cyber security Crossword Puzzles

Unit 2 vocabolar 2025-09-30

Unit 2 vocabolar crossword puzzle
Across
  1. In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
  2. The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
  3. The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
  4. A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
  5. In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
  6. The guarantee that systems and data are accessible and available to authorized users when needed.
  7. The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
  1. A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
  2. The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
  3. A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
  4. A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
  5. The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
  6. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.

13 Clues: The guarantee that systems and data are accessible and available to authorized users when needed.A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals....

Transhumanizam - ponavljanje 2024-04-10

Transhumanizam - ponavljanje crossword puzzle
Across
  1. Postupak zamrzavanja sa svrhom očuvanja tkiva
  2. Kiborg, Cyber
  3. Pokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bića
  4. Filozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija
Down
  1. Musk Osnivač SpaceX-a
  2. ... Života
  3. Moždani čip Elona Muska
  4. Popularizirao pojam transhumanizma u svom eseju

8 Clues: ... ŽivotaKiborg, CyberMusk Osnivač SpaceX-aMoždani čip Elona MuskaPostupak zamrzavanja sa svrhom očuvanja tkivaPopularizirao pojam transhumanizma u svom esejuPokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bićaFilozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija

Landon cybersecurity puzzle 2026-04-07

Landon cybersecurity puzzle crossword puzzle
Across
  1. A security system that blocks or allows network traffic based on safety rules.
  2. A secret set of characters used to access accounts or devices.
  3. Security — Protecting a computer network from unauthorized access or attacks.
  4. Security — Protecting data from being accessed, altered, or destroyed by unauthorized users.
  5. A scam where attackers trick you into giving personal information through fake emails or websites.
  6. Malware that spreads on its own across networks without needing a file or user action.
  7. A type of malware that spreads by attaching itself to files and activates when the file is opened.
  8. The process of converting data into a coded form so only authorized users can read it.
  9. Any harmful software designed to damage, disrupt, or gain unauthorized access to a device or system.
Down
  1. Authentication (2FA) — A security method that requires two forms of verification, like a password and a code sent to your phone.
  2. A hidden program that gives hackers control over a system while staying undetected.
  3. Backup — Saving copies of your files in case the original data is lost or damaged.
  4. Malware that locks or threatens your data and demands payment to restore access.
  5. Citizenship — Using technology responsibly, safely, and respectfully online.
  6. Software that secretly monitors your activity and collects personal information.

15 Clues: A secret set of characters used to access accounts or devices.Citizenship — Using technology responsibly, safely, and respectfully online.Security — Protecting a computer network from unauthorized access or attacks.A security system that blocks or allows network traffic based on safety rules....

ADM(Mat) Crossword Puzzle 2023-03-24

ADM(Mat) Crossword Puzzle crossword puzzle
Across
  1. a _____ must be completed when there is a change in personal circumstances
  2. it's unauthorized access, disclosure, destruction, removal, modification, use or interruption of assets or information
  3. it's the combination of the frequency, probability and the consequences of a mishap
  4. an _____ security report is to be completed within 48 hours of incident detection
  5. it's an area where access is limited to authorized personnel, to authorized and properly escorted visitors, signs indicate perimeter and is monitored
Down
  1. you are required to ______suspicious behavior
  2. these security _____ identify the type and level of sensitivity of information and their use protects the information from unauthorized disclosure
  3. a security _____ is a condition of employment or service, relative to position and must be fulfilled before commencement of duties
  4. is a situation where employees stop work and gather in a room that can be locked
  5. this tool further provides strategic direction on the management and oversight of security within ADM(Mat) in support of adherence to the PGS, DAODs and NDSODs etc
  6. a security _____ is any workplace violence, act, event, or omission that could result in a compromise of DND/CAF information, assets, or services

11 Clues: you are required to ______suspicious behaviora _____ must be completed when there is a change in personal circumstancesis a situation where employees stop work and gather in a room that can be lockedan _____ security report is to be completed within 48 hours of incident detection...

Cyber Threat Landscape 2024-04-04

Cyber Threat Landscape crossword puzzle
Across
  1. Pretending to be an employee that forgot their password
  2. Type of phishing scam that involves an email with phone number to call
  3. Using digital ads to deliver malware
  4. Cybercriminals send emails claiming to be from a reputable source
  5. Sending text messages containing malicious link
  6. Type of phishing attack that targets specific people or organizations through malicious emails
  7. Software designed to disrupt a device's normal operations without the user's knowledge
Down
  1. Type of authentication that uses multi-step account log in process that requires more than just a password
  2. Type of malware that prevents users from accessing their device and data
  3. Defrauding people over the phone
  4. Cybersecurity thret using QR codes to trick users
  5. Manipulated video, photo or audio recording that used AI to make it appear real
  6. Type of scam that an email appears to be sent for legitimate request

13 Clues: Defrauding people over the phoneUsing digital ads to deliver malwareSending text messages containing malicious linkCybersecurity thret using QR codes to trick usersPretending to be an employee that forgot their passwordCybercriminals send emails claiming to be from a reputable source...

Security within the IoT 2017-04-26

Security within the IoT crossword puzzle
Across
  1. People don't learn enough about the _______ they use to secure them properly.
  2. The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
  3. 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
  4. An important step to take during product development is to identify the potential ________ of hackers.
  5. The Internet of things is changing our _______ of personal security.
  6. Security can be a significant _______ to organizations adopting IoT technologies.
  7. BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
  1. Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
  2. IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
  3. IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
  4. Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
  5. Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
  6. The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
  7. According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
  8. Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.

15 Clues: The Internet of things is changing our _______ of personal security.People don't learn enough about the _______ they use to secure them properly.Security can be a significant _______ to organizations adopting IoT technologies.Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks....

global food security cross word puzzle 2024-04-19

global food security cross word puzzle crossword puzzle
Across
  1. The first basic human necessity and everyone's fundamental right.
  2. Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
  3. Altered weather patterns and agricultural productivity
  4. Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
  5. An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
  6. the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
  1. Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
  2. Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
  3. Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
  4. leading international efforts to address the need that people around the world have for reliable sources of quality food.
  5. Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
  6. Crucial for agriculture, requires sustainable management
  7. Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
  8. When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
  9. evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.

15 Clues: Altered weather patterns and agricultural productivityCrucial for agriculture, requires sustainable managementThe first basic human necessity and everyone's fundamental right.Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets....

Understanding Money 15.1 by Emily Mendola 2024-05-09

Understanding Money 15.1 by Emily Mendola crossword puzzle
Across
  1. A plastic card that allows the holder to make credit purchases up to an authorized amount
  2. Means that money is a common measure of the worth or price of a good or service
  3. Allows customers to pay for purchases directly from their checking account
  4. Banks that are a part of the Federal Reserve
  5. Money received today is worth more in the future because money today can be invested or deposited in the bank to earn interest
  6. A security that pays interest over terms of ten to thirty years
  7. A transfer of money from one bank account to another(EFT)
  8. The process of transferring money from one individual or organization to another
  9. A security that matures in a year or less
  10. Money is used in exchange for goods and services needed by individuals, businesses, and governments
  11. Nation's central bank that supervises and regulates banks in the country
Down
  1. Action taken to manage the supply of money and interest rates in an economy
  2. A security that pays interest over terms ranging from two to ten years
  3. A type of document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payer named on the document
  4. The mechanism a nation uses to provide and manage money for itself
  5. Means that money can be saved and used at a later date
  6. Type of financial investment issued by a corporation, government, or other organization
  7. Anything of value that is accepted in return for goods or services

18 Clues: A security that matures in a year or lessBanks that are a part of the Federal ReserveMeans that money can be saved and used at a later dateA transfer of money from one bank account to another(EFT)A security that pays interest over terms of ten to thirty yearsThe mechanism a nation uses to provide and manage money for itself...

cybersecurity terms 2022-12-16

cybersecurity terms crossword puzzle
Across
  1. a computer connected to a network that has been compromised by a hacker
  2. a kind of software used to prevent, scan, detect and delete viruses from a computer
  3. software that enables a user to covert information from another computer by transmitting data from their hard drive
  4. software that allows an unauthorized user to access a computer
  5. a type of malware that self replicates and infects other computers
  6. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
  7. a type of malware that disguises itself as legitimate code or software\
  8. software that displays advertising material
  9. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
  1. a network security device that monitors and filters incoming and outgoing network traffic
  2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
  3. malicious software that blocks access to a computer until a sum of money is paid
  4. an undocumented way of gaining access to a computer system
  5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  6. a network of computers with malicious software
  7. any program that prohibits a pop-up at some point in time
  8. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
  9. software updates that address security vulnerabilities

18 Clues: software that displays advertising materiala network of computers with malicious softwaresoftware updates that address security vulnerabilitiesany program that prohibits a pop-up at some point in timean undocumented way of gaining access to a computer systemsoftware that allows an unauthorized user to access a computer...

Privacy and security 2018-11-14

Privacy and security crossword puzzle
Across
  1. This is when someone is calling or emailed you and tries to get you to sign up for something to get your personal info.
  2. when the sims 4 game is ______ it becomes all pixelated.
  3. This is when someone has you identity.
  4. Usually ______ are hacked because they have the most personal info
  5. Students learn strategys on how to protect there online ______________ for something.
  6. if you have a strong ______ you will most likely not be hacked
  7. How many people where effected when Facebook was hacked.
Down
  1. how many adults have been hacked in 2018
  2. Who need to learn about this so there future isn't affected?
  3. When repetitive emails are sent telling you that you won something and want you to do something.
  4. This is a statement or legal document explaining how the party/company is using your information.
  5. when people are hacked because of weak passwords their_________.
  6. if there where _______ to teach people how to stay safe; more people would not be hacked
  7. So many people are hacked because they are _______.
  8. What was the year that the most people where hacked

15 Clues: This is when someone has you identity.how many adults have been hacked in 2018So many people are hacked because they are _______.What was the year that the most people where hackedwhen the sims 4 game is ______ it becomes all pixelated.How many people where effected when Facebook was hacked....

Ukraine Food Security 2022-10-26

Ukraine Food Security crossword puzzle
Across
  1. Goods sent out of a country
  2. Relating to the government or affairs of a country
  3. Conflict between different countries
  4. Being provided with the necessary food for growth
  5. Resources given to aid others
  6. How much something costs
  7. Not enough of something (food)
  8. Current leader of Russia
  9. The country currently in need of help
Down
  1. Not having enough of/the right food
  2. The state of being stable, regarding to food
  3. Hostile actions to another
  4. Someone/a family being forced to leave their home
  5. When you help someone, you provide them with your ...
  6. Something of a high cost

15 Clues: How much something costsSomething of a high costCurrent leader of RussiaHostile actions to anotherGoods sent out of a countryResources given to aid othersNot enough of something (food)Not having enough of/the right foodConflict between different countriesThe country currently in need of helpThe state of being stable, regarding to food...

Ukraine Food Security 2022-11-01

Ukraine Food Security crossword puzzle
Across
  1. Relating to the government or affairs of a country
  2. Not enough of something (food)
  3. Goods sent out of a country
  4. Someone/a family being forced to leave their home
  5. Current leader of Russia
  6. Conflict between different countries
  7. Something of a high cost
  8. Being provided with the necessary food for growth
Down
  1. Resources given to aid others
  2. Not having enough of/the right food
  3. The country currently in need of help
  4. Hostile actions to another
  5. When you help someone, you provide them with your ...
  6. How much something costs
  7. The state of being stable, regarding to food

15 Clues: How much something costsCurrent leader of RussiaSomething of a high costHostile actions to anotherGoods sent out of a countryResources given to aid othersNot enough of something (food)Not having enough of/the right foodConflict between different countriesThe country currently in need of helpThe state of being stable, regarding to food...

Ukraine Food Security 2022-11-01

Ukraine Food Security crossword puzzle
Across
  1. Relating to the government or affairs of a country
  2. Not enough of something (food)
  3. Goods sent out of a country
  4. Someone/a family being forced to leave their home
  5. Current leader of Russia
  6. Conflict between different countries
  7. Something of a high cost
  8. Being provided with the necessary food for growth
Down
  1. Resources given to aid others
  2. Not having enough of/the right food
  3. The country currently in need of help
  4. Hostile actions to another
  5. When you help someone, you provide them with your ...
  6. How much something costs
  7. The state of being stable, regarding to food

15 Clues: How much something costsCurrent leader of RussiaSomething of a high costHostile actions to anotherGoods sent out of a countryResources given to aid othersNot enough of something (food)Not having enough of/the right foodConflict between different countriesThe country currently in need of helpThe state of being stable, regarding to food...

Information Security Crossword 2025-09-03

Information Security Crossword crossword puzzle
Across
  1. principle of keeping data accurate and unchanged. (9 letters)
  2. program that spreads by attaching to files. (5 letters)
  3. secret used to access systems. (8 letters)
  4. security item to secure doors. (5 letters)
  5. designed to damage or disrupt. (7 letters)
  6. accounts with two or more verification steps. (3 letters)
  7. document defining how data is handled. (6 letters)
Down
  1. who gains unauthorized access. (6 letters)
  2. review of systems for compliance and risks. (5 letters)
  3. information unreadable without a key. (11 letters)
  4. control that limits who can see or use data. (9 letters)
  5. messages used to trick people into giving data. (8 letters)
  6. hidden malicious program disguised as useful. (6 letters)
  7. where someone pretends to be another user. (11 letters)
  8. systems and networks from attacks. (10 letters)

15 Clues: who gains unauthorized access. (6 letters)secret used to access systems. (8 letters)security item to secure doors. (5 letters)designed to damage or disrupt. (7 letters)systems and networks from attacks. (10 letters)information unreadable without a key. (11 letters)document defining how data is handled. (6 letters)...

Security Career Knowledge 2026-03-18

Security Career Knowledge crossword puzzle
Across
  1. Techniques used to reduce tension and prevent a situation from becoming violent.
  2. A security procedure where a facility is secured and movement is restricted to allow security staff to interdict an active threat.
  3. The act of being aware of your surroundings and recognizing potential threats before they become a problem.
  4. A modular, sloped-face concrete barrier designed to prevent vehicle intrusion into high-risk sites
  5. Protective measures used to secure the outer boundary of a facility.
  6. A multi-disciplinary approach to reducing the incidence of crime by designing and managing the physical environment.
Down
  1. A short, sturdy vertical post designed to prevent vehicle intrusion into pedestrian spaces, while being easily navigated on foot.
  2. Razor wire formed in large, interlocking coils used to create ground barriers or fence-top barriers to physical intrusion.
  3. Methods used to manage large groups of people safely and efficiently.
  4. The process of controlling who is allowed to enter or exit a location.
  5. The process of checking people or items for threats before entry, often utilizing metal detectors or x-rays.
  6. A designated entry or exit location for a facility.
  7. Protection of digital systems and data from unauthorized access or attacks.
  8. The act of security personnel regularly moving through an area to observe/detect threats and ensure security.
  9. Crime prevention concept that maximizes visibility by modifying, removing or relocating features to enhance perimeter observation.

15 Clues: A designated entry or exit location for a facility.Protective measures used to secure the outer boundary of a facility.Methods used to manage large groups of people safely and efficiently.The process of controlling who is allowed to enter or exit a location.Protection of digital systems and data from unauthorized access or attacks....

Cybersecurity Fundamental Chapter 7 Part 2 2022-10-31

Cybersecurity Fundamental Chapter 7 Part 2 crossword puzzle
Across
  1. dedicated site that monitor, assesses, and defends the organization's information system.
  2. can supplement or in some cases, replace security guards.
  3. hardware or software solutions that enforce network security policies. Filters unauthorize or potentially dangerous traffic from entering the network.
  4. uses network to make or receive phone calls.
Down
  1. one of the faster sectors of information technology is the use of intelligent devices and sensors.
  2. allows two or more locations to communicate simultaneously using telecommunication technologies.
  3. logs the transaction for later retrieval.
  4. one or more location containing the tools that provide administrators with a detail status of the organization's network.
  5. form the backbone of the internet and communications between different
  6. the outermost layer of security, and these solutions are the most publicly visible.
  7. can be the foundation of highly secure identification and personal verification solutions.
  8. allows an individual to gain access to an area with automated entry points.
  9. provide a way to group devices within a LAN and on individual switches. use logical connections instead of physical connections.

13 Clues: logs the transaction for later retrieval.uses network to make or receive phone calls.can supplement or in some cases, replace security guards.form the backbone of the internet and communications between differentallows an individual to gain access to an area with automated entry points....

2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26

2024 OSCE Scholarship for Peace and Security - Crossword puzzle crossword puzzle
Across
  1. the world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy
  2. The world's largest regional security organization (Acronym)
  3. Synonym for firearms (Acronym)
  4. Agreement which prohibits the possession of nuclear weapons (Acronym)
  5. UN Security Council Resolution on Women, Peace and Security (Acronym)
  6. Agreement allowing for conduct of short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
Down
  1. A key OSCE arms control agreement outlining provisions n military information exchange
  2. Cornerstone rule guiding OSCE decision-making processes
  3. UN Security Council Resolution on the non-proliferation of weapons of mass destruction (Acronym)
  4. Together with Pu-239, it is used for the production of nuclear weapons (Abbrev.)

10 Clues: Synonym for firearms (Acronym)Cornerstone rule guiding OSCE decision-making processesThe world's largest regional security organization (Acronym)Agreement which prohibits the possession of nuclear weapons (Acronym)UN Security Council Resolution on Women, Peace and Security (Acronym)...

Cyber Security Crossword By Mora Marcuzzi 2020-08-20

Cyber Security Crossword By Mora Marcuzzi crossword puzzle
Across
  1. diseñado para infiltrarse en su dispositivo sin su conocimiento.Son subrepticios y trabajan activamente en contra de los intereses de la persona atacada.
  2. correo electrónico no solicitado que recibe una persona.
  3. evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
  4. infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
Down
  1. es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
  2. recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.

6 Clues: correo electrónico no solicitado que recibe una persona.evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador....

HAAS1 2024-07-19

HAAS1 crossword puzzle
Across
  1. What Centre would a customer go to for an appointment?
  2. What term do we use apart from 'customer' for a person applying for or receiving benefits
  3. What type of calls will we mostly be dealing with?
  4. We must ask security questions before speaking to a Customer in order to comply with Data_____?
  5. What is the name of the company we work for?
  6. A security question we ask for is the Customer's N___?
  7. What should you take plenty of during training?
  8. Which device should you have on silent during training?
  9. What term is used for a person who deals with a Customer's affairs if they are unable to do it for themselves?
Down
  1. What Centre will a customer call to reschedule an assessment appointment?
  2. What is a Customer applying for from DWP?
  3. In training what is there never, when it comes to a question?
  4. What number does NINO stand for?
  5. What does the second 'A' in HAAS stand for?
  6. This is a security question
  7. Which is the UK's biggest public service department?
  8. What type of contract is HAAS?
  9. What does the first 'A' in HAAS stand for?
  10. What does the 'H' stand for in HAAS?
  11. What 2x15 minute activity will we have each day?

20 Clues: This is a security questionWhat type of contract is HAAS?What number does NINO stand for?What does the 'H' stand for in HAAS?What is a Customer applying for from DWP?What does the first 'A' in HAAS stand for?What does the second 'A' in HAAS stand for?What is the name of the company we work for?What should you take plenty of during training?...

Corporate Security Crossword 2023-08-15

Corporate Security Crossword crossword puzzle
Across
  1. Many alarms come through this system via email on building issues
  2. Patrol vehicle for corporate security
  3. What does the "A" stand for in ALL
  4. App used to store employee badge identification
  5. App that is used for guests to check in
  6. Where we log our daily activity and incident reports
  7. App that Security uses to inform during emergency
Down
  1. Greatest boss of all time
  2. 99% of our job is this and 1% is better
  3. Homeland security partnered program with Haworth to mitigate risks during importing and exporting of goods
  4. Information shared from one shift to the next
  5. Name of the master key

12 Clues: Name of the master keyGreatest boss of all timeWhat does the "A" stand for in ALLPatrol vehicle for corporate security99% of our job is this and 1% is betterApp that is used for guests to check inInformation shared from one shift to the nextApp used to store employee badge identificationApp that Security uses to inform during emergency...

At the airport 2018-10-16

At the airport crossword puzzle
Across
  1. Verspätung
  2. Sicherheit; Schutz, Wachdienst
  3. Zoll
  4. Abflug
  5. Landung
  6. Gate
  7. Ankunft
  8. Start
  9. Visum
Down
  1. Flugzeug
  2. Kontrolle
  3. Schalter
  4. Passagier
  5. Reisender
  6. Gepäck
  7. Ausweis
  8. Koffer
  9. Flug

18 Clues: ZollGateFlugStartVisumGepäckKofferAbflugAusweisLandungAnkunftFlugzeugSchalterKontrollePassagierReisenderVerspätungSicherheit; Schutz, Wachdienst

Paul y el avión 2022-10-10

Paul y el avión crossword puzzle
Across
  1. pass, go through
  2. bed
  3. security
  4. worried
  5. sad
  6. because
  7. leaves
  8. runs
  9. plane
Down
  1. special
  2. looks at
  3. agent
  4. opens
  5. airport
  6. closes
  7. frustrated
  8. traffic
  9. car

18 Clues: bedcarsadrunsagentopensplaneclosesleavesspecialairporttrafficworriedbecauselooks atsecurityfrustratedpass, go through

crossword puzzle 2021-05-20

crossword puzzle crossword puzzle
Across
  1. cyber hub is located in
  2. tourism provides changes which causes
  3. teet ka achar is a pickle made from _ tree
  4. tourism may change _ effects
Down
  1. old custom of people which is still followed
  2. famous epic mahabharata was written in this state
  3. bird santuary is located in
  4. traditional headgear worn by men
  5. women cover their head by

9 Clues: cyber hub is located inwomen cover their head bybird santuary is located intourism may change _ effectstraditional headgear worn by mentourism provides changes which causesteet ka achar is a pickle made from _ treeold custom of people which is still followedfamous epic mahabharata was written in this state

E-Safety 2013-12-09

E-Safety crossword puzzle
Across
  1. Usually a scam but can be used to advertise.
  2. bully A person that uses the internet to bully someone.
  3. Staying safe on-line.
  4. A popular social networking website.
  5. A scam to steal your information.
Down
  1. A person that steals your information.
  2. Keeps your information safe.
  3. Allows you to video chat.
  4. Attacks your computer.

9 Clues: Staying safe on-line.Attacks your computer.Allows you to video chat.Keeps your information safe.A scam to steal your information.A popular social networking website.A person that steals your information.Usually a scam but can be used to advertise.bully A person that uses the internet to bully someone.

amazing crossword puzzle 1 2023-09-12

amazing crossword puzzle 1 crossword puzzle
Across
  1. ff
  2. c
  3. f
  4. ate
  5. s y
  6. ph
  7. cres
  8. tu
  9. x
Down
  1. tt
  2. w
  3. b
  4. l
  5. no
  6. in
  7. s
  8. c
  9. i

18 Clues: wbcflscixttffnoinphtuates ycres

vocabulary 2025-08-01

vocabulary crossword puzzle
Across
  1. สานพานรับส่งกระเป๋าในสนามบิน
  2. กระเป๋าเป้สะพายหลัง
  3. สายการบิน
  4. ออกเดินทาง
  5. ลงทะเบียนขึ้นเครื่องบิน
  6. ประตูทางออก
  7. เที่ยวบิน
  8. ผู้โดยสาร
Down
  1. การประกาศ
  2. ระบบรักษาความปลอดภัย
  3. ความสนุกสนาน, ความเพลิดเพลิน
  4. บัตรโดยสาร
  5. มาถึง
  6. ขึ้นเครื่องบิน
  7. ชั้นโดยสารราคาถูกที่สุด
  8. ถอดออก
  9. พนักงานขนกระเป๋า

17 Clues: มาถึงถอดออกการประกาศสายการบินเที่ยวบินผู้โดยสารบัตรโดยสารออกเดินทางประตูทางออกขึ้นเครื่องบินพนักงานขนกระเป๋ากระเป๋าเป้สะพายหลังระบบรักษาความปลอดภัยชั้นโดยสารราคาถูกที่สุดลงทะเบียนขึ้นเครื่องบินความสนุกสนาน, ความเพลิดเพลินสานพานรับส่งกระเป๋าในสนามบิน

Black Friday 2025-11-19

Black Friday crossword puzzle
Across
  1. ; A good offer or a good price.
  2. ; Full of people.
  3. ; A time when things are cheaper.
  4. ; A person who buys something.
  5. ; Something that does not cost a lot of money.
  6. ; A group of people waiting.
Down
  1. Something that costs a lot of money.
  2. ; A price reduction.
  3. ; A place where you can buy things.
  4. Monday ; The online shopping day after Black Friday.
  5. mall ; A big building with many stores.

11 Clues: ; Full of people.; A price reduction.; A group of people waiting.; A person who buys something.; A good offer or a good price.; A time when things are cheaper.; A place where you can buy things.Something that costs a lot of money.mall ; A big building with many stores.; Something that does not cost a lot of money....

Black Friday 2025-11-19

Black Friday crossword puzzle
Across
  1. ; A good offer or a good price.
  2. ; Full of people.
  3. ; A time when things are cheaper.
  4. ; A person who buys something.
  5. ; Something that does not cost a lot of money.
  6. ; A group of people waiting.
Down
  1. Something that costs a lot of money.
  2. ; A price reduction.
  3. ; A place where you can buy things.
  4. Monday ; The online shopping day after Black Friday.
  5. mall ; A big building with many stores.

11 Clues: ; Full of people.; A price reduction.; A group of people waiting.; A person who buys something.; A good offer or a good price.; A time when things are cheaper.; A place where you can buy things.Something that costs a lot of money.mall ; A big building with many stores.; Something that does not cost a lot of money....

Positions and Order Status 2026-02-05

Positions and Order Status crossword puzzle
Across
  1. Is the one to five characters used to represent the security. This is defined by the different markets or exchanges.
  2. The lifespan of a trading order, specifying how long it remains active before execution or expiration
  3. Is the price at which the security traded. A footnote will indicate whether this is real-time or delayed.
  4. Is the security's price increase or decrease since the previous market close.
  5. The title of the security is displayed in this field.
  6. Displays the value of the holding or your account.
  7. Instructions determining when and at what price a security is bought or sold, including market orders, limit orders, and stop-loss orders.
  8. Your order ended without being filled or canceled.
  9. Part of your order was filled. The remaining part was canceled.
Down
  1. Your order was rescinded at your request.
  2. The page to view current and recent trades.
  3. Your order cancellation request has been submitted.
  4. Your order cancellation request has been submitted.
  5. For stocks or mutual funds, this reflects the number of shares you currently hold. For fixed income securities, this field reflects the face value of the securities. For options, this field reflects the number of option contracts purchased or sold.
  6. Part of the order has been filled; part is still open.
  7. The total original cost of acquiring an asset—including purchase price, commissions, and fees.
  8. Your order is waiting to be completed.

17 Clues: Your order is waiting to be completed.Your order was rescinded at your request.The page to view current and recent trades.Displays the value of the holding or your account.Your order ended without being filled or canceled.Your order cancellation request has been submitted.Your order cancellation request has been submitted....

Maritime Piracy 2014-12-03

Maritime Piracy crossword puzzle
Across
  1. Festland
  2. abnehmen
  3. Zwischenfall
  4. zur See gehörig
  5. Gewalt
  6. Bewusstheit
  7. Spannungen
  8. Wasserfahrzeug
  9. Hafen
  10. vemeiden
Down
  1. Fracht
  2. berauben
  3. Überschrift
  4. einheimisch
  5. Sicherheitsmaßnahme
  6. Grenze
  7. Raub
  8. blinder Passagier
  9. Bedrohung

19 Clues: RaubHafenFrachtGrenzeGewaltberaubenFestlandabnehmenvemeidenBedrohungSpannungenÜberschrifteinheimischBewusstheitZwischenfallWasserfahrzeugzur See gehörigblinder PassagierSicherheitsmaßnahme

Comunidad = Community 2025-09-25

Comunidad = Community crossword puzzle
Across
  1. pastor
  2. libreria
  3. iglesia
  4. paramedico
  5. concerje
  6. bombero
  7. polecia
  8. mesero(a)
Down
  1. taller
  2. seguridad
  3. escuela
  4. cura/sacerdote
  5. jefe de cocina
  6. biblotecaria
  7. carpintero
  8. monja
  9. biblioteca
  10. propina
  11. banderas

19 Clues: monjapastortallerescuelaiglesiabomberopropinapolecialibreriaconcerjebanderasseguridadmesero(a)paramedicocarpinterobibliotecabiblotecariacura/sacerdotejefe de cocina

Theme Words 2026-02-17

Theme Words crossword puzzle
Across
  1. primeur
  2. verzoek
  3. in scène gezet
  4. anoniem
  5. beveiliging
  6. onbetrouwbaar
  7. onverantwoordelijk
  8. realistisch
Down
  1. toegang
  2. krantenkop
  3. erg populair
  4. bron
  5. objectief
  6. subjectief
  7. misleidend, bedreigend
  8. mening
  9. kritisch
  10. zoekopdracht
  11. virtueel

19 Clues: bronmeningtoegangprimeurverzoekanoniemkritischvirtueelobjectiefkrantenkopsubjectiefbeveiligingrealistischerg populairzoekopdrachtonbetrouwbaarin scène gezetonverantwoordelijkmisleidend, bedreigend

Valentine's Security Crossword 2023-02-08

Valentine's Security Crossword crossword puzzle
Across
  1. Mixing cocoa, cocoa butter, milk and sugar= result.
  2. ____________ and a Gentleman
  3. Common candy heart phrase.
  4. The act of bringing something to an end.
  5. Small cherub that brings couples together.
  6. Main drive running east to west.
  7. Gene Simmons is the lead singer of this band since 1973.
  8. A ______ by any other name would smell as sweet.
  9. Rosa, Dianthus and Alstroemeria are the scientific names for?
Down
  1. The program for keeping eyes on all the things.
  2. Guests that enter the building as workers
  3. Visitors for success track days.
  4. Wifi __________ changes each month.
  5. Pumps about 1.5 gallons of blood every minute
  6. Second part of ILY

15 Clues: Second part of ILYCommon candy heart phrase.____________ and a GentlemanVisitors for success track days.Main drive running east to west.Wifi __________ changes each month.The act of bringing something to an end.Guests that enter the building as workersSmall cherub that brings couples together.Pumps about 1.5 gallons of blood every minute...

Robbery, Safety & Security 2021-10-21

Robbery, Safety & Security crossword puzzle
Across
  1. "The ____ is ready"
  2. _______ situation
  3. ________ Officer
  4. A robber is committing a _______
  5. You are supposed to _________ with the robber.
  6. Remain ____!
  7. listen _______
Down
  1. __________ location
  2. Always consult the Robbery __________
  3. _________ aka blackmail
  4. ____ Threat Procedures
  5. Ask _________
  6. color of your robbery book
  7. extortion phone ____
  8. ____ clear signal

15 Clues: Remain ____!Ask _________listen _______________ Officer_______ situation____ clear signal__________ location"The ____ is ready"extortion phone ________ Threat Procedures_________ aka blackmailcolor of your robbery bookA robber is committing a _______Always consult the Robbery __________You are supposed to _________ with the robber.

SECURITY AWARENESS PUZZLE 2023-09-20

SECURITY AWARENESS PUZZLE crossword puzzle
Across
  1. Acronym for the Central Intelligence Agency
  2. Classified material must never be stored in your office?
  3. Visitors must have an ___ at all times
  4. This must be worn at all times when entering, exiting and within all company locations
  5. Classified material must NEVER be brought to your?
  6. Acronym for Communications Security
  7. If an unauthorized individual has seen classified material the the material has been?
  8. This is any information that reflects unfavorably on the loyalty, integrity and character of employees who hold a security clearance
Down
  1. Access to classified information requires a clearance and a (3 words)
  2. AREA Name of the area in a facility where classified computer equipment is openly stored (two words)
  3. Acronym for a classified computer in a closed area
  4. An orange stripe on an visitor's badge indicates that the visitor is a?
  5. What does the acronym FOUO stand for?
  6. Acronym for Department of Defense?
  7. Where must classified documents be secured at the end of the workday?

15 Clues: Acronym for Department of Defense?Acronym for Communications SecurityWhat does the acronym FOUO stand for?Visitors must have an ___ at all timesAcronym for the Central Intelligence AgencyAcronym for a classified computer in a closed areaClassified material must NEVER be brought to your?Classified material must never be stored in your office?...

Information Security - Crossword 2024-03-25

Information Security - Crossword crossword puzzle
Across
  1. A security protocol that provides secure communication over a network, often used for remote access
  2. A type of authentication that verifies a user's identity based on physical characteristics
  3. A security measure that restricts access based on the principle of least privilege
  4. A cryptographic key that is kept secret and used for decrypting data
  5. A protocol used to secure email communication
  6. A program or device that identifies and authenticates a user's identity electronically
  7. An attack that involves intercepting and altering communication between two parties
  8. A method of encrypting data that uses a single key for both encryption and decryption
Down
  1. The act of tricking individuals into revealing sensitive information
  2. A type of attack that uses social engineering to manipulate individuals into taking specific actions
  3. A type of malware that hides its presence and can perform malicious actions without user knowledge
  4. A type of attack that floods a system with excessive traffic to disrupt normal operation
  5. A security incident response plan to restore systems and operations after an attack
  6. A technique used to ensure data integrity by creating a unique hash value for a file
  7. Software used to detect and prevent unauthorized access to a computer network

15 Clues: A protocol used to secure email communicationThe act of tricking individuals into revealing sensitive informationA cryptographic key that is kept secret and used for decrypting dataSoftware used to detect and prevent unauthorized access to a computer networkA security measure that restricts access based on the principle of least privilege...

Security Audit Quiz 2025-11-18

Security Audit Quiz crossword puzzle
Across
  1. The probability of a threat exploiting a vulnerability.
  2. NIST CSF function focused on safeguarding assets
  3. Final step of an audit process.
  4. Checking compliance to documented requirements.
  5. A weakness that can be exploited.
  6. A potential cause of an unwanted incident.
  7. Ability to track actions back to individuals or systems.
  8. U.S. body responsible for cybersecurity standards.
Down
  1. The defined boundary of an audit.
  2. measures implemented to reduce risk.
  3. Level of harm from a compromise.
  4. Unauthorized attempt to access a system.
  5. Critical element of CIA triad.
  6. Testing to confirm proper implementation.
  7. Adhering to required standards or regulations.

15 Clues: Critical element of CIA triad.Final step of an audit process.Level of harm from a compromise.The defined boundary of an audit.A weakness that can be exploited.measures implemented to reduce risk.Unauthorized attempt to access a system.Testing to confirm proper implementation.A potential cause of an unwanted incident....

Information Security Puzzle 2026-02-27

Information Security Puzzle crossword puzzle
Across
  1. Loggoff or ____ systems when leaving them unattended.
  2. All users must update their web browsers ______
  3. - Users will not modify this without management approval
  4. Only ______, process, or store on CMMC compliant systems
  5. _______ technical information is subject to controls on access, use reproduction, and dissemenation which is defined by the customer
  6. Use _____, encrypt, then email CUI information
  7. GITLAB is only authorized for unclassified and ____
  8. Printed CUI must be reported to _______ for tracking purposes and stored in a locked cabinet or office.
  9. Transmitted emails must be ____________
Down
  1. Authorization granted based on role, job function, and need-to-know-
  2. Information type that must be identified in the SSP as CUI or non-CUI: ______
  3. Users will not this sensitive information on mobile devices
  4. Without this documented and approved, Cromulence will fail governance requirements-__________
  5. Keeping the web browser up to date is the ____ responsibility.
  6. Certification that verifies defense contractors meet cybersecurity standards to protect CUI? ____

15 Clues: Transmitted emails must be ____________Use _____, encrypt, then email CUI informationAll users must update their web browsers ______GITLAB is only authorized for unclassified and ____Loggoff or ____ systems when leaving them unattended.- Users will not modify this without management approvalOnly ______, process, or store on CMMC compliant systems...

Delirium section 2 2015-05-04

Delirium section 2 crossword puzzle
Across
  1. A solution to a sickness.
  2. A building on a farmstead.
  3. A live music show.
  4. A Word for security watching people.
  5. Library of approved books.
  6. The name for the disease of love.
  7. Library of authorized music.
  8. People who live in the wilds.
  9. The main characters best friend.
  10. University of ______
  11. The color of a storm cloud.
  12. Main character.
Down
  1. A time set for someone to be home.
  2. Group of people who patrol the streets after curfew.
  3. Separation of people based on prejudice.
  4. Alex has a 3 pronged ____ on the side of his head.
  5. A place where science experiments are conducted.
  6. Lena's aunts name.
  7. A vision you have while sleeping.
  8. Security guard who catches Lena and Hana.

20 Clues: Main character.A live music show.Lena's aunts name.University of ______A solution to a sickness.A building on a farmstead.Library of approved books.The color of a storm cloud.Library of authorized music.People who live in the wilds.The main characters best friend.The name for the disease of love.A vision you have while sleeping....

MLK Community Trivia 2023-11-11

MLK Community Trivia crossword puzzle
Across
  1. main street nearest this location
  2. feeder Middle School to East High
  3. thriving neighborhood fitness center
  4. friendly Youth Services Manager
  5. resource center filled with literature
  6. Community nickname
  7. Harley Field is located here
  8. assist students w/ schoolwork and STEM activities
  9. education center for 9th - 12th grade
Down
  1. Dr. King's name
  2. referred to as "Unk" or "Uncle" at the branch
  3. largest park near MLK Library
  4. our comedic male security officer
  5. can be found engaging with teens
  6. the MLK "TikTok" Queen
  7. MLK Branch manager
  8. the next educational level after high school
  9. motherly, nurturing security officer
  10. works mostly with children at MLK
  11. local rec & community center
  12. person most likely in School Help Center
  13. GO BUCKS!

22 Clues: GO BUCKS!Dr. King's nameMLK Branch managerCommunity nicknamethe MLK "TikTok" Queenlocal rec & community centerHarley Field is located herelargest park near MLK Libraryfriendly Youth Services Managercan be found engaging with teensmain street nearest this locationour comedic male security officerfeeder Middle School to East High...

Refugee 2022-12-06

Refugee crossword puzzle
Across
  1. redrob
  2. retlehs
  3. sserts
  4. ytiruces
  5. yrtnuoc
  6. eegufer
  7. noitairtaper
  8. ytilitsoh
  9. enimaf
  10. noitargimmi
  11. decalpsid
  12. epacse
  13. sudoxe
Down
  1. ssensselemoh
  2. seitlausac
  3. noitucesrep
  4. yrautcnas
  5. noitatroped
  6. noitargim
  7. enitnarauq
  8. sisirc
  9. RCHNU
  10. eeucave

23 Clues: RCHNUredrobssertssisircenimafepacsesudoxeretlehsyrtnuoceegufereeucaveytirucesyrautcnasnoitargimytilitsohdecalpsidseitlausacenitnarauqnoitucesrepnoitatropednoitargimmissensselemohnoitairtaper

vamos a viaje 2023-02-02

vamos a viaje crossword puzzle
Across
  1. gate
  2. suitcase
  3. to takeoff
  4. arrival
  5. to land
  6. passenger
  7. to travel
  8. vacation
  9. ticket
  10. passport
Down
  1. call somebody
  2. identification
  3. monitor or screen
  4. luggage
  5. to board
  6. security
  7. itinerary
  8. airport
  9. departure
  10. flight

20 Clues: gateticketflightluggageairportarrivalto landsuitcaseto boardsecurityvacationpassportitinerarydeparturepassengerto travelto takeoffcall somebodyidentificationmonitor or screen

E 2024-05-17

E crossword puzzle
Across
  1. - bevestigd
  2. - beheerder
  3. - beschouw
  4. - flierefluiten
  5. - genezen
  6. - afhankelijk
  7. - beveiliging
  8. - aankondiging
  9. - flexibiliteit
  10. - been
  11. - eschikbare
  12. - Bediening
Down
  1. - bereidtzichop
  2. - afstand
  3. - aanzienlijk
  4. - benodige
  5. - aanwezig
  6. - uitgevoerde
  7. - geschikte
  8. - Algemeen
  9. ogni parola inglese
  10. - behendigheid

22 Clues: - been- afstand- genezen- beschouw- benodige- aanwezig- Algemeen- bevestigd- beheerder- geschikte- Bediening- eschikbare- aanzienlijk- uitgevoerde- afhankelijk- beveiliging- aankondiging- behendigheid- bereidtzichop- flierefluiten- flexibiliteitogni parola inglese

Buffet de vocabulaire: Bon voyage page 8 2025-10-26

Buffet de vocabulaire: Bon voyage page 8 crossword puzzle
Across
  1. security
  2. luggage check
  3. airport
  4. plane
  5. terminal
  6. information
  7. track
  8. flight
  9. to land
Down
  1. newsstand
  2. platform
  3. to take off
  4. to declare
  5. compartment
  6. luggage
  7. snack bar
  8. restrooms
  9. counter
  10. seat
  11. customs

20 Clues: seatplanetrackflightairportluggagecountercustomsto landplatformsecurityterminalnewsstandsnack barrestroomsto declareto take offcompartmentinformationluggage check

Travelling 2024-01-28

Travelling crossword puzzle
Across
  1. badedragt
  2. sikkerhed
  3. solbriller
  4. hovedstad
  5. flybillet
  6. attraktion
  7. møntenhed
Down
  1. stewardesse
  2. visum
  3. fly
  4. kuffert
  5. strand
  6. pas
  7. geografi
  8. lufthavn
  9. håndbagage

16 Clues: flypasvisumstrandkuffertgeografilufthavnbadedragtsikkerhedhovedstadflybilletmøntenhedsolbrillerhåndbagageattraktionstewardesse

az nfb 2024-08-14

az nfb crossword puzzle
Across
  1. Respect
  2. Ownership
  3. Resilience
  4. Journey
  5. Opportunity
  6. Reinforce
  7. Delegate
  8. Experience
  9. Identity
Down
  1. Status
  2. Arizona
  3. Freewill
  4. Authentic
  5. Momentum
  6. Innovation
  7. Porterfield

16 Clues: StatusRespectArizonaJourneyFreewillMomentumDelegateIdentityOwnershipAuthenticReinforceResilienceInnovationExperienceOpportunityPorterfield

Kelas 7.5_Keisha Sunjaya 2023-05-10

Kelas 7.5_Keisha Sunjaya crossword puzzle
Across
  1. memperoleh informasi yg tepat dan akurat merupakan damoak tik yg
  2. mendapatkan jaringan nama lainnya
  3. salah satu kartu untuk mengakses kesehatan
  4. privasi yg berhubungan dengan fisik seseorang
  5. proyek kolaborasi merupakan media sosial yg berbentuk
  6. contoh perdagangan e-commerce
Down
  1. keinginan untuk menyendiri
  2. semua kolaborasi yg di upayakan pasti di mediasi oleh
  3. salah satu pengaruh tik yaitu
  4. cyber bullying merupakan contoh dampak yg

10 Clues: keinginan untuk menyendirisalah satu pengaruh tik yaitucontoh perdagangan e-commercemendapatkan jaringan nama lainnyacyber bullying merupakan contoh dampak ygsalah satu kartu untuk mengakses kesehatanprivasi yg berhubungan dengan fisik seseorangsemua kolaborasi yg di upayakan pasti di mediasi oleh...

Informatika 2024-08-10

Informatika crossword puzzle
Across
  1. Salah satu game online popular
  2. salah satu aplikasi media sosial
  3. Ilmu yang berkaitan dengan pemodelan matematika dan penggunaan komputer untuk menyelesaikan masalah-masalah sains
Down
  1. Salah satu karakter dalam profil pelajar pancasila
  2. Penghitungan dengan menggunakan komputer
  3. Dunia Maya
  4. Salah satu aplikasi jual beli online
  5. Salah satu aplikasi penyedia layanan transportasi
  6. Seseorang yang tidak begitu mahir dalam bermain
  7. Pembelajaran secara online

10 Clues: Dunia MayaPembelajaran secara onlineSalah satu game online popularsalah satu aplikasi media sosialSalah satu aplikasi jual beli onlinePenghitungan dengan menggunakan komputerSeseorang yang tidak begitu mahir dalam bermainSalah satu aplikasi penyedia layanan transportasiSalah satu karakter dalam profil pelajar pancasila...

9/11 2025-06-02

9/11 crossword puzzle
Across
  1. deep emotional response
  2. Type of attack carried out on 9/11
  3. Some were sacrificed for security
  4. US President
  5. intense national pride & unity
  6. saw stricter laws and regulations
Down
  1. gov. department added
  2. increased following 9/11
  3. Immigrants faced this
  4. expanded government authority to spy on citizens
  5. Targeted religious group
  6. created to strengthen national security

12 Clues: US Presidentgov. department addedImmigrants faced thisdeep emotional responseincreased following 9/11Targeted religious groupintense national pride & unitySome were sacrificed for securitysaw stricter laws and regulationsType of attack carried out on 9/11created to strengthen national securityexpanded government authority to spy on citizens

The Final 2025-08-20

The Final crossword puzzle
Across
  1. ein áleypari (bæði á vøllinum og uttanfyri)
  2. The Final. Attack on Wembley is a ?
  3. The safest _____ was England losing
  4. málscorari
  5. verjuleikari
  6. Player focused on free school meals Marcus ?
  7. The England team missed three ?
  8. ____ guard
  9. the sport
  10. what the stadium went into when the pressure from fans was at its highest
  11. a plan
  12. number of years between each of the England finals
Down
  1. the players came from different ?
  2. It´s _____ home
  3. Feeling it gives fans when their team wins
  4. Feeling fans get when they cannot enter the stadium
  5. Feel an _____ rush
  6. Wembley is the ____ stadium of England
  7. word used when security cannot control an entrance

19 Clues: a planthe sportmálscorari____ guardverjuleikariIt´s _____ homeFeel an _____ rushThe England team missed three ?the players came from different ?The Final. Attack on Wembley is a ?The safest _____ was England losingWembley is the ____ stadium of EnglandFeeling it gives fans when their team winsein áleypari (bæði á vøllinum og uttanfyri)...

Viajar 2023-03-10

Viajar crossword puzzle
Across
  1. to land
  2. exit
  3. counter
  4. to board
  5. luggage
  6. pilot
  7. passenger
  8. aisle
  9. suitcase
  10. customs
Down
  1. window
  2. seat
  3. airline
  4. security
  5. flight
  6. plane
  7. to take off
  8. arrival
  9. ticket

19 Clues: seatexitplanepilotaislewindowflightticketto landairlinecounterluggagearrivalcustomssecurityto boardsuitcasepassengerto take off

Kiley-bullying 2022-03-11

Kiley-bullying crossword puzzle
Across
  1. moment joking or making fun of someone
  2. someone standing and watching people get bullied
  3. hitting,spitting,punching
  4. someone who bully's people
  5. subject to aggressive pressure or intimidation.
Down
  1. name calling
  2. intended to provoke or make fun of someone in a playful way.
  3. online bullying

8 Clues: name callingonline bullyinghitting,spitting,punchingsomeone who bully's peoplemoment joking or making fun of someonesubject to aggressive pressure or intimidation.someone standing and watching people get bulliedintended to provoke or make fun of someone in a playful way.

ASEAN 2023-09-13

ASEAN crossword puzzle
Across
  1. Negara ASEAN dengan jumlah penduduk paling sedikit
  2. Kejahatan cyber crime merupakan dampak dari kemajuan
  3. Negara ASEAN dengan gunungapi terbanyak selain Indonesia
  4. Sungai Irawadi terletak di negara
  5. Keputusan tertinggi rapat ASEAN
  6. Masalah sosial negara berkembang
Down
  1. Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
  2. Salah satu Sekjen ASEAN berada di negara
  3. Merk mobil yang berasal dari negara Malaysia
  4. Perjanjian AFTA di tanda tangani di negara
  5. Pertemuan Defence Minister Meeting (ADMM)membahas tentang
  6. Sungai Chao Praya mengalir di negara
  7. Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
  8. Pakaian tradisional Vietnam
  9. Organisasi negara-negara kawasan Asia Tenggara

15 Clues: Pakaian tradisional VietnamKeputusan tertinggi rapat ASEANMasalah sosial negara berkembangSungai Irawadi terletak di negaraSungai Chao Praya mengalir di negaraSalah satu Sekjen ASEAN berada di negaraPerjanjian AFTA di tanda tangani di negaraMerk mobil yang berasal dari negara MalaysiaOrganisasi negara-negara kawasan Asia Tenggara...

Financial Fundamentals 2023-05-24

Financial Fundamentals crossword puzzle
Across
  1. Rate of ________ is the relationship between the amount received and cost of investment
  2. Regulates bank deposits
  3. _________ tax is based on land and buildings
  4. _______ system shows the relationships between individuals, businesses, and governments
  5. Trade _______ is bad for the economy; buying things outside of the country
  6. A short-term debt security (abbr)
  7. A rise in the general level of prices
  8. ______ price index is an index of the variation in prices paid by typical consumers for retail goods and other items.
  9. _______ Supply is the amount of money in circulation in an economy
  10. _______ Cash Flow is money expected to receive in the future
Down
  1. A security representing ownership in a corporation
  2. ________ Exchange Rate is the value of a country’s currency in relation to the value of the money in another country
  3. Regulates stock markets
  4. A security representing a loan issued by a business or government
  5. _______ rates are the cost of borrowing money
  6. Any item that serves as a method of payment
  7. _____ Insurance insures an individual against the risk of financial loss in case of death
  8. _______ markets are securities with maturities of greater than one year
  9. Trade _______ is good for the economy; trading out/paying for goods in country
  10. Regulates banks

20 Clues: Regulates banksRegulates bank depositsRegulates stock marketsA short-term debt security (abbr)A rise in the general level of pricesAny item that serves as a method of payment_________ tax is based on land and buildings_______ rates are the cost of borrowing moneyA security representing ownership in a corporation...

Terminology 2025-12-12

Terminology crossword puzzle
Across
  1. Internal resource for learning and development.
  2. Facility space containing equipment for cooling air/water using refrigerant.
  3. Personnel who accompany visitors or assets within a facility.
  4. We provide security and safety services
  5. System used for incident reporting and management.
  6. Safeguard people and locations to deliver on Meta's priorities, principles, and mission.
  7. The enclosure on the roof of a building that houses mechanical equipment.
  8. A silent alert signaling that a person is under threat.
  9. Microsoft's email and personal information manager application.
Down
  1. A sudden illness or injury requiring immediate attention.
  2. A highly secure, restricted area within Meta data centers where the destruction and sanitation of storage media devices take place.
  3. The internal knowledge base for Global Security Operations.
  4. Learning and development platform used for training courses.
  5. Main entry control point, often where visitors check in.
  6. Room where external network circuits enter the building (acronym).
  7. The main area in a facility where servers and network gear are housed.
  8. Consistent, regular routes and patterns followed by security personnel.
  9. Physical access control system software used to manage badge access.
  10. A room containing heat exchanger elements, often for HVAC.

19 Clues: We provide security and safety servicesInternal resource for learning and development.System used for incident reporting and management.A silent alert signaling that a person is under threat.Main entry control point, often where visitors check in.A sudden illness or injury requiring immediate attention....

Whatsapp in the news bbc 2025-06-17

Whatsapp in the news bbc crossword puzzle
Across
  1. The right to keep personal information secure and confidential.
  2. The process of converting data into a coded format to protect privacy.
  3. The parent company of WhatsApp, involved in the legal fight over encryption.
Down
  1. A popular messaging app known for its end-to-end encryption.
  2. The entity seeking access to encrypted user data in this legal case.
  3. Measures taken to protect information from unauthorized access.
  4. Short for "Technical Capability Notice," a secret government request for data access.
  5. The tech giant currently battling the UK Home Office over data security.
  6. End-to-end encryption, a security method preventing third-party access to messages.
  7. Apple’s cloud storage service that uses encryption for data security.

10 Clues: A popular messaging app known for its end-to-end encryption.Measures taken to protect information from unauthorized access.The right to keep personal information secure and confidential.The entity seeking access to encrypted user data in this legal case.Apple’s cloud storage service that uses encryption for data security....

ISMS Introduction Puzzle 2022-03-13

ISMS Introduction Puzzle crossword puzzle
Across
  1. The organization shall evaluate the information security performance and the _______ of the ISMS
  2. Need to demonstrate leadership and commitment with respect to the ISMS
  3. In the risk treatment process, this document must be produced before formulating an information security treatment plan
  4. A potential cause of an unwanted incident, which may result in harm to a system or organization
  5. Combination of the probability of an event and its consequences
  6. The organization shall determine interested parties that are relevant to the ISMS and the requirements of these interested parties relevant to information security. the above statement is described under Clause x.x Understanding the needs and ______________of interested parties.
  7. The organization shall continually improve the __________________, adequacy and effectiveness of the ISMS.
Down
  1. Contains the control objectives and controls to help in the information security risk treatment process
  2. Ensuring that information is accessible only to those authorized to access
  3. Excluding any of the requirements specified in Clause 4 to 10 is not acceptable when an organization claims ______to this International Standard
  4. The organization shall ensure that the information security risk assessments produce consistent, valid and ________ results.
  5. Is conducted at planned intervals to ensure the suitability, adequacy and effectiveness of ISMS
  6. Shall be conducted by the organization at planned intervals to provide information on whether the ISMS conforms to the organization’s own requirements for its ISMS and the requirements of the ISO27001 standards.
  7. The organization shall determine the boundaries and applicability of the ISMS to establish its
  8. Documented information of external _______, determined by the organization to be necessary for the planning and operation of the ISMS, shall be identified as appropriate, and controlled

15 Clues: Combination of the probability of an event and its consequencesNeed to demonstrate leadership and commitment with respect to the ISMSEnsuring that information is accessible only to those authorized to accessThe organization shall determine the boundaries and applicability of the ISMS to establish its...

global food security cross word puzzle 2024-04-19

global food security cross word puzzle crossword puzzle
Across
  1. An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
  2. Crucial for agriculture, requires sustainable management
  3. Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
  4. Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
  5. Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
  6. the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
  1. The first basic human necessity and everyone's fundamental right.
  2. leading international efforts to address the need that people around the world have for reliable sources of quality food.
  3. Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
  4. Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
  5. When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
  6. Altered weather patterns and agricultural productivity
  7. Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
  8. Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
  9. evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.

15 Clues: Altered weather patterns and agricultural productivityCrucial for agriculture, requires sustainable managementThe first basic human necessity and everyone's fundamental right.Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets....

INTERNET 2023-11-29

INTERNET crossword puzzle
Across
  1. service provider IPS
  2. engine google, yahoo, edge
  3. this device wraps up ur sTechnologyndy
Down
  1. web cyber_
  2. Revenue Service IRS
  3. old people have a hard time understanding
  4. a world that you join in Minecraft

7 Clues: web cyber_Revenue Service IRSservice provider IPSengine google, yahoo, edgea world that you join in Minecraftthis device wraps up ur sTechnologyndyold people have a hard time understanding

Cybersecurity Awareness 2023 2023-10-06

Cybersecurity Awareness 2023 crossword puzzle
Across
  1. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
  3. Digital ______ is the ability to use digital technology and media effectively
  4. Illegal _____ of copyrighted material is often referred to as piracy
  5. Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. Cybersecurity awareness month
  7. Online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. Many features in online _____ can expose players to predators
  9. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
  1. A person who attempts to gain unauthorized access to computer systems
  2. _____ settings help control things like your profile, contact, and other information relating to your account
  3. Online harrassment
  4. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  5. ______ theft is a type of crime in which your private information is stolen and used for criminal activity
  6. Designed to detect and destroy computer viruses

15 Clues: Online harrassmentCybersecurity awareness monthDesigned to detect and destroy computer virusesMany features in online _____ can expose players to predatorsIllegal _____ of copyrighted material is often referred to as piracyA person who attempts to gain unauthorized access to computer systems...

Tormentos - Bully free themed crossword puzzle 2025-12-08

Tormentos - Bully free themed crossword puzzle crossword puzzle
Across
  1. Abusive language or insults
  2. Showing behavior that is considerate of other people
  3. The feeling of being ashamed
  4. Displaying kindness or concern for others
Down
  1. To frighten someone
  2. bullying A name for digital bullying
  3. Not allowing someone or something to take part in a activity
  4. To give someone support or confidence
  5. Tormentos without the s

9 Clues: To frighten someoneTormentos without the sAbusive language or insultsThe feeling of being ashamedbullying A name for digital bullyingTo give someone support or confidenceDisplaying kindness or concern for othersShowing behavior that is considerate of other peopleNot allowing someone or something to take part in a activity

Chapter 2 Vocabulary 2022-09-07

Chapter 2 Vocabulary crossword puzzle
Across
  1. Security through domination
  2. ability to wield power independently
  3. The fundamental rules and norms of politics
  4. weak states that breaks down
  5. The ability of a state to carry out actions
  6. Political power concentrated to authority
  7. Ability to wield power to make people work
  8. States that have strong sovereignty
  9. tendency toward decentralisation
  10. Federalism that is not uniform
Down
  1. Combined political entities of state, regime, gov
  2. Power that is distributed to regional bodies
  3. Something recognised as right and proper
  4. States that have weak sovereignty
  5. Appeals on the laws they offer
  6. Using customs and age to justify
  7. Organisation that maintains a monopoly of violence
  8. Appeals by power or ideas
  9. Security through cooperation
  10. The leadership that runs the state

20 Clues: Appeals by power or ideasSecurity through dominationweak states that breaks downSecurity through cooperationAppeals on the laws they offerFederalism that is not uniformUsing customs and age to justifytendency toward decentralisationStates that have weak sovereigntyThe leadership that runs the stateStates that have strong sovereignty...

nvs 2013-09-12

nvs crossword puzzle
Across
  1. 1
  2. 2
  3. 4
  4. 6
  5. 9
  6. 17
  7. 13
  8. 3
  9. 10
  10. 14
  11. 15
Down
  1. 11
  2. 16
  3. 5
  4. 8
  5. 7
  6. 12

17 Clues: 1245869371116171310141215

Vocabulary 11A/ 11B 2014-11-30

Vocabulary 11A/ 11B crossword puzzle
Across
  1. slepkavība
  2. aplaupīt
  3. pieslēgties
  4. izdemolēt īpašumu
  5. kabatzaglis
  6. noķert zagli
  7. vīruss
  8. pielikums
  9. platjoslas internets
  10. nozagt
  11. noziegums
Down
  1. lejuplādēt
  2. tiešsaiste
  3. drošība
  4. meklēt
  5. portatīvais dators
  6. izdarīt noziegumu
  7. veikalu zaglis
  8. izdzēst
  9. atzīties

20 Clues: meklētvīrussnozagtdrošībaizdzēstaplaupītatzītiespielikumsnoziegumsslepkavībalejuplādēttiešsaistepieslēgtieskabatzaglisnoķert zagliveikalu zaglisizdarīt noziegumuizdemolēt īpašumuportatīvais datorsplatjoslas internets

Unit 16 2020-04-16

Unit 16 crossword puzzle
Across
  1. kirurg
  2. padi
  3. aksessuaar
  4. vahekäik
  5. reisiterminal
  6. karistus
  7. kohane
  8. turvalisus
  9. pagas
  10. kandik
  11. trahv
Down
  1. meditsiiniline
  2. ilmnema
  3. ürgne loodus
  4. reisi sihtkoht
  5. võõrastemaja
  6. kellekski saada tahtja
  7. mehaanik
  8. rabav
  9. loeng
  10. sadam

21 Clues: padirabavloengsadampagastrahvkirurgkohanekandikilmnemamehaanikvahekäikkaristusaksessuaarturvalisusürgne loodusvõõrastemajareisiterminalmeditsiinilinereisi sihtkohtkellekski saada tahtja

Лудкечпи 2020-03-10

Лудкечпи crossword puzzle
Across
  1. нарушитель защиты
  2. лэптоп
  3. осведомленность
  4. запутанный
  5. злоупотребление
  6. надёжность
  7. безопасность
  8. целостность данных
Down
  1. результат, проблема
  2. масса,куча
  3. доступность
  4. код,шифр
  5. цель
  6. финансовые средства
  7. последствие
  8. добиваться
  9. средства, имущество
  10. страшный
  11. опора
  12. быстрый

20 Clues: цельопоралэптопбыстрыйкод,шифрстрашныймасса,кучадобиватьсязапутанныйнадёжностьдоступностьпоследствиебезопасностьосведомленностьзлоупотреблениенарушитель защитыцелостность данныхрезультат, проблемафинансовые средствасредства, имущество

SS2 p.50 2020-11-02

SS2 p.50 crossword puzzle
Across
  1. lenig, soepel
  2. rijk
  3. gelegenheid
  4. persoonlijkheid
  5. mysterieus
  6. arm
  7. smoking
  8. veiligheid
  9. vijandig
  10. houding
  11. medaille
Down
  1. crimineel
  2. luxueus
  3. gebied
  4. helling
  5. meer
  6. vele
  7. eerste hulp
  8. opereren
  9. kennis
  10. bevroren
  11. vrouwelijk

22 Clues: armrijkmeervelegebiedkennisluxueushellingsmokinghoudingopererenbevrorenvijandigmedaillecrimineelmysterieusveiligheidvrouwelijkgelegenheideerste hulplenig, soepelpersoonlijkheid

1 2024-05-17

1 crossword puzzle
Across
  1. prepared
  2. substantial
  3. General
  4. suitable
  5. way
  6. leg
  7. conducted
  8. present
  9. flies
  10. agility
  11. required
Down
  1. security
  2. Available
  3. Control
  4. confirmed
  5. administrator
  6. wall
  7. announcement
  8. cured
  9. dependent
  10. distance
  11. flexibility
  12. consider

23 Clues: waylegwallcuredfliesGeneralControlpresentagilitysecuritypreparedsuitabledistanceconsiderrequiredAvailableconfirmedconducteddependentsubstantialflexibilityannouncementadministrator

Hispanic Heritage Month (airport edition) 2024-09-07

Hispanic Heritage Month (airport edition) crossword puzzle
Across
  1. Aviation
  2. Passport
  3. Welcome
  4. Bathroom
  5. Shoes
  6. Knives
  7. Belt
  8. Security
  9. Hello
  10. Goodmorning
Down
  1. Food
  2. Gate
  3. Pockets
  4. Drink
  5. Airplane
  6. Hat
  7. Please
  8. Thankyou
  9. Sharp
  10. Computer
  11. Airport
  12. Needles
  13. Baggage

23 Clues: HatFoodGateBeltDrinkShoesSharpHelloPleaseKnivesPocketsWelcomeAirportNeedlesBaggageAviationAirplanePassportThankyouBathroomComputerSecurityGoodmorning

Crucigrama del vocabulario de avión 2025-03-13

Crucigrama del vocabulario de avión crossword puzzle
Across
  1. tripulación
  2. maleta
  3. luggage
  4. despegar
  5. maletero
  6. desembarcar
  7. vuelo
  8. Aterrizar
  9. aéreolinea
  10. país
  11. inspeccionar
  12. mostrador
Down
  1. avión
  2. pasajera
  3. aduana
  4. reclamar
  5. demora
  6. destino
  7. pasaporte
  8. extranjero
  9. Salir
  10. boleto
  11. seguridad

23 Clues: paísaviónvueloSaliraduanamaletademoraboletoluggagedestinopasajerareclamardespegarmaleteropasaporteAterrizarseguridadmostradorextranjeroaéreolineatripulacióndesembarcarinspeccionar

Incarceron 2022-03-15

Incarceron crossword puzzle
Across
  1. rub or push
  2. dwdwqw
  3. dwddw
  4. wqddwqdwd
  5. wqdwdwq
  6. guards and security
  7. wqdd
  8. asdad
  9. adwqdw
  10. ddwwqd
Down
  1. szxZXx
  2. zDw
  3. az metal band
  4. unavoidable
  5. aszza
  6. wdwdq
  7. dww
  8. wqddw
  9. shake
  10. dqdw

20 Clues: zDwdwwwqdddqdwaszzadwddwwdwdqwqddwshakeasdadszxZXxdwdwqwadwqdwddwwqdwqdwdwqwqddwqdwdrub or pushunavoidableaz metal bandguards and security

Maslow's hierarchy of needs 2025-12-08

Maslow's hierarchy of needs crossword puzzle
Across
  1. установить
  2. неспособный
  3. безопасность
  4. улучшать
  5. внешний
  6. осведомленный
  7. иметь значение
  8. отличие
  9. искать
  10. ключевой
Down
  1. оценивать
  2. выбирать
  3. способный
  4. цитировать
  5. ценить
  6. поведение
  7. результат
  8. присущий
  9. свойственный
  10. директива
  11. использовать
  12. трудоустройство
  13. гарантировать

23 Clues: ценитьискатьвнешнийотличиевыбиратьулучшатьприсущийключевойоцениватьспособныйповедениерезультатдирективаустановитьцитироватьнеспособныйбезопасностьсвойственныйиспользоватьосведомленныйгарантироватьиметь значениетрудоустройство

Practice voc 6-7-8-9 - 9 Grade 2026 2026-02-11

Practice voc 6-7-8-9 - 9 Grade 2026 crossword puzzle
Across
  1. בריון
  2. רציני
  3. לכן
  4. חברה
  5. תהליך
  6. אירוע
  7. יקר ערך
  8. סיבה
  9. עלול/עשוי
Down
  1. להתרחש
  2. כפר
  3. סופר/מחבר
  4. אזור
  5. יתרון
  6. הערה/תגובה
  7. חשיבות
  8. התנצלות
  9. לקבל
  10. כלכלה
  11. ביטחון
  12. עובדה

21 Clues: כפרלכןאזורחברהלקבלסיבהבריוןרצינייתרוןתהליךכלכלהאירועעובדהלהתרחשחשיבותביטחוןהתנצלותיקר ערךסופר/מחברעלול/עשויהערה/תגובה

Espacio en Espanol 2026-03-19

Espacio en Espanol crossword puzzle
Across
  1. volatile
  2. weight
  3. both
  4. environment
  5. daily
  6. fog up
  7. rate
  8. acquire
  9. security
  10. challenging
  11. float
Down
  1. to carry out
  2. loss
  3. flavor
  4. this is
  5. innovative
  6. behavior
  7. value
  8. there
  9. advantages
  10. to unravel

21 Clues: lossbothratedailyvaluetherefloatweightflavorfog upthis isacquirevolatilebehaviorsecurityinnovativeadvantagesto unravelenvironmentchallengingto carry out

ICSS Unit 6 2024-08-16

ICSS Unit 6 crossword puzzle
Across
  1. Data cleansing will eliminate data that are ________.
  2. DNC Registry allows one to opt out of receiving __________ calls and messages
  3. Operational _______ refers to business disruption as a result of data breach.
  4. Operational security is also known as _______ security.
  5. A common form of MFA is two-factor __________.
  6. What type of system is required to keep customers' data secure?
  7. One way to ethically gain customer data is through a ________ survey.
  8. DTMF will mask the tones so that attacker will not be able to decipher the _______ frequency of the credit card details that was keyed in.
Down
  1. ______ loggers steal login credentials and sensitive enterprise data.
  2. Patch updates could be delayed due to undiscovered __________ before a major software update.
  3. One of the consequences of security breach is ______ damage.
  4. Trojans are malicious programs disguised as ________ ones.
  5. PDDA stands for Personal Data ________ Act
  6. Telephony ______ of services attack is an attempt to make telephone system unavailable to users.
  7. Too much data is also known as data ______.
  8. They key concepts of PDPA are consent, reasonableness and ________.

16 Clues: PDDA stands for Personal Data ________ ActToo much data is also known as data ______.A common form of MFA is two-factor __________.Data cleansing will eliminate data that are ________.Operational security is also known as _______ security.Trojans are malicious programs disguised as ________ ones....

Sustainability 2019-05-02

Sustainability crossword puzzle
Across
  1. beings
  2. Science
  3. Made
  4. test
  5. protection
  6. Goal
  7. World
  8. Agreement
  9. Security
Down
  1. Distructure
  2. environmental
  3. Chranabled
  4. Change
  5. Seeds
  6. Mammal
  7. Write

16 Clues: MadetestGoalSeedsWriteWorldbeingsChangeMammalScienceSecurityAgreementChranabledprotectionDistructureenvironmental

Sustainability 2019-05-02

Sustainability crossword puzzle
Across
  1. beings
  2. Science
  3. Made
  4. test
  5. protection
  6. Goal
  7. World
  8. Agreement
  9. Security
Down
  1. Distructure
  2. environmental
  3. Chranabled
  4. Change
  5. Seeds
  6. Mammal
  7. Write

16 Clues: MadetestGoalSeedsWriteWorldbeingsChangeMammalScienceSecurityAgreementChranabledprotectionDistructureenvironmental

Networking Concepts , Cyber Ethics 2025-06-15

Networking Concepts , Cyber Ethics crossword puzzle
Across
  1. Wide
  2. Privacy
  3. Access
  4. Manners
  5. Rules
  6. Connect
  7. Copying
Down
  1. Virus
  2. Internet
  3. Service
  4. Security
  5. Adress
  6. Device
  7. Stealing
  8. Harassment
  9. Local

16 Clues: WideVirusRulesLocalAccessAdressDevicePrivacyServiceMannersConnectCopyingInternetSecurityStealingHarassment

ord fra teksten 2025-08-25

ord fra teksten crossword puzzle
Across
  1. skinner
  2. omringet
  3. selskab
  4. medlem
  5. født
  6. farlig
  7. undvige
Down
  1. leder
  2. piger
  3. telefon
  4. bedstemor
  5. sikkerhed
  6. ben
  7. kabler
  8. tog
  9. gammel

16 Clues: bentogfødtlederpigermedlemkablergammelfarligskinnertelefonselskabundvigeomringetbedstemorsikkerhed

Cyber-bullying Crossword 2023-05-04

Cyber-bullying Crossword crossword puzzle
Across
  1. Which foundation is run by the government
  2. About 50% of ----- students experience online harrassment
  3. Who are most affected by cyberbullying
  4. Cyberbullying is a ...
  5. Where is cyberbullying most found
  6. Who did we write our letter too
  7. Our global issue
Down
  1. What social media platform has the highest percentage of reported harassment
  2. “Being a victim of cyberbullying has a greater effect on adolescents’ -------- and suicidal ideation”
  3. Mental issues ----- with the use of social media
  4. Scott Freeman is the Founder of what Foundation
  5. Ross Ellis is the Founder of what Foundation
  6. What rates are tied to cyberbullying

13 Clues: Our global issueCyberbullying is a ...Who did we write our letter tooWhere is cyberbullying most foundWhat rates are tied to cyberbullyingWho are most affected by cyberbullyingWhich foundation is run by the governmentRoss Ellis is the Founder of what FoundationScott Freeman is the Founder of what Foundation...

CYBER FEST CROSSWORD 2025-01-23

CYBER FEST CROSSWORD crossword puzzle
Across
  1. Cybercrime that uses fake emails to trick people into people sharing personal information
  2. Digital currency
  3. Any type of harmful software designed to damage or disrupt a computer system
  4. a machine programmed by a computer capable of carrying out actions automatically
  5. a collection of instructions, data, or computer programs that enable a computer to perform specific tasks
  6. AI
  7. Common Gateway Interface
  8. an intentional act of compromising computer systems
Down
  1. VR
  2. Virtual computer world
  3. Characters used to verify identity
  4. Act of gaining access to a computer, database or system
  5. A global computer network

13 Clues: VRAIDigital currencyVirtual computer worldCommon Gateway InterfaceA global computer networkCharacters used to verify identityan intentional act of compromising computer systemsAct of gaining access to a computer, database or systemAny type of harmful software designed to damage or disrupt a computer system...

Cyberbullying 2022-05-09

Cyberbullying crossword puzzle
Across
  1. If you are being cyberbullied, you should keep _____ of their messages
  2. A type of worry that can be caused by cyberbullying
  3. Online harassment
  4. Extreme sadness
Down
  1. Sometimes a cyber bully may create a fake ___
  2. Online information: social
  3. Messaging between phones
  4. A popular video-viewing app
  5. If you are being cyberbullied, you should tell a _____ adult
  6. Not risky
  7. One way to defend against a cyberbully
  8. A messaging app whose icon is a little ghost

12 Clues: Not riskyExtreme sadnessOnline harassmentMessaging between phonesOnline information: socialA popular video-viewing appOne way to defend against a cyberbullyA messaging app whose icon is a little ghostSometimes a cyber bully may create a fake ___A type of worry that can be caused by cyberbullying...

SMG Crossword Puzzle 2025-12-15

SMG Crossword Puzzle crossword puzzle
Across
  1. - A large company or group
  2. a measure of a company’s stock price relative to
  3. average forecast for a companies forecast
  4. - is the highest price and the lowest price of the stock over a 52-week
  5. - A debt security issues by government
Down
  1. Price a company will fetch in the open market by investor perception
  2. - measures volatility as compared to the overall stock
  3. a short unique abbreviation representing a public trading company or security on stock exchange
  4. is a loan made by an issuer (borrower) to a lender (investor).
  5. is a broad group of stocks often in the same industry.
  6. - Type of bond that includes Debt security issued by state, cities or county,
  7. - Company total income for selling goods or services.
  8. earnings.
  9. basis- the original price paid for an asset is used to determine capital gain or loss

14 Clues: earnings.- A large company or group- A debt security issues by governmentaverage forecast for a companies forecasta measure of a company’s stock price relative to- Company total income for selling goods or services.- measures volatility as compared to the overall stockis a broad group of stocks often in the same industry....

Religion, renewal and choice 2020-11-02

Religion, renewal and choice crossword puzzle
Across
  1. The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space)
  2. Davies' term that reflected the fact the clergy practise religion on behalf of the majority, who experience religion second hand - ________ religion.
  3. ___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity.
  4. The term used by Lyon to describe the fact that religious ideas no longer exist in physical churches only because of the media.
  5. The phrase used by Lyon that suggests that the world is not becoming rationalised, but instead is evolving and developing new unconventional beliefs, practices and spirituality.
  6. Hervieu-Leger's idea that religion has become individualised and we can select our own DIY beliefs that fit with our lives (2 words, no space)
  7. Refers to the growing interconnectedness of societies, which has led to greatly increased movements of ideas and beliefs across national boundaries.
Down
  1. The theoretical perspective that is explored and supported by the research and theories from this topic (beginning with P)
  2. The term used by Helland to describe the new forms of 'cyber-religion' that exist that challenge traditional, hierarchical religious ideas (2 words, no space)
  3. Religious _________ theory. The theory created by Stark and Bainbridge to explain the differences in secularisation in America and Europe.
  4. Cycle of _________. Term used by Stark and Bainbridge to explain why increasing diversity in religion does not have to lead to secularisation.
  5. The group Hervieu-Leger described as following an individual path of self-discovery and following New Age ideas.
  6. Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S)
  7. Davies' term that reflected the fact that people still follow religion but don't necessarily join an organisation - believing without ___________

14 Clues: The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space)___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity.Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S)...

Digital Privacy Crossword 2024-10-16

Digital Privacy Crossword crossword puzzle
Across
  1. A document that explains how websites use your data
  2. Extra layer of security that requires a code
  3. Data scrambled for security
  4. Using fake accounts to access restricted content
Down
  1. Checking identity before giving access
  2. Hidden malware disguised as legitimate software
  3. Small text files that track your online activity
  4. Security software that scans for threats
  5. Technology that verifies you are human (used on websites)
  6. A service that masks your IP address

10 Clues: Data scrambled for securityA service that masks your IP addressChecking identity before giving accessSecurity software that scans for threatsExtra layer of security that requires a codeHidden malware disguised as legitimate softwareSmall text files that track your online activityUsing fake accounts to access restricted content...

Collective Security & UN Peacekeeping 2018-02-13

Collective Security & UN Peacekeeping crossword puzzle
Across
  1. "The individual experts who have sat on the UN Sub-Commission on Protection of ______ ..." (pg. 245)
  2. Rights "The Security Council can Authorize a member state or regional organization to enforce _____" (pg. 195)
  3. Argued that peacekeeping is internal and external & makes the UN possible
  4. Scene of UN inaction and extreme violence
  5. "The UN's ___ reflects the ____ of the member states" (pg. 575)
  6. Site of UN peacekeeping as a result of British and French interests
  7. Attempt to cut off diplomatic or economic relations with a view towards altering offensive behavior (pg.61)
  8. Former political officer who shed light on the inner workings of UN decision making
  9. Concept that is through to undermine the efficiency of the UN. Used as a defense against UN action on human rights ( pg. 240)
  10. War A frigid conflict that bore peacekeeping
Down
  1. State that asked for UN assistance during the Cold War
  2. Timor UN administered territory during this entity's tradition ti independence (pg.105)
  3. An absence of centralized democratically elected governments, market economies, & the institutions associated with Western forms of governance (pg. 38)
  4. At times publicly protests governmental actions & provides assistance to refugees and contracts with NGOs (pg. 218)
  5. Security security arrangement, political, regional, or global, in which each state in the system accepts that the security of one is the concern of all, and therefore commits to a collective response to threats to, and breaches to peace
  6. Factor that contributed to the prioritization of UN needs over Rwanda (pg. 573)
  7. Tactic used by the UNGA and UNSC to target a specific actor or set of actors with the goal of changing actions or attitudes. Results of this are minimal due to the lack of coercive power attached to them ( pg. 199)
  8. Reflect interests of US Mission and Washington. Collateral damage is the production of indifference
  9. Author who's work details the origins, inner workings, responsibilities, and organizational powers of the UN
  10. Knowledge about human rights is not so much scientific knowledge, however as _______ judgement" (pg. 246)
  11. political "Peacekeeping" was created as much to salvage the UN from its ___ crises as it was to respond to threats to international peace and security" (pg. 31)
  12. One of many international entities dedicated to promoting and protecting human rights (acronym)

22 Clues: Scene of UN inaction and extreme violenceWar A frigid conflict that bore peacekeepingState that asked for UN assistance during the Cold War"The UN's ___ reflects the ____ of the member states" (pg. 575)Site of UN peacekeeping as a result of British and French interestsArgued that peacekeeping is internal and external & makes the UN possible...

MGR-22 CROSSWORD CONTEST 2022-08-22

MGR-22 CROSSWORD CONTEST crossword puzzle
Across
  1. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
  2. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
  3. IBM worked with __________ to create a scalable CRM platform, called Customer 360, which gives every part of IBM a holistic view into the client journey and cuts time to issue resolution by 26%
  4. “Never trust, always verify” is the first defining principle of which model
  5. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
  6. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers
  7. This aerospace manufacturer announced that open source, hybrid cloud, and AI technologies from IBM and Red Hat are part of its second mission
  8. One-way street to persisting top secrets
Down
  1. Decoy computers or systems that lure hackers and cybercriminals into attacking them
  2. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships
  3. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
  4. ensure the sensitive data is accessed only by an authorized user
  5. A Person who uses technology to gain unauthorized access to data is called a _____
  6. Recent IBM security acquisition of an endpoint security company.
  7. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was _____
  8. The _____________ ransomware group was involved in the recent hacking of a networking giant by compromising an employee’s personal google account.
  9. Cross-site scripting standing in front of a mirror
  10. To avoid ____________, user input should not be put directly into a database
  11. Vast Strides –I help in identifying Security Vulnerabilities
  12. A form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
  13. A protocol used for directory services authentication that was first developed in 1993
  14. A group of protocols used to encrypt data between two communication points.

22 Clues: One-way street to persisting top secretsCross-site scripting standing in front of a mirrorVast Strides –I help in identifying Security Vulnerabilitiesensure the sensitive data is accessed only by an authorized userRecent IBM security acquisition of an endpoint security company....

CyberCrossWord 2022-05-19

CyberCrossWord crossword puzzle
Across
  1. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  2. The process of verifying an identity by or for a system
  3. Policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  4. Code embedded in a program that copies itself and performs unwanted function
  5. The output of an encryption algorithm; the encrypted form of a message or data
  6. Assures that a system performs its intended function in an unimpaired manner
  7. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  8. A potential security harm to an asset
  9. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  10. Preserving authorized information access, or disclosure
  11. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  12. Assures that a system performs its intended function in an unimpaired manner
  13. A random value that is concatenated with a password
  14. A decoy system designed to lure a potential attacker away from critical systems
Down
  1. Confidentiality, integrity, and availability
  2. Assures that information and programs are changed only in a specified and authorized manner
  3. An attempt to alter system resources or affect their operation
  4. Attack An attempt to learn or make use of information from the system that does not affect system resources
  5. Guarding against improper information modification or destruction
  6. A program that takes over another computer and it's used to launch attacks
  7. Program that can replicate itself and send copies from computer to computer across network connections
  8. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  9. Assures that private information is disclosed to unauthorized individuals
  10. Weakness in an information system
  11. Function used to protect passwords that are stored in the local database
  12. A plastic card that can store and process data
  13. Assures that systems work promptly and service is not denied to authorized users
  14. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
  15. Key A temporary encryption key used between two principals
  16. The conversion of plaintext data into unintelligible form

30 Clues: Weakness in an information systemA potential security harm to an assetConfidentiality, integrity, and availabilityA plastic card that can store and process dataA random value that is concatenated with a passwordThe process of verifying an identity by or for a systemPreserving authorized information access, or disclosure...

Stock market terms 2023-10-25

Stock market terms crossword puzzle
Across
  1. max number of shares a publicly traded company can issue as specified in its articles of incorporation
  2. the money borrowed from a broker to purchase an investment
  3. when investors buy ownership of the shares of the company
  4. a period of time in a financial markets when the price of an asset or security continuously
  5. an intermediary between an investor and a security exchange
  6. a reward paid to the shareholders for their investment in a company's equity
  7. a period of sustained increases in the prices of stocks, bonds, or related indexes
  8. an order to buy/sell at the markets current available price
  9. the lowest price at which a seller will sell the stock
  10. The highest price a buyer will pay for a number of shares
  11. the standard deviation of a stocks annualised returns
  12. filling a buy/sell order in the market subject to conditions placed on the order by the end client
  13. to close out a position in a stock b/c price decline
  14. long means you own the security
  15. The foreign exchange market
Down
  1. execute a trade at a specific price that expires if not completed
  2. an order to buy/sell with a restriction
  3. a pooled collection of assets that invests in stocks, bonds, and other securities
  4. a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
  5. Measure of volatility
  6. a marketplace where securities, commodities, derivatives and other financial instruments are traded.
  7. the amount by which the ask price exceeds the bid price for an asset in the market
  8. a declining market
  9. number of shares traded between its daily open and close
  10. When a company first sells a stock to the public
  11. total value of all a companies shares of stock
  12. purchasing additional shares of a previously initiated investment after the price dropped
  13. collection of financial investments
  14. a statistic that captures the average change in a data series over time
  15. how much income an investment generates, separate from the principal.

30 Clues: a declining marketMeasure of volatilityThe foreign exchange marketlong means you own the securitycollection of financial investmentsan order to buy/sell with a restrictiontotal value of all a companies shares of stockWhen a company first sells a stock to the publicto close out a position in a stock b/c price decline...

Stock market terms 2023-10-25

Stock market terms crossword puzzle
Across
  1. max number of shares a publicly traded company can issue as specified in its articles of incorporation
  2. the money borrowed from a broker to purchase an investment
  3. when investors buy ownership of the shares of the company
  4. a period of time in a financial markets when the price of an asset or security continuously
  5. an intermediary between an investor and a security exchange
  6. a reward paid to the shareholders for their investment in a company's equity
  7. a period of sustained increases in the prices of stocks, bonds, or related indexes
  8. an order to buy/sell at the markets current available price
  9. the lowest price at which a seller will sell the stock
  10. The highest price a buyer will pay for a number of shares
  11. the standard deviation of a stocks annualised returns
  12. filling a buy/sell order in the market subject to conditions placed on the order by the end client
  13. to close out a position in a stock b/c price decline
  14. long means you own the security
  15. The foreign exchange market
Down
  1. execute a trade at a specific price that expires if not completed
  2. an order to buy/sell with a restriction
  3. a pooled collection of assets that invests in stocks, bonds, and other securities
  4. a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
  5. Measure of volatility
  6. a marketplace where securities, commodities, derivatives and other financial instruments are traded.
  7. the amount by which the ask price exceeds the bid price for an asset in the market
  8. a declining market
  9. number of shares traded between its daily open and close
  10. When a company first sells a stock to the public
  11. total value of all a companies shares of stock
  12. purchasing additional shares of a previously initiated investment after the price dropped
  13. collection of financial investments
  14. a statistic that captures the average change in a data series over time
  15. how much income an investment generates, separate from the principal.

30 Clues: a declining marketMeasure of volatilityThe foreign exchange marketlong means you own the securitycollection of financial investmentsan order to buy/sell with a restrictiontotal value of all a companies shares of stockWhen a company first sells a stock to the publicto close out a position in a stock b/c price decline...

Chapter 5 - Everything Needs to Be Secured 2025-11-06

Chapter 5 - Everything Needs to Be Secured crossword puzzle
Across
  1. Data relating to an individual that can identify or locate them.
  2. Software designed to damage, disrupt, or steal data.
  3. HOMES Homes with sensors and connected devices, increasing security risks.
  4. DATA Corporate data that may contain secrets or patents.
  5. Ethical hacker who helps organizations strengthen their security.
Down
  1. Hacker who acts with malicious intent.
  2. OF UPGRADEABILITY IoT limitation where devices cannot be updated easily.
  3. SECURITY Fences, guards, CCTV, and gates used to protect corporate facilities.
  4. A network filtering system that blocks unauthorized access.
  5. HOTSPOT A risky Wi-Fi network where traffic is not encrypted.
  6. DEVICES Devices connected to the internet that collect and exchange data.
  7. A secure encrypted connection used when accessing insecure networks.
  8. Software that scans, detects, and removes malicious programs.

13 Clues: Hacker who acts with malicious intent.Software designed to damage, disrupt, or steal data.A network filtering system that blocks unauthorized access.DATA Corporate data that may contain secrets or patents.Software that scans, detects, and removes malicious programs.Data relating to an individual that can identify or locate them....

crossword 2012-11-15

crossword crossword puzzle
Across
  1. artist with the highest number of views for his\her video on youtube (3)
  2. brand ambassador of sony cyber shot (7)
  3. logo 1 (7)
  4. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
  5. highest grossing hollywood movie (6)
  6. one world many states (16)
  7. the ultimate driving machine (3)
  8. logo 4 (9)
  9. towards excellence (4)
Down
  1. full form of P&G (14)
  2. ceo of virgin atlantic (14)
  3. logo 2 (10)
  4. subsidiary company of adidas which makes sportswear, apparel and accessories (6)
  5. logo 3 (5)
  6. world's local bank (4)
  7. parent company of minute maid (8)

16 Clues: logo 1 (7)logo 3 (5)logo 4 (9)logo 2 (10)full form of P&G (14)world's local bank (4)towards excellence (4)one world many states (16)ceo of virgin atlantic (14)the ultimate driving machine (3)parent company of minute maid (8)highest grossing hollywood movie (6)brand ambassador of sony cyber shot (7)...

Eksplorasi Merdeka 2025-08-18

Eksplorasi Merdeka crossword puzzle
Across
  1. Warna biru pada Jalur Gemilang melambangkan __________.
  2. Tema Hari Kebangsaan 2025 ialah "Malaysia MADANI:Rakyat ___________"
  3. Menjadi tempat pengisytiharan kemerdekaan ialah __________.
  4. Rukun Negara mengandungi __________ prinsip.
  5. Perkataan “Merdeka” dilaungkan sebanyak __________ kali pada 31 Ogos 1957.
  6. Bapa Kemerdekaan Malaysia ialah __________.
Down
  1. Bulan sabit pada Jalur Gemilang melambangkan agama __________.
  2. Lagu "Negaraku" diambil daripada lagu negeri ___________.
  3. Lagu manakah mengandungi lirik "Alam cyber teknologi terkini"
  4. Warna putih pada Jalur Gemilang melambangkan __________.
  5. Lagu "Keranamu Malaysia" menyemai semangat __________.
  6. Sejarah kemerdekaan Malaysia bermula dengan penjajahan oleh kuasa __________.
  7. Bunga kebangsaan Malaysia ialah bunga __________.
  8. Jata Negara mengandungi __________ ekor harimau.
  9. Warna yang melambangkan warna diraja.
  10. Sambutan kemerdekaan pada tahun 2025 adalah kali ke-6_.

16 Clues: Warna yang melambangkan warna diraja.Bapa Kemerdekaan Malaysia ialah __________.Rukun Negara mengandungi __________ prinsip.Jata Negara mengandungi __________ ekor harimau.Bunga kebangsaan Malaysia ialah bunga __________.Lagu "Keranamu Malaysia" menyemai semangat __________.Warna biru pada Jalur Gemilang melambangkan __________....

Luke Nick and Harry 2022-04-27

Luke Nick and Harry crossword puzzle
Across
  1. The original form of a message
  2. The receptiveness and convenience of data
  3. A process of encryption named after a Roman Emperor
  4. A measure put in place to minimize threats
  5. Software that takes advantage of a flaw
  6. Fraudulent practice of getting personal information
  7. Files that have changed since last backup
  8. Preliminary experimentation on a system
Down
  1. Identifying and analyzing flaws
  2. Encryption that uses the same key
  3. Exposed to the possibility of an attack
  4. Magic happens after this process of plaintext
  5. Guessing all combinations until correct
  6. Restoring data
  7. A digital authentication of dependability: can verify authenticity.
  8. Simulating a potential cyber-barrage

16 Clues: Restoring dataThe original form of a messageIdentifying and analyzing flawsEncryption that uses the same keySimulating a potential cyber-barrageExposed to the possibility of an attackGuessing all combinations until correctSoftware that takes advantage of a flawPreliminary experimentation on a systemThe receptiveness and convenience of data...

social media 2016-09-09

social media crossword puzzle
Across
  1. strange people
  2. keep safe from harm
  3. everybody has rights
  4. having an obligation to do something
  5. bullying the use of electronic communication to bully a person
  6. being free from being observed or disturbed by other people
  7. footprint a trail of data you create while using the Internet
  8. a group
Down
  1. a thing made to be similar or identical to another
  2. outline of something, especially a person's face
  3. putting a status on social media
  4. a bad group of people
  5. someone you don't know
  6. to be very involved in the internet
  7. ok at and comprehend the meaning

15 Clues: a groupstrange peoplekeep safe from harmeverybody has rightsa bad group of peoplesomeone you don't knowputting a status on social mediaok at and comprehend the meaningto be very involved in the internethaving an obligation to do somethingoutline of something, especially a person's facea thing made to be similar or identical to another...

Bullying 2012-10-30

Bullying crossword puzzle
Across
  1. deliberately harassing someone is b_______
  2. When you force someone to do something
  3. Bully someone without words, non-______
  4. You can bully someone ph______y
  5. When you bully someone with hand/body language
  6. You leave someone out of an activity or group
  7. th_____n (8 letters
  8. bullying someone online
Down
  1. you can bully someone m_____y
  2. You do it on purpose
  3. bullying can upset you and make you e________ (9 letters)
  4. 10 letter word h________t
  5. ______ 0 is the number you call for the fire/ambulance/police
  6. When you bully someone by calling someone names
  7. when you get mad feeling

15 Clues: You do it on purposeth_____n (8 lettersbullying someone onlinewhen you get mad feeling10 letter word h________tyou can bully someone m_____yYou can bully someone ph______yWhen you force someone to do somethingBully someone without words, non-______deliberately harassing someone is b_______You leave someone out of an activity or group...

iBoy by Samuel Opferman 2015-03-24

iBoy by Samuel Opferman crossword puzzle
Across
  1. Having an unknown name
  2. influence neural activity
  3. lack of strength
  4. a Greek philosopher and scientist born in Stagirus, northern Greece, in 384 BCE. His father, Nicomachus
  5. a combination of ingredients used in cooking or baking.
  6. computer network
Down
  1. Causing great astonishment, amazement, or dismay
  2. The supervising And continuing of an action to completion
  3. a lizard that chargés color
  4. Of or proceeding from the basic structure or nature of a person or thing;
  5. Having no limits
  6. In fact or to all purposes; practically
  7. to hold back
  8. Refusing to give up or let go; persevering obstinately.
  9. a power source

15 Clues: to hold backa power sourceHaving no limitslack of strengthcomputer networkHaving an unknown nameinfluence neural activitya lizard that chargés colorIn fact or to all purposes; practicallyCausing great astonishment, amazement, or dismayRefusing to give up or let go; persevering obstinately.a combination of ingredients used in cooking or baking....

ASEAN 2023-09-13

ASEAN crossword puzzle
Across
  1. Negara ASEAN dengan jumlah penduduk paling sedikit
  2. Kejahatan cyber crime merupakan dampak dari kemajuan
  3. Negara ASEAN dengan gunungapi terbanyak selain Indonesia
  4. Sungai Irawadi terletak di negara
  5. Keputusan tertinggi rapat ASEAN
  6. Masalah sosial negara berkembang
Down
  1. Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
  2. Salah satu Sekjen ASEAN berada di negara
  3. Merk mobil yang berasal dari negara Malaysia
  4. Perjanjian AFTA di tanda tangani di negara
  5. Pertemuan Defence Minister Meeting (ADMM)membahas tentang
  6. Sungai Chao Praya mengalir di negara
  7. Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
  8. Pakaian tradisional Vietnam
  9. Organisasi negara-negara kawasan Asia Tenggara

15 Clues: Pakaian tradisional VietnamKeputusan tertinggi rapat ASEANMasalah sosial negara berkembangSungai Irawadi terletak di negaraSungai Chao Praya mengalir di negaraSalah satu Sekjen ASEAN berada di negaraPerjanjian AFTA di tanda tangani di negaraMerk mobil yang berasal dari negara MalaysiaOrganisasi negara-negara kawasan Asia Tenggara...

IT Definitions Crossword 2013-12-02

IT Definitions Crossword crossword puzzle
Across
  1. Ways that are allowed behaviour on webpages that support an online community.
  2. Action, devices or events that harm components and/or data and security stored within.
  3. Contributes to the way a solution works and/or appears to the user
  4. Ways of making sure that a solution works the way it’s intended to work/be used for.
  5. A large internet based storage service that allows people to store data online and access anywhere with internet access.
  6. Ways information should be used and organised with onscreen solutions
  7. Software tools that allow people to figure out thoughts and find patterns in setting out data.
  8. A description of the/an intended use or environments of a software solution.
  9. A statement that outlines a situation, context, problem or needs.
  10. A type of software that can run an application without the user inputting the code.
  11. Are obligations that individuals or companies have to respect owner’s creations and privacy information.
Down
  1. A way of producing required information through a technology based hardware / application.
  2. Software or procedures used in protecting the integrity of hardware/component and/or the files it holds.
  3. Devices Equipment used in protecting hardware in a secure area.
  4. Measurements of time, cost, and/or effort used in order to create a solution
  5. A process of turning RAW data into a graphic visualisation for easier analysis and explanation
  6. A network protocol laid out into 7 layers.
  7. Ways to represent the was a solution works and/or appears to the user
  8. The combination of people, procedures, equipment and data that create data and information

19 Clues: A network protocol laid out into 7 layers.Devices Equipment used in protecting hardware in a secure area.A statement that outlines a situation, context, problem or needs.Contributes to the way a solution works and/or appears to the userWays information should be used and organised with onscreen solutions...

bullying 2023-11-28

bullying crossword puzzle
Across
  1. bullying An when you bully someone on ticktock,you tube
  2. bullying An hurting someones feelings
  3. games
  4. An when you hurt someone.
Down
  1. An you listen to people with ______.
  2. An saying rude things
  3. An talking when someone else is talking.
  4. An hurting with your feet.

8 Clues: gamesAn saying rude thingsAn when you hurt someone.An hurting with your feet.An you listen to people with ______.bullying An hurting someones feelingsAn talking when someone else is talking.bullying An when you bully someone on ticktock,you tube