cyber security Crossword Puzzles
Unit 2 vocabolar 2025-09-30
Across
- In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
- The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
- The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
- A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
- In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
- The guarantee that systems and data are accessible and available to authorized users when needed.
- The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
- A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
- The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
- A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
- A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
- The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
13 Clues: The guarantee that systems and data are accessible and available to authorized users when needed. • A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans. • The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals. • ...
Transhumanizam - ponavljanje 2024-04-10
Across
- Postupak zamrzavanja sa svrhom očuvanja tkiva
- Kiborg, Cyber
- Pokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bića
- Filozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija
Down
- Musk Osnivač SpaceX-a
- ... Života
- Moždani čip Elona Muska
- Popularizirao pojam transhumanizma u svom eseju
8 Clues: ... Života • Kiborg, Cyber • Musk Osnivač SpaceX-a • Moždani čip Elona Muska • Postupak zamrzavanja sa svrhom očuvanja tkiva • Popularizirao pojam transhumanizma u svom eseju • Pokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bića • Filozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija
Landon cybersecurity puzzle 2026-04-07
Across
- A security system that blocks or allows network traffic based on safety rules.
- A secret set of characters used to access accounts or devices.
- Security — Protecting a computer network from unauthorized access or attacks.
- Security — Protecting data from being accessed, altered, or destroyed by unauthorized users.
- A scam where attackers trick you into giving personal information through fake emails or websites.
- Malware that spreads on its own across networks without needing a file or user action.
- A type of malware that spreads by attaching itself to files and activates when the file is opened.
- The process of converting data into a coded form so only authorized users can read it.
- Any harmful software designed to damage, disrupt, or gain unauthorized access to a device or system.
Down
- Authentication (2FA) — A security method that requires two forms of verification, like a password and a code sent to your phone.
- A hidden program that gives hackers control over a system while staying undetected.
- Backup — Saving copies of your files in case the original data is lost or damaged.
- Malware that locks or threatens your data and demands payment to restore access.
- Citizenship — Using technology responsibly, safely, and respectfully online.
- Software that secretly monitors your activity and collects personal information.
15 Clues: A secret set of characters used to access accounts or devices. • Citizenship — Using technology responsibly, safely, and respectfully online. • Security — Protecting a computer network from unauthorized access or attacks. • A security system that blocks or allows network traffic based on safety rules. • ...
ADM(Mat) Crossword Puzzle 2023-03-24
Across
- a _____ must be completed when there is a change in personal circumstances
- it's unauthorized access, disclosure, destruction, removal, modification, use or interruption of assets or information
- it's the combination of the frequency, probability and the consequences of a mishap
- an _____ security report is to be completed within 48 hours of incident detection
- it's an area where access is limited to authorized personnel, to authorized and properly escorted visitors, signs indicate perimeter and is monitored
Down
- you are required to ______suspicious behavior
- these security _____ identify the type and level of sensitivity of information and their use protects the information from unauthorized disclosure
- a security _____ is a condition of employment or service, relative to position and must be fulfilled before commencement of duties
- is a situation where employees stop work and gather in a room that can be locked
- this tool further provides strategic direction on the management and oversight of security within ADM(Mat) in support of adherence to the PGS, DAODs and NDSODs etc
- a security _____ is any workplace violence, act, event, or omission that could result in a compromise of DND/CAF information, assets, or services
11 Clues: you are required to ______suspicious behavior • a _____ must be completed when there is a change in personal circumstances • is a situation where employees stop work and gather in a room that can be locked • an _____ security report is to be completed within 48 hours of incident detection • ...
Cyber Threat Landscape 2024-04-04
Across
- Pretending to be an employee that forgot their password
- Type of phishing scam that involves an email with phone number to call
- Using digital ads to deliver malware
- Cybercriminals send emails claiming to be from a reputable source
- Sending text messages containing malicious link
- Type of phishing attack that targets specific people or organizations through malicious emails
- Software designed to disrupt a device's normal operations without the user's knowledge
Down
- Type of authentication that uses multi-step account log in process that requires more than just a password
- Type of malware that prevents users from accessing their device and data
- Defrauding people over the phone
- Cybersecurity thret using QR codes to trick users
- Manipulated video, photo or audio recording that used AI to make it appear real
- Type of scam that an email appears to be sent for legitimate request
13 Clues: Defrauding people over the phone • Using digital ads to deliver malware • Sending text messages containing malicious link • Cybersecurity thret using QR codes to trick users • Pretending to be an employee that forgot their password • Cybercriminals send emails claiming to be from a reputable source • ...
Security within the IoT 2017-04-26
Across
- People don't learn enough about the _______ they use to secure them properly.
- The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
- 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
- An important step to take during product development is to identify the potential ________ of hackers.
- The Internet of things is changing our _______ of personal security.
- Security can be a significant _______ to organizations adopting IoT technologies.
- BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
- Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
- IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
- IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
- Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
- Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
- The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
- According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
- Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.
15 Clues: The Internet of things is changing our _______ of personal security. • People don't learn enough about the _______ they use to secure them properly. • Security can be a significant _______ to organizations adopting IoT technologies. • Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks. • ...
global food security cross word puzzle 2024-04-19
Across
- The first basic human necessity and everyone's fundamental right.
- Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
- Altered weather patterns and agricultural productivity
- Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
- An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
- the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
- Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
- Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
- Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
- leading international efforts to address the need that people around the world have for reliable sources of quality food.
- Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
- Crucial for agriculture, requires sustainable management
- Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
- When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
- evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.
15 Clues: Altered weather patterns and agricultural productivity • Crucial for agriculture, requires sustainable management • The first basic human necessity and everyone's fundamental right. • Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets. • ...
Understanding Money 15.1 by Emily Mendola 2024-05-09
Across
- A plastic card that allows the holder to make credit purchases up to an authorized amount
- Means that money is a common measure of the worth or price of a good or service
- Allows customers to pay for purchases directly from their checking account
- Banks that are a part of the Federal Reserve
- Money received today is worth more in the future because money today can be invested or deposited in the bank to earn interest
- A security that pays interest over terms of ten to thirty years
- A transfer of money from one bank account to another(EFT)
- The process of transferring money from one individual or organization to another
- A security that matures in a year or less
- Money is used in exchange for goods and services needed by individuals, businesses, and governments
- Nation's central bank that supervises and regulates banks in the country
Down
- Action taken to manage the supply of money and interest rates in an economy
- A security that pays interest over terms ranging from two to ten years
- A type of document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payer named on the document
- The mechanism a nation uses to provide and manage money for itself
- Means that money can be saved and used at a later date
- Type of financial investment issued by a corporation, government, or other organization
- Anything of value that is accepted in return for goods or services
18 Clues: A security that matures in a year or less • Banks that are a part of the Federal Reserve • Means that money can be saved and used at a later date • A transfer of money from one bank account to another(EFT) • A security that pays interest over terms of ten to thirty years • The mechanism a nation uses to provide and manage money for itself • ...
cybersecurity terms 2022-12-16
Across
- a computer connected to a network that has been compromised by a hacker
- a kind of software used to prevent, scan, detect and delete viruses from a computer
- software that enables a user to covert information from another computer by transmitting data from their hard drive
- software that allows an unauthorized user to access a computer
- a type of malware that self replicates and infects other computers
- a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
- a type of malware that disguises itself as legitimate code or software\
- software that displays advertising material
- A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
- a network security device that monitors and filters incoming and outgoing network traffic
- a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
- malicious software that blocks access to a computer until a sum of money is paid
- an undocumented way of gaining access to a computer system
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a network of computers with malicious software
- any program that prohibits a pop-up at some point in time
- hackers who use automated techniques to scan specific network ranges and find vulnerable systems
- software updates that address security vulnerabilities
18 Clues: software that displays advertising material • a network of computers with malicious software • software updates that address security vulnerabilities • any program that prohibits a pop-up at some point in time • an undocumented way of gaining access to a computer system • software that allows an unauthorized user to access a computer • ...
Privacy and security 2018-11-14
Across
- This is when someone is calling or emailed you and tries to get you to sign up for something to get your personal info.
- when the sims 4 game is ______ it becomes all pixelated.
- This is when someone has you identity.
- Usually ______ are hacked because they have the most personal info
- Students learn strategys on how to protect there online ______________ for something.
- if you have a strong ______ you will most likely not be hacked
- How many people where effected when Facebook was hacked.
Down
- how many adults have been hacked in 2018
- Who need to learn about this so there future isn't affected?
- When repetitive emails are sent telling you that you won something and want you to do something.
- This is a statement or legal document explaining how the party/company is using your information.
- when people are hacked because of weak passwords their_________.
- if there where _______ to teach people how to stay safe; more people would not be hacked
- So many people are hacked because they are _______.
- What was the year that the most people where hacked
15 Clues: This is when someone has you identity. • how many adults have been hacked in 2018 • So many people are hacked because they are _______. • What was the year that the most people where hacked • when the sims 4 game is ______ it becomes all pixelated. • How many people where effected when Facebook was hacked. • ...
Ukraine Food Security 2022-10-26
Across
- Goods sent out of a country
- Relating to the government or affairs of a country
- Conflict between different countries
- Being provided with the necessary food for growth
- Resources given to aid others
- How much something costs
- Not enough of something (food)
- Current leader of Russia
- The country currently in need of help
Down
- Not having enough of/the right food
- The state of being stable, regarding to food
- Hostile actions to another
- Someone/a family being forced to leave their home
- When you help someone, you provide them with your ...
- Something of a high cost
15 Clues: How much something costs • Something of a high cost • Current leader of Russia • Hostile actions to another • Goods sent out of a country • Resources given to aid others • Not enough of something (food) • Not having enough of/the right food • Conflict between different countries • The country currently in need of help • The state of being stable, regarding to food • ...
Ukraine Food Security 2022-11-01
Across
- Relating to the government or affairs of a country
- Not enough of something (food)
- Goods sent out of a country
- Someone/a family being forced to leave their home
- Current leader of Russia
- Conflict between different countries
- Something of a high cost
- Being provided with the necessary food for growth
Down
- Resources given to aid others
- Not having enough of/the right food
- The country currently in need of help
- Hostile actions to another
- When you help someone, you provide them with your ...
- How much something costs
- The state of being stable, regarding to food
15 Clues: How much something costs • Current leader of Russia • Something of a high cost • Hostile actions to another • Goods sent out of a country • Resources given to aid others • Not enough of something (food) • Not having enough of/the right food • Conflict between different countries • The country currently in need of help • The state of being stable, regarding to food • ...
Ukraine Food Security 2022-11-01
Across
- Relating to the government or affairs of a country
- Not enough of something (food)
- Goods sent out of a country
- Someone/a family being forced to leave their home
- Current leader of Russia
- Conflict between different countries
- Something of a high cost
- Being provided with the necessary food for growth
Down
- Resources given to aid others
- Not having enough of/the right food
- The country currently in need of help
- Hostile actions to another
- When you help someone, you provide them with your ...
- How much something costs
- The state of being stable, regarding to food
15 Clues: How much something costs • Current leader of Russia • Something of a high cost • Hostile actions to another • Goods sent out of a country • Resources given to aid others • Not enough of something (food) • Not having enough of/the right food • Conflict between different countries • The country currently in need of help • The state of being stable, regarding to food • ...
Information Security Crossword 2025-09-03
Across
- principle of keeping data accurate and unchanged. (9 letters)
- program that spreads by attaching to files. (5 letters)
- secret used to access systems. (8 letters)
- security item to secure doors. (5 letters)
- designed to damage or disrupt. (7 letters)
- accounts with two or more verification steps. (3 letters)
- document defining how data is handled. (6 letters)
Down
- who gains unauthorized access. (6 letters)
- review of systems for compliance and risks. (5 letters)
- information unreadable without a key. (11 letters)
- control that limits who can see or use data. (9 letters)
- messages used to trick people into giving data. (8 letters)
- hidden malicious program disguised as useful. (6 letters)
- where someone pretends to be another user. (11 letters)
- systems and networks from attacks. (10 letters)
15 Clues: who gains unauthorized access. (6 letters) • secret used to access systems. (8 letters) • security item to secure doors. (5 letters) • designed to damage or disrupt. (7 letters) • systems and networks from attacks. (10 letters) • information unreadable without a key. (11 letters) • document defining how data is handled. (6 letters) • ...
Security Career Knowledge 2026-03-18
Across
- Techniques used to reduce tension and prevent a situation from becoming violent.
- A security procedure where a facility is secured and movement is restricted to allow security staff to interdict an active threat.
- The act of being aware of your surroundings and recognizing potential threats before they become a problem.
- A modular, sloped-face concrete barrier designed to prevent vehicle intrusion into high-risk sites
- Protective measures used to secure the outer boundary of a facility.
- A multi-disciplinary approach to reducing the incidence of crime by designing and managing the physical environment.
Down
- A short, sturdy vertical post designed to prevent vehicle intrusion into pedestrian spaces, while being easily navigated on foot.
- Razor wire formed in large, interlocking coils used to create ground barriers or fence-top barriers to physical intrusion.
- Methods used to manage large groups of people safely and efficiently.
- The process of controlling who is allowed to enter or exit a location.
- The process of checking people or items for threats before entry, often utilizing metal detectors or x-rays.
- A designated entry or exit location for a facility.
- Protection of digital systems and data from unauthorized access or attacks.
- The act of security personnel regularly moving through an area to observe/detect threats and ensure security.
- Crime prevention concept that maximizes visibility by modifying, removing or relocating features to enhance perimeter observation.
15 Clues: A designated entry or exit location for a facility. • Protective measures used to secure the outer boundary of a facility. • Methods used to manage large groups of people safely and efficiently. • The process of controlling who is allowed to enter or exit a location. • Protection of digital systems and data from unauthorized access or attacks. • ...
Cybersecurity Fundamental Chapter 7 Part 2 2022-10-31
Across
- dedicated site that monitor, assesses, and defends the organization's information system.
- can supplement or in some cases, replace security guards.
- hardware or software solutions that enforce network security policies. Filters unauthorize or potentially dangerous traffic from entering the network.
- uses network to make or receive phone calls.
Down
- one of the faster sectors of information technology is the use of intelligent devices and sensors.
- allows two or more locations to communicate simultaneously using telecommunication technologies.
- logs the transaction for later retrieval.
- one or more location containing the tools that provide administrators with a detail status of the organization's network.
- form the backbone of the internet and communications between different
- the outermost layer of security, and these solutions are the most publicly visible.
- can be the foundation of highly secure identification and personal verification solutions.
- allows an individual to gain access to an area with automated entry points.
- provide a way to group devices within a LAN and on individual switches. use logical connections instead of physical connections.
13 Clues: logs the transaction for later retrieval. • uses network to make or receive phone calls. • can supplement or in some cases, replace security guards. • form the backbone of the internet and communications between different • allows an individual to gain access to an area with automated entry points. • ...
2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26
Across
- the world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy
- The world's largest regional security organization (Acronym)
- Synonym for firearms (Acronym)
- Agreement which prohibits the possession of nuclear weapons (Acronym)
- UN Security Council Resolution on Women, Peace and Security (Acronym)
- Agreement allowing for conduct of short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
Down
- A key OSCE arms control agreement outlining provisions n military information exchange
- Cornerstone rule guiding OSCE decision-making processes
- UN Security Council Resolution on the non-proliferation of weapons of mass destruction (Acronym)
- Together with Pu-239, it is used for the production of nuclear weapons (Abbrev.)
10 Clues: Synonym for firearms (Acronym) • Cornerstone rule guiding OSCE decision-making processes • The world's largest regional security organization (Acronym) • Agreement which prohibits the possession of nuclear weapons (Acronym) • UN Security Council Resolution on Women, Peace and Security (Acronym) • ...
Cyber Security Crossword By Mora Marcuzzi 2020-08-20
Across
- diseñado para infiltrarse en su dispositivo sin su conocimiento.Son subrepticios y trabajan activamente en contra de los intereses de la persona atacada.
- correo electrónico no solicitado que recibe una persona.
- evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
- infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
Down
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
- recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
6 Clues: correo electrónico no solicitado que recibe una persona. • evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red. • infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador. • ...
HAAS1 2024-07-19
Across
- What Centre would a customer go to for an appointment?
- What term do we use apart from 'customer' for a person applying for or receiving benefits
- What type of calls will we mostly be dealing with?
- We must ask security questions before speaking to a Customer in order to comply with Data_____?
- What is the name of the company we work for?
- A security question we ask for is the Customer's N___?
- What should you take plenty of during training?
- Which device should you have on silent during training?
- What term is used for a person who deals with a Customer's affairs if they are unable to do it for themselves?
Down
- What Centre will a customer call to reschedule an assessment appointment?
- What is a Customer applying for from DWP?
- In training what is there never, when it comes to a question?
- What number does NINO stand for?
- What does the second 'A' in HAAS stand for?
- This is a security question
- Which is the UK's biggest public service department?
- What type of contract is HAAS?
- What does the first 'A' in HAAS stand for?
- What does the 'H' stand for in HAAS?
- What 2x15 minute activity will we have each day?
20 Clues: This is a security question • What type of contract is HAAS? • What number does NINO stand for? • What does the 'H' stand for in HAAS? • What is a Customer applying for from DWP? • What does the first 'A' in HAAS stand for? • What does the second 'A' in HAAS stand for? • What is the name of the company we work for? • What should you take plenty of during training? • ...
Corporate Security Crossword 2023-08-15
Across
- Many alarms come through this system via email on building issues
- Patrol vehicle for corporate security
- What does the "A" stand for in ALL
- App used to store employee badge identification
- App that is used for guests to check in
- Where we log our daily activity and incident reports
- App that Security uses to inform during emergency
Down
- Greatest boss of all time
- 99% of our job is this and 1% is better
- Homeland security partnered program with Haworth to mitigate risks during importing and exporting of goods
- Information shared from one shift to the next
- Name of the master key
12 Clues: Name of the master key • Greatest boss of all time • What does the "A" stand for in ALL • Patrol vehicle for corporate security • 99% of our job is this and 1% is better • App that is used for guests to check in • Information shared from one shift to the next • App used to store employee badge identification • App that Security uses to inform during emergency • ...
At the airport 2018-10-16
18 Clues: Zoll • Gate • Flug • Start • Visum • Gepäck • Koffer • Abflug • Ausweis • Landung • Ankunft • Flugzeug • Schalter • Kontrolle • Passagier • Reisender • Verspätung • Sicherheit; Schutz, Wachdienst
Paul y el avión 2022-10-10
18 Clues: bed • car • sad • runs • agent • opens • plane • closes • leaves • special • airport • traffic • worried • because • looks at • security • frustrated • pass, go through
crossword puzzle 2021-05-20
Across
- cyber hub is located in
- tourism provides changes which causes
- teet ka achar is a pickle made from _ tree
- tourism may change _ effects
Down
- old custom of people which is still followed
- famous epic mahabharata was written in this state
- bird santuary is located in
- traditional headgear worn by men
- women cover their head by
9 Clues: cyber hub is located in • women cover their head by • bird santuary is located in • tourism may change _ effects • traditional headgear worn by men • tourism provides changes which causes • teet ka achar is a pickle made from _ tree • old custom of people which is still followed • famous epic mahabharata was written in this state
E-Safety 2013-12-09
Across
- Usually a scam but can be used to advertise.
- bully A person that uses the internet to bully someone.
- Staying safe on-line.
- A popular social networking website.
- A scam to steal your information.
Down
- A person that steals your information.
- Keeps your information safe.
- Allows you to video chat.
- Attacks your computer.
9 Clues: Staying safe on-line. • Attacks your computer. • Allows you to video chat. • Keeps your information safe. • A scam to steal your information. • A popular social networking website. • A person that steals your information. • Usually a scam but can be used to advertise. • bully A person that uses the internet to bully someone.
amazing crossword puzzle 1 2023-09-12
vocabulary 2025-08-01
17 Clues: มาถึง • ถอดออก • การประกาศ • สายการบิน • เที่ยวบิน • ผู้โดยสาร • บัตรโดยสาร • ออกเดินทาง • ประตูทางออก • ขึ้นเครื่องบิน • พนักงานขนกระเป๋า • กระเป๋าเป้สะพายหลัง • ระบบรักษาความปลอดภัย • ชั้นโดยสารราคาถูกที่สุด • ลงทะเบียนขึ้นเครื่องบิน • ความสนุกสนาน, ความเพลิดเพลิน • สานพานรับส่งกระเป๋าในสนามบิน
Black Friday 2025-11-19
Across
- ; A good offer or a good price.
- ; Full of people.
- ; A time when things are cheaper.
- ; A person who buys something.
- ; Something that does not cost a lot of money.
- ; A group of people waiting.
Down
- Something that costs a lot of money.
- ; A price reduction.
- ; A place where you can buy things.
- Monday ; The online shopping day after Black Friday.
- mall ; A big building with many stores.
11 Clues: ; Full of people. • ; A price reduction. • ; A group of people waiting. • ; A person who buys something. • ; A good offer or a good price. • ; A time when things are cheaper. • ; A place where you can buy things. • Something that costs a lot of money. • mall ; A big building with many stores. • ; Something that does not cost a lot of money. • ...
Black Friday 2025-11-19
Across
- ; A good offer or a good price.
- ; Full of people.
- ; A time when things are cheaper.
- ; A person who buys something.
- ; Something that does not cost a lot of money.
- ; A group of people waiting.
Down
- Something that costs a lot of money.
- ; A price reduction.
- ; A place where you can buy things.
- Monday ; The online shopping day after Black Friday.
- mall ; A big building with many stores.
11 Clues: ; Full of people. • ; A price reduction. • ; A group of people waiting. • ; A person who buys something. • ; A good offer or a good price. • ; A time when things are cheaper. • ; A place where you can buy things. • Something that costs a lot of money. • mall ; A big building with many stores. • ; Something that does not cost a lot of money. • ...
Positions and Order Status 2026-02-05
Across
- Is the one to five characters used to represent the security. This is defined by the different markets or exchanges.
- The lifespan of a trading order, specifying how long it remains active before execution or expiration
- Is the price at which the security traded. A footnote will indicate whether this is real-time or delayed.
- Is the security's price increase or decrease since the previous market close.
- The title of the security is displayed in this field.
- Displays the value of the holding or your account.
- Instructions determining when and at what price a security is bought or sold, including market orders, limit orders, and stop-loss orders.
- Your order ended without being filled or canceled.
- Part of your order was filled. The remaining part was canceled.
Down
- Your order was rescinded at your request.
- The page to view current and recent trades.
- Your order cancellation request has been submitted.
- Your order cancellation request has been submitted.
- For stocks or mutual funds, this reflects the number of shares you currently hold. For fixed income securities, this field reflects the face value of the securities. For options, this field reflects the number of option contracts purchased or sold.
- Part of the order has been filled; part is still open.
- The total original cost of acquiring an asset—including purchase price, commissions, and fees.
- Your order is waiting to be completed.
17 Clues: Your order is waiting to be completed. • Your order was rescinded at your request. • The page to view current and recent trades. • Displays the value of the holding or your account. • Your order ended without being filled or canceled. • Your order cancellation request has been submitted. • Your order cancellation request has been submitted. • ...
Maritime Piracy 2014-12-03
19 Clues: Raub • Hafen • Fracht • Grenze • Gewalt • berauben • Festland • abnehmen • vemeiden • Bedrohung • Spannungen • Überschrift • einheimisch • Bewusstheit • Zwischenfall • Wasserfahrzeug • zur See gehörig • blinder Passagier • Sicherheitsmaßnahme
Comunidad = Community 2025-09-25
19 Clues: monja • pastor • taller • escuela • iglesia • bombero • propina • polecia • libreria • concerje • banderas • seguridad • mesero(a) • paramedico • carpintero • biblioteca • biblotecaria • cura/sacerdote • jefe de cocina
Theme Words 2026-02-17
19 Clues: bron • mening • toegang • primeur • verzoek • anoniem • kritisch • virtueel • objectief • krantenkop • subjectief • beveiliging • realistisch • erg populair • zoekopdracht • onbetrouwbaar • in scène gezet • onverantwoordelijk • misleidend, bedreigend
Valentine's Security Crossword 2023-02-08
Across
- Mixing cocoa, cocoa butter, milk and sugar= result.
- ____________ and a Gentleman
- Common candy heart phrase.
- The act of bringing something to an end.
- Small cherub that brings couples together.
- Main drive running east to west.
- Gene Simmons is the lead singer of this band since 1973.
- A ______ by any other name would smell as sweet.
- Rosa, Dianthus and Alstroemeria are the scientific names for?
Down
- The program for keeping eyes on all the things.
- Guests that enter the building as workers
- Visitors for success track days.
- Wifi __________ changes each month.
- Pumps about 1.5 gallons of blood every minute
- Second part of ILY
15 Clues: Second part of ILY • Common candy heart phrase. • ____________ and a Gentleman • Visitors for success track days. • Main drive running east to west. • Wifi __________ changes each month. • The act of bringing something to an end. • Guests that enter the building as workers • Small cherub that brings couples together. • Pumps about 1.5 gallons of blood every minute • ...
Robbery, Safety & Security 2021-10-21
Across
- "The ____ is ready"
- _______ situation
- ________ Officer
- A robber is committing a _______
- You are supposed to _________ with the robber.
- Remain ____!
- listen _______
Down
- __________ location
- Always consult the Robbery __________
- _________ aka blackmail
- ____ Threat Procedures
- Ask _________
- color of your robbery book
- extortion phone ____
- ____ clear signal
15 Clues: Remain ____! • Ask _________ • listen _______ • ________ Officer • _______ situation • ____ clear signal • __________ location • "The ____ is ready" • extortion phone ____ • ____ Threat Procedures • _________ aka blackmail • color of your robbery book • A robber is committing a _______ • Always consult the Robbery __________ • You are supposed to _________ with the robber.
SECURITY AWARENESS PUZZLE 2023-09-20
Across
- Acronym for the Central Intelligence Agency
- Classified material must never be stored in your office?
- Visitors must have an ___ at all times
- This must be worn at all times when entering, exiting and within all company locations
- Classified material must NEVER be brought to your?
- Acronym for Communications Security
- If an unauthorized individual has seen classified material the the material has been?
- This is any information that reflects unfavorably on the loyalty, integrity and character of employees who hold a security clearance
Down
- Access to classified information requires a clearance and a (3 words)
- AREA Name of the area in a facility where classified computer equipment is openly stored (two words)
- Acronym for a classified computer in a closed area
- An orange stripe on an visitor's badge indicates that the visitor is a?
- What does the acronym FOUO stand for?
- Acronym for Department of Defense?
- Where must classified documents be secured at the end of the workday?
15 Clues: Acronym for Department of Defense? • Acronym for Communications Security • What does the acronym FOUO stand for? • Visitors must have an ___ at all times • Acronym for the Central Intelligence Agency • Acronym for a classified computer in a closed area • Classified material must NEVER be brought to your? • Classified material must never be stored in your office? • ...
Information Security - Crossword 2024-03-25
Across
- A security protocol that provides secure communication over a network, often used for remote access
- A type of authentication that verifies a user's identity based on physical characteristics
- A security measure that restricts access based on the principle of least privilege
- A cryptographic key that is kept secret and used for decrypting data
- A protocol used to secure email communication
- A program or device that identifies and authenticates a user's identity electronically
- An attack that involves intercepting and altering communication between two parties
- A method of encrypting data that uses a single key for both encryption and decryption
Down
- The act of tricking individuals into revealing sensitive information
- A type of attack that uses social engineering to manipulate individuals into taking specific actions
- A type of malware that hides its presence and can perform malicious actions without user knowledge
- A type of attack that floods a system with excessive traffic to disrupt normal operation
- A security incident response plan to restore systems and operations after an attack
- A technique used to ensure data integrity by creating a unique hash value for a file
- Software used to detect and prevent unauthorized access to a computer network
15 Clues: A protocol used to secure email communication • The act of tricking individuals into revealing sensitive information • A cryptographic key that is kept secret and used for decrypting data • Software used to detect and prevent unauthorized access to a computer network • A security measure that restricts access based on the principle of least privilege • ...
Security Audit Quiz 2025-11-18
Across
- The probability of a threat exploiting a vulnerability.
- NIST CSF function focused on safeguarding assets
- Final step of an audit process.
- Checking compliance to documented requirements.
- A weakness that can be exploited.
- A potential cause of an unwanted incident.
- Ability to track actions back to individuals or systems.
- U.S. body responsible for cybersecurity standards.
Down
- The defined boundary of an audit.
- measures implemented to reduce risk.
- Level of harm from a compromise.
- Unauthorized attempt to access a system.
- Critical element of CIA triad.
- Testing to confirm proper implementation.
- Adhering to required standards or regulations.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • The defined boundary of an audit. • A weakness that can be exploited. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
Information Security Puzzle 2026-02-27
Across
- Loggoff or ____ systems when leaving them unattended.
- All users must update their web browsers ______
- - Users will not modify this without management approval
- Only ______, process, or store on CMMC compliant systems
- _______ technical information is subject to controls on access, use reproduction, and dissemenation which is defined by the customer
- Use _____, encrypt, then email CUI information
- GITLAB is only authorized for unclassified and ____
- Printed CUI must be reported to _______ for tracking purposes and stored in a locked cabinet or office.
- Transmitted emails must be ____________
Down
- Authorization granted based on role, job function, and need-to-know-
- Information type that must be identified in the SSP as CUI or non-CUI: ______
- Users will not this sensitive information on mobile devices
- Without this documented and approved, Cromulence will fail governance requirements-__________
- Keeping the web browser up to date is the ____ responsibility.
- Certification that verifies defense contractors meet cybersecurity standards to protect CUI? ____
15 Clues: Transmitted emails must be ____________ • Use _____, encrypt, then email CUI information • All users must update their web browsers ______ • GITLAB is only authorized for unclassified and ____ • Loggoff or ____ systems when leaving them unattended. • - Users will not modify this without management approval • Only ______, process, or store on CMMC compliant systems • ...
Delirium section 2 2015-05-04
Across
- A solution to a sickness.
- A building on a farmstead.
- A live music show.
- A Word for security watching people.
- Library of approved books.
- The name for the disease of love.
- Library of authorized music.
- People who live in the wilds.
- The main characters best friend.
- University of ______
- The color of a storm cloud.
- Main character.
Down
- A time set for someone to be home.
- Group of people who patrol the streets after curfew.
- Separation of people based on prejudice.
- Alex has a 3 pronged ____ on the side of his head.
- A place where science experiments are conducted.
- Lena's aunts name.
- A vision you have while sleeping.
- Security guard who catches Lena and Hana.
20 Clues: Main character. • A live music show. • Lena's aunts name. • University of ______ • A solution to a sickness. • A building on a farmstead. • Library of approved books. • The color of a storm cloud. • Library of authorized music. • People who live in the wilds. • The main characters best friend. • The name for the disease of love. • A vision you have while sleeping. • ...
MLK Community Trivia 2023-11-11
Across
- main street nearest this location
- feeder Middle School to East High
- thriving neighborhood fitness center
- friendly Youth Services Manager
- resource center filled with literature
- Community nickname
- Harley Field is located here
- assist students w/ schoolwork and STEM activities
- education center for 9th - 12th grade
Down
- Dr. King's name
- referred to as "Unk" or "Uncle" at the branch
- largest park near MLK Library
- our comedic male security officer
- can be found engaging with teens
- the MLK "TikTok" Queen
- MLK Branch manager
- the next educational level after high school
- motherly, nurturing security officer
- works mostly with children at MLK
- local rec & community center
- person most likely in School Help Center
- GO BUCKS!
22 Clues: GO BUCKS! • Dr. King's name • MLK Branch manager • Community nickname • the MLK "TikTok" Queen • local rec & community center • Harley Field is located here • largest park near MLK Library • friendly Youth Services Manager • can be found engaging with teens • main street nearest this location • our comedic male security officer • feeder Middle School to East High • ...
Refugee 2022-12-06
23 Clues: RCHNU • redrob • sserts • sisirc • enimaf • epacse • sudoxe • retlehs • yrtnuoc • eegufer • eeucave • ytiruces • yrautcnas • noitargim • ytilitsoh • decalpsid • seitlausac • enitnarauq • noitucesrep • noitatroped • noitargimmi • ssensselemoh • noitairtaper
vamos a viaje 2023-02-02
20 Clues: gate • ticket • flight • luggage • airport • arrival • to land • suitcase • to board • security • vacation • passport • itinerary • departure • passenger • to travel • to takeoff • call somebody • identification • monitor or screen
E 2024-05-17
22 Clues: - been • - afstand • - genezen • - beschouw • - benodige • - aanwezig • - Algemeen • - bevestigd • - beheerder • - geschikte • - Bediening • - eschikbare • - aanzienlijk • - uitgevoerde • - afhankelijk • - beveiliging • - aankondiging • - behendigheid • - bereidtzichop • - flierefluiten • - flexibiliteit • ogni parola inglese
Buffet de vocabulaire: Bon voyage page 8 2025-10-26
20 Clues: seat • plane • track • flight • airport • luggage • counter • customs • to land • platform • security • terminal • newsstand • snack bar • restrooms • to declare • to take off • compartment • information • luggage check
Travelling 2024-01-28
16 Clues: fly • pas • visum • strand • kuffert • geografi • lufthavn • badedragt • sikkerhed • hovedstad • flybillet • møntenhed • solbriller • håndbagage • attraktion • stewardesse
az nfb 2024-08-14
16 Clues: Status • Respect • Arizona • Journey • Freewill • Momentum • Delegate • Identity • Ownership • Authentic • Reinforce • Resilience • Innovation • Experience • Opportunity • Porterfield
Kelas 7.5_Keisha Sunjaya 2023-05-10
Across
- memperoleh informasi yg tepat dan akurat merupakan damoak tik yg
- mendapatkan jaringan nama lainnya
- salah satu kartu untuk mengakses kesehatan
- privasi yg berhubungan dengan fisik seseorang
- proyek kolaborasi merupakan media sosial yg berbentuk
- contoh perdagangan e-commerce
Down
- keinginan untuk menyendiri
- semua kolaborasi yg di upayakan pasti di mediasi oleh
- salah satu pengaruh tik yaitu
- cyber bullying merupakan contoh dampak yg
10 Clues: keinginan untuk menyendiri • salah satu pengaruh tik yaitu • contoh perdagangan e-commerce • mendapatkan jaringan nama lainnya • cyber bullying merupakan contoh dampak yg • salah satu kartu untuk mengakses kesehatan • privasi yg berhubungan dengan fisik seseorang • semua kolaborasi yg di upayakan pasti di mediasi oleh • ...
Informatika 2024-08-10
Across
- Salah satu game online popular
- salah satu aplikasi media sosial
- Ilmu yang berkaitan dengan pemodelan matematika dan penggunaan komputer untuk menyelesaikan masalah-masalah sains
Down
- Salah satu karakter dalam profil pelajar pancasila
- Penghitungan dengan menggunakan komputer
- Dunia Maya
- Salah satu aplikasi jual beli online
- Salah satu aplikasi penyedia layanan transportasi
- Seseorang yang tidak begitu mahir dalam bermain
- Pembelajaran secara online
10 Clues: Dunia Maya • Pembelajaran secara online • Salah satu game online popular • salah satu aplikasi media sosial • Salah satu aplikasi jual beli online • Penghitungan dengan menggunakan komputer • Seseorang yang tidak begitu mahir dalam bermain • Salah satu aplikasi penyedia layanan transportasi • Salah satu karakter dalam profil pelajar pancasila • ...
9/11 2025-06-02
Across
- deep emotional response
- Type of attack carried out on 9/11
- Some were sacrificed for security
- US President
- intense national pride & unity
- saw stricter laws and regulations
Down
- gov. department added
- increased following 9/11
- Immigrants faced this
- expanded government authority to spy on citizens
- Targeted religious group
- created to strengthen national security
12 Clues: US President • gov. department added • Immigrants faced this • deep emotional response • increased following 9/11 • Targeted religious group • intense national pride & unity • Some were sacrificed for security • saw stricter laws and regulations • Type of attack carried out on 9/11 • created to strengthen national security • expanded government authority to spy on citizens
The Final 2025-08-20
Across
- ein áleypari (bæði á vøllinum og uttanfyri)
- The Final. Attack on Wembley is a ?
- The safest _____ was England losing
- málscorari
- verjuleikari
- Player focused on free school meals Marcus ?
- The England team missed three ?
- ____ guard
- the sport
- what the stadium went into when the pressure from fans was at its highest
- a plan
- number of years between each of the England finals
Down
- the players came from different ?
- It´s _____ home
- Feeling it gives fans when their team wins
- Feeling fans get when they cannot enter the stadium
- Feel an _____ rush
- Wembley is the ____ stadium of England
- word used when security cannot control an entrance
19 Clues: a plan • the sport • málscorari • ____ guard • verjuleikari • It´s _____ home • Feel an _____ rush • The England team missed three ? • the players came from different ? • The Final. Attack on Wembley is a ? • The safest _____ was England losing • Wembley is the ____ stadium of England • Feeling it gives fans when their team wins • ein áleypari (bæði á vøllinum og uttanfyri) • ...
Viajar 2023-03-10
19 Clues: seat • exit • plane • pilot • aisle • window • flight • ticket • to land • airline • counter • luggage • arrival • customs • security • to board • suitcase • passenger • to take off
Kiley-bullying 2022-03-11
8 Clues: name calling • online bullying • hitting,spitting,punching • someone who bully's people • moment joking or making fun of someone • subject to aggressive pressure or intimidation. • someone standing and watching people get bullied • intended to provoke or make fun of someone in a playful way.
ASEAN 2023-09-13
Across
- Negara ASEAN dengan jumlah penduduk paling sedikit
- Kejahatan cyber crime merupakan dampak dari kemajuan
- Negara ASEAN dengan gunungapi terbanyak selain Indonesia
- Sungai Irawadi terletak di negara
- Keputusan tertinggi rapat ASEAN
- Masalah sosial negara berkembang
Down
- Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
- Salah satu Sekjen ASEAN berada di negara
- Merk mobil yang berasal dari negara Malaysia
- Perjanjian AFTA di tanda tangani di negara
- Pertemuan Defence Minister Meeting (ADMM)membahas tentang
- Sungai Chao Praya mengalir di negara
- Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
- Pakaian tradisional Vietnam
- Organisasi negara-negara kawasan Asia Tenggara
15 Clues: Pakaian tradisional Vietnam • Keputusan tertinggi rapat ASEAN • Masalah sosial negara berkembang • Sungai Irawadi terletak di negara • Sungai Chao Praya mengalir di negara • Salah satu Sekjen ASEAN berada di negara • Perjanjian AFTA di tanda tangani di negara • Merk mobil yang berasal dari negara Malaysia • Organisasi negara-negara kawasan Asia Tenggara • ...
Financial Fundamentals 2023-05-24
Across
- Rate of ________ is the relationship between the amount received and cost of investment
- Regulates bank deposits
- _________ tax is based on land and buildings
- _______ system shows the relationships between individuals, businesses, and governments
- Trade _______ is bad for the economy; buying things outside of the country
- A short-term debt security (abbr)
- A rise in the general level of prices
- ______ price index is an index of the variation in prices paid by typical consumers for retail goods and other items.
- _______ Supply is the amount of money in circulation in an economy
- _______ Cash Flow is money expected to receive in the future
Down
- A security representing ownership in a corporation
- ________ Exchange Rate is the value of a country’s currency in relation to the value of the money in another country
- Regulates stock markets
- A security representing a loan issued by a business or government
- _______ rates are the cost of borrowing money
- Any item that serves as a method of payment
- _____ Insurance insures an individual against the risk of financial loss in case of death
- _______ markets are securities with maturities of greater than one year
- Trade _______ is good for the economy; trading out/paying for goods in country
- Regulates banks
20 Clues: Regulates banks • Regulates bank deposits • Regulates stock markets • A short-term debt security (abbr) • A rise in the general level of prices • Any item that serves as a method of payment • _________ tax is based on land and buildings • _______ rates are the cost of borrowing money • A security representing ownership in a corporation • ...
Terminology 2025-12-12
Across
- Internal resource for learning and development.
- Facility space containing equipment for cooling air/water using refrigerant.
- Personnel who accompany visitors or assets within a facility.
- We provide security and safety services
- System used for incident reporting and management.
- Safeguard people and locations to deliver on Meta's priorities, principles, and mission.
- The enclosure on the roof of a building that houses mechanical equipment.
- A silent alert signaling that a person is under threat.
- Microsoft's email and personal information manager application.
Down
- A sudden illness or injury requiring immediate attention.
- A highly secure, restricted area within Meta data centers where the destruction and sanitation of storage media devices take place.
- The internal knowledge base for Global Security Operations.
- Learning and development platform used for training courses.
- Main entry control point, often where visitors check in.
- Room where external network circuits enter the building (acronym).
- The main area in a facility where servers and network gear are housed.
- Consistent, regular routes and patterns followed by security personnel.
- Physical access control system software used to manage badge access.
- A room containing heat exchanger elements, often for HVAC.
19 Clues: We provide security and safety services • Internal resource for learning and development. • System used for incident reporting and management. • A silent alert signaling that a person is under threat. • Main entry control point, often where visitors check in. • A sudden illness or injury requiring immediate attention. • ...
Whatsapp in the news bbc 2025-06-17
Across
- The right to keep personal information secure and confidential.
- The process of converting data into a coded format to protect privacy.
- The parent company of WhatsApp, involved in the legal fight over encryption.
Down
- A popular messaging app known for its end-to-end encryption.
- The entity seeking access to encrypted user data in this legal case.
- Measures taken to protect information from unauthorized access.
- Short for "Technical Capability Notice," a secret government request for data access.
- The tech giant currently battling the UK Home Office over data security.
- End-to-end encryption, a security method preventing third-party access to messages.
- Apple’s cloud storage service that uses encryption for data security.
10 Clues: A popular messaging app known for its end-to-end encryption. • Measures taken to protect information from unauthorized access. • The right to keep personal information secure and confidential. • The entity seeking access to encrypted user data in this legal case. • Apple’s cloud storage service that uses encryption for data security. • ...
ISMS Introduction Puzzle 2022-03-13
Across
- The organization shall evaluate the information security performance and the _______ of the ISMS
- Need to demonstrate leadership and commitment with respect to the ISMS
- In the risk treatment process, this document must be produced before formulating an information security treatment plan
- A potential cause of an unwanted incident, which may result in harm to a system or organization
- Combination of the probability of an event and its consequences
- The organization shall determine interested parties that are relevant to the ISMS and the requirements of these interested parties relevant to information security. the above statement is described under Clause x.x Understanding the needs and ______________of interested parties.
- The organization shall continually improve the __________________, adequacy and effectiveness of the ISMS.
Down
- Contains the control objectives and controls to help in the information security risk treatment process
- Ensuring that information is accessible only to those authorized to access
- Excluding any of the requirements specified in Clause 4 to 10 is not acceptable when an organization claims ______to this International Standard
- The organization shall ensure that the information security risk assessments produce consistent, valid and ________ results.
- Is conducted at planned intervals to ensure the suitability, adequacy and effectiveness of ISMS
- Shall be conducted by the organization at planned intervals to provide information on whether the ISMS conforms to the organization’s own requirements for its ISMS and the requirements of the ISO27001 standards.
- The organization shall determine the boundaries and applicability of the ISMS to establish its
- Documented information of external _______, determined by the organization to be necessary for the planning and operation of the ISMS, shall be identified as appropriate, and controlled
15 Clues: Combination of the probability of an event and its consequences • Need to demonstrate leadership and commitment with respect to the ISMS • Ensuring that information is accessible only to those authorized to access • The organization shall determine the boundaries and applicability of the ISMS to establish its • ...
global food security cross word puzzle 2024-04-19
Across
- An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
- Crucial for agriculture, requires sustainable management
- Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
- Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
- Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
- the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
- The first basic human necessity and everyone's fundamental right.
- leading international efforts to address the need that people around the world have for reliable sources of quality food.
- Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
- Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
- When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
- Altered weather patterns and agricultural productivity
- Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
- Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
- evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.
15 Clues: Altered weather patterns and agricultural productivity • Crucial for agriculture, requires sustainable management • The first basic human necessity and everyone's fundamental right. • Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets. • ...
INTERNET 2023-11-29
7 Clues: web cyber_ • Revenue Service IRS • service provider IPS • engine google, yahoo, edge • a world that you join in Minecraft • this device wraps up ur sTechnologyndy • old people have a hard time understanding
Cybersecurity Awareness 2023 2023-10-06
Across
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
- Digital ______ is the ability to use digital technology and media effectively
- Illegal _____ of copyrighted material is often referred to as piracy
- Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- Cybersecurity awareness month
- Online commenter whose intent is to attack views expressed online; these attacks are often personal
- Many features in online _____ can expose players to predators
- A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
- A person who attempts to gain unauthorized access to computer systems
- _____ settings help control things like your profile, contact, and other information relating to your account
- Online harrassment
- A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- ______ theft is a type of crime in which your private information is stolen and used for criminal activity
- Designed to detect and destroy computer viruses
15 Clues: Online harrassment • Cybersecurity awareness month • Designed to detect and destroy computer viruses • Many features in online _____ can expose players to predators • Illegal _____ of copyrighted material is often referred to as piracy • A person who attempts to gain unauthorized access to computer systems • ...
Tormentos - Bully free themed crossword puzzle 2025-12-08
Across
- Abusive language or insults
- Showing behavior that is considerate of other people
- The feeling of being ashamed
- Displaying kindness or concern for others
Down
- To frighten someone
- bullying A name for digital bullying
- Not allowing someone or something to take part in a activity
- To give someone support or confidence
- Tormentos without the s
9 Clues: To frighten someone • Tormentos without the s • Abusive language or insults • The feeling of being ashamed • bullying A name for digital bullying • To give someone support or confidence • Displaying kindness or concern for others • Showing behavior that is considerate of other people • Not allowing someone or something to take part in a activity
Chapter 2 Vocabulary 2022-09-07
Across
- Security through domination
- ability to wield power independently
- The fundamental rules and norms of politics
- weak states that breaks down
- The ability of a state to carry out actions
- Political power concentrated to authority
- Ability to wield power to make people work
- States that have strong sovereignty
- tendency toward decentralisation
- Federalism that is not uniform
Down
- Combined political entities of state, regime, gov
- Power that is distributed to regional bodies
- Something recognised as right and proper
- States that have weak sovereignty
- Appeals on the laws they offer
- Using customs and age to justify
- Organisation that maintains a monopoly of violence
- Appeals by power or ideas
- Security through cooperation
- The leadership that runs the state
20 Clues: Appeals by power or ideas • Security through domination • weak states that breaks down • Security through cooperation • Appeals on the laws they offer • Federalism that is not uniform • Using customs and age to justify • tendency toward decentralisation • States that have weak sovereignty • The leadership that runs the state • States that have strong sovereignty • ...
nvs 2013-09-12
Vocabulary 11A/ 11B 2014-11-30
20 Clues: meklēt • vīruss • nozagt • drošība • izdzēst • aplaupīt • atzīties • pielikums • noziegums • slepkavība • lejuplādēt • tiešsaiste • pieslēgties • kabatzaglis • noķert zagli • veikalu zaglis • izdarīt noziegumu • izdemolēt īpašumu • portatīvais dators • platjoslas internets
Unit 16 2020-04-16
21 Clues: padi • rabav • loeng • sadam • pagas • trahv • kirurg • kohane • kandik • ilmnema • mehaanik • vahekäik • karistus • aksessuaar • turvalisus • ürgne loodus • võõrastemaja • reisiterminal • meditsiiniline • reisi sihtkoht • kellekski saada tahtja
Лудкечпи 2020-03-10
20 Clues: цель • опора • лэптоп • быстрый • код,шифр • страшный • масса,куча • добиваться • запутанный • надёжность • доступность • последствие • безопасность • осведомленность • злоупотребление • нарушитель защиты • целостность данных • результат, проблема • финансовые средства • средства, имущество
SS2 p.50 2020-11-02
22 Clues: arm • rijk • meer • vele • gebied • kennis • luxueus • helling • smoking • houding • opereren • bevroren • vijandig • medaille • crimineel • mysterieus • veiligheid • vrouwelijk • gelegenheid • eerste hulp • lenig, soepel • persoonlijkheid
1 2024-05-17
23 Clues: way • leg • wall • cured • flies • General • Control • present • agility • security • prepared • suitable • distance • consider • required • Available • confirmed • conducted • dependent • substantial • flexibility • announcement • administrator
Hispanic Heritage Month (airport edition) 2024-09-07
23 Clues: Hat • Food • Gate • Belt • Drink • Shoes • Sharp • Hello • Please • Knives • Pockets • Welcome • Airport • Needles • Baggage • Aviation • Airplane • Passport • Thankyou • Bathroom • Computer • Security • Goodmorning
Crucigrama del vocabulario de avión 2025-03-13
23 Clues: país • avión • vuelo • Salir • aduana • maleta • demora • boleto • luggage • destino • pasajera • reclamar • despegar • maletero • pasaporte • Aterrizar • seguridad • mostrador • extranjero • aéreolinea • tripulación • desembarcar • inspeccionar
Incarceron 2022-03-15
20 Clues: zDw • dww • wqdd • dqdw • aszza • dwddw • wdwdq • wqddw • shake • asdad • szxZXx • dwdwqw • adwqdw • ddwwqd • wqdwdwq • wqddwqdwd • rub or push • unavoidable • az metal band • guards and security
Maslow's hierarchy of needs 2025-12-08
23 Clues: ценить • искать • внешний • отличие • выбирать • улучшать • присущий • ключевой • оценивать • способный • поведение • результат • директива • установить • цитировать • неспособный • безопасность • свойственный • использовать • осведомленный • гарантировать • иметь значение • трудоустройство
Practice voc 6-7-8-9 - 9 Grade 2026 2026-02-11
21 Clues: כפר • לכן • אזור • חברה • לקבל • סיבה • בריון • רציני • יתרון • תהליך • כלכלה • אירוע • עובדה • להתרחש • חשיבות • ביטחון • התנצלות • יקר ערך • סופר/מחבר • עלול/עשוי • הערה/תגובה
Espacio en Espanol 2026-03-19
21 Clues: loss • both • rate • daily • value • there • float • weight • flavor • fog up • this is • acquire • volatile • behavior • security • innovative • advantages • to unravel • environment • challenging • to carry out
ICSS Unit 6 2024-08-16
Across
- Data cleansing will eliminate data that are ________.
- DNC Registry allows one to opt out of receiving __________ calls and messages
- Operational _______ refers to business disruption as a result of data breach.
- Operational security is also known as _______ security.
- A common form of MFA is two-factor __________.
- What type of system is required to keep customers' data secure?
- One way to ethically gain customer data is through a ________ survey.
- DTMF will mask the tones so that attacker will not be able to decipher the _______ frequency of the credit card details that was keyed in.
Down
- ______ loggers steal login credentials and sensitive enterprise data.
- Patch updates could be delayed due to undiscovered __________ before a major software update.
- One of the consequences of security breach is ______ damage.
- Trojans are malicious programs disguised as ________ ones.
- PDDA stands for Personal Data ________ Act
- Telephony ______ of services attack is an attempt to make telephone system unavailable to users.
- Too much data is also known as data ______.
- They key concepts of PDPA are consent, reasonableness and ________.
16 Clues: PDDA stands for Personal Data ________ Act • Too much data is also known as data ______. • A common form of MFA is two-factor __________. • Data cleansing will eliminate data that are ________. • Operational security is also known as _______ security. • Trojans are malicious programs disguised as ________ ones. • ...
Sustainability 2019-05-02
Sustainability 2019-05-02
Networking Concepts , Cyber Ethics 2025-06-15
ord fra teksten 2025-08-25
Cyber-bullying Crossword 2023-05-04
Across
- Which foundation is run by the government
- About 50% of ----- students experience online harrassment
- Who are most affected by cyberbullying
- Cyberbullying is a ...
- Where is cyberbullying most found
- Who did we write our letter too
- Our global issue
Down
- What social media platform has the highest percentage of reported harassment
- “Being a victim of cyberbullying has a greater effect on adolescents’ -------- and suicidal ideation”
- Mental issues ----- with the use of social media
- Scott Freeman is the Founder of what Foundation
- Ross Ellis is the Founder of what Foundation
- What rates are tied to cyberbullying
13 Clues: Our global issue • Cyberbullying is a ... • Who did we write our letter too • Where is cyberbullying most found • What rates are tied to cyberbullying • Who are most affected by cyberbullying • Which foundation is run by the government • Ross Ellis is the Founder of what Foundation • Scott Freeman is the Founder of what Foundation • ...
CYBER FEST CROSSWORD 2025-01-23
Across
- Cybercrime that uses fake emails to trick people into people sharing personal information
- Digital currency
- Any type of harmful software designed to damage or disrupt a computer system
- a machine programmed by a computer capable of carrying out actions automatically
- a collection of instructions, data, or computer programs that enable a computer to perform specific tasks
- AI
- Common Gateway Interface
- an intentional act of compromising computer systems
Down
- VR
- Virtual computer world
- Characters used to verify identity
- Act of gaining access to a computer, database or system
- A global computer network
13 Clues: VR • AI • Digital currency • Virtual computer world • Common Gateway Interface • A global computer network • Characters used to verify identity • an intentional act of compromising computer systems • Act of gaining access to a computer, database or system • Any type of harmful software designed to damage or disrupt a computer system • ...
Cyberbullying 2022-05-09
Across
- If you are being cyberbullied, you should keep _____ of their messages
- A type of worry that can be caused by cyberbullying
- Online harassment
- Extreme sadness
Down
- Sometimes a cyber bully may create a fake ___
- Online information: social
- Messaging between phones
- A popular video-viewing app
- If you are being cyberbullied, you should tell a _____ adult
- Not risky
- One way to defend against a cyberbully
- A messaging app whose icon is a little ghost
12 Clues: Not risky • Extreme sadness • Online harassment • Messaging between phones • Online information: social • A popular video-viewing app • One way to defend against a cyberbully • A messaging app whose icon is a little ghost • Sometimes a cyber bully may create a fake ___ • A type of worry that can be caused by cyberbullying • ...
SMG Crossword Puzzle 2025-12-15
Across
- - A large company or group
- a measure of a company’s stock price relative to
- average forecast for a companies forecast
- - is the highest price and the lowest price of the stock over a 52-week
- - A debt security issues by government
Down
- Price a company will fetch in the open market by investor perception
- - measures volatility as compared to the overall stock
- a short unique abbreviation representing a public trading company or security on stock exchange
- is a loan made by an issuer (borrower) to a lender (investor).
- is a broad group of stocks often in the same industry.
- - Type of bond that includes Debt security issued by state, cities or county,
- - Company total income for selling goods or services.
- earnings.
- basis- the original price paid for an asset is used to determine capital gain or loss
14 Clues: earnings. • - A large company or group • - A debt security issues by government • average forecast for a companies forecast • a measure of a company’s stock price relative to • - Company total income for selling goods or services. • - measures volatility as compared to the overall stock • is a broad group of stocks often in the same industry. • ...
Religion, renewal and choice 2020-11-02
Across
- The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space)
- Davies' term that reflected the fact the clergy practise religion on behalf of the majority, who experience religion second hand - ________ religion.
- ___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity.
- The term used by Lyon to describe the fact that religious ideas no longer exist in physical churches only because of the media.
- The phrase used by Lyon that suggests that the world is not becoming rationalised, but instead is evolving and developing new unconventional beliefs, practices and spirituality.
- Hervieu-Leger's idea that religion has become individualised and we can select our own DIY beliefs that fit with our lives (2 words, no space)
- Refers to the growing interconnectedness of societies, which has led to greatly increased movements of ideas and beliefs across national boundaries.
Down
- The theoretical perspective that is explored and supported by the research and theories from this topic (beginning with P)
- The term used by Helland to describe the new forms of 'cyber-religion' that exist that challenge traditional, hierarchical religious ideas (2 words, no space)
- Religious _________ theory. The theory created by Stark and Bainbridge to explain the differences in secularisation in America and Europe.
- Cycle of _________. Term used by Stark and Bainbridge to explain why increasing diversity in religion does not have to lead to secularisation.
- The group Hervieu-Leger described as following an individual path of self-discovery and following New Age ideas.
- Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S)
- Davies' term that reflected the fact that people still follow religion but don't necessarily join an organisation - believing without ___________
14 Clues: The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space) • ___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity. • Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S) • ...
Digital Privacy Crossword 2024-10-16
Across
- A document that explains how websites use your data
- Extra layer of security that requires a code
- Data scrambled for security
- Using fake accounts to access restricted content
Down
- Checking identity before giving access
- Hidden malware disguised as legitimate software
- Small text files that track your online activity
- Security software that scans for threats
- Technology that verifies you are human (used on websites)
- A service that masks your IP address
10 Clues: Data scrambled for security • A service that masks your IP address • Checking identity before giving access • Security software that scans for threats • Extra layer of security that requires a code • Hidden malware disguised as legitimate software • Small text files that track your online activity • Using fake accounts to access restricted content • ...
Collective Security & UN Peacekeeping 2018-02-13
Across
- "The individual experts who have sat on the UN Sub-Commission on Protection of ______ ..." (pg. 245)
- Rights "The Security Council can Authorize a member state or regional organization to enforce _____" (pg. 195)
- Argued that peacekeeping is internal and external & makes the UN possible
- Scene of UN inaction and extreme violence
- "The UN's ___ reflects the ____ of the member states" (pg. 575)
- Site of UN peacekeeping as a result of British and French interests
- Attempt to cut off diplomatic or economic relations with a view towards altering offensive behavior (pg.61)
- Former political officer who shed light on the inner workings of UN decision making
- Concept that is through to undermine the efficiency of the UN. Used as a defense against UN action on human rights ( pg. 240)
- War A frigid conflict that bore peacekeeping
Down
- State that asked for UN assistance during the Cold War
- Timor UN administered territory during this entity's tradition ti independence (pg.105)
- An absence of centralized democratically elected governments, market economies, & the institutions associated with Western forms of governance (pg. 38)
- At times publicly protests governmental actions & provides assistance to refugees and contracts with NGOs (pg. 218)
- Security security arrangement, political, regional, or global, in which each state in the system accepts that the security of one is the concern of all, and therefore commits to a collective response to threats to, and breaches to peace
- Factor that contributed to the prioritization of UN needs over Rwanda (pg. 573)
- Tactic used by the UNGA and UNSC to target a specific actor or set of actors with the goal of changing actions or attitudes. Results of this are minimal due to the lack of coercive power attached to them ( pg. 199)
- Reflect interests of US Mission and Washington. Collateral damage is the production of indifference
- Author who's work details the origins, inner workings, responsibilities, and organizational powers of the UN
- Knowledge about human rights is not so much scientific knowledge, however as _______ judgement" (pg. 246)
- political "Peacekeeping" was created as much to salvage the UN from its ___ crises as it was to respond to threats to international peace and security" (pg. 31)
- One of many international entities dedicated to promoting and protecting human rights (acronym)
22 Clues: Scene of UN inaction and extreme violence • War A frigid conflict that bore peacekeeping • State that asked for UN assistance during the Cold War • "The UN's ___ reflects the ____ of the member states" (pg. 575) • Site of UN peacekeeping as a result of British and French interests • Argued that peacekeeping is internal and external & makes the UN possible • ...
MGR-22 CROSSWORD CONTEST 2022-08-22
Across
- An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
- This IBM Research tool allows scientists and businesses to search mountains of unstructured data
- IBM worked with __________ to create a scalable CRM platform, called Customer 360, which gives every part of IBM a holistic view into the client journey and cuts time to issue resolution by 26%
- “Never trust, always verify” is the first defining principle of which model
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
- IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers
- This aerospace manufacturer announced that open source, hybrid cloud, and AI technologies from IBM and Red Hat are part of its second mission
- One-way street to persisting top secrets
Down
- Decoy computers or systems that lure hackers and cybercriminals into attacking them
- For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships
- IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
- ensure the sensitive data is accessed only by an authorized user
- A Person who uses technology to gain unauthorized access to data is called a _____
- Recent IBM security acquisition of an endpoint security company.
- First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was _____
- The _____________ ransomware group was involved in the recent hacking of a networking giant by compromising an employee’s personal google account.
- Cross-site scripting standing in front of a mirror
- To avoid ____________, user input should not be put directly into a database
- Vast Strides –I help in identifying Security Vulnerabilities
- A form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
- A protocol used for directory services authentication that was first developed in 1993
- A group of protocols used to encrypt data between two communication points.
22 Clues: One-way street to persisting top secrets • Cross-site scripting standing in front of a mirror • Vast Strides –I help in identifying Security Vulnerabilities • ensure the sensitive data is accessed only by an authorized user • Recent IBM security acquisition of an endpoint security company. • ...
CyberCrossWord 2022-05-19
Across
- Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
- The process of verifying an identity by or for a system
- Policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
- Code embedded in a program that copies itself and performs unwanted function
- The output of an encryption algorithm; the encrypted form of a message or data
- Assures that a system performs its intended function in an unimpaired manner
- Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
- A potential security harm to an asset
- An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
- Preserving authorized information access, or disclosure
- The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
- Assures that a system performs its intended function in an unimpaired manner
- A random value that is concatenated with a password
- A decoy system designed to lure a potential attacker away from critical systems
Down
- Confidentiality, integrity, and availability
- Assures that information and programs are changed only in a specified and authorized manner
- An attempt to alter system resources or affect their operation
- Attack An attempt to learn or make use of information from the system that does not affect system resources
- Guarding against improper information modification or destruction
- A program that takes over another computer and it's used to launch attacks
- Program that can replicate itself and send copies from computer to computer across network connections
- Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
- Assures that private information is disclosed to unauthorized individuals
- Weakness in an information system
- Function used to protect passwords that are stored in the local database
- A plastic card that can store and process data
- Assures that systems work promptly and service is not denied to authorized users
- A procedure whereby two communicating parties can cooperate to acquire a shared secret key
- Key A temporary encryption key used between two principals
- The conversion of plaintext data into unintelligible form
30 Clues: Weakness in an information system • A potential security harm to an asset • Confidentiality, integrity, and availability • A plastic card that can store and process data • A random value that is concatenated with a password • The process of verifying an identity by or for a system • Preserving authorized information access, or disclosure • ...
Stock market terms 2023-10-25
Across
- max number of shares a publicly traded company can issue as specified in its articles of incorporation
- the money borrowed from a broker to purchase an investment
- when investors buy ownership of the shares of the company
- a period of time in a financial markets when the price of an asset or security continuously
- an intermediary between an investor and a security exchange
- a reward paid to the shareholders for their investment in a company's equity
- a period of sustained increases in the prices of stocks, bonds, or related indexes
- an order to buy/sell at the markets current available price
- the lowest price at which a seller will sell the stock
- The highest price a buyer will pay for a number of shares
- the standard deviation of a stocks annualised returns
- filling a buy/sell order in the market subject to conditions placed on the order by the end client
- to close out a position in a stock b/c price decline
- long means you own the security
- The foreign exchange market
Down
- execute a trade at a specific price that expires if not completed
- an order to buy/sell with a restriction
- a pooled collection of assets that invests in stocks, bonds, and other securities
- a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
- Measure of volatility
- a marketplace where securities, commodities, derivatives and other financial instruments are traded.
- the amount by which the ask price exceeds the bid price for an asset in the market
- a declining market
- number of shares traded between its daily open and close
- When a company first sells a stock to the public
- total value of all a companies shares of stock
- purchasing additional shares of a previously initiated investment after the price dropped
- collection of financial investments
- a statistic that captures the average change in a data series over time
- how much income an investment generates, separate from the principal.
30 Clues: a declining market • Measure of volatility • The foreign exchange market • long means you own the security • collection of financial investments • an order to buy/sell with a restriction • total value of all a companies shares of stock • When a company first sells a stock to the public • to close out a position in a stock b/c price decline • ...
Stock market terms 2023-10-25
Across
- max number of shares a publicly traded company can issue as specified in its articles of incorporation
- the money borrowed from a broker to purchase an investment
- when investors buy ownership of the shares of the company
- a period of time in a financial markets when the price of an asset or security continuously
- an intermediary between an investor and a security exchange
- a reward paid to the shareholders for their investment in a company's equity
- a period of sustained increases in the prices of stocks, bonds, or related indexes
- an order to buy/sell at the markets current available price
- the lowest price at which a seller will sell the stock
- The highest price a buyer will pay for a number of shares
- the standard deviation of a stocks annualised returns
- filling a buy/sell order in the market subject to conditions placed on the order by the end client
- to close out a position in a stock b/c price decline
- long means you own the security
- The foreign exchange market
Down
- execute a trade at a specific price that expires if not completed
- an order to buy/sell with a restriction
- a pooled collection of assets that invests in stocks, bonds, and other securities
- a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
- Measure of volatility
- a marketplace where securities, commodities, derivatives and other financial instruments are traded.
- the amount by which the ask price exceeds the bid price for an asset in the market
- a declining market
- number of shares traded between its daily open and close
- When a company first sells a stock to the public
- total value of all a companies shares of stock
- purchasing additional shares of a previously initiated investment after the price dropped
- collection of financial investments
- a statistic that captures the average change in a data series over time
- how much income an investment generates, separate from the principal.
30 Clues: a declining market • Measure of volatility • The foreign exchange market • long means you own the security • collection of financial investments • an order to buy/sell with a restriction • total value of all a companies shares of stock • When a company first sells a stock to the public • to close out a position in a stock b/c price decline • ...
Chapter 5 - Everything Needs to Be Secured 2025-11-06
Across
- Data relating to an individual that can identify or locate them.
- Software designed to damage, disrupt, or steal data.
- HOMES Homes with sensors and connected devices, increasing security risks.
- DATA Corporate data that may contain secrets or patents.
- Ethical hacker who helps organizations strengthen their security.
Down
- Hacker who acts with malicious intent.
- OF UPGRADEABILITY IoT limitation where devices cannot be updated easily.
- SECURITY Fences, guards, CCTV, and gates used to protect corporate facilities.
- A network filtering system that blocks unauthorized access.
- HOTSPOT A risky Wi-Fi network where traffic is not encrypted.
- DEVICES Devices connected to the internet that collect and exchange data.
- A secure encrypted connection used when accessing insecure networks.
- Software that scans, detects, and removes malicious programs.
13 Clues: Hacker who acts with malicious intent. • Software designed to damage, disrupt, or steal data. • A network filtering system that blocks unauthorized access. • DATA Corporate data that may contain secrets or patents. • Software that scans, detects, and removes malicious programs. • Data relating to an individual that can identify or locate them. • ...
crossword 2012-11-15
Across
- artist with the highest number of views for his\her video on youtube (3)
- brand ambassador of sony cyber shot (7)
- logo 1 (7)
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
- highest grossing hollywood movie (6)
- one world many states (16)
- the ultimate driving machine (3)
- logo 4 (9)
- towards excellence (4)
Down
- full form of P&G (14)
- ceo of virgin atlantic (14)
- logo 2 (10)
- subsidiary company of adidas which makes sportswear, apparel and accessories (6)
- logo 3 (5)
- world's local bank (4)
- parent company of minute maid (8)
16 Clues: logo 1 (7) • logo 3 (5) • logo 4 (9) • logo 2 (10) • full form of P&G (14) • world's local bank (4) • towards excellence (4) • one world many states (16) • ceo of virgin atlantic (14) • the ultimate driving machine (3) • parent company of minute maid (8) • highest grossing hollywood movie (6) • brand ambassador of sony cyber shot (7) • ...
Eksplorasi Merdeka 2025-08-18
Across
- Warna biru pada Jalur Gemilang melambangkan __________.
- Tema Hari Kebangsaan 2025 ialah "Malaysia MADANI:Rakyat ___________"
- Menjadi tempat pengisytiharan kemerdekaan ialah __________.
- Rukun Negara mengandungi __________ prinsip.
- Perkataan “Merdeka” dilaungkan sebanyak __________ kali pada 31 Ogos 1957.
- Bapa Kemerdekaan Malaysia ialah __________.
Down
- Bulan sabit pada Jalur Gemilang melambangkan agama __________.
- Lagu "Negaraku" diambil daripada lagu negeri ___________.
- Lagu manakah mengandungi lirik "Alam cyber teknologi terkini"
- Warna putih pada Jalur Gemilang melambangkan __________.
- Lagu "Keranamu Malaysia" menyemai semangat __________.
- Sejarah kemerdekaan Malaysia bermula dengan penjajahan oleh kuasa __________.
- Bunga kebangsaan Malaysia ialah bunga __________.
- Jata Negara mengandungi __________ ekor harimau.
- Warna yang melambangkan warna diraja.
- Sambutan kemerdekaan pada tahun 2025 adalah kali ke-6_.
16 Clues: Warna yang melambangkan warna diraja. • Bapa Kemerdekaan Malaysia ialah __________. • Rukun Negara mengandungi __________ prinsip. • Jata Negara mengandungi __________ ekor harimau. • Bunga kebangsaan Malaysia ialah bunga __________. • Lagu "Keranamu Malaysia" menyemai semangat __________. • Warna biru pada Jalur Gemilang melambangkan __________. • ...
Luke Nick and Harry 2022-04-27
Across
- The original form of a message
- The receptiveness and convenience of data
- A process of encryption named after a Roman Emperor
- A measure put in place to minimize threats
- Software that takes advantage of a flaw
- Fraudulent practice of getting personal information
- Files that have changed since last backup
- Preliminary experimentation on a system
Down
- Identifying and analyzing flaws
- Encryption that uses the same key
- Exposed to the possibility of an attack
- Magic happens after this process of plaintext
- Guessing all combinations until correct
- Restoring data
- A digital authentication of dependability: can verify authenticity.
- Simulating a potential cyber-barrage
16 Clues: Restoring data • The original form of a message • Identifying and analyzing flaws • Encryption that uses the same key • Simulating a potential cyber-barrage • Exposed to the possibility of an attack • Guessing all combinations until correct • Software that takes advantage of a flaw • Preliminary experimentation on a system • The receptiveness and convenience of data • ...
social media 2016-09-09
Across
- strange people
- keep safe from harm
- everybody has rights
- having an obligation to do something
- bullying the use of electronic communication to bully a person
- being free from being observed or disturbed by other people
- footprint a trail of data you create while using the Internet
- a group
Down
- a thing made to be similar or identical to another
- outline of something, especially a person's face
- putting a status on social media
- a bad group of people
- someone you don't know
- to be very involved in the internet
- ok at and comprehend the meaning
15 Clues: a group • strange people • keep safe from harm • everybody has rights • a bad group of people • someone you don't know • putting a status on social media • ok at and comprehend the meaning • to be very involved in the internet • having an obligation to do something • outline of something, especially a person's face • a thing made to be similar or identical to another • ...
Bullying 2012-10-30
Across
- deliberately harassing someone is b_______
- When you force someone to do something
- Bully someone without words, non-______
- You can bully someone ph______y
- When you bully someone with hand/body language
- You leave someone out of an activity or group
- th_____n (8 letters
- bullying someone online
Down
- you can bully someone m_____y
- You do it on purpose
- bullying can upset you and make you e________ (9 letters)
- 10 letter word h________t
- ______ 0 is the number you call for the fire/ambulance/police
- When you bully someone by calling someone names
- when you get mad feeling
15 Clues: You do it on purpose • th_____n (8 letters • bullying someone online • when you get mad feeling • 10 letter word h________t • you can bully someone m_____y • You can bully someone ph______y • When you force someone to do something • Bully someone without words, non-______ • deliberately harassing someone is b_______ • You leave someone out of an activity or group • ...
iBoy by Samuel Opferman 2015-03-24
Across
- Having an unknown name
- influence neural activity
- lack of strength
- a Greek philosopher and scientist born in Stagirus, northern Greece, in 384 BCE. His father, Nicomachus
- a combination of ingredients used in cooking or baking.
- computer network
Down
- Causing great astonishment, amazement, or dismay
- The supervising And continuing of an action to completion
- a lizard that chargés color
- Of or proceeding from the basic structure or nature of a person or thing;
- Having no limits
- In fact or to all purposes; practically
- to hold back
- Refusing to give up or let go; persevering obstinately.
- a power source
15 Clues: to hold back • a power source • Having no limits • lack of strength • computer network • Having an unknown name • influence neural activity • a lizard that chargés color • In fact or to all purposes; practically • Causing great astonishment, amazement, or dismay • Refusing to give up or let go; persevering obstinately. • a combination of ingredients used in cooking or baking. • ...
ASEAN 2023-09-13
Across
- Negara ASEAN dengan jumlah penduduk paling sedikit
- Kejahatan cyber crime merupakan dampak dari kemajuan
- Negara ASEAN dengan gunungapi terbanyak selain Indonesia
- Sungai Irawadi terletak di negara
- Keputusan tertinggi rapat ASEAN
- Masalah sosial negara berkembang
Down
- Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
- Salah satu Sekjen ASEAN berada di negara
- Merk mobil yang berasal dari negara Malaysia
- Perjanjian AFTA di tanda tangani di negara
- Pertemuan Defence Minister Meeting (ADMM)membahas tentang
- Sungai Chao Praya mengalir di negara
- Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
- Pakaian tradisional Vietnam
- Organisasi negara-negara kawasan Asia Tenggara
15 Clues: Pakaian tradisional Vietnam • Keputusan tertinggi rapat ASEAN • Masalah sosial negara berkembang • Sungai Irawadi terletak di negara • Sungai Chao Praya mengalir di negara • Salah satu Sekjen ASEAN berada di negara • Perjanjian AFTA di tanda tangani di negara • Merk mobil yang berasal dari negara Malaysia • Organisasi negara-negara kawasan Asia Tenggara • ...
IT Definitions Crossword 2013-12-02
Across
- Ways that are allowed behaviour on webpages that support an online community.
- Action, devices or events that harm components and/or data and security stored within.
- Contributes to the way a solution works and/or appears to the user
- Ways of making sure that a solution works the way it’s intended to work/be used for.
- A large internet based storage service that allows people to store data online and access anywhere with internet access.
- Ways information should be used and organised with onscreen solutions
- Software tools that allow people to figure out thoughts and find patterns in setting out data.
- A description of the/an intended use or environments of a software solution.
- A statement that outlines a situation, context, problem or needs.
- A type of software that can run an application without the user inputting the code.
- Are obligations that individuals or companies have to respect owner’s creations and privacy information.
Down
- A way of producing required information through a technology based hardware / application.
- Software or procedures used in protecting the integrity of hardware/component and/or the files it holds.
- Devices Equipment used in protecting hardware in a secure area.
- Measurements of time, cost, and/or effort used in order to create a solution
- A process of turning RAW data into a graphic visualisation for easier analysis and explanation
- A network protocol laid out into 7 layers.
- Ways to represent the was a solution works and/or appears to the user
- The combination of people, procedures, equipment and data that create data and information
19 Clues: A network protocol laid out into 7 layers. • Devices Equipment used in protecting hardware in a secure area. • A statement that outlines a situation, context, problem or needs. • Contributes to the way a solution works and/or appears to the user • Ways information should be used and organised with onscreen solutions • ...
bullying 2023-11-28
8 Clues: games • An saying rude things • An when you hurt someone. • An hurting with your feet. • An you listen to people with ______. • bullying An hurting someones feelings • An talking when someone else is talking. • bullying An when you bully someone on ticktock,you tube
