cyber security Crossword Puzzles

Digital citizenship 2018-08-25

Digital citizenship crossword puzzle
Across
  1. A program used to view webpages on the Internet; ex: Internet Explorer, Firefox, Safari or Chrome.
  2. A person who posts comments just to get a rise out of people and cause a distraction online.
  3. Being a member of and supporting your community and country. They have both rights and responsibilities.
  4. Is your right to determine what information you would like others to know about you.
  5. Using fake names, posing as someone else, or creating a fake profile about someone else.
  6. People who witness the actions of the bully and the reactions of the victim(s), without taking action.
  7. When someone tries to mislead the person into giving away information, such as a username, password or credit card details, by pretending to be a legitimate website when communicating electronically.
  8. Someone who accesses computer information without permission.
  9. The secret word you use when signing in to the Internet or an online service that helps to confirm your identity.
  10. More serious
  11. Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.
  12. Saying mean things in ALL CAPS with the intention to embarrass/humiliate.
  13. An extra (a second)layer of security
  14. The use of digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass, or embarrass someone else.
Down
  1. Information that can be used to identify you, such as your age, gender, how many brothers and sisters you have, your favorite food, address, telephone number, school, etc.
  2. The way something sounds and the feelings it expresses.
  3. To shut off another user's access to viewing your information on a social media site.
  4. A crime that happens when someone gets the personal information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money.
  5. To add a descriptive word, label, or phrase to a photo or video.
  6. A word you use when looking for information on a search engine (Google, Yahoo, etc).
  7. To annoy someone repeatedly. For example, cursing at, following, or mocking someone online.
  8. To change something that is written to make it better.
  9. Anyone who can see information about you or posted by you online.
  10. Bombarding someone with messages over digital media or repeated content when it is least expected.
  11. Less serious
  12. A graphic (picture, image) that you use to represent yourself on the Internet.
  13. Lasting a long time, if not forever, such as information that one posts online that does not go away because it is passed on and spread.
  14. Having an unknown identity
  15. Symbols you can type that show how you feel
  16. Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.
  17. To change the way something looks.
  18. Someone who acts in an aggressive, hostile, or hurtful manner toward others.

32 Clues: Less seriousMore seriousHaving an unknown identityTo change the way something looks.An extra (a second)layer of securitySymbols you can type that show how you feelTo change something that is written to make it better.The way something sounds and the feelings it expresses.Someone who accesses computer information without permission....

Choosing A Local Church 2025-03-03

Choosing A Local Church crossword puzzle
Across
  1. Leadership
  2. Program
  3. Godly
  4. Greeters
  5. Fellowship
  6. Believer's
  7. Separation
  8. Meeting
  9. Offering
  10. Scripture
Down
  1. Creed
  2. Evangelist
  3. Regular Memorial
  4. Great Commission
  5. Plan
  6. I Timothy
  7. Scriptural
  8. Fixing

18 Clues: PlanCreedGodlyFixingProgramMeetingGreetersOfferingI TimothyScriptureEvangelistLeadershipFellowshipBeliever'sSeparationScripturalRegular MemorialGreat Commission

cyber safety NIC PulcIanI 2016-05-25

cyber safety    NIC PulcIanI crossword puzzle
Across
  1. talk and put photos that everyone can see
  2. communicate
  3. a persones detail
  4. steeling money from someone
  5. stolen information
  6. keep something to yourself
  7. method
  8. find something you want to know about
  9. female or male
Down
  1. information site
  2. a website containing writers opinion
  3. unwanted mail in your email account
  4. something mean cent to you
  5. one in a class
  6. someone who keeps you safe
  7. talk to someone
  8. internet
  9. to keep something safe
  10. illegally getting into someone's account
  11. something disgusting

20 Clues: methodinternetcommunicateone in a classfemale or maletalk to someoneinformation sitea persones detailstolen informationsomething disgustingto keep something safesomething mean cent to yousomeone who keeps you safekeep something to yourselfsteeling money from someoneunwanted mail in your email accounta website containing writers opinion...

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Cyber safety-Alexander Sladic 2016-05-23

Cyber safety-Alexander Sladic crossword puzzle
Across
  1. a dishonest scheme
  2. a way of publishing photos online
  3. protecting your personal information
  4. a person, known or unknown, that sends unexpected rude messages
  5. something to keep you entertained
  6. the environment of the Internet
  7. what you find on the Internet on a certain topic
  8. a collection of information on the Internet
  9. who you appear to be online
  10. unwanted messages
Down
  1. what you use to protect your electronic equipment and access
  2. something that can infect your device
  3. a way of sending and receiving mail electronically
  4. a way of getting something from the Internet
  5. the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organisation
  6. an online diary
  7. a device produced by Apple
  8. an online resource that helps you find information and connect with people
  9. attempts by scammers to trick you into giving out your personal information
  10. a way of communicating online

20 Clues: an online diaryunwanted messagesa dishonest schemea device produced by Applewho you appear to be onlinea way of communicating onlinethe environment of the Interneta way of publishing photos onlinesomething to keep you entertainedprotecting your personal informationsomething that can infect your devicea collection of information on the Internet...

860 OSS Cyber Squad 2022-04-29

860 OSS Cyber Squad crossword puzzle
Across
  1. Shrek "Far Far Away"
  2. Kings of the Jungles
  3. Ruler of a country
  4. Explosion
  5. Famous Potato Chips
  6. THC
  7. The newest member
  8. Earth
  9. "The Great" Leader
  10. One Woman Show
  11. Kitchen Appliance
  12. Return to Sender via Biloxi
  13. Bart and Homer
  14. Empire State Building
  15. Best Buy Squad
  16. Liquor without "ch"
Down
  1. Movie Projector
  2. Porcupine
  3. Michigan Superior Ontario
  4. Mini Explosion
  5. Flowers and Roses
  6. Mound
  7. Aspen Colorado
  8. Personal Trainer
  9. Adam Eve
  10. Safety Concerns
  11. Boisterous
  12. Forged by the sea

28 Clues: THCMoundEarthAdam EvePorcupineExplosionBoisterousMini ExplosionAspen ColoradoOne Woman ShowBart and HomerBest Buy SquadMovie ProjectorSafety ConcernsPersonal TrainerFlowers and RosesThe newest memberKitchen ApplianceForged by the seaRuler of a country"The Great" LeaderFamous Potato ChipsLiquor without "ch"Shrek "Far Far Away"Kings of the Jungles...

Cyber Crossword | Easy 2 2023-07-06

Cyber Crossword | Easy 2 crossword puzzle
Across
  1. The assurance that information is disclosed only to authorised entities.
  2. The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
  3. A feature or defect of a computer system that allows access to data by bypassing normal security measures.
  4. An event that is not part of normal operations that disrupts operational processes.
  5. A defect, fault or imperfection, especially one that is hidden or unknown.
  6. The methods used to manipulate people into carrying out specific actions, or divulging information.
  7. Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
  8. A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
  9. A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
  10. The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
  1. A software program or group of software programs designed for end users.
  2. A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
  3. Measurable physical characteristics used to identify or verify an individual.
  4. The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
  5. A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
  6. A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
  7. The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
  8. A collection of data or instructions that tell a computer how to work.
  9. Malicious software that makes data or systems unusable until the victim makes a payment.
  10. Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.

20 Clues: A collection of data or instructions that tell a computer how to work.A software program or group of software programs designed for end users.The assurance that information is disclosed only to authorised entities.A defect, fault or imperfection, especially one that is hidden or unknown....

CYBER AND DIGITAL LITERACY 2024-05-02

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. systematic investigation into and study of materials and sources
  2. action or omission that constitutes an offense that may be prosecuted
  3. any program or utility that helps programmers or users
  4. the fact of being who or what a person or thing is
  5. having special and usually practical knowledge
  6. he act of posting or reposting content on your social media
  7. a file or code, typically delivered over a network
  8. the imparting or exchanging of information or news
  9. the condition of being safe from undergoing
  10. he protection of computer systems and information
  11. complex configuration composed of hardware
  12. system that connects two or more computing devices
  13. the process by which topic ideas that appeal
  14. personal information
  15. spreads between computers and causes damage
  16. a computer or system that provides resources, data, services, or programs
  17. a set of instructions, data or programs used to operate computers
  18. organized or classified data, which has some meaningful values for the receiver
  19. the recording, reproducing, or broadcasting of moving visual images
  20. action of working with someone to produce or create something
  21. control the functioning of a system
Down
  1. available on or performed using the internet or other computer network
  2. a microcomputer designed for use by one person at a time
  3. acquisition of knowledge or skills through experience
  4. the innovative use of digital tools and technologies during teaching and learning
  5. anything you share on social media
  6. to make additions, deletions, or other changes
  7. a media type displayed as visual information
  8. knowledge and ability to use computers
  9. create, share, and/or exchange information and ideas in virtual communities
  10. information that can be interpreted and used by computers
  11. To store data on and retrieve data from a disk or other peripheral device
  12. the act of compromising digital devices and networks
  13. the protection of computer systems
  14. any electronic or online account
  15. a secret word or expression used by authorized persons
  16. he main means of mass communication
  17. creating globalized accounts on each relevant platform
  18. to deliver messages across computer networks
  19. the application of scientific knowledge to the practical aims of human life
  20. relating to or characteristic of the culture of computers
  21. a global network of billions of computers and other electronic devices
  22. a digitally replicated version of something real
  23. a detailed examination of anything complex
  24. a person who utilizes a computer or network service
  25. potential negative action
  26. electronic technology that generates
  27. device that accepts information
  28. online journal or information website
  29. relating to the present or recent times

50 Clues: personal informationpotential negative actiondevice that accepts informationany electronic or online accountanything you share on social mediathe protection of computer systemshe main means of mass communicationcontrol the functioning of a systemelectronic technology that generatesonline journal or information website...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. is an expanded conceptualization of literacy that includes the ability to access and analyze media
  2. These are schemes that deceive the users in various ways in an attempt totake advantage of them
  3. is the ability to access, manage, understand, integrate, communicate, evaluate and create information safely
  4. is free for student, teacher, and personal use
  5. to plan, direct, or plot the path or position of (a ship, an aircraft, etc)
  6. the ability of students to use digital technology, communication tools and/or networks appropriately to solve information problems to function in an information society
  7. a portable computer that is small enough to use on one's lap
  8. a free photo and video sharing app
  9. the action of working with someone to produce or create something.
  10. a group of data that collectively carries a logical meaning.
  11. It is the use of electronic means, such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, oroverpower an individual or group
  12. is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing
  13. a style of shoe with a very thick sole that is equally or almost equally thick at the front and back, so the foot is almost flat inside
  14. refers to reading and writing abilities
  15. a string of characters used to verify the identity of a user during the authentication process
  16. is the ability to discover, evaluate, and use information and technology effectively and ethically.
  17. defined as the capacity to use computer technology successfully
  18. the ability to read, write and create visual images.
  19. show that technology and its use can improve intructional practices
  20. available on or performed using the internet or other computer network
  21. a device or implement, especially one held in the hand, used to carry out a particular function.
  22. ability to access, manage, understand, integrate, communicate, evaluate and create information
  23. learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
  24. ability and capacity acquired through deliberate, systematic, and sustained effort
  25. a representation of a person's real self, online.
  26. Various websites on the Internet contain material that maydeem offensive, distasteful or explicit
  27. a theory by Gregory Ulmer that describes the skills necessary to exploit the full communicative potential of a new electronic media
  28. It is a common type of scam, of which the scammers disguise as a trustworthysource in an attempt to obtain private information,
  29. a piece of writing, image, or other item of content published online, typically on a blog or on social media.
Down
  1. a short burst of inconsequential information and chirps from birds
  2. Just like physical documents are so arranged that they can be easily findable, digital file management is the cornerstone of order in a virtual environment.
  3. means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  4. Mastery of web-surfing is like finding treasures in the enormous ocean
  5. is defined as the knowledge and ability to use computers and related technology efficiently
  6. relating to, or utilizing devices constructed or working by the methods or principles of electronics
  7. A term coined by Howard Rheingold to describe the digital literacy skills of managing the technology we use and synthesizing the information we find online.
  8. a device that uses either a system of wires along which electrical signals are sent or a system of radio signals
  9. the action of taking part in something.
  10. the state of being comfortable, healthy, or happy
  11. facts provided or learned about something or someone.
  12. the application of scientific knowledge for practical purposes,
  13. a social networking site that makes it easy for you to connect and share with family and friends online.
  14. an award-winning education technology platform that makes it easy to augment images, videos, and virtual tours with additional information and links.
  15. Communication defines the traditional classrooms
  16. a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
  17. It is a malicious software (particularly spyware) disguised to collect and transmitprivate information,
  18. It is the act of engaging an underage minor into appropriate sexualrelationships through the Internet
  19. It is the use of the Internet or other electronic means to stalk or harass anindividual
  20. the use and application of technology and digital tools in international development
  21. upload a video of (someone or something)
  22. absolutely necessary or important; essential.
  23. it incorporates a lot more.

52 Clues: it incorporates a lot more.a free photo and video sharing appthe action of taking part in something.refers to reading and writing abilitiesupload a video of (someone or something)absolutely necessary or important; essential.is free for student, teacher, and personal useCommunication defines the traditional classrooms...

CyberSecurity Awareness - Cyber Knowledge 2024-09-24

CyberSecurity Awareness - Cyber Knowledge crossword puzzle
Across
  1. is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
  2. email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
  3. a weakness that can be accidentally triggered or intentionally exploited
  4. a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
  5. computer software that is provided usually for free but contains advertisements
  6. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
  7. a program that is designed to harm a computer by deleting data,
  8. a string of words and characters that you type in to authenticate yourself
  9. preventive cybersecurity action
  10. a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
  11. A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
  12. a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
  1. the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
  2. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  3. having or showing realization, perception, or knowledge
  4. Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
  5. software designed to interfere with a computer's normal functioning
  6. computer software that secretly records information about the way you use your computer
  7. a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
  8. a secret series of numbers or letters that allows you to use a computer system
  9. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean

21 Clues: preventive cybersecurity actionhaving or showing realization, perception, or knowledgea program that is designed to harm a computer by deleting data,software designed to interfere with a computer's normal functioninga weakness that can be accidentally triggered or intentionally exploited...

Cyber Physical Systems-2 2025-03-20

Cyber Physical Systems-2 crossword puzzle
Across
  1. Using data to forecast and prevent equipment failures.
  2. Self-driving cars and intelligent transportation systems.
  3. A predictable system behavior under given conditions.
  4. The delay between input and response in a system.
  5. An intelligent electricity network with automated controls.
  6. The use of technology to control industrial processes.
  7. Ensuring processes operate in a coordinated manner.
  8. The ability to continue operation despite component failures.
Down
  1. Smart healthcare devices with embedded intelligence.
  2. The creation of mathematical representations of systems.
  3. The ability of a system to function under expected conditions.
  4. The process of improving system performance.
  5. The capacity of a system to handle growth efficiently.
  6. Urban areas that integrate technology for improved efficiency.
  7. Monitoring and optimizing energy consumption.
  8. Farming with IoT and AI for better productivity.
  9. The production of goods using machines and automation.
  10. The management of materials and goods from production to delivery.
  11. Duplication of critical components to increase reliability.
  12. The capacity of a system to recover from disruptions.

20 Clues: The process of improving system performance.Monitoring and optimizing energy consumption.Farming with IoT and AI for better productivity.The delay between input and response in a system.Ensuring processes operate in a coordinated manner.Smart healthcare devices with embedded intelligence.A predictable system behavior under given conditions....

Cyber ethics and networking 2025-06-05

Cyber ethics and networking crossword puzzle
Across
  1. A secret word to access systems
  2. Always log out of ____ after use
  3. Act of pretending to be someone else online
  4. A rule that controls data transmission
  5. Software designed to protect against viruses
  6. Repeated online harassment
  7. Someone who uses tech to harm others
  8. Common wireless security protocol
  9. A global system of interconnected networks
Down
  1. Helps to convert domain names to IP address
  2. Never share your ____ with strangers
  3. Unsolicited email or messages
  4. Think before you ____ online
  5. Connecting to someone's Wi-Fi without permission
  6. Connects computers in a small area
  7. Protects private data on a network
  8. address The unique address of a device on a network
  9. Online behaviour guidelines
  10. Avoid clicking these in suspicious emails
  11. Device that forwards data pockets

20 Clues: Repeated online harassmentOnline behaviour guidelinesThink before you ____ onlineUnsolicited email or messagesA secret word to access systemsAlways log out of ____ after useCommon wireless security protocolDevice that forwards data pocketsConnects computers in a small areaProtects private data on a networkNever share your ____ with strangers...

CHAPTER 18 TERMS 2020-09-10

CHAPTER 18 TERMS crossword puzzle
Across
  1. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
  2. contain events triggered by applications or programs determined by their programmers
  3. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
  4. the facility to which the message refers.
  5. a device that test the speed of data transfer in the network.
  6. are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
  7. detects unwanted attempts to manipulate network systems and/or environments
  8. a single digit code from 0 to 7 that indicates the severity of the message.
  9. most popular form of TCP scanning
  10. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
  11. is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
  12. used for sniffing wireless networks
  13. protocol analyzers such as load testing, connectivity testing, and throughput testing.
  14. contain events generated by Windows system component, including drivers and services that started or failed to start.
  15. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
  16. analyzes protocols
  17. looks inside every packet on a network segment.
Down
  1. text string containing detailed information about the even being reported.
  2. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
  3. date and time of a message.
  4. a text string that uniquely describes the message.
  5. a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
  6. a powerful enterprise (large corporate environment) network intrusion and prevention system.
  7. a device that test the speed of data transfer in the network.
  8. contain security events like valid logon attempts and potential security problems
  9. a term for software products and services combining security information management and security event management.
  10. is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
  11. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
  12. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
  13. a software tool designed to search a host for open ports.
  14. a combination cable tester and network analyzer, only better because it comes with more options.
  15. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
  16. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
  17. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
  18. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
  19. supports plaintext authentication with community strings and uses only UDP.
  20. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.

37 Clues: analyzes protocolsdate and time of a message.most popular form of TCP scanningused for sniffing wireless networksthe facility to which the message refers.looks inside every packet on a network segment.a text string that uniquely describes the message.a software tool designed to search a host for open ports....

Chapter 3: Access Control 2014-10-22

Chapter 3: Access Control crossword puzzle
Across
  1. The absence or weakness of a safeguard that could be exploited.
  2. A subject provides some type of data to an authentication service. First step in the authentication process.
  3. An access policy that restricts subjects’ access to objects based on the security clearance of the subject and the classification of the object. The system enforces the security policy, and users cannot share their files with other users.
  4. A security principle that makes sure that information and systems are not modified maliciously or accidentally.
  5. Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.
  6. A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create.
  7. A security principle that works to ensure that information is not disclosed to unauthorized subjects.
  8. Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.
  9. When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.
  10. A passive entity that contains or receives information. Examples include records, pages, memory segments, files, directories, directory trees, and programs.
  11. A form of attack in which an attacker uses a large set of likely combinations to guess a secret, usually a password.
  12. The reliability and accessibility of data and resources to authorized individuals in a timely manner.
  13. A chronological set of logs and records used to provide evidence of a system’s performance or activity that took place on the system. These logs and records can be used to attempt to reconstruct past events and track the activities that took place, and possibly detect and identify intruders.
  14. A security principle indicating that individuals must be identifiable and must be held responsible for their actions.
Down
  1. Granting access to an object after the subject has been properly identified and authenticated.
  2. A computer set up as a sacrificial lamb on the network in the hope that attackers will attack this system instead of actual production systems.
  3. An access control model and policy that restricts access to objects based on the identity of the subjects and the groups to which those subjects belong. The data owner has the discretion of allowing or denying others access to the resources it owns.
  4. To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, _____, and authorization.
  5. The three security principles: availability, integrity, and confidentiality.
  6. An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.
  7. Type of model that provides access to resources based on the role the user holds within the company or the tasks that the user has been assigned.
  8. An active entity, generally in the form of a person, process, or device, that causes information to flow among objects or that changes the system state.

22 Clues: The absence or weakness of a safeguard that could be exploited.The three security principles: availability, integrity, and confidentiality.Granting access to an object after the subject has been properly identified and authenticated.A security principle that works to ensure that information is not disclosed to unauthorized subjects....

AWS Quiz III 2022-06-10

AWS Quiz III crossword puzzle
Across
  1. is an edge computing, data migration, and edge storage device that comes in two Options.
  2. is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
  3. is a highly available and scalable cloud Domain Name System (DNS) web service.
  4. provides a single location to track the progress of application migrations across multiple AWS and partner solutions
  5. is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
  6. is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
  7. is an object storage service that offers industry-leading scalability, data availability, security, and performance.
  8. is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
  9. lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
  10. provides alerts and remediation guidance when AWS is experiencing events that might affect you.
  11. is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
  12. provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
  1. makes it easy to establish a dedicated network connection from your premises to AWS.
  2. running on AWS
  3. is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
  4. gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
  5. can migrate your data to and from most widely used commercial and open-source databases.
  6. is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
  7. is a networking service that improves the availability and performance of the applications that you offer to your global users.
  8. enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
  9. provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
  10. is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
  11. provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
  12. is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
  13. is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
  14. makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
  15. is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
  16. helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

28 Clues: running on AWSis a highly available and scalable cloud Domain Name System (DNS) web service.makes it easy to establish a dedicated network connection from your premises to AWS.is an edge computing, data migration, and edge storage device that comes in two Options....

Final Crossword 2025-06-11

Final Crossword crossword puzzle
Across
  1. A network device that can forward packets across different computer networks
  2. small number of passwords used when trying several different user accounts
  3. tool that provides a visual representation of the wireless signal
  4. A framework for transporting authentication protocols
  5. Having a high tolerance for risk
  6. A device that distributes resources and services to devices connected to the network
  7. An access control scheme that is the most restrictive
  8. A downgrade attack
  9. A systematic approach to dealing with transformations within an organization
  10. The retrieval of difficult-to-obtain data
  11. Threat intelligence data that has been legally gathered
  12. denial of the truth or validity of something
  13. Vulnerability for which there are no days of advanced warning
  14. Employee choose from company-approved devices
  15. Redirecting users to fake websites to steal data
  16. Installing software security updates
  17. replaces SSL
  18. A standard of normal activities
  19. A device that distributes work across a network
  20. Infecting frequented websites with malware
  21. bogus requests to overwhelm the recipient
  22. Addressing a risk by making the risk less serious
  23. Unnecessary ports that are not disabled
  24. A product that consolidates real-time security monitoring and management
  25. pay security researchers who uncover security bugs
  26. Using more than one type of authentication credential
  27. An AP set up by an attacker to mimic an authorized AP
  28. An attack in which threat actors introduce something into RAM
  29. retains historical documents
Down
  1. ensure critical data is protected
  2. server within the DMZ that is used to connect two dissimilar security zones
  3. Taking a “picture” of the state of the data repeatedly
  4. software embedded into hardware
  5. Isolating systems that have been compromised
  6. Simplifies the process of building, deploying, and managing containerized applications
  7. A device that maintains power to equipment in case of an interruption
  8. An certificate that uses an asterisk to cover multiple subdomains
  9. evidence or proof of something
  10. VM breaking out to interact with host OS
  11. Directly probing for vulnerabilities
  12. is a finite sequence of rigorous instructions
  13. A creative invention or work with rights
  14. digital fingerprints
  15. refers to integrating security into the application
  16. Combining two or more devices to appear as a single unit
  17. Numeric scores on a vulnerability
  18. captures and stores each keystroke that a user types on the computer’s keyboard
  19. The state or fact of something being likely or possible
  20. Tools that allow a device to be managed remotely by an organization
  21. A protocol suite for securing Internet Protocol (IP) communications
  22. use of technology without the knowledge of the official IT department
  23. A coding technique for accounting for errors
  24. An incident response testing exercise that is a monthly 30-minute discussion
  25. threat actor gains illicit access of elevated rights or privileges
  26. enables users to access a network resource through a directory service
  27. unauthorized copying of data
  28. Intentionally flooding the radio frequency spectrum
  29. Having little tolerance for risk
  30. isolate the failure of a server and storage resources from cloud users
  31. Procedures needed if a “roll back”
  32. Converting data into unreadable form for security

61 Clues: replaces SSLA downgrade attackdigital fingerprintsunauthorized copying of dataretains historical documentsevidence or proof of somethingsoftware embedded into hardwareA standard of normal activitiesHaving a high tolerance for riskHaving little tolerance for riskensure critical data is protectedNumeric scores on a vulnerability...

twitter 2013-11-21

twitter crossword puzzle
Across
  1. and app for evry on
  2. it is the oppisite of being nice
  3. bullying bulliying on line
  4. a socal media website where you tweet
Down
  1. it is the oppisite of good
  2. where ypu text online
  3. online chat room
  4. online chat for blackbery
  5. you know is where someone thinks they know best on the internet

9 Clues: online chat roomand app for evry onwhere ypu text onlineonline chat for blackberyit is the oppisite of goodbullying bulliying on lineit is the oppisite of being nicea socal media website where you tweetyou know is where someone thinks they know best on the internet

SDLC 2024-10-22

SDLC crossword puzzle
Across
  1. Performed for ensuring that code changes do not introduce new vulnerabilities
  2. A type of testing that checks for vulnerabilities in the application
  3. The phase where security requirements are identified and documented.
  4. The process of converting source code into executable code
Down
  1. A security measure that involves reviewing code for vulnerabilities
  2. A practice of continuously integrating and testing code changes
  3. The final phase where the product is deployed to production.
  4. The phase where the system is monitored for security incidents.
  5. The phase where the system is designed, including security architecture.

9 Clues: The process of converting source code into executable codeThe final phase where the product is deployed to production.A practice of continuously integrating and testing code changesThe phase where the system is monitored for security incidents.A security measure that involves reviewing code for vulnerabilities...

Security Awareness Crossword Puzzle 2025-07-12

Security Awareness Crossword Puzzle crossword puzzle
Across
  1. What is the name of The Israeli Security Agency
  2. Which security device functions as a physical barrier to prevent forced entry of vehicles from entering restricted areas?
  3. LUX is the units of
  4. Any Aerial Threats across the land border by Fighter Planes or Missiles is delt by
Down
  1. Which Refinery unit received the Best Location Award-2024 for outstanding security practices
  2. Which country used DRONE for the first time for attack
  3. The colour of‘VIP VISITOR’ card is
  4. A mobile Application to grant permission online for DRONES
  5. The first line of defence in physical security is

9 Clues: LUX is the units ofThe colour of‘VIP VISITOR’ card isWhat is the name of The Israeli Security AgencyThe first line of defence in physical security isWhich country used DRONE for the first time for attackA mobile Application to grant permission online for DRONESAny Aerial Threats across the land border by Fighter Planes or Missiles is delt by...

12 Days of Christmas ITHD Puzzle 2024-12-09

12 Days of Christmas ITHD Puzzle crossword puzzle
Across
  1. a link to something in a website.
  2. Collection of professional creative software made by Adobe.
  3. a secret word or phrase that must be used to gain admission to something.
  4. Prevents unauthorized access to a disk's contents, even if the disk is offline.
  5. Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
  1. The practice of protecting devices, networks and programs from digital attacks.
  2. Creates a private connection between your computer and a remote server.
  3. The programs and other operating information used by a computer.
  4. Person who breaches computer security
  5. Group of devices connected within a limited area, such as a home, office or building.
  6. A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
  7. Programming error
  8. Unsolicited email
  9. Temporary data storage

14 Clues: Programming errorUnsolicited emailTemporary data storagea link to something in a website.Person who breaches computer securityCollection of professional creative software made by Adobe.The programs and other operating information used by a computer.Creates a private connection between your computer and a remote server....

Financial Math 2021-09-20

Financial Math crossword puzzle
Across
  1. often offer to their employees in which they don't report to work
  2. - set amount of money that a worker receives for each item the individual produces.
  3. - The set number of hours that an employee is expected to work.
  4. covers only the individual to the extent outlined
  5. paid time off
  6. payroll tax deducted to fund the Social Security and Medicare programs
  7. formula to determine weekly benefits.
  8. total pay which is the sum of an employees hourlypay and overtime pay
  9. - the compensation that is paid to the owner of an asset based on income earned
  10. type of retirement plan where an employee receives compensation
  11. allows employees to buy or receive company stocks
  12. covers all members of the immediate family for health care bills to the extent outlined
  13. maximum income on which a person must pay social security tax in given year
  14. hourly rate that federal law allows as the least hourly rate
  15. paid time off to care for sick children or newborns.
  16. - work paid for according to the amount produced
  17. amount of social security a worker pays depends on the social security percentage and the maximum taxable income for that year
  18. - extra hours an employee works beyond their regular hours
  19. A government program that offers benefits to eligible employees who, through no fault on their own, have become unemployed
Down
  1. nine digit number that identifies a resident of united states
  2. - twice a month
  3. - provides income to people who retire, become disabled, or who receive survivors benefits.
  4. - The hourly rate an employee usually gets paid for overtime hours.
  5. employers may offer to save for retirement
  6. - Payroll or other types of checks that are directly and electronically deposited into a bank account.
  7. - every two weeks
  8. - what you are getting paid by hour
  9. Assistance to employees who are injured while working at their job
  10. An overtime rate that is two times the hourly rate.
  11. money that employers and employer contribute to social security and medicare
  12. - hourly wage an employee receives for any overtime hours.
  13. form of noncash compensation received in addition to a wage or salary
  14. - health, life, and disability
  15. - a fee paid for services, usually a percentage of the total cost
  16. employee pays is a set percentage of entire income with no maximum

35 Clues: paid time off- twice a month- every two weeks- health, life, and disability- what you are getting paid by hourformula to determine weekly benefits.employers may offer to save for retirement- work paid for according to the amount producedcovers only the individual to the extent outlinedallows employees to buy or receive company stocks...

GLOBAL POLITICS U4 AOS2 2022-09-12

GLOBAL POLITICS U4 AOS2 crossword puzzle
Across
  1. rights afforded to all human beings
  2. move across borders searching protection
  3. peaceful means to enforce int'l laws
  4. defined territory occupied by an entity
  5. state of panic due to a dispute
  6. Power concentrated to a singular leader
  7. approved by the head of state of a state
  8. involving in affairs of other actors
  9. use of violence to achieve an agenda
  10. System where actors control wealth
Down
  1. amount of money necessary to survive
  2. provide security and political stability
  3. use of armed force between parties
  4. global interaction among states
  5. popular uprising
  6. internal conflict in a state
  7. questions of morality
  8. to be safe from harm
  9. exercise legitimate political authority
  10. violations of the laws of war
  11. states conduct their foreign relations.

21 Clues: popular uprisingto be safe from harmquestions of moralityinternal conflict in a stateviolations of the laws of warglobal interaction among statesstate of panic due to a disputeuse of armed force between partiesSystem where actors control wealthrights afforded to all human beingsamount of money necessary to survive...

travel vocab 2020-04-08

travel vocab crossword puzzle
Across
  1. security agent
  2. to board
  3. car wagon
  4. to check luggage
  5. bunk
  6. to miss
  7. seat
  8. visa
  9. international airport
  10. ticket
  11. to land
  12. to see
  13. carry on luggage
  14. waiting room
  15. baggage claim
  16. platform
  17. departure
  18. counter
  19. first class
  20. safety belt
  21. flight attendant
  22. suitcase
  23. stop
  24. window
Down
  1. ticket
  2. to take off
  3. layover
  4. to get/obtain
  5. luggage screening
  6. boarding pass
  7. second class
  8. delayed
  9. passport
  10. to turn
  11. on time
  12. to hope
  13. aisle
  14. to go straight
  15. coach
  16. connection
  17. customs
  18. trip travel
  19. arrival
  20. passenger
  21. gate
  22. controller
  23. to go through security
  24. sleeping car
  25. ticket window
  26. event ticket

50 Clues: bunkseatvisagatestopaislecoachticketticketto seewindowlayoverdelayedto turnon timeto hopeto missto landcustomsarrivalcounterto boardpassportplatformsuitcasecar wagonpassengerdepartureconnectioncontrollerto take offtrip travelfirst classsafety beltsecond classwaiting roomsleeping carevent ticketto get/obtainboarding passbaggage claimticket window...

Password 2022-05-27

Password crossword puzzle
Across
  1. i
  2. d
  3. l
  4. m
  5. n
  6. h
  7. a
  8. f
  9. k
  10. t
  11. v
Down
  1. s
  2. c
  3. j
  4. e
  5. p
  6. o
  7. b
  8. y
  9. w
  10. z
  11. g
  12. q

23 Clues: scijepdlmonhbyafwzkgtqv

Password 2022-05-27

Password crossword puzzle
Across
  1. s
  2. n
  3. m
  4. p
  5. a
  6. k
  7. q
  8. h
  9. j
  10. c
  11. v
  12. b
Down
  1. f
  2. y
  3. t
  4. e
  5. z
  6. o
  7. g
  8. w
  9. i
  10. d
  11. l

23 Clues: fsyteznmpoakgwqhidjclvb

HIPAA 2024-07-12

HIPAA crossword puzzle
Across
  1. The type of safeguard that lays out the policies and procedures that a covered entity must implement.
  2. The I in HIPAA stands for __________.
  3. The type of safeguard that protects ePHI and who has access to it.
  4. The two main HIPAA rules are the _______ Rule and Security Rule.
  5. The P in HIPAA stands for __________.
  6. The security rule ensures _________, integrity, and security of PHI.
  7. Healthcare providers, health plans, and healthcare clearinghouses are covered _________.
  8. 58% of people have lied to their physican due to fear of _________ or embarrassment.
Down
  1. The type of safeguard that protects the physical environment that the PHI is stored and accessed in.
  2. A _________ action plan may be required to return to HIPAA standards after a violation.
  3. The first A in HIPAA stands for ________.
  4. The maximum number of years you can serve in jail for a HIPAA violation.
  5. The e in ePHI stands for _________.
  6. The penalties of a HIPAA violation are jail time or a substantial _______.
  7. The P in PHI stands for _________.
  8. HIPAA protects the ________.

16 Clues: HIPAA protects the ________.The P in PHI stands for _________.The e in ePHI stands for _________.The I in HIPAA stands for __________.The P in HIPAA stands for __________.The first A in HIPAA stands for ________.The two main HIPAA rules are the _______ Rule and Security Rule.The type of safeguard that protects ePHI and who has access to it....

Cyber Security Homework 1 Year 8 2025-10-15

Cyber Security Homework 1 Year 8 crossword puzzle
Across
  1. A self-replicating malware that spreads without user action.
  2. Crime involving stealing someone's personal information
  3. A type of malware that attaches itself to clean files.
Down
  1. Software designed to damage or disrupt systems
  2. A type of malware that pretends to be legitimate software
  3. A scam where attackers trick users into giving personal information

6 Clues: Software designed to damage or disrupt systemsA type of malware that attaches itself to clean files.Crime involving stealing someone's personal informationA type of malware that pretends to be legitimate softwareA self-replicating malware that spreads without user action.A scam where attackers trick users into giving personal information

Cyber Security Awareness Month Week 3 2021-10-22

Cyber Security Awareness Month Week 3 crossword puzzle
Across
  1. Setup a ______ network with strong password for smart devices to limit the damage of a cyberattack on your home network.
  2. ________is a network security device or software, that monitors and block specific traffic based on a defined set of security rules.
  3. _______ engineering is a psychological manipulation technique that tricks users into giving away sensitive information
Down
  1. Think before you click on _______ or links in any emails
  2. ___ is an authentication method that requires the user to provide two or more verification factors to gain access.
  3. Using a trusted ________ manager can help keep your passwords organized and secured.

6 Clues: Think before you click on _______ or links in any emailsUsing a trusted ________ manager can help keep your passwords organized and secured.___ is an authentication method that requires the user to provide two or more verification factors to gain access....

It's a crazy world out there! 2016-08-12

It's a crazy world out there! crossword puzzle
Across
  1. palvelu
  2. epäsuosittu
  3. sivistys
  4. vieraanvarainen
  5. yllättävä
  6. piirre
  7. totuus
Down
  1. onneksi
  2. muovi
  3. turvallisuus
  4. roskat
  5. maali
  6. viranomaiset
  7. päättää
  8. vanki
  9. paeta

16 Clues: muovimaalivankipaetaroskatpiirretotuusonneksipalvelupäättääsivistysyllättäväepäsuosittuturvallisuusviranomaisetvieraanvarainen

1234 2023-10-13

1234 crossword puzzle
Across
  1. prom
  2. odloty
  3. przepłynąć
  4. bramka
  5. przepłynąć
  6. dogodny
  7. podróż
  8. bagaż
Down
  1. pasażer
  2. ciężarówka
  3. motocykl
  4. port
  5. mikrobus
  6. ocjrona
  7. tunel
  8. bagażnik
  9. dostrzeć

17 Clues: promporttunelbagażodlotybramkapodróżpasażerocjronadogodnymotocyklmikrobusbagażnikdostrzećciężarówkaprzepłynąćprzepłynąć

Networking Concepts , Cyber Ethics 2025-06-15

Networking Concepts , Cyber Ethics crossword puzzle
Across
  1. Wide
  2. Privacy
  3. Access
  4. Manners
  5. Rules
  6. Connect
  7. Copying
Down
  1. Virus
  2. Internet
  3. Service
  4. Security
  5. Adress
  6. Device
  7. Stealing
  8. Harassment
  9. Local

16 Clues: WideVirusRulesLocalAccessAdressDevicePrivacyServiceMannersConnectCopyingInternetSecurityStealingHarassment

Crimes 2016-09-19

Crimes crossword puzzle
Across
  1. Crime A crime done in dislike of a certain race, religion, orientation
  2. Starting a harmful fire
  3. Pretending to be someone else
  4. Hurting someone
  5. Crime A crime that is committed online
Down
  1. Threatening or physically harming someone
  2. Lying under oath
  3. Forcefully taking something from someone

8 Clues: Hurting someoneLying under oathStarting a harmful firePretending to be someone elseCrime A crime that is committed onlineForcefully taking something from someoneThreatening or physically harming someoneCrime A crime done in dislike of a certain race, religion, orientation

bullying 2023-11-28

bullying crossword puzzle
Across
  1. bullying An when you bully someone on ticktock,you tube
  2. bullying An hurting someones feelings
  3. games
  4. An when you hurt someone.
Down
  1. An you listen to people with ______.
  2. An saying rude things
  3. An talking when someone else is talking.
  4. An hurting with your feet.

8 Clues: gamesAn saying rude thingsAn when you hurt someone.An hurting with your feet.An you listen to people with ______.bullying An hurting someones feelingsAn talking when someone else is talking.bullying An when you bully someone on ticktock,you tube

technology 2023-11-06

technology crossword puzzle
Across
  1. used to see better
  2. used to type better
  3. is in the mediaverse
  4. used to make device work
  5. used to plug in things
  6. are used to not have sound loud
  7. you use it alot in school
  8. energy used for energy from sun
Down
  1. used to talk to people online
  2. is used for all thing to work
  3. there are thousands of them in technology
  4. used to keep electronic alive
  5. used to watch and play things on device
  6. type of car but different and new
  7. used to help instead of the computer mouse

15 Clues: used to see betterused to type betteris in the mediaverseused to plug in thingsused to make device workyou use it alot in schoolused to talk to people onlineis used for all thing to workused to keep electronic aliveare used to not have sound loudenergy used for energy from suntype of car but different and newused to watch and play things on device...

Security Crossword Challenge 2015-02-18

Security Crossword Challenge crossword puzzle
Across
  1. 3rd President
  2. 18th President
  3. 1st President
  4. Taking of items
  5. 1st Ambassador to France
  6. Cash or valuables in transit
  7. 1st Secretary of Treasury
  8. Opens many doors
Down
  1. Secures your money
  2. Funny Money
  3. 16th President
  4. Unusual Behavior
  5. Used to make change
  6. 7th President
  7. Director of Security

15 Clues: Funny Money3rd President1st President7th President16th President18th PresidentTaking of itemsUnusual BehaviorOpens many doorsSecures your moneyUsed to make changeDirector of Security1st Ambassador to France1st Secretary of TreasuryCash or valuables in transit

Security Crossword Puzzle 2022-04-20

Security Crossword Puzzle crossword puzzle
Across
  1. Located at each desk and teller unit in the branch
  2. Employees will be asked to ______ the robber
  3. All employees are expected to follow ______ when in the vault
  4. _____ the bank is done at the beginning and end of each day
  5. Clean _____ policy
  6. Each branch has an _______ sign to signal it is safe to enter the branch
Down
  1. After a robbery, employees will be asked to reconstruct their last five _______
  2. _____ is one of the easiest ways to prevent a robbery
  3. If emailing sensitive information, _____ must be used
  4. The robbery packets also include a _______ checklist
  5. _____ code can be used by employees to activate the alarms
  6. Contact the ______ department to notify them of the robbery
  7. Remain _____ during a robbery
  8. Rocky Mountain Safe _______ Task Force will be involved after a robbery
  9. Hold-up _______

15 Clues: Hold-up _______Clean _____ policyRemain _____ during a robberyEmployees will be asked to ______ the robberLocated at each desk and teller unit in the branchThe robbery packets also include a _______ checklist_____ is one of the easiest ways to prevent a robberyIf emailing sensitive information, _____ must be used...

ISC Security Crossword 2026-02-21

ISC Security Crossword crossword puzzle
Across
  1. Assault w/ deadly weapon
  2. Correct time
  3. Assault
  4. Indecent Exposure
  5. Fire
  6. Domestic violence
  7. Bomb Threat
Down
  1. Suicide
  2. Battery
  3. Drunk driver
  4. Defrauding Innkeeper
  5. Stop Transmitting
  6. Burglary
  7. Man W/ Gun
  8. Vandalism

15 Clues: FireSuicideBatteryAssaultBurglaryVandalismMan W/ GunBomb ThreatDrunk driverCorrect timeStop TransmittingIndecent ExposureDomestic violenceDefrauding InnkeeperAssault w/ deadly weapon

Social Security Card 2025-04-10

Social Security Card crossword puzzle
Across
  1. alien, A person from another country who can live or work in the U.S.
  2. of identity, A document that shows your name and who you are.
  3. To finish all parts of something.
  4. A document that shows who you are.
  5. Related or connected to the topic.
  6. Being a legal member of a country.
Down
  1. A form you fill out to ask for something officially.
  2. Done by choice, not required.
  3. To say something officially.
  4. A group of people with similar physical features or ancestry.
  5. out, To write all the needed information on a form.
  6. Allowed or qualified to do or receive something.
  7. Security card, An official card with a number used by the U.S. government to track your earnings and benefits.
  8. country, A country that is not your home country.
  9. To not do something or leave it out.
  10. guardian: A person with the legal right to care for another person.

16 Clues: To say something officially.Done by choice, not required.To finish all parts of something.A document that shows who you are.Related or connected to the topic.Being a legal member of a country.To not do something or leave it out.Allowed or qualified to do or receive something.country, A country that is not your home country....

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. whats the robot thing in doctor who called?
  2. its rain clouds as an emotion
  3. like someone poking you repeatedly
  4. eminiem song
Down
  1. its not nice
  2. part of a yanderes job
  3. spooky mask bois

7 Clues: its not niceeminiem songspooky mask boispart of a yanderes jobits rain clouds as an emotionlike someone poking you repeatedlywhats the robot thing in doctor who called?

9Health Crossword Bullying 2024-09-15

9Health Crossword Bullying crossword puzzle
Across
  1. Do not
  2. What should you not do back?
  3. When someone doesn't include you
  4. Bullying someone can ruin someone self
  5. Spreading lies about people
  6. Bullying Online
  7. Someone who stands up for others
  8. Bullying someone by their skin colour
  9. Bullying someone because of their mental and physical condition
Down
  1. Age group that gets bullied the most
  2. Using private information to get something from someone
  3. A place where most bullying takes place at
  4. Using Words
  5. People go here to feel better
  6. Someone who just watches people being bullied
  7. making others do stuff they don't want to do
  8. When your getting bullied tell a trusted
  9. Bullying that ruins someones reputation
  10. what is the person being bullied called
  11. What is the person bullying called

20 Clues: Do notUsing WordsBullying OnlineSpreading lies about peopleWhat should you not do back?People go here to feel betterWhen someone doesn't include youSomeone who stands up for othersWhat is the person bullying calledAge group that gets bullied the mostBullying someone by their skin colourBullying someone can ruin someone self...

end of 2019 2019-12-30

end of 2019 crossword puzzle
Across
  1. salah satu jenis kopi
  2. merk kalkulator di toko
  3. pahlawan di uang Rp2000 "M.husni hoesni ....."
  4. salah satu marketplace di Indonesia
  5. salah satu merk air mineral (tanpa spasi)
  6. salah satu kecamatan di jakarta pusat
  7. jumlah kursi plastik biru di toko
  8. kepanjangan T dihuruf T di ITC mangga dua
  9. kurir dengan tagline "Ketika semua jadi mudah"
  10. warna tulisan security di meja security lantai 5
Down
  1. menteri pendidikan 2020 (..... Makarim)
  2. garansi memory V-gen
  3. merk sepatu
  4. kota ( bukan negara) asal UGREEN
  5. Kota ( bukan negara )asal Akitio
  6. warna background logo Logitech Pelangi komputer
  7. nama salah satu mantan kurir Rajakom (kecil hitam)
  8. nama toko computer di samping semar
  9. merk monitor tv di lift
  10. salah satu merk laptop

20 Clues: merk sepatugaransi memory V-gensalah satu jenis kopisalah satu merk laptopmerk kalkulator di tokomerk monitor tv di liftkota ( bukan negara) asal UGREENKota ( bukan negara )asal Akitiojumlah kursi plastik biru di tokosalah satu marketplace di Indonesianama toko computer di samping semarsalah satu kecamatan di jakarta pusat...

Curricula Crossword 2022-03-18

Curricula Crossword crossword puzzle
Across
  1. what its called to surf the net
  2. service organization's controls
  3. pay this software to get your info back
  4. telecommunication message from phone
  5. a dishonest scheme; a fraud.
  6. telecommunication message from computer
  7. is able to subvert computer security.
  8. freedom from unauthorized intrusion
  9. Scammers want you to buys these for them
  10. a hacker's best friend
  11. hackers hide in me, and you love me
Down
  1. software intended to damage a computer
  2. share all your fav things with me
  3. double your safety using this
  4. following someone else into a building
  5. Deedee's toy and sidekick
  6. pink dress and an amazing hacker
  7. ethical principle of holding information
  8. the stronger the better
  9. I work security in Curriculaville

20 Clues: a hacker's best friendthe stronger the betterDeedee's toy and sidekicka dishonest scheme; a fraud.double your safety using thiswhat its called to surf the netservice organization's controlspink dress and an amazing hackershare all your fav things with meI work security in Curriculavillefreedom from unauthorized intrusion...

REDEMPTION CW 2023-07-27

REDEMPTION CW crossword puzzle
Across
  1. Evicted against vincent
  2. evicted first
  3. Evicted in the first 3-1 vote
  4. evicted in the triple eviction
  5. was the first COHOH of the season
  6. evicted in the triple eviction
Down
  1. An HOH competition Jenn won!
  2. Evicted in a triple eviction
  3. the goal of the entire season! You want to be this!
  4. the name of the host of the Longterm
  5. evicted in a triple eviction

11 Clues: evicted firstEvicted against vincentAn HOH competition Jenn won!Evicted in a triple evictionevicted in a triple evictionEvicted in the first 3-1 voteevicted in the triple evictionevicted in the triple evictionwas the first COHOH of the seasonthe name of the host of the Longtermthe goal of the entire season! You want to be this!

Cyber Awareness Puzzle 2022-10-13

Cyber Awareness Puzzle crossword puzzle
Across
  1. When raw data is put into context and has meaning, the data transforms into ...
  2. A type of malware that records every single press of the keyboard that you make.
  3. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
  4. The IT ... 2000 is the law used to prosecute cybercrime in India
  5. link designed to steal personal information.
  6. Settings on folders or files that control who is allowed to access them.
Down
  1. I am not a robot.
  2. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
  3. Gaining unauthorised access to or control of a computer system.
  4. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  5. Malicious code intended to monitor your activity without your permission.
  6. An email that contains a message with a
  7. A malicious code typically disguised as a legitimate program.

13 Clues: I am not a robot.An email that contains a message with alink designed to steal personal information.A malicious code typically disguised as a legitimate program.Gaining unauthorised access to or control of a computer system.The IT ... 2000 is the law used to prosecute cybercrime in India...

Лудкечпи 2020-03-10

Лудкечпи crossword puzzle
Across
  1. нарушитель защиты
  2. лэптоп
  3. осведомленность
  4. запутанный
  5. злоупотребление
  6. надёжность
  7. безопасность
  8. целостность данных
Down
  1. результат, проблема
  2. масса,куча
  3. доступность
  4. код,шифр
  5. цель
  6. финансовые средства
  7. последствие
  8. добиваться
  9. средства, имущество
  10. страшный
  11. опора
  12. быстрый

20 Clues: цельопоралэптопбыстрыйкод,шифрстрашныймасса,кучадобиватьсязапутанныйнадёжностьдоступностьпоследствиебезопасностьосведомленностьзлоупотреблениенарушитель защитыцелостность данныхрезультат, проблемафинансовые средствасредства, имущество

german vocab 2023-02-22

german vocab crossword puzzle
Across
  1. name
  2. pillow
  3. hail
  4. treasure
  5. school
  6. press
  7. beer
  8. victory
  9. recovery
  10. courage
  11. to drive
  12. stove
  13. grandmother
Down
  1. to waste or squander
  2. to recommend
  3. security
  4. marriage license bureau
  5. negotiation
  6. garden
  7. movie

20 Clues: namehailbeerpressstovemoviepillowschoolgardenvictorycouragesecuritytreasurerecoveryto drivenegotiationgrandmotherto recommendto waste or squandermarriage license bureau

Ch 10 crossword 2024-02-23

Ch 10 crossword crossword puzzle
Across
  1. window
  2. delay
  3. security checkpoint
  4. takeoff
  5. aisle
  6. flight number
  7. passenger
  8. trunk
  9. runway
  10. compartment
  11. ID
Down
  1. aboard
  2. depart time
  3. late
  4. passport
  5. on time
  6. going
  7. automatic
  8. to board
  9. to land

20 Clues: IDlatedelayaislegoingtrunkaboardwindowrunwaytakeoffon timeto landpassportto boardpassengerautomaticdepart timecompartmentflight numbersecurity checkpoint

Chromebook Crossword 2023-05-29

Chromebook Crossword crossword puzzle
Across
  1. storage
  2. apps
  3. on paper
  4. pointer
  5. cover
  6. connection
  7. simple
  8. safety
  9. working
  10. privacy
  11. fast
  12. powerpoint
  13. word
Down
  1. internet
  2. operating system
  3. browser
  4. protection
  5. gaming
  6. maximum boot up seconds
  7. gamepass
  8. excel

21 Clues: appsfastwordcoverexcelgamingsimplesafetystoragebrowserpointerworkingprivacyinterneton papergamepassprotectionconnectionpowerpointoperating systemmaximum boot up seconds

En el aeropuerto 2023-10-02

En el aeropuerto crossword puzzle
Across
  1. screen
  2. suitcase
  3. flight
  4. hand luggage
  5. tourist information
  6. currency exchange
  7. passenger
Down
  1. baggage claim
  2. check-in
  3. departures
  4. passport
  5. security
  6. arrivals
  7. country
  8. boarding pass
  9. city
  10. gate
  11. elevator
  12. car hire
  13. airplane

20 Clues: citygatescreenflightcountrycheck-inpassportsecurityarrivalssuitcaseelevatorcar hireairplanepassengerdepartureshand luggagebaggage claimboarding passcurrency exchangetourist information

Intro to Cybersecurity Vocabulary 2025-10-14

Intro to Cybersecurity Vocabulary crossword puzzle
Across
  1. set of security controls designed to protect payment account security such as credit or debit card transactions
  2. protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
  3. crime committed over the internet
  4. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  5. set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
  6. occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
  1. set of best practice recommendations for information security management
  2. unique skills for a specific area
  3. attempt to steal, damage or destroy information on a device or computer system
  4. individual who participates in hacking
  5. abilities needed to communicate and work with others
  6. prevents a user from accessing a system
  7. act of skirting or breaking through security boundaries

13 Clues: unique skills for a specific areacrime committed over the internetindividual who participates in hackingprevents a user from accessing a systemabilities needed to communicate and work with othersact of skirting or breaking through security boundariesset of best practice recommendations for information security management...

Security 2013-04-02

Security crossword puzzle
Across
  1. / a financial arrangement used to protect individuals or business against financial loss.
  2. / consists of actions taken to prevent crime and to protects the safety of people and property.
  3. / a safe deposit box that is usually kept in a large locked room.
  4. / the process of closely observing what is going on in an area.
Down
  1. / pays for losses due to crimes such as theft, arson, forgery, and embezzlement.
  2. / is knowing where all hotel keys are located at all times and knowing who has each key

6 Clues: / the process of closely observing what is going on in an area./ pays for losses due to crimes such as theft, arson, forgery, and embezzlement./ a safe deposit box that is usually kept in a large locked room./ is knowing where all hotel keys are located at all times and knowing who has each key...

security 2014-02-27

security crossword puzzle
Across
  1. look into the camera
  2. voice pattern
  3. method to identify people
  4. place hand on scanner
  5. type of physiological characteristic
Down
  1. no identity number needed

6 Clues: voice patternlook into the cameraplace hand on scannerno identity number neededmethod to identify peopletype of physiological characteristic

security 2021-08-18

security crossword puzzle
Across
  1. I am testin gthis out
  2. a color I like
  3. director cybersecurity
Down
  1. a way to protect data
  2. a way to look at the sun
  3. a way to protect users

6 Clues: a color I likea way to protect dataI am testin gthis outa way to protect usersdirector cybersecuritya way to look at the sun

security 2023-02-08

security crossword puzzle
Across
  1. a computer problem
  2. Likes to chase mice
  3. Flying mammal
Down
  1. Has a trunk
  2. Man's best friend
  3. Large marsupial

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best frienda computer problemLikes to chase mice

Module 8 Crossword 2024-03-02

Module 8 Crossword crossword puzzle
Across
  1. is still a problem in many state and federal prisons, despite new prison construction and decline in use of imprisonment
  2. ________ security Inmates have more freedom to associate with each other
  3. The number of inmates a prison can effectively accommodate, based on management considerations
  4. The size of the correctional population an institution can effectively hold
Down
  1. Most people sentenced to federal prison were convicted of ______ law violations
  2. Most people sentenced to state prisons were convicted of ________ crimes
  3. The number of inmates a prison can handle, according to experts (yields highest capacities)
  4. The number of inmates a prison originally built to hold
  5. _______ security holds Death-row inmates all maximum-security prisoners
  6. _______ security Inmates generally housed in dormitory-like settings

10 Clues: The number of inmates a prison originally built to hold_______ security Inmates generally housed in dormitory-like settings_______ security holds Death-row inmates all maximum-security prisonersMost people sentenced to state prisons were convicted of ________ crimes________ security Inmates have more freedom to associate with each other...

business/UAE/school 2021-02-04

business/UAE/school crossword puzzle
Across
  1. cities
  2. supplies
  3. gathering
  4. children
  5. retail
  6. bill
  7. guidance
  8. management
Down
  1. food
  2. playtime
  3. aid
  4. money
  5. consumer
  6. development
  7. security
  8. learning

16 Clues: aidfoodbillmoneycitiesretailplaytimesuppliesconsumerchildrensecuritylearningguidancegatheringmanagementdevelopment

Sustainability 2019-05-02

Sustainability crossword puzzle
Across
  1. beings
  2. Science
  3. Made
  4. test
  5. protection
  6. Goal
  7. World
  8. Agreement
  9. Security
Down
  1. Distructure
  2. environmental
  3. Chranabled
  4. Change
  5. Seeds
  6. Mammal
  7. Write

16 Clues: MadetestGoalSeedsWriteWorldbeingsChangeMammalScienceSecurityAgreementChranabledprotectionDistructureenvironmental

Viajes 2014-11-13

Viajes crossword puzzle
Across
  1. clothes
  2. station
  3. bathingsuit
  4. vacation
  5. line
  6. passport
  7. ticket
Down
  1. departure
  2. security
  3. suitcase
  4. trip
  5. totravel
  6. airport
  7. luggage
  8. flight
  9. gate

16 Clues: triplinegateflightticketclothesstationairportluggagesecuritysuitcasetotravelvacationpassportdeparturebathingsuit

SSHE 2023-11-16

SSHE crossword puzzle
Across
  1. sdkjfalskdjfalsdkjf
  2. alsdkjfalkdjf
  3. kasdjfalskdjflaks
  4. kasjdflkasjfl
  5. sadkjfalklsdjfa
  6. askdjfalklsjdfladsk
  7. askdjfaskdjf
  8. dkjflsadkjf
Down
  1. askdjfalkdjfals
  2. sdkjfalskjf
  3. sasdfalsdf
  4. asdkjfaksdjf
  5. adflkajsdlkfj
  6. kdjfalskdjfalsk
  7. asdkjflaskdjf
  8. sdkjfalskf

16 Clues: sasdfalsdfsdkjfalskfsdkjfalskjfdkjflsadkjfasdkjfaksdjfaskdjfaskdjfadflkajsdlkfjalsdkjfalkdjfasdkjflaskdjfkasjdflkasjflaskdjfalkdjfalskdjfalskdjfalsksadkjfalklsdjfakasdjfalskdjflakssdkjfalskdjfalsdkjfaskdjfalklsjdfladsk

Gun control vocabs 2024-11-14

Gun control vocabs crossword puzzle
Across
  1. weapon
  2. topic
  3. poll
  4. firearms
  5. beagainst
  6. safety
  7. debatable
  8. remainder
  9. groupofinterests
Down
  1. reachagoal
  2. carryaweapon
  3. stop
  4. necessary
  5. owningaweapon
  6. reachable
  7. supporter

16 Clues: stoppolltopicweaponsafetyfirearmsnecessarybeagainstreachablesupporterdebatableremainderreachagoalcarryaweaponowningaweapongroupofinterests

Networking Concepts , Cyber Ethics 2025-06-15

Networking Concepts , Cyber Ethics crossword puzzle
Across
  1. Wide
  2. Privacy
  3. Access
  4. Manners
  5. Rules
  6. Connect
  7. Copying
Down
  1. Virus
  2. Internet
  3. Service
  4. Security
  5. Adress
  6. Device
  7. Stealing
  8. Harassment
  9. Local

16 Clues: WideVirusRulesLocalAccessAdressDevicePrivacyServiceMannersConnectCopyingInternetSecurityStealingHarassment

Security Controls 2022-05-30

Security Controls crossword puzzle
Across
  1. A control acts to eliminate or reduce the impact of an intrusion event
  2. a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  3. A control that acts to eliminate or reduce the likelihood that an attack can succeed
  4. The security controls that provide oversight of the information system.
Down
  1. A type of security control that discourages intrusion attempts
  2. A control may not prevent or deter access, but it will identify and record any attempted or successful intrusion
  3. A type of security control that acts against in-person intrusion attempts
  4. Security controls focused on the things done by people.
  5. The hardware and software components that protect a system against cyberattacks.

9 Clues: Security controls focused on the things done by people.A type of security control that discourages intrusion attemptsA control acts to eliminate or reduce the impact of an intrusion eventThe security controls that provide oversight of the information system.A type of security control that acts against in-person intrusion attempts...

Unit 15-16 2023-03-13

Unit 15-16 crossword puzzle
Across
  1. turvalisus
  2. deklareerima
  3. lomp
  4. tegelik
  5. aksessuaar
  6. rabav
  7. padi
Down
  1. sadam
  2. karistus
  3. trahv
  4. vahekäik
  5. kellegi kallal norima
  6. kandik
  7. pardapääse
  8. tankla
  9. kirurg
  10. toll

17 Clues: lomptollpadisadamtrahvrabavkandiktanklakirurgtegelikkaristusvahekäikturvalisuspardapääseaksessuaardeklareerimakellegi kallal norima

MIKOŁAJ'S CROSSWORD 2018-11-14

MIKOŁAJ'S CROSSWORD crossword puzzle
Across
  1. BŁĄD
  2. KOMÓRKA
  3. PRODUKOWAĆ
  4. ROBOTYKA
  5. ŚRODOWISKO
  6. POŁĄCZYĆ
  7. ZAPROJEKTOWAĆ
  8. USTAWIENIA
  9. GALAKTYKA
Down
  1. BADANIA
  2. EKOLOGIA
  3. WTYCZKA
  4. WYNALAZEK
  5. DANE
  6. BEZPIECZEŃSTWO
  7. DATA WYSŁAĆ DANE
  8. WPROWADZIĆ

17 Clues: BŁĄDDANEBADANIAKOMÓRKAWTYCZKAEKOLOGIAROBOTYKAPOŁĄCZYĆWYNALAZEKGALAKTYKAPRODUKOWAĆWPROWADZIĆŚRODOWISKOUSTAWIENIAZAPROJEKTOWAĆBEZPIECZEŃSTWODATA WYSŁAĆ DANE

wilko 2015-02-17

wilko crossword puzzle
Across
  1. how old Tom is on his big birthday
  2. toms pastime at break
  3. what Tom carries on shop floor
  4. security device used in store
  5. toms car
  6. toms old force
  7. toms boss
  8. toms version of 50 shades
  9. toms wife
  10. toms favourite wind up merchant
  11. picture of suspect
Down
  1. date of toms birthday
  2. what Tom does to shoplifters
  3. what's in toms black folders
  4. toms old car
  5. toms former job
  6. what Tom calls a shoplifters
  7. guard toms job
  8. recorded evidence
  9. toms Mon morning job
  10. toms home town
  11. month of toms birthday
  12. what Tom does in the warehouse
  13. toms old boss
  14. toms son
  15. toms daughter
  16. toms favourite word

27 Clues: toms cartoms sontoms bosstoms wifetoms old cartoms old bosstoms daughterguard toms jobtoms home towntoms old forcetoms former jobrecorded evidencepicture of suspecttoms favourite wordtoms Mon morning jobdate of toms birthdaytoms pastime at breakmonth of toms birthdaytoms version of 50 shadeswhat Tom does to shoplifterswhat's in toms black folders...

Tema 2 2021-10-07

Tema 2 crossword puzzle
Across
  1. displaced
  2. worldpopulation
  3. totackle,toboard
  4. countriesoftheworld
  5. citizenship/thecitizens
  6. totry,attempt
  7. towork,haveajob
  8. flow
  9. (in)security;(lackof)security
  10. approach,pointofview,focus
  11. famoso,famous
  12. movement,motion
  13. toattain/tobeableto
  14. immigrants-lapersonaquesaledesulugardeorigenparallegaraundestinodiferente
  15. laadministracion,management
  16. willexist
  17. restart
  18. analyze,examine
  19. foreigner,alien
  20. worldwide
  21. AfricanStudiesGroup
  22. immigrationaccionyefectodeinmigar
Down
  1. immigrantswithinone'sowncountry
  2. tolink,toconnect
  3. federation
  4. toemigrate(leaveacountry)
  5. ignorance,lackofawareness
  6. population
  7. fromthesouth
  8. toexchange,totrade
  9. wewillhave(futuretenseoftener)
  10. legal
  11. knowledge,understanding
  12. Ibelievethat
  13. ignition,on
  14. totrackdown
  15. country,nation
  16. visa(traveldocument)
  17. tobrake,stop
  18. development,growth,progress
  19. reason
  20. totravel,journey
  21. continent,mainland
  22. terrorist(male)
  23. workingday; day'sjourney
  24. toreach,achieve
  25. toimmigrate(enteracountry)
  26. inside,in
  27. phenomenon

49 Clues: flowlegalreasonrestartdisplacedwillexistinside,inworldwidefederationpopulationphenomenonignition,ontotrackdownfromthesouthIbelievethattobrake,stoptotry,attemptfamoso,famouscountry,nationworldpopulationtowork,haveajobmovement,motionterrorist(male)toreach,achieveanalyze,examineforeigner,alientolink,toconnecttotackle,toboardtotravel,journey...

juuadvsuu8vu8jju8 news week 6 jndfsjdijd 2025-01-08

juuadvsuu8vu8jju8 news week 6 jndfsjdijd crossword puzzle
Across
  1. Water gets infested with oil after boat incident
  2. Wisconsion School Shooting
  3. what killed a Russian general
  4. on alert for snow and ice
  5. Canadian prime minister announces resignation
  6. D.C. boosts security after attack, how many did they add
  7. New launches new offensive in Russia
  8. Deadly winter storm sweeps across the country as millions face Arctic outbreak
  9. Attacked people on new years
  10. what happened on Dec17, 2024
  11. Congrestion takes effect in NYC
Down
  1. Got attacked by Ukraine
  2. Charging people for driving
  3. how many flights have been canceled or delayed
  4. Suspect traveled to new orleans
  5. Faced security warnings years before attack
  6. E-Bike incident
  7. Wrestled to the ground by cops
  8. Who died [39th president]
  9. On strike at mountain resort

20 Clues: E-Bike incidentGot attacked by Ukraineon alert for snow and iceWho died [39th president]Wisconsion School ShootingCharging people for drivingOn strike at mountain resortAttacked people on new yearswhat happened on Dec17, 2024what killed a Russian generalWrestled to the ground by copsSuspect traveled to new orleansCongrestion takes effect in NYC...

CPNI 2025-04-29

CPNI crossword puzzle
Across
  1. Unauthorized access or disclosure of CPNI.
  2. Security measure for account access.
  3. Ability to view or use data.
  4. Right to control personal information.
  5. Customer declines to share CPNI externally.
  6. Information collected about customers.
  7. Employee education on CPNI rules.
  8. Sharing information with others.
  9. Regulates telecom privacy, including CPNI rules.
  10. Confirming identity before disclosing CPNI.
  11. Action taken for non-compliance.
  12. Breach of CPNI rules or policies.
Down
  1. Measures to safeguard customer data.
  2. Customer permission to use or share CPNI.
  3. Protections for preventing data leaks.
  4. Rules for handling CPNI properly.
  5. Customer agrees to share CPNI with others.
  6. Customer service profile or record.
  7. Information kept private and protected.
  8. Customer data collected by telecoms about service usage.

20 Clues: Ability to view or use data.Sharing information with others.Action taken for non-compliance.Rules for handling CPNI properly.Employee education on CPNI rules.Breach of CPNI rules or policies.Customer service profile or record.Measures to safeguard customer data.Security measure for account access.Protections for preventing data leaks....

ai 2025-01-22

ai crossword puzzle
Across
  1. : Unfair favoritism in AI decisions.
  2. : Monitoring for security or control.
  3. : The natural world affected by AI.
  4. : Information used by AI.
  5. : The ability to act independently.
  6. : Something made by humans, not natural.
  7. : The ability of a machine to think like a human.
  8. : Introducing something new.
  9. : The science of designing robots.
  10. : Relying too much on something.
Down
  1. : Studying data to draw conclusions.
  2. : The process of acquiring knowledge or skills.
  3. : Identifying something or someone.
  4. : Keeping personal information safe.
  5. : A set of rules for solving a problem (AI-related).
  6. : Using imagination to create something new.
  7. : Completing tasks with minimal waste.
  8. : Protecting against threats or harm.
  9. : Using machines to perform tasks automatically.
  10. : The application of scientific knowledge.

20 Clues: : Information used by AI.: Introducing something new.: Relying too much on something.: The science of designing robots.: Identifying something or someone.: The natural world affected by AI.: The ability to act independently.: Unfair favoritism in AI decisions.: Studying data to draw conclusions.: Keeping personal information safe....

Gefahren im Internet 2022-04-25

Gefahren im Internet crossword puzzle
Across
  1. bist du ein...?
  2. wie nennt man beleidigungen auf digitaler ebene
Down
  1. was bedeutet hate massages auf deutsch?
  2. wo finde meistens cyber-mobbing statt?

4 Clues: bist du ein...?wo finde meistens cyber-mobbing statt?was bedeutet hate massages auf deutsch?wie nennt man beleidigungen auf digitaler ebene

Genius Grid - III 2025-02-19

Genius Grid - III crossword puzzle
Across
  1. Component of an air handling unit (AHU) responsible for filtering airborne particles
  2. The front line of defense in information security
  3. Honeywell deploy _____sensors for real-time data collection in smart cities.
  4. The Iconic site for our HBS, In this Arabian city, I'm named after a flower yet stand taller than all. What am I?
  5. Puts out fire with chemicals
  6. Danger or risk
  7. Recent acqusition portfolio of honeywell for security GBE
Down
  1. In the context of BMS, EMS stands for ______ management systems
  2. Device used to store current and also It acts as filter
  3. Freedom from danger
  4. VDGS Stands for Visual _____ Guidance System
  5. ______city in the USA has partnered with Honeywell to implement smart city technologies aimed at improving public safety and energy efficiency? This city gave birth to wotld's most famous soda drink.
  6. _________ Infrared Sensor (PIR)
  7. Heat, light, and flames produced by burning
  8. BEATS portfolio includes Niagara, Alerton P&S and _______ brands
  9. a digital security measure

16 Clues: Danger or riskFreedom from dangera digital security measurePuts out fire with chemicals_________ Infrared Sensor (PIR)Heat, light, and flames produced by burningVDGS Stands for Visual _____ Guidance SystemThe front line of defense in information securityDevice used to store current and also It acts as filter...

Key terms for Taxes 2024-12-02

Key terms for Taxes crossword puzzle
Across
  1. Deduction A flat amount subtracted from taxable income.
  2. Pay Compensation for hours worked over 40 in a week, calculated at 1.5 times the regular hourly rate.
  3. Gains Profit earned from selling investment assets.
  4. Contractor An individual working independently without employee benefits.
  5. Benefits Employment benefits required by law, such as Social Security and Medicare.
  6. Benefits Employer-provided perks like health insurance or retirement plans.
  7. Donations Tax-deductible contributions made to qualified nonprofits.
Down
  1. Security A federal program providing income for retirees and disabled individuals.
  2. Deductions Expenses that reduce taxable income when listed individually.
  3. A health insurance program for those aged 65 or older.
  4. Tax funding Social Security and Medicare programs.
  5. Gross Income (AGI) Income after allowable deductions, used to calculate taxes.
  6. Wage The lowest hourly wage allowed by law.
  7. Tax Taxes withheld from an employee’s paycheck for FICA and income tax.
  8. Brackets Income ranges taxed at progressively higher rates.
  9. Loss: Deductible property damage from federally declared disasters.

16 Clues: Wage The lowest hourly wage allowed by law.Tax funding Social Security and Medicare programs.Gains Profit earned from selling investment assets.A health insurance program for those aged 65 or older.Deduction A flat amount subtracted from taxable income.Brackets Income ranges taxed at progressively higher rates....

chapter 4 vocab 2017-02-21

chapter 4 vocab crossword puzzle
Across
  1. to pass through
  2. luggage
  3. to board
  4. to leave
  5. identification
  6. round tripticket
  7. monotor
  8. to travel
  9. suitcase
Down
  1. to take
  2. flight
  3. taxi
  4. passport
  5. departure
  6. gate
  7. security
  8. pilot
  9. itnerary
  10. arrival
  11. customs

20 Clues: taxigatepilotflightto takeluggagearrivalmonotorcustomspassportsecurityto boardto leaveitnerarysuitcasedepartureto travelidentificationto pass throughround tripticket

3a 2018-02-28

3a crossword puzzle
Across
  1. masszázs
  2. rémálom
  3. beszáll (repülőbe)
  4. kezelés
  5. nagykövet
  6. üzlet
  7. tucat
  8. golfpálya (4,6)
  9. létesítmény
  10. legalább (2,5)
  11. ingyenes
Down
  1. utas
  2. érzék
  3. városnézés
  4. benti
  5. paradicsom
  6. ülés
  7. békésen
  8. biztonság(i ellenőrzés)
  9. fogorvos
  10. szolgáltatás

21 Clues: utasülésérzékbentiüzlettucatrémálomkezelésbékésenmasszázsfogorvosingyenesnagykövetvárosnézésparadicsomlétesítményszolgáltatáslegalább (2,5)golfpálya (4,6)beszáll (repülőbe)biztonság(i ellenőrzés)

EnglishMaster? 2021-03-11

EnglishMaster? crossword puzzle
Across
  1. "auch gepostet"
  2. Langes Auto
  3. Lauffeuer
  4. "schneiden"
  5. Staffel
  6. Power
  7. Atmosphäre
  8. Mikro
  9. Klima
  10. Lagerfeuer
Down
  1. Very importen person
  2. sonnig
  3. Emotion
  4. Feuerwehrmann
  5. "Wache"
  6. klopfen
  7. programm
  8. gegenüber
  9. Heli
  10. neutral
  11. Flamme

21 Clues: HeliPowerMikroKlimasonnigFlammeEmotion"Wache"klopfenStaffelneutralprogrammLauffeuergegenüberAtmosphäreLagerfeuerLanges Auto"schneiden"Feuerwehrmann"auch gepostet"Very importen person

FOCUS ON IELTS/ UNIT 2 2014-02-10

FOCUS ON IELTS/ UNIT 2 crossword puzzle
Across
  1. increase
  2. intake
  3. suitable
  4. persistent
  5. copy
  6. harvest
  7. oppose
Down
  1. stress
  2. huge
  3. addiction
  4. attractive
  5. quickly
  6. security
  7. distribute
  8. energy
  9. research

16 Clues: hugecopystressintakeenergyopposequicklyharvestincreasesuitablesecurityresearchaddictionattractivepersistentdistribute

U11 - Mod 22 Key Terms 2024-11-25

U11 - Mod 22 Key Terms crossword puzzle
Across
  1. (6,6) policy, sets out how to remotely connect to an organization’s internal network and explains what information is remotely accessible.
  2. (8) policy, this document addresses the constraints and behaviors of individuals within an organization and often specifies how data can be accessed, and what data is accessible by whom.
  3. (10,3) policy, highlights a set of rules that determine access to and use of network resources.
  4. (5) resources security, this refers to the security procedures in place that relate to employees joining, moving within, and leaving an organization.
  5. (8,8) policy, provides guidance on how to report and respond to security-related incidents within an organization.
  6. (8) policy, defines minimum password requirements.
  7. (10) policy, enforces the rules for composing credentials.
Down
  1. (4,10) this is the first step in the risk management process, which determines the quantitative and qualitative value of risk related to a specific situation or threat.
  2. (14) and authentication policy, specifies who should be permitted access to network resources and what verification procedures are in place to facilitate this.
  3. (11,8) incident management, this describes an organization’s approach to the anticipation of and response to information security breaches.
  4. (4) policy, sets out measurable rules for processing data within an organization, such as specifying where data is stored, how data is classified, and how data is handled and disposed of.
  5. (5,10) this is an inventory of and classification scheme for information assets within an organization.
  6. (14) policy, provides guidance for how work should be carried out in an organization.
  7. (7) maintenance policy, outlines procedures for updating an organization’s specified operating systems and end-user applications.

14 Clues: (8) policy, defines minimum password requirements.(10) policy, enforces the rules for composing credentials.(14) policy, provides guidance for how work should be carried out in an organization.(10,3) policy, highlights a set of rules that determine access to and use of network resources....

The Secret Life of Locks 2025-05-19

The Secret Life of Locks crossword puzzle
Across
  1. To open a lock
  2. Used for digital or keypad locks
  3. Simple mechanism to hold doors closed
  4. Type of lock with numbered dial
  5. Device used to secure things
  6. Opens multiple locks
Down
  1. Purpose of a lock
  2. To open a lock without a key
  3. Strong lock on doors
  4. Additional layer of door security
  5. Heavy-duty part of a lock
  6. Portable type of lock
  7. Used to open a lock
  8. Box that uses a lock for valuables

14 Clues: To open a lockPurpose of a lockUsed to open a lockStrong lock on doorsOpens multiple locksPortable type of lockHeavy-duty part of a lockTo open a lock without a keyDevice used to secure thingsType of lock with numbered dialUsed for digital or keypad locksAdditional layer of door securityBox that uses a lock for valuables...

Total Defence Day 2023 - Digital Defence (P4-6) 2023-02-07

Total Defence Day 2023 - Digital Defence (P4-6) crossword puzzle
Across
  1. Cyber criminals will ask you for ______________ information like phone numbers, banking details and One-Time Passwords(OTPs).
  2. Scammers will ______________ your friends or Whatsapp support team to get your one-time code.
  3. Always practice good cyber ______________ to ensure your accounts are safe.
Down
  1. Malicious malware can cause the program to ______________.
  2. We can use ______________ as our passwords e.g. Saw Eagle At The Park.

5 Clues: Malicious malware can cause the program to ______________.We can use ______________ as our passwords e.g. Saw Eagle At The Park.Always practice good cyber ______________ to ensure your accounts are safe.Scammers will ______________ your friends or Whatsapp support team to get your one-time code....

Internet safety crossword 2023-03-06

Internet safety crossword crossword puzzle
Across
  1. It is important to _______ any incidences of cyber-bullying to an adult or someone you trust.
  2. It is also important to keep any __________ of cyber-bullying.
Down
  1. The internet is ________, which means that what you post online is difficult to remove.
  2. You should never post personal information on the internet, such as your ________ phone number.
  3. Other types of personal information include your _____ address.

5 Clues: It is also important to keep any __________ of cyber-bullying.Other types of personal information include your _____ address.The internet is ________, which means that what you post online is difficult to remove.It is important to _______ any incidences of cyber-bullying to an adult or someone you trust....

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  2. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  3. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  4. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  5. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  6. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  7. OF SERVICE (DOS)
  8. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
  9. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  10. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  11. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
Down
  1. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  2. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  4. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  7. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
  8. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  9. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  10. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  11. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.

22 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Vocabulario de artículo 2021-02-25

Vocabulario de artículo crossword puzzle
Across
  1. entertainment
  2. unemployment
  3. city
  4. clean
  5. theme park
  6. town
  7. dangerous
  8. narrow
  9. cameras
Down
  1. spaces
  2. pollution
  3. sports center
  4. far
  5. streets
  6. port
  7. security
  8. ugly

17 Clues: farcityporttownuglycleanspacesnarrowstreetscamerassecuritypollutiondangeroustheme parkunemploymententertainmentsports center

lentokenttäsanastoa 2021-11-19

lentokenttäsanastoa crossword puzzle
Across
  1. hihna
  2. lentokone
  3. saapua
  4. portti
  5. matkustaa
  6. turvallisuus
  7. terminaali
Down
  1. passi
  2. lähteä
  3. nousta kulkuneuvoon
  4. istumapaikka
  5. lento
  6. lentokenttä
  7. matkalaukku
  8. loma
  9. laukku
  10. lähtöselvitys

17 Clues: lomapassihihnalentolähteäsaapuaporttilaukkulentokonematkustaaterminaalilentokenttämatkalaukkuistumapaikkaturvallisuuslähtöselvitysnousta kulkuneuvoon

UNFPA SFPs 2021-05-10

UNFPA SFPs crossword puzzle
Across
  1. Security Risk Management Measures
  2. Global Directory
Down
  1. tool for reporting security incidents
  2. Security Communications Systems
  3. Portal used by personnel with sec.responsibilities
  4. Residential Security Measures
  5. UNDSS app for headcount and flash reports

7 Clues: Global DirectoryResidential Security MeasuresSecurity Communications SystemsSecurity Risk Management Measurestool for reporting security incidentsUNDSS app for headcount and flash reportsPortal used by personnel with sec.responsibilities

Mon 20 March DOGS 2023-03-20

Mon 20 March DOGS crossword puzzle
Across
  1. Creative groomers dream
  2. The best for cheaper vets bills
  3. Roman fine boned runner
  4. Mills needed these
  5. Teutonic sheep keepers
Down
  1. Good pullers in packs
  2. Security called they want their dog back
  3. See Security
  4. Dog with bad PR
  5. Will eat anything
  6. Long everywhere apart from legs

11 Clues: See SecurityDog with bad PRWill eat anythingMills needed theseGood pullers in packsTeutonic sheep keepersCreative groomers dreamRoman fine boned runnerLong everywhere apart from legsThe best for cheaper vets billsSecurity called they want their dog back

Hacker 2013-02-05

Hacker crossword puzzle
Across
  1. The art and science of cracking the phone network
  2. Products announced far in advance of any release.
  3. A malicious, security-breaking program that is disguised as something benign
Down
  1. Someone who accesses a computer system by circumventing its security system
  2. Code with a complex and tangled control structure
  3. A person whoknows how a complex piece of software or hardware works
  4. Individual hired to break into places in order to test their security
  5. A hole deliberately left in place by designers or maintainers
  6. One who breaks security on a system

9 Clues: One who breaks security on a systemCode with a complex and tangled control structureThe art and science of cracking the phone networkProducts announced far in advance of any release.A hole deliberately left in place by designers or maintainersA person whoknows how a complex piece of software or hardware works...

Security 2024-11-21

Security crossword puzzle
Across
  1. Large marsupial
  2. who is test user
  3. Flying mammal
Down
  1. Has a trunk
  2. Man's best friend
  3. Likes to chase mice

6 Clues: Has a trunkFlying mammalLarge marsupialwho is test userMan's best friendLikes to chase mice

boilermaking mehdi 2023-04-03

boilermaking mehdi crossword puzzle
Across
  1. security for foot
  2. we can cut metal sheet
  3. with this we can hit nails
  4. with this we can stick 2 metal parts
  5. is fer + carbon
Down
  1. security for hands
  2. security for head
  3. with this we can screw

8 Clues: is fer + carbonsecurity for headsecurity for footsecurity for handswith this we can screwwe can cut metal sheetwith this we can hit nailswith this we can stick 2 metal parts

tesdtfuf 2023-01-04

tesdtfuf crossword puzzle
Across
  1. trustworthy
  2. security
  3. reliable
Down
  1. transport
  2. loyalty
  3. competence
  4. service
  5. friendly

8 Clues: loyaltyservicefriendlysecurityreliabletransportcompetencetrustworthy

CH2 Vocab 3H 2021-11-19

CH2 Vocab 3H crossword puzzle
Across
  1. kapen
  2. verdeling, distributie
  3. gejaagd, hectisch
  4. rechtzaak
  5. rijkdom
  6. verbeteren
  7. busje
  8. krantenkop
  9. buitenwijk
Down
  1. investering, belegging
  2. beveiliging
  3. ontrafelen
  4. voertuig
  5. aankunnen
  6. misdeeld, verstoken
  7. ontwikkelen
  8. volgen, opsporen
  9. custody in hechtenis
  10. terugkrijgen

19 Clues: kapenbusjerijkdomvoertuigaankunnenrechtzaakontrafelenverbeterenkrantenkopbuitenwijkbeveiligingontwikkelenterugkrijgenvolgen, opsporengejaagd, hectischmisdeeld, verstokencustody in hechtenisinvestering, beleggingverdeling, distributie

Focus unit 1 2023-11-14

Focus unit 1 crossword puzzle
Across
  1. - אי
  2. - לא רגיל
  3. - פריט
  4. - בטוח
  5. - להעמיד פנים
  6. - מתנה
  7. - בית מלון
  8. - מטוס
  9. guard - מאבטח
Down
  1. - לדחוף
  2. sale - במבצע
  3. - שדי תעופה
  4. - במשך
  5. - דרכון
  6. - דעה
  7. - עיתון
  8. - ריצפה, קומה
  9. - עגלה
  10. - סיבה

19 Clues: - אי- דעה- במשך- פריט- בטוח- מתנה- עגלה- מטוס- סיבה- לדחוף- דרכון- עיתון- לא רגיל- בית מלון- שדי תעופהsale - במבצע- להעמיד פנים- ריצפה, קומהguard - מאבטח

TJ PF Tax Unit Vocab (2026) 2026-03-17

TJ PF Tax Unit Vocab (2026) crossword puzzle
Across
  1. dues paid for membership in our society, used to fund things like road maintenance, government programs, and national defense
  2. a type of deduction that anyone can claim for $15,750
  3. employers use the W-4 to determine how much to remove from your paycheck for taxes
  4. the president who is responsible for enacting the Social Security Act in 1935
  5. type of mandatory tax used to secure income for workers who qualify for retirement (2 words)
  6. term used to describe a retired person choosing to collect social security after the age of 70 (2 words)
  7. a range of income tax dollars that have different percentages used to calculate federal and state taxes (2 words)
  8. the lowest dollar amount that an employer is allowed to pay an employee (2 words)
  9. the amount that you get back from the government after paying too much in taxes
  10. the federal agency that receives your 1040 forms (acronym)
  11. an employee earns these each time that they earn $1810 in income during 3 consecutive months within one calendar year
  12. this money is removed from gross pay so that a smaller amount of income is taxable
Down
  1. investment earnings reported on form 1099 and listed on line 7a of the 1040 (2 words)
  2. this form is used to prove and verify ____________________
  3. term used to describe a retired person choosing to collect social security payments at the age of 67 (2 words)
  4. hours worked beyond 40 hours in one week
  5. the total earnings for an employee before any deductions or withholdings
  6. the amount of income that is used to calculate an employee’s federal, state and FICA taxes
  7. a type of tax structure that requires someone with higher income to pay a higher rate of tax for a portion of income
  8. the amount of taxable income remaining after voluntary deductions (3 words)
  9. a type of tax applied to taxable earnings
  10. amount on your paycheck stub that is referred to as "take-home" pay; the actual amount that you can spend
  11. term used to describe a retired person choosing to collect social security between the ages of 62 and 66 (2 words)
  12. type of mandatory tax used to secure funds for individuals over 65 to cover healthcare expenses
  13. this acronym is used on your paycheck stub to represent social security and medicare taxes

25 Clues: hours worked beyond 40 hours in one weeka type of tax applied to taxable earningsa type of deduction that anyone can claim for $15,750this form is used to prove and verify ____________________the federal agency that receives your 1040 forms (acronym)the total earnings for an employee before any deductions or withholdings...

Bully 2021-06-25

Bully crossword puzzle
Across
  1. a person that does something bad over and over
  2. a feeling that is tied to the colour blue
  3. a feeling that also is tied to the colour red
  4. a bad thing people do
  5. a mind thing
Down
  1. a short term for technology
  2. not good
  3. when they punch or push you
  4. a feeling that also is tied to the colour blue
  5. worry
  6. a feeling that is tied to the colour red

11 Clues: worrynot gooda mind thinga bad thing people doa short term for technologywhen they punch or push youa feeling that is tied to the colour reda feeling that is tied to the colour bluea feeling that also is tied to the colour reda person that does something bad over and overa feeling that also is tied to the colour blue

ΚΟΙΝΩΝΙΚΑ ΔΙΚΤΥΑ 2023-04-26

ΚΟΙΝΩΝΙΚΑ ΔΙΚΤΥΑ crossword puzzle
Across
  1. Πιο είναι το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης.
  2. Τείχος προστασίας.
  3. Κακόβουλο πρόγραμμα.
  4. Όταν κάποιος υποδύεται μία αξιόπιστη οντότητα ώστε να αποστήση τα προσωπικά του δεδομένα.
  5. Περιέχει προσωπικές μας πληροφορίες.
  6. ανεπιθύμητα μηνύματα.
Down
  1. Κακόβουλη χρήστες που στοχοποιούν και παρενοχλούν άλλους.(2 λέξεις)
  2. Συμπεριφορά που χαρακτηρίζεται απο εξάρτηση σε μια συγκεκριμένη δραστηριότητα.
  3. Δυνατότητα κοινωνικής συναναστροφής με άλλα άτομα.
  4. Βλαβερό πρόγραμμα που ανπαράγεται δημιούργοντας αντίγραφα του εαυτού του.
  5. Λογισμικό προστασίας από ιούς.

11 Clues: Τείχος προστασίας.Κακόβουλο πρόγραμμα.ανεπιθύμητα μηνύματα.Λογισμικό προστασίας από ιούς.Περιέχει προσωπικές μας πληροφορίες.Δυνατότητα κοινωνικής συναναστροφής με άλλα άτομα.Πιο είναι το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης.Κακόβουλη χρήστες που στοχοποιούν και παρενοχλούν άλλους.(2 λέξεις)...

Cyber Extortion crossword 2024-04-08

Cyber Extortion crossword crossword puzzle
Across
  1. ______ extortion is extortion of money online.
  2. Demand for payment in exchange for stolen data.
  3. Abbreviation of Distribution Denial of Service.
  4. _________ of service.
  5. Distribution Denial of Service DDoS affects.
  6. Opposite of encryption.
Down
  1. A threat to release sexually images, videos unless a ransom is paid.
  2. A method used by extortionists to convey demands.
  3. A victim maybe _____ out of basic computer functions.
  4. Extortionists use this to encrypting files or lock systems.
  5. You should never ______ ransom.

11 Clues: _________ of service.Opposite of encryption.You should never ______ ransom.Distribution Denial of Service DDoS affects.______ extortion is extortion of money online.Demand for payment in exchange for stolen data.Abbreviation of Distribution Denial of Service.A method used by extortionists to convey demands....

The Bois Minecraft server 2023-05-01

The Bois Minecraft server crossword puzzle
Across
  1. the max amount of data
  2. online security safety
  3. A group of people all connected to one what?
  4. studies properties of spaces
  5. LAN
  6. big boss of internet
Down
  1. security regulations
  2. a person or organization using the services of a lawyer or other professional person or company.
  3. one group server access
  4. a very safe way to stop viruses
  5. your online adress
  6. Thing you put USB into
  7. Interconnected devices

13 Clues: LANyour online adresssecurity regulationsbig boss of internetthe max amount of dataonline security safetyThing you put USB intoInterconnected devicesone group server accessstudies properties of spacesa very safe way to stop virusesA group of people all connected to one what?...

IT 120 - Lesson 7 Configuring SOHO Network Security 2024-10-22

IT 120 - Lesson 7 Configuring SOHO Network Security crossword puzzle
Across
  1. phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it
  2. biometric camera-based scanner that uses unique features of a palm shown by visible and infrared light
  3. technique of discovering things about an organization or person based on what they throw away
  4. information is accessible to those authorized to view or modify it
  5. mechanism to configure access through a firewall for application that require more than one port
  6. attack technique where the threat actor disguises their identity or impersonates another user or resource
  7. AAA protocol used to manage remote and wireless authentication infrastructures
  8. security entry system with two gateways, only one of which is open at any one time
  9. type of port forwarding where the external port is forwarded to a different internal port on the LAN
  10. home router implementation of DMZ where all ports with no existing forwarding rules are opened and directed to a single LAN host
  11. person or entity responsible for an event that has been identified as a security incident or as a risk
  12. social engineering attack where an attacker pretends to be someone they are not
  13. password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords
  14. system whose configuration is different from its secure baseline
  15. wireless access point that deceives users into believing that it is a legitimate network access point
  16. vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability
  17. weakness that could be triggered accidentally or exploited intentionally to cause a security breach
  18. security framework and tools that facilitate the use of personally-owned devices to access corporate networks and data
  19. physical intrusion detection and warning that can use circuit, motion, proximity, and duress triggers
  20. any type of physical, application, or network attack that affects the availability of a managed resource
  21. symmetric 128-, 192, or 256-bit block cipher used for bulk encryption in modern security standards
  22. tactic to obtain someone's password or PIN by observing him or her as it is typed in
  23. specific method by which malware code infects a target host, often via some vulnerability in a software process
  24. protocol framework allowing network devices to autoconfigure services
  25. authentication mechanism that allows a user to present a smartcard to operate an entry system
  26. allowing a threat actor to enter a site or controlled location without authorization
  27. security measure used to identify and block suspicious, malicious and/or inappropriate content in accordance with an organization's policies
  28. an attack that uses multiple compromised hosts to overwhelm a service with request or response traffic
  29. activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines
  30. physical security control that uses cameras and recording devices to visually monitor the activity in a certain area
Down
  1. threat actor who is assigned privileges on the system that cause an intentional or unintentional incident
  2. email based attack, in which the attacker sends email from a supposedly reputable source to try to elicit private information from the victim
  3. malicious script hosted on an attacker's site or coded in a link injected onto a trusted site designed to compromise client browsing the trusted site, circumventing the browser's security model of trusted zones
  4. security barrier designed to prevent unauthorized access to a site perimeter
  5. protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  6. data is stored and transferred as intended and any modification is authorized
  7. one or more required security controls is missing or misconfigured on a system
  8. attack where the threat actor makes an independent connection between two victims and is able to read and possible modify traffic
  9. sturdy vertical post installed to control road traffic or designed to prevent ram-raiding and vehicle-ramming attacks
  10. form of phishing which targets specific individuals
  11. cipher that uses mathematically linked public and private keys
  12. function that converts an arbitrary length string input to a fixed length string output
  13. software instructions embedded on a hardware device
  14. technique to gain access to a building by following someone who is unaware of their presence
  15. hand-held or walkthrough metal detector designed to detect concealed weapons
  16. password attack that compares encrypted passwords against a predetermined list of possible password values
  17. likelihood and impact of a threat actor exercising a vulnerability
  18. standards for authenticating and encrypting access to Wi-Fi networks
  19. process in which a router takes requests from the Internet for a particular application and sends them to a designated host on the LAN
  20. two way encryption scheme in which encryption and decryption are both performed by the same key
  21. physical security mechanisms that ensure a site is sufficiently illuminated for employees and guests to feel safe and for camera-based surveillance systems to work well
  22. attack that injects a database query into the input data directed at a server by accessing the client side of the application
  23. character string that identifies a particular wireless LAN
  24. message digest encrypted using a sender's private key that is appended to a message to authenticate the sender and prove message integrity
  25. biometric scanner based on analysis of the unique pattern of blood vessels at the back of the eye
  26. framework for negotiating authentication methods that enables systems to use hardware-based identifiers for authentication and establish secure tunnels through which to submit credentials
  27. threat actor extracts information while speaking over the phone or VoIP service
  28. any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm
  29. certain information should only be known to certain people
  30. form of phishing which targets senior executives or wealthy individuals
  31. group of hosts or devices that have been infected by a control program called a bot that enables attacks to exploit the hosts to mount attacks
  32. physical security device that restricts access to ports and internal components to key holders
  33. segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports
  34. single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system
  35. personal authentication mechanism for Wi-Fi networks introduced with WPA3

65 Clues: form of phishing which targets specific individualssoftware instructions embedded on a hardware devicecharacter string that identifies a particular wireless LANcertain information should only be known to certain peoplecipher that uses mathematically linked public and private keyssystem whose configuration is different from its secure baseline...

chapter 2 2022-11-21

chapter 2 crossword puzzle
Across
  1. is a type of EFT transaction; money is deposited directly into a customer's checking acc.
  2. allow customers to pay for purchases and withdraw cash.
  3. those people who do the work
  4. are issued after the sale of stocks.
  5. is a financial institution that is involved in trading securities in financial markets.
  6. for sophisticated investors who borrow money to purchase securities.
  7. is a financial institution that does not accept deposits.
  8. is a financial investment issued by a corporation, government, or other organization.
  9. is a document guaranteeing payment of a specific amount of money.
  10. percent dividend of the stock as a percentage of stock price
  11. is a bank account used by depositors to accumulate money for future use.
  12. are largest category of deposits institutions.
  13. stock holders buy and sell shares of stock from one another with the help of brokers.
  14. selling stocks and bonds directly to public investors
Down
  1. is a financial institution that accepts money from costumers and deposits it into the customers account.
  2. is a security that pay interest over terms of ten to thirty years.
  3. need to pay for security purchases within three business days of order.
  4. are for profit businesses that sell insurance produts.
  5. is a document guaranteeing that a buyer will pay the seller the agreed upon. amount and within the time specified.
  6. is a security that pays interest over terms ranging from two to ten years.
  7. is a financial institution that offers and loan services.
  8. people who lend money to the business in return for a contracted rate of interest or return for their investment.
  9. is a security that matures in a year or less.
  10. is a financial institution that provides services for businesses.
  11. is a bank account that allows that allows the account owner to make deposits, write checks, and withdraw money.
  12. is a nonprofit financial institution that is privately owned and provides banking services for its members.
  13. people who buy shares of stock in the company
  14. is a regular payment made from customer's bank account to a vendor or supplier.
  15. is a financial institution that makes money by issuing loans; loan company.
  16. money for real estate, equipment, and so on.

30 Clues: those people who do the workare issued after the sale of stocks.money for real estate, equipment, and so on.is a security that matures in a year or less.people who buy shares of stock in the companyare largest category of deposits institutions.selling stocks and bonds directly to public investors...