cyber security Crossword Puzzles
Investment Unit 2024-03-20
Across
- The consequences of taking money out of your retirements account before the required age
- represents a loan from the buyer to the issuer
- federal payroll tax that is deducted from each paycheck to pay for others' social security and earns credits that you will supposedly be paid when you receive social security
- the 60 day period after leaving your company to move the money in your 401k into a new 401k
- intrest on intrest
- the amount of years until social security is expected to run out
- cash from a large group of investors to invest in stocks, bonds and other securities
- digital currency backed by nothing except public impression
- a fund where your money is diversified across multiple companies, giving you a more diverse profile
- the maximum amount of money you can put into the IRA per year
- The increase in the value of an asset
- in a traditional IRA, once you turn 73 you must begin taking out a minimum amount of money from the account each year
- animal representing a bad market
- a unique brief combination of letters that represents the company's stocks
- the number of days you have to rollover your 401k after leaving a company
Down
- the age you collect social security
- investing a small sum regularly into a fund
- the age you start investing
- the money made overtime
- when someone trades based on information on a company because it is announced to the public
- you can put in up to $7000 per year into this retirement account pre-tax but will be taxed when you take the money out
- a sum of money saved or made available for a particular purpose
- you can put in up to $7000 per year into this retirement account post-tax and will not be taxed when you take the money out
- animal representing a good market
- investing a big sum into a fund at once
- expected to run out in 2031
- expected to run out in 2033
- unionized workers receive this when they retire
- when you are guaranteed to receive 100% of the money the company you work for matched for your 401k
- a retirement account managed by your employer that will pay you once you retire a certain percentage of your average salary over the course of specified years
- a security that represents the ownership of a peice of a company
31 Clues: intrest on intrest • the money made overtime • the age you start investing • expected to run out in 2031 • expected to run out in 2033 • animal representing a bad market • animal representing a good market • the age you collect social security • The increase in the value of an asset • investing a big sum into a fund at once • investing a small sum regularly into a fund • ...
Internet Safety 2025-03-04
Across
- Testing Security For Images To Prevent Theft And Fakes secure from hackers, crooks, and internet thieves
- Make your posts 'friends only' so that only people you know get to see them. If you need to share your phone number or other private information with a friend, do so in a private message - not in a public post.
- Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
- Adults seeking to abuse children will go where kids are. As a result, grooming can theoretically happen just about anywhere online
- Never get into 'flaming' someone else on an online forum (ie. insulting them or getting into heated arguments)
- Privacy settings are configurations on digital platforms that allow users to control their personal information and how it is shared with others.
- After all, capital letters on the internet mean shouting and are generally considered impolite.
- While cybersecurity protects devices and networks from harm by third parties, Online Safety protects the people using them from harm by the devices and networks (and therefore third parties) through awareness, education, information and technology.
- Respect the privacy of others. This rule should be followed not only in everyday use of online
- A cookie is a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
Down
- November 2021) Flaming, also known as roasting, is the act of posting insults, often including profanity or other offensive language, on the internet.
- Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact.
- Tell your children they do not have to accept any online activity meant to intimidate, threaten, tease, or harm them or anyone else
- recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
- Identity theft is the act of stealing a specific person's identifying information and then using it to pretend to be that particular individual. So identity theft can sometimes
- You can help limit the potentially damaging impact of your online presence by searching for yourself, setting alerts and tightening your privacy settings.
- A website that lets users keep a journal or diary on any subject they like and leave comments on other users' posts.
- An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
- The use of hacking, malware attacks, or other cyber activity in which an unauthorized user attempts to access sensitive data or intellectual property
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
20 Clues: Respect the privacy of others. This rule should be followed not only in everyday use of online • After all, capital letters on the internet mean shouting and are generally considered impolite. • Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet. • ...
Vocabulario #6 (es2) - write translations! 2022-10-31
16 Clues: – trip • – seat • – pilot • – aisle • – window • – flight • – counter • - delayed • – luggage • – security • – backpack • – Passport • – passenger • – departure • – Cancelled • – to travel
Circle of Security 2021-03-12
Across
- When possible follow your child's __________.
- It is never too ______ to be a good parent.
- Whenever necessary, take _____________.
- _____________ Firmness and Affection.
- Change child by changing your ___________.
- Babies naturally seek ____________.
- Name callers are ____________.
- Children need us to be________.
Down
- Knowing we are loved gives us ___________.
- Children need us to be ______________.
- Security teaches a baby to feel __________.
- Know you can NOT be _________,and that is ok.
- Without knowledge children can feel________.
- Babysitters should be over age _____.
14 Clues: Name callers are ____________. • Children need us to be________. • Babies naturally seek ____________. • _____________ Firmness and Affection. • Babysitters should be over age _____. • Children need us to be ______________. • Whenever necessary, take _____________. • Knowing we are loved gives us ___________. • Change child by changing your ___________. • ...
Unit 2 Vocabulary: The Human Factor 2023-10-13
Across
- Deceptive schemes or rumors created with the intent to mislead or trick people. They are typically spread through various channels, including social media, email, or other forms of communication.
- A formal set of rules, guidelines, or principles established by an organization to govern its operations and decision-making. Often outline security procedures and best practices.
- A form of cyberattack where attackers impersonate legitimate organizations or individuals to trick recipients into revealing sensitive information like login credentials, personal details, or financial data. It's often done through deceptive emails, websites, or messages.
- A type of phishing that occurs through text messages or SMS. Attackers send fraudulent messages that may contain malicious links or ask for sensitive information.
- A tactic where an attacker manipulates individuals into approaching them for information or assistance. The attacker, in this case, positions themselves as a helpful resource to extract information or gain access.
- The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations.
- Occurs when an unauthorized person gains physical access to a restricted area or building by following an authorized person without their knowledge or consent.
- To reduce or lessen the severity or impact of a problem or risk. It involves taking steps to minimize the potential harm from security threats or vulnerabilities.
Down
- A method used by individuals to manipulate, deceive, or trick people into revealing confidential information or taking actions that compromise security. It relies on psychological manipulation and often involves impersonating a trusted entity to gain unauthorized access to sensitive data or systems.
- A form of social engineering where the attacker creates a fabricated scenario to obtain information or gain trust. This often involves impersonating someone else, such as a co-worker, to trick individuals into divulging sensitive data.
- A social engineering technique that involves offering something enticing (e.g., a free download, software, or a physical device) to lure individuals into taking actions that compromise their security, such as downloading malicious software or revealing sensitive information.
- A detailed step-by-step process or set of actions that need to be followed to accomplish a specific task or objective. Often provide instructions on how to implement security measures or respond to security incidents.
- The act of spying on someone's computer screen or keypad from a close distance to obtain sensitive information, such as login credentials, PINs, or personal data, without their knowledge or consent.
- Refers to the practice of collecting and analyzing information from publicly available sources, such as social media, websites, and news articles, to gather intelligence about individuals, organizations, or events.
- Involves rummaging through trash or discarded materials, such as documents, hard drives, or electronic devices, in search of information that can be used for malicious purposes, like identity theft or data breaches.
- A social engineering technique that uses phone calls to deceive individuals into revealing personal or financial information. Attackers often impersonate trusted entities to gain the victim's trust.
- A specialized form of spear-phishing that specifically targets high-profile individuals, such as executives or senior management within an organization. The goal is to steal sensitive information or gain access to their accounts.
- A highly targeted form of phishing that focuses on a specific individual, organization, or department. Attackers conduct detailed research to personalize their phishing attempts, making them more convincing.
- A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information.
- Malicious software or deceptive advertisements that exploit fear or intimidation to trick users into purchasing fake security software or taking actions that compromise their computer's security. Often displays false alerts about non-existent threats to scare users into paying for a solution.
20 Clues: A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information. • The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations. • ...
Stock Market Terms Crossword 2020-05-13
Across
- is a period of sustained increases in the prices of stocks, bonds or indices (1wd)
- is a huge company with an excellent reputation. (3wd)
- an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it (4wd)
- the amount by which the ask price exceeds the bid price for an asset in the market (3wd)
- to give/hand over in exchange for money (1wd)
- type of order to purchase or sell a security at a specified price or better.(2wd)
- the buying of a stock, commodity, or currency with the expectation that it will rise in value (2wd)
- an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset, rather than being expensed in the period the cost was originally incurred (1wd)
- the process of offering shares of a private corporation to the public in a new stock issuance. (1wd/3wd)
- a marketplace where securities, commodities, derivatives and other financial instruments are traded (1wd)
- alternative investments using pooled funds that employ different strategies to earn active return, or alpha, for their investors (4wds)
- a unique series of letters assigned to a security for trading purposes(2wd)
- the condition of the financial market in which prices are rising or expected to rise.(2wd)
- a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed. (2wd)
- a trader who executes a large volume of short and long trades to capitalize on intraday market price action (2wd)
- the lowest price a shareholder is willing to part with shares (1wd)
- the marketplace where various national currencies are traded.(1wd)
- a grouping of financial assets such as stocks, bonds, commodities, currencies and cash equivalents, as well as their fund counterparts, including mutual, exchange-traded and closed funds (1wd)
Down
- an investing strategy in which a stock owner purchases additional shares of a previously initiated investment after the price has dropped further. (2wd)
- the completion of a buy or sell order for a security.(1wd)
- the maximum number of shares that a corporation is legally permitted to issue (2wd)
- the money borrowed from a brokerage firm to purchase an investment. It is the difference between the total value of securities held in an investor's account and the loan amount from the broker (1wd)
- a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock(1wd/4wds)
- the ease with which an asset, or security, can be converted into ready cash without affecting its market price (1wd)
- the total quantity of shares or contracts traded for a specified security. (2wd)
- a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations.(2wd)
- a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market.(2wd)
- an individual or firm that acts as an intermediary between an investor and a securities exchange.(1wd)
- the highest price an investor is willing to pay for a share (1wd)
- a statistical measure of the dispersion of returns for a given security or market index. (1wd)
- the portion of shares of a corporation that are in the hands of public investors (2wd)
- the last price at which a security or commodity traded, meaning the most recent price to which a buyer and seller agreed and at which some amount of the asset was transacted(1wd)
- to purchase/obtain in exchange for payment (1wd)
- an asset that tracks a particular set of equities, similar to an index.(1wd/4wds)
- the sale of new or closely held shares by a company that has already made an initial public offering (2wd)
- when a market experiences prolonged price declines (2wd)
- the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders.(1wd)
- the earnings generated and realized on an investment over a particular period of time(1wd)
- an area of the economy in which businesses share the same or a related product or service(1wd)
- a measure of the volatility, or systematic risk, of a security or portfolio, in comparison to the market as a whole (1wd)
40 Clues: to give/hand over in exchange for money (1wd) • to purchase/obtain in exchange for payment (1wd) • is a huge company with an excellent reputation. (3wd) • when a market experiences prolonged price declines (2wd) • the completion of a buy or sell order for a security.(1wd) • the highest price an investor is willing to pay for a share (1wd) • ...
ONLINE SAFETY CROSSWORD 2013-01-31
Across
- If you find something inappropriate, ____ it.
- Another word for the internet
- Keep all of your information ______
- Computers are often open to _____
- If anything happens online, tell an ______
- Do not send on _________ to your friends
Down
- Only let your ______ see your personal information
- Rarely any free offers that come up online are actually ____
- The age you must be to go on YouTube
- Many online offers are _____
10 Clues: Many online offers are _____ • Another word for the internet • Computers are often open to _____ • Keep all of your information ______ • The age you must be to go on YouTube • Do not send on _________ to your friends • If anything happens online, tell an ______ • If you find something inappropriate, ____ it. • Only let your ______ see your personal information • ...
Futuristic cities 2024-06-28
Across
- - Bright, glowing lights often used in signs.
- - To move instantly from one place to another.
- - A place where spacecraft are launched and landed.
- - A machine that can perform tasks automatically.
- - A 3D image created with lasers.
Down
- - A very tall building.
- - A vehicle that floats above the ground.
- - A robot that looks like a human.
- - Relating to computers or technology.
- - An unmanned aerial vehicle.
10 Clues: - A very tall building. • - An unmanned aerial vehicle. • - A 3D image created with lasers. • - A robot that looks like a human. • - Relating to computers or technology. • - A vehicle that floats above the ground. • - Bright, glowing lights often used in signs. • - To move instantly from one place to another. • - A machine that can perform tasks automatically. • ...
The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04
Across
- what car manufacturer made the first modern driverless car
- data should not be kept longer than
- who is exempt from the data protection act
- all personal data should be kept
- the owner of the data
Down
- the DPA has 8
- police, government and taxers all all ______ from the DPA
- a form of cyber-bullying
- data must be routinely for maximum protection
- data should be used
10 Clues: the DPA has 8 • data should be used • the owner of the data • a form of cyber-bullying • all personal data should be kept • data should not be kept longer than • who is exempt from the data protection act • data must be routinely for maximum protection • police, government and taxers all all ______ from the DPA • what car manufacturer made the first modern driverless car
Code B 2023-12-07
Across
- Programming language for web development
- Process of identifying and fixing errors in code
- Function that calls itself
- Repeating a process or set of instructions
- Markup language for creating web pages
Down
- Application Programming Interface for software communication
- Prefix related to computers and digital technology
- Graphical User Interface for user interaction
- Symbol indicating a specific operation in code
- Set of rules governing the structure of code
10 Clues: Function that calls itself • Markup language for creating web pages • Programming language for web development • Repeating a process or set of instructions • Set of rules governing the structure of code • Graphical User Interface for user interaction • Symbol indicating a specific operation in code • Process of identifying and fixing errors in code • ...
ICT Related Terms 2025-02-03
Across
- a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems Users are typically
- is a binary digit, the smallest increment of data on a computer.
- Browser It's a program on your computer that allows you to connect to the Internet to visit websites, download files, and applications.
- is a network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital information for processing.
- - is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- short for "malicious software," refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
- a range of frequencies within a given band, in particular that used for transmitting a signal, the transmission capacity of a computer network or other telecommunication system.
- is a type of malware that spreads copies of itself from computer to computer.
- is a malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.
Down
- are text files with small pieces of data like a username and password that are used to identify your computer as you use a computer network.
- is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.... It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
- is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system.
- the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1....
- is the transmission of wide bandwidth data over a high-speed internet connection.
- an electronic communication setwork that connects computer networks and organizational computer facilities around the world used with except when being used attributively.
- stands for the Completely Automated Public Turing test to tell Computers and Humans Apart.
- the act or an instance of shutting down and restarting something (such as a computer or program).
- is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use.
- Wide Web is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hyperlinks, and are accessible over the Internet.
- Space is an amount of computer storage space on random-access memory devices, such as on a hard drive, floppy or USB flash drive.
20 Clues: is a binary digit, the smallest increment of data on a computer. • is a type of malware that spreads copies of itself from computer to computer. • is the transmission of wide bandwidth data over a high-speed internet connection. • stands for the Completely Automated Public Turing test to tell Computers and Humans Apart. • ...
Krzyżówka Angielski 2025-12-10
Across
- The right to keep personal data protected.
- Learning skills or knowledge.
- Records of system activities.
- Studying information to understand it.
- Connected computers that share data.
- Instructions written for computers.
- A direct instruction given to a computer.
- The chance that something bad may happen.
- Use of technology to perform tasks without human input.
- A break in security where data is exposed.
- Rules about what is morally right or wrong.
- The ability to manage or direct something.
- A system on which applications can run.
- A tool that blocks unwanted network traffic.
- Continuous flow of data.
- A simplified digital structure used to predict or analyze.
- A tool used to explore or test a system.
- A call for data or a service.
- To follow the path of an action or data flow.
- Following laws, rules, or standards.
- Official rule made by authorities.
- Something unusual that may signal a problem.
- Monitoring to make sure rules are followed.
- Protection against threats or attacks.
- An event that disrupts normal operations.
- A saved copy of data in case of loss.
- A step taken to solve a problem.
- A set of rules for communication.
- Searching for threats inside a network.
- Proof of an event or action.
- A formal review of systems or processes.
- A prediction based on information.
- To watch or track activity.
- A request for information from a database.
- A user identity in a system.
Down
- A sign that danger or problems may occur.
- Unauthorized entry into a system.
- A formal rule or guideline.
- A document describing an event or findings.
- A specific area or internet address space.
- Long-term storage of old files.
- A computer that provides resources to others.
- A place where data is kept.
- A piece of hardware used in computing.
- Delay in data communication.
- A set of connected computer components.
- Someone who monitors or watches activity.
- Programs used by a computer.
- A risk or danger.
- Related to money or cost.
- A part of a larger software system.
- The way a system or user acts.
- Related to investigating cyber incidents.
- Accidental or unlawful release of information.
- To check a system for issues or threats.
- A connection point in a network.
- A secret code to access a system.
- Numerical information used for analysis.
- Belief that someone or something is reliable.
- A person or system chosen for attack.
- Too much data or activity for a system to handle.
- A weakness that can be exploited.
- Converting information into a secure code.
- The path data takes to reach a destination.
- Permission to use or enter a system.
- Measurements used to evaluate performance.
- Information stored or processed by computers.
67 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • A place where data is kept. • To watch or track activity. • Delay in data communication. • Programs used by a computer. • Proof of an event or action. • A user identity in a system. • Learning skills or knowledge. • Records of system activities. • A call for data or a service. • ...
Finance 2024-03-13
Across
- A percentage of the amount borrowed that a user of a loan must pay the lender.
- What's the commonly used acronym for a marketable security that tracks a stock?
- A number between 300 & 850 that determines a person's creditworthiness.
- When a person or organization owes money to someone else is called as ______.
- What do you call a legal entity created by an individual in which one person or institution holds the right to manage property or assets for the benefit of someone else?
- What is the coefficient that measures risk-adjusted performance, factoring in the risk due to the specific security, rather than the overall market?
- Goods or services that are required for survival but are desired are called as _______.
- What term is used to describe the range of price swings of a security or market over time? market over time?
- A way to spend money wisely by calculating net income and expenses to see what you spend your money on.
- What is the amount of current income provided by an investment?
Down
- What is the abbreviation of a type of retirement account in which contributions are deductible from earned income in the calculation of federal and state income taxes if the taxpayer meets certain requirements?
- What financial products value is based on an underlying security, commodity or other financial instrument?
- What kind of contract is standardized, transferable, and exchange-traded and requires delivery of a commodity, bond, currency, or stock index, at a specified price, on a specified future date?
- What do you call evidence of a debt in which the issuer promises to pay the holders of this financial product a specified amount of interest and to repay the principal at maturity?
- What do you call evidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options)?
- COST The potential loss of other alternatives due to choosing another alternative.
- What kind of funds does a hedge fund use to earn alpha for its investors?
- What is a type of trust created by a person during his or her lifetime?
18 Clues: What is the amount of current income provided by an investment? • A number between 300 & 850 that determines a person's creditworthiness. • What is a type of trust created by a person during his or her lifetime? • What kind of funds does a hedge fund use to earn alpha for its investors? • ...
Air Force Career: Cyber Surety 2021-11-17
Across
- From programming to _____, these experts keep our systems and our information safe.
- Responsible for cybersecurity of national ____ systems.
- Minimum Education: High School ______
- ASVAB requirement
Down
- Completion of 8.5 weeks of Basic _____Training
- Enforce national, DoD, and Air Force security policies and _________
- Status: Enlisted Airmen with credits earned towards _______ Systems Technology
- Ensure all systems comply with ____ security standards.
- Training: 50 ____
9 Clues: Training: 50 ____ • ASVAB requirement • Minimum Education: High School ______ • Completion of 8.5 weeks of Basic _____Training • Ensure all systems comply with ____ security standards. • Responsible for cybersecurity of national ____ systems. • Enforce national, DoD, and Air Force security policies and _________ • ...
WRS 15 & 16 - DA Puzzle 2023-12-01
Across
- data converted into a meaningful and useful context
- malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
- using the Internet for anything other than work tasks
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
- the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
- pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- to support with evidence or authority; to make more certain
- a particular preference or point of view that is personal, rather than scientific.
- malware that accesses or controls a device without being detected
- a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
- something that furnishes proof
- the protection of information systems against unauthorized access (e.g., hacking, identity theft)
- believable; reliable
- a flaw or weakness that allows a threat agent to bypass security
- a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
- using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
- a website that allows people of similar interests to interact and exchange information that is typically personal
Down
- the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
- connected with or related to the matter at hand
- unbiased; neutral
- using the Internet, ethically, for work-related tasks
- a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
- unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
- the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
- cyber attack that targets the server side to get customer information from the database, such as credit card numbers
- book, article, person, or other resource consulted for information.
- examine and judge carefully
- attacks focused on the workplace Network workers access.
- malware that spreads by users from an infected device to the rest of the devices on a network/system
29 Clues: unbiased; neutral • believable; reliable • examine and judge carefully • something that furnishes proof • connected with or related to the matter at hand • data converted into a meaningful and useful context • using the Internet, ethically, for work-related tasks • using the Internet for anything other than work tasks • ...
Newsletter 2024-06-17
Across
- What term describes an ethical hacker who uses their skills to improve cybersecurity
- what acts as a barrier between a trusted internal network and an untrusted external network.
- What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
- What term in cybersecurity is responsible for defending against simulated or real attacks.
- What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
- What technology stores recently accessed data to speed up future acess
- What type of malware will self-replication and spread independently across networks.
- What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
- What term refers to the physical components of a computer system.
- What term refers to a group of interconnected computers or other devices that can communicate with each other.
- What term refers to testing a computer system, network, or web application to find security vulnerabilities?
- What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
- what term refers to a collection of data or computer instructions that tell a computer how to work.
- What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
- What group within an organization is responsible for simulating attacks against their own organization to test security measures.
- What term refers to a fixed-size output of a hash function that represents input data?
Down
- What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
- What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
- What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
- What term refers to when someone is trying to disguise themselves as being a trusted known source.
- What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
- What type of software attaches itself to a legitimate program and spreads once the program is run.
- What term describes unauthorized use of someone else's computer to mine cryptocurrency?
- What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
- What type of malware encrypts a victim’s files and demands payment for the decryption key?
- What field of study involves techniques for secure communication in the presence of third parties?
- What protocol translates domain names into IP addresses?
- What term refers to a record of events that happen within an operating system, application or network device.
- What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.
29 Clues: What protocol translates domain names into IP addresses? • What term refers to the physical components of a computer system. • What technology stores recently accessed data to speed up future acess • What term describes an ethical hacker who uses their skills to improve cybersecurity • ...
DORA christmas 2024-12-15
Across
- What must cryptographic keys be protected against throughout their lifecycle?
- What is the name of the Dutch IT-association that published the first DORA-control framework?
- "The control team lead shall select at least three ********* to conduct the TLPT, on the basis of all of the following elements: (a) the recommendation by the threat intelligence provider and the threat-led nature of each scenario; (b) the input provided by the test managers; (c) the feasibility of the proposed scenarios for execution, based on the expert judgement of the testers; (d) the size, complexity and overall risk profile of the financial entity and the nature, scale and complexity of its services, activities and operations."
- What technique can be used in network design to limit contagion during cyber attacks?
- The **** plan with a third party must be based on realistic scenarios and assumptions.
- Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
- What must financial entities use for advanced testing of ICT tools?
- How often per year should a review of access rights for ICT systems that support critical or important functions be performed
- What percentage of affected clients using a service meets the materiality threshold for major incidents?
- What must ICT security policies ensure regarding data?
Down
- Information of subcontractors should **** be in the Register of Information that effectively underpin ICT services supporting critical or important functions or material parts thereof.
- What is the main subject matter of DORA?
- Who is responsible for implementing the ICT risk management framework in financial entities?
- What must financial entities report to relevant authorities?
- "The Register of Information has six criteria: Financial entities shall ensure that the information contained in the templates referred to in paragraph 1 adhere to the following principles of data quality. Five of them are: accuracy; completeness; integrity; uniformity; validity. What is the six criteria?"
- What must be promptly renewed to ensure ongoing security?
- What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
- We enter the run phase of DORA. The ICT framework should be reviewed yearly. This report is quite extensive. So early start is important. Internal ***** should also start early to ***** this ICT Framework.
- How frequently should vulnerability scanning be performed on critical ICT assets?
- What should financial entities have to ensure data restoration?
20 Clues: What is the main subject matter of DORA? • What must ICT security policies ensure regarding data? • What must be promptly renewed to ensure ongoing security? • What must financial entities report to relevant authorities? • What should financial entities have to ensure data restoration? • What must financial entities use for advanced testing of ICT tools? • ...
Information Age, Biodiversity and the Healthy Society. 2025-03-19
Across
- The disparity between individuals, communities, and countries in accessing and utilizing digital technologies, which affects economic opportunities, education, and social progress.
- The development of writing systems like cuneiform and hieroglyphics, along with postal services such as those used by the Persian and Roman empires.
- National parks and wildlife reserves preserve biodiversity by providing secure habitats. Their effectiveness depends on strong management, law enforcement, and community engagement, though they face challenges like habitat loss, illegal activities, and climate change.
- Aids conservation through remote sensing, GIS, drones, and AI for monitoring species and ecosystems. Environmental DNA (eDNA) helps detect species presence, improving conservation efficiency and accuracy.
- A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide.
- Disrupts biodiversity by altering habitats, food chains, and species distribution. Rising temperatures, extreme weather, and ocean acidification threaten marine and terrestrial ecosystems.
- The increasing use of cloud storage, combined with poor security configurations, weak access controls, and insufficient encryption, raises vulnerability to cyber threats.
- Medications prescribed, managed, and delivered remotely through telehealth platforms, digital pharmacies, and e-prescription services, allowing patients to receive treatment without in-person visits.
- Scientists have successfully bred this species as part of efforts to restore the woolly mammoth.
- AI and data-driven decisions can reinforce societal biases, resulting in unfair treatment in employment, financial services, and law enforcement.
- Negative attitudes and stereotypes toward individuals with mental health conditions, leading to discrimination and discouraging people from seeking necessary care.
- The presence of diverse crops, livestock, and beneficial microorganisms that sustain farm productivity and ecosystem health, ensuring food security and environmental stability.
- The ability to obtain necessary medical services without financial, geographical, or systemic obstacles. Despite its importance, many individuals still struggle with healthcare accessibility.
Down
- The reduction of plant, animal, and microorganism species due to deforestation, pollution, climate change, and habitat destruction. Declining biodiversity weakens ecosystems, impacting air, water, and food supply. Protecting habitats and reducing pollution can help slow this loss.
- The introduction of printing and early mass communication, notably with Gutenberg’s printing press in the 1440s, which transformed information dissemination.
- The exchange of information through digital methods, including emails, text messages, social media, and video calls. It relies on electronic devices and the internet for efficient data transmission.
- Many users unknowingly accept data collection due to complex terms of service, raising doubts about the validity of their consent.
- Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages.
- Plays a key role in conserving and enhancing biodiversity within cities. Proper planning can prevent habitat fragmentation and support native species while benefiting human well-being.
- The imitation of human intelligence in machines, enabling them to learn, reason, solve problems, understand language, and make decisions.
20 Clues: Scientists have successfully bred this species as part of efforts to restore the woolly mammoth. • A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide. • Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages. • ...
Insurance types 2022-06-27
Across
- Liability (Dram), coverage for bodily injury or property damage caused by an intoxicated person who was served liquor by the business owner.
- Liability/Errors & Omissions, Coverage for professional services in the event of an error (does something wrong) or omission (does not do something they're supposed to) that leads to financial loss (as opposed to bodily injury or property damage)
- Liability, protects businesses from Internet-based risks and risks relating to information technology infrastructure, information privacy, information governance liability, etc. Keywords: Malware, Data Breaches, Cyber Security, Operational Risk, Service Risk, Cyber Attacks
- Risk, Specialty type of Property Insurance that protects a person's or organization's insurable interest in materials, fixtures and/or equipment awaiting installation during the construction or renovation of a building or structure, should those items sustain physical loss or damage from a covered loss.
- Auto, Covers the cost of an auto accident if the business owner or an employee is at fault.
- Marine, Specialty type of Property Insurance that protects moveable equipment away from the business owner's premises.
- Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property
- Liability, Umbrella insurance refers to liability insurance that is in excess of specified other policies and also potentially primary insurance for losses not covered by the other policies.
- Covers the business owner's building and contents in case of a covered loss such as water/fire damage or theft.
- provides coverage against all risks of physical loss or damage to freight during the shipment from any external cause during shipping.
- Insurance, Coverage for a boat
- Risk, Lessor's Risk Only (LRO) Insurance, also known as the Landlord's Insurance, is a specific type of property and liability coverage designed for building owners.
- Insurance, livestock owned by the business.
Down
- Personal Property, Business Personal Property covers everything inside of a building. If you were to open the door and shake everything out, everything that came out would be covered under Business Personal Property.
- Interruption Insurance, replaces income lost in the event that business is halted for some reason, such as a fire or a natural disaster.
- pays to repair or replace a vehicle you don't own if it is damaged by a collision, fire, theft, explosion, or vandalism while you are towing or hauling.
- Insurance, protects a property owner against damage caused by fires, severe storms, hail/sleet, or other natural events (hazards).
- Liability / Unladen Liability, provides coverage for truck drivers when they are operating their trucks in a non-trucking capacity BOB Tail- covers your return trip after delivering the freight trailer to its destination. Without the trailer attached,
- Liability, Protects the business owner from any claims for bodily injury property damage and personal/advertising injuries. Also covers products and completed operations (means that the work done is still covered even after the job has been completed).
- Practices Liability, often referred to as EPLI or EPL, covers businesses against claims by workers that their legal rights as employees of the company have been violated (i.e. Claims of Sexual harassment, Discrimination, Wrongful termination.)
- Liability, manufactures/sells/relabels a product that has a defect and that defect causes injury or property damage, your business could be held liable. This insurance type covers the risk of defects, in case your product is faulty.
- Insurance, Insurance for crops grown by an agricultural business. If the customer is looking for coverage while the crops are being transported, please use Commercial Auto (Cargo) and use the correct trucking category.
- Liability, Media liability is a type of Professional Liability. It covers the Personal/Advertising injuries (e.g. libel, slander, and copyright infringement) just like a normal Commercial General Liability policy would except typically the General Liability's policy coverage for Personal/Advertising injuries would exclude these types of injuries for businesses primarily engaged in advertising, publishing, broadcasting, or similar activities. Media liability exists to fill in those gaps. It's extra coverage for these types of businesses.
- , type of professional liability insurance intended to cover medical practitioners, lawyers, or public officials.
- Keepers Liability, auto dealers/repair shops. This will cover vehicles (not belonging to the business owner) in case of damage from unforeseen circumstances (like a natural disaster).
- and Officers Liability, protects the personal assets of company directors and officers in the event they were sued while acting in their capacity as a director or officer. Most commonly requested by non-profit companies.
26 Clues: Insurance, Coverage for a boat • Insurance, livestock owned by the business. • Auto, Covers the cost of an auto accident if the business owner or an employee is at fault. • Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property • ...
Introduction to Cybersecurity 2025-06-19
Across
- Fraudulent attempt to steal sensitive data via deceptive emails.
- Incident where data is accessed/stolen without permission.
- Three core security goals: Confidentiality, Integrity, and _______.
- Moral principles governing digital behavior (e.g., privacy, transparency).
Down
- Security system that monitors/controls network traffic (blocks unauthorized access).
- Self-replicating malware that spreads between devices.
- Process of encoding data to prevent unauthorized reading.
- Malicious software designed to damage systems (e.g., viruses, trojans).
- Person who exploits system vulnerabilities.
- Software update to fix security flaws.
10 Clues: Software update to fix security flaws. • Person who exploits system vulnerabilities. • Self-replicating malware that spreads between devices. • Process of encoding data to prevent unauthorized reading. • Incident where data is accessed/stolen without permission. • Fraudulent attempt to steal sensitive data via deceptive emails. • ...
Transactions Online 2017-02-28
Across
- Cyber criminals.
- Online department store.
- You say that you are not satisfied with a product or service.
- Delivery of a product and its cost.
- Bankcard attached to your current account.
- The card used for paying via the Internet.
- Cash on delivery.
- You can get your money back after a wrong product or service.
- The name you write in the login box.
Down
- Consumer of a product or service.
- Financial manoeuver.
- Your personal identification code.
- Possibility for compensation.
- Ruined during delivery.
- You can get another product for a faulty one.
- To transport a product from one point to another.
16 Clues: Cyber criminals. • Cash on delivery. • Financial manoeuver. • Ruined during delivery. • Online department store. • Possibility for compensation. • Consumer of a product or service. • Your personal identification code. • Delivery of a product and its cost. • The name you write in the login box. • Bankcard attached to your current account. • ...
crossword 2012-11-15
Across
- one world many states (16)
- logo 1 (7)
- logo 4 (9)
- logo 2 (10)
- logo 3 (5)
- subsidiary company of adidas which makes sportswear, apparel and accessories (6)
- world's local bank (4)
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
Down
- highest grossing hollywood movie (6)
- full form of P&G (14)
- ceo of virgin atlantic (14)
- parent company of minute maid (8)
- the ultimate driving machine (3)
- artist with the highest number of views for his\her video on youtube (3)
- towards excellence (4)
- brand ambassador of sony cyber shot (7)
16 Clues: logo 1 (7) • logo 4 (9) • logo 3 (5) • logo 2 (10) • full form of P&G (14) • towards excellence (4) • world's local bank (4) • one world many states (16) • ceo of virgin atlantic (14) • the ultimate driving machine (3) • parent company of minute maid (8) • highest grossing hollywood movie (6) • brand ambassador of sony cyber shot (7) • ...
crossword 2012-11-15
Across
- logo 3 (5)
- parent company of minute maid (8)
- logo 2 (10)
- the ultimate driving machine (3)
- one world many states (16)
- full form of P&G (14)
- artist with the highest number of views for his\her video on youtube (3)
Down
- brand ambassador of sony cyber shot (7)
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
- ceo of virgin atlantic (14)
- subsidiary company of adidas which makes sportswear, apparel and accessories (6)
- towards excellence (4)
- world's local bank (4)
- logo 1 (7)
- logo 4 (9)
- highest grossing hollywood movie (6)
16 Clues: logo 3 (5) • logo 1 (7) • logo 4 (9) • logo 2 (10) • full form of P&G (14) • towards excellence (4) • world's local bank (4) • one world many states (16) • ceo of virgin atlantic (14) • the ultimate driving machine (3) • parent company of minute maid (8) • highest grossing hollywood movie (6) • brand ambassador of sony cyber shot (7) • ...
DOMESTIC AND INTERNATIONAL AIRPORTS 2022-07-21
Across
- The word for 'A' in the phonetic alphabet
- (2 words)the thing your baggage goes on after check-in
- (2 words) something you need in order for you to access facilities airside
- (2 words) responsible for directing all ground traffic in designated 'movement areas' except traffic on runways
- The side of the airport you are on when you have passed through customs and about to board your plane
- the area in airports BEFORE departing passengers pass through security (accessible by both travelers and non-travelers)
- the 2 letter code for Emirates Airlines
- the word for 'W' in the phonetic alphabet
- a place in airports where you can complete currency exchange transactions
Down
- a flight originating and terminating in the same country
- another term for 'AIRLINE'
- security s________
- something you need in order to for you to access facilities airside
- (2 words) who drive baggage and freight between planes and airport terminals or cargo buildings?
- IATA code for Gisborne
- acronym for Aviation Security Service
- p_______ alphabet
- the word for 'Y' in the phonetic alphabet
- the 2 letter code for Singapore Airlines
- (2 words) what is the living thing they use in customs to help stop illegal drugs and explosives being smuggled into the country?
- IATA code for Nelson
21 Clues: p_______ alphabet • security s________ • IATA code for Nelson • IATA code for Gisborne • another term for 'AIRLINE' • acronym for Aviation Security Service • the 2 letter code for Emirates Airlines • the 2 letter code for Singapore Airlines • The word for 'A' in the phonetic alphabet • the word for 'Y' in the phonetic alphabet • the word for 'W' in the phonetic alphabet • ...
Investments and Bonds 2022-11-29
Across
- type of bond, a corporation's promise to repay a specified amount of money with interest
- type of bond backed by assets of a business
- type of bond repaid through the income generated through the project
- type of bond, when multiple are issued on the same date but have different maturity dates
- type of bond backed by good faith of the company
- type of security that lasts 2-10 years
- a manager/third party that carries out the bond
- aka junk bond, type of bond that is risky but pays high interest
- the dollar amount the bondholder will receive at the bond's maturity
Down
- the ability for issuers to pay off bondholders early, if necessary
- type of security that lasts 30 years
- date on which corporate bonds are repaid
- investing/placing your money in more than one area
- document with all of the bond's information
- type of security that lasts 4-52 weeks
- type of bond that can convert from a corporate bond to equal value of a company's stock
- type of bond attached to a certain holder
- fund with annual/semiannual deposits to guarantee that companies can repay bondholders
- the _____ the risk, the higher the potential return
- type of bond issued at city, county, or state level
20 Clues: type of security that lasts 30 years • type of security that lasts 4-52 weeks • type of security that lasts 2-10 years • date on which corporate bonds are repaid • type of bond attached to a certain holder • document with all of the bond's information • type of bond backed by assets of a business • a manager/third party that carries out the bond • ...
Airside and Landside 2019-07-23
Across
- passenger transfer between ground transportation and the facilities that allow them to board
- it’s the area where you go through security and hand your passport and departure card for inspection
- reach a plane at the end of a journey
- only travelers can go through this area when they leaving
- is provided as a quite place for contemplation to all travelers
- you go through before you leave Landside to get to the airside
- airport with customs and border control when passengers travel between countries
- if Incase fire thing happen
- duties levied by a government on imported goods
- it’s an area before departing passenger go through security
Down
- and beverage you go when your hungry
- if you need to buy multi vitamins where do you go?
- facilities they offer and usually have food, drinks, internet and relaxing area
- a strip of hard ground along which aircraft take off and land
- the first thing you do when you get at the airport
- it’s a document that you need to get on plane
- if you have foreign cash where do you go?
- if you want to buy alcohol in airside area where do you go?
- personal belonging you packet for traveling
- flight within the same country is called?
20 Clues: if Incase fire thing happen • and beverage you go when your hungry • reach a plane at the end of a journey • if you have foreign cash where do you go? • flight within the same country is called? • personal belonging you packet for traveling • it’s a document that you need to get on plane • duties levied by a government on imported goods • ...
Chapter 7 Crossword CEH 2026-03-02
Across
- Malware changing behavior dynamically
- Network traffic analysis tool
- Attacker spreading across networks
- Multiple layered security strategy
- Compressing malware to hide code
- Indicator showing compromise evidence
- Malware operating primarily in memory
- Infrastructure controlling infected systems
- Isolated environment for safe execution
- Windows executable file format
- Detecting threats by activity patterns
- Security model requiring verification
- Malware requiring user execution to spread
- macOS executable format
- Linux executable format
- Tool tracking system processes
- Malware Malware using artificial intelligence techniques
- Gaining higher system permissions
- Examining malware without execution
- Endpoint detection and response security
- Secure hashing algorithm for identification
Down
- Extended threat detection platform
- Proactive search for attackers
- Executing code inside running processes
- Using system scripting tools maliciously
- Small payload executed in memory
- Command showing network connections
- Social engineering used to deliver malware
- Technique allowing malware survival after reboot
- Startup registry location abused by malware
- Dedicated malware inspection system
- Converting binaries into assembly code
- Software designed to damage systems or steal data
- Studying malware behavior during execution
- Making code difficult to analyze
- Creating digital fingerprint of files
- Self replicating malware spreading automatically
- Code abusing system vulnerability
- Automated execution used for persistence
- Startup program monitoring utility
40 Clues: macOS executable format • Linux executable format • Network traffic analysis tool • Proactive search for attackers • Windows executable file format • Tool tracking system processes • Small payload executed in memory • Compressing malware to hide code • Making code difficult to analyze • Code abusing system vulnerability • Gaining higher system permissions • ...
Unit 5 - Do's and Don'ts 2020-02-02
21 Clues: Lkw • Fall • Helm • Küche • Strom • Schild • Eigentum • Vorsicht • Sicherheit • drogenfrei • Bibliothek • Koch/Köchin • Gehörschutz • Gabelstapler • Schutzbrille • Boden,Fußboden • unbeaufsichtigt • Parkplatz,Parkhaus • Nichtraucherbereich • zerbrechen,kaputtmachen • hinterlassen,stehenlassen
unit 3 2020-12-10
20 Clues: vám • kapu • utas • jóslat • indulás • helyszin • foglalás • egzotikus • mostanában • tetőterasz • csengőhang • mennyország • konferencia • okostelefon • táblák, jelzések • biztonsági ellenörzés • érkezés (repülőtéren) • poggyászszállító kocsi • szöveges üzenetet küld • beszáll ( a repülőgépbe)
Travel, holiday 2020-01-12
20 Clues: jegy • peron • utazás • csomag • útlevél • érkezés • külföld • kilátás • szállás • foglalás • felfedez • leszállás • tengerpart • városnézés • rom, lerombol • luxushajó, óceánjáró • pihenés, kikapcsolódás • indulás, indulási oldal • szórakozás, szórakoztató program • ellenörzés, biztonsági szolgálat
Theme 2 Crime 2024-11-16
24 Clues: rel • dador • steng • aanval • bewijs • getuige • advocaat • dankbaar • oplossen • indringer • opgelucht • rechtzaak • hechtenis • rechtszaak • verzamelen • voorkomend • beveiliging • financiering • zakkenrollen • veroordeling • gerechtigheid • ontwetendheid • afkickkliniek • veronderstellen
POIST 2025-12-15
22 Clues: judge • nurse • singer • banker • doctor • driver • farmer • plumber • teacher • cleaner • musician • engineer • mechanic • scientist • secretary • electrician • salesperson • web developer • security guard • businessperson • computer progammer • computer technician
HIP Guardians of Health Information 2026 2026-03-13
21 Clues: AAHIP • AITDU • OIGCND • LQIYTAU • VRAPYIC • SLSAYIAN • TSCIYURE • CEIDRMEA • RWDOAPSS • DYFICEEINC • CINPYTOREN • GYOTHLEONC • USOERSDICL • BSITCAGNART • ARBENEIIFYC • PTLYIIROBAT • EIOLYNNDICFAITT • ADLECIM NEYSCTEIS • EATLHH NTMORAFNOII • LEAERSE FO MRTNOANOFII • ICNREOCLTE THLHAE ERCRRDO
La unidad 10 2021-04-16
16 Clues: late • board • window • flight • counter • confirm • landing • luggage • customs • takeoff • arrivals • schedule • security • passport • departures • bathrooms(SP)
Exam Vocabulary p7 2021-10-15
16 Clues: macht • policy • gedrag • pesten • dakloos • invloed • armoede • politiek • omgeving • regering • veiligheid • plaatselijk • gemeenschap • maatregelen • maatschappij • reclame maken
เกมค้นหาคำศัพท์ 2025-08-03
16 Clues: มาถึง • ถอดออก • ที่นั่ง • เดินทาง • สายการบิน • เที่ยวบิน • ผู้โดยสาร • บัตรโดยสาร • ออกเดินทาง • ขึ้นเครื่อง • ประตูทางออก • พนักงานขนกระเป๋า • กระเป๋าเป้สะพายหลัง • ระบบรักษาความปลอดภัย • ชั้นโดยสารราคาที่ถูกที่สุด • สายพานที่ใช้รับส่งกระเป๋าในสนามบิน
Test 2025-09-17
At the airport vocabulary 2024-11-03
Across
- Put in the trash.
- Document needed for international travel
- Airport security personnel
- Items that need to be placed in the tray
- Place to show your boarding pass
- Checks your travel documents
Down
- Leave luggage with the airline
- Often weighed before boarding
- Someone traveling on a plane
- What you do with your belt at security.
- Not international
- Enter the plane
- Where you greet arriving passengers
13 Clues: Enter the plane • Put in the trash. • Not international • Airport security personnel • Someone traveling on a plane • Checks your travel documents • Often weighed before boarding • Leave luggage with the airline • Place to show your boarding pass • Where you greet arriving passengers • What you do with your belt at security. • Document needed for international travel • ...
Bullying 2023-03-21
Across
- A form of help
- manipulation, mimicking and intimidation
- A witness of the bullying
- Person who is being bullied
- use of negative words to intentionally upset someone
Down
- verbally, socially or psychologically bullying someone using technology
- Spreading rumours and repeated mimicking
- Pushing and shoving someone repeatedly
8 Clues: A form of help • A witness of the bullying • Person who is being bullied • Pushing and shoving someone repeatedly • Spreading rumours and repeated mimicking • manipulation, mimicking and intimidation • use of negative words to intentionally upset someone • verbally, socially or psychologically bullying someone using technology
Online Communication 2023-08-07
Across
- Connects global computers
- Exchanging information
- Remarks made under someone else's post
Down
- Social media platform founded in February 2004
- Message sent by computer
- Something involving computers or the internet
- social media platform bought by Facbook in 2012
- Software program downloaded onto a computer or phone
8 Clues: Exchanging information • Message sent by computer • Connects global computers • Remarks made under someone else's post • Something involving computers or the internet • Social media platform founded in February 2004 • social media platform bought by Facbook in 2012 • Software program downloaded onto a computer or phone
Vocabulario #6 (es2) - write translations! 2022-10-31
16 Clues: – trip • – seat • – pilot • – aisle • – window • – flight • – counter • - delayed • – luggage • – security • – backpack • – Passport • – passenger • – departure • – Cancelled • – to travel
CSC Puzzle 2021-06-09
Across
- Required to wear a security shirt
- See something, _____ something
- Anaheim Angels _____________
- OC's branch manager
- Common hair color abbreviation
- Common eye color abbreviation
- What does CP stand for
- Non-guard carded staff is _______ staff
- Guests are not allowed to re-________ the stadium
Down
- _______items include weapons, alcohol and large bags
- Verbal or physical
- Someone leaving with a subject who is being evicted
- Used to protect your skin from the sun
- What day is payday?
- Color of pen a security guard uses
- Text ___________ to 474747 to place a contactless concessions order
16 Clues: Verbal or physical • OC's branch manager • What day is payday? • What does CP stand for • Anaheim Angels _____________ • Common eye color abbreviation • See something, _____ something • Common hair color abbreviation • Required to wear a security shirt • Color of pen a security guard uses • Used to protect your skin from the sun • Non-guard carded staff is _______ staff • ...
Globalization Vocabulary 1 2017-02-20
Across
- Of or relating to the government
- Blending to sameness
- Operating or existing in many countries
- Customs, traditions, values of a group of people
- To rely upon each other
- Nations global organization for peace, security
- Living and nonliving things interacting together
Down
- The world seems smaller by Marshall McLuhan
- To be involved in complex ways with each other
- When larger systems, and everything interconnect
- Use, management of money
- In agreement
- System of money
- Organization for peace, security, political alliance
- Buy/sell goods/resources of a country or region
- Organized group of people
16 Clues: In agreement • System of money • Blending to sameness • To rely upon each other • Use, management of money • Organized group of people • Of or relating to the government • Operating or existing in many countries • The world seems smaller by Marshall McLuhan • To be involved in complex ways with each other • Nations global organization for peace, security • ...
Loan Terms 2025-11-07
Across
- person who takes out a loan
- Term loan length that doesn’t change
- property pledged as security for a loan
- Card linked directly to a bank account
- replacing an old loan with a new one
- length of time to repay a loan
- maximum amount that can be borrowed
- original amount of money borrowed
- chance of losing money
Down
- Card allowing borrowed payments
- Interest rate that changes with the market
- loan to buy property
- person or bank that gives money
- borrowed money that must be repaid
- asset pledged for repayment
- Interest rate that stays the same
- rate percentage charged on borrowed money
17 Clues: loan to buy property • chance of losing money • person who takes out a loan • asset pledged for repayment • length of time to repay a loan • Card allowing borrowed payments • person or bank that gives money • Interest rate that stays the same • original amount of money borrowed • borrowed money that must be repaid • maximum amount that can be borrowed • ...
Profiles 2 text 1 Pinja 2014-12-03
16 Clues: jono • matka • saapua • tuhlata • siepata • hassakka • majoitus • matkustaa • ulkomaille • lomakeskus • askeittain • matkatavara • days nykyaan • turvallisuus • aurinkovoida • lahtoselvitys
Human rights 2023-10-27
16 Clues: frihed • social • lighed • styrkelse • privatliv • tolerance • værdighed • sikkerhed • medtagelse • rimelighed • selvstændig • ansvarlighed • retfærdighed • diskrimination • menneskeværdighed • borgerrettigheder
CyberDSA D3 2025-08-14
Across
- Applying updates to fix software flaws.
- Method of guessing passwords by trying all possibilities.
- Security barrier that controls network traffic flow.
- Isolated environment to safely run suspicious files.
- System for analyzing and correlating security events.
Down
- Period of active connection between a user and a system.
- Technology that prevents sensitive data from leaving a network.
- Authorized simulated cyberattack to test security defenses.
- Algorithm for encrypting and decrypting information.
- Recorded events and activities on a system or network.
10 Clues: Applying updates to fix software flaws. • Algorithm for encrypting and decrypting information. • Security barrier that controls network traffic flow. • Isolated environment to safely run suspicious files. • System for analyzing and correlating security events. • Recorded events and activities on a system or network. • ...
CAB 2021-05-05
Across
- Writing mean things on peoples Facebook, Instagram etc.
- What is the B of bullying?
- Someone that stood up for themselves/ other people.
- No one is having fun.
- What is the A of bullying?
- Spreading rumors, excluding people from games and groups.
- Someone that hits people or calls them names.
- Someone that watched bullying happen.
Down
- Someone is being hurt on purpose.
- Name calling, threating.
- Everyone is having fun.
- What is the D of bullying?
- What is the C of bullying?
- Punching, kicking, and spitting.
- Attacked physically, socially, or emotionally.
- Someone that got hit or gets called names.
16 Clues: No one is having fun. • Everyone is having fun. • Name calling, threating. • What is the B of bullying? • What is the D of bullying? • What is the C of bullying? • What is the A of bullying? • Punching, kicking, and spitting. • Someone is being hurt on purpose. • Someone that watched bullying happen. • Someone that got hit or gets called names. • ...
Finance 2023-12-15
Across
- of a company's earnings to its share price.
- borrowed or invested, excluding interest.
- charge for the use of borrowed assets, usually yearly.
- ratio (Price-to-earnings ratio)
- representing partial ownership of a company.
- portfolio value change due to interest rate shifts.
- investments across various assets to reduce risk.
- during which an investor can't sell a newly issued security.
Down
- at Risk (VaR)
- of an asset's sensitivity to interest rate changes.
- rate
- period
- fund
- mirroring a financial market index.
- instrument promising repayment with interest.
15 Clues: rate • fund • period • at Risk (VaR) • ratio (Price-to-earnings ratio) • mirroring a financial market index. • borrowed or invested, excluding interest. • of a company's earnings to its share price. • representing partial ownership of a company. • instrument promising repayment with interest. • investments across various assets to reduce risk. • ...
PHN001 2017-06-05
Across
- The process of securing a network appliance or server to protect it against hacking.
- Physical security domain associated with internal IT systems. (BSS)
- The utilization of algorithms to secure signalling.
- Physical security domain associated with network connections that consist of physical lines.
- Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
- Virus known to spread over GSM-SMS networks.
- Method used to physically cut into a cable and steal / divert signal.
- Wifi encryption method that is easy to hack
- Mobile technology that uses the TDMA radio signal.
Down
- Mobile technology that competes with GSM.
- Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
- The process of tricking people by changing your apparenet identity.
- Modern wireless technology that creates homespots and hotspots.
- Trade name for 4G networks
- Attack vector utilized which the target of most fraudster. A ____ domain attack.
- Modern wireless technology based on local Microwave Signals
- The initals for the internet protocol that secures most mobile networks.
- Type of server resident on a GSM network and utilized to force code onto handsets.
- The identification number assigned to every GSM device.
- Wifi encryption method that is difficult to hack
- The item inserted into a device which holds an encryption key.
21 Clues: Trade name for 4G networks • Mobile technology that competes with GSM. • Wifi encryption method that is easy to hack • Virus known to spread over GSM-SMS networks. • Wifi encryption method that is difficult to hack • Mobile technology that uses the TDMA radio signal. • The utilization of algorithms to secure signalling. • ...
Emergency Responce plan 2019-06-10
Across
- 0124-2290192
- Raise the ______________ using the manual Call point
- Facility team will __________ for controlling the source of spill if possible
- Emergency handling trained associate will blow the ___________, to indicate that there is emergency situation is inside the building
- Support the security team to fighting the _________________
- After reentry into the building, debrief with Operations, Safety,________ Facility Manager & other observers to collect all pertinent information related to the emergency event.
- Operation manager will Maintain order and ensure that all Associates remain at the ______________.
- reach at the Assembly _____________
- Who will monitor the news and notify the site leader ?
Down
- During fire the operation manager will, Take charge of all persons at the evacuation point and ensure roll call is taken and is matching to the _________.
- Support Operation manager will move the associate to the _______________ area
- ,Don not Run ( Compleate the sentence )
- Associate should take injured Person to where, if Possible ?
- 0124-2292101
- Incident Commander will Go to the designated outside assembly point and follow the _______________ commander check sheet
- 011-26152801
- Provide appropiate __________to evacuate associate
- Do not leave the __________ until Asked to.
- security team will inform to whom, After consultation with Incident Commander about the incident ?
- arrange the spill kit from __________ location
20 Clues: 0124-2290192 • 0124-2292101 • 011-26152801 • reach at the Assembly _____________ • ,Don not Run ( Compleate the sentence ) • Do not leave the __________ until Asked to. • arrange the spill kit from __________ location • Provide appropiate __________to evacuate associate • Raise the ______________ using the manual Call point • ...
Cashless society 2024-09-04
Across
- The cost associated with creating physical money
- what do you think orba cashless world?
- Electronic tool often used for payments in a cashless society
- A problem in a cashless society where electronic systems fail
- The state of financial transactions occurring without physical cash
- A device often used for cashless transactions while traveling
- The financial institution that may hire security teams to protect cash
- What positive effect does a cashless society have on crime?
- The physical form of money that is becoming less prevalent
- The primary risk associated with online transactions due to data breaches
- A type of currency that is becoming less common due to digital transactions
Down
- The type of fees that may increase if banks can't charge for cash withdrawals
- a cashless society has its own?
- Financial crime involving hiding the source of illegally obtained money
- The type of crime that may decrease in a cashless society
- if the source of the money is unknown, money laundering becomes much more?
- The term for the illegal hiding of income
- A major benefit of a cashless society related to the ease of carrying money
- A financial concept that could impact customers if all transactions are electronic
- What is a security concern with electronic transactions?
20 Clues: a cashless society has its own? • what do you think orba cashless world? • The term for the illegal hiding of income • The cost associated with creating physical money • What is a security concern with electronic transactions? • The type of crime that may decrease in a cashless society • The physical form of money that is becoming less prevalent • ...
Investment Unit 2024-03-20
Across
- the age to collect social security benefits
- The ticker for Google
- The ticker for Amazon
- the market where many people buy investments
- the market where many people sell their investments
- Expected to run short of funds by 2031.
- digital money
- don't give you ownership rights.
- when you purchase or sell a stock
- You can get more benefits if you delay retirement until what age?
- it is meant for short-term goals
- The color that means stocks are doing bad
- The increase in the value of an asset
- Social Security & Medicare together is called...
- the bigger the box in the S&P 500, the bigger the...
Down
- 35 is the average age when ______ start to invest
- The ticker for Microsoft
- The ticker for Tesla
- 6.2% is the percent of your paycheck gets taken out for what?
- the age you can start investing
- The color that means stocks are doing good
- Managed by your employer.
- The president that created social security
- it is meant for long-term goals
- a common job that provides a pension
- The ticker for Meta
- invest a small sum regularly
- Invest a big sum at one go
- 32 is the average age when ______ start to invest
- physical money
30 Clues: digital money • physical money • The ticker for Meta • The ticker for Tesla • The ticker for Google • The ticker for Amazon • The ticker for Microsoft • Managed by your employer. • Invest a big sum at one go • invest a small sum regularly • the age you can start investing • it is meant for long-term goals • don't give you ownership rights. • it is meant for short-term goals • ...
Investing Brayden O 2026-04-01
Across
- Virtual currency with nothing backing it
- Age can delay your retirement to receive more money
- Percent of 18-29 year olds that have invested in, traded or used crypto
- Money recieved after working a certain amout of years for a unionized workforce
- Material Non Public information
- Minimum amount of that must be taken out of the account annually once 73
- Average retirement savings for people under 35
- How much Tom Brady lost with FTX
- Investing all money available into the market
- Percent an employee pays for social security tax
- Buying or selling a stock based on Material, Non Public information
- Investing money in equal amounts at regular intervals
- Goverment medical health plan
Down
- Information that hasnt been shared with the general public
- Info that would actually change a persons mind about buying or selling stock
- amount Age to receive full social security benefits
- Percent an employee pays for medicare
- Contributes to a personal savings with after tax contributions
- Emplyer sponsored retirement plan
- System of recording information that makes it hard to hack
- Money put aside when you worked that you receive when you retire
- Currencies created and backed by the government
- Personal savings account
- Social Security and Medicare Together
- Age to “invest” in crypto
25 Clues: Personal savings account • Age to “invest” in crypto • Goverment medical health plan • Material Non Public information • How much Tom Brady lost with FTX • Emplyer sponsored retirement plan • Percent an employee pays for medicare • Social Security and Medicare Together • Virtual currency with nothing backing it • Investing all money available into the market • ...
Security Issues in Informatics 2024-11-25
Across
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- a type of malware that disguises itself as a legitimate program or file to gain access to a computer system
- when personal information is accessed, disclosed, or lost without authorization
- tricking someone into giving away sensitive information, like passwords or credit card details, by manipulating them psychologically, often by pretending to be someone they trust, like a company or a colleague, to gain access to systems or data
- a malicious cyber attack that targets cloud-based systems, services, or data
Down
- a security risk that occurs when someone with authorized access to an organization's resources misuses that access to cause harm
- a secret word or phrase that must be used to gain admission to something. in this case,easily guessable or crackable by hackers, typically due to its short length, use of common words, personal information like names or birthdates, or predictable patterns
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- a type of malicious software designed to block access to a computer system until a sum of money is paid
- irrelevant or inappropriate messages sent on the internet to a large number of people
10 Clues: a malicious cyber attack that targets cloud-based systems, services, or data • when personal information is accessed, disclosed, or lost without authorization • irrelevant or inappropriate messages sent on the internet to a large number of people • a type of malicious software designed to block access to a computer system until a sum of money is paid • ...
Shared Services ICT 2023-07-16
6 Clues: Aplikasi ERP • Fungsi IT Operation • Pertamina Digital Signature • Multi-Factor Authentication • Platform Permintaan Layanan ICT • Jenis Cyber Attack untuk mencuri informasi pengguna
Cyber Physical Systems - 1 2025-03-20
Across
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- Processing data closer to the source rather than a central server.
- Study of control and communication in machines and living beings.
- A highly automated, connected, and intelligent manufacturing system.
- Internet-based computing providing storage and processing power.
- A network of connected devices that communicate over the internet.
- Using models to replicate real-world behaviors.
- Devices that detect and respond to physical changes.
- The ability of different systems to work together.
- Large volumes of data used for analytics and decision-making.
Down
- A decentralized and secure digital ledger technology.
- Combining different subsystems into a unified system.
- A virtual replica of a physical system for monitoring and analysis.
- A computing system integrated into a larger system.
- The capability of a system to function independently.
- Devices that convert electrical signals into mechanical motion.
- Related to manufacturing and production systems.
- The process of making systems operate without human intervention.
19 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Safety Moment - Team Building Edition 2015-04-21
Turning adjectives into nouns using the suffix ity. 2014-12-03
15 Clues: purity • ability • density • reality • security • divinity • immunity • activity • stupidity • community • simplicity • complexity • opportunity • nationality • responsibility
Collective nouns (for people) 2024-05-19
Adv. B 2024-02-05
step 12 2016-02-17
20 Clues: tulli • herra • rouva • neiti • baari • sukset • kärryt • portti • muistaa • odottaa • häämatka • hiekkaranta • matkalaukku • club yökerho • passintarkastus • in lähtöselvitys • area tupakointialue • check turvatarkastus • boss entinen esimies • time koneeseen siirtymisaika
SPOTLIGHT8 KPL7 s.166-167 2016-02-08
23 Clues: koe • sana • lupa • kysyä • uskoa • suukko • halaus • luvata • viesti • salasana • ongelmat • tapahtua • kuluttaa • kiusaaja • molemmat • oppitunti • salaisuus • keskustelu • rasistinen • valehtelija • turvallisuus • pyytää anteeksi • poissa tolaltaan
Psalms 23 2020-03-30
vocabulary 2025-01-08
Travelling 2025-11-10
23 Clues: juna • loma • pyörä • laiva • passi • matka • metro • tulli • taksi • kartta • lentäjä • turisti • saapuvat • lähtevät • lentokone • matkustaa • autolautta • konduktööri • matkalaukku • lentoemäntä • helikopteri • matkatavarat • turvatarkastus
4th Grade Spelling List #1 2025-09-17
20 Clues: gift • flee • pass • stay • color • trash • hoops • expert • handed • present • security • heaviness • time past • attraction • midsection • blood vessel • twisting injury • collection book • day after today • day before today
Victim support crossword 2022-09-02
19 Clues: sud • žalba • žrtva • krađa • napad • istraga • svjedok • ozljeda • ročište • pljačka • prekršaj • pritužba • optužnica • oštećenik • počinitelj • kazneno djelo • sigurnosne mjere • državni odvjetnik • ovlašteni tužitelj
INFO SEC PUZZLE 2024-11-11
9 Clues: DATA SECURITY • SENSITIVE TYPE • EASE OF ACCESS • NETWORK SECURITY • REQUIRED TO LOGIN • LATEST MALWARE TYPE • DATA CONFIDENTIALITY • DANGEROUS FOR COMPUTER • REQUIRED FOR HANDLING VIRUS
Kibernetička sigurnost 2025-07-01
9 Clues: software • demanding ransom • security barrier • computer program • of important data • scam to steal info • who breaks security • scrambling for safety • code to access account
Cluster Ja 001 2023-03-23
Across
- The VPN app of choice of Athena
- Our CEO
- New communication platform of choice replacing Google HangOuts
- Athena ____ form is used to lodge tickets for finance/payroll/tools/etc
- ___-A-Thon
- Athena's HMO provider
- Our new COO
- Executive Assistant is now known as Executive ___
Down
- Our PH Legal Entity Name
- An app used to provide a US number that can be used for calls and messages
- ___ Value Nominations
- Athena uses ___ Bank for payroll
- Time keep tool
- Our Operational Name
- Learning Platform that houses different training modules
- Athena ____ Services is responsible for coordinating client gift requests
- MDM is a security app provided by ___
17 Clues: Our CEO • ___-A-Thon • Our new COO • Time keep tool • Our Operational Name • ___ Value Nominations • Athena's HMO provider • Our PH Legal Entity Name • The VPN app of choice of Athena • Athena uses ___ Bank for payroll • MDM is a security app provided by ___ • Executive Assistant is now known as Executive ___ • Learning Platform that houses different training modules • ...
SGC Security Services: Key Concepts & Achievements 2026-01-27
Across
- Driving force behind SGC’s AI and technology adoption
- Regular process to ensure compliance and quality
- Approach to client relationships
- AI-driven analytics, digital vetting, reporting tools
- Service standard
- Technology used for monitoring and incident verification
- SIA Approved Contractor Scheme, NSI Guarding Gold, ISO certifications
- 24/7 operations hub for incident management
Down
- Core team members
- Meeting industry regulations and accreditations
- Ongoing requirement for all officers and supervisors
- Largest client sector, major healthcare contracts
- Strategy for keeping skilled staff
- Security company founded in 2006
- Over 30 years’ experience from the founder
- Prestigious awards evening for healthcare security
- Solutions for events, concerts, stadiums
17 Clues: Service standard • Core team members • Approach to client relationships • Security company founded in 2006 • Strategy for keeping skilled staff • Solutions for events, concerts, stadiums • Over 30 years’ experience from the founder • 24/7 operations hub for incident management • Meeting industry regulations and accreditations • ...
Travel 2024-05-20
17 Clues: taxi • agent • pilot • ticket • scales • customs • airport • copilot • takeoff • luggage • landing • suitcase • airplane • passport • departure board • flight attendant • security checkpoint
Cyber safety Samson kelly 2016-06-01
Across
- Where only you can go on it.
- Where you send a message.
- Something that blocks people from getting on you device.
- bully Being mean on the emailS.
- It's bits of information.
- You put stuff on it to show people.
- You ask to do it.
- A female who helps you at home.
- ages You don't have your own age.
Down
- A sick device.
- You put photos on it.
- A electronic with a keyboard.
- media you give information away.
- It blocks virusus.
- A large amount of Data not wanted.
- You make one when you get emails.
- A person who helps you at school.
- A website persuades you.
- A male who helps you at home.
19 Clues: A sick device. • You ask to do it. • It blocks virusus. • You put photos on it. • A website persuades you. • Where you send a message. • It's bits of information. • Where only you can go on it. • A electronic with a keyboard. • A male who helps you at home. • A female who helps you at home. • media you give information away. • bully Being mean on the emailS. • ...
Holidays 2022-10-26
Across
- horn of plenty
- Unstitched her arm to escape her creator
- gobbles
- fermented juice of apples
- android who has scissors for hands
- Red, shining nose
- Pocus black flame candle lit by Californian transplant
- Stole Christmas
- natural sleep aid
- Got on the wrong plane after searching for batteries in his dad’s bag
Down
- Fall back an hour
- Monday online sales after a weekend of feast
- shed leaves seasonally
- essential amino acid found in poultry
- Frost Old man winter’s variant
- Friday camp out for a deal, after holiday meal
- penny pincher who doesn’t want to help Tiny Tim
- tart red fruit of the holidays
- Alone Movie franchise where the solo protagonist outsmarts bad people
19 Clues: gobbles • horn of plenty • Stole Christmas • Fall back an hour • Red, shining nose • natural sleep aid • shed leaves seasonally • fermented juice of apples • Frost Old man winter’s variant • tart red fruit of the holidays • android who has scissors for hands • essential amino acid found in poultry • Unstitched her arm to escape her creator • Monday online sales after a weekend of feast • ...
Holidays 2022-10-26
Across
- Alone Movie franchise where the solo protagonist outsmarts bad people
- gobbles
- Red, shining nose
- Friday camp out for a deal, after holiday meal
- Pocus black flame candle lit by Californian transplant
- natural sleep aid
- android who has scissors for hands
- Frost Old man winter’s variant
- essential amino acid found in poultry
- tart red fruit of the holidays
Down
- shed leaves seasonally
- Monday online sales after a weekend of feast
- Stole Christmas
- horn of plenty
- penny pincher who doesn’t want to help Tiny Tim
- fermented juice of apples
- Unstitched her arm to escape her creator
- Got on the wrong plane after searching for batteries in his dad’s bag
- Fall back an hour
19 Clues: gobbles • horn of plenty • Stole Christmas • Red, shining nose • natural sleep aid • Fall back an hour • shed leaves seasonally • fermented juice of apples • Frost Old man winter’s variant • tart red fruit of the holidays • android who has scissors for hands • essential amino acid found in poultry • Unstitched her arm to escape her creator • Monday online sales after a weekend of feast • ...
9Health Crossword Bullying 2024-09-15
Across
- Do not
- What should you not do back?
- When someone doesn't include you
- Bullying someone can ruin someone self
- Spreading lies about people
- Bullying Online
- Someone who stands up for others
- Bullying someone by their skin colour
- Bullying someone because of their mental and physical condition
Down
- Age group that gets bullied the most
- Using private information to get something from someone
- A place where most bullying takes place at
- Using Words
- People go here to feel better
- Someone who just watches people being bullied
- making others do stuff they don't want to do
- When your getting bullied tell a trusted
- Bullying that ruins someones reputation
- what is the person being bullied called
- What is the person bullying called
20 Clues: Do not • Using Words • Bullying Online • Spreading lies about people • What should you not do back? • People go here to feel better • When someone doesn't include you • Someone who stands up for others • What is the person bullying called • Age group that gets bullied the most • Bullying someone by their skin colour • Bullying someone can ruin someone self • ...
CW-Gavin 2021-11-18
Across
- CLEAN AIR AND WATER ACTS regulate industrial waste disposal and other activities
- was the first major global supply chain
- ENVIRONMENTAL POLICY ACT requires the federal government to consider environment impact via
- AND SECURE TRADE-the FAST program is a trade initiative between the united states
- the most security from that and the most protection from weather
- SUPERFUND is the common name for a the comprehensive environmental response
- rail sidings are usually located from the normal shipping
- DOCK-are by far the most commonly used dock design in the united states
- available in a facility is more than just floor space
- workers must be able to retrieve the materials
Down
- any person who directly affects safely transportation
- SECURITY INITIATIVE-the goal of the CSI is to focus first on the ports
- Fences,Gates,Security,Guards,Lights
- volume expected to move through a warehouse
- DOCK- it consists of a platform that extend out from the extended building wall
- substance or material that the U.S department of transportation
- series of standards outlines a system for companies
17 Clues: Fences,Gates,Security,Guards,Lights • was the first major global supply chain • volume expected to move through a warehouse • workers must be able to retrieve the materials • series of standards outlines a system for companies • any person who directly affects safely transportation • available in a facility is more than just floor space • ...
How familiar are you with low level computer systems [university knowledge] 2024-04-09
Across
- Tool used for reverse engineering binaries
- What is the weakest link in the security chain
- The most common data transfer interface in Unix systems
- Superuser or administrator account in Unix-like operating systems
- A famous open-source kernel made by Linus Torvalds
- What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
- Process of single stepping through software instructions and resolving bugs
- We all hate this programming language obviously
- Modern OS-level containerization toolset (Hint: microservices architecture)
Down
- Assembly is converted into computer instructions through an...
- Systems storing user passwords are required to hash and...
- What famous BSD operating-system is known to be fixated with security?
- Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
- Common locking mechanism for programs that share memory or run in parallel
- A reliable but slow transport protocol
- Interface for a program to request services from the kernel
- A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.
17 Clues: A reliable but slow transport protocol • Tool used for reverse engineering binaries • What is the weakest link in the security chain • We all hate this programming language obviously • A famous open-source kernel made by Linus Torvalds • The most common data transfer interface in Unix systems • Systems storing user passwords are required to hash and... • ...
How familiar are you with low level computer systems [university knowledge] 2024-04-09
Across
- Tool used for reverse engineering binaries
- What is the weakest link in the security chain
- The most common data transfer interface in Unix systems
- Superuser or administrator account in Unix-like operating systems
- A famous open-source kernel made by Linus Torvalds
- What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
- Process of single stepping through software instructions and resolving bugs
- We all hate this programming language obviously
- Modern OS-level containerization toolset (Hint: microservices architecture)
Down
- Assembly is converted into computer instructions through an...
- Systems storing user passwords are required to hash and...
- What famous BSD operating-system is known to be fixated with security?
- Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
- Common locking mechanism for programs that share memory or run in parallel
- A reliable but slow transport protocol
- Interface for a program to request services from the kernel
- A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.
17 Clues: A reliable but slow transport protocol • Tool used for reverse engineering binaries • What is the weakest link in the security chain • We all hate this programming language obviously • A famous open-source kernel made by Linus Torvalds • The most common data transfer interface in Unix systems • Systems storing user passwords are required to hash and... • ...
what do you know? 2021-05-04
Across
- name-calling threatening
- attacks physically, emotionally, or socially
- it happens more than once over a period of time
- response to feeling or an event
- punching,kicking,spitting
- what percent of students report bullying
Down
- there is an intent to hurt or harm
- something happening over and over again
- moment getting hurt on accident once
- writing mean thing on Facebook, Instagram, or Twitter
- in intent to make fun of someone in a playful way
- spreading rumors, excluding people from games and groups
- being far away from everything/in your own space
13 Clues: name-calling threatening • punching,kicking,spitting • response to feeling or an event • there is an intent to hurt or harm • moment getting hurt on accident once • something happening over and over again • what percent of students report bullying • attacks physically, emotionally, or socially • it happens more than once over a period of time • ...
Test 2024-12-16
Across
- - Software designed to damage or disrupt systems.
- - A cyber attack that overwhelms a server.
- - Simulating an attack to identify vulnerabilities.
- - A software update to fix vulnerabilities.
- - Fraudulent attempts to obtain sensitive information via email.
- - A group of infected computers under a hacker’s control.
Down
- - A hacker engaged in activism.
- - Software that detects and removes malware.
- Engineering - Manipulating people to gain confidential info.
- Breach - Unauthorized access to confidential data.
- - Software that secretly gathers information about a person.
- - Unsolicited messages or emails.
- - Malicious software disguised as legitimate software.
13 Clues: - A hacker engaged in activism. • - Unsolicited messages or emails. • - A cyber attack that overwhelms a server. • - A software update to fix vulnerabilities. • - Software that detects and removes malware. • - Software designed to damage or disrupt systems. • Breach - Unauthorized access to confidential data. • - Simulating an attack to identify vulnerabilities. • ...
United Nations 2023-11-19
Across
- It is a platform for nations to address these issues
- This is one of the permanent members of the Security Council
- The ESCO stands for Educational, Scientific and Cultural ...
- This universal document about human rights was adopted in 1945
- Created after this war
- Each nation gets this number of votes
- Members discuss issues and then vote in this group
Down
- The Security Council can impose these on nations who are not following UN rules
- There are 17 goals aimed at ending poverty, protecting the planet and ensuring this for all
- There are this number of permanent members in the Security Council
- There are 193 ________ (members)
- This is the acronym for the World Health Organization
12 Clues: Created after this war • There are 193 ________ (members) • Each nation gets this number of votes • Members discuss issues and then vote in this group • It is a platform for nations to address these issues • This is the acronym for the World Health Organization • This is one of the permanent members of the Security Council • ...
Glossary of Stock Terms 2021-03-23
Across
- program covers medical care for low income pt
- long-term contract sold by life insurance companies
- financial professional
- individual adds signature to loan
- combined security holdings of a person
- person names in a will to receive benefits
- designed investment to reduce risk
Down
- date debt comes due for payment
- debt security issued by a corporation or government
- written instrument used to transfer money
- inability to pay outstanding debt
- cost of borrowed money
- general rise in price of goods
- distribution of earnings to shareholders
- periodic payment for an insurance policy
- certificate representing one unit of ownership
16 Clues: cost of borrowed money • financial professional • general rise in price of goods • date debt comes due for payment • inability to pay outstanding debt • individual adds signature to loan • designed investment to reduce risk • combined security holdings of a person • distribution of earnings to shareholders • periodic payment for an insurance policy • ...
Cyber safety 2015-02-24
Across
- environment where electronic communication occurs
- people you don't know
- relating to electronic communication
- pinching people information from the Internet
Down
- something you use to keep things safe.
- harassment by electronic communication
- a crime that is committed on the Internet
- being safe from risk or danger
8 Clues: people you don't know • being safe from risk or danger • relating to electronic communication • something you use to keep things safe. • harassment by electronic communication • a crime that is committed on the Internet • pinching people information from the Internet • environment where electronic communication occurs
security in e-commerce 2024-05-17
8 Clues: fire is on the walls • crime happened in cyber • ___________ is to protect data. • Virus has similar neme of Tarzon • these biscuits are baked in computers • unauthorised access to computer system • hide the identity by using fake e-mails • monitors information travelling over a network
Building Singapore's Defence 2025-05-26
Across
- – What we need as a nation to stand strong.
- – A type of defence involving emergency preparedness.
- – A goal of all types of defence.
- – Practising for emergencies.
Down
- – Singapore's military force.
- – Short for National Service.
- – The kind of defence that involves everyone.
- – Defence against online threats.
8 Clues: – Singapore's military force. • – Short for National Service. • – Practising for emergencies. • – Defence against online threats. • – A goal of all types of defence. • – What we need as a nation to stand strong. • – The kind of defence that involves everyone. • – A type of defence involving emergency preparedness.
Healthy Habits, Healthy You 2024-11-15
Across
- what the story is mostly about
- tools that make tasks easier or solve problems
- digital technology
- give more information about the main idea
Down
- signals or clues that help recognize danger
- something you do regularly
- practices that help keep your body clean and healthy
- feeling well in both body and mind
- choosing one thing in place of another
9 Clues: digital technology • something you do regularly • what the story is mostly about • feeling well in both body and mind • choosing one thing in place of another • give more information about the main idea • signals or clues that help recognize danger • tools that make tasks easier or solve problems • practices that help keep your body clean and healthy
FBI Crossword 2015-04-28
Across
- A person who takes an active role
- An action that is punishable by law
- Practice for the field
- To increase strength of an army or similar force
- Firearm
- Facts or details wether a belief or proposition is true
- To prevent possible riots or destruction
Down
- A private police force
- Metal covering worn by security
- Nation, state, or community
- An inquiry or study
- A person involved in work secretly
- Several states in which they form a unity
- A police patrol car
- An example of something occurring
15 Clues: Firearm • An inquiry or study • A police patrol car • A private police force • Practice for the field • Nation, state, or community • Metal covering worn by security • A person who takes an active role • An example of something occurring • A person involved in work secretly • An action that is punishable by law • To prevent possible riots or destruction • ...
Great Depression 2023-10-16
Across
- Roosevelt's way of making america better
- where people stood to get food
- a farm live
- farmers that used others land
- to remove against their will
- where businesses are bought, sold, or traded
- using the land to much
- a way to help people make money
- a long time without water
Down
- making to many goods
- a city life
- clouds of dust caused by over farming
- a time of economic distress
- security to help security of elders
- a new way created to communicate around the world
15 Clues: a city life • a farm live • making to many goods • using the land to much • a long time without water • a time of economic distress • to remove against their will • farmers that used others land • where people stood to get food • a way to help people make money • security to help security of elders • clouds of dust caused by over farming • Roosevelt's way of making america better • ...
Sadlier Unit 11 Crossword puzzle 2023-03-15
Chapter 5 A2 2025-05-15
16 Clues: zeker • volgen • onjuist • bezorgd • opnemen • verlopen • aanpassen • vermoeiend • bevredigend • verwijderen • beïnvloeden • onpartijdig • reclamespot • beveiliging • beïnvloeden • zoekopdracht
15.11.2022 words 2022-11-15
15 Clues: выборы • терять • ученый • реклама • поймать • счастье • покидать • важность • движение • выбирать • ассистент • зависимость • удовольствие • безопасность • правительство
world cup news 2022-11-25
15 Clues: tuki • lähtö • kärsiä • vakava • vastaan • vartija • väitetty • pidätetty • syytökset • pysytteli • tarkastelu • osallistujat • seuraamukset • takavarikoida • osallistuminen
Cybersecurity Basics #1 2024-09-17
Across
- The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
- Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
- Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
- Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
- Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
- Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
- A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
- A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
- To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
- To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.
10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen. • To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn. • Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only. • ...
Precious's Crossword 2023-09-21
Across
- Being sad or having discomfort
- When someone tries to force you into doing something
- Able to do or make happen
- A Requirement That Makes A Goal About Yourself
- Class where were gonna learn about our bodys
- A vegetable Ms.Hookano Recommended
- The main thing we learned about in class
- Our school
- Something our class keeps having to talk about
- The thing we sit under for P4c
Down
- A type of food that is good for the body
- The Activity
- The Period We are
- Something Mobile to Stay healthy
- The Third Requirement For Goal Setting
- Something That Has become an issue The Internet
16 Clues: Our school • The Activity • The Period We are • Able to do or make happen • Being sad or having discomfort • The thing we sit under for P4c • Something Mobile to Stay healthy • A vegetable Ms.Hookano Recommended • The Third Requirement For Goal Setting • A type of food that is good for the body • The main thing we learned about in class • ...
Elida vocabulary hints 2015-04-29
Across
- bully bullying online.
- writing that has been copied from someone else work.
- someone who access to your computer file.
- connected computers.
Down
- network is facebook,snapchat,instagram,twitter.
- a law that protects your work.
- network of thousands of other computer networks.
- use a copyright law that provides educate.
8 Clues: connected computers. • bully bullying online. • a law that protects your work. • someone who access to your computer file. • use a copyright law that provides educate. • network is facebook,snapchat,instagram,twitter. • network of thousands of other computer networks. • writing that has been copied from someone else work.
Recent trends in accounting 2024-01-23
Across
- financial data from cyber threats (13)
- reporting on environmental and social impact (3,4)
- from compliance to strategic guidance (9)
- in the virtual cloud (6)
Down
- large datasets for financial insights (12)
- blockchain for tamper-proof transactions (9)
- data entry using software (10)
- AI to reduce repetitive tasks (7)
8 Clues: in the virtual cloud (6) • data entry using software (10) • AI to reduce repetitive tasks (7) • financial data from cyber threats (13) • from compliance to strategic guidance (9) • large datasets for financial insights (12) • blockchain for tamper-proof transactions (9) • reporting on environmental and social impact (3,4)
Cells 2013-09-17
Across
- 'Brain' of the cell
- Protein Producers
- Contains digestive enzymes
- Jellylike substance
- 'Powerhouse' of the cell
- Transports materials through the cell from the Golgi Body
- Gives it the most structure and strength
- 'Security Guard' of the Nucleus
- Transports materials through the cell and produces protein
- 'Garbage disposer' of the cell
- Contains DNA of the cell
Down
- The Skeleton of the Cell
- 'Security Guard' of the Cell
- Only found in animal cells and are located near the nucleus
- Transports materials through the cell
- Photosynthesis happens in, and contains chlorophyll
- Surrounded by only a single membrane, doesn't contain DNA or Ribosomes
17 Clues: Protein Producers • 'Brain' of the cell • Jellylike substance • The Skeleton of the Cell • 'Powerhouse' of the cell • Contains DNA of the cell • Contains digestive enzymes • 'Security Guard' of the Cell • 'Garbage disposer' of the cell • 'Security Guard' of the Nucleus • Transports materials through the cell • Gives it the most structure and strength • ...
Security Awareness Campaign 2025 2025-10-28
Across
- phishing via sms/text messages
- copy of data for recovery
- browser add-ons that pose a supply chain risk
- what should you do if you suspect a security incident?
- malware that locks files for money
- access rights granted to a user
- phishing via voice/phone call
- malicious software
Down
- If a customer asks for security documents or compliance information, where should you direct them?
- policy for how long data is kept
- tool to store and generate credentials
- virtual private network (acronym)
- unauthorized physical entry
- uncontrolled spread of data copies
- records keystrokes to steal passwords
- adherence to rules/regulations
- social engineering via email
17 Clues: malicious software • copy of data for recovery • unauthorized physical entry • social engineering via email • phishing via voice/phone call • phishing via sms/text messages • adherence to rules/regulations • access rights granted to a user • policy for how long data is kept • virtual private network (acronym) • uncontrolled spread of data copies • ...
