cyber security Crossword Puzzles

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. The consequences of taking money out of your retirements account before the required age
  2. represents a loan from the buyer to the issuer
  3. federal payroll tax that is deducted from each paycheck to pay for others' social security and earns credits that you will supposedly be paid when you receive social security
  4. the 60 day period after leaving your company to move the money in your 401k into a new 401k
  5. intrest on intrest
  6. the amount of years until social security is expected to run out
  7. cash from a large group of investors to invest in stocks, bonds and other securities
  8. digital currency backed by nothing except public impression
  9. a fund where your money is diversified across multiple companies, giving you a more diverse profile
  10. the maximum amount of money you can put into the IRA per year
  11. The increase in the value of an asset
  12. in a traditional IRA, once you turn 73 you must begin taking out a minimum amount of money from the account each year
  13. animal representing a bad market
  14. a unique brief combination of letters that represents the company's stocks
  15. the number of days you have to rollover your 401k after leaving a company
Down
  1. the age you collect social security
  2. investing a small sum regularly into a fund
  3. the age you start investing
  4. the money made overtime
  5. when someone trades based on information on a company because it is announced to the public
  6. you can put in up to $7000 per year into this retirement account pre-tax but will be taxed when you take the money out
  7. a sum of money saved or made available for a particular purpose
  8. you can put in up to $7000 per year into this retirement account post-tax and will not be taxed when you take the money out
  9. animal representing a good market
  10. investing a big sum into a fund at once
  11. expected to run out in 2031
  12. expected to run out in 2033
  13. unionized workers receive this when they retire
  14. when you are guaranteed to receive 100% of the money the company you work for matched for your 401k
  15. a retirement account managed by your employer that will pay you once you retire a certain percentage of your average salary over the course of specified years
  16. a security that represents the ownership of a peice of a company

31 Clues: intrest on intrestthe money made overtimethe age you start investingexpected to run out in 2031expected to run out in 2033animal representing a bad marketanimal representing a good marketthe age you collect social securityThe increase in the value of an assetinvesting a big sum into a fund at onceinvesting a small sum regularly into a fund...

Internet Safety 2025-03-04

Internet Safety crossword puzzle
Across
  1. Testing Security For Images To Prevent Theft And Fakes secure from hackers, crooks, and internet thieves
  2. Make your posts 'friends only' so that only people you know get to see them. If you need to share your phone number or other private information with a friend, do so in a private message - not in a public post.
  3. Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
  4. Adults seeking to abuse children will go where kids are. As a result, grooming can theoretically happen just about anywhere online
  5. Never get into 'flaming' someone else on an online forum (ie. insulting them or getting into heated arguments)
  6. Privacy settings are configurations on digital platforms that allow users to control their personal information and how it is shared with others.
  7. After all, capital letters on the internet mean shouting and are generally considered impolite.
  8. While cybersecurity protects devices and networks from harm by third parties, Online Safety protects the people using them from harm by the devices and networks (and therefore third parties) through awareness, education, information and technology.
  9. Respect the privacy of others. This rule should be followed not only in everyday use of online
  10. A cookie is a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
Down
  1. November 2021) Flaming, also known as roasting, is the act of posting insults, often including profanity or other offensive language, on the internet.
  2. Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact.
  3. Tell your children they do not have to accept any online activity meant to intimidate, threaten, tease, or harm them or anyone else
  4. recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
  5. Identity theft is the act of stealing a specific person's identifying information and then using it to pretend to be that particular individual. So identity theft can sometimes
  6. You can help limit the potentially damaging impact of your online presence by searching for yourself, setting alerts and tightening your privacy settings.
  7. A website that lets users keep a journal or diary on any subject they like and leave comments on other users' posts.
  8. An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
  9. The use of hacking, malware attacks, or other cyber activity in which an unauthorized user attempts to access sensitive data or intellectual property
  10. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.

20 Clues: Respect the privacy of others. This rule should be followed not only in everyday use of onlineAfter all, capital letters on the internet mean shouting and are generally considered impolite.Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet....

Vocabulario #6 (es2) - write translations! 2022-10-31

Vocabulario #6 (es2) - write translations! crossword puzzle
Across
  1. – window
  2. – departure
  3. – Cancelled
  4. – counter
  5. – backpack
  6. – Passport
  7. – flight
  8. – aisle
Down
  1. – passenger
  2. – trip
  3. – seat
  4. – pilot
  5. – security
  6. - delayed
  7. – to travel
  8. – luggage

16 Clues: – trip– seat– pilot– aisle– window– flight– counter- delayed– luggage– security– backpack– Passport– passenger– departure– Cancelled– to travel

Circle of Security 2021-03-12

Circle of Security crossword puzzle
Across
  1. When possible follow your child's __________.
  2. It is never too ______ to be a good parent.
  3. Whenever necessary, take _____________.
  4. _____________ Firmness and Affection.
  5. Change child by changing your ___________.
  6. Babies naturally seek ____________.
  7. Name callers are ____________.
  8. Children need us to be________.
Down
  1. Knowing we are loved gives us ___________.
  2. Children need us to be ______________.
  3. Security teaches a baby to feel __________.
  4. Know you can NOT be _________,and that is ok.
  5. Without knowledge children can feel________.
  6. Babysitters should be over age _____.

14 Clues: Name callers are ____________.Children need us to be________.Babies naturally seek ____________._____________ Firmness and Affection.Babysitters should be over age _____.Children need us to be ______________.Whenever necessary, take _____________.Knowing we are loved gives us ___________.Change child by changing your ___________....

Unit 2 Vocabulary: The Human Factor 2023-10-13

Unit 2 Vocabulary:  The Human Factor crossword puzzle
Across
  1. Deceptive schemes or rumors created with the intent to mislead or trick people. They are typically spread through various channels, including social media, email, or other forms of communication.
  2. A formal set of rules, guidelines, or principles established by an organization to govern its operations and decision-making. Often outline security procedures and best practices.
  3. A form of cyberattack where attackers impersonate legitimate organizations or individuals to trick recipients into revealing sensitive information like login credentials, personal details, or financial data. It's often done through deceptive emails, websites, or messages.
  4. A type of phishing that occurs through text messages or SMS. Attackers send fraudulent messages that may contain malicious links or ask for sensitive information.
  5. A tactic where an attacker manipulates individuals into approaching them for information or assistance. The attacker, in this case, positions themselves as a helpful resource to extract information or gain access.
  6. The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations.
  7. Occurs when an unauthorized person gains physical access to a restricted area or building by following an authorized person without their knowledge or consent.
  8. To reduce or lessen the severity or impact of a problem or risk. It involves taking steps to minimize the potential harm from security threats or vulnerabilities.
Down
  1. A method used by individuals to manipulate, deceive, or trick people into revealing confidential information or taking actions that compromise security. It relies on psychological manipulation and often involves impersonating a trusted entity to gain unauthorized access to sensitive data or systems.
  2. A form of social engineering where the attacker creates a fabricated scenario to obtain information or gain trust. This often involves impersonating someone else, such as a co-worker, to trick individuals into divulging sensitive data.
  3. A social engineering technique that involves offering something enticing (e.g., a free download, software, or a physical device) to lure individuals into taking actions that compromise their security, such as downloading malicious software or revealing sensitive information.
  4. A detailed step-by-step process or set of actions that need to be followed to accomplish a specific task or objective. Often provide instructions on how to implement security measures or respond to security incidents.
  5. The act of spying on someone's computer screen or keypad from a close distance to obtain sensitive information, such as login credentials, PINs, or personal data, without their knowledge or consent.
  6. Refers to the practice of collecting and analyzing information from publicly available sources, such as social media, websites, and news articles, to gather intelligence about individuals, organizations, or events.
  7. Involves rummaging through trash or discarded materials, such as documents, hard drives, or electronic devices, in search of information that can be used for malicious purposes, like identity theft or data breaches.
  8. A social engineering technique that uses phone calls to deceive individuals into revealing personal or financial information. Attackers often impersonate trusted entities to gain the victim's trust.
  9. A specialized form of spear-phishing that specifically targets high-profile individuals, such as executives or senior management within an organization. The goal is to steal sensitive information or gain access to their accounts.
  10. A highly targeted form of phishing that focuses on a specific individual, organization, or department. Attackers conduct detailed research to personalize their phishing attempts, making them more convincing.
  11. A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information.
  12. Malicious software or deceptive advertisements that exploit fear or intimidation to trick users into purchasing fake security software or taking actions that compromise their computer's security. Often displays false alerts about non-existent threats to scare users into paying for a solution.

20 Clues: A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information.The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations....

Stock Market Terms Crossword 2020-05-13

Stock Market Terms Crossword crossword puzzle
Across
  1. is a period of sustained increases in the prices of stocks, bonds or indices (1wd)
  2. is a huge company with an excellent reputation. (3wd)
  3. an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it (4wd)
  4. the amount by which the ask price exceeds the bid price for an asset in the market (3wd)
  5. to give/hand over in exchange for money (1wd)
  6. type of order to purchase or sell a security at a specified price or better.(2wd)
  7. the buying of a stock, commodity, or currency with the expectation that it will rise in value (2wd)
  8. an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset, rather than being expensed in the period the cost was originally incurred (1wd)
  9. the process of offering shares of a private corporation to the public in a new stock issuance. (1wd/3wd)
  10. a marketplace where securities, commodities, derivatives and other financial instruments are traded (1wd)
  11. alternative investments using pooled funds that employ different strategies to earn active return, or alpha, for their investors (4wds)
  12. a unique series of letters assigned to a security for trading purposes(2wd)
  13. the condition of the financial market in which prices are rising or expected to rise.(2wd)
  14. a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed. (2wd)
  15. a trader who executes a large volume of short and long trades to capitalize on intraday market price action (2wd)
  16. the lowest price a shareholder is willing to part with shares (1wd)
  17. the marketplace where various national currencies are traded.(1wd)
  18. a grouping of financial assets such as stocks, bonds, commodities, currencies and cash equivalents, as well as their fund counterparts, including mutual, exchange-traded and closed funds (1wd)
Down
  1. an investing strategy in which a stock owner purchases additional shares of a previously initiated investment after the price has dropped further. (2wd)
  2. the completion of a buy or sell order for a security.(1wd)
  3. the maximum number of shares that a corporation is legally permitted to issue (2wd)
  4. the money borrowed from a brokerage firm to purchase an investment. It is the difference between the total value of securities held in an investor's account and the loan amount from the broker (1wd)
  5. a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock(1wd/4wds)
  6. the ease with which an asset, or security, can be converted into ready cash without affecting its market price (1wd)
  7. the total quantity of shares or contracts traded for a specified security. (2wd)
  8. a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations.(2wd)
  9. a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market.(2wd)
  10. an individual or firm that acts as an intermediary between an investor and a securities exchange.(1wd)
  11. the highest price an investor is willing to pay for a share (1wd)
  12. a statistical measure of the dispersion of returns for a given security or market index. (1wd)
  13. the portion of shares of a corporation that are in the hands of public investors (2wd)
  14. the last price at which a security or commodity traded, meaning the most recent price to which a buyer and seller agreed and at which some amount of the asset was transacted(1wd)
  15. to purchase/obtain in exchange for payment (1wd)
  16. an asset that tracks a particular set of equities, similar to an index.(1wd/4wds)
  17. the sale of new or closely held shares by a company that has already made an initial public offering (2wd)
  18. when a market experiences prolonged price declines (2wd)
  19. the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders.(1wd)
  20. the earnings generated and realized on an investment over a particular period of time(1wd)
  21. an area of the economy in which businesses share the same or a related product or service(1wd)
  22. a measure of the volatility, or systematic risk, of a security or portfolio, in comparison to the market as a whole (1wd)

40 Clues: to give/hand over in exchange for money (1wd)to purchase/obtain in exchange for payment (1wd)is a huge company with an excellent reputation. (3wd)when a market experiences prolonged price declines (2wd)the completion of a buy or sell order for a security.(1wd)the highest price an investor is willing to pay for a share (1wd)...

ONLINE SAFETY CROSSWORD 2013-01-31

ONLINE SAFETY CROSSWORD crossword puzzle
Across
  1. If you find something inappropriate, ____ it.
  2. Another word for the internet
  3. Keep all of your information ______
  4. Computers are often open to _____
  5. If anything happens online, tell an ______
  6. Do not send on _________ to your friends
Down
  1. Only let your ______ see your personal information
  2. Rarely any free offers that come up online are actually ____
  3. The age you must be to go on YouTube
  4. Many online offers are _____

10 Clues: Many online offers are _____Another word for the internetComputers are often open to _____Keep all of your information ______The age you must be to go on YouTubeDo not send on _________ to your friendsIf anything happens online, tell an ______If you find something inappropriate, ____ it.Only let your ______ see your personal information...

Futuristic cities 2024-06-28

Futuristic cities crossword puzzle
Across
  1. - Bright, glowing lights often used in signs.
  2. - To move instantly from one place to another.
  3. - A place where spacecraft are launched and landed.
  4. - A machine that can perform tasks automatically.
  5. - A 3D image created with lasers.
Down
  1. - A very tall building.
  2. - A vehicle that floats above the ground.
  3. - A robot that looks like a human.
  4. - Relating to computers or technology.
  5. - An unmanned aerial vehicle.

10 Clues: - A very tall building.- An unmanned aerial vehicle.- A 3D image created with lasers.- A robot that looks like a human.- Relating to computers or technology.- A vehicle that floats above the ground.- Bright, glowing lights often used in signs.- To move instantly from one place to another.- A machine that can perform tasks automatically....

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons crossword puzzle
Across
  1. what car manufacturer made the first modern driverless car
  2. data should not be kept longer than
  3. who is exempt from the data protection act
  4. all personal data should be kept
  5. the owner of the data
Down
  1. the DPA has 8
  2. police, government and taxers all all ______ from the DPA
  3. a form of cyber-bullying
  4. data must be routinely for maximum protection
  5. data should be used

10 Clues: the DPA has 8data should be usedthe owner of the dataa form of cyber-bullyingall personal data should be keptdata should not be kept longer thanwho is exempt from the data protection actdata must be routinely for maximum protectionpolice, government and taxers all all ______ from the DPAwhat car manufacturer made the first modern driverless car

Code B 2023-12-07

Code B crossword puzzle
Across
  1. Programming language for web development
  2. Process of identifying and fixing errors in code
  3. Function that calls itself
  4. Repeating a process or set of instructions
  5. Markup language for creating web pages
Down
  1. Application Programming Interface for software communication
  2. Prefix related to computers and digital technology
  3. Graphical User Interface for user interaction
  4. Symbol indicating a specific operation in code
  5. Set of rules governing the structure of code

10 Clues: Function that calls itselfMarkup language for creating web pagesProgramming language for web developmentRepeating a process or set of instructionsSet of rules governing the structure of codeGraphical User Interface for user interactionSymbol indicating a specific operation in codeProcess of identifying and fixing errors in code...

ICT Related Terms 2025-02-03

ICT Related Terms crossword puzzle
Across
  1. a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems Users are typically
  2. is a binary digit, the smallest increment of data on a computer.
  3. Browser It's a program on your computer that allows you to connect to the Internet to visit websites, download files, and applications.
  4. is a network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital information for processing.
  5. - is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  6. short for "malicious software," refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
  7. a range of frequencies within a given band, in particular that used for transmitting a signal, the transmission capacity of a computer network or other telecommunication system.
  8. is a type of malware that spreads copies of itself from computer to computer.
  9. is a malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.
Down
  1. are text files with small pieces of data like a username and password that are used to identify your computer as you use a computer network.
  2. is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.... It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
  3. is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system.
  4. the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1....
  5. is the transmission of wide bandwidth data over a high-speed internet connection.
  6. an electronic communication setwork that connects computer networks and organizational computer facilities around the world used with except when being used attributively.
  7. stands for the Completely Automated Public Turing test to tell Computers and Humans Apart.
  8. the act or an instance of shutting down and restarting something (such as a computer or program).
  9. is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use.
  10. Wide Web is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hyperlinks, and are accessible over the Internet.
  11. Space is an amount of computer storage space on random-access memory devices, such as on a hard drive, floppy or USB flash drive.

20 Clues: is a binary digit, the smallest increment of data on a computer.is a type of malware that spreads copies of itself from computer to computer.is the transmission of wide bandwidth data over a high-speed internet connection.stands for the Completely Automated Public Turing test to tell Computers and Humans Apart....

Krzyżówka Angielski 2025-12-10

Krzyżówka Angielski crossword puzzle
Across
  1. The right to keep personal data protected.
  2. Learning skills or knowledge.
  3. Records of system activities.
  4. Studying information to understand it.
  5. Connected computers that share data.
  6. Instructions written for computers.
  7. A direct instruction given to a computer.
  8. The chance that something bad may happen.
  9. Use of technology to perform tasks without human input.
  10. A break in security where data is exposed.
  11. Rules about what is morally right or wrong.
  12. The ability to manage or direct something.
  13. A system on which applications can run.
  14. A tool that blocks unwanted network traffic.
  15. Continuous flow of data.
  16. A simplified digital structure used to predict or analyze.
  17. A tool used to explore or test a system.
  18. A call for data or a service.
  19. To follow the path of an action or data flow.
  20. Following laws, rules, or standards.
  21. Official rule made by authorities.
  22. Something unusual that may signal a problem.
  23. Monitoring to make sure rules are followed.
  24. Protection against threats or attacks.
  25. An event that disrupts normal operations.
  26. A saved copy of data in case of loss.
  27. A step taken to solve a problem.
  28. A set of rules for communication.
  29. Searching for threats inside a network.
  30. Proof of an event or action.
  31. A formal review of systems or processes.
  32. A prediction based on information.
  33. To watch or track activity.
  34. A request for information from a database.
  35. A user identity in a system.
Down
  1. A sign that danger or problems may occur.
  2. Unauthorized entry into a system.
  3. A formal rule or guideline.
  4. A document describing an event or findings.
  5. A specific area or internet address space.
  6. Long-term storage of old files.
  7. A computer that provides resources to others.
  8. A place where data is kept.
  9. A piece of hardware used in computing.
  10. Delay in data communication.
  11. A set of connected computer components.
  12. Someone who monitors or watches activity.
  13. Programs used by a computer.
  14. A risk or danger.
  15. Related to money or cost.
  16. A part of a larger software system.
  17. The way a system or user acts.
  18. Related to investigating cyber incidents.
  19. Accidental or unlawful release of information.
  20. To check a system for issues or threats.
  21. A connection point in a network.
  22. A secret code to access a system.
  23. Numerical information used for analysis.
  24. Belief that someone or something is reliable.
  25. A person or system chosen for attack.
  26. Too much data or activity for a system to handle.
  27. A weakness that can be exploited.
  28. Converting information into a secure code.
  29. The path data takes to reach a destination.
  30. Permission to use or enter a system.
  31. Measurements used to evaluate performance.
  32. Information stored or processed by computers.

67 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.A place where data is kept.To watch or track activity.Delay in data communication.Programs used by a computer.Proof of an event or action.A user identity in a system.Learning skills or knowledge.Records of system activities.A call for data or a service....

Finance 2024-03-13

Finance crossword puzzle
Across
  1. A percentage of the amount borrowed that a user of a loan must pay the lender.
  2. What's the commonly used acronym for a marketable security that tracks a stock?
  3. A number between 300 & 850 that determines a person's creditworthiness.
  4. When a person or organization owes money to someone else is called as ______.
  5. What do you call a legal entity created by an individual in which one person or institution holds the right to manage property or assets for the benefit of someone else?
  6. What is the coefficient that measures risk-adjusted performance, factoring in the risk due to the specific security, rather than the overall market?
  7. Goods or services that are required for survival but are desired are called as _______.
  8. What term is used to describe the range of price swings of a security or market over time? market over time?
  9. A way to spend money wisely by calculating net income and expenses to see what you spend your money on.
  10. What is the amount of current income provided by an investment?
Down
  1. What is the abbreviation of a type of retirement account in which contributions are deductible from earned income in the calculation of federal and state income taxes if the taxpayer meets certain requirements?
  2. What financial products value is based on an underlying security, commodity or other financial instrument?
  3. What kind of contract is standardized, transferable, and exchange-traded and requires delivery of a commodity, bond, currency, or stock index, at a specified price, on a specified future date?
  4. What do you call evidence of a debt in which the issuer promises to pay the holders of this financial product a specified amount of interest and to repay the principal at maturity?
  5. What do you call evidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options)?
  6. COST The potential loss of other alternatives due to choosing another alternative.
  7. What kind of funds does a hedge fund use to earn alpha for its investors?
  8. What is a type of trust created by a person during his or her lifetime?

18 Clues: What is the amount of current income provided by an investment?A number between 300 & 850 that determines a person's creditworthiness.What is a type of trust created by a person during his or her lifetime?What kind of funds does a hedge fund use to earn alpha for its investors?...

Air Force Career: Cyber Surety 2021-11-17

Air Force Career: Cyber Surety crossword puzzle
Across
  1. From programming to _____, these experts keep our systems and our information safe.
  2. Responsible for cybersecurity of national ____ systems.
  3. Minimum Education: High School ______
  4. ASVAB requirement
Down
  1. Completion of 8.5 weeks of Basic _____Training
  2. Enforce national, DoD, and Air Force security policies and _________
  3. Status: Enlisted Airmen with credits earned towards _______ Systems Technology
  4. Ensure all systems comply with ____ security standards.
  5. Training: 50 ____

9 Clues: Training: 50 ____ASVAB requirementMinimum Education: High School ______Completion of 8.5 weeks of Basic _____TrainingEnsure all systems comply with ____ security standards.Responsible for cybersecurity of national ____ systems.Enforce national, DoD, and Air Force security policies and _________...

WRS 15 & 16 - DA Puzzle 2023-12-01

WRS 15 & 16 - DA Puzzle crossword puzzle
Across
  1. data converted into a meaningful and useful context
  2. malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
  3. using the Internet for anything other than work tasks
  4. includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
  5. the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
  6. pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
  7. to support with evidence or authority; to make more certain
  8. a particular preference or point of view that is personal, rather than scientific.
  9. malware that accesses or controls a device without being detected
  10. a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
  11. something that furnishes proof
  12. the protection of information systems against unauthorized access (e.g., hacking, identity theft)
  13. believable; reliable
  14. a flaw or weakness that allows a threat agent to bypass security
  15. a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
  16. using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
  17. a website that allows people of similar interests to interact and exchange information that is typically personal
Down
  1. the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
  2. connected with or related to the matter at hand
  3. unbiased; neutral
  4. using the Internet, ethically, for work-related tasks
  5. a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
  6. unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
  7. the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
  8. cyber attack that targets the server side to get customer information from the database, such as credit card numbers
  9. book, article, person, or other resource consulted for information.
  10. examine and judge carefully
  11. attacks focused on the workplace Network workers access.
  12. malware that spreads by users from an infected device to the rest of the devices on a network/system

29 Clues: unbiased; neutralbelievable; reliableexamine and judge carefullysomething that furnishes proofconnected with or related to the matter at handdata converted into a meaningful and useful contextusing the Internet, ethically, for work-related tasksusing the Internet for anything other than work tasks...

Newsletter 2024-06-17

Newsletter crossword puzzle
Across
  1. What term describes an ethical hacker who uses their skills to improve cybersecurity
  2. what acts as a barrier between a trusted internal network and an untrusted external network.
  3. What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
  4. What term in cybersecurity is responsible for defending against simulated or real attacks.
  5. What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
  6. What technology stores recently accessed data to speed up future acess
  7. What type of malware will self-replication and spread independently across networks.
  8. What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
  9. What term refers to the physical components of a computer system.
  10. What term refers to a group of interconnected computers or other devices that can communicate with each other.
  11. What term refers to testing a computer system, network, or web application to find security vulnerabilities?
  12. What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
  13. what term refers to a collection of data or computer instructions that tell a computer how to work.
  14. What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
  15. What group within an organization is responsible for simulating attacks against their own organization to test security measures.
  16. What term refers to a fixed-size output of a hash function that represents input data?
Down
  1. What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
  2. What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
  3. What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
  4. What term refers to when someone is trying to disguise themselves as being a trusted known source.
  5. What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
  6. What type of software attaches itself to a legitimate program and spreads once the program is run.
  7. What term describes unauthorized use of someone else's computer to mine cryptocurrency?
  8. What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
  9. What type of malware encrypts a victim’s files and demands payment for the decryption key?
  10. What field of study involves techniques for secure communication in the presence of third parties?
  11. What protocol translates domain names into IP addresses?
  12. What term refers to a record of events that happen within an operating system, application or network device.
  13. What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.

29 Clues: What protocol translates domain names into IP addresses?What term refers to the physical components of a computer system.What technology stores recently accessed data to speed up future acessWhat term describes an ethical hacker who uses their skills to improve cybersecurity...

DORA christmas 2024-12-15

DORA christmas crossword puzzle
Across
  1. What must cryptographic keys be protected against throughout their lifecycle?
  2. What is the name of the Dutch IT-association that published the first DORA-control framework?
  3. "The control team lead shall select at least three ********* to conduct the TLPT, on the basis of all of the following elements: (a) the recommendation by the threat intelligence provider and the threat-led nature of each scenario; (b) the input provided by the test managers; (c) the feasibility of the proposed scenarios for execution, based on the expert judgement of the testers; (d) the size, complexity and overall risk profile of the financial entity and the nature, scale and complexity of its services, activities and operations."
  4. What technique can be used in network design to limit contagion during cyber attacks?
  5. The **** plan with a third party must be based on realistic scenarios and assumptions.
  6. Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
  7. What must financial entities use for advanced testing of ICT tools?
  8. How often per year should a review of access rights for ICT systems that support critical or important functions be performed
  9. What percentage of affected clients using a service meets the materiality threshold for major incidents?
  10. What must ICT security policies ensure regarding data?
Down
  1. Information of subcontractors should **** be in the Register of Information that effectively underpin ICT services supporting critical or important functions or material parts thereof.
  2. What is the main subject matter of DORA?
  3. Who is responsible for implementing the ICT risk management framework in financial entities?
  4. What must financial entities report to relevant authorities?
  5. "The Register of Information has six criteria: Financial entities shall ensure that the information contained in the templates referred to in paragraph 1 adhere to the following principles of data quality. Five of them are: accuracy; completeness; integrity; uniformity; validity. What is the six criteria?"
  6. What must be promptly renewed to ensure ongoing security?
  7. What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
  8. We enter the run phase of DORA. The ICT framework should be reviewed yearly. This report is quite extensive. So early start is important. Internal ***** should also start early to ***** this ICT Framework.
  9. How frequently should vulnerability scanning be performed on critical ICT assets?
  10. What should financial entities have to ensure data restoration?

20 Clues: What is the main subject matter of DORA?What must ICT security policies ensure regarding data?What must be promptly renewed to ensure ongoing security?What must financial entities report to relevant authorities?What should financial entities have to ensure data restoration?What must financial entities use for advanced testing of ICT tools?...

Information Age, Biodiversity and the Healthy Society. 2025-03-19

Information Age, Biodiversity and the Healthy Society. crossword puzzle
Across
  1. The disparity between individuals, communities, and countries in accessing and utilizing digital technologies, which affects economic opportunities, education, and social progress.
  2. The development of writing systems like cuneiform and hieroglyphics, along with postal services such as those used by the Persian and Roman empires.
  3. National parks and wildlife reserves preserve biodiversity by providing secure habitats. Their effectiveness depends on strong management, law enforcement, and community engagement, though they face challenges like habitat loss, illegal activities, and climate change.
  4. Aids conservation through remote sensing, GIS, drones, and AI for monitoring species and ecosystems. Environmental DNA (eDNA) helps detect species presence, improving conservation efficiency and accuracy.
  5. A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide.
  6. Disrupts biodiversity by altering habitats, food chains, and species distribution. Rising temperatures, extreme weather, and ocean acidification threaten marine and terrestrial ecosystems.
  7. The increasing use of cloud storage, combined with poor security configurations, weak access controls, and insufficient encryption, raises vulnerability to cyber threats.
  8. Medications prescribed, managed, and delivered remotely through telehealth platforms, digital pharmacies, and e-prescription services, allowing patients to receive treatment without in-person visits.
  9. Scientists have successfully bred this species as part of efforts to restore the woolly mammoth.
  10. AI and data-driven decisions can reinforce societal biases, resulting in unfair treatment in employment, financial services, and law enforcement.
  11. Negative attitudes and stereotypes toward individuals with mental health conditions, leading to discrimination and discouraging people from seeking necessary care.
  12. The presence of diverse crops, livestock, and beneficial microorganisms that sustain farm productivity and ecosystem health, ensuring food security and environmental stability.
  13. The ability to obtain necessary medical services without financial, geographical, or systemic obstacles. Despite its importance, many individuals still struggle with healthcare accessibility.
Down
  1. The reduction of plant, animal, and microorganism species due to deforestation, pollution, climate change, and habitat destruction. Declining biodiversity weakens ecosystems, impacting air, water, and food supply. Protecting habitats and reducing pollution can help slow this loss.
  2. The introduction of printing and early mass communication, notably with Gutenberg’s printing press in the 1440s, which transformed information dissemination.
  3. The exchange of information through digital methods, including emails, text messages, social media, and video calls. It relies on electronic devices and the internet for efficient data transmission.
  4. Many users unknowingly accept data collection due to complex terms of service, raising doubts about the validity of their consent.
  5. Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages.
  6. Plays a key role in conserving and enhancing biodiversity within cities. Proper planning can prevent habitat fragmentation and support native species while benefiting human well-being.
  7. The imitation of human intelligence in machines, enabling them to learn, reason, solve problems, understand language, and make decisions.

20 Clues: Scientists have successfully bred this species as part of efforts to restore the woolly mammoth.A significant environmental problem affecting air, water, and soil quality, posing serious risks to public health worldwide.Oral communication and symbols, including cave paintings, smoke signals, and drum beats, were early forms of conveying messages....

Insurance types 2022-06-27

Insurance types crossword puzzle
Across
  1. Liability (Dram), coverage for bodily injury or property damage caused by an intoxicated person who was served liquor by the business owner.
  2. Liability/Errors & Omissions, Coverage for professional services in the event of an error (does something wrong) or omission (does not do something they're supposed to) that leads to financial loss (as opposed to bodily injury or property damage)
  3. Liability, protects businesses from Internet-based risks and risks relating to information technology infrastructure, information privacy, information governance liability, etc. Keywords: Malware, Data Breaches, Cyber Security, Operational Risk, Service Risk, Cyber Attacks
  4. Risk, Specialty type of Property Insurance that protects a person's or organization's insurable interest in materials, fixtures and/or equipment awaiting installation during the construction or renovation of a building or structure, should those items sustain physical loss or damage from a covered loss.
  5. Auto, Covers the cost of an auto accident if the business owner or an employee is at fault.
  6. Marine, Specialty type of Property Insurance that protects moveable equipment away from the business owner's premises.
  7. Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property
  8. Liability, Umbrella insurance refers to liability insurance that is in excess of specified other policies and also potentially primary insurance for losses not covered by the other policies.
  9. Covers the business owner's building and contents in case of a covered loss such as water/fire damage or theft.
  10. provides coverage against all risks of physical loss or damage to freight during the shipment from any external cause during shipping.
  11. Insurance, Coverage for a boat
  12. Risk, Lessor's Risk Only (LRO) Insurance, also known as the Landlord's Insurance, is a specific type of property and liability coverage designed for building owners.
  13. Insurance, livestock owned by the business.
Down
  1. Personal Property, Business Personal Property covers everything inside of a building. If you were to open the door and shake everything out, everything that came out would be covered under Business Personal Property.
  2. Interruption Insurance, replaces income lost in the event that business is halted for some reason, such as a fire or a natural disaster.
  3. pays to repair or replace a vehicle you don't own if it is damaged by a collision, fire, theft, explosion, or vandalism while you are towing or hauling.
  4. Insurance, protects a property owner against damage caused by fires, severe storms, hail/sleet, or other natural events (hazards).
  5. Liability / Unladen Liability, provides coverage for truck drivers when they are operating their trucks in a non-trucking capacity BOB Tail- covers your return trip after delivering the freight trailer to its destination. Without the trailer attached,
  6. Liability, Protects the business owner from any claims for bodily injury property damage and personal/advertising injuries. Also covers products and completed operations (means that the work done is still covered even after the job has been completed).
  7. Practices Liability, often referred to as EPLI or EPL, covers businesses against claims by workers that their legal rights as employees of the company have been violated (i.e. Claims of Sexual harassment, Discrimination, Wrongful termination.)
  8. Liability, manufactures/sells/relabels a product that has a defect and that defect causes injury or property damage, your business could be held liable. This insurance type covers the risk of defects, in case your product is faulty.
  9. Insurance, Insurance for crops grown by an agricultural business. If the customer is looking for coverage while the crops are being transported, please use Commercial Auto (Cargo) and use the correct trucking category.
  10. Liability, Media liability is a type of Professional Liability. It covers the Personal/Advertising injuries (e.g. libel, slander, and copyright infringement) just like a normal Commercial General Liability policy would except typically the General Liability's policy coverage for Personal/Advertising injuries would exclude these types of injuries for businesses primarily engaged in advertising, publishing, broadcasting, or similar activities. Media liability exists to fill in those gaps. It's extra coverage for these types of businesses.
  11. , type of professional liability insurance intended to cover medical practitioners, lawyers, or public officials.
  12. Keepers Liability, auto dealers/repair shops. This will cover vehicles (not belonging to the business owner) in case of damage from unforeseen circumstances (like a natural disaster).
  13. and Officers Liability, protects the personal assets of company directors and officers in the event they were sued while acting in their capacity as a director or officer. Most commonly requested by non-profit companies.

26 Clues: Insurance, Coverage for a boatInsurance, livestock owned by the business.Auto, Covers the cost of an auto accident if the business owner or an employee is at fault.Insurance, Coverage for a flying vehicle Business Owners Policy, Combination of General Liability and Property...

Introduction to Cybersecurity 2025-06-19

Introduction to Cybersecurity crossword puzzle
Across
  1. Fraudulent attempt to steal sensitive data via deceptive emails.
  2. Incident where data is accessed/stolen without permission.
  3. Three core security goals: Confidentiality, Integrity, and _______.
  4. Moral principles governing digital behavior (e.g., privacy, transparency).
Down
  1. Security system that monitors/controls network traffic (blocks unauthorized access).
  2. Self-replicating malware that spreads between devices.
  3. Process of encoding data to prevent unauthorized reading.
  4. Malicious software designed to damage systems (e.g., viruses, trojans).
  5. Person who exploits system vulnerabilities.
  6. Software update to fix security flaws.

10 Clues: Software update to fix security flaws.Person who exploits system vulnerabilities.Self-replicating malware that spreads between devices.Process of encoding data to prevent unauthorized reading.Incident where data is accessed/stolen without permission.Fraudulent attempt to steal sensitive data via deceptive emails....

Transactions Online 2017-02-28

Transactions Online crossword puzzle
Across
  1. Cyber criminals.
  2. Online department store.
  3. You say that you are not satisfied with a product or service.
  4. Delivery of a product and its cost.
  5. Bankcard attached to your current account.
  6. The card used for paying via the Internet.
  7. Cash on delivery.
  8. You can get your money back after a wrong product or service.
  9. The name you write in the login box.
Down
  1. Consumer of a product or service.
  2. Financial manoeuver.
  3. Your personal identification code.
  4. Possibility for compensation.
  5. Ruined during delivery.
  6. You can get another product for a faulty one.
  7. To transport a product from one point to another.

16 Clues: Cyber criminals.Cash on delivery.Financial manoeuver.Ruined during delivery.Online department store.Possibility for compensation.Consumer of a product or service.Your personal identification code.Delivery of a product and its cost.The name you write in the login box.Bankcard attached to your current account....

crossword 2012-11-15

crossword crossword puzzle
Across
  1. one world many states (16)
  2. logo 1 (7)
  3. logo 4 (9)
  4. logo 2 (10)
  5. logo 3 (5)
  6. subsidiary company of adidas which makes sportswear, apparel and accessories (6)
  7. world's local bank (4)
  8. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
Down
  1. highest grossing hollywood movie (6)
  2. full form of P&G (14)
  3. ceo of virgin atlantic (14)
  4. parent company of minute maid (8)
  5. the ultimate driving machine (3)
  6. artist with the highest number of views for his\her video on youtube (3)
  7. towards excellence (4)
  8. brand ambassador of sony cyber shot (7)

16 Clues: logo 1 (7)logo 4 (9)logo 3 (5)logo 2 (10)full form of P&G (14)towards excellence (4)world's local bank (4)one world many states (16)ceo of virgin atlantic (14)the ultimate driving machine (3)parent company of minute maid (8)highest grossing hollywood movie (6)brand ambassador of sony cyber shot (7)...

crossword 2012-11-15

crossword crossword puzzle
Across
  1. logo 3 (5)
  2. parent company of minute maid (8)
  3. logo 2 (10)
  4. the ultimate driving machine (3)
  5. one world many states (16)
  6. full form of P&G (14)
  7. artist with the highest number of views for his\her video on youtube (3)
Down
  1. brand ambassador of sony cyber shot (7)
  2. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
  3. ceo of virgin atlantic (14)
  4. subsidiary company of adidas which makes sportswear, apparel and accessories (6)
  5. towards excellence (4)
  6. world's local bank (4)
  7. logo 1 (7)
  8. logo 4 (9)
  9. highest grossing hollywood movie (6)

16 Clues: logo 3 (5)logo 1 (7)logo 4 (9)logo 2 (10)full form of P&G (14)towards excellence (4)world's local bank (4)one world many states (16)ceo of virgin atlantic (14)the ultimate driving machine (3)parent company of minute maid (8)highest grossing hollywood movie (6)brand ambassador of sony cyber shot (7)...

DOMESTIC AND INTERNATIONAL AIRPORTS 2022-07-21

DOMESTIC AND INTERNATIONAL AIRPORTS crossword puzzle
Across
  1. The word for 'A' in the phonetic alphabet
  2. (2 words)the thing your baggage goes on after check-in
  3. (2 words) something you need in order for you to access facilities airside
  4. (2 words) responsible for directing all ground traffic in designated 'movement areas' except traffic on runways
  5. The side of the airport you are on when you have passed through customs and about to board your plane
  6. the area in airports BEFORE departing passengers pass through security (accessible by both travelers and non-travelers)
  7. the 2 letter code for Emirates Airlines
  8. the word for 'W' in the phonetic alphabet
  9. a place in airports where you can complete currency exchange transactions
Down
  1. a flight originating and terminating in the same country
  2. another term for 'AIRLINE'
  3. security s________
  4. something you need in order to for you to access facilities airside
  5. (2 words) who drive baggage and freight between planes and airport terminals or cargo buildings?
  6. IATA code for Gisborne
  7. acronym for Aviation Security Service
  8. p_______ alphabet
  9. the word for 'Y' in the phonetic alphabet
  10. the 2 letter code for Singapore Airlines
  11. (2 words) what is the living thing they use in customs to help stop illegal drugs and explosives being smuggled into the country?
  12. IATA code for Nelson

21 Clues: p_______ alphabetsecurity s________IATA code for NelsonIATA code for Gisborneanother term for 'AIRLINE'acronym for Aviation Security Servicethe 2 letter code for Emirates Airlinesthe 2 letter code for Singapore AirlinesThe word for 'A' in the phonetic alphabetthe word for 'Y' in the phonetic alphabetthe word for 'W' in the phonetic alphabet...

Investments and Bonds 2022-11-29

Investments and Bonds crossword puzzle
Across
  1. type of bond, a corporation's promise to repay a specified amount of money with interest
  2. type of bond backed by assets of a business
  3. type of bond repaid through the income generated through the project
  4. type of bond, when multiple are issued on the same date but have different maturity dates
  5. type of bond backed by good faith of the company
  6. type of security that lasts 2-10 years
  7. a manager/third party that carries out the bond
  8. aka junk bond, type of bond that is risky but pays high interest
  9. the dollar amount the bondholder will receive at the bond's maturity
Down
  1. the ability for issuers to pay off bondholders early, if necessary
  2. type of security that lasts 30 years
  3. date on which corporate bonds are repaid
  4. investing/placing your money in more than one area
  5. document with all of the bond's information
  6. type of security that lasts 4-52 weeks
  7. type of bond that can convert from a corporate bond to equal value of a company's stock
  8. type of bond attached to a certain holder
  9. fund with annual/semiannual deposits to guarantee that companies can repay bondholders
  10. the _____ the risk, the higher the potential return
  11. type of bond issued at city, county, or state level

20 Clues: type of security that lasts 30 yearstype of security that lasts 4-52 weekstype of security that lasts 2-10 yearsdate on which corporate bonds are repaidtype of bond attached to a certain holderdocument with all of the bond's informationtype of bond backed by assets of a businessa manager/third party that carries out the bond...

Airside and Landside 2019-07-23

Airside and Landside crossword puzzle
Across
  1. passenger transfer between ground transportation and the facilities that allow them to board
  2. it’s the area where you go through security and hand your passport and departure card for inspection
  3. reach a plane at the end of a journey
  4. only travelers can go through this area when they leaving
  5. is provided as a quite place for contemplation to all travelers
  6. you go through before you leave Landside to get to the airside
  7. airport with customs and border control when passengers travel between countries
  8. if Incase fire thing happen
  9. duties levied by a government on imported goods
  10. it’s an area before departing passenger go through security
Down
  1. and beverage you go when your hungry
  2. if you need to buy multi vitamins where do you go?
  3. facilities they offer and usually have food, drinks, internet and relaxing area
  4. a strip of hard ground along which aircraft take off and land
  5. the first thing you do when you get at the airport
  6. it’s a document that you need to get on plane
  7. if you have foreign cash where do you go?
  8. if you want to buy alcohol in airside area where do you go?
  9. personal belonging you packet for traveling
  10. flight within the same country is called?

20 Clues: if Incase fire thing happenand beverage you go when your hungryreach a plane at the end of a journeyif you have foreign cash where do you go?flight within the same country is called?personal belonging you packet for travelingit’s a document that you need to get on planeduties levied by a government on imported goods...

Chapter 7 Crossword CEH 2026-03-02

Chapter 7 Crossword CEH crossword puzzle
Across
  1. Malware changing behavior dynamically
  2. Network traffic analysis tool
  3. Attacker spreading across networks
  4. Multiple layered security strategy
  5. Compressing malware to hide code
  6. Indicator showing compromise evidence
  7. Malware operating primarily in memory
  8. Infrastructure controlling infected systems
  9. Isolated environment for safe execution
  10. Windows executable file format
  11. Detecting threats by activity patterns
  12. Security model requiring verification
  13. Malware requiring user execution to spread
  14. macOS executable format
  15. Linux executable format
  16. Tool tracking system processes
  17. Malware Malware using artificial intelligence techniques
  18. Gaining higher system permissions
  19. Examining malware without execution
  20. Endpoint detection and response security
  21. Secure hashing algorithm for identification
Down
  1. Extended threat detection platform
  2. Proactive search for attackers
  3. Executing code inside running processes
  4. Using system scripting tools maliciously
  5. Small payload executed in memory
  6. Command showing network connections
  7. Social engineering used to deliver malware
  8. Technique allowing malware survival after reboot
  9. Startup registry location abused by malware
  10. Dedicated malware inspection system
  11. Converting binaries into assembly code
  12. Software designed to damage systems or steal data
  13. Studying malware behavior during execution
  14. Making code difficult to analyze
  15. Creating digital fingerprint of files
  16. Self replicating malware spreading automatically
  17. Code abusing system vulnerability
  18. Automated execution used for persistence
  19. Startup program monitoring utility

40 Clues: macOS executable formatLinux executable formatNetwork traffic analysis toolProactive search for attackersWindows executable file formatTool tracking system processesSmall payload executed in memoryCompressing malware to hide codeMaking code difficult to analyzeCode abusing system vulnerabilityGaining higher system permissions...

Unit 5 - Do's and Don'ts 2020-02-02

Unit 5 - Do's and Don'ts crossword puzzle
Across
  1. Küche
  2. Parkplatz,Parkhaus
  3. Eigentum
  4. unbeaufsichtigt
  5. Gabelstapler
  6. Vorsicht
  7. Bibliothek
  8. Koch/Köchin
  9. Gehörschutz
  10. Strom
Down
  1. Sicherheit
  2. drogenfrei
  3. Boden,Fußboden
  4. Nichtraucherbereich
  5. hinterlassen,stehenlassen
  6. Schutzbrille
  7. zerbrechen,kaputtmachen
  8. Fall
  9. Schild
  10. Helm
  11. Lkw

21 Clues: LkwFallHelmKücheStromSchildEigentumVorsichtSicherheitdrogenfreiBibliothekKoch/KöchinGehörschutzGabelstaplerSchutzbrilleBoden,FußbodenunbeaufsichtigtParkplatz,ParkhausNichtraucherbereichzerbrechen,kaputtmachenhinterlassen,stehenlassen

unit 3 2020-12-10

unit 3 crossword puzzle
Across
  1. biztonsági ellenörzés
  2. helyszin
  3. érkezés (repülőtéren)
  4. mennyország
  5. konferencia
  6. vám
  7. jóslat
  8. táblák, jelzések
  9. foglalás
Down
  1. poggyászszállító kocsi
  2. mostanában
  3. kapu
  4. tetőterasz
  5. indulás
  6. okostelefon
  7. egzotikus
  8. csengőhang
  9. utas
  10. beszáll ( a repülőgépbe)
  11. szöveges üzenetet küld

20 Clues: vámkapuutasjóslatinduláshelyszinfoglalásegzotikusmostanábantetőteraszcsengőhangmennyországkonferenciaokostelefontáblák, jelzésekbiztonsági ellenörzésérkezés (repülőtéren)poggyászszállító kocsiszöveges üzenetet küldbeszáll ( a repülőgépbe)

Travel, holiday 2020-01-12

Travel, holiday crossword puzzle
Across
  1. utazás
  2. jegy
  3. érkezés
  4. foglalás
  5. csomag
  6. indulás, indulási oldal
  7. kilátás
  8. városnézés
  9. szállás
  10. luxushajó, óceánjáró
  11. peron
  12. ellenörzés, biztonsági szolgálat
Down
  1. leszállás
  2. rom, lerombol
  3. útlevél
  4. tengerpart
  5. pihenés, kikapcsolódás
  6. külföld
  7. szórakozás, szórakoztató program
  8. felfedez

20 Clues: jegyperonutazáscsomagútlevélérkezéskülföldkilátásszállásfoglalásfelfedezleszállástengerpartvárosnézésrom, lerombolluxushajó, óceánjárópihenés, kikapcsolódásindulás, indulási oldalszórakozás, szórakoztató programellenörzés, biztonsági szolgálat

Theme 2 Crime 2024-11-16

Theme 2 Crime crossword puzzle
Across
  1. gerechtigheid
  2. advocaat
  3. verzamelen
  4. indringer
  5. dankbaar
  6. oplossen
  7. steng
  8. zakkenrollen
  9. opgelucht
  10. voorkomend
  11. veroordeling
Down
  1. rechtszaak
  2. dador
  3. beveiliging
  4. financiering
  5. veronderstellen
  6. ontwetendheid
  7. aanval
  8. getuige
  9. afkickkliniek
  10. bewijs
  11. rel
  12. rechtzaak
  13. hechtenis

24 Clues: reldadorstengaanvalbewijsgetuigeadvocaatdankbaaroplossenindringeropgeluchtrechtzaakhechtenisrechtszaakverzamelenvoorkomendbeveiligingfinancieringzakkenrollenveroordelinggerechtigheidontwetendheidafkickkliniekveronderstellen

POIST 2025-12-15

POIST crossword puzzle
Across
  1. computer progammer
  2. businessperson
  3. scientist
  4. judge
  5. doctor
  6. secretary
  7. electrician
  8. salesperson
  9. nurse
Down
  1. singer
  2. computer technician
  3. security guard
  4. plumber
  5. musician
  6. web developer
  7. banker
  8. teacher
  9. cleaner
  10. engineer
  11. driver
  12. mechanic
  13. farmer

22 Clues: judgenursesingerbankerdoctordriverfarmerplumberteachercleanermusicianengineermechanicscientistsecretaryelectriciansalespersonweb developersecurity guardbusinesspersoncomputer progammercomputer technician

HIP Guardians of Health Information 2026 2026-03-13

HIP Guardians of Health Information 2026 crossword puzzle
Across
  1. AAHIP
  2. EATLHH NTMORAFNOII
  3. TSCIYURE
  4. CEIDRMEA
  5. BSITCAGNART
  6. AITDU
  7. OIGCND
  8. ARBENEIIFYC
  9. RWDOAPSS
  10. PTLYIIROBAT
  11. ICNREOCLTE THLHAE ERCRRDO
Down
  1. EIOLYNNDICFAITT
  2. DYFICEEINC
  3. LQIYTAU
  4. LEAERSE FO MRTNOANOFII
  5. VRAPYIC
  6. CINPYTOREN
  7. SLSAYIAN
  8. ADLECIM NEYSCTEIS
  9. GYOTHLEONC
  10. USOERSDICL

21 Clues: AAHIPAITDUOIGCNDLQIYTAUVRAPYICSLSAYIANTSCIYURECEIDRMEARWDOAPSSDYFICEEINCCINPYTORENGYOTHLEONCUSOERSDICLBSITCAGNARTARBENEIIFYCPTLYIIROBATEIOLYNNDICFAITTADLECIM NEYSCTEISEATLHH NTMORAFNOIILEAERSE FO MRTNOANOFIIICNREOCLTE THLHAE ERCRRDO

La unidad 10 2021-04-16

La unidad 10 crossword puzzle
Across
  1. counter
  2. confirm
  3. flight
  4. bathrooms(SP)
  5. customs
  6. security
  7. board
  8. takeoff
  9. late
Down
  1. window
  2. landing
  3. departures
  4. arrivals
  5. schedule
  6. luggage
  7. passport

16 Clues: lateboardwindowflightcounterconfirmlandingluggagecustomstakeoffarrivalsschedulesecuritypassportdeparturesbathrooms(SP)

Exam Vocabulary p7 2021-10-15

Exam Vocabulary p7 crossword puzzle
Across
  1. invloed
  2. armoede
  3. plaatselijk
  4. policy
  5. reclame maken
  6. gemeenschap
  7. regering
  8. maatregelen
  9. pesten
Down
  1. maatschappij
  2. dakloos
  3. politiek
  4. macht
  5. veiligheid
  6. omgeving
  7. gedrag

16 Clues: machtpolicygedragpestendakloosinvloedarmoedepolitiekomgevingregeringveiligheidplaatselijkgemeenschapmaatregelenmaatschappijreclame maken

เกมค้นหาคำศัพท์ 2025-08-03

เกมค้นหาคำศัพท์ crossword puzzle
Across
  1. บัตรโดยสาร
  2. ชั้นโดยสารราคาที่ถูกที่สุด
  3. ที่นั่ง
  4. พนักงานขนกระเป๋า
  5. เที่ยวบิน
  6. ถอดออก
  7. มาถึง
  8. ผู้โดยสาร
Down
  1. สายการบิน
  2. ขึ้นเครื่อง
  3. ระบบรักษาความปลอดภัย
  4. ออกเดินทาง
  5. ประตูทางออก
  6. เดินทาง
  7. สายพานที่ใช้รับส่งกระเป๋าในสนามบิน
  8. กระเป๋าเป้สะพายหลัง

16 Clues: มาถึงถอดออกที่นั่งเดินทางสายการบินเที่ยวบินผู้โดยสารบัตรโดยสารออกเดินทางขึ้นเครื่องประตูทางออกพนักงานขนกระเป๋ากระเป๋าเป้สะพายหลังระบบรักษาความปลอดภัยชั้นโดยสารราคาที่ถูกที่สุดสายพานที่ใช้รับส่งกระเป๋าในสนามบิน

Test 2025-09-17

Test crossword puzzle
Across
  1. erwaefsrgergr
  2. awerawer ewb
  3. weafvrewbtew
Down
  1. asfdvaerbwer
  2. sgbrg ertb aw

5 Clues: asfdvaerbwerawerawer ewbweafvrewbtewerwaefsrgergrsgbrg ertb aw

At the airport vocabulary 2024-11-03

At the airport vocabulary crossword puzzle
Across
  1. Put in the trash.
  2. Document needed for international travel
  3. Airport security personnel
  4. Items that need to be placed in the tray
  5. Place to show your boarding pass
  6. Checks your travel documents
Down
  1. Leave luggage with the airline
  2. Often weighed before boarding
  3. Someone traveling on a plane
  4. What you do with your belt at security.
  5. Not international
  6. Enter the plane
  7. Where you greet arriving passengers

13 Clues: Enter the planePut in the trash.Not internationalAirport security personnelSomeone traveling on a planeChecks your travel documentsOften weighed before boardingLeave luggage with the airlinePlace to show your boarding passWhere you greet arriving passengersWhat you do with your belt at security.Document needed for international travel...

Bullying 2023-03-21

Bullying crossword puzzle
Across
  1. A form of help
  2. manipulation, mimicking and intimidation
  3. A witness of the bullying
  4. Person who is being bullied
  5. use of negative words to intentionally upset someone
Down
  1. verbally, socially or psychologically bullying someone using technology
  2. Spreading rumours and repeated mimicking
  3. Pushing and shoving someone repeatedly

8 Clues: A form of helpA witness of the bullyingPerson who is being bulliedPushing and shoving someone repeatedlySpreading rumours and repeated mimickingmanipulation, mimicking and intimidationuse of negative words to intentionally upset someoneverbally, socially or psychologically bullying someone using technology

Online Communication 2023-08-07

Online Communication crossword puzzle
Across
  1. Connects global computers
  2. Exchanging information
  3. Remarks made under someone else's post
Down
  1. Social media platform founded in February 2004
  2. Message sent by computer
  3. Something involving computers or the internet
  4. social media platform bought by Facbook in 2012
  5. Software program downloaded onto a computer or phone

8 Clues: Exchanging informationMessage sent by computerConnects global computersRemarks made under someone else's postSomething involving computers or the internetSocial media platform founded in February 2004social media platform bought by Facbook in 2012Software program downloaded onto a computer or phone

Vocabulario #6 (es2) - write translations! 2022-10-31

Vocabulario #6 (es2) - write translations! crossword puzzle
Across
  1. – window
  2. – departure
  3. – Cancelled
  4. – counter
  5. – backpack
  6. – Passport
  7. – flight
  8. – aisle
Down
  1. – passenger
  2. – trip
  3. – seat
  4. – pilot
  5. – security
  6. - delayed
  7. – to travel
  8. – luggage

16 Clues: – trip– seat– pilot– aisle– window– flight– counter- delayed– luggage– security– backpack– Passport– passenger– departure– Cancelled– to travel

CSC Puzzle 2021-06-09

CSC Puzzle crossword puzzle
Across
  1. Required to wear a security shirt
  2. See something, _____ something
  3. Anaheim Angels _____________
  4. OC's branch manager
  5. Common hair color abbreviation
  6. Common eye color abbreviation
  7. What does CP stand for
  8. Non-guard carded staff is _______ staff
  9. Guests are not allowed to re-________ the stadium
Down
  1. _______items include weapons, alcohol and large bags
  2. Verbal or physical
  3. Someone leaving with a subject who is being evicted
  4. Used to protect your skin from the sun
  5. What day is payday?
  6. Color of pen a security guard uses
  7. Text ___________ to 474747 to place a contactless concessions order

16 Clues: Verbal or physicalOC's branch managerWhat day is payday?What does CP stand forAnaheim Angels _____________Common eye color abbreviationSee something, _____ somethingCommon hair color abbreviationRequired to wear a security shirtColor of pen a security guard usesUsed to protect your skin from the sunNon-guard carded staff is _______ staff...

Globalization Vocabulary 1 2017-02-20

Globalization Vocabulary 1 crossword puzzle
Across
  1. Of or relating to the government
  2. Blending to sameness
  3. Operating or existing in many countries
  4. Customs, traditions, values of a group of people
  5. To rely upon each other
  6. Nations global organization for peace, security
  7. Living and nonliving things interacting together
Down
  1. The world seems smaller by Marshall McLuhan
  2. To be involved in complex ways with each other
  3. When larger systems, and everything interconnect
  4. Use, management of money
  5. In agreement
  6. System of money
  7. Organization for peace, security, political alliance
  8. Buy/sell goods/resources of a country or region
  9. Organized group of people

16 Clues: In agreementSystem of moneyBlending to samenessTo rely upon each otherUse, management of moneyOrganized group of peopleOf or relating to the governmentOperating or existing in many countriesThe world seems smaller by Marshall McLuhanTo be involved in complex ways with each otherNations global organization for peace, security...

Loan Terms 2025-11-07

Loan Terms crossword puzzle
Across
  1. person who takes out a loan
  2. Term loan length that doesn’t change
  3. property pledged as security for a loan
  4. Card linked directly to a bank account
  5. replacing an old loan with a new one
  6. length of time to repay a loan
  7. maximum amount that can be borrowed
  8. original amount of money borrowed
  9. chance of losing money
Down
  1. Card allowing borrowed payments
  2. Interest rate that changes with the market
  3. loan to buy property
  4. person or bank that gives money
  5. borrowed money that must be repaid
  6. asset pledged for repayment
  7. Interest rate that stays the same
  8. rate percentage charged on borrowed money

17 Clues: loan to buy propertychance of losing moneyperson who takes out a loanasset pledged for repaymentlength of time to repay a loanCard allowing borrowed paymentsperson or bank that gives moneyInterest rate that stays the sameoriginal amount of money borrowedborrowed money that must be repaidmaximum amount that can be borrowed...

Profiles 2 text 1 Pinja 2014-12-03

Profiles 2 text 1 Pinja crossword puzzle
Across
  1. ulkomaille
  2. tuhlata
  3. lomakeskus
  4. siepata
  5. askeittain
  6. matkatavara
  7. jono
  8. majoitus
  9. lahtoselvitys
Down
  1. days nykyaan
  2. saapua
  3. matkustaa
  4. matka
  5. turvallisuus
  6. aurinkovoida
  7. hassakka

16 Clues: jonomatkasaapuatuhlatasiepatahassakkamajoitusmatkustaaulkomaillelomakeskusaskeittainmatkatavaradays nykyaanturvallisuusaurinkovoidalahtoselvitys

Human rights 2023-10-27

Human rights crossword puzzle
Across
  1. selvstændig
  2. tolerance
  3. værdighed
  4. medtagelse
  5. diskrimination
  6. rimelighed
Down
  1. menneskeværdighed
  2. frihed
  3. styrkelse
  4. privatliv
  5. social
  6. ansvarlighed
  7. retfærdighed
  8. lighed
  9. borgerrettigheder
  10. sikkerhed

16 Clues: frihedsociallighedstyrkelseprivatlivtoleranceværdighedsikkerhedmedtagelserimelighedselvstændigansvarlighedretfærdigheddiskriminationmenneskeværdighedborgerrettigheder

CyberDSA D3 2025-08-14

CyberDSA D3 crossword puzzle
Across
  1. Applying updates to fix software flaws.
  2. Method of guessing passwords by trying all possibilities.
  3. Security barrier that controls network traffic flow.
  4. Isolated environment to safely run suspicious files.
  5. System for analyzing and correlating security events.
Down
  1. Period of active connection between a user and a system.
  2. Technology that prevents sensitive data from leaving a network.
  3. Authorized simulated cyberattack to test security defenses.
  4. Algorithm for encrypting and decrypting information.
  5. Recorded events and activities on a system or network.

10 Clues: Applying updates to fix software flaws.Algorithm for encrypting and decrypting information.Security barrier that controls network traffic flow.Isolated environment to safely run suspicious files.System for analyzing and correlating security events.Recorded events and activities on a system or network....

CAB 2021-05-05

CAB crossword puzzle
Across
  1. Writing mean things on peoples Facebook, Instagram etc.
  2. What is the B of bullying?
  3. Someone that stood up for themselves/ other people.
  4. No one is having fun.
  5. What is the A of bullying?
  6. Spreading rumors, excluding people from games and groups.
  7. Someone that hits people or calls them names.
  8. Someone that watched bullying happen.
Down
  1. Someone is being hurt on purpose.
  2. Name calling, threating.
  3. Everyone is having fun.
  4. What is the D of bullying?
  5. What is the C of bullying?
  6. Punching, kicking, and spitting.
  7. Attacked physically, socially, or emotionally.
  8. Someone that got hit or gets called names.

16 Clues: No one is having fun.Everyone is having fun.Name calling, threating.What is the B of bullying?What is the D of bullying?What is the C of bullying?What is the A of bullying?Punching, kicking, and spitting.Someone is being hurt on purpose.Someone that watched bullying happen.Someone that got hit or gets called names....

Finance 2023-12-15

Finance crossword puzzle
Across
  1. of a company's earnings to its share price.
  2. borrowed or invested, excluding interest.
  3. charge for the use of borrowed assets, usually yearly.
  4. ratio (Price-to-earnings ratio)
  5. representing partial ownership of a company.
  6. portfolio value change due to interest rate shifts.
  7. investments across various assets to reduce risk.
  8. during which an investor can't sell a newly issued security.
Down
  1. at Risk (VaR)
  2. of an asset's sensitivity to interest rate changes.
  3. rate
  4. period
  5. fund
  6. mirroring a financial market index.
  7. instrument promising repayment with interest.

15 Clues: ratefundperiodat Risk (VaR)ratio (Price-to-earnings ratio)mirroring a financial market index.borrowed or invested, excluding interest.of a company's earnings to its share price.representing partial ownership of a company.instrument promising repayment with interest.investments across various assets to reduce risk....

PHN001 2017-06-05

PHN001 crossword puzzle
Across
  1. The process of securing a network appliance or server to protect it against hacking.
  2. Physical security domain associated with internal IT systems. (BSS)
  3. The utilization of algorithms to secure signalling.
  4. Physical security domain associated with network connections that consist of physical lines.
  5. Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
  6. Virus known to spread over GSM-SMS networks.
  7. Method used to physically cut into a cable and steal / divert signal.
  8. Wifi encryption method that is easy to hack
  9. Mobile technology that uses the TDMA radio signal.
Down
  1. Mobile technology that competes with GSM.
  2. Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
  3. The process of tricking people by changing your apparenet identity.
  4. Modern wireless technology that creates homespots and hotspots.
  5. Trade name for 4G networks
  6. Attack vector utilized which the target of most fraudster. A ____ domain attack.
  7. Modern wireless technology based on local Microwave Signals
  8. The initals for the internet protocol that secures most mobile networks.
  9. Type of server resident on a GSM network and utilized to force code onto handsets.
  10. The identification number assigned to every GSM device.
  11. Wifi encryption method that is difficult to hack
  12. The item inserted into a device which holds an encryption key.

21 Clues: Trade name for 4G networksMobile technology that competes with GSM.Wifi encryption method that is easy to hackVirus known to spread over GSM-SMS networks.Wifi encryption method that is difficult to hackMobile technology that uses the TDMA radio signal.The utilization of algorithms to secure signalling....

Emergency Responce plan 2019-06-10

Emergency Responce plan crossword puzzle
Across
  1. 0124-2290192
  2. Raise the ______________ using the manual Call point
  3. Facility team will __________ for controlling the source of spill if possible
  4. Emergency handling trained associate will blow the ___________, to indicate that there is emergency situation is inside the building
  5. Support the security team to fighting the _________________
  6. After reentry into the building, debrief with Operations, Safety,________ Facility Manager & other observers to collect all pertinent information related to the emergency event.
  7. Operation manager will Maintain order and ensure that all Associates remain at the ______________.
  8. reach at the Assembly _____________
  9. Who will monitor the news and notify the site leader ?
Down
  1. During fire the operation manager will, Take charge of all persons at the evacuation point and ensure roll call is taken and is matching to the _________.
  2. Support Operation manager will move the associate to the _______________ area
  3. ,Don not Run ( Compleate the sentence )
  4. Associate should take injured Person to where, if Possible ?
  5. 0124-2292101
  6. Incident Commander will Go to the designated outside assembly point and follow the _______________ commander check sheet
  7. 011-26152801
  8. Provide appropiate __________to evacuate associate
  9. Do not leave the __________ until Asked to.
  10. security team will inform to whom, After consultation with Incident Commander about the incident ?
  11. arrange the spill kit from __________ location

20 Clues: 0124-22901920124-2292101011-26152801reach at the Assembly _____________,Don not Run ( Compleate the sentence )Do not leave the __________ until Asked to.arrange the spill kit from __________ locationProvide appropiate __________to evacuate associateRaise the ______________ using the manual Call point...

Cashless society 2024-09-04

Cashless society crossword puzzle
Across
  1. The cost associated with creating physical money
  2. what do you think orba cashless world?
  3. Electronic tool often used for payments in a cashless society
  4. A problem in a cashless society where electronic systems fail
  5. The state of financial transactions occurring without physical cash
  6. A device often used for cashless transactions while traveling
  7. The financial institution that may hire security teams to protect cash
  8. What positive effect does a cashless society have on crime?
  9. The physical form of money that is becoming less prevalent
  10. The primary risk associated with online transactions due to data breaches
  11. A type of currency that is becoming less common due to digital transactions
Down
  1. The type of fees that may increase if banks can't charge for cash withdrawals
  2. a cashless society has its own?
  3. Financial crime involving hiding the source of illegally obtained money
  4. The type of crime that may decrease in a cashless society
  5. if the source of the money is unknown, money laundering becomes much more?
  6. The term for the illegal hiding of income
  7. A major benefit of a cashless society related to the ease of carrying money
  8. A financial concept that could impact customers if all transactions are electronic
  9. What is a security concern with electronic transactions?

20 Clues: a cashless society has its own?what do you think orba cashless world?The term for the illegal hiding of incomeThe cost associated with creating physical moneyWhat is a security concern with electronic transactions?The type of crime that may decrease in a cashless societyThe physical form of money that is becoming less prevalent...

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. the age to collect social security benefits
  2. The ticker for Google
  3. The ticker for Amazon
  4. the market where many people buy investments
  5. the market where many people sell their investments
  6. Expected to run short of funds by 2031.
  7. digital money
  8. don't give you ownership rights.
  9. when you purchase or sell a stock
  10. You can get more benefits if you delay retirement until what age?
  11. it is meant for short-term goals
  12. The color that means stocks are doing bad
  13. The increase in the value of an asset
  14. Social Security & Medicare together is called...
  15. the bigger the box in the S&P 500, the bigger the...
Down
  1. 35 is the average age when ______ start to invest
  2. The ticker for Microsoft
  3. The ticker for Tesla
  4. 6.2% is the percent of your paycheck gets taken out for what?
  5. the age you can start investing
  6. The color that means stocks are doing good
  7. Managed by your employer.
  8. The president that created social security
  9. it is meant for long-term goals
  10. a common job that provides a pension
  11. The ticker for Meta
  12. invest a small sum regularly
  13. Invest a big sum at one go
  14. 32 is the average age when ______ start to invest
  15. physical money

30 Clues: digital moneyphysical moneyThe ticker for MetaThe ticker for TeslaThe ticker for GoogleThe ticker for AmazonThe ticker for MicrosoftManaged by your employer.Invest a big sum at one goinvest a small sum regularlythe age you can start investingit is meant for long-term goalsdon't give you ownership rights.it is meant for short-term goals...

Investing Brayden O 2026-04-01

Investing Brayden O crossword puzzle
Across
  1. Virtual currency with nothing backing it
  2. Age can delay your retirement to receive more money
  3. Percent of 18-29 year olds that have invested in, traded or used crypto
  4. Money recieved after working a certain amout of years for a unionized workforce
  5. Material Non Public information
  6. Minimum amount of that must be taken out of the account annually once 73
  7. Average retirement savings for people under 35
  8. How much Tom Brady lost with FTX
  9. Investing all money available into the market
  10. Percent an employee pays for social security tax
  11. Buying or selling a stock based on Material, Non Public information
  12. Investing money in equal amounts at regular intervals
  13. Goverment medical health plan
Down
  1. Information that hasnt been shared with the general public
  2. Info that would actually change a persons mind about buying or selling stock
  3. amount Age to receive full social security benefits
  4. Percent an employee pays for medicare
  5. Contributes to a personal savings with after tax contributions
  6. Emplyer sponsored retirement plan
  7. System of recording information that makes it hard to hack
  8. Money put aside when you worked that you receive when you retire
  9. Currencies created and backed by the government
  10. Personal savings account
  11. Social Security and Medicare Together
  12. Age to “invest” in crypto

25 Clues: Personal savings accountAge to “invest” in cryptoGoverment medical health planMaterial Non Public informationHow much Tom Brady lost with FTXEmplyer sponsored retirement planPercent an employee pays for medicareSocial Security and Medicare TogetherVirtual currency with nothing backing itInvesting all money available into the market...

Security Issues in Informatics 2024-11-25

Security Issues in Informatics crossword puzzle
Across
  1. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. a type of malware that disguises itself as a legitimate program or file to gain access to a computer system
  3. when personal information is accessed, disclosed, or lost without authorization
  4. tricking someone into giving away sensitive information, like passwords or credit card details, by manipulating them psychologically, often by pretending to be someone they trust, like a company or a colleague, to gain access to systems or data
  5. a malicious cyber attack that targets cloud-based systems, services, or data
Down
  1. a security risk that occurs when someone with authorized access to an organization's resources misuses that access to cause harm
  2. a secret word or phrase that must be used to gain admission to something. in this case,easily guessable or crackable by hackers, typically due to its short length, use of common words, personal information like names or birthdates, or predictable patterns
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. a type of malicious software designed to block access to a computer system until a sum of money is paid
  5. irrelevant or inappropriate messages sent on the internet to a large number of people

10 Clues: a malicious cyber attack that targets cloud-based systems, services, or datawhen personal information is accessed, disclosed, or lost without authorizationirrelevant or inappropriate messages sent on the internet to a large number of peoplea type of malicious software designed to block access to a computer system until a sum of money is paid...

Shared Services ICT 2023-07-16

Shared Services ICT crossword puzzle
Across
  1. Aplikasi ERP
  2. Platform Permintaan Layanan ICT
Down
  1. Fungsi IT Operation
  2. Jenis Cyber Attack untuk mencuri informasi pengguna
  3. Pertamina Digital Signature
  4. Multi-Factor Authentication

6 Clues: Aplikasi ERPFungsi IT OperationPertamina Digital SignatureMulti-Factor AuthenticationPlatform Permintaan Layanan ICTJenis Cyber Attack untuk mencuri informasi pengguna

Cyber Physical Systems - 1 2025-03-20

Cyber Physical Systems - 1 crossword puzzle
Across
  1. The coordination of processes to operate in unison.
  2. Protection of digital and cyber-physical systems from threats.
  3. Processing data closer to the source rather than a central server.
  4. Study of control and communication in machines and living beings.
  5. A highly automated, connected, and intelligent manufacturing system.
  6. Internet-based computing providing storage and processing power.
  7. A network of connected devices that communicate over the internet.
  8. Using models to replicate real-world behaviors.
  9. Devices that detect and respond to physical changes.
  10. The ability of different systems to work together.
  11. Large volumes of data used for analytics and decision-making.
Down
  1. A decentralized and secure digital ledger technology.
  2. Combining different subsystems into a unified system.
  3. A virtual replica of a physical system for monitoring and analysis.
  4. A computing system integrated into a larger system.
  5. The capability of a system to function independently.
  6. Devices that convert electrical signals into mechanical motion.
  7. Related to manufacturing and production systems.
  8. The process of making systems operate without human intervention.

19 Clues: Using models to replicate real-world behaviors.Related to manufacturing and production systems.The ability of different systems to work together.The coordination of processes to operate in unison.A computing system integrated into a larger system.Devices that detect and respond to physical changes....

Safety Moment - Team Building Edition 2015-04-21

Safety Moment - Team Building Edition crossword puzzle
Across
  1. 10
  2. 4
  3. 5
  4. 8
  5. 7
  6. 15
  7. 12
Down
  1. 14
  2. 1
  3. 11
  4. 9
  5. 13
  6. 3
  7. 2
  8. 6

15 Clues: 149587326141011131512

Turning adjectives into nouns using the suffix ity. 2014-12-03

Turning adjectives into nouns using the suffix ity. crossword puzzle
Across
  1. simplicity
  2. density
  3. stupidity
  4. opportunity
  5. complexity
  6. divinity
  7. nationality
  8. purity
  9. activity
Down
  1. ability
  2. security
  3. responsibility
  4. community
  5. immunity
  6. reality

15 Clues: purityabilitydensityrealitysecuritydivinityimmunityactivitystupiditycommunitysimplicitycomplexityopportunitynationalityresponsibility

Collective nouns (for people) 2024-05-19

Collective nouns (for people) crossword puzzle
Across
  1. Recruits
  2. Actors
  3. Judges
  4. Kings
  5. Politicians
  6. Sailors
  7. Experts
Down
  1. Rioters
  2. Friends
  3. Natives
  4. Security
  5. Men
  6. Soldiers
  7. Witches
  8. Tourists

15 Clues: MenKingsActorsJudgesRiotersFriendsNativesSailorsWitchesExpertsRecruitsSecuritySoldiersTouristsPoliticians

Adv. B 2024-02-05

Adv. B crossword puzzle
Across
  1. abuse
  2. crime
  3. cheat
  4. offender
  5. security
  6. guilt
  7. vandalism
  8. destroy
  9. homicide
Down
  1. kidnap
  2. bomb
  3. steal
  4. harassment
  5. defraud
  6. suspect

15 Clues: bombabusecrimecheatstealguiltkidnapdefraudsuspectdestroyoffendersecurityhomicidevandalismharassment

step 12 2016-02-17

step 12 crossword puzzle
Across
  1. in lähtöselvitys
  2. tulli
  3. herra
  4. rouva
  5. matkalaukku
  6. neiti
  7. baari
  8. häämatka
  9. portti
Down
  1. hiekkaranta
  2. sukset
  3. area tupakointialue
  4. check turvatarkastus
  5. club yökerho
  6. muistaa
  7. passintarkastus
  8. time koneeseen siirtymisaika
  9. kärryt
  10. boss entinen esimies
  11. odottaa

20 Clues: tulliherrarouvaneitibaarisuksetkärrytporttimuistaaodottaahäämatkahiekkarantamatkalaukkuclub yökerhopassintarkastusin lähtöselvitysarea tupakointialuecheck turvatarkastusboss entinen esimiestime koneeseen siirtymisaika

SPOTLIGHT8 KPL7 s.166-167 2016-02-08

SPOTLIGHT8 KPL7 s.166-167 crossword puzzle
Across
  1. salasana
  2. poissa tolaltaan
  3. ongelmat
  4. pyytää anteeksi
  5. kysyä
  6. keskustelu
  7. rasistinen
  8. kuluttaa
  9. uskoa
  10. koe
  11. molemmat
Down
  1. suukko
  2. sana
  3. halaus
  4. oppitunti
  5. lupa
  6. valehtelija
  7. luvata
  8. viesti
  9. turvallisuus
  10. tapahtua
  11. salaisuus
  12. kiusaaja

23 Clues: koesanalupakysyäuskoasuukkohalausluvataviestisalasanaongelmattapahtuakuluttaakiusaajamolemmatoppituntisalaisuuskeskustelurasistinenvalehtelijaturvallisuuspyytää anteeksipoissa tolaltaan

Psalms 23 2020-03-30

Psalms 23 crossword puzzle
Across
  1. vs5f
  2. vs4e
  3. vs4b
  4. vs4a
  5. vs4d
  6. vs4g
  7. vs4c
  8. vs6e
  9. vs3a
  10. vs6a
  11. vs5c
Down
  1. vs1a
  2. vs6d
  3. vs3b
  4. vs2b
  5. vs6b
  6. vs6c
  7. vs3c
  8. vs4f
  9. vs3d
  10. vs5b
  11. vs1b
  12. vs5e
  13. vs5d
  14. vs5a

25 Clues: vs1avs5fvs6dvs4evs3bvs4bvs2bvs6bvs6cvs3cvs4avs4dvs4fvs3dvs5bvs1bvs5evs4gvs5dvs4cvs6evs3avs6avs5avs5c

vocabulary 2025-01-08

vocabulary crossword puzzle
Across
  1. Q
  2. E
  3. M
  4. W
  5. J
  6. R
  7. X
  8. K
  9. S
Down
  1. N
  2. I
  3. T
  4. O
  5. F
  6. C
  7. A
  8. B
  9. L
  10. P
  11. D
  12. V
  13. H
  14. U
  15. G

24 Clues: NQITOFECMABLPWDVJHRXKUGS

Travelling 2025-11-10

Travelling crossword puzzle
Across
  1. matkalaukku
  2. laiva
  3. passi
  4. lentoemäntä
  5. matkustaa
  6. lentäjä
  7. turvatarkastus
  8. kartta
  9. metro
  10. tulli
  11. taksi
  12. lähtevät
  13. loma
Down
  1. konduktööri
  2. juna
  3. pyörä
  4. lentokone
  5. helikopteri
  6. saapuvat
  7. matka
  8. turisti
  9. matkatavarat
  10. autolautta

23 Clues: junalomapyörälaivapassimatkametrotullitaksikarttalentäjäturistisaapuvatlähtevätlentokonematkustaaautolauttakonduktöörimatkalaukkulentoemäntähelikopterimatkatavaratturvatarkastus

4th Grade Spelling List #1 2025-09-17

4th Grade Spelling List #1 crossword puzzle
Across
  1. attraction
  2. expert
  3. present
  4. color
  5. handed
  6. flee
  7. day after today
  8. hoops
  9. stay
Down
  1. security
  2. heaviness
  3. midsection
  4. time past
  5. blood vessel
  6. twisting injury
  7. gift
  8. day before today
  9. collection book
  10. pass
  11. trash

20 Clues: giftfleepassstaycolortrashhoopsexperthandedpresentsecurityheavinesstime pastattractionmidsectionblood vesseltwisting injurycollection bookday after todayday before today

Victim support crossword 2022-09-02

Victim support crossword crossword puzzle
Across
  1. istraga
  2. pritužba
  3. žalba
  4. oštećenik
  5. ovlašteni tužitelj
  6. svjedok
  7. pljačka
  8. sigurnosne mjere
Down
  1. prekršaj
  2. počinitelj
  3. državni odvjetnik
  4. optužnica
  5. žrtva
  6. kazneno djelo
  7. sud
  8. ozljeda
  9. ročište
  10. krađa
  11. napad

19 Clues: sudžalbažrtvakrađanapadistragasvjedokozljedaročištepljačkaprekršajpritužbaoptužnicaoštećenikpočiniteljkazneno djelosigurnosne mjeredržavni odvjetnikovlašteni tužitelj

INFO SEC PUZZLE 2024-11-11

INFO SEC PUZZLE crossword puzzle
Across
  1. SENSITIVE TYPE
  2. REQUIRED TO LOGIN
  3. LATEST MALWARE TYPE
  4. EASE OF ACCESS
  5. NETWORK SECURITY
Down
  1. REQUIRED FOR HANDLING VIRUS
  2. DATA CONFIDENTIALITY
  3. DANGEROUS FOR COMPUTER
  4. DATA SECURITY

9 Clues: DATA SECURITYSENSITIVE TYPEEASE OF ACCESSNETWORK SECURITYREQUIRED TO LOGINLATEST MALWARE TYPEDATA CONFIDENTIALITYDANGEROUS FOR COMPUTERREQUIRED FOR HANDLING VIRUS

Kibernetička sigurnost 2025-07-01

Kibernetička sigurnost crossword puzzle
Across
  1. of important data
  2. security barrier
  3. code to access account
  4. computer program
Down
  1. who breaks security
  2. demanding ransom
  3. software
  4. scrambling for safety
  5. scam to steal info

9 Clues: softwaredemanding ransomsecurity barriercomputer programof important datascam to steal infowho breaks securityscrambling for safetycode to access account

Cluster Ja 001 2023-03-23

Cluster Ja 001 crossword puzzle
Across
  1. The VPN app of choice of Athena
  2. Our CEO
  3. New communication platform of choice replacing Google HangOuts
  4. Athena ____ form is used to lodge tickets for finance/payroll/tools/etc
  5. ___-A-Thon
  6. Athena's HMO provider
  7. Our new COO
  8. Executive Assistant is now known as Executive ___
Down
  1. Our PH Legal Entity Name
  2. An app used to provide a US number that can be used for calls and messages
  3. ___ Value Nominations
  4. Athena uses ___ Bank for payroll
  5. Time keep tool
  6. Our Operational Name
  7. Learning Platform that houses different training modules
  8. Athena ____ Services is responsible for coordinating client gift requests
  9. MDM is a security app provided by ___

17 Clues: Our CEO___-A-ThonOur new COOTime keep toolOur Operational Name___ Value NominationsAthena's HMO providerOur PH Legal Entity NameThe VPN app of choice of AthenaAthena uses ___ Bank for payrollMDM is a security app provided by ___Executive Assistant is now known as Executive ___Learning Platform that houses different training modules...

SGC Security Services: Key Concepts & Achievements 2026-01-27

SGC Security Services: Key Concepts & Achievements crossword puzzle
Across
  1. Driving force behind SGC’s AI and technology adoption
  2. Regular process to ensure compliance and quality
  3. Approach to client relationships
  4. AI-driven analytics, digital vetting, reporting tools
  5. Service standard
  6. Technology used for monitoring and incident verification
  7. SIA Approved Contractor Scheme, NSI Guarding Gold, ISO certifications
  8. 24/7 operations hub for incident management
Down
  1. Core team members
  2. Meeting industry regulations and accreditations
  3. Ongoing requirement for all officers and supervisors
  4. Largest client sector, major healthcare contracts
  5. Strategy for keeping skilled staff
  6. Security company founded in 2006
  7. Over 30 years’ experience from the founder
  8. Prestigious awards evening for healthcare security
  9. Solutions for events, concerts, stadiums

17 Clues: Service standardCore team membersApproach to client relationshipsSecurity company founded in 2006Strategy for keeping skilled staffSolutions for events, concerts, stadiumsOver 30 years’ experience from the founder24/7 operations hub for incident managementMeeting industry regulations and accreditations...

Travel 2024-05-20

Travel crossword puzzle
Across
  1. flight attendant
  2. agent
  3. takeoff
  4. departure board
  5. pilot
  6. luggage
  7. landing
Down
  1. customs
  2. security checkpoint
  3. airport
  4. copilot
  5. suitcase
  6. airplane
  7. ticket
  8. taxi
  9. passport
  10. scales

17 Clues: taxiagentpilotticketscalescustomsairportcopilottakeoffluggagelandingsuitcaseairplanepassportdeparture boardflight attendantsecurity checkpoint

Cyber safety Samson kelly 2016-06-01

Cyber safety  Samson kelly crossword puzzle
Across
  1. Where only you can go on it.
  2. Where you send a message.
  3. Something that blocks people from getting on you device.
  4. bully Being mean on the emailS.
  5. It's bits of information.
  6. You put stuff on it to show people.
  7. You ask to do it.
  8. A female who helps you at home.
  9. ages You don't have your own age.
Down
  1. A sick device.
  2. You put photos on it.
  3. A electronic with a keyboard.
  4. media you give information away.
  5. It blocks virusus.
  6. A large amount of Data not wanted.
  7. You make one when you get emails.
  8. A person who helps you at school.
  9. A website persuades you.
  10. A male who helps you at home.

19 Clues: A sick device.You ask to do it.It blocks virusus.You put photos on it.A website persuades you.Where you send a message.It's bits of information.Where only you can go on it.A electronic with a keyboard.A male who helps you at home.A female who helps you at home.media you give information away.bully Being mean on the emailS....

Holidays 2022-10-26

Holidays crossword puzzle
Across
  1. horn of plenty
  2. Unstitched her arm to escape her creator
  3. gobbles
  4. fermented juice of apples
  5. android who has scissors for hands
  6. Red, shining nose
  7. Pocus black flame candle lit by Californian transplant
  8. Stole Christmas
  9. natural sleep aid
  10. Got on the wrong plane after searching for batteries in his dad’s bag
Down
  1. Fall back an hour
  2. Monday online sales after a weekend of feast
  3. shed leaves seasonally
  4. essential amino acid found in poultry
  5. Frost Old man winter’s variant
  6. Friday camp out for a deal, after holiday meal
  7. penny pincher who doesn’t want to help Tiny Tim
  8. tart red fruit of the holidays
  9. Alone Movie franchise where the solo protagonist outsmarts bad people

19 Clues: gobbleshorn of plentyStole ChristmasFall back an hourRed, shining nosenatural sleep aidshed leaves seasonallyfermented juice of applesFrost Old man winter’s varianttart red fruit of the holidaysandroid who has scissors for handsessential amino acid found in poultryUnstitched her arm to escape her creatorMonday online sales after a weekend of feast...

Holidays 2022-10-26

Holidays crossword puzzle
Across
  1. Alone Movie franchise where the solo protagonist outsmarts bad people
  2. gobbles
  3. Red, shining nose
  4. Friday camp out for a deal, after holiday meal
  5. Pocus black flame candle lit by Californian transplant
  6. natural sleep aid
  7. android who has scissors for hands
  8. Frost Old man winter’s variant
  9. essential amino acid found in poultry
  10. tart red fruit of the holidays
Down
  1. shed leaves seasonally
  2. Monday online sales after a weekend of feast
  3. Stole Christmas
  4. horn of plenty
  5. penny pincher who doesn’t want to help Tiny Tim
  6. fermented juice of apples
  7. Unstitched her arm to escape her creator
  8. Got on the wrong plane after searching for batteries in his dad’s bag
  9. Fall back an hour

19 Clues: gobbleshorn of plentyStole ChristmasRed, shining nosenatural sleep aidFall back an hourshed leaves seasonallyfermented juice of applesFrost Old man winter’s varianttart red fruit of the holidaysandroid who has scissors for handsessential amino acid found in poultryUnstitched her arm to escape her creatorMonday online sales after a weekend of feast...

9Health Crossword Bullying 2024-09-15

9Health Crossword Bullying crossword puzzle
Across
  1. Do not
  2. What should you not do back?
  3. When someone doesn't include you
  4. Bullying someone can ruin someone self
  5. Spreading lies about people
  6. Bullying Online
  7. Someone who stands up for others
  8. Bullying someone by their skin colour
  9. Bullying someone because of their mental and physical condition
Down
  1. Age group that gets bullied the most
  2. Using private information to get something from someone
  3. A place where most bullying takes place at
  4. Using Words
  5. People go here to feel better
  6. Someone who just watches people being bullied
  7. making others do stuff they don't want to do
  8. When your getting bullied tell a trusted
  9. Bullying that ruins someones reputation
  10. what is the person being bullied called
  11. What is the person bullying called

20 Clues: Do notUsing WordsBullying OnlineSpreading lies about peopleWhat should you not do back?People go here to feel betterWhen someone doesn't include youSomeone who stands up for othersWhat is the person bullying calledAge group that gets bullied the mostBullying someone by their skin colourBullying someone can ruin someone self...

CW-Gavin 2021-11-18

CW-Gavin crossword puzzle
Across
  1. CLEAN AIR AND WATER ACTS regulate industrial waste disposal and other activities
  2. was the first major global supply chain
  3. ENVIRONMENTAL POLICY ACT requires the federal government to consider environment impact via
  4. AND SECURE TRADE-the FAST program is a trade initiative between the united states
  5. the most security from that and the most protection from weather
  6. SUPERFUND is the common name for a the comprehensive environmental response
  7. rail sidings are usually located from the normal shipping
  8. DOCK-are by far the most commonly used dock design in the united states
  9. available in a facility is more than just floor space
  10. workers must be able to retrieve the materials
Down
  1. any person who directly affects safely transportation
  2. SECURITY INITIATIVE-the goal of the CSI is to focus first on the ports
  3. Fences,Gates,Security,Guards,Lights
  4. volume expected to move through a warehouse
  5. DOCK- it consists of a platform that extend out from the extended building wall
  6. substance or material that the U.S department of transportation
  7. series of standards outlines a system for companies

17 Clues: Fences,Gates,Security,Guards,Lightswas the first major global supply chainvolume expected to move through a warehouseworkers must be able to retrieve the materialsseries of standards outlines a system for companiesany person who directly affects safely transportationavailable in a facility is more than just floor space...

How familiar are you with low level computer systems [university knowledge] 2024-04-09

How familiar are you with low level computer systems [university knowledge] crossword puzzle
Across
  1. Tool used for reverse engineering binaries
  2. What is the weakest link in the security chain
  3. The most common data transfer interface in Unix systems
  4. Superuser or administrator account in Unix-like operating systems
  5. A famous open-source kernel made by Linus Torvalds
  6. What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
  7. Process of single stepping through software instructions and resolving bugs
  8. We all hate this programming language obviously
  9. Modern OS-level containerization toolset (Hint: microservices architecture)
Down
  1. Assembly is converted into computer instructions through an...
  2. Systems storing user passwords are required to hash and...
  3. What famous BSD operating-system is known to be fixated with security?
  4. Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
  5. Common locking mechanism for programs that share memory or run in parallel
  6. A reliable but slow transport protocol
  7. Interface for a program to request services from the kernel
  8. A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.

17 Clues: A reliable but slow transport protocolTool used for reverse engineering binariesWhat is the weakest link in the security chainWe all hate this programming language obviouslyA famous open-source kernel made by Linus TorvaldsThe most common data transfer interface in Unix systemsSystems storing user passwords are required to hash and......

How familiar are you with low level computer systems [university knowledge] 2024-04-09

How familiar are you with low level computer systems [university knowledge] crossword puzzle
Across
  1. Tool used for reverse engineering binaries
  2. What is the weakest link in the security chain
  3. The most common data transfer interface in Unix systems
  4. Superuser or administrator account in Unix-like operating systems
  5. A famous open-source kernel made by Linus Torvalds
  6. What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
  7. Process of single stepping through software instructions and resolving bugs
  8. We all hate this programming language obviously
  9. Modern OS-level containerization toolset (Hint: microservices architecture)
Down
  1. Assembly is converted into computer instructions through an...
  2. Systems storing user passwords are required to hash and...
  3. What famous BSD operating-system is known to be fixated with security?
  4. Protocol whose purpose is to provide communications security over the internet (green padlock in your browser)
  5. Common locking mechanism for programs that share memory or run in parallel
  6. A reliable but slow transport protocol
  7. Interface for a program to request services from the kernel
  8. A famous distributed version control system (originally) made by Linus Torvalds, also known as the father of Linux.

17 Clues: A reliable but slow transport protocolTool used for reverse engineering binariesWhat is the weakest link in the security chainWe all hate this programming language obviouslyA famous open-source kernel made by Linus TorvaldsThe most common data transfer interface in Unix systemsSystems storing user passwords are required to hash and......

what do you know? 2021-05-04

what do you know? crossword puzzle
Across
  1. name-calling threatening
  2. attacks physically, emotionally, or socially
  3. it happens more than once over a period of time
  4. response to feeling or an event
  5. punching,kicking,spitting
  6. what percent of students report bullying
Down
  1. there is an intent to hurt or harm
  2. something happening over and over again
  3. moment getting hurt on accident once
  4. writing mean thing on Facebook, Instagram, or Twitter
  5. in intent to make fun of someone in a playful way
  6. spreading rumors, excluding people from games and groups
  7. being far away from everything/in your own space

13 Clues: name-calling threateningpunching,kicking,spittingresponse to feeling or an eventthere is an intent to hurt or harmmoment getting hurt on accident oncesomething happening over and over againwhat percent of students report bullyingattacks physically, emotionally, or sociallyit happens more than once over a period of time...

Test 2024-12-16

Test crossword puzzle
Across
  1. - Software designed to damage or disrupt systems.
  2. - A cyber attack that overwhelms a server.
  3. - Simulating an attack to identify vulnerabilities.
  4. - A software update to fix vulnerabilities.
  5. - Fraudulent attempts to obtain sensitive information via email.
  6. - A group of infected computers under a hacker’s control.
Down
  1. - A hacker engaged in activism.
  2. - Software that detects and removes malware.
  3. Engineering - Manipulating people to gain confidential info.
  4. Breach - Unauthorized access to confidential data.
  5. - Software that secretly gathers information about a person.
  6. - Unsolicited messages or emails.
  7. - Malicious software disguised as legitimate software.

13 Clues: - A hacker engaged in activism.- Unsolicited messages or emails.- A cyber attack that overwhelms a server.- A software update to fix vulnerabilities.- Software that detects and removes malware.- Software designed to damage or disrupt systems.Breach - Unauthorized access to confidential data.- Simulating an attack to identify vulnerabilities....

United Nations 2023-11-19

United Nations crossword puzzle
Across
  1. It is a platform for nations to address these issues
  2. This is one of the permanent members of the Security Council
  3. The ESCO stands for Educational, Scientific and Cultural ...
  4. This universal document about human rights was adopted in 1945
  5. Created after this war
  6. Each nation gets this number of votes
  7. Members discuss issues and then vote in this group
Down
  1. The Security Council can impose these on nations who are not following UN rules
  2. There are 17 goals aimed at ending poverty, protecting the planet and ensuring this for all
  3. There are this number of permanent members in the Security Council
  4. There are 193 ________ (members)
  5. This is the acronym for the World Health Organization

12 Clues: Created after this warThere are 193 ________ (members)Each nation gets this number of votesMembers discuss issues and then vote in this groupIt is a platform for nations to address these issuesThis is the acronym for the World Health OrganizationThis is one of the permanent members of the Security Council...

Glossary of Stock Terms 2021-03-23

Glossary of Stock Terms crossword puzzle
Across
  1. program covers medical care for low income pt
  2. long-term contract sold by life insurance companies
  3. financial professional
  4. individual adds signature to loan
  5. combined security holdings of a person
  6. person names in a will to receive benefits
  7. designed investment to reduce risk
Down
  1. date debt comes due for payment
  2. debt security issued by a corporation or government
  3. written instrument used to transfer money
  4. inability to pay outstanding debt
  5. cost of borrowed money
  6. general rise in price of goods
  7. distribution of earnings to shareholders
  8. periodic payment for an insurance policy
  9. certificate representing one unit of ownership

16 Clues: cost of borrowed moneyfinancial professionalgeneral rise in price of goodsdate debt comes due for paymentinability to pay outstanding debtindividual adds signature to loandesigned investment to reduce riskcombined security holdings of a persondistribution of earnings to shareholdersperiodic payment for an insurance policy...

Cyber safety 2015-02-24

Cyber safety crossword puzzle
Across
  1. environment where electronic communication occurs
  2. people you don't know
  3. relating to electronic communication
  4. pinching people information from the Internet
Down
  1. something you use to keep things safe.
  2. harassment by electronic communication
  3. a crime that is committed on the Internet
  4. being safe from risk or danger

8 Clues: people you don't knowbeing safe from risk or dangerrelating to electronic communicationsomething you use to keep things safe.harassment by electronic communicationa crime that is committed on the Internetpinching people information from the Internetenvironment where electronic communication occurs

security in e-commerce 2024-05-17

security in e-commerce crossword puzzle
Across
  1. crime happened in cyber
  2. Virus has similar neme of Tarzon
  3. fire is on the walls
  4. hide the identity by using fake e-mails
Down
  1. ___________ is to protect data.
  2. these biscuits are baked in computers
  3. monitors information travelling over a network
  4. unauthorised access to computer system

8 Clues: fire is on the wallscrime happened in cyber___________ is to protect data.Virus has similar neme of Tarzonthese biscuits are baked in computersunauthorised access to computer systemhide the identity by using fake e-mailsmonitors information travelling over a network

Building Singapore's Defence 2025-05-26

Building Singapore's Defence crossword puzzle
Across
  1. – What we need as a nation to stand strong.
  2. – A type of defence involving emergency preparedness.
  3. – A goal of all types of defence.
  4. – Practising for emergencies.
Down
  1. – Singapore's military force.
  2. – Short for National Service.
  3. – The kind of defence that involves everyone.
  4. – Defence against online threats.

8 Clues: – Singapore's military force.– Short for National Service.– Practising for emergencies.– Defence against online threats.– A goal of all types of defence.– What we need as a nation to stand strong.– The kind of defence that involves everyone.– A type of defence involving emergency preparedness.

Healthy Habits, Healthy You 2024-11-15

Healthy Habits, Healthy You crossword puzzle
Across
  1. what the story is mostly about
  2. tools that make tasks easier or solve problems
  3. digital technology
  4. give more information about the main idea
Down
  1. signals or clues that help recognize danger
  2. something you do regularly
  3. practices that help keep your body clean and healthy
  4. feeling well in both body and mind
  5. choosing one thing in place of another

9 Clues: digital technologysomething you do regularlywhat the story is mostly aboutfeeling well in both body and mindchoosing one thing in place of anothergive more information about the main ideasignals or clues that help recognize dangertools that make tasks easier or solve problemspractices that help keep your body clean and healthy

FBI Crossword 2015-04-28

FBI Crossword crossword puzzle
Across
  1. A person who takes an active role
  2. An action that is punishable by law
  3. Practice for the field
  4. To increase strength of an army or similar force
  5. Firearm
  6. Facts or details wether a belief or proposition is true
  7. To prevent possible riots or destruction
Down
  1. A private police force
  2. Metal covering worn by security
  3. Nation, state, or community
  4. An inquiry or study
  5. A person involved in work secretly
  6. Several states in which they form a unity
  7. A police patrol car
  8. An example of something occurring

15 Clues: FirearmAn inquiry or studyA police patrol carA private police forcePractice for the fieldNation, state, or communityMetal covering worn by securityA person who takes an active roleAn example of something occurringA person involved in work secretlyAn action that is punishable by lawTo prevent possible riots or destruction...

Great Depression 2023-10-16

Great Depression crossword puzzle
Across
  1. Roosevelt's way of making america better
  2. where people stood to get food
  3. a farm live
  4. farmers that used others land
  5. to remove against their will
  6. where businesses are bought, sold, or traded
  7. using the land to much
  8. a way to help people make money
  9. a long time without water
Down
  1. making to many goods
  2. a city life
  3. clouds of dust caused by over farming
  4. a time of economic distress
  5. security to help security of elders
  6. a new way created to communicate around the world

15 Clues: a city lifea farm livemaking to many goodsusing the land to mucha long time without watera time of economic distressto remove against their willfarmers that used others landwhere people stood to get fooda way to help people make moneysecurity to help security of eldersclouds of dust caused by over farmingRoosevelt's way of making america better...

Sadlier Unit 11 Crossword puzzle 2023-03-15

Sadlier Unit 11 Crossword puzzle crossword puzzle
Across
  1. foolish
  2. sort
  3. pacify
  4. snuggle
  5. cascade
  6. cry
Down
  1. confidence
  2. plunge
  3. confirm
  4. standard
  5. tangy
  6. flexible
  7. picky
  8. operate
  9. sensible

15 Clues: crysorttangypickyplungepacifyconfirmfoolishsnuggleoperatecascadestandardflexiblesensibleconfidence

Chapter 5 A2 2025-05-15

Chapter 5 A2 crossword puzzle
Across
  1. beïnvloeden
  2. zeker
  3. bezorgd
  4. beveiliging
  5. beïnvloeden
  6. verlopen
Down
  1. bevredigend
  2. verwijderen
  3. aanpassen
  4. zoekopdracht
  5. onjuist
  6. onpartijdig
  7. vermoeiend
  8. reclamespot
  9. volgen
  10. opnemen

16 Clues: zekervolgenonjuistbezorgdopnemenverlopenaanpassenvermoeiendbevredigendverwijderenbeïnvloedenonpartijdigreclamespotbeveiligingbeïnvloedenzoekopdracht

15.11.2022 words 2022-11-15

15.11.2022 words crossword puzzle
Across
  1. правительство
  2. зависимость
  3. важность
  4. безопасность
  5. ученый
  6. движение
  7. выбирать
Down
  1. реклама
  2. удовольствие
  3. поймать
  4. ассистент
  5. покидать
  6. выборы
  7. терять
  8. счастье

15 Clues: выборытерятьученыйрекламапойматьсчастьепокидатьважностьдвижениевыбиратьассистентзависимостьудовольствиебезопасностьправительство

world cup news 2022-11-25

world cup news crossword puzzle
Across
  1. kärsiä
  2. lähtö
  3. osallistuminen
  4. vartija
  5. seuraamukset
  6. pysytteli
  7. väitetty
Down
  1. tarkastelu
  2. tuki
  3. pidätetty
  4. vastaan
  5. osallistujat
  6. vakava
  7. syytökset
  8. takavarikoida

15 Clues: tukilähtökärsiävakavavastaanvartijaväitettypidätettysyytöksetpysyttelitarkasteluosallistujatseuraamuksettakavarikoidaosallistuminen

Cybersecurity Basics #1 2024-09-17

Cybersecurity Basics #1 crossword puzzle
Across
  1. The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
  2. Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
  3. Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
  4. Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
  1. Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
  2. Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
  3. A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
  4. A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
  5. To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
  6. To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.

10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only....

Precious's Crossword 2023-09-21

Precious's Crossword crossword puzzle
Across
  1. Being sad or having discomfort
  2. When someone tries to force you into doing something
  3. Able to do or make happen
  4. A Requirement That Makes A Goal About Yourself
  5. Class where were gonna learn about our bodys
  6. A vegetable Ms.Hookano Recommended
  7. The main thing we learned about in class
  8. Our school
  9. Something our class keeps having to talk about
  10. The thing we sit under for P4c
Down
  1. A type of food that is good for the body
  2. The Activity
  3. The Period We are
  4. Something Mobile to Stay healthy
  5. The Third Requirement For Goal Setting
  6. Something That Has become an issue The Internet

16 Clues: Our schoolThe ActivityThe Period We areAble to do or make happenBeing sad or having discomfortThe thing we sit under for P4cSomething Mobile to Stay healthyA vegetable Ms.Hookano RecommendedThe Third Requirement For Goal SettingA type of food that is good for the bodyThe main thing we learned about in class...

Elida vocabulary hints 2015-04-29

Elida vocabulary hints crossword puzzle
Across
  1. bully bullying online.
  2. writing that has been copied from someone else work.
  3. someone who access to your computer file.
  4. connected computers.
Down
  1. network is facebook,snapchat,instagram,twitter.
  2. a law that protects your work.
  3. network of thousands of other computer networks.
  4. use a copyright law that provides educate.

8 Clues: connected computers.bully bullying online.a law that protects your work.someone who access to your computer file.use a copyright law that provides educate.network is facebook,snapchat,instagram,twitter.network of thousands of other computer networks.writing that has been copied from someone else work.

Recent trends in accounting 2024-01-23

Recent trends in accounting crossword puzzle
Across
  1. financial data from cyber threats (13)
  2. reporting on environmental and social impact (3,4)
  3. from compliance to strategic guidance (9)
  4. in the virtual cloud (6)
Down
  1. large datasets for financial insights (12)
  2. blockchain for tamper-proof transactions (9)
  3. data entry using software (10)
  4. AI to reduce repetitive tasks (7)

8 Clues: in the virtual cloud (6)data entry using software (10)AI to reduce repetitive tasks (7)financial data from cyber threats (13)from compliance to strategic guidance (9)large datasets for financial insights (12)blockchain for tamper-proof transactions (9)reporting on environmental and social impact (3,4)

Cells 2013-09-17

Cells crossword puzzle
Across
  1. 'Brain' of the cell
  2. Protein Producers
  3. Contains digestive enzymes
  4. Jellylike substance
  5. 'Powerhouse' of the cell
  6. Transports materials through the cell from the Golgi Body
  7. Gives it the most structure and strength
  8. 'Security Guard' of the Nucleus
  9. Transports materials through the cell and produces protein
  10. 'Garbage disposer' of the cell
  11. Contains DNA of the cell
Down
  1. The Skeleton of the Cell
  2. 'Security Guard' of the Cell
  3. Only found in animal cells and are located near the nucleus
  4. Transports materials through the cell
  5. Photosynthesis happens in, and contains chlorophyll
  6. Surrounded by only a single membrane, doesn't contain DNA or Ribosomes

17 Clues: Protein Producers'Brain' of the cellJellylike substanceThe Skeleton of the Cell'Powerhouse' of the cellContains DNA of the cellContains digestive enzymes'Security Guard' of the Cell'Garbage disposer' of the cell'Security Guard' of the NucleusTransports materials through the cellGives it the most structure and strength...

Security Awareness Campaign 2025 2025-10-28

Security Awareness Campaign 2025 crossword puzzle
Across
  1. phishing via sms/text messages
  2. copy of data for recovery
  3. browser add-ons that pose a supply chain risk
  4. what should you do if you suspect a security incident?
  5. malware that locks files for money
  6. access rights granted to a user
  7. phishing via voice/phone call
  8. malicious software
Down
  1. If a customer asks for security documents or compliance information, where should you direct them?
  2. policy for how long data is kept
  3. tool to store and generate credentials
  4. virtual private network (acronym)
  5. unauthorized physical entry
  6. uncontrolled spread of data copies
  7. records keystrokes to steal passwords
  8. adherence to rules/regulations
  9. social engineering via email

17 Clues: malicious softwarecopy of data for recoveryunauthorized physical entrysocial engineering via emailphishing via voice/phone callphishing via sms/text messagesadherence to rules/regulationsaccess rights granted to a userpolicy for how long data is keptvirtual private network (acronym)uncontrolled spread of data copies...