cyber security Crossword Puzzles
Computer Definitions 2024-06-24
Across
- various high-capacity transmission technologies that transmit data, voice, and video across long distances and at high speeds
- A type of computer virus that can spread to different computers and damage data
- a software program used to locate and display information on the Internet or an intranet Compatible- a Computer or other electronically device with the recommended operating system and hardware configuration as stated in the Documentation.
- a measure of how much information a network can transfer
- System- system software that manages computer hardware and software resources, and provides common services for computer programs.
- Joint Photographic Experts Group
- connected to, served by, or available through a system and especially a computer or telecommunications system Megahertz- a million cycles per second
- Computing includes designing and building hardware and software systems for a wide range of purposes
- A computer that sits between different networks or applications.
- Files don’t take up as much space and can be transferred to other computers quicker
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- an extremely transferable programming language used across platforms and different types of devices, from smartphones to smart TVs
- a unit of digital information that most commonly consists of eight bits
- provides the instructions and processing power the computer needs to do its work
- a tiny wafer of semiconducting material with an embedded electronic circuit
- Shows how many pixels are on a computer screen
- a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- Any stored data
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
Down
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- allows devices to communicate with each other without cables or wires.
- the smallest unit of data that a computer can process and store
- to shut down and restart (a computer system) or (of a computer system) to shut down and restart.
- t he process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- a data measurement unit applied to digital computer or media storage
- Space- the total amount of data that a hard disk or hard drive can store Virus- a type of malicious software, or malware, that spreads between computers and causes damage to data and software Memory- the electronic components used by computers to store data and instructions that can be accessed quickly by the processor
- analogue computer, any of a class of devices in which continuously variable physical quantities
- files embedded within online communication channels such as emails, instant messages, or social network
- small files of information that a web server generates and sends to a web browser
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- a set of rules to transmit data from different devises
- any unsolicited communication sent in bulk
- any criminal activity that involves a computer, network or networked device
- Security- the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.
- a type of malware that downloads onto a computer disguised as a legitimate program
35 Clues: Any stored data • Joint Photographic Experts Group • any unsolicited communication sent in bulk • Shows how many pixels are on a computer screen • a set of rules to transmit data from different devises • a measure of how much information a network can transfer • the smallest unit of data that a computer can process and store • ...
ICS puzzle 2023-12-12
Across
- the process of converting coded or encrypted data to its original form.
- attempts by hackers to cause harm, destroy, or access sensitive information in a computer system.
- Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- a form of malware that distributes itself by transferring copies of itself to other computers across the network.
- attack swamps a website with so much traffic that it simply can’t cope
- a technique used by threat actors to leverage a vulnerability in order to compromise a system.
- a activity when cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
- a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
- A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
- an identity verification process
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
- A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Down
- a program used to prevent, identify, and remove viruses and other malicious software from your computer.
- A copy of files and programs made to facilitate recovery, if necessary.
- an email-based threat that tries to coerce the victim into clicking on a link in an email or opening an attachment that has arrived by email.
- perform simulated cyberattacks on computer systems and networks to help identify security vulnerabilities and weaknesses.
- a modern security strategy based on the principle never trust, always verify.
- a network security device, it creates a barrier between a trusted network and an untrustworthy network.
- A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
- A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.
- Disclosure of information to unauthorized persons, or a violation of the security policy of a system.
- Unauthorized act of bypassing the security mechanisms of a system.
- Any circumstance or event with the potential to adversely impact organizational operations.
- an encrypted internet connection to provide a secure connection.
- a part of the World Wide Web only accessible through special software or tools, where keeps its users and visitors hidden.
- An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
- an unintended software or hardware problem
- An attack on the authentication protocol run in which the Attacker positions himself in between the Claimant and Verifier so that he can intercept and alter data traveling between them.
28 Clues: an identity verification process • an unintended software or hardware problem • an encrypted internet connection to provide a secure connection. • Unauthorized act of bypassing the security mechanisms of a system. • attack swamps a website with so much traffic that it simply can’t cope • A copy of files and programs made to facilitate recovery, if necessary. • ...
Clique 2018-01-16
Across
- Someone around the same age, grade and size.
- Touching a persons body or things.
- An exclusive group of friends that leave others out.
- Pushing others by things you say.
- Name of a Queen Bee.
Down
- A name of the world's greatest counselor
- To push.
- Name of a Target Bee.
- The best elementary school in the whole world.
- A way to bully using the internet.
10 Clues: To push. • Name of a Queen Bee. • Name of a Target Bee. • Pushing others by things you say. • Touching a persons body or things. • A way to bully using the internet. • A name of the world's greatest counselor • Someone around the same age, grade and size. • The best elementary school in the whole world. • An exclusive group of friends that leave others out.
Digital Citizenship 2019-06-17
Across
- misuse act crime to use a computer
- a _ _ _ or set of _ _ _ _
- when someone goes on a _______ without owners permission
- divide someone who dosent have acsess to _ _ _ _ _ _ _ _ _ _ _
Down
- commissioner someone who can enforce the data protection act
- bullying hurt someone
- subject _ _ _ _ about you/people
- intelligence human intelligence processed by a computer
- communication can cause distress or anxiety
- something that can cause problems with electronics
10 Clues: a _ _ _ or set of _ _ _ _ • bullying hurt someone • misuse act crime to use a computer • subject _ _ _ _ about you/people • communication can cause distress or anxiety • something that can cause problems with electronics • intelligence human intelligence processed by a computer • ...
Complexity Cross V2 2024-05-09
Across
- The youngest in the group, was merged with a
- Cyber taught Stratus strength of the ____, not the body
- The character who loves plants
- A rare delicacy, and Sage's prized possession
- The filmmaker who's everywhere
Down
- The character who was once a vigilante
- ____, the teenage goddess
- _____ Forest, the place where Sage grew up
- ____ City, the place where Stratus lives
- The character who can control metal
10 Clues: ____, the teenage goddess • The character who loves plants • The filmmaker who's everywhere • The character who can control metal • The character who was once a vigilante • ____ City, the place where Stratus lives • _____ Forest, the place where Sage grew up • The youngest in the group, was merged with a • A rare delicacy, and Sage's prized possession • ...
The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04
Across
- What car manufacturer made the first modern driverless car
- Data should not be kept longer than
- Who is exempt from the data protection act
- All personal data should be kept
- The owner of the data
Down
- The DPA has 8
- Police, Government and Taxers all all ______ from the DPA
- A form of cyber-bullying
- Data must be routinely for maximum protection
- Data should be used
10 Clues: The DPA has 8 • Data should be used • The owner of the data • A form of cyber-bullying • All personal data should be kept • Data should not be kept longer than • Who is exempt from the data protection act • Data must be routinely for maximum protection • Police, Government and Taxers all all ______ from the DPA • What car manufacturer made the first modern driverless car
CYBERSECURITY 2025-02-08
Across
- A person who tries to break into systems.
- A fake email trying to trick you.
- Someone you do not know online.
- Relating to computers and the internet.
- Software designed to harm your device.
Down
- The action of entering username/password.
- A secret code to keep your account safe.
- A way to send messages online.
- Keeping your personal information safe.
- A harmful program that damages a computer.
10 Clues: A way to send messages online. • Someone you do not know online. • A fake email trying to trick you. • Software designed to harm your device. • Keeping your personal information safe. • Relating to computers and the internet. • A secret code to keep your account safe. • The action of entering username/password. • A person who tries to break into systems. • ...
Chapter 8 - System Access 2023-03-21
Across
- Permissions listed on an access control list (ACL) that are granted to a user. ACEs can be Allow or Deny. They can be assigned explicitly or inherited.
- The level of permissions that have been granted to a user who has been authenticated to a system.
- An object that contains security credentials. In Windows, it includes the user's security ID (SID) as well as the SID for each security group the user is a member.
- A method of authentication for which the user creates an online user account with Microsoft. Each time the user signs into the local system, Windows submits the credentials over the internet to Microsoft for authentication.
- The generally accessible key in a cryptographic system. It is used to encrypt data and is stored within a certificate. It cannot be used to decrypt the data.
- The security process in which the client authenticates to the server and, before data is exchanged, the server authenticates back to the client.
- A security feature that can be configured in the Windows sign-in settings to automatically lock a computer when the user walks away. It requires a Bluetooth device (typically a smartphone) that can be connected to the workstation.
- A collection of access rights, usually connected with an employee's responsibilities in an organization.
- A text string or regular expression used to scan files for matches.
- Rules that include a condition that must be matched for permission assignments to be made.
- The key that is used to decrypt data in a cryptographic system. It is stored in a private certificate store and should be protected and not shared.
- A group of users who have complete and unrestricted access to the system and accounts.
- In Windows, the ability to set policies that will provide feedback on specified events within a host or network.
- An action a user can perform on a system. Group Policy provides a set of predefined rights.
- Permissions granted to files or subfolders based on the permissions assigned to a parent folder.
- A method of authentication that stores on the local system the usernames and passwords for each user.
Down
- Microsoft's virtualization machine creation software that can create software-based virtual computers within a Windows system.
- A setting or group of settings applied to a user or computer. Polices are configured using Group Policy on the local computer or in the domain.
- A process of translating data into an unreadable format or code to prevent unauthorized access to the data.
- A permission uses an allow or deny statement to control user access to resources.
- A Windows feature that uses virtualization extensions of the central processing unit. It is used to protect data in memory from malicious attacks.
- A feature of Windows server systems that allows the system administrator to centralize control of access to files and folders based on file and folder attributes in combination with the attributes of the user.
- The security process in which the client authenticates to the server before the server will send data back to the client.
- A method of authentication that stores the usernames and passwords on a remote computer within the network that is configured as a domain controller.
- A device you can buy from a retailer for authentication. It can be configured in Windows for use as an additional sign-in option.
- A Windows encryption feature that is used on full volumes and cannot be used on individual files or folders.
- In Windows auditing, a setting in an auditing policy that turns on the logging of events in a host or network.
- A list of permissions granted to users and groups. The permissions are associated with an NTFS file or folder.
- A list of central access rules that define the level of access a user has to data managed by DAC.
- A collection of users that, by default, has very minimal access to the system.
- The creator of a file or folder who, by default, has full access.
- A Windows sub-security process that authenticates to the local system, stores security-related information, and creates access tokens.
- Security features that restrict or allow user access to resources on the system.
- A component of the Windows operating system that helps protect the system during the start-up or boot process.
- A biometric logon system incorporated into Windows 10 sign-in settings.
- In Windows auditing, a setting that turns off an auditing policy.
- Verifying that an entity requesting credentials is the entity associated with the credentials. It is also called identity proofing.
37 Clues: The creator of a file or folder who, by default, has full access. • In Windows auditing, a setting that turns off an auditing policy. • A text string or regular expression used to scan files for matches. • A biometric logon system incorporated into Windows 10 sign-in settings. • A collection of users that, by default, has very minimal access to the system. • ...
AppSec Village @ BlueHat India 2024-01-18
Across
- A script that's cross, but not because it's angry
- A token of security, not a medieval pledge of fealty
- A case of mistaken identity, but for cloud resources
- A web menace that's not a cookie monster, but might use one
- A directory in the cloud, not a phonebook
- A bouncer for cloud services, checking IDs at the door
- A casting director for cloud access, assigning roles, not actors
Down
- A central hub for cloud safety, not a mall cop station
- Where secrets are locked away, not in a pirate's chest
- Not just a catwalk for risks, it's a blueprint for defense
- A security check that's more of a poke around than a full physical
- A blend of development, security, and operations - shaken, not stirred
- It's a scramble, but not for breakfast
13 Clues: It's a scramble, but not for breakfast • A directory in the cloud, not a phonebook • A script that's cross, but not because it's angry • A token of security, not a medieval pledge of fealty • A case of mistaken identity, but for cloud resources • A central hub for cloud safety, not a mall cop station • Where secrets are locked away, not in a pirate's chest • ...
Cisco Enterprise Networking and Data Center Indepth 2020-07-31
Across
- Routing & Switching Cisco competitor?
- Using multiple cloud services?
- SDN/SDWAN Cisco competitor?
- Unified intent-based networking architecture?
- type of switch that makes scaling the network easier?
- UCS Competitor of Cisco?
- SDN/SDWAN Cisco competitor?
- Common security problem with data centers?
- DC Storage competitor of Cisco?
Down
- DC Security competitor of Cisco?
- Routing & Switching Cisco competitor?
- Simplify the number of devices connected?
- UCS Competitor of Cisco's product line?
- Catalyst 3000 came from what company?
- Cisco's popular brand of network switches, wirleess controllers, and access points?
- DC Networking competitor of Cisco?
16 Clues: UCS Competitor of Cisco? • SDN/SDWAN Cisco competitor? • SDN/SDWAN Cisco competitor? • Using multiple cloud services? • DC Storage competitor of Cisco? • DC Security competitor of Cisco? • DC Networking competitor of Cisco? • Routing & Switching Cisco competitor? • Routing & Switching Cisco competitor? • Catalyst 3000 came from what company? • ...
Computer Words 2024-06-17
Across
- the smallest unit of data that a computer can process and store.
- Security- the practice of protecting systems, networks, and programs from digital attacks
- the ability of software and hardware from different sources to work together without having to be altered to do so
- allows devices to communicate with each other without cables or wires.
- a software program used to locate and display information on the Internet or an intranet.
- any unsolicited communication sent in bulk.
- small files of information that a web server generates and sends to a web browser
- used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- a tiny wafer of semiconducting material with an embedded electronic circuit.
- a data measurement unit applied to digital computer or media storage
- System- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- computer systems that are connected to a network and are accessible to users from anywhere at any time
- a unit of data that is eight binary digits long
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- A zip is a file format that can contain multiple files combined and compressed into one file.
Down
- the capacity at which a network can transmit data.
- the use or operation of computers.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- to reload the operating system of a computer:
- an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
- the transmission of high-quality data of wide bandwidth.
- the number of pixels that are displayed per inch for an image
- the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- a set of rules for formatting and processing data.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a computer on a network that provides the interface between two applications or networks that use different protocols
- the logic circuitry that responds to and processes the basic instructions that drive a computer
- device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- files embedded within online communication channels such as emails, instant messages, or social networks
- Any stored data.
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- a type of malware that downloads onto a computer disguised as a legitimate program
- a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- Crime- any criminal activity that involves a computer, network or networked device.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- Space- the amount of data that can reside within the disk drive or storage medium to a maximum limit.
40 Clues: Any stored data. • the use or operation of computers. • any unsolicited communication sent in bulk. • to reload the operating system of a computer: • a unit of data that is eight binary digits long • the capacity at which a network can transmit data. • a set of rules for formatting and processing data. • the transmission of high-quality data of wide bandwidth. • ...
AT THE AIRPORT - Al Aeropuerto 2018-10-16
16 Clues: Gate • Pilot • Tickets • Trolley • Luggage • Delayed • Customs • Arrivals • Security • Passport • Check in • Suitcase • Aeroplane • Departures • Money Exchange • Monitor (screen)
Puzzle #10 – “Direct Deposit” 2025-06-29
Across
- - Agency that sets up your Social Security payments
- - Direct deposit is this compared to mailing checks
- - Electronic way to receive Social Security benefits
- - You must have this to receive direct deposit
- - Where your Social Security check is usually sent
Down
- - The method used instead of paper checks
- - How payments are delivered once direct deposit is set up
- - One reason direct deposit is recommended
- - Type of account where deposits often go
- - This number helps send money to the right bank
10 Clues: - The method used instead of paper checks • - Type of account where deposits often go • - One reason direct deposit is recommended • - You must have this to receive direct deposit • - This number helps send money to the right bank • - Where your Social Security check is usually sent • - Agency that sets up your Social Security payments • ...
CyberDSA D2 2025-08-14
Across
- Encrypted network connection over the internet for secure communication.
- Software that secretly collects user information.
- Security Operations Center that monitors and responds to threats.
- Process of verifying the identity of a user or system.
- Copy of data kept for recovery in case of loss.
Down
- Process of converting data into a secure, unreadable format.
- Secret string used to authenticate a user.
- Software update designed to fix security vulnerabilities.
- Network security device that filters incoming and outgoing traffic.
- Malicious program that can copy itself and infect systems.
10 Clues: Secret string used to authenticate a user. • Copy of data kept for recovery in case of loss. • Software that secretly collects user information. • Process of verifying the identity of a user or system. • Software update designed to fix security vulnerabilities. • Malicious program that can copy itself and infect systems. • ...
Safety and Security 2016-03-15
Across
- Business names, Garda arival, coin order, cash amounts transfered
- Bundling/Clipping money and keeping drawer____
- Processes and methodologies designed to protect sensitive information
- Have a password protect _____ for all private information
- Locking your _____ anytime you walk away from station
- If you leave our desk/computer do this
- Limit for bottom drawer
- Keep your security codes ____
Down
- Limit for top drawer
- Before you leave at night do this to your workstation PC
- Handwritten notes, documents, account numbers
- Print, Electronic, Verbal
- None of these items in your drawer
- Email, OSI, Velocity, Online check orders
14 Clues: Limit for top drawer • Limit for bottom drawer • Print, Electronic, Verbal • Keep your security codes ____ • None of these items in your drawer • If you leave our desk/computer do this • Email, OSI, Velocity, Online check orders • Handwritten notes, documents, account numbers • Bundling/Clipping money and keeping drawer____ • ...
2021 Q4 Security 2021-12-15
Across
- Use the ____ button when you receive a 'sus'email
- Number of people that are emailed when we call 911
- The company that monitors our alarms
- ____, hide, neutralize in an active shooter situation
- Packet in vault room with specific instructions
- ___ with all demands of the robber
Down
- When safe to do so press your ____ buttons
- To call 911 dial _-911
- Never write down or share _____
- In the event of a fire, ____ mbr sensitive info
- Always leave the building in ____
- Packet under the phone
- ___ parking lot is our Secondary Meeting Spot
- Great ___ is our best robbery deterrent
14 Clues: To call 911 dial _-911 • Packet under the phone • Never write down or share _____ • Always leave the building in ____ • ___ with all demands of the robber • The company that monitors our alarms • Great ___ is our best robbery deterrent • When safe to do so press your ____ buttons • ___ parking lot is our Secondary Meeting Spot • ...
Q4 Security Training 2023-12-20
Across
- When safe to do so, we should activate the _____ or/and observe the robber's escape route.
- thousand What is the amount dispensed during a robbery from the TCR?
- To preserve evidence of a not pass robbery, drop the note on the ____ or leave it at your station.
- The type of form filled out when observing a robber.
- Person responsible for advising members of a robbery situation.
- All Media inquires go to this department.
- Most bomb threats and extortion are received this way.
- These eight items around the branch can help alert security that a robbery has occurred.
Down
- Person responsible for shouting "I've been robbed, Lock the doors!"
- The practice of obtaining something, especially money, through force of threats.
- When calling 911, we call from an RBFCU ____ ____.
- This form provides the following information: Contact names, instructions for branch employees on what to do during and after a robbery, and phone numbers.
- Behavior to keep during a robbery is to ___ _____ and avoid sudden movements.
- Keys to press for dispense procedure.
14 Clues: Keys to press for dispense procedure. • All Media inquires go to this department. • When calling 911, we call from an RBFCU ____ ____. • The type of form filled out when observing a robber. • Most bomb threats and extortion are received this way. • Person responsible for advising members of a robbery situation. • ...
Information Security Awareness 2020-09-24
Across
- This is better and harder to crack than a password
- The type of email to get you to click on a fraudulent link
- Disclosing personal member information may be
- The best response to password Recovery Questions is
- engineering,How might someone evil try to get information from you
- Someone that follows closely behind you without using their badge
- Minimum number of characters for a network password
- What is not allowed in a DNA password
- This is better and harder to crack than a password
- If I click on a link I believe was malicious I should
Down
- How do you think most evil hackers begin to break into a company’s network?
- What is the default data classification
- The data classification for Employee Handbook, internal phone directory
- Best way to keep track of multiple unique passwords
- Who is responsible for data security
15 Clues: Who is responsible for data security • What is not allowed in a DNA password • What is the default data classification • Disclosing personal member information may be • This is better and harder to crack than a password • This is better and harder to crack than a password • The best response to password Recovery Questions is • ...
The Thrilling Puzzle Climax Of K Collins' Computer Science Lessons 2023-05-04
Across
- What car manufacturer made the first modern driverless car
- Data should not be kept longer than
- Who is exempt from the data protection act
- All personal data should be kept
- The owner of the data
Down
- The DPA has 8
- Police, Government and Taxers all all ______ from the DPA
- A form of cyber-bullying
- Data must be routinely for maximum protection
- Data should be used
10 Clues: The DPA has 8 • Data should be used • The owner of the data • A form of cyber-bullying • All personal data should be kept • Data should not be kept longer than • Who is exempt from the data protection act • Data must be routinely for maximum protection • Police, Government and Taxers all all ______ from the DPA • What car manufacturer made the first modern driverless car
English Holiday HomeWork Mohamed Asharaful Part 1 2021-08-28
Across
- Poverty, SDG goal against poverty.
- Water and Sanitization, Lacking in cleanliness and water.
- Responsibility, Responsible posts and appropriate posts against any sensitive topic.
- Education, SDG goal for good education.
- A chance for next generation.
- Life, Non polluted life for animals in land.
- People who use internet to bully people psychologically.
Down
- For the next generation.
- For the transportation.
- Life, Non-Polluted life under the water.
10 Clues: For the transportation. • For the next generation. • A chance for next generation. • Poverty, SDG goal against poverty. • Education, SDG goal for good education. • Life, Non-Polluted life under the water. • Life, Non polluted life for animals in land. • People who use internet to bully people psychologically. • Water and Sanitization, Lacking in cleanliness and water. • ...
7cf nachhol 2024-01-13
Across
- a group of people who sing
- to suddenly talk to somebody in a aggressive way: to ...
- verb for behaviour: to ...
- something you can carry injured people with
- to say something nasty about someone online: cyber ...
Down
- a very high building
- ... to a survey, children use their mobile phones too often
- English for "besonders"
- another word for "most of the time"
- noun of "to use"
10 Clues: noun of "to use" • a very high building • English for "besonders" • a group of people who sing • verb for behaviour: to ... • another word for "most of the time" • something you can carry injured people with • to say something nasty about someone online: cyber ... • to suddenly talk to somebody in a aggressive way: to ... • ...
social media and mental health 2024-04-19
Across
- platform made by meta
- online, perhaps
- mean action done by one or more people to another group or person
- a feeling related to sunshine and the color yellow
- slow exercise that helps with flexibility and calming
Down
- people use this to talk about their feelings
- social media users make these
- prolonged sadness
- quiet activity to help clear and calm the mind
- severe worrying
10 Clues: online, perhaps • severe worrying • prolonged sadness • platform made by meta • social media users make these • people use this to talk about their feelings • quiet activity to help clear and calm the mind • a feeling related to sunshine and the color yellow • slow exercise that helps with flexibility and calming • ...
Technogley 2025-01-16
Across
- the brain of your computer
- it capulises your words
- it makes your computer have sound
- it can tern your computer on and of
- bullying
Down
- it macks your crombook eseer or harder to here
- helps you find things you don't know
- it deletes letters of your screens
- how you connect internet to a phone, tablet or computer
- saver photos and words and letters
10 Clues: bullying • it capulises your words • the brain of your computer • it makes your computer have sound • it deletes letters of your screens • saver photos and words and letters • it can tern your computer on and of • helps you find things you don't know • it macks your crombook eseer or harder to here • how you connect internet to a phone, tablet or computer
Hass im Netz 2025-05-16
Across
- Vorsilbe für alles, was im Internet passiert.
- So nennt man einen Beitrag in sozialen Netzwerken.
- Person, die im Netz absichtlich provoziert.
- Damit sichert man Beweise bei Cybermobbing.
- Beleidigende oder hetzerische Sprache im Netz.
Down
- Diese sollte man auch im Netz schützen.
- Im Internet oft ohne echten Namen unterwegs.
- Welle negativer Kommentare im Netz.
- So schützt man sich vor Belästigung online.
- Online-Kommunikation in Echtzeit.
10 Clues: Online-Kommunikation in Echtzeit. • Welle negativer Kommentare im Netz. • Diese sollte man auch im Netz schützen. • So schützt man sich vor Belästigung online. • Person, die im Netz absichtlich provoziert. • Damit sichert man Beweise bei Cybermobbing. • Im Internet oft ohne echten Namen unterwegs. • Vorsilbe für alles, was im Internet passiert. • ...
3 ja 3.1 2025-02-25
15 Clues: tulkki • kunnia • nuoriso • tehtävä • intohimo • konflikti • ilahtunut • arvokkuus • väkivalta • tasa-arvo • yhteishenki • turvallisuus • vuosittainen • monikielisyys • puolestapuhuja
Algorithms 2024-09-12
Across
- a common port smaller than USB
- safety the practice of protecting yourself online
- the action you take with your mouse
- a programming concept that allows you to repeat a set of instructions
- the smallest unit of data a computer can process (1/0)
- another word for software
- a list of steps needed to complete a task
Down
- The most common type of port
- the practice of protecting computer systems
- The language that tells a computer what to do
- a single simple instruction
- a person who writes code
- A programming error
13 Clues: A programming error • a person who writes code • another word for software • a single simple instruction • The most common type of port • a common port smaller than USB • the action you take with your mouse • a list of steps needed to complete a task • the practice of protecting computer systems • The language that tells a computer what to do • ...
Documents: Lesson 7 2021-10-01
Across
- Also located within Documents Section
- Position or _____ Trustee, Sponsor etc when they sign
- where coding is located in mainframe
- Only these SCNs can Esign Documents
- shows who and when documents was signed in the document ______
- _________ Preferences are made by each ER
- OneNote for EDS
- Where you view document history
- section in Manage security where esign rights are located
Down
- Which tab are the forms located in?
- Esignature but not Trustee, fiduciary or Adopting Employer?
- Grants access to Secondary to esign
- "...Employer" signature role
- E stands for in Esignature
- Where the notifications for tasks go to ER
- ToDOList Item
- Esignature Role
- Where the Signor goes to Esign documents (3 words)
- ________ Security to assign Esig Rights to SCNs
19 Clues: ToDOList Item • Esignature Role • OneNote for EDS • E stands for in Esignature • "...Employer" signature role • Where you view document history • Which tab are the forms located in? • Grants access to Secondary to esign • Only these SCNs can Esign Documents • where coding is located in mainframe • Also located within Documents Section • _________ Preferences are made by each ER • ...
Thanksgiving V2 2023-10-30
Across
- Typical pie for fall.
- How many days did the first Thanksgiving last
- Ornamental container shaped like a goat's horn
- Another typical side dish, loved by rabbits.
- Monday after Thanksgiving
- Often the main course of a meal on Thanksgiving
- Attended the first Thanksgiving with the Indigenous American tribe
Down
- Indigenous American tribe that celebrated the first Thanksgiving
- Food comes in a sauce or a jelly
- Site of first Thanksgiving
- Dish either can be sweet or mashed
- Friday after Thanksgiving
- Typical Southern side dish
- Green, French, string are types of these.
- Typically "stuffed" inside a turkey
- Side dish that is cooked slowly in an oven
- Typically poured over mashed potatoes
17 Clues: Typical pie for fall. • Friday after Thanksgiving • Monday after Thanksgiving • Site of first Thanksgiving • Typical Southern side dish • Food comes in a sauce or a jelly • Dish either can be sweet or mashed • Typically "stuffed" inside a turkey • Typically poured over mashed potatoes • Green, French, string are types of these. • Side dish that is cooked slowly in an oven • ...
Stock Market Terms 2020-05-19
Across
- is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
- the price a seller is willing to accept for a security [1 wrd]
- is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
- is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
- a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
- is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
- a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
- to obtain in exchange for payment[1 wrd]
- the availability of liquid assets to a market or company [1 wrd]
- an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
- is the completion of a buy or sell order for a security. [1 wrd]
- is the last price at which a security or commodity traded [1 wrd]
- is a portmanteau of foreign currency and exchange. [1wds]
- A bear market is when a market experiences prolonged price declines. [2wds]
- refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
- give or hand over something in exchange for currency [ 1 wrd]
- is defined as the purchase and sale of a security within a single trading day. [2 wds]
- is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
- is the total quantity of shares or contracts traded for a specified security. [2wds]
- refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
- is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
- an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
- sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
- is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
- is a unique series of letters assigned to a security for trading purposes. [1 wrd]
- the number of shares that a corporation is legally allowed to issue[2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
- is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
- refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
- refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
- involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
- is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
- is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
- a range of investments held by a person or organization. [1 wrd]
- is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
- offer a certain price for something especially at an auction [ 1wrd]
- is a measurement of market risk or volatility .[1 wds]
- A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
- the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
40 Clues: to obtain in exchange for payment[1 wrd] • is a measurement of market risk or volatility .[1 wds] • is a portmanteau of foreign currency and exchange. [1wds] • give or hand over something in exchange for currency [ 1 wrd] • the price a seller is willing to accept for a security [1 wrd] • the availability of liquid assets to a market or company [1 wrd] • ...
Stock Market Terms 2020-05-21
Across
- is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
- the price a seller is willing to accept for a security [1 wrd]
- is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
- is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
- a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
- is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
- a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
- to obtain in exchange for payment[1 wrd]
- the availability of liquid assets to a market or company [1 wrd]
- an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
- is the completion of a buy or sell order for a security. [1 wrd]
- is the last price at which a security or commodity traded [1 wrd]
- is a portmanteau of foreign currency and exchange. [1wds]
- A bear market is when a market experiences prolonged price declines. [2wds]
- refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
- give or hand over something in exchange for currency [ 1 wrd]
- is defined as the purchase and sale of a security within a single trading day. [2 wds]
- is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
- is the total quantity of shares or contracts traded for a specified security. [2wds]
- refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
- is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
- an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
- sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
- is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
- is a unique series of letters assigned to a security for trading purposes. [1 wrd]
- the number of shares that a corporation is legally allowed to issue[2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
- is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
- refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
- refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
- involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
- is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
- is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
- a range of investments held by a person or organization. [1 wrd]
- is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
- offer a certain price for something especially at an auction [ 1wrd]
- is a measurement of market risk or volatility .[1 wds]
- A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
- the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
40 Clues: to obtain in exchange for payment[1 wrd] • is a measurement of market risk or volatility .[1 wds] • is a portmanteau of foreign currency and exchange. [1wds] • give or hand over something in exchange for currency [ 1 wrd] • the price a seller is willing to accept for a security [1 wrd] • the availability of liquid assets to a market or company [1 wrd] • ...
Women and The New Deal 2020-02-27
Across
- There was still a belief that men were the rightful _______
- Most ND programmes were designed to help men. Only 8000 women were involved in this program
- The Social Security Act benefited women with families as it provided what type of benefits?
- This person encouraged the formation of the Black Cabinet as well as championing the concept of a living wage
- The Wagner Act allowed women to join what along with men?
- There was discrimination against which group of women working
- This group of women were encouraged to pursue domestic work and higher education
- More women were doing this in 1940 than in 1933?
Down
- There was still a belief that women only worked for this type of money
- This 1935 act benefited single working-class women with young families who were unable to work.
- Who tried to avoid paying social security payments to women by introducing special qualifications and conditions?
- The 1936 Gallup Poll revealed that 4/5 people thought what type of women should not work?
- This person executed many aspects of the ND including the CCC, PWA and the Social Security Act
- Gladys Tantaquidgeon studied this subject at the University of Pennsylvania and was offered a position as social worker on a South Dakota reservation by John Collier.
- This group of women were ignored in the social security act as they were mainly employed as domestic workers
- Frances Perkins became the first female US Secretary of ___
16 Clues: More women were doing this in 1940 than in 1933? • The Wagner Act allowed women to join what along with men? • There was still a belief that men were the rightful _______ • Frances Perkins became the first female US Secretary of ___ • There was discrimination against which group of women working • ...
Delirium (section 2) 2015-05-07
Across
- Lena's pretty best friend.
- The color of a storm cloud.
- A house on a farmstead.
- The name for the disease of love.
- A word for security watching people.
- Library of approved books.
- Lena's aunt's name.
- A live music show.
Down
- People who live in the wilds.
- Separation of people based on prejudice.
- A vision you have while sleeping.
- A certain time for someone to be home.
- Where Alex takes his classes(University of Portland).
- People who patrol the streets after curfew.
- A place where science experiments are conducted.
- A solution to a sickness.
- Main character.
- Security gaur who Hana and Lena get caught by.
- Alex has a 3 pronged _____ on the side of his head.
- Library of authorized music.
20 Clues: Main character. • A live music show. • Lena's aunt's name. • A house on a farmstead. • A solution to a sickness. • Lena's pretty best friend. • Library of approved books. • The color of a storm cloud. • Library of authorized music. • People who live in the wilds. • A vision you have while sleeping. • The name for the disease of love. • A word for security watching people. • ...
Compliance Division 2024-02-07
Across
- Elevated __________
- Plays in a band
- Wrong 50% of the time
- Must agree on 3-way
- Email requiring action
- Where to send outstanding transactions
- Warning
- AKA True-up
- A monthly charge
- Fitness Enthusiast
- May hold Security Deposits
- For owner or tenant
- Where the bad ones go
- Loves Indy
- OK if Agreed to in PMA
- Part I _______
- Software
- Type of account
Down
- Often missing from Check Register
- Monthly Requirement
- When all three parts equal
- Often refundable
- Rentals we don't want to see in a CTA
- Money holder
- Pays the security deposit
- Makes the best cookies
- Mixed funds
- When records are not received
- Take me to your leader
- Not allowed to come out of a CTA
30 Clues: Warning • Software • Loves Indy • AKA True-up • Mixed funds • Money holder • Part I _______ • Plays in a band • Type of account • Often refundable • A monthly charge • Fitness Enthusiast • Elevated __________ • Monthly Requirement • Must agree on 3-way • For owner or tenant • Wrong 50% of the time • Where the bad ones go • Email requiring action • Makes the best cookies • OK if Agreed to in PMA • ...
LIVEABILITY CROSSWORD 2025-03-17
Across
- A community need for teenagers.
- Contaminates in the air, water or land.
- Commerce, trade and enterprise.
- Dentists, hospital, ambulance availability
- Train transport.
- Weather patterns and conditions. Temperature.
- A good government that is stable provides...
- Most people's preferred climate.
- Essentials structures and systems for a community
Down
- Childcare, TAFE, university, schools.
- The way people do life and experiences together
- Protection, security, well-being
- A place for healing and caring for the sick.
- Breaking of laws that make areas unsafe to live in.
- Purity of the air and atmosphere in a community.
- The qualities of a place that make it comfortable and suitable for living
- Leadership of communities.
- The business of selling goods to the public.
- Used for domestic and international travel.
- Worship, prayer, gathering
20 Clues: Train transport. • Leadership of communities. • Worship, prayer, gathering • A community need for teenagers. • Commerce, trade and enterprise. • Protection, security, well-being • Most people's preferred climate. • Childcare, TAFE, university, schools. • Contaminates in the air, water or land. • Dentists, hospital, ambulance availability • ...
IT Terms 2025-05-15
Across
- Internet-based delivery of IT resources.
- Software to manage customer interactions.
- Two-symbol system used by computers.
- Computer system within a larger system.
- Plan for continuing business during disruption.
- Simulates human intelligence in machines.
- Processes and executes instructions (abbr).
- Network of physical devices sharing data.
- Unique address for a device on a network.
- Device connected to a network.
- Visual interface with icons and menus.
- Tech and strategy for analyzing business data.
Down
- Stores data temporarily for quick access.
- Organized collection of electronic data.
- Protects systems from digital threats.
- Converts data into code for security.
- Group of connected computers sharing rules.
- Security device that filters traffic.
- Finding and fixing code issues.
- Set of rules for communication between software components.
20 Clues: Device connected to a network. • Finding and fixing code issues. • Two-symbol system used by computers. • Converts data into code for security. • Security device that filters traffic. • Protects systems from digital threats. • Visual interface with icons and menus. • Computer system within a larger system. • Internet-based delivery of IT resources. • ...
Safer Internet 2020-04-01
Across
- Person die sich als eine andre ausgibt.
- Beweise zu sichern wäre auch sehr vorteilhaft
- niedrige Preise heißen auch .....preise.
- Gegenteil von offline.
- Es gibt Vorteile im Internet, aber auch ....
Down
- Beim Phishing versucht man deine .... zu bekommen.
- Deine ...... solltest du schützen.
- Unter Cyber-Mobbing versteht man das ......,Bedrohen,Belästigen und Bloßstellen einer Person
- Damit bezahlst du in bar.
9 Clues: Gegenteil von offline. • Damit bezahlst du in bar. • Deine ...... solltest du schützen. • Person die sich als eine andre ausgibt. • niedrige Preise heißen auch .....preise. • Es gibt Vorteile im Internet, aber auch .... • Beweise zu sichern wäre auch sehr vorteilhaft • Beim Phishing versucht man deine .... zu bekommen. • ...
KI-Betrug: Die neuen Tricks der Cyberkriminellen 2025-03-28
Across
- - Was Phishing-E-Mails verwenden, um Sie auszutricksen.
- – Das solltest du tun, bevor du jemandem vertraust.
- - Fälschen einer E-Mail oder Telefonnummer.
- - Die Technologie hinter diesen neuen Betrügereien.
Down
- – Wenn geheime Daten plötzlich öffentlich sind.
- - Eine Sicherheitsfalle für Cyber-Kriminelle (engl.).
- - Ein realistisches, aber gefälschtes Video.
- - KI kann dies mit Stimmen tun.
- – Wenn jemand dich absichtlich täuscht.
9 Clues: - KI kann dies mit Stimmen tun. • – Wenn jemand dich absichtlich täuscht. • - Fälschen einer E-Mail oder Telefonnummer. • - Ein realistisches, aber gefälschtes Video. • – Wenn geheime Daten plötzlich öffentlich sind. • – Das solltest du tun, bevor du jemandem vertraust. • - Die Technologie hinter diesen neuen Betrügereien. • ...
Literasi Digital 2024-08-15
Across
- Nama lain dari kata sandi
- Aktivitas yang dilakukan seseorang secara daring untuk mengganggu atau menyakiti orang lain
- Kejahatan didunia digital disebut cyber
- Keamanan sangat penting untuk menjaga
Down
- Nama lain dari perangkat lunak
- Manfaat literasi digital untuk menambah
- Negara yang memiliki tingkat literasi digital yang tinggi
- HAKI terbagi menjadi berapa bagian
- Tombol untuk membatalkan tindakan di komputer
9 Clues: Nama lain dari kata sandi • Nama lain dari perangkat lunak • HAKI terbagi menjadi berapa bagian • Keamanan sangat penting untuk menjaga • Manfaat literasi digital untuk menambah • Kejahatan didunia digital disebut cyber • Tombol untuk membatalkan tindakan di komputer • Negara yang memiliki tingkat literasi digital yang tinggi • ...
Technology Vocabulary 2022-01-21
Across
- involving,using,or relating to the internet
- a person who has grown up with digital tech
- someone who dislikes new technology
- a discovery that really improves a situation
- to move something forward,or improve something
- a way something can be used for a purpose
Down
- important change in the way people do things
- to cause a change in someone or something
- the most modern stage of development
- the use of a new idea or method
- to start to happen or exist
- to continue gradually
12 Clues: to continue gradually • to start to happen or exist • the use of a new idea or method • someone who dislikes new technology • the most modern stage of development • to cause a change in someone or something • a way something can be used for a purpose • involving,using,or relating to the internet • a person who has grown up with digital tech • ...
malware 2023-06-19
Across
- sending emails or messages as fake company
- a word to keep your things safe
- fishing pretending to be a different person
- control lets parents set the settings on a device
- fraud a scam online
- a type of malware that downloads onto a computer
- mail emails that a useless
Down
- a program that breaks your device
- A computer program that can run independently
- allows users to convert information
- leaving a trace online
- when a person winds another up online
12 Clues: fraud a scam online • leaving a trace online • mail emails that a useless • a word to keep your things safe • a program that breaks your device • allows users to convert information • when a person winds another up online • sending emails or messages as fake company • fishing pretending to be a different person • A computer program that can run independently • ...
Digital Strategy 2025-11-03
Across
- predicting future demand for products
- software for managing business processes.
- Raw facts and figures used for analytics
- the process of sourcing and purchasing goods or services.
- monitoring the movement of goods.
- operating on an international scale
Down
- Network of suppliers, manufacturers and costumers
- Protecting systems and data from cyber threats
- Technology enabling remote access to computing resources
- a measurable value to evaluate performance.
- Automated tool that interacts with users via text or voice
- Step-by-step procedure for solving a problem
12 Clues: monitoring the movement of goods. • operating on an international scale • predicting future demand for products • Raw facts and figures used for analytics • software for managing business processes. • a measurable value to evaluate performance. • Step-by-step procedure for solving a problem • Protecting systems and data from cyber threats • ...
Faculty 2025-10-16
19 Clues: Gym • Art • Lab • Ivrit • 9th Bio • Spanish • Ramabam • History • Security • Principal • AP English • Engineering • Graphic design • Israel Guidence • College Advisory • Marketing Director • Associate Principal • Activities Director • Admissions Coodinator
Favorite ways to travel 2023-06-12
15 Clues: choice • safety • premium • elegant • journey • shadier • opulence • dreadful • airfield • confined • exploring • drawbacks • advantages • compartment • indefinitely
Stay Smart Online 2023-01-05
Across
- Stay _________ in Cyberspace.
- Always remember to ______ your accounts from other's devices.
- Do not share your ______ with anyone.
- Report any cases of _______ to Cyber crime department.
Down
- Respect the _________ laws
- Never share personal details on __________
- Be aware of _____ while shopping online.
- Apply _______ settings in Whatsapp to safeguard your data.
8 Clues: Respect the _________ laws • Stay _________ in Cyberspace. • Do not share your ______ with anyone. • Be aware of _____ while shopping online. • Never share personal details on __________ • Report any cases of _______ to Cyber crime department. • Apply _______ settings in Whatsapp to safeguard your data. • Always remember to ______ your accounts from other's devices.
DE TOPIC 1 2025-08-03
Across
- utilising software and digital and technologies
- Operates online
- Follow islamic principles and ethics
- Focus on physical good and services
Down
- Create positive societal impact
- Integration of cyber-physical systems, IoT, AI and data analitics
- Focused on mass production and global market
- Focused on sustainability and environment conservation
8 Clues: Operates online • Create positive societal impact • Focus on physical good and services • Follow islamic principles and ethics • Focused on mass production and global market • utilising software and digital and technologies • Focused on sustainability and environment conservation • Integration of cyber-physical systems, IoT, AI and data analitics
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16
Across
- Data describing other data, such as timestamps or authors
- An illegal intrusion into a computer system or network
- Legal process of collecting and analyzing digital evidence
- Unauthorized email scams that trick users into revealing information
- The verification procedure to demonstrate that the network meets security requirements
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Network tool for capturing and analyzing traffic
- Potential events or circumstances that can cause harm to an organization's assets.
- Technology used by NGFW to detect and block malware
Down
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- A central security resource where multiple virtual traps are monitored (One word).
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Process of identifying, assessing, and mitigating threats
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Programs designed to record personal information, typically undesired software
- Malicious software specifically designed to disrupt or damage computer systems
- Firewall Firewall type that provides unified policy across distributed networks
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20 2025-10-23
Across
- Data describing other data, such as timestamps or authors
- Process of identifying, assessing, and mitigating threats
- The verification procedure to demonstrate that the network meets security requirements
- Technology used by NGFW to detect and block malware
- Unauthorized email scams that trick users into revealing information
- An illegal intrusion into a computer system or network
- A central security resource where multiple virtual traps are monitored (One word).
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Malicious software specifically designed to disrupt or damage computer systems
Down
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Network tool for capturing and analyzing traffic
- Programs designed to record personal information, typically undesired software
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
- Potential events or circumstances that can cause harm to an organization's assets.
- Legal process of collecting and analyzing digital evidence
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- Firewall Firewall type that provides unified policy across distributed networks
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Software that records keystrokes, potentially capturing sensitive login credentials.
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
Phish 2024-09-18
Across
- : “Too good to be true”
- : Familiar ___ are often faked by scammers
- Link : Imposter website
- for help : Sense danger?
- : Who should learn how to recognize and avoid (phishing)?
- Breach : Exposes business secrets and confidential data
Down
- Criminal : A stranger in a dark alley is much like a _____ in your inbox.
- : Where to find additional information on the different types of (phishing)
- : Malicious email attack
- : Compromises computer and files
- Credentials : Never send these via email
- : “Think Before You ___”
- Phish : Who do you report suspicious email to?
13 Clues: : “Too good to be true” • Link : Imposter website • : Malicious email attack • : “Think Before You ___” • for help : Sense danger? • : Compromises computer and files • Credentials : Never send these via email • : Familiar ___ are often faked by scammers • Phish : Who do you report suspicious email to? • Breach : Exposes business secrets and confidential data • ...
Spanish Review 2016-02-16
20 Clues: avion • camisa • quince • estudio • dibujar • entender • un libro • una mesa • una tiza • una rega • un lapiz • la gorra • una silla • madrugada • seguridad • calcetines • una mochhlia • una computadora • una calculadora • pantalones cortos
Politica 2018-03-04
26 Clues: paz • ley • deuda • líder • crimen • guerra • consejo • opinión • demanda • Campaña • economia • sociedad • nacional • ejército • progreso • tribunal • gobierno • votación • libertad • impuesto • inversión • seguridad • seguridad • argumento • estrategia • presidente
Student Vocab Crossword puzzle 2023-04-26
25 Clues: gum • bomb • door • boat • tofly • trick • candy • image • hotel • plane • skier • towalk • turtle • energy • simple • avacado • baggage • weather • airport • security • cliffjump • perchance • waterbottle • bathingsuit • clothingstore
Student Vocab Crossword puzzle 2023-04-26
25 Clues: gum • bomb • door • boat • tofly • trick • candy • image • hotel • plane • skier • towalk • turtle • energy • simple • avacado • baggage • weather • airport • security • cliffjump • perchance • waterbottle • bathingsuit • clothingstore
Student Vocab Crossword puzzle 2023-04-26
25 Clues: gum • bomb • door • boat • tofly • trick • candy • image • hotel • plane • skier • towalk • turtle • energy • simple • avacado • baggage • weather • airport • security • cliffjump • perchance • waterbottle • bathingsuit • clothingstore
Prefix Crossword - Grade 8 Language Worksheet 2023-11-06
25 Clues: do • wind • pack • even • agree • truth • behave • natural • legible • comfort • honesty • similar • connect • approve • regular • possible • maturity • security • relevant • behaviour • expensive • mortality • advantage • probability • convenience
Politics 2016-03-01
Across
- : an attractive rather than coercive type of power
- : using laws to fairly judge and punish crimes and criminals
- : Politics as "master scienc"
- : ASEAN observer (Acronym)
- : evolved as science and art
- : another term for "security"
- : "city-state"
- : defense of the state and its citizens
- : quantitative and descriptive approach approach
- : persons and institutions that make and enforce laws
Down
- : in charge of internal security
- : limitation and regulation
- : Civil Society Organization
- : a subdiscipline of polisci that compares governments and political systems
- : International Relations
- : a qualitative approach that tries to find out what is best for the people
- : power of politicians and individuals to act out law
- : the act of influencing the government to do what you want
- : the currency of politics
- : military or economic type of power
20 Clues: : "city-state" • : International Relations • : ASEAN observer (Acronym) • : the currency of politics • : limitation and regulation • : Civil Society Organization • : evolved as science and art • : Politics as "master scienc" • : another term for "security" • : in charge of internal security • : military or economic type of power • : defense of the state and its citizens • ...
Fun while you learn. 2020-06-09
Across
- Physiological effect of rapid decompression.
- Also called the Silent review.
- The flight deck during critical phases.
- Mental review, Stop____ Review..
- In case of decompression, Put on the nearest Oxygen _ ?
- Command “Cabin crew Arm doors for departure and ___ ?
- Content of polar kit.
- Which crew does transit security search ?
- You must check this on a passenger’s boarding card.
- One of the hijacker profiles.
- Used for pax showing disruptive behavior.
Down
- Critical Phases of the flight, “Take off,__,landing.”
- This follows, CSD to the flight deck - 2.
- Adopt this position to preserve body temperature.
- You shout this 30 seconds before crash landing.
- Security form used ONLY for outstation.
- Decompression is ? ___ of cabin pressure.
- Element of fire triangle.
- The one who fights the fire.
- Command, “ ___initiate controlled disembarkation.”
20 Clues: Content of polar kit. • Element of fire triangle. • The one who fights the fire. • One of the hijacker profiles. • Also called the Silent review. • Mental review, Stop____ Review.. • The flight deck during critical phases. • Security form used ONLY for outstation. • This follows, CSD to the flight deck - 2. • Decompression is ? ___ of cabin pressure. • ...
NETWORKING REQUIREMENTS 2024-08-06
Across
- A negotiator between networks
- Relies on a server for services
- Common example is connecting a Bluetooth device with smartphone
- Devices connected in 1 physical environment
- Connects with cables
- Communication over a ranged distance
- A term for describing hubs and switches
- Divided in 7 layers allowing communication
- Security that controls input and output limitations
- Enables communication between physical devices
- Connection of 2 nodes
Down
- Technology for the speed of a desktop
- Practices to detect unauthorized access
- Facilitates communication between networks
- The maximum amount of capacity in a network
- Coming together for specific tasks
- Allows wireless devices to connect to wired networks
- Can be connected without cables
- Computers are linked by this device
- Rules on how data is transmitted
20 Clues: Connects with cables • Connection of 2 nodes • A negotiator between networks • Relies on a server for services • Can be connected without cables • Rules on how data is transmitted • Coming together for specific tasks • Computers are linked by this device • Communication over a ranged distance • Technology for the speed of a desktop • Practices to detect unauthorized access • ...
spanish 2023-01-27
Across
- security does this to luggage
- not taking off but
- getting checked aka
- when your getting on the plane
- in order to board you have to
- the people riding the plane
- the person who walks around planes
- you go here to get your bags
- you have to buy one of these
- what takes you from place to place
- not landing but
Down
- your plan for the trip
- what you put all your stuff in
- they open the ... to the plane
- making sure your flight is still on
- they scan your boarding pass on
- you take this from place to place
- you have to show security this
- to go in the air
- where you go to get on the plane
- what your suitcase is called
21 Clues: not landing but • to go in the air • not taking off but • getting checked aka • your plan for the trip • the people riding the plane • you go here to get your bags • you have to buy one of these • what your suitcase is called • security does this to luggage • in order to board you have to • what you put all your stuff in • they open the ... to the plane • when your getting on the plane • ...
RCY Marvel Crossword 2022-12-07
Across
- Dr Erik Selvig joined SHIELD to study this
- Librarian of Kamar Taj
- Dora Milaje Security chief
- Co founder of X-Con security
- Smallest Avenger
- King of Asgard
- King Laufeys son
- queen of Asgard
- Scott Langs cellmate
- Avenging archer
- Hydra Leader
- Scientific sister of Tchalla
- Had mind stone in forehead
Down
- Helps Howard Stark create SHIELD
- Odins oldest child
- Military rank held by Nick Fury
- one of Thanos adopted children
- Friend of Thor
- Nickname of Timothy Dugan
- Surname of Howard Starks business partner
- Assists Thor to defeat Hela
- Where Bucky finds sanctuary
- Bruce Banners alter ego
- First name of agent Natasha Romanoff alias at Stark Industries
- SHIELD agent who helped design Capt America shield
25 Clues: Hydra Leader • Friend of Thor • King of Asgard • queen of Asgard • Avenging archer • Smallest Avenger • King Laufeys son • Odins oldest child • Scott Langs cellmate • Librarian of Kamar Taj • Bruce Banners alter ego • Nickname of Timothy Dugan • Dora Milaje Security chief • Had mind stone in forehead • Assists Thor to defeat Hela • Where Bucky finds sanctuary • Co founder of X-Con security • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- The individuals who control access to people, data, and systems
- Kwiktrip's password policy requires that coworkers change their passwords __days
- You can help fight cybercrime by becoming a __________
- What is the common hacking method
- These are designed to maintain the security of everyone associated with an organization
- This attack occurs when cybercriminals research and track which sites employees visit the most
Down
- _____are the last line of defense
- Failure to run these equals failure to patch security vulnerabilities
- This security tool identified and removes malicious programs
- This dangerous attack targets specific people or organization, often with custom made email or messages
- Stealing money is the main goal behind this type of malware
- Any scenario that triggers emotions should also trigger your ______
- This attack occurs when someone sneaks into a secured area behind someone else
- What should you do when a workstation or device is no longer in use
- The future of security is_____, not machines
15 Clues: _____are the last line of defense • What is the common hacking method • The future of security is_____, not machines • You can help fight cybercrime by becoming a __________ • Stealing money is the main goal behind this type of malware • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
Foreign Policy Making Chapter 18 2025-04-15
Across
- is the policy of avoiding involvement in foreign affairs.
- North Atlantic Treaty Organization
- Fees for importing goods into the United States from other countries.
- has the power to declare war and control funding for foreign policy
- is a Cold War strategy to stop the spread of communism.
- represent the U.S. abroad in negotiations and embassies
- Establishment emphasized freedom from military threat and political coercion.
Down
- agency that gathers foreign intelligence for National Security in the U.S.
- the policy that involves decisions about relations with the rest of the world
- hostility between the United States and Soviet Union.
- is the policy of becoming involved in foreign affairs
- the president, the diplomats, congress, and the national security establishment are all what?
- An organization created in 1945 to promote international peace, security, and cooperation.
- is the use of violence to demoralize and frighten a country's population or government
14 Clues: North Atlantic Treaty Organization • hostility between the United States and Soviet Union. • is the policy of becoming involved in foreign affairs • is a Cold War strategy to stop the spread of communism. • represent the U.S. abroad in negotiations and embassies • is the policy of avoiding involvement in foreign affairs. • ...
JOBS 2022-04-13
17 Clues: cuoco • pilota • postino • gommista • barbiere • muratore • pescatore • fotografo • meccanico • idraulico • poliziotto • imbianchino • pasticciere • giardiniere • parrucchiera • elettricista • guardia di sicurezza
Pre school age shows 2021-08-17
Across
- patrol boy and his dogs fight crime and help other people
- repair man and tools
- the builder guy who builds stuff
- boy with friends and family
Down
- and friends purple dinosaur
- the expolor boots backpack the map also includes Spanish
- umzoomi the tiny team who helps kids
- chase kids who fight hacker
- and friends into the city Dora when she’s a teenager
- clues Steve joe use handy dandy notebooks
10 Clues: repair man and tools • and friends purple dinosaur • chase kids who fight hacker • boy with friends and family • the builder guy who builds stuff • umzoomi the tiny team who helps kids • clues Steve joe use handy dandy notebooks • and friends into the city Dora when she’s a teenager • the expolor boots backpack the map also includes Spanish • ...
Islington Crosswords. 2024-12-15
Across
- has solved different national and int'l cyber cases
- where classes are named after alumni
- cozy smaller lecture place
Down
- A record of the books you have borrowed
- A long-running cinema hall located in Kathmandu, named after a goddess
- Pops when heated
- Classes named after cities in Nepal
- biggest lecture place
- holds an old memory of the college
9 Clues: Pops when heated • biggest lecture place • cozy smaller lecture place • holds an old memory of the college • Classes named after cities in Nepal • where classes are named after alumni • A record of the books you have borrowed • has solved different national and int'l cyber cases • A long-running cinema hall located in Kathmandu, named after a goddess
FITE: Technology Terms 2013-05-14
8 Clues: speed of computer • short term storage • how you behave online • another word for online • Comcast, xfinity, Dish, etc. • another software similar to Powerpoint • an upgrade that lets you have more slots to plug in • what you do to give credit to the website,book, author, poet etc.
Les mots-croisés PlayStation #4 2022-08-01
8 Clues: PlayStation... • Une ville du futur • S'éloigner en toute hâte • Quand on n'est pas à plusieurs • L'antagoniste historique du chien • Quand on ne trouve pas son chemin • Qui va de côté et d'autre, qui n'est pas fixé • Suite à une flèche dans le genou nous sommes...
Networking and Cyber Ethics 2025-06-11
Across
- Sending unwanted emails or advertisements
- Speech Avoiding this keeps others safe from harm online
- Misleading information shared online
- A program designed to harm a computer
- Using someone else's work without giving credit
- The act of bullying others using digital devices
- These guide our behavior on the internet
- Taking credit for someone else's work
- The illegal copying of software
Down
- When someone pretends to be someone else online
- A person who uses technology to harm or steal
- Making changes to software without permission
- Strong word or phrase used to protect accounts
- Being honest and fair online
- Using fake identity to cheat or harm online users
- Using the internet in a respectful and legal way
- Keeping your personal data safe
- You should always think before you do this on social media
- Theft Type of theft involving personal data
19 Clues: Being honest and fair online • Keeping your personal data safe • The illegal copying of software • Misleading information shared online • A program designed to harm a computer • Taking credit for someone else's work • These guide our behavior on the internet • Sending unwanted emails or advertisements • Theft Type of theft involving personal data • ...
vocabulary unit 11 2024-02-26
pedro crossword puzzle 2015-04-28
8 Clues: copying word for word • having manners online • people being mean online • common place people cyber bullied • only taking a little of someone's work • a site anyone can edit or express opinion • law to stop people from copying someone else's work • harmful attachment that latches unknowingly to your computer
Encryption 2022-01-10
Across
- Decoding machine used at Bletchley Park during
- an algorithm for performing encryption and
- appear
- Type of analysis used to determine how often
Down
- Code used during WW1/2 comprising dots and dashes
- Organisation responsible for UK cyber defence
- Person responsible for the first substitution cipher
- an encryption method used by the ancient
8 Clues: appear • an encryption method used by the ancient • an algorithm for performing encryption and • Type of analysis used to determine how often • Organisation responsible for UK cyber defence • Decoding machine used at Bletchley Park during • Code used during WW1/2 comprising dots and dashes • Person responsible for the first substitution cipher
pretty cute and smart 2025-02-19
19 Clues: % • wary • kind • amie • risky • truth • harsh • drunk • study • finish • pastor • sponge • doorway • hot out • sing loudly • magnetic pull • another person • best friends forever • people who protect you
Occupations 2021-02-03
Heathrow 2025-11-06
15 Clues: pass • pagas • turva • kohver • tualett • rahakott • nimesilt • sihtkoht • kaelapadi • seljakott • pardakaart • kõrvaklapid • kõrvatropid • ratastega kohver • väljumine, lahkumine
Vocabulario 2017-12-03
Profiles 2 text 1 Sandra 2014-12-03
15 Clues: esine • varata • varaus • hyttynen • kilpailu • elinaika • toimittaa • lomakeskus • ulkomailla • liioitella • vastakkainen • matkatavarat • aurinkovoide • turvallisuus • milloin tahansa
ena2 3-3.1 2025-02-25
15 Clues: juhla • rauha • rahat • viihde • ilahtunut • tasa-arvo • delegaatti • vuosipäivä • vähäosainen • muistojuhla • kiusaaminen • vuosittainen • turvallisuus • puolestapuhuja • omistautuminen
Digital citizenship 2022-02-16
Across
- something you don't share online
- a technology device where you can download social media apps
- a mode which you can put your account on
- something where you can post videos or pictures on
- a social media app
- a form of communicating to someone
Down
- a form of texting
- something you leave behind on the internet
- something which is private
- an app where you can talk to people online
- a crime
- an app where you can watch videos
- people who want information from you
13 Clues: a crime • a form of texting • a social media app • something which is private • something you don't share online • an app where you can watch videos • a form of communicating to someone • people who want information from you • a mode which you can put your account on • something you leave behind on the internet • an app where you can talk to people online • ...
CIP,C11-5,2018 2020-10-28
Across
- responsible for overseeing privacy legislation in a province or territory
- oversees provincial licensing
- The Insurance ____________ Act gives power to OSFI
- measure of financial stability for an insurance company
- a type of data breach where personal information is hacked
Down
- a condition formed from legislation
- supervisor of insurance companies
- an insurance company makes money this way
- a federal privacy act
- foreign insurance companies are regulated at this level of government
- files a report with the federal regulator
- the regulator in Quebec
- a type of computer liability insurance
13 Clues: a federal privacy act • the regulator in Quebec • oversees provincial licensing • supervisor of insurance companies • a condition formed from legislation • a type of computer liability insurance • an insurance company makes money this way • files a report with the federal regulator • The Insurance ____________ Act gives power to OSFI • ...
Bullying 2024-12-19
Across
- The act of copying
- Harming another person's reputation
- The act of physically harming another person
- Provoking or making fun of someone playfully
- Using the body or an object to harm others
- The act of pushing someone
- Using words to threaten, harm, or hurt another person
Down
- Use of offensive names
- Conversations about people that are not proven to be true
- Acting threatening, or frightening another
- To hit someone with a closed fist
- Abusing and/or insulting another person regularly
- Using the internet to bully another person
13 Clues: The act of copying • Use of offensive names • The act of pushing someone • To hit someone with a closed fist • Harming another person's reputation • Acting threatening, or frightening another • Using the internet to bully another person • Using the body or an object to harm others • The act of physically harming another person • Provoking or making fun of someone playfully • ...
computer 2023-10-11
17 Clues: сеть • мышка • сканер • флешка • принтер • ксерокс • ноутбук • монитор • клавиатура • взламывать • безопасность • обмениваться • коврик для мыши • искать информацию • компьютерная сеть • электронное письмо • сведения (информация)
Sip N Solve 2025-10-26
Across
- What Month Is the Groom’s Birthday?
- What is the Best Man’s Name?
- What Did The Bride Study At University?
- What Town Do They Live In?
- How Many Venues Did They Visit?
- What Month Is The Bride’s Birthday?
- Where Did They Go On Their First Holiday Abroad? (Italian City)
- Where Did They Get Engaged?
- What Number House Do They Live At?
- What Trade Does The Groom Work In?
Down
- Where Are They Going On Honeymoon?
- What is the Groom’s Middle Name?
- Who Said ‘I Love You’ First? Bride or Groom?
- Groom’s Hobby
- What Month Did They Get Engaged?
- What is the Maid of Honour’s Name
- Bride’s Middle Name?
17 Clues: Groom’s Hobby • Bride’s Middle Name? • What Town Do They Live In? • Where Did They Get Engaged? • What is the Best Man’s Name? • How Many Venues Did They Visit? • What is the Groom’s Middle Name? • What Month Did They Get Engaged? • What is the Maid of Honour’s Name • Where Are They Going On Honeymoon? • What Number House Do They Live At? • What Trade Does The Groom Work In? • ...
Praetorian 2020-07-01
Across
- This tool graphs relationships in AD environments
- Our Friday retroactive meeting where we take a look at all of the exciting things we accomplished that week
- The open source tool that Diana uses to identify flaws in containers
- This AWS service sometimes allows you to fetch API credentials from instances
- Publicly known exploits and weaknesses often get designated one of these
- The protocol used in TLS to exchange keys
- Each services team's name starts with this
Down
- The cow in the Austin Office is covered with graphics from this song
- The reporting CLI tool that allows us to edit reports
- Praetorian's product that helps secure our client's software through continuous security analysis
- a governance model that helps evaluate cybersecurity practices, establish or improve a cybersecurity program, and inform your security roadmap and buying decisions
- Integrating security into the entirety of software's lifetime, from plan to monitor
- _SRF
- Carbonated yerba mate drink for all your energy needs
- New hires build these during their first week at Praetorian
15 Clues: _SRF • The protocol used in TLS to exchange keys • Each services team's name starts with this • This tool graphs relationships in AD environments • The reporting CLI tool that allows us to edit reports • Carbonated yerba mate drink for all your energy needs • New hires build these during their first week at Praetorian • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
Lesson 30 Vocabulary 2015-05-22
Across
- A program that hackers use to capture IDs and passwords on a network.
- A malicious program that records keystrokes.
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- security feature used for larger networks that controls computers from one point.
- installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- Encrypts the information in an SSL Certificate.
Down
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
Theories of global politics 2021-03-24
Across
- The word Immanuel Kant used to describe a situation of constant peace
- A theory of global politics which emphasises the importance of states cooperating with each other to achieve shared goals
- The idea that each state's security and prosperity is now linked to those of others
- Council The body within the United Nations with the authority to approve military action against other states
- The idea that there is no supreme power to police the global political system
- A term to describe realist concerns about security; in the effort to maximise one's own military strength, states encourage their rivals to do the same
Down
- Each state has sole power within its own border and no other state should attempt to intervene in their affairs
- City in France where the last major climate change agreement was signed.
- 46th President of the United States; re-entered the Paris Climate agreement
- A non-governmental oganisation concerned with protecting the environment
- An intergovernmental organisation concerned with encouraging a free market approach to economic development
- 45th President of the United States; withdrew from the Paris climate agreement
- A theory of global politics which emphasises each state's desire for power and security
13 Clues: The word Immanuel Kant used to describe a situation of constant peace • City in France where the last major climate change agreement was signed. • A non-governmental oganisation concerned with protecting the environment • 46th President of the United States; re-entered the Paris Climate agreement • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
crossword puzzle 2021-05-20
Across
- cyber hub is located in
- tourism provides changes which causes
- teet ka achar is a pickle made from which tree?
- women cover their head by
Down
- traditional headgear worn by men
- old custom of people which is still followed
- famous epic mahabharata was written in this state
- cultural tourism may effect
- famous bird santuary is located in
9 Clues: cyber hub is located in • women cover their head by • cultural tourism may effect • traditional headgear worn by men • famous bird santuary is located in • tourism provides changes which causes • old custom of people which is still followed • teet ka achar is a pickle made from which tree? • famous epic mahabharata was written in this state
F.P.S digital realities 2023-05-09
9 Clues: a system or environment • nausea or sickness from VR • mix of two or more elements • mix of all online realities • using a device without your hands • using game play to help an activity • Extra devices eg headset monster etc. • response from and computer application • a virtual model of the users body in VR
F.P.S digital realities 2023-05-09
9 Clues: a system or environment • nausea or sickness from VR • mix of two or more elements • mix of all online realities • using a device without your hands • using game play to help an activity • Extra devices eg headset monster etc. • response from and computer application • a virtual model of the users body in VR
Engagement Crossword One 2025-11-04
9 Clues: Who is a football coach? • Who speaks fluent French? • Who has a desire to learn? • Who is based in the Midlands? • Who currently works in DEFRA? • Who has had two postings in MoD? • Who is on the DDaT/Cyber scheme? • Who used to work in private office? • Who does a strategic planning and performance role?
NATO Crossword 2023-08-04
Across
- This ability enables Allied forces and equipment from different countries to work together
- This is the section of NATO's founding treaty that explains how new members can join
- The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
- PermReps sit on the NAC, or North Atlantic ___
- Allies contribute money to fund NATO programs. This is known as ___ funding.
- This is one of NATO's closest partners, and its headquarters are right downtown
- NATO Air Base Geilenkirchen, Germany is home to 14 of these aircraft, known as NATO's eyes in the sky
- US General Christopher Cavoli currently holds this position, the second-highest military position within NATO
- This country is an official Invitee, but not yet a member
- NATO's current Secretary General is from this country
- Last month's NATO Summit took place in this city
- Allies pledged to devote this much of their GDP to defense spending
- This kind of threat typically does not involve violence, but can include disinformation, interference in politics, and cyber operations
Down
- The principle that if one Ally is attacked, all Allies are attacked, is known as ___ defense
- He was the first SACEUR, and was later the 34th President of the United States
- Countries that wish to join NATO usually, but not always, have a MAP, or Membership ___ Plan
- The length statement released at NATO Summits is often called this
- This Italian city is home to a NATO military command
- NATO's largest partnership group is the Partnership for ___
- NATO's maritime security operation in the Mediterranean is called Operation Sea ___
- NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
- NATO's military headquarters in Mons, Belgium
- NATO has led a peace support operation in this country since June 1999
- NATO's full name is the North ___ Treaty Organization
- This Virginia city is home to Allied Command Transformation (ACT)
- All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.
26 Clues: NATO's military headquarters in Mons, Belgium • PermReps sit on the NAC, or North Atlantic ___ • Last month's NATO Summit took place in this city • This Italian city is home to a NATO military command • NATO's current Secretary General is from this country • NATO's full name is the North ___ Treaty Organization • ...
Security Crossword Challenge 2015-02-17
Across
- Cash or Valuables in Transit
- 7th President of the United States
- Funny money
- First Ambassador to France
- 1st President
- Secures your money
- 16th President
Down
- Taking of items
- 3rd President
- Unusual Behavior
- Director of Security
- 7th President
- Used to make change
- First Secretary of State
- Opens many doors
- 18th President
16 Clues: Funny money • 3rd President • 7th President • 1st President • 18th President • 16th President • Taking of items • Unusual Behavior • Opens many doors • Secures your money • Used to make change • Director of Security • First Secretary of State • First Ambassador to France • Cash or Valuables in Transit • 7th President of the United States
career 2019-01-19
15 Clues: ทหาร • นักสืบ • ช่างไฟ • หมอฟัน • เสมียน • พ่อครัว • นักเขียน • นักเรียน • ช่างประปา • ช่างตัดผม • บรรณาธิการ • ช่างถ่ายรูป • นักบินอวกาศ • doctor หมอตา • guard ยามรักษาความปลอดภัย
career 2019-01-19
15 Clues: ทหาร • นักสืบ • หมอฟัน • ช่างไฟ • เสมียน • พ่อครัว • นักเรียน • นักเขียน • ช่างตัดผม • ช่างประปา • บรรณาธิการ • ช่างถ่ายรูป • นักบินอวกาศ • doctor หมอตา • guard ยามรักษาความปลอดภัย
Block 2 & 4 - Common Words 2014-01-17
17 Clues: ID • guy • old • how • ugly • born • girl • cost • sound • spell • compare • last name • first name • pronunciation • driver's license • social security number • filled, complete, drunk
Information Security Management System (ISMS) 2014-03-14
Across
- HR personnel is assigned to prepare access request for HRIS and ______.
- A default folder where essential corporate documents must be stored
- ____________is everyone's responsibility
- A secret word or phrase that are to be treated as sensitive, confidential information
Down
- Signifies that asset is highly confidential/critical
- A document that defines the accountability and responsibility of the Asset Owner (custodian) and records the status of the asset.
- He signed the Information Security Policy
- Is the official name of the repository of ISMS Policies, Standards, Procedures and Guidelines
- New program launched in relation to ISMS where updates of which are shown through comic strips.
- Strong password should be at least ____ characters long.
- Also known as a confidentiality agreement
- Information security events or incidents must immediately be reported to____________.
- Aspects of Information Security
- IT system used when requesting access or raising any IT requests
- Recommended action for paper and printed material containing confidential information prior to disposal
15 Clues: Aspects of Information Security • ____________is everyone's responsibility • He signed the Information Security Policy • Also known as a confidentiality agreement • Signifies that asset is highly confidential/critical • Strong password should be at least ____ characters long. • IT system used when requesting access or raising any IT requests • ...
