cyber security Crossword Puzzles

RU ITEC411 - Privacy 2023-10-16

RU ITEC411 - Privacy crossword puzzle
Across
  1. Matching The act of combining and comparing information from different databases, often using a common identifier like a social security number to match records.
  2. Specification The principle that data should be collected for specific, explicit, and legitimate purposes.
  3. Files a website stores on a visitor's computer to track user behavior.
  4. Information Any information relating to an individual person.
  5. Use The use of personal information for a purpose other than the one for which it was originally provided.
  6. Information Gathering The collection of personal information about a user without the user's knowledge.
  7. Minimization The practice of collecting only the data that is necessary for the stated purpose.
  8. Guidelines The guidelines of the Organization for Economic Co-operation and Development that serve as the basis for many privacy laws worldwide.
  9. The National Institute of Standards and Technology, which provides security and privacy standards and guidelines.
  10. Risks Potential threats to the confidentiality and security of personal information.
Down
  1. Information Practices A set of principles that guide the responsible handling of personal information.
  2. Data Protection Directive A comprehensive European Union directive governing data protection and privacy.
  3. Profiling The analysis of data to determine characteristics of people who are most likely to engage in a particular behavior.
  4. Measures Safeguards and controls put in place to protect personal information from unauthorized access or disclosure.
  5. The requirement to inform individuals about data collection practices, purposes, and policies.
  6. The voluntary agreement given by individuals for the collection and use of their personal information.
  7. Mining The process of searching and analyzing vast amounts of data to discover patterns and generate new information or knowledge.
  8. The Personal Information Protection and Electronic Documents Act, a Canadian privacy law.
  9. The principle of being responsible for ensuring the protection of personal information.
  10. Consent Users being aware of what information is collected and how it is used before giving permission.

20 Clues: Information Any information relating to an individual person.Files a website stores on a visitor's computer to track user behavior.Risks Potential threats to the confidentiality and security of personal information.The principle of being responsible for ensuring the protection of personal information....

Teka teki silang keamanan 2025-11-28

Teka teki silang keamanan crossword puzzle
Across
  1. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  2. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  5. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  6. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  7. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  8. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
  1. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  4. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  10. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  11. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  12. OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Amazon Las 7 Security Part 2 2023-03-15

Amazon Las 7 Security Part 2 crossword puzzle
Across
  1. cleaners of the warehouse
  2. watches over the security team
  3. engineers of the warehouse
  4. the app we use to communicate with AA's
  5. who we report to for allied
  6. the master opener
Down
  1. who we report to for amazon
  2. maintenance of the building
  3. roving the buildings exterior
  4. the door security uses frequently
  5. tracking reports

11 Clues: tracking reportsthe master openercleaners of the warehouseengineers of the warehousewho we report to for amazonmaintenance of the buildingwho we report to for alliedroving the buildings exteriorwatches over the security teamthe door security uses frequentlythe app we use to communicate with AA's

Find The Parts of The School 2024-03-01

Find The Parts of The School crossword puzzle
Across
  1. Monitoring and Handling School Security
  2. Where students eat lunch
  3. For personal counseling
  4. For Supplies, equipment and materials
  5. A level of a building
  6. For Physical Education Classes
Down
  1. Where students go for helth-related issues
  2. For conducting experiments
  3. Including the principal's,vice principal's
  4. For school assemblies, performances, events
  5. For art classes and projets

11 Clues: A level of a buildingFor personal counselingWhere students eat lunchFor conducting experimentsFor art classes and projetsFor Physical Education ClassesFor Supplies, equipment and materialsMonitoring and Handling School SecurityWhere students go for helth-related issuesIncluding the principal's,vice principal's...

Kreuzwordrätsel 2016-05-17

Kreuzwordrätsel crossword puzzle
Across
  1. Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
  2. Je länger das Passwort, desto ...
  3. Schutz von Infos
  4. Schutz von personenbezogenen Daten
Down
  1. Werbegeschenke, die mit Schadsoftware versehen sind
  2. Beispiel eines Passwortmanagers
  3. Schutz von vertraulichen Daten in E-Mails
  4. Methode zu Passwortfindung
  5. Notebook vor fremden Blicken schützen
  6. Über E-Mails an sensible Daten gelangen
  7. Größtes Risiko bei Social Engineering
  8. Abk. Data Security Partner

12 Clues: Schutz von InfosMethode zu PasswortfindungAbk. Data Security PartnerBeispiel eines PasswortmanagersJe länger das Passwort, desto ...Schutz von personenbezogenen DatenNotebook vor fremden Blicken schützenGrößtes Risiko bei Social EngineeringÜber E-Mails an sensible Daten gelangenSchutz von vertraulichen Daten in E-Mails...

Kreuzworträtsel 2016-05-17

Kreuzworträtsel crossword puzzle
Across
  1. Über E-Mails sensible Daten gelangen
  2. Schutz von Vertrautlichkeit, Integrität und Verfügbarkeit
  3. Notebook vor fremden Blicken schützen
  4. Je länger das Passwort, desto ...
  5. Beispiel eines Passwortmanagers
  6. Schutz von personenbezogenen Daten
Down
  1. Schutz von Infos
  2. Größtes Risiko bei Social Engineering
  3. Werbegeschenke, die mit Schadsoftware versehen werden können
  4. Methode zur Passwortfindung
  5. Schutz von vertraulichen Daten in E-Mails
  6. Abk. Data Security Partner

12 Clues: Schutz von InfosAbk. Data Security PartnerMethode zur PasswortfindungBeispiel eines PasswortmanagersJe länger das Passwort, desto ...Schutz von personenbezogenen DatenÜber E-Mails sensible Daten gelangenGrößtes Risiko bei Social EngineeringNotebook vor fremden Blicken schützenSchutz von vertraulichen Daten in E-Mails...

Kreuzworträtsel 2016-05-10

Kreuzworträtsel crossword puzzle
Across
  1. Schutz von Infos
  2. Über E-Mails an sensible Daten gelangen
  3. Schutz von vertraulichen Daten in E-Mails
  4. Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
  5. Je länger das Passwort, desto ....
Down
  1. Werbegeschenke, die mit Schadsoftware versehen sind
  2. Größtes Risiko bei Social Engineering
  3. Methode zur Passwortfindung
  4. Schutz von personenbezogenen Daten
  5. Notebook vor fremden Blicken schützen
  6. Abk. Data Security Partner
  7. Beispiel eines Passwortmanagers

12 Clues: Schutz von InfosAbk. Data Security PartnerMethode zur PasswortfindungBeispiel eines PasswortmanagersSchutz von personenbezogenen DatenJe länger das Passwort, desto ....Größtes Risiko bei Social EngineeringNotebook vor fremden Blicken schützenÜber E-Mails an sensible Daten gelangenSchutz von vertraulichen Daten in E-Mails...

MOTIVATION 2023-04-22

MOTIVATION crossword puzzle
Across
  1. 21
  2. 22
  3. 13
  4. 16
  5. 7
  6. 14
  7. 18
  8. 25
  9. 17
  10. 12
  11. 11
  12. 8
  13. 19
  14. 9
Down
  1. 5
  2. 4
  3. 20
  4. 23
  5. 3
  6. 15
  7. 1
  8. 6
  9. 10
  10. 2
  11. 24

25 Clues: 54371628921202322131615141825171012111924

French Airport 2013-06-12

French Airport crossword puzzle
Across
  1. flight number
  2. airport
  3. international
  4. terminal
  5. boarding pass
  6. airplane
  7. passenger
  8. window
  9. suitcase
  10. corridor
Down
  1. counter
  2. airline
  3. gate
  4. flight
  5. lobby
  6. control security
  7. hand baggage
  8. to leave
  9. track
  10. passport
  11. to arrive
  12. ticket

22 Clues: gatelobbytrackflightwindowticketcounterairlineairportterminalto leavepassportairplanesuitcasecorridorto arrivepassengerhand baggageflight numberinternationalboarding passcontrol security

fish 2023-07-19

fish crossword puzzle
Across
  1. dfgh
  2. iuyj
  3. STORY 5
  4. lm
  5. hvbj
  6. hjbn
  7. ergh
  8. bv
  9. gthjh
  10. jn
  11. erg
  12. fgdw
Down
  1. gf
  2. dfg
  3. okl
  4. COMMONS oklm
  5. ihjbn
  6. ki8
  7. jokm
  8. hj
  9. dfg
  10. asd
  11. wsa
  12. qwer

24 Clues: gflmhjbvjndfgoklki8dfgasdwsaergdfghjokmiuyjhvbjhjbnerghqwerfgdwihjbngthjhSTORY 5COMMONS oklm

Spanish crossword 2020-04-10

Spanish crossword crossword puzzle
Across
  1. seat belt
  2. sleeping car
  3. visa
  4. in the train station
  5. connection
  6. passport
  7. to land
  8. coach
  9. aisle
  10. ticket
  11. stop
  12. to board
  13. security agent
  14. flight
  15. gate
  16. platform
  17. ticket window
  18. luggage screening
  19. second class
  20. to get or obtain
  21. to hope
  22. ticket
  23. car wagon
  24. baggage claim
  25. boarding pass
Down
  1. to go through security
  2. seat
  3. on time
  4. first class
  5. suitcase
  6. customs
  7. international airport
  8. window
  9. delayed
  10. mano carry-on baggage
  11. event ticket
  12. trip travel
  13. counter
  14. bunk
  15. to miss
  16. to see
  17. turn
  18. arrival
  19. flight attendent
  20. espera waiting room
  21. take off
  22. control
  23. passenger
  24. to check luggage
  25. to give
  26. layover

51 Clues: seatvisabunkstopturngatecoachaislewindowticketto seeflightticketon timecustomsto landdelayedcounterto missarrivalcontrolto giveto hopelayoversuitcasepassportto boardplatformtake offseat beltpassengercar wagonconnectionfirst classtrip travelsleeping carevent ticketsecond classticket windowbaggage claimboarding passsecurity agentflight attendent...

Security Terminology for Christian 2024-03-06

Security Terminology for Christian crossword puzzle
Across
  1. Network Interface Card
  2. the Bourne Again SHell
  3. Data Protection Officer
  4. Instant Messaging
  5. Domain Name System
  6. allows people to select the mobile devices they would like to use, typically from a limited number of options
  7. Chief Security Officer
  8. Layer 2 Tunneling Protocol
  9. Indicators of Compromise
  10. POST Office Protocol
  11. Personal Health Information
Down
  1. Network Attached Storage
  2. a type of challenge–response test used in computing to determine whether the user is human in order to deter bot attacks and spam
  3. being allowed to use one's personally owned device, rather than being required to use an officially provided device.
  4. Database Administrator
  5. Information Systems Security Officer
  6. Chief Information Officer
  7. Dynamic Link Library
  8. Personal Identification Number
  9. Chief Technology Officer
  10. Peer-to-Peer

21 Clues: Peer-to-PeerInstant MessagingDomain Name SystemDynamic Link LibraryPOST Office ProtocolNetwork Interface Cardthe Bourne Again SHellDatabase AdministratorChief Security OfficerData Protection OfficerNetwork Attached StorageIndicators of CompromiseChief Technology OfficerChief Information OfficerLayer 2 Tunneling ProtocolPersonal Health Information...

Social Security 2017-03-01

Social Security crossword puzzle
Across
  1. federal program that taxes workers to provide income support to the elderly.
  2. federal system of health insurance for those requiring financial assistance.
  3. aversion/ the extent to which individuals are willing to bear risk.
  4. percentage of workers retiring at a certain age.
  5. payment that lasts until the recipient's death.
Down
  1. of deceased worker or former worker is also entitled to benefits.
  2. workers continue working past the age of 65 and are available upon retirement. benefit increases end at age 70.
  3. rating/ charging a price for insurance that is a function of realized outco
  4. federal program of health insurance for persons 65 years of age or older.

9 Clues: payment that lasts until the recipient's death.percentage of workers retiring at a certain age.of deceased worker or former worker is also entitled to benefits.aversion/ the extent to which individuals are willing to bear risk.federal program of health insurance for persons 65 years of age or older....

network security 2022-10-31

network security crossword puzzle
Across
  1. a way of gaining sensitive information with influence
  2. convincing people you are a person known or from a well-known buisness who steal your information
  3. hacks installed without permition
  4. virus' that self replicate
  5. find and stops malware
  6. used to keep information secure
Down
  1. malware that attaches to certain file
  2. they examine data to block threats
  3. malware disguised as legitimate software

9 Clues: find and stops malwarevirus' that self replicateused to keep information securehacks installed without permitionthey examine data to block threatsmalware that attaches to certain filemalware disguised as legitimate softwarea way of gaining sensitive information with influence...

Internet security 2023-11-27

Internet security crossword puzzle
Across
  1. What is the term for software created to damage or alter computer data or operations?
  2. What term refers to computer criminals who use technology to commit various crimes?
  3. What is a program that runs automatically and can be used to perform various tasks called?
  4. What is the term for software that protects a computer against malware programs?
  5. What is the term for the action of gaining unauthorized access to an account or personal information through deception or manipulation?
  6. What is the term for the illegal copying and distribution of copyrighted software, information, music, and video files?
Down
  1. What type of program attaches itself to executable files or documents and spreads by infecting other files or programs on a computer?
  2. What is the term for cyber attacks that attempt to gain unauthorized access to a computer system?
  3. What is the process of making a copy of data from a computer onto an external storage device, such as an external hard drive?
  4. What type of internet crime involves sending fake emails or creating false websites to obtain personal or banking information?

10 Clues: What is the term for software that protects a computer against malware programs?What term refers to computer criminals who use technology to commit various crimes?What is the term for software created to damage or alter computer data or operations?What is a program that runs automatically and can be used to perform various tasks called?...

Computer Security 2023-09-21

Computer Security crossword puzzle
Across
  1. to set up for use
  2. websites and other online forms of communication used to share information
  3. a kind of malware that can copy itself from one device to another
  4. safe
Down
  1. to keep safe
  2. an email, text message, or link that tricks people into giving criminals personal information
  3. computer software that criminals use to get people's personal information or passwords
  4. programs used by a computer
  5. a kind of malware that infects computers; a virus usually arrives as an email attachment

9 Clues: safeto keep safeto set up for useprograms used by a computera kind of malware that can copy itself from one device to anotherwebsites and other online forms of communication used to share informationcomputer software that criminals use to get people's personal information or passwords...

Information Security 2020-07-08

Information Security crossword puzzle
Across
  1. when attackers use various methods/tricks to get
  2. actually purging the data; permanently losing the
  3. software used to prevent, detect, and remove malware
  4. testing to see if system vulnerabilities can be exploited in order to actually gain access to systems, the network, data and so forth; acts in a way that an attacker might act
  5. when someone gains entrance/access by
Down
  1. on the tailcoats of an authorized person
  2. information from unsuspecting persons
  3. used to perform authentication; a username,a certificate,or a token
  4. Identifying risks to understand the risks that we are exposed to

9 Clues: information from unsuspecting personswhen someone gains entrance/access byon the tailcoats of an authorized personwhen attackers use various methods/tricks to getactually purging the data; permanently losing thesoftware used to prevent, detect, and remove malwareIdentifying risks to understand the risks that we are exposed to...

Security Issues 2019-01-29

Security Issues crossword puzzle
Across
  1. Everything is backed up at once.
  2. In this type of backup, only two image files are required to restore the system!
  3. Faster backup time as only amended files need to be copied.
  4. A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
  1. Useful when backing up large amounts of data.
  2. Procedures or measures taken to ensure the safety of an organisation.
  3. This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
  4. This is information that is still important but it is not needed for immediate use.
  5. A very important element to a company/organisation!

9 Clues: Everything is backed up at once.Useful when backing up large amounts of data.A very important element to a company/organisation!Faster backup time as only amended files need to be copied.Procedures or measures taken to ensure the safety of an organisation.In this type of backup, only two image files are required to restore the system!...

Network Security 2024-05-12

Network Security crossword puzzle
Across
  1. Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  2. The process of protecting information or data by scrambling it so only those with the key can unscramble it
  3. A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
  4. A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
  5. A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
  1. An attack where a series of a computers repeatedly send requests to a server to overload a system
  2. The process of a user confirming that they are who they say they are on a computer system
  3. Trying to trick someone into giving out information over email
  4. A computer program that makes lots of copies of itself,

9 Clues: A computer program that makes lots of copies of itself,Trying to trick someone into giving out information over emailThe process of a user confirming that they are who they say they are on a computer systemAn attack where a series of a computers repeatedly send requests to a server to overload a system...

Security Terms 2023-03-27

Security Terms crossword puzzle
Across
  1. Seeking (BLANK) health treatment is a positive course of action and a key measure for suicide prevention.c
  2. CV record checks include (BLANK)
  3. (BLANK) is an important part of the DON PV Program.
  4. Head of the Navy Intelligence Community Elements (HICE
  5. After an individual has been “cleared,” they are continuously vetted using automated checks of (BLANK).
Down
  1. An insider threat may be (BLANK) if the insider is unaware that their actions or behaviors are exposing the United States to an elevated risk of harm or loss, perhaps through lack of training or negligence.
  2. CV record checks include (BLANK)
  3. personal are required to report security violations and changes to their personal status (e.g. marriage/divorce, arrests, delinquent debt, or foreign travel/contacts)
  4. CV record checks include (BLANK)
  5. CV record checks include (BLANK),
  6. CV record checks include (BLANK)
  7. Replacing DISS

12 Clues: Replacing DISSCV record checks include (BLANK)CV record checks include (BLANK)CV record checks include (BLANK)CV record checks include (BLANK)CV record checks include (BLANK),(BLANK) is an important part of the DON PV Program.Head of the Navy Intelligence Community Elements (HICE...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. Red fruit often mistaken for a vegetable
  2. Yellow fruit that monkeys love to eat
  3. Leafy green that made Popeye strong
  4. Round citrus fruit named after its color
  5. Small green vegetables that come in a pod
Down
  1. Green vegetable that looks like tiny trees
  2. Red berry with seeds on the outside
  3. Orange vegetable that helps you see in the dark
  4. Red fruit that keeps the doctor away

9 Clues: Red berry with seeds on the outsideLeafy green that made Popeye strongRed fruit that keeps the doctor awayYellow fruit that monkeys love to eatRed fruit often mistaken for a vegetableRound citrus fruit named after its colorSmall green vegetables that come in a podGreen vegetable that looks like tiny trees...

Klett 11.1 2025-11-11

Klett 11.1 crossword puzzle
Across
  1. abfahren, abfliegen
  2. Ankunft
  3. ausfüllen
  4. gültig
  5. Durchsuchung, Untersuchung
  6. Sicherheit, Sicherheitsvorkehrungen
  7. durchführen
Down
  1. Abreise, Abflug
  2. anmelden, verzollen
  3. Information, Auskunft
  4. ankommen
  5. Dokument, Papier
  6. zurückkommen, zurückkehren
  7. Reisepass
  8. Visum
  9. erreichen
  10. zurückkommen, zurückkehren
  11. Zoll
  12. Ausweispapier(e)
  13. Zoll

20 Clues: ZollZollVisumgültigAnkunftankommenausfüllenReisepasserreichendurchführenAbreise, AbflugDokument, PapierAusweispapier(e)anmelden, verzollenabfahren, abfliegenInformation, Auskunftzurückkommen, zurückkehrenzurückkommen, zurückkehrenDurchsuchung, UntersuchungSicherheit, Sicherheitsvorkehrungen

Happy Memories 2023-02-16

Happy Memories crossword puzzle
Across
  1. twentythree
  2. five
  3. three
  4. seven
  5. twentyfour
  6. eleven
  7. sixteen
  8. seventeen
  9. six
  10. one
  11. four
  12. ten
  13. eighteen
  14. thirteen
  15. twentyfive
  16. fourteen
Down
  1. twenty
  2. twentyone
  3. nineteen
  4. fifteen
  5. twelve
  6. tw0
  7. twentytwo
  8. eight
  9. nine

25 Clues: tw0sixonetenfivefourninethreeseveneighttwentyeleventwelvefifteensixteennineteeneighteenthirteenfourteentwentyoneseventeentwentytwotwentyfourtwentyfivetwentythree

Unidad 2 Ciudadanía Digital y Conecta con Chile 2024-10-15

Unidad 2 Ciudadanía Digital y Conecta con Chile crossword puzzle
Across
  1. citizenship
  2. miles
  3. to promote
  4. it possesses
  5. wide
  6. fingerprint, footprint
  7. reliability
  8. two hundred
  9. five hundred
Down
  1. fifty
  2. long
  3. security
  4. narrow
  5. causes
  6. to improve, to better (verb)
  7. coasts
  8. role
  9. almost
  10. goals, objectives
  11. just (fair)

20 Clues: longrolewidefiftymilesnarrowcausescoastsalmostsecurityto promotecitizenshipreliabilitytwo hundredjust (fair)it possessesfive hundredgoals, objectivesfingerprint, footprintto improve, to better (verb)

Words Unit 5 2017-05-06

Words Unit 5 crossword puzzle
Across
  1. Lohn
  2. Decke
  3. Angst
  4. passend
  5. Verbindung
  6. Verwandter
  7. Sicherheit
Down
  1. Kühlschrank
  2. Werkzeug
  3. Stockwerk
  4. jagen
  5. romantisch
  6. Herausforderung
  7. Wolkenkratzer

14 Clues: LohnjagenDeckeAngstpassendWerkzeugStockwerkromantischVerbindungVerwandterSicherheitKühlschrankWolkenkratzerHerausforderung

Information Security Awareness 2020-09-24

Information Security Awareness crossword puzzle
Across
  1. What is not allowed in a DNA password
  2. Best way to keep track of multiple unique passwords
  3. The data classification for Employee Handbook, internal phone directory
  4. This is better and harder to crack than a password
  5. How do you think most evil hackers begin to break into a company’s network?
  6. The best response to password Recovery Questions is
  7. Minimum number of characters for a network password
  8. What is the default data classification
  9. Who is responsible for data security
Down
  1. The type of email to get you to click on a fraudulent link
  2. Disclosing personal member information may be
  3. Someone that follows closely behind you without using their badge
  4. If I click on a link I believe was malicious I should
  5. This is better and harder to crack than a password
  6. How might someone evil try to get information from you

15 Clues: Who is responsible for data securityWhat is not allowed in a DNA passwordWhat is the default data classificationDisclosing personal member information may beThis is better and harder to crack than a passwordThis is better and harder to crack than a passwordBest way to keep track of multiple unique passwords...

March Security Crossword 2021-04-01

March Security Crossword crossword puzzle
Across
  1. Last name of WikiLeaks founder
  2. Founded in 1955, a global community of security practitioners
  3. The 4th step in the EDIP Technique Training cycle
  4. city straddling the River Avon in the southwest of England where Large riots have recently taken place
  5. The monitoring of behavior, activities, or information
  6. (5,3) an ethical computer hacker
  7. Japanese organised crime syndicate
Down
  1. Current UK national threat level
  2. Biggest threat to Cultural Venues & Prometheus' gift
  3. Created the color code & a brand of Mini
  4. "Effect of uncertainty on objectives" - ISO 31000
  5. a 3 pronged spear
  6. (5,4) High profile museum burglary in Dresden, Germany
  7. Famous Federal Penitentiary in San Francisco Bay

14 Clues: a 3 pronged spearLast name of WikiLeaks founderCurrent UK national threat level(5,3) an ethical computer hackerJapanese organised crime syndicateCreated the color code & a brand of MiniFamous Federal Penitentiary in San Francisco BayThe 4th step in the EDIP Technique Training cycle"Effect of uncertainty on objectives" - ISO 31000...

Security Officer Numbers 2023-01-11

Security Officer Numbers crossword puzzle
Across
  1. 112
  2. 101
  3. 100
  4. 102
  5. 130
  6. 106
  7. 112
  8. 125
  9. 103
Down
  1. 126
  2. 136
  3. 105
  4. 115
  5. 133
  6. 114

15 Clues: 112126136101105115133114100102130106112125103

POLITICS 2016-03-01

POLITICS crossword puzzle
Across
  1. : an attractive rather than coercive type of power
  2. : ASEAN observer (Acronym)
  3. : "city-state"
  4. : military or economic type of power
  5. : a subdiscipline of polisci that compares governments and political systems
  6. : Civil Society Organization
  7. : defense of the state and its citizens
  8. : International Relations
  9. : Politics as "master science"
Down
  1. : evolved as science and art
  2. : a qualitative approach that tries to find out what is best for the people
  3. : quantitative and descriptive approach approach
  4. : persons and institutions that make and enforce laws
  5. : the currency of politics
  6. : using laws to fairly judge and punish crimes and criminals
  7. : the act of influencing the government to do what you want
  8. : in charge of internal security
  9. : power of politicians and individuals to act out law
  10. : limitation and regulation
  11. : another term for "security"

20 Clues: : "city-state": International Relations: ASEAN observer (Acronym): the currency of politics: limitation and regulation: evolved as science and art: Civil Society Organization: another term for "security": Politics as "master science": in charge of internal security: military or economic type of power: defense of the state and its citizens...

Military Acronyms 2019-04-04

Military Acronyms crossword puzzle
Across
  1. Violation
  2. General Fund Enterprise Business System
  3. Marine Corps
  4. Cancelled
  5. Defense Enterprise Accounting and Management System
  6. Password
  7. Defense Cash Accountability System
  8. DFAS Automated Reporting & Tracking System
  9. Defense Travel System
  10. Accounts Receivable
  11. Standard Contract Reconciliation Tool
  12. Federal Employee Retirement System
  13. Army Material Command
  14. Accounts Payable
  15. Chief Financial Officer
  16. Voucher
  17. BRAC Transition Applications
Down
  1. Journal Voucher
  2. Commercial Invoice
  3. Air Force Space Command
  4. Line of Accounting
  5. Subject Matter Experts
  6. Naval Sea Systems Command
  7. Month to Date
  8. Electronic Signature
  9. Operational Security
  10. Department of Defense
  11. Defense Finance Accounting Services
  12. Disbursing Office
  13. General Schedule
  14. Year End
  15. Standard Operating Procedures
  16. Terminal Area Security Officer
  17. Rank
  18. Civilian
  19. Fiscal Year
  20. Unmatched Transaction

37 Clues: RankVoucherPasswordYear EndCivilianViolationCancelledFiscal YearMarine CorpsMonth to DateJournal VoucherGeneral ScheduleAccounts PayableDisbursing OfficeCommercial InvoiceLine of AccountingAccounts ReceivableElectronic SignatureOperational SecurityDepartment of DefenseDefense Travel SystemArmy Material CommandUnmatched Transaction...

social media's lexical field 2023-03-24

social media's lexical field crossword puzzle
Across
  1. opinion people give on your activity
  2. personal place on website where you can post things
  3. when your senses are exposed to a lot of informations
  4. harassment online
  5. things that requires people's participation
  6. how much you think you are worth
  7. something you can't stop thinking about
Down
  1. something you're physically dependent on
  2. something that is bad for your health
  3. you're doing it when you post something
  4. when you're standing for something
  5. something that is disorted
  6. picture, video or test that you publish on your account

13 Clues: harassment onlinesomething that is disortedhow much you think you are worthwhen you're standing for somethingopinion people give on your activitysomething that is bad for your healthyou're doing it when you post somethingsomething you can't stop thinking aboutsomething you're physically dependent onthings that requires people's participation...

Teka teki silang keamanan 2025-11-28

Teka teki silang keamanan crossword puzzle
Across
  1. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  2. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  5. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  6. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  7. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  8. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
  1. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  4. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  10. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  11. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  12. OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Teka teki silang keamanan 2025-11-28

Teka teki silang keamanan crossword puzzle
Across
  1. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  2. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  5. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  6. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  7. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  8. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
  1. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  4. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  10. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  11. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  12. OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Computer Article Crossword 2015-06-10

Computer Article Crossword crossword puzzle
Across
  1. Very important and possibly dangerous
  2. The month which the hack happened
  3. Far away from anything else
  4. The Chairman of the Senate Armed Services Committee
  5. Keeping people safe on the Internet
  6. Breaking into a secure area
  7. To put together information
  8. To break into a secure area on the internet
Down
  1. Stealing someone's personal details
  2. All over the world
  3. The abbreviation for The Office of Personnel Management
  4. One billion people have access to Facebook on.......
  5. The Name of Mark Zuckerberg's company
  6. The name of the new App Zuckerberg is releasing
  7. The ........ Intelligence Committee which released information about the cyber attack
  8. The Country blamed for the hacking of American databases
  9. The President of America

17 Clues: All over the worldThe President of AmericaFar away from anything elseBreaking into a secure areaTo put together informationThe month which the hack happenedStealing someone's personal detailsKeeping people safe on the InternetVery important and possibly dangerousThe Name of Mark Zuckerberg's companyTo break into a secure area on the internet...

ITG Quiz Lavinya&Lea 2022-06-29

ITG Quiz Lavinya&Lea crossword puzzle
Across
  1. mit was kann man Internetseiten erstellen?
  2. Mit was kann man Datien verringern?
  3. Nenne mir eins der Office Apps?
  4. Mit welcher Taste kann man die Groß-und Kleinschreibung anpassen?
  5. Was produzieren Windräder?
  6. Mit was tippt man Wörter?
  7. Durch was bekommt man Internet?
  8. Mit was bekommt man zugriff auf Onlineseiten
  9. mit welcher Taste trennt man Wörter?
Down
  1. Mit was kann man Prozesse abbrechen?
  2. Wie nennt man Mobbing im Internet?
  3. Was ist die Hauptplatine eines Computers?
  4. Was ist ein Anzeigegerät?
  5. Mit was kann man Handys laden wenn keine Steckdose in der nähe ist?
  6. Was bedeutet STRG?
  7. Welches Fach lehrt uns über Technologischen Grundlagen auf?
  8. Womit kann man Links auswählen/Kopieren?

17 Clues: Was bedeutet STRG?Was ist ein Anzeigegerät?Mit was tippt man Wörter?Was produzieren Windräder?Nenne mir eins der Office Apps?Durch was bekommt man Internet?Wie nennt man Mobbing im Internet?Mit was kann man Datien verringern?Mit was kann man Prozesse abbrechen?mit welcher Taste trennt man Wörter?Womit kann man Links auswählen/Kopieren?...

网络安全:过关斩将 2024-06-27

网络安全:过关斩将 crossword puzzle
Across
  1. Software that secretly monitors and collect user's' activities.
  2. Social media platform for sharing short videos
  3. A way to avoid internet addiction.
  4. Cyber scam using various methods to steal information.
  5. A program to protect your computer from viruses.
  6. False information spread online.
  7. Software used to navigate the internet.
  8. A potential privacy risk on the internet.
  9. Online harassment
Down
  1. Dishonest scheme to cheat.
  2. Dependence on a substance/activity.
  3. Registering one's presence at a location
  4. A password that is valid for only one login transaction
  5. State of being separated from others。
  6. Remote face-to-face communication.
  7. Important method to protect yourself online.
  8. An important way of protecting personal privacy.

17 Clues: Online harassmentDishonest scheme to cheat.False information spread online.A way to avoid internet addiction.Remote face-to-face communication.Dependence on a substance/activity.State of being separated from others。Software used to navigate the internet.Registering one's presence at a locationA potential privacy risk on the internet....

Data handling, Accountability, and Security 2023-11-22

Data handling, Accountability, and Security crossword puzzle
Across
  1. Adherence to regulations and standards.
  2. Plan for data breaches.
  3. Attempt to trick individuals for data.
  4. Regulating data accessibility.
Down
  1. Programs to educate staff on data security.
  2. Responsibility for data handling.
  3. Protection of sensitive information.
  4. Evaluation of data security measures.
  5. Moral principles guiding data handling.
  6. Clear communication about data practices.
  7. Guidelines for data handling.

11 Clues: Plan for data breaches.Guidelines for data handling.Regulating data accessibility.Responsibility for data handling.Protection of sensitive information.Evaluation of data security measures.Attempt to trick individuals for data.Moral principles guiding data handling.Adherence to regulations and standards.Clear communication about data practices....

SCOTIA INFOALERTS!!! 2013-07-21

SCOTIA INFOALERTS!!! crossword puzzle
Across
  1. how many alert categories
  2. text back word used to end notification
  3. name one alert category
  4. accounts eligible
  5. where to register for alerts
  6. cancellation fee
Down
  1. way alerts can be received
  2. way alerts can be received
  3. does not apply to security alerts
  4. over___different alert types
  5. cost of enrollment
  6. where to register for alerts

12 Clues: cancellation feeaccounts eligiblecost of enrollmentname one alert categoryhow many alert categoriesway alerts can be receivedway alerts can be receivedover___different alert typeswhere to register for alertswhere to register for alertsdoes not apply to security alertstext back word used to end notification

Crossword 2025-11-02

Crossword crossword puzzle
Across
  1. A dishonest schemer: S______
  2. Multi-factor A_____________
  3. S______ settings
  4. Make a Strong P_______
  5. U_____ your devices and apps
Down
  1. Fake message scams: P_______
  2. Software that accesses devices: M______
  3. A copy of computer data: B_____
  4. Software that asks for payment: R_________
  5. P______ & Security

10 Clues: S______ settingsP______ & SecurityMake a Strong P_______Multi-factor A_____________Fake message scams: P_______A dishonest schemer: S______U_____ your devices and appsA copy of computer data: B_____Software that accesses devices: M______Software that asks for payment: R_________

Finance 1-9 2013-08-22

Finance 1-9 crossword puzzle
Across
  1. dluznik
  2. ubezpieczenie spoleczne "social ......"
  3. obligacja
  4. kredyt hipoteczny
  5. ujawniac
  6. oddzial
  7. prowizja
  8. przychod
  9. spolka
  10. zobowiazanie
  11. wynajem
Down
  1. glowna ksiega rachunkowa "nominal ....."
  2. obrot
  3. jednoosobowa dzialalnosc gospodarcza "sole ...."
  4. wycena
  5. amortyzacja
  6. waluta
  7. aktywa

18 Clues: obrotwycenawalutaaktywaspolkadluznikoddzialwynajemujawniacprowizjaprzychodobligacjaamortyzacjazobowiazaniekredyt hipotecznyubezpieczenie spoleczne "social ......"glowna ksiega rachunkowa "nominal ....."jednoosobowa dzialalnosc gospodarcza "sole ...."

New Insights 4 Glossary: Society and health care 2022-09-05

New Insights 4 Glossary: Society and health care crossword puzzle
Across
  1. tuki
  2. syrjäytyminen
  3. private sector
  4. social security
  5. specialist
  6. health insurance
  7. paternity leave
  8. kansalaisuus
  9. vähemmistö
  10. kansalainen
Down
  1. emigrant
  2. köyhyys
  3. sick leave
  4. housing benefit
  5. student allowance/benefit
  6. kuntoutus
  7. maternity leave
  8. enemmistä

18 Clues: tukiköyhyysemigrantkuntoutusenemmistäsick leavespecialistvähemmistökansalainenkansalaisuussyrjäytyminenprivate sectorhousing benefitsocial securitymaternity leavepaternity leavehealth insurancestudent allowance/benefit

codi bullying crossword 2023-03-21

codi bullying crossword crossword puzzle
Across
  1. getting physically picked on everyday
  2. someone who stands around and watches someone getting bullied
  3. a sore from being punched or kicked
  4. some teases you verbally everyday
Down
  1. a type of psychological bullying
  2. someone who sees another person getting bullied
  3. getting picked on online everyday
  4. a type of physical bullying
  5. someone teases you and picks on you everyday

9 Clues: a type of physical bullyinga type of psychological bullyinggetting picked on online everydaysome teases you verbally everydaya sore from being punched or kickedgetting physically picked on everydaysomeone teases you and picks on you everydaysomeone who sees another person getting bulliedsomeone who stands around and watches someone getting bullied

Cyberbulling 2021-05-03

Cyberbulling crossword puzzle
Across
  1. a type of bulling other than verbal, cyber or social
  2. a service that provides help
  3. to mute someone on social media
  4. a place to communicate online
  5. someone who steals another identity
Down
  1. a person who wants to fit in
  2. someone who causes harm online
  3. wanting to be in control
  4. a person you can go to for support

9 Clues: wanting to be in controla person who wants to fit ina service that provides helpa place to communicate onlinesomeone who causes harm onlineto mute someone on social mediaa person you can go to for supportsomeone who steals another identitya type of bulling other than verbal, cyber or social

BNS Bulletin 2024-08-27

BNS Bulletin crossword puzzle
Across
  1. Decriminalized act in BNS, previously under Section 497 IPC
  2. Indian term for citizen used in BNS
  3. Colonial-era law replaced in BNS
  4. Crime explicitly defined in BNS, not in IPC
  5. Capital punishment retained in BNS
Down
  1. Number of sections in BNS
  2. The new code replacing IPC
  3. City where IPC was primarily drafted
  4. Digital crimes comprehensively covered in BNS

9 Clues: Number of sections in BNSThe new code replacing IPCColonial-era law replaced in BNSCapital punishment retained in BNSIndian term for citizen used in BNSCity where IPC was primarily draftedCrime explicitly defined in BNS, not in IPCDigital crimes comprehensively covered in BNSDecriminalized act in BNS, previously under Section 497 IPC

INFORMATIKA X TKJ 2024-05-07

INFORMATIKA X TKJ crossword puzzle
Across
  1. Kode G pada RGB
  2. digunakan untuk menghasilkan salinan data dari komputer adalah
  3. Salah satu jenis serangan cyber yang mengunci data?
  4. Angka yang terdiri dari 0 dan 1
  5. Perangkat keras yang berfungsi sebagai otak komputer?
  6. Software Berbahaya
  7. Keamanan Jaringan
  8. Perangkat keras yang bertanggung jawab untuk mengirimkan data antara komputer dan jaringan
Down
  1. Mengarahkan/mengatur Paket Data
  2. Sistem operasi yang dikembangkan oleh Microsoft
  3. Titik-titik kecil yang membentuk gambar digital
  4. Format file untuk gambar dengan latar belakang transparan
  5. Perangkat keras yang digunakan untuk memasukkan data ke dalam komputer
  6. Perubahan bertahap antara dua warna atau lebih
  7. jenis huruf yang memiliki dekorasi tambahan di ujung-ujungnya
  8. Hypertext Markup Language
  9. Perangkat lunak untuk mengelola basis data
  10. penyimpanan data yang bersifat permanen?
  11. Kode C pada CMYK
  12. Uniform Resource Locator

20 Clues: Kode G pada RGBKode C pada CMYKKeamanan JaringanSoftware BerbahayaUniform Resource LocatorHypertext Markup LanguageMengarahkan/mengatur Paket DataAngka yang terdiri dari 0 dan 1penyimpanan data yang bersifat permanen?Perangkat lunak untuk mengelola basis dataPerubahan bertahap antara dua warna atau lebih...

OL 4, Unit 4, Station 2 2025-05-07

OL 4, Unit 4, Station 2 crossword puzzle
Across
  1. geben, existieren
  2. seit
  3. Konto
  4. begrüßen
  5. trendsetzend
  6. Foto
  7. befreunden
  8. online stellen
  9. verdienen
  10. Smartphone
  11. beeinflussen
  12. Seite (im Internet)
  13. Post
  14. Kommentar
  15. modisch, trendy
  16. einige, mehrere
  17. Innovation, Neuheit
  18. seit, seitdem
  19. veraltet
  20. äußerst, sehr
  21. eigentlich, grundsätzlich
  22. täglich
  23. Status
  24. Link
  25. Follower
  26. Clip; Ausschnitt
Down
  1. altmodisch
  2. kommunizieren
  3. Veganismus
  4. soziale Medien
  5. Jumping Fitness
  6. Lieblings-
  7. updaten
  8. Anfrage
  9. abonnieren
  10. Trend, Entwicklung
  11. Selfie
  12. mobil, tragbar
  13. Tonne
  14. zerissen
  15. nicht mögen
  16. streamen
  17. Karte, Plan
  18. entfreunden
  19. Blogger
  20. Einfluss, Auswirkung
  21. Computerspiele-
  22. Cyber-Mobbing
  23. sofort, gleich
  24. die Hälfte

50 Clues: seitFotoPostLinkKontoTonneSelfieStatusupdatenAnfrageBloggertäglichbegrüßenzerissenstreamenveraltetFollowerverdienenKommentaraltmodischVeganismusLieblings-abonnierenbefreundenSmartphonedie Hälftenicht mögenKarte, Planentfreundentrendsetzendbeeinflussenkommunizierenseit, seitdemCyber-Mobbingäußerst, sehrsoziale Medienonline stellenmobil, tragbar...

Quiz #5 Insurance on Property 2024-11-14

Quiz #5 Insurance on Property crossword puzzle
Across
  1. These fluctuate for seasonal stock.
  2. This is has a potential severity that is too high.
  3. This type of water is excluded.
  4. Peak
  5. Property on its way to a different location.
  6. What insurers impose to encourage insurance to full value.
  7. Coverage for boiler and machinery.
  8. ______ locations
Down
  1. Vice
  2. Combined limits for multiple locations.
  3. These risks can be caused by viruses and worms.
  4. Is it RC or ACV?
  5. This is a type of property excluded along with autos, money, ...
  6. Acronym for building and contents together.
  7. This loss to inventory is not covered.
  8. This is found on the dec sheet by the property insured.
  9. This can be purchased to increase limits.
  10. Not covered.
  11. Perils
  12. Code Upgrades can be found in these municipal rules.

20 Clues: VicePeakPerilsNot covered.Is it RC or ACV?______ locationsThis type of water is excluded.Coverage for boiler and machinery.These fluctuate for seasonal stock.This loss to inventory is not covered.Combined limits for multiple locations.This can be purchased to increase limits.Acronym for building and contents together....

FPS Definitions 2023-05-09

FPS Definitions crossword puzzle
Across
  1. VR A headset used to view virtual reality
  2. Using reality’s in away not intended
  3. A interactive video that views the entire visible area
  4. A system that can give you feedback on your health
  5. Attract and hold attention
  6. A term that capitulates other realities
Down
  1. Motion sickness cause my devices
  2. A visible form of an idea
  3. Digital elements used to overview real life
  4. A code used to program

10 Clues: A code used to programA visible form of an ideaAttract and hold attentionMotion sickness cause my devicesUsing reality’s in away not intendedA term that capitulates other realitiesVR A headset used to view virtual realityDigital elements used to overview real lifeA system that can give you feedback on your health...

CyberDSA D1 2025-08-14

CyberDSA D1 crossword puzzle
Across
  1. Malicious software designed to damage systems
  2. Malicious program disguised as legitimate software
  3. Incident where unauthorized access to data occurs
  4. Fraudulent emails or messages to steal credentials
  5. Hostile action aimed at exploiting vulnerabilities
Down
  1. Organization behind the ATT&CK framework for cyber threats.
  2. Malware that encrypts files and demands payment
  3. Intelligence gathered from publicly available sources
  4. Network of compromised devices controlled remotely
  5. Decoy system set up to lure attackers

10 Clues: Decoy system set up to lure attackersMalicious software designed to damage systemsMalware that encrypts files and demands paymentIncident where unauthorized access to data occursMalicious program disguised as legitimate softwareNetwork of compromised devices controlled remotelyFraudulent emails or messages to steal credentials...

Health 2022-10-24

Health crossword puzzle
Across
  1. A bullying done on social media/internet
  2. A bullying done by actions physically
  3. The person who helps the victim
  4. A person who stands by all the bullies actions.
  5. being sad for a long period of time
Down
  1. A person who bullies others
  2. can recover quickly and not strong as depression
  3. A bullying done by words
  4. You joke in a way that makes people smile
  5. The person the bully bullies

10 Clues: A bullying done by wordsA person who bullies othersThe person the bully bulliesThe person who helps the victimbeing sad for a long period of timeA bullying done by actions physicallyA bullying done on social media/internetYou joke in a way that makes people smileA person who stands by all the bullies actions....

Health crossword puzzle 2022-10-24

Health crossword puzzle crossword puzzle
Across
  1. a person that stands up to the bully
  2. the type of bullying that uses violence
  3. the type of bullying that’s on the internet
  4. the need to kill yourself
Down
  1. a person that isn’t involved in the conflict
  2. the person that hurts the victim physically and mentally
  3. the type of bullying that uses words
  4. felling sad for multiple days
  5. the person that’s getting bullied
  6. hurting someone physically and mentally

10 Clues: the need to kill yourselffelling sad for multiple daysthe person that’s getting bulliedthe type of bullying that uses wordsa person that stands up to the bullythe type of bullying that uses violencehurting someone physically and mentallythe type of bullying that’s on the interneta person that isn’t involved in the conflict...

Complete the crossword for words with soft c 2025-09-29

Complete the crossword for words with soft c crossword puzzle
Across
  1. last month of the year
  2. move around
  3. an ordinary person not in the armed forces
  4. a tank to hold water as in a toilet
Down
  1. to do with computers, the internet or online world
  2. do something happy to mark a special day
  3. very good exceptional
  4. a special piece of paper to say what you achieved
  5. a special service at an event such as a wedding
  6. something happens by mistake

10 Clues: move aroundvery good exceptionallast month of the yearsomething happens by mistakea tank to hold water as in a toiletdo something happy to mark a special dayan ordinary person not in the armed forcesa special service at an event such as a weddinga special piece of paper to say what you achievedto do with computers, the internet or online world

12.a 2 2023-04-25

12.a 2 crossword puzzle
Across
  1. market research
  2. responsibility
  3. advantage
  4. office staff
  5. quantity
  6. weakness
  7. salary
Down
  1. market gap
  2. survive
  3. enterprise
  4. develop
  5. sample
  6. reward
  7. independence
  8. security
  9. time-consuming

16 Clues: samplerewardsalarysurvivedevelopsecurityquantityweaknessadvantagemarket gapenterpriseindependenceoffice staffresponsibilitytime-consumingmarket research

Change a verb into a nouns 2023-11-30

Change a verb into a nouns crossword puzzle
Across
  1. conclusion
  2. addition
  3. success
  4. attraction
  5. achievement
  6. security
Down
  1. protection
  2. comparison
  3. description
  4. decision
  5. collection
  6. distraction
  7. madness
  8. attention

14 Clues: successmadnessadditiondecisionsecurityattentionprotectioncomparisonconclusioncollectionattractiondescriptiondistractionachievement

Change a nouns into a verb 2023-11-30

Change a nouns into a verb crossword puzzle
Across
  1. success
  2. security
  3. attraction
  4. achievement
  5. madness
  6. distraction
  7. protection
Down
  1. description
  2. conclusion
  3. attention
  4. addition
  5. decision
  6. comparison
  7. collection

14 Clues: successmadnesssecurityadditiondecisionattentionconclusionattractioncomparisonprotectioncollectiondescriptionachievementdistraction

2 2024-05-15

2 crossword puzzle
Across
  1. special
  2. cured
  3. by
  4. suitable
  5. security
  6. thereof
  7. through
  8. outside
Down
  1. things
  2. wedding
  3. opened
  4. air
  5. confirmed
  6. exists
  7. earth

15 Clues: byaircuredearththingsopenedexistsweddingspecialthereofthroughoutsidesuitablesecurityconfirmed

National Services Acronyms 2025-02-17

National Services Acronyms crossword puzzle
Across
  1. RTE_____
  2. APA______
  3. B____AU
  4. DP____T
  5. F____SF
  6. PS____N
  7. S____DP
Down
  1. SDP_____
  2. MI____F
  3. RH____P
  4. NWR____R
  5. S_____IL
  6. I_____BCA
  7. LE____V

14 Clues: MI____FRH____PB____AUDP____TF____SFPS____NS____DPLE____VSDP_____RTE_____NWR____RS_____ILAPA______I_____BCA

C reading 2021-09-06

C reading crossword puzzle
Across
  1. disaster
  2. move
  3. several
  4. horrific
  5. sail
  6. random
  7. dreadful
  8. bag
  9. embrace
Down
  1. somehow
  2. security
  3. threat
  4. awesome
  5. pour

14 Clues: bagmovesailpourthreatrandomsomehowseveralawesomeembracedisastersecurityhorrificdreadful

DE TOPIC 1 2025-08-03

DE TOPIC 1 crossword puzzle
Across
  1. Integration of cyber-physical systems, IoT, AI and data analitics
  2. Focused on mass production and global market
  3. utilising software and digital and technologies
Down
  1. Focus on physical good and services
  2. Focused on sustainability and environment conservation
  3. Follow islamic principles and ethics
  4. Operates online
  5. Create positive societal impact

8 Clues: Operates onlineCreate positive societal impactFocus on physical good and servicesFollow islamic principles and ethicsFocused on mass production and global marketutilising software and digital and technologiesFocused on sustainability and environment conservationIntegration of cyber-physical systems, IoT, AI and data analitics

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. The ------------risk of the firm is diversifiable
  2. CAPM is a market --------------model
  3. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  4. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses.
  5. An opportunity where an investor earns riskless profit without making any net investment
  6. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  7. The other name for non-diversifiable risk is -------------------------
  8. One of the researchers/economists who developed the CAPM model
  9. The economist who developed the Arbitrage Pricing Theory (APT) model.
Down
  1. In the absence of secondary markets, this risk would be higher.
  2. The line representing CAPM is the -----------------market line
  3. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing.
  4. In order to diversify, we look for security returns that are related ------------------
  5. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  6. The other name for indifference curve is --------------curve
  7. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions.
  8. A conditional market order to sell stock if it drops to a given price (write without space)
  9. --------------------is the slope of the security characteristic line
  10. equal to the average ------------------as the number of securities becomes very large
  11. Variance of a portfolio with equi-proportionate investments in each security is
  12. The economist who laid the foundations for the Modern Portfolio theory

21 Clues: CAPM is a market --------------modelThe ------------risk of the firm is diversifiableThe other name for indifference curve is --------------curveThe line representing CAPM is the -----------------market lineOne of the researchers/economists who developed the CAPM modelIn the absence of secondary markets, this risk would be higher....

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. In order to diversify, we look for security returns that are related ------------------
  2. Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
  3. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
  4. In the absence of secondary markets, this risk would be higher
  5. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  6. The line representing CAPM is the -----------------market line
  7. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
  8. An opportunity where an investor earns riskless profit without making any net investment
  9. A conditional market order to sell stock if it drops to a given price (write without space)
  10. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
Down
  1. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  2. The other name for non-diversifiable risk is -------------------------risk
  3. The other name for indifference curve is --------------curve
  4. The economist who laid the foundations for the Modern Portfolio theory
  5. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
  6. --------------------is the slope of the security characteristic line
  7. The ------------risk of the firm is diversifiable
  8. CAPM is a market --------------model
  9. The economist who developed the Arbitrage Pricing Theory (APT) model
  10. One of the researchers/economists who developed the CAPM model

20 Clues: CAPM is a market --------------modelThe ------------risk of the firm is diversifiableThe other name for indifference curve is --------------curveIn the absence of secondary markets, this risk would be higherThe line representing CAPM is the -----------------market lineOne of the researchers/economists who developed the CAPM model...

Cast study - An ethical approach to hacking 2025-06-12

Cast study - An ethical approach to hacking crossword puzzle
Across
  1. Simulated cyberattacks used to assess system security.
  2. The analysis of systems and data to investigate security incidents or breaches.
  3. Software used to recover or bypass passwords through brute force or other methods.
  4. A testing method where the tester has full knowledge of the system’s internals.
  5. The technique of identifying active devices and services on a network.
  6. A testing method where the tester has partial knowledge of the system.
  7. A social engineering attack using phone calls to extract sensitive information.
  8. A unique identifier assigned to each device connected to a network.
  9. The creation of code or tools to take advantage of system vulnerabilities.
  10. Identifying the operating system of a target device during reconnaissance.
  11. Probing a system to identify open ports and available services.
  12. Psychological manipulation tactics to trick people into revealing confidential information.
  13. A documented strategy for detecting, responding to, and recovering from security incidents.
Down
  1. An evaluation of an organization’s overall cybersecurity strength and weaknesses.
  2. A web attack that injects malicious scripts into trusted websites.
  3. Using advanced search operators to find sensitive data or vulnerabilities online.
  4. The process of evaluating systems through defined methods to find vulnerabilities.
  5. Publicly available information gathered for analysis.
  6. Malicious software designed to harm or exploit systems.
  7. An exploit where a program overruns a buffer’s boundary and overwrites adjacent memory.
  8. A code injection attack targeting databases through malicious SQL queries.
  9. A social engineering method that involves inventing a scenario to steal information.
  10. An individual who gains unauthorized access to systems or data.
  11. A testing method where the tester has no prior knowledge of the system.
  12. The layout or structure of a network’s connections and devices.
  13. The process of discovering devices and connections within a network.

26 Clues: Publicly available information gathered for analysis.Simulated cyberattacks used to assess system security.Malicious software designed to harm or exploit systems.An individual who gains unauthorized access to systems or data.Probing a system to identify open ports and available services....

Cold War 2018-04-26

Cold War crossword puzzle
Across
  1. war
  2. Tse-tung
  3. maliltary
  4. Act
  5. Doctrine
  6. race
  7. perestroika
  8. curtain
  9. airlift
Down
  1. Pact
  2. policy
  3. nation
  4. security
  5. Plan
  6. theory

15 Clues: warActPactPlanracepolicynationtheorycurtainairliftsecurityTse-tungDoctrinemaliltaryperestroika

FITE: Tech. Terms By:Maya Ausley 2013-05-16

FITE: Tech. Terms By:Maya Ausley crossword puzzle
Across
  1. type of mouse
  2. Example: Comcast
  3. 'WWW'___________
  4. behavior online
  5. a device that connects to a computer
  6. 32 id numbers
  7. short term storage
  8. Liquid Cristal Display
  9. Example: speakers
  10. where you plug in speakers/earbuds
  11. LCD stands for___________.
  12. without cables or wires
  13. tools, machinery, and other durable equipment
  14. largest amount of storage space possible
  15. long term storage
Down
  1. your safety online
  2. wired internet port
  3. the primary circuit board
  4. NCSA stands for___________.
  5. online
  6. the smallest storage size
  7. visual display unit
  8. where you put in a disc
  9. Example: Temple Run
  10. the programs and other operating information used by computers
  11. flash drive port
  12. wireless internet
  13. cloud based presentation maker with zooming features
  14. Example: google
  15. online storage

30 Clues: onlinetype of mouse32 id numbersonline storagebehavior onlineExample: googleExample: Comcast'WWW'___________flash drive portwireless internetExample: speakerslong term storageyour safety onlineshort term storagewired internet portvisual display unitExample: Temple RunLiquid Cristal Displaywhere you put in a discwithout cables or wires...

Supercoulafragolisticexpeouladotios crossword puzzle 2013-08-26

Supercoulafragolisticexpeouladotios crossword puzzle crossword puzzle
Across
  1. open your mouth wide for the nurse.
  2. water that is ultra pure!
  3. Violins, Basses, Violas, and Cellos.
  4. programs for managers I think...
  5. fruits and veggies. and other stuff.
  6. they make vents.
  7. so logical!
  8. Makes cars.
  9. I'm in cyberspace!
Down
  1. its quality entertainment!
  2. they make kindles.
  3. the make radars. not much else to explain.
  4. I can see your bones!
  5. the opposite of hardware.
  6. so much information!
  7. zip code doors and stuff.
  8. the former producer company of Minecraft.
  9. these graphics are amazing!
  10. the opposite of software.
  11. hey transport stuff.
  12. Helping the earth and environment!
  13. they make websites
  14. Where boats drop off there exporting items.
  15. kind of looks like a U.S.B port...
  16. No monkey business!
  17. Yahoo pages.

26 Clues: so logical!Makes cars.Yahoo pages.they make vents.they make kindles.they make websitesI'm in cyberspace!No monkey business!so much information!hey transport stuff.I can see your bones!the opposite of hardware.zip code doors and stuff.water that is ultra pure!the opposite of software.its quality entertainment!these graphics are amazing!...

OL 4, Unit 4, Station 2 2025-05-07

OL 4, Unit 4, Station 2 crossword puzzle
Across
  1. sofort, gleich
  2. abonnieren
  3. befreunden
  4. fitness Jumping Fitness
  5. täglich
  6. äußerst, sehr
  7. Veganismus
  8. kommunizieren
  9. Foto
  10. Einfluss, Auswirkung
  11. altmodisch
  12. Status
  13. veraltet
  14. Innovation, Neuheit
  15. Lieblings-
  16. Selfie
  17. Blogger
  18. begrüßen
  19. Konto
  20. trendsetzend
  21. einige, mehrere
Down
  1. beeinflussen
  2. Cyber-Mobbing
  3. verdienen
  4. seit, seitdem
  5. Kommentar
  6. Post
  7. eigentlich, grundsätzlich
  8. entfreunden
  9. Tonne
  10. Link
  11. Karte, Plan
  12. modisch, trendy
  13. Smartphone
  14. streamen
  15. Seite (im Internet)
  16. nicht mögen
  17. seit
  18. online stellen
  19. soziale Medien
  20. die Hälfte
  21. mobil, tragbar
  22. geben, existieren
  23. Trend, Entwicklung
  24. zerissen
  25. Anfrage
  26. updaten
  27. Computerspiele-
  28. Follower
  29. Clip; Ausschnitt

50 Clues: PostLinkFotoseitTonneKontoStatusSelfietäglichBloggerAnfrageupdatenstreamenveraltetzerissenbegrüßenFollowerverdienenKommentarabonnierenbefreundenVeganismusSmartphonealtmodischdie HälfteLieblings-entfreundenKarte, Plannicht mögenbeeinflussentrendsetzendCyber-Mobbingseit, seitdemäußerst, sehrkommunizierensofort, gleichonline stellensoziale Medien...

Lenovo 3 2021-09-10

Lenovo 3 crossword puzzle
Across
  1. What is the new model for the current and future workforce?
  2. What is the biggest security threat today?
  3. One of Lenovo's approaches to security is "Security by ..."
  4. XDR stands for "_ _ _ _ _ _ _ _ Detection and Response"
Down
  1. What is the name of Lenovo's security brand?
  2. What are prime targets for hackers?
  3. Lenovo Smart Standby understands when you are not using your computer and schedules ... (Bears schedule this in winter!)
  4. What is most exposed in the hybrid model?

8 Clues: What are prime targets for hackers?What is most exposed in the hybrid model?What is the biggest security threat today?What is the name of Lenovo's security brand?XDR stands for "_ _ _ _ _ _ _ _ Detection and Response"What is the new model for the current and future workforce?One of Lenovo's approaches to security is "Security by ..."...

Airports 2020-05-13

Airports crossword puzzle
Across
  1. indulás
  2. érkezés
  3. bőrönd
  4. vámvizsgálat
  5. WC
  6. poggyász
  7. utas
  8. beszállni
  9. fogorvos
  10. kézikocsi
  11. létesítmény
  12. repülőjárat
  13. biztonsági
  14. késik
Down
  1. sor
  2. bevándorlás
  3. bejelentkezés
  4. rendelő
  5. útlevél
  6. külföldre
  7. szórakoztatni
  8. váróterem
  9. városnézés
  10. kapu
  11. repülőtér

25 Clues: WCsorutaskapukésikbőröndindulásérkezésrendelőútlevélpoggyászfogorvoskülföldrebeszállniváróteremkézikocsirepülőtérvárosnézésbiztonságibevándorláslétesítményrepülőjáratvámvizsgálatbejelentkezésszórakoztatni

C2 2025-05-15

C2 crossword puzzle
Across
  1. turtle
  2. door
  3. bed
  4. flag
  5. helicopter
  6. lamp
  7. cat
  8. security
  9. snake
  10. cruise ship
  11. luggage
  12. train
Down
  1. hamburger
  2. pilot
  3. eagle
  4. pasta
  5. window
  6. dog
  7. cereal
  8. car
  9. hot dog
  10. pyramid
  11. passport
  12. bunny

24 Clues: dogbedcarcatdoorflaglamppiloteaglepastabunnysnaketrainwindowturtlecerealhot dogpyramidluggagepassportsecurityhamburgerhelicoptercruise ship

Capítulo 7: A Viajar #2 2024-11-19

Capítulo 7: A Viajar #2 crossword puzzle
Across
  1. table tray
  2. to take the train
  3. to pack suitcases
  4. passenger
  5. destination
  6. price
  7. layover
  8. security
  9. park
  10. bicycle
Down
  1. flight
  2. train track
  3. arrivals
  4. customs
  5. floor
  6. train
  7. one-way ticket
  8. entrance
  9. to plan
  10. airplane

20 Clues: parkfloortrainpriceflightcustomsto planlayoverbicyclearrivalsentrancesecurityairplanepassengertable traytrain trackdestinationone-way ticketto take the trainto pack suitcases

Unidad 6A 2025-05-22

Unidad 6A crossword puzzle
Across
  1. security
  2. to save
  3. to plan
  4. to reserve
  5. delay
  6. ticket
  7. expensive
Down
  1. flight
  2. to fly
  3. to cross
  4. cloud
  5. exit
  6. cheap
  7. to board
  8. misunderstanding
  9. to spend
  10. fare

17 Clues: exitfarecloudcheapdelayflightto flyticketto saveto planto crosssecurityto boardto spendexpensiveto reservemisunderstanding

Network Requirements 2023-09-05

Network Requirements crossword puzzle
Across
  1. A set of rules for the network
  2. managing IP-packet traffic
  3. the basic unit of data
  4. maximum data rate networks can manage
  5. the structure of a network
  6. ensures protection from unauthorised access
  7. accommodation of growth without decreased performance
  8. maximum size of a packet that can be transmitted
  9. a security device
  10. usage of backup components
Down
  1. allows access to a private network over the internet
  2. actual data transfer rate
  3. translates domain names to IP addresses
  4. division of a network into subnetworks
  5. allows multiple devices on a private network to share a public IP address
  6. make late
  7. delay in transmission measured in (ms)
  8. involves constant diagnosis of issues and network analysis
  9. deviation in signal pulses
  10. another word for forfeiture

20 Clues: make latea security devicethe basic unit of dataactual data transfer ratemanaging IP-packet trafficthe structure of a networkdeviation in signal pulsesusage of backup componentsanother word for forfeitureA set of rules for the networkmaximum data rate networks can managedivision of a network into subnetworksdelay in transmission measured in (ms)...

Spanish Travel Vocab 2020-04-10

Spanish Travel Vocab crossword puzzle
Across
  1. to see
  2. stop
  3. baggage claim
  4. second class
  5. to hope
  6. flight attendant
  7. event ticket
  8. to take off
  9. to go through security
  10. gate
  11. car wagon
  12. to check luggage
  13. to miss
  14. departure
  15. platform
  16. coach
  17. trip
  18. counter
  19. in the train station
  20. window
  21. customs
  22. layover
  23. ticket
  24. international airport
  25. carry on luggage
Down
  1. security agent
  2. in the airport
  3. luggage
  4. first class
  5. aisle
  6. baggage screening
  7. boarding pass
  8. delayed
  9. suitcase
  10. waiting room
  11. to land
  12. visa
  13. to get
  14. ticket
  15. bunk
  16. passenger
  17. seat belt
  18. to give
  19. sleeping car
  20. arrival
  21. flight
  22. ticket window
  23. connection
  24. on time
  25. seat
  26. to turn
  27. controller

52 Clues: stopvisagatebunktripseataislecoachto seeto getticketflightwindowticketluggageto hopedelayedto landto missto givecounterarrivalcustomslayoveron timeto turnsuitcaseplatformcar wagonpassengerdepartureseat beltconnectioncontrollerfirst classto take offsecond classwaiting roomevent ticketsleeping carbaggage claimboarding passticket windowsecurity agent...

CITS2006-C10-Mohammad 2025-05-19

CITS2006-C10-Mohammad crossword puzzle
Across
  1. Secures internet traffic over public networks
  2. Converting data into an unreadable form
  3. Fake system to lure attackers
  4. Overwhelming a many systems with traffic
  5. Records keystrokes secretly
  6. Malware disguised as legitimate software
  7. Secures data with one-way transformation
  8. Malicious software
  9. Digital proof of website authenticity
  10. Pretending to be a trusted source
  11. Self-replicating malware
Down
  1. Tricking users to steal information
  2. Guessing repeatedly to gain access
  3. Hidden way to bypass security
  4. Vulnerability with no known fix yet
  5. Locks files for money
  6. Network of infected devices
  7. Exploits database query vulnerabilities
  8. Isolated space to safely run untrusted code
  9. Secretly monitors user activity
  10. Security fix for a software
  11. Protocol securing web communications
  12. Filters network traffic
  13. Adding extra login verification steps

24 Clues: Malicious softwareLocks files for moneyFilters network trafficSelf-replicating malwareNetwork of infected devicesRecords keystrokes secretlySecurity fix for a softwareHidden way to bypass securityFake system to lure attackersSecretly monitors user activityPretending to be a trusted sourceGuessing repeatedly to gain access...

The 16 Career Clusters 2025-10-19

The 16 Career Clusters crossword puzzle
Across
  1. : Plane driver in Transportation, Distribution & Logistics
  2. : Patient care provider in Health Science
  3. : Numbers expert in Business, Management & Administration
  4. : Animal doctor in Agriculture, Food & Natural Resources
  5. : Fashion demonstrator in Marketing, Sales & Service
  6. : Food preparation expert in Hospitality and Tourism
  7. : Wiring expert in Architecture & Construction
  8. : Book manager in Education & Training
  9. : Congressional assistant in Government & Public Administration
  10. : Metal joiner in Manufacturing
Down
  1. : Fire responder in Law, Public Safety, Corrections & Security
  2. : Design specialist in Science Technology, Engineering & MATH
  3. : Spiritual leader in Human Services
  4. : Legal representative in Law, Public Safety, Corrections & Security
  5. : Oral health specialist in Health Science
  6. : Financial institution manager in Finance
  7. : Music performer in Arts, A/V Tech & Communications
  8. : Knowledge imparter in Education & Training
  9. : Network systems expert in Information Technology
  10. : Building designer in Architecture & Construction

20 Clues: : Metal joiner in Manufacturing: Spiritual leader in Human Services: Book manager in Education & Training: Patient care provider in Health Science: Oral health specialist in Health Science: Financial institution manager in Finance: Knowledge imparter in Education & Training: Wiring expert in Architecture & Construction...

SEAT WORK 2022-08-30

SEAT WORK crossword puzzle
Across
  1. SECURITY PERSONNEL - defined by the IRR of R.A. 5487, as natural persons which include rendering/performing security and/or detective services as employed by private security agencies and/or private firms.
  2. SECURITY MANAGEMENT - It is established to provide security for installation or facilities and to promote efficiency of security operations and economy in the use of security personnel.
  3. - The state of being protected or safe from harm; things done to make people or places safe.
  4. CONTRACT THEORY - Individual agree to live according to certain rules, norms and laws, so that collectively we can enjoy the benefits of living in a society.
Down
  1. TAYLOR - Father of Scientific Management Theory.
  2. - latin word “__________” which means “safe, secure, free from care, unworried, unconcerned.
  3. TAYLOR- he proposed the need to introduce science into managing organizations in order to bring objectivity, precision, order and predictability.
  4. - According to history, protecting these establishments are almost single-handedly made by the State forces.
  5. REVOLUTION - The process of change from an agrarian, handicraft economy to one dominated by industry and machine manufacture.
  6. SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients.

10 Clues: TAYLOR - Father of Scientific Management Theory.- The state of being protected or safe from harm; things done to make people or places safe.- latin word “__________” which means “safe, secure, free from care, unworried, unconcerned.SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients....

what do you know? 2021-05-04

what do you know? crossword puzzle
Across
  1. attacks physically, emotionally, or socially
  2. physical or emotional pain
  3. punching,kicking,spitting
  4. in intent to make fun of someone in a playful way
  5. being far away from everything/in your own space
  6. there is an intent to hurt or harm
  7. it happens more than once over a period of time
Down
  1. what percent of students report bullying
  2. name-calling threatening
  3. writing mean thing on Facebook, Instagram, or Twitter
  4. spreading rumors, excluding people from games and groups
  5. something happening over and over again
  6. response to feeling or an event
  7. moment getting hurt on accident once

14 Clues: name-calling threateningpunching,kicking,spittingphysical or emotional painresponse to feeling or an eventthere is an intent to hurt or harmmoment getting hurt on accident oncesomething happening over and over againwhat percent of students report bullyingattacks physically, emotionally, or sociallyit happens more than once over a period of time...

Securities Crossword 2023-01-04

Securities Crossword crossword puzzle
Across
  1. Type of security that takes care of parks and schools
  2. People who invest in bonds and stocks
  3. Type of bond that is internations
  4. what is the mane for the devaluing of money when too much is in circulation
  5. Where stocks and bonds can be bought and sold
  6. this is issued by governments and corporations when they want to raise money.
  7. a tradable financial asset
Down
  1. A stock is categorized as this when the price dramatically fluctuates
  2. another name for money
  3. who ensures most bonds
  4. debt obligations issued by the U.S. Department of the Treasury. T-bills have the shortest maturity date of all the debt issued by the federal government
  5. Investors look to make this when they go into the market
  6. all the shares by which ownership of a corporation or company is divided
  7. what type of bond is bought by corporations
  8. Because of their large denomination this type of security is bought most often by large institutional investors

15 Clues: another name for moneywho ensures most bondsa tradable financial assetType of bond that is internationsPeople who invest in bonds and stockswhat type of bond is bought by corporationsWhere stocks and bonds can be bought and soldType of security that takes care of parks and schoolsInvestors look to make this when they go into the market...

U11 - Mod 13 Key Terms 2024-10-21

U11 - Mod 13 Key Terms crossword puzzle
Across
  1. access controls that are actual barriers deployed to prevent direct physical contact with systems.
  2. (4,5) is a comprehensive approach to securing all access across networks, applications, and environments.
  3. it verifies the identity of each user, to prevent unauthorized access; An administrative access control, one of the three security services.
  4. (4,3,4) Smart cards and security key fobs are examples of something that users possess
  5. it keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make; An administrative access control, one of the three security services.
  6. (4,3,4) Passwords, passphrases, or PINs are all examples
Down
  1. (6,4,2) solution allows the user to use one set of login credentials to authenticate across multiple applications. This way, the user only needs to remember one strong password.
  2. it determines which resources users can access, along with the operations that users can perform; An administrative access control, one of the three security services.
  3. access controls that are the hardware and software solutions used to manage access to resources and systems.
  4. access controls that are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
  5. are rules configured to limit folder or file access for an individual or a group and can help secure data.
  6. (3,3,3) Biometric security compares unique physical characteristics against stored profiles to authenticate users.

12 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples(4,3,4) Smart cards and security key fobs are examples of something that users possessaccess controls that are actual barriers deployed to prevent direct physical contact with systems.(4,5) is a comprehensive approach to securing all access across networks, applications, and environments....

IC3 Lesson 30 Vocabulary 2015-05-18

IC3 Lesson 30 Vocabulary crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
  5. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
  1. Encrypts the information in an SSL Certificate
  2. Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
  3. Hackers using spyware to control your browser
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  6. A malicious program that records keystrokes
  7. Deciphers the information in an SSL Certificate
  8. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

CHAPTER 4 CF 2024-09-12

CHAPTER 4 CF crossword puzzle
Across
  1. A formal document outlining security policies, procedures, and guidelines for safeguarding information assets.
  2. The process involves the continuous implementation and management of security policies, involving regular updates, audits, and adherence to established guidelines.
  3. The process involves setting access controls on files and folders to restrict their viewing, modification, or deletion permissions.
  4. The guidelines outline the process for checking out and introducing new employees.
  5. To manage permissions effectively
  6. The framework and oversight for security policies are established, outlining roles and responsibilities for policy enforcement and review.
  7. The guidelines emphasize the importance of honesty and professionalism in employee behavior.
Down
  1. Rules for regulating access to specific physical spaces, such as offices or server rooms.
  2. Grouping users based on roles, such as marketing or IT staff, and assigning specific access allows for efficient management of permissions for multiple users simultaneously.
  3. This ensures the security and compliance of all systems by detecting any errors or misuse of access.
  4. The process involves creating user accounts and determining the specifics of what each user can access or perform on the system.
  5. Authentication methods rely on unique biological traits like fingerprints, facial recognition, or iris scans.
  6. Devices or software that generate one-time codes or credentials for authentication.

13 Clues: To manage permissions effectivelyThe guidelines outline the process for checking out and introducing new employees.Devices or software that generate one-time codes or credentials for authentication.Rules for regulating access to specific physical spaces, such as offices or server rooms....

4 2024-05-14

4 crossword puzzle
Across
  1. special
  2. thereof
  3. circus performance
  4. consider
  5. wedding
  6. coordination
Down
  1. discuss
  2. cardan
  3. circus act
  4. confirmed
  5. calculated
  6. prepared
  7. security
  8. outside
  9. exists

15 Clues: cardanexistsdiscussspecialthereofoutsideweddingpreparedconsidersecurityconfirmedcircus actcalculatedcoordinationcircus performance

KPL 3&3.1 2025-02-26

KPL 3&3.1 crossword puzzle
Across
  1. missio
  2. alusta
  3. tasa-arvo
  4. varat
  5. turvallisuus
  6. näkyvä
  7. delegaatti
Down
  1. maailmanlaajuinen
  2. vaikutus
  3. kunnia
  4. erityisesti
  5. edistää
  6. rohkaista
  7. ongelma
  8. rauha

15 Clues: varatrauhamissiokunniaalustanäkyväedistääongelmavaikutustasa-arvorohkaistadelegaattierityisestiturvallisuusmaailmanlaajuinen

Heathrow 2025-11-06

Heathrow crossword puzzle
Across
  1. tualett
  2. kõrvaklapid
  3. kõrvatropid
  4. sihtkoht
  5. ratastega kohver
  6. kohver
Down
  1. kaelapadi
  2. pardakaart
  3. rahakott
  4. väljumine, lahkumine
  5. pass
  6. pagas
  7. nimesilt
  8. seljakott
  9. turva

15 Clues: passpagasturvakohvertualettrahakottnimesiltsihtkohtkaelapadiseljakottpardakaartkõrvaklapidkõrvatropidratastega kohverväljumine, lahkumine

War and Peacekeeping 2023-11-26

War and Peacekeeping crossword puzzle
Across
  1. What peacekeepers aim to achieve.
  2. Mission type often associated with the U.N.
  3. A nation helped by New Zealand's peacekeepers in 1999.
  4. Soldiers in digital battles.
  5. The opposite of peace.
  6. A mission to help a nation, often abbreviated.
  7. Something that is done to fix buildings and heal communities.
Down
  1. A nation known for its peacekeeping efforts, especially in the Pacific.
  2. Organisation often involved in peacekeeping.
  3. Headgear often worn by peacekeepers.
  4. They enforce law and order in a country.
  5. Large water bodies surrounding the Solomon Islands.
  6. Type of warfare conducted in cyberspace.
  7. Another word for conflict or battle.
  8. An act of helping or aiding.

15 Clues: The opposite of peace.Soldiers in digital battles.An act of helping or aiding.What peacekeepers aim to achieve.Headgear often worn by peacekeepers.Another word for conflict or battle.They enforce law and order in a country.Type of warfare conducted in cyberspace.Mission type often associated with the U.N.Organisation often involved in peacekeeping....

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. ______Regulation works by utilising feedback
  2. Shawn Fanning created the______
  3. cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  4. cyber________
Down
  1. according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
  2. some experts regard digital______ as the third industrial revolution
  3. the conversion of analogue data into digital form
  4. wrote Code and Other Laws of Cyberspace

8 Clues: cyber________Shawn Fanning created the______wrote Code and Other Laws of Cyberspace______Regulation works by utilising feedbackthe conversion of analogue data into digital formsome experts regard digital______ as the third industrial revolution...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  2. ____Regulation works by utilising feedback
  3. according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
  1. wrote Code and Other Laws of Cyberspace
  2. cyber____
  3. digital___ is the productivity platform that some experts regard as the third industrial revolution
  4. Shawn Fanning created the____
  5. the conversion of analogue data into digital form

8 Clues: cyber____Shawn Fanning created the____wrote Code and Other Laws of Cyberspace____Regulation works by utilising feedbackthe conversion of analogue data into digital formdigital___ is the productivity platform that some experts regard as the third industrial revolution...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. An individual who causes harm or stress to another human intentionally and repetitively.
  2. The act of protecting ones self or others from harm or intimidation online.
  3. the use of technology to harass, threaten, embarrass, or target another person.
  4. A result or effect, typically one that is unwelcome or unpleasant.
Down
  1. Electronic device most students own at home and is square and mostly portable.
  2. A repetitive action toward another human purposely causing harm or intimidation.
  3. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  4. Having firm belief or reliability in someone.

8 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.The act of protecting ones self or others from harm or intimidation online.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person....

Cyber Liability 2020-02-05

Cyber Liability crossword puzzle
Across
  1. Direct monetary fines, penalties, reimbursements, fraud recoveries or assessments owed by the insured organization under the terms of a merchant services agreement.
  2. Legal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages.
  3. In the wake of a data breach provides services to the insured, including: computer expert, legal, public relations and crisis management, breach notifications, call center, breach resolution and mitigation.
  4. Indemnifies the insured for data protection loss incurred by the insured due to alteration, corruption, destruction, deletion or damage to a data asset, or inability to access a data asset.
  5. Liability to third party individuals or businesses for theft, loss, or unauthorized disclosure of personally identifiable information or third party information that is in the care, custody, or control of the insured organization.
Down
  1. Net profit and extra expense loss during the period of restoration
  2. Coverage for payment made in response to an extortion threat to damage or corrupt data if not paid. Typically carried out by hackers placing ransomware on our insured's systems.
  3. Coverage for defense costs and penalties resulting from Federal Trade Commission (FTC) or Federal Communications Commission (FCC) proceedings concerning a covered data breach incident.

8 Clues: Net profit and extra expense loss during the period of restorationLegal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages....

Cyber bullying 2024-10-08

Cyber bullying crossword puzzle
Across
  1. Never open an ___ from someone you do not know or from bullies
  2. Do not spread ___ about someone
  3. Never give out personal __
  4. Do not send ___ messages
  5. Do not ___ a person from online activities such as a chat
Down
  1. Never tell anyone your ___, not even your friends
  2. Be ___ to others
  3. Do not send messages when you are ___

8 Clues: Be ___ to othersDo not send ___ messagesNever give out personal __Do not spread ___ about someoneDo not send messages when you are ___Never tell anyone your ___, not even your friendsDo not ___ a person from online activities such as a chatNever open an ___ from someone you do not know or from bullies

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. Talking someone into revealing secrets or embarrassing information
  2. someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  3. intense harassment and denigration that includes threats or creates significant fear.
  4. Intentionally and cruelly excluding someone from an online group
  5. Sharing someone's secrets or embarrassing information
Down
  1. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation
  2. Repeatedly sending nasty, mean, and insulting messages
  3. Online fights using electronic messages with angry and vulgar language.

8 Clues: Sharing someone's secrets or embarrassing informationRepeatedly sending nasty, mean, and insulting messagesIntentionally and cruelly excluding someone from an online groupTalking someone into revealing secrets or embarrassing informationOnline fights using electronic messages with angry and vulgar language....

cyber crimes 2023-05-04

cyber crimes crossword puzzle
Across
  1. personal data should be kept _______ by company's and organization
  2. can have information data _______
  3. when some one try stealing data of you by calling or messaging you pretending to be someone else
  4. data should be used _________
Down
  1. can request to ____ erased
  2. sneaking on to someone's computer and intending to committed a crime has 5 years of prison and a ________ fine
  3. you can request your ________ information
  4. they are 7 __________

8 Clues: they are 7 __________can request to ____ eraseddata should be used _________can have information data _______you can request your ________ informationpersonal data should be kept _______ by company's and organizationwhen some one try stealing data of you by calling or messaging you pretending to be someone else...

Cyber Crime 2025-02-06

Cyber Crime crossword puzzle
Across
  1. Kejahatan yang dilakukan dengan cara mengintip atau mengambil informasi pribadi seseorang secara diam-diam.
  2. Tindakan yang dilakukan untuk menipu orang agar memberikan informasi pribadi melalui email atau situs palsu
  3. Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat.
  4. Aksi mengganggu atau menyerang sistem komputer atau jaringan dengan tujuan merusak atau mencuri data.
Down
  1. Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online.
  2. Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer.
  3. Tindakan mengirim pesan atau email berulang kali dengan maksud mengganggu atau mengintimidasi korban.
  4. Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi.

8 Clues: Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi.Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat.Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online.Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer....

cyber ethics 2025-06-07

cyber ethics crossword puzzle
Across
  1. Strong code used to protect your digital identity
  2. : When your personal info is stolen and misused
  3. Avoid this while using someone else’s digital content
  4. Posting rude or harmful comments online is called
Down
  1. Software that defends systems from cyber threats
  2. Using someone's personal information without permission
  3. Sending fake emails to trick users into revealing private info
  4. False online identity to mislead others

8 Clues: False online identity to mislead othersStrong code used to protect your digital identity: When your personal info is stolen and misusedAvoid this while using someone else’s digital contentSoftware that defends systems from cyber threatsPosting rude or harmful comments online is called...

Cyber-crossing 2024-10-29

Cyber-crossing crossword puzzle
Across
  1. The act of disguising as a trusted entity to obtain information.
  2. Media that has been adjusted to spread falsified information.
  3. Steps taken to protect a device from threats.
  4. 2 Step verification is an example of:
Down
  1. A secret word or phrase used to gain access.
  2. Impersonation of another person to commit crimes.
  3. A type of malware with the ability to spread throughout a system.
  4. Someone who gains unauthorised access to systems.

8 Clues: 2 Step verification is an example of:A secret word or phrase used to gain access.Steps taken to protect a device from threats.Impersonation of another person to commit crimes.Someone who gains unauthorised access to systems.Media that has been adjusted to spread falsified information.The act of disguising as a trusted entity to obtain information....

Cyber Crossword 2025-09-30

Cyber Crossword crossword puzzle
Across
  1. Keeps network traffic private over the internet.
  2. Secret string used to access accounts.
  3. A site pretending to be real to steal credentials.
  4. Software that self replicates and spreads maliciously.
  5. A device or software that blocks unauthorized network traffic.
Down
  1. Process that converts data into unreadable form to protect it.
  2. A fraudulent message designed to trick recipients into sharing info.
  3. Software used by attackers to lock files or steal data for ransom.

8 Clues: Secret string used to access accounts.Keeps network traffic private over the internet.A site pretending to be real to steal credentials.Software that self replicates and spreads maliciously.Process that converts data into unreadable form to protect it.A device or software that blocks unauthorized network traffic....

Meta 2023-09-12

Meta crossword puzzle
Across
  1. Events & Amenities
  2. Pride@
  3. IT Support
  4. Transportation
  5. Ship Happens
  6. EHS
  7. Disability@
  8. APIs@
  9. Facilities
Down
  1. Open Arts
  2. Black@
  3. Security
  4. AV Technical Production
  5. SEA + BEL Site Team
  6. Women@
  7. Latin@
  8. Culinary / Pastry
  9. Native@
  10. Fitness Center

19 Clues: EHSAPIs@Black@Women@Pride@Latin@Native@SecurityOpen ArtsIT SupportFacilitiesDisability@Ship HappensTransportationFitness CenterCulinary / PastryEvents & AmenitiesSEA + BEL Site TeamAV Technical Production

Phising 2024-10-14

Phising crossword puzzle
Across
  1. forwarding/Automatically sending emails from one account to another, often exploited by attackers.
  2. authentication/A security process requiring two types of identification.
  3. targeted phishing attack aimed at specific individuals.
  4. activity alert/Notifications for potential security breaches or unusual behaviour.
  5. operations/Activities aimed at influencing or manipulating information for strategic purposes.
  6. addresses/Email accounts outside an organisation’s official domain, which may pose risks.
Down
  1. communication/Messages received without prior request, often phishing-related.
  2. monitoring/Tracking changes to system or server settings for security purposes.
  3. a trusted entity to deceive users.
  4. theft/The act of stealing usernames and passwords.
  5. awareness training/Educational programs to help users recognise phishing attacks.
  6. deceptive offer or message designed to attract and manipulate a target.

12 Clues: a trusted entity to deceive users.theft/The act of stealing usernames and passwords.targeted phishing attack aimed at specific individuals.deceptive offer or message designed to attract and manipulate a target.authentication/A security process requiring two types of identification....

Tom Brouwers Engels 2021-01-13

Tom Brouwers Engels crossword puzzle
Across
  1. what you get when it's halloween
  2. when something terrible has happend you need to ...
  3. things in our body to keep us living
  4. when his father died he dropped a ...
  5. the row of bones in your back
  6. all planets are in a ...
  7. when you can't stop doing something you have an ...
  8. things made out of wood
  9. when it's heavily snowing
Down
  1. a sentence what someone said is a ...
  2. the midway pauze in a game
  3. when there is lightning an thunder
  4. the place where you need to wait
  5. opposite of finish
  6. when you see somebody you ... them
  7. to be save for covid you need to have a ... with the covid vaccine
  8. life from anotherplanet
  9. our ... is called the milky way
  10. online
  11. the opposite of pessimist

20 Clues: onlineopposite of finishlife from anotherplanetthings made out of woodall planets are in a ...the opposite of pessimistwhen it's heavily snowingthe midway pauze in a gamethe row of bones in your backour ... is called the milky waywhat you get when it's halloweenthe place where you need to waitwhen there is lightning an thunder...

Crossword Puzzle 2022-11-27

Crossword Puzzle crossword puzzle
Across
  1. The edgier battle star
  2. famous Early 90s Kindergarten teacher
  3. “I see you enjoy Super Mario…”
  4. Your greatest cyber crime
  5. 1988’s olympic winter
  6. “Resident” Albert
  7. Metal Gear character who likes to wrestle senators
  8. An adorable name for Hershey Bars
  9. Your kind of sister
  10. A double entendre TV show
  11. A wholesome healthy breakfast
  12. An 80s themed “Vice” with plenty of white suits
  13. Lost in ’88
Down
  1. Your on a first name basis with this Galactica Admiral
  2. dating sim meets supernatural teen adventure
  3. Being ___ in Detroit is hard
  4. No___ GTA RP
  5. A fun holiday treat
  6. Themed Oreos are highly…
  7. The proper microwave wattage
  8. A rare candy bar
  9. A renowned piece of art
  10. MultiVersus competitor (this clue is sponsored by Chilis)

23 Clues: Lost in ’88No___ GTA RPA rare candy bar“Resident” AlbertA fun holiday treatYour kind of sister1988’s olympic winterThe edgier battle starA renowned piece of artThemed Oreos are highly…Your greatest cyber crimeA double entendre TV showBeing ___ in Detroit is hardThe proper microwave wattageA wholesome healthy breakfast“I see you enjoy Super Mario…”...