cyber security Crossword Puzzles
RU ITEC411 - Privacy 2023-10-16
Across
- Matching The act of combining and comparing information from different databases, often using a common identifier like a social security number to match records.
- Specification The principle that data should be collected for specific, explicit, and legitimate purposes.
- Files a website stores on a visitor's computer to track user behavior.
- Information Any information relating to an individual person.
- Use The use of personal information for a purpose other than the one for which it was originally provided.
- Information Gathering The collection of personal information about a user without the user's knowledge.
- Minimization The practice of collecting only the data that is necessary for the stated purpose.
- Guidelines The guidelines of the Organization for Economic Co-operation and Development that serve as the basis for many privacy laws worldwide.
- The National Institute of Standards and Technology, which provides security and privacy standards and guidelines.
- Risks Potential threats to the confidentiality and security of personal information.
Down
- Information Practices A set of principles that guide the responsible handling of personal information.
- Data Protection Directive A comprehensive European Union directive governing data protection and privacy.
- Profiling The analysis of data to determine characteristics of people who are most likely to engage in a particular behavior.
- Measures Safeguards and controls put in place to protect personal information from unauthorized access or disclosure.
- The requirement to inform individuals about data collection practices, purposes, and policies.
- The voluntary agreement given by individuals for the collection and use of their personal information.
- Mining The process of searching and analyzing vast amounts of data to discover patterns and generate new information or knowledge.
- The Personal Information Protection and Electronic Documents Act, a Canadian privacy law.
- The principle of being responsible for ensuring the protection of personal information.
- Consent Users being aware of what information is collected and how it is used before giving permission.
20 Clues: Information Any information relating to an individual person. • Files a website stores on a visitor's computer to track user behavior. • Risks Potential threats to the confidentiality and security of personal information. • The principle of being responsible for ensuring the protection of personal information. • ...
Teka teki silang keamanan 2025-11-28
Across
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
Amazon Las 7 Security Part 2 2023-03-15
Across
- cleaners of the warehouse
- watches over the security team
- engineers of the warehouse
- the app we use to communicate with AA's
- who we report to for allied
- the master opener
Down
- who we report to for amazon
- maintenance of the building
- roving the buildings exterior
- the door security uses frequently
- tracking reports
11 Clues: tracking reports • the master opener • cleaners of the warehouse • engineers of the warehouse • who we report to for amazon • maintenance of the building • who we report to for allied • roving the buildings exterior • watches over the security team • the door security uses frequently • the app we use to communicate with AA's
Find The Parts of The School 2024-03-01
Across
- Monitoring and Handling School Security
- Where students eat lunch
- For personal counseling
- For Supplies, equipment and materials
- A level of a building
- For Physical Education Classes
Down
- Where students go for helth-related issues
- For conducting experiments
- Including the principal's,vice principal's
- For school assemblies, performances, events
- For art classes and projets
11 Clues: A level of a building • For personal counseling • Where students eat lunch • For conducting experiments • For art classes and projets • For Physical Education Classes • For Supplies, equipment and materials • Monitoring and Handling School Security • Where students go for helth-related issues • Including the principal's,vice principal's • ...
Kreuzwordrätsel 2016-05-17
Across
- Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
- Je länger das Passwort, desto ...
- Schutz von Infos
- Schutz von personenbezogenen Daten
Down
- Werbegeschenke, die mit Schadsoftware versehen sind
- Beispiel eines Passwortmanagers
- Schutz von vertraulichen Daten in E-Mails
- Methode zu Passwortfindung
- Notebook vor fremden Blicken schützen
- Über E-Mails an sensible Daten gelangen
- Größtes Risiko bei Social Engineering
- Abk. Data Security Partner
12 Clues: Schutz von Infos • Methode zu Passwortfindung • Abk. Data Security Partner • Beispiel eines Passwortmanagers • Je länger das Passwort, desto ... • Schutz von personenbezogenen Daten • Notebook vor fremden Blicken schützen • Größtes Risiko bei Social Engineering • Über E-Mails an sensible Daten gelangen • Schutz von vertraulichen Daten in E-Mails • ...
Kreuzworträtsel 2016-05-17
Across
- Über E-Mails sensible Daten gelangen
- Schutz von Vertrautlichkeit, Integrität und Verfügbarkeit
- Notebook vor fremden Blicken schützen
- Je länger das Passwort, desto ...
- Beispiel eines Passwortmanagers
- Schutz von personenbezogenen Daten
Down
- Schutz von Infos
- Größtes Risiko bei Social Engineering
- Werbegeschenke, die mit Schadsoftware versehen werden können
- Methode zur Passwortfindung
- Schutz von vertraulichen Daten in E-Mails
- Abk. Data Security Partner
12 Clues: Schutz von Infos • Abk. Data Security Partner • Methode zur Passwortfindung • Beispiel eines Passwortmanagers • Je länger das Passwort, desto ... • Schutz von personenbezogenen Daten • Über E-Mails sensible Daten gelangen • Größtes Risiko bei Social Engineering • Notebook vor fremden Blicken schützen • Schutz von vertraulichen Daten in E-Mails • ...
Kreuzworträtsel 2016-05-10
Across
- Schutz von Infos
- Über E-Mails an sensible Daten gelangen
- Schutz von vertraulichen Daten in E-Mails
- Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
- Je länger das Passwort, desto ....
Down
- Werbegeschenke, die mit Schadsoftware versehen sind
- Größtes Risiko bei Social Engineering
- Methode zur Passwortfindung
- Schutz von personenbezogenen Daten
- Notebook vor fremden Blicken schützen
- Abk. Data Security Partner
- Beispiel eines Passwortmanagers
12 Clues: Schutz von Infos • Abk. Data Security Partner • Methode zur Passwortfindung • Beispiel eines Passwortmanagers • Schutz von personenbezogenen Daten • Je länger das Passwort, desto .... • Größtes Risiko bei Social Engineering • Notebook vor fremden Blicken schützen • Über E-Mails an sensible Daten gelangen • Schutz von vertraulichen Daten in E-Mails • ...
MOTIVATION 2023-04-22
French Airport 2013-06-12
22 Clues: gate • lobby • track • flight • window • ticket • counter • airline • airport • terminal • to leave • passport • airplane • suitcase • corridor • to arrive • passenger • hand baggage • flight number • international • boarding pass • control security
fish 2023-07-19
Spanish crossword 2020-04-10
Across
- seat belt
- sleeping car
- visa
- in the train station
- connection
- passport
- to land
- coach
- aisle
- ticket
- stop
- to board
- security agent
- flight
- gate
- platform
- ticket window
- luggage screening
- second class
- to get or obtain
- to hope
- ticket
- car wagon
- baggage claim
- boarding pass
Down
- to go through security
- seat
- on time
- first class
- suitcase
- customs
- international airport
- window
- delayed
- mano carry-on baggage
- event ticket
- trip travel
- counter
- bunk
- to miss
- to see
- turn
- arrival
- flight attendent
- espera waiting room
- take off
- control
- passenger
- to check luggage
- to give
- layover
51 Clues: seat • visa • bunk • stop • turn • gate • coach • aisle • window • ticket • to see • flight • ticket • on time • customs • to land • delayed • counter • to miss • arrival • control • to give • to hope • layover • suitcase • passport • to board • platform • take off • seat belt • passenger • car wagon • connection • first class • trip travel • sleeping car • event ticket • second class • ticket window • baggage claim • boarding pass • security agent • flight attendent • ...
Security Terminology for Christian 2024-03-06
Across
- Network Interface Card
- the Bourne Again SHell
- Data Protection Officer
- Instant Messaging
- Domain Name System
- allows people to select the mobile devices they would like to use, typically from a limited number of options
- Chief Security Officer
- Layer 2 Tunneling Protocol
- Indicators of Compromise
- POST Office Protocol
- Personal Health Information
Down
- Network Attached Storage
- a type of challenge–response test used in computing to determine whether the user is human in order to deter bot attacks and spam
- being allowed to use one's personally owned device, rather than being required to use an officially provided device.
- Database Administrator
- Information Systems Security Officer
- Chief Information Officer
- Dynamic Link Library
- Personal Identification Number
- Chief Technology Officer
- Peer-to-Peer
21 Clues: Peer-to-Peer • Instant Messaging • Domain Name System • Dynamic Link Library • POST Office Protocol • Network Interface Card • the Bourne Again SHell • Database Administrator • Chief Security Officer • Data Protection Officer • Network Attached Storage • Indicators of Compromise • Chief Technology Officer • Chief Information Officer • Layer 2 Tunneling Protocol • Personal Health Information • ...
Social Security 2017-03-01
Across
- federal program that taxes workers to provide income support to the elderly.
- federal system of health insurance for those requiring financial assistance.
- aversion/ the extent to which individuals are willing to bear risk.
- percentage of workers retiring at a certain age.
- payment that lasts until the recipient's death.
Down
- of deceased worker or former worker is also entitled to benefits.
- workers continue working past the age of 65 and are available upon retirement. benefit increases end at age 70.
- rating/ charging a price for insurance that is a function of realized outco
- federal program of health insurance for persons 65 years of age or older.
9 Clues: payment that lasts until the recipient's death. • percentage of workers retiring at a certain age. • of deceased worker or former worker is also entitled to benefits. • aversion/ the extent to which individuals are willing to bear risk. • federal program of health insurance for persons 65 years of age or older. • ...
network security 2022-10-31
Across
- a way of gaining sensitive information with influence
- convincing people you are a person known or from a well-known buisness who steal your information
- hacks installed without permition
- virus' that self replicate
- find and stops malware
- used to keep information secure
Down
- malware that attaches to certain file
- they examine data to block threats
- malware disguised as legitimate software
9 Clues: find and stops malware • virus' that self replicate • used to keep information secure • hacks installed without permition • they examine data to block threats • malware that attaches to certain file • malware disguised as legitimate software • a way of gaining sensitive information with influence • ...
Internet security 2023-11-27
Across
- What is the term for software created to damage or alter computer data or operations?
- What term refers to computer criminals who use technology to commit various crimes?
- What is a program that runs automatically and can be used to perform various tasks called?
- What is the term for software that protects a computer against malware programs?
- What is the term for the action of gaining unauthorized access to an account or personal information through deception or manipulation?
- What is the term for the illegal copying and distribution of copyrighted software, information, music, and video files?
Down
- What type of program attaches itself to executable files or documents and spreads by infecting other files or programs on a computer?
- What is the term for cyber attacks that attempt to gain unauthorized access to a computer system?
- What is the process of making a copy of data from a computer onto an external storage device, such as an external hard drive?
- What type of internet crime involves sending fake emails or creating false websites to obtain personal or banking information?
10 Clues: What is the term for software that protects a computer against malware programs? • What term refers to computer criminals who use technology to commit various crimes? • What is the term for software created to damage or alter computer data or operations? • What is a program that runs automatically and can be used to perform various tasks called? • ...
Computer Security 2023-09-21
Across
- to set up for use
- websites and other online forms of communication used to share information
- a kind of malware that can copy itself from one device to another
- safe
Down
- to keep safe
- an email, text message, or link that tricks people into giving criminals personal information
- computer software that criminals use to get people's personal information or passwords
- programs used by a computer
- a kind of malware that infects computers; a virus usually arrives as an email attachment
9 Clues: safe • to keep safe • to set up for use • programs used by a computer • a kind of malware that can copy itself from one device to another • websites and other online forms of communication used to share information • computer software that criminals use to get people's personal information or passwords • ...
Information Security 2020-07-08
Across
- when attackers use various methods/tricks to get
- actually purging the data; permanently losing the
- software used to prevent, detect, and remove malware
- testing to see if system vulnerabilities can be exploited in order to actually gain access to systems, the network, data and so forth; acts in a way that an attacker might act
- when someone gains entrance/access by
Down
- on the tailcoats of an authorized person
- information from unsuspecting persons
- used to perform authentication; a username,a certificate,or a token
- Identifying risks to understand the risks that we are exposed to
9 Clues: information from unsuspecting persons • when someone gains entrance/access by • on the tailcoats of an authorized person • when attackers use various methods/tricks to get • actually purging the data; permanently losing the • software used to prevent, detect, and remove malware • Identifying risks to understand the risks that we are exposed to • ...
Security Issues 2019-01-29
Across
- Everything is backed up at once.
- In this type of backup, only two image files are required to restore the system!
- Faster backup time as only amended files need to be copied.
- A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
- Useful when backing up large amounts of data.
- Procedures or measures taken to ensure the safety of an organisation.
- This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
- This is information that is still important but it is not needed for immediate use.
- A very important element to a company/organisation!
9 Clues: Everything is backed up at once. • Useful when backing up large amounts of data. • A very important element to a company/organisation! • Faster backup time as only amended files need to be copied. • Procedures or measures taken to ensure the safety of an organisation. • In this type of backup, only two image files are required to restore the system! • ...
Network Security 2024-05-12
Across
- Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- The process of protecting information or data by scrambling it so only those with the key can unscramble it
- A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
- A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
- A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
- An attack where a series of a computers repeatedly send requests to a server to overload a system
- The process of a user confirming that they are who they say they are on a computer system
- Trying to trick someone into giving out information over email
- A computer program that makes lots of copies of itself,
9 Clues: A computer program that makes lots of copies of itself, • Trying to trick someone into giving out information over email • The process of a user confirming that they are who they say they are on a computer system • An attack where a series of a computers repeatedly send requests to a server to overload a system • ...
Security Terms 2023-03-27
Across
- Seeking (BLANK) health treatment is a positive course of action and a key measure for suicide prevention.c
- CV record checks include (BLANK)
- (BLANK) is an important part of the DON PV Program.
- Head of the Navy Intelligence Community Elements (HICE
- After an individual has been “cleared,” they are continuously vetted using automated checks of (BLANK).
Down
- An insider threat may be (BLANK) if the insider is unaware that their actions or behaviors are exposing the United States to an elevated risk of harm or loss, perhaps through lack of training or negligence.
- CV record checks include (BLANK)
- personal are required to report security violations and changes to their personal status (e.g. marriage/divorce, arrests, delinquent debt, or foreign travel/contacts)
- CV record checks include (BLANK)
- CV record checks include (BLANK),
- CV record checks include (BLANK)
- Replacing DISS
12 Clues: Replacing DISS • CV record checks include (BLANK) • CV record checks include (BLANK) • CV record checks include (BLANK) • CV record checks include (BLANK) • CV record checks include (BLANK), • (BLANK) is an important part of the DON PV Program. • Head of the Navy Intelligence Community Elements (HICE • ...
Food Security 2024-12-17
Across
- Red fruit often mistaken for a vegetable
- Yellow fruit that monkeys love to eat
- Leafy green that made Popeye strong
- Round citrus fruit named after its color
- Small green vegetables that come in a pod
Down
- Green vegetable that looks like tiny trees
- Red berry with seeds on the outside
- Orange vegetable that helps you see in the dark
- Red fruit that keeps the doctor away
9 Clues: Red berry with seeds on the outside • Leafy green that made Popeye strong • Red fruit that keeps the doctor away • Yellow fruit that monkeys love to eat • Red fruit often mistaken for a vegetable • Round citrus fruit named after its color • Small green vegetables that come in a pod • Green vegetable that looks like tiny trees • ...
Klett 11.1 2025-11-11
Across
- abfahren, abfliegen
- Ankunft
- ausfüllen
- gültig
- Durchsuchung, Untersuchung
- Sicherheit, Sicherheitsvorkehrungen
- durchführen
Down
- Abreise, Abflug
- anmelden, verzollen
- Information, Auskunft
- ankommen
- Dokument, Papier
- zurückkommen, zurückkehren
- Reisepass
- Visum
- erreichen
- zurückkommen, zurückkehren
- Zoll
- Ausweispapier(e)
- Zoll
20 Clues: Zoll • Zoll • Visum • gültig • Ankunft • ankommen • ausfüllen • Reisepass • erreichen • durchführen • Abreise, Abflug • Dokument, Papier • Ausweispapier(e) • anmelden, verzollen • abfahren, abfliegen • Information, Auskunft • zurückkommen, zurückkehren • zurückkommen, zurückkehren • Durchsuchung, Untersuchung • Sicherheit, Sicherheitsvorkehrungen
Happy Memories 2023-02-16
25 Clues: tw0 • six • one • ten • five • four • nine • three • seven • eight • twenty • eleven • twelve • fifteen • sixteen • nineteen • eighteen • thirteen • fourteen • twentyone • seventeen • twentytwo • twentyfour • twentyfive • twentythree
Unidad 2 Ciudadanía Digital y Conecta con Chile 2024-10-15
20 Clues: long • role • wide • fifty • miles • narrow • causes • coasts • almost • security • to promote • citizenship • reliability • two hundred • just (fair) • it possesses • five hundred • goals, objectives • fingerprint, footprint • to improve, to better (verb)
Words Unit 5 2017-05-06
14 Clues: Lohn • jagen • Decke • Angst • passend • Werkzeug • Stockwerk • romantisch • Verbindung • Verwandter • Sicherheit • Kühlschrank • Wolkenkratzer • Herausforderung
Information Security Awareness 2020-09-24
Across
- What is not allowed in a DNA password
- Best way to keep track of multiple unique passwords
- The data classification for Employee Handbook, internal phone directory
- This is better and harder to crack than a password
- How do you think most evil hackers begin to break into a company’s network?
- The best response to password Recovery Questions is
- Minimum number of characters for a network password
- What is the default data classification
- Who is responsible for data security
Down
- The type of email to get you to click on a fraudulent link
- Disclosing personal member information may be
- Someone that follows closely behind you without using their badge
- If I click on a link I believe was malicious I should
- This is better and harder to crack than a password
- How might someone evil try to get information from you
15 Clues: Who is responsible for data security • What is not allowed in a DNA password • What is the default data classification • Disclosing personal member information may be • This is better and harder to crack than a password • This is better and harder to crack than a password • Best way to keep track of multiple unique passwords • ...
March Security Crossword 2021-04-01
Across
- Last name of WikiLeaks founder
- Founded in 1955, a global community of security practitioners
- The 4th step in the EDIP Technique Training cycle
- city straddling the River Avon in the southwest of England where Large riots have recently taken place
- The monitoring of behavior, activities, or information
- (5,3) an ethical computer hacker
- Japanese organised crime syndicate
Down
- Current UK national threat level
- Biggest threat to Cultural Venues & Prometheus' gift
- Created the color code & a brand of Mini
- "Effect of uncertainty on objectives" - ISO 31000
- a 3 pronged spear
- (5,4) High profile museum burglary in Dresden, Germany
- Famous Federal Penitentiary in San Francisco Bay
14 Clues: a 3 pronged spear • Last name of WikiLeaks founder • Current UK national threat level • (5,3) an ethical computer hacker • Japanese organised crime syndicate • Created the color code & a brand of Mini • Famous Federal Penitentiary in San Francisco Bay • The 4th step in the EDIP Technique Training cycle • "Effect of uncertainty on objectives" - ISO 31000 • ...
Security Officer Numbers 2023-01-11
POLITICS 2016-03-01
Across
- : an attractive rather than coercive type of power
- : ASEAN observer (Acronym)
- : "city-state"
- : military or economic type of power
- : a subdiscipline of polisci that compares governments and political systems
- : Civil Society Organization
- : defense of the state and its citizens
- : International Relations
- : Politics as "master science"
Down
- : evolved as science and art
- : a qualitative approach that tries to find out what is best for the people
- : quantitative and descriptive approach approach
- : persons and institutions that make and enforce laws
- : the currency of politics
- : using laws to fairly judge and punish crimes and criminals
- : the act of influencing the government to do what you want
- : in charge of internal security
- : power of politicians and individuals to act out law
- : limitation and regulation
- : another term for "security"
20 Clues: : "city-state" • : International Relations • : ASEAN observer (Acronym) • : the currency of politics • : limitation and regulation • : evolved as science and art • : Civil Society Organization • : another term for "security" • : Politics as "master science" • : in charge of internal security • : military or economic type of power • : defense of the state and its citizens • ...
Military Acronyms 2019-04-04
Across
- Violation
- General Fund Enterprise Business System
- Marine Corps
- Cancelled
- Defense Enterprise Accounting and Management System
- Password
- Defense Cash Accountability System
- DFAS Automated Reporting & Tracking System
- Defense Travel System
- Accounts Receivable
- Standard Contract Reconciliation Tool
- Federal Employee Retirement System
- Army Material Command
- Accounts Payable
- Chief Financial Officer
- Voucher
- BRAC Transition Applications
Down
- Journal Voucher
- Commercial Invoice
- Air Force Space Command
- Line of Accounting
- Subject Matter Experts
- Naval Sea Systems Command
- Month to Date
- Electronic Signature
- Operational Security
- Department of Defense
- Defense Finance Accounting Services
- Disbursing Office
- General Schedule
- Year End
- Standard Operating Procedures
- Terminal Area Security Officer
- Rank
- Civilian
- Fiscal Year
- Unmatched Transaction
37 Clues: Rank • Voucher • Password • Year End • Civilian • Violation • Cancelled • Fiscal Year • Marine Corps • Month to Date • Journal Voucher • General Schedule • Accounts Payable • Disbursing Office • Commercial Invoice • Line of Accounting • Accounts Receivable • Electronic Signature • Operational Security • Department of Defense • Defense Travel System • Army Material Command • Unmatched Transaction • ...
social media's lexical field 2023-03-24
Across
- opinion people give on your activity
- personal place on website where you can post things
- when your senses are exposed to a lot of informations
- harassment online
- things that requires people's participation
- how much you think you are worth
- something you can't stop thinking about
Down
- something you're physically dependent on
- something that is bad for your health
- you're doing it when you post something
- when you're standing for something
- something that is disorted
- picture, video or test that you publish on your account
13 Clues: harassment online • something that is disorted • how much you think you are worth • when you're standing for something • opinion people give on your activity • something that is bad for your health • you're doing it when you post something • something you can't stop thinking about • something you're physically dependent on • things that requires people's participation • ...
Teka teki silang keamanan 2025-11-28
Across
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
Teka teki silang keamanan 2025-11-28
Across
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
Computer Article Crossword 2015-06-10
Across
- Very important and possibly dangerous
- The month which the hack happened
- Far away from anything else
- The Chairman of the Senate Armed Services Committee
- Keeping people safe on the Internet
- Breaking into a secure area
- To put together information
- To break into a secure area on the internet
Down
- Stealing someone's personal details
- All over the world
- The abbreviation for The Office of Personnel Management
- One billion people have access to Facebook on.......
- The Name of Mark Zuckerberg's company
- The name of the new App Zuckerberg is releasing
- The ........ Intelligence Committee which released information about the cyber attack
- The Country blamed for the hacking of American databases
- The President of America
17 Clues: All over the world • The President of America • Far away from anything else • Breaking into a secure area • To put together information • The month which the hack happened • Stealing someone's personal details • Keeping people safe on the Internet • Very important and possibly dangerous • The Name of Mark Zuckerberg's company • To break into a secure area on the internet • ...
ITG Quiz Lavinya&Lea 2022-06-29
Across
- mit was kann man Internetseiten erstellen?
- Mit was kann man Datien verringern?
- Nenne mir eins der Office Apps?
- Mit welcher Taste kann man die Groß-und Kleinschreibung anpassen?
- Was produzieren Windräder?
- Mit was tippt man Wörter?
- Durch was bekommt man Internet?
- Mit was bekommt man zugriff auf Onlineseiten
- mit welcher Taste trennt man Wörter?
Down
- Mit was kann man Prozesse abbrechen?
- Wie nennt man Mobbing im Internet?
- Was ist die Hauptplatine eines Computers?
- Was ist ein Anzeigegerät?
- Mit was kann man Handys laden wenn keine Steckdose in der nähe ist?
- Was bedeutet STRG?
- Welches Fach lehrt uns über Technologischen Grundlagen auf?
- Womit kann man Links auswählen/Kopieren?
17 Clues: Was bedeutet STRG? • Was ist ein Anzeigegerät? • Mit was tippt man Wörter? • Was produzieren Windräder? • Nenne mir eins der Office Apps? • Durch was bekommt man Internet? • Wie nennt man Mobbing im Internet? • Mit was kann man Datien verringern? • Mit was kann man Prozesse abbrechen? • mit welcher Taste trennt man Wörter? • Womit kann man Links auswählen/Kopieren? • ...
网络安全:过关斩将 2024-06-27
Across
- Software that secretly monitors and collect user's' activities.
- Social media platform for sharing short videos
- A way to avoid internet addiction.
- Cyber scam using various methods to steal information.
- A program to protect your computer from viruses.
- False information spread online.
- Software used to navigate the internet.
- A potential privacy risk on the internet.
- Online harassment
Down
- Dishonest scheme to cheat.
- Dependence on a substance/activity.
- Registering one's presence at a location
- A password that is valid for only one login transaction
- State of being separated from others。
- Remote face-to-face communication.
- Important method to protect yourself online.
- An important way of protecting personal privacy.
17 Clues: Online harassment • Dishonest scheme to cheat. • False information spread online. • A way to avoid internet addiction. • Remote face-to-face communication. • Dependence on a substance/activity. • State of being separated from others。 • Software used to navigate the internet. • Registering one's presence at a location • A potential privacy risk on the internet. • ...
Data handling, Accountability, and Security 2023-11-22
Across
- Adherence to regulations and standards.
- Plan for data breaches.
- Attempt to trick individuals for data.
- Regulating data accessibility.
Down
- Programs to educate staff on data security.
- Responsibility for data handling.
- Protection of sensitive information.
- Evaluation of data security measures.
- Moral principles guiding data handling.
- Clear communication about data practices.
- Guidelines for data handling.
11 Clues: Plan for data breaches. • Guidelines for data handling. • Regulating data accessibility. • Responsibility for data handling. • Protection of sensitive information. • Evaluation of data security measures. • Attempt to trick individuals for data. • Moral principles guiding data handling. • Adherence to regulations and standards. • Clear communication about data practices. • ...
SCOTIA INFOALERTS!!! 2013-07-21
Across
- how many alert categories
- text back word used to end notification
- name one alert category
- accounts eligible
- where to register for alerts
- cancellation fee
Down
- way alerts can be received
- way alerts can be received
- does not apply to security alerts
- over___different alert types
- cost of enrollment
- where to register for alerts
12 Clues: cancellation fee • accounts eligible • cost of enrollment • name one alert category • how many alert categories • way alerts can be received • way alerts can be received • over___different alert types • where to register for alerts • where to register for alerts • does not apply to security alerts • text back word used to end notification
Crossword 2025-11-02
10 Clues: S______ settings • P______ & Security • Make a Strong P_______ • Multi-factor A_____________ • Fake message scams: P_______ • A dishonest schemer: S______ • U_____ your devices and apps • A copy of computer data: B_____ • Software that accesses devices: M______ • Software that asks for payment: R_________
Finance 1-9 2013-08-22
18 Clues: obrot • wycena • waluta • aktywa • spolka • dluznik • oddzial • wynajem • ujawniac • prowizja • przychod • obligacja • amortyzacja • zobowiazanie • kredyt hipoteczny • ubezpieczenie spoleczne "social ......" • glowna ksiega rachunkowa "nominal ....." • jednoosobowa dzialalnosc gospodarcza "sole ...."
New Insights 4 Glossary: Society and health care 2022-09-05
18 Clues: tuki • köyhyys • emigrant • kuntoutus • enemmistä • sick leave • specialist • vähemmistö • kansalainen • kansalaisuus • syrjäytyminen • private sector • housing benefit • social security • maternity leave • paternity leave • health insurance • student allowance/benefit
codi bullying crossword 2023-03-21
Across
- getting physically picked on everyday
- someone who stands around and watches someone getting bullied
- a sore from being punched or kicked
- some teases you verbally everyday
Down
- a type of psychological bullying
- someone who sees another person getting bullied
- getting picked on online everyday
- a type of physical bullying
- someone teases you and picks on you everyday
9 Clues: a type of physical bullying • a type of psychological bullying • getting picked on online everyday • some teases you verbally everyday • a sore from being punched or kicked • getting physically picked on everyday • someone teases you and picks on you everyday • someone who sees another person getting bullied • someone who stands around and watches someone getting bullied
Cyberbulling 2021-05-03
Across
- a type of bulling other than verbal, cyber or social
- a service that provides help
- to mute someone on social media
- a place to communicate online
- someone who steals another identity
Down
- a person who wants to fit in
- someone who causes harm online
- wanting to be in control
- a person you can go to for support
9 Clues: wanting to be in control • a person who wants to fit in • a service that provides help • a place to communicate online • someone who causes harm online • to mute someone on social media • a person you can go to for support • someone who steals another identity • a type of bulling other than verbal, cyber or social
BNS Bulletin 2024-08-27
Across
- Decriminalized act in BNS, previously under Section 497 IPC
- Indian term for citizen used in BNS
- Colonial-era law replaced in BNS
- Crime explicitly defined in BNS, not in IPC
- Capital punishment retained in BNS
Down
- Number of sections in BNS
- The new code replacing IPC
- City where IPC was primarily drafted
- Digital crimes comprehensively covered in BNS
9 Clues: Number of sections in BNS • The new code replacing IPC • Colonial-era law replaced in BNS • Capital punishment retained in BNS • Indian term for citizen used in BNS • City where IPC was primarily drafted • Crime explicitly defined in BNS, not in IPC • Digital crimes comprehensively covered in BNS • Decriminalized act in BNS, previously under Section 497 IPC
INFORMATIKA X TKJ 2024-05-07
Across
- Kode G pada RGB
- digunakan untuk menghasilkan salinan data dari komputer adalah
- Salah satu jenis serangan cyber yang mengunci data?
- Angka yang terdiri dari 0 dan 1
- Perangkat keras yang berfungsi sebagai otak komputer?
- Software Berbahaya
- Keamanan Jaringan
- Perangkat keras yang bertanggung jawab untuk mengirimkan data antara komputer dan jaringan
Down
- Mengarahkan/mengatur Paket Data
- Sistem operasi yang dikembangkan oleh Microsoft
- Titik-titik kecil yang membentuk gambar digital
- Format file untuk gambar dengan latar belakang transparan
- Perangkat keras yang digunakan untuk memasukkan data ke dalam komputer
- Perubahan bertahap antara dua warna atau lebih
- jenis huruf yang memiliki dekorasi tambahan di ujung-ujungnya
- Hypertext Markup Language
- Perangkat lunak untuk mengelola basis data
- penyimpanan data yang bersifat permanen?
- Kode C pada CMYK
- Uniform Resource Locator
20 Clues: Kode G pada RGB • Kode C pada CMYK • Keamanan Jaringan • Software Berbahaya • Uniform Resource Locator • Hypertext Markup Language • Mengarahkan/mengatur Paket Data • Angka yang terdiri dari 0 dan 1 • penyimpanan data yang bersifat permanen? • Perangkat lunak untuk mengelola basis data • Perubahan bertahap antara dua warna atau lebih • ...
OL 4, Unit 4, Station 2 2025-05-07
Across
- geben, existieren
- seit
- Konto
- begrüßen
- trendsetzend
- Foto
- befreunden
- online stellen
- verdienen
- Smartphone
- beeinflussen
- Seite (im Internet)
- Post
- Kommentar
- modisch, trendy
- einige, mehrere
- Innovation, Neuheit
- seit, seitdem
- veraltet
- äußerst, sehr
- eigentlich, grundsätzlich
- täglich
- Status
- Link
- Follower
- Clip; Ausschnitt
Down
- altmodisch
- kommunizieren
- Veganismus
- soziale Medien
- Jumping Fitness
- Lieblings-
- updaten
- Anfrage
- abonnieren
- Trend, Entwicklung
- Selfie
- mobil, tragbar
- Tonne
- zerissen
- nicht mögen
- streamen
- Karte, Plan
- entfreunden
- Blogger
- Einfluss, Auswirkung
- Computerspiele-
- Cyber-Mobbing
- sofort, gleich
- die Hälfte
50 Clues: seit • Foto • Post • Link • Konto • Tonne • Selfie • Status • updaten • Anfrage • Blogger • täglich • begrüßen • zerissen • streamen • veraltet • Follower • verdienen • Kommentar • altmodisch • Veganismus • Lieblings- • abonnieren • befreunden • Smartphone • die Hälfte • nicht mögen • Karte, Plan • entfreunden • trendsetzend • beeinflussen • kommunizieren • seit, seitdem • Cyber-Mobbing • äußerst, sehr • soziale Medien • online stellen • mobil, tragbar • ...
Quiz #5 Insurance on Property 2024-11-14
Across
- These fluctuate for seasonal stock.
- This is has a potential severity that is too high.
- This type of water is excluded.
- Peak
- Property on its way to a different location.
- What insurers impose to encourage insurance to full value.
- Coverage for boiler and machinery.
- ______ locations
Down
- Vice
- Combined limits for multiple locations.
- These risks can be caused by viruses and worms.
- Is it RC or ACV?
- This is a type of property excluded along with autos, money, ...
- Acronym for building and contents together.
- This loss to inventory is not covered.
- This is found on the dec sheet by the property insured.
- This can be purchased to increase limits.
- Not covered.
- Perils
- Code Upgrades can be found in these municipal rules.
20 Clues: Vice • Peak • Perils • Not covered. • Is it RC or ACV? • ______ locations • This type of water is excluded. • Coverage for boiler and machinery. • These fluctuate for seasonal stock. • This loss to inventory is not covered. • Combined limits for multiple locations. • This can be purchased to increase limits. • Acronym for building and contents together. • ...
FPS Definitions 2023-05-09
Across
- VR A headset used to view virtual reality
- Using reality’s in away not intended
- A interactive video that views the entire visible area
- A system that can give you feedback on your health
- Attract and hold attention
- A term that capitulates other realities
Down
- Motion sickness cause my devices
- A visible form of an idea
- Digital elements used to overview real life
- A code used to program
10 Clues: A code used to program • A visible form of an idea • Attract and hold attention • Motion sickness cause my devices • Using reality’s in away not intended • A term that capitulates other realities • VR A headset used to view virtual reality • Digital elements used to overview real life • A system that can give you feedback on your health • ...
CyberDSA D1 2025-08-14
Across
- Malicious software designed to damage systems
- Malicious program disguised as legitimate software
- Incident where unauthorized access to data occurs
- Fraudulent emails or messages to steal credentials
- Hostile action aimed at exploiting vulnerabilities
Down
- Organization behind the ATT&CK framework for cyber threats.
- Malware that encrypts files and demands payment
- Intelligence gathered from publicly available sources
- Network of compromised devices controlled remotely
- Decoy system set up to lure attackers
10 Clues: Decoy system set up to lure attackers • Malicious software designed to damage systems • Malware that encrypts files and demands payment • Incident where unauthorized access to data occurs • Malicious program disguised as legitimate software • Network of compromised devices controlled remotely • Fraudulent emails or messages to steal credentials • ...
Health 2022-10-24
Across
- A bullying done on social media/internet
- A bullying done by actions physically
- The person who helps the victim
- A person who stands by all the bullies actions.
- being sad for a long period of time
Down
- A person who bullies others
- can recover quickly and not strong as depression
- A bullying done by words
- You joke in a way that makes people smile
- The person the bully bullies
10 Clues: A bullying done by words • A person who bullies others • The person the bully bullies • The person who helps the victim • being sad for a long period of time • A bullying done by actions physically • A bullying done on social media/internet • You joke in a way that makes people smile • A person who stands by all the bullies actions. • ...
Health crossword puzzle 2022-10-24
Across
- a person that stands up to the bully
- the type of bullying that uses violence
- the type of bullying that’s on the internet
- the need to kill yourself
Down
- a person that isn’t involved in the conflict
- the person that hurts the victim physically and mentally
- the type of bullying that uses words
- felling sad for multiple days
- the person that’s getting bullied
- hurting someone physically and mentally
10 Clues: the need to kill yourself • felling sad for multiple days • the person that’s getting bullied • the type of bullying that uses words • a person that stands up to the bully • the type of bullying that uses violence • hurting someone physically and mentally • the type of bullying that’s on the internet • a person that isn’t involved in the conflict • ...
Complete the crossword for words with soft c 2025-09-29
Across
- last month of the year
- move around
- an ordinary person not in the armed forces
- a tank to hold water as in a toilet
Down
- to do with computers, the internet or online world
- do something happy to mark a special day
- very good exceptional
- a special piece of paper to say what you achieved
- a special service at an event such as a wedding
- something happens by mistake
10 Clues: move around • very good exceptional • last month of the year • something happens by mistake • a tank to hold water as in a toilet • do something happy to mark a special day • an ordinary person not in the armed forces • a special service at an event such as a wedding • a special piece of paper to say what you achieved • to do with computers, the internet or online world
12.a 2 2023-04-25
16 Clues: sample • reward • salary • survive • develop • security • quantity • weakness • advantage • market gap • enterprise • independence • office staff • responsibility • time-consuming • market research
Change a verb into a nouns 2023-11-30
14 Clues: success • madness • addition • decision • security • attention • protection • comparison • conclusion • collection • attraction • description • distraction • achievement
Change a nouns into a verb 2023-11-30
14 Clues: success • madness • security • addition • decision • attention • conclusion • attraction • comparison • protection • collection • description • achievement • distraction
2 2024-05-15
National Services Acronyms 2025-02-17
C reading 2021-09-06
DE TOPIC 1 2025-08-03
Across
- Integration of cyber-physical systems, IoT, AI and data analitics
- Focused on mass production and global market
- utilising software and digital and technologies
Down
- Focus on physical good and services
- Focused on sustainability and environment conservation
- Follow islamic principles and ethics
- Operates online
- Create positive societal impact
8 Clues: Operates online • Create positive societal impact • Focus on physical good and services • Follow islamic principles and ethics • Focused on mass production and global market • utilising software and digital and technologies • Focused on sustainability and environment conservation • Integration of cyber-physical systems, IoT, AI and data analitics
SAPM CROSSWORD 2022-06-22
Across
- The ------------risk of the firm is diversifiable
- CAPM is a market --------------model
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses.
- An opportunity where an investor earns riskless profit without making any net investment
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- The other name for non-diversifiable risk is -------------------------
- One of the researchers/economists who developed the CAPM model
- The economist who developed the Arbitrage Pricing Theory (APT) model.
Down
- In the absence of secondary markets, this risk would be higher.
- The line representing CAPM is the -----------------market line
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing.
- In order to diversify, we look for security returns that are related ------------------
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The other name for indifference curve is --------------curve
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions.
- A conditional market order to sell stock if it drops to a given price (write without space)
- --------------------is the slope of the security characteristic line
- equal to the average ------------------as the number of securities becomes very large
- Variance of a portfolio with equi-proportionate investments in each security is
- The economist who laid the foundations for the Modern Portfolio theory
21 Clues: CAPM is a market --------------model • The ------------risk of the firm is diversifiable • The other name for indifference curve is --------------curve • The line representing CAPM is the -----------------market line • One of the researchers/economists who developed the CAPM model • In the absence of secondary markets, this risk would be higher. • ...
SAPM CROSSWORD 2022-06-22
Across
- In order to diversify, we look for security returns that are related ------------------
- Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
- In the absence of secondary markets, this risk would be higher
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- The line representing CAPM is the -----------------market line
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
- An opportunity where an investor earns riskless profit without making any net investment
- A conditional market order to sell stock if it drops to a given price (write without space)
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
Down
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- The other name for non-diversifiable risk is -------------------------risk
- The other name for indifference curve is --------------curve
- The economist who laid the foundations for the Modern Portfolio theory
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
- --------------------is the slope of the security characteristic line
- The ------------risk of the firm is diversifiable
- CAPM is a market --------------model
- The economist who developed the Arbitrage Pricing Theory (APT) model
- One of the researchers/economists who developed the CAPM model
20 Clues: CAPM is a market --------------model • The ------------risk of the firm is diversifiable • The other name for indifference curve is --------------curve • In the absence of secondary markets, this risk would be higher • The line representing CAPM is the -----------------market line • One of the researchers/economists who developed the CAPM model • ...
Cast study - An ethical approach to hacking 2025-06-12
Across
- Simulated cyberattacks used to assess system security.
- The analysis of systems and data to investigate security incidents or breaches.
- Software used to recover or bypass passwords through brute force or other methods.
- A testing method where the tester has full knowledge of the system’s internals.
- The technique of identifying active devices and services on a network.
- A testing method where the tester has partial knowledge of the system.
- A social engineering attack using phone calls to extract sensitive information.
- A unique identifier assigned to each device connected to a network.
- The creation of code or tools to take advantage of system vulnerabilities.
- Identifying the operating system of a target device during reconnaissance.
- Probing a system to identify open ports and available services.
- Psychological manipulation tactics to trick people into revealing confidential information.
- A documented strategy for detecting, responding to, and recovering from security incidents.
Down
- An evaluation of an organization’s overall cybersecurity strength and weaknesses.
- A web attack that injects malicious scripts into trusted websites.
- Using advanced search operators to find sensitive data or vulnerabilities online.
- The process of evaluating systems through defined methods to find vulnerabilities.
- Publicly available information gathered for analysis.
- Malicious software designed to harm or exploit systems.
- An exploit where a program overruns a buffer’s boundary and overwrites adjacent memory.
- A code injection attack targeting databases through malicious SQL queries.
- A social engineering method that involves inventing a scenario to steal information.
- An individual who gains unauthorized access to systems or data.
- A testing method where the tester has no prior knowledge of the system.
- The layout or structure of a network’s connections and devices.
- The process of discovering devices and connections within a network.
26 Clues: Publicly available information gathered for analysis. • Simulated cyberattacks used to assess system security. • Malicious software designed to harm or exploit systems. • An individual who gains unauthorized access to systems or data. • Probing a system to identify open ports and available services. • ...
Cold War 2018-04-26
FITE: Tech. Terms By:Maya Ausley 2013-05-16
Across
- type of mouse
- Example: Comcast
- 'WWW'___________
- behavior online
- a device that connects to a computer
- 32 id numbers
- short term storage
- Liquid Cristal Display
- Example: speakers
- where you plug in speakers/earbuds
- LCD stands for___________.
- without cables or wires
- tools, machinery, and other durable equipment
- largest amount of storage space possible
- long term storage
Down
- your safety online
- wired internet port
- the primary circuit board
- NCSA stands for___________.
- online
- the smallest storage size
- visual display unit
- where you put in a disc
- Example: Temple Run
- the programs and other operating information used by computers
- flash drive port
- wireless internet
- cloud based presentation maker with zooming features
- Example: google
- online storage
30 Clues: online • type of mouse • 32 id numbers • online storage • behavior online • Example: google • Example: Comcast • 'WWW'___________ • flash drive port • wireless internet • Example: speakers • long term storage • your safety online • short term storage • wired internet port • visual display unit • Example: Temple Run • Liquid Cristal Display • where you put in a disc • without cables or wires • ...
Supercoulafragolisticexpeouladotios crossword puzzle 2013-08-26
Across
- open your mouth wide for the nurse.
- water that is ultra pure!
- Violins, Basses, Violas, and Cellos.
- programs for managers I think...
- fruits and veggies. and other stuff.
- they make vents.
- so logical!
- Makes cars.
- I'm in cyberspace!
Down
- its quality entertainment!
- they make kindles.
- the make radars. not much else to explain.
- I can see your bones!
- the opposite of hardware.
- so much information!
- zip code doors and stuff.
- the former producer company of Minecraft.
- these graphics are amazing!
- the opposite of software.
- hey transport stuff.
- Helping the earth and environment!
- they make websites
- Where boats drop off there exporting items.
- kind of looks like a U.S.B port...
- No monkey business!
- Yahoo pages.
26 Clues: so logical! • Makes cars. • Yahoo pages. • they make vents. • they make kindles. • they make websites • I'm in cyberspace! • No monkey business! • so much information! • hey transport stuff. • I can see your bones! • the opposite of hardware. • zip code doors and stuff. • water that is ultra pure! • the opposite of software. • its quality entertainment! • these graphics are amazing! • ...
OL 4, Unit 4, Station 2 2025-05-07
Across
- sofort, gleich
- abonnieren
- befreunden
- fitness Jumping Fitness
- täglich
- äußerst, sehr
- Veganismus
- kommunizieren
- Foto
- Einfluss, Auswirkung
- altmodisch
- Status
- veraltet
- Innovation, Neuheit
- Lieblings-
- Selfie
- Blogger
- begrüßen
- Konto
- trendsetzend
- einige, mehrere
Down
- beeinflussen
- Cyber-Mobbing
- verdienen
- seit, seitdem
- Kommentar
- Post
- eigentlich, grundsätzlich
- entfreunden
- Tonne
- Link
- Karte, Plan
- modisch, trendy
- Smartphone
- streamen
- Seite (im Internet)
- nicht mögen
- seit
- online stellen
- soziale Medien
- die Hälfte
- mobil, tragbar
- geben, existieren
- Trend, Entwicklung
- zerissen
- Anfrage
- updaten
- Computerspiele-
- Follower
- Clip; Ausschnitt
50 Clues: Post • Link • Foto • seit • Tonne • Konto • Status • Selfie • täglich • Blogger • Anfrage • updaten • streamen • veraltet • zerissen • begrüßen • Follower • verdienen • Kommentar • abonnieren • befreunden • Veganismus • Smartphone • altmodisch • die Hälfte • Lieblings- • entfreunden • Karte, Plan • nicht mögen • beeinflussen • trendsetzend • Cyber-Mobbing • seit, seitdem • äußerst, sehr • kommunizieren • sofort, gleich • online stellen • soziale Medien • ...
Lenovo 3 2021-09-10
Across
- What is the new model for the current and future workforce?
- What is the biggest security threat today?
- One of Lenovo's approaches to security is "Security by ..."
- XDR stands for "_ _ _ _ _ _ _ _ Detection and Response"
Down
- What is the name of Lenovo's security brand?
- What are prime targets for hackers?
- Lenovo Smart Standby understands when you are not using your computer and schedules ... (Bears schedule this in winter!)
- What is most exposed in the hybrid model?
8 Clues: What are prime targets for hackers? • What is most exposed in the hybrid model? • What is the biggest security threat today? • What is the name of Lenovo's security brand? • XDR stands for "_ _ _ _ _ _ _ _ Detection and Response" • What is the new model for the current and future workforce? • One of Lenovo's approaches to security is "Security by ..." • ...
Airports 2020-05-13
25 Clues: WC • sor • utas • kapu • késik • bőrönd • indulás • érkezés • rendelő • útlevél • poggyász • fogorvos • külföldre • beszállni • váróterem • kézikocsi • repülőtér • városnézés • biztonsági • bevándorlás • létesítmény • repülőjárat • vámvizsgálat • bejelentkezés • szórakoztatni
C2 2025-05-15
24 Clues: dog • bed • car • cat • door • flag • lamp • pilot • eagle • pasta • bunny • snake • train • window • turtle • cereal • hot dog • pyramid • luggage • passport • security • hamburger • helicopter • cruise ship
Capítulo 7: A Viajar #2 2024-11-19
20 Clues: park • floor • train • price • flight • customs • to plan • layover • bicycle • arrivals • entrance • security • airplane • passenger • table tray • train track • destination • one-way ticket • to take the train • to pack suitcases
Unidad 6A 2025-05-22
17 Clues: exit • fare • cloud • cheap • delay • flight • to fly • ticket • to save • to plan • to cross • security • to board • to spend • expensive • to reserve • misunderstanding
Network Requirements 2023-09-05
Across
- A set of rules for the network
- managing IP-packet traffic
- the basic unit of data
- maximum data rate networks can manage
- the structure of a network
- ensures protection from unauthorised access
- accommodation of growth without decreased performance
- maximum size of a packet that can be transmitted
- a security device
- usage of backup components
Down
- allows access to a private network over the internet
- actual data transfer rate
- translates domain names to IP addresses
- division of a network into subnetworks
- allows multiple devices on a private network to share a public IP address
- make late
- delay in transmission measured in (ms)
- involves constant diagnosis of issues and network analysis
- deviation in signal pulses
- another word for forfeiture
20 Clues: make late • a security device • the basic unit of data • actual data transfer rate • managing IP-packet traffic • the structure of a network • deviation in signal pulses • usage of backup components • another word for forfeiture • A set of rules for the network • maximum data rate networks can manage • division of a network into subnetworks • delay in transmission measured in (ms) • ...
Spanish Travel Vocab 2020-04-10
Across
- to see
- stop
- baggage claim
- second class
- to hope
- flight attendant
- event ticket
- to take off
- to go through security
- gate
- car wagon
- to check luggage
- to miss
- departure
- platform
- coach
- trip
- counter
- in the train station
- window
- customs
- layover
- ticket
- international airport
- carry on luggage
Down
- security agent
- in the airport
- luggage
- first class
- aisle
- baggage screening
- boarding pass
- delayed
- suitcase
- waiting room
- to land
- visa
- to get
- ticket
- bunk
- passenger
- seat belt
- to give
- sleeping car
- arrival
- flight
- ticket window
- connection
- on time
- seat
- to turn
- controller
52 Clues: stop • visa • gate • bunk • trip • seat • aisle • coach • to see • to get • ticket • flight • window • ticket • luggage • to hope • delayed • to land • to miss • to give • counter • arrival • customs • layover • on time • to turn • suitcase • platform • car wagon • passenger • departure • seat belt • connection • controller • first class • to take off • second class • waiting room • event ticket • sleeping car • baggage claim • boarding pass • ticket window • security agent • ...
CITS2006-C10-Mohammad 2025-05-19
Across
- Secures internet traffic over public networks
- Converting data into an unreadable form
- Fake system to lure attackers
- Overwhelming a many systems with traffic
- Records keystrokes secretly
- Malware disguised as legitimate software
- Secures data with one-way transformation
- Malicious software
- Digital proof of website authenticity
- Pretending to be a trusted source
- Self-replicating malware
Down
- Tricking users to steal information
- Guessing repeatedly to gain access
- Hidden way to bypass security
- Vulnerability with no known fix yet
- Locks files for money
- Network of infected devices
- Exploits database query vulnerabilities
- Isolated space to safely run untrusted code
- Secretly monitors user activity
- Security fix for a software
- Protocol securing web communications
- Filters network traffic
- Adding extra login verification steps
24 Clues: Malicious software • Locks files for money • Filters network traffic • Self-replicating malware • Network of infected devices • Records keystrokes secretly • Security fix for a software • Hidden way to bypass security • Fake system to lure attackers • Secretly monitors user activity • Pretending to be a trusted source • Guessing repeatedly to gain access • ...
The 16 Career Clusters 2025-10-19
Across
- : Plane driver in Transportation, Distribution & Logistics
- : Patient care provider in Health Science
- : Numbers expert in Business, Management & Administration
- : Animal doctor in Agriculture, Food & Natural Resources
- : Fashion demonstrator in Marketing, Sales & Service
- : Food preparation expert in Hospitality and Tourism
- : Wiring expert in Architecture & Construction
- : Book manager in Education & Training
- : Congressional assistant in Government & Public Administration
- : Metal joiner in Manufacturing
Down
- : Fire responder in Law, Public Safety, Corrections & Security
- : Design specialist in Science Technology, Engineering & MATH
- : Spiritual leader in Human Services
- : Legal representative in Law, Public Safety, Corrections & Security
- : Oral health specialist in Health Science
- : Financial institution manager in Finance
- : Music performer in Arts, A/V Tech & Communications
- : Knowledge imparter in Education & Training
- : Network systems expert in Information Technology
- : Building designer in Architecture & Construction
20 Clues: : Metal joiner in Manufacturing • : Spiritual leader in Human Services • : Book manager in Education & Training • : Patient care provider in Health Science • : Oral health specialist in Health Science • : Financial institution manager in Finance • : Knowledge imparter in Education & Training • : Wiring expert in Architecture & Construction • ...
SEAT WORK 2022-08-30
Across
- SECURITY PERSONNEL - defined by the IRR of R.A. 5487, as natural persons which include rendering/performing security and/or detective services as employed by private security agencies and/or private firms.
- SECURITY MANAGEMENT - It is established to provide security for installation or facilities and to promote efficiency of security operations and economy in the use of security personnel.
- - The state of being protected or safe from harm; things done to make people or places safe.
- CONTRACT THEORY - Individual agree to live according to certain rules, norms and laws, so that collectively we can enjoy the benefits of living in a society.
Down
- TAYLOR - Father of Scientific Management Theory.
- - latin word “__________” which means “safe, secure, free from care, unworried, unconcerned.
- TAYLOR- he proposed the need to introduce science into managing organizations in order to bring objectivity, precision, order and predictability.
- - According to history, protecting these establishments are almost single-handedly made by the State forces.
- REVOLUTION - The process of change from an agrarian, handicraft economy to one dominated by industry and machine manufacture.
- SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients.
10 Clues: TAYLOR - Father of Scientific Management Theory. • - The state of being protected or safe from harm; things done to make people or places safe. • - latin word “__________” which means “safe, secure, free from care, unworried, unconcerned. • SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients. • ...
what do you know? 2021-05-04
Across
- attacks physically, emotionally, or socially
- physical or emotional pain
- punching,kicking,spitting
- in intent to make fun of someone in a playful way
- being far away from everything/in your own space
- there is an intent to hurt or harm
- it happens more than once over a period of time
Down
- what percent of students report bullying
- name-calling threatening
- writing mean thing on Facebook, Instagram, or Twitter
- spreading rumors, excluding people from games and groups
- something happening over and over again
- response to feeling or an event
- moment getting hurt on accident once
14 Clues: name-calling threatening • punching,kicking,spitting • physical or emotional pain • response to feeling or an event • there is an intent to hurt or harm • moment getting hurt on accident once • something happening over and over again • what percent of students report bullying • attacks physically, emotionally, or socially • it happens more than once over a period of time • ...
Securities Crossword 2023-01-04
Across
- Type of security that takes care of parks and schools
- People who invest in bonds and stocks
- Type of bond that is internations
- what is the mane for the devaluing of money when too much is in circulation
- Where stocks and bonds can be bought and sold
- this is issued by governments and corporations when they want to raise money.
- a tradable financial asset
Down
- A stock is categorized as this when the price dramatically fluctuates
- another name for money
- who ensures most bonds
- debt obligations issued by the U.S. Department of the Treasury. T-bills have the shortest maturity date of all the debt issued by the federal government
- Investors look to make this when they go into the market
- all the shares by which ownership of a corporation or company is divided
- what type of bond is bought by corporations
- Because of their large denomination this type of security is bought most often by large institutional investors
15 Clues: another name for money • who ensures most bonds • a tradable financial asset • Type of bond that is internations • People who invest in bonds and stocks • what type of bond is bought by corporations • Where stocks and bonds can be bought and sold • Type of security that takes care of parks and schools • Investors look to make this when they go into the market • ...
U11 - Mod 13 Key Terms 2024-10-21
Across
- access controls that are actual barriers deployed to prevent direct physical contact with systems.
- (4,5) is a comprehensive approach to securing all access across networks, applications, and environments.
- it verifies the identity of each user, to prevent unauthorized access; An administrative access control, one of the three security services.
- (4,3,4) Smart cards and security key fobs are examples of something that users possess
- it keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make; An administrative access control, one of the three security services.
- (4,3,4) Passwords, passphrases, or PINs are all examples
Down
- (6,4,2) solution allows the user to use one set of login credentials to authenticate across multiple applications. This way, the user only needs to remember one strong password.
- it determines which resources users can access, along with the operations that users can perform; An administrative access control, one of the three security services.
- access controls that are the hardware and software solutions used to manage access to resources and systems.
- access controls that are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
- are rules configured to limit folder or file access for an individual or a group and can help secure data.
- (3,3,3) Biometric security compares unique physical characteristics against stored profiles to authenticate users.
12 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples • (4,3,4) Smart cards and security key fobs are examples of something that users possess • access controls that are actual barriers deployed to prevent direct physical contact with systems. • (4,5) is a comprehensive approach to securing all access across networks, applications, and environments. • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
CHAPTER 4 CF 2024-09-12
Across
- A formal document outlining security policies, procedures, and guidelines for safeguarding information assets.
- The process involves the continuous implementation and management of security policies, involving regular updates, audits, and adherence to established guidelines.
- The process involves setting access controls on files and folders to restrict their viewing, modification, or deletion permissions.
- The guidelines outline the process for checking out and introducing new employees.
- To manage permissions effectively
- The framework and oversight for security policies are established, outlining roles and responsibilities for policy enforcement and review.
- The guidelines emphasize the importance of honesty and professionalism in employee behavior.
Down
- Rules for regulating access to specific physical spaces, such as offices or server rooms.
- Grouping users based on roles, such as marketing or IT staff, and assigning specific access allows for efficient management of permissions for multiple users simultaneously.
- This ensures the security and compliance of all systems by detecting any errors or misuse of access.
- The process involves creating user accounts and determining the specifics of what each user can access or perform on the system.
- Authentication methods rely on unique biological traits like fingerprints, facial recognition, or iris scans.
- Devices or software that generate one-time codes or credentials for authentication.
13 Clues: To manage permissions effectively • The guidelines outline the process for checking out and introducing new employees. • Devices or software that generate one-time codes or credentials for authentication. • Rules for regulating access to specific physical spaces, such as offices or server rooms. • ...
4 2024-05-14
15 Clues: cardan • exists • discuss • special • thereof • outside • wedding • prepared • consider • security • confirmed • circus act • calculated • coordination • circus performance
KPL 3&3.1 2025-02-26
15 Clues: varat • rauha • missio • kunnia • alusta • näkyvä • edistää • ongelma • vaikutus • tasa-arvo • rohkaista • delegaatti • erityisesti • turvallisuus • maailmanlaajuinen
Heathrow 2025-11-06
15 Clues: pass • pagas • turva • kohver • tualett • rahakott • nimesilt • sihtkoht • kaelapadi • seljakott • pardakaart • kõrvaklapid • kõrvatropid • ratastega kohver • väljumine, lahkumine
War and Peacekeeping 2023-11-26
Across
- What peacekeepers aim to achieve.
- Mission type often associated with the U.N.
- A nation helped by New Zealand's peacekeepers in 1999.
- Soldiers in digital battles.
- The opposite of peace.
- A mission to help a nation, often abbreviated.
- Something that is done to fix buildings and heal communities.
Down
- A nation known for its peacekeeping efforts, especially in the Pacific.
- Organisation often involved in peacekeeping.
- Headgear often worn by peacekeepers.
- They enforce law and order in a country.
- Large water bodies surrounding the Solomon Islands.
- Type of warfare conducted in cyberspace.
- Another word for conflict or battle.
- An act of helping or aiding.
15 Clues: The opposite of peace. • Soldiers in digital battles. • An act of helping or aiding. • What peacekeepers aim to achieve. • Headgear often worn by peacekeepers. • Another word for conflict or battle. • They enforce law and order in a country. • Type of warfare conducted in cyberspace. • Mission type often associated with the U.N. • Organisation often involved in peacekeeping. • ...
Cyber Law 2021-09-05
Across
- ______Regulation works by utilising feedback
- Shawn Fanning created the______
- cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- cyber________
Down
- according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
- some experts regard digital______ as the third industrial revolution
- the conversion of analogue data into digital form
- wrote Code and Other Laws of Cyberspace
8 Clues: cyber________ • Shawn Fanning created the______ • wrote Code and Other Laws of Cyberspace • ______Regulation works by utilising feedback • the conversion of analogue data into digital form • some experts regard digital______ as the third industrial revolution • ...
Cyber Law 2021-09-05
Across
- cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- ____Regulation works by utilising feedback
- according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
- wrote Code and Other Laws of Cyberspace
- cyber____
- digital___ is the productivity platform that some experts regard as the third industrial revolution
- Shawn Fanning created the____
- the conversion of analogue data into digital form
8 Clues: cyber____ • Shawn Fanning created the____ • wrote Code and Other Laws of Cyberspace • ____Regulation works by utilising feedback • the conversion of analogue data into digital form • digital___ is the productivity platform that some experts regard as the third industrial revolution • ...
Cyber Crossword 2021-04-26
Across
- An individual who causes harm or stress to another human intentionally and repetitively.
- The act of protecting ones self or others from harm or intimidation online.
- the use of technology to harass, threaten, embarrass, or target another person.
- A result or effect, typically one that is unwelcome or unpleasant.
Down
- Electronic device most students own at home and is square and mostly portable.
- A repetitive action toward another human purposely causing harm or intimidation.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- Having firm belief or reliability in someone.
8 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • The act of protecting ones self or others from harm or intimidation online. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • ...
Cyber Liability 2020-02-05
Across
- Direct monetary fines, penalties, reimbursements, fraud recoveries or assessments owed by the insured organization under the terms of a merchant services agreement.
- Legal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages.
- In the wake of a data breach provides services to the insured, including: computer expert, legal, public relations and crisis management, breach notifications, call center, breach resolution and mitigation.
- Indemnifies the insured for data protection loss incurred by the insured due to alteration, corruption, destruction, deletion or damage to a data asset, or inability to access a data asset.
- Liability to third party individuals or businesses for theft, loss, or unauthorized disclosure of personally identifiable information or third party information that is in the care, custody, or control of the insured organization.
Down
- Net profit and extra expense loss during the period of restoration
- Coverage for payment made in response to an extortion threat to damage or corrupt data if not paid. Typically carried out by hackers placing ransomware on our insured's systems.
- Coverage for defense costs and penalties resulting from Federal Trade Commission (FTC) or Federal Communications Commission (FCC) proceedings concerning a covered data breach incident.
8 Clues: Net profit and extra expense loss during the period of restoration • Legal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages. • ...
Cyber bullying 2024-10-08
Across
- Never open an ___ from someone you do not know or from bullies
- Do not spread ___ about someone
- Never give out personal __
- Do not send ___ messages
- Do not ___ a person from online activities such as a chat
Down
- Never tell anyone your ___, not even your friends
- Be ___ to others
- Do not send messages when you are ___
8 Clues: Be ___ to others • Do not send ___ messages • Never give out personal __ • Do not spread ___ about someone • Do not send messages when you are ___ • Never tell anyone your ___, not even your friends • Do not ___ a person from online activities such as a chat • Never open an ___ from someone you do not know or from bullies
cyber safety 2023-05-22
Across
- Talking someone into revealing secrets or embarrassing information
- someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
- intense harassment and denigration that includes threats or creates significant fear.
- Intentionally and cruelly excluding someone from an online group
- Sharing someone's secrets or embarrassing information
Down
- Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation
- Repeatedly sending nasty, mean, and insulting messages
- Online fights using electronic messages with angry and vulgar language.
8 Clues: Sharing someone's secrets or embarrassing information • Repeatedly sending nasty, mean, and insulting messages • Intentionally and cruelly excluding someone from an online group • Talking someone into revealing secrets or embarrassing information • Online fights using electronic messages with angry and vulgar language. • ...
cyber crimes 2023-05-04
Across
- personal data should be kept _______ by company's and organization
- can have information data _______
- when some one try stealing data of you by calling or messaging you pretending to be someone else
- data should be used _________
Down
- can request to ____ erased
- sneaking on to someone's computer and intending to committed a crime has 5 years of prison and a ________ fine
- you can request your ________ information
- they are 7 __________
8 Clues: they are 7 __________ • can request to ____ erased • data should be used _________ • can have information data _______ • you can request your ________ information • personal data should be kept _______ by company's and organization • when some one try stealing data of you by calling or messaging you pretending to be someone else • ...
Cyber Crime 2025-02-06
Across
- Kejahatan yang dilakukan dengan cara mengintip atau mengambil informasi pribadi seseorang secara diam-diam.
- Tindakan yang dilakukan untuk menipu orang agar memberikan informasi pribadi melalui email atau situs palsu
- Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat.
- Aksi mengganggu atau menyerang sistem komputer atau jaringan dengan tujuan merusak atau mencuri data.
Down
- Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online.
- Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer.
- Tindakan mengirim pesan atau email berulang kali dengan maksud mengganggu atau mengintimidasi korban.
- Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi.
8 Clues: Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi. • Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat. • Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online. • Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer. • ...
cyber ethics 2025-06-07
Across
- Strong code used to protect your digital identity
- : When your personal info is stolen and misused
- Avoid this while using someone else’s digital content
- Posting rude or harmful comments online is called
Down
- Software that defends systems from cyber threats
- Using someone's personal information without permission
- Sending fake emails to trick users into revealing private info
- False online identity to mislead others
8 Clues: False online identity to mislead others • Strong code used to protect your digital identity • : When your personal info is stolen and misused • Avoid this while using someone else’s digital content • Software that defends systems from cyber threats • Posting rude or harmful comments online is called • ...
Cyber-crossing 2024-10-29
Across
- The act of disguising as a trusted entity to obtain information.
- Media that has been adjusted to spread falsified information.
- Steps taken to protect a device from threats.
- 2 Step verification is an example of:
Down
- A secret word or phrase used to gain access.
- Impersonation of another person to commit crimes.
- A type of malware with the ability to spread throughout a system.
- Someone who gains unauthorised access to systems.
8 Clues: 2 Step verification is an example of: • A secret word or phrase used to gain access. • Steps taken to protect a device from threats. • Impersonation of another person to commit crimes. • Someone who gains unauthorised access to systems. • Media that has been adjusted to spread falsified information. • The act of disguising as a trusted entity to obtain information. • ...
Cyber Crossword 2025-09-30
Across
- Keeps network traffic private over the internet.
- Secret string used to access accounts.
- A site pretending to be real to steal credentials.
- Software that self replicates and spreads maliciously.
- A device or software that blocks unauthorized network traffic.
Down
- Process that converts data into unreadable form to protect it.
- A fraudulent message designed to trick recipients into sharing info.
- Software used by attackers to lock files or steal data for ransom.
8 Clues: Secret string used to access accounts. • Keeps network traffic private over the internet. • A site pretending to be real to steal credentials. • Software that self replicates and spreads maliciously. • Process that converts data into unreadable form to protect it. • A device or software that blocks unauthorized network traffic. • ...
Meta 2023-09-12
19 Clues: EHS • APIs@ • Black@ • Women@ • Pride@ • Latin@ • Native@ • Security • Open Arts • IT Support • Facilities • Disability@ • Ship Happens • Transportation • Fitness Center • Culinary / Pastry • Events & Amenities • SEA + BEL Site Team • AV Technical Production
Phising 2024-10-14
Across
- forwarding/Automatically sending emails from one account to another, often exploited by attackers.
- authentication/A security process requiring two types of identification.
- targeted phishing attack aimed at specific individuals.
- activity alert/Notifications for potential security breaches or unusual behaviour.
- operations/Activities aimed at influencing or manipulating information for strategic purposes.
- addresses/Email accounts outside an organisation’s official domain, which may pose risks.
Down
- communication/Messages received without prior request, often phishing-related.
- monitoring/Tracking changes to system or server settings for security purposes.
- a trusted entity to deceive users.
- theft/The act of stealing usernames and passwords.
- awareness training/Educational programs to help users recognise phishing attacks.
- deceptive offer or message designed to attract and manipulate a target.
12 Clues: a trusted entity to deceive users. • theft/The act of stealing usernames and passwords. • targeted phishing attack aimed at specific individuals. • deceptive offer or message designed to attract and manipulate a target. • authentication/A security process requiring two types of identification. • ...
Tom Brouwers Engels 2021-01-13
Across
- what you get when it's halloween
- when something terrible has happend you need to ...
- things in our body to keep us living
- when his father died he dropped a ...
- the row of bones in your back
- all planets are in a ...
- when you can't stop doing something you have an ...
- things made out of wood
- when it's heavily snowing
Down
- a sentence what someone said is a ...
- the midway pauze in a game
- when there is lightning an thunder
- the place where you need to wait
- opposite of finish
- when you see somebody you ... them
- to be save for covid you need to have a ... with the covid vaccine
- life from anotherplanet
- our ... is called the milky way
- online
- the opposite of pessimist
20 Clues: online • opposite of finish • life from anotherplanet • things made out of wood • all planets are in a ... • the opposite of pessimist • when it's heavily snowing • the midway pauze in a game • the row of bones in your back • our ... is called the milky way • what you get when it's halloween • the place where you need to wait • when there is lightning an thunder • ...
Crossword Puzzle 2022-11-27
Across
- The edgier battle star
- famous Early 90s Kindergarten teacher
- “I see you enjoy Super Mario…”
- Your greatest cyber crime
- 1988’s olympic winter
- “Resident” Albert
- Metal Gear character who likes to wrestle senators
- An adorable name for Hershey Bars
- Your kind of sister
- A double entendre TV show
- A wholesome healthy breakfast
- An 80s themed “Vice” with plenty of white suits
- Lost in ’88
Down
- Your on a first name basis with this Galactica Admiral
- dating sim meets supernatural teen adventure
- Being ___ in Detroit is hard
- No___ GTA RP
- A fun holiday treat
- Themed Oreos are highly…
- The proper microwave wattage
- A rare candy bar
- A renowned piece of art
- MultiVersus competitor (this clue is sponsored by Chilis)
23 Clues: Lost in ’88 • No___ GTA RP • A rare candy bar • “Resident” Albert • A fun holiday treat • Your kind of sister • 1988’s olympic winter • The edgier battle star • A renowned piece of art • Themed Oreos are highly… • Your greatest cyber crime • A double entendre TV show • Being ___ in Detroit is hard • The proper microwave wattage • A wholesome healthy breakfast • “I see you enjoy Super Mario…” • ...
