cyber security Crossword Puzzles
Detective Conan 8 and Puzzles 2024-08-26
1 2024-05-15
Exam Vocabulary 2024-04-11
Job Hunting 2023-06-17
15 Clues: Perks • Solve • Kindof • Salary • Storage • Speaker • Operate • Distinct • Searching • Stability • ITsupport • Education • Progression • Opportunities • Websitehosting
Crossword 3.1 2025-02-25
safer internet 2020-04-19
7 Clues: Schadsoftware • währung im netz • mobbing im Internet • hilft bei Entfehrnung von Bildern • was versuchen Betrüger zu bekommen? • wichtigste Verbreitungsquelle von bösen Links • Was macht man, wenn man eine vireninfizierte E-mail bekommt?
Clique 2018-01-16
Across
- Someone around the same age, grade and size.
- Touching a persons body or things.
- An exclusive group of friends that leave others out.
- Pushing others by things you say.
- Name of a Queen Bee.
Down
- A name of the world's greatest counselor
- To push.
- Name of a Target Bee.
- The best elementary school in the whole world.
- A way to bully using the internet.
10 Clues: To push. • Name of a Queen Bee. • Name of a Target Bee. • Pushing others by things you say. • Touching a persons body or things. • A way to bully using the internet. • A name of the world's greatest counselor • Someone around the same age, grade and size. • The best elementary school in the whole world. • An exclusive group of friends that leave others out.
Digital Citizenship 2019-06-17
Across
- misuse act crime to use a computer
- a _ _ _ or set of _ _ _ _
- when someone goes on a _______ without owners permission
- divide someone who dosent have acsess to _ _ _ _ _ _ _ _ _ _ _
Down
- commissioner someone who can enforce the data protection act
- bullying hurt someone
- subject _ _ _ _ about you/people
- intelligence human intelligence processed by a computer
- communication can cause distress or anxiety
- something that can cause problems with electronics
10 Clues: a _ _ _ or set of _ _ _ _ • bullying hurt someone • misuse act crime to use a computer • subject _ _ _ _ about you/people • communication can cause distress or anxiety • something that can cause problems with electronics • intelligence human intelligence processed by a computer • ...
Complexity Cross V2 2024-05-09
Across
- The youngest in the group, was merged with a
- Cyber taught Stratus strength of the ____, not the body
- The character who loves plants
- A rare delicacy, and Sage's prized possession
- The filmmaker who's everywhere
Down
- The character who was once a vigilante
- ____, the teenage goddess
- _____ Forest, the place where Sage grew up
- ____ City, the place where Stratus lives
- The character who can control metal
10 Clues: ____, the teenage goddess • The character who loves plants • The filmmaker who's everywhere • The character who can control metal • The character who was once a vigilante • ____ City, the place where Stratus lives • _____ Forest, the place where Sage grew up • The youngest in the group, was merged with a • A rare delicacy, and Sage's prized possession • ...
The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04
Across
- What car manufacturer made the first modern driverless car
- Data should not be kept longer than
- Who is exempt from the data protection act
- All personal data should be kept
- The owner of the data
Down
- The DPA has 8
- Police, Government and Taxers all all ______ from the DPA
- A form of cyber-bullying
- Data must be routinely for maximum protection
- Data should be used
10 Clues: The DPA has 8 • Data should be used • The owner of the data • A form of cyber-bullying • All personal data should be kept • Data should not be kept longer than • Who is exempt from the data protection act • Data must be routinely for maximum protection • Police, Government and Taxers all all ______ from the DPA • What car manufacturer made the first modern driverless car
CYBERSECURITY 2025-02-08
Across
- A person who tries to break into systems.
- A fake email trying to trick you.
- Someone you do not know online.
- Relating to computers and the internet.
- Software designed to harm your device.
Down
- The action of entering username/password.
- A secret code to keep your account safe.
- A way to send messages online.
- Keeping your personal information safe.
- A harmful program that damages a computer.
10 Clues: A way to send messages online. • Someone you do not know online. • A fake email trying to trick you. • Software designed to harm your device. • Keeping your personal information safe. • Relating to computers and the internet. • A secret code to keep your account safe. • The action of entering username/password. • A person who tries to break into systems. • ...
m m 2026-01-19
Across
- Actions taken to reduce risk
- The likelihood that something will occur
- Risk that affects public trust or image
- Risk related to money or finances
Down
- The process of returning to normal
- The effect of a risk if it happens
- Risk related to people, policies, processes, or systems
- Risk from laws and regulations
- Risk related to computers and data
- A potential source of danger
10 Clues: Actions taken to reduce risk • A potential source of danger • Risk from laws and regulations • Risk related to money or finances • The process of returning to normal • The effect of a risk if it happens • Risk related to computers and data • Risk that affects public trust or image • The likelihood that something will occur • ...
IPO Process 2023-01-03
Across
- a federal government agency that regulates and supervises the securities industry
- brokerage firm that raises money for companies using public equity and debt markets
- company whose shares have never been offered publicly for sale
- process by which a privately held company first offers shares of stock to the public; this is done via an initial public offering (IPO)
- if the opening price of an IPO in the secondary market is higher than its offering price, the difference
- ____Herring a preliminary prospectus filed with the SEC
- characteristic of a security which rises or falls sharply in price within a short time period
- when an investor sells their shares to the public on the secondary market after an initial public offering (IPO).
- the amount of stock in an initial public offering (IPO) that is sold to a customer
Down
- date on which an executed trade of securities must be paid for
- Price price at which a new security will be distributed to the public prior to the new issue trading on the secondary market; commonly referred to as offering price
- date the day a newly registered security can be offered for sale
- the first issuance of stock from a private company for public sale.
- in charge of organizing the syndicate, distributing member participation shares, and making stabilizing transactions; the lead underwriter’s name appears on the left side of a prospectus cover
- privately held company offers its shares to the public—an initial public offering (IPO)
- price for which a new security issue will be sold to the public
16 Clues: ____Herring a preliminary prospectus filed with the SEC • date on which an executed trade of securities must be paid for • company whose shares have never been offered publicly for sale • price for which a new security issue will be sold to the public • date the day a newly registered security can be offered for sale • ...
Housekeeping Safety & Security 2014-05-29
Across
- Lost items should be recorded in this
- Cleaners that may be harmful
- Best cure for emergencies
- Group of employees that develop and monitor security programs
- Leaving the hotel premises
- Not being personally injured
- Prevention of incidents like theft or fire
Down
- What to do before entering guest room
- Opens even double-locked doors
- Where to meet after exiting hotel
- Stealing from others
- Bend the knees before doing this
- Opens all guestroom doors
- When slips and falls happen
14 Clues: Stealing from others • Best cure for emergencies • Opens all guestroom doors • Leaving the hotel premises • When slips and falls happen • Cleaners that may be harmful • Not being personally injured • Opens even double-locked doors • Bend the knees before doing this • Where to meet after exiting hotel • Lost items should be recorded in this • What to do before entering guest room • ...
Housing Ads 2014-07-07
Across
- the place where you put a car (abbreviation)
- the room where you shower (abbreviation)
- an apartment that you can buy and own
- examples: refrigerator, stove, dishwasher
- the room where you sleep (abbreviation)
- very large
- a lot of space
Down
- a small outdoor space not on the 1st floor
- to keep the home cool in the summer (abbreviation)
- you must pay the $500 security _____________ (abbrevation)
- examples: heat, electricity, water, garbage
- ____________ guard
- large highways
- a one-room apartment
14 Clues: very large • large highways • a lot of space • ____________ guard • a one-room apartment • an apartment that you can buy and own • the room where you sleep (abbreviation) • the room where you shower (abbreviation) • examples: refrigerator, stove, dishwasher • a small outdoor space not on the 1st floor • examples: heat, electricity, water, garbage • ...
Insights 5, ch.1 2021-12-09
15 Clues: alaryhmä • ajoneuvo • pidätellä • tietoisuus • rankaiseva • ratkaiseva • tiedollinen • pitkittynyt • turvallisuus • tavanomainen • ennakkoasenne • jarruttaminen • kehittyneisyys • ristiriitainen • jännityksenhakuisuus
Profiles 1 text 1 Santeri 2014-12-03
15 Clues: jono • alue • esine • kantaa • tavara • romaani • miehistö • osoittaa • matkustaa • lentokone • välttämätön • juutalainen • turvallisuus • vastakkainen • olla pahoillaan
unit 10 2015-03-11
Animal Farm Crossword Puzzle 2024-05-09
3 ja 3.1 2025-02-25
15 Clues: tulkki • kunnia • nuoriso • tehtävä • intohimo • konflikti • ilahtunut • arvokkuus • väkivalta • tasa-arvo • yhteishenki • turvallisuus • vuosittainen • monikielisyys • puolestapuhuja
Spanish Travel Vocabulary 2026-03-25
FIT E: Final Quiz Vocab :D 2013-05-14
Zerodha Community 2024-11-29
Across
- Company repurchasing its outstanding shares
- Price at which the asset trades in the regular market
- Trading involving high risk, in expectation of significant returns
- Neutral strategy that involves simultaneously taking a long position and a short position on a security
- Total market value of a company's outstanding shares
- Difference between what buyers are willing to pay and the price sellers are asking
Down
- Purchasing an asset from one market and selling it to another market where the price is higher
- Selling stocks with the expectation the price will fall
- ____ Analysis is a holistic approach to study a business.
- Measure of an asset’s risk in relation to the market
- The ratio that helps gauge how cheap or expensive the stock is trading
- Order placed to limit losses by automatically selling a security when it reaches a set price
- Company’s obligation/Loan that the company has taken
- Security whose value is derived from another financial entity
14 Clues: Company repurchasing its outstanding shares • Measure of an asset’s risk in relation to the market • Company’s obligation/Loan that the company has taken • Total market value of a company's outstanding shares • Price at which the asset trades in the regular market • Selling stocks with the expectation the price will fall • ...
SMG Crossword Puzzle 2025-12-15
Across
- - A large company or group
- earnings.
- - measures volatility as compared to the overall stock
- average forecast for a companies forecast
- - Company total income for selling goods or services.
- basis- the original price paid for an asset is used to determine capital gain or loss
- is a loan made by an issuer (borrower) to a lender (investor).
- Ratio- a measure of a company’s stock price relative to
Down
- is a broad group of stocks often in the same industry.
- - is the highest price and the lowest price of the stock over a 52-week
- Value- Price a company will fetch in the open market by investor perception
- a short unique abbreviation representing a public trading company or security on stock exchange
- - A debt security issues by government
- - Type of bond that includes Debt security issued by state, cities or county,
14 Clues: earnings. • - A large company or group • - A debt security issues by government • average forecast for a companies forecast • - Company total income for selling goods or services. • is a broad group of stocks often in the same industry. • - measures volatility as compared to the overall stock • Ratio- a measure of a company’s stock price relative to • ...
SEC+ 701 Chap 1 2024-10-15
Across
- embedding security into all aspects of APPS
- what were allowed to do on network
- control using policies
- control type that enforces a rule of behavior
- controls like alarms and locks
- control implemented as a system
- proving your identitiy
- abbr. person overall responsible for security
Down
- 2wrds.difference between current and want state
- part of framework providing ongoing monotoring
- control type that operates during an attack
- an example of a technical control
- identify, analyze,contain and eradicate threats
- something negative on network
- framework process of restoring systems
- abbr. person responsible for new and emerging IT
- tracking your movements on network
17 Clues: control using policies • proving your identitiy • something negative on network • controls like alarms and locks • control implemented as a system • an example of a technical control • what were allowed to do on network • tracking your movements on network • framework process of restoring systems • embedding security into all aspects of APPS • ...
safety meeting 2026-02-09
Across
- number of fire extinguishers
- in a robbery you should stay ___
- security meeting happens how many times a year
- Branch employees should go ____ to safe haven
- branch passcode
- safe haven
- 1-800-727-7375
- inspect the building exterior
- anything that interferes/prevents normal work functions
- when opening always be aware of your
Down
- observe robber's actions and appearance
- yelling
- keeping you, customer & bank information protected
- Return to the branch until ______ by authorities, Global Security, your manager or your MD-BankingDon’t:
- submit as soon as possible( but no more than 72 hours after)
- Always ___ with demands
- waving fist
17 Clues: yelling • safe haven • waving fist • 1-800-727-7375 • branch passcode • Always ___ with demands • number of fire extinguishers • inspect the building exterior • in a robbery you should stay ___ • when opening always be aware of your • observe robber's actions and appearance • Branch employees should go ____ to safe haven • security meeting happens how many times a year • ...
Model UN Vocabulary 2012-11-08
Across
- Rules in which the General Assembly, the Economic and Social Council, the Regional Bodies, the Security Council, and the Historical Security Council
- Limited time a speaker has
- Requires a “Yes” or a “No” from every country
- The primary mean of communication
- When a delegate motions to change the order in which the resolutions are presented
- Aids the Committee in its discussion and formulation or resolutions
- This requires a two-thirds majority in order to go into effect
- A thirty second speech, in which a delegate may request when his/her personal or national integrity has been impugned
- Delegates may move for the suspension or adjournment of all Committee functions whenever the floor is open
- Formal argument in which two sides are expressed
- A rule in which you show respect to the Committee and the other delegates
- A roll call is not required for this
- Not allowed in the Committee room during formal debate or moderated caucus
- This will be taken into consideration of the Committee has more than one Topic Area to discuss
- Yielding to another delegate, to questions, or to the Chair
- the order in which point or motions are presented
Down
- Formal address
- They are held responsible to the Secretary General
- The representation of member states
- This can occur only after the debate on a Topic Area or amendment has been closed
- Must have the approval of the Director and the signatures of 12 members in the General Assembly, 4 members in the Economic and Social Council and Regional Bodies, and 3 members in the Security Council and Historical Security Council.
- A guest-speaker, expert witness, or representative
- When the floor is open, a delegate may call for the postponement of debate on resolution
- Verbal remark expressing one’s opinion
- Oral or written statements made by the Secretary-General or one of the members of the Secretariat
- Temporarily suspends formal debate, allowing members to discuss ideas informally.
- This is introduced when it receives the approval of the Director and is signed by 25 members in the General Assembly, 8 members in the Economic and Social Council and 5 members in the Security Council and Historical Security Council
- A delegate rises to this only when the floor is open to ask the Moderator a question about the Rules of Procedures
- The Secretary General is the last pundit for the validity of this
- Facilitates a debate at specific time periods in the discussion
- List for the Topic Area being discussed
- Decision made by the moderator and with the popular vote of a two-third majority
- When the moderator calls all countries noted by the dais to be in attendance in alphabetical order
- Once it is approved and has been copied and distributed, a delegate my introduce it
34 Clues: Formal address • Limited time a speaker has • The primary mean of communication • The representation of member states • A roll call is not required for this • Verbal remark expressing one’s opinion • List for the Topic Area being discussed • Requires a “Yes” or a “No” from every country • Formal argument in which two sides are expressed • ...
Internet Safety Tips 2024-08-04
9 Clues: Prevent • Security • Step two • Peace of mind • Security helper • Opposite of share • Make more difficult • Avoid identity theft • Who's information hacks you
Abode 2021-07-13
10 Clues: Safety • Loud noise • Hand crafted • Electric eye • Warning sound • Where you live • Takes pictures • Make it your own • A nice company that sells home security systems • A set of things working together as an interconnecting network
Risk Interest Groups 2025-12-05
Across
- Machine learning using deep neural networks with many layers. (2 Words - between words)
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Transforming plaintext into ciphertext using cryptographic keys.
- Model memorizes noise in training data, hurting generalization.
- Security Information and Event Management for log aggregation and analytics.
- — Security model enforcing continuous verification and least privilege
- AI field enabling computers to understand and generate human language. (3 Words - between words)
- Public Key Infrastructure that manages certificates and trust.
- Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
- Trusted entity that issues and validates digital certificates. (2 Words - between words)
- Single software instance serves multiple customers with isolation. (2 Words - between words)
- Automated coordination/management of services, containers, and workloads.
- Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
- Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
- Algorithm that performs encryption and decryption.
- Access Control List defining allowed/denied permissions.
- Cloud model delivering virtualized compute, storage, and networking.
18 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Model memorizes noise in training data, hurting generalization. • Transforming plaintext into ciphertext using cryptographic keys. • ...
Vocabulary Crossword 2 2024-09-19
17 Clues: Zweck • Normen • Umstände • dringlich • einordnen • wahrnehmen • Absicherung • einzigartig • einheitlich • unglaublich • Gemeinschaft • Ungleichheit • Selbstverständnis • Herausforderungen • ehrenamtlich arbeiten • beeinflussen, betreffen • pay gleiche Bezahlung
Acronyms of the Government 2022-10-22
Across
- Replaces the Federal Security Agency.
- Provides military and other means of protection.
- Oversees military actions in six geographical areas
- The main title for the many branches of health and service.
- Collects taxes within the U.S.
- Inspects and grades foods the U.S produces.
- Maintains roads and highways.
- Highest ranking members of the military.
- Protects the oil reserves in the U.S.
- Investigates threats of terrorism.
- Issues weather forecasts.
Down
- Provides safe, affordable housing.
- Insures national security.
- Delivers mail in the U.S.
- Large police organization.
- Provides benefits for veterans and their families.
- Conducts legal business of the U.S government.
- Insures some mortgages private banks make to home owners.
18 Clues: Delivers mail in the U.S. • Issues weather forecasts. • Insures national security. • Large police organization. • Maintains roads and highways. • Collects taxes within the U.S. • Provides safe, affordable housing. • Investigates threats of terrorism. • Replaces the Federal Security Agency. • Protects the oil reserves in the U.S. • Highest ranking members of the military. • ...
WIT 2023-06-12
Across
- Scrambled information into an alternative form that requires a key or password to decrypt the information
- It is a U.S. legislation that establishes standards for the privacy and security of protected health information (PHI).
- popularly known payment card Industry standard
- Top most severity to be fixed at athenahealth
Down
- High priority security issues
- common vulnerability exposures
- The Open Worldwide Application Security Project
- It includes any individually identifiable health information that is created, received, or maintained by a healthcare organization, such as medical records or patient demographics.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- security triad
10 Clues: security triad • High priority security issues • common vulnerability exposures • popularly known payment card Industry standard • Top most severity to be fixed at athenahealth • The Open Worldwide Application Security Project • Scrambled information into an alternative form that requires a key or password to decrypt the information • ...
CAB 2021-05-04
Across
- it happens more than once over a period of time
- someone who is being hurt from a comment of a photo they posted
- someone who stands up for the person getting bullied
- everyone is having fun
- someone who just sits by and dose nothing but watches
- punching kicking spitting
- someone who has experienced being hurt mentally and physically
- someone is being hurt
Down
- there is an intent to hurt or harm
- insulting or unwanted messages
- attracts physically emotionally or socially
- no one is having fun
- intentionally excluding someone from an online group
- the person who is being mean
14 Clues: no one is having fun • someone is being hurt • everyone is having fun • punching kicking spitting • the person who is being mean • insulting or unwanted messages • there is an intent to hurt or harm • attracts physically emotionally or socially • it happens more than once over a period of time • someone who stands up for the person getting bullied • ...
The full Monthy 2019-10-09
18 Clues: joke • reply • torush • gnomes • horror • stupid • benefit • rubbish • serious • blankets • crazyidea • workshift • toincrease • unemployed • punishment • appointment • securityguard • emotions pain pain
Thanksgiving V2 2023-10-30
Across
- Typical pie for fall.
- How many days did the first Thanksgiving last
- Ornamental container shaped like a goat's horn
- Another typical side dish, loved by rabbits.
- Monday after Thanksgiving
- Often the main course of a meal on Thanksgiving
- Attended the first Thanksgiving with the Indigenous American tribe
Down
- Indigenous American tribe that celebrated the first Thanksgiving
- Food comes in a sauce or a jelly
- Site of first Thanksgiving
- Dish either can be sweet or mashed
- Friday after Thanksgiving
- Typical Southern side dish
- Green, French, string are types of these.
- Typically "stuffed" inside a turkey
- Side dish that is cooked slowly in an oven
- Typically poured over mashed potatoes
17 Clues: Typical pie for fall. • Friday after Thanksgiving • Monday after Thanksgiving • Site of first Thanksgiving • Typical Southern side dish • Food comes in a sauce or a jelly • Dish either can be sweet or mashed • Typically "stuffed" inside a turkey • Typically poured over mashed potatoes • Green, French, string are types of these. • Side dish that is cooked slowly in an oven • ...
Algorithms 2024-09-12
Across
- a common port smaller than USB
- safety the practice of protecting yourself online
- the action you take with your mouse
- a programming concept that allows you to repeat a set of instructions
- the smallest unit of data a computer can process (1/0)
- another word for software
- a list of steps needed to complete a task
Down
- The most common type of port
- the practice of protecting computer systems
- The language that tells a computer what to do
- a single simple instruction
- a person who writes code
- A programming error
13 Clues: A programming error • a person who writes code • another word for software • a single simple instruction • The most common type of port • a common port smaller than USB • the action you take with your mouse • a list of steps needed to complete a task • the practice of protecting computer systems • The language that tells a computer what to do • ...
Generative Culture Crossword: Week 4 - Security 2020-10-25
Across
- personnel conducted the fraud activity
- fraud activity intended to deceived victim for financial benefit.
- Metal _______ used as screening equipment to screen personnel.
- Head cover wear by Auxiliary police
- CCTVs is the example of video _____ system (VSS)to improve the parameters monitoring
Down
- Activity conducted by Auxiliary Police to check the INSTEP parameters.
- there are 4 supervisors for every shift which lead by ________
- _______ Minimum Security Standard (M2S2) describes the process for classifying PETRONAS facilities according to criticality.
- weapon stick used by Auxiliary Police.
- Who is the Sergeant for INSTEP Auxiliary Police?
- __________ light installed at patrol vehicle to improve visual presence during patrolling.
- What type of security measures applied when installing CCTVs? (refer to 4D1R concept)
- Installing anti climb wall is referring to what security measures? (refer to 4D1R concept)
13 Clues: Head cover wear by Auxiliary police • personnel conducted the fraud activity • weapon stick used by Auxiliary Police. • Who is the Sergeant for INSTEP Auxiliary Police? • there are 4 supervisors for every shift which lead by ________ • Metal _______ used as screening equipment to screen personnel. • fraud activity intended to deceived victim for financial benefit. • ...
Computer Words 2024-06-17
Across
- the smallest unit of data that a computer can process and store.
- Security- the practice of protecting systems, networks, and programs from digital attacks
- the ability of software and hardware from different sources to work together without having to be altered to do so
- allows devices to communicate with each other without cables or wires.
- a software program used to locate and display information on the Internet or an intranet.
- any unsolicited communication sent in bulk.
- small files of information that a web server generates and sends to a web browser
- used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- a tiny wafer of semiconducting material with an embedded electronic circuit.
- a data measurement unit applied to digital computer or media storage
- System- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- computer systems that are connected to a network and are accessible to users from anywhere at any time
- a unit of data that is eight binary digits long
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- A zip is a file format that can contain multiple files combined and compressed into one file.
Down
- the capacity at which a network can transmit data.
- the use or operation of computers.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- to reload the operating system of a computer:
- an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
- the transmission of high-quality data of wide bandwidth.
- the number of pixels that are displayed per inch for an image
- the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- a set of rules for formatting and processing data.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a computer on a network that provides the interface between two applications or networks that use different protocols
- the logic circuitry that responds to and processes the basic instructions that drive a computer
- device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- files embedded within online communication channels such as emails, instant messages, or social networks
- Any stored data.
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- a type of malware that downloads onto a computer disguised as a legitimate program
- a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- Crime- any criminal activity that involves a computer, network or networked device.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- Space- the amount of data that can reside within the disk drive or storage medium to a maximum limit.
40 Clues: Any stored data. • the use or operation of computers. • any unsolicited communication sent in bulk. • to reload the operating system of a computer: • a unit of data that is eight binary digits long • the capacity at which a network can transmit data. • a set of rules for formatting and processing data. • the transmission of high-quality data of wide bandwidth. • ...
Investment Course Lesson 10 Technical Analysis 1 2023-03-02
Across
- The rise and fall of markets on a repeated basis
- The average selling price of a security over a period of time, adjusted to reflect the most recent trend activities related to the stock in question
- when a security price and moving average crossover each other on the chart, indicating strong or weak investor confidence
- A technique to limit loss by buying more of an asset when the price falls
- A contract where the obligation to buy exists
Down
- shows how two moving averages in a particular security are related
- a narrow or defined classification of a company’s profile
- when the price of a security moves contrary to other data.
- a large section of the overall economy used to identify a company’s profile
- the average selling price of a stock over a period of time
- A contract that gives the buyer the right to buy an underlying asset at a certain price in the future
11 Clues: A contract where the obligation to buy exists • The rise and fall of markets on a repeated basis • a narrow or defined classification of a company’s profile • when the price of a security moves contrary to other data. • the average selling price of a stock over a period of time • shows how two moving averages in a particular security are related • ...
Joshua Crossword Puzzle 2024-11-20
Across
- - A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- - is the process of detecting and preventing illegal or unauthorized use of a computer
- - is ensuring that the information is accessible to authorized persons when required without delay.
- - includes the applications on the computers and operating system.
- theft - Any action of stealing information from a users system.
- - An individual who breaks into computer systems to steal, change, or destroy information.
- - An action or event that has the potential to compromise and/or violate security.
Down
- - A defined method of breaching the security of an IT system through vulnerability.
- - refers to protecting personnel, hardware, programs, networks, and data from physical threats.
- Any action derived from intelligent threats to violate the security of the system.
- preventing intruders from accessing any part of a computer system.
11 Clues: theft - Any action of stealing information from a users system. • - includes the applications on the computers and operating system. • preventing intruders from accessing any part of a computer system. • Any action derived from intelligent threats to violate the security of the system. • ...
Cisco Enterprise Networking and DC In-depth 2020-07-31
Across
- Routing & Switching Cisco competitor?
- Using multiple cloud services?
- SDN/SDWAN Cisco competitor?
- Unified intent-based networking architecture?
- type of switch that makes scaling the network easier?
- UCS Competitor of Cisco?
- SDN/SDWAN Cisco competitor?
- Common security problem with data centers?
- DC Storage competitor of Cisco?
Down
- DC Security competitor of Cisco?
- Routing & Switching Cisco competitor?
- Simplify the number of devices connected?
- UCS Competitor of Cisco's product line?
- Catalyst 3000 came from what company?
- Cisco's popular brand of network switches, wirleess controllers, and access points?
- DC Networking competitor of Cisco?
16 Clues: UCS Competitor of Cisco? • SDN/SDWAN Cisco competitor? • SDN/SDWAN Cisco competitor? • Using multiple cloud services? • DC Storage competitor of Cisco? • DC Security competitor of Cisco? • DC Networking competitor of Cisco? • Routing & Switching Cisco competitor? • Routing & Switching Cisco competitor? • Catalyst 3000 came from what company? • ...
Lesson 2 Word 2022-03-28
Great Depression Word search 2024-10-24
ICS puzzle 2023-12-12
Across
- the process of converting coded or encrypted data to its original form.
- attempts by hackers to cause harm, destroy, or access sensitive information in a computer system.
- Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- a form of malware that distributes itself by transferring copies of itself to other computers across the network.
- attack swamps a website with so much traffic that it simply can’t cope
- a technique used by threat actors to leverage a vulnerability in order to compromise a system.
- a activity when cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
- a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
- A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
- an identity verification process
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
- A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Down
- a program used to prevent, identify, and remove viruses and other malicious software from your computer.
- A copy of files and programs made to facilitate recovery, if necessary.
- an email-based threat that tries to coerce the victim into clicking on a link in an email or opening an attachment that has arrived by email.
- perform simulated cyberattacks on computer systems and networks to help identify security vulnerabilities and weaknesses.
- a modern security strategy based on the principle never trust, always verify.
- a network security device, it creates a barrier between a trusted network and an untrustworthy network.
- A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
- A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.
- Disclosure of information to unauthorized persons, or a violation of the security policy of a system.
- Unauthorized act of bypassing the security mechanisms of a system.
- Any circumstance or event with the potential to adversely impact organizational operations.
- an encrypted internet connection to provide a secure connection.
- a part of the World Wide Web only accessible through special software or tools, where keeps its users and visitors hidden.
- An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
- an unintended software or hardware problem
- An attack on the authentication protocol run in which the Attacker positions himself in between the Claimant and Verifier so that he can intercept and alter data traveling between them.
28 Clues: an identity verification process • an unintended software or hardware problem • an encrypted internet connection to provide a secure connection. • Unauthorized act of bypassing the security mechanisms of a system. • attack swamps a website with so much traffic that it simply can’t cope • A copy of files and programs made to facilitate recovery, if necessary. • ...
RU ITEC411 Chapter 5 Crime and Security 2026-03-11
Across
- Security system to block unwanted stuff
- Scamming people through fake text messages
- Scamming people through fake phone calls
- Law that makes unauthorized access illegal
- Mixing information up so its unable to be read
- Fake system to study hackers
- Damaging / breaking into a computer network
- Providing identification to access
- Identifying someone using face scan or fingerprints
Down
- Harmful program on your computer
- Scamming people through fake emails
- Protecting devices from everything
- Impersonating someone with their information
- Computer program that spreads through devices
- Scamming people through fake redirecting websites
- Hacking but used for political issues
- Investigating computers for evidence for a crime
- Breaking into a computer without permission
- Stealing money using fake information
19 Clues: Fake system to study hackers • Harmful program on your computer • Protecting devices from everything • Providing identification to access • Scamming people through fake emails • Hacking but used for political issues • Stealing money using fake information • Security system to block unwanted stuff • Scamming people through fake phone calls • ...
1a 2025-09-15
19 Clues: @ • ige • pont • állam • alany • főnév • tárgy • segédige • határozó • kérdőszó • melléknév • biztonság • kezdőbetűk • irányítószám • Hollandia (Holland) • az ige szótári alakja • vezetéknév (last name) • személyi igazolvány (2) • szolgáltatás, kiszolgálás,
Chapter 8 - System Access 2023-03-21
Across
- Permissions listed on an access control list (ACL) that are granted to a user. ACEs can be Allow or Deny. They can be assigned explicitly or inherited.
- The level of permissions that have been granted to a user who has been authenticated to a system.
- An object that contains security credentials. In Windows, it includes the user's security ID (SID) as well as the SID for each security group the user is a member.
- A method of authentication for which the user creates an online user account with Microsoft. Each time the user signs into the local system, Windows submits the credentials over the internet to Microsoft for authentication.
- The generally accessible key in a cryptographic system. It is used to encrypt data and is stored within a certificate. It cannot be used to decrypt the data.
- The security process in which the client authenticates to the server and, before data is exchanged, the server authenticates back to the client.
- A security feature that can be configured in the Windows sign-in settings to automatically lock a computer when the user walks away. It requires a Bluetooth device (typically a smartphone) that can be connected to the workstation.
- A collection of access rights, usually connected with an employee's responsibilities in an organization.
- A text string or regular expression used to scan files for matches.
- Rules that include a condition that must be matched for permission assignments to be made.
- The key that is used to decrypt data in a cryptographic system. It is stored in a private certificate store and should be protected and not shared.
- A group of users who have complete and unrestricted access to the system and accounts.
- In Windows, the ability to set policies that will provide feedback on specified events within a host or network.
- An action a user can perform on a system. Group Policy provides a set of predefined rights.
- Permissions granted to files or subfolders based on the permissions assigned to a parent folder.
- A method of authentication that stores on the local system the usernames and passwords for each user.
Down
- Microsoft's virtualization machine creation software that can create software-based virtual computers within a Windows system.
- A setting or group of settings applied to a user or computer. Polices are configured using Group Policy on the local computer or in the domain.
- A process of translating data into an unreadable format or code to prevent unauthorized access to the data.
- A permission uses an allow or deny statement to control user access to resources.
- A Windows feature that uses virtualization extensions of the central processing unit. It is used to protect data in memory from malicious attacks.
- A feature of Windows server systems that allows the system administrator to centralize control of access to files and folders based on file and folder attributes in combination with the attributes of the user.
- The security process in which the client authenticates to the server before the server will send data back to the client.
- A method of authentication that stores the usernames and passwords on a remote computer within the network that is configured as a domain controller.
- A device you can buy from a retailer for authentication. It can be configured in Windows for use as an additional sign-in option.
- A Windows encryption feature that is used on full volumes and cannot be used on individual files or folders.
- In Windows auditing, a setting in an auditing policy that turns on the logging of events in a host or network.
- A list of permissions granted to users and groups. The permissions are associated with an NTFS file or folder.
- A list of central access rules that define the level of access a user has to data managed by DAC.
- A collection of users that, by default, has very minimal access to the system.
- The creator of a file or folder who, by default, has full access.
- A Windows sub-security process that authenticates to the local system, stores security-related information, and creates access tokens.
- Security features that restrict or allow user access to resources on the system.
- A component of the Windows operating system that helps protect the system during the start-up or boot process.
- A biometric logon system incorporated into Windows 10 sign-in settings.
- In Windows auditing, a setting that turns off an auditing policy.
- Verifying that an entity requesting credentials is the entity associated with the credentials. It is also called identity proofing.
37 Clues: The creator of a file or folder who, by default, has full access. • In Windows auditing, a setting that turns off an auditing policy. • A text string or regular expression used to scan files for matches. • A biometric logon system incorporated into Windows 10 sign-in settings. • A collection of users that, by default, has very minimal access to the system. • ...
AppSec Village @ BlueHat India 2024-01-18
Across
- A script that's cross, but not because it's angry
- A token of security, not a medieval pledge of fealty
- A case of mistaken identity, but for cloud resources
- A web menace that's not a cookie monster, but might use one
- A directory in the cloud, not a phonebook
- A bouncer for cloud services, checking IDs at the door
- A casting director for cloud access, assigning roles, not actors
Down
- A central hub for cloud safety, not a mall cop station
- Where secrets are locked away, not in a pirate's chest
- Not just a catwalk for risks, it's a blueprint for defense
- A security check that's more of a poke around than a full physical
- A blend of development, security, and operations - shaken, not stirred
- It's a scramble, but not for breakfast
13 Clues: It's a scramble, but not for breakfast • A directory in the cloud, not a phonebook • A script that's cross, but not because it's angry • A token of security, not a medieval pledge of fealty • A case of mistaken identity, but for cloud resources • A central hub for cloud safety, not a mall cop station • Where secrets are locked away, not in a pirate's chest • ...
The Thrilling Puzzle Climax Of K Collins' Computer Science Lessons 2023-05-04
Across
- What car manufacturer made the first modern driverless car
- Data should not be kept longer than
- Who is exempt from the data protection act
- All personal data should be kept
- The owner of the data
Down
- The DPA has 8
- Police, Government and Taxers all all ______ from the DPA
- A form of cyber-bullying
- Data must be routinely for maximum protection
- Data should be used
10 Clues: The DPA has 8 • Data should be used • The owner of the data • A form of cyber-bullying • All personal data should be kept • Data should not be kept longer than • Who is exempt from the data protection act • Data must be routinely for maximum protection • Police, Government and Taxers all all ______ from the DPA • What car manufacturer made the first modern driverless car
English Holiday HomeWork Mohamed Asharaful Part 1 2021-08-28
Across
- Poverty, SDG goal against poverty.
- Water and Sanitization, Lacking in cleanliness and water.
- Responsibility, Responsible posts and appropriate posts against any sensitive topic.
- Education, SDG goal for good education.
- A chance for next generation.
- Life, Non polluted life for animals in land.
- People who use internet to bully people psychologically.
Down
- For the next generation.
- For the transportation.
- Life, Non-Polluted life under the water.
10 Clues: For the transportation. • For the next generation. • A chance for next generation. • Poverty, SDG goal against poverty. • Education, SDG goal for good education. • Life, Non-Polluted life under the water. • Life, Non polluted life for animals in land. • People who use internet to bully people psychologically. • Water and Sanitization, Lacking in cleanliness and water. • ...
7cf nachhol 2024-01-13
Across
- a group of people who sing
- to suddenly talk to somebody in a aggressive way: to ...
- verb for behaviour: to ...
- something you can carry injured people with
- to say something nasty about someone online: cyber ...
Down
- a very high building
- ... to a survey, children use their mobile phones too often
- English for "besonders"
- another word for "most of the time"
- noun of "to use"
10 Clues: noun of "to use" • a very high building • English for "besonders" • a group of people who sing • verb for behaviour: to ... • another word for "most of the time" • something you can carry injured people with • to say something nasty about someone online: cyber ... • to suddenly talk to somebody in a aggressive way: to ... • ...
social media and mental health 2024-04-19
Across
- platform made by meta
- online, perhaps
- mean action done by one or more people to another group or person
- a feeling related to sunshine and the color yellow
- slow exercise that helps with flexibility and calming
Down
- people use this to talk about their feelings
- social media users make these
- prolonged sadness
- quiet activity to help clear and calm the mind
- severe worrying
10 Clues: online, perhaps • severe worrying • prolonged sadness • platform made by meta • social media users make these • people use this to talk about their feelings • quiet activity to help clear and calm the mind • a feeling related to sunshine and the color yellow • slow exercise that helps with flexibility and calming • ...
Technogley 2025-01-16
Across
- the brain of your computer
- it capulises your words
- it makes your computer have sound
- it can tern your computer on and of
- bullying
Down
- it macks your crombook eseer or harder to here
- helps you find things you don't know
- it deletes letters of your screens
- how you connect internet to a phone, tablet or computer
- saver photos and words and letters
10 Clues: bullying • it capulises your words • the brain of your computer • it makes your computer have sound • it deletes letters of your screens • saver photos and words and letters • it can tern your computer on and of • helps you find things you don't know • it macks your crombook eseer or harder to here • how you connect internet to a phone, tablet or computer
Hass im Netz 2025-05-16
Across
- Vorsilbe für alles, was im Internet passiert.
- So nennt man einen Beitrag in sozialen Netzwerken.
- Person, die im Netz absichtlich provoziert.
- Damit sichert man Beweise bei Cybermobbing.
- Beleidigende oder hetzerische Sprache im Netz.
Down
- Diese sollte man auch im Netz schützen.
- Im Internet oft ohne echten Namen unterwegs.
- Welle negativer Kommentare im Netz.
- So schützt man sich vor Belästigung online.
- Online-Kommunikation in Echtzeit.
10 Clues: Online-Kommunikation in Echtzeit. • Welle negativer Kommentare im Netz. • Diese sollte man auch im Netz schützen. • So schützt man sich vor Belästigung online. • Person, die im Netz absichtlich provoziert. • Damit sichert man Beweise bei Cybermobbing. • Im Internet oft ohne echten Namen unterwegs. • Vorsilbe für alles, was im Internet passiert. • ...
Cisco Enterprise Networking and Data Center Indepth 2020-07-31
Across
- Routing & Switching Cisco competitor?
- Using multiple cloud services?
- SDN/SDWAN Cisco competitor?
- Unified intent-based networking architecture?
- type of switch that makes scaling the network easier?
- UCS Competitor of Cisco?
- SDN/SDWAN Cisco competitor?
- Common security problem with data centers?
- DC Storage competitor of Cisco?
Down
- DC Security competitor of Cisco?
- Routing & Switching Cisco competitor?
- Simplify the number of devices connected?
- UCS Competitor of Cisco's product line?
- Catalyst 3000 came from what company?
- Cisco's popular brand of network switches, wirleess controllers, and access points?
- DC Networking competitor of Cisco?
16 Clues: UCS Competitor of Cisco? • SDN/SDWAN Cisco competitor? • SDN/SDWAN Cisco competitor? • Using multiple cloud services? • DC Storage competitor of Cisco? • DC Security competitor of Cisco? • DC Networking competitor of Cisco? • Routing & Switching Cisco competitor? • Routing & Switching Cisco competitor? • Catalyst 3000 came from what company? • ...
1989-Present Day 2026-01-20
Across
- Taxes on imported goods
- UN intervention in 1990s Africa (7,3)
- Current U.S. President
- Air travel security screening (2,4,4)
- Former dictator of Libya
- PM of Canada during COVID
- Started the War on Terror
- The fall of this symbolized the end of Cold War
Down
- NAFTA was replaced by this in 2020
- Post-9/11 security laws (7,3)
- 1991 end of this communist superpower (6,5)
- Mass displacement from Middle East conflicts (7,6)
- He signed NAFTA
- 2010 Middle East uprisings (4,6)
14 Clues: He signed NAFTA • Current U.S. President • Taxes on imported goods • Former dictator of Libya • PM of Canada during COVID • Started the War on Terror • Post-9/11 security laws (7,3) • 2010 Middle East uprisings (4,6) • NAFTA was replaced by this in 2020 • UN intervention in 1990s Africa (7,3) • Air travel security screening (2,4,4) • 1991 end of this communist superpower (6,5) • ...
Safer Internet 2020-04-01
Across
- Person die sich als eine andre ausgibt.
- Beweise zu sichern wäre auch sehr vorteilhaft
- niedrige Preise heißen auch .....preise.
- Gegenteil von offline.
- Es gibt Vorteile im Internet, aber auch ....
Down
- Beim Phishing versucht man deine .... zu bekommen.
- Deine ...... solltest du schützen.
- Unter Cyber-Mobbing versteht man das ......,Bedrohen,Belästigen und Bloßstellen einer Person
- Damit bezahlst du in bar.
9 Clues: Gegenteil von offline. • Damit bezahlst du in bar. • Deine ...... solltest du schützen. • Person die sich als eine andre ausgibt. • niedrige Preise heißen auch .....preise. • Es gibt Vorteile im Internet, aber auch .... • Beweise zu sichern wäre auch sehr vorteilhaft • Beim Phishing versucht man deine .... zu bekommen. • ...
KI-Betrug: Die neuen Tricks der Cyberkriminellen 2025-03-28
Across
- - Was Phishing-E-Mails verwenden, um Sie auszutricksen.
- – Das solltest du tun, bevor du jemandem vertraust.
- - Fälschen einer E-Mail oder Telefonnummer.
- - Die Technologie hinter diesen neuen Betrügereien.
Down
- – Wenn geheime Daten plötzlich öffentlich sind.
- - Eine Sicherheitsfalle für Cyber-Kriminelle (engl.).
- - Ein realistisches, aber gefälschtes Video.
- - KI kann dies mit Stimmen tun.
- – Wenn jemand dich absichtlich täuscht.
9 Clues: - KI kann dies mit Stimmen tun. • – Wenn jemand dich absichtlich täuscht. • - Fälschen einer E-Mail oder Telefonnummer. • - Ein realistisches, aber gefälschtes Video. • – Wenn geheime Daten plötzlich öffentlich sind. • – Das solltest du tun, bevor du jemandem vertraust. • - Die Technologie hinter diesen neuen Betrügereien. • ...
Literasi Digital 2024-08-15
Across
- Nama lain dari kata sandi
- Aktivitas yang dilakukan seseorang secara daring untuk mengganggu atau menyakiti orang lain
- Kejahatan didunia digital disebut cyber
- Keamanan sangat penting untuk menjaga
Down
- Nama lain dari perangkat lunak
- Manfaat literasi digital untuk menambah
- Negara yang memiliki tingkat literasi digital yang tinggi
- HAKI terbagi menjadi berapa bagian
- Tombol untuk membatalkan tindakan di komputer
9 Clues: Nama lain dari kata sandi • Nama lain dari perangkat lunak • HAKI terbagi menjadi berapa bagian • Keamanan sangat penting untuk menjaga • Manfaat literasi digital untuk menambah • Kejahatan didunia digital disebut cyber • Tombol untuk membatalkan tindakan di komputer • Negara yang memiliki tingkat literasi digital yang tinggi • ...
Profiles 1 text 1 Santeri 2014-12-03
15 Clues: jono • alue • esine • kantaa • tavara • romaani • osoittaa • miehistö • lentokone • matkustaa • juutalainen • välttämätön • vastakkainen • turvallisuus • olla pahoillaan
Profiles 1 text 1 Santeri 2014-12-03
15 Clues: jono • alue • esine • tavara • kantaa • romaani • osoittaa • miehistö • matkustaa • lentokone • juutalainen • välttämätön • vastakkainen • turvallisuus • olla pahoillaan
Daily Vocabularies 2024-01-20
15 Clues: terang • masalah • melihat • menarik • penting • menerima • bertahan • keamanan • merayakan • kebenaran • bermanfaat • pemerintah • percaya diri • membayangkan • membandingkan
Stay Smart Online 2023-01-05
Across
- Stay _________ in Cyberspace.
- Always remember to ______ your accounts from other's devices.
- Do not share your ______ with anyone.
- Report any cases of _______ to Cyber crime department.
Down
- Respect the _________ laws
- Never share personal details on __________
- Be aware of _____ while shopping online.
- Apply _______ settings in Whatsapp to safeguard your data.
8 Clues: Respect the _________ laws • Stay _________ in Cyberspace. • Do not share your ______ with anyone. • Be aware of _____ while shopping online. • Never share personal details on __________ • Report any cases of _______ to Cyber crime department. • Apply _______ settings in Whatsapp to safeguard your data. • Always remember to ______ your accounts from other's devices.
DE TOPIC 1 2025-08-03
Across
- utilising software and digital and technologies
- Operates online
- Follow islamic principles and ethics
- Focus on physical good and services
Down
- Create positive societal impact
- Integration of cyber-physical systems, IoT, AI and data analitics
- Focused on mass production and global market
- Focused on sustainability and environment conservation
8 Clues: Operates online • Create positive societal impact • Focus on physical good and services • Follow islamic principles and ethics • Focused on mass production and global market • utilising software and digital and technologies • Focused on sustainability and environment conservation • Integration of cyber-physical systems, IoT, AI and data analitics
Technology Vocabulary 2022-01-21
Across
- involving,using,or relating to the internet
- a person who has grown up with digital tech
- someone who dislikes new technology
- a discovery that really improves a situation
- to move something forward,or improve something
- a way something can be used for a purpose
Down
- important change in the way people do things
- to cause a change in someone or something
- the most modern stage of development
- the use of a new idea or method
- to start to happen or exist
- to continue gradually
12 Clues: to continue gradually • to start to happen or exist • the use of a new idea or method • someone who dislikes new technology • the most modern stage of development • to cause a change in someone or something • a way something can be used for a purpose • involving,using,or relating to the internet • a person who has grown up with digital tech • ...
malware 2023-06-19
Across
- sending emails or messages as fake company
- a word to keep your things safe
- fishing pretending to be a different person
- control lets parents set the settings on a device
- fraud a scam online
- a type of malware that downloads onto a computer
- mail emails that a useless
Down
- a program that breaks your device
- A computer program that can run independently
- allows users to convert information
- leaving a trace online
- when a person winds another up online
12 Clues: fraud a scam online • leaving a trace online • mail emails that a useless • a word to keep your things safe • a program that breaks your device • allows users to convert information • when a person winds another up online • sending emails or messages as fake company • fishing pretending to be a different person • A computer program that can run independently • ...
Digital Strategy 2025-11-03
Across
- predicting future demand for products
- software for managing business processes.
- Raw facts and figures used for analytics
- the process of sourcing and purchasing goods or services.
- monitoring the movement of goods.
- operating on an international scale
Down
- Network of suppliers, manufacturers and costumers
- Protecting systems and data from cyber threats
- Technology enabling remote access to computing resources
- a measurable value to evaluate performance.
- Automated tool that interacts with users via text or voice
- Step-by-step procedure for solving a problem
12 Clues: monitoring the movement of goods. • operating on an international scale • predicting future demand for products • Raw facts and figures used for analytics • software for managing business processes. • a measurable value to evaluate performance. • Step-by-step procedure for solving a problem • Protecting systems and data from cyber threats • ...
Phish 2024-09-18
Across
- : “Too good to be true”
- : Familiar ___ are often faked by scammers
- Link : Imposter website
- for help : Sense danger?
- : Who should learn how to recognize and avoid (phishing)?
- Breach : Exposes business secrets and confidential data
Down
- Criminal : A stranger in a dark alley is much like a _____ in your inbox.
- : Where to find additional information on the different types of (phishing)
- : Malicious email attack
- : Compromises computer and files
- Credentials : Never send these via email
- : “Think Before You ___”
- Phish : Who do you report suspicious email to?
13 Clues: : “Too good to be true” • Link : Imposter website • : Malicious email attack • : “Think Before You ___” • for help : Sense danger? • : Compromises computer and files • Credentials : Never send these via email • : Familiar ___ are often faked by scammers • Phish : Who do you report suspicious email to? • Breach : Exposes business secrets and confidential data • ...
Networking and Cyber Ethics 2025-06-11
Across
- Sending unwanted emails or advertisements
- Speech Avoiding this keeps others safe from harm online
- Misleading information shared online
- A program designed to harm a computer
- Using someone else's work without giving credit
- The act of bullying others using digital devices
- These guide our behavior on the internet
- Taking credit for someone else's work
- The illegal copying of software
Down
- When someone pretends to be someone else online
- A person who uses technology to harm or steal
- Making changes to software without permission
- Strong word or phrase used to protect accounts
- Being honest and fair online
- Using fake identity to cheat or harm online users
- Using the internet in a respectful and legal way
- Keeping your personal data safe
- You should always think before you do this on social media
- Theft Type of theft involving personal data
19 Clues: Being honest and fair online • Keeping your personal data safe • The illegal copying of software • Misleading information shared online • A program designed to harm a computer • Taking credit for someone else's work • These guide our behavior on the internet • Sending unwanted emails or advertisements • Theft Type of theft involving personal data • ...
Stock Market Terms 2020-05-19
Across
- is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
- the price a seller is willing to accept for a security [1 wrd]
- is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
- is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
- a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
- is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
- a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
- to obtain in exchange for payment[1 wrd]
- the availability of liquid assets to a market or company [1 wrd]
- an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
- is the completion of a buy or sell order for a security. [1 wrd]
- is the last price at which a security or commodity traded [1 wrd]
- is a portmanteau of foreign currency and exchange. [1wds]
- A bear market is when a market experiences prolonged price declines. [2wds]
- refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
- give or hand over something in exchange for currency [ 1 wrd]
- is defined as the purchase and sale of a security within a single trading day. [2 wds]
- is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
- is the total quantity of shares or contracts traded for a specified security. [2wds]
- refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
- is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
- an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
- sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
- is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
- is a unique series of letters assigned to a security for trading purposes. [1 wrd]
- the number of shares that a corporation is legally allowed to issue[2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
- is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
- refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
- refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
- involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
- is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
- is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
- a range of investments held by a person or organization. [1 wrd]
- is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
- offer a certain price for something especially at an auction [ 1wrd]
- is a measurement of market risk or volatility .[1 wds]
- A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
- the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
40 Clues: to obtain in exchange for payment[1 wrd] • is a measurement of market risk or volatility .[1 wds] • is a portmanteau of foreign currency and exchange. [1wds] • give or hand over something in exchange for currency [ 1 wrd] • the price a seller is willing to accept for a security [1 wrd] • the availability of liquid assets to a market or company [1 wrd] • ...
Stock Market Terms 2020-05-21
Across
- is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
- the price a seller is willing to accept for a security [1 wrd]
- is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
- is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
- a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
- is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
- a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
- to obtain in exchange for payment[1 wrd]
- the availability of liquid assets to a market or company [1 wrd]
- an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
- is the completion of a buy or sell order for a security. [1 wrd]
- is the last price at which a security or commodity traded [1 wrd]
- is a portmanteau of foreign currency and exchange. [1wds]
- A bear market is when a market experiences prolonged price declines. [2wds]
- refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
- give or hand over something in exchange for currency [ 1 wrd]
- is defined as the purchase and sale of a security within a single trading day. [2 wds]
- is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
- is the total quantity of shares or contracts traded for a specified security. [2wds]
- refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
- is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
- an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
- sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
- is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
- is a unique series of letters assigned to a security for trading purposes. [1 wrd]
- the number of shares that a corporation is legally allowed to issue[2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
- is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
- refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
- refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
- involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
- is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
- is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
- a range of investments held by a person or organization. [1 wrd]
- is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
- offer a certain price for something especially at an auction [ 1wrd]
- is a measurement of market risk or volatility .[1 wds]
- A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
- the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
- is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
40 Clues: to obtain in exchange for payment[1 wrd] • is a measurement of market risk or volatility .[1 wds] • is a portmanteau of foreign currency and exchange. [1wds] • give or hand over something in exchange for currency [ 1 wrd] • the price a seller is willing to accept for a security [1 wrd] • the availability of liquid assets to a market or company [1 wrd] • ...
Safety and Security 2016-03-15
Across
- Business names, Garda arival, coin order, cash amounts transfered
- Bundling/Clipping money and keeping drawer____
- Processes and methodologies designed to protect sensitive information
- Have a password protect _____ for all private information
- Locking your _____ anytime you walk away from station
- If you leave our desk/computer do this
- Limit for bottom drawer
- Keep your security codes ____
Down
- Limit for top drawer
- Before you leave at night do this to your workstation PC
- Handwritten notes, documents, account numbers
- Print, Electronic, Verbal
- None of these items in your drawer
- Email, OSI, Velocity, Online check orders
14 Clues: Limit for top drawer • Limit for bottom drawer • Print, Electronic, Verbal • Keep your security codes ____ • None of these items in your drawer • If you leave our desk/computer do this • Email, OSI, Velocity, Online check orders • Handwritten notes, documents, account numbers • Bundling/Clipping money and keeping drawer____ • ...
2021 Q4 Security 2021-12-15
Across
- Use the ____ button when you receive a 'sus'email
- Number of people that are emailed when we call 911
- The company that monitors our alarms
- ____, hide, neutralize in an active shooter situation
- Packet in vault room with specific instructions
- ___ with all demands of the robber
Down
- When safe to do so press your ____ buttons
- To call 911 dial _-911
- Never write down or share _____
- In the event of a fire, ____ mbr sensitive info
- Always leave the building in ____
- Packet under the phone
- ___ parking lot is our Secondary Meeting Spot
- Great ___ is our best robbery deterrent
14 Clues: To call 911 dial _-911 • Packet under the phone • Never write down or share _____ • Always leave the building in ____ • ___ with all demands of the robber • The company that monitors our alarms • Great ___ is our best robbery deterrent • When safe to do so press your ____ buttons • ___ parking lot is our Secondary Meeting Spot • ...
Q4 Security Training 2023-12-20
Across
- When safe to do so, we should activate the _____ or/and observe the robber's escape route.
- thousand What is the amount dispensed during a robbery from the TCR?
- To preserve evidence of a not pass robbery, drop the note on the ____ or leave it at your station.
- The type of form filled out when observing a robber.
- Person responsible for advising members of a robbery situation.
- All Media inquires go to this department.
- Most bomb threats and extortion are received this way.
- These eight items around the branch can help alert security that a robbery has occurred.
Down
- Person responsible for shouting "I've been robbed, Lock the doors!"
- The practice of obtaining something, especially money, through force of threats.
- When calling 911, we call from an RBFCU ____ ____.
- This form provides the following information: Contact names, instructions for branch employees on what to do during and after a robbery, and phone numbers.
- Behavior to keep during a robbery is to ___ _____ and avoid sudden movements.
- Keys to press for dispense procedure.
14 Clues: Keys to press for dispense procedure. • All Media inquires go to this department. • When calling 911, we call from an RBFCU ____ ____. • The type of form filled out when observing a robber. • Most bomb threats and extortion are received this way. • Person responsible for advising members of a robbery situation. • ...
Information Security Awareness 2020-09-24
Across
- This is better and harder to crack than a password
- The type of email to get you to click on a fraudulent link
- Disclosing personal member information may be
- The best response to password Recovery Questions is
- engineering,How might someone evil try to get information from you
- Someone that follows closely behind you without using their badge
- Minimum number of characters for a network password
- What is not allowed in a DNA password
- This is better and harder to crack than a password
- If I click on a link I believe was malicious I should
Down
- How do you think most evil hackers begin to break into a company’s network?
- What is the default data classification
- The data classification for Employee Handbook, internal phone directory
- Best way to keep track of multiple unique passwords
- Who is responsible for data security
15 Clues: Who is responsible for data security • What is not allowed in a DNA password • What is the default data classification • Disclosing personal member information may be • This is better and harder to crack than a password • This is better and harder to crack than a password • The best response to password Recovery Questions is • ...
Puzzle #10 – “Direct Deposit” 2025-06-29
Across
- - Agency that sets up your Social Security payments
- - Direct deposit is this compared to mailing checks
- - Electronic way to receive Social Security benefits
- - You must have this to receive direct deposit
- - Where your Social Security check is usually sent
Down
- - The method used instead of paper checks
- - How payments are delivered once direct deposit is set up
- - One reason direct deposit is recommended
- - Type of account where deposits often go
- - This number helps send money to the right bank
10 Clues: - The method used instead of paper checks • - Type of account where deposits often go • - One reason direct deposit is recommended • - You must have this to receive direct deposit • - This number helps send money to the right bank • - Where your Social Security check is usually sent • - Agency that sets up your Social Security payments • ...
CyberDSA D2 2025-08-14
Across
- Encrypted network connection over the internet for secure communication.
- Software that secretly collects user information.
- Security Operations Center that monitors and responds to threats.
- Process of verifying the identity of a user or system.
- Copy of data kept for recovery in case of loss.
Down
- Process of converting data into a secure, unreadable format.
- Secret string used to authenticate a user.
- Software update designed to fix security vulnerabilities.
- Network security device that filters incoming and outgoing traffic.
- Malicious program that can copy itself and infect systems.
10 Clues: Secret string used to authenticate a user. • Copy of data kept for recovery in case of loss. • Software that secretly collects user information. • Process of verifying the identity of a user or system. • Software update designed to fix security vulnerabilities. • Malicious program that can copy itself and infect systems. • ...
Delirium (section 2) 2015-05-07
Across
- Lena's pretty best friend.
- The color of a storm cloud.
- A house on a farmstead.
- The name for the disease of love.
- A word for security watching people.
- Library of approved books.
- Lena's aunt's name.
- A live music show.
Down
- People who live in the wilds.
- Separation of people based on prejudice.
- A vision you have while sleeping.
- A certain time for someone to be home.
- Where Alex takes his classes(University of Portland).
- People who patrol the streets after curfew.
- A place where science experiments are conducted.
- A solution to a sickness.
- Main character.
- Security gaur who Hana and Lena get caught by.
- Alex has a 3 pronged _____ on the side of his head.
- Library of authorized music.
20 Clues: Main character. • A live music show. • Lena's aunt's name. • A house on a farmstead. • A solution to a sickness. • Lena's pretty best friend. • Library of approved books. • The color of a storm cloud. • Library of authorized music. • People who live in the wilds. • A vision you have while sleeping. • The name for the disease of love. • A word for security watching people. • ...
Compliance Division 2024-02-07
Across
- Elevated __________
- Plays in a band
- Wrong 50% of the time
- Must agree on 3-way
- Email requiring action
- Where to send outstanding transactions
- Warning
- AKA True-up
- A monthly charge
- Fitness Enthusiast
- May hold Security Deposits
- For owner or tenant
- Where the bad ones go
- Loves Indy
- OK if Agreed to in PMA
- Part I _______
- Software
- Type of account
Down
- Often missing from Check Register
- Monthly Requirement
- When all three parts equal
- Often refundable
- Rentals we don't want to see in a CTA
- Money holder
- Pays the security deposit
- Makes the best cookies
- Mixed funds
- When records are not received
- Take me to your leader
- Not allowed to come out of a CTA
30 Clues: Warning • Software • Loves Indy • AKA True-up • Mixed funds • Money holder • Part I _______ • Plays in a band • Type of account • Often refundable • A monthly charge • Fitness Enthusiast • Elevated __________ • Monthly Requirement • Must agree on 3-way • For owner or tenant • Wrong 50% of the time • Where the bad ones go • Email requiring action • Makes the best cookies • OK if Agreed to in PMA • ...
LIVEABILITY CROSSWORD 2025-03-17
Across
- A community need for teenagers.
- Contaminates in the air, water or land.
- Commerce, trade and enterprise.
- Dentists, hospital, ambulance availability
- Train transport.
- Weather patterns and conditions. Temperature.
- A good government that is stable provides...
- Most people's preferred climate.
- Essentials structures and systems for a community
Down
- Childcare, TAFE, university, schools.
- The way people do life and experiences together
- Protection, security, well-being
- A place for healing and caring for the sick.
- Breaking of laws that make areas unsafe to live in.
- Purity of the air and atmosphere in a community.
- The qualities of a place that make it comfortable and suitable for living
- Leadership of communities.
- The business of selling goods to the public.
- Used for domestic and international travel.
- Worship, prayer, gathering
20 Clues: Train transport. • Leadership of communities. • Worship, prayer, gathering • A community need for teenagers. • Commerce, trade and enterprise. • Protection, security, well-being • Most people's preferred climate. • Childcare, TAFE, university, schools. • Contaminates in the air, water or land. • Dentists, hospital, ambulance availability • ...
IT Terms 2025-05-15
Across
- Internet-based delivery of IT resources.
- Software to manage customer interactions.
- Two-symbol system used by computers.
- Computer system within a larger system.
- Plan for continuing business during disruption.
- Simulates human intelligence in machines.
- Processes and executes instructions (abbr).
- Network of physical devices sharing data.
- Unique address for a device on a network.
- Device connected to a network.
- Visual interface with icons and menus.
- Tech and strategy for analyzing business data.
Down
- Stores data temporarily for quick access.
- Organized collection of electronic data.
- Protects systems from digital threats.
- Converts data into code for security.
- Group of connected computers sharing rules.
- Security device that filters traffic.
- Finding and fixing code issues.
- Set of rules for communication between software components.
20 Clues: Device connected to a network. • Finding and fixing code issues. • Two-symbol system used by computers. • Converts data into code for security. • Security device that filters traffic. • Protects systems from digital threats. • Visual interface with icons and menus. • Computer system within a larger system. • Internet-based delivery of IT resources. • ...
Investing - Grace Lewis 2026-04-02
Across
- rising “up” market
- Someone that buys and sells stocks
- Something an employer does to complement your pay.
- gained from giving a loan to the government
- Max amount a company can have
- Loan to the government or company
- Age to receive social security benefits
- Wide range of stocks
- Something that affects stock inside a company
- Multiple companies in multiple stocks
- A share of a company
Down
- Putting money into stocks in increments no matter the status of the stock
- Place to buy stocks
- A specific place to store money for a specific purpose
- Someone that own stocks
- Social security and Medicare together
- Payment to shareholders usually quarterly
- Something that affects a company’s stock from the outside
- decreasing“down” market
- Union workers, firemen, etc. receive this
20 Clues: rising “up” market • Place to buy stocks • Wide range of stocks • A share of a company • Someone that own stocks • decreasing“down” market • Max amount a company can have • Loan to the government or company • Someone that buys and sells stocks • Social security and Medicare together • Multiple companies in multiple stocks • Age to receive social security benefits • ...
Pre school age shows 2021-08-17
Across
- patrol boy and his dogs fight crime and help other people
- repair man and tools
- the builder guy who builds stuff
- boy with friends and family
Down
- and friends purple dinosaur
- the expolor boots backpack the map also includes Spanish
- umzoomi the tiny team who helps kids
- chase kids who fight hacker
- and friends into the city Dora when she’s a teenager
- clues Steve joe use handy dandy notebooks
10 Clues: repair man and tools • and friends purple dinosaur • chase kids who fight hacker • boy with friends and family • the builder guy who builds stuff • umzoomi the tiny team who helps kids • clues Steve joe use handy dandy notebooks • and friends into the city Dora when she’s a teenager • the expolor boots backpack the map also includes Spanish • ...
Islington Crosswords. 2024-12-15
Across
- has solved different national and int'l cyber cases
- where classes are named after alumni
- cozy smaller lecture place
Down
- A record of the books you have borrowed
- A long-running cinema hall located in Kathmandu, named after a goddess
- Pops when heated
- Classes named after cities in Nepal
- biggest lecture place
- holds an old memory of the college
9 Clues: Pops when heated • biggest lecture place • cozy smaller lecture place • holds an old memory of the college • Classes named after cities in Nepal • where classes are named after alumni • A record of the books you have borrowed • has solved different national and int'l cyber cases • A long-running cinema hall located in Kathmandu, named after a goddess
AT THE AIRPORT - Al Aeropuerto 2018-10-16
16 Clues: Gate • Pilot • Tickets • Trolley • Luggage • Delayed • Customs • Arrivals • Security • Passport • Check in • Suitcase • Aeroplane • Departures • Money Exchange • Monitor (screen)
Documents: Lesson 7 2021-10-01
Across
- Also located within Documents Section
- Position or _____ Trustee, Sponsor etc when they sign
- where coding is located in mainframe
- Only these SCNs can Esign Documents
- shows who and when documents was signed in the document ______
- _________ Preferences are made by each ER
- OneNote for EDS
- Where you view document history
- section in Manage security where esign rights are located
Down
- Which tab are the forms located in?
- Esignature but not Trustee, fiduciary or Adopting Employer?
- Grants access to Secondary to esign
- "...Employer" signature role
- E stands for in Esignature
- Where the notifications for tasks go to ER
- ToDOList Item
- Esignature Role
- Where the Signor goes to Esign documents (3 words)
- ________ Security to assign Esig Rights to SCNs
19 Clues: ToDOList Item • Esignature Role • OneNote for EDS • E stands for in Esignature • "...Employer" signature role • Where you view document history • Which tab are the forms located in? • Grants access to Secondary to esign • Only these SCNs can Esign Documents • where coding is located in mainframe • Also located within Documents Section • _________ Preferences are made by each ER • ...
Women and The New Deal 2020-02-27
Across
- There was still a belief that men were the rightful _______
- Most ND programmes were designed to help men. Only 8000 women were involved in this program
- The Social Security Act benefited women with families as it provided what type of benefits?
- This person encouraged the formation of the Black Cabinet as well as championing the concept of a living wage
- The Wagner Act allowed women to join what along with men?
- There was discrimination against which group of women working
- This group of women were encouraged to pursue domestic work and higher education
- More women were doing this in 1940 than in 1933?
Down
- There was still a belief that women only worked for this type of money
- This 1935 act benefited single working-class women with young families who were unable to work.
- Who tried to avoid paying social security payments to women by introducing special qualifications and conditions?
- The 1936 Gallup Poll revealed that 4/5 people thought what type of women should not work?
- This person executed many aspects of the ND including the CCC, PWA and the Social Security Act
- Gladys Tantaquidgeon studied this subject at the University of Pennsylvania and was offered a position as social worker on a South Dakota reservation by John Collier.
- This group of women were ignored in the social security act as they were mainly employed as domestic workers
- Frances Perkins became the first female US Secretary of ___
16 Clues: More women were doing this in 1940 than in 1933? • The Wagner Act allowed women to join what along with men? • There was still a belief that men were the rightful _______ • Frances Perkins became the first female US Secretary of ___ • There was discrimination against which group of women working • ...
Criminal Law 2026-02-25
Across
- less serious offense, usually punishable by less than a year in jail, such as simple property damage"
- security may only use the minimum amount of this necessary to control a situation or protect themselves"
- causing bodily harm or making insulting, provoking physical contact with another person"
- severe crime, like armed robbery, where private citizens often have broader legal authority to intervene"
- specific property boundaries where a private security officer has the legal authority to act"
- unauthorized taking of someone else's property with the intention of permanently depriving them of it"
- property directly from a person by using physical violence or the threat of violence"
Down
- an individual knowingly enters or remains on private property after being told to leave"
- that places another person in reasonable fear of receiving an immediate physical injury"
- a building or secure area without permission with the intent to commit a theft or felony inside"
- formal court order requiring a security officer to testify about a criminal incident they witnessed on duty"
- someone into custody, which private security can generally only do if a crime occurs in their presence"
- holding a suspected shoplifter or trespasser while waiting for local law enforcement"
- conscious decision or deliberate state of mind required to commit a criminal act"
- c
15 Clues: c • conscious decision or deliberate state of mind required to commit a criminal act" • holding a suspected shoplifter or trespasser while waiting for local law enforcement" • property directly from a person by using physical violence or the threat of violence" • an individual knowingly enters or remains on private property after being told to leave" • ...
FITE: Technology Terms 2013-05-14
8 Clues: speed of computer • short term storage • how you behave online • another word for online • Comcast, xfinity, Dish, etc. • another software similar to Powerpoint • an upgrade that lets you have more slots to plug in • what you do to give credit to the website,book, author, poet etc.
Les mots-croisés PlayStation #4 2022-08-01
8 Clues: PlayStation... • Une ville du futur • S'éloigner en toute hâte • Quand on n'est pas à plusieurs • L'antagoniste historique du chien • Quand on ne trouve pas son chemin • Qui va de côté et d'autre, qui n'est pas fixé • Suite à une flèche dans le genou nous sommes...
3 ja 3.1 2025-02-25
15 Clues: tulkki • kunnia • nuoriso • tehtävä • intohimo • konflikti • ilahtunut • arvokkuus • väkivalta • tasa-arvo • yhteishenki • turvallisuus • vuosittainen • monikielisyys • puolestapuhuja
Barron 2026-03-25
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16
Across
- Data describing other data, such as timestamps or authors
- An illegal intrusion into a computer system or network
- Legal process of collecting and analyzing digital evidence
- Unauthorized email scams that trick users into revealing information
- The verification procedure to demonstrate that the network meets security requirements
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Network tool for capturing and analyzing traffic
- Potential events or circumstances that can cause harm to an organization's assets.
- Technology used by NGFW to detect and block malware
Down
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- A central security resource where multiple virtual traps are monitored (One word).
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Process of identifying, assessing, and mitigating threats
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Programs designed to record personal information, typically undesired software
- Malicious software specifically designed to disrupt or damage computer systems
- Firewall Firewall type that provides unified policy across distributed networks
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20 2025-10-23
Across
- Data describing other data, such as timestamps or authors
- Process of identifying, assessing, and mitigating threats
- The verification procedure to demonstrate that the network meets security requirements
- Technology used by NGFW to detect and block malware
- Unauthorized email scams that trick users into revealing information
- An illegal intrusion into a computer system or network
- A central security resource where multiple virtual traps are monitored (One word).
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Malicious software specifically designed to disrupt or damage computer systems
Down
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Network tool for capturing and analyzing traffic
- Programs designed to record personal information, typically undesired software
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
- Potential events or circumstances that can cause harm to an organization's assets.
- Legal process of collecting and analyzing digital evidence
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- Firewall Firewall type that provides unified policy across distributed networks
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Software that records keystrokes, potentially capturing sensitive login credentials.
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
profession 2026-03-12
17 Clues: guru • koki • sopir • pilot • polisi • satpam • dokter • petani • ilmuwan • tentara • nelayan • perawat • tukang foto • dokter gigi • tukang cukur • penjaga toko • pemadam kebakaran
Security Crossword Challenge 2015-02-17
Across
- Cash or Valuables in Transit
- 7th President of the United States
- Funny money
- First Ambassador to France
- 1st President
- Secures your money
- 16th President
Down
- Taking of items
- 3rd President
- Unusual Behavior
- Director of Security
- 7th President
- Used to make change
- First Secretary of State
- Opens many doors
- 18th President
16 Clues: Funny money • 3rd President • 7th President • 1st President • 18th President • 16th President • Taking of items • Unusual Behavior • Opens many doors • Secures your money • Used to make change • Director of Security • First Secretary of State • First Ambassador to France • Cash or Valuables in Transit • 7th President of the United States
Sip N Solve 2025-10-26
Across
- What Month Is the Groom’s Birthday?
- What is the Best Man’s Name?
- What Did The Bride Study At University?
- What Town Do They Live In?
- How Many Venues Did They Visit?
- What Month Is The Bride’s Birthday?
- Where Did They Go On Their First Holiday Abroad? (Italian City)
- Where Did They Get Engaged?
- What Number House Do They Live At?
- What Trade Does The Groom Work In?
Down
- Where Are They Going On Honeymoon?
- What is the Groom’s Middle Name?
- Who Said ‘I Love You’ First? Bride or Groom?
- Groom’s Hobby
- What Month Did They Get Engaged?
- What is the Maid of Honour’s Name
- Bride’s Middle Name?
17 Clues: Groom’s Hobby • Bride’s Middle Name? • What Town Do They Live In? • Where Did They Get Engaged? • What is the Best Man’s Name? • How Many Venues Did They Visit? • What is the Groom’s Middle Name? • What Month Did They Get Engaged? • What is the Maid of Honour’s Name • Where Are They Going On Honeymoon? • What Number House Do They Live At? • What Trade Does The Groom Work In? • ...
