cyber security Crossword Puzzles

Detective Conan 8 and Puzzles 2024-08-26

Detective Conan 8 and Puzzles crossword puzzle
Across
  1. coffi
  2. securi
  3. corne
  4. press
  5. room
  6. inven
  7. scare
Down
  1. mai
  2. robbe
  3. furth
  4. stam
  5. bject
  6. rais
  7. shado
  8. bloo

15 Clues: maistamraisroombloorobbecoffifurthbjectcornepressshadoinvenscaresecuri

1 2024-05-15

1 crossword puzzle
Across
  1. consider
  2. exists
  3. thereof
  4. special
  5. prepared
  6. opened
  7. cured
Down
  1. air
  2. security
  3. calculated
  4. outside
  5. earth
  6. wedding
  7. confirmed
  8. discuss

15 Clues: airearthcuredexistsopenedoutsidethereofspecialweddingdiscusssecurityconsiderpreparedconfirmedcalculated

Exam Vocabulary 2024-04-11

Exam Vocabulary crossword puzzle
Across
  1. invloed
  2. doel
  3. verboden
  4. geheugen
  5. helaas
  6. rijkdom
  7. kennis
Down
  1. bron
  2. schadelijk
  3. onderwerp
  4. genoeg
  5. veiligheid
  6. kantoor
  7. schrijver
  8. university

15 Clues: brondoelgenoeghelaaskennisinvloedkantoorrijkdomverbodengeheugenonderwerpschrijverschadelijkveiligheiduniversity

Job Hunting 2023-06-17

Job Hunting crossword puzzle
Across
  1. Storage
  2. Speaker
  3. Stability
  4. Perks
  5. Education
  6. Solve
  7. Salary
Down
  1. Websitehosting
  2. Progression
  3. Searching
  4. Distinct
  5. Kindof
  6. Opportunities
  7. Operate
  8. ITsupport

15 Clues: PerksSolveKindofSalaryStorageSpeakerOperateDistinctSearchingStabilityITsupportEducationProgressionOpportunitiesWebsitehosting

Crossword 3.1 2025-02-25

Crossword 3.1 crossword puzzle
Across
  1. turvallisuus
  2. ääni
  3. rauha
  4. tehtävä
  5. ongelma
  6. vetoomus
  7. hallitus
  8. arvo
  9. arvokkuus
Down
  1. sanktio
  2. vaikuttava
  3. kiusaaminen
  4. diplomaatti
  5. käytäntö
  6. nuoriso

15 Clues: ääniarvorauhasanktiotehtävänuorisoongelmakäytäntövetoomushallitusarvokkuusvaikuttavakiusaaminendiplomaattiturvallisuus

safer internet 2020-04-19

safer internet crossword puzzle
Across
  1. wichtigste Verbreitungsquelle von bösen Links
  2. Was macht man, wenn man eine vireninfizierte E-mail bekommt?
  3. hilft bei Entfehrnung von Bildern
Down
  1. was versuchen Betrüger zu bekommen?
  2. währung im netz
  3. mobbing im Internet
  4. Schadsoftware

7 Clues: Schadsoftwarewährung im netzmobbing im Internethilft bei Entfehrnung von Bildernwas versuchen Betrüger zu bekommen?wichtigste Verbreitungsquelle von bösen LinksWas macht man, wenn man eine vireninfizierte E-mail bekommt?

Clique 2018-01-16

Clique crossword puzzle
Across
  1. Someone around the same age, grade and size.
  2. Touching a persons body or things.
  3. An exclusive group of friends that leave others out.
  4. Pushing others by things you say.
  5. Name of a Queen Bee.
Down
  1. A name of the world's greatest counselor
  2. To push.
  3. Name of a Target Bee.
  4. The best elementary school in the whole world.
  5. A way to bully using the internet.

10 Clues: To push.Name of a Queen Bee.Name of a Target Bee.Pushing others by things you say.Touching a persons body or things.A way to bully using the internet.A name of the world's greatest counselorSomeone around the same age, grade and size.The best elementary school in the whole world.An exclusive group of friends that leave others out.

Digital Citizenship 2019-06-17

Digital Citizenship crossword puzzle
Across
  1. misuse act crime to use a computer
  2. a _ _ _ or set of _ _ _ _
  3. when someone goes on a _______ without owners permission
  4. divide someone who dosent have acsess to _ _ _ _ _ _ _ _ _ _ _
Down
  1. commissioner someone who can enforce the data protection act
  2. bullying hurt someone
  3. subject _ _ _ _ about you/people
  4. intelligence human intelligence processed by a computer
  5. communication can cause distress or anxiety
  6. something that can cause problems with electronics

10 Clues: a _ _ _ or set of _ _ _ _bullying hurt someonemisuse act crime to use a computersubject _ _ _ _ about you/peoplecommunication can cause distress or anxietysomething that can cause problems with electronicsintelligence human intelligence processed by a computer...

Complexity Cross V2 2024-05-09

Complexity Cross V2 crossword puzzle
Across
  1. The youngest in the group, was merged with a
  2. Cyber taught Stratus strength of the ____, not the body
  3. The character who loves plants
  4. A rare delicacy, and Sage's prized possession
  5. The filmmaker who's everywhere
Down
  1. The character who was once a vigilante
  2. ____, the teenage goddess
  3. _____ Forest, the place where Sage grew up
  4. ____ City, the place where Stratus lives
  5. The character who can control metal

10 Clues: ____, the teenage goddessThe character who loves plantsThe filmmaker who's everywhereThe character who can control metalThe character who was once a vigilante____ City, the place where Stratus lives_____ Forest, the place where Sage grew upThe youngest in the group, was merged with aA rare delicacy, and Sage's prized possession...

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons crossword puzzle
Across
  1. What car manufacturer made the first modern driverless car
  2. Data should not be kept longer than
  3. Who is exempt from the data protection act
  4. All personal data should be kept
  5. The owner of the data
Down
  1. The DPA has 8
  2. Police, Government and Taxers all all ______ from the DPA
  3. A form of cyber-bullying
  4. Data must be routinely for maximum protection
  5. Data should be used

10 Clues: The DPA has 8Data should be usedThe owner of the dataA form of cyber-bullyingAll personal data should be keptData should not be kept longer thanWho is exempt from the data protection actData must be routinely for maximum protectionPolice, Government and Taxers all all ______ from the DPAWhat car manufacturer made the first modern driverless car

CYBERSECURITY 2025-02-08

CYBERSECURITY crossword puzzle
Across
  1. A person who tries to break into systems.
  2. A fake email trying to trick you.
  3. Someone you do not know online.
  4. Relating to computers and the internet.
  5. Software designed to harm your device.
Down
  1. The action of entering username/password.
  2. A secret code to keep your account safe.
  3. A way to send messages online.
  4. Keeping your personal information safe.
  5. A harmful program that damages a computer.

10 Clues: A way to send messages online.Someone you do not know online.A fake email trying to trick you.Software designed to harm your device.Keeping your personal information safe.Relating to computers and the internet.A secret code to keep your account safe.The action of entering username/password.A person who tries to break into systems....

m m 2026-01-19

m m crossword puzzle
Across
  1. Actions taken to reduce risk
  2. The likelihood that something will occur
  3. Risk that affects public trust or image
  4. Risk related to money or finances
Down
  1. The process of returning to normal
  2. The effect of a risk if it happens
  3. Risk related to people, policies, processes, or systems
  4. Risk from laws and regulations
  5. Risk related to computers and data
  6. A potential source of danger

10 Clues: Actions taken to reduce riskA potential source of dangerRisk from laws and regulationsRisk related to money or financesThe process of returning to normalThe effect of a risk if it happensRisk related to computers and dataRisk that affects public trust or imageThe likelihood that something will occur...

IPO Process 2023-01-03

IPO Process crossword puzzle
Across
  1. a federal government agency that regulates and supervises the securities industry
  2. brokerage firm that raises money for companies using public equity and debt markets
  3. company whose shares have never been offered publicly for sale
  4. process by which a privately held company first offers shares of stock to the public; this is done via an initial public offering (IPO)
  5. if the opening price of an IPO in the secondary market is higher than its offering price, the difference
  6. ____Herring a preliminary prospectus filed with the SEC
  7. characteristic of a security which rises or falls sharply in price within a short time period
  8. when an investor sells their shares to the public on the secondary market after an initial public offering (IPO).
  9. the amount of stock in an initial public offering (IPO) that is sold to a customer
Down
  1. date on which an executed trade of securities must be paid for
  2. Price price at which a new security will be distributed to the public prior to the new issue trading on the secondary market; commonly referred to as offering price
  3. date the day a newly registered security can be offered for sale
  4. the first issuance of stock from a private company for public sale.
  5. in charge of organizing the syndicate, distributing member participation shares, and making stabilizing transactions; the lead underwriter’s name appears on the left side of a prospectus cover
  6. privately held company offers its shares to the public—an initial public offering (IPO)
  7. price for which a new security issue will be sold to the public

16 Clues: ____Herring a preliminary prospectus filed with the SECdate on which an executed trade of securities must be paid forcompany whose shares have never been offered publicly for saleprice for which a new security issue will be sold to the publicdate the day a newly registered security can be offered for sale...

Housekeeping Safety & Security 2014-05-29

Housekeeping Safety & Security crossword puzzle
Across
  1. Lost items should be recorded in this
  2. Cleaners that may be harmful
  3. Best cure for emergencies
  4. Group of employees that develop and monitor security programs
  5. Leaving the hotel premises
  6. Not being personally injured
  7. Prevention of incidents like theft or fire
Down
  1. What to do before entering guest room
  2. Opens even double-locked doors
  3. Where to meet after exiting hotel
  4. Stealing from others
  5. Bend the knees before doing this
  6. Opens all guestroom doors
  7. When slips and falls happen

14 Clues: Stealing from othersBest cure for emergenciesOpens all guestroom doorsLeaving the hotel premisesWhen slips and falls happenCleaners that may be harmfulNot being personally injuredOpens even double-locked doorsBend the knees before doing thisWhere to meet after exiting hotelLost items should be recorded in thisWhat to do before entering guest room...

Housing Ads 2014-07-07

Housing Ads crossword puzzle
Across
  1. the place where you put a car (abbreviation)
  2. the room where you shower (abbreviation)
  3. an apartment that you can buy and own
  4. examples: refrigerator, stove, dishwasher
  5. the room where you sleep (abbreviation)
  6. very large
  7. a lot of space
Down
  1. a small outdoor space not on the 1st floor
  2. to keep the home cool in the summer (abbreviation)
  3. you must pay the $500 security _____________ (abbrevation)
  4. examples: heat, electricity, water, garbage
  5. ____________ guard
  6. large highways
  7. a one-room apartment

14 Clues: very largelarge highwaysa lot of space____________ guarda one-room apartmentan apartment that you can buy and ownthe room where you sleep (abbreviation)the room where you shower (abbreviation)examples: refrigerator, stove, dishwashera small outdoor space not on the 1st floorexamples: heat, electricity, water, garbage...

Insights 5, ch.1 2021-12-09

Insights 5, ch.1 crossword puzzle
Across
  1. rankaiseva
  2. kehittyneisyys
  3. jännityksenhakuisuus
  4. tavanomainen
  5. ratkaiseva
  6. pidätellä
  7. jarruttaminen
Down
  1. tiedollinen
  2. tietoisuus
  3. alaryhmä
  4. ajoneuvo
  5. pitkittynyt
  6. ennakkoasenne
  7. ristiriitainen
  8. turvallisuus

15 Clues: alaryhmäajoneuvopidätellätietoisuusrankaisevaratkaisevatiedollinenpitkittynytturvallisuustavanomainenennakkoasennejarruttaminenkehittyneisyysristiriitainenjännityksenhakuisuus

Profiles 1 text 1 Santeri 2014-12-03

Profiles 1 text 1 Santeri crossword puzzle
Across
  1. alue
  2. tavara
  3. turvallisuus
  4. välttämätön
  5. vastakkainen
  6. lentokone
  7. romaani
  8. juutalainen
Down
  1. miehistö
  2. jono
  3. kantaa
  4. osoittaa
  5. esine
  6. matkustaa
  7. olla pahoillaan

15 Clues: jonoalueesinekantaatavararomaanimiehistöosoittaamatkustaalentokonevälttämätönjuutalainenturvallisuusvastakkainenolla pahoillaan

unit 10 2015-03-11

unit 10 crossword puzzle
Across
  1. Scare
  2. purchase
  3. D. Roosevelt
  4. Steinbeck
  5. chats
  6. holiday
  7. security
  8. bowl
  9. trust
Down
  1. Roosevelt
  2. soup
  3. holder
  4. migration
  5. Thursday
  6. Deal

15 Clues: soupbowlDealScarechatstrustholderholidaypurchaseThursdaysecurityRooseveltSteinbeckmigrationD. Roosevelt

Animal Farm Crossword Puzzle 2024-05-09

Animal Farm Crossword Puzzle crossword puzzle
Across
  1. Tough
  2. Trotsky
  3. Easy-Going
  4. Stalin
  5. Fancy
  6. Read
  7. Security
Down
  1. Grumpy
  2. Persuasive
  3. Trade
  4. Drunk
  5. Dedicated
  6. Dream
  7. Motherly
  8. Religion

15 Clues: ReadToughTradeDrunkDreamFancyGrumpyStalinTrotskyMotherlyReligionSecurityDedicatedPersuasiveEasy-Going

3 ja 3.1 2025-02-25

3 ja 3.1 crossword puzzle
Across
  1. nuoriso
  2. konflikti
  3. ilahtunut
  4. puolestapuhuja
  5. intohimo
  6. vuosittainen
  7. tasa-arvo
  8. yhteishenki
  9. tehtävä
Down
  1. monikielisyys
  2. tulkki
  3. turvallisuus
  4. kunnia
  5. arvokkuus
  6. väkivalta

15 Clues: tulkkikunnianuorisotehtäväintohimokonfliktiilahtunutarvokkuusväkivaltatasa-arvoyhteishenkiturvallisuusvuosittainenmonikielisyyspuolestapuhuja

Spanish Travel Vocabulary 2026-03-25

Spanish Travel Vocabulary crossword puzzle
Across
  1. Security
  2. land
  3. assistant
  4. service
  5. destination
  6. track
  7. smoking
Down
  1. take off
  2. top
  3. Oxogen
  4. afternoon
  5. seat
  6. international
  7. aisle
  8. abroad

15 Clues: topseatlandaisletrackOxogenabroadservicesmokingtake offSecurityafternoonassistantdestinationinternational

FIT E: Final Quiz Vocab :D 2013-05-14

FIT E: Final Quiz Vocab :D crossword puzzle
Across
  1. Something you type and usually save
  2. Click Click
Down
  1. Storage up in the sky
  2. Proteins to a computer
  3. Different types of lighting
  4. Baa

6 Clues: BaaClick ClickStorage up in the skyProteins to a computerDifferent types of lightingSomething you type and usually save

Zerodha Community 2024-11-29

Zerodha Community crossword puzzle
Across
  1. Company repurchasing its outstanding shares
  2. Price at which the asset trades in the regular market
  3. Trading involving high risk, in expectation of significant returns
  4. Neutral strategy that involves simultaneously taking a long position and a short position on a security
  5. Total market value of a company's outstanding shares
  6. Difference between what buyers are willing to pay and the price sellers are asking
Down
  1. Purchasing an asset from one market and selling it to another market where the price is higher
  2. Selling stocks with the expectation the price will fall
  3. ____ Analysis is a holistic approach to study a business.
  4. Measure of an asset’s risk in relation to the market
  5. The ratio that helps gauge how cheap or expensive the stock is trading
  6. Order placed to limit losses by automatically selling a security when it reaches a set price
  7. Company’s obligation/Loan that the company has taken
  8. Security whose value is derived from another financial entity

14 Clues: Company repurchasing its outstanding sharesMeasure of an asset’s risk in relation to the marketCompany’s obligation/Loan that the company has takenTotal market value of a company's outstanding sharesPrice at which the asset trades in the regular marketSelling stocks with the expectation the price will fall...

SMG Crossword Puzzle 2025-12-15

SMG Crossword Puzzle crossword puzzle
Across
  1. - A large company or group
  2. earnings.
  3. - measures volatility as compared to the overall stock
  4. average forecast for a companies forecast
  5. - Company total income for selling goods or services.
  6. basis- the original price paid for an asset is used to determine capital gain or loss
  7. is a loan made by an issuer (borrower) to a lender (investor).
  8. Ratio- a measure of a company’s stock price relative to
Down
  1. is a broad group of stocks often in the same industry.
  2. - is the highest price and the lowest price of the stock over a 52-week
  3. Value- Price a company will fetch in the open market by investor perception
  4. a short unique abbreviation representing a public trading company or security on stock exchange
  5. - A debt security issues by government
  6. - Type of bond that includes Debt security issued by state, cities or county,

14 Clues: earnings.- A large company or group- A debt security issues by governmentaverage forecast for a companies forecast- Company total income for selling goods or services.is a broad group of stocks often in the same industry.- measures volatility as compared to the overall stockRatio- a measure of a company’s stock price relative to...

SEC+ 701 Chap 1 2024-10-15

SEC+ 701 Chap 1 crossword puzzle
Across
  1. embedding security into all aspects of APPS
  2. what were allowed to do on network
  3. control using policies
  4. control type that enforces a rule of behavior
  5. controls like alarms and locks
  6. control implemented as a system
  7. proving your identitiy
  8. abbr. person overall responsible for security
Down
  1. 2wrds.difference between current and want state
  2. part of framework providing ongoing monotoring
  3. control type that operates during an attack
  4. an example of a technical control
  5. identify, analyze,contain and eradicate threats
  6. something negative on network
  7. framework process of restoring systems
  8. abbr. person responsible for new and emerging IT
  9. tracking your movements on network

17 Clues: control using policiesproving your identitiysomething negative on networkcontrols like alarms and lockscontrol implemented as a systeman example of a technical controlwhat were allowed to do on networktracking your movements on networkframework process of restoring systemsembedding security into all aspects of APPS...

safety meeting 2026-02-09

safety meeting crossword puzzle
Across
  1. number of fire extinguishers
  2. in a robbery you should stay ___
  3. security meeting happens how many times a year
  4. Branch employees should go ____ to safe haven
  5. branch passcode
  6. safe haven
  7. 1-800-727-7375
  8. inspect the building exterior
  9. anything that interferes/prevents normal work functions
  10. when opening always be aware of your
Down
  1. observe robber's actions and appearance
  2. yelling
  3. keeping you, customer & bank information protected
  4. Return to the branch until ______ by authorities, Global Security, your manager or your MD-BankingDon’t:
  5. submit as soon as possible( but no more than 72 hours after)
  6. Always ___ with demands
  7. waving fist

17 Clues: yellingsafe havenwaving fist1-800-727-7375branch passcodeAlways ___ with demandsnumber of fire extinguishersinspect the building exteriorin a robbery you should stay ___when opening always be aware of yourobserve robber's actions and appearanceBranch employees should go ____ to safe havensecurity meeting happens how many times a year...

Model UN Vocabulary 2012-11-08

Model UN Vocabulary crossword puzzle
Across
  1. Rules in which the General Assembly, the Economic and Social Council, the Regional Bodies, the Security Council, and the Historical Security Council
  2. Limited time a speaker has
  3. Requires a “Yes” or a “No” from every country
  4. The primary mean of communication
  5. When a delegate motions to change the order in which the resolutions are presented
  6. Aids the Committee in its discussion and formulation or resolutions
  7. This requires a two-thirds majority in order to go into effect
  8. A thirty second speech, in which a delegate may request when his/her personal or national integrity has been impugned
  9. Delegates may move for the suspension or adjournment of all Committee functions whenever the floor is open
  10. Formal argument in which two sides are expressed
  11. A rule in which you show respect to the Committee and the other delegates
  12. A roll call is not required for this
  13. Not allowed in the Committee room during formal debate or moderated caucus
  14. This will be taken into consideration of the Committee has more than one Topic Area to discuss
  15. Yielding to another delegate, to questions, or to the Chair
  16. the order in which point or motions are presented
Down
  1. Formal address
  2. They are held responsible to the Secretary General
  3. The representation of member states
  4. This can occur only after the debate on a Topic Area or amendment has been closed
  5. Must have the approval of the Director and the signatures of 12 members in the General Assembly, 4 members in the Economic and Social Council and Regional Bodies, and 3 members in the Security Council and Historical Security Council.
  6. A guest-speaker, expert witness, or representative
  7. When the floor is open, a delegate may call for the postponement of debate on resolution
  8. Verbal remark expressing one’s opinion
  9. Oral or written statements made by the Secretary-General or one of the members of the Secretariat
  10. Temporarily suspends formal debate, allowing members to discuss ideas informally.
  11. This is introduced when it receives the approval of the Director and is signed by 25 members in the General Assembly, 8 members in the Economic and Social Council and 5 members in the Security Council and Historical Security Council
  12. A delegate rises to this only when the floor is open to ask the Moderator a question about the Rules of Procedures
  13. The Secretary General is the last pundit for the validity of this
  14. Facilitates a debate at specific time periods in the discussion
  15. List for the Topic Area being discussed
  16. Decision made by the moderator and with the popular vote of a two-third majority
  17. When the moderator calls all countries noted by the dais to be in attendance in alphabetical order
  18. Once it is approved and has been copied and distributed, a delegate my introduce it

34 Clues: Formal addressLimited time a speaker hasThe primary mean of communicationThe representation of member statesA roll call is not required for thisVerbal remark expressing one’s opinionList for the Topic Area being discussedRequires a “Yes” or a “No” from every countryFormal argument in which two sides are expressed...

Internet Safety Tips 2024-08-04

Internet Safety Tips crossword puzzle
Across
  1. Security helper
  2. Opposite of share
  3. Prevent
  4. Step two
Down
  1. Peace of mind
  2. Make more difficult
  3. Who's information hacks you
  4. Security
  5. Avoid identity theft

9 Clues: PreventSecurityStep twoPeace of mindSecurity helperOpposite of shareMake more difficultAvoid identity theftWho's information hacks you

Abode 2021-07-13

Abode crossword puzzle
Across
  1. Safety
  2. Where you live
  3. A set of things working together as an interconnecting network
  4. Takes pictures
  5. A nice company that sells home security systems
Down
  1. Make it your own
  2. Hand crafted
  3. Electric eye
  4. Warning sound
  5. Loud noise

10 Clues: SafetyLoud noiseHand craftedElectric eyeWarning soundWhere you liveTakes picturesMake it your ownA nice company that sells home security systemsA set of things working together as an interconnecting network

Risk Interest Groups 2025-12-05

Risk Interest Groups crossword puzzle
Across
  1. Machine learning using deep neural networks with many layers. (2 Words - between words)
  2. Packaging apps and dependencies into portable, isolated containers.
  3. Controls network traffic based on security policies.
  4. Transforming plaintext into ciphertext using cryptographic keys.
  5. Model memorizes noise in training data, hurting generalization.
  6. Security Information and Event Management for log aggregation and analytics.
  7. — Security model enforcing continuous verification and least privilege
  8. AI field enabling computers to understand and generate human language. (3 Words - between words)
  9. Public Key Infrastructure that manages certificates and trust.
  10. Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
  1. Trusted entity that issues and validates digital certificates. (2 Words - between words)
  2. Single software instance serves multiple customers with isolation. (2 Words - between words)
  3. Automated coordination/management of services, containers, and workloads.
  4. Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
  5. Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
  6. Algorithm that performs encryption and decryption.
  7. Access Control List defining allowed/denied permissions.
  8. Cloud model delivering virtualized compute, storage, and networking.

18 Clues: Algorithm that performs encryption and decryption.Controls network traffic based on security policies.Access Control List defining allowed/denied permissions.Public Key Infrastructure that manages certificates and trust.Model memorizes noise in training data, hurting generalization.Transforming plaintext into ciphertext using cryptographic keys....

Vocabulary Crossword 2 2024-09-19

Vocabulary Crossword 2 crossword puzzle
Across
  1. Selbstverständnis
  2. einzigartig
  3. einheitlich
  4. unglaublich
  5. einordnen
  6. beeinflussen, betreffen
  7. ehrenamtlich arbeiten
  8. pay gleiche Bezahlung
Down
  1. Zweck
  2. wahrnehmen
  3. Absicherung
  4. Gemeinschaft
  5. Herausforderungen
  6. dringlich
  7. Normen
  8. Ungleichheit
  9. Umstände

17 Clues: ZweckNormenUmständedringlicheinordnenwahrnehmenAbsicherungeinzigartigeinheitlichunglaublichGemeinschaftUngleichheitSelbstverständnisHerausforderungenehrenamtlich arbeitenbeeinflussen, betreffenpay gleiche Bezahlung

Acronyms of the Government 2022-10-22

Acronyms of the Government crossword puzzle
Across
  1. Replaces the Federal Security Agency.
  2. Provides military and other means of protection.
  3. Oversees military actions in six geographical areas
  4. The main title for the many branches of health and service.
  5. Collects taxes within the U.S.
  6. Inspects and grades foods the U.S produces.
  7. Maintains roads and highways.
  8. Highest ranking members of the military.
  9. Protects the oil reserves in the U.S.
  10. Investigates threats of terrorism.
  11. Issues weather forecasts.
Down
  1. Provides safe, affordable housing.
  2. Insures national security.
  3. Delivers mail in the U.S.
  4. Large police organization.
  5. Provides benefits for veterans and their families.
  6. Conducts legal business of the U.S government.
  7. Insures some mortgages private banks make to home owners.

18 Clues: Delivers mail in the U.S.Issues weather forecasts.Insures national security.Large police organization.Maintains roads and highways.Collects taxes within the U.S.Provides safe, affordable housing.Investigates threats of terrorism.Replaces the Federal Security Agency.Protects the oil reserves in the U.S.Highest ranking members of the military....

WIT 2023-06-12

WIT crossword puzzle
Across
  1. Scrambled information into an alternative form that requires a key or password to decrypt the information
  2. It is a U.S. legislation that establishes standards for the privacy and security of protected health information (PHI).
  3. popularly known payment card Industry standard
  4. Top most severity to be fixed at athenahealth
Down
  1. High priority security issues
  2. common vulnerability exposures
  3. The Open Worldwide Application Security Project
  4. It includes any individually identifiable health information that is created, received, or maintained by a healthcare organization, such as medical records or patient demographics.
  5. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  6. security triad

10 Clues: security triadHigh priority security issuescommon vulnerability exposurespopularly known payment card Industry standardTop most severity to be fixed at athenahealthThe Open Worldwide Application Security ProjectScrambled information into an alternative form that requires a key or password to decrypt the information...

CAB 2021-05-04

CAB crossword puzzle
Across
  1. it happens more than once over a period of time
  2. someone who is being hurt from a comment of a photo they posted
  3. someone who stands up for the person getting bullied
  4. everyone is having fun
  5. someone who just sits by and dose nothing but watches
  6. punching kicking spitting
  7. someone who has experienced being hurt mentally and physically
  8. someone is being hurt
Down
  1. there is an intent to hurt or harm
  2. insulting or unwanted messages
  3. attracts physically emotionally or socially
  4. no one is having fun
  5. intentionally excluding someone from an online group
  6. the person who is being mean

14 Clues: no one is having funsomeone is being hurteveryone is having funpunching kicking spittingthe person who is being meaninsulting or unwanted messagesthere is an intent to hurt or harmattracts physically emotionally or sociallyit happens more than once over a period of timesomeone who stands up for the person getting bullied...

The full Monthy 2019-10-09

The full Monthy crossword puzzle
Across
  1. blankets
  2. emotions pain pain
  3. rubbish
  4. punishment
  5. appointment
  6. securityguard
  7. gnomes
  8. horror
  9. stupid
Down
  1. joke
  2. toincrease
  3. unemployed
  4. benefit
  5. crazyidea
  6. serious
  7. workshift
  8. torush
  9. reply

18 Clues: jokereplytorushgnomeshorrorstupidbenefitrubbishseriousblanketscrazyideaworkshifttoincreaseunemployedpunishmentappointmentsecurityguardemotions pain pain

Thanksgiving V2 2023-10-30

Thanksgiving V2 crossword puzzle
Across
  1. Typical pie for fall.
  2. How many days did the first Thanksgiving last
  3. Ornamental container shaped like a goat's horn
  4. Another typical side dish, loved by rabbits.
  5. Monday after Thanksgiving
  6. Often the main course of a meal on Thanksgiving
  7. Attended the first Thanksgiving with the Indigenous American tribe
Down
  1. Indigenous American tribe that celebrated the first Thanksgiving
  2. Food comes in a sauce or a jelly
  3. Site of first Thanksgiving
  4. Dish either can be sweet or mashed
  5. Friday after Thanksgiving
  6. Typical Southern side dish
  7. Green, French, string are types of these.
  8. Typically "stuffed" inside a turkey
  9. Side dish that is cooked slowly in an oven
  10. Typically poured over mashed potatoes

17 Clues: Typical pie for fall.Friday after ThanksgivingMonday after ThanksgivingSite of first ThanksgivingTypical Southern side dishFood comes in a sauce or a jellyDish either can be sweet or mashedTypically "stuffed" inside a turkeyTypically poured over mashed potatoesGreen, French, string are types of these.Side dish that is cooked slowly in an oven...

Algorithms 2024-09-12

Algorithms crossword puzzle
Across
  1. a common port smaller than USB
  2. safety the practice of protecting yourself online
  3. the action you take with your mouse
  4. a programming concept that allows you to repeat a set of instructions
  5. the smallest unit of data a computer can process (1/0)
  6. another word for software
  7. a list of steps needed to complete a task
Down
  1. The most common type of port
  2. the practice of protecting computer systems
  3. The language that tells a computer what to do
  4. a single simple instruction
  5. a person who writes code
  6. A programming error

13 Clues: A programming errora person who writes codeanother word for softwarea single simple instructionThe most common type of porta common port smaller than USBthe action you take with your mousea list of steps needed to complete a taskthe practice of protecting computer systemsThe language that tells a computer what to do...

Generative Culture Crossword: Week 4 - Security 2020-10-25

Generative Culture Crossword: Week 4 - Security crossword puzzle
Across
  1. personnel conducted the fraud activity
  2. fraud activity intended to deceived victim for financial benefit.
  3. Metal _______ used as screening equipment to screen personnel.
  4. Head cover wear by Auxiliary police
  5. CCTVs is the example of video _____ system (VSS)to improve the parameters monitoring
Down
  1. Activity conducted by Auxiliary Police to check the INSTEP parameters.
  2. there are 4 supervisors for every shift which lead by ________
  3. _______ Minimum Security Standard (M2S2) describes the process for classifying PETRONAS facilities according to criticality.
  4. weapon stick used by Auxiliary Police.
  5. Who is the Sergeant for INSTEP Auxiliary Police?
  6. __________ light installed at patrol vehicle to improve visual presence during patrolling.
  7. What type of security measures applied when installing CCTVs? (refer to 4D1R concept)
  8. Installing anti climb wall is referring to what security measures? (refer to 4D1R concept)

13 Clues: Head cover wear by Auxiliary policepersonnel conducted the fraud activityweapon stick used by Auxiliary Police.Who is the Sergeant for INSTEP Auxiliary Police?there are 4 supervisors for every shift which lead by ________Metal _______ used as screening equipment to screen personnel.fraud activity intended to deceived victim for financial benefit....

Computer Words 2024-06-17

Computer Words crossword puzzle
Across
  1. the smallest unit of data that a computer can process and store.
  2. Security- the practice of protecting systems, networks, and programs from digital attacks
  3. the ability of software and hardware from different sources to work together without having to be altered to do so
  4. allows devices to communicate with each other without cables or wires.
  5. a software program used to locate and display information on the Internet or an intranet.
  6. any unsolicited communication sent in bulk.
  7. small files of information that a web server generates and sends to a web browser
  8. used to refer to computer files or memory that can be read or used, but not changed or added to in any way
  9. a tiny wafer of semiconducting material with an embedded electronic circuit.
  10. a data measurement unit applied to digital computer or media storage
  11. System- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  12. computer systems that are connected to a network and are accessible to users from anywhere at any time
  13. a unit of data that is eight binary digits long
  14. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
  15. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
  16. a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
  17. a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
  18. the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
  19. A zip is a file format that can contain multiple files combined and compressed into one file.
Down
  1. the capacity at which a network can transmit data.
  2. the use or operation of computers.
  3. a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
  4. to reload the operating system of a computer:
  5. an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
  6. the transmission of high-quality data of wide bandwidth.
  7. the number of pixels that are displayed per inch for an image
  8. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
  9. a set of rules for formatting and processing data.
  10. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  11. a computer on a network that provides the interface between two applications or networks that use different protocols
  12. the logic circuitry that responds to and processes the basic instructions that drive a computer
  13. device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
  14. files embedded within online communication channels such as emails, instant messages, or social networks
  15. Any stored data.
  16. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
  17. a type of malware that downloads onto a computer disguised as a legitimate program
  18. a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
  19. Crime- any criminal activity that involves a computer, network or networked device.
  20. A computer program that can copy itself and infect a computer without permission or knowledge of the user
  21. Space- the amount of data that can reside within the disk drive or storage medium to a maximum limit.

40 Clues: Any stored data.the use or operation of computers.any unsolicited communication sent in bulk.to reload the operating system of a computer:a unit of data that is eight binary digits longthe capacity at which a network can transmit data.a set of rules for formatting and processing data.the transmission of high-quality data of wide bandwidth....

Investment Course Lesson 10 Technical Analysis 1 2023-03-02

Investment Course Lesson 10 Technical Analysis 1 crossword puzzle
Across
  1. The rise and fall of markets on a repeated basis
  2. The average selling price of a security over a period of time, adjusted to reflect the most recent trend activities related to the stock in question
  3. when a security price and moving average crossover each other on the chart, indicating strong or weak investor confidence
  4. A technique to limit loss by buying more of an asset when the price falls
  5. A contract where the obligation to buy exists
Down
  1. shows how two moving averages in a particular security are related
  2. a narrow or defined classification of a company’s profile
  3. when the price of a security moves contrary to other data.
  4. a large section of the overall economy used to identify a company’s profile
  5. the average selling price of a stock over a period of time
  6. A contract that gives the buyer the right to buy an underlying asset at a certain price in the future

11 Clues: A contract where the obligation to buy existsThe rise and fall of markets on a repeated basisa narrow or defined classification of a company’s profilewhen the price of a security moves contrary to other data.the average selling price of a stock over a period of timeshows how two moving averages in a particular security are related...

Joshua Crossword Puzzle 2024-11-20

Joshua Crossword Puzzle crossword puzzle
Across
  1. - A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
  2. - is the process of detecting and preventing illegal or unauthorized use of a computer
  3. - is ensuring that the information is accessible to authorized persons when required without delay.
  4. - includes the applications on the computers and operating system.
  5. theft - Any action of stealing information from a users system.
  6. - An individual who breaks into computer systems to steal, change, or destroy information.
  7. - An action or event that has the potential to compromise and/or violate security.
Down
  1. - A defined method of breaching the security of an IT system through vulnerability.
  2. - refers to protecting personnel, hardware, programs, networks, and data from physical threats.
  3. Any action derived from intelligent threats to violate the security of the system.
  4. preventing intruders from accessing any part of a computer system.

11 Clues: theft - Any action of stealing information from a users system.- includes the applications on the computers and operating system.preventing intruders from accessing any part of a computer system.Any action derived from intelligent threats to violate the security of the system....

Cisco Enterprise Networking and DC In-depth 2020-07-31

Cisco Enterprise Networking and DC In-depth crossword puzzle
Across
  1. Routing & Switching Cisco competitor?
  2. Using multiple cloud services?
  3. SDN/SDWAN Cisco competitor?
  4. Unified intent-based networking architecture?
  5. type of switch that makes scaling the network easier?
  6. UCS Competitor of Cisco?
  7. SDN/SDWAN Cisco competitor?
  8. Common security problem with data centers?
  9. DC Storage competitor of Cisco?
Down
  1. DC Security competitor of Cisco?
  2. Routing & Switching Cisco competitor?
  3. Simplify the number of devices connected?
  4. UCS Competitor of Cisco's product line?
  5. Catalyst 3000 came from what company?
  6. Cisco's popular brand of network switches, wirleess controllers, and access points?
  7. DC Networking competitor of Cisco?

16 Clues: UCS Competitor of Cisco?SDN/SDWAN Cisco competitor?SDN/SDWAN Cisco competitor?Using multiple cloud services?DC Storage competitor of Cisco?DC Security competitor of Cisco?DC Networking competitor of Cisco?Routing & Switching Cisco competitor?Routing & Switching Cisco competitor?Catalyst 3000 came from what company?...

Lesson 2 Word 2022-03-28

Lesson 2 Word crossword puzzle
Across
  1. 안전
  2. 단서
  3. 포함하다
  4. 어떤
  5. 이로운
  6. 핥다
  7. 반영하다
  8. 알아차리다
Down
  1. 식단
  2. 주름
  3. 예방하다
  4. 용기, 담는 그릇
  5. 생강
  6. 장난끼 있는
  7. 자연
  8. 활동적인

16 Clues: 식단주름안전생강단서자연어떤핥다이로운예방하다포함하다활동적인반영하다알아차리다장난끼 있는용기, 담는 그릇

Great Depression Word search 2024-10-24

Great Depression Word search crossword puzzle
Across
  1. Deal
  2. plan
  3. Renaissance
  4. Trial
  5. Army
  6. works programs
  7. economy
  8. Age
  9. Bowl
  10. Scare
Down
  1. capitalism
  2. Tariff
  3. Security
  4. Valley Authority
  5. Act
  6. Tuesday

16 Clues: ActAgeDealplanArmyBowlTrialScareTariffTuesdayeconomySecuritycapitalismRenaissanceworks programsValley Authority

ICS puzzle 2023-12-12

ICS puzzle crossword puzzle
Across
  1. the process of converting coded or encrypted data to its original form.
  2. attempts by hackers to cause harm, destroy, or access sensitive information in a computer system.
  3. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
  4. a form of malware that distributes itself by transferring copies of itself to other computers across the network.
  5. attack swamps a website with so much traffic that it simply can’t cope
  6. a technique used by threat actors to leverage a vulnerability in order to compromise a system.
  7. a activity when cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
  8. a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
  9. A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
  10. an identity verification process
  11. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
  12. A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Down
  1. a program used to prevent, identify, and remove viruses and other malicious software from your computer.
  2. A copy of files and programs made to facilitate recovery, if necessary.
  3. an email-based threat that tries to coerce the victim into clicking on a link in an email or opening an attachment that has arrived by email.
  4. perform simulated cyberattacks on computer systems and networks to help identify security vulnerabilities and weaknesses.
  5. a modern security strategy based on the principle never trust, always verify.
  6. a network security device, it creates a barrier between a trusted network and an untrustworthy network.
  7. A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
  8. A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.
  9. Disclosure of information to unauthorized persons, or a violation of the security policy of a system.
  10. Unauthorized act of bypassing the security mechanisms of a system.
  11. Any circumstance or event with the potential to adversely impact organizational operations.
  12. an encrypted internet connection to provide a secure connection.
  13. a part of the World Wide Web only accessible through special software or tools, where keeps its users and visitors hidden.
  14. An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
  15. an unintended software or hardware problem
  16. An attack on the authentication protocol run in which the Attacker positions himself in between the Claimant and Verifier so that he can intercept and alter data traveling between them.

28 Clues: an identity verification processan unintended software or hardware probleman encrypted internet connection to provide a secure connection.Unauthorized act of bypassing the security mechanisms of a system.attack swamps a website with so much traffic that it simply can’t copeA copy of files and programs made to facilitate recovery, if necessary....

RU ITEC411 Chapter 5 Crime and Security 2026-03-11

RU ITEC411 Chapter 5 Crime and Security crossword puzzle
Across
  1. Security system to block unwanted stuff
  2. Scamming people through fake text messages
  3. Scamming people through fake phone calls
  4. Law that makes unauthorized access illegal
  5. Mixing information up so its unable to be read
  6. Fake system to study hackers
  7. Damaging / breaking into a computer network
  8. Providing identification to access
  9. Identifying someone using face scan or fingerprints
Down
  1. Harmful program on your computer
  2. Scamming people through fake emails
  3. Protecting devices from everything
  4. Impersonating someone with their information
  5. Computer program that spreads through devices
  6. Scamming people through fake redirecting websites
  7. Hacking but used for political issues
  8. Investigating computers for evidence for a crime
  9. Breaking into a computer without permission
  10. Stealing money using fake information

19 Clues: Fake system to study hackersHarmful program on your computerProtecting devices from everythingProviding identification to accessScamming people through fake emailsHacking but used for political issuesStealing money using fake informationSecurity system to block unwanted stuffScamming people through fake phone calls...

1a 2025-09-15

1a crossword puzzle
Across
  1. vezetéknév (last name)
  2. alany
  3. határozó
  4. szolgáltatás, kiszolgálás,
  5. biztonság
  6. kezdőbetűk
  7. főnév
  8. pont
  9. Hollandia (Holland)
  10. tárgy
Down
  1. melléknév
  2. irányítószám
  3. állam
  4. segédige
  5. ige
  6. kérdőszó
  7. személyi igazolvány (2)
  8. az ige szótári alakja
  9. @

19 Clues: @igepontállamalanyfőnévtárgysegédigehatározókérdőszómelléknévbiztonságkezdőbetűkirányítószámHollandia (Holland)az ige szótári alakjavezetéknév (last name)személyi igazolvány (2)szolgáltatás, kiszolgálás,

Chapter 8 - System Access 2023-03-21

Chapter 8 - System Access crossword puzzle
Across
  1. Permissions listed on an access control list (ACL) that are granted to a user. ACEs can be Allow or Deny. They can be assigned explicitly or inherited.
  2. The level of permissions that have been granted to a user who has been authenticated to a system.
  3. An object that contains security credentials. In Windows, it includes the user's security ID (SID) as well as the SID for each security group the user is a member.
  4. A method of authentication for which the user creates an online user account with Microsoft. Each time the user signs into the local system, Windows submits the credentials over the internet to Microsoft for authentication.
  5. The generally accessible key in a cryptographic system. It is used to encrypt data and is stored within a certificate. It cannot be used to decrypt the data.
  6. The security process in which the client authenticates to the server and, before data is exchanged, the server authenticates back to the client.
  7. A security feature that can be configured in the Windows sign-in settings to automatically lock a computer when the user walks away. It requires a Bluetooth device (typically a smartphone) that can be connected to the workstation.
  8. A collection of access rights, usually connected with an employee's responsibilities in an organization.
  9. A text string or regular expression used to scan files for matches.
  10. Rules that include a condition that must be matched for permission assignments to be made.
  11. The key that is used to decrypt data in a cryptographic system. It is stored in a private certificate store and should be protected and not shared.
  12. A group of users who have complete and unrestricted access to the system and accounts.
  13. In Windows, the ability to set policies that will provide feedback on specified events within a host or network.
  14. An action a user can perform on a system. Group Policy provides a set of predefined rights.
  15. Permissions granted to files or subfolders based on the permissions assigned to a parent folder.
  16. A method of authentication that stores on the local system the usernames and passwords for each user.
Down
  1. Microsoft's virtualization machine creation software that can create software-based virtual computers within a Windows system.
  2. A setting or group of settings applied to a user or computer. Polices are configured using Group Policy on the local computer or in the domain.
  3. A process of translating data into an unreadable format or code to prevent unauthorized access to the data.
  4. A permission uses an allow or deny statement to control user access to resources.
  5. A Windows feature that uses virtualization extensions of the central processing unit. It is used to protect data in memory from malicious attacks.
  6. A feature of Windows server systems that allows the system administrator to centralize control of access to files and folders based on file and folder attributes in combination with the attributes of the user.
  7. The security process in which the client authenticates to the server before the server will send data back to the client.
  8. A method of authentication that stores the usernames and passwords on a remote computer within the network that is configured as a domain controller.
  9. A device you can buy from a retailer for authentication. It can be configured in Windows for use as an additional sign-in option.
  10. A Windows encryption feature that is used on full volumes and cannot be used on individual files or folders.
  11. In Windows auditing, a setting in an auditing policy that turns on the logging of events in a host or network.
  12. A list of permissions granted to users and groups. The permissions are associated with an NTFS file or folder.
  13. A list of central access rules that define the level of access a user has to data managed by DAC.
  14. A collection of users that, by default, has very minimal access to the system.
  15. The creator of a file or folder who, by default, has full access.
  16. A Windows sub-security process that authenticates to the local system, stores security-related information, and creates access tokens.
  17. Security features that restrict or allow user access to resources on the system.
  18. A component of the Windows operating system that helps protect the system during the start-up or boot process.
  19. A biometric logon system incorporated into Windows 10 sign-in settings.
  20. In Windows auditing, a setting that turns off an auditing policy.
  21. Verifying that an entity requesting credentials is the entity associated with the credentials. It is also called identity proofing.

37 Clues: The creator of a file or folder who, by default, has full access.In Windows auditing, a setting that turns off an auditing policy.A text string or regular expression used to scan files for matches.A biometric logon system incorporated into Windows 10 sign-in settings.A collection of users that, by default, has very minimal access to the system....

AppSec Village @ BlueHat India 2024-01-18

AppSec Village @ BlueHat India crossword puzzle
Across
  1. A script that's cross, but not because it's angry
  2. A token of security, not a medieval pledge of fealty
  3. A case of mistaken identity, but for cloud resources
  4. A web menace that's not a cookie monster, but might use one
  5. A directory in the cloud, not a phonebook
  6. A bouncer for cloud services, checking IDs at the door
  7. A casting director for cloud access, assigning roles, not actors
Down
  1. A central hub for cloud safety, not a mall cop station
  2. Where secrets are locked away, not in a pirate's chest
  3. Not just a catwalk for risks, it's a blueprint for defense
  4. A security check that's more of a poke around than a full physical
  5. A blend of development, security, and operations - shaken, not stirred
  6. It's a scramble, but not for breakfast

13 Clues: It's a scramble, but not for breakfastA directory in the cloud, not a phonebookA script that's cross, but not because it's angryA token of security, not a medieval pledge of fealtyA case of mistaken identity, but for cloud resourcesA central hub for cloud safety, not a mall cop stationWhere secrets are locked away, not in a pirate's chest...

The Thrilling Puzzle Climax Of K Collins' Computer Science Lessons 2023-05-04

The Thrilling Puzzle Climax Of K Collins' Computer Science Lessons crossword puzzle
Across
  1. What car manufacturer made the first modern driverless car
  2. Data should not be kept longer than
  3. Who is exempt from the data protection act
  4. All personal data should be kept
  5. The owner of the data
Down
  1. The DPA has 8
  2. Police, Government and Taxers all all ______ from the DPA
  3. A form of cyber-bullying
  4. Data must be routinely for maximum protection
  5. Data should be used

10 Clues: The DPA has 8Data should be usedThe owner of the dataA form of cyber-bullyingAll personal data should be keptData should not be kept longer thanWho is exempt from the data protection actData must be routinely for maximum protectionPolice, Government and Taxers all all ______ from the DPAWhat car manufacturer made the first modern driverless car

English Holiday HomeWork Mohamed Asharaful Part 1 2021-08-28

English Holiday HomeWork Mohamed Asharaful Part 1 crossword puzzle
Across
  1. Poverty, SDG goal against poverty.
  2. Water and Sanitization, Lacking in cleanliness and water.
  3. Responsibility, Responsible posts and appropriate posts against any sensitive topic.
  4. Education, SDG goal for good education.
  5. A chance for next generation.
  6. Life, Non polluted life for animals in land.
  7. People who use internet to bully people psychologically.
Down
  1. For the next generation.
  2. For the transportation.
  3. Life, Non-Polluted life under the water.

10 Clues: For the transportation.For the next generation.A chance for next generation.Poverty, SDG goal against poverty.Education, SDG goal for good education.Life, Non-Polluted life under the water.Life, Non polluted life for animals in land.People who use internet to bully people psychologically.Water and Sanitization, Lacking in cleanliness and water....

7cf nachhol 2024-01-13

7cf nachhol crossword puzzle
Across
  1. a group of people who sing
  2. to suddenly talk to somebody in a aggressive way: to ...
  3. verb for behaviour: to ...
  4. something you can carry injured people with
  5. to say something nasty about someone online: cyber ...
Down
  1. a very high building
  2. ... to a survey, children use their mobile phones too often
  3. English for "besonders"
  4. another word for "most of the time"
  5. noun of "to use"

10 Clues: noun of "to use"a very high buildingEnglish for "besonders"a group of people who singverb for behaviour: to ...another word for "most of the time"something you can carry injured people withto say something nasty about someone online: cyber ...to suddenly talk to somebody in a aggressive way: to ......

social media and mental health 2024-04-19

social media and mental health crossword puzzle
Across
  1. platform made by meta
  2. online, perhaps
  3. mean action done by one or more people to another group or person
  4. a feeling related to sunshine and the color yellow
  5. slow exercise that helps with flexibility and calming
Down
  1. people use this to talk about their feelings
  2. social media users make these
  3. prolonged sadness
  4. quiet activity to help clear and calm the mind
  5. severe worrying

10 Clues: online, perhapssevere worryingprolonged sadnessplatform made by metasocial media users make thesepeople use this to talk about their feelingsquiet activity to help clear and calm the minda feeling related to sunshine and the color yellowslow exercise that helps with flexibility and calming...

Technogley 2025-01-16

Technogley crossword puzzle
Across
  1. the brain of your computer
  2. it capulises your words
  3. it makes your computer have sound
  4. it can tern your computer on and of
  5. bullying
Down
  1. it macks your crombook eseer or harder to here
  2. helps you find things you don't know
  3. it deletes letters of your screens
  4. how you connect internet to a phone, tablet or computer
  5. saver photos and words and letters

10 Clues: bullyingit capulises your wordsthe brain of your computerit makes your computer have soundit deletes letters of your screenssaver photos and words and lettersit can tern your computer on and ofhelps you find things you don't knowit macks your crombook eseer or harder to herehow you connect internet to a phone, tablet or computer

Hass im Netz 2025-05-16

Hass im Netz crossword puzzle
Across
  1. Vorsilbe für alles, was im Internet passiert.
  2. So nennt man einen Beitrag in sozialen Netzwerken.
  3. Person, die im Netz absichtlich provoziert.
  4. Damit sichert man Beweise bei Cybermobbing.
  5. Beleidigende oder hetzerische Sprache im Netz.
Down
  1. Diese sollte man auch im Netz schützen.
  2. Im Internet oft ohne echten Namen unterwegs.
  3. Welle negativer Kommentare im Netz.
  4. So schützt man sich vor Belästigung online.
  5. Online-Kommunikation in Echtzeit.

10 Clues: Online-Kommunikation in Echtzeit.Welle negativer Kommentare im Netz.Diese sollte man auch im Netz schützen.So schützt man sich vor Belästigung online.Person, die im Netz absichtlich provoziert.Damit sichert man Beweise bei Cybermobbing.Im Internet oft ohne echten Namen unterwegs.Vorsilbe für alles, was im Internet passiert....

Cisco Enterprise Networking and Data Center Indepth 2020-07-31

Cisco Enterprise Networking and Data Center Indepth crossword puzzle
Across
  1. Routing & Switching Cisco competitor?
  2. Using multiple cloud services?
  3. SDN/SDWAN Cisco competitor?
  4. Unified intent-based networking architecture?
  5. type of switch that makes scaling the network easier?
  6. UCS Competitor of Cisco?
  7. SDN/SDWAN Cisco competitor?
  8. Common security problem with data centers?
  9. DC Storage competitor of Cisco?
Down
  1. DC Security competitor of Cisco?
  2. Routing & Switching Cisco competitor?
  3. Simplify the number of devices connected?
  4. UCS Competitor of Cisco's product line?
  5. Catalyst 3000 came from what company?
  6. Cisco's popular brand of network switches, wirleess controllers, and access points?
  7. DC Networking competitor of Cisco?

16 Clues: UCS Competitor of Cisco?SDN/SDWAN Cisco competitor?SDN/SDWAN Cisco competitor?Using multiple cloud services?DC Storage competitor of Cisco?DC Security competitor of Cisco?DC Networking competitor of Cisco?Routing & Switching Cisco competitor?Routing & Switching Cisco competitor?Catalyst 3000 came from what company?...

1989-Present Day 2026-01-20

1989-Present Day crossword puzzle
Across
  1. Taxes on imported goods
  2. UN intervention in 1990s Africa (7,3)
  3. Current U.S. President
  4. Air travel security screening (2,4,4)
  5. Former dictator of Libya
  6. PM of Canada during COVID
  7. Started the War on Terror
  8. The fall of this symbolized the end of Cold War
Down
  1. NAFTA was replaced by this in 2020
  2. Post-9/11 security laws (7,3)
  3. 1991 end of this communist superpower (6,5)
  4. Mass displacement from Middle East conflicts (7,6)
  5. He signed NAFTA
  6. 2010 Middle East uprisings (4,6)

14 Clues: He signed NAFTACurrent U.S. PresidentTaxes on imported goodsFormer dictator of LibyaPM of Canada during COVIDStarted the War on TerrorPost-9/11 security laws (7,3)2010 Middle East uprisings (4,6)NAFTA was replaced by this in 2020UN intervention in 1990s Africa (7,3)Air travel security screening (2,4,4)1991 end of this communist superpower (6,5)...

Safer Internet 2020-04-01

Safer Internet crossword puzzle
Across
  1. Person die sich als eine andre ausgibt.
  2. Beweise zu sichern wäre auch sehr vorteilhaft
  3. niedrige Preise heißen auch .....preise.
  4. Gegenteil von offline.
  5. Es gibt Vorteile im Internet, aber auch ....
Down
  1. Beim Phishing versucht man deine .... zu bekommen.
  2. Deine ...... solltest du schützen.
  3. Unter Cyber-Mobbing versteht man das ......,Bedrohen,Belästigen und Bloßstellen einer Person
  4. Damit bezahlst du in bar.

9 Clues: Gegenteil von offline.Damit bezahlst du in bar.Deine ...... solltest du schützen.Person die sich als eine andre ausgibt.niedrige Preise heißen auch .....preise.Es gibt Vorteile im Internet, aber auch ....Beweise zu sichern wäre auch sehr vorteilhaftBeim Phishing versucht man deine .... zu bekommen....

KI-Betrug: Die neuen Tricks der Cyberkriminellen 2025-03-28

KI-Betrug: Die neuen Tricks der Cyberkriminellen crossword puzzle
Across
  1. - Was Phishing-E-Mails verwenden, um Sie auszutricksen.
  2. – Das solltest du tun, bevor du jemandem vertraust.
  3. - Fälschen einer E-Mail oder Telefonnummer.
  4. - Die Technologie hinter diesen neuen Betrügereien.
Down
  1. – Wenn geheime Daten plötzlich öffentlich sind.
  2. - Eine Sicherheitsfalle für Cyber-Kriminelle (engl.).
  3. - Ein realistisches, aber gefälschtes Video.
  4. - KI kann dies mit Stimmen tun.
  5. – Wenn jemand dich absichtlich täuscht.

9 Clues: - KI kann dies mit Stimmen tun.– Wenn jemand dich absichtlich täuscht.- Fälschen einer E-Mail oder Telefonnummer.- Ein realistisches, aber gefälschtes Video.– Wenn geheime Daten plötzlich öffentlich sind.– Das solltest du tun, bevor du jemandem vertraust.- Die Technologie hinter diesen neuen Betrügereien....

Literasi Digital 2024-08-15

Literasi Digital crossword puzzle
Across
  1. Nama lain dari kata sandi
  2. Aktivitas yang dilakukan seseorang secara daring untuk mengganggu atau menyakiti orang lain
  3. Kejahatan didunia digital disebut cyber
  4. Keamanan sangat penting untuk menjaga
Down
  1. Nama lain dari perangkat lunak
  2. Manfaat literasi digital untuk menambah
  3. Negara yang memiliki tingkat literasi digital yang tinggi
  4. HAKI terbagi menjadi berapa bagian
  5. Tombol untuk membatalkan tindakan di komputer

9 Clues: Nama lain dari kata sandiNama lain dari perangkat lunakHAKI terbagi menjadi berapa bagianKeamanan sangat penting untuk menjagaManfaat literasi digital untuk menambahKejahatan didunia digital disebut cyberTombol untuk membatalkan tindakan di komputerNegara yang memiliki tingkat literasi digital yang tinggi...

Profiles 1 text 1 Santeri 2014-12-03

Profiles 1 text 1 Santeri crossword puzzle
Across
  1. juutalainen
  2. välttämätön
  3. lentokone
  4. olla pahoillaan
  5. matkustaa
  6. tavara
Down
  1. vastakkainen
  2. jono
  3. osoittaa
  4. alue
  5. romaani
  6. kantaa
  7. turvallisuus
  8. miehistö
  9. esine

15 Clues: jonoalueesinekantaatavararomaaniosoittaamiehistölentokonematkustaajuutalainenvälttämätönvastakkainenturvallisuusolla pahoillaan

Profiles 1 text 1 Santeri 2014-12-03

Profiles 1 text 1 Santeri crossword puzzle
Across
  1. tavara
  2. osoittaa
  3. miehistö
  4. vastakkainen
  5. romaani
  6. kantaa
  7. turvallisuus
Down
  1. jono
  2. juutalainen
  3. välttämätön
  4. matkustaa
  5. lentokone
  6. esine
  7. alue
  8. olla pahoillaan

15 Clues: jonoalueesinetavarakantaaromaaniosoittaamiehistömatkustaalentokonejuutalainenvälttämätönvastakkainenturvallisuusolla pahoillaan

Daily Vocabularies 2024-01-20

Daily Vocabularies crossword puzzle
Across
  1. percaya diri
  2. terang
  3. masalah
  4. membandingkan
  5. melihat
  6. menarik
  7. bermanfaat
  8. pemerintah
  9. kebenaran
  10. keamanan
Down
  1. menerima
  2. membayangkan
  3. merayakan
  4. penting
  5. bertahan

15 Clues: terangmasalahmelihatmenarikpentingmenerimabertahankeamananmerayakankebenaranbermanfaatpemerintahpercaya dirimembayangkanmembandingkan

Stay Smart Online 2023-01-05

Stay Smart Online crossword puzzle
Across
  1. Stay _________ in Cyberspace.
  2. Always remember to ______ your accounts from other's devices.
  3. Do not share your ______ with anyone.
  4. Report any cases of _______ to Cyber crime department.
Down
  1. Respect the _________ laws
  2. Never share personal details on __________
  3. Be aware of _____ while shopping online.
  4. Apply _______ settings in Whatsapp to safeguard your data.

8 Clues: Respect the _________ lawsStay _________ in Cyberspace.Do not share your ______ with anyone.Be aware of _____ while shopping online.Never share personal details on __________Report any cases of _______ to Cyber crime department.Apply _______ settings in Whatsapp to safeguard your data.Always remember to ______ your accounts from other's devices.

DE TOPIC 1 2025-08-03

DE TOPIC 1 crossword puzzle
Across
  1. utilising software and digital and technologies
  2. Operates online
  3. Follow islamic principles and ethics
  4. Focus on physical good and services
Down
  1. Create positive societal impact
  2. Integration of cyber-physical systems, IoT, AI and data analitics
  3. Focused on mass production and global market
  4. Focused on sustainability and environment conservation

8 Clues: Operates onlineCreate positive societal impactFocus on physical good and servicesFollow islamic principles and ethicsFocused on mass production and global marketutilising software and digital and technologiesFocused on sustainability and environment conservationIntegration of cyber-physical systems, IoT, AI and data analitics

Technology Vocabulary 2022-01-21

Technology Vocabulary crossword puzzle
Across
  1. involving,using,or relating to the internet
  2. a person who has grown up with digital tech
  3. someone who dislikes new technology
  4. a discovery that really improves a situation
  5. to move something forward,or improve something
  6. a way something can be used for a purpose
Down
  1. important change in the way people do things
  2. to cause a change in someone or something
  3. the most modern stage of development
  4. the use of a new idea or method
  5. to start to happen or exist
  6. to continue gradually

12 Clues: to continue graduallyto start to happen or existthe use of a new idea or methodsomeone who dislikes new technologythe most modern stage of developmentto cause a change in someone or somethinga way something can be used for a purposeinvolving,using,or relating to the interneta person who has grown up with digital tech...

malware 2023-06-19

malware crossword puzzle
Across
  1. sending emails or messages as fake company
  2. a word to keep your things safe
  3. fishing pretending to be a different person
  4. control lets parents set the settings on a device
  5. fraud a scam online
  6. a type of malware that downloads onto a computer
  7. mail emails that a useless
Down
  1. a program that breaks your device
  2. A computer program that can run independently
  3. allows users to convert information
  4. leaving a trace online
  5. when a person winds another up online

12 Clues: fraud a scam onlineleaving a trace onlinemail emails that a uselessa word to keep your things safea program that breaks your deviceallows users to convert informationwhen a person winds another up onlinesending emails or messages as fake companyfishing pretending to be a different personA computer program that can run independently...

Digital Strategy 2025-11-03

Digital Strategy crossword puzzle
Across
  1. predicting future demand for products
  2. software for managing business processes.
  3. Raw facts and figures used for analytics
  4. the process of sourcing and purchasing goods or services.
  5. monitoring the movement of goods.
  6. operating on an international scale
Down
  1. Network of suppliers, manufacturers and costumers
  2. Protecting systems and data from cyber threats
  3. Technology enabling remote access to computing resources
  4. a measurable value to evaluate performance.
  5. Automated tool that interacts with users via text or voice
  6. Step-by-step procedure for solving a problem

12 Clues: monitoring the movement of goods.operating on an international scalepredicting future demand for productsRaw facts and figures used for analyticssoftware for managing business processes.a measurable value to evaluate performance.Step-by-step procedure for solving a problemProtecting systems and data from cyber threats...

Phish 2024-09-18

Phish crossword puzzle
Across
  1. : “Too good to be true”
  2. : Familiar ___ are often faked by scammers
  3. Link : Imposter website
  4. for help : Sense danger?
  5. : Who should learn how to recognize and avoid (phishing)?
  6. Breach : Exposes business secrets and confidential data
Down
  1. Criminal : A stranger in a dark alley is much like a _____ in your inbox.
  2. : Where to find additional information on the different types of (phishing)
  3. : Malicious email attack
  4. : Compromises computer and files
  5. Credentials : Never send these via email
  6. : “Think Before You ___”
  7. Phish : Who do you report suspicious email to?

13 Clues: : “Too good to be true”Link : Imposter website: Malicious email attack: “Think Before You ___”for help : Sense danger?: Compromises computer and filesCredentials : Never send these via email: Familiar ___ are often faked by scammersPhish : Who do you report suspicious email to?Breach : Exposes business secrets and confidential data...

Networking and Cyber Ethics 2025-06-11

Networking and Cyber Ethics crossword puzzle
Across
  1. Sending unwanted emails or advertisements
  2. Speech Avoiding this keeps others safe from harm online
  3. Misleading information shared online
  4. A program designed to harm a computer
  5. Using someone else's work without giving credit
  6. The act of bullying others using digital devices
  7. These guide our behavior on the internet
  8. Taking credit for someone else's work
  9. The illegal copying of software
Down
  1. When someone pretends to be someone else online
  2. A person who uses technology to harm or steal
  3. Making changes to software without permission
  4. Strong word or phrase used to protect accounts
  5. Being honest and fair online
  6. Using fake identity to cheat or harm online users
  7. Using the internet in a respectful and legal way
  8. Keeping your personal data safe
  9. You should always think before you do this on social media
  10. Theft Type of theft involving personal data

19 Clues: Being honest and fair onlineKeeping your personal data safeThe illegal copying of softwareMisleading information shared onlineA program designed to harm a computerTaking credit for someone else's workThese guide our behavior on the internetSending unwanted emails or advertisementsTheft Type of theft involving personal data...

Stock Market Terms 2020-05-19

Stock Market Terms crossword puzzle
Across
  1. is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
  2. the price a seller is willing to accept for a security [1 wrd]
  3. is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
  4. is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
  5. a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
  6. is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
  7. a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
  8. to obtain in exchange for payment[1 wrd]
  9. the availability of liquid assets to a market or company [1 wrd]
  10. an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
  11. is the completion of a buy or sell order for a security. [1 wrd]
  12. is the last price at which a security or commodity traded [1 wrd]
  13. is a portmanteau of foreign currency and exchange. [1wds]
  14. A bear market is when a market experiences prolonged price declines. [2wds]
  15. refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
  16. give or hand over something in exchange for currency [ 1 wrd]
  17. is defined as the purchase and sale of a security within a single trading day. [2 wds]
  18. is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
  19. is the total quantity of shares or contracts traded for a specified security. [2wds]
  20. refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
  1. is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
  2. an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
  3. sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
  4. is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
  5. is a unique series of letters assigned to a security for trading purposes. [1 wrd]
  6. the number of shares that a corporation is legally allowed to issue[2 wds]
  7. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
  8. is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
  9. refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
  10. refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
  11. involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
  12. is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
  13. is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
  14. a range of investments held by a person or organization. [1 wrd]
  15. is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
  16. offer a certain price for something especially at an auction [ 1wrd]
  17. is a measurement of market risk or volatility .[1 wds]
  18. A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
  19. the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
  20. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]

40 Clues: to obtain in exchange for payment[1 wrd]is a measurement of market risk or volatility .[1 wds]is a portmanteau of foreign currency and exchange. [1wds]give or hand over something in exchange for currency [ 1 wrd]the price a seller is willing to accept for a security [1 wrd]the availability of liquid assets to a market or company [1 wrd]...

Stock Market Terms 2020-05-21

Stock Market Terms crossword puzzle
Across
  1. is a period of sustained increases in the prices of stocks, bonds or indexes. [ 1 wrd]
  2. the price a seller is willing to accept for a security [1 wrd]
  3. is a basket of securities that tracks an underlying index , can contain various investments including stocks, commodities, and bonds. [acronym]
  4. is a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market [2wds]
  5. a company that typically has a large market cap, a sterling reputation and many years of success in the business world.[3 wds]
  6. is an aggressively managed portfolio of investments that uses leveraged, long, short and derivative positions. [2wds]
  7. a group of companies that operate in the same segment of the economy or share a similar business type. [1 wrd]
  8. to obtain in exchange for payment[1 wrd]
  9. the availability of liquid assets to a market or company [1 wrd]
  10. an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it [4 wds]
  11. is the completion of a buy or sell order for a security. [1 wrd]
  12. is the last price at which a security or commodity traded [1 wrd]
  13. is a portmanteau of foreign currency and exchange. [1wds]
  14. A bear market is when a market experiences prolonged price declines. [2wds]
  15. refers to the earnings generated and realized on an investment over a particular period of time.[1 wrd]
  16. give or hand over something in exchange for currency [ 1 wrd]
  17. is defined as the purchase and sale of a security within a single trading day. [2 wds]
  18. is a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock. [acronym]
  19. is the total quantity of shares or contracts traded for a specified security. [2wds]
  20. refers to the process of offering shares of a private corporation to the public in a new stock issuance.[3 wds]
Down
  1. is the amount by which the ask price exceeds the bid price for an asset in the market [3 wds]
  2. an individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor. [1 wds]
  3. sale of new or closely held shares of a company that has already made an initial public offering .[2wds]
  4. is a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations. [2 wds]
  5. is a unique series of letters assigned to a security for trading purposes. [1 wrd]
  6. the number of shares that a corporation is legally allowed to issue[2 wds]
  7. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]
  8. is an order to purchase an asset at or below a specified price, allowing traders to control how much they pay [ 2wds]
  9. refers to the difference between the seller's cost for acquiring products and the selling price.[1 wrd]
  10. refers to the shares of a company that can be publicly traded and are not restricted [2 wds]
  11. involves investing additional amounts in a financial instrument or asset if it declines significantly in price after the original investment is made.[2wds]
  12. is a statistical measure of the dispersion of returns for a given security or market index.[1 wrd]
  13. is a financial market of a group of securities in which prices are rising or are expected to rise [2 wds]
  14. a range of investments held by a person or organization. [1 wrd]
  15. is an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset.[1 wds]
  16. offer a certain price for something especially at an auction [ 1wrd]
  17. is a measurement of market risk or volatility .[1 wds]
  18. A day order is a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed [2wds]
  19. the buying of a stock, commodity, or currency with the expectation that it will rise in value. [2 wds]
  20. is the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders. [1 wrd]

40 Clues: to obtain in exchange for payment[1 wrd]is a measurement of market risk or volatility .[1 wds]is a portmanteau of foreign currency and exchange. [1wds]give or hand over something in exchange for currency [ 1 wrd]the price a seller is willing to accept for a security [1 wrd]the availability of liquid assets to a market or company [1 wrd]...

Safety and Security 2016-03-15

Safety and Security crossword puzzle
Across
  1. Business names, Garda arival, coin order, cash amounts transfered
  2. Bundling/Clipping money and keeping drawer____
  3. Processes and methodologies designed to protect sensitive information
  4. Have a password protect _____ for all private information
  5. Locking your _____ anytime you walk away from station
  6. If you leave our desk/computer do this
  7. Limit for bottom drawer
  8. Keep your security codes ____
Down
  1. Limit for top drawer
  2. Before you leave at night do this to your workstation PC
  3. Handwritten notes, documents, account numbers
  4. Print, Electronic, Verbal
  5. None of these items in your drawer
  6. Email, OSI, Velocity, Online check orders

14 Clues: Limit for top drawerLimit for bottom drawerPrint, Electronic, VerbalKeep your security codes ____None of these items in your drawerIf you leave our desk/computer do thisEmail, OSI, Velocity, Online check ordersHandwritten notes, documents, account numbersBundling/Clipping money and keeping drawer____...

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. Use the ____ button when you receive a 'sus'email
  2. Number of people that are emailed when we call 911
  3. The company that monitors our alarms
  4. ____, hide, neutralize in an active shooter situation
  5. Packet in vault room with specific instructions
  6. ___ with all demands of the robber
Down
  1. When safe to do so press your ____ buttons
  2. To call 911 dial _-911
  3. Never write down or share _____
  4. In the event of a fire, ____ mbr sensitive info
  5. Always leave the building in ____
  6. Packet under the phone
  7. ___ parking lot is our Secondary Meeting Spot
  8. Great ___ is our best robbery deterrent

14 Clues: To call 911 dial _-911Packet under the phoneNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons___ parking lot is our Secondary Meeting Spot...

Q4 Security Training 2023-12-20

Q4 Security Training crossword puzzle
Across
  1. When safe to do so, we should activate the _____ or/and observe the robber's escape route.
  2. thousand What is the amount dispensed during a robbery from the TCR?
  3. To preserve evidence of a not pass robbery, drop the note on the ____ or leave it at your station.
  4. The type of form filled out when observing a robber.
  5. Person responsible for advising members of a robbery situation.
  6. All Media inquires go to this department.
  7. Most bomb threats and extortion are received this way.
  8. These eight items around the branch can help alert security that a robbery has occurred.
Down
  1. Person responsible for shouting "I've been robbed, Lock the doors!"
  2. The practice of obtaining something, especially money, through force of threats.
  3. When calling 911, we call from an RBFCU ____ ____.
  4. This form provides the following information: Contact names, instructions for branch employees on what to do during and after a robbery, and phone numbers.
  5. Behavior to keep during a robbery is to ___ _____ and avoid sudden movements.
  6. Keys to press for dispense procedure.

14 Clues: Keys to press for dispense procedure.All Media inquires go to this department.When calling 911, we call from an RBFCU ____ ____.The type of form filled out when observing a robber.Most bomb threats and extortion are received this way.Person responsible for advising members of a robbery situation....

Information Security Awareness 2020-09-24

Information Security Awareness crossword puzzle
Across
  1. This is better and harder to crack than a password
  2. The type of email to get you to click on a fraudulent link
  3. Disclosing personal member information may be
  4. The best response to password Recovery Questions is
  5. engineering,How might someone evil try to get information from you
  6. Someone that follows closely behind you without using their badge
  7. Minimum number of characters for a network password
  8. What is not allowed in a DNA password
  9. This is better and harder to crack than a password
  10. If I click on a link I believe was malicious I should
Down
  1. How do you think most evil hackers begin to break into a company’s network?
  2. What is the default data classification
  3. The data classification for Employee Handbook, internal phone directory
  4. Best way to keep track of multiple unique passwords
  5. Who is responsible for data security

15 Clues: Who is responsible for data securityWhat is not allowed in a DNA passwordWhat is the default data classificationDisclosing personal member information may beThis is better and harder to crack than a passwordThis is better and harder to crack than a passwordThe best response to password Recovery Questions is...

Puzzle #10 – “Direct Deposit” 2025-06-29

Puzzle #10 – “Direct Deposit” crossword puzzle
Across
  1. - Agency that sets up your Social Security payments
  2. - Direct deposit is this compared to mailing checks
  3. - Electronic way to receive Social Security benefits
  4. - You must have this to receive direct deposit
  5. - Where your Social Security check is usually sent
Down
  1. - The method used instead of paper checks
  2. - How payments are delivered once direct deposit is set up
  3. - One reason direct deposit is recommended
  4. - Type of account where deposits often go
  5. - This number helps send money to the right bank

10 Clues: - The method used instead of paper checks- Type of account where deposits often go- One reason direct deposit is recommended- You must have this to receive direct deposit- This number helps send money to the right bank- Where your Social Security check is usually sent- Agency that sets up your Social Security payments...

CyberDSA D2 2025-08-14

CyberDSA D2 crossword puzzle
Across
  1. Encrypted network connection over the internet for secure communication.
  2. Software that secretly collects user information.
  3. Security Operations Center that monitors and responds to threats.
  4. Process of verifying the identity of a user or system.
  5. Copy of data kept for recovery in case of loss.
Down
  1. Process of converting data into a secure, unreadable format.
  2. Secret string used to authenticate a user.
  3. Software update designed to fix security vulnerabilities.
  4. Network security device that filters incoming and outgoing traffic.
  5. Malicious program that can copy itself and infect systems.

10 Clues: Secret string used to authenticate a user.Copy of data kept for recovery in case of loss.Software that secretly collects user information.Process of verifying the identity of a user or system.Software update designed to fix security vulnerabilities.Malicious program that can copy itself and infect systems....

Delirium (section 2) 2015-05-07

Delirium (section 2) crossword puzzle
Across
  1. Lena's pretty best friend.
  2. The color of a storm cloud.
  3. A house on a farmstead.
  4. The name for the disease of love.
  5. A word for security watching people.
  6. Library of approved books.
  7. Lena's aunt's name.
  8. A live music show.
Down
  1. People who live in the wilds.
  2. Separation of people based on prejudice.
  3. A vision you have while sleeping.
  4. A certain time for someone to be home.
  5. Where Alex takes his classes(University of Portland).
  6. People who patrol the streets after curfew.
  7. A place where science experiments are conducted.
  8. A solution to a sickness.
  9. Main character.
  10. Security gaur who Hana and Lena get caught by.
  11. Alex has a 3 pronged _____ on the side of his head.
  12. Library of authorized music.

20 Clues: Main character.A live music show.Lena's aunt's name.A house on a farmstead.A solution to a sickness.Lena's pretty best friend.Library of approved books.The color of a storm cloud.Library of authorized music.People who live in the wilds.A vision you have while sleeping.The name for the disease of love.A word for security watching people....

Compliance Division 2024-02-07

Compliance Division crossword puzzle
Across
  1. Elevated __________
  2. Plays in a band
  3. Wrong 50% of the time
  4. Must agree on 3-way
  5. Email requiring action
  6. Where to send outstanding transactions
  7. Warning
  8. AKA True-up
  9. A monthly charge
  10. Fitness Enthusiast
  11. May hold Security Deposits
  12. For owner or tenant
  13. Where the bad ones go
  14. Loves Indy
  15. OK if Agreed to in PMA
  16. Part I _______
  17. Software
  18. Type of account
Down
  1. Often missing from Check Register
  2. Monthly Requirement
  3. When all three parts equal
  4. Often refundable
  5. Rentals we don't want to see in a CTA
  6. Money holder
  7. Pays the security deposit
  8. Makes the best cookies
  9. Mixed funds
  10. When records are not received
  11. Take me to your leader
  12. Not allowed to come out of a CTA

30 Clues: WarningSoftwareLoves IndyAKA True-upMixed fundsMoney holderPart I _______Plays in a bandType of accountOften refundableA monthly chargeFitness EnthusiastElevated __________Monthly RequirementMust agree on 3-wayFor owner or tenantWrong 50% of the timeWhere the bad ones goEmail requiring actionMakes the best cookiesOK if Agreed to in PMA...

LIVEABILITY CROSSWORD 2025-03-17

LIVEABILITY CROSSWORD crossword puzzle
Across
  1. A community need for teenagers.
  2. Contaminates in the air, water or land.
  3. Commerce, trade and enterprise.
  4. Dentists, hospital, ambulance availability
  5. Train transport.
  6. Weather patterns and conditions. Temperature.
  7. A good government that is stable provides...
  8. Most people's preferred climate.
  9. Essentials structures and systems for a community
Down
  1. Childcare, TAFE, university, schools.
  2. The way people do life and experiences together
  3. Protection, security, well-being
  4. A place for healing and caring for the sick.
  5. Breaking of laws that make areas unsafe to live in.
  6. Purity of the air and atmosphere in a community.
  7. The qualities of a place that make it comfortable and suitable for living
  8. Leadership of communities.
  9. The business of selling goods to the public.
  10. Used for domestic and international travel.
  11. Worship, prayer, gathering

20 Clues: Train transport.Leadership of communities.Worship, prayer, gatheringA community need for teenagers.Commerce, trade and enterprise.Protection, security, well-beingMost people's preferred climate.Childcare, TAFE, university, schools.Contaminates in the air, water or land.Dentists, hospital, ambulance availability...

IT Terms 2025-05-15

IT Terms crossword puzzle
Across
  1. Internet-based delivery of IT resources.
  2. Software to manage customer interactions.
  3. Two-symbol system used by computers.
  4. Computer system within a larger system.
  5. Plan for continuing business during disruption.
  6. Simulates human intelligence in machines.
  7. Processes and executes instructions (abbr).
  8. Network of physical devices sharing data.
  9. Unique address for a device on a network.
  10. Device connected to a network.
  11. Visual interface with icons and menus.
  12. Tech and strategy for analyzing business data.
Down
  1. Stores data temporarily for quick access.
  2. Organized collection of electronic data.
  3. Protects systems from digital threats.
  4. Converts data into code for security.
  5. Group of connected computers sharing rules.
  6. Security device that filters traffic.
  7. Finding and fixing code issues.
  8. Set of rules for communication between software components.

20 Clues: Device connected to a network.Finding and fixing code issues.Two-symbol system used by computers.Converts data into code for security.Security device that filters traffic.Protects systems from digital threats.Visual interface with icons and menus.Computer system within a larger system.Internet-based delivery of IT resources....

Investing - Grace Lewis 2026-04-02

Investing - Grace Lewis crossword puzzle
Across
  1. rising “up” market
  2. Someone that buys and sells stocks
  3. Something an employer does to complement your pay.
  4. gained from giving a loan to the government
  5. Max amount a company can have
  6. Loan to the government or company
  7. Age to receive social security benefits
  8. Wide range of stocks
  9. Something that affects stock inside a company
  10. Multiple companies in multiple stocks
  11. A share of a company
Down
  1. Putting money into stocks in increments no matter the status of the stock
  2. Place to buy stocks
  3. A specific place to store money for a specific purpose
  4. Someone that own stocks
  5. Social security and Medicare together
  6. Payment to shareholders usually quarterly
  7. Something that affects a company’s stock from the outside
  8. decreasing“down” market
  9. Union workers, firemen, etc. receive this

20 Clues: rising “up” marketPlace to buy stocksWide range of stocksA share of a companySomeone that own stocksdecreasing“down” marketMax amount a company can haveLoan to the government or companySomeone that buys and sells stocksSocial security and Medicare togetherMultiple companies in multiple stocksAge to receive social security benefits...

Pre school age shows 2021-08-17

Pre school age shows crossword puzzle
Across
  1. patrol boy and his dogs fight crime and help other people
  2. repair man and tools
  3. the builder guy who builds stuff
  4. boy with friends and family
Down
  1. and friends purple dinosaur
  2. the expolor boots backpack the map also includes Spanish
  3. umzoomi the tiny team who helps kids
  4. chase kids who fight hacker
  5. and friends into the city Dora when she’s a teenager
  6. clues Steve joe use handy dandy notebooks

10 Clues: repair man and toolsand friends purple dinosaurchase kids who fight hackerboy with friends and familythe builder guy who builds stuffumzoomi the tiny team who helps kidsclues Steve joe use handy dandy notebooksand friends into the city Dora when she’s a teenagerthe expolor boots backpack the map also includes Spanish...

Islington Crosswords. 2024-12-15

Islington Crosswords. crossword puzzle
Across
  1. has solved different national and int'l cyber cases
  2. where classes are named after alumni
  3. cozy smaller lecture place
Down
  1. A record of the books you have borrowed
  2. A long-running cinema hall located in Kathmandu, named after a goddess
  3. Pops when heated
  4. Classes named after cities in Nepal
  5. biggest lecture place
  6. holds an old memory of the college

9 Clues: Pops when heatedbiggest lecture placecozy smaller lecture placeholds an old memory of the collegeClasses named after cities in Nepalwhere classes are named after alumniA record of the books you have borrowedhas solved different national and int'l cyber casesA long-running cinema hall located in Kathmandu, named after a goddess

AT THE AIRPORT - Al Aeropuerto 2018-10-16

AT THE AIRPORT - Al Aeropuerto crossword puzzle
Across
  1. Pilot
  2. Luggage
  3. Departures
  4. Passport
  5. Money Exchange
  6. Check in
  7. Aeroplane
  8. Customs
Down
  1. Tickets
  2. Trolley
  3. Arrivals
  4. Security
  5. Gate
  6. Monitor (screen)
  7. Delayed
  8. Suitcase

16 Clues: GatePilotTicketsTrolleyLuggageDelayedCustomsArrivalsSecurityPassportCheck inSuitcaseAeroplaneDeparturesMoney ExchangeMonitor (screen)

Documents: Lesson 7 2021-10-01

Documents: Lesson 7 crossword puzzle
Across
  1. Also located within Documents Section
  2. Position or _____ Trustee, Sponsor etc when they sign
  3. where coding is located in mainframe
  4. Only these SCNs can Esign Documents
  5. shows who and when documents was signed in the document ______
  6. _________ Preferences are made by each ER
  7. OneNote for EDS
  8. Where you view document history
  9. section in Manage security where esign rights are located
Down
  1. Which tab are the forms located in?
  2. Esignature but not Trustee, fiduciary or Adopting Employer?
  3. Grants access to Secondary to esign
  4. "...Employer" signature role
  5. E stands for in Esignature
  6. Where the notifications for tasks go to ER
  7. ToDOList Item
  8. Esignature Role
  9. Where the Signor goes to Esign documents (3 words)
  10. ________ Security to assign Esig Rights to SCNs

19 Clues: ToDOList ItemEsignature RoleOneNote for EDSE stands for in Esignature"...Employer" signature roleWhere you view document historyWhich tab are the forms located in?Grants access to Secondary to esignOnly these SCNs can Esign Documentswhere coding is located in mainframeAlso located within Documents Section_________ Preferences are made by each ER...

Women and The New Deal 2020-02-27

Women and The New Deal crossword puzzle
Across
  1. There was still a belief that men were the rightful _______
  2. Most ND programmes were designed to help men. Only 8000 women were involved in this program
  3. The Social Security Act benefited women with families as it provided what type of benefits?
  4. This person encouraged the formation of the Black Cabinet as well as championing the concept of a living wage
  5. The Wagner Act allowed women to join what along with men?
  6. There was discrimination against which group of women working
  7. This group of women were encouraged to pursue domestic work and higher education
  8. More women were doing this in 1940 than in 1933?
Down
  1. There was still a belief that women only worked for this type of money
  2. This 1935 act benefited single working-class women with young families who were unable to work.
  3. Who tried to avoid paying social security payments to women by introducing special qualifications and conditions?
  4. The 1936 Gallup Poll revealed that 4/5 people thought what type of women should not work?
  5. This person executed many aspects of the ND including the CCC, PWA and the Social Security Act
  6. Gladys Tantaquidgeon studied this subject at the University of Pennsylvania and was offered a position as social worker on a South Dakota reservation by John Collier.
  7. This group of women were ignored in the social security act as they were mainly employed as domestic workers
  8. Frances Perkins became the first female US Secretary of ___

16 Clues: More women were doing this in 1940 than in 1933?The Wagner Act allowed women to join what along with men?There was still a belief that men were the rightful _______Frances Perkins became the first female US Secretary of ___There was discrimination against which group of women working...

Criminal Law 2026-02-25

Criminal Law crossword puzzle
Across
  1. less serious offense, usually punishable by less than a year in jail, such as simple property damage"
  2. security may only use the minimum amount of this necessary to control a situation or protect themselves"
  3. causing bodily harm or making insulting, provoking physical contact with another person"
  4. severe crime, like armed robbery, where private citizens often have broader legal authority to intervene"
  5. specific property boundaries where a private security officer has the legal authority to act"
  6. unauthorized taking of someone else's property with the intention of permanently depriving them of it"
  7. property directly from a person by using physical violence or the threat of violence"
Down
  1. an individual knowingly enters or remains on private property after being told to leave"
  2. that places another person in reasonable fear of receiving an immediate physical injury"
  3. a building or secure area without permission with the intent to commit a theft or felony inside"
  4. formal court order requiring a security officer to testify about a criminal incident they witnessed on duty"
  5. someone into custody, which private security can generally only do if a crime occurs in their presence"
  6. holding a suspected shoplifter or trespasser while waiting for local law enforcement"
  7. conscious decision or deliberate state of mind required to commit a criminal act"
  8. c

15 Clues: cconscious decision or deliberate state of mind required to commit a criminal act"holding a suspected shoplifter or trespasser while waiting for local law enforcement"property directly from a person by using physical violence or the threat of violence"an individual knowingly enters or remains on private property after being told to leave"...

FITE: Technology Terms 2013-05-14

FITE: Technology Terms crossword puzzle
Across
  1. speed of computer
  2. Comcast, xfinity, Dish, etc.
  3. how you behave online
  4. short term storage
Down
  1. an upgrade that lets you have more slots to plug in
  2. another software similar to Powerpoint
  3. another word for online
  4. what you do to give credit to the website,book, author, poet etc.

8 Clues: speed of computershort term storagehow you behave onlineanother word for onlineComcast, xfinity, Dish, etc.another software similar to Powerpointan upgrade that lets you have more slots to plug inwhat you do to give credit to the website,book, author, poet etc.

Les mots-croisés PlayStation #4 2022-08-01

Les mots-croisés PlayStation #4 crossword puzzle
Across
  1. Une ville du futur
  2. S'éloigner en toute hâte
  3. Qui va de côté et d'autre, qui n'est pas fixé
  4. Quand on ne trouve pas son chemin
Down
  1. Suite à une flèche dans le genou nous sommes...
  2. L'antagoniste historique du chien
  3. PlayStation...
  4. Quand on n'est pas à plusieurs

8 Clues: PlayStation...Une ville du futurS'éloigner en toute hâteQuand on n'est pas à plusieursL'antagoniste historique du chienQuand on ne trouve pas son cheminQui va de côté et d'autre, qui n'est pas fixéSuite à une flèche dans le genou nous sommes...

3 ja 3.1 2025-02-25

3 ja 3.1 crossword puzzle
Across
  1. nuoriso
  2. konflikti
  3. ilahtunut
  4. puolestapuhuja
  5. intohimo
  6. vuosittainen
  7. tasa-arvo
  8. yhteishenki
  9. tehtävä
Down
  1. monikielisyys
  2. tulkki
  3. turvallisuus
  4. kunnia
  5. arvokkuus
  6. väkivalta

15 Clues: tulkkikunnianuorisotehtäväintohimokonfliktiilahtunutarvokkuusväkivaltatasa-arvoyhteishenkiturvallisuusvuosittainenmonikielisyyspuolestapuhuja

Barron 2026-03-25

Barron crossword puzzle
Across
  1. compartment
  2. landing
  3. Seat
  4. flight
  5. aisle
Down
  1. window
  2. late
  3. international
  4. on board
  5. oxygen
  6. service
  7. takeoff
  8. Land
  9. security
  10. time

15 Clues: lateLandSeattimeaislewindowoxygenflightservicetakeofflandingon boardsecuritycompartmentinternational

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET A Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET D Duration :15 mins  Marks:20 crossword puzzle
Across
  1. Data describing other data, such as timestamps or authors
  2. An illegal intrusion into a computer system or network
  3. Legal process of collecting and analyzing digital evidence
  4. Unauthorized email scams that trick users into revealing information
  5. The verification procedure to demonstrate that the network meets security requirements
  6. Software that records keystrokes, potentially capturing sensitive login credentials.
  7. Deceptive emails or messages impersonating trusted entities to steal sensitive information
  8. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  9. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  10. Network tool for capturing and analyzing traffic
  11. Potential events or circumstances that can cause harm to an organization's assets.
  12. Technology used by NGFW to detect and block malware
Down
  1. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  2. A central security resource where multiple virtual traps are monitored (One word).
  3. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  4. Process of identifying, assessing, and mitigating threats
  5. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  6. Programs designed to record personal information, typically undesired software
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Firewall Firewall type that provides unified policy across distributed networks

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET D Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20 2025-10-23

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET F Duration :15 mins  Marks:20 crossword puzzle
Across
  1. Data describing other data, such as timestamps or authors
  2. Process of identifying, assessing, and mitigating threats
  3. The verification procedure to demonstrate that the network meets security requirements
  4. Technology used by NGFW to detect and block malware
  5. Unauthorized email scams that trick users into revealing information
  6. An illegal intrusion into a computer system or network
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  9. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  10. Malicious software specifically designed to disrupt or damage computer systems
Down
  1. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  2. Network tool for capturing and analyzing traffic
  3. Programs designed to record personal information, typically undesired software
  4. Deceptive emails or messages impersonating trusted entities to steal sensitive information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Legal process of collecting and analyzing digital evidence
  7. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  8. Firewall Firewall type that provides unified policy across distributed networks
  9. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  10. Software that records keystrokes, potentially capturing sensitive login credentials.

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

profession 2026-03-12

profession crossword puzzle
Across
  1. satpam
  2. ilmuwan
  3. tukang foto
  4. koki
  5. tukang cukur
  6. tentara
  7. penjaga toko
  8. nelayan
  9. dokter gigi
Down
  1. polisi
  2. dokter
  3. guru
  4. sopir
  5. pilot
  6. pemadam kebakaran
  7. petani
  8. perawat

17 Clues: gurukokisopirpilotpolisisatpamdokterpetaniilmuwantentaranelayanperawattukang fotodokter gigitukang cukurpenjaga tokopemadam kebakaran

Security Crossword Challenge 2015-02-17

Security Crossword Challenge crossword puzzle
Across
  1. Cash or Valuables in Transit
  2. 7th President of the United States
  3. Funny money
  4. First Ambassador to France
  5. 1st President
  6. Secures your money
  7. 16th President
Down
  1. Taking of items
  2. 3rd President
  3. Unusual Behavior
  4. Director of Security
  5. 7th President
  6. Used to make change
  7. First Secretary of State
  8. Opens many doors
  9. 18th President

16 Clues: Funny money3rd President7th President1st President18th President16th PresidentTaking of itemsUnusual BehaviorOpens many doorsSecures your moneyUsed to make changeDirector of SecurityFirst Secretary of StateFirst Ambassador to FranceCash or Valuables in Transit7th President of the United States

Sip N Solve 2025-10-26

Sip N Solve crossword puzzle
Across
  1. What Month Is the Groom’s Birthday?
  2. What is the Best Man’s Name?
  3. What Did The Bride Study At University?
  4. What Town Do They Live In?
  5. How Many Venues Did They Visit?
  6. What Month Is The Bride’s Birthday?
  7. Where Did They Go On Their First Holiday Abroad? (Italian City)
  8. Where Did They Get Engaged?
  9. What Number House Do They Live At?
  10. What Trade Does The Groom Work In?
Down
  1. Where Are They Going On Honeymoon?
  2. What is the Groom’s Middle Name?
  3. Who Said ‘I Love You’ First? Bride or Groom?
  4. Groom’s Hobby
  5. What Month Did They Get Engaged?
  6. What is the Maid of Honour’s Name
  7. Bride’s Middle Name?

17 Clues: Groom’s HobbyBride’s Middle Name?What Town Do They Live In?Where Did They Get Engaged?What is the Best Man’s Name?How Many Venues Did They Visit?What is the Groom’s Middle Name?What Month Did They Get Engaged?What is the Maid of Honour’s NameWhere Are They Going On Honeymoon?What Number House Do They Live At?What Trade Does The Groom Work In?...