cyber security Crossword Puzzles
Crossword Puzzle 2022-11-27
Across
- The edgier battle star
- famous Early 90s Kindergarten teacher
- “I see you enjoy Super Mario…”
- Your greatest cyber crime
- 1988’s olympic winter
- “Resident” Albert
- Metal Gear character who likes to wrestle senators
- An adorable name for Hershey Bars
- Your kind of sister
- A double entendre TV show
- A wholesome healthy breakfast
- An 80s themed “Vice” with plenty of white suits
- Lost in ’88
Down
- Your on a first name basis with this Galactica Admiral
- dating sim meets supernatural teen adventure
- Being ___ in Detroit is hard
- No___ GTA RP
- A fun holiday treat
- Themed Oreos are highly…
- The proper microwave wattage
- A rare candy bar
- A renowned piece of art
- MultiVersus competitor (this clue is sponsored by Chilis)
23 Clues: Lost in ’88 • No___ GTA RP • A rare candy bar • “Resident” Albert • A fun holiday treat • Your kind of sister • 1988’s olympic winter • The edgier battle star • A renowned piece of art • Themed Oreos are highly… • Your greatest cyber crime • A double entendre TV show • Being ___ in Detroit is hard • The proper microwave wattage • A wholesome healthy breakfast • “I see you enjoy Super Mario…” • ...
Happy Valentines Day! I love you! 2024-02-12
Across
- Something Mia dreams of (NOT adultery)
- Mia's favorite thing to see on Duncan's face
- Large, glittering, masculine
- For intellectual couples
- Something Duncan doesn't play with me
- Tinned fish for Duncan
- Duncan's mistress
- Long and short bursts of "I love you"
- Special meal first eaten on Cyber Monday
- Makes us better
Down
- Our first meal together
- Dark, night, cold, passive (plural); everyone in Pittsburgh
- What not to give a sick man
- Something I want to spend on Duncan
- Duncan, of Target
- something Mia loves to do with her boyfriend
- What Duncan claims he is not
- A drink that could be found in a china shop
- The best thing since Prozac
- Concerned with implications
- How much I love Duncan, with coffee
21 Clues: Makes us better • Duncan, of Target • Duncan's mistress • Tinned fish for Duncan • Our first meal together • For intellectual couples • What not to give a sick man • The best thing since Prozac • Concerned with implications • What Duncan claims he is not • Large, glittering, masculine • Something I want to spend on Duncan • How much I love Duncan, with coffee • ...
RUU TNI Resmi jadi Undang-Undang 2025-04-04
Across
- kata 'cyber' dalam B.Indonesia menjadi ...
- pangkat dalam TNI dan Polri yang lebih rendah dari Bintara adalah ...
- kata kerja dari 'tangan' adalah ...
- kata 'article' dalam UU disebut ...
- sinonim kata 'pencegahan' adalah ...
- persamaan makna dari 'waktu itu' adalah ...
- sinonim dari kata 'posisi' dalam pekerjaan adalah ...
- kata 'ministry' dalam B.Indonesia adalah ...
- pangkat dalam TNI dan Polri yang berada ditengah-tengah ialah ...
- kata 'highlights' dalam B.Indonesia adalah ...
- sinonim kata 'meresmikan' adalah ...
Down
- kata 'secretariat' dalam B.Indonesia menjadi ...\
- menjalankan posisi dan tugas juga disebut ...
- sinonim kata 'berada dalam' adalah ...(loaded)
- kata 'set/define' dalam B.Indonesia adalah ...
- kata 'to save/rescue' dalam B.Indonesia adalah ...
- sinonim kata 'dasar' adalah ...
- kata benda dari 'mengancam' adalah ...
- pangkat dalam TNI dan Polri yang lebih tinggi dari bintara adalah ...
- sinonim kata dari 'diringkas' adalah ...
20 Clues: sinonim kata 'dasar' adalah ... • kata kerja dari 'tangan' adalah ... • kata 'article' dalam UU disebut ... • sinonim kata 'pencegahan' adalah ... • sinonim kata 'meresmikan' adalah ... • kata benda dari 'mengancam' adalah ... • sinonim kata dari 'diringkas' adalah ... • kata 'cyber' dalam B.Indonesia menjadi ... • persamaan makna dari 'waktu itu' adalah ... • ...
GE 2025-04-13
Across
- risks of cyber threats and vulnerabilities
- gap to emerging technologies
- machine learning that perform tasks
- Tailored to fit the specific job you are applying
- leveraging principles of quantum mechanics
- integration of emerging technologies in industries
- delivery of computing services over the internet
- connects devices to the internet
- overlays digital information onto physical world
- refers to the innovative advancements in various field
- - creates immersive virtual environment
Down
- being updated to the innovative ways and effect on industry
- effect of innovations in renewable energy
- joining professional organization to stay informed about industry developments.
- - it refers to the emerging technologies in various field
- A distributed ledger technology
- advancement in biotech
- the purpose of emerging technologies
- staying flexible and adapting to changes.
- Not necessarily tailored for specific jobs
20 Clues: advancement in biotech • gap to emerging technologies • A distributed ledger technology • connects devices to the internet • machine learning that perform tasks • the purpose of emerging technologies • - creates immersive virtual environment • effect of innovations in renewable energy • staying flexible and adapting to changes. • risks of cyber threats and vulnerabilities • ...
Informatika sekarang dan Masa depan 2025-08-26
Across
- Program berbahaya yang bisa merusak sistem komputer
- Ilmu tentang data besar disebut
- Teknologi uang digital
- Kendaraan tanpa pengemudi
- Robot dengan kecerdasan buatan
- Aplikasi yang memungkinkan komunikasi tatap muka secara virtual
- Proses mengubah data mentah menjadi informasi yang berguna
- Alat untuk menghubungkan komputer ke jaringan internet
- Jaringan perangkat saling terhubung
- Bahasa pemrograman popular dalam pengolahan big data
Down
- Sistem yang bisa belajar dari data
- Big data tidak akan berguna tanpa analisis
- Perangkat wearable yang bisa menghitung langkah kaki dan detak jantung
- Sistem keamanan di dunia digital
- Jaringan global yang menghubungkan miliaran perangkat diseluruh dunia
- Algotitma pembelajaran AI
- Konten negatif atau menyesatkan yang sering beredar di sosial media
- Penyimpanan data di internet
- Penyimpanan dan pemrosesan data besar
- Proses mengenali informasi dari data besar
20 Clues: Teknologi uang digital • Kendaraan tanpa pengemudi • Algotitma pembelajaran AI • Penyimpanan data di internet • Robot dengan kecerdasan buatan • Ilmu tentang data besar disebut • Sistem keamanan di dunia digital • Sistem yang bisa belajar dari data • Jaringan perangkat saling terhubung • Penyimpanan dan pemrosesan data besar • Big data tidak akan berguna tanpa analisis • ...
CYBAH 2025-07-02
Across
- Program du laddar ner till mobilen
- Hemsiodor använder dem för att samla information om di
- Person som gör intrång i system
- An cyberattack som begränaer tillkommligheten till en tjänst
- Skadlig kod som kräver lösensumma
- Bluffmail som försöker lura dig att lämna ut information
- Skyddar din internettrafik via en säker tunnel
- Hemlig kombination för inloggning
- Juridiskt skydd för personlig informatio online
- Program som upptäcker skadlig kod
- Automatisk programkod som kan missbrukas
Down
- Prefix som betyder digitalt eller internetrelaterat
- Vad står P:et i IP-adress för (svenska ordet)
- Plats där du lagrar filer online
- Gör information oläslig utan nyckel
- Något du bör skydda online
- En sort skod man kan skanna med mobilen
- Personligt Identifikations Nummer
- Skyddar nätverket från obehörig åtkomst
- Litet, portabelt lagringsminne
20 Clues: Något du bör skydda online • Litet, portabelt lagringsminne • Person som gör intrång i system • Plats där du lagrar filer online • Skadlig kod som kräver lösensumma • Personligt Identifikations Nummer • Hemlig kombination för inloggning • Program som upptäcker skadlig kod • Program du laddar ner till mobilen • Gör information oläslig utan nyckel • ...
Managing User Security 2021-09-28
Across
- the two keys included are Authentication Service exchange and Ticket Granting Service exchange.
- essentially a database of the network resources and includes objects such as user and group accounts,computers,servers, and printers.
- a user can be granted additional rights to data beyond what is allowed by his or her assigned access level
- allows semi-independent systems to work together.
- the measurement and analysis of a biological feature.
- the point where false rejection rate and false acceptance rate are equal.
Down
- it’s based off “what you do” like a pattern or rhythm.
- all the areas that give a hacker access to a system.
- when biometric credentials are authorized on invalid characteristics.
- the process of validating a user.
- opposite action denying an authorized biometric credential.
- standard authentication protocol on all versions of Microsoft servers when using the Active Directory.
- user cycle through different roles.
- the process of reducing or eliminating vulnerabilities on a system.
14 Clues: the process of validating a user. • user cycle through different roles. • allows semi-independent systems to work together. • all the areas that give a hacker access to a system. • the measurement and analysis of a biological feature. • it’s based off “what you do” like a pattern or rhythm. • opposite action denying an authorized biometric credential. • ...
ASKING AND GIVING OPINION 2024-07-26
16 Clues: yakin • ujian • masalah • menarik • meminta • khawatir • keuangan • keamanan • pendapat • kejadian • keputusan • menanyakan • menyelidiki • mata pelajaran • menimbulkan perdebatan • mengira-ngira/bertanya-tanya
Chapter 6 - Network Design Elements 2025-05-21
Across
- A cloud-based delivery model for security services like antivirus and firewalls.
- A cloud model offering virtualized computing resources over the internet.
- A network state where a device defaults to open access after failure.
- A solution that enforces security policies before allowing network access.
- A method of dialing many phone numbers to find modems or unsecured lines.
- Impersonating a device's MAC address to bypass security.
- An attack that allows access to traffic on other VLANs.
- A network design using two firewalls to isolate a DMZ.
Down
- A publicly shared list of known cybersecurity vulnerabilities and exposures.
- A cloud model providing a platform for developers to build and deploy applications.
- A protocol that prevents network loops by managing redundant paths.
- A switch memory table that stores MAC-to-port mappings.
- A cloud model where applications are delivered over the internet.
- An attack that overwhelms a switch's memory with fake MAC addresses.
- A one-to-one mapping between a private and public IP address.
- A firewall setup with three interfaces: internal, external, and DMZ.
- A method that modifies IP addresses to allow private devices to access the internet.
- A buffer zone between internal networks and external, untrusted networks.
- A type of NAT that maps multiple private IPs to one public IP using port numbers.
19 Clues: A network design using two firewalls to isolate a DMZ. • A switch memory table that stores MAC-to-port mappings. • An attack that allows access to traffic on other VLANs. • Impersonating a device's MAC address to bypass security. • A one-to-one mapping between a private and public IP address. • A cloud model where applications are delivered over the internet. • ...
Semester Review 2022-12-14
16 Clues: bonds • Raids • Scare • Jungle • Market • Entente • Stiffens • security • Movement • of Nations • on margin • Service Act • Speakeasies • Conservation • of Versailles • HouseNeutrality
Network Security 2021-03-08
Across
- What type of malware is executed through executable files
- protects a network from unauthorised access, can be in hardware or software form
- A way of hiding incoming and outgoing messages/information from other people
- Controls what specific users can and cant do
- the intentional or unintentional release of secure or private/confidential information to an untrusted environment
Down
- The Process of proving who you are in order to get access to something
- A type of malware which is executed through a weakness in the system
- Keystroke logging could be used as a type of what malware?
- What type of malware deceives the user?
9 Clues: What type of malware deceives the user? • Controls what specific users can and cant do • What type of malware is executed through executable files • Keystroke logging could be used as a type of what malware? • A type of malware which is executed through a weakness in the system • The Process of proving who you are in order to get access to something • ...
IT-Security 2016-01-29
Across
- Programme, die Tastatureingaben mitprotokollieren
- Virus, der sich direkt über Netze verbreiten
- Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
- Versteckt in einem scheinbar nützlichen Programm
Down
- Mobbing mit Hilfe von elektronischen Medien
- Datenverarbeitungsregisternummer
- Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
- Viren, die als Programm in ein Dokument/ Datei eingebettet sind
- Überbegriff für unerwünschte, schädliche Software
9 Clues: Datenverarbeitungsregisternummer • Mobbing mit Hilfe von elektronischen Medien • Virus, der sich direkt über Netze verbreiten • Versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Überbegriff für unerwünschte, schädliche Software • Viren, die als Programm in ein Dokument/ Datei eingebettet sind • ...
Computer Security 2024-03-22
Across
- controls flow of network traffic between device and internet
- when unauthorized individuals access data
- giving of 2 pieces of personal information to access data
Down
- detects a physical attribute of an individual allowing/denying them access to data
- malware disguised as legitimate sites
- converts plaintext into ciphertext and vice versa
- detection software which detects malicious activity
- consequence of computer misuse
- data stored in an alternative location to be recovered
9 Clues: consequence of computer misuse • malware disguised as legitimate sites • when unauthorized individuals access data • converts plaintext into ciphertext and vice versa • detection software which detects malicious activity • data stored in an alternative location to be recovered • giving of 2 pieces of personal information to access data • ...
food security 2024-10-17
Across
- - A plant grown by farmers to be eaten.
- - This nutrient is found in foods like bread and rice.
- - The practice of catching fish for food.
- - A place where animals are raised for food, like cows or chickens.
Down
- - The type of farming that grows crops without chemicals.
- - The storage place where food is kept to be sold or given.
- - A place where food is processed and packed before being sent to stores.
- - This happens when people do not have enough food to eat.
- - The act of distributing food to people in need.
9 Clues: - A plant grown by farmers to be eaten. • - The practice of catching fish for food. • - The act of distributing food to people in need. • - This nutrient is found in foods like bread and rice. • - The type of farming that grows crops without chemicals. • - This happens when people do not have enough food to eat. • ...
Food Security 2024-11-28
Across
- which is the crunchy side dish which normally has more oil?
- one vegetable in which we should double check while washing
- Good vegetable for blood nourishing
- Which is Non-healthy material for food wrapping ?
Down
- any substance which is added to look food attractive
- Reportadely India's less hygienic street food
- Which is the natural vegetable for blood sugar control ?
- A not so good food item for our tooth health
- Which is the most iron rich food ?
9 Clues: Which is the most iron rich food ? • Good vegetable for blood nourishing • A not so good food item for our tooth health • Reportadely India's less hygienic street food • Which is Non-healthy material for food wrapping ? • any substance which is added to look food attractive • Which is the natural vegetable for blood sugar control ? • ...
kuis tentang apa aja 2023-01-25
COLSA Capabilities 2023-04-21
IS and BC Cross-Up Crossword 2021-10-26
Across
- This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
- _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
- Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
- Sending an email, posting photos on a social media site and using your webcam.
- Equipment that offers short term protection against power surges and power outages (acronym).
- conforming to a rule, such as a specification, policy, standard or law.
- Your ________ device often contains more personal information than any other source.
- “ This too good to be true email gives off a false sense of ______”.
- When calls are made by social engineering, they are called _____ .
- A crime where a computer is the object of the crime or is used as a tool to commit an offense.
- Where do UTC employee report their ICT issues (three words).
- Always _______your computer when you leave your desk.
- Facebook and TikTok are types of ________ (two words).
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- A major business disruption; the earth moves, shifts and shakes.
- Who can be the target of a cyber attack.
- Never use your TTUTC________address for personal usage.
- Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- You can call 999, 881 or 990 for _______ services.
- The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
- This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
- The address of a webpage. Check the validity of it before clicking on it (acronym).
- __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
- a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
- BCP's main focus is not preventing incidents but rather the __________ from it.
Down
- The process of adding allowed programs to a list is called_________.
- sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
- __________ Edwards is the Recovery Director and is in charge of BCP.
- An asset like other essential business assets in the Corporation.
- My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
- The staff and the customers are considered.
- A technology that allows us to access our files through the internet from anywhere in the world.
- A list of entities that are blocked or denied privileges or access.
- The art of manipulating people to get access to sensitive information (two words.
- Choose a password that is easy for you to ____________ but hard for you someone to guess.
- information such as legal documents and contracts must be classified as __________information. - (restricted)
- A collection of computers that are controlled on the same network.
- A concept where all things are connected to the internet; household items usually (three words).
- A piece of code put in to correct an error.
- The global system of interconnected computer networks that link billions of devices.
- Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
- Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
- The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
- someone who seeks and exploits weaknesses in a computer system or computer network.
- The UTC hotsite is located here.
- Usually comprises the display device of the computer.
- Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
48 Clues: The UTC hotsite is located here. • Who can be the target of a cyber attack. • The staff and the customers are considered. • A piece of code put in to correct an error. • You can call 999, 881 or 990 for _______ services. • Always _______your computer when you leave your desk. • Usually comprises the display device of the computer. • ...
Change a nouns into a verb 2023-11-30
14 Clues: success • madness • security • addition • decision • attention • conclusion • attraction • comparison • protection • collection • description • achievement • distraction
Change a nouns into a verb 2023-11-30
14 Clues: success • madness • addition • decision • security • attention • protection • comparison • conclusion • collection • attraction • description • distraction • achievement
Herzberg Two factor theory 2023-02-28
15 Clues: Wage • Power • Labour • Reward • Thesis • Laudation • Occupation • Overseeing • Protection • Instigators • Basic Needs • Germination • Procurement • Psychologist • Head of staff
Technology Collocations 2023-10-18
Across
- Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks.
- Encompasses devices and systems that enhance the automation, control, and efficiency of various household functions, like lighting, heating, and security.
- Involves the process of discovering patterns and information from large sets of data, often used for business intelligence, research, and decision-making.
- Involves the use of remote servers on the internet to store, manage, and process data, providing on-demand access to a shared pool of computing resources.
- Refers to the latest and most advanced technological innovations or developments. It's often used to describe state-of-the-art products or systems.
- Describes the profound and rapid changes brought about by the widespread adoption and integration of digital technology in various aspects of society.
- Describes a design or layout of a technological system or device that is easy for users to navigate and understand without much difficulty.
- Involves using unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify and grant access to devices or systems.
Down
- Refers to the transfer of information between devices without the need for physical connections, typically using technologies like Wi-Fi or Bluetooth.
- Creates a simulated environment that users can interact with, often through the use of specialized headsets and equipment, providing an immersive and artificial experience.
- Integrates computer-generated information, such as images or data, into the user's view of the real world, enhancing their perception and interaction with the environment.
- Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities.
12 Clues: Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities. • Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks. • ...
career 2019-01-19
15 Clues: ทหาร • หมอฟัน • นักสืบ • ช่างไฟ • เสมียน • พ่อครัว • นักเขียน • นักเรียน • ช่างตัดผม • ช่างประปา • บรรณาธิการ • นักบินอวกาศ • ช่างถ่ายรูป • doctor หมอตา • guard ยามรักษาความปลอดภัย
funny stuff for the 8.1 2020-03-02
15 Clues: Dürre • Zutat • flamme • Sender • möglich • Ursache • glänzend • verbrannt • Lagerfeuer • Entdeckung • Sicherheit • vergleichen • Genehmigung • unaufhaltsam • eingängig (Melodie,Slogen)
IT English Homework 2020-04-20
15 Clues: hamis • sütik • igazi • csaló • jelkód • zárolt • memória • támogatás • rendőrség • biztonság • frissítés • ellenőrzés • ujjlenyomat • biometrikus adatok • kicsi programhibák
Chapter 7 Vocab Eng 4 2025-11-17
Q2 Week 6 Groups 4 and 5 2021-12-08
10 Clues: Being safe • A type of business • More than one agency • More than one ability • More than one security • More than one accuracy • More than one familiarity • Being able to do something • Being exact about something • Being familiar with someone or something
Tecnología 2023-03-22
18 Clues: risk • send • mail • device • screen • access • advice • message • respond • password • security • computer • to enjoy • spend time • technology • cell-phone • social-media • to have a good time
CYBERSECURITY AWARENESS - C40 2024-10-22
Across
- The process of analyzing systems for vulnerabilities (8 LETTERS)
- A program that replicates itself to spread malware (4 LETTERS)
- A security method where each user has specific privileges (6 LETTERS)
- Cybercriminals often use this method to monitor network activity (8 LETTERS)
- Using multiple types of information to verify identity (14 LETTERS)
- Security strategy that requires users to change this regularly (8 LETTERS)
Down
- Common method used to protect sensitive data (10 LETTERS)
- Fake emails claiming to be from trusted sources (8 LETTERS)
- A phrase longer than a password for added security (9 LETTERS)
- Network of infected computers controlled remotely (6 LETTERS)
- Program designed to prevent unauthorized access (8 LETTERS)
11 Clues: Common method used to protect sensitive data (10 LETTERS) • Fake emails claiming to be from trusted sources (8 LETTERS) • Program designed to prevent unauthorized access (8 LETTERS) • Network of infected computers controlled remotely (6 LETTERS) • A phrase longer than a password for added security (9 LETTERS) • ...
Lesson 30 Vocabulary 2015-05-18
Across
- Hackers using spyware to control your browser.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
Down
- Complex and secure,containing at least eight characters and at least one letter,one number,and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- A malicious program that records keystrokes.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Encrypts the information in an SSL Certificate.
- A program that hackers use to capture IDs and passwords on a network.
- security feature used for larger networks that controls computers from one point.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26
Across
- Agreement allowing for the conduct oh short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
- A key OSCE arms control agreement outlining provisions on annual military information exchange among the OSCE participating States
- UN Security Council Resolution on Women, Peace and Security (Acronym)
Down
- Cornerstone rule guiding OSCE decision-making processes
- The world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy (Acronym)
- UN Security Council Resolution on the non-proliferation of weapons of mass destruction and their means of delivery (Acronym)
- Agreement which prohibits the possession of nuclear weapons (Acronym)
- The world's largest regional security organization (Acronym)
- One of the two fissile materials used in nuclear weapons (Abbreviation)
- Synonym for firearms (Acronym)
10 Clues: Synonym for firearms (Acronym) • Cornerstone rule guiding OSCE decision-making processes • The world's largest regional security organization (Acronym) • Agreement which prohibits the possession of nuclear weapons (Acronym) • UN Security Council Resolution on Women, Peace and Security (Acronym) • ...
Police - Unit 2 2014-09-24
Security Awareness Effectiveness 2021-06-21
Across
- Don’t share your user
- before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want it to become publicly available?
- __________ is making and storing another copy of data
- A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory
- the IT security Policies are uploaded on _______
- Facts and statistics collected for reference or analysis.
- How to safeguard the information stored in laptop; Keep it ______ , when you are not available at desk.
Down
- Smishing is related to _____________
- The gaining of unauthorized access to data in a system or computer is __________. Down
- ________ is a scam that involves Internet fraudsters who send spam or pop-up messages to get the personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims
- A _______ Password contains at least 3 of the 4 following characters: Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g. 123), Special/Non-Alphanumeric (e.g. ! $ # %)
- Permitted by law is _________
- Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
- 123456 is ___________ password
14 Clues: Don’t share your user • Permitted by law is _________ • 123456 is ___________ password • Smishing is related to _____________ • the IT security Policies are uploaded on _______ • __________ is making and storing another copy of data • Facts and statistics collected for reference or analysis. • ...
Social Security Terminology 2022-12-02
Across
- When a tic comes through Barcode that someone has this SSI pay status, the SSIF team usually celebrates!
- The SSA program that is required to be filed by ABD
- The opposite of approved
- The agreement signed by clients to "repay" their ABD with SSA earnings
- The Social Security _____
- The SSA-3373 form is the _____ Report
Down
- If someone's claim is denied, they can request this kind of appeal
- The SSA-3369 form is the _____ History Report
- A lot of claims get denied for "failure to _____"
- This State Date Exchange program
- This type of appeal goes before an Administrative Law Judge
- The highest level of appeal recognized by both SSA and DSHS is the Appeals Council _____
- The other program offered by SSA
- This is the first level of filing for SSA benefits
14 Clues: The opposite of approved • The Social Security _____ • This State Date Exchange program • The other program offered by SSA • The SSA-3373 form is the _____ Report • The SSA-3369 form is the _____ History Report • A lot of claims get denied for "failure to _____" • This is the first level of filing for SSA benefits • The SSA program that is required to be filed by ABD • ...
Information Security Awareness 2020-09-24
Across
- What is not allowed in a DNA password?
- Best way to keep track of multiple unique passwords?
- The data classification for Employee Handbook, internal phone directory?
- This is better and harder to crack than a password
- How do you think most evil hackers begin to break into a company’s network?
- The best response to password Recovery Questions is a
- Minimum number of characters for a network password?
- What is the default data? classification
- Who is responsible for data security?
Down
- The type of email to get you to click on a fraudulent link
- Disclosing personal member information may be
- Someone that follows closely behind you without using their badge?
- If I click on a link I believe was malicious I should
- This is better and harder to crack than a password
- How might someone evil try to get information from you?
15 Clues: Who is responsible for data security? • What is not allowed in a DNA password? • What is the default data? classification • Disclosing personal member information may be • This is better and harder to crack than a password • This is better and harder to crack than a password • Best way to keep track of multiple unique passwords? • ...
Security Crossword Challenge 2015-02-17
14 Clues: Funny money • 3rd President • 7th President • 1st President • 18th President • Taking of items • Opens many doors • Unusual Behavior • Secures your money • Used to make change • Director of Security • First Ambassador to France • Cash or Valuables in Transit • 7th President of the United States
Security Crossword Puzzle 2016-09-26
Across
- / Name of the Site Security Supervisor
- / GSK to become _________ neutral by 2050
- / GSK Value 4: Operate with ___________
- / Last name of newly appointed CEO of GSK
- / 4141 is the extension for this?
- / Using someone else's badge is a _______ violation.
Down
- / Someone you register in Passage Point
- / GSK Value 1: Be _______ focused
- / Place to pick up visitors?
- / Last name of the GSK Security Operations Manager
- / GSK Value 2: Act with __________
- / What should be displayed at all times?
- / GSK Value 3: Demonstrate _________ for people
- / First name of the Navy Yard Site Director
14 Clues: / Place to pick up visitors? • / GSK Value 1: Be _______ focused • / 4141 is the extension for this? • / GSK Value 2: Act with __________ • / Name of the Site Security Supervisor • / Someone you register in Passage Point • / GSK Value 4: Operate with ___________ • / What should be displayed at all times? • / GSK to become _________ neutral by 2050 • ...
Safety and Security 2023-11-14
Across
- ATM check.
- where fire extinguisher is located.
- drawer counted if gone for _ days.
- how to close day with no computer
- if away from drawer, it should be?
- where first aid kit is located
- where we meet in emergency.
Down
- medical note required for any work __
- radio station that reports closing
- what should be posted on the door for emergency closure.
- please call if you are more than _ minutes late.
- branch will be audited by whom yearly?
- record for opening vault.
- grants permission to close bank
14 Clues: ATM check. • record for opening vault. • where we meet in emergency. • where first aid kit is located • grants permission to close bank • how to close day with no computer • radio station that reports closing • drawer counted if gone for _ days. • if away from drawer, it should be? • where fire extinguisher is located. • medical note required for any work __ • ...
Forensic science charlie 2019-09-25
Across
- $27 million - Dollar amount that is written in illegitimate checks every day
- forensics - (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
- vouchers/ WIC coupons, Certain bonds, Postage stamps
- questioned documents - Checks, Certificates, Wills, Passports, Licenses, Money, Letters, Contracts, Suicide Notes, Receipts, and Even Lottery Tickets
- block - Charlie
- documents - Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
- Spectroscopy - an analytical technique that measures the mass-to-charge ratio of charged particles.
- Pressure - Check for pressure on the downward and upward strokes Compare how capital letters are joined to lowercase letters
- documents include: - Checks, employment records, legal agreements, licenses, and wills
- chemical wash detection systems that change color when a check is altered
- analysis comparison - "Learns" to recognize how a person signs; Evaluates speed, pressure, and rhythm of the signatures; Recognizes forgeries by the detection of even slight differences
- - A substance that accelerates the rate of a chemical reaction but is not itself permanently changed by the reaction.
- - A technique for separating molecules through their migration on a support medium under the influence of an electrical potential
- commonly forged today - Currency/paper money, Traveler's checks
- resolution borders that are difficult to copy
- - writing over top to smear or make original writing unreadable
- as well as around the portrait; When the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
- testing - also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
- years - maximum prison term for forgery. Forgery is a federal felony
- - a branch of bioscience dealing with the study of the form and structure of organisms and their specific structural features.
- case of the 1930s - What was the first known case in which handwriting analysis played a role?
- consistency /Ratio - What are the overall height, width, and size of the letters?
- composition - the individual chemicals that make up a substance
- - any prewritten handwriting samples from a suspect(s)
- ninety nine - The year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
- Hat Hackers - are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
- color patterns on paper
- Security Features in US currency - Portrait stands out and appears raised off the paper; Contains clear red and blue fibers woven throughout the bill; Has clear, distinct border edges; Treasury seal is shown with clear, sharp saw-tooth points; Watermark appears on the right side of the bill in the light; The security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it; There is minute printing on the security
- - making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
- Check Techniques - Directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
- phosphatase - An enzyme found in high concentration in semen.
Down
- signature pads - stores handwriting samples in databases
- - any long connecting marks and or swooshes added to letters
- hat hackers - usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
- - forgery for material gain
- analysis - the examination and comparison of questioned documents with known material
- taken to prevent check forgery - Chemically sensitive paper
- font size requires more ink and makes alterations more difficult
- - any extra caricatures or pictures added to words
- - When false documents or other items are copied for the purpose of deception
- handwriting - handwriting is difficult to disguise and forge
- of documents detection - any changes, erasures, or obliterations that may have occurred
- hackers (White hat hackers) - White hat hackers choose to use their powers for good rather than evil. Also known as "ethical hackers," white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
- accounting, forensic accountancy or financial forensics - the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation.
- and personalized handwriting habits - Similar to fingerprints, every person's handwriting is what it is
- Fibers - fiber created from natural materials or by chemical processes, a man-made fiber
- Habits (aka. Baseline characteristics) - Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
- - a material that changes the color of reflected or transmitted light as the result of wavelength-selective absorption.
- Service - the agency that investigates forgery cases
- - a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.
- - Does the writing tilt to the left or right, or is it straight up and down? Are some letters consistently tilted more or less than others?
- - A protein that acts as a catalyst for certain specific reactions.
- - Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
- Chromatography - Dye or ink is applied to filter or chromatography paper placed in a solvent and pigments are separated
- Fibers - fiber derived from plants or animals
- - A compound capable of donating a hydrogen ion (H+) to another compound.
- fibers that glow under different light
- Chromatography - a common type of chromatography used in analytical chemistry for separating and analyzing compounds
58 Clues: block - Charlie • color patterns on paper • - forgery for material gain • fibers that glow under different light • resolution borders that are difficult to copy • Fibers - fiber derived from plants or animals • - any extra caricatures or pictures added to words • vouchers/ WIC coupons, Certain bonds, Postage stamps • Service - the agency that investigates forgery cases • ...
IT-Security 2016-01-29
Across
- Programme, die Tastatureingaben mitprotokollieren
- Mobbing mit Hilfe von elektronischen Medien
- Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
Down
- Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
- Versteckt in einem scheinbar nützlichen Programm
- Viren, die als Programm in ein Dokument/ Datei eingebettet sind
- Datenverarbeitungsregisternummer
- Virus, der sich direkt über Netze verbreiten
- Überbegriff für unerwünschte, schädliche Software
9 Clues: Datenverarbeitungsregisternummer • Mobbing mit Hilfe von elektronischen Medien • Virus, der sich direkt über Netze verbreiten • Versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Überbegriff für unerwünschte, schädliche Software • Viren, die als Programm in ein Dokument/ Datei eingebettet sind • ...
Food Security 2018-11-08
Across
- Inequality "if women had the same access to resources as men" is an example of ________.
- one major problem, with only one third of food being consumed.
- Disease stress and poor nutrition can lead to this accumulating in families.
- Single largest employer in the world.
- 281 million undernourished people live on this continent.
Down
- Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
- Four billion people worldwide have no access to _______.
- the world needs to rethink their _______ on how we are growing, sharing and consuming our food.
- Programs support your school ___________ to help food security in your community.
9 Clues: Single largest employer in the world. • Four billion people worldwide have no access to _______. • 281 million undernourished people live on this continent. • one major problem, with only one third of food being consumed. • Disease stress and poor nutrition can lead to this accumulating in families. • ...
Network Security 2024-07-08
Across
- Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- The process of protecting information or data by scrambling it so only those with the key can unscramble it
- A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
- A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
- A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
- An attack where a series of a computers repeatedly send requests to a server to overload a system
- The process of a user confirming that they are who they say they are on a computer system
- Trying to trick someone into giving out information over email
- A computer program that makes lots of copies of itself,
9 Clues: A computer program that makes lots of copies of itself, • Trying to trick someone into giving out information over email • The process of a user confirming that they are who they say they are on a computer system • An attack where a series of a computers repeatedly send requests to a server to overload a system • ...
Security Crossword 2023-05-18
Across
- badge color for a NON U.S citizen that requires an escort
- who do you email for foreign travel concerns
- what visitors must do when they arrive onsite (contains a dash)
- the form that is filled out after foreign travel
Down
- what you earn when completing this puzzle
- when you notify security about a visitor or foreign travel
- color badge for U.S citizen no escort required
- color badge for visitors that require an escort
- who you contact for any security questions, concerns, incidents
9 Clues: what you earn when completing this puzzle • who do you email for foreign travel concerns • color badge for U.S citizen no escort required • color badge for visitors that require an escort • the form that is filled out after foreign travel • badge color for a NON U.S citizen that requires an escort • when you notify security about a visitor or foreign travel • ...
Y8 Security 2021-12-15
Across
- self replicate without any user help meaning they can spread very quickly.
- when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
- Monitor user actions such as key presses and then send the information back to the hacker
- emails that try to trick you into giving away personal information such as bank details
- attach themselves to files by copying themselves. They are then spread by users who open them and activate them.
Down
- malicious software. A program designed to cause harm to your computer
- malware which is disguised as legitimate software
- two or more devices connected together
- tell the victim their computer has lots of viruses and scare them into paying for the problem to be fixed
9 Clues: two or more devices connected together • malware which is disguised as legitimate software • malicious software. A program designed to cause harm to your computer • self replicate without any user help meaning they can spread very quickly. • emails that try to trick you into giving away personal information such as bank details • ...
Food security 2024-12-17
9 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Small animal raised for meat and fur • Animal raised for wool, meat and milk • Poultry raised for eggs meat and feathers • Pollinator that plays a critical role in food production
Food security 2024-12-18
Across
- to save food from being wasted.
- Niño A weather pattern that can lead to droughts.
- a process that turns waste into something that helps plants grow.
- You need me to grow plants, but I can be scarce in deserts.
- A global issue caused by a lack of food.
Down
- am the science of producing food, using land and livestock.
- The process of growing plants and raising animals for food. (Agriculture)
- The farming method that uses natural fertilizers.
- grain that feeds billions of people worldwide, and I grow in flooded fields.
9 Clues: to save food from being wasted. • A global issue caused by a lack of food. • The farming method that uses natural fertilizers. • Niño A weather pattern that can lead to droughts. • am the science of producing food, using land and livestock. • You need me to grow plants, but I can be scarce in deserts. • ...
Food Security 2024-11-28
Across
- Food that can be used as a resource or is stored to avoid shortages.
- The act of growing enough food for the population in a country.
- A key principal in food security: ensuring food is available consistently.
- The variety and nutritional quality of food grown or available.
Down
- A person or group that grows, produces, or distributes food.
- A situation where people do not have enough access to safe and nutritious food.
- A system for ensuring everyone has access to adequate and nutritious food.
- aid Government program to provide food to those in need.
- A key resource used in food production, particularly for crops
9 Clues: aid Government program to provide food to those in need. • A person or group that grows, produces, or distributes food. • A key resource used in food production, particularly for crops • The act of growing enough food for the population in a country. • The variety and nutritional quality of food grown or available. • ...
Security Password 2025-08-23
Across
- What is the name of your favorite musical?
- What city was your car stolen in?
- What is your maternal grandfather's first name?
Down
- What instrument did you inherit from your great grandmother?
- What is the name of your best friend from college?
- What is your family's favorite NCAA team?
- What is the name of your roommate in grad school?
- What is your first cats name?
- Where did you stay for your first anniversary?
9 Clues: What is your first cats name? • What city was your car stolen in? • What is your family's favorite NCAA team? • What is the name of your favorite musical? • Where did you stay for your first anniversary? • What is your maternal grandfather's first name? • What is the name of your roommate in grad school? • What is the name of your best friend from college? • ...
Software Security 2025-11-01
Across
- Isolating system components to contain security breaches.
- a power to extend the software on certain implementations considering future growth.
- A flaw or weakness that can be exploited to cause harm.
- Injection Common attack injecting malicious code into database queries.
Down
- Ensuring information is accessible only to authorized users.
- arises in software due to uncontrolled expansion in volume and enormous capacity of storage.
- The process of verifying the identity of a user or system.
- Security model enforcing “no read-up” and “no write-down” rules for confidentiality.
- Average time to fix a discovered vulnerability (abbreviation).
9 Clues: A flaw or weakness that can be exploited to cause harm. • Isolating system components to contain security breaches. • The process of verifying the identity of a user or system. • Ensuring information is accessible only to authorized users. • Average time to fix a discovered vulnerability (abbreviation). • ...
MALEWARE 2023-06-19
6 Clues: SPYS ON YOU • SOMEONE HACKS YOU • ATTAKERS DECIVE POEPLE • HOLDS YOU HOSTAGE ONLINE • REAPETING SOMETHING TO ANNOY SOMEONE • SPYS ON YOU AND STEALS YOUR PASSWORDS
Cybersecurity Month 2022-10-13
Across
- ________ Information must be protected from leaks or accidental exposure.
- Button in Outlook to report suspicious email or phishing in one click.
- _______ Period is the length of time information assets are maintained for an authorized person.
- Security _______ is a single or series of unwanted or unexpected information Security Events
Down
- What is celebrated in October?
- Information is accessible to authorized users.
- Information is accurate, complete, and reliable.
- Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
- A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.
9 Clues: What is celebrated in October? • Information is accessible to authorized users. • Information is accurate, complete, and reliable. • Button in Outlook to report suspicious email or phishing in one click. • ________ Information must be protected from leaks or accidental exposure. • ...
Cyber Information 2020-08-10
Across
- A online app where you post pictures
- A belief or opinion generally held about someone
- A app that can keep the world open and connected with eachother
- A app where you can freely write your opinions
Down
- Posting to much information and details online
- A app where you talk to people and start streaks with friends
- Popular with teenagers, charlie demileo is most popular
- A trail of data you create while using the internet
8 Clues: A online app where you post pictures • Posting to much information and details online • A app where you can freely write your opinions • A belief or opinion generally held about someone • A trail of data you create while using the internet • Popular with teenagers, charlie demileo is most popular • A app where you talk to people and start streaks with friends • ...
Cyber Safety 2023-05-22
Across
- the fraudulent paractice of using another persons name
- pretending to be someone else and sending or posting material
- sharing someone's secrets online
- online fights using electronic messages with angry and volgar language
Down
- the use of devices to bully someone by sending messages or mean post.
- repeatedly sending nasty, mean, and insulting messages
- talking someone into revealing secrets and information about themselves online
- dissing someone online
8 Clues: dissing someone online • sharing someone's secrets online • the fraudulent paractice of using another persons name • repeatedly sending nasty, mean, and insulting messages • pretending to be someone else and sending or posting material • the use of devices to bully someone by sending messages or mean post. • ...
Cyber bullying 2023-10-31
8 Clues: An effect of being bullied • Talk to a person you trust • What you use to talk online • what you use to browse online • Don't pay attention to what they say • Don't share your personal information • How to stop someone from messaging you • Tell the system that this user is bullying you
cyber safety 2025-05-05
Across
- Action taken to block a bully
- Device that filters unwanted internet traffic
- Software that protects your computer system
- Sharing secrets without consent is called
Down
- Repeatedly sending cruel online messages
- Online act of harming someone's reputation
- A fake message to steal data
- Keep this private to stay safe online
8 Clues: A fake message to steal data • Action taken to block a bully • Keep this private to stay safe online • Repeatedly sending cruel online messages • Sharing secrets without consent is called • Online act of harming someone's reputation • Software that protects your computer system • Device that filters unwanted internet traffic
Cyber Test 2024-04-10
8 Clues: Did I do thaaaaat? • Yo Angela whos the boss • My whole team coming clean • These Dudes is comic relief • Then go home and write about • Get Ready for a whale of a tim • And Im the Mother lovin monster • When you see me better cross the street
Cyber Ethics 2025-06-15
Across
- We should avoid clicking on unknown_______.
- An illegal intrusion into a computer system or network.
- The act of using someone else's original work or thoughts.
- A legal right granted by law to the creator for his original work.
Down
- The simplest way to prevent plagiarism is through proper_______.
- The process of transforming data into an unreadable form.
- A digital footprint is also known as a digital________.
- The unwanted bulk emails that come from unknown sources.
8 Clues: We should avoid clicking on unknown_______. • A digital footprint is also known as a digital________. • An illegal intrusion into a computer system or network. • The unwanted bulk emails that come from unknown sources. • The process of transforming data into an unreadable form. • The act of using someone else's original work or thoughts. • ...
CYBER CRIME 2022-10-11
Across
- an expression of intention to damage or to harm
- a person who has committed a crime
- a type of social engineering attack often used to steal user data
- intrusive software that is designed to damage and destroy computers
- a horse malware
Down
- a verb meaning to gain unauthorized acess into a computer system
- the process of proving that something is real
- a technique used by hackers to rediredt users to false websites without their knowledge
8 Clues: a horse malware • a person who has committed a crime • the process of proving that something is real • an expression of intention to damage or to harm • a verb meaning to gain unauthorized acess into a computer system • a type of social engineering attack often used to steal user data • intrusive software that is designed to damage and destroy computers • ...
Cyber-Attacks 2022-01-13
Across
- a spoof or look-alike website
- the most common way hackers gain entry to a company's computer network
- personally identifiable information
- everyone's responsibility to protect company information and assets
Down
- an add on to enhance function of browser
- software that locks up a computer system and then demands a payment to unlock it
- software designed to harm computer
- fraudulent emails designed to obtain PII
8 Clues: a spoof or look-alike website • software designed to harm computer • personally identifiable information • an add on to enhance function of browser • fraudulent emails designed to obtain PII • everyone's responsibility to protect company information and assets • the most common way hackers gain entry to a company's computer network • ...
Cyber Wellness 2023-02-01
9 Clues: Practice _N____________ • Respect others _P__________ • Respect others _O___________ • Do not reveal __P____________ • Post _P___________ information • Do not reveal __U______________ • Say P____________ things online. • Say E____________ remarks online • Do not post S_____________ information online
Cyber Safety 2025-06-25
Across
- Acronym for Two Factor Authentication
- The "Nigerian Prince"
- Cyber attackers are looking for and go after ...
- Action that follows an email phishing attempt at work
Down
- One of the main sources of system vulnerability
- State of mind to prevent falling for scams and phishing attempts
- Among the most targeted industries for ransomware
- Quality of a password that is difficult to hack
8 Clues: The "Nigerian Prince" • Acronym for Two Factor Authentication • One of the main sources of system vulnerability • Quality of a password that is difficult to hack • Cyber attackers are looking for and go after ... • Among the most targeted industries for ransomware • Action that follows an email phishing attempt at work • ...
RU ITEC411 2021-04-12
Across
- Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
- A form of authenticating who you are, by using ones body part.
- A form of stealing that usually involves impersonating someone or something.
- A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
- Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
- Something that you access on the internet, a page of sorts.
- A software that is attached to other software, program, picture, etc., that tends to replicates itself.
- This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
- A way of hiding information that you do not want someone knowing, if intercepted.
- Preventing someone information that may be viewed as harmful from being seen from the public.
Down
- The conduct of a persons character and obligations to others.
- A kind of warfare that is virtual.
- A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
- In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
- A group of people and how they work together as a society.
- Someone that is using a computer is called a what?
- A form of testing a network, database, firewall, etc.
- A way into a system without having to go through the standard protocols.
- A kind of software that looks like the real software you are trying to download, however is actually malware.
- A kind of rule that is usually made up the government to try and keep the peace (for the most part).
20 Clues: A kind of warfare that is virtual. • Someone that is using a computer is called a what? • A form of testing a network, database, firewall, etc. • A group of people and how they work together as a society. • Something that you access on the internet, a page of sorts. • The conduct of a persons character and obligations to others. • ...
Information Technology 2023-05-24
Across
- a person who exploits computer hardware and software for their own purposes
- to modify or arrange something so that it works in a certain way
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- a personal website maintained by an individual
- a computer virus that copies its code over and destroys the files of the original data
- a set of rules that must be followed for the sake of security
- a filter that prevents harmful software from entering a network
- a small application that is embedded in a webpage
- to make copies
- to make sure that it is legitimate
- a piece of code that is used to fix a flaw in a computer program
- any type of media used on a webpage, including images and videos
- the proces of stealing another person’s information and using it for personal gain
- how users communicate with a computer
- the use of the internet for software and other resources
- a collection of icons or pictures that have been organized in a file or page
Down
- changing computer to your needs
- a measurement of how quickly a computer works
- device that converts mechanical information into electronic signals
- the company that produces Macs and other computing products
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- tricking people into giving information through email
- to work at a location away from a main office by using technology
- a word or phrase that makes a computer perform an operation
- a person who uses computers and the internet to commit crimes
- a filter that prevents harmful softaware from leaving a network
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- using a legitimate-looking website to trick people
- a program that restricts access on a network
- an action that results in the loss of another person’s property
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
FITAVocab.CLK 2013-05-15
Across
- society designed to inform people about internet safety and security
- electronic technology
- unit to measure speed of signaling or data transfer
- Comcast;Xfinity
- arrangement of data
- port to connect peripherals to a computer
- document or file with special format
- device that sends data to a computer
- type of port to connect mouse or keyboard to a PC
- 8 bits
- processes hardware instructions
- main circuit board
- "I'm lovin' it!"
- symbol designed for recognition
- slot to slide in cds and other discs
- data delivered to a computer
- data delivered from a computer
- quoting on an authoritative source
- oath taken by a person before undertaking the duties of an office
- quantity of storage in computers
- to start up
- sequence of instructions to be completed by a computer
- flash drive; earbuds
- rules and behaviors designed to keep individuals safe when online
Down
- relating to computer or computer networks
- cords
- program that searches for documents
- bring in and start anew
- amount your computer can hold
- delivers information to a computer
- internet "hosting" service that allows you to make your own website
- wireless networking technology that connects other wireless electronic devices
- preview of file or page
- collection of software that directs a computer's operations
- way in which parts of something are laid out
- port to connect to the internet
- data transmission in which a single wire can carry several channels at one time
- protecting information on computer systems/networks
- Dogpile;Ixquick
- slot that allows you to add more plugins
- program designed to do a certain function
- ID with 32 characters used for naming wireless networks
- port to connect audio devices to a computer
- area network that uses high frequency radio signals to transmit and receive data
- a computer's main storage device that stores all your files
- collection of related data stored on your computer or other storage device
- code of conduct one uses online
47 Clues: cords • 8 bits • to start up • Comcast;Xfinity • Dogpile;Ixquick • "I'm lovin' it!" • main circuit board • arrangement of data • flash drive; earbuds • electronic technology • bring in and start anew • preview of file or page • data delivered to a computer • amount your computer can hold • data delivered from a computer • port to connect to the internet • processes hardware instructions • ...
Computer criminals - types and what they do/how they operate 2016-09-07
Across
- gaining illegal or unauthorized access to a file, computer or network.
- When hackers threaten or harm a website, server, or a computer system using denial of service (DOS)
- Spamming It refers to the use of electronic messaging systems to send unsolicited messages to users
- attack to commit a Cyber Crime can be called as a Cyber Attack
- crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data
- The process of making, adapting, or imitating objects, statistics, or documents, with the intent to deceive
Down
- E-mail fishing for personal and financial information disguised as legitimate business e-mail
- False websites that fish for personal and financial information by planting false URLs in Domain Name Users
- Theft It is one of the most serious frauds as it involves stealing money and obtaining other benefits with the use of a false identity
- as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
10 Clues: attack to commit a Cyber Crime can be called as a Cyber Attack • gaining illegal or unauthorized access to a file, computer or network. • E-mail fishing for personal and financial information disguised as legitimate business e-mail • When hackers threaten or harm a website, server, or a computer system using denial of service (DOS) • ...
Bonds 2014-05-02
Across
- The price at which a seller is prepared to sell a security at a particular time.
- Unable to pay debts.
- Businesses that buy and sell securities.
- The price at which a buyer is prepared to buy a security at a particular time.
- People or institutions to whom money is owed.
- Payments by companies to their shareholders.
Down
- Funds operated by investment companies that invest people’s money in various assets.
- The length of time for which a bond is issued (until it is repaid).
- The amount of capital making up a bond or other loan.
- Funds that invest money that will be paid to people after they retire from work.
- The amount of interest that a bond pays.
- Part ownership of a company in the form of stocks or shares.
- The rate of income an investor receives from a security.
13 Clues: Unable to pay debts. • Businesses that buy and sell securities. • The amount of interest that a bond pays. • Payments by companies to their shareholders. • People or institutions to whom money is owed. • The amount of capital making up a bond or other loan. • The rate of income an investor receives from a security. • ...
End-of-Semester Crossword 2023-01-24
Across
- novelas, soap operas can be this
- the Monday after Thanksgiving
- Every Wednesday is ___ Day
- The pilgrims arrived on this ship
- Teacher Neil's favorite drink
- Argentina won the ___ Cup.
- I need to give __ smoking!
- His car had a __-n-run in October
- (idiom) ___ in the oven (pregnant)
- MLK was a ___ Rights Leader.
- the British word for 'fall' season
Down
- similar to goal, made on NYE
- another word for cheesy, silly, dumb
- We changed the clocks in Nov. "Fall ___"
- "And then a __ comes along, w/ the strength.."
- The Tuesday after Thanksgiving
- (idiom) turn over a new ___. (new beginning)
- Most people have bad ___
- The __ New Year started on Sunday.
- Being a lazy, you're a couch ___.
- the Friday before Thanksgiving
21 Clues: Most people have bad ___ • Every Wednesday is ___ Day • Argentina won the ___ Cup. • I need to give __ smoking! • similar to goal, made on NYE • MLK was a ___ Rights Leader. • the Monday after Thanksgiving • Teacher Neil's favorite drink • The Tuesday after Thanksgiving • the Friday before Thanksgiving • novelas, soap operas can be this • The pilgrims arrived on this ship • ...
Conspiracy theories 2022-11-02
Across
- to keep a secret, to lie ....
- fit in, mix, merge, blend in
- a concept, a thought
- the killing of 6 million jews across Europe from 1941 to 1945
- the I in CIA
- first man to walk on the moon, Neil ........
- shady, dim, sunless
- another name for covid-19
- keep an eye on, surveil, tail
- princess ........ she was killed in a car crash in Paris in 1997
Down
- secret, confidential
- some people believe that the earth is .......
- a US president who was assassinated
- the f in FBI
- secret organization, secret club or secret .........
- falsify, fabricate, bluff
- when someone is very happy, we say he is over the ......
- doubt, uncertainty
- a digital attack, a ....... attack
- ........ 51
- extraterrestrial, unearthly
21 Clues: ........ 51 • the f in FBI • the I in CIA • doubt, uncertainty • shady, dim, sunless • secret, confidential • a concept, a thought • falsify, fabricate, bluff • another name for covid-19 • extraterrestrial, unearthly • fit in, mix, merge, blend in • to keep a secret, to lie .... • keep an eye on, surveil, tail • a digital attack, a ....... attack • a US president who was assassinated • ...
Love Story 2024-12-10
Across
- Pines Party 2024
- Bathroom funny business
- Chicks
- Serenades in the park
- Make believe pig skin
- Rabbits' favorite pastry
- Food Market or comedienne
- If my priest had a spouse
- family pet cyber thief
- Julia Louis-Meyer
- Don't feed the swines
- Scalding rubadub
- FL, 33301
- School Shooting Romance
- Margaret Rhymes
- Puzzles by the pool
Down
- It's not rice in the hourglass, it's ...
- Summer kickoff weekend
- Beach chouxs
- Cooking in the nude
- Fly Like R Kelly
- White trash beauty pageant
- Up the bean stalk to meet them
- Flames on barrier sand
- Maple Leaves & Gaslighters
- 2 with red noses dance to horse meat
- Singing feng shui money plant
- Indoor galaxies
- White claws without a couch
29 Clues: Chicks • FL, 33301 • Beach chouxs • Indoor galaxies • Margaret Rhymes • Pines Party 2024 • Fly Like R Kelly • Scalding rubadub • Julia Louis-Meyer • Cooking in the nude • Puzzles by the pool • Serenades in the park • Make believe pig skin • Don't feed the swines • Summer kickoff weekend • Flames on barrier sand • family pet cyber thief • Bathroom funny business • School Shooting Romance • ...
Appian Developer 2022-11-07
Across
- An Appian object that stores an expression to be called from other expressions
- Configuration option that indicates a processes relative importance over other processes
- An Appian object that is a focused work environment for their user
- links to process models the user can start directly from a record
- Role assigned to the user who starts a given process
- the underlying technology that powers Appian Interfaces
- An Appian object that stores connection info for an external system
- An interface for feeds, tasks, and actions that is available to all Appian users
- links to process models the user can start directly from the record list
- An object in the process modeler that represents a step in a process
Down
- The type of security role given to a user that includes all possible permissions
- A specific type of variable that is only available in the context in which it is defined
- An Appian object that allows you to create a collection of users with security permissions
- An Appian object that connects Appian to external relational databases
- A general term for all components that make up the end user experience
- any individual who can access and use any of the Appian interfaces
- A category of process model nodes which evaluate criteria to determine paths to follow
- A type of security role where the user can view and modify the object, but not edit security
- A column in a data table that provides a link between data in two tables
- Confirmation that an extracted piece of data is correct
- A series of tasks linked together to create a wizard which a user can navigate
- A user interface component that allows the user to make a binary choice 'yes' or 'no'
- A response that occurs when a task is delayed
23 Clues: A response that occurs when a task is delayed • Role assigned to the user who starts a given process • Confirmation that an extracted piece of data is correct • the underlying technology that powers Appian Interfaces • links to process models the user can start directly from a record • any individual who can access and use any of the Appian interfaces • ...
RU ITEC411 2021-04-12
Across
- Preventing someone information that may be viewed as harmful from being seen from the public.
- A kind of warfare that is virtual.
- A form of testing a network, database, firewall, etc.
- Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
- A way into a system without having to go through the standard protocols.
- Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
- A form of authenticating who you are, by using ones body part.
- A kind of software that looks like the real software you are trying to download, however is actually malware.
- A software that is attached to other software, program, picture, etc., that tends to replicates itself.
Down
- Something that you access on the internet, a page of sorts.
- A group of people and how they work together as a society.
- Someone that is using a computer is called a what?
- In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
- A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
- A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
- A way of hiding information that you do not want someone knowing, if intercepted.
- The conduct of a persons character and obligations to others.
- A kind of rule that is usually made up the government to try and keep the peace (for the most part).
- A form of stealing that usually involves impersonating someone or something.
- This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
20 Clues: A kind of warfare that is virtual. • Someone that is using a computer is called a what? • A form of testing a network, database, firewall, etc. • A group of people and how they work together as a society. • Something that you access on the internet, a page of sorts. • The conduct of a persons character and obligations to others. • ...
INNOVATION & RESPONSABILITY 2024-09-04
Across
- / Things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet.
- / Technology that proposes to improve capacity and productivity by changing or increasing the normal ranges of human function, through the restoration or extension of human physical, intellectual and social capabilities.
- / The process of performing a scientific procedure, especially in a laboratory, to determine something.
- / Work directed towards the innovation, introduction, and improvement of products and processes.
- / The process of generating a genetically identical copy of a cell or an organism.
- / The use of biology to develop new products, methods and organisms intended to improve human health and society.
- / A government authority or licence conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention.
- / A rule or directive made and maintained by an authority.
- / A sudden advance especially in knowledge or technique.
- / Chat GPT is one of them.
Down
- / The branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules
- / A branch of artificial intelligence (AI) and computer science that focuses on the using data and algorithms to enable AI to imitate the way that humans learn, gradually improving its accuracy.
- / A machine resembling a human being and able to replicate certain human movements and functions automatically.
- / Creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
- / Adaptation of a system, process, etc. to be operated with the use of computers and the internet.
- / A genetically modified organism
- / The simulation of human intelligence processes by machines, especially computer systems.
- / The study of the complete set of DNA (including all of its genes) in a person or other organism.
- / The process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
- / A person recognising the value of liveable environments for humans and nature.
20 Clues: / Chat GPT is one of them. • / A genetically modified organism • / A rule or directive made and maintained by an authority. • / A sudden advance especially in knowledge or technique. • / A person recognising the value of liveable environments for humans and nature. • / The process of generating a genetically identical copy of a cell or an organism. • ...
2 2023-05-24
Across
- the company that produces Macs and other computing products
- the use of the internet for software and other resources
- a word or phrase that makes a computer perform an operation
- a small application that is embedded in a webpage
- changing computer to your needs
- to make copies
- any type of media used on a webpage, including images and videos
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- an action that results in the loss of another person’s property
- a filter that prevents harmful software from leaving a network
- a person who exploits computer hardware and software for their own purposes
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- tricking people into giving information through email
Down
- to modify or arrange something so that it works in a certain way
- a measurement of how quickly a computer works
- device that converts mechanical information into electronic signals
- how users communicate with a computer
- a personal website maintained by an individual
- to work at a location away from a main office by using technology
- a computer virus that copies its code over and destroys the files of the original data
- a piece of code that is used to fix a flaw in a computer program
- a filter that prevents harmful software from entering a network
- a program that restricts access on a network
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- the proces of stealing another person’s information and using it for personal gain
- a person who uses computers and the internet to commit crimes
- using a legitimate-looking website to trick people
- a set of rules that must be followed for the sake of security
- a collection of icons or pictures that have been organized in a file or page
- to make sure that it is legitimate
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
G8 CrossWord 2013-01-14
Across
- Can't_host_G8_meetings
- A_major_concern_at_G8
- Location_of_first_G8
- The_8th_country_added_to_G8
- Large_South_American_Economy_not_in_G8
- Common_issue_discussed
- Hosted_2007_G8
Down
- Large_Asian_Economy_not_in_G8
- Leader_who_did_not_attend_2012_G8
- Average_number_of_days_of_G8_meetings
- Next_host_of_G8
- First_North_American_Country_in_G8
- Only_Asian_Country
- The_7th_country_added_to_G8
14 Clues: Hosted_2007_G8 • Next_host_of_G8 • Only_Asian_Country • Location_of_first_G8 • A_major_concern_at_G8 • Can't_host_G8_meetings • Common_issue_discussed • The_7th_country_added_to_G8 • The_8th_country_added_to_G8 • Large_Asian_Economy_not_in_G8 • Leader_who_did_not_attend_2012_G8 • First_North_American_Country_in_G8 • Average_number_of_days_of_G8_meetings • ...
Airports 2020-03-07
Career English 1과 2021-03-30
Mots croisés Cyber 2024-02-01
Across
- Vérification de l'identité.
- Outil de sécurité qui crée une connexion sécurisée et cryptée entre vous et Internet (acronyme).
- Comportement menaçant facilité par des moyens électroniques tels que les SMS.
- Type de logiciel malveillant conçu pour bloquer l'accès à un système informatique jusqu'à ce qu'une somme d'argent soit payée
- Une norme de technologie sans fil utilisée sur de courtes distances utilisant des ondes radio UHF de courte longueur d’onde.
- Technologie de réseau domestique largement utilisée qui permet une connexion sans fil avec l’interface Internet.
Down
- Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible.
- Accès non autorisé à un réseau, à des systèmes d'information ou à une application.
- L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus.
- Matériel ou logiciel conçu pour empêcher tout accès non autorisé vers ou depuis un réseau privé
- Une faille ou une faiblesse dans un système informatique qui pourrait être exploitée pour violer la sécurité du système.
- Un e-mail frauduleux provenant prétendument d'une entreprise réputée tentant d'obtenir des informations personnelles.
12 Clues: Vérification de l'identité. • L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus. • Comportement menaçant facilité par des moyens électroniques tels que les SMS. • Accès non autorisé à un réseau, à des systèmes d'information ou à une application. • Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible. • ...
Cad Abbreviations 2023-12-27
19 Clues: number • Suspect • between • traffic • unknown • accident • security • location • possibly • occupied • on scene • business • voicemail • supervisor • In Front of • on the phone • methed of travel • last seen wearing • no further information
crossword 2025-10-27
19 Clues: Art • Gym • Lab • Ivrit • Rambam • History • Spanish • Security • Principal • AP English • Engineering • Graphic Design • Israel Guidance • College Guidance • 9th Grade Biology • Marketing Director • Activities Director • Associate Principal • Admissions Coordinator
KUIS P5 BANGUNLAH JIWA DAN RAGANYA 2025-01-15
Across
- Perundungan melalui media sosial disebut ... bullying
- Jenis olahraga yang membutuhkan kecepatan dan keserasian gerakan fisik yang teratur
- Contoh makanan yang mengandung protein hewani
- Kegiatan untuk menjaga kesehatan dan kebugaran tubuh
- Memukul termasuk dalam jenis perundungan ...
- Anjuran makan ... kali sehari
- Contoh makanan yang mengandung protein nabati
- Karbohidrat selain nasi
Down
- Untuk menjaga kesehatan tubuh, harus makan makanan bergizi ...
- Istilah lain dari makanan cepat saji
- Buah dan sayur merupakan jenis makanan yang mengandung ...
- Cabang olahraga dengan gerakan mengikuti musik disebut senam ...
- Karakter yang kita pelajari dari kegiatan senam
- Di dalam tubuh yang sehat, terdapat jiwa yang ...
14 Clues: Karbohidrat selain nasi • Anjuran makan ... kali sehari • Istilah lain dari makanan cepat saji • Memukul termasuk dalam jenis perundungan ... • Contoh makanan yang mengandung protein hewani • Contoh makanan yang mengandung protein nabati • Karakter yang kita pelajari dari kegiatan senam • Di dalam tubuh yang sehat, terdapat jiwa yang ... • ...
French words 2023-04-14
25 Clues: car • bed • tip • menu • cash • taxi • boat • guide • stamp • people • palace • strike • ticket • subway • castle • baggage • customs • on foot • cue/line • suitcase • passport • security • cathedral • consultant • post office
GSCP 3rd Activities - Key Management 2025-11-04
Across
- What was the topic of the second Global Security Culture Program campaign?
- The primary purpose of the red zone is to protect what?
- Security measure distributed based on roles and business justification.
- An alarm that will be triggered when someone opens a door without receiving "access granted" (green light).
- Security Zone that is inside the fence line, outside the building.
Down
- What type of connector is used as a safety mechanism for lanyards?
- How are Media Bin Keys classified in the Key Risk Matrix?
- Security Zone that is inside the building, outside of the red zone.
- The process by which all individuals and objects are screened going into and out of the Red Zone.
- Which system do Amazon data centers use to securely manage physical keys, control access permissions, and track key usage history?
10 Clues: The primary purpose of the red zone is to protect what? • How are Media Bin Keys classified in the Key Risk Matrix? • What type of connector is used as a safety mechanism for lanyards? • Security Zone that is inside the fence line, outside the building. • Security Zone that is inside the building, outside of the red zone. • ...
Hartford Funds Compliance Crossword 2019-05-01
Across
- A security device used in cars, trucks and corporate networks.
- Investment adviser firm that serves as the adviser to certain Hartford Funds.
- Working for, or on the board of a start-up company is considered a(n) _____________ and must be reported via MCO prior to any engagement.
- Adhere to a rule (policy, standard, law).
- Dedicated to investor protection and market integrity through effective and efficient regulation of broker-dealers.
- Separation of illicit proceeds from their source by a variation of financial transactions intended to conceal the origin of the proceeds.
- Vendor employees use to attest/complete various Compliance related activities (reportable account disclosure, outside business requests, limited partnership requests, etc).
- Any technology application that allows users to create, share and exchange information in an online community or forum.
- Situation in which a person is in a position to derive personal benefit from decisions made in their official capacity. HINT – 3 words.
- Moral principles that govern a person’s behavior.
- Hartford Funds Chief Compliance Officer.
Down
- Mutual Funds/ETFs should never be described as providing this type of protection.
- Unacceptable or improper behavior by an employee.
- Compliance is not an act, it’s a _______.
- Protection of internet-connected systems from cyber-attacks, protect against unauthorized access to data centers and other computerized systems.
- Investment adviser firm that serves as the adviser to separately managed accounts.
- All potential conflicts of interest need to be _________.
- Who is responsible for making sure all reportable accounts, trades, and holdings are appropriately and timely disclosed in MyComplianceOffice?
- Encouraging a Financial Advisor to invest his clients in Hartford Funds Core Equity Fund because the Fund will outperform its benchmark during the next 2 years is inappropriate. Use of such language is considered?
- FINRA Registered Broker-Dealer that is the official distributor for Hartford Fund’s ETFs.
- Engages in the underwriting and wholesale distribution and marketing of open end investment companies registered under the Investment Company Act of 1940 to third party firms.
- Procedures, laws and regulations designed to stop the practice of generating income through illegal actions.
- Travel & Expense items are input into this system.
23 Clues: Hartford Funds Chief Compliance Officer. • Compliance is not an act, it’s a _______. • Adhere to a rule (policy, standard, law). • Unacceptable or improper behavior by an employee. • Moral principles that govern a person’s behavior. • Travel & Expense items are input into this system. • All potential conflicts of interest need to be _________. • ...
Semester 1 Intro to Business and Marketing Review 2023-12-06
Across
- An economic system in which individuals own and operate the majority of businesses that provide goods and services.
- Cyber ____________ refers to the practices and steps that users of computers and IoT devices take to maintain system health and improve online security.
- An economic system in which businesses and individuals decide what to produce and buy, and the market determines prices and quantities sold.
- This occurs when people's needs and wants are unlimited and the resources to produce the goods and services to meet those needs and wants are limited.
- The performance ______________ process is a formal system for reviewing, evaluating, and improving employee performance.
- The people who create goods and services are called ___________ resources.
- A person who risks time, effort, and money to start and operate a business.
- A set of behaviors that utilize a toolbox of techniques, tools, and strategies that allow a person to achieve set goals within a given time.
- Things that you think you must have in order to be satisfied.
- Types of workplace communication include memos, business letters, _________, and chat platforms.
Down
- The inputs and resources used to produce goods and services.
- An economy that exhibits elements of both capitalism and socialism.
- Things that you must have in order to survive.
- Resources that are used in the production of goods and services.
- The skill set and process that utilizes a systematic approach to a task, whether answering a question, making a decision, or solving a problem.
- What remains after all business expenses have been deducted from sales revenue.
- Nonproductive _____________ in teams can cause a breakdown of trust, resentment, lowered efforts and stalled productivity.
- The organized effort of individuals to produce and sell, for a profit, the goods and services that satisfy society's needs.
- An economic system in which the government decides what goods and services will be produced,how they will be produced, for whom available goods and services will be produced, and who owns and controls the major factors of production.
- The way in which people deal with the creation and distribution of wealth.
- Raw materials supplied by nature.
21 Clues: Raw materials supplied by nature. • Things that you must have in order to survive. • The inputs and resources used to produce goods and services. • Things that you think you must have in order to be satisfied. • Resources that are used in the production of goods and services. • An economy that exhibits elements of both capitalism and socialism. • ...
Cyberbullying 2024-09-17
8 Clues: the cause • something cyberbullies do • when some one is cyber bulling • do this to your parent or guardian • The person who is being cyberbullied • something to do after telling and blocking • actions that are _______ can cause bad things. • 1-404-978-9282,1-877-355-5787, and 650-253-0000.
Global challenge 2024-11-12
8 Clues: cable with glass • spreading in a liquid • the reason you have www • bullying in the internet • devices to transmit informations • platform where you can communicate • a fight in I.e. economics around the world • people who can control your devices from around the world
Air Travel Words 2022-04-18
Across
- time The time a plane will leave from an airport.
- attendant The airline employee responsible for providing service to passengers and ensuring their in-flight safety.
- pass The ticket passengers need to enter the plane and locate their seat.
- The area where the pilot sits to operate the plane; remains closed and locked during flight for security reasons.
- flight The airplane a passenger catches after a layover.
- time The time a plane will land at an airport.
- class The section of the plane that offers standard seat size, amenities, and service; typically, the least expensive section. Also called economy class.
- A flight that departs late at night and arrives during early morning hours.
- class A section of the plane reserved for travelers who want to upgrade from the standard seat size, amenities, and service.
Down
- luggage Bags that are put in the cargo area of the plane, which is inaccessible by passengers.
- class The section of the plane that offers the largest seat size and highest-quality amenities and service.
- ticket A ticket that passengers buy to fly to a destination but not to return.
- number The number that identifies a particular flight and that passengers use to find their gate number and plane.
- agent An airline employee who checks in passengers, checks luggage, and prints boarding passes.
- ticket A ticket that passengers buy to travel to a destination and back again.
- The process passengers must go through when first arriving at the airport before going through security.
- (Federal Aviation Administration) The federal agency that develops and enforces safety regulations and advancements.
- A stop in an airport before reaching the final destination.
- The bags passengers bring with them on the plane.
- class See coach class.
- (Transportation Security Administration) A federal agency that protects transportation systems in the United States and ensures safe air travel; employees serve as security officers in airports.
- claim The area in the airport where passengers go to collect their luggage.
22 Clues: class See coach class. • time The time a plane will land at an airport. • time The time a plane will leave from an airport. • The bags passengers bring with them on the plane. • flight The airplane a passenger catches after a layover. • A stop in an airport before reaching the final destination. • ...
CHAPTER 6 NATIONAL SECURITY AND PEACE EDUCATION 2019-09-30
Across
- the particular condition that someone or something is in at a specific time.
- a group of people living in the same place or having a particular characteristic in common.
- discussion aimed at reaching an agreement.
- WOLFERS- who has a member of the council of the ISS and did much to help the institute was one of the handful of men created the establishment of academic fields of international now politics.
- he state of being free from danger or threat.he state of being free from danger or threat.
- profession, activity, or skill of managing international relations, typically by a country's representatives abroad.
- intense feeling of deep affection.
- relating to the government or the public affairs of a country.
- PEACE- refers to a state of affairs where peace is permanently established over a certain area. ... The term perpetual peace became acknowledged when German philosopher Immanuel Kant published his 1795 essay Perpetual Peace: A Philosophical Sketch.
Down
- the power or right to give orders, make decisions, and enforce obedience.
- the power or right to act, speak, or think as one wants without hindrance or restraint.
- surroundings or conditions in which a person, animal, or plant lives or operates.
- the arts and other manifestations of human intellectual achievement regarded collectively.
- a large body of people united by common descent, history, culture, or language, inhabiting a particular country or territory.
- the action of protecting, or the state of being protected.
- from disturbance; tranquility.
- SECURITY-National security is the security of a nation state, including its citizens, economy, and institutions, which is regarded as a duty of government.
- The branch of knowledge concerned with the production, consumption, and transfer of wealth.
- relating to or characteristic of soldiers or armed forces.
- MAIER-served as the director of the Center for European Studies at Harvard, 1994-2001, and currently co-directs (with Sven Beckert, Sugata Bose, and Jean Comaroff) the Weatherhead Initiative in Global History.
20 Clues: from disturbance; tranquility. • intense feeling of deep affection. • discussion aimed at reaching an agreement. • the action of protecting, or the state of being protected. • relating to or characteristic of soldiers or armed forces. • relating to the government or the public affairs of a country. • ...
Bernardo C. Los Viajes assignment 2024-03-05
19 Clues: valid • ruins • hostel • Border • expired • to sail • lodging • compass • itinerary • insurance • to return • ecotourism • tour guide • high season • traffic jam • room service • customs agent • to pack your bags • security measures
Pre-intermediate 3 2022-11-14
19 Clues: vám • utas • fiuka • késik • talán • kütyü • jóslat • egy napot • mostanában • határozott • konferencia • indulási kapuk • hely, helyszin • érkezési kapuk • átvesz, befogad • tábla, jelzések • beszáll (repülőbe) • biztonsági ellenörzés • agresszív közúti magatartás
Airport vocabulary 2022-11-16
19 Clues: viaje • viajar • aduana • puerta • salidas • esperar • turista • demorado • llegadas • terminal • peso(kg) • equipaje • pasaporte • seguridad • cancelado • asiento de pasillo • tarjeta de embarque • asiento de la ventana • fecha de nacimiento (contracion)
Cyberpuzzle 2023-08-08
Across
- Substitute_ with numbers, punctuation marks or symbols when creating your password
- Phishing attempt directed at specific individuals or companies
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Kind of software used to prevent, scan, detect and delete viruses from a computer
- Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
- Cybersecurity Awareness Month
- Mandatory to wear inside the organisation and to remove outside
Down
- Action to do when I receive a suspicious email
- When available, use stronger_for an added layer of security
- Type of malware that disrupts computers, servers, and other devices
- Phishing attack deployed via SMS message
- Defensive technology designed to keep the bad guys out
12 Clues: Cybersecurity Awareness Month • Phishing attack deployed via SMS message • Action to do when I receive a suspicious email • Defensive technology designed to keep the bad guys out • When available, use stronger_for an added layer of security • Phishing attempt directed at specific individuals or companies • ...
Cyber Ethics & Networking Concepts 2025-05-24
Across
- Computer network created for an individual person
- Bulk emails from unknown sources
- Use single user software in multiple system
- Stands for Wi-Fi
- Delivers message only to the destination
- Topology where data travels in a cicular path
- Imitating or copying the sources of one's original work to another persons
- All nodes connected via a central device
- Criminal Activities that involve the use of computers
Down
- An impression of information about a person using internet
- Responsible behaviour in social media
- A type of cyberattack that uses fraudulent email
- Simplest form of network topology
- Each computer in a network
- Illegally copied or distributed software
- Internet accessing in an illegal manner
- Network within a small area
- Harmful program disrupts computer system
18 Clues: Stands for Wi-Fi • Each computer in a network • Network within a small area • Bulk emails from unknown sources • Simplest form of network topology • Responsible behaviour in social media • Internet accessing in an illegal manner • Illegally copied or distributed software • Delivers message only to the destination • Harmful program disrupts computer system • ...
FIT E: Technology Vocab 2013-05-16
Across
- is made up of 1000 gigabytes
- the wiring in your computer
- is made up of 1000 zetabytes
- a type of booklet that advertises a company's products
- a company's symbol or graphic design
- the location where you can put in a disc
- the location on your computer where you can plug in your peripherals
- any type of attachment you can plug in your computer
- a type of program that allows you to receive internet
- anything that is sent out of a computer
- a informational paper about you and your history, usually made for a job
- the privacy and security of yourself on the internet
- is made up of 1000 bits
- is made up of 1000 petabytes
- is made up of 1000 bytes
- a type of search engine that searches all types of other search engine
- the main center of your computer where all the data goes
Down
- a program that allows you to search the web
- anything that has to do with the internet
- the device you use to operate your desktop
- is made up of 1000 yottabytes
- the act of spreading public notice for your product
- the brain of your computer, where all the data is stored
- the term used for a picture or graphic image that is made up by numbers
- a zoomable presentation program
- is made up of 1000 exabytes
- the screen of your computer
- anything that you plug in your computer
- a company's words or phrase that is advertised
- is made up of 1000 terabytes
- a program where you can access any type of media or internet wirelessly
- is made up of 1000 kilobytes
- is made up of 1000 brontobytes
- a portable electronic device that is wireless
- the location on your cmputer where you can plug in your headphones or earbuds
- the place where you can save files off of any type of device
- is made up of 1000 megabytes
- the smallest amount of storage you can have
38 Clues: is made up of 1000 bits • is made up of 1000 bytes • the wiring in your computer • is made up of 1000 exabytes • the screen of your computer • is made up of 1000 gigabytes • is made up of 1000 zetabytes • is made up of 1000 terabytes • is made up of 1000 kilobytes • is made up of 1000 petabytes • is made up of 1000 megabytes • is made up of 1000 yottabytes • ...
Crossword 3 2023-05-24
Across
- to make copies
- a piece of code that is used to fix a flaw in a computer program
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- the proces of stealing another person’s information and using it for personal gain
- to make sure that it is legitimate
- any type of media used on a webpage, including images and videos
- a person who exploits computer hardware and software for their own purposes
- a small application that is embedded in a webpage
- a measurement of how quickly a computer works
- a collection of icons or pictures that have been organized in a file or page
- a person who uses computers and the internet to commit crimes
Down
- a computer virus that copies its code over and destroys the files of the original data
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- a word or phrase that makes a computer perform an operation
- a filter that prevents harmful software from entering a network
- device that converts mechanical information into electronic signals
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- a filter that prevents harmful software from leaving a network
- an action that results in the loss of another person’s property
- tricking people into giving information through email
- how users communicate with a computer
- the use of the internet for software and other resources
- the company that produces Macs and other computing products
- changing computer to your needs
- a program that restricts access on a network
- to modify or arrange something so that it works in a certain way
- a set of rules that must be followed for the sake of security
- using a legitimate-looking website to trick people
- a personal website maintained by an individual
- to work at a location away from a main office by using technology
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
NATO Crossword 2023-08-03
Across
- NATO's largest partnership group is known as the Partnership for ___
- NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
- Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
- NATO is the North ___ Treaty Organization
- NATO has been leading a peace-support operation in this country since June 1999
- The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
- This was the first SACEUR, and was later the 34th President of the United States
- The lengthy statement released at Summits is often called this.
- US General Christopher Cavoli currently holds this position, the second-highest military position within NATO.
- This kind of threat typically does not involve weapons, but can include disinformation, interference in politics, and cyber operations
- NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
- This ability enables Allied forces from different countries to operate together.
- Last month's NATO Summit took place in this city.
Down
- This Italian city is home to NATO military command.
- NATO's maritime security operation in the Mediterranean is called Operation Sea ___
- This is the part of the founding treaty that explains how new members can join
- PermReps sit on the NAC, or North Atlantic ___
- Allies pledged to devote this much of their GDP to defense spending
- NATO's military headquarters in Mons, Belgium
- All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.
- This country is an official Invitee, but not yet a member
- This is one of NATO's closest partners, and its headquarters are right downtown
- Allies contribute money to fund NATO programs. This is known as ___ funding.
- NATO's current Secretary General is from this country
- The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
- This Virginia city is home to Allied Command Transformation (ACT)
26 Clues: NATO is the North ___ Treaty Organization • NATO's military headquarters in Mons, Belgium • PermReps sit on the NAC, or North Atlantic ___ • Last month's NATO Summit took place in this city. • This Italian city is home to NATO military command. • NATO's current Secretary General is from this country • This country is an official Invitee, but not yet a member • ...
Team Building 2025-06-11
Across
- What should we do to every member who walks in?
- What form has to be filled out to add a joint owner to an account?
- Who do we send wires to?
- Monthly Cyber Security training
- What are we doing when entering C in the proc code?
- What tool do we have to check after placing a hold on a check?
- Where our goals are entered
- What department is notified of the death of a member?
- What has to be pressed on the cash advance machine at the end of the night?
- What is the name of the credit cards reward program?
- What is the drive thru being replaced with?
- Who has to be called to release a vehicle from rep?
Down
- What can be up to 50% on auto loans depending on credit score?
- Where are checks scanned in at the end of the night?
- What would you recommend to a member who needs to do some home remodeling?
- What program gives CD's a .05% rate increase?
- What kind of ID does someone have to have to do a cash advance?
- What has to be filled out on verafin when opening a new account?
- What has to be accompany a POA being submitted to the back office?
- Who do we contact for questions regarding current loans?
- Who can withdraw from a custodial account?
- How many cross sells per month do you need to reach the first tier goal?
- What is checked each time a cashier's check is made
- Who needs to be emailed when giving out or receiving $5,000 in cash?
- What does an MSR have to pull to qualify someone for a loan?
- What do MSR's add to an auto loan that covers vehicle repairs?
- What is added to an auto loan to cover the amount owed on the loan vs the amount paid by insurance coverage after a total loss?
- What does the E in HELOC represent?
28 Clues: Who do we send wires to? • Where our goals are entered • Monthly Cyber Security training • What does the E in HELOC represent? • Who can withdraw from a custodial account? • What is the drive thru being replaced with? • What program gives CD's a .05% rate increase? • What should we do to every member who walks in? • What is checked each time a cashier's check is made • ...
At the Airport 2017-01-12
22 Clues: багаж • терять • прямой • острый • тележка • предмет • опасный • тяжелый • быстрый • очередь • жидкость • пассажир • оставлять • показывать • пропускать • досматривать • внимательный • присоединяться • проходить через - go ... • посадочный талон - ... card • стойка регистрации - ... desk • сотрудник службы безопасности
o Aeroporto e Uma Viagem de Aviao 2023-03-20
26 Clues: trip • cart • agent • pilot • flight • runway • luggage • carryon • monitor • customs • through • arrivals • suitcase • vacation • security • escalator • passenger • tocheckin • tripticket • flightcrew • seatnumber • fristclass • stewardness • destination • domesticflight • automatic runway
Family 2024-01-10
26 Clues: Care • Love • Grow • Face • Core • Build • Learn • Family • Values • Social • Foster • Culture • Support • Empathy • Crucial • Respect • Teaches • Identity • Provides • Security • Preserves • Challenges • Traditions • Environment • Understanding • Bases/foundations
