cyber security Crossword Puzzles

Digital citizenship 2022-02-16

Digital citizenship crossword puzzle
Across
  1. something you don't share online
  2. a technology device where you can download social media apps
  3. a mode which you can put your account on
  4. something where you can post videos or pictures on
  5. a social media app
  6. a form of communicating to someone
Down
  1. a form of texting
  2. something you leave behind on the internet
  3. something which is private
  4. an app where you can talk to people online
  5. a crime
  6. an app where you can watch videos
  7. people who want information from you

13 Clues: a crimea form of textinga social media appsomething which is privatesomething you don't share onlinean app where you can watch videosa form of communicating to someonepeople who want information from youa mode which you can put your account onsomething you leave behind on the internetan app where you can talk to people online...

CIP,C11-5,2018 2020-10-28

CIP,C11-5,2018 crossword puzzle
Across
  1. responsible for overseeing privacy legislation in a province or territory
  2. oversees provincial licensing
  3. The Insurance ____________ Act gives power to OSFI
  4. measure of financial stability for an insurance company
  5. a type of data breach where personal information is hacked
Down
  1. a condition formed from legislation
  2. supervisor of insurance companies
  3. an insurance company makes money this way
  4. a federal privacy act
  5. foreign insurance companies are regulated at this level of government
  6. files a report with the federal regulator
  7. the regulator in Quebec
  8. a type of computer liability insurance

13 Clues: a federal privacy actthe regulator in Quebecoversees provincial licensingsupervisor of insurance companiesa condition formed from legislationa type of computer liability insurancean insurance company makes money this wayfiles a report with the federal regulatorThe Insurance ____________ Act gives power to OSFI...

Bullying 2024-12-19

Bullying crossword puzzle
Across
  1. The act of copying
  2. Harming another person's reputation
  3. The act of physically harming another person
  4. Provoking or making fun of someone playfully
  5. Using the body or an object to harm others
  6. The act of pushing someone
  7. Using words to threaten, harm, or hurt another person
Down
  1. Use of offensive names
  2. Conversations about people that are not proven to be true
  3. Acting threatening, or frightening another
  4. To hit someone with a closed fist
  5. Abusing and/or insulting another person regularly
  6. Using the internet to bully another person

13 Clues: The act of copyingUse of offensive namesThe act of pushing someoneTo hit someone with a closed fistHarming another person's reputationActing threatening, or frightening anotherUsing the internet to bully another personUsing the body or an object to harm othersThe act of physically harming another personProvoking or making fun of someone playfully...

Faculty 2025-10-16

Faculty crossword puzzle
Across
  1. Engineering
  2. Graphic design
  3. Principal
  4. Admissions Coodinator
  5. AP English
  6. Marketing Director
  7. Lab
  8. Israel Guidence
  9. Ivrit
Down
  1. Gym
  2. Security
  3. Associate Principal
  4. 9th Bio
  5. Spanish
  6. Art
  7. Activities Director
  8. Ramabam
  9. History
  10. College Advisory

19 Clues: GymArtLabIvrit9th BioSpanishRamabamHistorySecurityPrincipalAP EnglishEngineeringGraphic designIsrael GuidenceCollege AdvisoryMarketing DirectorAssociate PrincipalActivities DirectorAdmissions Coodinator

Politics 2016-03-01

Politics crossword puzzle
Across
  1. : an attractive rather than coercive type of power
  2. : using laws to fairly judge and punish crimes and criminals
  3. : Politics as "master scienc"
  4. : ASEAN observer (Acronym)
  5. : evolved as science and art
  6. : another term for "security"
  7. : "city-state"
  8. : defense of the state and its citizens
  9. : quantitative and descriptive approach approach
  10. : persons and institutions that make and enforce laws
Down
  1. : in charge of internal security
  2. : limitation and regulation
  3. : Civil Society Organization
  4. : a subdiscipline of polisci that compares governments and political systems
  5. : International Relations
  6. : a qualitative approach that tries to find out what is best for the people
  7. : power of politicians and individuals to act out law
  8. : the act of influencing the government to do what you want
  9. : the currency of politics
  10. : military or economic type of power

20 Clues: : "city-state": International Relations: ASEAN observer (Acronym): the currency of politics: limitation and regulation: Civil Society Organization: evolved as science and art: Politics as "master scienc": another term for "security": in charge of internal security: military or economic type of power: defense of the state and its citizens...

Fun while you learn. 2020-06-09

Fun while you learn. crossword puzzle
Across
  1. Physiological effect of rapid decompression.
  2. Also called the Silent review.
  3. The flight deck during critical phases.
  4. Mental review, Stop____ Review..
  5. In case of decompression, Put on the nearest Oxygen _ ?
  6. Command “Cabin crew Arm doors for departure and ___ ?
  7. Content of polar kit.
  8. Which crew does transit security search ?
  9. You must check this on a passenger’s boarding card.
  10. One of the hijacker profiles.
  11. Used for pax showing disruptive behavior.
Down
  1. Critical Phases of the flight, “Take off,__,landing.”
  2. This follows, CSD to the flight deck - 2.
  3. Adopt this position to preserve body temperature.
  4. You shout this 30 seconds before crash landing.
  5. Security form used ONLY for outstation.
  6. Decompression is ? ___ of cabin pressure.
  7. Element of fire triangle.
  8. The one who fights the fire.
  9. Command, “ ___initiate controlled disembarkation.”

20 Clues: Content of polar kit.Element of fire triangle.The one who fights the fire.One of the hijacker profiles.Also called the Silent review.Mental review, Stop____ Review..The flight deck during critical phases.Security form used ONLY for outstation.This follows, CSD to the flight deck - 2.Decompression is ? ___ of cabin pressure....

NETWORKING REQUIREMENTS 2024-08-06

NETWORKING REQUIREMENTS crossword puzzle
Across
  1. A negotiator between networks
  2. Relies on a server for services
  3. Common example is connecting a Bluetooth device with smartphone
  4. Devices connected in 1 physical environment
  5. Connects with cables
  6. Communication over a ranged distance
  7. A term for describing hubs and switches
  8. Divided in 7 layers allowing communication
  9. Security that controls input and output limitations
  10. Enables communication between physical devices
  11. Connection of 2 nodes
Down
  1. Technology for the speed of a desktop
  2. Practices to detect unauthorized access
  3. Facilitates communication between networks
  4. The maximum amount of capacity in a network
  5. Coming together for specific tasks
  6. Allows wireless devices to connect to wired networks
  7. Can be connected without cables
  8. Computers are linked by this device
  9. Rules on how data is transmitted

20 Clues: Connects with cablesConnection of 2 nodesA negotiator between networksRelies on a server for servicesCan be connected without cablesRules on how data is transmittedComing together for specific tasksComputers are linked by this deviceCommunication over a ranged distanceTechnology for the speed of a desktopPractices to detect unauthorized access...

spanish 2023-01-27

spanish crossword puzzle
Across
  1. security does this to luggage
  2. not taking off but
  3. getting checked aka
  4. when your getting on the plane
  5. in order to board you have to
  6. the people riding the plane
  7. the person who walks around planes
  8. you go here to get your bags
  9. you have to buy one of these
  10. what takes you from place to place
  11. not landing but
Down
  1. your plan for the trip
  2. what you put all your stuff in
  3. they open the ... to the plane
  4. making sure your flight is still on
  5. they scan your boarding pass on
  6. you take this from place to place
  7. you have to show security this
  8. to go in the air
  9. where you go to get on the plane
  10. what your suitcase is called

21 Clues: not landing butto go in the airnot taking off butgetting checked akayour plan for the tripthe people riding the planeyou go here to get your bagsyou have to buy one of thesewhat your suitcase is calledsecurity does this to luggagein order to board you have towhat you put all your stuff inthey open the ... to the planewhen your getting on the plane...

RCY Marvel Crossword 2022-12-07

RCY Marvel Crossword crossword puzzle
Across
  1. Dr Erik Selvig joined SHIELD to study this
  2. Librarian of Kamar Taj
  3. Dora Milaje Security chief
  4. Co founder of X-Con security
  5. Smallest Avenger
  6. King of Asgard
  7. King Laufeys son
  8. queen of Asgard
  9. Scott Langs cellmate
  10. Avenging archer
  11. Hydra Leader
  12. Scientific sister of Tchalla
  13. Had mind stone in forehead
Down
  1. Helps Howard Stark create SHIELD
  2. Odins oldest child
  3. Military rank held by Nick Fury
  4. one of Thanos adopted children
  5. Friend of Thor
  6. Nickname of Timothy Dugan
  7. Surname of Howard Starks business partner
  8. Assists Thor to defeat Hela
  9. Where Bucky finds sanctuary
  10. Bruce Banners alter ego
  11. First name of agent Natasha Romanoff alias at Stark Industries
  12. SHIELD agent who helped design Capt America shield

25 Clues: Hydra LeaderFriend of ThorKing of Asgardqueen of AsgardAvenging archerSmallest AvengerKing Laufeys sonOdins oldest childScott Langs cellmateLibrarian of Kamar TajBruce Banners alter egoNickname of Timothy DuganDora Milaje Security chiefHad mind stone in foreheadAssists Thor to defeat HelaWhere Bucky finds sanctuaryCo founder of X-Con security...

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. The individuals who control access to people, data, and systems
  2. Kwiktrip's password policy requires that coworkers change their passwords __days
  3. You can help fight cybercrime by becoming a __________
  4. What is the common hacking method
  5. These are designed to maintain the security of everyone associated with an organization
  6. This attack occurs when cybercriminals research and track which sites employees visit the most
Down
  1. _____are the last line of defense
  2. Failure to run these equals failure to patch security vulnerabilities
  3. This security tool identified and removes malicious programs
  4. This dangerous attack targets specific people or organization, often with custom made email or messages
  5. Stealing money is the main goal behind this type of malware
  6. Any scenario that triggers emotions should also trigger your ______
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. What should you do when a workstation or device is no longer in use
  9. The future of security is_____, not machines

15 Clues: _____are the last line of defenseWhat is the common hacking methodThe future of security is_____, not machinesYou can help fight cybercrime by becoming a __________Stealing money is the main goal behind this type of malwareThis security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

Foreign Policy Making Chapter 18 2025-04-15

Foreign Policy Making Chapter 18 crossword puzzle
Across
  1. is the policy of avoiding involvement in foreign affairs.
  2. North Atlantic Treaty Organization
  3. Fees for importing goods into the United States from other countries.
  4. has the power to declare war and control funding for foreign policy
  5. is a Cold War strategy to stop the spread of communism.
  6. represent the U.S. abroad in negotiations and embassies
  7. Establishment emphasized freedom from military threat and political coercion.
Down
  1. agency that gathers foreign intelligence for National Security in the U.S.
  2. the policy that involves decisions about relations with the rest of the world
  3. hostility between the United States and Soviet Union.
  4. is the policy of becoming involved in foreign affairs
  5. the president, the diplomats, congress, and the national security establishment are all what?
  6. An organization created in 1945 to promote international peace, security, and cooperation.
  7. is the use of violence to demoralize and frighten a country's population or government

14 Clues: North Atlantic Treaty Organizationhostility between the United States and Soviet Union.is the policy of becoming involved in foreign affairsis a Cold War strategy to stop the spread of communism.represent the U.S. abroad in negotiations and embassiesis the policy of avoiding involvement in foreign affairs....

Acronym 2021-11-21

Acronym crossword puzzle
Across
  1. joe Biden
  2. founder
  3. quickly
  4. teacher
  5. security
  6. army
  7. confusion
Down
  1. spaceship
  2. fun
  3. crime
  4. money
  5. important
  6. chicken
  7. disorder
  8. offline

15 Clues: funarmycrimemoneyfounderquicklychickenteacherofflinesecuritydisorderspaceshipjoe Bidenimportantconfusion

Puzle 2023-10-13

Puzle crossword puzzle
Across
  1. przepłynąć
  2. wyprzedzić
  3. chodnik
  4. ciężarówka
  5. peron
  6. rejs
  7. furgonetka
  8. motocykl
Down
  1. dogodny
  2. jacht
  3. bramka
  4. przybyć
  5. bagażnik
  6. za granicą
  7. ochrona

15 Clues: rejsjachtperonbramkadogodnychodnikprzybyćochronabagażnikmotocyklprzepłynąćwyprzedzićciężarówkaza granicąfurgonetka

Favorite ways to travel 2023-06-12

Favorite ways to travel crossword puzzle
Across
  1. exploring
  2. safety
  3. compartment
  4. airfield
  5. shadier
  6. confined
  7. drawbacks
  8. indefinitely
Down
  1. premium
  2. elegant
  3. choice
  4. advantages
  5. opulence
  6. journey
  7. dreadful

15 Clues: choicesafetypremiumelegantjourneyshadieropulencedreadfulairfieldconfinedexploringdrawbacksadvantagescompartmentindefinitely

Spanish Review 2016-02-16

Spanish Review crossword puzzle
Across
  1. una silla
  2. madrugada
  3. una calculadora
  4. camisa
  5. una tiza
  6. una rega
  7. calcetines
  8. un lapiz
  9. estudio
  10. la gorra
Down
  1. una computadora
  2. avion
  3. entender
  4. seguridad
  5. una mochhlia
  6. un libro
  7. una mesa
  8. pantalones cortos
  9. quince
  10. dibujar

20 Clues: avioncamisaquinceestudiodibujarentenderun librouna mesauna tizauna regaun lapizla gorrauna sillamadrugadaseguridadcalcetinesuna mochhliauna computadorauna calculadorapantalones cortos

Politica 2018-03-04

Politica crossword puzzle
Across
  1. economia
  2. paz
  3. Campaña
  4. estrategia
  5. presidente
  6. seguridad
  7. gobierno
  8. libertad
  9. líder
  10. argumento
  11. impuesto
Down
  1. inversión
  2. crimen
  3. sociedad
  4. consejo
  5. opinión
  6. nacional
  7. guerra
  8. seguridad
  9. ejército
  10. demanda
  11. progreso
  12. deuda
  13. tribunal
  14. votación
  15. ley

26 Clues: pazleydeudalídercrimenguerraconsejoopinióndemandaCampañaeconomiasociedadnacionalejércitoprogresotribunalgobiernovotaciónlibertadimpuestoinversiónseguridadseguridadargumentoestrategiapresidente

Student Vocab Crossword puzzle 2023-04-26

Student Vocab Crossword puzzle crossword puzzle
Across
  1. towalk
  2. trick
  3. bomb
  4. candy
  5. door
  6. image
  7. weather
  8. hotel
  9. simple
  10. plane
  11. bathingsuit
  12. clothingstore
  13. skier
  14. airport
Down
  1. security
  2. waterbottle
  3. tofly
  4. gum
  5. cliffjump
  6. turtle
  7. avacado
  8. energy
  9. perchance
  10. baggage
  11. boat

25 Clues: gumbombdoorboattoflytrickcandyimagehotelplaneskiertowalkturtleenergysimpleavacadobaggageweatherairportsecuritycliffjumpperchancewaterbottlebathingsuitclothingstore

Student Vocab Crossword puzzle 2023-04-26

Student Vocab Crossword puzzle crossword puzzle
Across
  1. towalk
  2. trick
  3. bomb
  4. candy
  5. door
  6. image
  7. weather
  8. hotel
  9. simple
  10. plane
  11. bathingsuit
  12. clothingstore
  13. skier
  14. airport
Down
  1. security
  2. waterbottle
  3. tofly
  4. gum
  5. cliffjump
  6. turtle
  7. avacado
  8. energy
  9. perchance
  10. baggage
  11. boat

25 Clues: gumbombdoorboattoflytrickcandyimagehotelplaneskiertowalkturtleenergysimpleavacadobaggageweatherairportsecuritycliffjumpperchancewaterbottlebathingsuitclothingstore

Student Vocab Crossword puzzle 2023-04-26

Student Vocab Crossword puzzle crossword puzzle
Across
  1. towalk
  2. trick
  3. bomb
  4. candy
  5. door
  6. image
  7. weather
  8. hotel
  9. simple
  10. plane
  11. bathingsuit
  12. clothingstore
  13. skier
  14. airport
Down
  1. security
  2. waterbottle
  3. tofly
  4. gum
  5. cliffjump
  6. turtle
  7. avacado
  8. energy
  9. perchance
  10. baggage
  11. boat

25 Clues: gumbombdoorboattoflytrickcandyimagehotelplaneskiertowalkturtleenergysimpleavacadobaggageweatherairportsecuritycliffjumpperchancewaterbottlebathingsuitclothingstore

Prefix Crossword - Grade 8 Language Worksheet 2023-11-06

Prefix Crossword - Grade 8 Language Worksheet crossword puzzle
Across
  1. behaviour
  2. probability
  3. comfort
  4. convenience
  5. honesty
  6. advantage
  7. similar
  8. truth
  9. even
  10. approve
  11. regular
Down
  1. possible
  2. behave
  3. do
  4. natural
  5. maturity
  6. legible
  7. agree
  8. expensive
  9. mortality
  10. security
  11. relevant
  12. connect
  13. wind
  14. pack

25 Clues: dowindpackevenagreetruthbehavenaturallegiblecomforthonestysimilarconnectapproveregularpossiblematuritysecurityrelevantbehaviourexpensivemortalityadvantageprobabilityconvenience

vocabulary unit 11 2024-02-26

vocabulary unit 11 crossword puzzle
Across
  1. rule
  2. safety
  3. landslide
  4. silly
  5. to order
  6. visible
  7. tyrant
  8. sharp
  9. moveable
Down
  1. guide
  2. neighborhood
  3. request
  4. snuggle
  5. choosy
  6. to make sure
  7. sensible

16 Clues: ruleguidesillysharpsafetychoosytyrantrequestsnugglevisibleto ordersensiblemoveablelandslideneighborhoodto make sure

crossword puzzle 2021-05-20

crossword puzzle crossword puzzle
Across
  1. cyber hub is located in
  2. tourism provides changes which causes
  3. teet ka achar is a pickle made from which tree?
  4. women cover their head by
Down
  1. traditional headgear worn by men
  2. old custom of people which is still followed
  3. famous epic mahabharata was written in this state
  4. cultural tourism may effect
  5. famous bird santuary is located in

9 Clues: cyber hub is located inwomen cover their head bycultural tourism may effecttraditional headgear worn by menfamous bird santuary is located intourism provides changes which causesold custom of people which is still followedteet ka achar is a pickle made from which tree?famous epic mahabharata was written in this state

F.P.S digital realities 2023-05-09

F.P.S digital realities crossword puzzle
Across
  1. mix of all online realities
  2. response from and computer application
  3. a virtual model of the users body in VR
  4. a system or environment
Down
  1. mix of two or more elements
  2. nausea or sickness from VR
  3. Extra devices eg headset monster etc.
  4. using game play to help an activity
  5. using a device without your hands

9 Clues: a system or environmentnausea or sickness from VRmix of two or more elementsmix of all online realitiesusing a device without your handsusing game play to help an activityExtra devices eg headset monster etc.response from and computer applicationa virtual model of the users body in VR

F.P.S digital realities 2023-05-09

F.P.S digital realities crossword puzzle
Across
  1. mix of all online realities
  2. response from and computer application
  3. a virtual model of the users body in VR
  4. a system or environment
Down
  1. mix of two or more elements
  2. nausea or sickness from VR
  3. Extra devices eg headset monster etc.
  4. using game play to help an activity
  5. using a device without your hands

9 Clues: a system or environmentnausea or sickness from VRmix of two or more elementsmix of all online realitiesusing a device without your handsusing game play to help an activityExtra devices eg headset monster etc.response from and computer applicationa virtual model of the users body in VR

Engagement Crossword One 2025-11-04

Engagement Crossword One crossword puzzle
Across
  1. Who speaks fluent French?
  2. Who is a football coach?
  3. Who has had two postings in MoD?
  4. Who is on the DDaT/Cyber scheme?
Down
  1. Who does a strategic planning and performance role?
  2. Who is based in the Midlands?
  3. Who currently works in DEFRA?
  4. Who has a desire to learn?
  5. Who used to work in private office?

9 Clues: Who is a football coach?Who speaks fluent French?Who has a desire to learn?Who is based in the Midlands?Who currently works in DEFRA?Who has had two postings in MoD?Who is on the DDaT/Cyber scheme?Who used to work in private office?Who does a strategic planning and performance role?

Professions 2026-01-01

Professions crossword puzzle
Across
  1. Tentara
  2. Polisi
  3. Perawat
  4. Pilot
  5. Kepala Sekolah
  6. Teknisi/Insinyur
  7. Satpam
Down
  1. Supir
  2. Pegawai Kantor
  3. Dokter
  4. Guru
  5. Pedagang
  6. Petugas Kebersihan
  7. Petani
  8. Koki
  9. Murid

16 Clues: GuruKokiSupirPilotMuridDokterPolisiPetaniSatpamTentaraPerawatPedagangPegawai KantorKepala SekolahTeknisi/InsinyurPetugas Kebersihan

pretty cute and smart 2025-02-19

pretty cute and smart crossword puzzle
Across
  1. wary
  2. kind
  3. magnetic pull
  4. truth
  5. finish
  6. amie
  7. harsh
  8. study
  9. pastor
  10. hot out
  11. sponge
Down
  1. sing loudly
  2. doorway
  3. risky
  4. people who protect you
  5. another person
  6. drunk
  7. best friends forever
  8. %

19 Clues: %warykindamieriskytruthharshdrunkstudyfinishpastorspongedoorwayhot outsing loudlymagnetic pullanother personbest friends foreverpeople who protect you

JOBS 2022-04-13

JOBS crossword puzzle
Across
  1. imbianchino
  2. poliziotto
  3. idraulico
  4. parrucchiera
  5. cuoco
  6. pasticciere
  7. giardiniere
  8. muratore
Down
  1. pescatore
  2. fotografo
  3. gommista
  4. guardia di sicurezza
  5. meccanico
  6. pilota
  7. postino
  8. barbiere
  9. elettricista

17 Clues: cuocopilotapostinogommistabarbieremuratorepescatorefotografomeccanicoidraulicopoliziottoimbianchinopasticcieregiardiniereparrucchieraelettricistaguardia di sicurezza

Vocabulario 2017-12-03

Vocabulario crossword puzzle
Across
  1. suitcase
  2. son
  3. aisle
  4. to board
  5. luggage
  6. ticket
Down
  1. cousins
  2. flight
  3. airplane
  4. customs
  5. arrival
  6. security
  7. chess
  8. seat
  9. grandson

15 Clues: sonseataislechessflightticketcousinscustomsarrivalluggageairplanesuitcasesecurityto boardgrandson

Profiles 2 text 1 Sandra 2014-12-03

Profiles 2 text 1 Sandra crossword puzzle
Across
  1. varata
  2. liioitella
  3. milloin tahansa
  4. toimittaa
  5. kilpailu
  6. aurinkovoide
  7. esine
  8. elinaika
Down
  1. vastakkainen
  2. matkatavarat
  3. lomakeskus
  4. ulkomailla
  5. varaus
  6. hyttynen
  7. turvallisuus

15 Clues: esinevaratavaraushyttynenkilpailuelinaikatoimittaalomakeskusulkomaillaliioitellavastakkainenmatkatavarataurinkovoideturvallisuusmilloin tahansa

ena2 3-3.1 2025-02-25

ena2 3-3.1 crossword puzzle
Across
  1. ilahtunut
  2. puolestapuhuja
  3. rauha
  4. tasa-arvo
  5. vuosittainen
  6. omistautuminen
  7. viihde
  8. turvallisuus
  9. kiusaaminen
Down
  1. vähäosainen
  2. juhla
  3. delegaatti
  4. muistojuhla
  5. rahat
  6. vuosipäivä

15 Clues: juhlarauharahatviihdeilahtunuttasa-arvodelegaattivuosipäivävähäosainenmuistojuhlakiusaaminenvuosittainenturvallisuuspuolestapuhujaomistautuminen

INFORMATIKA X TKJ 2024-05-07

INFORMATIKA X TKJ crossword puzzle
Across
  1. Kode G pada RGB
  2. digunakan untuk menghasilkan salinan data dari komputer adalah
  3. Salah satu jenis serangan cyber yang mengunci data?
  4. Angka yang terdiri dari 0 dan 1
  5. Perangkat keras yang berfungsi sebagai otak komputer?
  6. Software Berbahaya
  7. Keamanan Jaringan
  8. Perangkat keras yang bertanggung jawab untuk mengirimkan data antara komputer dan jaringan
Down
  1. Mengarahkan/mengatur Paket Data
  2. Sistem operasi yang dikembangkan oleh Microsoft
  3. Titik-titik kecil yang membentuk gambar digital
  4. Format file untuk gambar dengan latar belakang transparan
  5. Perangkat keras yang digunakan untuk memasukkan data ke dalam komputer
  6. Perubahan bertahap antara dua warna atau lebih
  7. jenis huruf yang memiliki dekorasi tambahan di ujung-ujungnya
  8. Hypertext Markup Language
  9. Perangkat lunak untuk mengelola basis data
  10. penyimpanan data yang bersifat permanen?
  11. Kode C pada CMYK
  12. Uniform Resource Locator

20 Clues: Kode G pada RGBKode C pada CMYKKeamanan JaringanSoftware BerbahayaUniform Resource LocatorHypertext Markup LanguageMengarahkan/mengatur Paket DataAngka yang terdiri dari 0 dan 1penyimpanan data yang bersifat permanen?Perangkat lunak untuk mengelola basis dataPerubahan bertahap antara dua warna atau lebih...

OL 4, Unit 4, Station 2 2025-05-07

OL 4, Unit 4, Station 2 crossword puzzle
Across
  1. geben, existieren
  2. seit
  3. Konto
  4. begrüßen
  5. trendsetzend
  6. Foto
  7. befreunden
  8. online stellen
  9. verdienen
  10. Smartphone
  11. beeinflussen
  12. Seite (im Internet)
  13. Post
  14. Kommentar
  15. modisch, trendy
  16. einige, mehrere
  17. Innovation, Neuheit
  18. seit, seitdem
  19. veraltet
  20. äußerst, sehr
  21. eigentlich, grundsätzlich
  22. täglich
  23. Status
  24. Link
  25. Follower
  26. Clip; Ausschnitt
Down
  1. altmodisch
  2. kommunizieren
  3. Veganismus
  4. soziale Medien
  5. Jumping Fitness
  6. Lieblings-
  7. updaten
  8. Anfrage
  9. abonnieren
  10. Trend, Entwicklung
  11. Selfie
  12. mobil, tragbar
  13. Tonne
  14. zerissen
  15. nicht mögen
  16. streamen
  17. Karte, Plan
  18. entfreunden
  19. Blogger
  20. Einfluss, Auswirkung
  21. Computerspiele-
  22. Cyber-Mobbing
  23. sofort, gleich
  24. die Hälfte

50 Clues: seitFotoPostLinkKontoTonneSelfieStatusupdatenAnfrageBloggertäglichbegrüßenzerissenstreamenveraltetFollowerverdienenKommentaraltmodischVeganismusLieblings-abonnierenbefreundenSmartphonedie Hälftenicht mögenKarte, Planentfreundentrendsetzendbeeinflussenkommunizierenseit, seitdemCyber-Mobbingäußerst, sehrsoziale Medienonline stellenmobil, tragbar...

Quiz #5 Insurance on Property 2024-11-14

Quiz #5 Insurance on Property crossword puzzle
Across
  1. These fluctuate for seasonal stock.
  2. This is has a potential severity that is too high.
  3. This type of water is excluded.
  4. Peak
  5. Property on its way to a different location.
  6. What insurers impose to encourage insurance to full value.
  7. Coverage for boiler and machinery.
  8. ______ locations
Down
  1. Vice
  2. Combined limits for multiple locations.
  3. These risks can be caused by viruses and worms.
  4. Is it RC or ACV?
  5. This is a type of property excluded along with autos, money, ...
  6. Acronym for building and contents together.
  7. This loss to inventory is not covered.
  8. This is found on the dec sheet by the property insured.
  9. This can be purchased to increase limits.
  10. Not covered.
  11. Perils
  12. Code Upgrades can be found in these municipal rules.

20 Clues: VicePeakPerilsNot covered.Is it RC or ACV?______ locationsThis type of water is excluded.Coverage for boiler and machinery.These fluctuate for seasonal stock.This loss to inventory is not covered.Combined limits for multiple locations.This can be purchased to increase limits.Acronym for building and contents together....

NATO Crossword 2023-08-04

NATO Crossword crossword puzzle
Across
  1. This ability enables Allied forces and equipment from different countries to work together
  2. This is the section of NATO's founding treaty that explains how new members can join
  3. The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
  4. PermReps sit on the NAC, or North Atlantic ___
  5. Allies contribute money to fund NATO programs. This is known as ___ funding.
  6. This is one of NATO's closest partners, and its headquarters are right downtown
  7. NATO Air Base Geilenkirchen, Germany is home to 14 of these aircraft, known as NATO's eyes in the sky
  8. US General Christopher Cavoli currently holds this position, the second-highest military position within NATO
  9. This country is an official Invitee, but not yet a member
  10. NATO's current Secretary General is from this country
  11. Last month's NATO Summit took place in this city
  12. Allies pledged to devote this much of their GDP to defense spending
  13. This kind of threat typically does not involve violence, but can include disinformation, interference in politics, and cyber operations
Down
  1. The principle that if one Ally is attacked, all Allies are attacked, is known as ___ defense
  2. He was the first SACEUR, and was later the 34th President of the United States
  3. Countries that wish to join NATO usually, but not always, have a MAP, or Membership ___ Plan
  4. The length statement released at NATO Summits is often called this
  5. This Italian city is home to a NATO military command
  6. NATO's largest partnership group is the Partnership for ___
  7. NATO's maritime security operation in the Mediterranean is called Operation Sea ___
  8. NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
  9. NATO's military headquarters in Mons, Belgium
  10. NATO has led a peace support operation in this country since June 1999
  11. NATO's full name is the North ___ Treaty Organization
  12. This Virginia city is home to Allied Command Transformation (ACT)
  13. All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.

26 Clues: NATO's military headquarters in Mons, BelgiumPermReps sit on the NAC, or North Atlantic ___Last month's NATO Summit took place in this cityThis Italian city is home to a NATO military commandNATO's current Secretary General is from this countryNATO's full name is the North ___ Treaty Organization...

DTI Chapters 5–8 2026-03-06

DTI Chapters 5–8 crossword puzzle
Across
  1. AI field that allows computers to understand human language
  2. Process of removing errors or inconsistencies from data
  3. Analysis that explains what happened in the past
  4. Communication between machines without human intervention
  5. Observing systems continuously to collect real-time information
  6. Technology that converts spoken words into digital commands
  7. Ability of systems to perform tasks with minimal waste
  8. Protection of personal or sensitive data from unauthorized access
  9. Presenting data using charts or graphical representations
  10. Computer system that imitates the decision-making of human experts
  11. Concept connecting people, processes, data and things together
  12. Challenge arising from managing many interconnected devices
  13. Field of computing focused on creating intelligent machines
  14. Method of sending digital messages across networks
  15. Software used to access and view websites
  16. Analysis that explains why something happened
  17. Device used to detect environmental changes or physical conditions
  18. Professional who interprets data and produces meaningful reports
  19. Process where systems operate with minimal human involvement
Down
  1. Human-readable name that corresponds to an IP address
  2. Unique numeric identifier assigned to each device on a network
  3. Analysis recommending the best actions to take
  4. Technology enabling computers to interpret images
  5. Extremely large datasets generated from digital systems
  6. Analysis that forecasts future outcomes based on data
  7. Business transactions conducted through the Internet
  8. System that translates domain names into IP addresses
  9. Global network that connects millions of computers worldwide
  10. Technology that allows voice communication through the Internet
  11. Vision of a future where everything is digitally interconnected
  12. Protocol used to transfer files over the Internet
  13. Process of analyzing raw data to generate insights
  14. Protection of systems and networks from cyber threats
  15. AI technique where systems learn patterns from data
  16. Branch of AI involving machines performing physical tasks
  17. Network of physical devices connected to the Internet
  18. Unique address used to locate a webpage on the Internet
  19. Markup language used to structure content on web pages
  20. Real-time typed conversation between users online
  21. Technology that identifies objects using radio frequency signals

40 Clues: Software used to access and view websitesAnalysis that explains why something happenedAnalysis recommending the best actions to takeAnalysis that explains what happened in the pastTechnology enabling computers to interpret imagesProtocol used to transfer files over the InternetReal-time typed conversation between users online...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET A Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

Praetorian 2020-07-01

Praetorian crossword puzzle
Across
  1. This tool graphs relationships in AD environments
  2. Our Friday retroactive meeting where we take a look at all of the exciting things we accomplished that week
  3. The open source tool that Diana uses to identify flaws in containers
  4. This AWS service sometimes allows you to fetch API credentials from instances
  5. Publicly known exploits and weaknesses often get designated one of these
  6. The protocol used in TLS to exchange keys
  7. Each services team's name starts with this
Down
  1. The cow in the Austin Office is covered with graphics from this song
  2. The reporting CLI tool that allows us to edit reports
  3. Praetorian's product that helps secure our client's software through continuous security analysis
  4. a governance model that helps evaluate cybersecurity practices, establish or improve a cybersecurity program, and inform your security roadmap and buying decisions
  5. Integrating security into the entirety of software's lifetime, from plan to monitor
  6. _SRF
  7. Carbonated yerba mate drink for all your energy needs
  8. New hires build these during their first week at Praetorian

15 Clues: _SRFThe protocol used in TLS to exchange keysEach services team's name starts with thisThis tool graphs relationships in AD environmentsThe reporting CLI tool that allows us to edit reportsCarbonated yerba mate drink for all your energy needsNew hires build these during their first week at Praetorian...

Occupations 2021-02-03

Occupations crossword puzzle
Across
  1. Students
  2. Songs
  3. hospital
  4. Security
  5. Tables and dishes
  6. Tools
  7. Cake
Down
  1. Tooth
  2. Trial
  3. Colors
  4. Wood
  5. Kitchen
  6. Fire
  7. Airplane
  8. Car

15 Clues: CarWoodFireCakeToothTrialSongsToolsColorsKitchenStudentshospitalSecurityAirplaneTables and dishes

Heathrow 2025-11-06

Heathrow crossword puzzle
Across
  1. tualett
  2. kõrvaklapid
  3. kõrvatropid
  4. sihtkoht
  5. ratastega kohver
  6. kohver
Down
  1. kaelapadi
  2. pardakaart
  3. rahakott
  4. väljumine, lahkumine
  5. pass
  6. pagas
  7. nimesilt
  8. seljakott
  9. turva

15 Clues: passpagasturvakohvertualettrahakottnimesiltsihtkohtkaelapadiseljakottpardakaartkõrvaklapidkõrvatropidratastega kohverväljumine, lahkumine

computer 2023-10-11

computer crossword puzzle
Across
  1. электронное письмо
  2. монитор
  3. флешка
  4. сеть
  5. искать информацию
  6. обмениваться
  7. компьютерная сеть
  8. сведения (информация)
Down
  1. сканер
  2. принтер
  3. ксерокс
  4. коврик для мыши
  5. мышка
  6. ноутбук
  7. безопасность
  8. клавиатура
  9. взламывать

17 Clues: сетьмышкасканерфлешкапринтерксероксноутбукмониторклавиатуравзламыватьбезопасностьобмениватьсяковрик для мышиискать информациюкомпьютерная сетьэлектронное письмосведения (информация)

Computer Article Crossword 2015-06-10

Computer Article Crossword crossword puzzle
Across
  1. Very important and possibly dangerous
  2. The month which the hack happened
  3. Far away from anything else
  4. The Chairman of the Senate Armed Services Committee
  5. Keeping people safe on the Internet
  6. Breaking into a secure area
  7. To put together information
  8. To break into a secure area on the internet
Down
  1. Stealing someone's personal details
  2. All over the world
  3. The abbreviation for The Office of Personnel Management
  4. One billion people have access to Facebook on.......
  5. The Name of Mark Zuckerberg's company
  6. The name of the new App Zuckerberg is releasing
  7. The ........ Intelligence Committee which released information about the cyber attack
  8. The Country blamed for the hacking of American databases
  9. The President of America

17 Clues: All over the worldThe President of AmericaFar away from anything elseBreaking into a secure areaTo put together informationThe month which the hack happenedStealing someone's personal detailsKeeping people safe on the InternetVery important and possibly dangerousThe Name of Mark Zuckerberg's companyTo break into a secure area on the internet...

ITG Quiz Lavinya&Lea 2022-06-29

ITG Quiz Lavinya&Lea crossword puzzle
Across
  1. mit was kann man Internetseiten erstellen?
  2. Mit was kann man Datien verringern?
  3. Nenne mir eins der Office Apps?
  4. Mit welcher Taste kann man die Groß-und Kleinschreibung anpassen?
  5. Was produzieren Windräder?
  6. Mit was tippt man Wörter?
  7. Durch was bekommt man Internet?
  8. Mit was bekommt man zugriff auf Onlineseiten
  9. mit welcher Taste trennt man Wörter?
Down
  1. Mit was kann man Prozesse abbrechen?
  2. Wie nennt man Mobbing im Internet?
  3. Was ist die Hauptplatine eines Computers?
  4. Was ist ein Anzeigegerät?
  5. Mit was kann man Handys laden wenn keine Steckdose in der nähe ist?
  6. Was bedeutet STRG?
  7. Welches Fach lehrt uns über Technologischen Grundlagen auf?
  8. Womit kann man Links auswählen/Kopieren?

17 Clues: Was bedeutet STRG?Was ist ein Anzeigegerät?Mit was tippt man Wörter?Was produzieren Windräder?Nenne mir eins der Office Apps?Durch was bekommt man Internet?Wie nennt man Mobbing im Internet?Mit was kann man Datien verringern?Mit was kann man Prozesse abbrechen?mit welcher Taste trennt man Wörter?Womit kann man Links auswählen/Kopieren?...

网络安全:过关斩将 2024-06-27

网络安全:过关斩将 crossword puzzle
Across
  1. Software that secretly monitors and collect user's' activities.
  2. Social media platform for sharing short videos
  3. A way to avoid internet addiction.
  4. Cyber scam using various methods to steal information.
  5. A program to protect your computer from viruses.
  6. False information spread online.
  7. Software used to navigate the internet.
  8. A potential privacy risk on the internet.
  9. Online harassment
Down
  1. Dishonest scheme to cheat.
  2. Dependence on a substance/activity.
  3. Registering one's presence at a location
  4. A password that is valid for only one login transaction
  5. State of being separated from others。
  6. Remote face-to-face communication.
  7. Important method to protect yourself online.
  8. An important way of protecting personal privacy.

17 Clues: Online harassmentDishonest scheme to cheat.False information spread online.A way to avoid internet addiction.Remote face-to-face communication.Dependence on a substance/activity.State of being separated from others。Software used to navigate the internet.Registering one's presence at a locationA potential privacy risk on the internet....

IC3 Lesson 30 Vocabulary 2015-05-18

IC3 Lesson 30 Vocabulary crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
  5. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
  1. Encrypts the information in an SSL Certificate
  2. Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
  3. Hackers using spyware to control your browser
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  6. A malicious program that records keystrokes
  7. Deciphers the information in an SSL Certificate
  8. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

Lesson 30 Vocabulary 2015-05-22

Lesson 30 Vocabulary crossword puzzle
Across
  1. A program that hackers use to capture IDs and passwords on a network.
  2. A malicious program that records keystrokes.
  3. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
  4. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Hackers using spyware to control your browser.
  7. security feature used for larger networks that controls computers from one point.
  8. installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  9. Encrypts the information in an SSL Certificate.
Down
  1. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  2. attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Deciphers the information in an SSL Certificate.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.security feature used for larger networks that controls computers from one point....

Theories of global politics 2021-03-24

Theories of global politics crossword puzzle
Across
  1. The word Immanuel Kant used to describe a situation of constant peace
  2. A theory of global politics which emphasises the importance of states cooperating with each other to achieve shared goals
  3. The idea that each state's security and prosperity is now linked to those of others
  4. Council The body within the United Nations with the authority to approve military action against other states
  5. The idea that there is no supreme power to police the global political system
  6. A term to describe realist concerns about security; in the effort to maximise one's own military strength, states encourage their rivals to do the same
Down
  1. Each state has sole power within its own border and no other state should attempt to intervene in their affairs
  2. City in France where the last major climate change agreement was signed.
  3. 46th President of the United States; re-entered the Paris Climate agreement
  4. A non-governmental oganisation concerned with protecting the environment
  5. An intergovernmental organisation concerned with encouraging a free market approach to economic development
  6. 45th President of the United States; withdrew from the Paris climate agreement
  7. A theory of global politics which emphasises each state's desire for power and security

13 Clues: The word Immanuel Kant used to describe a situation of constant peaceCity in France where the last major climate change agreement was signed.A non-governmental oganisation concerned with protecting the environment46th President of the United States; re-entered the Paris Climate agreement...

social media's lexical field 2023-03-24

social media's lexical field crossword puzzle
Across
  1. opinion people give on your activity
  2. personal place on website where you can post things
  3. when your senses are exposed to a lot of informations
  4. harassment online
  5. things that requires people's participation
  6. how much you think you are worth
  7. something you can't stop thinking about
Down
  1. something you're physically dependent on
  2. something that is bad for your health
  3. you're doing it when you post something
  4. when you're standing for something
  5. something that is disorted
  6. picture, video or test that you publish on your account

13 Clues: harassment onlinesomething that is disortedhow much you think you are worthwhen you're standing for somethingopinion people give on your activitysomething that is bad for your healthyou're doing it when you post somethingsomething you can't stop thinking aboutsomething you're physically dependent onthings that requires people's participation...

pedro crossword puzzle 2015-04-28

pedro crossword puzzle crossword puzzle
Across
  1. harmful attachment that latches unknowingly to your computer
  2. common place people cyber bullied
Down
  1. only taking a little of someone's work
  2. law to stop people from copying someone else's work
  3. copying word for word
  4. having manners online
  5. people being mean online
  6. a site anyone can edit or express opinion

8 Clues: copying word for wordhaving manners onlinepeople being mean onlinecommon place people cyber bulliedonly taking a little of someone's worka site anyone can edit or express opinionlaw to stop people from copying someone else's workharmful attachment that latches unknowingly to your computer

Encryption 2022-01-10

Encryption crossword puzzle
Across
  1. Decoding machine used at Bletchley Park during
  2. an algorithm for performing encryption and
  3. appear
  4. Type of analysis used to determine how often
Down
  1. Code used during WW1/2 comprising dots and dashes
  2. Organisation responsible for UK cyber defence
  3. Person responsible for the first substitution cipher
  4. an encryption method used by the ancient

8 Clues: appearan encryption method used by the ancientan algorithm for performing encryption andType of analysis used to determine how oftenOrganisation responsible for UK cyber defenceDecoding machine used at Bletchley Park duringCode used during WW1/2 comprising dots and dashesPerson responsible for the first substitution cipher

codi bullying crossword 2023-03-21

codi bullying crossword crossword puzzle
Across
  1. getting physically picked on everyday
  2. someone who stands around and watches someone getting bullied
  3. a sore from being punched or kicked
  4. some teases you verbally everyday
Down
  1. a type of psychological bullying
  2. someone who sees another person getting bullied
  3. getting picked on online everyday
  4. a type of physical bullying
  5. someone teases you and picks on you everyday

9 Clues: a type of physical bullyinga type of psychological bullyinggetting picked on online everydaysome teases you verbally everydaya sore from being punched or kickedgetting physically picked on everydaysomeone teases you and picks on you everydaysomeone who sees another person getting bulliedsomeone who stands around and watches someone getting bullied

Cyberbulling 2021-05-03

Cyberbulling crossword puzzle
Across
  1. a type of bulling other than verbal, cyber or social
  2. a service that provides help
  3. to mute someone on social media
  4. a place to communicate online
  5. someone who steals another identity
Down
  1. a person who wants to fit in
  2. someone who causes harm online
  3. wanting to be in control
  4. a person you can go to for support

9 Clues: wanting to be in controla person who wants to fit ina service that provides helpa place to communicate onlinesomeone who causes harm onlineto mute someone on social mediaa person you can go to for supportsomeone who steals another identitya type of bulling other than verbal, cyber or social

BNS Bulletin 2024-08-27

BNS Bulletin crossword puzzle
Across
  1. Decriminalized act in BNS, previously under Section 497 IPC
  2. Indian term for citizen used in BNS
  3. Colonial-era law replaced in BNS
  4. Crime explicitly defined in BNS, not in IPC
  5. Capital punishment retained in BNS
Down
  1. Number of sections in BNS
  2. The new code replacing IPC
  3. City where IPC was primarily drafted
  4. Digital crimes comprehensively covered in BNS

9 Clues: Number of sections in BNSThe new code replacing IPCColonial-era law replaced in BNSCapital punishment retained in BNSIndian term for citizen used in BNSCity where IPC was primarily draftedCrime explicitly defined in BNS, not in IPCDigital crimes comprehensively covered in BNSDecriminalized act in BNS, previously under Section 497 IPC

what do you know? 2021-05-04

what do you know? crossword puzzle
Across
  1. attacks physically, emotionally, or socially
  2. physical or emotional pain
  3. punching,kicking,spitting
  4. in intent to make fun of someone in a playful way
  5. being far away from everything/in your own space
  6. there is an intent to hurt or harm
  7. it happens more than once over a period of time
Down
  1. what percent of students report bullying
  2. name-calling threatening
  3. writing mean thing on Facebook, Instagram, or Twitter
  4. spreading rumors, excluding people from games and groups
  5. something happening over and over again
  6. response to feeling or an event
  7. moment getting hurt on accident once

14 Clues: name-calling threateningpunching,kicking,spittingphysical or emotional painresponse to feeling or an eventthere is an intent to hurt or harmmoment getting hurt on accident oncesomething happening over and over againwhat percent of students report bullyingattacks physically, emotionally, or sociallyit happens more than once over a period of time...

RU ITEC411 - Privacy 2023-10-16

RU ITEC411 - Privacy crossword puzzle
Across
  1. Matching The act of combining and comparing information from different databases, often using a common identifier like a social security number to match records.
  2. Specification The principle that data should be collected for specific, explicit, and legitimate purposes.
  3. Files a website stores on a visitor's computer to track user behavior.
  4. Information Any information relating to an individual person.
  5. Use The use of personal information for a purpose other than the one for which it was originally provided.
  6. Information Gathering The collection of personal information about a user without the user's knowledge.
  7. Minimization The practice of collecting only the data that is necessary for the stated purpose.
  8. Guidelines The guidelines of the Organization for Economic Co-operation and Development that serve as the basis for many privacy laws worldwide.
  9. The National Institute of Standards and Technology, which provides security and privacy standards and guidelines.
  10. Risks Potential threats to the confidentiality and security of personal information.
Down
  1. Information Practices A set of principles that guide the responsible handling of personal information.
  2. Data Protection Directive A comprehensive European Union directive governing data protection and privacy.
  3. Profiling The analysis of data to determine characteristics of people who are most likely to engage in a particular behavior.
  4. Measures Safeguards and controls put in place to protect personal information from unauthorized access or disclosure.
  5. The requirement to inform individuals about data collection practices, purposes, and policies.
  6. The voluntary agreement given by individuals for the collection and use of their personal information.
  7. Mining The process of searching and analyzing vast amounts of data to discover patterns and generate new information or knowledge.
  8. The Personal Information Protection and Electronic Documents Act, a Canadian privacy law.
  9. The principle of being responsible for ensuring the protection of personal information.
  10. Consent Users being aware of what information is collected and how it is used before giving permission.

20 Clues: Information Any information relating to an individual person.Files a website stores on a visitor's computer to track user behavior.Risks Potential threats to the confidentiality and security of personal information.The principle of being responsible for ensuring the protection of personal information....

Teka teki silang keamanan 2025-11-28

Teka teki silang keamanan crossword puzzle
Across
  1. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  2. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  5. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  6. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  7. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  8. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
  1. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  4. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  10. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  11. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  12. OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Information Security Awareness 2020-09-24

Information Security Awareness crossword puzzle
Across
  1. What is not allowed in a DNA password
  2. Best way to keep track of multiple unique passwords
  3. The data classification for Employee Handbook, internal phone directory
  4. This is better and harder to crack than a password
  5. How do you think most evil hackers begin to break into a company’s network?
  6. The best response to password Recovery Questions is
  7. Minimum number of characters for a network password
  8. What is the default data classification
  9. Who is responsible for data security
Down
  1. The type of email to get you to click on a fraudulent link
  2. Disclosing personal member information may be
  3. Someone that follows closely behind you without using their badge
  4. If I click on a link I believe was malicious I should
  5. This is better and harder to crack than a password
  6. How might someone evil try to get information from you

15 Clues: Who is responsible for data securityWhat is not allowed in a DNA passwordWhat is the default data classificationDisclosing personal member information may beThis is better and harder to crack than a passwordThis is better and harder to crack than a passwordBest way to keep track of multiple unique passwords...

March Security Crossword 2021-04-01

March Security Crossword crossword puzzle
Across
  1. Last name of WikiLeaks founder
  2. Founded in 1955, a global community of security practitioners
  3. The 4th step in the EDIP Technique Training cycle
  4. city straddling the River Avon in the southwest of England where Large riots have recently taken place
  5. The monitoring of behavior, activities, or information
  6. (5,3) an ethical computer hacker
  7. Japanese organised crime syndicate
Down
  1. Current UK national threat level
  2. Biggest threat to Cultural Venues & Prometheus' gift
  3. Created the color code & a brand of Mini
  4. "Effect of uncertainty on objectives" - ISO 31000
  5. a 3 pronged spear
  6. (5,4) High profile museum burglary in Dresden, Germany
  7. Famous Federal Penitentiary in San Francisco Bay

14 Clues: a 3 pronged spearLast name of WikiLeaks founderCurrent UK national threat level(5,3) an ethical computer hackerJapanese organised crime syndicateCreated the color code & a brand of MiniFamous Federal Penitentiary in San Francisco BayThe 4th step in the EDIP Technique Training cycle"Effect of uncertainty on objectives" - ISO 31000...

Security Officer Numbers 2023-01-11

Security Officer Numbers crossword puzzle
Across
  1. 112
  2. 101
  3. 100
  4. 102
  5. 130
  6. 106
  7. 112
  8. 125
  9. 103
Down
  1. 126
  2. 136
  3. 105
  4. 115
  5. 133
  6. 114

15 Clues: 112126136101105115133114100102130106112125103

DE TOPIC 1 2025-08-03

DE TOPIC 1 crossword puzzle
Across
  1. Integration of cyber-physical systems, IoT, AI and data analitics
  2. Focused on mass production and global market
  3. utilising software and digital and technologies
Down
  1. Focus on physical good and services
  2. Focused on sustainability and environment conservation
  3. Follow islamic principles and ethics
  4. Operates online
  5. Create positive societal impact

8 Clues: Operates onlineCreate positive societal impactFocus on physical good and servicesFollow islamic principles and ethicsFocused on mass production and global marketutilising software and digital and technologiesFocused on sustainability and environment conservationIntegration of cyber-physical systems, IoT, AI and data analitics

Spanish crossword 2020-04-10

Spanish crossword crossword puzzle
Across
  1. seat belt
  2. sleeping car
  3. visa
  4. in the train station
  5. connection
  6. passport
  7. to land
  8. coach
  9. aisle
  10. ticket
  11. stop
  12. to board
  13. security agent
  14. flight
  15. gate
  16. platform
  17. ticket window
  18. luggage screening
  19. second class
  20. to get or obtain
  21. to hope
  22. ticket
  23. car wagon
  24. baggage claim
  25. boarding pass
Down
  1. to go through security
  2. seat
  3. on time
  4. first class
  5. suitcase
  6. customs
  7. international airport
  8. window
  9. delayed
  10. mano carry-on baggage
  11. event ticket
  12. trip travel
  13. counter
  14. bunk
  15. to miss
  16. to see
  17. turn
  18. arrival
  19. flight attendent
  20. espera waiting room
  21. take off
  22. control
  23. passenger
  24. to check luggage
  25. to give
  26. layover

51 Clues: seatvisabunkstopturngatecoachaislewindowticketto seeflightticketon timecustomsto landdelayedcounterto missarrivalcontrolto giveto hopelayoversuitcasepassportto boardplatformtake offseat beltpassengercar wagonconnectionfirst classtrip travelsleeping carevent ticketsecond classticket windowbaggage claimboarding passsecurity agentflight attendent...

Security Terminology for Christian 2024-03-06

Security Terminology for Christian crossword puzzle
Across
  1. Network Interface Card
  2. the Bourne Again SHell
  3. Data Protection Officer
  4. Instant Messaging
  5. Domain Name System
  6. allows people to select the mobile devices they would like to use, typically from a limited number of options
  7. Chief Security Officer
  8. Layer 2 Tunneling Protocol
  9. Indicators of Compromise
  10. POST Office Protocol
  11. Personal Health Information
Down
  1. Network Attached Storage
  2. a type of challenge–response test used in computing to determine whether the user is human in order to deter bot attacks and spam
  3. being allowed to use one's personally owned device, rather than being required to use an officially provided device.
  4. Database Administrator
  5. Information Systems Security Officer
  6. Chief Information Officer
  7. Dynamic Link Library
  8. Personal Identification Number
  9. Chief Technology Officer
  10. Peer-to-Peer

21 Clues: Peer-to-PeerInstant MessagingDomain Name SystemDynamic Link LibraryPOST Office ProtocolNetwork Interface Cardthe Bourne Again SHellDatabase AdministratorChief Security OfficerData Protection OfficerNetwork Attached StorageIndicators of CompromiseChief Technology OfficerChief Information OfficerLayer 2 Tunneling ProtocolPersonal Health Information...

Information Security Management System (ISMS) 2014-03-14

Information Security Management System (ISMS) crossword puzzle
Across
  1. HR personnel is assigned to prepare access request for HRIS and ______.
  2. A default folder where essential corporate documents must be stored
  3. ____________is everyone's responsibility
  4. A secret word or phrase that are to be treated as sensitive, confidential information
Down
  1. Signifies that asset is highly confidential/critical
  2. A document that defines the accountability and responsibility of the Asset Owner (custodian) and records the status of the asset.
  3. He signed the Information Security Policy
  4. Is the official name of the repository of ISMS Policies, Standards, Procedures and Guidelines
  5. New program launched in relation to ISMS where updates of which are shown through comic strips.
  6. Strong password should be at least ____ characters long.
  7. Also known as a confidentiality agreement
  8. Information security events or incidents must immediately be reported to____________.
  9. Aspects of Information Security
  10. IT system used when requesting access or raising any IT requests
  11. Recommended action for paper and printed material containing confidential information prior to disposal

15 Clues: Aspects of Information Security____________is everyone's responsibilityHe signed the Information Security PolicyAlso known as a confidentiality agreementSignifies that asset is highly confidential/criticalStrong password should be at least ____ characters long.IT system used when requesting access or raising any IT requests...

FITE: Tech. Terms By:Maya Ausley 2013-05-16

FITE: Tech. Terms By:Maya Ausley crossword puzzle
Across
  1. type of mouse
  2. Example: Comcast
  3. 'WWW'___________
  4. behavior online
  5. a device that connects to a computer
  6. 32 id numbers
  7. short term storage
  8. Liquid Cristal Display
  9. Example: speakers
  10. where you plug in speakers/earbuds
  11. LCD stands for___________.
  12. without cables or wires
  13. tools, machinery, and other durable equipment
  14. largest amount of storage space possible
  15. long term storage
Down
  1. your safety online
  2. wired internet port
  3. the primary circuit board
  4. NCSA stands for___________.
  5. online
  6. the smallest storage size
  7. visual display unit
  8. where you put in a disc
  9. Example: Temple Run
  10. the programs and other operating information used by computers
  11. flash drive port
  12. wireless internet
  13. cloud based presentation maker with zooming features
  14. Example: google
  15. online storage

30 Clues: onlinetype of mouse32 id numbersonline storagebehavior onlineExample: googleExample: Comcast'WWW'___________flash drive portwireless internetExample: speakerslong term storageyour safety onlineshort term storagewired internet portvisual display unitExample: Temple RunLiquid Cristal Displaywhere you put in a discwithout cables or wires...

Supercoulafragolisticexpeouladotios crossword puzzle 2013-08-26

Supercoulafragolisticexpeouladotios crossword puzzle crossword puzzle
Across
  1. open your mouth wide for the nurse.
  2. water that is ultra pure!
  3. Violins, Basses, Violas, and Cellos.
  4. programs for managers I think...
  5. fruits and veggies. and other stuff.
  6. they make vents.
  7. so logical!
  8. Makes cars.
  9. I'm in cyberspace!
Down
  1. its quality entertainment!
  2. they make kindles.
  3. the make radars. not much else to explain.
  4. I can see your bones!
  5. the opposite of hardware.
  6. so much information!
  7. zip code doors and stuff.
  8. the former producer company of Minecraft.
  9. these graphics are amazing!
  10. the opposite of software.
  11. hey transport stuff.
  12. Helping the earth and environment!
  13. they make websites
  14. Where boats drop off there exporting items.
  15. kind of looks like a U.S.B port...
  16. No monkey business!
  17. Yahoo pages.

26 Clues: so logical!Makes cars.Yahoo pages.they make vents.they make kindles.they make websitesI'm in cyberspace!No monkey business!so much information!hey transport stuff.I can see your bones!the opposite of hardware.zip code doors and stuff.water that is ultra pure!the opposite of software.its quality entertainment!these graphics are amazing!...

OL 4, Unit 4, Station 2 2025-05-07

OL 4, Unit 4, Station 2 crossword puzzle
Across
  1. sofort, gleich
  2. abonnieren
  3. befreunden
  4. fitness Jumping Fitness
  5. täglich
  6. äußerst, sehr
  7. Veganismus
  8. kommunizieren
  9. Foto
  10. Einfluss, Auswirkung
  11. altmodisch
  12. Status
  13. veraltet
  14. Innovation, Neuheit
  15. Lieblings-
  16. Selfie
  17. Blogger
  18. begrüßen
  19. Konto
  20. trendsetzend
  21. einige, mehrere
Down
  1. beeinflussen
  2. Cyber-Mobbing
  3. verdienen
  4. seit, seitdem
  5. Kommentar
  6. Post
  7. eigentlich, grundsätzlich
  8. entfreunden
  9. Tonne
  10. Link
  11. Karte, Plan
  12. modisch, trendy
  13. Smartphone
  14. streamen
  15. Seite (im Internet)
  16. nicht mögen
  17. seit
  18. online stellen
  19. soziale Medien
  20. die Hälfte
  21. mobil, tragbar
  22. geben, existieren
  23. Trend, Entwicklung
  24. zerissen
  25. Anfrage
  26. updaten
  27. Computerspiele-
  28. Follower
  29. Clip; Ausschnitt

50 Clues: PostLinkFotoseitTonneKontoStatusSelfietäglichBloggerAnfrageupdatenstreamenveraltetzerissenbegrüßenFollowerverdienenKommentarabonnierenbefreundenVeganismusSmartphonealtmodischdie HälfteLieblings-entfreundenKarte, Plannicht mögenbeeinflussentrendsetzendCyber-Mobbingseit, seitdemäußerst, sehrkommunizierensofort, gleichonline stellensoziale Medien...

MOTIVATION 2023-04-22

MOTIVATION crossword puzzle
Across
  1. 21
  2. 22
  3. 13
  4. 16
  5. 7
  6. 14
  7. 18
  8. 25
  9. 17
  10. 12
  11. 11
  12. 8
  13. 19
  14. 9
Down
  1. 5
  2. 4
  3. 20
  4. 23
  5. 3
  6. 15
  7. 1
  8. 6
  9. 10
  10. 2
  11. 24

25 Clues: 54371628921202322131615141825171012111924

French Airport 2013-06-12

French Airport crossword puzzle
Across
  1. flight number
  2. airport
  3. international
  4. terminal
  5. boarding pass
  6. airplane
  7. passenger
  8. window
  9. suitcase
  10. corridor
Down
  1. counter
  2. airline
  3. gate
  4. flight
  5. lobby
  6. control security
  7. hand baggage
  8. to leave
  9. track
  10. passport
  11. to arrive
  12. ticket

22 Clues: gatelobbytrackflightwindowticketcounterairlineairportterminalto leavepassportairplanesuitcasecorridorto arrivepassengerhand baggageflight numberinternationalboarding passcontrol security

fish 2023-07-19

fish crossword puzzle
Across
  1. dfgh
  2. iuyj
  3. STORY 5
  4. lm
  5. hvbj
  6. hjbn
  7. ergh
  8. bv
  9. gthjh
  10. jn
  11. erg
  12. fgdw
Down
  1. gf
  2. dfg
  3. okl
  4. COMMONS oklm
  5. ihjbn
  6. ki8
  7. jokm
  8. hj
  9. dfg
  10. asd
  11. wsa
  12. qwer

24 Clues: gflmhjbvjndfgoklki8dfgasdwsaergdfghjokmiuyjhvbjhjbnerghqwerfgdwihjbngthjhSTORY 5COMMONS oklm

career 2019-01-19

career crossword puzzle
Across
  1. ช่างประปา
  2. นักสืบ
  3. guard ยามรักษาความปลอดภัย
  4. ช่างไฟ
  5. เสมียน
  6. นักบินอวกาศ
  7. ทหาร
  8. ช่างตัดผม
Down
  1. นักเขียน
  2. ช่างถ่ายรูป
  3. หมอฟัน
  4. พ่อครัว
  5. นักเรียน
  6. บรรณาธิการ
  7. doctor หมอตา

15 Clues: ทหารนักสืบช่างไฟหมอฟันเสมียนพ่อครัวนักเขียนนักเรียนช่างประปาช่างตัดผมบรรณาธิการช่างถ่ายรูปนักบินอวกาศdoctor หมอตาguard ยามรักษาความปลอดภัย

career 2019-01-19

career crossword puzzle
Across
  1. ช่างตัดผม
  2. ช่างประปา
  3. ทหาร
  4. หมอฟัน
  5. ช่างไฟ
  6. doctor หมอตา
  7. นักเขียน
  8. guard ยามรักษาความปลอดภัย
  9. พ่อครัว
Down
  1. บรรณาธิการ
  2. ช่างถ่ายรูป
  3. นักบินอวกาศ
  4. นักสืบ
  5. นักเรียน
  6. เสมียน

15 Clues: ทหารนักสืบหมอฟันช่างไฟเสมียนพ่อครัวนักเรียนนักเขียนช่างตัดผมช่างประปาบรรณาธิการช่างถ่ายรูปนักบินอวกาศdoctor หมอตาguard ยามรักษาความปลอดภัย

Block 2 & 4 - Common Words 2014-01-17

Block 2 & 4 - Common Words crossword puzzle
Across
  1. ugly
  2. last name
  3. compare
  4. sound
  5. filled, complete, drunk
  6. pronunciation
  7. ID
  8. how
Down
  1. guy
  2. old
  3. driver's license
  4. social security number
  5. born
  6. girl
  7. first name
  8. spell
  9. cost

17 Clues: IDguyoldhowuglyborngirlcostsoundspellcomparelast namefirst namepronunciationdriver's licensesocial security numberfilled, complete, drunk

Teka teki silang keamanan 2025-11-28

Teka teki silang keamanan crossword puzzle
Across
  1. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  2. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  5. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  6. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  7. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  8. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
  1. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  4. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  10. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  11. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  12. OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Teka teki silang keamanan 2025-11-28

Teka teki silang keamanan crossword puzzle
Across
  1. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  2. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  5. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  6. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  7. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  8. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
  1. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  4. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  10. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  11. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  12. OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

Managing User Security 2021-09-28

Managing User Security crossword puzzle
Across
  1. the two keys included are Authentication Service exchange and Ticket Granting Service exchange.
  2. essentially a database of the network resources and includes objects such as user and group accounts,computers,servers, and printers.
  3. a user can be granted additional rights to data beyond what is allowed by his or her assigned access level
  4. allows semi-independent systems to work together.
  5. the measurement and analysis of a biological feature.
  6. the point where false rejection rate and false acceptance rate are equal.
Down
  1. it’s based off “what you do” like a pattern or rhythm.
  2. all the areas that give a hacker access to a system.
  3. when biometric credentials are authorized on invalid characteristics.
  4. the process of validating a user.
  5. opposite action denying an authorized biometric credential.
  6. standard authentication protocol on all versions of Microsoft servers when using the Active Directory.
  7. user cycle through different roles.
  8. the process of reducing or eliminating vulnerabilities on a system.

14 Clues: the process of validating a user.user cycle through different roles.allows semi-independent systems to work together.all the areas that give a hacker access to a system.the measurement and analysis of a biological feature.it’s based off “what you do” like a pattern or rhythm.opposite action denying an authorized biometric credential....

Amazon Las 7 Security Part 2 2023-03-15

Amazon Las 7 Security Part 2 crossword puzzle
Across
  1. cleaners of the warehouse
  2. watches over the security team
  3. engineers of the warehouse
  4. the app we use to communicate with AA's
  5. who we report to for allied
  6. the master opener
Down
  1. who we report to for amazon
  2. maintenance of the building
  3. roving the buildings exterior
  4. the door security uses frequently
  5. tracking reports

11 Clues: tracking reportsthe master openercleaners of the warehouseengineers of the warehousewho we report to for amazonmaintenance of the buildingwho we report to for alliedroving the buildings exteriorwatches over the security teamthe door security uses frequentlythe app we use to communicate with AA's

Find The Parts of The School 2024-03-01

Find The Parts of The School crossword puzzle
Across
  1. Monitoring and Handling School Security
  2. Where students eat lunch
  3. For personal counseling
  4. For Supplies, equipment and materials
  5. A level of a building
  6. For Physical Education Classes
Down
  1. Where students go for helth-related issues
  2. For conducting experiments
  3. Including the principal's,vice principal's
  4. For school assemblies, performances, events
  5. For art classes and projets

11 Clues: A level of a buildingFor personal counselingWhere students eat lunchFor conducting experimentsFor art classes and projetsFor Physical Education ClassesFor Supplies, equipment and materialsMonitoring and Handling School SecurityWhere students go for helth-related issuesIncluding the principal's,vice principal's...

Klett 11.1 2025-11-11

Klett 11.1 crossword puzzle
Across
  1. abfahren, abfliegen
  2. Ankunft
  3. ausfüllen
  4. gültig
  5. Durchsuchung, Untersuchung
  6. Sicherheit, Sicherheitsvorkehrungen
  7. durchführen
Down
  1. Abreise, Abflug
  2. anmelden, verzollen
  3. Information, Auskunft
  4. ankommen
  5. Dokument, Papier
  6. zurückkommen, zurückkehren
  7. Reisepass
  8. Visum
  9. erreichen
  10. zurückkommen, zurückkehren
  11. Zoll
  12. Ausweispapier(e)
  13. Zoll

20 Clues: ZollZollVisumgültigAnkunftankommenausfüllenReisepasserreichendurchführenAbreise, AbflugDokument, PapierAusweispapier(e)anmelden, verzollenabfahren, abfliegenInformation, Auskunftzurückkommen, zurückkehrenzurückkommen, zurückkehrenDurchsuchung, UntersuchungSicherheit, Sicherheitsvorkehrungen

Social Security 2017-03-01

Social Security crossword puzzle
Across
  1. federal program that taxes workers to provide income support to the elderly.
  2. federal system of health insurance for those requiring financial assistance.
  3. aversion/ the extent to which individuals are willing to bear risk.
  4. percentage of workers retiring at a certain age.
  5. payment that lasts until the recipient's death.
Down
  1. of deceased worker or former worker is also entitled to benefits.
  2. workers continue working past the age of 65 and are available upon retirement. benefit increases end at age 70.
  3. rating/ charging a price for insurance that is a function of realized outco
  4. federal program of health insurance for persons 65 years of age or older.

9 Clues: payment that lasts until the recipient's death.percentage of workers retiring at a certain age.of deceased worker or former worker is also entitled to benefits.aversion/ the extent to which individuals are willing to bear risk.federal program of health insurance for persons 65 years of age or older....

network security 2022-10-31

network security crossword puzzle
Across
  1. a way of gaining sensitive information with influence
  2. convincing people you are a person known or from a well-known buisness who steal your information
  3. hacks installed without permition
  4. virus' that self replicate
  5. find and stops malware
  6. used to keep information secure
Down
  1. malware that attaches to certain file
  2. they examine data to block threats
  3. malware disguised as legitimate software

9 Clues: find and stops malwarevirus' that self replicateused to keep information securehacks installed without permitionthey examine data to block threatsmalware that attaches to certain filemalware disguised as legitimate softwarea way of gaining sensitive information with influence...

Internet security 2023-11-27

Internet security crossword puzzle
Across
  1. What is the term for software created to damage or alter computer data or operations?
  2. What term refers to computer criminals who use technology to commit various crimes?
  3. What is a program that runs automatically and can be used to perform various tasks called?
  4. What is the term for software that protects a computer against malware programs?
  5. What is the term for the action of gaining unauthorized access to an account or personal information through deception or manipulation?
  6. What is the term for the illegal copying and distribution of copyrighted software, information, music, and video files?
Down
  1. What type of program attaches itself to executable files or documents and spreads by infecting other files or programs on a computer?
  2. What is the term for cyber attacks that attempt to gain unauthorized access to a computer system?
  3. What is the process of making a copy of data from a computer onto an external storage device, such as an external hard drive?
  4. What type of internet crime involves sending fake emails or creating false websites to obtain personal or banking information?

10 Clues: What is the term for software that protects a computer against malware programs?What term refers to computer criminals who use technology to commit various crimes?What is the term for software created to damage or alter computer data or operations?What is a program that runs automatically and can be used to perform various tasks called?...

Computer Security 2023-09-21

Computer Security crossword puzzle
Across
  1. to set up for use
  2. websites and other online forms of communication used to share information
  3. a kind of malware that can copy itself from one device to another
  4. safe
Down
  1. to keep safe
  2. an email, text message, or link that tricks people into giving criminals personal information
  3. computer software that criminals use to get people's personal information or passwords
  4. programs used by a computer
  5. a kind of malware that infects computers; a virus usually arrives as an email attachment

9 Clues: safeto keep safeto set up for useprograms used by a computera kind of malware that can copy itself from one device to anotherwebsites and other online forms of communication used to share informationcomputer software that criminals use to get people's personal information or passwords...

Information Security 2020-07-08

Information Security crossword puzzle
Across
  1. when attackers use various methods/tricks to get
  2. actually purging the data; permanently losing the
  3. software used to prevent, detect, and remove malware
  4. testing to see if system vulnerabilities can be exploited in order to actually gain access to systems, the network, data and so forth; acts in a way that an attacker might act
  5. when someone gains entrance/access by
Down
  1. on the tailcoats of an authorized person
  2. information from unsuspecting persons
  3. used to perform authentication; a username,a certificate,or a token
  4. Identifying risks to understand the risks that we are exposed to

9 Clues: information from unsuspecting personswhen someone gains entrance/access byon the tailcoats of an authorized personwhen attackers use various methods/tricks to getactually purging the data; permanently losing thesoftware used to prevent, detect, and remove malwareIdentifying risks to understand the risks that we are exposed to...

Security Issues 2019-01-29

Security Issues crossword puzzle
Across
  1. Everything is backed up at once.
  2. In this type of backup, only two image files are required to restore the system!
  3. Faster backup time as only amended files need to be copied.
  4. A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
  1. Useful when backing up large amounts of data.
  2. Procedures or measures taken to ensure the safety of an organisation.
  3. This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
  4. This is information that is still important but it is not needed for immediate use.
  5. A very important element to a company/organisation!

9 Clues: Everything is backed up at once.Useful when backing up large amounts of data.A very important element to a company/organisation!Faster backup time as only amended files need to be copied.Procedures or measures taken to ensure the safety of an organisation.In this type of backup, only two image files are required to restore the system!...

Network Security 2024-05-12

Network Security crossword puzzle
Across
  1. Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  2. The process of protecting information or data by scrambling it so only those with the key can unscramble it
  3. A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
  4. A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
  5. A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
  1. An attack where a series of a computers repeatedly send requests to a server to overload a system
  2. The process of a user confirming that they are who they say they are on a computer system
  3. Trying to trick someone into giving out information over email
  4. A computer program that makes lots of copies of itself,

9 Clues: A computer program that makes lots of copies of itself,Trying to trick someone into giving out information over emailThe process of a user confirming that they are who they say they are on a computer systemAn attack where a series of a computers repeatedly send requests to a server to overload a system...

Security Terms 2023-03-27

Security Terms crossword puzzle
Across
  1. Seeking (BLANK) health treatment is a positive course of action and a key measure for suicide prevention.c
  2. CV record checks include (BLANK)
  3. (BLANK) is an important part of the DON PV Program.
  4. Head of the Navy Intelligence Community Elements (HICE
  5. After an individual has been “cleared,” they are continuously vetted using automated checks of (BLANK).
Down
  1. An insider threat may be (BLANK) if the insider is unaware that their actions or behaviors are exposing the United States to an elevated risk of harm or loss, perhaps through lack of training or negligence.
  2. CV record checks include (BLANK)
  3. personal are required to report security violations and changes to their personal status (e.g. marriage/divorce, arrests, delinquent debt, or foreign travel/contacts)
  4. CV record checks include (BLANK)
  5. CV record checks include (BLANK),
  6. CV record checks include (BLANK)
  7. Replacing DISS

12 Clues: Replacing DISSCV record checks include (BLANK)CV record checks include (BLANK)CV record checks include (BLANK)CV record checks include (BLANK)CV record checks include (BLANK),(BLANK) is an important part of the DON PV Program.Head of the Navy Intelligence Community Elements (HICE...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. Red fruit often mistaken for a vegetable
  2. Yellow fruit that monkeys love to eat
  3. Leafy green that made Popeye strong
  4. Round citrus fruit named after its color
  5. Small green vegetables that come in a pod
Down
  1. Green vegetable that looks like tiny trees
  2. Red berry with seeds on the outside
  3. Orange vegetable that helps you see in the dark
  4. Red fruit that keeps the doctor away

9 Clues: Red berry with seeds on the outsideLeafy green that made Popeye strongRed fruit that keeps the doctor awayYellow fruit that monkeys love to eatRed fruit often mistaken for a vegetableRound citrus fruit named after its colorSmall green vegetables that come in a podGreen vegetable that looks like tiny trees...

Kreuzwordrätsel 2016-05-17

Kreuzwordrätsel crossword puzzle
Across
  1. Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
  2. Je länger das Passwort, desto ...
  3. Schutz von Infos
  4. Schutz von personenbezogenen Daten
Down
  1. Werbegeschenke, die mit Schadsoftware versehen sind
  2. Beispiel eines Passwortmanagers
  3. Schutz von vertraulichen Daten in E-Mails
  4. Methode zu Passwortfindung
  5. Notebook vor fremden Blicken schützen
  6. Über E-Mails an sensible Daten gelangen
  7. Größtes Risiko bei Social Engineering
  8. Abk. Data Security Partner

12 Clues: Schutz von InfosMethode zu PasswortfindungAbk. Data Security PartnerBeispiel eines PasswortmanagersJe länger das Passwort, desto ...Schutz von personenbezogenen DatenNotebook vor fremden Blicken schützenGrößtes Risiko bei Social EngineeringÜber E-Mails an sensible Daten gelangenSchutz von vertraulichen Daten in E-Mails...

Kreuzworträtsel 2016-05-17

Kreuzworträtsel crossword puzzle
Across
  1. Über E-Mails sensible Daten gelangen
  2. Schutz von Vertrautlichkeit, Integrität und Verfügbarkeit
  3. Notebook vor fremden Blicken schützen
  4. Je länger das Passwort, desto ...
  5. Beispiel eines Passwortmanagers
  6. Schutz von personenbezogenen Daten
Down
  1. Schutz von Infos
  2. Größtes Risiko bei Social Engineering
  3. Werbegeschenke, die mit Schadsoftware versehen werden können
  4. Methode zur Passwortfindung
  5. Schutz von vertraulichen Daten in E-Mails
  6. Abk. Data Security Partner

12 Clues: Schutz von InfosAbk. Data Security PartnerMethode zur PasswortfindungBeispiel eines PasswortmanagersJe länger das Passwort, desto ...Schutz von personenbezogenen DatenÜber E-Mails sensible Daten gelangenGrößtes Risiko bei Social EngineeringNotebook vor fremden Blicken schützenSchutz von vertraulichen Daten in E-Mails...

Kreuzworträtsel 2016-05-10

Kreuzworträtsel crossword puzzle
Across
  1. Schutz von Infos
  2. Über E-Mails an sensible Daten gelangen
  3. Schutz von vertraulichen Daten in E-Mails
  4. Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
  5. Je länger das Passwort, desto ....
Down
  1. Werbegeschenke, die mit Schadsoftware versehen sind
  2. Größtes Risiko bei Social Engineering
  3. Methode zur Passwortfindung
  4. Schutz von personenbezogenen Daten
  5. Notebook vor fremden Blicken schützen
  6. Abk. Data Security Partner
  7. Beispiel eines Passwortmanagers

12 Clues: Schutz von InfosAbk. Data Security PartnerMethode zur PasswortfindungBeispiel eines PasswortmanagersSchutz von personenbezogenen DatenJe länger das Passwort, desto ....Größtes Risiko bei Social EngineeringNotebook vor fremden Blicken schützenÜber E-Mails an sensible Daten gelangenSchutz von vertraulichen Daten in E-Mails...

Words Unit 5 2017-05-06

Words Unit 5 crossword puzzle
Across
  1. Lohn
  2. Decke
  3. Angst
  4. passend
  5. Verbindung
  6. Verwandter
  7. Sicherheit
Down
  1. Kühlschrank
  2. Werkzeug
  3. Stockwerk
  4. jagen
  5. romantisch
  6. Herausforderung
  7. Wolkenkratzer

14 Clues: LohnjagenDeckeAngstpassendWerkzeugStockwerkromantischVerbindungVerwandterSicherheitKühlschrankWolkenkratzerHerausforderung

Data handling, Accountability, and Security 2023-11-22

Data handling, Accountability, and Security crossword puzzle
Across
  1. Adherence to regulations and standards.
  2. Plan for data breaches.
  3. Attempt to trick individuals for data.
  4. Regulating data accessibility.
Down
  1. Programs to educate staff on data security.
  2. Responsibility for data handling.
  3. Protection of sensitive information.
  4. Evaluation of data security measures.
  5. Moral principles guiding data handling.
  6. Clear communication about data practices.
  7. Guidelines for data handling.

11 Clues: Plan for data breaches.Guidelines for data handling.Regulating data accessibility.Responsibility for data handling.Protection of sensitive information.Evaluation of data security measures.Attempt to trick individuals for data.Moral principles guiding data handling.Adherence to regulations and standards.Clear communication about data practices....

POLITICS 2016-03-01

POLITICS crossword puzzle
Across
  1. : an attractive rather than coercive type of power
  2. : ASEAN observer (Acronym)
  3. : "city-state"
  4. : military or economic type of power
  5. : a subdiscipline of polisci that compares governments and political systems
  6. : Civil Society Organization
  7. : defense of the state and its citizens
  8. : International Relations
  9. : Politics as "master science"
Down
  1. : evolved as science and art
  2. : a qualitative approach that tries to find out what is best for the people
  3. : quantitative and descriptive approach approach
  4. : persons and institutions that make and enforce laws
  5. : the currency of politics
  6. : using laws to fairly judge and punish crimes and criminals
  7. : the act of influencing the government to do what you want
  8. : in charge of internal security
  9. : power of politicians and individuals to act out law
  10. : limitation and regulation
  11. : another term for "security"

20 Clues: : "city-state": International Relations: ASEAN observer (Acronym): the currency of politics: limitation and regulation: evolved as science and art: Civil Society Organization: another term for "security": Politics as "master science": in charge of internal security: military or economic type of power: defense of the state and its citizens...

Military Acronyms 2019-04-04

Military Acronyms crossword puzzle
Across
  1. Violation
  2. General Fund Enterprise Business System
  3. Marine Corps
  4. Cancelled
  5. Defense Enterprise Accounting and Management System
  6. Password
  7. Defense Cash Accountability System
  8. DFAS Automated Reporting & Tracking System
  9. Defense Travel System
  10. Accounts Receivable
  11. Standard Contract Reconciliation Tool
  12. Federal Employee Retirement System
  13. Army Material Command
  14. Accounts Payable
  15. Chief Financial Officer
  16. Voucher
  17. BRAC Transition Applications
Down
  1. Journal Voucher
  2. Commercial Invoice
  3. Air Force Space Command
  4. Line of Accounting
  5. Subject Matter Experts
  6. Naval Sea Systems Command
  7. Month to Date
  8. Electronic Signature
  9. Operational Security
  10. Department of Defense
  11. Defense Finance Accounting Services
  12. Disbursing Office
  13. General Schedule
  14. Year End
  15. Standard Operating Procedures
  16. Terminal Area Security Officer
  17. Rank
  18. Civilian
  19. Fiscal Year
  20. Unmatched Transaction

37 Clues: RankVoucherPasswordYear EndCivilianViolationCancelledFiscal YearMarine CorpsMonth to DateJournal VoucherGeneral ScheduleAccounts PayableDisbursing OfficeCommercial InvoiceLine of AccountingAccounts ReceivableElectronic SignatureOperational SecurityDepartment of DefenseDefense Travel SystemArmy Material CommandUnmatched Transaction...

Investing - Grace Lewis 2026-04-02

Investing - Grace Lewis crossword puzzle
Across
  1. rising “up” market
  2. Someone that buys and sells stocks
  3. Something an employer does to complement your pay.
  4. gained from giving a loan to the government
  5. Max amount a company can have
  6. Loan to the government or company
  7. Age to receive social security benefits
  8. Wide range of stocks
  9. Something that affects stock inside a company
  10. Multiple companies in multiple stocks
  11. A share of a company
Down
  1. Putting money into stocks in increments no matter the status of the stock
  2. Place to buy stocks
  3. A specific place to store money for a specific purpose
  4. Someone that own stocks
  5. Social security and Medicare together
  6. Payment to shareholders usually quarterly
  7. Something that affects a company’s stock from the outside
  8. decreasing“down” market
  9. Union workers, firemen, etc. receive this

20 Clues: rising “up” marketPlace to buy stocksWide range of stocksA share of a companySomeone that own stocksdecreasing“down” marketMax amount a company can haveLoan to the government or companySomeone that buys and sells stocksSocial security and Medicare togetherMultiple companies in multiple stocksAge to receive social security benefits...

Happy Memories 2023-02-16

Happy Memories crossword puzzle
Across
  1. twentythree
  2. five
  3. three
  4. seven
  5. twentyfour
  6. eleven
  7. sixteen
  8. seventeen
  9. six
  10. one
  11. four
  12. ten
  13. eighteen
  14. thirteen
  15. twentyfive
  16. fourteen
Down
  1. twenty
  2. twentyone
  3. nineteen
  4. fifteen
  5. twelve
  6. tw0
  7. twentytwo
  8. eight
  9. nine

25 Clues: tw0sixonetenfivefourninethreeseveneighttwentyeleventwelvefifteensixteennineteeneighteenthirteenfourteentwentyoneseventeentwentytwotwentyfourtwentyfivetwentythree

Unidad 2 Ciudadanía Digital y Conecta con Chile 2024-10-15

Unidad 2 Ciudadanía Digital y Conecta con Chile crossword puzzle
Across
  1. citizenship
  2. miles
  3. to promote
  4. it possesses
  5. wide
  6. fingerprint, footprint
  7. reliability
  8. two hundred
  9. five hundred
Down
  1. fifty
  2. long
  3. security
  4. narrow
  5. causes
  6. to improve, to better (verb)
  7. coasts
  8. role
  9. almost
  10. goals, objectives
  11. just (fair)

20 Clues: longrolewidefiftymilesnarrowcausescoastsalmostsecurityto promotecitizenshipreliabilitytwo hundredjust (fair)it possessesfive hundredgoals, objectivesfingerprint, footprintto improve, to better (verb)

War and Peacekeeping 2023-11-26

War and Peacekeeping crossword puzzle
Across
  1. What peacekeepers aim to achieve.
  2. Mission type often associated with the U.N.
  3. A nation helped by New Zealand's peacekeepers in 1999.
  4. Soldiers in digital battles.
  5. The opposite of peace.
  6. A mission to help a nation, often abbreviated.
  7. Something that is done to fix buildings and heal communities.
Down
  1. A nation known for its peacekeeping efforts, especially in the Pacific.
  2. Organisation often involved in peacekeeping.
  3. Headgear often worn by peacekeepers.
  4. They enforce law and order in a country.
  5. Large water bodies surrounding the Solomon Islands.
  6. Type of warfare conducted in cyberspace.
  7. Another word for conflict or battle.
  8. An act of helping or aiding.

15 Clues: The opposite of peace.Soldiers in digital battles.An act of helping or aiding.What peacekeepers aim to achieve.Headgear often worn by peacekeepers.Another word for conflict or battle.They enforce law and order in a country.Type of warfare conducted in cyberspace.Mission type often associated with the U.N.Organisation often involved in peacekeeping....

SCOTIA INFOALERTS!!! 2013-07-21

SCOTIA INFOALERTS!!! crossword puzzle
Across
  1. how many alert categories
  2. text back word used to end notification
  3. name one alert category
  4. accounts eligible
  5. where to register for alerts
  6. cancellation fee
Down
  1. way alerts can be received
  2. way alerts can be received
  3. does not apply to security alerts
  4. over___different alert types
  5. cost of enrollment
  6. where to register for alerts

12 Clues: cancellation feeaccounts eligiblecost of enrollmentname one alert categoryhow many alert categoriesway alerts can be receivedway alerts can be receivedover___different alert typeswhere to register for alertswhere to register for alertsdoes not apply to security alertstext back word used to end notification

Crossword 2025-11-02

Crossword crossword puzzle
Across
  1. A dishonest schemer: S______
  2. Multi-factor A_____________
  3. S______ settings
  4. Make a Strong P_______
  5. U_____ your devices and apps
Down
  1. Fake message scams: P_______
  2. Software that accesses devices: M______
  3. A copy of computer data: B_____
  4. Software that asks for payment: R_________
  5. P______ & Security

10 Clues: S______ settingsP______ & SecurityMake a Strong P_______Multi-factor A_____________Fake message scams: P_______A dishonest schemer: S______U_____ your devices and appsA copy of computer data: B_____Software that accesses devices: M______Software that asks for payment: R_________