cyber security Crossword Puzzles

Family 2024-01-10

Family crossword puzzle
Across
  1. Support
  2. Respect
  3. Preserves
  4. Understanding
  5. Social
  6. Love
  7. Environment
  8. Security
  9. Traditions
  10. Bases/foundations
  11. Face
  12. Core
Down
  1. Culture
  2. Build
  3. Identity
  4. Empathy
  5. Crucial
  6. Family
  7. Challenges
  8. Learn
  9. Provides
  10. Values
  11. Care
  12. Teaches
  13. Foster
  14. Grow

26 Clues: CareLoveGrowFaceCoreBuildLearnFamilyValuesSocialFosterCultureSupportEmpathyCrucialRespectTeachesIdentityProvidesSecurityPreservesChallengesTraditionsEnvironmentUnderstandingBases/foundations

German homework/crossword 2024-11-21

German homework/crossword crossword puzzle
Across
  1. - environment
  2. - to vault
  3. - to dive
  4. - answer
  5. - mood
  6. - Religion
  7. - to crawl
  8. - economy
  9. - to shake/jiggle
  10. - reason
  11. - to measure
Down
  1. - to deliver
  2. - justice, fairness
  3. - to hit
  4. - strenuous, exhausting
  5. - health
  6. - advantage
  7. - brain
  8. - to catch
  9. - safety, security

20 Clues: - mood- brain- health- answer- reason- to hit- economy- to dive- Religion- to crawl- to catch- to vault- advantage- to measure- environment- to deliver- safety, security- to shake/jiggle- justice, fairness- strenuous, exhausting

Test Your Risk Vocabulary 2021-09-01

Test Your Risk Vocabulary crossword puzzle
Across
  1. Vulnerability
  2. Strain
  3. Conscientiousness
  4. Guarantee
  5. Divergence
  6. Risk grading
  7. Protection
  8. Alertness
  9. Likelihood
  10. Extenuation
  11. Financial wealth
  12. Ratings Agency
  13. Adherence
  14. Average
  15. Debt instrument
Down
  1. Evaluation
  2. Oversight
  3. Supervisory
  4. Payment
  5. Precautionary
  6. Unpredictability
  7. Burden
  8. Deterioration
  9. Profits

24 Clues: StrainBurdenPaymentProfitsAverageOversightGuaranteeAlertnessAdherenceEvaluationDivergenceProtectionLikelihoodSupervisoryExtenuationRisk gradingVulnerabilityPrecautionaryDeteriorationRatings AgencyDebt instrumentUnpredictabilityFinancial wealthConscientiousness

Unit 2 - The Human Factor 2025-03-14

Unit 2 - The Human Factor crossword puzzle
Across
  1. A social engineering tactic where an attacker fabricates a story to obtain information.
  2. A set of rules that an organization follows to maintain security.
  3. False alarms or fake warnings designed to trick people into taking action.
  4. A documented series of steps to follow for security practices.
  5. Phishing attacks carried out via SMS text messages.
  6. Manipulating people into revealing confidential information.
  7. Unauthorized access to or manipulation of computer systems or networks.
  8. A cyberattack where fraudulent emails trick users into revealing sensitive data.
Down
  1. Malicious software designed to frighten users into downloading harmful programs.
  2. A tactic where an attacker manipulates a target into seeking their help, ultimately gaining access to sensitive information.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. A targeted phishing attack aimed at a specific individual or organization.
  5. The act of spying on someone’s screen or keyboard to obtain sensitive information.
  6. The act of searching through trash to find confidential information.
  7. A social engineering attack that lures victims with a tempting offer to steal their information.
  8. To reduce the impact or risk of a security threat.
  9. Abbreviation for gathering publicly available information to analyze a target.
  10. Phishing attacks conducted over voice calls.
  11. A phishing attack targeting high-profile executives or important individuals.

19 Clues: Phishing attacks conducted over voice calls.To reduce the impact or risk of a security threat.Phishing attacks carried out via SMS text messages.Manipulating people into revealing confidential information.A documented series of steps to follow for security practices.A set of rules that an organization follows to maintain security....

Crossword 2020-12-18

Crossword crossword puzzle
Across
  1. bow
  2. trapped
  3. main character
  4. prince
  5. flowers
  6. the best
  7. Guard
Down
  1. security
  2. endearment
  3. gossip
  4. competition
  5. queen
  6. Take over
  7. opponents
  8. royalty

15 Clues: bowqueenGuardgossipprincetrappedflowersroyaltysecuritythe bestTake overopponentsendearmentcompetitionmain character

Zoom Culture 2021-10-12

Zoom Culture crossword puzzle
Across
  1. medical
  2. security
  3. to cost
  4. to offer
  5. problems
  6. system
  7. function
  8. automatically
Down
  1. doctor
  2. electronic
  3. to visit
  4. social
  5. world
  6. house
  7. better

15 Clues: worldhousedoctorsocialsystembettermedicalto costto visitsecurityto offerproblemsfunctionelectronicautomatically

Information Security 2022-02-11

Information Security crossword puzzle
Across
  1. This filter blocks Java, so you may not be able to access Java content on websites.
  2. protection helps protect your local network from the Internet.
  3. The VPN client(s) on the local network can establish a PPTP VPN tunnel through the Router.
  4. This filter blocks cookies, which are data stored on your computer and used by websites when
  5. interact with them.
Down
  1. This filter blocks ActiveX, so you may not be able to access ActiveX content on websites.
  2. The VPN client(s) on the local network can establish an L2TP VPN tunnel through the Router.
  3. The VPN client(s) on the local network can establish an IPSec VPN tunnel through the Router.
  4. This filter blocks the use of Internet proxy servers.

9 Clues: interact with them.This filter blocks the use of Internet proxy servers.protection helps protect your local network from the Internet.This filter blocks Java, so you may not be able to access Java content on websites.This filter blocks ActiveX, so you may not be able to access ActiveX content on websites....

Security Crossword 2015-06-22

Security Crossword crossword puzzle
Across
  1. City sirens warn of this
  2. When the fire system sounds, do this
  3. highest temperature of the day
  4. These may save your life
  5. ...and report
Down
  1. Patrol Officers do this
  2. "Mr. Brown will not be in today"
  3. For an injury, call this team
  4. if you don't have a valid "BI", you get this

9 Clues: ...and reportPatrol Officers do thisCity sirens warn of thisThese may save your lifeFor an injury, call this teamhighest temperature of the day"Mr. Brown will not be in today"When the fire system sounds, do thisif you don't have a valid "BI", you get this

IT-Security 2020-03-25

IT-Security crossword puzzle
Across
  1. Überbegriff für verschiedene Typen von unerwünschten Programmen
  2. Forscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malware
  3. Eine Methode, über gefälschte Webseite, E-Mails und Kurznachrichten an persönliche Daten eines Internet-Benutzers zu gelangen und damit Identitätsdiebstahl zu begehen.
  4. braucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk
Down
  1. anderes Wort für Computerkriminalität bzw. Internetkriminalität
  2. Ist in einem scheinbar nützlichen Programm versteckt und kann z. B. Passwörter auslesen oder auf Daten im Netzwerk zugreifen und diese an den Auftrageber der Malware übermittteln.
  3. Sicherheitskopien
  4. kleine Textdateien, die Informationen über eine besuchte Webseite auf dem PC des Benutzers abspeichern
  5. unerwünschte Werbemails

9 Clues: Sicherheitskopienunerwünschte Werbemailsanderes Wort für Computerkriminalität bzw. InternetkriminalitätÜberbegriff für verschiedene Typen von unerwünschten ProgrammenForscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malwarebraucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk...

Security Crossword 2022-07-27

Security Crossword crossword puzzle
Across
  1. You find the Bomb Threat Checklist, and Extortion Checklist documents in here.
  2. Lock the branch entry/exit doors, relocking after each member leaves. Do not admit anyone into branch after close
  3. when transaction(s) are done within the same day over 10k.
  4. Alt+Shift+I
Down
  1. While opening branch you carry this through the branch while doing walk through.
  2. Certain duties require atleast 2 employees to do such example: Night drop and opening vault.
  3. You find the Robbery Checklist, Robbery Response, and Robbery witness documents in here.
  4. should inspect the branch exterior for signs of forced entry, suspicious vehicles or people
  5. a report you make if you are suspicious of any activity on member's account

9 Clues: Alt+Shift+Iwhen transaction(s) are done within the same day over 10k.a report you make if you are suspicious of any activity on member's accountYou find the Bomb Threat Checklist, and Extortion Checklist documents in here.While opening branch you carry this through the branch while doing walk through....

FOOD SECURITY 2024-10-17

FOOD SECURITY crossword puzzle
Across
  1. suffering from lacking proper nutrition
  2. - This happens when people do not have enough food to eat.
  3. words)the lack of access to clean water
  4. Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
Down
  1. - The type of farming that grows crops without chemicals.
  2. Most devastating famine that occurred in India was the FAMINE OF _____ in 1943.
  3. 281 million undernourished people live on this continent.
  4. - The practice of catching fish for food.
  5. - The storage place where food is kept to be sold or given.

9 Clues: suffering from lacking proper nutritionwords)the lack of access to clean water- The practice of catching fish for food.- The type of farming that grows crops without chemicals.281 million undernourished people live on this continent.- This happens when people do not have enough food to eat.- The storage place where food is kept to be sold or given....

Security Awareness 2024-10-03

Security Awareness crossword puzzle
Across
  1. A type of software that blocks unauthorized access to a network (9 letters)
  2. A secret word or phrase used to gain access to a system (8 letters)
  3. Software that detects and removes malware (10 letters)
  4. A fix to software that addresses a vulnerability or flaw (5 letters)
Down
  1. A program designed to damage or disrupt a computer (5 letters)
  2. The process of converting information into code to prevent unauthorized access (10 letters)
  3. A technique used to steal sensitive information by pretending to be a trustworthy source (8 letters)
  4. A security measure that requires two forms of verification to access an account (3 letters)
  5. Unsolicited or unwanted email, often used for scams (4 letters)

9 Clues: Software that detects and removes malware (10 letters)A program designed to damage or disrupt a computer (5 letters)Unsolicited or unwanted email, often used for scams (4 letters)A secret word or phrase used to gain access to a system (8 letters)A fix to software that addresses a vulnerability or flaw (5 letters)...

Food security 2024-11-28

Food security crossword puzzle
Across
  1. Aid provided to countries experiencing famine.
  2. The loss of food during production or distribution.
  3. The process of converting agricultural products into packaged food.
  4. Government-subsidized programs to provide basic food.
Down
  1. Crops specifically grown to combat hunger, like fortified rice.
  2. A farming system where trees are integrated with crops.
  3. A harmful practice of overusing soil nutrients.
  4. Farming that avoids deforestation.
  5. A disaster leading to the collapse of food production.

9 Clues: Farming that avoids deforestation.Aid provided to countries experiencing famine.A harmful practice of overusing soil nutrients.The loss of food during production or distribution.Government-subsidized programs to provide basic food.A disaster leading to the collapse of food production.A farming system where trees are integrated with crops....

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Poultry raised for eggs meat and feathers
  2. Small animal raised for meat and fur
  3. Animal raised for wool, meat and milk
  4. Large marsupial
Down
  1. Likes to chase mice
  2. Pollinator that plays a critical role in food production
  3. Has a trunk
  4. Flying mammal
  5. Man's best friend

9 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceSmall animal raised for meat and furAnimal raised for wool, meat and milkPoultry raised for eggs meat and feathersPollinator that plays a critical role in food production

Security Awareness 2025-12-22

Security Awareness crossword puzzle
Across
  1. keep it secret
  2. Physical security breach by skipping card readers.
  3. Alternate for Irrelevant Junk mail.
  4. Hardware that filters data packets through network.
Down
  1. Wireless technology in mobile phones.
  2. 7 letter word. I allow only humans and not robots by protecting sites and fake accounts.
  3. World's First Antivirus program.
  4. I will call & trick you by my speaking skills, emotionally touch your heart and take your personal information.
  5. An animal with no limbs but can crawl.

9 Clues: keep it secretWorld's First Antivirus program.Alternate for Irrelevant Junk mail.Wireless technology in mobile phones.An animal with no limbs but can crawl.Physical security breach by skipping card readers.Hardware that filters data packets through network.7 letter word. I allow only humans and not robots by protecting sites and fake accounts....

CIS Controls & Technicians 2024-05-14

CIS Controls & Technicians crossword puzzle
Across
  1. track and manage hardware devices
  2. protect the organization's info through measures such as encryption and access controls
  3. educate users on safe-handling of information
  4. regularly test the security controls by simulating attacks on systems and networks
  5. manage the security life cycle of acquired software
Down
  1. only authorized to be installed and executed
  2. continuously acquire, assess and take action
  3. defense of this is to control the installation, spread and execution of malicious code
  4. part of inventory and control of enterprise assets
  5. protect the organization's info, by developing and implementing an incident response capability
  6. test of security controls to ensure they are effective and updated as needed

11 Clues: track and manage hardware devicesonly authorized to be installed and executedcontinuously acquire, assess and take actioneducate users on safe-handling of informationpart of inventory and control of enterprise assetsmanage the security life cycle of acquired softwaretest of security controls to ensure they are effective and updated as needed...

E-safety 2020-10-15

E-safety crossword puzzle
Across
  1. how you feel
  2. what everyone uses to interact with people virtually
  3. how you may feel
  4. a mean person who hides behind a screen
Down
  1. what you need to do to keep you information safe
  2. who you could go to
  3. who you could tell
  4. dont make it your real name

8 Clues: how you feelhow you may feelwho you could tellwho you could go todont make it your real namea mean person who hides behind a screenwhat you need to do to keep you information safewhat everyone uses to interact with people virtually

Encryption 2022-01-10

Encryption crossword puzzle
Across
  1. Decoding machine used at Bletchley Park during
  2. an algorithm for performing encryption and
  3. appear
  4. Type of analysis used to determine how often
Down
  1. Code used during WW1/2 comprising dots and dashes
  2. Organisation responsible for UK cyber defence
  3. Person responsible for the first substitution cipher
  4. an encryption method used by the ancient

8 Clues: appearan encryption method used by the ancientan algorithm for performing encryption andType of analysis used to determine how oftenOrganisation responsible for UK cyber defenceDecoding machine used at Bletchley Park duringCode used during WW1/2 comprising dots and dashesPerson responsible for the first substitution cipher

BULLYING 2024-08-10

BULLYING crossword puzzle
Across
  1. bullying perundungan pada sosial media
  2. Orang yang meminta uang dengan disertai ancaman adalah
  3. kata bully berasal dari bahasa
  4. bullying dapat menyebabkan
Down
  1. tindakan yang membully disebut dengan
  2. bullying dalam bentuk perkataan disebut dengan
  3. Pembullyan dalam bentuk kekerasan, seperti menjambak, memukul, dan menendang adalah bentuk bullying
  4. perubahan suasana hati disebut dengan

8 Clues: bullying dapat menyebabkankata bully berasal dari bahasatindakan yang membully disebut denganperubahan suasana hati disebut denganbullying perundungan pada sosial mediabullying dalam bentuk perkataan disebut denganOrang yang meminta uang dengan disertai ancaman adalah...

Chapter 14: Taxes 2017-04-26

Chapter 14: Taxes crossword puzzle
Across
  1. (2) form used to pay taxes
  2. amounts subtracted from income
  3. (2) taxable income, property, good or service
  4. imported goods tax
  5. government income from taxes
  6. (2) tax paid upon purchasing a good or service
  7. spending levels can be adjusted
  8. tax payments before receiving pay
  9. pays for government programs and services
Down
  1. example: Social Security and Medicare
  2. programs you must qualify for to receive services
  3. (2) example: sales tax
  4. funds Medicare and Social Security

13 Clues: imported goods tax(2) example: sales tax(2) form used to pay taxesgovernment income from taxesamounts subtracted from incomespending levels can be adjustedtax payments before receiving payfunds Medicare and Social Securityexample: Social Security and Medicarepays for government programs and services(2) taxable income, property, good or service...

class puzzle 2023-08-28

class puzzle crossword puzzle
Across
  1. short for "malicious software" and covers threats such as viruses, worms, Trojanhorses, ransomware and the numerous other programs used by hackers to gainaccess to or damage sensitive information on a computer
  2. intent of doing harm
  3. gap or weakness which undermines an organization’s security efforts
  4. making sure a person is who they say they are
  5. rights an individual or organization has over information and how it is used
  6. procedure used to determine user privileges or access levels to the system
Down
  1. Virus macros which have been programmed to carry out malicious intent
  2. how information is protected
  3. information or data which can be accessed when needed
  4. state of being complete or uncorrupted
  5. calculated assessment of potential threats to an organization’s security
  6. network of computers and devices managed as a unit with the same proceduresand rules
  7. requirement of being private or secret

13 Clues: intent of doing harmhow information is protectedstate of being complete or uncorruptedrequirement of being private or secretmaking sure a person is who they say they areinformation or data which can be accessed when neededgap or weakness which undermines an organization’s security efforts...

Airport 2024-06-12

Airport crossword puzzle
Across
  1. Before security, put your __________ bag.
  2. To spend time looking at items in the airport shops, you_________.
  3. To give extra money for a heavy bag, you need to ______________.
  4. To make sure your shoes are secure, ______ your shoelaces.
  5. To go through security, you need to ______________ the scanner.
  6. If your baggage is too heavy, it is called ______________.
Down
  1. To arrive at the airport early so you don't ______________.
  2. To wait in line with other passengers, you need to ______________.
  3. To check the flight times, look at the ______________.
  4. Security staff might ____ you ____ for safety.

10 Clues: Before security, put your __________ bag.Security staff might ____ you ____ for safety.To check the flight times, look at the ______________.To make sure your shoes are secure, ______ your shoelaces.If your baggage is too heavy, it is called ______________.To arrive at the airport early so you don't ______________....

DevSecOps Crossword 2024-04-26

DevSecOps Crossword crossword puzzle
Across
  1. Continuous ..... is a development practice that requires team member to integrate code into repository at least once a day
  2. ..... Engineer enables the developer with automation and CI/CD pipeline
  3. Practices that emphasize security as code and everyone is responsible for security
  4. Activity or anything that does not add value
  5. The most popular Agile Framework
  6. One of the most popular DevSecOps orchestration tool
Down
  1. Simple,lightweight and loosely coupled architectural style
  2. Agile Methodology that introduces Continuous Integration
  3. White box security scan approach in DevSecOps pipeline
  4. Team to ensure service reliability, introduced by Google in 2003

10 Clues: The most popular Agile FrameworkActivity or anything that does not add valueOne of the most popular DevSecOps orchestration toolWhite box security scan approach in DevSecOps pipelineAgile Methodology that introduces Continuous IntegrationSimple,lightweight and loosely coupled architectural style...

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. a single significant act or a pattern of acts by one or more students
  2. intentional repeated feels proud
  3. using threats
  4. use of any electronic means to hurt someone
  5. excluding others from a group
  6. identity of the person who bullies can be kept secret.
Down
  1. sending pictures messages information using electronic devices
  2. accidental occasional feels remorse
  3. secrecy of internet encourages those who might not otherwise bull
  4. pointing out differences
  5. any physical contact that hurts a person
  6. name calling jokes offensive remarks

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Future of Sport 2025-08-21

Future of Sport crossword puzzle
Across
  1. Underground venue for 60-degree Wimbledon (7)
  2. Mechanical horses in volcano racing (5)
  3. What gravity becomes in 2050 tennis matches (4)
  4. Time-traveling referees work across these (7)
  5. Cristiano's six identical fashion moguls (6)
  6. Virtual boxer you can't actually touch (8)
Down
  1. Flying robots that join human footballers on the pitch (6)
  2. Brain-computer links for drone pilots (6)
  3. Ronaldo-Charlie's business speciality (7)
  4. Wearable flight device for cricket batsmen (7)
  5. Transparent beings in boxing rings (6)

11 Clues: Transparent beings in boxing rings (6)Mechanical horses in volcano racing (5)Brain-computer links for drone pilots (6)Ronaldo-Charlie's business speciality (7)Virtual boxer you can't actually touch (8)Cristiano's six identical fashion moguls (6)Underground venue for 60-degree Wimbledon (7)Time-traveling referees work across these (7)...

Cyber Safety 2020-08-21

Cyber Safety crossword puzzle
Across
  1. detects viruses and eliminates them before they get into you computer.
  2. software that is made to damage or gain unauthorized access to a computer
  3. folders within a cite which holds your information (username, password, etc.) about that website without taking other personal information.
Down
  1. a type of software that allows another user to have information about another computer using a hard drive.
  2. bad mails that a made for taking information about your passwords, credit card number, and especially to get into you bank account.
  3. system that blocks not wanted users and mails from getting your information.
  4. a sickness for a computer. When received one, you can’t get into your computer.
  5. junk mail that can also be called “unwanted mail”

8 Clues: junk mail that can also be called “unwanted mail”detects viruses and eliminates them before they get into you computer.software that is made to damage or gain unauthorized access to a computersystem that blocks not wanted users and mails from getting your information.a sickness for a computer. When received one, you can’t get into your computer....

cyber acoso 2021-04-06

cyber acoso crossword puzzle
Across
  1. hacer daño a alguien
  2. alguien hace algo que supera los limites
  3. alguien se mata
  4. intentar entender lo que alguien piensa y siente
  5. ser rudos tanto física como psicológicamente
Down
  1. un adulto intenta contactar un menor con intento sexual
  2. lo que tú piensas de ti
  3. pensar que no hay nadie a nuestro lado

8 Clues: alguien se matahacer daño a alguienlo que tú piensas de tipensar que no hay nadie a nuestro ladoalguien hace algo que supera los limitesser rudos tanto física como psicológicamenteintentar entender lo que alguien piensa y sienteun adulto intenta contactar un menor con intento sexual

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  2. ____Regulation works by utilising feedback
  3. according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
  1. wrote Code and Other Laws of Cyberspace
  2. cyber____
  3. digital___ is the productivity platform that some experts regard as the third industrial revolution
  4. Shawn Fanning created the____
  5. the conversion of analogue data into digital form

8 Clues: cyber____Shawn Fanning created the____wrote Code and Other Laws of Cyberspace____Regulation works by utilising feedbackthe conversion of analogue data into digital formdigital___ is the productivity platform that some experts regard as the third industrial revolution...

Cyber Safety 2022-02-02

Cyber Safety crossword puzzle
Across
  1. SHOT MESSAGE
  2. UNIQUE ADDRESS OF YOUR DEVICE
  3. SMALL TEXT FILES
  4. ATTACK ON INDIVIDUAL OR GROUP
Down
  1. FILE THAT STEAL OR INFECT
  2. HARASS ON INTERNET
  3. SOCIAL NETWORK FOR BUSINESS
  4. ATTACK THAT PREVENT LEGITIMATE USERS

8 Clues: SHOT MESSAGESMALL TEXT FILESHARASS ON INTERNETFILE THAT STEAL OR INFECTSOCIAL NETWORK FOR BUSINESSUNIQUE ADDRESS OF YOUR DEVICEATTACK ON INDIVIDUAL OR GROUPATTACK THAT PREVENT LEGITIMATE USERS

Cyber Safety 2021-09-16

Cyber Safety crossword puzzle
Across
  1. 123moveies.com
  2. Donald Trump Social Media
  3. Middle mother social media
  4. Scam
Down
  1. Social Media
  2. Social Media
  3. Clock
  4. Virus
  5. Market Fraud

9 Clues: ScamClockVirusSocial MediaSocial MediaMarket Fraud123moveies.comDonald Trump Social MediaMiddle mother social media

cyber safety 2019-09-26

cyber safety crossword puzzle
Across
  1. get off online identity theft stealing something
  2. URL www.pizza.com
  3. media instagram snapchat
Down
  1. information it belongs to your
  2. fish
  3. scam scam
  4. balance every once and awhile get off your phone
  5. flag feeling this feels wrong

8 Clues: fishscam scamURL www.pizza.commedia instagram snapchatinformation it belongs to yourflag feeling this feels wrongbalance every once and awhile get off your phoneget off online identity theft stealing something

CYBER BULLYING 2015-02-18

CYBER BULLYING crossword puzzle
Across
  1. Πώς ονομάζεται το άτομο που εκφοβίζεται ;
  2. Οι θύτες έχουν κακή ...
  3. Πώς ονομάζεται το άτομο που εκφοβίζει;
  4. Γίνεται ανάμεσα σε δύο ανθρώπους ...
Down
  1. Υπάρχει λεκτική και σωματική ...
  2. Διαταράσσεται η ... των εφήβων
  3. Κυκλοφορούν κακά ... βασιζόμενα στο θύμα
  4. Κυριαρχεί η ... στον εκφοβισμό

8 Clues: Οι θύτες έχουν κακή ...Διαταράσσεται η ... των εφήβωνΚυριαρχεί η ... στον εκφοβισμόΥπάρχει λεκτική και σωματική ...Γίνεται ανάμεσα σε δύο ανθρώπους ...Πώς ονομάζεται το άτομο που εκφοβίζει;Κυκλοφορούν κακά ... βασιζόμενα στο θύμαΠώς ονομάζεται το άτομο που εκφοβίζεται ;

CYBER CRIME 2022-10-10

CYBER CRIME crossword puzzle
Across
  1. a person who has committed a crime
  2. a technique used by hackers to redirect users to false websites without their knowledge.
  3. a verb meaning to gain unauthorized access into a computer system
  4. a horse malware
Down
  1. the process of proving that something is real
  2. a type of social engineering attack often used to steal user data
  3. intrusive software that is designed to damage and destroy computers
  4. an expression of intention to damage or to harm

8 Clues: a horse malwarea person who has committed a crimethe process of proving that something is realan expression of intention to damage or to harma type of social engineering attack often used to steal user dataa verb meaning to gain unauthorized access into a computer systemintrusive software that is designed to damage and destroy computers...

Cyber Crime 2024-05-29

Cyber Crime crossword puzzle
Across
  1. Pretending to be someone else for bad reasons
  2. Holding your information for money
  3. Pretending to be a real business
  4. = stealing something
  5. You need this on your devices
Down
  1. It can happen to your accounts
  2. to bother someone in a bad way
  3. = not legal

8 Clues: = not legal= stealing somethingYou need this on your devicesIt can happen to your accountsto bother someone in a bad wayPretending to be a real businessHolding your information for moneyPretending to be someone else for bad reasons

Cyber wellness 2023-02-01

Cyber wellness crossword puzzle
Across
  1. Tell an adult if someone is c___________ you
  2. do not leak your p_______ information
  3. R______ other peoples opinions when online
  4. be safe while your playing o_____
Down
  1. dont share your i__________
  2. never reveal your p______
  3. Dont tell random people your a______
  4. think before you p______ online

8 Clues: never reveal your p______dont share your i__________think before you p______ onlinebe safe while your playing o_____Dont tell random people your a______do not leak your p_______ informationR______ other peoples opinions when onlineTell an adult if someone is c___________ you

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. Repeatedly sending nasty, mean, and insulting messages.
  2. Online fights using electronic messages with angry and vulgar language.
  3. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  4. Sharing someone's secrets or embarrassing information or images online.
  5. Repeated, intense harassment and denigration that includes threats or creates significant fear.
Down
  1. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  2. Intentionally and cruelly excluding someone from an online group.
  3. "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.

8 Clues: Repeatedly sending nasty, mean, and insulting messages.Intentionally and cruelly excluding someone from an online group.Sharing someone's secrets or embarrassing information or images online.Online fights using electronic messages with angry and vulgar language....

Cyber Safety 2024-10-09

Cyber Safety crossword puzzle
Across
  1. refers to the responsible and ethical behaviour of individuals when using digital technologies and the internet.
  2. means being safe and responsible online.
  3. It refers to the buying and selling of goods using electronic means, like online shopping.
  4. It refers to the proper and respectful behaviour when using electronic devices and interacting with others online.
Down
  1. This means being able to fully participate in society using electronic devices and the internet.
  2. It is the process of learning and teaching about technology and how to use it effectively.
  3. These are the rules and responsibilities that apply to our actions and behaviour in the digital world.
  4. Continuous and spreading effect of an event or an action.

8 Clues: means being safe and responsible online.Continuous and spreading effect of an event or an action.It is the process of learning and teaching about technology and how to use it effectively.It refers to the buying and selling of goods using electronic means, like online shopping....

Cyber Attack 2024-12-11

Cyber Attack crossword puzzle
Across
  1. A type of malicious software that can spread between computers and damage data
  2. software that cybercriminals use to steal data, damage computers, or destroy systems. It's short for "malicious softwar
  3. social engineering attack that uses fake mobile text messages to trick people. The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind text messages—and “phishing”.
  4. Prevents access to files, systems, or networks, and demands payment to return them
Down
  1. Secretly monitors a user's activities and reports them to the software's author.
  2. are several types of phishing attacks, including:
  3. one that uses fraudulent emails, text messages, phone calls, or websites to trick people into sharing sensitive data, downloading malware, or otherwise exposing themselves to cybercrime. Phishing attacks are a form of social engineering.
  4. Displays unwanted advertisements and pop-ups, and can track online behavior.

8 Clues: are several types of phishing attacks, including:Displays unwanted advertisements and pop-ups, and can track online behavior.A type of malicious software that can spread between computers and damage dataSecretly monitors a user's activities and reports them to the software's author....

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  5. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. Which Cristo Rey sports team won medals at Florida National Competition?
  8. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  9. What is the title of the football team’s hype video on Marist School’s website?
  10. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  11. How many Cristo Rey students are part of a “team” at their job? (write out number)
Down
  1. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  2. What type of classes does Northside Hospital offer?
  3. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  4. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  5. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  6. What percent of students at Cristo Rey get accepted to college after graduation?
  7. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  8. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  9. The Coca Cola Company is devoted to replenishing all the ___ they use during production

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  2. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. What is the title of the football team’s hype video on Marist School’s website?
  5. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. What type of classes does Northside Hospital offer?
  8. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  9. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  10. Which Cristo Rey sports team won medals at Florida National Competition?
  11. The Coca Cola Company is devoted to replenishing all the ___ they use during production
Down
  1. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  2. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  5. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  6. What percent of students at Cristo Rey get accepted to college after graduation?
  7. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  8. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  9. How many Cristo Rey students are part of a “team” at their job? (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Cyber Safety 2019-01-25

Cyber Safety crossword puzzle
Across
  1. Garfield is a large ____ that knows how to stay safe online.
  2. Do not share this information about where you live with strangers.
  3. Nermal loves to play these online.
  4. Always tell your ____ what you are doing online.
Down
  1. Do not share your full ____ online. Use a nickname, instead.
  2. Never share this secret code with anyone.
  3. Your favorite TV ____ are okay to share online.
  4. Only give your ____ number to family and friends you know in real life.

8 Clues: Nermal loves to play these online.Never share this secret code with anyone.Your favorite TV ____ are okay to share online.Always tell your ____ what you are doing online.Garfield is a large ____ that knows how to stay safe online.Do not share your full ____ online. Use a nickname, instead....

Cyber Info 2020-08-10

Cyber Info crossword puzzle
Across
  1. social media app where you can post pictures
  2. how people view you and what they associate you with
  3. instagram for your parents
  4. app where you can give your opinions
Down
  1. when you put out too much information online
  2. snap your friends everyday to start a streak
  3. charli is queen
  4. the mark you leave behind when doing anything online

8 Clues: charli is queeninstagram for your parentsapp where you can give your opinionswhen you put out too much information onlinesnap your friends everyday to start a streaksocial media app where you can post picturesthe mark you leave behind when doing anything onlinehow people view you and what they associate you with

Cyber Safety 2022-01-11

Cyber Safety crossword puzzle
Across
  1. Always follow your school's______ and policies about Internet use.
  2. Never give out your name, address, telephone number, password, school name, parents' names, pictures of yourself, credit card numbers, Social Security number, or any other personal ______ to others
  3. Talk to a trusted adult if you or someone you know is being___
  4. Use hard-to-guess ______and keep them secret–even from your friends.
Down
  1. Using the Internet, cellphones, or other technology to send or post text or images to hurt or embarrass another person is called ______
  2. filesharing could be used by others to infect your computer with a ______
  3. make sure that your family has installed a _____ to keep your computer safe from hackers
  4. Don't share access to your computer with ______.

8 Clues: Don't share access to your computer with ______.Talk to a trusted adult if you or someone you know is being___Always follow your school's______ and policies about Internet use.Use hard-to-guess ______and keep them secret–even from your friends.filesharing could be used by others to infect your computer with a ______...

Cyber Safety 2024-08-06

Cyber Safety crossword puzzle
Across
  1. - Bullying online
  2. - Being safe online
  3. - Putting agressive presure on someone
  4. - Stands up against bullies
Down
  1. - Protecting systems
  2. - Supporting bullies
  3. - Sites that are accessed using a web browser
  4. - Connected computers share resources

8 Clues: - Bullying online- Being safe online- Protecting systems- Supporting bullies- Stands up against bullies- Connected computers share resources- Putting agressive presure on someone- Sites that are accessed using a web browser

Cyber ethics 2025-06-14

Cyber ethics crossword puzzle
Across
  1. A legal right granted by the law to the creator for his original work.
  2. Purchasing a single lisenced copy of the software and loading it into several computers.
  3. Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
  1. An illegal intrution into a computer system Or network.
  2. Vital information resources under seize.
  3. An act of sending to an user, misleading him to belive that it is from a trusted organisation.
  4. Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
  5. Unwanted bulk emails that comes from unknown sources.

8 Clues: Vital information resources under seize.Unwanted bulk emails that comes from unknown sources.An illegal intrution into a computer system Or network.A legal right granted by the law to the creator for his original work.Purchasing a single lisenced copy of the software and loading it into several computers....

IS and BC Cross-Up Crossword 2021-10-26

IS and BC Cross-Up Crossword crossword puzzle
Across
  1. Your ________ device often contains more personal information than any other source.
  2. BCP's main focus is not preventing incidents but rather the __________ from it.
  3. A major business disruption; the earth moves, shifts and shakes.
  4. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
  5. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
  6. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
  7. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
  8. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
  9. Never use your TTUTC________address for personal usage.
  10. Sending an email, posting photos on a social media site and using your webcam.
  11. The global system of interconnected computer networks that link billions of devices.
  12. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
  13. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
  14. The art of manipulating people to get access to sensitive information (two words.
  15. conforming to a rule, such as a specification, policy, standard or law.
  16. A collection of computers that are controlled on the same network.
  17. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  18. The staff and the customers are considered.
  19. The UTC hotsite is located here.
  20. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
  21. Facebook and TikTok are types of ________ (two words).
Down
  1. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
  2. someone who seeks and exploits weaknesses in a computer system or computer network.
  3. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
  4. A technology that allows us to access our files through the internet from anywhere in the world.
  5. When calls are made by social engineering, they are called _____ .
  6. Choose a password that is easy for you to ____________ but hard for you someone to guess.
  7. information such as legal documents and contracts must be classified as __________information. - (restricted)
  8. A piece of code put in to correct an error.
  9. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
  10. Always _______your computer when you leave your desk.
  11. Where do UTC employee report their ICT issues (three words).
  12. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
  13. The address of a webpage. Check the validity of it before clicking on it (acronym).
  14. Usually comprises the display device of the computer.
  15. An asset like other essential business assets in the Corporation.
  16. Who can be the target of a cyber attack.
  17. A concept where all things are connected to the internet; household items usually (three words).
  18. Equipment that offers short term protection against power surges and power outages (acronym).
  19. __________ Edwards is the Recovery Director and is in charge of BCP.
  20. A fraudulent email purportedly from a reputable company attempting to get personal information.
  21. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
  22. The process of adding allowed programs to a list is called_________.
  23. You can call 999, 881 or 990 for _______ services.
  24. “ This too good to be true email gives off a false sense of ______”.
  25. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
  26. A list of entities that are blocked or denied privileges or access.
  27. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).

48 Clues: The UTC hotsite is located here.Who can be the target of a cyber attack.A piece of code put in to correct an error.The staff and the customers are considered.You can call 999, 881 or 990 for _______ services.Always _______your computer when you leave your desk.Usually comprises the display device of the computer....

INFORMATION TECHNOLOGY 2021-02-09

INFORMATION TECHNOLOGY crossword puzzle
Across
  1. any number of computers and devices joined together by a communications link
  2. Internet Service Provider
  3. Career and Technical Education
  4. Hypertext Markup Language
  5. physical components of a computer
  6. Operating System
  7. fake emails to try and get personal information
  8. Local Area Network, single building or location
  9. 2-year college degree or training
  10. malicious code that secretly watches what you send over the internet
Down
  1. writes code to create software programs
  2. 4-year college degree
  3. programs that make a computer useful, Word, Excel, PowerPoint, etc.
  4. Wide Area Network, connects computer devices over dispersed locations
  5. pertaining to the world wide web culture
  6. Wireless LAN, radio, microware or infrared links take the place of physical cables

16 Clues: Operating System4-year college degreeInternet Service ProviderHypertext Markup LanguageCareer and Technical Educationphysical components of a computer2-year college degree or trainingwrites code to create software programspertaining to the world wide web culturefake emails to try and get personal information...

Tugas ppkn 2023-11-02

Tugas ppkn crossword puzzle
Across
  1. UU no 11 tahun 2008 berisi tentang informasi dan transaksi...
  2. kejahatan yang menyalahgunakan teknologi internet
  3. salah satu sarana efektif untuk mencegah dampak negatif kemajuan IPTEK dengan penanaman nilai-nilai
  4. Ilmu pengetahuan dan teknologi
  5. pembuat pesawat Indonesia
  6. Candi yang berada di Jawa tengah
  7. 1984 Apple menghasilkan komputer
Down
  1. sebelum ditemukan orang zaman dulu berkomunikasi melalui
  2. Lembaga ilmu pengetahuan Indonesia
  3. Bidang yang berkaitan dengan pemerintahan dan kebijakan pemerintah
  4. warga yang mulai mengembangkan sistem pertanian belasan tahun yang lalu
  5. Sistem Komunikasi Satelit Domestik
  6. salah satu bukti nyata adanya kemudahan berbelanja melalui toko
  7. Meningkatkan devisa negara termasuk dalam bidang
  8. Johannes Gutenberg pada 1440 mulai mengembangkan mesin
  9. siapa yang mengeluarkan komputer seri 650dan700

16 Clues: pembuat pesawat IndonesiaIlmu pengetahuan dan teknologiCandi yang berada di Jawa tengah1984 Apple menghasilkan komputerLembaga ilmu pengetahuan IndonesiaSistem Komunikasi Satelit Domestiksiapa yang mengeluarkan komputer seri 650dan700Meningkatkan devisa negara termasuk dalam bidangkejahatan yang menyalahgunakan teknologi internet...

Types of Markets 2022-01-25

Types of Markets crossword puzzle
Across
  1. The ___(issuing stocks for the first time) typically occurs in a primary market.
  2. Primary and secondary ___ are sold in a primary market.
  3. Zero-coupon bonds do not earn ____ within the bond market.
  4. Within bond markets in the US, bonds have a ___ value of $1000.
  5. ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
  6. The most populated exchange in the U.S who owns trading rights with listed companies
  7. Future markets help protect against ___ of uncertain markets.
  8. In a secondary market shares of stock are ___ to the public
Down
  1. ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
  2. buy orders at a ____ price.
  3. Corporations issue debt securities to be traded within ____ markets.
  4. A security is sold in a ___ market when it is first issued.
  5. ____ exchanges are markets that do not have a location.
  6. The purpose of trading within security markets is
  7. Raising capital within public and private markets is a goal within the ___ market.]
  8. Who must register bonds within the bond market?

16 Clues: buy orders at a ____ price.Who must register bonds within the bond market?____ exchanges are markets that do not have a location.The purpose of trading within security markets isPrimary and secondary ___ are sold in a primary market.Zero-coupon bonds do not earn ____ within the bond market....

Cyber Kindness Week 2024-04-12

Cyber Kindness Week crossword puzzle
Across
  1. Focusing on the good in people and situations.
  2. Providing motivation and uplifting words.
  3. Being open-minded and empathetic.
  4. Giving without expecting anything in return.
  5. Working together for common goals.
  6. Understanding others' feelings.
Down
  1. Showing care and concern.
  2. Thinking about how your actions affect others.
  3. Showing appreciation for others' kindness.
  4. Valuing others' opinions and boundaries.
  5. Offering assistance when needed.
  6. Showing behaviour that is respectful and considerate of other people.

12 Clues: Showing care and concern.Understanding others' feelings.Offering assistance when needed.Being open-minded and empathetic.Working together for common goals.Valuing others' opinions and boundaries.Providing motivation and uplifting words.Showing appreciation for others' kindness.Giving without expecting anything in return....

FNAF 2024-03-28

FNAF crossword puzzle
Across
  1. What do you use to watch the animatronics?
  2. The ____ of 1987
  3. Who serves ice cream?
  4. FNAF___ was Scotts most controversial FNAF game.
  5. Old Man ____ (he fishes)
  6. Who is the purple guy?
  7. Which character has a cupcake?
Down
  1. Who is the security guard in Security Breach?
  2. Who is the pirate?
  3. Who wants to be beautiful?
  4. Who originally plays the electric guitar?
  5. Which child possesses Golden Freddy?
  6. What is the name of William Afton's daughter?

13 Clues: The ____ of 1987Who is the pirate?Who serves ice cream?Who is the purple guy?Old Man ____ (he fishes)Who wants to be beautiful?Which character has a cupcake?Which child possesses Golden Freddy?Who originally plays the electric guitar?What do you use to watch the animatronics?Who is the security guard in Security Breach?...

"The Tale of Jenny and the Coffee Juggler" 2024-09-11

"The Tale of Jenny and the Coffee Juggler" crossword puzzle
Across
  1. What Carl really wants.
  2. How Jenny feels when enforcing security.
  3. What Jenny's sticking to like glue.
  4. What Carl forgot to show.
  5. What you're trying to prevent.
  6. That feeling you should ignore when enforcing security.
Down
  1. What you need to ask for ID.
  2. A classic security no-no.

8 Clues: What Carl really wants.A classic security no-no.What Carl forgot to show.What you need to ask for ID.What you're trying to prevent.What Jenny's sticking to like glue.How Jenny feels when enforcing security.That feeling you should ignore when enforcing security.

HistoryPuzzlebyLP 2022-01-14

HistoryPuzzlebyLP crossword puzzle
Across
  1. Abbreviation for Public Works Act
  2. 2nd day of the week
  3. last name of the 32nd US president
  4. AKA National Labor Relations Act
  5. getting a loan then investing which is known as "_____ on margin"
  6. "National ______ Act"
  7. "____ Cabinet" & "____ Tuesday" (one word)
  8. Wife of the 32nd US president's first name
  9. the beginning of a politician's term in office (____ 100 days)
Down
  1. the first word in AAA (____ Adjustment Act)
  2. Organization that provides assistance & relief
  3. Jobless WW1 veterans organized a group called
  4. Series of programs often summed up by the the three R's which was enacted by President Roosevelt
  5. "Tennessee _____ Authority" (TVA)
  6. "____ security" + ism
  7. "Social _____ Act"

16 Clues: "Social _____ Act"2nd day of the week"____ security" + ism"National ______ Act"AKA National Labor Relations ActAbbreviation for Public Works Act"Tennessee _____ Authority" (TVA)last name of the 32nd US president"____ Cabinet" & "____ Tuesday" (one word)Wife of the 32nd US president's first namethe first word in AAA (____ Adjustment Act)...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  2. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  3. Which Cristo Rey sports team won medals at Florida National Competition?
  4. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  5. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  6. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  7. How many Cristo Rey students are part of a “team” at their job? (write out number)
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  9. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  10. What is the title of the football team’s hype video on Marist School’s website?
  11. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
  1. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  2. How many credits do you need to graduate from Cristo Rey? (write out number)
  3. What percent of students at Cristo Rey get accepted to college after graduation?
  4. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  5. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  6. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  7. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  8. What type of classes does Northside Hospital offer?
  9. Through corporate work study program, students earn ____% of the cost of their education (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  2. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  3. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  4. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  5. What type of classes does Northside Hospital offer?
  6. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  7. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  8. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  9. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
  1. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  2. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  3. What is the title of the football team’s hype video on Marist School’s website?
  4. Which Cristo Rey sports team won medals at Florida National Competition?
  5. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  8. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  9. What percent of students at Cristo Rey get accepted to college after graduation?
  10. How many Cristo Rey students are part of a “team” at their job? (write out number)
  11. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Sicherheit im Netz 2025-04-22

Sicherheit im Netz crossword puzzle
Across
  1. Beispiel für Cyber-Mobbing
  2. Viren infizieren deinen Computer.
  3. Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?
  4. Das häufigste Mittel Menschen zu manipulieren.
Down
  1. Ein Grund warum gemobbt wird.
  2. Was solltest du bei unangemessenen Inhalten tun?
  3. Wie nennt man Mobbing im Internet?
  4. Mache ... von unangenehmen Nachrichten/Bildern oder Chats.

8 Clues: Beispiel für Cyber-MobbingEin Grund warum gemobbt wird.Viren infizieren deinen Computer.Wie nennt man Mobbing im Internet?Das häufigste Mittel Menschen zu manipulieren.Was solltest du bei unangemessenen Inhalten tun?Mache ... von unangenehmen Nachrichten/Bildern oder Chats.Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?

Practica 8A 2023-02-14

Practica 8A crossword puzzle
Across
  1. arrival
  2. suitcase
  3. to last
  4. customs
  5. to inspect, to search
  6. airport
  7. security checkpoint
  8. flight
Down
  1. to check (luggage)
  2. aisle
  3. to board
  4. customs officer
  5. tourist
  6. passenger
  7. reservation
  8. delay
  9. pilot

17 Clues: aisledelaypilotflightarrivaltouristto lastcustomsairportto boardsuitcasepassengerreservationcustoms officerto check (luggage)security checkpointto inspect, to search

Chemical Process Engineer 2023-09-17

Chemical Process Engineer crossword puzzle
Across
  1. relevance
  2. a sort of variation
  3. device
  4. outcome
  5. fluently
  6. adjustment
Down
  1. timetable
  2. care
  3. improvement
  4. procedure
  5. security
  6. solving issues
  7. analyse
  8. arrangement
  9. supervision
  10. unit
  11. you receive it at work

17 Clues: careunitdeviceanalyseoutcomesecurityfluentlytimetableprocedurerelevanceadjustmentimprovementarrangementsupervisionsolving issuesa sort of variationyou receive it at work

Jordan's Crossword puzzle 2018-11-18

Jordan's Crossword puzzle crossword puzzle
Across
  1. demanding money for information
  2. let's attacker to secretly control the users infected computer
  3. small piece of software that corrupts devices
  4. the programs and other operating info used by a computer
  5. a type of software intended to damage or destroy
Down
  1. a necessity when hacking putting in a virus
  2. uses computer networks to duplicate itself
  3. it claims to be a game
  4. trying to get someone to reveal personal information
  5. denial of service
  6. attacks online
  7. repeatedly showing up on your screen
  8. kids can't fill this gap if it's too large
  9. attacks personal information; also the name of king of gods
  10. uses email addresses to replicate itself

15 Clues: attacks onlinedenial of serviceit claims to be a gamedemanding money for informationrepeatedly showing up on your screenuses email addresses to replicate itselfuses computer networks to duplicate itselfkids can't fill this gap if it's too largea necessity when hacking putting in a virussmall piece of software that corrupts devices...

Networking Concepts & Cyber Ethics 2025-05-30

Networking Concepts & Cyber Ethics crossword puzzle
Across
  1. : We send and get messages here
  2. : We use this to click on computer
  3. : We should not share too many of these
  4. : We should be this when using internet
  5. : We must follow these when we use internet
  6. : It helps our phone or laptop to use internet
  7. : Word used for online world
  8. : We use this to visit websites
  9. : Kids play this on computer or phone
Down
  1. : We use this to study and play
  2. : We watch this on YouTube
  3. : We should keep this secret
  4. : We should only chat with real ____ online
  5. : Talking with friends using phone or computer
  6. : We should not share this with strangers online

15 Clues: : We watch this on YouTube: We should keep this secret: Word used for online world: We use this to study and play: We send and get messages here: We use this to visit websites: We use this to click on computer: Kids play this on computer or phone: We should not share too many of these: We should be this when using internet...

Food Security 2022-07-08

Food Security crossword puzzle
Across
  1. liquid used to water plants and grow animals.
  2. to be able to get something
  3. the long term shifts in temperature and weather patterns.
  4. the state of being unable to buy necessary things to survive easily
Down
  1. art of growing crops and raising live stock.
  2. need for food.
  3. long time of dry weather and lack of water.
  4. when something can be accessed
  5. movement of food or goods from one area to another.

9 Clues: need for food.to be able to get somethingwhen something can be accessedlong time of dry weather and lack of water.art of growing crops and raising live stock.liquid used to water plants and grow animals.movement of food or goods from one area to another.the long term shifts in temperature and weather patterns....

Security Issues 2019-01-29

Security Issues crossword puzzle
Across
  1. Everything is backed up at once.
  2. In this type of backup, only two image files are required to restore the system!
  3. Faster backup time as only amended files need to be copied.
  4. A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
  1. Useful when backing up large amounts of data.
  2. Procedures or measures taken to ensure the safety of an organisation.
  3. This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
  4. This is information that is still important but it is not needed for immediate use.
  5. A very important element to a company/organisation!

9 Clues: Everything is backed up at once.Useful when backing up large amounts of data.A very important element to a company/organisation!Faster backup time as only amended files need to be copied.Procedures or measures taken to ensure the safety of an organisation.In this type of backup, only two image files are required to restore the system!...

Information security 2020-08-26

Information security crossword puzzle
Across
  1. potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
  2. Is the process of determining and assigning privileges to various resources, objects or data.
  3. the action of stopping any form of attack from happening.
  4. An internet scam that targets unsuspecting users through email.
  5. Is a technique that is used to exploit a vulnerability in any application attack gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Down
  1. a way of injecting malicious scripts into web pages.
  2. Are small files that Web sites put on your computer hard disk drive when you first visit.
  3. the process of tracking recording system activities and resource access.
  4. People, property, and information that needed to be protected asset Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.

9 Clues: a way of injecting malicious scripts into web pages.the action of stopping any form of attack from happening.An internet scam that targets unsuspecting users through email.the process of tracking recording system activities and resource access.Are small files that Web sites put on your computer hard disk drive when you first visit....

Security Department 2020-03-28

Security Department crossword puzzle
Across
  1. a person who monitor that the hotel areas are in order
  2. a metal box in which valuable objects are stored
  3. a objet that records images in or outside a building or in a public place, in order to prevent or help solve situation in the future
  4. a device such as a bell or siren that warns the people in a building that the building is on fire
  5. the careful watching of a person or place
  6. a place in a hotel where things that people have lost are stored
Down
  1. prepare the annual security program and inspect the operation of the alarms
  2. a person who guard employed by the hotel
  3. the crime of stealing from somewhere or someone

9 Clues: a person who guard employed by the hotelthe careful watching of a person or placethe crime of stealing from somewhere or someonea metal box in which valuable objects are storeda person who monitor that the hotel areas are in ordera place in a hotel where things that people have lost are stored...

Security percutions 2020-11-26

Security percutions crossword puzzle
Across
  1. s a method of changing the original numbers and characters so that they are hidden or disguised. This is important if you are sending sensitive information.
  2. an expert at programming and solving problems with a computer
  3. It helps you prevent viruses
  4. is a law that determines whether people are allowed to access computers and modify the data on the computer system.
Down
  1. are used to check packets of data as they are received by a computer system from a network or the internet
  2. small malicious program that can alter and delete files
  3. An internet worm is a program that spreads across the internet by replicating itself on computers via their network connections.
  4. This type of malicious software pretends to be a useful program while secretly performing another function
  5. Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

9 Clues: It helps you prevent virusessmall malicious program that can alter and delete filesan expert at programming and solving problems with a computerare used to check packets of data as they are received by a computer system from a network or the internet...

Security Matters 2023-10-02

Security Matters crossword puzzle
Across
  1. You'll need a pole for this
  2. You might use a wasp sord to protect this
  3. If I were doing my Bruce Forsythe impression I would be?
  4. I might be called this on the golf course
  5. What caused the lockdowns
Down
  1. Holding clothes hostage
  2. Trying desperately to get a compliment
  3. IF you dont have this you might go to your cry suite
  4. Tin of processed meat

9 Clues: Tin of processed meatHolding clothes hostageWhat caused the lockdownsYou'll need a pole for thisTrying desperately to get a complimentYou might use a wasp sord to protect thisI might be called this on the golf courseIF you dont have this you might go to your cry suiteIf I were doing my Bruce Forsythe impression I would be?

Social Security 2023-12-15

Social Security crossword puzzle
Across
  1. A federal insurance program
  2. You can earn a maximum of four of these per year and you need 40 to qualify for future Social Security benefits
  3. It’s the tax withheld from your wages that funds the Social Security and Medicare programs.
  4. Primary Insurance Amount
Down
  1. Social security has five types of __
  2. A joint federal and state program that helps with medical costs for people with low incomes and limited resources.
  3. Programs that provide monthly cash benefits to workers and their dependents when they retire, become disabled, or die
  4. An index prepared by the U. S. Department of Labor that charts the rise in costs for selected goods and services
  5. Documents you must submit to support a factor of entitlement or payment amount

9 Clues: Primary Insurance AmountA federal insurance programSocial security has five types of __Documents you must submit to support a factor of entitlement or payment amountIt’s the tax withheld from your wages that funds the Social Security and Medicare programs....

Security Meeting 2025-01-22

Security Meeting crossword puzzle
Across
  1. Found in the top drawer at LC desk.
  2. Opener does this in the morning to clear the branch.
  3. Number of hand-held alarms in branch.
  4. The robbery folder color.
Down
  1. "Alt +___ + I" is used in TCR during robbery.
  2. The Extortion folder color.
  3. The phone we use to call 911.
  4. Color of our "All Clear" sign.
  5. Where to meet during evacuation.

9 Clues: The robbery folder color.The Extortion folder color.The phone we use to call 911.Color of our "All Clear" sign.Where to meet during evacuation.Found in the top drawer at LC desk.Number of hand-held alarms in branch."Alt +___ + I" is used in TCR during robbery.Opener does this in the morning to clear the branch.

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. what is NFSA
  2. Introduced Pradhan Mantri Garib Kalyan Anna Yojana
  3. How many kgs under AAY
Down
  1. What is the price/kg
  2. What is AAY
  3. beneficiaries
  4. How many kg/person
  5. how many years
  6. how it is distributed
  7. When it was started

10 Clues: What is AAYwhat is NFSAbeneficiarieshow many yearsHow many kg/personWhen it was startedWhat is the price/kghow it is distributedHow many kgs under AAYIntroduced Pradhan Mantri Garib Kalyan Anna Yojana

BusFin Chapter 1 2024-08-19

BusFin Chapter 1 crossword puzzle
Across
  1. a security that represents ownership in a company
  2. setting financial goals is the _____ step in the financial planning process
  3. a factor that affects financial activities; related to inflation
  4. supply and demand, risk, and liquidity are some factors that affect the value of this
  5. the ease in which an investment can be converted to cash
  6. when a country imports more than it exports
Down
  1. financial market where short-term debt is bought and sold
  2. what you give up by making a choice
  3. a debt security
  4. ________, investor funds, and borrowing are all sources of funds
  5. a commercial bank is an example of a ___________institution

11 Clues: a debt securitywhat you give up by making a choicewhen a country imports more than it exportsa security that represents ownership in a companythe ease in which an investment can be converted to cashfinancial market where short-term debt is bought and solda commercial bank is an example of a ___________institution...

Traveling 2023-03-16

Traveling crossword puzzle
Across
  1. chegadas
  2. bagagem
  3. dinheiro
  4. alfândega
  5. vacinação
  6. troco
  7. partidas
  8. passaporte
Down
  1. voo
  2. casa de câmbio
  3. caixa eletrônico
  4. moeda
  5. visto
  6. card cartão de crédito
  7. segurança
  8. carteira

16 Clues: voomoedavistotrocobagagemchegadasdinheiropartidascarteiraalfândegavacinaçãosegurançapassaportecasa de câmbiocaixa eletrônicocard cartão de crédito

Team FIRU 2021-07-20

Team FIRU crossword puzzle
Across
  1. Often found hanging in the office
  2. Make the best salad sandwich in Greenacre
  3. Town and former maximum security gaol
  4. Where is the big prawn?
  5. Must be checked and filed
  6. Provided the entertainment at the 1990 AFL grand final
  7. Has the odd drive by shooting
  8. Their job is to is to investigate and solve crime
Down
  1. Sang the song I'm too sexy?
  2. What do they call a quarter pounder with cheese in France?
  3. Famous Goulburn inmate
  4. Who opened the Big Merino in 1985?
  5. How many to a cell in Goulburn Maximum Security cells?
  6. Not in Northern Ireland
  7. Former FBEU secretary
  8. Rays favourite swear word?

16 Clues: Former FBEU secretaryFamous Goulburn inmateWhere is the big prawn?Not in Northern IrelandMust be checked and filedRays favourite swear word?Sang the song I'm too sexy?Has the odd drive by shootingOften found hanging in the officeWho opened the Big Merino in 1985?Town and former maximum security gaolMake the best salad sandwich in Greenacre...

FNAF crossword 2024-04-05

FNAF crossword crossword puzzle
Across
  1. Animatronics from security breach
  2. Animatronics from the second game
  3. Cheapest set of animatronics in pizzeria simulator
  4. Where is glamrock bonnie hidden in ruin
  5. What role do you play as in FNAF 1-3
  6. What suit does afton get springlocked in
  7. Where are you in FNAF 4
Down
  1. Animatronics from sister location
  2. Animatronics from the third game
  3. The most disregarded FNAF game
  4. Everyones fav black bear
  5. Who causes hallucinations saying "its me"
  6. Who gets a stage of their own
  7. Bonnie's "replacement" in security breach and ruin
  8. *sighs* Who always comes back

15 Clues: Where are you in FNAF 4Everyones fav black bearWho gets a stage of their own*sighs* Who always comes backThe most disregarded FNAF gameAnimatronics from the third gameAnimatronics from sister locationAnimatronics from security breachAnimatronics from the second gameWhat role do you play as in FNAF 1-3Where is glamrock bonnie hidden in ruin...

Cashless society 2024-09-12

Cashless society crossword puzzle
Across
  1. System ........... that causes payment issues
  2. The convenience of not carrying.....physically
  3. Cash transactions leave .......... to be tracked
  4. Electronic ............ criminals
  5. A payment method that eliminates...
  6. loundering A financial crime that's harder to commit without ...........
  7. ....................interest rate affecting bank customers
  8. .................transaksi elektronik yang digunakan sebagai alternatif kartu kredit dan debit
Down
  1. Security .............. to protect cash
  2. Every ............ recorded makes it hard to hide
  3. Transaction ............... to avoid this crime
  4. ...............that needs to be converted when traveling
  5. Type of ............ banks may increase without cash
  6. ................associated with physical currency management
  7. ...................state of not using physical money
  8. gambling A common activity where ........... is used and tracked

16 Clues: Electronic ............ criminalsA payment method that eliminates...Security .............. to protect cashSystem ........... that causes payment issuesThe convenience of not carrying.....physicallyTransaction ............... to avoid this crimeCash transactions leave .......... to be trackedEvery ............ recorded makes it hard to hide...

THINK BEFORE YOU CLICK 2025-04-06

THINK BEFORE YOU CLICK crossword puzzle
Across
  1. Necessary to ensure continuity.
  2. Helps avoid phishing and maintain security.
  3. Describes the identity or message in phishing.
  4. Often disguised in phishing emails.
  5. Essential to protect data and systems.
  6. Crucial during disruptions for transparency.
  7. Red flag in scam messages to pressure action.
  8. What scammers ask victims to do to steal info.
Down
  1. Key to avoiding phishing and ensuring business stability.
  2. Result of falling for a scam.
  3. System to keep business running during disruptions.
  4. Core goal of BCMS.
  5. Common platform used in phishing attacks.
  6. Deceptive scheme or trick.
  7. Fraudulent attempt to obtain sensitive information.

15 Clues: Core goal of BCMS.Deceptive scheme or trick.Result of falling for a scam.Necessary to ensure continuity.Often disguised in phishing emails.Essential to protect data and systems.Common platform used in phishing attacks.Helps avoid phishing and maintain security.Crucial during disruptions for transparency.Red flag in scam messages to pressure action....

Spanish 2023-12-18

Spanish crossword puzzle
Across
  1. engineer
  2. inner tube
  3. itinerary
  4. to pack
  5. inn
  6. flip plops
  7. streetcar
  8. in flight service
  9. terminal
  10. luggage claim
  11. ferry
  12. sled
  13. stwerdess
Down
  1. subway
  2. conductor
  3. recline
  4. security
  5. platform
  6. to slide
  7. turnstile
  8. to tour
  9. guest houes

22 Clues: innsledferrysubwayreclineto packto tourengineersecurityplatformto slideterminalconductoritineraryturnstilestreetcarstwerdessinner tubeflip plopsguest houesluggage claimin flight service

Viajes 2024-04-25

Viajes crossword puzzle
Across
  1. gate
  2. flight
  3. seat
  4. plane
  5. arrivals
  6. travel agent
  7. to land
  8. to travel
  9. row
  10. departures
  11. passport
  12. suitcase
  13. airport
Down
  1. destination
  2. layover
  3. travel
  4. to take off
  5. round trip
  6. security
  7. luggage
  8. customs
  9. aisle
  10. passenger

23 Clues: rowgateseatplaneaisleflighttravellayoverluggageto landcustomsairportarrivalssecuritypassportsuitcaseto travelpassengerround tripdeparturesdestinationto take offtravel agent

Neighbourhood Watchers 2025-08-04

Neighbourhood Watchers crossword puzzle
Across
  1. кузнец
  2. предотвратить
  3. изолированный
  4. ежегодный
  5. ___measures принимать меры
  6. охрана
  7. гражданство
  8. добровольный
  9. уязвимый
  10. пословица
  11. имущество
  12. поведение
Down
  1. кража со взломом
  2. улучшить
  3. убедиться
  4. меры
  5. участник
  6. шанс, возможность
  7. район
  8. установить
  9. включать в себя
  10. обеспечить
  11. награда

23 Clues: мерырайонкузнецохрананаградаулучшитьучастникуязвимыйубедитьсяежегодныйпословицаимуществоповедениеустановитьобеспечитьгражданстводобровольныйпредотвратитьизолированныйвключать в себякража со взломомшанс, возможность___measures принимать меры

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

IT-Security - Datenschutz/-sicherheit 2016-01-29

IT-Security - Datenschutz/-sicherheit crossword puzzle
Across
  1. Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
  2. Virus der sich direkt über Netzte im Internet verbreitet
  3. versteckt in einem scheinbar nützlichen Programm
  4. Mobbing mit Hilfe von elektronischen Medien
  5. Beobachtung bei der Eingabe von Daten
Down
  1. Sicherheitskopie im Falle von Verlust oder dergleichen
  2. forschen das Nutzerverhalten aus
  3. Diebstahl von Daten die weggeworfen wurden
  4. jemand der illegal in Computersysteme eingreift
  5. unerwünschte Werbemails

10 Clues: unerwünschte Werbemailsforschen das Nutzerverhalten ausBeobachtung bei der Eingabe von DatenDiebstahl von Daten die weggeworfen wurdenMobbing mit Hilfe von elektronischen Medienjemand der illegal in Computersysteme eingreiftversteckt in einem scheinbar nützlichen ProgrammSicherheitskopie im Falle von Verlust oder dergleichen...

Chapter 2 2020-08-22

Chapter 2 crossword puzzle
Across
  1. threat actor that seeks to harm the government
  2. reduce the risk of a threat
  3. individual who gains unauthorized access
  4. when different employees take over job tasks
  5. this privilege principal limits access to work tasks
  6. after an attack perform a memory
Down
  1. media preparation technique
  2. this document states who has had access to the evidence
  3. this security measure is AKA defense-in-depth
  4. identifies traffic on your network
  5. important aspect of evidence gathering
  6. separation of ___
  7. testing tool to validate bandwidth
  8. this testing type simulates a large number of clients
  9. privileges resulting from of privilege escalation
  10. are the greatest threat to network security
  11. changes the position of characters

17 Clues: separation of ___media preparation techniquereduce the risk of a threatafter an attack perform a memoryidentifies traffic on your networktesting tool to validate bandwidthchanges the position of charactersimportant aspect of evidence gatheringindividual who gains unauthorized accessare the greatest threat to network security...

ACEBA 2020-09-23

ACEBA crossword puzzle
Across
  1. boss
  2. designing
  3. pushers
  4. shopping
  5. training
  6. donor
Down
  1. travel
  2. award
  3. technology
  4. risk
  5. money
  6. EAs
  7. indicators
  8. project name

14 Clues: EAsbossriskawardmoneydonortravelpushersshoppingtrainingdesigningtechnologyindicatorsproject name

33 Pieces of Greatness 2025-04-03

33 Pieces of Greatness crossword puzzle
Across
  1. The security tool you've been working on
  2. A protective security measure in networking
  3. Favorite anime character
  4. Favorite Arsenal player
  5. Favorite drink
  6. Favorite person in the world
  7. All time favorite game console
Down
  1. Arsenal’s nickname
  2. All is well in the world, as long as you can eat
  3. The first city you had your passport stamped
  4. When you're stressed, you play..
  5. A luxury item you always splurge on
  6. Strategy-based board game you love

13 Clues: Favorite drinkArsenal’s nicknameFavorite Arsenal playerFavorite anime characterFavorite person in the worldAll time favorite game consoleWhen you're stressed, you play..Strategy-based board game you loveA luxury item you always splurge onThe security tool you've been working onA protective security measure in networking...

The Online World 2015-09-21

The Online World crossword puzzle
Across
  1. Search Engine
  2. A website connected to another via a link
  3. One system to another
  4. Movement of files from a system to your computer
  5. Recipient of a small fee for traffic clicking through an add
Down
  1. Set of online rules for the cyber net
  2. The format of a file after compression
  3. Only a readable version of a file
  4. Type of online communication
  5. Name for and education online site
  6. A online collection of personal

11 Clues: Search EngineOne system to anotherType of online communicationA online collection of personalOnly a readable version of a fileName for and education online siteSet of online rules for the cyber netThe format of a file after compressionA website connected to another via a linkMovement of files from a system to your computer...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many Cristo Rey students are part of a “team” at their job? (write out number)
  2. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  5. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  8. What type of classes does Northside Hospital offer?
  9. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
Down
  1. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  2. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. Which Cristo Rey sports team won medals at Florida National Competition?
  5. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  6. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  7. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  8. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  9. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  10. What percent of students at Cristo Rey get accepted to college after graduation?
  11. What is the title of the football team’s hype video on Marist School’s website?

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Airports 2022-07-21

Airports crossword puzzle
Across
  1. city with the code SIN
  2. the airline code for cathay pacific
  3. most common cause of runway incursions
  4. country of the world's busiest airport
  5. you can carry up to 100ml of this
  6. first international Airport opened in
Down
  1. ideal solution for evacuating passengers
  2. the area where aircraft park
  3. the area after check-in and passport control
  4. vertical guidance system to guide planes
  5. the security of aviation as a whole
  6. man family tried to sneak this through the airport
  7. customs officers intercept this
  8. the area before security
  9. makes up 50% of Auckland Airports' income

15 Clues: city with the code SINthe area before securitythe area where aircraft parkcustoms officers intercept thisyou can carry up to 100ml of thisthe security of aviation as a wholethe airline code for cathay pacificfirst international Airport opened inmost common cause of runway incursionscountry of the world's busiest airport...

Англ.яз. 2020-03-10

Англ.яз. crossword puzzle
Across
  1. защита
  2. хранить
  3. результат, проблема
  4. безопасность
  5. враг, нарушитель
  6. производительный
  7. конфиденциальность
  8. способ, средство
  9. достоверность, подлинность
  10. программное обеспечение
  11. оборудование, аппаратное обеспечение
Down
  1. полезность
  2. защищённость
  3. последствие, результат
  4. невозможный отказ от авторства
  5. содержимое
  6. применение
  7. быстрый
  8. обрабатывать
  9. нарушитель, взломщик

20 Clues: защитахранитьбыстрыйполезностьсодержимоеприменениезащищённостьбезопасностьобрабатыватьвраг, нарушительпроизводительныйспособ, средствоконфиденциальностьрезультат, проблеманарушитель, взломщикпоследствие, результатпрограммное обеспечениедостоверность, подлинностьневозможный отказ от авторстваоборудование, аппаратное обеспечение

At the Airport 2017-01-12

At the Airport crossword puzzle
Across
  1. предмет
  2. острый
  3. очередь
  4. стойка регистрации - ... desk
  5. внимательный
  6. тележка
  7. прямой
  8. быстрый
  9. оставлять
  10. пропускать
  11. опасный
  12. посадочный талон - ... card
Down
  1. показывать
  2. багаж
  3. досматривать
  4. проходить через - go ...
  5. тяжелый
  6. сотрудник службы безопасности
  7. пассажир
  8. терять
  9. жидкость
  10. присоединяться

22 Clues: багажострыйтерятьпрямойпредметтяжелыйочередьтележкабыстрыйопасныйпассажиржидкостьоставлятьпоказыватьпропускатьдосматриватьвнимательныйприсоединятьсяпроходить через - go ...посадочный талон - ... cardсотрудник службы безопасностистойка регистрации - ... desk

What You Wanna Be? (Transcribe the phonetic symbol to the box) 2024-01-07

What You Wanna Be? (Transcribe the phonetic symbol to the box) crossword puzzle
Across
  1. sɪˈkjʊrəti
  2. ʌnɪmˈplɔɪd
  3. laɪˈbreriən
  4. ɑːrkɪtekt
  5. sekrəteri
  6. æθliːt
  7. faɪərfaɪtər
  8. flɔːrɪst
  9. bæŋkər
  10. raɪtər
  11. nɜːrs
Down
  1. bʊtʃər
  2. ɡeɪmər
  3. plʌmər
  4. dentɪst
  5. ʌndərteɪkər
  6. vet
  7. beɪkər
  8. teɪlər
  9. tiːtʃər
  10. əˈkaʊntənt
  11. fɪʃmʌŋɡər
  12. dɑːktər
  13. draɪvər
  14. beɡər
  15. lɔɪər

26 Clues: vetbeɡərlɔɪərnɜːrsbʊtʃərɡeɪmərplʌmərbeɪkərteɪləræθliːtbæŋkərraɪtərdentɪsttiːtʃərdɑːktərdraɪvərflɔːrɪstɑːrkɪtektsekrəterifɪʃmʌŋɡərsɪˈkjʊrətiʌnɪmˈplɔɪdəˈkaʊntəntʌndərteɪkərlaɪˈbreriənfaɪərfaɪtər

GTA5 2023-07-05

GTA5 crossword puzzle
Across
  1. government
  2. franklin dog
  3. marina hights
  4. Trevorfriend
  5. weapon stash
  6. autoshop
  7. michaelson
  8. flying bike
  9. airport
  10. sandy shores
  11. newjet
  12. hacker
Down
  1. carsalesmen
  2. jetcar
  3. high end clothes
  4. gta5map
  5. eastlossantos
  6. security
  7. tall building
  8. police
  9. clothes store
  10. oldjet

22 Clues: jetcarpoliceoldjetnewjethackergta5mapairportautoshopsecuritygovernmentmichaelsoncarsalesmenflying bikefranklin dogTrevorfriendweapon stashsandy shoresmarina hightseastlossantostall buildingclothes storehigh end clothes

ICT Password 2024-03-06

ICT Password crossword puzzle
Across
  1. Voice Over Internet Protocol
  2. Example of a crypto currency
  3. World Wide Web
Down
  1. Information Communictaion Technology
  2. Technology to hide Ip address and location
  3. Crime Crime carried out using computer

6 Clues: World Wide WebVoice Over Internet ProtocolExample of a crypto currencyInformation Communictaion TechnologyCrime Crime carried out using computerTechnology to hide Ip address and location

Navigate Unit 1.1+1.2 2021-08-31

Navigate Unit 1.1+1.2 crossword puzzle
Across
  1. Kunde (Kundin), Käufer
  2. Verletzung
  3. Meinung
  4. Vertrauen
  5. etw. zugeben, eingestehen
  6. Abenteuer
  7. schuldig
  8. Sicherheit, Sicherheitsdienst
  9. jdn überzeugen
  10. Angestellte/r
Down
  1. Rabatt, Preisnachlass
  2. Streit
  3. Almosen, Barmherzigkeit, Benefiz-
  4. Internet
  5. Therapie
  6. zuverlässig
  7. sich entwickeln
  8. treu

18 Clues: treuStreitMeinungInternetTherapieschuldigVertrauenAbenteuerVerletzungzuverlässigAngestellte/rjdn überzeugensich entwickelnRabatt, PreisnachlassKunde (Kundin), Käuferetw. zugeben, eingestehenSicherheit, SicherheitsdienstAlmosen, Barmherzigkeit, Benefiz-

AT THE AIRPORT 2017-11-08

AT THE AIRPORT crossword puzzle
Across
  1. LASKEUTUA
  2. MATKATAVARAT
  3. SAAPUVAT LENNOT
  4. TURVATARKASTUS
  5. VIISUMI
  6. KÄYTÄVÄPAIKKA
  7. ARVIOITU LÄHTÖAIKA
  8. VAPAA
  9. VÄLILASKU
Down
  1. PUNNITA
  2. MATKATAVAROIDEN NOUTOPISTE
  3. LÄHTEVÄT LENNOT
  4. VIIVÄSTYNTYT
  5. PASSI
  6. VARATTU
  7. LENTO
  8. TULLI
  9. MÄÄRÄNPÄÄ

18 Clues: PASSILENTOTULLIVAPAAPUNNITAVARATTUVIISUMILASKEUTUAMÄÄRÄNPÄÄVÄLILASKUMATKATAVARATVIIVÄSTYNTYTKÄYTÄVÄPAIKKATURVATARKASTUSLÄHTEVÄT LENNOTSAAPUVAT LENNOTARVIOITU LÄHTÖAIKAMATKATAVAROIDEN NOUTOPISTE

OffDig 2024-12-17

OffDig crossword puzzle
Across
  1. Kort for teknologi og AI-platforme
  2. Kunstig intelligens til at styrke konkurrenceevne
  3. En essentiel teknologi til moderne AI-løsninger
  4. Automatisering af processer gennem avancerede digitale værktøjer
  5. AI-løsninger, der skaber reel forretningsværdi
Down
  1. Hjælper virksomheder med AI-strategi og transformation
  2. En ledende aktør inden for digital og AI-transformation
  3. AI som kernen i fremtidens nytænkning
  4. Beskytter organisationer mod digitale trusler
  5. Bruges til at drive strategi og vækst

10 Clues: Kort for teknologi og AI-platformeAI som kernen i fremtidens nytænkningBruges til at drive strategi og vækstBeskytter organisationer mod digitale truslerAI-løsninger, der skaber reel forretningsværdiEn essentiel teknologi til moderne AI-løsningerKunstig intelligens til at styrke konkurrenceevneHjælper virksomheder med AI-strategi og transformation...

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

Receptionist Essentials 2025-03-19

Receptionist Essentials crossword puzzle
Across
  1. / Security risk where an unauthorized person follows an employee through a secure door
  2. / The process of handling unexpected situations professionally
  3. / An important security step before issuing a guest badge
  4. / The designated area where visitors check in
  5. / The internal resource where you can find answers to policies and procedures
Down
  1. / What you must remain during a workplace emergency
  2. / The software used for internal messaging at Apple
  3. / A common security measure for Apple employees
  4. / What you provide when guiding guests to a meeting room
  5. / The first person guests interact with at the front desk

10 Clues: / The designated area where visitors check in/ A common security measure for Apple employees/ What you must remain during a workplace emergency/ The software used for internal messaging at Apple/ What you provide when guiding guests to a meeting room/ The first person guests interact with at the front desk...

EMD Polices & Procedures 2021-02-11

EMD Polices & Procedures crossword puzzle
Across
  1. Type of inspection performed by security officers to ensure that employees are using their assigned badges
  2. CW-EMD cleared employee has a _______ on their badge
  3. Special arrangements have been made to allow_____________ employees to bring company provided cell phones through CW-EMD property
  4. Issued to employees and long term contractors to identify a vehicle and vehicle owner should there be an issue
  5. Application used for alarms and event view
  6. Document with information that must be reported to the next officer taking over that post
  7. All visitors must have a ___________ completed in order to be allowed into the facility or do work on the grounds
  8. Alarm that sounds like a hockey goal
  9. This report is a firsthand account of the activities the security officer performed while on duty.
  10. This type of report is used for a situation that requires greater detail to be investigated
  11. only post that is manned from 0630-2230 Monday thru Friday.
  12. __________ is to be completed every time a foreign national enters the shop for a tour
  13. Badge color reserved specifically for Foreign Nationals
  14. Site with no on-site security that is monitored by CW-EMD
  15. These passes are issued for a maximum of 5 business days at a time
  16. Temporary badges can only be issued and returned to_______
Down
  1. Has a yellow background with red lettering and the Curtiss-Wright logo
  2. __________ Book is used by CW-EMD security to alert security officers of individuals who previously had access to the site.
  3. Form used by employees to have incoming media scanned for viruses
  4. Stickers on personal owned cell phone that have been approved by the FSO/Asst. FSO are this color
  5. __________ are issued if a person’s vehicle information is not registered in the Auto Registration
  6. Form generated by and issued by the Purchasing Department authorizing equipment to be removed from the site
  7. Foreign Nationals are permitted to have approved electronics in this area and this area only
  8. __________visitors wearing this badge MUST ALWAYS have an EMD escort with them
  9. Post where you control and perform 100% vehicle inspections
  10. required any time work is being done inside the building that could potentially spark a fire
  11. Document needed when taking company property off site
  12. Secure area located in Bldg. 3A 2nd floor
  13. type of visitor that is required to have a video date

29 Clues: Alarm that sounds like a hockey goalSecure area located in Bldg. 3A 2nd floorApplication used for alarms and event viewCW-EMD cleared employee has a _______ on their badgeDocument needed when taking company property off sitetype of visitor that is required to have a video dateBadge color reserved specifically for Foreign Nationals...

Cybersecurity Awareness 2024-12-13

Cybersecurity Awareness crossword puzzle
Across
  1. A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
  2. Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
  3. A type of malware that locks a user’s files or system, demanding payment to restore access.
  4. A fix or update to software that addresses security vulnerabilities or bugs.
  5. Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
  6. A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
  7. Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
  8. Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
  9. Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
  10. Software that secretly gathers information about you or your device without your consent.
  11. (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
  12. A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
  13. The process of converting data into a secret code to prevent unauthorized access.
  14. Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
  1. Software designed to detect, prevent, and remove malicious programs from your computer or network.
  2. Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
  3. Any potential danger or risk that could exploit vulnerabilities in a system or network.
  4. Malicious software designed to harm or exploit devices, systems, or networks.
  5. Breach An incident where confidential data is accessed or disclosed without authorization.
  6. Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
  7. A security vulnerability that is unknown to the software maker and has no fix or patch available.
  8. Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
  9. Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
  10. A copy of important data or files that can be restored in case of loss, damage, or attack.
  11. (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.

25 Clues: A fix or update to software that addresses security vulnerabilities or bugs.Malicious software designed to harm or exploit devices, systems, or networks.The process of converting data into a secret code to prevent unauthorized access.Any potential danger or risk that could exploit vulnerabilities in a system or network....