cyber security Crossword Puzzles
Family 2024-01-10
26 Clues: Care • Love • Grow • Face • Core • Build • Learn • Family • Values • Social • Foster • Culture • Support • Empathy • Crucial • Respect • Teaches • Identity • Provides • Security • Preserves • Challenges • Traditions • Environment • Understanding • Bases/foundations
German homework/crossword 2024-11-21
20 Clues: - mood • - brain • - health • - answer • - reason • - to hit • - economy • - to dive • - Religion • - to crawl • - to catch • - to vault • - advantage • - to measure • - environment • - to deliver • - safety, security • - to shake/jiggle • - justice, fairness • - strenuous, exhausting
Test Your Risk Vocabulary 2021-09-01
24 Clues: Strain • Burden • Payment • Profits • Average • Oversight • Guarantee • Alertness • Adherence • Evaluation • Divergence • Protection • Likelihood • Supervisory • Extenuation • Risk grading • Vulnerability • Precautionary • Deterioration • Ratings Agency • Debt instrument • Unpredictability • Financial wealth • Conscientiousness
Unit 2 - The Human Factor 2025-03-14
Across
- A social engineering tactic where an attacker fabricates a story to obtain information.
- A set of rules that an organization follows to maintain security.
- False alarms or fake warnings designed to trick people into taking action.
- A documented series of steps to follow for security practices.
- Phishing attacks carried out via SMS text messages.
- Manipulating people into revealing confidential information.
- Unauthorized access to or manipulation of computer systems or networks.
- A cyberattack where fraudulent emails trick users into revealing sensitive data.
Down
- Malicious software designed to frighten users into downloading harmful programs.
- A tactic where an attacker manipulates a target into seeking their help, ultimately gaining access to sensitive information.
- Gaining unauthorized access to a secured area by following an authorized person.
- A targeted phishing attack aimed at a specific individual or organization.
- The act of spying on someone’s screen or keyboard to obtain sensitive information.
- The act of searching through trash to find confidential information.
- A social engineering attack that lures victims with a tempting offer to steal their information.
- To reduce the impact or risk of a security threat.
- Abbreviation for gathering publicly available information to analyze a target.
- Phishing attacks conducted over voice calls.
- A phishing attack targeting high-profile executives or important individuals.
19 Clues: Phishing attacks conducted over voice calls. • To reduce the impact or risk of a security threat. • Phishing attacks carried out via SMS text messages. • Manipulating people into revealing confidential information. • A documented series of steps to follow for security practices. • A set of rules that an organization follows to maintain security. • ...
Crossword 2020-12-18
Zoom Culture 2021-10-12
Information Security 2022-02-11
Across
- This filter blocks Java, so you may not be able to access Java content on websites.
- protection helps protect your local network from the Internet.
- The VPN client(s) on the local network can establish a PPTP VPN tunnel through the Router.
- This filter blocks cookies, which are data stored on your computer and used by websites when
- interact with them.
Down
- This filter blocks ActiveX, so you may not be able to access ActiveX content on websites.
- The VPN client(s) on the local network can establish an L2TP VPN tunnel through the Router.
- The VPN client(s) on the local network can establish an IPSec VPN tunnel through the Router.
- This filter blocks the use of Internet proxy servers.
9 Clues: interact with them. • This filter blocks the use of Internet proxy servers. • protection helps protect your local network from the Internet. • This filter blocks Java, so you may not be able to access Java content on websites. • This filter blocks ActiveX, so you may not be able to access ActiveX content on websites. • ...
Security Crossword 2015-06-22
9 Clues: ...and report • Patrol Officers do this • City sirens warn of this • These may save your life • For an injury, call this team • highest temperature of the day • "Mr. Brown will not be in today" • When the fire system sounds, do this • if you don't have a valid "BI", you get this
IT-Security 2020-03-25
Across
- Überbegriff für verschiedene Typen von unerwünschten Programmen
- Forscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malware
- Eine Methode, über gefälschte Webseite, E-Mails und Kurznachrichten an persönliche Daten eines Internet-Benutzers zu gelangen und damit Identitätsdiebstahl zu begehen.
- braucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk
Down
- anderes Wort für Computerkriminalität bzw. Internetkriminalität
- Ist in einem scheinbar nützlichen Programm versteckt und kann z. B. Passwörter auslesen oder auf Daten im Netzwerk zugreifen und diese an den Auftrageber der Malware übermittteln.
- Sicherheitskopien
- kleine Textdateien, die Informationen über eine besuchte Webseite auf dem PC des Benutzers abspeichern
- unerwünschte Werbemails
9 Clues: Sicherheitskopien • unerwünschte Werbemails • anderes Wort für Computerkriminalität bzw. Internetkriminalität • Überbegriff für verschiedene Typen von unerwünschten Programmen • Forscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malware • braucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk • ...
Security Crossword 2022-07-27
Across
- You find the Bomb Threat Checklist, and Extortion Checklist documents in here.
- Lock the branch entry/exit doors, relocking after each member leaves. Do not admit anyone into branch after close
- when transaction(s) are done within the same day over 10k.
- Alt+Shift+I
Down
- While opening branch you carry this through the branch while doing walk through.
- Certain duties require atleast 2 employees to do such example: Night drop and opening vault.
- You find the Robbery Checklist, Robbery Response, and Robbery witness documents in here.
- should inspect the branch exterior for signs of forced entry, suspicious vehicles or people
- a report you make if you are suspicious of any activity on member's account
9 Clues: Alt+Shift+I • when transaction(s) are done within the same day over 10k. • a report you make if you are suspicious of any activity on member's account • You find the Bomb Threat Checklist, and Extortion Checklist documents in here. • While opening branch you carry this through the branch while doing walk through. • ...
FOOD SECURITY 2024-10-17
Across
- suffering from lacking proper nutrition
- - This happens when people do not have enough food to eat.
- words)the lack of access to clean water
- Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
Down
- - The type of farming that grows crops without chemicals.
- Most devastating famine that occurred in India was the FAMINE OF _____ in 1943.
- 281 million undernourished people live on this continent.
- - The practice of catching fish for food.
- - The storage place where food is kept to be sold or given.
9 Clues: suffering from lacking proper nutrition • words)the lack of access to clean water • - The practice of catching fish for food. • - The type of farming that grows crops without chemicals. • 281 million undernourished people live on this continent. • - This happens when people do not have enough food to eat. • - The storage place where food is kept to be sold or given. • ...
Security Awareness 2024-10-03
Across
- A type of software that blocks unauthorized access to a network (9 letters)
- A secret word or phrase used to gain access to a system (8 letters)
- Software that detects and removes malware (10 letters)
- A fix to software that addresses a vulnerability or flaw (5 letters)
Down
- A program designed to damage or disrupt a computer (5 letters)
- The process of converting information into code to prevent unauthorized access (10 letters)
- A technique used to steal sensitive information by pretending to be a trustworthy source (8 letters)
- A security measure that requires two forms of verification to access an account (3 letters)
- Unsolicited or unwanted email, often used for scams (4 letters)
9 Clues: Software that detects and removes malware (10 letters) • A program designed to damage or disrupt a computer (5 letters) • Unsolicited or unwanted email, often used for scams (4 letters) • A secret word or phrase used to gain access to a system (8 letters) • A fix to software that addresses a vulnerability or flaw (5 letters) • ...
Food security 2024-11-28
Across
- Aid provided to countries experiencing famine.
- The loss of food during production or distribution.
- The process of converting agricultural products into packaged food.
- Government-subsidized programs to provide basic food.
Down
- Crops specifically grown to combat hunger, like fortified rice.
- A farming system where trees are integrated with crops.
- A harmful practice of overusing soil nutrients.
- Farming that avoids deforestation.
- A disaster leading to the collapse of food production.
9 Clues: Farming that avoids deforestation. • Aid provided to countries experiencing famine. • A harmful practice of overusing soil nutrients. • The loss of food during production or distribution. • Government-subsidized programs to provide basic food. • A disaster leading to the collapse of food production. • A farming system where trees are integrated with crops. • ...
Food security 2024-12-17
9 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Small animal raised for meat and fur • Animal raised for wool, meat and milk • Poultry raised for eggs meat and feathers • Pollinator that plays a critical role in food production
Security Awareness 2025-12-22
Across
- keep it secret
- Physical security breach by skipping card readers.
- Alternate for Irrelevant Junk mail.
- Hardware that filters data packets through network.
Down
- Wireless technology in mobile phones.
- 7 letter word. I allow only humans and not robots by protecting sites and fake accounts.
- World's First Antivirus program.
- I will call & trick you by my speaking skills, emotionally touch your heart and take your personal information.
- An animal with no limbs but can crawl.
9 Clues: keep it secret • World's First Antivirus program. • Alternate for Irrelevant Junk mail. • Wireless technology in mobile phones. • An animal with no limbs but can crawl. • Physical security breach by skipping card readers. • Hardware that filters data packets through network. • 7 letter word. I allow only humans and not robots by protecting sites and fake accounts. • ...
CIS Controls & Technicians 2024-05-14
Across
- track and manage hardware devices
- protect the organization's info through measures such as encryption and access controls
- educate users on safe-handling of information
- regularly test the security controls by simulating attacks on systems and networks
- manage the security life cycle of acquired software
Down
- only authorized to be installed and executed
- continuously acquire, assess and take action
- defense of this is to control the installation, spread and execution of malicious code
- part of inventory and control of enterprise assets
- protect the organization's info, by developing and implementing an incident response capability
- test of security controls to ensure they are effective and updated as needed
11 Clues: track and manage hardware devices • only authorized to be installed and executed • continuously acquire, assess and take action • educate users on safe-handling of information • part of inventory and control of enterprise assets • manage the security life cycle of acquired software • test of security controls to ensure they are effective and updated as needed • ...
E-safety 2020-10-15
8 Clues: how you feel • how you may feel • who you could tell • who you could go to • dont make it your real name • a mean person who hides behind a screen • what you need to do to keep you information safe • what everyone uses to interact with people virtually
Encryption 2022-01-10
Across
- Decoding machine used at Bletchley Park during
- an algorithm for performing encryption and
- appear
- Type of analysis used to determine how often
Down
- Code used during WW1/2 comprising dots and dashes
- Organisation responsible for UK cyber defence
- Person responsible for the first substitution cipher
- an encryption method used by the ancient
8 Clues: appear • an encryption method used by the ancient • an algorithm for performing encryption and • Type of analysis used to determine how often • Organisation responsible for UK cyber defence • Decoding machine used at Bletchley Park during • Code used during WW1/2 comprising dots and dashes • Person responsible for the first substitution cipher
BULLYING 2024-08-10
Across
- bullying perundungan pada sosial media
- Orang yang meminta uang dengan disertai ancaman adalah
- kata bully berasal dari bahasa
- bullying dapat menyebabkan
Down
- tindakan yang membully disebut dengan
- bullying dalam bentuk perkataan disebut dengan
- Pembullyan dalam bentuk kekerasan, seperti menjambak, memukul, dan menendang adalah bentuk bullying
- perubahan suasana hati disebut dengan
8 Clues: bullying dapat menyebabkan • kata bully berasal dari bahasa • tindakan yang membully disebut dengan • perubahan suasana hati disebut dengan • bullying perundungan pada sosial media • bullying dalam bentuk perkataan disebut dengan • Orang yang meminta uang dengan disertai ancaman adalah • ...
Chapter 14: Taxes 2017-04-26
Across
- (2) form used to pay taxes
- amounts subtracted from income
- (2) taxable income, property, good or service
- imported goods tax
- government income from taxes
- (2) tax paid upon purchasing a good or service
- spending levels can be adjusted
- tax payments before receiving pay
- pays for government programs and services
Down
- example: Social Security and Medicare
- programs you must qualify for to receive services
- (2) example: sales tax
- funds Medicare and Social Security
13 Clues: imported goods tax • (2) example: sales tax • (2) form used to pay taxes • government income from taxes • amounts subtracted from income • spending levels can be adjusted • tax payments before receiving pay • funds Medicare and Social Security • example: Social Security and Medicare • pays for government programs and services • (2) taxable income, property, good or service • ...
class puzzle 2023-08-28
Across
- short for "malicious software" and covers threats such as viruses, worms, Trojanhorses, ransomware and the numerous other programs used by hackers to gainaccess to or damage sensitive information on a computer
- intent of doing harm
- gap or weakness which undermines an organization’s security efforts
- making sure a person is who they say they are
- rights an individual or organization has over information and how it is used
- procedure used to determine user privileges or access levels to the system
Down
- Virus macros which have been programmed to carry out malicious intent
- how information is protected
- information or data which can be accessed when needed
- state of being complete or uncorrupted
- calculated assessment of potential threats to an organization’s security
- network of computers and devices managed as a unit with the same proceduresand rules
- requirement of being private or secret
13 Clues: intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • information or data which can be accessed when needed • gap or weakness which undermines an organization’s security efforts • ...
Airport 2024-06-12
Across
- Before security, put your __________ bag.
- To spend time looking at items in the airport shops, you_________.
- To give extra money for a heavy bag, you need to ______________.
- To make sure your shoes are secure, ______ your shoelaces.
- To go through security, you need to ______________ the scanner.
- If your baggage is too heavy, it is called ______________.
Down
- To arrive at the airport early so you don't ______________.
- To wait in line with other passengers, you need to ______________.
- To check the flight times, look at the ______________.
- Security staff might ____ you ____ for safety.
10 Clues: Before security, put your __________ bag. • Security staff might ____ you ____ for safety. • To check the flight times, look at the ______________. • To make sure your shoes are secure, ______ your shoelaces. • If your baggage is too heavy, it is called ______________. • To arrive at the airport early so you don't ______________. • ...
DevSecOps Crossword 2024-04-26
Across
- Continuous ..... is a development practice that requires team member to integrate code into repository at least once a day
- ..... Engineer enables the developer with automation and CI/CD pipeline
- Practices that emphasize security as code and everyone is responsible for security
- Activity or anything that does not add value
- The most popular Agile Framework
- One of the most popular DevSecOps orchestration tool
Down
- Simple,lightweight and loosely coupled architectural style
- Agile Methodology that introduces Continuous Integration
- White box security scan approach in DevSecOps pipeline
- Team to ensure service reliability, introduced by Google in 2003
10 Clues: The most popular Agile Framework • Activity or anything that does not add value • One of the most popular DevSecOps orchestration tool • White box security scan approach in DevSecOps pipeline • Agile Methodology that introduces Continuous Integration • Simple,lightweight and loosely coupled architectural style • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
Bullying 2022-06-06
Across
- a single significant act or a pattern of acts by one or more students
- intentional repeated feels proud
- using threats
- use of any electronic means to hurt someone
- excluding others from a group
- identity of the person who bullies can be kept secret.
Down
- sending pictures messages information using electronic devices
- accidental occasional feels remorse
- secrecy of internet encourages those who might not otherwise bull
- pointing out differences
- any physical contact that hurts a person
- name calling jokes offensive remarks
12 Clues: using threats • pointing out differences • excluding others from a group • intentional repeated feels proud • accidental occasional feels remorse • name calling jokes offensive remarks • any physical contact that hurts a person • use of any electronic means to hurt someone • identity of the person who bullies can be kept secret. • ...
Future of Sport 2025-08-21
Across
- Underground venue for 60-degree Wimbledon (7)
- Mechanical horses in volcano racing (5)
- What gravity becomes in 2050 tennis matches (4)
- Time-traveling referees work across these (7)
- Cristiano's six identical fashion moguls (6)
- Virtual boxer you can't actually touch (8)
Down
- Flying robots that join human footballers on the pitch (6)
- Brain-computer links for drone pilots (6)
- Ronaldo-Charlie's business speciality (7)
- Wearable flight device for cricket batsmen (7)
- Transparent beings in boxing rings (6)
11 Clues: Transparent beings in boxing rings (6) • Mechanical horses in volcano racing (5) • Brain-computer links for drone pilots (6) • Ronaldo-Charlie's business speciality (7) • Virtual boxer you can't actually touch (8) • Cristiano's six identical fashion moguls (6) • Underground venue for 60-degree Wimbledon (7) • Time-traveling referees work across these (7) • ...
Cyber Safety 2020-08-21
Across
- detects viruses and eliminates them before they get into you computer.
- software that is made to damage or gain unauthorized access to a computer
- folders within a cite which holds your information (username, password, etc.) about that website without taking other personal information.
Down
- a type of software that allows another user to have information about another computer using a hard drive.
- bad mails that a made for taking information about your passwords, credit card number, and especially to get into you bank account.
- system that blocks not wanted users and mails from getting your information.
- a sickness for a computer. When received one, you can’t get into your computer.
- junk mail that can also be called “unwanted mail”
8 Clues: junk mail that can also be called “unwanted mail” • detects viruses and eliminates them before they get into you computer. • software that is made to damage or gain unauthorized access to a computer • system that blocks not wanted users and mails from getting your information. • a sickness for a computer. When received one, you can’t get into your computer. • ...
cyber acoso 2021-04-06
8 Clues: alguien se mata • hacer daño a alguien • lo que tú piensas de ti • pensar que no hay nadie a nuestro lado • alguien hace algo que supera los limites • ser rudos tanto física como psicológicamente • intentar entender lo que alguien piensa y siente • un adulto intenta contactar un menor con intento sexual
Cyber Law 2021-09-05
Across
- cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- ____Regulation works by utilising feedback
- according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
- wrote Code and Other Laws of Cyberspace
- cyber____
- digital___ is the productivity platform that some experts regard as the third industrial revolution
- Shawn Fanning created the____
- the conversion of analogue data into digital form
8 Clues: cyber____ • Shawn Fanning created the____ • wrote Code and Other Laws of Cyberspace • ____Regulation works by utilising feedback • the conversion of analogue data into digital form • digital___ is the productivity platform that some experts regard as the third industrial revolution • ...
Cyber Safety 2022-02-02
8 Clues: SHOT MESSAGE • SMALL TEXT FILES • HARASS ON INTERNET • FILE THAT STEAL OR INFECT • SOCIAL NETWORK FOR BUSINESS • UNIQUE ADDRESS OF YOUR DEVICE • ATTACK ON INDIVIDUAL OR GROUP • ATTACK THAT PREVENT LEGITIMATE USERS
Cyber Safety 2021-09-16
cyber safety 2019-09-26
8 Clues: fish • scam scam • URL www.pizza.com • media instagram snapchat • information it belongs to your • flag feeling this feels wrong • balance every once and awhile get off your phone • get off online identity theft stealing something
CYBER BULLYING 2015-02-18
8 Clues: Οι θύτες έχουν κακή ... • Διαταράσσεται η ... των εφήβων • Κυριαρχεί η ... στον εκφοβισμό • Υπάρχει λεκτική και σωματική ... • Γίνεται ανάμεσα σε δύο ανθρώπους ... • Πώς ονομάζεται το άτομο που εκφοβίζει; • Κυκλοφορούν κακά ... βασιζόμενα στο θύμα • Πώς ονομάζεται το άτομο που εκφοβίζεται ;
CYBER CRIME 2022-10-10
Across
- a person who has committed a crime
- a technique used by hackers to redirect users to false websites without their knowledge.
- a verb meaning to gain unauthorized access into a computer system
- a horse malware
Down
- the process of proving that something is real
- a type of social engineering attack often used to steal user data
- intrusive software that is designed to damage and destroy computers
- an expression of intention to damage or to harm
8 Clues: a horse malware • a person who has committed a crime • the process of proving that something is real • an expression of intention to damage or to harm • a type of social engineering attack often used to steal user data • a verb meaning to gain unauthorized access into a computer system • intrusive software that is designed to damage and destroy computers • ...
Cyber Crime 2024-05-29
8 Clues: = not legal • = stealing something • You need this on your devices • It can happen to your accounts • to bother someone in a bad way • Pretending to be a real business • Holding your information for money • Pretending to be someone else for bad reasons
Cyber wellness 2023-02-01
8 Clues: never reveal your p______ • dont share your i__________ • think before you p______ online • be safe while your playing o_____ • Dont tell random people your a______ • do not leak your p_______ information • R______ other peoples opinions when online • Tell an adult if someone is c___________ you
cyber safety 2023-05-22
Across
- Repeatedly sending nasty, mean, and insulting messages.
- Online fights using electronic messages with angry and vulgar language.
- Talking someone into revealing secrets or embarrassing information, then sharing it online.
- Sharing someone's secrets or embarrassing information or images online.
- Repeated, intense harassment and denigration that includes threats or creates significant fear.
Down
- Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
- Intentionally and cruelly excluding someone from an online group.
- "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
8 Clues: Repeatedly sending nasty, mean, and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Sharing someone's secrets or embarrassing information or images online. • Online fights using electronic messages with angry and vulgar language. • ...
Cyber Safety 2024-10-09
Across
- refers to the responsible and ethical behaviour of individuals when using digital technologies and the internet.
- means being safe and responsible online.
- It refers to the buying and selling of goods using electronic means, like online shopping.
- It refers to the proper and respectful behaviour when using electronic devices and interacting with others online.
Down
- This means being able to fully participate in society using electronic devices and the internet.
- It is the process of learning and teaching about technology and how to use it effectively.
- These are the rules and responsibilities that apply to our actions and behaviour in the digital world.
- Continuous and spreading effect of an event or an action.
8 Clues: means being safe and responsible online. • Continuous and spreading effect of an event or an action. • It is the process of learning and teaching about technology and how to use it effectively. • It refers to the buying and selling of goods using electronic means, like online shopping. • ...
Cyber Attack 2024-12-11
Across
- A type of malicious software that can spread between computers and damage data
- software that cybercriminals use to steal data, damage computers, or destroy systems. It's short for "malicious softwar
- social engineering attack that uses fake mobile text messages to trick people. The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind text messages—and “phishing”.
- Prevents access to files, systems, or networks, and demands payment to return them
Down
- Secretly monitors a user's activities and reports them to the software's author.
- are several types of phishing attacks, including:
- one that uses fraudulent emails, text messages, phone calls, or websites to trick people into sharing sensitive data, downloading malware, or otherwise exposing themselves to cybercrime. Phishing attacks are a form of social engineering.
- Displays unwanted advertisements and pop-ups, and can track online behavior.
8 Clues: are several types of phishing attacks, including: • Displays unwanted advertisements and pop-ups, and can track online behavior. • A type of malicious software that can spread between computers and damage data • Secretly monitors a user's activities and reports them to the software's author. • ...
Cristo Rey Crossword 2018-06-21
Across
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- How many credits do you need to graduate from Cristo Rey? (write out number)
- Which Cristo Rey sports team won medals at Florida National Competition?
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- What is the title of the football team’s hype video on Marist School’s website?
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- How many Cristo Rey students are part of a “team” at their job? (write out number)
Down
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- What type of classes does Northside Hospital offer?
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- What percent of students at Cristo Rey get accepted to college after graduation?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
Cristo Rey Crossword 2018-06-21
Across
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- What is the title of the football team’s hype video on Marist School’s website?
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What type of classes does Northside Hospital offer?
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- Which Cristo Rey sports team won medals at Florida National Competition?
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
Down
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- What percent of students at Cristo Rey get accepted to college after graduation?
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- How many Cristo Rey students are part of a “team” at their job? (write out number)
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
Cyber Safety 2019-01-25
Across
- Garfield is a large ____ that knows how to stay safe online.
- Do not share this information about where you live with strangers.
- Nermal loves to play these online.
- Always tell your ____ what you are doing online.
Down
- Do not share your full ____ online. Use a nickname, instead.
- Never share this secret code with anyone.
- Your favorite TV ____ are okay to share online.
- Only give your ____ number to family and friends you know in real life.
8 Clues: Nermal loves to play these online. • Never share this secret code with anyone. • Your favorite TV ____ are okay to share online. • Always tell your ____ what you are doing online. • Garfield is a large ____ that knows how to stay safe online. • Do not share your full ____ online. Use a nickname, instead. • ...
Cyber Info 2020-08-10
Across
- social media app where you can post pictures
- how people view you and what they associate you with
- instagram for your parents
- app where you can give your opinions
Down
- when you put out too much information online
- snap your friends everyday to start a streak
- charli is queen
- the mark you leave behind when doing anything online
8 Clues: charli is queen • instagram for your parents • app where you can give your opinions • when you put out too much information online • snap your friends everyday to start a streak • social media app where you can post pictures • the mark you leave behind when doing anything online • how people view you and what they associate you with
Cyber Safety 2022-01-11
Across
- Always follow your school's______ and policies about Internet use.
- Never give out your name, address, telephone number, password, school name, parents' names, pictures of yourself, credit card numbers, Social Security number, or any other personal ______ to others
- Talk to a trusted adult if you or someone you know is being___
- Use hard-to-guess ______and keep them secret–even from your friends.
Down
- Using the Internet, cellphones, or other technology to send or post text or images to hurt or embarrass another person is called ______
- filesharing could be used by others to infect your computer with a ______
- make sure that your family has installed a _____ to keep your computer safe from hackers
- Don't share access to your computer with ______.
8 Clues: Don't share access to your computer with ______. • Talk to a trusted adult if you or someone you know is being___ • Always follow your school's______ and policies about Internet use. • Use hard-to-guess ______and keep them secret–even from your friends. • filesharing could be used by others to infect your computer with a ______ • ...
Cyber Safety 2024-08-06
8 Clues: - Bullying online • - Being safe online • - Protecting systems • - Supporting bullies • - Stands up against bullies • - Connected computers share resources • - Putting agressive presure on someone • - Sites that are accessed using a web browser
Cyber ethics 2025-06-14
Across
- A legal right granted by the law to the creator for his original work.
- Purchasing a single lisenced copy of the software and loading it into several computers.
- Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
- An illegal intrution into a computer system Or network.
- Vital information resources under seize.
- An act of sending to an user, misleading him to belive that it is from a trusted organisation.
- Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
- Unwanted bulk emails that comes from unknown sources.
8 Clues: Vital information resources under seize. • Unwanted bulk emails that comes from unknown sources. • An illegal intrution into a computer system Or network. • A legal right granted by the law to the creator for his original work. • Purchasing a single lisenced copy of the software and loading it into several computers. • ...
IS and BC Cross-Up Crossword 2021-10-26
Across
- Your ________ device often contains more personal information than any other source.
- BCP's main focus is not preventing incidents but rather the __________ from it.
- A major business disruption; the earth moves, shifts and shakes.
- Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
- The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
- _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
- sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
- __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
- Never use your TTUTC________address for personal usage.
- Sending an email, posting photos on a social media site and using your webcam.
- The global system of interconnected computer networks that link billions of devices.
- a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
- This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
- The art of manipulating people to get access to sensitive information (two words.
- conforming to a rule, such as a specification, policy, standard or law.
- A collection of computers that are controlled on the same network.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- The staff and the customers are considered.
- The UTC hotsite is located here.
- This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
- Facebook and TikTok are types of ________ (two words).
Down
- A crime where a computer is the object of the crime or is used as a tool to commit an offense.
- someone who seeks and exploits weaknesses in a computer system or computer network.
- Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
- A technology that allows us to access our files through the internet from anywhere in the world.
- When calls are made by social engineering, they are called _____ .
- Choose a password that is easy for you to ____________ but hard for you someone to guess.
- information such as legal documents and contracts must be classified as __________information. - (restricted)
- A piece of code put in to correct an error.
- Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
- Always _______your computer when you leave your desk.
- Where do UTC employee report their ICT issues (three words).
- My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
- The address of a webpage. Check the validity of it before clicking on it (acronym).
- Usually comprises the display device of the computer.
- An asset like other essential business assets in the Corporation.
- Who can be the target of a cyber attack.
- A concept where all things are connected to the internet; household items usually (three words).
- Equipment that offers short term protection against power surges and power outages (acronym).
- __________ Edwards is the Recovery Director and is in charge of BCP.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
- The process of adding allowed programs to a list is called_________.
- You can call 999, 881 or 990 for _______ services.
- “ This too good to be true email gives off a false sense of ______”.
- Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
- A list of entities that are blocked or denied privileges or access.
- The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
48 Clues: The UTC hotsite is located here. • Who can be the target of a cyber attack. • A piece of code put in to correct an error. • The staff and the customers are considered. • You can call 999, 881 or 990 for _______ services. • Always _______your computer when you leave your desk. • Usually comprises the display device of the computer. • ...
INFORMATION TECHNOLOGY 2021-02-09
Across
- any number of computers and devices joined together by a communications link
- Internet Service Provider
- Career and Technical Education
- Hypertext Markup Language
- physical components of a computer
- Operating System
- fake emails to try and get personal information
- Local Area Network, single building or location
- 2-year college degree or training
- malicious code that secretly watches what you send over the internet
Down
- writes code to create software programs
- 4-year college degree
- programs that make a computer useful, Word, Excel, PowerPoint, etc.
- Wide Area Network, connects computer devices over dispersed locations
- pertaining to the world wide web culture
- Wireless LAN, radio, microware or infrared links take the place of physical cables
16 Clues: Operating System • 4-year college degree • Internet Service Provider • Hypertext Markup Language • Career and Technical Education • physical components of a computer • 2-year college degree or training • writes code to create software programs • pertaining to the world wide web culture • fake emails to try and get personal information • ...
Tugas ppkn 2023-11-02
Across
- UU no 11 tahun 2008 berisi tentang informasi dan transaksi...
- kejahatan yang menyalahgunakan teknologi internet
- salah satu sarana efektif untuk mencegah dampak negatif kemajuan IPTEK dengan penanaman nilai-nilai
- Ilmu pengetahuan dan teknologi
- pembuat pesawat Indonesia
- Candi yang berada di Jawa tengah
- 1984 Apple menghasilkan komputer
Down
- sebelum ditemukan orang zaman dulu berkomunikasi melalui
- Lembaga ilmu pengetahuan Indonesia
- Bidang yang berkaitan dengan pemerintahan dan kebijakan pemerintah
- warga yang mulai mengembangkan sistem pertanian belasan tahun yang lalu
- Sistem Komunikasi Satelit Domestik
- salah satu bukti nyata adanya kemudahan berbelanja melalui toko
- Meningkatkan devisa negara termasuk dalam bidang
- Johannes Gutenberg pada 1440 mulai mengembangkan mesin
- siapa yang mengeluarkan komputer seri 650dan700
16 Clues: pembuat pesawat Indonesia • Ilmu pengetahuan dan teknologi • Candi yang berada di Jawa tengah • 1984 Apple menghasilkan komputer • Lembaga ilmu pengetahuan Indonesia • Sistem Komunikasi Satelit Domestik • siapa yang mengeluarkan komputer seri 650dan700 • Meningkatkan devisa negara termasuk dalam bidang • kejahatan yang menyalahgunakan teknologi internet • ...
Types of Markets 2022-01-25
Across
- The ___(issuing stocks for the first time) typically occurs in a primary market.
- Primary and secondary ___ are sold in a primary market.
- Zero-coupon bonds do not earn ____ within the bond market.
- Within bond markets in the US, bonds have a ___ value of $1000.
- ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
- The most populated exchange in the U.S who owns trading rights with listed companies
- Future markets help protect against ___ of uncertain markets.
- In a secondary market shares of stock are ___ to the public
Down
- ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
- buy orders at a ____ price.
- Corporations issue debt securities to be traded within ____ markets.
- A security is sold in a ___ market when it is first issued.
- ____ exchanges are markets that do not have a location.
- The purpose of trading within security markets is
- Raising capital within public and private markets is a goal within the ___ market.]
- Who must register bonds within the bond market?
16 Clues: buy orders at a ____ price. • Who must register bonds within the bond market? • ____ exchanges are markets that do not have a location. • The purpose of trading within security markets is • Primary and secondary ___ are sold in a primary market. • Zero-coupon bonds do not earn ____ within the bond market. • ...
Cyber Kindness Week 2024-04-12
Across
- Focusing on the good in people and situations.
- Providing motivation and uplifting words.
- Being open-minded and empathetic.
- Giving without expecting anything in return.
- Working together for common goals.
- Understanding others' feelings.
Down
- Showing care and concern.
- Thinking about how your actions affect others.
- Showing appreciation for others' kindness.
- Valuing others' opinions and boundaries.
- Offering assistance when needed.
- Showing behaviour that is respectful and considerate of other people.
12 Clues: Showing care and concern. • Understanding others' feelings. • Offering assistance when needed. • Being open-minded and empathetic. • Working together for common goals. • Valuing others' opinions and boundaries. • Providing motivation and uplifting words. • Showing appreciation for others' kindness. • Giving without expecting anything in return. • ...
FNAF 2024-03-28
Across
- What do you use to watch the animatronics?
- The ____ of 1987
- Who serves ice cream?
- FNAF___ was Scotts most controversial FNAF game.
- Old Man ____ (he fishes)
- Who is the purple guy?
- Which character has a cupcake?
Down
- Who is the security guard in Security Breach?
- Who is the pirate?
- Who wants to be beautiful?
- Who originally plays the electric guitar?
- Which child possesses Golden Freddy?
- What is the name of William Afton's daughter?
13 Clues: The ____ of 1987 • Who is the pirate? • Who serves ice cream? • Who is the purple guy? • Old Man ____ (he fishes) • Who wants to be beautiful? • Which character has a cupcake? • Which child possesses Golden Freddy? • Who originally plays the electric guitar? • What do you use to watch the animatronics? • Who is the security guard in Security Breach? • ...
"The Tale of Jenny and the Coffee Juggler" 2024-09-11
8 Clues: What Carl really wants. • A classic security no-no. • What Carl forgot to show. • What you need to ask for ID. • What you're trying to prevent. • What Jenny's sticking to like glue. • How Jenny feels when enforcing security. • That feeling you should ignore when enforcing security.
HistoryPuzzlebyLP 2022-01-14
Across
- Abbreviation for Public Works Act
- 2nd day of the week
- last name of the 32nd US president
- AKA National Labor Relations Act
- getting a loan then investing which is known as "_____ on margin"
- "National ______ Act"
- "____ Cabinet" & "____ Tuesday" (one word)
- Wife of the 32nd US president's first name
- the beginning of a politician's term in office (____ 100 days)
Down
- the first word in AAA (____ Adjustment Act)
- Organization that provides assistance & relief
- Jobless WW1 veterans organized a group called
- Series of programs often summed up by the the three R's which was enacted by President Roosevelt
- "Tennessee _____ Authority" (TVA)
- "____ security" + ism
- "Social _____ Act"
16 Clues: "Social _____ Act" • 2nd day of the week • "____ security" + ism • "National ______ Act" • AKA National Labor Relations Act • Abbreviation for Public Works Act • "Tennessee _____ Authority" (TVA) • last name of the 32nd US president • "____ Cabinet" & "____ Tuesday" (one word) • Wife of the 32nd US president's first name • the first word in AAA (____ Adjustment Act) • ...
Cristo Rey Crossword 2018-06-21
Across
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- Which Cristo Rey sports team won medals at Florida National Competition?
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- What is the title of the football team’s hype video on Marist School’s website?
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What percent of students at Cristo Rey get accepted to college after graduation?
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- What type of classes does Northside Hospital offer?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Cristo Rey Crossword 2018-06-21
Across
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- What type of classes does Northside Hospital offer?
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- What is the title of the football team’s hype video on Marist School’s website?
- Which Cristo Rey sports team won medals at Florida National Competition?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- How many credits do you need to graduate from Cristo Rey? (write out number)
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- What percent of students at Cristo Rey get accepted to college after graduation?
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Sicherheit im Netz 2025-04-22
Across
- Beispiel für Cyber-Mobbing
- Viren infizieren deinen Computer.
- Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?
- Das häufigste Mittel Menschen zu manipulieren.
Down
- Ein Grund warum gemobbt wird.
- Was solltest du bei unangemessenen Inhalten tun?
- Wie nennt man Mobbing im Internet?
- Mache ... von unangenehmen Nachrichten/Bildern oder Chats.
8 Clues: Beispiel für Cyber-Mobbing • Ein Grund warum gemobbt wird. • Viren infizieren deinen Computer. • Wie nennt man Mobbing im Internet? • Das häufigste Mittel Menschen zu manipulieren. • Was solltest du bei unangemessenen Inhalten tun? • Mache ... von unangenehmen Nachrichten/Bildern oder Chats. • Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?
Practica 8A 2023-02-14
17 Clues: aisle • delay • pilot • flight • arrival • tourist • to last • customs • airport • to board • suitcase • passenger • reservation • customs officer • to check (luggage) • security checkpoint • to inspect, to search
Chemical Process Engineer 2023-09-17
17 Clues: care • unit • device • analyse • outcome • security • fluently • timetable • procedure • relevance • adjustment • improvement • arrangement • supervision • solving issues • a sort of variation • you receive it at work
Jordan's Crossword puzzle 2018-11-18
Across
- demanding money for information
- let's attacker to secretly control the users infected computer
- small piece of software that corrupts devices
- the programs and other operating info used by a computer
- a type of software intended to damage or destroy
Down
- a necessity when hacking putting in a virus
- uses computer networks to duplicate itself
- it claims to be a game
- trying to get someone to reveal personal information
- denial of service
- attacks online
- repeatedly showing up on your screen
- kids can't fill this gap if it's too large
- attacks personal information; also the name of king of gods
- uses email addresses to replicate itself
15 Clues: attacks online • denial of service • it claims to be a game • demanding money for information • repeatedly showing up on your screen • uses email addresses to replicate itself • uses computer networks to duplicate itself • kids can't fill this gap if it's too large • a necessity when hacking putting in a virus • small piece of software that corrupts devices • ...
Networking Concepts & Cyber Ethics 2025-05-30
Across
- : We send and get messages here
- : We use this to click on computer
- : We should not share too many of these
- : We should be this when using internet
- : We must follow these when we use internet
- : It helps our phone or laptop to use internet
- : Word used for online world
- : We use this to visit websites
- : Kids play this on computer or phone
Down
- : We use this to study and play
- : We watch this on YouTube
- : We should keep this secret
- : We should only chat with real ____ online
- : Talking with friends using phone or computer
- : We should not share this with strangers online
15 Clues: : We watch this on YouTube • : We should keep this secret • : Word used for online world • : We use this to study and play • : We send and get messages here • : We use this to visit websites • : We use this to click on computer • : Kids play this on computer or phone • : We should not share too many of these • : We should be this when using internet • ...
Food Security 2022-07-08
Across
- liquid used to water plants and grow animals.
- to be able to get something
- the long term shifts in temperature and weather patterns.
- the state of being unable to buy necessary things to survive easily
Down
- art of growing crops and raising live stock.
- need for food.
- long time of dry weather and lack of water.
- when something can be accessed
- movement of food or goods from one area to another.
9 Clues: need for food. • to be able to get something • when something can be accessed • long time of dry weather and lack of water. • art of growing crops and raising live stock. • liquid used to water plants and grow animals. • movement of food or goods from one area to another. • the long term shifts in temperature and weather patterns. • ...
Security Issues 2019-01-29
Across
- Everything is backed up at once.
- In this type of backup, only two image files are required to restore the system!
- Faster backup time as only amended files need to be copied.
- A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
- Useful when backing up large amounts of data.
- Procedures or measures taken to ensure the safety of an organisation.
- This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
- This is information that is still important but it is not needed for immediate use.
- A very important element to a company/organisation!
9 Clues: Everything is backed up at once. • Useful when backing up large amounts of data. • A very important element to a company/organisation! • Faster backup time as only amended files need to be copied. • Procedures or measures taken to ensure the safety of an organisation. • In this type of backup, only two image files are required to restore the system! • ...
Information security 2020-08-26
Across
- potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
- Is the process of determining and assigning privileges to various resources, objects or data.
- the action of stopping any form of attack from happening.
- An internet scam that targets unsuspecting users through email.
- Is a technique that is used to exploit a vulnerability in any application attack gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Down
- a way of injecting malicious scripts into web pages.
- Are small files that Web sites put on your computer hard disk drive when you first visit.
- the process of tracking recording system activities and resource access.
- People, property, and information that needed to be protected asset Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
9 Clues: a way of injecting malicious scripts into web pages. • the action of stopping any form of attack from happening. • An internet scam that targets unsuspecting users through email. • the process of tracking recording system activities and resource access. • Are small files that Web sites put on your computer hard disk drive when you first visit. • ...
Security Department 2020-03-28
Across
- a person who monitor that the hotel areas are in order
- a metal box in which valuable objects are stored
- a objet that records images in or outside a building or in a public place, in order to prevent or help solve situation in the future
- a device such as a bell or siren that warns the people in a building that the building is on fire
- the careful watching of a person or place
- a place in a hotel where things that people have lost are stored
Down
- prepare the annual security program and inspect the operation of the alarms
- a person who guard employed by the hotel
- the crime of stealing from somewhere or someone
9 Clues: a person who guard employed by the hotel • the careful watching of a person or place • the crime of stealing from somewhere or someone • a metal box in which valuable objects are stored • a person who monitor that the hotel areas are in order • a place in a hotel where things that people have lost are stored • ...
Security percutions 2020-11-26
Across
- s a method of changing the original numbers and characters so that they are hidden or disguised. This is important if you are sending sensitive information.
- an expert at programming and solving problems with a computer
- It helps you prevent viruses
- is a law that determines whether people are allowed to access computers and modify the data on the computer system.
Down
- are used to check packets of data as they are received by a computer system from a network or the internet
- small malicious program that can alter and delete files
- An internet worm is a program that spreads across the internet by replicating itself on computers via their network connections.
- This type of malicious software pretends to be a useful program while secretly performing another function
- Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
9 Clues: It helps you prevent viruses • small malicious program that can alter and delete files • an expert at programming and solving problems with a computer • are used to check packets of data as they are received by a computer system from a network or the internet • ...
Security Matters 2023-10-02
Across
- You'll need a pole for this
- You might use a wasp sord to protect this
- If I were doing my Bruce Forsythe impression I would be?
- I might be called this on the golf course
- What caused the lockdowns
Down
- Holding clothes hostage
- Trying desperately to get a compliment
- IF you dont have this you might go to your cry suite
- Tin of processed meat
9 Clues: Tin of processed meat • Holding clothes hostage • What caused the lockdowns • You'll need a pole for this • Trying desperately to get a compliment • You might use a wasp sord to protect this • I might be called this on the golf course • IF you dont have this you might go to your cry suite • If I were doing my Bruce Forsythe impression I would be?
Social Security 2023-12-15
Across
- A federal insurance program
- You can earn a maximum of four of these per year and you need 40 to qualify for future Social Security benefits
- It’s the tax withheld from your wages that funds the Social Security and Medicare programs.
- Primary Insurance Amount
Down
- Social security has five types of __
- A joint federal and state program that helps with medical costs for people with low incomes and limited resources.
- Programs that provide monthly cash benefits to workers and their dependents when they retire, become disabled, or die
- An index prepared by the U. S. Department of Labor that charts the rise in costs for selected goods and services
- Documents you must submit to support a factor of entitlement or payment amount
9 Clues: Primary Insurance Amount • A federal insurance program • Social security has five types of __ • Documents you must submit to support a factor of entitlement or payment amount • It’s the tax withheld from your wages that funds the Social Security and Medicare programs. • ...
Security Meeting 2025-01-22
Across
- Found in the top drawer at LC desk.
- Opener does this in the morning to clear the branch.
- Number of hand-held alarms in branch.
- The robbery folder color.
Down
- "Alt +___ + I" is used in TCR during robbery.
- The Extortion folder color.
- The phone we use to call 911.
- Color of our "All Clear" sign.
- Where to meet during evacuation.
9 Clues: The robbery folder color. • The Extortion folder color. • The phone we use to call 911. • Color of our "All Clear" sign. • Where to meet during evacuation. • Found in the top drawer at LC desk. • Number of hand-held alarms in branch. • "Alt +___ + I" is used in TCR during robbery. • Opener does this in the morning to clear the branch.
Food Security 2024-10-17
10 Clues: What is AAY • what is NFSA • beneficiaries • how many years • How many kg/person • When it was started • What is the price/kg • how it is distributed • How many kgs under AAY • Introduced Pradhan Mantri Garib Kalyan Anna Yojana
BusFin Chapter 1 2024-08-19
Across
- a security that represents ownership in a company
- setting financial goals is the _____ step in the financial planning process
- a factor that affects financial activities; related to inflation
- supply and demand, risk, and liquidity are some factors that affect the value of this
- the ease in which an investment can be converted to cash
- when a country imports more than it exports
Down
- financial market where short-term debt is bought and sold
- what you give up by making a choice
- a debt security
- ________, investor funds, and borrowing are all sources of funds
- a commercial bank is an example of a ___________institution
11 Clues: a debt security • what you give up by making a choice • when a country imports more than it exports • a security that represents ownership in a company • the ease in which an investment can be converted to cash • financial market where short-term debt is bought and sold • a commercial bank is an example of a ___________institution • ...
Traveling 2023-03-16
16 Clues: voo • moeda • visto • troco • bagagem • chegadas • dinheiro • partidas • carteira • alfândega • vacinação • segurança • passaporte • casa de câmbio • caixa eletrônico • card cartão de crédito
Team FIRU 2021-07-20
Across
- Often found hanging in the office
- Make the best salad sandwich in Greenacre
- Town and former maximum security gaol
- Where is the big prawn?
- Must be checked and filed
- Provided the entertainment at the 1990 AFL grand final
- Has the odd drive by shooting
- Their job is to is to investigate and solve crime
Down
- Sang the song I'm too sexy?
- What do they call a quarter pounder with cheese in France?
- Famous Goulburn inmate
- Who opened the Big Merino in 1985?
- How many to a cell in Goulburn Maximum Security cells?
- Not in Northern Ireland
- Former FBEU secretary
- Rays favourite swear word?
16 Clues: Former FBEU secretary • Famous Goulburn inmate • Where is the big prawn? • Not in Northern Ireland • Must be checked and filed • Rays favourite swear word? • Sang the song I'm too sexy? • Has the odd drive by shooting • Often found hanging in the office • Who opened the Big Merino in 1985? • Town and former maximum security gaol • Make the best salad sandwich in Greenacre • ...
FNAF crossword 2024-04-05
Across
- Animatronics from security breach
- Animatronics from the second game
- Cheapest set of animatronics in pizzeria simulator
- Where is glamrock bonnie hidden in ruin
- What role do you play as in FNAF 1-3
- What suit does afton get springlocked in
- Where are you in FNAF 4
Down
- Animatronics from sister location
- Animatronics from the third game
- The most disregarded FNAF game
- Everyones fav black bear
- Who causes hallucinations saying "its me"
- Who gets a stage of their own
- Bonnie's "replacement" in security breach and ruin
- *sighs* Who always comes back
15 Clues: Where are you in FNAF 4 • Everyones fav black bear • Who gets a stage of their own • *sighs* Who always comes back • The most disregarded FNAF game • Animatronics from the third game • Animatronics from sister location • Animatronics from security breach • Animatronics from the second game • What role do you play as in FNAF 1-3 • Where is glamrock bonnie hidden in ruin • ...
Cashless society 2024-09-12
Across
- System ........... that causes payment issues
- The convenience of not carrying.....physically
- Cash transactions leave .......... to be tracked
- Electronic ............ criminals
- A payment method that eliminates...
- loundering A financial crime that's harder to commit without ...........
- ....................interest rate affecting bank customers
- .................transaksi elektronik yang digunakan sebagai alternatif kartu kredit dan debit
Down
- Security .............. to protect cash
- Every ............ recorded makes it hard to hide
- Transaction ............... to avoid this crime
- ...............that needs to be converted when traveling
- Type of ............ banks may increase without cash
- ................associated with physical currency management
- ...................state of not using physical money
- gambling A common activity where ........... is used and tracked
16 Clues: Electronic ............ criminals • A payment method that eliminates... • Security .............. to protect cash • System ........... that causes payment issues • The convenience of not carrying.....physically • Transaction ............... to avoid this crime • Cash transactions leave .......... to be tracked • Every ............ recorded makes it hard to hide • ...
THINK BEFORE YOU CLICK 2025-04-06
Across
- Necessary to ensure continuity.
- Helps avoid phishing and maintain security.
- Describes the identity or message in phishing.
- Often disguised in phishing emails.
- Essential to protect data and systems.
- Crucial during disruptions for transparency.
- Red flag in scam messages to pressure action.
- What scammers ask victims to do to steal info.
Down
- Key to avoiding phishing and ensuring business stability.
- Result of falling for a scam.
- System to keep business running during disruptions.
- Core goal of BCMS.
- Common platform used in phishing attacks.
- Deceptive scheme or trick.
- Fraudulent attempt to obtain sensitive information.
15 Clues: Core goal of BCMS. • Deceptive scheme or trick. • Result of falling for a scam. • Necessary to ensure continuity. • Often disguised in phishing emails. • Essential to protect data and systems. • Common platform used in phishing attacks. • Helps avoid phishing and maintain security. • Crucial during disruptions for transparency. • Red flag in scam messages to pressure action. • ...
Spanish 2023-12-18
22 Clues: inn • sled • ferry • subway • recline • to pack • to tour • engineer • security • platform • to slide • terminal • conductor • itinerary • turnstile • streetcar • stwerdess • inner tube • flip plops • guest houes • luggage claim • in flight service
Viajes 2024-04-25
23 Clues: row • gate • seat • plane • aisle • flight • travel • layover • luggage • to land • customs • airport • arrivals • security • passport • suitcase • to travel • passenger • round trip • departures • destination • to take off • travel agent
Neighbourhood Watchers 2025-08-04
23 Clues: меры • район • кузнец • охрана • награда • улучшить • участник • уязвимый • убедиться • ежегодный • пословица • имущество • поведение • установить • обеспечить • гражданство • добровольный • предотвратить • изолированный • включать в себя • кража со взломом • шанс, возможность • ___measures принимать меры
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
IT-Security - Datenschutz/-sicherheit 2016-01-29
Across
- Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
- Virus der sich direkt über Netzte im Internet verbreitet
- versteckt in einem scheinbar nützlichen Programm
- Mobbing mit Hilfe von elektronischen Medien
- Beobachtung bei der Eingabe von Daten
Down
- Sicherheitskopie im Falle von Verlust oder dergleichen
- forschen das Nutzerverhalten aus
- Diebstahl von Daten die weggeworfen wurden
- jemand der illegal in Computersysteme eingreift
- unerwünschte Werbemails
10 Clues: unerwünschte Werbemails • forschen das Nutzerverhalten aus • Beobachtung bei der Eingabe von Daten • Diebstahl von Daten die weggeworfen wurden • Mobbing mit Hilfe von elektronischen Medien • jemand der illegal in Computersysteme eingreift • versteckt in einem scheinbar nützlichen Programm • Sicherheitskopie im Falle von Verlust oder dergleichen • ...
Chapter 2 2020-08-22
Across
- threat actor that seeks to harm the government
- reduce the risk of a threat
- individual who gains unauthorized access
- when different employees take over job tasks
- this privilege principal limits access to work tasks
- after an attack perform a memory
Down
- media preparation technique
- this document states who has had access to the evidence
- this security measure is AKA defense-in-depth
- identifies traffic on your network
- important aspect of evidence gathering
- separation of ___
- testing tool to validate bandwidth
- this testing type simulates a large number of clients
- privileges resulting from of privilege escalation
- are the greatest threat to network security
- changes the position of characters
17 Clues: separation of ___ • media preparation technique • reduce the risk of a threat • after an attack perform a memory • identifies traffic on your network • testing tool to validate bandwidth • changes the position of characters • important aspect of evidence gathering • individual who gains unauthorized access • are the greatest threat to network security • ...
ACEBA 2020-09-23
33 Pieces of Greatness 2025-04-03
Across
- The security tool you've been working on
- A protective security measure in networking
- Favorite anime character
- Favorite Arsenal player
- Favorite drink
- Favorite person in the world
- All time favorite game console
Down
- Arsenal’s nickname
- All is well in the world, as long as you can eat
- The first city you had your passport stamped
- When you're stressed, you play..
- A luxury item you always splurge on
- Strategy-based board game you love
13 Clues: Favorite drink • Arsenal’s nickname • Favorite Arsenal player • Favorite anime character • Favorite person in the world • All time favorite game console • When you're stressed, you play.. • Strategy-based board game you love • A luxury item you always splurge on • The security tool you've been working on • A protective security measure in networking • ...
The Online World 2015-09-21
Across
- Search Engine
- A website connected to another via a link
- One system to another
- Movement of files from a system to your computer
- Recipient of a small fee for traffic clicking through an add
Down
- Set of online rules for the cyber net
- The format of a file after compression
- Only a readable version of a file
- Type of online communication
- Name for and education online site
- A online collection of personal
11 Clues: Search Engine • One system to another • Type of online communication • A online collection of personal • Only a readable version of a file • Name for and education online site • Set of online rules for the cyber net • The format of a file after compression • A website connected to another via a link • Movement of files from a system to your computer • ...
Cristo Rey Crossword 2018-06-21
Across
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- What type of classes does Northside Hospital offer?
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
Down
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- Which Cristo Rey sports team won medals at Florida National Competition?
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- What percent of students at Cristo Rey get accepted to college after graduation?
- What is the title of the football team’s hype video on Marist School’s website?
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
Airports 2022-07-21
Across
- city with the code SIN
- the airline code for cathay pacific
- most common cause of runway incursions
- country of the world's busiest airport
- you can carry up to 100ml of this
- first international Airport opened in
Down
- ideal solution for evacuating passengers
- the area where aircraft park
- the area after check-in and passport control
- vertical guidance system to guide planes
- the security of aviation as a whole
- man family tried to sneak this through the airport
- customs officers intercept this
- the area before security
- makes up 50% of Auckland Airports' income
15 Clues: city with the code SIN • the area before security • the area where aircraft park • customs officers intercept this • you can carry up to 100ml of this • the security of aviation as a whole • the airline code for cathay pacific • first international Airport opened in • most common cause of runway incursions • country of the world's busiest airport • ...
Англ.яз. 2020-03-10
Across
- защита
- хранить
- результат, проблема
- безопасность
- враг, нарушитель
- производительный
- конфиденциальность
- способ, средство
- достоверность, подлинность
- программное обеспечение
- оборудование, аппаратное обеспечение
Down
- полезность
- защищённость
- последствие, результат
- невозможный отказ от авторства
- содержимое
- применение
- быстрый
- обрабатывать
- нарушитель, взломщик
20 Clues: защита • хранить • быстрый • полезность • содержимое • применение • защищённость • безопасность • обрабатывать • враг, нарушитель • производительный • способ, средство • конфиденциальность • результат, проблема • нарушитель, взломщик • последствие, результат • программное обеспечение • достоверность, подлинность • невозможный отказ от авторства • оборудование, аппаратное обеспечение
At the Airport 2017-01-12
22 Clues: багаж • острый • терять • прямой • предмет • тяжелый • очередь • тележка • быстрый • опасный • пассажир • жидкость • оставлять • показывать • пропускать • досматривать • внимательный • присоединяться • проходить через - go ... • посадочный талон - ... card • сотрудник службы безопасности • стойка регистрации - ... desk
What You Wanna Be? (Transcribe the phonetic symbol to the box) 2024-01-07
26 Clues: vet • beɡər • lɔɪər • nɜːrs • bʊtʃər • ɡeɪmər • plʌmər • beɪkər • teɪlər • æθliːt • bæŋkər • raɪtər • dentɪst • tiːtʃər • dɑːktər • draɪvər • flɔːrɪst • ɑːrkɪtekt • sekrəteri • fɪʃmʌŋɡər • sɪˈkjʊrəti • ʌnɪmˈplɔɪd • əˈkaʊntənt • ʌndərteɪkər • laɪˈbreriən • faɪərfaɪtər
GTA5 2023-07-05
22 Clues: jetcar • police • oldjet • newjet • hacker • gta5map • airport • autoshop • security • government • michaelson • carsalesmen • flying bike • franklin dog • Trevorfriend • weapon stash • sandy shores • marina hights • eastlossantos • tall building • clothes store • high end clothes
ICT Password 2024-03-06
6 Clues: World Wide Web • Voice Over Internet Protocol • Example of a crypto currency • Information Communictaion Technology • Crime Crime carried out using computer • Technology to hide Ip address and location
Navigate Unit 1.1+1.2 2021-08-31
18 Clues: treu • Streit • Meinung • Internet • Therapie • schuldig • Vertrauen • Abenteuer • Verletzung • zuverlässig • Angestellte/r • jdn überzeugen • sich entwickeln • Rabatt, Preisnachlass • Kunde (Kundin), Käufer • etw. zugeben, eingestehen • Sicherheit, Sicherheitsdienst • Almosen, Barmherzigkeit, Benefiz-
AT THE AIRPORT 2017-11-08
18 Clues: PASSI • LENTO • TULLI • VAPAA • PUNNITA • VARATTU • VIISUMI • LASKEUTUA • MÄÄRÄNPÄÄ • VÄLILASKU • MATKATAVARAT • VIIVÄSTYNTYT • KÄYTÄVÄPAIKKA • TURVATARKASTUS • LÄHTEVÄT LENNOT • SAAPUVAT LENNOT • ARVIOITU LÄHTÖAIKA • MATKATAVAROIDEN NOUTOPISTE
OffDig 2024-12-17
Across
- Kort for teknologi og AI-platforme
- Kunstig intelligens til at styrke konkurrenceevne
- En essentiel teknologi til moderne AI-løsninger
- Automatisering af processer gennem avancerede digitale værktøjer
- AI-løsninger, der skaber reel forretningsværdi
Down
- Hjælper virksomheder med AI-strategi og transformation
- En ledende aktør inden for digital og AI-transformation
- AI som kernen i fremtidens nytænkning
- Beskytter organisationer mod digitale trusler
- Bruges til at drive strategi og vækst
10 Clues: Kort for teknologi og AI-platforme • AI som kernen i fremtidens nytænkning • Bruges til at drive strategi og vækst • Beskytter organisationer mod digitale trusler • AI-løsninger, der skaber reel forretningsværdi • En essentiel teknologi til moderne AI-løsninger • Kunstig intelligens til at styrke konkurrenceevne • Hjælper virksomheder med AI-strategi og transformation • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
Receptionist Essentials 2025-03-19
Across
- / Security risk where an unauthorized person follows an employee through a secure door
- / The process of handling unexpected situations professionally
- / An important security step before issuing a guest badge
- / The designated area where visitors check in
- / The internal resource where you can find answers to policies and procedures
Down
- / What you must remain during a workplace emergency
- / The software used for internal messaging at Apple
- / A common security measure for Apple employees
- / What you provide when guiding guests to a meeting room
- / The first person guests interact with at the front desk
10 Clues: / The designated area where visitors check in • / A common security measure for Apple employees • / What you must remain during a workplace emergency • / The software used for internal messaging at Apple • / What you provide when guiding guests to a meeting room • / The first person guests interact with at the front desk • ...
EMD Polices & Procedures 2021-02-11
Across
- Type of inspection performed by security officers to ensure that employees are using their assigned badges
- CW-EMD cleared employee has a _______ on their badge
- Special arrangements have been made to allow_____________ employees to bring company provided cell phones through CW-EMD property
- Issued to employees and long term contractors to identify a vehicle and vehicle owner should there be an issue
- Application used for alarms and event view
- Document with information that must be reported to the next officer taking over that post
- All visitors must have a ___________ completed in order to be allowed into the facility or do work on the grounds
- Alarm that sounds like a hockey goal
- This report is a firsthand account of the activities the security officer performed while on duty.
- This type of report is used for a situation that requires greater detail to be investigated
- only post that is manned from 0630-2230 Monday thru Friday.
- __________ is to be completed every time a foreign national enters the shop for a tour
- Badge color reserved specifically for Foreign Nationals
- Site with no on-site security that is monitored by CW-EMD
- These passes are issued for a maximum of 5 business days at a time
- Temporary badges can only be issued and returned to_______
Down
- Has a yellow background with red lettering and the Curtiss-Wright logo
- __________ Book is used by CW-EMD security to alert security officers of individuals who previously had access to the site.
- Form used by employees to have incoming media scanned for viruses
- Stickers on personal owned cell phone that have been approved by the FSO/Asst. FSO are this color
- __________ are issued if a person’s vehicle information is not registered in the Auto Registration
- Form generated by and issued by the Purchasing Department authorizing equipment to be removed from the site
- Foreign Nationals are permitted to have approved electronics in this area and this area only
- __________visitors wearing this badge MUST ALWAYS have an EMD escort with them
- Post where you control and perform 100% vehicle inspections
- required any time work is being done inside the building that could potentially spark a fire
- Document needed when taking company property off site
- Secure area located in Bldg. 3A 2nd floor
- type of visitor that is required to have a video date
29 Clues: Alarm that sounds like a hockey goal • Secure area located in Bldg. 3A 2nd floor • Application used for alarms and event view • CW-EMD cleared employee has a _______ on their badge • Document needed when taking company property off site • type of visitor that is required to have a video date • Badge color reserved specifically for Foreign Nationals • ...
Cybersecurity Awareness 2024-12-13
Across
- A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
- Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
- A type of malware that locks a user’s files or system, demanding payment to restore access.
- A fix or update to software that addresses security vulnerabilities or bugs.
- Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
- A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
- Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
- Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
- Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
- Software that secretly gathers information about you or your device without your consent.
- (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
- A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
- The process of converting data into a secret code to prevent unauthorized access.
- Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
- Software designed to detect, prevent, and remove malicious programs from your computer or network.
- Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
- Any potential danger or risk that could exploit vulnerabilities in a system or network.
- Malicious software designed to harm or exploit devices, systems, or networks.
- Breach An incident where confidential data is accessed or disclosed without authorization.
- Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
- A security vulnerability that is unknown to the software maker and has no fix or patch available.
- Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
- Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
- A copy of important data or files that can be restored in case of loss, damage, or attack.
- (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.
25 Clues: A fix or update to software that addresses security vulnerabilities or bugs. • Malicious software designed to harm or exploit devices, systems, or networks. • The process of converting data into a secret code to prevent unauthorized access. • Any potential danger or risk that could exploit vulnerabilities in a system or network. • ...
