cyber security Crossword Puzzles
Digital citizenship 2022-02-16
Across
- something you don't share online
- a technology device where you can download social media apps
- a mode which you can put your account on
- something where you can post videos or pictures on
- a social media app
- a form of communicating to someone
Down
- a form of texting
- something you leave behind on the internet
- something which is private
- an app where you can talk to people online
- a crime
- an app where you can watch videos
- people who want information from you
13 Clues: a crime • a form of texting • a social media app • something which is private • something you don't share online • an app where you can watch videos • a form of communicating to someone • people who want information from you • a mode which you can put your account on • something you leave behind on the internet • an app where you can talk to people online • ...
CIP,C11-5,2018 2020-10-28
Across
- responsible for overseeing privacy legislation in a province or territory
- oversees provincial licensing
- The Insurance ____________ Act gives power to OSFI
- measure of financial stability for an insurance company
- a type of data breach where personal information is hacked
Down
- a condition formed from legislation
- supervisor of insurance companies
- an insurance company makes money this way
- a federal privacy act
- foreign insurance companies are regulated at this level of government
- files a report with the federal regulator
- the regulator in Quebec
- a type of computer liability insurance
13 Clues: a federal privacy act • the regulator in Quebec • oversees provincial licensing • supervisor of insurance companies • a condition formed from legislation • a type of computer liability insurance • an insurance company makes money this way • files a report with the federal regulator • The Insurance ____________ Act gives power to OSFI • ...
Bullying 2024-12-19
Across
- The act of copying
- Harming another person's reputation
- The act of physically harming another person
- Provoking or making fun of someone playfully
- Using the body or an object to harm others
- The act of pushing someone
- Using words to threaten, harm, or hurt another person
Down
- Use of offensive names
- Conversations about people that are not proven to be true
- Acting threatening, or frightening another
- To hit someone with a closed fist
- Abusing and/or insulting another person regularly
- Using the internet to bully another person
13 Clues: The act of copying • Use of offensive names • The act of pushing someone • To hit someone with a closed fist • Harming another person's reputation • Acting threatening, or frightening another • Using the internet to bully another person • Using the body or an object to harm others • The act of physically harming another person • Provoking or making fun of someone playfully • ...
Faculty 2025-10-16
19 Clues: Gym • Art • Lab • Ivrit • 9th Bio • Spanish • Ramabam • History • Security • Principal • AP English • Engineering • Graphic design • Israel Guidence • College Advisory • Marketing Director • Associate Principal • Activities Director • Admissions Coodinator
Politics 2016-03-01
Across
- : an attractive rather than coercive type of power
- : using laws to fairly judge and punish crimes and criminals
- : Politics as "master scienc"
- : ASEAN observer (Acronym)
- : evolved as science and art
- : another term for "security"
- : "city-state"
- : defense of the state and its citizens
- : quantitative and descriptive approach approach
- : persons and institutions that make and enforce laws
Down
- : in charge of internal security
- : limitation and regulation
- : Civil Society Organization
- : a subdiscipline of polisci that compares governments and political systems
- : International Relations
- : a qualitative approach that tries to find out what is best for the people
- : power of politicians and individuals to act out law
- : the act of influencing the government to do what you want
- : the currency of politics
- : military or economic type of power
20 Clues: : "city-state" • : International Relations • : ASEAN observer (Acronym) • : the currency of politics • : limitation and regulation • : Civil Society Organization • : evolved as science and art • : Politics as "master scienc" • : another term for "security" • : in charge of internal security • : military or economic type of power • : defense of the state and its citizens • ...
Fun while you learn. 2020-06-09
Across
- Physiological effect of rapid decompression.
- Also called the Silent review.
- The flight deck during critical phases.
- Mental review, Stop____ Review..
- In case of decompression, Put on the nearest Oxygen _ ?
- Command “Cabin crew Arm doors for departure and ___ ?
- Content of polar kit.
- Which crew does transit security search ?
- You must check this on a passenger’s boarding card.
- One of the hijacker profiles.
- Used for pax showing disruptive behavior.
Down
- Critical Phases of the flight, “Take off,__,landing.”
- This follows, CSD to the flight deck - 2.
- Adopt this position to preserve body temperature.
- You shout this 30 seconds before crash landing.
- Security form used ONLY for outstation.
- Decompression is ? ___ of cabin pressure.
- Element of fire triangle.
- The one who fights the fire.
- Command, “ ___initiate controlled disembarkation.”
20 Clues: Content of polar kit. • Element of fire triangle. • The one who fights the fire. • One of the hijacker profiles. • Also called the Silent review. • Mental review, Stop____ Review.. • The flight deck during critical phases. • Security form used ONLY for outstation. • This follows, CSD to the flight deck - 2. • Decompression is ? ___ of cabin pressure. • ...
NETWORKING REQUIREMENTS 2024-08-06
Across
- A negotiator between networks
- Relies on a server for services
- Common example is connecting a Bluetooth device with smartphone
- Devices connected in 1 physical environment
- Connects with cables
- Communication over a ranged distance
- A term for describing hubs and switches
- Divided in 7 layers allowing communication
- Security that controls input and output limitations
- Enables communication between physical devices
- Connection of 2 nodes
Down
- Technology for the speed of a desktop
- Practices to detect unauthorized access
- Facilitates communication between networks
- The maximum amount of capacity in a network
- Coming together for specific tasks
- Allows wireless devices to connect to wired networks
- Can be connected without cables
- Computers are linked by this device
- Rules on how data is transmitted
20 Clues: Connects with cables • Connection of 2 nodes • A negotiator between networks • Relies on a server for services • Can be connected without cables • Rules on how data is transmitted • Coming together for specific tasks • Computers are linked by this device • Communication over a ranged distance • Technology for the speed of a desktop • Practices to detect unauthorized access • ...
spanish 2023-01-27
Across
- security does this to luggage
- not taking off but
- getting checked aka
- when your getting on the plane
- in order to board you have to
- the people riding the plane
- the person who walks around planes
- you go here to get your bags
- you have to buy one of these
- what takes you from place to place
- not landing but
Down
- your plan for the trip
- what you put all your stuff in
- they open the ... to the plane
- making sure your flight is still on
- they scan your boarding pass on
- you take this from place to place
- you have to show security this
- to go in the air
- where you go to get on the plane
- what your suitcase is called
21 Clues: not landing but • to go in the air • not taking off but • getting checked aka • your plan for the trip • the people riding the plane • you go here to get your bags • you have to buy one of these • what your suitcase is called • security does this to luggage • in order to board you have to • what you put all your stuff in • they open the ... to the plane • when your getting on the plane • ...
RCY Marvel Crossword 2022-12-07
Across
- Dr Erik Selvig joined SHIELD to study this
- Librarian of Kamar Taj
- Dora Milaje Security chief
- Co founder of X-Con security
- Smallest Avenger
- King of Asgard
- King Laufeys son
- queen of Asgard
- Scott Langs cellmate
- Avenging archer
- Hydra Leader
- Scientific sister of Tchalla
- Had mind stone in forehead
Down
- Helps Howard Stark create SHIELD
- Odins oldest child
- Military rank held by Nick Fury
- one of Thanos adopted children
- Friend of Thor
- Nickname of Timothy Dugan
- Surname of Howard Starks business partner
- Assists Thor to defeat Hela
- Where Bucky finds sanctuary
- Bruce Banners alter ego
- First name of agent Natasha Romanoff alias at Stark Industries
- SHIELD agent who helped design Capt America shield
25 Clues: Hydra Leader • Friend of Thor • King of Asgard • queen of Asgard • Avenging archer • Smallest Avenger • King Laufeys son • Odins oldest child • Scott Langs cellmate • Librarian of Kamar Taj • Bruce Banners alter ego • Nickname of Timothy Dugan • Dora Milaje Security chief • Had mind stone in forehead • Assists Thor to defeat Hela • Where Bucky finds sanctuary • Co founder of X-Con security • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- The individuals who control access to people, data, and systems
- Kwiktrip's password policy requires that coworkers change their passwords __days
- You can help fight cybercrime by becoming a __________
- What is the common hacking method
- These are designed to maintain the security of everyone associated with an organization
- This attack occurs when cybercriminals research and track which sites employees visit the most
Down
- _____are the last line of defense
- Failure to run these equals failure to patch security vulnerabilities
- This security tool identified and removes malicious programs
- This dangerous attack targets specific people or organization, often with custom made email or messages
- Stealing money is the main goal behind this type of malware
- Any scenario that triggers emotions should also trigger your ______
- This attack occurs when someone sneaks into a secured area behind someone else
- What should you do when a workstation or device is no longer in use
- The future of security is_____, not machines
15 Clues: _____are the last line of defense • What is the common hacking method • The future of security is_____, not machines • You can help fight cybercrime by becoming a __________ • Stealing money is the main goal behind this type of malware • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
Foreign Policy Making Chapter 18 2025-04-15
Across
- is the policy of avoiding involvement in foreign affairs.
- North Atlantic Treaty Organization
- Fees for importing goods into the United States from other countries.
- has the power to declare war and control funding for foreign policy
- is a Cold War strategy to stop the spread of communism.
- represent the U.S. abroad in negotiations and embassies
- Establishment emphasized freedom from military threat and political coercion.
Down
- agency that gathers foreign intelligence for National Security in the U.S.
- the policy that involves decisions about relations with the rest of the world
- hostility between the United States and Soviet Union.
- is the policy of becoming involved in foreign affairs
- the president, the diplomats, congress, and the national security establishment are all what?
- An organization created in 1945 to promote international peace, security, and cooperation.
- is the use of violence to demoralize and frighten a country's population or government
14 Clues: North Atlantic Treaty Organization • hostility between the United States and Soviet Union. • is the policy of becoming involved in foreign affairs • is a Cold War strategy to stop the spread of communism. • represent the U.S. abroad in negotiations and embassies • is the policy of avoiding involvement in foreign affairs. • ...
Acronym 2021-11-21
Puzle 2023-10-13
Favorite ways to travel 2023-06-12
15 Clues: choice • safety • premium • elegant • journey • shadier • opulence • dreadful • airfield • confined • exploring • drawbacks • advantages • compartment • indefinitely
Spanish Review 2016-02-16
20 Clues: avion • camisa • quince • estudio • dibujar • entender • un libro • una mesa • una tiza • una rega • un lapiz • la gorra • una silla • madrugada • seguridad • calcetines • una mochhlia • una computadora • una calculadora • pantalones cortos
Politica 2018-03-04
26 Clues: paz • ley • deuda • líder • crimen • guerra • consejo • opinión • demanda • Campaña • economia • sociedad • nacional • ejército • progreso • tribunal • gobierno • votación • libertad • impuesto • inversión • seguridad • seguridad • argumento • estrategia • presidente
Student Vocab Crossword puzzle 2023-04-26
25 Clues: gum • bomb • door • boat • tofly • trick • candy • image • hotel • plane • skier • towalk • turtle • energy • simple • avacado • baggage • weather • airport • security • cliffjump • perchance • waterbottle • bathingsuit • clothingstore
Student Vocab Crossword puzzle 2023-04-26
25 Clues: gum • bomb • door • boat • tofly • trick • candy • image • hotel • plane • skier • towalk • turtle • energy • simple • avacado • baggage • weather • airport • security • cliffjump • perchance • waterbottle • bathingsuit • clothingstore
Student Vocab Crossword puzzle 2023-04-26
25 Clues: gum • bomb • door • boat • tofly • trick • candy • image • hotel • plane • skier • towalk • turtle • energy • simple • avacado • baggage • weather • airport • security • cliffjump • perchance • waterbottle • bathingsuit • clothingstore
Prefix Crossword - Grade 8 Language Worksheet 2023-11-06
25 Clues: do • wind • pack • even • agree • truth • behave • natural • legible • comfort • honesty • similar • connect • approve • regular • possible • maturity • security • relevant • behaviour • expensive • mortality • advantage • probability • convenience
vocabulary unit 11 2024-02-26
crossword puzzle 2021-05-20
Across
- cyber hub is located in
- tourism provides changes which causes
- teet ka achar is a pickle made from which tree?
- women cover their head by
Down
- traditional headgear worn by men
- old custom of people which is still followed
- famous epic mahabharata was written in this state
- cultural tourism may effect
- famous bird santuary is located in
9 Clues: cyber hub is located in • women cover their head by • cultural tourism may effect • traditional headgear worn by men • famous bird santuary is located in • tourism provides changes which causes • old custom of people which is still followed • teet ka achar is a pickle made from which tree? • famous epic mahabharata was written in this state
F.P.S digital realities 2023-05-09
9 Clues: a system or environment • nausea or sickness from VR • mix of two or more elements • mix of all online realities • using a device without your hands • using game play to help an activity • Extra devices eg headset monster etc. • response from and computer application • a virtual model of the users body in VR
F.P.S digital realities 2023-05-09
9 Clues: a system or environment • nausea or sickness from VR • mix of two or more elements • mix of all online realities • using a device without your hands • using game play to help an activity • Extra devices eg headset monster etc. • response from and computer application • a virtual model of the users body in VR
Engagement Crossword One 2025-11-04
9 Clues: Who is a football coach? • Who speaks fluent French? • Who has a desire to learn? • Who is based in the Midlands? • Who currently works in DEFRA? • Who has had two postings in MoD? • Who is on the DDaT/Cyber scheme? • Who used to work in private office? • Who does a strategic planning and performance role?
Professions 2026-01-01
16 Clues: Guru • Koki • Supir • Pilot • Murid • Dokter • Polisi • Petani • Satpam • Tentara • Perawat • Pedagang • Pegawai Kantor • Kepala Sekolah • Teknisi/Insinyur • Petugas Kebersihan
pretty cute and smart 2025-02-19
19 Clues: % • wary • kind • amie • risky • truth • harsh • drunk • study • finish • pastor • sponge • doorway • hot out • sing loudly • magnetic pull • another person • best friends forever • people who protect you
JOBS 2022-04-13
17 Clues: cuoco • pilota • postino • gommista • barbiere • muratore • pescatore • fotografo • meccanico • idraulico • poliziotto • imbianchino • pasticciere • giardiniere • parrucchiera • elettricista • guardia di sicurezza
Vocabulario 2017-12-03
Profiles 2 text 1 Sandra 2014-12-03
15 Clues: esine • varata • varaus • hyttynen • kilpailu • elinaika • toimittaa • lomakeskus • ulkomailla • liioitella • vastakkainen • matkatavarat • aurinkovoide • turvallisuus • milloin tahansa
ena2 3-3.1 2025-02-25
15 Clues: juhla • rauha • rahat • viihde • ilahtunut • tasa-arvo • delegaatti • vuosipäivä • vähäosainen • muistojuhla • kiusaaminen • vuosittainen • turvallisuus • puolestapuhuja • omistautuminen
INFORMATIKA X TKJ 2024-05-07
Across
- Kode G pada RGB
- digunakan untuk menghasilkan salinan data dari komputer adalah
- Salah satu jenis serangan cyber yang mengunci data?
- Angka yang terdiri dari 0 dan 1
- Perangkat keras yang berfungsi sebagai otak komputer?
- Software Berbahaya
- Keamanan Jaringan
- Perangkat keras yang bertanggung jawab untuk mengirimkan data antara komputer dan jaringan
Down
- Mengarahkan/mengatur Paket Data
- Sistem operasi yang dikembangkan oleh Microsoft
- Titik-titik kecil yang membentuk gambar digital
- Format file untuk gambar dengan latar belakang transparan
- Perangkat keras yang digunakan untuk memasukkan data ke dalam komputer
- Perubahan bertahap antara dua warna atau lebih
- jenis huruf yang memiliki dekorasi tambahan di ujung-ujungnya
- Hypertext Markup Language
- Perangkat lunak untuk mengelola basis data
- penyimpanan data yang bersifat permanen?
- Kode C pada CMYK
- Uniform Resource Locator
20 Clues: Kode G pada RGB • Kode C pada CMYK • Keamanan Jaringan • Software Berbahaya • Uniform Resource Locator • Hypertext Markup Language • Mengarahkan/mengatur Paket Data • Angka yang terdiri dari 0 dan 1 • penyimpanan data yang bersifat permanen? • Perangkat lunak untuk mengelola basis data • Perubahan bertahap antara dua warna atau lebih • ...
OL 4, Unit 4, Station 2 2025-05-07
Across
- geben, existieren
- seit
- Konto
- begrüßen
- trendsetzend
- Foto
- befreunden
- online stellen
- verdienen
- Smartphone
- beeinflussen
- Seite (im Internet)
- Post
- Kommentar
- modisch, trendy
- einige, mehrere
- Innovation, Neuheit
- seit, seitdem
- veraltet
- äußerst, sehr
- eigentlich, grundsätzlich
- täglich
- Status
- Link
- Follower
- Clip; Ausschnitt
Down
- altmodisch
- kommunizieren
- Veganismus
- soziale Medien
- Jumping Fitness
- Lieblings-
- updaten
- Anfrage
- abonnieren
- Trend, Entwicklung
- Selfie
- mobil, tragbar
- Tonne
- zerissen
- nicht mögen
- streamen
- Karte, Plan
- entfreunden
- Blogger
- Einfluss, Auswirkung
- Computerspiele-
- Cyber-Mobbing
- sofort, gleich
- die Hälfte
50 Clues: seit • Foto • Post • Link • Konto • Tonne • Selfie • Status • updaten • Anfrage • Blogger • täglich • begrüßen • zerissen • streamen • veraltet • Follower • verdienen • Kommentar • altmodisch • Veganismus • Lieblings- • abonnieren • befreunden • Smartphone • die Hälfte • nicht mögen • Karte, Plan • entfreunden • trendsetzend • beeinflussen • kommunizieren • seit, seitdem • Cyber-Mobbing • äußerst, sehr • soziale Medien • online stellen • mobil, tragbar • ...
Quiz #5 Insurance on Property 2024-11-14
Across
- These fluctuate for seasonal stock.
- This is has a potential severity that is too high.
- This type of water is excluded.
- Peak
- Property on its way to a different location.
- What insurers impose to encourage insurance to full value.
- Coverage for boiler and machinery.
- ______ locations
Down
- Vice
- Combined limits for multiple locations.
- These risks can be caused by viruses and worms.
- Is it RC or ACV?
- This is a type of property excluded along with autos, money, ...
- Acronym for building and contents together.
- This loss to inventory is not covered.
- This is found on the dec sheet by the property insured.
- This can be purchased to increase limits.
- Not covered.
- Perils
- Code Upgrades can be found in these municipal rules.
20 Clues: Vice • Peak • Perils • Not covered. • Is it RC or ACV? • ______ locations • This type of water is excluded. • Coverage for boiler and machinery. • These fluctuate for seasonal stock. • This loss to inventory is not covered. • Combined limits for multiple locations. • This can be purchased to increase limits. • Acronym for building and contents together. • ...
NATO Crossword 2023-08-04
Across
- This ability enables Allied forces and equipment from different countries to work together
- This is the section of NATO's founding treaty that explains how new members can join
- The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
- PermReps sit on the NAC, or North Atlantic ___
- Allies contribute money to fund NATO programs. This is known as ___ funding.
- This is one of NATO's closest partners, and its headquarters are right downtown
- NATO Air Base Geilenkirchen, Germany is home to 14 of these aircraft, known as NATO's eyes in the sky
- US General Christopher Cavoli currently holds this position, the second-highest military position within NATO
- This country is an official Invitee, but not yet a member
- NATO's current Secretary General is from this country
- Last month's NATO Summit took place in this city
- Allies pledged to devote this much of their GDP to defense spending
- This kind of threat typically does not involve violence, but can include disinformation, interference in politics, and cyber operations
Down
- The principle that if one Ally is attacked, all Allies are attacked, is known as ___ defense
- He was the first SACEUR, and was later the 34th President of the United States
- Countries that wish to join NATO usually, but not always, have a MAP, or Membership ___ Plan
- The length statement released at NATO Summits is often called this
- This Italian city is home to a NATO military command
- NATO's largest partnership group is the Partnership for ___
- NATO's maritime security operation in the Mediterranean is called Operation Sea ___
- NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
- NATO's military headquarters in Mons, Belgium
- NATO has led a peace support operation in this country since June 1999
- NATO's full name is the North ___ Treaty Organization
- This Virginia city is home to Allied Command Transformation (ACT)
- All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.
26 Clues: NATO's military headquarters in Mons, Belgium • PermReps sit on the NAC, or North Atlantic ___ • Last month's NATO Summit took place in this city • This Italian city is home to a NATO military command • NATO's current Secretary General is from this country • NATO's full name is the North ___ Treaty Organization • ...
DTI Chapters 5–8 2026-03-06
Across
- AI field that allows computers to understand human language
- Process of removing errors or inconsistencies from data
- Analysis that explains what happened in the past
- Communication between machines without human intervention
- Observing systems continuously to collect real-time information
- Technology that converts spoken words into digital commands
- Ability of systems to perform tasks with minimal waste
- Protection of personal or sensitive data from unauthorized access
- Presenting data using charts or graphical representations
- Computer system that imitates the decision-making of human experts
- Concept connecting people, processes, data and things together
- Challenge arising from managing many interconnected devices
- Field of computing focused on creating intelligent machines
- Method of sending digital messages across networks
- Software used to access and view websites
- Analysis that explains why something happened
- Device used to detect environmental changes or physical conditions
- Professional who interprets data and produces meaningful reports
- Process where systems operate with minimal human involvement
Down
- Human-readable name that corresponds to an IP address
- Unique numeric identifier assigned to each device on a network
- Analysis recommending the best actions to take
- Technology enabling computers to interpret images
- Extremely large datasets generated from digital systems
- Analysis that forecasts future outcomes based on data
- Business transactions conducted through the Internet
- System that translates domain names into IP addresses
- Global network that connects millions of computers worldwide
- Technology that allows voice communication through the Internet
- Vision of a future where everything is digitally interconnected
- Protocol used to transfer files over the Internet
- Process of analyzing raw data to generate insights
- Protection of systems and networks from cyber threats
- AI technique where systems learn patterns from data
- Branch of AI involving machines performing physical tasks
- Network of physical devices connected to the Internet
- Unique address used to locate a webpage on the Internet
- Markup language used to structure content on web pages
- Real-time typed conversation between users online
- Technology that identifies objects using radio frequency signals
40 Clues: Software used to access and view websites • Analysis that explains why something happened • Analysis recommending the best actions to take • Analysis that explains what happened in the past • Technology enabling computers to interpret images • Protocol used to transfer files over the Internet • Real-time typed conversation between users online • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
Praetorian 2020-07-01
Across
- This tool graphs relationships in AD environments
- Our Friday retroactive meeting where we take a look at all of the exciting things we accomplished that week
- The open source tool that Diana uses to identify flaws in containers
- This AWS service sometimes allows you to fetch API credentials from instances
- Publicly known exploits and weaknesses often get designated one of these
- The protocol used in TLS to exchange keys
- Each services team's name starts with this
Down
- The cow in the Austin Office is covered with graphics from this song
- The reporting CLI tool that allows us to edit reports
- Praetorian's product that helps secure our client's software through continuous security analysis
- a governance model that helps evaluate cybersecurity practices, establish or improve a cybersecurity program, and inform your security roadmap and buying decisions
- Integrating security into the entirety of software's lifetime, from plan to monitor
- _SRF
- Carbonated yerba mate drink for all your energy needs
- New hires build these during their first week at Praetorian
15 Clues: _SRF • The protocol used in TLS to exchange keys • Each services team's name starts with this • This tool graphs relationships in AD environments • The reporting CLI tool that allows us to edit reports • Carbonated yerba mate drink for all your energy needs • New hires build these during their first week at Praetorian • ...
Occupations 2021-02-03
Heathrow 2025-11-06
15 Clues: pass • pagas • turva • kohver • tualett • rahakott • nimesilt • sihtkoht • kaelapadi • seljakott • pardakaart • kõrvaklapid • kõrvatropid • ratastega kohver • väljumine, lahkumine
computer 2023-10-11
17 Clues: сеть • мышка • сканер • флешка • принтер • ксерокс • ноутбук • монитор • клавиатура • взламывать • безопасность • обмениваться • коврик для мыши • искать информацию • компьютерная сеть • электронное письмо • сведения (информация)
Computer Article Crossword 2015-06-10
Across
- Very important and possibly dangerous
- The month which the hack happened
- Far away from anything else
- The Chairman of the Senate Armed Services Committee
- Keeping people safe on the Internet
- Breaking into a secure area
- To put together information
- To break into a secure area on the internet
Down
- Stealing someone's personal details
- All over the world
- The abbreviation for The Office of Personnel Management
- One billion people have access to Facebook on.......
- The Name of Mark Zuckerberg's company
- The name of the new App Zuckerberg is releasing
- The ........ Intelligence Committee which released information about the cyber attack
- The Country blamed for the hacking of American databases
- The President of America
17 Clues: All over the world • The President of America • Far away from anything else • Breaking into a secure area • To put together information • The month which the hack happened • Stealing someone's personal details • Keeping people safe on the Internet • Very important and possibly dangerous • The Name of Mark Zuckerberg's company • To break into a secure area on the internet • ...
ITG Quiz Lavinya&Lea 2022-06-29
Across
- mit was kann man Internetseiten erstellen?
- Mit was kann man Datien verringern?
- Nenne mir eins der Office Apps?
- Mit welcher Taste kann man die Groß-und Kleinschreibung anpassen?
- Was produzieren Windräder?
- Mit was tippt man Wörter?
- Durch was bekommt man Internet?
- Mit was bekommt man zugriff auf Onlineseiten
- mit welcher Taste trennt man Wörter?
Down
- Mit was kann man Prozesse abbrechen?
- Wie nennt man Mobbing im Internet?
- Was ist die Hauptplatine eines Computers?
- Was ist ein Anzeigegerät?
- Mit was kann man Handys laden wenn keine Steckdose in der nähe ist?
- Was bedeutet STRG?
- Welches Fach lehrt uns über Technologischen Grundlagen auf?
- Womit kann man Links auswählen/Kopieren?
17 Clues: Was bedeutet STRG? • Was ist ein Anzeigegerät? • Mit was tippt man Wörter? • Was produzieren Windräder? • Nenne mir eins der Office Apps? • Durch was bekommt man Internet? • Wie nennt man Mobbing im Internet? • Mit was kann man Datien verringern? • Mit was kann man Prozesse abbrechen? • mit welcher Taste trennt man Wörter? • Womit kann man Links auswählen/Kopieren? • ...
网络安全:过关斩将 2024-06-27
Across
- Software that secretly monitors and collect user's' activities.
- Social media platform for sharing short videos
- A way to avoid internet addiction.
- Cyber scam using various methods to steal information.
- A program to protect your computer from viruses.
- False information spread online.
- Software used to navigate the internet.
- A potential privacy risk on the internet.
- Online harassment
Down
- Dishonest scheme to cheat.
- Dependence on a substance/activity.
- Registering one's presence at a location
- A password that is valid for only one login transaction
- State of being separated from others。
- Remote face-to-face communication.
- Important method to protect yourself online.
- An important way of protecting personal privacy.
17 Clues: Online harassment • Dishonest scheme to cheat. • False information spread online. • A way to avoid internet addiction. • Remote face-to-face communication. • Dependence on a substance/activity. • State of being separated from others。 • Software used to navigate the internet. • Registering one's presence at a location • A potential privacy risk on the internet. • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
Lesson 30 Vocabulary 2015-05-22
Across
- A program that hackers use to capture IDs and passwords on a network.
- A malicious program that records keystrokes.
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- security feature used for larger networks that controls computers from one point.
- installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- Encrypts the information in an SSL Certificate.
Down
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
Theories of global politics 2021-03-24
Across
- The word Immanuel Kant used to describe a situation of constant peace
- A theory of global politics which emphasises the importance of states cooperating with each other to achieve shared goals
- The idea that each state's security and prosperity is now linked to those of others
- Council The body within the United Nations with the authority to approve military action against other states
- The idea that there is no supreme power to police the global political system
- A term to describe realist concerns about security; in the effort to maximise one's own military strength, states encourage their rivals to do the same
Down
- Each state has sole power within its own border and no other state should attempt to intervene in their affairs
- City in France where the last major climate change agreement was signed.
- 46th President of the United States; re-entered the Paris Climate agreement
- A non-governmental oganisation concerned with protecting the environment
- An intergovernmental organisation concerned with encouraging a free market approach to economic development
- 45th President of the United States; withdrew from the Paris climate agreement
- A theory of global politics which emphasises each state's desire for power and security
13 Clues: The word Immanuel Kant used to describe a situation of constant peace • City in France where the last major climate change agreement was signed. • A non-governmental oganisation concerned with protecting the environment • 46th President of the United States; re-entered the Paris Climate agreement • ...
social media's lexical field 2023-03-24
Across
- opinion people give on your activity
- personal place on website where you can post things
- when your senses are exposed to a lot of informations
- harassment online
- things that requires people's participation
- how much you think you are worth
- something you can't stop thinking about
Down
- something you're physically dependent on
- something that is bad for your health
- you're doing it when you post something
- when you're standing for something
- something that is disorted
- picture, video or test that you publish on your account
13 Clues: harassment online • something that is disorted • how much you think you are worth • when you're standing for something • opinion people give on your activity • something that is bad for your health • you're doing it when you post something • something you can't stop thinking about • something you're physically dependent on • things that requires people's participation • ...
pedro crossword puzzle 2015-04-28
8 Clues: copying word for word • having manners online • people being mean online • common place people cyber bullied • only taking a little of someone's work • a site anyone can edit or express opinion • law to stop people from copying someone else's work • harmful attachment that latches unknowingly to your computer
Encryption 2022-01-10
Across
- Decoding machine used at Bletchley Park during
- an algorithm for performing encryption and
- appear
- Type of analysis used to determine how often
Down
- Code used during WW1/2 comprising dots and dashes
- Organisation responsible for UK cyber defence
- Person responsible for the first substitution cipher
- an encryption method used by the ancient
8 Clues: appear • an encryption method used by the ancient • an algorithm for performing encryption and • Type of analysis used to determine how often • Organisation responsible for UK cyber defence • Decoding machine used at Bletchley Park during • Code used during WW1/2 comprising dots and dashes • Person responsible for the first substitution cipher
codi bullying crossword 2023-03-21
Across
- getting physically picked on everyday
- someone who stands around and watches someone getting bullied
- a sore from being punched or kicked
- some teases you verbally everyday
Down
- a type of psychological bullying
- someone who sees another person getting bullied
- getting picked on online everyday
- a type of physical bullying
- someone teases you and picks on you everyday
9 Clues: a type of physical bullying • a type of psychological bullying • getting picked on online everyday • some teases you verbally everyday • a sore from being punched or kicked • getting physically picked on everyday • someone teases you and picks on you everyday • someone who sees another person getting bullied • someone who stands around and watches someone getting bullied
Cyberbulling 2021-05-03
Across
- a type of bulling other than verbal, cyber or social
- a service that provides help
- to mute someone on social media
- a place to communicate online
- someone who steals another identity
Down
- a person who wants to fit in
- someone who causes harm online
- wanting to be in control
- a person you can go to for support
9 Clues: wanting to be in control • a person who wants to fit in • a service that provides help • a place to communicate online • someone who causes harm online • to mute someone on social media • a person you can go to for support • someone who steals another identity • a type of bulling other than verbal, cyber or social
BNS Bulletin 2024-08-27
Across
- Decriminalized act in BNS, previously under Section 497 IPC
- Indian term for citizen used in BNS
- Colonial-era law replaced in BNS
- Crime explicitly defined in BNS, not in IPC
- Capital punishment retained in BNS
Down
- Number of sections in BNS
- The new code replacing IPC
- City where IPC was primarily drafted
- Digital crimes comprehensively covered in BNS
9 Clues: Number of sections in BNS • The new code replacing IPC • Colonial-era law replaced in BNS • Capital punishment retained in BNS • Indian term for citizen used in BNS • City where IPC was primarily drafted • Crime explicitly defined in BNS, not in IPC • Digital crimes comprehensively covered in BNS • Decriminalized act in BNS, previously under Section 497 IPC
what do you know? 2021-05-04
Across
- attacks physically, emotionally, or socially
- physical or emotional pain
- punching,kicking,spitting
- in intent to make fun of someone in a playful way
- being far away from everything/in your own space
- there is an intent to hurt or harm
- it happens more than once over a period of time
Down
- what percent of students report bullying
- name-calling threatening
- writing mean thing on Facebook, Instagram, or Twitter
- spreading rumors, excluding people from games and groups
- something happening over and over again
- response to feeling or an event
- moment getting hurt on accident once
14 Clues: name-calling threatening • punching,kicking,spitting • physical or emotional pain • response to feeling or an event • there is an intent to hurt or harm • moment getting hurt on accident once • something happening over and over again • what percent of students report bullying • attacks physically, emotionally, or socially • it happens more than once over a period of time • ...
RU ITEC411 - Privacy 2023-10-16
Across
- Matching The act of combining and comparing information from different databases, often using a common identifier like a social security number to match records.
- Specification The principle that data should be collected for specific, explicit, and legitimate purposes.
- Files a website stores on a visitor's computer to track user behavior.
- Information Any information relating to an individual person.
- Use The use of personal information for a purpose other than the one for which it was originally provided.
- Information Gathering The collection of personal information about a user without the user's knowledge.
- Minimization The practice of collecting only the data that is necessary for the stated purpose.
- Guidelines The guidelines of the Organization for Economic Co-operation and Development that serve as the basis for many privacy laws worldwide.
- The National Institute of Standards and Technology, which provides security and privacy standards and guidelines.
- Risks Potential threats to the confidentiality and security of personal information.
Down
- Information Practices A set of principles that guide the responsible handling of personal information.
- Data Protection Directive A comprehensive European Union directive governing data protection and privacy.
- Profiling The analysis of data to determine characteristics of people who are most likely to engage in a particular behavior.
- Measures Safeguards and controls put in place to protect personal information from unauthorized access or disclosure.
- The requirement to inform individuals about data collection practices, purposes, and policies.
- The voluntary agreement given by individuals for the collection and use of their personal information.
- Mining The process of searching and analyzing vast amounts of data to discover patterns and generate new information or knowledge.
- The Personal Information Protection and Electronic Documents Act, a Canadian privacy law.
- The principle of being responsible for ensuring the protection of personal information.
- Consent Users being aware of what information is collected and how it is used before giving permission.
20 Clues: Information Any information relating to an individual person. • Files a website stores on a visitor's computer to track user behavior. • Risks Potential threats to the confidentiality and security of personal information. • The principle of being responsible for ensuring the protection of personal information. • ...
Teka teki silang keamanan 2025-11-28
Across
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
Information Security Awareness 2020-09-24
Across
- What is not allowed in a DNA password
- Best way to keep track of multiple unique passwords
- The data classification for Employee Handbook, internal phone directory
- This is better and harder to crack than a password
- How do you think most evil hackers begin to break into a company’s network?
- The best response to password Recovery Questions is
- Minimum number of characters for a network password
- What is the default data classification
- Who is responsible for data security
Down
- The type of email to get you to click on a fraudulent link
- Disclosing personal member information may be
- Someone that follows closely behind you without using their badge
- If I click on a link I believe was malicious I should
- This is better and harder to crack than a password
- How might someone evil try to get information from you
15 Clues: Who is responsible for data security • What is not allowed in a DNA password • What is the default data classification • Disclosing personal member information may be • This is better and harder to crack than a password • This is better and harder to crack than a password • Best way to keep track of multiple unique passwords • ...
March Security Crossword 2021-04-01
Across
- Last name of WikiLeaks founder
- Founded in 1955, a global community of security practitioners
- The 4th step in the EDIP Technique Training cycle
- city straddling the River Avon in the southwest of England where Large riots have recently taken place
- The monitoring of behavior, activities, or information
- (5,3) an ethical computer hacker
- Japanese organised crime syndicate
Down
- Current UK national threat level
- Biggest threat to Cultural Venues & Prometheus' gift
- Created the color code & a brand of Mini
- "Effect of uncertainty on objectives" - ISO 31000
- a 3 pronged spear
- (5,4) High profile museum burglary in Dresden, Germany
- Famous Federal Penitentiary in San Francisco Bay
14 Clues: a 3 pronged spear • Last name of WikiLeaks founder • Current UK national threat level • (5,3) an ethical computer hacker • Japanese organised crime syndicate • Created the color code & a brand of Mini • Famous Federal Penitentiary in San Francisco Bay • The 4th step in the EDIP Technique Training cycle • "Effect of uncertainty on objectives" - ISO 31000 • ...
Security Officer Numbers 2023-01-11
DE TOPIC 1 2025-08-03
Across
- Integration of cyber-physical systems, IoT, AI and data analitics
- Focused on mass production and global market
- utilising software and digital and technologies
Down
- Focus on physical good and services
- Focused on sustainability and environment conservation
- Follow islamic principles and ethics
- Operates online
- Create positive societal impact
8 Clues: Operates online • Create positive societal impact • Focus on physical good and services • Follow islamic principles and ethics • Focused on mass production and global market • utilising software and digital and technologies • Focused on sustainability and environment conservation • Integration of cyber-physical systems, IoT, AI and data analitics
Spanish crossword 2020-04-10
Across
- seat belt
- sleeping car
- visa
- in the train station
- connection
- passport
- to land
- coach
- aisle
- ticket
- stop
- to board
- security agent
- flight
- gate
- platform
- ticket window
- luggage screening
- second class
- to get or obtain
- to hope
- ticket
- car wagon
- baggage claim
- boarding pass
Down
- to go through security
- seat
- on time
- first class
- suitcase
- customs
- international airport
- window
- delayed
- mano carry-on baggage
- event ticket
- trip travel
- counter
- bunk
- to miss
- to see
- turn
- arrival
- flight attendent
- espera waiting room
- take off
- control
- passenger
- to check luggage
- to give
- layover
51 Clues: seat • visa • bunk • stop • turn • gate • coach • aisle • window • ticket • to see • flight • ticket • on time • customs • to land • delayed • counter • to miss • arrival • control • to give • to hope • layover • suitcase • passport • to board • platform • take off • seat belt • passenger • car wagon • connection • first class • trip travel • sleeping car • event ticket • second class • ticket window • baggage claim • boarding pass • security agent • flight attendent • ...
Security Terminology for Christian 2024-03-06
Across
- Network Interface Card
- the Bourne Again SHell
- Data Protection Officer
- Instant Messaging
- Domain Name System
- allows people to select the mobile devices they would like to use, typically from a limited number of options
- Chief Security Officer
- Layer 2 Tunneling Protocol
- Indicators of Compromise
- POST Office Protocol
- Personal Health Information
Down
- Network Attached Storage
- a type of challenge–response test used in computing to determine whether the user is human in order to deter bot attacks and spam
- being allowed to use one's personally owned device, rather than being required to use an officially provided device.
- Database Administrator
- Information Systems Security Officer
- Chief Information Officer
- Dynamic Link Library
- Personal Identification Number
- Chief Technology Officer
- Peer-to-Peer
21 Clues: Peer-to-Peer • Instant Messaging • Domain Name System • Dynamic Link Library • POST Office Protocol • Network Interface Card • the Bourne Again SHell • Database Administrator • Chief Security Officer • Data Protection Officer • Network Attached Storage • Indicators of Compromise • Chief Technology Officer • Chief Information Officer • Layer 2 Tunneling Protocol • Personal Health Information • ...
Information Security Management System (ISMS) 2014-03-14
Across
- HR personnel is assigned to prepare access request for HRIS and ______.
- A default folder where essential corporate documents must be stored
- ____________is everyone's responsibility
- A secret word or phrase that are to be treated as sensitive, confidential information
Down
- Signifies that asset is highly confidential/critical
- A document that defines the accountability and responsibility of the Asset Owner (custodian) and records the status of the asset.
- He signed the Information Security Policy
- Is the official name of the repository of ISMS Policies, Standards, Procedures and Guidelines
- New program launched in relation to ISMS where updates of which are shown through comic strips.
- Strong password should be at least ____ characters long.
- Also known as a confidentiality agreement
- Information security events or incidents must immediately be reported to____________.
- Aspects of Information Security
- IT system used when requesting access or raising any IT requests
- Recommended action for paper and printed material containing confidential information prior to disposal
15 Clues: Aspects of Information Security • ____________is everyone's responsibility • He signed the Information Security Policy • Also known as a confidentiality agreement • Signifies that asset is highly confidential/critical • Strong password should be at least ____ characters long. • IT system used when requesting access or raising any IT requests • ...
FITE: Tech. Terms By:Maya Ausley 2013-05-16
Across
- type of mouse
- Example: Comcast
- 'WWW'___________
- behavior online
- a device that connects to a computer
- 32 id numbers
- short term storage
- Liquid Cristal Display
- Example: speakers
- where you plug in speakers/earbuds
- LCD stands for___________.
- without cables or wires
- tools, machinery, and other durable equipment
- largest amount of storage space possible
- long term storage
Down
- your safety online
- wired internet port
- the primary circuit board
- NCSA stands for___________.
- online
- the smallest storage size
- visual display unit
- where you put in a disc
- Example: Temple Run
- the programs and other operating information used by computers
- flash drive port
- wireless internet
- cloud based presentation maker with zooming features
- Example: google
- online storage
30 Clues: online • type of mouse • 32 id numbers • online storage • behavior online • Example: google • Example: Comcast • 'WWW'___________ • flash drive port • wireless internet • Example: speakers • long term storage • your safety online • short term storage • wired internet port • visual display unit • Example: Temple Run • Liquid Cristal Display • where you put in a disc • without cables or wires • ...
Supercoulafragolisticexpeouladotios crossword puzzle 2013-08-26
Across
- open your mouth wide for the nurse.
- water that is ultra pure!
- Violins, Basses, Violas, and Cellos.
- programs for managers I think...
- fruits and veggies. and other stuff.
- they make vents.
- so logical!
- Makes cars.
- I'm in cyberspace!
Down
- its quality entertainment!
- they make kindles.
- the make radars. not much else to explain.
- I can see your bones!
- the opposite of hardware.
- so much information!
- zip code doors and stuff.
- the former producer company of Minecraft.
- these graphics are amazing!
- the opposite of software.
- hey transport stuff.
- Helping the earth and environment!
- they make websites
- Where boats drop off there exporting items.
- kind of looks like a U.S.B port...
- No monkey business!
- Yahoo pages.
26 Clues: so logical! • Makes cars. • Yahoo pages. • they make vents. • they make kindles. • they make websites • I'm in cyberspace! • No monkey business! • so much information! • hey transport stuff. • I can see your bones! • the opposite of hardware. • zip code doors and stuff. • water that is ultra pure! • the opposite of software. • its quality entertainment! • these graphics are amazing! • ...
OL 4, Unit 4, Station 2 2025-05-07
Across
- sofort, gleich
- abonnieren
- befreunden
- fitness Jumping Fitness
- täglich
- äußerst, sehr
- Veganismus
- kommunizieren
- Foto
- Einfluss, Auswirkung
- altmodisch
- Status
- veraltet
- Innovation, Neuheit
- Lieblings-
- Selfie
- Blogger
- begrüßen
- Konto
- trendsetzend
- einige, mehrere
Down
- beeinflussen
- Cyber-Mobbing
- verdienen
- seit, seitdem
- Kommentar
- Post
- eigentlich, grundsätzlich
- entfreunden
- Tonne
- Link
- Karte, Plan
- modisch, trendy
- Smartphone
- streamen
- Seite (im Internet)
- nicht mögen
- seit
- online stellen
- soziale Medien
- die Hälfte
- mobil, tragbar
- geben, existieren
- Trend, Entwicklung
- zerissen
- Anfrage
- updaten
- Computerspiele-
- Follower
- Clip; Ausschnitt
50 Clues: Post • Link • Foto • seit • Tonne • Konto • Status • Selfie • täglich • Blogger • Anfrage • updaten • streamen • veraltet • zerissen • begrüßen • Follower • verdienen • Kommentar • abonnieren • befreunden • Veganismus • Smartphone • altmodisch • die Hälfte • Lieblings- • entfreunden • Karte, Plan • nicht mögen • beeinflussen • trendsetzend • Cyber-Mobbing • seit, seitdem • äußerst, sehr • kommunizieren • sofort, gleich • online stellen • soziale Medien • ...
MOTIVATION 2023-04-22
French Airport 2013-06-12
22 Clues: gate • lobby • track • flight • window • ticket • counter • airline • airport • terminal • to leave • passport • airplane • suitcase • corridor • to arrive • passenger • hand baggage • flight number • international • boarding pass • control security
fish 2023-07-19
career 2019-01-19
15 Clues: ทหาร • นักสืบ • ช่างไฟ • หมอฟัน • เสมียน • พ่อครัว • นักเขียน • นักเรียน • ช่างประปา • ช่างตัดผม • บรรณาธิการ • ช่างถ่ายรูป • นักบินอวกาศ • doctor หมอตา • guard ยามรักษาความปลอดภัย
career 2019-01-19
15 Clues: ทหาร • นักสืบ • หมอฟัน • ช่างไฟ • เสมียน • พ่อครัว • นักเรียน • นักเขียน • ช่างตัดผม • ช่างประปา • บรรณาธิการ • ช่างถ่ายรูป • นักบินอวกาศ • doctor หมอตา • guard ยามรักษาความปลอดภัย
Block 2 & 4 - Common Words 2014-01-17
17 Clues: ID • guy • old • how • ugly • born • girl • cost • sound • spell • compare • last name • first name • pronunciation • driver's license • social security number • filled, complete, drunk
Teka teki silang keamanan 2025-11-28
Across
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
Teka teki silang keamanan 2025-11-28
Across
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
Down
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OF SERVICE (DOS)jenis ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
20 Clues: Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
Managing User Security 2021-09-28
Across
- the two keys included are Authentication Service exchange and Ticket Granting Service exchange.
- essentially a database of the network resources and includes objects such as user and group accounts,computers,servers, and printers.
- a user can be granted additional rights to data beyond what is allowed by his or her assigned access level
- allows semi-independent systems to work together.
- the measurement and analysis of a biological feature.
- the point where false rejection rate and false acceptance rate are equal.
Down
- it’s based off “what you do” like a pattern or rhythm.
- all the areas that give a hacker access to a system.
- when biometric credentials are authorized on invalid characteristics.
- the process of validating a user.
- opposite action denying an authorized biometric credential.
- standard authentication protocol on all versions of Microsoft servers when using the Active Directory.
- user cycle through different roles.
- the process of reducing or eliminating vulnerabilities on a system.
14 Clues: the process of validating a user. • user cycle through different roles. • allows semi-independent systems to work together. • all the areas that give a hacker access to a system. • the measurement and analysis of a biological feature. • it’s based off “what you do” like a pattern or rhythm. • opposite action denying an authorized biometric credential. • ...
Amazon Las 7 Security Part 2 2023-03-15
Across
- cleaners of the warehouse
- watches over the security team
- engineers of the warehouse
- the app we use to communicate with AA's
- who we report to for allied
- the master opener
Down
- who we report to for amazon
- maintenance of the building
- roving the buildings exterior
- the door security uses frequently
- tracking reports
11 Clues: tracking reports • the master opener • cleaners of the warehouse • engineers of the warehouse • who we report to for amazon • maintenance of the building • who we report to for allied • roving the buildings exterior • watches over the security team • the door security uses frequently • the app we use to communicate with AA's
Find The Parts of The School 2024-03-01
Across
- Monitoring and Handling School Security
- Where students eat lunch
- For personal counseling
- For Supplies, equipment and materials
- A level of a building
- For Physical Education Classes
Down
- Where students go for helth-related issues
- For conducting experiments
- Including the principal's,vice principal's
- For school assemblies, performances, events
- For art classes and projets
11 Clues: A level of a building • For personal counseling • Where students eat lunch • For conducting experiments • For art classes and projets • For Physical Education Classes • For Supplies, equipment and materials • Monitoring and Handling School Security • Where students go for helth-related issues • Including the principal's,vice principal's • ...
Klett 11.1 2025-11-11
Across
- abfahren, abfliegen
- Ankunft
- ausfüllen
- gültig
- Durchsuchung, Untersuchung
- Sicherheit, Sicherheitsvorkehrungen
- durchführen
Down
- Abreise, Abflug
- anmelden, verzollen
- Information, Auskunft
- ankommen
- Dokument, Papier
- zurückkommen, zurückkehren
- Reisepass
- Visum
- erreichen
- zurückkommen, zurückkehren
- Zoll
- Ausweispapier(e)
- Zoll
20 Clues: Zoll • Zoll • Visum • gültig • Ankunft • ankommen • ausfüllen • Reisepass • erreichen • durchführen • Abreise, Abflug • Dokument, Papier • Ausweispapier(e) • anmelden, verzollen • abfahren, abfliegen • Information, Auskunft • zurückkommen, zurückkehren • zurückkommen, zurückkehren • Durchsuchung, Untersuchung • Sicherheit, Sicherheitsvorkehrungen
Social Security 2017-03-01
Across
- federal program that taxes workers to provide income support to the elderly.
- federal system of health insurance for those requiring financial assistance.
- aversion/ the extent to which individuals are willing to bear risk.
- percentage of workers retiring at a certain age.
- payment that lasts until the recipient's death.
Down
- of deceased worker or former worker is also entitled to benefits.
- workers continue working past the age of 65 and are available upon retirement. benefit increases end at age 70.
- rating/ charging a price for insurance that is a function of realized outco
- federal program of health insurance for persons 65 years of age or older.
9 Clues: payment that lasts until the recipient's death. • percentage of workers retiring at a certain age. • of deceased worker or former worker is also entitled to benefits. • aversion/ the extent to which individuals are willing to bear risk. • federal program of health insurance for persons 65 years of age or older. • ...
network security 2022-10-31
Across
- a way of gaining sensitive information with influence
- convincing people you are a person known or from a well-known buisness who steal your information
- hacks installed without permition
- virus' that self replicate
- find and stops malware
- used to keep information secure
Down
- malware that attaches to certain file
- they examine data to block threats
- malware disguised as legitimate software
9 Clues: find and stops malware • virus' that self replicate • used to keep information secure • hacks installed without permition • they examine data to block threats • malware that attaches to certain file • malware disguised as legitimate software • a way of gaining sensitive information with influence • ...
Internet security 2023-11-27
Across
- What is the term for software created to damage or alter computer data or operations?
- What term refers to computer criminals who use technology to commit various crimes?
- What is a program that runs automatically and can be used to perform various tasks called?
- What is the term for software that protects a computer against malware programs?
- What is the term for the action of gaining unauthorized access to an account or personal information through deception or manipulation?
- What is the term for the illegal copying and distribution of copyrighted software, information, music, and video files?
Down
- What type of program attaches itself to executable files or documents and spreads by infecting other files or programs on a computer?
- What is the term for cyber attacks that attempt to gain unauthorized access to a computer system?
- What is the process of making a copy of data from a computer onto an external storage device, such as an external hard drive?
- What type of internet crime involves sending fake emails or creating false websites to obtain personal or banking information?
10 Clues: What is the term for software that protects a computer against malware programs? • What term refers to computer criminals who use technology to commit various crimes? • What is the term for software created to damage or alter computer data or operations? • What is a program that runs automatically and can be used to perform various tasks called? • ...
Computer Security 2023-09-21
Across
- to set up for use
- websites and other online forms of communication used to share information
- a kind of malware that can copy itself from one device to another
- safe
Down
- to keep safe
- an email, text message, or link that tricks people into giving criminals personal information
- computer software that criminals use to get people's personal information or passwords
- programs used by a computer
- a kind of malware that infects computers; a virus usually arrives as an email attachment
9 Clues: safe • to keep safe • to set up for use • programs used by a computer • a kind of malware that can copy itself from one device to another • websites and other online forms of communication used to share information • computer software that criminals use to get people's personal information or passwords • ...
Information Security 2020-07-08
Across
- when attackers use various methods/tricks to get
- actually purging the data; permanently losing the
- software used to prevent, detect, and remove malware
- testing to see if system vulnerabilities can be exploited in order to actually gain access to systems, the network, data and so forth; acts in a way that an attacker might act
- when someone gains entrance/access by
Down
- on the tailcoats of an authorized person
- information from unsuspecting persons
- used to perform authentication; a username,a certificate,or a token
- Identifying risks to understand the risks that we are exposed to
9 Clues: information from unsuspecting persons • when someone gains entrance/access by • on the tailcoats of an authorized person • when attackers use various methods/tricks to get • actually purging the data; permanently losing the • software used to prevent, detect, and remove malware • Identifying risks to understand the risks that we are exposed to • ...
Security Issues 2019-01-29
Across
- Everything is backed up at once.
- In this type of backup, only two image files are required to restore the system!
- Faster backup time as only amended files need to be copied.
- A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
- Useful when backing up large amounts of data.
- Procedures or measures taken to ensure the safety of an organisation.
- This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
- This is information that is still important but it is not needed for immediate use.
- A very important element to a company/organisation!
9 Clues: Everything is backed up at once. • Useful when backing up large amounts of data. • A very important element to a company/organisation! • Faster backup time as only amended files need to be copied. • Procedures or measures taken to ensure the safety of an organisation. • In this type of backup, only two image files are required to restore the system! • ...
Network Security 2024-05-12
Across
- Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- The process of protecting information or data by scrambling it so only those with the key can unscramble it
- A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
- A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
- A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
- An attack where a series of a computers repeatedly send requests to a server to overload a system
- The process of a user confirming that they are who they say they are on a computer system
- Trying to trick someone into giving out information over email
- A computer program that makes lots of copies of itself,
9 Clues: A computer program that makes lots of copies of itself, • Trying to trick someone into giving out information over email • The process of a user confirming that they are who they say they are on a computer system • An attack where a series of a computers repeatedly send requests to a server to overload a system • ...
Security Terms 2023-03-27
Across
- Seeking (BLANK) health treatment is a positive course of action and a key measure for suicide prevention.c
- CV record checks include (BLANK)
- (BLANK) is an important part of the DON PV Program.
- Head of the Navy Intelligence Community Elements (HICE
- After an individual has been “cleared,” they are continuously vetted using automated checks of (BLANK).
Down
- An insider threat may be (BLANK) if the insider is unaware that their actions or behaviors are exposing the United States to an elevated risk of harm or loss, perhaps through lack of training or negligence.
- CV record checks include (BLANK)
- personal are required to report security violations and changes to their personal status (e.g. marriage/divorce, arrests, delinquent debt, or foreign travel/contacts)
- CV record checks include (BLANK)
- CV record checks include (BLANK),
- CV record checks include (BLANK)
- Replacing DISS
12 Clues: Replacing DISS • CV record checks include (BLANK) • CV record checks include (BLANK) • CV record checks include (BLANK) • CV record checks include (BLANK) • CV record checks include (BLANK), • (BLANK) is an important part of the DON PV Program. • Head of the Navy Intelligence Community Elements (HICE • ...
Food Security 2024-12-17
Across
- Red fruit often mistaken for a vegetable
- Yellow fruit that monkeys love to eat
- Leafy green that made Popeye strong
- Round citrus fruit named after its color
- Small green vegetables that come in a pod
Down
- Green vegetable that looks like tiny trees
- Red berry with seeds on the outside
- Orange vegetable that helps you see in the dark
- Red fruit that keeps the doctor away
9 Clues: Red berry with seeds on the outside • Leafy green that made Popeye strong • Red fruit that keeps the doctor away • Yellow fruit that monkeys love to eat • Red fruit often mistaken for a vegetable • Round citrus fruit named after its color • Small green vegetables that come in a pod • Green vegetable that looks like tiny trees • ...
Kreuzwordrätsel 2016-05-17
Across
- Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
- Je länger das Passwort, desto ...
- Schutz von Infos
- Schutz von personenbezogenen Daten
Down
- Werbegeschenke, die mit Schadsoftware versehen sind
- Beispiel eines Passwortmanagers
- Schutz von vertraulichen Daten in E-Mails
- Methode zu Passwortfindung
- Notebook vor fremden Blicken schützen
- Über E-Mails an sensible Daten gelangen
- Größtes Risiko bei Social Engineering
- Abk. Data Security Partner
12 Clues: Schutz von Infos • Methode zu Passwortfindung • Abk. Data Security Partner • Beispiel eines Passwortmanagers • Je länger das Passwort, desto ... • Schutz von personenbezogenen Daten • Notebook vor fremden Blicken schützen • Größtes Risiko bei Social Engineering • Über E-Mails an sensible Daten gelangen • Schutz von vertraulichen Daten in E-Mails • ...
Kreuzworträtsel 2016-05-17
Across
- Über E-Mails sensible Daten gelangen
- Schutz von Vertrautlichkeit, Integrität und Verfügbarkeit
- Notebook vor fremden Blicken schützen
- Je länger das Passwort, desto ...
- Beispiel eines Passwortmanagers
- Schutz von personenbezogenen Daten
Down
- Schutz von Infos
- Größtes Risiko bei Social Engineering
- Werbegeschenke, die mit Schadsoftware versehen werden können
- Methode zur Passwortfindung
- Schutz von vertraulichen Daten in E-Mails
- Abk. Data Security Partner
12 Clues: Schutz von Infos • Abk. Data Security Partner • Methode zur Passwortfindung • Beispiel eines Passwortmanagers • Je länger das Passwort, desto ... • Schutz von personenbezogenen Daten • Über E-Mails sensible Daten gelangen • Größtes Risiko bei Social Engineering • Notebook vor fremden Blicken schützen • Schutz von vertraulichen Daten in E-Mails • ...
Kreuzworträtsel 2016-05-10
Across
- Schutz von Infos
- Über E-Mails an sensible Daten gelangen
- Schutz von vertraulichen Daten in E-Mails
- Schutz von Vertraulichkeit, Integrität und Verfügbarkeit
- Je länger das Passwort, desto ....
Down
- Werbegeschenke, die mit Schadsoftware versehen sind
- Größtes Risiko bei Social Engineering
- Methode zur Passwortfindung
- Schutz von personenbezogenen Daten
- Notebook vor fremden Blicken schützen
- Abk. Data Security Partner
- Beispiel eines Passwortmanagers
12 Clues: Schutz von Infos • Abk. Data Security Partner • Methode zur Passwortfindung • Beispiel eines Passwortmanagers • Schutz von personenbezogenen Daten • Je länger das Passwort, desto .... • Größtes Risiko bei Social Engineering • Notebook vor fremden Blicken schützen • Über E-Mails an sensible Daten gelangen • Schutz von vertraulichen Daten in E-Mails • ...
Words Unit 5 2017-05-06
14 Clues: Lohn • jagen • Decke • Angst • passend • Werkzeug • Stockwerk • romantisch • Verbindung • Verwandter • Sicherheit • Kühlschrank • Wolkenkratzer • Herausforderung
Data handling, Accountability, and Security 2023-11-22
Across
- Adherence to regulations and standards.
- Plan for data breaches.
- Attempt to trick individuals for data.
- Regulating data accessibility.
Down
- Programs to educate staff on data security.
- Responsibility for data handling.
- Protection of sensitive information.
- Evaluation of data security measures.
- Moral principles guiding data handling.
- Clear communication about data practices.
- Guidelines for data handling.
11 Clues: Plan for data breaches. • Guidelines for data handling. • Regulating data accessibility. • Responsibility for data handling. • Protection of sensitive information. • Evaluation of data security measures. • Attempt to trick individuals for data. • Moral principles guiding data handling. • Adherence to regulations and standards. • Clear communication about data practices. • ...
POLITICS 2016-03-01
Across
- : an attractive rather than coercive type of power
- : ASEAN observer (Acronym)
- : "city-state"
- : military or economic type of power
- : a subdiscipline of polisci that compares governments and political systems
- : Civil Society Organization
- : defense of the state and its citizens
- : International Relations
- : Politics as "master science"
Down
- : evolved as science and art
- : a qualitative approach that tries to find out what is best for the people
- : quantitative and descriptive approach approach
- : persons and institutions that make and enforce laws
- : the currency of politics
- : using laws to fairly judge and punish crimes and criminals
- : the act of influencing the government to do what you want
- : in charge of internal security
- : power of politicians and individuals to act out law
- : limitation and regulation
- : another term for "security"
20 Clues: : "city-state" • : International Relations • : ASEAN observer (Acronym) • : the currency of politics • : limitation and regulation • : evolved as science and art • : Civil Society Organization • : another term for "security" • : Politics as "master science" • : in charge of internal security • : military or economic type of power • : defense of the state and its citizens • ...
Military Acronyms 2019-04-04
Across
- Violation
- General Fund Enterprise Business System
- Marine Corps
- Cancelled
- Defense Enterprise Accounting and Management System
- Password
- Defense Cash Accountability System
- DFAS Automated Reporting & Tracking System
- Defense Travel System
- Accounts Receivable
- Standard Contract Reconciliation Tool
- Federal Employee Retirement System
- Army Material Command
- Accounts Payable
- Chief Financial Officer
- Voucher
- BRAC Transition Applications
Down
- Journal Voucher
- Commercial Invoice
- Air Force Space Command
- Line of Accounting
- Subject Matter Experts
- Naval Sea Systems Command
- Month to Date
- Electronic Signature
- Operational Security
- Department of Defense
- Defense Finance Accounting Services
- Disbursing Office
- General Schedule
- Year End
- Standard Operating Procedures
- Terminal Area Security Officer
- Rank
- Civilian
- Fiscal Year
- Unmatched Transaction
37 Clues: Rank • Voucher • Password • Year End • Civilian • Violation • Cancelled • Fiscal Year • Marine Corps • Month to Date • Journal Voucher • General Schedule • Accounts Payable • Disbursing Office • Commercial Invoice • Line of Accounting • Accounts Receivable • Electronic Signature • Operational Security • Department of Defense • Defense Travel System • Army Material Command • Unmatched Transaction • ...
Investing - Grace Lewis 2026-04-02
Across
- rising “up” market
- Someone that buys and sells stocks
- Something an employer does to complement your pay.
- gained from giving a loan to the government
- Max amount a company can have
- Loan to the government or company
- Age to receive social security benefits
- Wide range of stocks
- Something that affects stock inside a company
- Multiple companies in multiple stocks
- A share of a company
Down
- Putting money into stocks in increments no matter the status of the stock
- Place to buy stocks
- A specific place to store money for a specific purpose
- Someone that own stocks
- Social security and Medicare together
- Payment to shareholders usually quarterly
- Something that affects a company’s stock from the outside
- decreasing“down” market
- Union workers, firemen, etc. receive this
20 Clues: rising “up” market • Place to buy stocks • Wide range of stocks • A share of a company • Someone that own stocks • decreasing“down” market • Max amount a company can have • Loan to the government or company • Someone that buys and sells stocks • Social security and Medicare together • Multiple companies in multiple stocks • Age to receive social security benefits • ...
Happy Memories 2023-02-16
25 Clues: tw0 • six • one • ten • five • four • nine • three • seven • eight • twenty • eleven • twelve • fifteen • sixteen • nineteen • eighteen • thirteen • fourteen • twentyone • seventeen • twentytwo • twentyfour • twentyfive • twentythree
Unidad 2 Ciudadanía Digital y Conecta con Chile 2024-10-15
20 Clues: long • role • wide • fifty • miles • narrow • causes • coasts • almost • security • to promote • citizenship • reliability • two hundred • just (fair) • it possesses • five hundred • goals, objectives • fingerprint, footprint • to improve, to better (verb)
War and Peacekeeping 2023-11-26
Across
- What peacekeepers aim to achieve.
- Mission type often associated with the U.N.
- A nation helped by New Zealand's peacekeepers in 1999.
- Soldiers in digital battles.
- The opposite of peace.
- A mission to help a nation, often abbreviated.
- Something that is done to fix buildings and heal communities.
Down
- A nation known for its peacekeeping efforts, especially in the Pacific.
- Organisation often involved in peacekeeping.
- Headgear often worn by peacekeepers.
- They enforce law and order in a country.
- Large water bodies surrounding the Solomon Islands.
- Type of warfare conducted in cyberspace.
- Another word for conflict or battle.
- An act of helping or aiding.
15 Clues: The opposite of peace. • Soldiers in digital battles. • An act of helping or aiding. • What peacekeepers aim to achieve. • Headgear often worn by peacekeepers. • Another word for conflict or battle. • They enforce law and order in a country. • Type of warfare conducted in cyberspace. • Mission type often associated with the U.N. • Organisation often involved in peacekeeping. • ...
SCOTIA INFOALERTS!!! 2013-07-21
Across
- how many alert categories
- text back word used to end notification
- name one alert category
- accounts eligible
- where to register for alerts
- cancellation fee
Down
- way alerts can be received
- way alerts can be received
- does not apply to security alerts
- over___different alert types
- cost of enrollment
- where to register for alerts
12 Clues: cancellation fee • accounts eligible • cost of enrollment • name one alert category • how many alert categories • way alerts can be received • way alerts can be received • over___different alert types • where to register for alerts • where to register for alerts • does not apply to security alerts • text back word used to end notification
Crossword 2025-11-02
10 Clues: S______ settings • P______ & Security • Make a Strong P_______ • Multi-factor A_____________ • Fake message scams: P_______ • A dishonest schemer: S______ • U_____ your devices and apps • A copy of computer data: B_____ • Software that accesses devices: M______ • Software that asks for payment: R_________
