cyber security Crossword Puzzles

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. The ------------risk of the firm is diversifiable
  2. CAPM is a market --------------model
  3. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  4. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses.
  5. An opportunity where an investor earns riskless profit without making any net investment
  6. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  7. The other name for non-diversifiable risk is -------------------------
  8. One of the researchers/economists who developed the CAPM model
  9. The economist who developed the Arbitrage Pricing Theory (APT) model.
Down
  1. In the absence of secondary markets, this risk would be higher.
  2. The line representing CAPM is the -----------------market line
  3. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing.
  4. In order to diversify, we look for security returns that are related ------------------
  5. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  6. The other name for indifference curve is --------------curve
  7. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions.
  8. A conditional market order to sell stock if it drops to a given price (write without space)
  9. --------------------is the slope of the security characteristic line
  10. equal to the average ------------------as the number of securities becomes very large
  11. Variance of a portfolio with equi-proportionate investments in each security is
  12. The economist who laid the foundations for the Modern Portfolio theory

21 Clues: CAPM is a market --------------modelThe ------------risk of the firm is diversifiableThe other name for indifference curve is --------------curveThe line representing CAPM is the -----------------market lineOne of the researchers/economists who developed the CAPM modelIn the absence of secondary markets, this risk would be higher....

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. In order to diversify, we look for security returns that are related ------------------
  2. Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
  3. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
  4. In the absence of secondary markets, this risk would be higher
  5. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  6. The line representing CAPM is the -----------------market line
  7. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
  8. An opportunity where an investor earns riskless profit without making any net investment
  9. A conditional market order to sell stock if it drops to a given price (write without space)
  10. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
Down
  1. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  2. The other name for non-diversifiable risk is -------------------------risk
  3. The other name for indifference curve is --------------curve
  4. The economist who laid the foundations for the Modern Portfolio theory
  5. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
  6. --------------------is the slope of the security characteristic line
  7. The ------------risk of the firm is diversifiable
  8. CAPM is a market --------------model
  9. The economist who developed the Arbitrage Pricing Theory (APT) model
  10. One of the researchers/economists who developed the CAPM model

20 Clues: CAPM is a market --------------modelThe ------------risk of the firm is diversifiableThe other name for indifference curve is --------------curveIn the absence of secondary markets, this risk would be higherThe line representing CAPM is the -----------------market lineOne of the researchers/economists who developed the CAPM model...

Cast study - An ethical approach to hacking 2025-06-12

Cast study - An ethical approach to hacking crossword puzzle
Across
  1. Simulated cyberattacks used to assess system security.
  2. The analysis of systems and data to investigate security incidents or breaches.
  3. Software used to recover or bypass passwords through brute force or other methods.
  4. A testing method where the tester has full knowledge of the system’s internals.
  5. The technique of identifying active devices and services on a network.
  6. A testing method where the tester has partial knowledge of the system.
  7. A social engineering attack using phone calls to extract sensitive information.
  8. A unique identifier assigned to each device connected to a network.
  9. The creation of code or tools to take advantage of system vulnerabilities.
  10. Identifying the operating system of a target device during reconnaissance.
  11. Probing a system to identify open ports and available services.
  12. Psychological manipulation tactics to trick people into revealing confidential information.
  13. A documented strategy for detecting, responding to, and recovering from security incidents.
Down
  1. An evaluation of an organization’s overall cybersecurity strength and weaknesses.
  2. A web attack that injects malicious scripts into trusted websites.
  3. Using advanced search operators to find sensitive data or vulnerabilities online.
  4. The process of evaluating systems through defined methods to find vulnerabilities.
  5. Publicly available information gathered for analysis.
  6. Malicious software designed to harm or exploit systems.
  7. An exploit where a program overruns a buffer’s boundary and overwrites adjacent memory.
  8. A code injection attack targeting databases through malicious SQL queries.
  9. A social engineering method that involves inventing a scenario to steal information.
  10. An individual who gains unauthorized access to systems or data.
  11. A testing method where the tester has no prior knowledge of the system.
  12. The layout or structure of a network’s connections and devices.
  13. The process of discovering devices and connections within a network.

26 Clues: Publicly available information gathered for analysis.Simulated cyberattacks used to assess system security.Malicious software designed to harm or exploit systems.An individual who gains unauthorized access to systems or data.Probing a system to identify open ports and available services....

Radio Numbers 2026-03-27

Radio Numbers crossword puzzle
Across
  1. Amanda Laughery Night Shift Supervisor
  2. Ofc Erica Burns Building Security
  3. Breann Hathaway
  4. Ofc Michael Sheehan
  5. K9 Ofc Jason Ward
  6. Chief Eric Schmitt
  7. Sgt Caleb Teig
  8. Ofc Joshua Gross
  9. Code Norman Teed
  10. Natalie Rodgers
  11. Ofc Darold Donathan
  12. Chaplin Tom Willcox CP1
  13. Ofc Julia Swoboda
  14. PSA Haley Mendoza
  15. SRO Taylor Davisson
  16. Ofc Johnathan Sigmin
  17. Ofc Kory Franklin
  18. Ofc William Huber
  19. Sgt Stanley Kauffman
  20. Ofc Don Bradford Building Security
  21. Ofc Trainee Ashlyn Thom
  22. Allie Bryant
  23. Ofc Sarah Chapman Building Security
  24. Sgt Melissa Stowers
  25. Lt Dale Burnett
  26. Det Zach Hamilton
  27. Ofc Emilee Norris
  28. Det BJ Russell
  29. Ofc James Wood
  30. Code Kirk Standridge
  31. Ofc Michael Wachob
  32. Code Christopher Barber
  33. Sgt Jeremy Dixon
  34. Code Ronnie Bradley
  35. Ofc Steven Parrish
  36. Julie Lowery Records
  37. John Pate Part Time
  38. Ken Watson
  39. Ofc Colton Schmitt
  40. OIT Bodee Hern
  41. Nicole Robinson
Down
  1. Lt Eric Wehmeier
  2. PSA Dave Miller
  3. Det Sgt Tanner Muckenthaler
  4. Ofc Gavin Gannaway
  5. Ofc Christian Urbina
  6. Lt EJ Jones
  7. Ofc Matt Edie
  8. Ofc Wesley Anderson
  9. ACO Ashley Hurst
  10. Ofc Jordan Harder
  11. Ofc Chase Rains
  12. Breanne Benton
  13. K9 Ofc Brendan Gamble
  14. Kayla Lovell
  15. SRO Jesse Wilcox
  16. Ofc Brittney Holt
  17. Sgt Cody Lowery
  18. Ofc Kayla Smith
  19. Ofc Caleb McCarty
  20. Lori Hodge
  21. Ofc Nicholas Brown
  22. Det Cody Foster
  23. Ofc Daniel McKinney
  24. Sgt Gregory Yartz
  25. Ofc Robert Bishop Court Security
  26. Eastyn Buttke
  27. Ofc Austin Simmons
  28. Elijah Emerson
  29. Det Joe Edwards
  30. Ofc Amber Edie
  31. Ofc Alex Kaster
  32. Ofc Kyle Rhea
  33. Det Seth Jenkerson
  34. Ofc Alexander Rose
  35. Ofc Luis Gonzalez
  36. SRO Steve Mobley
  37. Det David Lingscheit
  38. Ofc Austin Williams
  39. Missy Dement Records
  40. Harold Clements Comm Supervisor
  41. Ofc Logan Wilson

82 Clues: Lori HodgeKen WatsonLt EJ JonesKayla LovellAllie BryantOfc Matt EdieEastyn ButtkeOfc Kyle RheaSgt Caleb TeigBreanne BentonElijah EmersonOfc Amber EdieDet BJ RussellOfc James WoodOIT Bodee HernPSA Dave MillerBreann HathawayOfc Chase RainsNatalie RodgersSgt Cody LoweryOfc Kayla SmithDet Cody FosterLt Dale BurnettDet Joe EdwardsOfc Alex Kaster...

Network Requirements 2023-09-05

Network Requirements crossword puzzle
Across
  1. A set of rules for the network
  2. managing IP-packet traffic
  3. the basic unit of data
  4. maximum data rate networks can manage
  5. the structure of a network
  6. ensures protection from unauthorised access
  7. accommodation of growth without decreased performance
  8. maximum size of a packet that can be transmitted
  9. a security device
  10. usage of backup components
Down
  1. allows access to a private network over the internet
  2. actual data transfer rate
  3. translates domain names to IP addresses
  4. division of a network into subnetworks
  5. allows multiple devices on a private network to share a public IP address
  6. make late
  7. delay in transmission measured in (ms)
  8. involves constant diagnosis of issues and network analysis
  9. deviation in signal pulses
  10. another word for forfeiture

20 Clues: make latea security devicethe basic unit of dataactual data transfer ratemanaging IP-packet trafficthe structure of a networkdeviation in signal pulsesusage of backup componentsanother word for forfeitureA set of rules for the networkmaximum data rate networks can managedivision of a network into subnetworksdelay in transmission measured in (ms)...

Spanish Travel Vocab 2020-04-10

Spanish Travel Vocab crossword puzzle
Across
  1. to see
  2. stop
  3. baggage claim
  4. second class
  5. to hope
  6. flight attendant
  7. event ticket
  8. to take off
  9. to go through security
  10. gate
  11. car wagon
  12. to check luggage
  13. to miss
  14. departure
  15. platform
  16. coach
  17. trip
  18. counter
  19. in the train station
  20. window
  21. customs
  22. layover
  23. ticket
  24. international airport
  25. carry on luggage
Down
  1. security agent
  2. in the airport
  3. luggage
  4. first class
  5. aisle
  6. baggage screening
  7. boarding pass
  8. delayed
  9. suitcase
  10. waiting room
  11. to land
  12. visa
  13. to get
  14. ticket
  15. bunk
  16. passenger
  17. seat belt
  18. to give
  19. sleeping car
  20. arrival
  21. flight
  22. ticket window
  23. connection
  24. on time
  25. seat
  26. to turn
  27. controller

52 Clues: stopvisagatebunktripseataislecoachto seeto getticketflightwindowticketluggageto hopedelayedto landto missto givecounterarrivalcustomslayoveron timeto turnsuitcaseplatformcar wagonpassengerdepartureseat beltconnectioncontrollerfirst classto take offsecond classwaiting roomevent ticketsleeping carbaggage claimboarding passticket windowsecurity agent...

CITS2006-C10-Mohammad 2025-05-19

CITS2006-C10-Mohammad crossword puzzle
Across
  1. Secures internet traffic over public networks
  2. Converting data into an unreadable form
  3. Fake system to lure attackers
  4. Overwhelming a many systems with traffic
  5. Records keystrokes secretly
  6. Malware disguised as legitimate software
  7. Secures data with one-way transformation
  8. Malicious software
  9. Digital proof of website authenticity
  10. Pretending to be a trusted source
  11. Self-replicating malware
Down
  1. Tricking users to steal information
  2. Guessing repeatedly to gain access
  3. Hidden way to bypass security
  4. Vulnerability with no known fix yet
  5. Locks files for money
  6. Network of infected devices
  7. Exploits database query vulnerabilities
  8. Isolated space to safely run untrusted code
  9. Secretly monitors user activity
  10. Security fix for a software
  11. Protocol securing web communications
  12. Filters network traffic
  13. Adding extra login verification steps

24 Clues: Malicious softwareLocks files for moneyFilters network trafficSelf-replicating malwareNetwork of infected devicesRecords keystrokes secretlySecurity fix for a softwareHidden way to bypass securityFake system to lure attackersSecretly monitors user activityPretending to be a trusted sourceGuessing repeatedly to gain access...

The 16 Career Clusters 2025-10-19

The 16 Career Clusters crossword puzzle
Across
  1. : Plane driver in Transportation, Distribution & Logistics
  2. : Patient care provider in Health Science
  3. : Numbers expert in Business, Management & Administration
  4. : Animal doctor in Agriculture, Food & Natural Resources
  5. : Fashion demonstrator in Marketing, Sales & Service
  6. : Food preparation expert in Hospitality and Tourism
  7. : Wiring expert in Architecture & Construction
  8. : Book manager in Education & Training
  9. : Congressional assistant in Government & Public Administration
  10. : Metal joiner in Manufacturing
Down
  1. : Fire responder in Law, Public Safety, Corrections & Security
  2. : Design specialist in Science Technology, Engineering & MATH
  3. : Spiritual leader in Human Services
  4. : Legal representative in Law, Public Safety, Corrections & Security
  5. : Oral health specialist in Health Science
  6. : Financial institution manager in Finance
  7. : Music performer in Arts, A/V Tech & Communications
  8. : Knowledge imparter in Education & Training
  9. : Network systems expert in Information Technology
  10. : Building designer in Architecture & Construction

20 Clues: : Metal joiner in Manufacturing: Spiritual leader in Human Services: Book manager in Education & Training: Patient care provider in Health Science: Oral health specialist in Health Science: Financial institution manager in Finance: Knowledge imparter in Education & Training: Wiring expert in Architecture & Construction...

Airports 2020-05-13

Airports crossword puzzle
Across
  1. indulás
  2. érkezés
  3. bőrönd
  4. vámvizsgálat
  5. WC
  6. poggyász
  7. utas
  8. beszállni
  9. fogorvos
  10. kézikocsi
  11. létesítmény
  12. repülőjárat
  13. biztonsági
  14. késik
Down
  1. sor
  2. bevándorlás
  3. bejelentkezés
  4. rendelő
  5. útlevél
  6. külföldre
  7. szórakoztatni
  8. váróterem
  9. városnézés
  10. kapu
  11. repülőtér

25 Clues: WCsorutaskapukésikbőröndindulásérkezésrendelőútlevélpoggyászfogorvoskülföldrebeszállniváróteremkézikocsirepülőtérvárosnézésbiztonságibevándorláslétesítményrepülőjáratvámvizsgálatbejelentkezésszórakoztatni

C2 2025-05-15

C2 crossword puzzle
Across
  1. turtle
  2. door
  3. bed
  4. flag
  5. helicopter
  6. lamp
  7. cat
  8. security
  9. snake
  10. cruise ship
  11. luggage
  12. train
Down
  1. hamburger
  2. pilot
  3. eagle
  4. pasta
  5. window
  6. dog
  7. cereal
  8. car
  9. hot dog
  10. pyramid
  11. passport
  12. bunny

24 Clues: dogbedcarcatdoorflaglamppiloteaglepastabunnysnaketrainwindowturtlecerealhot dogpyramidluggagepassportsecurityhamburgerhelicoptercruise ship

Capítulo 7: A Viajar #2 2024-11-19

Capítulo 7: A Viajar #2 crossword puzzle
Across
  1. table tray
  2. to take the train
  3. to pack suitcases
  4. passenger
  5. destination
  6. price
  7. layover
  8. security
  9. park
  10. bicycle
Down
  1. flight
  2. train track
  3. arrivals
  4. customs
  5. floor
  6. train
  7. one-way ticket
  8. entrance
  9. to plan
  10. airplane

20 Clues: parkfloortrainpriceflightcustomsto planlayoverbicyclearrivalsentrancesecurityairplanepassengertable traytrain trackdestinationone-way ticketto take the trainto pack suitcases

Tom Brouwers Engels 2021-01-13

Tom Brouwers Engels crossword puzzle
Across
  1. what you get when it's halloween
  2. when something terrible has happend you need to ...
  3. things in our body to keep us living
  4. when his father died he dropped a ...
  5. the row of bones in your back
  6. all planets are in a ...
  7. when you can't stop doing something you have an ...
  8. things made out of wood
  9. when it's heavily snowing
Down
  1. a sentence what someone said is a ...
  2. the midway pauze in a game
  3. when there is lightning an thunder
  4. the place where you need to wait
  5. opposite of finish
  6. when you see somebody you ... them
  7. to be save for covid you need to have a ... with the covid vaccine
  8. life from anotherplanet
  9. our ... is called the milky way
  10. online
  11. the opposite of pessimist

20 Clues: onlineopposite of finishlife from anotherplanetthings made out of woodall planets are in a ...the opposite of pessimistwhen it's heavily snowingthe midway pauze in a gamethe row of bones in your backour ... is called the milky waywhat you get when it's halloweenthe place where you need to waitwhen there is lightning an thunder...

Crossword Puzzle 2022-11-27

Crossword Puzzle crossword puzzle
Across
  1. The edgier battle star
  2. famous Early 90s Kindergarten teacher
  3. “I see you enjoy Super Mario…”
  4. Your greatest cyber crime
  5. 1988’s olympic winter
  6. “Resident” Albert
  7. Metal Gear character who likes to wrestle senators
  8. An adorable name for Hershey Bars
  9. Your kind of sister
  10. A double entendre TV show
  11. A wholesome healthy breakfast
  12. An 80s themed “Vice” with plenty of white suits
  13. Lost in ’88
Down
  1. Your on a first name basis with this Galactica Admiral
  2. dating sim meets supernatural teen adventure
  3. Being ___ in Detroit is hard
  4. No___ GTA RP
  5. A fun holiday treat
  6. Themed Oreos are highly…
  7. The proper microwave wattage
  8. A rare candy bar
  9. A renowned piece of art
  10. MultiVersus competitor (this clue is sponsored by Chilis)

23 Clues: Lost in ’88No___ GTA RPA rare candy bar“Resident” AlbertA fun holiday treatYour kind of sister1988’s olympic winterThe edgier battle starA renowned piece of artThemed Oreos are highly…Your greatest cyber crimeA double entendre TV showBeing ___ in Detroit is hardThe proper microwave wattageA wholesome healthy breakfast“I see you enjoy Super Mario…”...

Happy Valentines Day! I love you! 2024-02-12

Happy Valentines Day! I love you! crossword puzzle
Across
  1. Something Mia dreams of (NOT adultery)
  2. Mia's favorite thing to see on Duncan's face
  3. Large, glittering, masculine
  4. For intellectual couples
  5. Something Duncan doesn't play with me
  6. Tinned fish for Duncan
  7. Duncan's mistress
  8. Long and short bursts of "I love you"
  9. Special meal first eaten on Cyber Monday
  10. Makes us better
Down
  1. Our first meal together
  2. Dark, night, cold, passive (plural); everyone in Pittsburgh
  3. What not to give a sick man
  4. Something I want to spend on Duncan
  5. Duncan, of Target
  6. something Mia loves to do with her boyfriend
  7. What Duncan claims he is not
  8. A drink that could be found in a china shop
  9. The best thing since Prozac
  10. Concerned with implications
  11. How much I love Duncan, with coffee

21 Clues: Makes us betterDuncan, of TargetDuncan's mistressTinned fish for DuncanOur first meal togetherFor intellectual couplesWhat not to give a sick manThe best thing since ProzacConcerned with implicationsWhat Duncan claims he is notLarge, glittering, masculineSomething I want to spend on DuncanHow much I love Duncan, with coffee...

RUU TNI Resmi jadi Undang-Undang 2025-04-04

RUU TNI Resmi jadi Undang-Undang crossword puzzle
Across
  1. kata 'cyber' dalam B.Indonesia menjadi ...
  2. pangkat dalam TNI dan Polri yang lebih rendah dari Bintara adalah ...
  3. kata kerja dari 'tangan' adalah ...
  4. kata 'article' dalam UU disebut ...
  5. sinonim kata 'pencegahan' adalah ...
  6. persamaan makna dari 'waktu itu' adalah ...
  7. sinonim dari kata 'posisi' dalam pekerjaan adalah ...
  8. kata 'ministry' dalam B.Indonesia adalah ...
  9. pangkat dalam TNI dan Polri yang berada ditengah-tengah ialah ...
  10. kata 'highlights' dalam B.Indonesia adalah ...
  11. sinonim kata 'meresmikan' adalah ...
Down
  1. kata 'secretariat' dalam B.Indonesia menjadi ...\
  2. menjalankan posisi dan tugas juga disebut ...
  3. sinonim kata 'berada dalam' adalah ...(loaded)
  4. kata 'set/define' dalam B.Indonesia adalah ...
  5. kata 'to save/rescue' dalam B.Indonesia adalah ...
  6. sinonim kata 'dasar' adalah ...
  7. kata benda dari 'mengancam' adalah ...
  8. pangkat dalam TNI dan Polri yang lebih tinggi dari bintara adalah ...
  9. sinonim kata dari 'diringkas' adalah ...

20 Clues: sinonim kata 'dasar' adalah ...kata kerja dari 'tangan' adalah ...kata 'article' dalam UU disebut ...sinonim kata 'pencegahan' adalah ...sinonim kata 'meresmikan' adalah ...kata benda dari 'mengancam' adalah ...sinonim kata dari 'diringkas' adalah ...kata 'cyber' dalam B.Indonesia menjadi ...persamaan makna dari 'waktu itu' adalah ......

GE 2025-04-13

GE crossword puzzle
Across
  1. risks of cyber threats and vulnerabilities
  2. gap to emerging technologies
  3. machine learning that perform tasks
  4. Tailored to fit the specific job you are applying
  5. leveraging principles of quantum mechanics
  6. integration of emerging technologies in industries
  7. delivery of computing services over the internet
  8. connects devices to the internet
  9. overlays digital information onto physical world
  10. refers to the innovative advancements in various field
  11. - creates immersive virtual environment
Down
  1. being updated to the innovative ways and effect on industry
  2. effect of innovations in renewable energy
  3. joining professional organization to stay informed about industry developments.
  4. - it refers to the emerging technologies in various field
  5. A distributed ledger technology
  6. advancement in biotech
  7. the purpose of emerging technologies
  8. staying flexible and adapting to changes.
  9. Not necessarily tailored for specific jobs

20 Clues: advancement in biotechgap to emerging technologiesA distributed ledger technologyconnects devices to the internetmachine learning that perform tasksthe purpose of emerging technologies- creates immersive virtual environmenteffect of innovations in renewable energystaying flexible and adapting to changes.risks of cyber threats and vulnerabilities...

CYBAH 2025-07-02

CYBAH crossword puzzle
Across
  1. Program du laddar ner till mobilen
  2. Hemsiodor använder dem för att samla information om di
  3. Person som gör intrång i system
  4. An cyberattack som begränaer tillkommligheten till en tjänst
  5. Skadlig kod som kräver lösensumma
  6. Bluffmail som försöker lura dig att lämna ut information
  7. Skyddar din internettrafik via en säker tunnel
  8. Hemlig kombination för inloggning
  9. Juridiskt skydd för personlig informatio online
  10. Program som upptäcker skadlig kod
  11. Automatisk programkod som kan missbrukas
Down
  1. Prefix som betyder digitalt eller internetrelaterat
  2. Vad står P:et i IP-adress för (svenska ordet)
  3. Plats där du lagrar filer online
  4. Gör information oläslig utan nyckel
  5. Något du bör skydda online
  6. En sort skod man kan skanna med mobilen
  7. Personligt Identifikations Nummer
  8. Skyddar nätverket från obehörig åtkomst
  9. Litet, portabelt lagringsminne

20 Clues: Något du bör skydda onlineLitet, portabelt lagringsminnePerson som gör intrång i systemPlats där du lagrar filer onlineSkadlig kod som kräver lösensummaPersonligt Identifikations NummerHemlig kombination för inloggningProgram som upptäcker skadlig kodProgram du laddar ner till mobilenGör information oläslig utan nyckel...

Informatika sekarang dan Masa depan 2025-08-26

Informatika sekarang dan Masa depan crossword puzzle
Across
  1. Program berbahaya yang bisa merusak sistem komputer
  2. Ilmu tentang data besar disebut
  3. Teknologi uang digital
  4. Kendaraan tanpa pengemudi
  5. Robot dengan kecerdasan buatan
  6. Aplikasi yang memungkinkan komunikasi tatap muka secara virtual
  7. Proses mengubah data mentah menjadi informasi yang berguna
  8. Alat untuk menghubungkan komputer ke jaringan internet
  9. Jaringan perangkat saling terhubung
  10. Bahasa pemrograman popular dalam pengolahan big data
Down
  1. Sistem yang bisa belajar dari data
  2. Big data tidak akan berguna tanpa analisis
  3. Perangkat wearable yang bisa menghitung langkah kaki dan detak jantung
  4. Sistem keamanan di dunia digital
  5. Jaringan global yang menghubungkan miliaran perangkat diseluruh dunia
  6. Algotitma pembelajaran AI
  7. Konten negatif atau menyesatkan yang sering beredar di sosial media
  8. Penyimpanan data di internet
  9. Penyimpanan dan pemrosesan data besar
  10. Proses mengenali informasi dari data besar

20 Clues: Teknologi uang digitalKendaraan tanpa pengemudiAlgotitma pembelajaran AIPenyimpanan data di internetRobot dengan kecerdasan buatanIlmu tentang data besar disebutSistem keamanan di dunia digitalSistem yang bisa belajar dari dataJaringan perangkat saling terhubungPenyimpanan dan pemrosesan data besarBig data tidak akan berguna tanpa analisis...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. ______Regulation works by utilising feedback
  2. Shawn Fanning created the______
  3. cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  4. cyber________
Down
  1. according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
  2. some experts regard digital______ as the third industrial revolution
  3. the conversion of analogue data into digital form
  4. wrote Code and Other Laws of Cyberspace

8 Clues: cyber________Shawn Fanning created the______wrote Code and Other Laws of Cyberspace______Regulation works by utilising feedbackthe conversion of analogue data into digital formsome experts regard digital______ as the third industrial revolution...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  2. ____Regulation works by utilising feedback
  3. according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
  1. wrote Code and Other Laws of Cyberspace
  2. cyber____
  3. digital___ is the productivity platform that some experts regard as the third industrial revolution
  4. Shawn Fanning created the____
  5. the conversion of analogue data into digital form

8 Clues: cyber____Shawn Fanning created the____wrote Code and Other Laws of Cyberspace____Regulation works by utilising feedbackthe conversion of analogue data into digital formdigital___ is the productivity platform that some experts regard as the third industrial revolution...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. An individual who causes harm or stress to another human intentionally and repetitively.
  2. The act of protecting ones self or others from harm or intimidation online.
  3. the use of technology to harass, threaten, embarrass, or target another person.
  4. A result or effect, typically one that is unwelcome or unpleasant.
Down
  1. Electronic device most students own at home and is square and mostly portable.
  2. A repetitive action toward another human purposely causing harm or intimidation.
  3. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  4. Having firm belief or reliability in someone.

8 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.The act of protecting ones self or others from harm or intimidation online.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person....

Cyber Liability 2020-02-05

Cyber Liability crossword puzzle
Across
  1. Direct monetary fines, penalties, reimbursements, fraud recoveries or assessments owed by the insured organization under the terms of a merchant services agreement.
  2. Legal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages.
  3. In the wake of a data breach provides services to the insured, including: computer expert, legal, public relations and crisis management, breach notifications, call center, breach resolution and mitigation.
  4. Indemnifies the insured for data protection loss incurred by the insured due to alteration, corruption, destruction, deletion or damage to a data asset, or inability to access a data asset.
  5. Liability to third party individuals or businesses for theft, loss, or unauthorized disclosure of personally identifiable information or third party information that is in the care, custody, or control of the insured organization.
Down
  1. Net profit and extra expense loss during the period of restoration
  2. Coverage for payment made in response to an extortion threat to damage or corrupt data if not paid. Typically carried out by hackers placing ransomware on our insured's systems.
  3. Coverage for defense costs and penalties resulting from Federal Trade Commission (FTC) or Federal Communications Commission (FCC) proceedings concerning a covered data breach incident.

8 Clues: Net profit and extra expense loss during the period of restorationLegal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages....

Cyber bullying 2024-10-08

Cyber bullying crossword puzzle
Across
  1. Never open an ___ from someone you do not know or from bullies
  2. Do not spread ___ about someone
  3. Never give out personal __
  4. Do not send ___ messages
  5. Do not ___ a person from online activities such as a chat
Down
  1. Never tell anyone your ___, not even your friends
  2. Be ___ to others
  3. Do not send messages when you are ___

8 Clues: Be ___ to othersDo not send ___ messagesNever give out personal __Do not spread ___ about someoneDo not send messages when you are ___Never tell anyone your ___, not even your friendsDo not ___ a person from online activities such as a chatNever open an ___ from someone you do not know or from bullies

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. Talking someone into revealing secrets or embarrassing information
  2. someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  3. intense harassment and denigration that includes threats or creates significant fear.
  4. Intentionally and cruelly excluding someone from an online group
  5. Sharing someone's secrets or embarrassing information
Down
  1. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation
  2. Repeatedly sending nasty, mean, and insulting messages
  3. Online fights using electronic messages with angry and vulgar language.

8 Clues: Sharing someone's secrets or embarrassing informationRepeatedly sending nasty, mean, and insulting messagesIntentionally and cruelly excluding someone from an online groupTalking someone into revealing secrets or embarrassing informationOnline fights using electronic messages with angry and vulgar language....

cyber crimes 2023-05-04

cyber crimes crossword puzzle
Across
  1. personal data should be kept _______ by company's and organization
  2. can have information data _______
  3. when some one try stealing data of you by calling or messaging you pretending to be someone else
  4. data should be used _________
Down
  1. can request to ____ erased
  2. sneaking on to someone's computer and intending to committed a crime has 5 years of prison and a ________ fine
  3. you can request your ________ information
  4. they are 7 __________

8 Clues: they are 7 __________can request to ____ eraseddata should be used _________can have information data _______you can request your ________ informationpersonal data should be kept _______ by company's and organizationwhen some one try stealing data of you by calling or messaging you pretending to be someone else...

Cyber Crime 2025-02-06

Cyber Crime crossword puzzle
Across
  1. Kejahatan yang dilakukan dengan cara mengintip atau mengambil informasi pribadi seseorang secara diam-diam.
  2. Tindakan yang dilakukan untuk menipu orang agar memberikan informasi pribadi melalui email atau situs palsu
  3. Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat.
  4. Aksi mengganggu atau menyerang sistem komputer atau jaringan dengan tujuan merusak atau mencuri data.
Down
  1. Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online.
  2. Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer.
  3. Tindakan mengirim pesan atau email berulang kali dengan maksud mengganggu atau mengintimidasi korban.
  4. Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi.

8 Clues: Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi.Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat.Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online.Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer....

cyber ethics 2025-06-07

cyber ethics crossword puzzle
Across
  1. Strong code used to protect your digital identity
  2. : When your personal info is stolen and misused
  3. Avoid this while using someone else’s digital content
  4. Posting rude or harmful comments online is called
Down
  1. Software that defends systems from cyber threats
  2. Using someone's personal information without permission
  3. Sending fake emails to trick users into revealing private info
  4. False online identity to mislead others

8 Clues: False online identity to mislead othersStrong code used to protect your digital identity: When your personal info is stolen and misusedAvoid this while using someone else’s digital contentSoftware that defends systems from cyber threatsPosting rude or harmful comments online is called...

Cyber-crossing 2024-10-29

Cyber-crossing crossword puzzle
Across
  1. The act of disguising as a trusted entity to obtain information.
  2. Media that has been adjusted to spread falsified information.
  3. Steps taken to protect a device from threats.
  4. 2 Step verification is an example of:
Down
  1. A secret word or phrase used to gain access.
  2. Impersonation of another person to commit crimes.
  3. A type of malware with the ability to spread throughout a system.
  4. Someone who gains unauthorised access to systems.

8 Clues: 2 Step verification is an example of:A secret word or phrase used to gain access.Steps taken to protect a device from threats.Impersonation of another person to commit crimes.Someone who gains unauthorised access to systems.Media that has been adjusted to spread falsified information.The act of disguising as a trusted entity to obtain information....

Cyber Crossword 2025-09-30

Cyber Crossword crossword puzzle
Across
  1. Keeps network traffic private over the internet.
  2. Secret string used to access accounts.
  3. A site pretending to be real to steal credentials.
  4. Software that self replicates and spreads maliciously.
  5. A device or software that blocks unauthorized network traffic.
Down
  1. Process that converts data into unreadable form to protect it.
  2. A fraudulent message designed to trick recipients into sharing info.
  3. Software used by attackers to lock files or steal data for ransom.

8 Clues: Secret string used to access accounts.Keeps network traffic private over the internet.A site pretending to be real to steal credentials.Software that self replicates and spreads maliciously.Process that converts data into unreadable form to protect it.A device or software that blocks unauthorized network traffic....

FPS Definitions 2023-05-09

FPS Definitions crossword puzzle
Across
  1. VR A headset used to view virtual reality
  2. Using reality’s in away not intended
  3. A interactive video that views the entire visible area
  4. A system that can give you feedback on your health
  5. Attract and hold attention
  6. A term that capitulates other realities
Down
  1. Motion sickness cause my devices
  2. A visible form of an idea
  3. Digital elements used to overview real life
  4. A code used to program

10 Clues: A code used to programA visible form of an ideaAttract and hold attentionMotion sickness cause my devicesUsing reality’s in away not intendedA term that capitulates other realitiesVR A headset used to view virtual realityDigital elements used to overview real lifeA system that can give you feedback on your health...

CyberDSA D1 2025-08-14

CyberDSA D1 crossword puzzle
Across
  1. Malicious software designed to damage systems
  2. Malicious program disguised as legitimate software
  3. Incident where unauthorized access to data occurs
  4. Fraudulent emails or messages to steal credentials
  5. Hostile action aimed at exploiting vulnerabilities
Down
  1. Organization behind the ATT&CK framework for cyber threats.
  2. Malware that encrypts files and demands payment
  3. Intelligence gathered from publicly available sources
  4. Network of compromised devices controlled remotely
  5. Decoy system set up to lure attackers

10 Clues: Decoy system set up to lure attackersMalicious software designed to damage systemsMalware that encrypts files and demands paymentIncident where unauthorized access to data occursMalicious program disguised as legitimate softwareNetwork of compromised devices controlled remotelyFraudulent emails or messages to steal credentials...

Health 2022-10-24

Health crossword puzzle
Across
  1. A bullying done on social media/internet
  2. A bullying done by actions physically
  3. The person who helps the victim
  4. A person who stands by all the bullies actions.
  5. being sad for a long period of time
Down
  1. A person who bullies others
  2. can recover quickly and not strong as depression
  3. A bullying done by words
  4. You joke in a way that makes people smile
  5. The person the bully bullies

10 Clues: A bullying done by wordsA person who bullies othersThe person the bully bulliesThe person who helps the victimbeing sad for a long period of timeA bullying done by actions physicallyA bullying done on social media/internetYou joke in a way that makes people smileA person who stands by all the bullies actions....

Health crossword puzzle 2022-10-24

Health crossword puzzle crossword puzzle
Across
  1. a person that stands up to the bully
  2. the type of bullying that uses violence
  3. the type of bullying that’s on the internet
  4. the need to kill yourself
Down
  1. a person that isn’t involved in the conflict
  2. the person that hurts the victim physically and mentally
  3. the type of bullying that uses words
  4. felling sad for multiple days
  5. the person that’s getting bullied
  6. hurting someone physically and mentally

10 Clues: the need to kill yourselffelling sad for multiple daysthe person that’s getting bulliedthe type of bullying that uses wordsa person that stands up to the bullythe type of bullying that uses violencehurting someone physically and mentallythe type of bullying that’s on the interneta person that isn’t involved in the conflict...

Complete the crossword for words with soft c 2025-09-29

Complete the crossword for words with soft c crossword puzzle
Across
  1. last month of the year
  2. move around
  3. an ordinary person not in the armed forces
  4. a tank to hold water as in a toilet
Down
  1. to do with computers, the internet or online world
  2. do something happy to mark a special day
  3. very good exceptional
  4. a special piece of paper to say what you achieved
  5. a special service at an event such as a wedding
  6. something happens by mistake

10 Clues: move aroundvery good exceptionallast month of the yearsomething happens by mistakea tank to hold water as in a toiletdo something happy to mark a special dayan ordinary person not in the armed forcesa special service at an event such as a weddinga special piece of paper to say what you achievedto do with computers, the internet or online world

12.a 2 2023-04-25

12.a 2 crossword puzzle
Across
  1. market research
  2. responsibility
  3. advantage
  4. office staff
  5. quantity
  6. weakness
  7. salary
Down
  1. market gap
  2. survive
  3. enterprise
  4. develop
  5. sample
  6. reward
  7. independence
  8. security
  9. time-consuming

16 Clues: samplerewardsalarysurvivedevelopsecurityquantityweaknessadvantagemarket gapenterpriseindependenceoffice staffresponsibilitytime-consumingmarket research

U11 - Mod 13 Key Terms 2024-10-21

U11 - Mod 13 Key Terms crossword puzzle
Across
  1. access controls that are actual barriers deployed to prevent direct physical contact with systems.
  2. (4,5) is a comprehensive approach to securing all access across networks, applications, and environments.
  3. it verifies the identity of each user, to prevent unauthorized access; An administrative access control, one of the three security services.
  4. (4,3,4) Smart cards and security key fobs are examples of something that users possess
  5. it keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make; An administrative access control, one of the three security services.
  6. (4,3,4) Passwords, passphrases, or PINs are all examples
Down
  1. (6,4,2) solution allows the user to use one set of login credentials to authenticate across multiple applications. This way, the user only needs to remember one strong password.
  2. it determines which resources users can access, along with the operations that users can perform; An administrative access control, one of the three security services.
  3. access controls that are the hardware and software solutions used to manage access to resources and systems.
  4. access controls that are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
  5. are rules configured to limit folder or file access for an individual or a group and can help secure data.
  6. (3,3,3) Biometric security compares unique physical characteristics against stored profiles to authenticate users.

12 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples(4,3,4) Smart cards and security key fobs are examples of something that users possessaccess controls that are actual barriers deployed to prevent direct physical contact with systems.(4,5) is a comprehensive approach to securing all access across networks, applications, and environments....

Finance 1-9 2013-08-22

Finance 1-9 crossword puzzle
Across
  1. dluznik
  2. ubezpieczenie spoleczne "social ......"
  3. obligacja
  4. kredyt hipoteczny
  5. ujawniac
  6. oddzial
  7. prowizja
  8. przychod
  9. spolka
  10. zobowiazanie
  11. wynajem
Down
  1. glowna ksiega rachunkowa "nominal ....."
  2. obrot
  3. jednoosobowa dzialalnosc gospodarcza "sole ...."
  4. wycena
  5. amortyzacja
  6. waluta
  7. aktywa

18 Clues: obrotwycenawalutaaktywaspolkadluznikoddzialwynajemujawniacprowizjaprzychodobligacjaamortyzacjazobowiazaniekredyt hipotecznyubezpieczenie spoleczne "social ......"glowna ksiega rachunkowa "nominal ....."jednoosobowa dzialalnosc gospodarcza "sole ...."

New Insights 4 Glossary: Society and health care 2022-09-05

New Insights 4 Glossary: Society and health care crossword puzzle
Across
  1. tuki
  2. syrjäytyminen
  3. private sector
  4. social security
  5. specialist
  6. health insurance
  7. paternity leave
  8. kansalaisuus
  9. vähemmistö
  10. kansalainen
Down
  1. emigrant
  2. köyhyys
  3. sick leave
  4. housing benefit
  5. student allowance/benefit
  6. kuntoutus
  7. maternity leave
  8. enemmistä

18 Clues: tukiköyhyysemigrantkuntoutusenemmistäsick leavespecialistvähemmistökansalainenkansalaisuussyrjäytyminenprivate sectorhousing benefitsocial securitymaternity leavepaternity leavehealth insurancestudent allowance/benefit

Network Security 2021-03-08

Network Security crossword puzzle
Across
  1. What type of malware is executed through executable files
  2. protects a network from unauthorised access, can be in hardware or software form
  3. A way of hiding incoming and outgoing messages/information from other people
  4. Controls what specific users can and cant do
  5. the intentional or unintentional release of secure or private/confidential information to an untrusted environment
Down
  1. The Process of proving who you are in order to get access to something
  2. A type of malware which is executed through a weakness in the system
  3. Keystroke logging could be used as a type of what malware?
  4. What type of malware deceives the user?

9 Clues: What type of malware deceives the user?Controls what specific users can and cant doWhat type of malware is executed through executable filesKeystroke logging could be used as a type of what malware?A type of malware which is executed through a weakness in the systemThe Process of proving who you are in order to get access to something...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Programme, die Tastatureingaben mitprotokollieren
  2. Virus, der sich direkt über Netze verbreiten
  3. Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
  4. Versteckt in einem scheinbar nützlichen Programm
Down
  1. Mobbing mit Hilfe von elektronischen Medien
  2. Datenverarbeitungsregisternummer
  3. Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
  4. Viren, die als Programm in ein Dokument/ Datei eingebettet sind
  5. Überbegriff für unerwünschte, schädliche Software

9 Clues: DatenverarbeitungsregisternummerMobbing mit Hilfe von elektronischen MedienVirus, der sich direkt über Netze verbreitenVersteckt in einem scheinbar nützlichen ProgrammProgramme, die Tastatureingaben mitprotokollierenÜberbegriff für unerwünschte, schädliche SoftwareViren, die als Programm in ein Dokument/ Datei eingebettet sind...

Computer Security 2024-03-22

Computer Security crossword puzzle
Across
  1. controls flow of network traffic between device and internet
  2. when unauthorized individuals access data
  3. giving of 2 pieces of personal information to access data
Down
  1. detects a physical attribute of an individual allowing/denying them access to data
  2. malware disguised as legitimate sites
  3. converts plaintext into ciphertext and vice versa
  4. detection software which detects malicious activity
  5. consequence of computer misuse
  6. data stored in an alternative location to be recovered

9 Clues: consequence of computer misusemalware disguised as legitimate siteswhen unauthorized individuals access dataconverts plaintext into ciphertext and vice versadetection software which detects malicious activitydata stored in an alternative location to be recoveredgiving of 2 pieces of personal information to access data...

food security 2024-10-17

food security crossword puzzle
Across
  1. - A plant grown by farmers to be eaten.
  2. - This nutrient is found in foods like bread and rice.
  3. - The practice of catching fish for food.
  4. - A place where animals are raised for food, like cows or chickens.
Down
  1. - The type of farming that grows crops without chemicals.
  2. - The storage place where food is kept to be sold or given.
  3. - A place where food is processed and packed before being sent to stores.
  4. - This happens when people do not have enough food to eat.
  5. - The act of distributing food to people in need.

9 Clues: - A plant grown by farmers to be eaten.- The practice of catching fish for food.- The act of distributing food to people in need.- This nutrient is found in foods like bread and rice.- The type of farming that grows crops without chemicals.- This happens when people do not have enough food to eat....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. which is the crunchy side dish which normally has more oil?
  2. one vegetable in which we should double check while washing
  3. Good vegetable for blood nourishing
  4. Which is Non-healthy material for food wrapping ?
Down
  1. any substance which is added to look food attractive
  2. Reportadely India's less hygienic street food
  3. Which is the natural vegetable for blood sugar control ?
  4. A not so good food item for our tooth health
  5. Which is the most iron rich food ?

9 Clues: Which is the most iron rich food ?Good vegetable for blood nourishingA not so good food item for our tooth healthReportadely India's less hygienic street foodWhich is Non-healthy material for food wrapping ?any substance which is added to look food attractiveWhich is the natural vegetable for blood sugar control ?...

Securities Crossword 2023-01-04

Securities Crossword crossword puzzle
Across
  1. Type of security that takes care of parks and schools
  2. People who invest in bonds and stocks
  3. Type of bond that is internations
  4. what is the mane for the devaluing of money when too much is in circulation
  5. Where stocks and bonds can be bought and sold
  6. this is issued by governments and corporations when they want to raise money.
  7. a tradable financial asset
Down
  1. A stock is categorized as this when the price dramatically fluctuates
  2. another name for money
  3. who ensures most bonds
  4. debt obligations issued by the U.S. Department of the Treasury. T-bills have the shortest maturity date of all the debt issued by the federal government
  5. Investors look to make this when they go into the market
  6. all the shares by which ownership of a corporation or company is divided
  7. what type of bond is bought by corporations
  8. Because of their large denomination this type of security is bought most often by large institutional investors

15 Clues: another name for moneywho ensures most bondsa tradable financial assetType of bond that is internationsPeople who invest in bonds and stockswhat type of bond is bought by corporationsWhere stocks and bonds can be bought and soldType of security that takes care of parks and schoolsInvestors look to make this when they go into the market...

Technology Collocations 2023-10-18

Technology Collocations crossword puzzle
Across
  1. Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks.
  2. Encompasses devices and systems that enhance the automation, control, and efficiency of various household functions, like lighting, heating, and security.
  3. Involves the process of discovering patterns and information from large sets of data, often used for business intelligence, research, and decision-making.
  4. Involves the use of remote servers on the internet to store, manage, and process data, providing on-demand access to a shared pool of computing resources.
  5. Refers to the latest and most advanced technological innovations or developments. It's often used to describe state-of-the-art products or systems.
  6. Describes the profound and rapid changes brought about by the widespread adoption and integration of digital technology in various aspects of society.
  7. Describes a design or layout of a technological system or device that is easy for users to navigate and understand without much difficulty.
  8. Involves using unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify and grant access to devices or systems.
Down
  1. Refers to the transfer of information between devices without the need for physical connections, typically using technologies like Wi-Fi or Bluetooth.
  2. Creates a simulated environment that users can interact with, often through the use of specialized headsets and equipment, providing an immersive and artificial experience.
  3. Integrates computer-generated information, such as images or data, into the user's view of the real world, enhancing their perception and interaction with the environment.
  4. Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities.

12 Clues: Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities.Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks....

Change a verb into a nouns 2023-11-30

Change a verb into a nouns crossword puzzle
Across
  1. conclusion
  2. addition
  3. success
  4. attraction
  5. achievement
  6. security
Down
  1. protection
  2. comparison
  3. description
  4. decision
  5. collection
  6. distraction
  7. madness
  8. attention

14 Clues: successmadnessadditiondecisionsecurityattentionprotectioncomparisonconclusioncollectionattractiondescriptiondistractionachievement

Change a nouns into a verb 2023-11-30

Change a nouns into a verb crossword puzzle
Across
  1. success
  2. security
  3. attraction
  4. achievement
  5. madness
  6. distraction
  7. protection
Down
  1. description
  2. conclusion
  3. attention
  4. addition
  5. decision
  6. comparison
  7. collection

14 Clues: successmadnesssecurityadditiondecisionattentionconclusionattractioncomparisonprotectioncollectiondescriptionachievementdistraction

2 2024-05-15

2 crossword puzzle
Across
  1. special
  2. cured
  3. by
  4. suitable
  5. security
  6. thereof
  7. through
  8. outside
Down
  1. things
  2. wedding
  3. opened
  4. air
  5. confirmed
  6. exists
  7. earth

15 Clues: byaircuredearththingsopenedexistsweddingspecialthereofthroughoutsidesuitablesecurityconfirmed

National Services Acronyms 2025-02-17

National Services Acronyms crossword puzzle
Across
  1. RTE_____
  2. APA______
  3. B____AU
  4. DP____T
  5. F____SF
  6. PS____N
  7. S____DP
Down
  1. SDP_____
  2. MI____F
  3. RH____P
  4. NWR____R
  5. S_____IL
  6. I_____BCA
  7. LE____V

14 Clues: MI____FRH____PB____AUDP____TF____SFPS____NS____DPLE____VSDP_____RTE_____NWR____RS_____ILAPA______I_____BCA

C reading 2021-09-06

C reading crossword puzzle
Across
  1. disaster
  2. move
  3. several
  4. horrific
  5. sail
  6. random
  7. dreadful
  8. bag
  9. embrace
Down
  1. somehow
  2. security
  3. threat
  4. awesome
  5. pour

14 Clues: bagmovesailpourthreatrandomsomehowseveralawesomeembracedisastersecurityhorrificdreadful

SEAT WORK 2022-08-30

SEAT WORK crossword puzzle
Across
  1. SECURITY PERSONNEL - defined by the IRR of R.A. 5487, as natural persons which include rendering/performing security and/or detective services as employed by private security agencies and/or private firms.
  2. SECURITY MANAGEMENT - It is established to provide security for installation or facilities and to promote efficiency of security operations and economy in the use of security personnel.
  3. - The state of being protected or safe from harm; things done to make people or places safe.
  4. CONTRACT THEORY - Individual agree to live according to certain rules, norms and laws, so that collectively we can enjoy the benefits of living in a society.
Down
  1. TAYLOR - Father of Scientific Management Theory.
  2. - latin word “__________” which means “safe, secure, free from care, unworried, unconcerned.
  3. TAYLOR- he proposed the need to introduce science into managing organizations in order to bring objectivity, precision, order and predictability.
  4. - According to history, protecting these establishments are almost single-handedly made by the State forces.
  5. REVOLUTION - The process of change from an agrarian, handicraft economy to one dominated by industry and machine manufacture.
  6. SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients.

10 Clues: TAYLOR - Father of Scientific Management Theory.- The state of being protected or safe from harm; things done to make people or places safe.- latin word “__________” which means “safe, secure, free from care, unworried, unconcerned.SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients....

Cold War 2018-04-26

Cold War crossword puzzle
Across
  1. war
  2. Tse-tung
  3. maliltary
  4. Act
  5. Doctrine
  6. race
  7. perestroika
  8. curtain
  9. airlift
Down
  1. Pact
  2. policy
  3. nation
  4. security
  5. Plan
  6. theory

15 Clues: warActPactPlanracepolicynationtheorycurtainairliftsecurityTse-tungDoctrinemaliltaryperestroika

Unidad 6A 2025-05-22

Unidad 6A crossword puzzle
Across
  1. security
  2. to save
  3. to plan
  4. to reserve
  5. delay
  6. ticket
  7. expensive
Down
  1. flight
  2. to fly
  3. to cross
  4. cloud
  5. exit
  6. cheap
  7. to board
  8. misunderstanding
  9. to spend
  10. fare

17 Clues: exitfarecloudcheapdelayflightto flyticketto saveto planto crosssecurityto boardto spendexpensiveto reservemisunderstanding

Lenovo 3 2021-09-10

Lenovo 3 crossword puzzle
Across
  1. What is the new model for the current and future workforce?
  2. What is the biggest security threat today?
  3. One of Lenovo's approaches to security is "Security by ..."
  4. XDR stands for "_ _ _ _ _ _ _ _ Detection and Response"
Down
  1. What is the name of Lenovo's security brand?
  2. What are prime targets for hackers?
  3. Lenovo Smart Standby understands when you are not using your computer and schedules ... (Bears schedule this in winter!)
  4. What is most exposed in the hybrid model?

8 Clues: What are prime targets for hackers?What is most exposed in the hybrid model?What is the biggest security threat today?What is the name of Lenovo's security brand?XDR stands for "_ _ _ _ _ _ _ _ Detection and Response"What is the new model for the current and future workforce?One of Lenovo's approaches to security is "Security by ..."...

IC3 Lesson 30 Vocabulary 2015-05-18

IC3 Lesson 30 Vocabulary crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
  5. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
  1. Encrypts the information in an SSL Certificate
  2. Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
  3. Hackers using spyware to control your browser
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  6. A malicious program that records keystrokes
  7. Deciphers the information in an SSL Certificate
  8. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

CHAPTER 4 CF 2024-09-12

CHAPTER 4 CF crossword puzzle
Across
  1. A formal document outlining security policies, procedures, and guidelines for safeguarding information assets.
  2. The process involves the continuous implementation and management of security policies, involving regular updates, audits, and adherence to established guidelines.
  3. The process involves setting access controls on files and folders to restrict their viewing, modification, or deletion permissions.
  4. The guidelines outline the process for checking out and introducing new employees.
  5. To manage permissions effectively
  6. The framework and oversight for security policies are established, outlining roles and responsibilities for policy enforcement and review.
  7. The guidelines emphasize the importance of honesty and professionalism in employee behavior.
Down
  1. Rules for regulating access to specific physical spaces, such as offices or server rooms.
  2. Grouping users based on roles, such as marketing or IT staff, and assigning specific access allows for efficient management of permissions for multiple users simultaneously.
  3. This ensures the security and compliance of all systems by detecting any errors or misuse of access.
  4. The process involves creating user accounts and determining the specifics of what each user can access or perform on the system.
  5. Authentication methods rely on unique biological traits like fingerprints, facial recognition, or iris scans.
  6. Devices or software that generate one-time codes or credentials for authentication.

13 Clues: To manage permissions effectivelyThe guidelines outline the process for checking out and introducing new employees.Devices or software that generate one-time codes or credentials for authentication.Rules for regulating access to specific physical spaces, such as offices or server rooms....

RU ITEC411 2021-04-12

RU ITEC411 crossword puzzle
Across
  1. Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
  2. A form of authenticating who you are, by using ones body part.
  3. A form of stealing that usually involves impersonating someone or something.
  4. A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
  5. Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
  6. Something that you access on the internet, a page of sorts.
  7. A software that is attached to other software, program, picture, etc., that tends to replicates itself.
  8. This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
  9. A way of hiding information that you do not want someone knowing, if intercepted.
  10. Preventing someone information that may be viewed as harmful from being seen from the public.
Down
  1. The conduct of a persons character and obligations to others.
  2. A kind of warfare that is virtual.
  3. A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
  4. In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
  5. A group of people and how they work together as a society.
  6. Someone that is using a computer is called a what?
  7. A form of testing a network, database, firewall, etc.
  8. A way into a system without having to go through the standard protocols.
  9. A kind of software that looks like the real software you are trying to download, however is actually malware.
  10. A kind of rule that is usually made up the government to try and keep the peace (for the most part).

20 Clues: A kind of warfare that is virtual.Someone that is using a computer is called a what?A form of testing a network, database, firewall, etc.A group of people and how they work together as a society.Something that you access on the internet, a page of sorts.The conduct of a persons character and obligations to others....

Information Technology 2023-05-24

Information Technology crossword puzzle
Across
  1. a person who exploits computer hardware and software for their own purposes
  2. to modify or arrange something so that it works in a certain way
  3. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  4. a personal website maintained by an individual
  5. a computer virus that copies its code over and destroys the files of the original data
  6. a set of rules that must be followed for the sake of security
  7. a filter that prevents harmful software from entering a network
  8. a small application that is embedded in a webpage
  9. to make copies
  10. to make sure that it is legitimate
  11. a piece of code that is used to fix a flaw in a computer program
  12. any type of media used on a webpage, including images and videos
  13. the proces of stealing another person’s information and using it for personal gain
  14. how users communicate with a computer
  15. the use of the internet for software and other resources
  16. a collection of icons or pictures that have been organized in a file or page
Down
  1. changing computer to your needs
  2. a measurement of how quickly a computer works
  3. device that converts mechanical information into electronic signals
  4. the company that produces Macs and other computing products
  5. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  6. tricking people into giving information through email
  7. to work at a location away from a main office by using technology
  8. a word or phrase that makes a computer perform an operation
  9. a person who uses computers and the internet to commit crimes
  10. a filter that prevents harmful softaware from leaving a network
  11. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  12. using a legitimate-looking website to trick people
  13. a program that restricts access on a network
  14. an action that results in the loss of another person’s property

30 Clues: to make copieschanging computer to your needsto make sure that it is legitimatehow users communicate with a computera program that restricts access on a networka measurement of how quickly a computer worksa personal website maintained by an individuala small application that is embedded in a webpageusing a legitimate-looking website to trick people...

FITAVocab.CLK 2013-05-15

FITAVocab.CLK crossword puzzle
Across
  1. society designed to inform people about internet safety and security
  2. electronic technology
  3. unit to measure speed of signaling or data transfer
  4. Comcast;Xfinity
  5. arrangement of data
  6. port to connect peripherals to a computer
  7. document or file with special format
  8. device that sends data to a computer
  9. type of port to connect mouse or keyboard to a PC
  10. 8 bits
  11. processes hardware instructions
  12. main circuit board
  13. "I'm lovin' it!"
  14. symbol designed for recognition
  15. slot to slide in cds and other discs
  16. data delivered to a computer
  17. data delivered from a computer
  18. quoting on an authoritative source
  19. oath taken by a person before undertaking the duties of an office
  20. quantity of storage in computers
  21. to start up
  22. sequence of instructions to be completed by a computer
  23. flash drive; earbuds
  24. rules and behaviors designed to keep individuals safe when online
Down
  1. relating to computer or computer networks
  2. cords
  3. program that searches for documents
  4. bring in and start anew
  5. amount your computer can hold
  6. delivers information to a computer
  7. internet "hosting" service that allows you to make your own website
  8. wireless networking technology that connects other wireless electronic devices
  9. preview of file or page
  10. collection of software that directs a computer's operations
  11. way in which parts of something are laid out
  12. port to connect to the internet
  13. data transmission in which a single wire can carry several channels at one time
  14. protecting information on computer systems/networks
  15. Dogpile;Ixquick
  16. slot that allows you to add more plugins
  17. program designed to do a certain function
  18. ID with 32 characters used for naming wireless networks
  19. port to connect audio devices to a computer
  20. area network that uses high frequency radio signals to transmit and receive data
  21. a computer's main storage device that stores all your files
  22. collection of related data stored on your computer or other storage device
  23. code of conduct one uses online

47 Clues: cords8 bitsto start upComcast;XfinityDogpile;Ixquick"I'm lovin' it!"main circuit boardarrangement of dataflash drive; earbudselectronic technologybring in and start anewpreview of file or pagedata delivered to a computeramount your computer can holddata delivered from a computerport to connect to the internetprocesses hardware instructions...

Chapter 6 - Network Design Elements 2025-05-21

Chapter 6 - Network Design Elements crossword puzzle
Across
  1. A cloud-based delivery model for security services like antivirus and firewalls.
  2. A cloud model offering virtualized computing resources over the internet.
  3. A network state where a device defaults to open access after failure.
  4. A solution that enforces security policies before allowing network access.
  5. A method of dialing many phone numbers to find modems or unsecured lines.
  6. Impersonating a device's MAC address to bypass security.
  7. An attack that allows access to traffic on other VLANs.
  8. A network design using two firewalls to isolate a DMZ.
Down
  1. A publicly shared list of known cybersecurity vulnerabilities and exposures.
  2. A cloud model providing a platform for developers to build and deploy applications.
  3. A protocol that prevents network loops by managing redundant paths.
  4. A switch memory table that stores MAC-to-port mappings.
  5. A cloud model where applications are delivered over the internet.
  6. An attack that overwhelms a switch's memory with fake MAC addresses.
  7. A one-to-one mapping between a private and public IP address.
  8. A firewall setup with three interfaces: internal, external, and DMZ.
  9. A method that modifies IP addresses to allow private devices to access the internet.
  10. A buffer zone between internal networks and external, untrusted networks.
  11. A type of NAT that maps multiple private IPs to one public IP using port numbers.

19 Clues: A network design using two firewalls to isolate a DMZ.A switch memory table that stores MAC-to-port mappings.An attack that allows access to traffic on other VLANs.Impersonating a device's MAC address to bypass security.A one-to-one mapping between a private and public IP address.A cloud model where applications are delivered over the internet....

Meta 2023-09-12

Meta crossword puzzle
Across
  1. Events & Amenities
  2. Pride@
  3. IT Support
  4. Transportation
  5. Ship Happens
  6. EHS
  7. Disability@
  8. APIs@
  9. Facilities
Down
  1. Open Arts
  2. Black@
  3. Security
  4. AV Technical Production
  5. SEA + BEL Site Team
  6. Women@
  7. Latin@
  8. Culinary / Pastry
  9. Native@
  10. Fitness Center

19 Clues: EHSAPIs@Black@Women@Pride@Latin@Native@SecurityOpen ArtsIT SupportFacilitiesDisability@Ship HappensTransportationFitness CenterCulinary / PastryEvents & AmenitiesSEA + BEL Site TeamAV Technical Production

Phising 2024-10-14

Phising crossword puzzle
Across
  1. forwarding/Automatically sending emails from one account to another, often exploited by attackers.
  2. authentication/A security process requiring two types of identification.
  3. targeted phishing attack aimed at specific individuals.
  4. activity alert/Notifications for potential security breaches or unusual behaviour.
  5. operations/Activities aimed at influencing or manipulating information for strategic purposes.
  6. addresses/Email accounts outside an organisation’s official domain, which may pose risks.
Down
  1. communication/Messages received without prior request, often phishing-related.
  2. monitoring/Tracking changes to system or server settings for security purposes.
  3. a trusted entity to deceive users.
  4. theft/The act of stealing usernames and passwords.
  5. awareness training/Educational programs to help users recognise phishing attacks.
  6. deceptive offer or message designed to attract and manipulate a target.

12 Clues: a trusted entity to deceive users.theft/The act of stealing usernames and passwords.targeted phishing attack aimed at specific individuals.deceptive offer or message designed to attract and manipulate a target.authentication/A security process requiring two types of identification....

IS and BC Cross-Up Crossword 2021-10-26

IS and BC Cross-Up Crossword crossword puzzle
Across
  1. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
  2. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
  3. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
  4. Sending an email, posting photos on a social media site and using your webcam.
  5. Equipment that offers short term protection against power surges and power outages (acronym).
  6. conforming to a rule, such as a specification, policy, standard or law.
  7. Your ________ device often contains more personal information than any other source.
  8. “ This too good to be true email gives off a false sense of ______”.
  9. When calls are made by social engineering, they are called _____ .
  10. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
  11. Where do UTC employee report their ICT issues (three words).
  12. Always _______your computer when you leave your desk.
  13. Facebook and TikTok are types of ________ (two words).
  14. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  15. A major business disruption; the earth moves, shifts and shakes.
  16. Who can be the target of a cyber attack.
  17. Never use your TTUTC________address for personal usage.
  18. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
  19. A fraudulent email purportedly from a reputable company attempting to get personal information.
  20. You can call 999, 881 or 990 for _______ services.
  21. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
  22. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
  23. The address of a webpage. Check the validity of it before clicking on it (acronym).
  24. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
  25. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
  26. BCP's main focus is not preventing incidents but rather the __________ from it.
Down
  1. The process of adding allowed programs to a list is called_________.
  2. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
  3. __________ Edwards is the Recovery Director and is in charge of BCP.
  4. An asset like other essential business assets in the Corporation.
  5. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
  6. The staff and the customers are considered.
  7. A technology that allows us to access our files through the internet from anywhere in the world.
  8. A list of entities that are blocked or denied privileges or access.
  9. The art of manipulating people to get access to sensitive information (two words.
  10. Choose a password that is easy for you to ____________ but hard for you someone to guess.
  11. information such as legal documents and contracts must be classified as __________information. - (restricted)
  12. A collection of computers that are controlled on the same network.
  13. A concept where all things are connected to the internet; household items usually (three words).
  14. A piece of code put in to correct an error.
  15. The global system of interconnected computer networks that link billions of devices.
  16. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
  17. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
  18. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
  19. someone who seeks and exploits weaknesses in a computer system or computer network.
  20. The UTC hotsite is located here.
  21. Usually comprises the display device of the computer.
  22. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).

48 Clues: The UTC hotsite is located here.Who can be the target of a cyber attack.The staff and the customers are considered.A piece of code put in to correct an error.You can call 999, 881 or 990 for _______ services.Always _______your computer when you leave your desk.Usually comprises the display device of the computer....

kuis tentang apa aja 2023-01-25

kuis tentang apa aja crossword puzzle
Across
  1. cyber threat
  2. kota besar
  3. platform goyang
Down
  1. belanja online
  2. hari raya imlek

5 Clues: kota besarcyber threatbelanja onlinehari raya imlekplatform goyang

COLSA Capabilities 2023-04-21

COLSA Capabilities crossword puzzle
Across
  1. _________ Information Services
  2. COLSA Headquarters __________, Alabama
Down
  1. System & Software
  2. Cyber and Information _______
  3. ____ Science

5 Clues: ____ ScienceSystem & SoftwareCyber and Information ________________ Information ServicesCOLSA Headquarters __________, Alabama

Semester Review 2022-12-14

Semester Review crossword puzzle
Across
  1. bonds
  2. HouseNeutrality
  3. of Versailles
  4. of Nations
  5. Stiffens
  6. security
  7. Movement
  8. Speakeasies
  9. on margin
Down
  1. Jungle
  2. Raids
  3. Conservation
  4. Entente
  5. Scare
  6. Service Act
  7. Market

16 Clues: bondsRaidsScareJungleMarketEntenteStiffenssecurityMovementof Nationson marginService ActSpeakeasiesConservationof VersaillesHouseNeutrality

4 2024-05-14

4 crossword puzzle
Across
  1. special
  2. thereof
  3. circus performance
  4. consider
  5. wedding
  6. coordination
Down
  1. discuss
  2. cardan
  3. circus act
  4. confirmed
  5. calculated
  6. prepared
  7. security
  8. outside
  9. exists

15 Clues: cardanexistsdiscussspecialthereofoutsideweddingpreparedconsidersecurityconfirmedcircus actcalculatedcoordinationcircus performance

KPL 3&3.1 2025-02-26

KPL 3&3.1 crossword puzzle
Across
  1. missio
  2. alusta
  3. tasa-arvo
  4. varat
  5. turvallisuus
  6. näkyvä
  7. delegaatti
Down
  1. maailmanlaajuinen
  2. vaikutus
  3. kunnia
  4. erityisesti
  5. edistää
  6. rohkaista
  7. ongelma
  8. rauha

15 Clues: varatrauhamissiokunniaalustanäkyväedistääongelmavaikutustasa-arvorohkaistadelegaattierityisestiturvallisuusmaailmanlaajuinen

Citera 2026-03-25

Citera crossword puzzle
Across
  1. land
  2. seat
  3. Compartment
  4. aisle
  5. Take off
  6. Belt
  7. window
  8. the track
Down
  1. oxygen
  2. service
  3. Mask
  4. late
  5. Time
  6. security
  7. international

15 Clues: MasklandlateseatTimeBeltaisleoxygenwindowservicesecurityTake offthe trackCompartmentinternational

Heathrow 2025-11-06

Heathrow crossword puzzle
Across
  1. tualett
  2. kõrvaklapid
  3. kõrvatropid
  4. sihtkoht
  5. ratastega kohver
  6. kohver
Down
  1. kaelapadi
  2. pardakaart
  3. rahakott
  4. väljumine, lahkumine
  5. pass
  6. pagas
  7. nimesilt
  8. seljakott
  9. turva

15 Clues: passpagasturvakohvertualettrahakottnimesiltsihtkohtkaelapadiseljakottpardakaartkõrvaklapidkõrvatropidratastega kohverväljumine, lahkumine

End-of-Semester Crossword 2023-01-24

End-of-Semester Crossword crossword puzzle
Across
  1. novelas, soap operas can be this
  2. the Monday after Thanksgiving
  3. Every Wednesday is ___ Day
  4. The pilgrims arrived on this ship
  5. Teacher Neil's favorite drink
  6. Argentina won the ___ Cup.
  7. I need to give __ smoking!
  8. His car had a __-n-run in October
  9. (idiom) ___ in the oven (pregnant)
  10. MLK was a ___ Rights Leader.
  11. the British word for 'fall' season
Down
  1. similar to goal, made on NYE
  2. another word for cheesy, silly, dumb
  3. We changed the clocks in Nov. "Fall ___"
  4. "And then a __ comes along, w/ the strength.."
  5. The Tuesday after Thanksgiving
  6. (idiom) turn over a new ___. (new beginning)
  7. Most people have bad ___
  8. The __ New Year started on Sunday.
  9. Being a lazy, you're a couch ___.
  10. the Friday before Thanksgiving

21 Clues: Most people have bad ___Every Wednesday is ___ DayArgentina won the ___ Cup.I need to give __ smoking!similar to goal, made on NYEMLK was a ___ Rights Leader.the Monday after ThanksgivingTeacher Neil's favorite drinkThe Tuesday after Thanksgivingthe Friday before Thanksgivingnovelas, soap operas can be thisThe pilgrims arrived on this ship...

Conspiracy theories 2022-11-02

Conspiracy theories crossword puzzle
Across
  1. to keep a secret, to lie ....
  2. fit in, mix, merge, blend in
  3. a concept, a thought
  4. the killing of 6 million jews across Europe from 1941 to 1945
  5. the I in CIA
  6. first man to walk on the moon, Neil ........
  7. shady, dim, sunless
  8. another name for covid-19
  9. keep an eye on, surveil, tail
  10. princess ........ she was killed in a car crash in Paris in 1997
Down
  1. secret, confidential
  2. some people believe that the earth is .......
  3. a US president who was assassinated
  4. the f in FBI
  5. secret organization, secret club or secret .........
  6. falsify, fabricate, bluff
  7. when someone is very happy, we say he is over the ......
  8. doubt, uncertainty
  9. a digital attack, a ....... attack
  10. ........ 51
  11. extraterrestrial, unearthly

21 Clues: ........ 51the f in FBIthe I in CIAdoubt, uncertaintyshady, dim, sunlesssecret, confidentiala concept, a thoughtfalsify, fabricate, bluffanother name for covid-19extraterrestrial, unearthlyfit in, mix, merge, blend into keep a secret, to lie ....keep an eye on, surveil, taila digital attack, a ....... attacka US president who was assassinated...

Love Story 2024-12-10

Love Story crossword puzzle
Across
  1. Pines Party 2024
  2. Bathroom funny business
  3. Chicks
  4. Serenades in the park
  5. Make believe pig skin
  6. Rabbits' favorite pastry
  7. Food Market or comedienne
  8. If my priest had a spouse
  9. family pet cyber thief
  10. Julia Louis-Meyer
  11. Don't feed the swines
  12. Scalding rubadub
  13. FL, 33301
  14. School Shooting Romance
  15. Margaret Rhymes
  16. Puzzles by the pool
Down
  1. It's not rice in the hourglass, it's ...
  2. Summer kickoff weekend
  3. Beach chouxs
  4. Cooking in the nude
  5. Fly Like R Kelly
  6. White trash beauty pageant
  7. Up the bean stalk to meet them
  8. Flames on barrier sand
  9. Maple Leaves & Gaslighters
  10. 2 with red noses dance to horse meat
  11. Singing feng shui money plant
  12. Indoor galaxies
  13. White claws without a couch

29 Clues: ChicksFL, 33301Beach chouxsIndoor galaxiesMargaret RhymesPines Party 2024Fly Like R KellyScalding rubadubJulia Louis-MeyerCooking in the nudePuzzles by the poolSerenades in the parkMake believe pig skinDon't feed the swinesSummer kickoff weekendFlames on barrier sandfamily pet cyber thiefBathroom funny businessSchool Shooting Romance...

ASKING AND GIVING OPINION 2024-07-26

ASKING AND GIVING OPINION crossword puzzle
Across
  1. mata pelajaran
  2. khawatir
  3. ujian
  4. keuangan
  5. keamanan
  6. pendapat
  7. menarik
  8. kejadian
  9. meminta
Down
  1. menimbulkan perdebatan
  2. mengira-ngira/bertanya-tanya
  3. menanyakan
  4. yakin
  5. menyelidiki
  6. keputusan
  7. masalah

16 Clues: yakinujianmasalahmenarikmemintakhawatirkeuangankeamananpendapatkejadiankeputusanmenanyakanmenyelidikimata pelajaranmenimbulkan perdebatanmengira-ngira/bertanya-tanya

Computer criminals - types and what they do/how they operate 2016-09-07

Computer criminals - types and what they do/how they operate crossword puzzle
Across
  1. gaining illegal or unauthorized access to a file, computer or network.
  2. When hackers threaten or harm a website, server, or a computer system using denial of service (DOS)
  3. Spamming It refers to the use of electronic messaging systems to send unsolicited messages to users
  4. attack to commit a Cyber Crime can be called as a Cyber Attack
  5. crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data
  6. The process of making, adapting, or imitating objects, statistics, or documents, with the intent to deceive
Down
  1. E-mail fishing for personal and financial information disguised as legitimate business e-mail
  2. False websites that fish for personal and financial information by planting false URLs in Domain Name Users
  3. Theft It is one of the most serious frauds as it involves stealing money and obtaining other benefits with the use of a false identity
  4. as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

10 Clues: attack to commit a Cyber Crime can be called as a Cyber Attackgaining illegal or unauthorized access to a file, computer or network.E-mail fishing for personal and financial information disguised as legitimate business e-mailWhen hackers threaten or harm a website, server, or a computer system using denial of service (DOS)...

career 2019-01-19

career crossword puzzle
Across
  1. นักเขียน
  2. นักเรียน
  3. ช่างประปา
  4. นักบินอวกาศ
  5. บรรณาธิการ
  6. ช่างถ่ายรูป
  7. เสมียน
  8. guard ยามรักษาความปลอดภัย
Down
  1. หมอฟัน
  2. ช่างตัดผม
  3. ทหาร
  4. นักสืบ
  5. ช่างไฟ
  6. doctor หมอตา
  7. พ่อครัว

15 Clues: ทหารหมอฟันนักสืบช่างไฟเสมียนพ่อครัวนักเขียนนักเรียนช่างตัดผมช่างประปาบรรณาธิการนักบินอวกาศช่างถ่ายรูปdoctor หมอตาguard ยามรักษาความปลอดภัย

funny stuff for the 8.1 2020-03-02

funny stuff for the 8.1 crossword puzzle
Across
  1. eingängig (Melodie,Slogen)
  2. möglich
  3. Entdeckung
  4. Sender
  5. glänzend
  6. Zutat
  7. Sicherheit
  8. Genehmigung
Down
  1. flamme
  2. vergleichen
  3. Lagerfeuer
  4. unaufhaltsam
  5. Ursache
  6. verbrannt
  7. Dürre

15 Clues: DürreZutatflammeSendermöglichUrsacheglänzendverbranntLagerfeuerEntdeckungSicherheitvergleichenGenehmigungunaufhaltsameingängig (Melodie,Slogen)

IT English Homework 2020-04-20

IT English Homework crossword puzzle
Across
  1. jelkód
  2. zárolt
  3. biometrikus adatok
  4. ujjlenyomat
  5. biztonság
  6. frissítés
Down
  1. hamis
  2. sütik
  3. igazi
  4. támogatás
  5. rendőrség
  6. memória
  7. csaló
  8. ellenőrzés
  9. kicsi programhibák

15 Clues: hamissütikigazicsalójelkódzároltmemóriatámogatásrendőrségbiztonságfrissítésellenőrzésujjlenyomatbiometrikus adatokkicsi programhibák

Chapter 7 Vocab Eng 4 2025-11-17

Chapter 7 Vocab Eng 4 crossword puzzle
Across
  1. clear
  2. plants
  3. height
  4. trip
  5. pure
  6. fancy
  7. security
Down
  1. abundance
  2. tiny
  3. cruuuuuuuzer
  4. sparkle
  5. jack
  6. to the world
  7. barnowl
  8. mustache

15 Clues: tinyjacktrippureclearfancyplantsheightsparklebarnowlmustachesecurityabundancecruuuuuuuzerto the world

Cyber Information 2020-08-10

Cyber Information crossword puzzle
Across
  1. A online app where you post pictures
  2. A belief or opinion generally held about someone
  3. A app that can keep the world open and connected with eachother
  4. A app where you can freely write your opinions
Down
  1. Posting to much information and details online
  2. A app where you talk to people and start streaks with friends
  3. Popular with teenagers, charlie demileo is most popular
  4. A trail of data you create while using the internet

8 Clues: A online app where you post picturesPosting to much information and details onlineA app where you can freely write your opinionsA belief or opinion generally held about someoneA trail of data you create while using the internetPopular with teenagers, charlie demileo is most popularA app where you talk to people and start streaks with friends...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. the fraudulent paractice of using another persons name
  2. pretending to be someone else and sending or posting material
  3. sharing someone's secrets online
  4. online fights using electronic messages with angry and volgar language
Down
  1. the use of devices to bully someone by sending messages or mean post.
  2. repeatedly sending nasty, mean, and insulting messages
  3. talking someone into revealing secrets and information about themselves online
  4. dissing someone online

8 Clues: dissing someone onlinesharing someone's secrets onlinethe fraudulent paractice of using another persons namerepeatedly sending nasty, mean, and insulting messagespretending to be someone else and sending or posting materialthe use of devices to bully someone by sending messages or mean post....

Cyber bullying 2023-10-31

Cyber bullying crossword puzzle
Across
  1. what you use to browse online
  2. How to stop someone from messaging you
  3. What you use to talk online
  4. Tell the system that this user is bullying you
Down
  1. An effect of being bullied
  2. Talk to a person you trust
  3. Don't pay attention to what they say
  4. Don't share your personal information

8 Clues: An effect of being bulliedTalk to a person you trustWhat you use to talk onlinewhat you use to browse onlineDon't pay attention to what they sayDon't share your personal informationHow to stop someone from messaging youTell the system that this user is bullying you

cyber safety 2025-05-05

cyber safety crossword puzzle
Across
  1. Action taken to block a bully
  2. Device that filters unwanted internet traffic
  3. Software that protects your computer system
  4. Sharing secrets without consent is called
Down
  1. Repeatedly sending cruel online messages
  2. Online act of harming someone's reputation
  3. A fake message to steal data
  4. Keep this private to stay safe online

8 Clues: A fake message to steal dataAction taken to block a bullyKeep this private to stay safe onlineRepeatedly sending cruel online messagesSharing secrets without consent is calledOnline act of harming someone's reputationSoftware that protects your computer systemDevice that filters unwanted internet traffic

Cyber Test 2024-04-10

Cyber Test crossword puzzle
Across
  1. My whole team coming clean
  2. Did I do thaaaaat?
  3. When you see me better cross the street
Down
  1. Get Ready for a whale of a tim
  2. These Dudes is comic relief
  3. And Im the Mother lovin monster
  4. Then go home and write about
  5. Yo Angela whos the boss

8 Clues: Did I do thaaaaat?Yo Angela whos the bossMy whole team coming cleanThese Dudes is comic reliefThen go home and write aboutGet Ready for a whale of a timAnd Im the Mother lovin monsterWhen you see me better cross the street

Cyber Ethics 2025-06-15

Cyber Ethics crossword puzzle
Across
  1. We should avoid clicking on unknown_______.
  2. An illegal intrusion into a computer system or network.
  3. The act of using someone else's original work or thoughts.
  4. A legal right granted by law to the creator for his original work.
Down
  1. The simplest way to prevent plagiarism is through proper_______.
  2. The process of transforming data into an unreadable form.
  3. A digital footprint is also known as a digital________.
  4. The unwanted bulk emails that come from unknown sources.

8 Clues: We should avoid clicking on unknown_______.A digital footprint is also known as a digital________.An illegal intrusion into a computer system or network.The unwanted bulk emails that come from unknown sources.The process of transforming data into an unreadable form.The act of using someone else's original work or thoughts....

CYBER CRIME 2022-10-11

CYBER CRIME crossword puzzle
Across
  1. an expression of intention to damage or to harm
  2. a person who has committed a crime
  3. a type of social engineering attack often used to steal user data
  4. intrusive software that is designed to damage and destroy computers
  5. a horse malware
Down
  1. a verb meaning to gain unauthorized acess into a computer system
  2. the process of proving that something is real
  3. a technique used by hackers to rediredt users to false websites without their knowledge

8 Clues: a horse malwarea person who has committed a crimethe process of proving that something is realan expression of intention to damage or to harma verb meaning to gain unauthorized acess into a computer systema type of social engineering attack often used to steal user dataintrusive software that is designed to damage and destroy computers...

Cyber-Attacks 2022-01-13

Cyber-Attacks crossword puzzle
Across
  1. a spoof or look-alike website
  2. the most common way hackers gain entry to a company's computer network
  3. personally identifiable information
  4. everyone's responsibility to protect company information and assets
Down
  1. an add on to enhance function of browser
  2. software that locks up a computer system and then demands a payment to unlock it
  3. software designed to harm computer
  4. fraudulent emails designed to obtain PII

8 Clues: a spoof or look-alike websitesoftware designed to harm computerpersonally identifiable informationan add on to enhance function of browserfraudulent emails designed to obtain PIIeveryone's responsibility to protect company information and assetsthe most common way hackers gain entry to a company's computer network...

Cyber Wellness 2023-02-01

Cyber Wellness crossword puzzle
Across
  1. Say P____________ things online.
  2. Respect others _O___________
  3. Do not reveal __U______________
Down
  1. Post _P___________ information
  2. Do not reveal __P____________
  3. Do not post S_____________ information online
  4. Respect others _P__________
  5. Say E____________ remarks online
  6. Practice _N____________

9 Clues: Practice _N____________Respect others _P__________Respect others _O___________Do not reveal __P____________Post _P___________ informationDo not reveal __U______________Say P____________ things online.Say E____________ remarks onlineDo not post S_____________ information online

Cyber Safety 2025-06-25

Cyber Safety crossword puzzle
Across
  1. Acronym for Two Factor Authentication
  2. The "Nigerian Prince"
  3. Cyber attackers are looking for and go after ...
  4. Action that follows an email phishing attempt at work
Down
  1. One of the main sources of system vulnerability
  2. State of mind to prevent falling for scams and phishing attempts
  3. Among the most targeted industries for ransomware
  4. Quality of a password that is difficult to hack

8 Clues: The "Nigerian Prince"Acronym for Two Factor AuthenticationOne of the main sources of system vulnerabilityQuality of a password that is difficult to hackCyber attackers are looking for and go after ...Among the most targeted industries for ransomwareAction that follows an email phishing attempt at work...

Lesson 30 Vocabulary 2015-05-18

Lesson 30 Vocabulary crossword puzzle
Across
  1. Hackers using spyware to control your browser.
  2. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  3. Deciphers the information in an SSL Certificate.
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
Down
  1. Complex and secure,containing at least eight characters and at least one letter,one number,and one special character.
  2. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  3. A malicious program that records keystrokes.
  4. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  5. Encrypts the information in an SSL Certificate.
  6. A program that hackers use to capture IDs and passwords on a network.
  7. security feature used for larger networks that controls computers from one point.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.security feature used for larger networks that controls computers from one point....

Herzberg Two factor theory 2023-02-28

Herzberg Two factor theory crossword puzzle
Across
  1. Labour
  2. Laudation
  3. Basic Needs
  4. Germination
  5. Occupation
  6. Procurement
  7. Wage
  8. Overseeing
Down
  1. Power
  2. Head of staff
  3. Reward
  4. Instigators
  5. Psychologist
  6. Thesis
  7. Protection

15 Clues: WagePowerLabourRewardThesisLaudationOccupationOverseeingProtectionInstigatorsBasic NeedsGerminationProcurementPsychologistHead of staff

RU ITEC411 2021-04-12

RU ITEC411 crossword puzzle
Across
  1. Preventing someone information that may be viewed as harmful from being seen from the public.
  2. A kind of warfare that is virtual.
  3. A form of testing a network, database, firewall, etc.
  4. Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
  5. A way into a system without having to go through the standard protocols.
  6. Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
  7. A form of authenticating who you are, by using ones body part.
  8. A kind of software that looks like the real software you are trying to download, however is actually malware.
  9. A software that is attached to other software, program, picture, etc., that tends to replicates itself.
Down
  1. Something that you access on the internet, a page of sorts.
  2. A group of people and how they work together as a society.
  3. Someone that is using a computer is called a what?
  4. In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
  5. A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
  6. A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
  7. A way of hiding information that you do not want someone knowing, if intercepted.
  8. The conduct of a persons character and obligations to others.
  9. A kind of rule that is usually made up the government to try and keep the peace (for the most part).
  10. A form of stealing that usually involves impersonating someone or something.
  11. This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.

20 Clues: A kind of warfare that is virtual.Someone that is using a computer is called a what?A form of testing a network, database, firewall, etc.A group of people and how they work together as a society.Something that you access on the internet, a page of sorts.The conduct of a persons character and obligations to others....

INNOVATION & RESPONSABILITY 2024-09-04

INNOVATION & RESPONSABILITY crossword puzzle
Across
  1. / Things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet.
  2. / Technology that proposes to improve capacity and productivity by changing or increasing the normal ranges of human function, through the restoration or extension of human physical, intellectual and social capabilities.
  3. / The process of performing a scientific procedure, especially in a laboratory, to determine something.
  4. / Work directed towards the innovation, introduction, and improvement of products and processes.
  5. / The process of generating a genetically identical copy of a cell or an organism.
  6. / The use of biology to develop new products, methods and organisms intended to improve human health and society.
  7. / A government authority or licence conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention.
  8. / A rule or directive made and maintained by an authority.
  9. / A sudden advance especially in knowledge or technique.
  10. / Chat GPT is one of them.
Down
  1. / The branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules
  2. / A branch of artificial intelligence (AI) and computer science that focuses on the using data and algorithms to enable AI to imitate the way that humans learn, gradually improving its accuracy.
  3. / A machine resembling a human being and able to replicate certain human movements and functions automatically.
  4. / Creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
  5. / Adaptation of a system, process, etc. to be operated with the use of computers and the internet.
  6. / A genetically modified organism
  7. / The simulation of human intelligence processes by machines, especially computer systems.
  8. / The study of the complete set of DNA (including all of its genes) in a person or other organism.
  9. / The process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
  10. / A person recognising the value of liveable environments for humans and nature.

20 Clues: / Chat GPT is one of them./ A genetically modified organism/ A rule or directive made and maintained by an authority./ A sudden advance especially in knowledge or technique./ A person recognising the value of liveable environments for humans and nature./ The process of generating a genetically identical copy of a cell or an organism....

2 2023-05-24

2 crossword puzzle
Across
  1. the company that produces Macs and other computing products
  2. the use of the internet for software and other resources
  3. a word or phrase that makes a computer perform an operation
  4. a small application that is embedded in a webpage
  5. changing computer to your needs
  6. to make copies
  7. any type of media used on a webpage, including images and videos
  8. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  9. an action that results in the loss of another person’s property
  10. a filter that prevents harmful software from leaving a network
  11. a person who exploits computer hardware and software for their own purposes
  12. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  13. tricking people into giving information through email
Down
  1. to modify or arrange something so that it works in a certain way
  2. a measurement of how quickly a computer works
  3. device that converts mechanical information into electronic signals
  4. how users communicate with a computer
  5. a personal website maintained by an individual
  6. to work at a location away from a main office by using technology
  7. a computer virus that copies its code over and destroys the files of the original data
  8. a piece of code that is used to fix a flaw in a computer program
  9. a filter that prevents harmful software from entering a network
  10. a program that restricts access on a network
  11. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  12. the proces of stealing another person’s information and using it for personal gain
  13. a person who uses computers and the internet to commit crimes
  14. using a legitimate-looking website to trick people
  15. a set of rules that must be followed for the sake of security
  16. a collection of icons or pictures that have been organized in a file or page
  17. to make sure that it is legitimate

30 Clues: to make copieschanging computer to your needsto make sure that it is legitimatehow users communicate with a computera program that restricts access on a networka measurement of how quickly a computer worksa personal website maintained by an individuala small application that is embedded in a webpageusing a legitimate-looking website to trick people...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Programme, die Tastatureingaben mitprotokollieren
  2. Mobbing mit Hilfe von elektronischen Medien
  3. Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
Down
  1. Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
  2. Versteckt in einem scheinbar nützlichen Programm
  3. Viren, die als Programm in ein Dokument/ Datei eingebettet sind
  4. Datenverarbeitungsregisternummer
  5. Virus, der sich direkt über Netze verbreiten
  6. Überbegriff für unerwünschte, schädliche Software

9 Clues: DatenverarbeitungsregisternummerMobbing mit Hilfe von elektronischen MedienVirus, der sich direkt über Netze verbreitenVersteckt in einem scheinbar nützlichen ProgrammProgramme, die Tastatureingaben mitprotokollierenÜberbegriff für unerwünschte, schädliche SoftwareViren, die als Programm in ein Dokument/ Datei eingebettet sind...

Food Security 2018-11-08

Food Security crossword puzzle
Across
  1. Inequality "if women had the same access to resources as men" is an example of ________.
  2. one major problem, with only one third of food being consumed.
  3. Disease stress and poor nutrition can lead to this accumulating in families.
  4. Single largest employer in the world.
  5. 281 million undernourished people live on this continent.
Down
  1. Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
  2. Four billion people worldwide have no access to _______.
  3. the world needs to rethink their _______ on how we are growing, sharing and consuming our food.
  4. Programs support your school ___________ to help food security in your community.

9 Clues: Single largest employer in the world.Four billion people worldwide have no access to _______.281 million undernourished people live on this continent.one major problem, with only one third of food being consumed.Disease stress and poor nutrition can lead to this accumulating in families....

Network Security 2024-07-08

Network Security crossword puzzle
Across
  1. Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  2. The process of protecting information or data by scrambling it so only those with the key can unscramble it
  3. A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
  4. A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
  5. A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
  1. An attack where a series of a computers repeatedly send requests to a server to overload a system
  2. The process of a user confirming that they are who they say they are on a computer system
  3. Trying to trick someone into giving out information over email
  4. A computer program that makes lots of copies of itself,

9 Clues: A computer program that makes lots of copies of itself,Trying to trick someone into giving out information over emailThe process of a user confirming that they are who they say they are on a computer systemAn attack where a series of a computers repeatedly send requests to a server to overload a system...

Security Crossword 2023-05-18

Security Crossword crossword puzzle
Across
  1. badge color for a NON U.S citizen that requires an escort
  2. who do you email for foreign travel concerns
  3. what visitors must do when they arrive onsite (contains a dash)
  4. the form that is filled out after foreign travel
Down
  1. what you earn when completing this puzzle
  2. when you notify security about a visitor or foreign travel
  3. color badge for U.S citizen no escort required
  4. color badge for visitors that require an escort
  5. who you contact for any security questions, concerns, incidents

9 Clues: what you earn when completing this puzzlewho do you email for foreign travel concernscolor badge for U.S citizen no escort requiredcolor badge for visitors that require an escortthe form that is filled out after foreign travelbadge color for a NON U.S citizen that requires an escortwhen you notify security about a visitor or foreign travel...

Y8 Security 2021-12-15

Y8 Security crossword puzzle
Across
  1. self replicate without any user help meaning they can spread very quickly.
  2. when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
  3. Monitor user actions such as key presses and then send the information back to the hacker
  4. emails that try to trick you into giving away personal information such as bank details
  5. attach themselves to files by copying themselves. They are then spread by users who open them and activate them.
Down
  1. malicious software. A program designed to cause harm to your computer
  2. malware which is disguised as legitimate software
  3. two or more devices connected together
  4. tell the victim their computer has lots of viruses and scare them into paying for the problem to be fixed

9 Clues: two or more devices connected togethermalware which is disguised as legitimate softwaremalicious software. A program designed to cause harm to your computerself replicate without any user help meaning they can spread very quickly.emails that try to trick you into giving away personal information such as bank details...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Poultry raised for eggs meat and feathers
  2. Small animal raised for meat and fur
  3. Animal raised for wool, meat and milk
  4. Large marsupial
Down
  1. Likes to chase mice
  2. Pollinator that plays a critical role in food production
  3. Has a trunk
  4. Flying mammal
  5. Man's best friend

9 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceSmall animal raised for meat and furAnimal raised for wool, meat and milkPoultry raised for eggs meat and feathersPollinator that plays a critical role in food production