cyber security Crossword Puzzles
SAPM CROSSWORD 2022-06-22
Across
- The ------------risk of the firm is diversifiable
- CAPM is a market --------------model
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses.
- An opportunity where an investor earns riskless profit without making any net investment
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- The other name for non-diversifiable risk is -------------------------
- One of the researchers/economists who developed the CAPM model
- The economist who developed the Arbitrage Pricing Theory (APT) model.
Down
- In the absence of secondary markets, this risk would be higher.
- The line representing CAPM is the -----------------market line
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing.
- In order to diversify, we look for security returns that are related ------------------
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The other name for indifference curve is --------------curve
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions.
- A conditional market order to sell stock if it drops to a given price (write without space)
- --------------------is the slope of the security characteristic line
- equal to the average ------------------as the number of securities becomes very large
- Variance of a portfolio with equi-proportionate investments in each security is
- The economist who laid the foundations for the Modern Portfolio theory
21 Clues: CAPM is a market --------------model • The ------------risk of the firm is diversifiable • The other name for indifference curve is --------------curve • The line representing CAPM is the -----------------market line • One of the researchers/economists who developed the CAPM model • In the absence of secondary markets, this risk would be higher. • ...
SAPM CROSSWORD 2022-06-22
Across
- In order to diversify, we look for security returns that are related ------------------
- Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
- In the absence of secondary markets, this risk would be higher
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- The line representing CAPM is the -----------------market line
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
- An opportunity where an investor earns riskless profit without making any net investment
- A conditional market order to sell stock if it drops to a given price (write without space)
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
Down
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- The other name for non-diversifiable risk is -------------------------risk
- The other name for indifference curve is --------------curve
- The economist who laid the foundations for the Modern Portfolio theory
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
- --------------------is the slope of the security characteristic line
- The ------------risk of the firm is diversifiable
- CAPM is a market --------------model
- The economist who developed the Arbitrage Pricing Theory (APT) model
- One of the researchers/economists who developed the CAPM model
20 Clues: CAPM is a market --------------model • The ------------risk of the firm is diversifiable • The other name for indifference curve is --------------curve • In the absence of secondary markets, this risk would be higher • The line representing CAPM is the -----------------market line • One of the researchers/economists who developed the CAPM model • ...
Cast study - An ethical approach to hacking 2025-06-12
Across
- Simulated cyberattacks used to assess system security.
- The analysis of systems and data to investigate security incidents or breaches.
- Software used to recover or bypass passwords through brute force or other methods.
- A testing method where the tester has full knowledge of the system’s internals.
- The technique of identifying active devices and services on a network.
- A testing method where the tester has partial knowledge of the system.
- A social engineering attack using phone calls to extract sensitive information.
- A unique identifier assigned to each device connected to a network.
- The creation of code or tools to take advantage of system vulnerabilities.
- Identifying the operating system of a target device during reconnaissance.
- Probing a system to identify open ports and available services.
- Psychological manipulation tactics to trick people into revealing confidential information.
- A documented strategy for detecting, responding to, and recovering from security incidents.
Down
- An evaluation of an organization’s overall cybersecurity strength and weaknesses.
- A web attack that injects malicious scripts into trusted websites.
- Using advanced search operators to find sensitive data or vulnerabilities online.
- The process of evaluating systems through defined methods to find vulnerabilities.
- Publicly available information gathered for analysis.
- Malicious software designed to harm or exploit systems.
- An exploit where a program overruns a buffer’s boundary and overwrites adjacent memory.
- A code injection attack targeting databases through malicious SQL queries.
- A social engineering method that involves inventing a scenario to steal information.
- An individual who gains unauthorized access to systems or data.
- A testing method where the tester has no prior knowledge of the system.
- The layout or structure of a network’s connections and devices.
- The process of discovering devices and connections within a network.
26 Clues: Publicly available information gathered for analysis. • Simulated cyberattacks used to assess system security. • Malicious software designed to harm or exploit systems. • An individual who gains unauthorized access to systems or data. • Probing a system to identify open ports and available services. • ...
Radio Numbers 2026-03-27
Across
- Amanda Laughery Night Shift Supervisor
- Ofc Erica Burns Building Security
- Breann Hathaway
- Ofc Michael Sheehan
- K9 Ofc Jason Ward
- Chief Eric Schmitt
- Sgt Caleb Teig
- Ofc Joshua Gross
- Code Norman Teed
- Natalie Rodgers
- Ofc Darold Donathan
- Chaplin Tom Willcox CP1
- Ofc Julia Swoboda
- PSA Haley Mendoza
- SRO Taylor Davisson
- Ofc Johnathan Sigmin
- Ofc Kory Franklin
- Ofc William Huber
- Sgt Stanley Kauffman
- Ofc Don Bradford Building Security
- Ofc Trainee Ashlyn Thom
- Allie Bryant
- Ofc Sarah Chapman Building Security
- Sgt Melissa Stowers
- Lt Dale Burnett
- Det Zach Hamilton
- Ofc Emilee Norris
- Det BJ Russell
- Ofc James Wood
- Code Kirk Standridge
- Ofc Michael Wachob
- Code Christopher Barber
- Sgt Jeremy Dixon
- Code Ronnie Bradley
- Ofc Steven Parrish
- Julie Lowery Records
- John Pate Part Time
- Ken Watson
- Ofc Colton Schmitt
- OIT Bodee Hern
- Nicole Robinson
Down
- Lt Eric Wehmeier
- PSA Dave Miller
- Det Sgt Tanner Muckenthaler
- Ofc Gavin Gannaway
- Ofc Christian Urbina
- Lt EJ Jones
- Ofc Matt Edie
- Ofc Wesley Anderson
- ACO Ashley Hurst
- Ofc Jordan Harder
- Ofc Chase Rains
- Breanne Benton
- K9 Ofc Brendan Gamble
- Kayla Lovell
- SRO Jesse Wilcox
- Ofc Brittney Holt
- Sgt Cody Lowery
- Ofc Kayla Smith
- Ofc Caleb McCarty
- Lori Hodge
- Ofc Nicholas Brown
- Det Cody Foster
- Ofc Daniel McKinney
- Sgt Gregory Yartz
- Ofc Robert Bishop Court Security
- Eastyn Buttke
- Ofc Austin Simmons
- Elijah Emerson
- Det Joe Edwards
- Ofc Amber Edie
- Ofc Alex Kaster
- Ofc Kyle Rhea
- Det Seth Jenkerson
- Ofc Alexander Rose
- Ofc Luis Gonzalez
- SRO Steve Mobley
- Det David Lingscheit
- Ofc Austin Williams
- Missy Dement Records
- Harold Clements Comm Supervisor
- Ofc Logan Wilson
82 Clues: Lori Hodge • Ken Watson • Lt EJ Jones • Kayla Lovell • Allie Bryant • Ofc Matt Edie • Eastyn Buttke • Ofc Kyle Rhea • Sgt Caleb Teig • Breanne Benton • Elijah Emerson • Ofc Amber Edie • Det BJ Russell • Ofc James Wood • OIT Bodee Hern • PSA Dave Miller • Breann Hathaway • Ofc Chase Rains • Natalie Rodgers • Sgt Cody Lowery • Ofc Kayla Smith • Det Cody Foster • Lt Dale Burnett • Det Joe Edwards • Ofc Alex Kaster • ...
Network Requirements 2023-09-05
Across
- A set of rules for the network
- managing IP-packet traffic
- the basic unit of data
- maximum data rate networks can manage
- the structure of a network
- ensures protection from unauthorised access
- accommodation of growth without decreased performance
- maximum size of a packet that can be transmitted
- a security device
- usage of backup components
Down
- allows access to a private network over the internet
- actual data transfer rate
- translates domain names to IP addresses
- division of a network into subnetworks
- allows multiple devices on a private network to share a public IP address
- make late
- delay in transmission measured in (ms)
- involves constant diagnosis of issues and network analysis
- deviation in signal pulses
- another word for forfeiture
20 Clues: make late • a security device • the basic unit of data • actual data transfer rate • managing IP-packet traffic • the structure of a network • deviation in signal pulses • usage of backup components • another word for forfeiture • A set of rules for the network • maximum data rate networks can manage • division of a network into subnetworks • delay in transmission measured in (ms) • ...
Spanish Travel Vocab 2020-04-10
Across
- to see
- stop
- baggage claim
- second class
- to hope
- flight attendant
- event ticket
- to take off
- to go through security
- gate
- car wagon
- to check luggage
- to miss
- departure
- platform
- coach
- trip
- counter
- in the train station
- window
- customs
- layover
- ticket
- international airport
- carry on luggage
Down
- security agent
- in the airport
- luggage
- first class
- aisle
- baggage screening
- boarding pass
- delayed
- suitcase
- waiting room
- to land
- visa
- to get
- ticket
- bunk
- passenger
- seat belt
- to give
- sleeping car
- arrival
- flight
- ticket window
- connection
- on time
- seat
- to turn
- controller
52 Clues: stop • visa • gate • bunk • trip • seat • aisle • coach • to see • to get • ticket • flight • window • ticket • luggage • to hope • delayed • to land • to miss • to give • counter • arrival • customs • layover • on time • to turn • suitcase • platform • car wagon • passenger • departure • seat belt • connection • controller • first class • to take off • second class • waiting room • event ticket • sleeping car • baggage claim • boarding pass • ticket window • security agent • ...
CITS2006-C10-Mohammad 2025-05-19
Across
- Secures internet traffic over public networks
- Converting data into an unreadable form
- Fake system to lure attackers
- Overwhelming a many systems with traffic
- Records keystrokes secretly
- Malware disguised as legitimate software
- Secures data with one-way transformation
- Malicious software
- Digital proof of website authenticity
- Pretending to be a trusted source
- Self-replicating malware
Down
- Tricking users to steal information
- Guessing repeatedly to gain access
- Hidden way to bypass security
- Vulnerability with no known fix yet
- Locks files for money
- Network of infected devices
- Exploits database query vulnerabilities
- Isolated space to safely run untrusted code
- Secretly monitors user activity
- Security fix for a software
- Protocol securing web communications
- Filters network traffic
- Adding extra login verification steps
24 Clues: Malicious software • Locks files for money • Filters network traffic • Self-replicating malware • Network of infected devices • Records keystrokes secretly • Security fix for a software • Hidden way to bypass security • Fake system to lure attackers • Secretly monitors user activity • Pretending to be a trusted source • Guessing repeatedly to gain access • ...
The 16 Career Clusters 2025-10-19
Across
- : Plane driver in Transportation, Distribution & Logistics
- : Patient care provider in Health Science
- : Numbers expert in Business, Management & Administration
- : Animal doctor in Agriculture, Food & Natural Resources
- : Fashion demonstrator in Marketing, Sales & Service
- : Food preparation expert in Hospitality and Tourism
- : Wiring expert in Architecture & Construction
- : Book manager in Education & Training
- : Congressional assistant in Government & Public Administration
- : Metal joiner in Manufacturing
Down
- : Fire responder in Law, Public Safety, Corrections & Security
- : Design specialist in Science Technology, Engineering & MATH
- : Spiritual leader in Human Services
- : Legal representative in Law, Public Safety, Corrections & Security
- : Oral health specialist in Health Science
- : Financial institution manager in Finance
- : Music performer in Arts, A/V Tech & Communications
- : Knowledge imparter in Education & Training
- : Network systems expert in Information Technology
- : Building designer in Architecture & Construction
20 Clues: : Metal joiner in Manufacturing • : Spiritual leader in Human Services • : Book manager in Education & Training • : Patient care provider in Health Science • : Oral health specialist in Health Science • : Financial institution manager in Finance • : Knowledge imparter in Education & Training • : Wiring expert in Architecture & Construction • ...
Airports 2020-05-13
25 Clues: WC • sor • utas • kapu • késik • bőrönd • indulás • érkezés • rendelő • útlevél • poggyász • fogorvos • külföldre • beszállni • váróterem • kézikocsi • repülőtér • városnézés • biztonsági • bevándorlás • létesítmény • repülőjárat • vámvizsgálat • bejelentkezés • szórakoztatni
C2 2025-05-15
24 Clues: dog • bed • car • cat • door • flag • lamp • pilot • eagle • pasta • bunny • snake • train • window • turtle • cereal • hot dog • pyramid • luggage • passport • security • hamburger • helicopter • cruise ship
Capítulo 7: A Viajar #2 2024-11-19
20 Clues: park • floor • train • price • flight • customs • to plan • layover • bicycle • arrivals • entrance • security • airplane • passenger • table tray • train track • destination • one-way ticket • to take the train • to pack suitcases
Tom Brouwers Engels 2021-01-13
Across
- what you get when it's halloween
- when something terrible has happend you need to ...
- things in our body to keep us living
- when his father died he dropped a ...
- the row of bones in your back
- all planets are in a ...
- when you can't stop doing something you have an ...
- things made out of wood
- when it's heavily snowing
Down
- a sentence what someone said is a ...
- the midway pauze in a game
- when there is lightning an thunder
- the place where you need to wait
- opposite of finish
- when you see somebody you ... them
- to be save for covid you need to have a ... with the covid vaccine
- life from anotherplanet
- our ... is called the milky way
- online
- the opposite of pessimist
20 Clues: online • opposite of finish • life from anotherplanet • things made out of wood • all planets are in a ... • the opposite of pessimist • when it's heavily snowing • the midway pauze in a game • the row of bones in your back • our ... is called the milky way • what you get when it's halloween • the place where you need to wait • when there is lightning an thunder • ...
Crossword Puzzle 2022-11-27
Across
- The edgier battle star
- famous Early 90s Kindergarten teacher
- “I see you enjoy Super Mario…”
- Your greatest cyber crime
- 1988’s olympic winter
- “Resident” Albert
- Metal Gear character who likes to wrestle senators
- An adorable name for Hershey Bars
- Your kind of sister
- A double entendre TV show
- A wholesome healthy breakfast
- An 80s themed “Vice” with plenty of white suits
- Lost in ’88
Down
- Your on a first name basis with this Galactica Admiral
- dating sim meets supernatural teen adventure
- Being ___ in Detroit is hard
- No___ GTA RP
- A fun holiday treat
- Themed Oreos are highly…
- The proper microwave wattage
- A rare candy bar
- A renowned piece of art
- MultiVersus competitor (this clue is sponsored by Chilis)
23 Clues: Lost in ’88 • No___ GTA RP • A rare candy bar • “Resident” Albert • A fun holiday treat • Your kind of sister • 1988’s olympic winter • The edgier battle star • A renowned piece of art • Themed Oreos are highly… • Your greatest cyber crime • A double entendre TV show • Being ___ in Detroit is hard • The proper microwave wattage • A wholesome healthy breakfast • “I see you enjoy Super Mario…” • ...
Happy Valentines Day! I love you! 2024-02-12
Across
- Something Mia dreams of (NOT adultery)
- Mia's favorite thing to see on Duncan's face
- Large, glittering, masculine
- For intellectual couples
- Something Duncan doesn't play with me
- Tinned fish for Duncan
- Duncan's mistress
- Long and short bursts of "I love you"
- Special meal first eaten on Cyber Monday
- Makes us better
Down
- Our first meal together
- Dark, night, cold, passive (plural); everyone in Pittsburgh
- What not to give a sick man
- Something I want to spend on Duncan
- Duncan, of Target
- something Mia loves to do with her boyfriend
- What Duncan claims he is not
- A drink that could be found in a china shop
- The best thing since Prozac
- Concerned with implications
- How much I love Duncan, with coffee
21 Clues: Makes us better • Duncan, of Target • Duncan's mistress • Tinned fish for Duncan • Our first meal together • For intellectual couples • What not to give a sick man • The best thing since Prozac • Concerned with implications • What Duncan claims he is not • Large, glittering, masculine • Something I want to spend on Duncan • How much I love Duncan, with coffee • ...
RUU TNI Resmi jadi Undang-Undang 2025-04-04
Across
- kata 'cyber' dalam B.Indonesia menjadi ...
- pangkat dalam TNI dan Polri yang lebih rendah dari Bintara adalah ...
- kata kerja dari 'tangan' adalah ...
- kata 'article' dalam UU disebut ...
- sinonim kata 'pencegahan' adalah ...
- persamaan makna dari 'waktu itu' adalah ...
- sinonim dari kata 'posisi' dalam pekerjaan adalah ...
- kata 'ministry' dalam B.Indonesia adalah ...
- pangkat dalam TNI dan Polri yang berada ditengah-tengah ialah ...
- kata 'highlights' dalam B.Indonesia adalah ...
- sinonim kata 'meresmikan' adalah ...
Down
- kata 'secretariat' dalam B.Indonesia menjadi ...\
- menjalankan posisi dan tugas juga disebut ...
- sinonim kata 'berada dalam' adalah ...(loaded)
- kata 'set/define' dalam B.Indonesia adalah ...
- kata 'to save/rescue' dalam B.Indonesia adalah ...
- sinonim kata 'dasar' adalah ...
- kata benda dari 'mengancam' adalah ...
- pangkat dalam TNI dan Polri yang lebih tinggi dari bintara adalah ...
- sinonim kata dari 'diringkas' adalah ...
20 Clues: sinonim kata 'dasar' adalah ... • kata kerja dari 'tangan' adalah ... • kata 'article' dalam UU disebut ... • sinonim kata 'pencegahan' adalah ... • sinonim kata 'meresmikan' adalah ... • kata benda dari 'mengancam' adalah ... • sinonim kata dari 'diringkas' adalah ... • kata 'cyber' dalam B.Indonesia menjadi ... • persamaan makna dari 'waktu itu' adalah ... • ...
GE 2025-04-13
Across
- risks of cyber threats and vulnerabilities
- gap to emerging technologies
- machine learning that perform tasks
- Tailored to fit the specific job you are applying
- leveraging principles of quantum mechanics
- integration of emerging technologies in industries
- delivery of computing services over the internet
- connects devices to the internet
- overlays digital information onto physical world
- refers to the innovative advancements in various field
- - creates immersive virtual environment
Down
- being updated to the innovative ways and effect on industry
- effect of innovations in renewable energy
- joining professional organization to stay informed about industry developments.
- - it refers to the emerging technologies in various field
- A distributed ledger technology
- advancement in biotech
- the purpose of emerging technologies
- staying flexible and adapting to changes.
- Not necessarily tailored for specific jobs
20 Clues: advancement in biotech • gap to emerging technologies • A distributed ledger technology • connects devices to the internet • machine learning that perform tasks • the purpose of emerging technologies • - creates immersive virtual environment • effect of innovations in renewable energy • staying flexible and adapting to changes. • risks of cyber threats and vulnerabilities • ...
CYBAH 2025-07-02
Across
- Program du laddar ner till mobilen
- Hemsiodor använder dem för att samla information om di
- Person som gör intrång i system
- An cyberattack som begränaer tillkommligheten till en tjänst
- Skadlig kod som kräver lösensumma
- Bluffmail som försöker lura dig att lämna ut information
- Skyddar din internettrafik via en säker tunnel
- Hemlig kombination för inloggning
- Juridiskt skydd för personlig informatio online
- Program som upptäcker skadlig kod
- Automatisk programkod som kan missbrukas
Down
- Prefix som betyder digitalt eller internetrelaterat
- Vad står P:et i IP-adress för (svenska ordet)
- Plats där du lagrar filer online
- Gör information oläslig utan nyckel
- Något du bör skydda online
- En sort skod man kan skanna med mobilen
- Personligt Identifikations Nummer
- Skyddar nätverket från obehörig åtkomst
- Litet, portabelt lagringsminne
20 Clues: Något du bör skydda online • Litet, portabelt lagringsminne • Person som gör intrång i system • Plats där du lagrar filer online • Skadlig kod som kräver lösensumma • Personligt Identifikations Nummer • Hemlig kombination för inloggning • Program som upptäcker skadlig kod • Program du laddar ner till mobilen • Gör information oläslig utan nyckel • ...
Informatika sekarang dan Masa depan 2025-08-26
Across
- Program berbahaya yang bisa merusak sistem komputer
- Ilmu tentang data besar disebut
- Teknologi uang digital
- Kendaraan tanpa pengemudi
- Robot dengan kecerdasan buatan
- Aplikasi yang memungkinkan komunikasi tatap muka secara virtual
- Proses mengubah data mentah menjadi informasi yang berguna
- Alat untuk menghubungkan komputer ke jaringan internet
- Jaringan perangkat saling terhubung
- Bahasa pemrograman popular dalam pengolahan big data
Down
- Sistem yang bisa belajar dari data
- Big data tidak akan berguna tanpa analisis
- Perangkat wearable yang bisa menghitung langkah kaki dan detak jantung
- Sistem keamanan di dunia digital
- Jaringan global yang menghubungkan miliaran perangkat diseluruh dunia
- Algotitma pembelajaran AI
- Konten negatif atau menyesatkan yang sering beredar di sosial media
- Penyimpanan data di internet
- Penyimpanan dan pemrosesan data besar
- Proses mengenali informasi dari data besar
20 Clues: Teknologi uang digital • Kendaraan tanpa pengemudi • Algotitma pembelajaran AI • Penyimpanan data di internet • Robot dengan kecerdasan buatan • Ilmu tentang data besar disebut • Sistem keamanan di dunia digital • Sistem yang bisa belajar dari data • Jaringan perangkat saling terhubung • Penyimpanan dan pemrosesan data besar • Big data tidak akan berguna tanpa analisis • ...
Cyber Law 2021-09-05
Across
- ______Regulation works by utilising feedback
- Shawn Fanning created the______
- cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- cyber________
Down
- according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
- some experts regard digital______ as the third industrial revolution
- the conversion of analogue data into digital form
- wrote Code and Other Laws of Cyberspace
8 Clues: cyber________ • Shawn Fanning created the______ • wrote Code and Other Laws of Cyberspace • ______Regulation works by utilising feedback • the conversion of analogue data into digital form • some experts regard digital______ as the third industrial revolution • ...
Cyber Law 2021-09-05
Across
- cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- ____Regulation works by utilising feedback
- according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
- wrote Code and Other Laws of Cyberspace
- cyber____
- digital___ is the productivity platform that some experts regard as the third industrial revolution
- Shawn Fanning created the____
- the conversion of analogue data into digital form
8 Clues: cyber____ • Shawn Fanning created the____ • wrote Code and Other Laws of Cyberspace • ____Regulation works by utilising feedback • the conversion of analogue data into digital form • digital___ is the productivity platform that some experts regard as the third industrial revolution • ...
Cyber Crossword 2021-04-26
Across
- An individual who causes harm or stress to another human intentionally and repetitively.
- The act of protecting ones self or others from harm or intimidation online.
- the use of technology to harass, threaten, embarrass, or target another person.
- A result or effect, typically one that is unwelcome or unpleasant.
Down
- Electronic device most students own at home and is square and mostly portable.
- A repetitive action toward another human purposely causing harm or intimidation.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- Having firm belief or reliability in someone.
8 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • The act of protecting ones self or others from harm or intimidation online. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • ...
Cyber Liability 2020-02-05
Across
- Direct monetary fines, penalties, reimbursements, fraud recoveries or assessments owed by the insured organization under the terms of a merchant services agreement.
- Legal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages.
- In the wake of a data breach provides services to the insured, including: computer expert, legal, public relations and crisis management, breach notifications, call center, breach resolution and mitigation.
- Indemnifies the insured for data protection loss incurred by the insured due to alteration, corruption, destruction, deletion or damage to a data asset, or inability to access a data asset.
- Liability to third party individuals or businesses for theft, loss, or unauthorized disclosure of personally identifiable information or third party information that is in the care, custody, or control of the insured organization.
Down
- Net profit and extra expense loss during the period of restoration
- Coverage for payment made in response to an extortion threat to damage or corrupt data if not paid. Typically carried out by hackers placing ransomware on our insured's systems.
- Coverage for defense costs and penalties resulting from Federal Trade Commission (FTC) or Federal Communications Commission (FCC) proceedings concerning a covered data breach incident.
8 Clues: Net profit and extra expense loss during the period of restoration • Legal liability coverage for personal and advertising offenses from insured's display of media material on their website or social media web pages. • ...
Cyber bullying 2024-10-08
Across
- Never open an ___ from someone you do not know or from bullies
- Do not spread ___ about someone
- Never give out personal __
- Do not send ___ messages
- Do not ___ a person from online activities such as a chat
Down
- Never tell anyone your ___, not even your friends
- Be ___ to others
- Do not send messages when you are ___
8 Clues: Be ___ to others • Do not send ___ messages • Never give out personal __ • Do not spread ___ about someone • Do not send messages when you are ___ • Never tell anyone your ___, not even your friends • Do not ___ a person from online activities such as a chat • Never open an ___ from someone you do not know or from bullies
cyber safety 2023-05-22
Across
- Talking someone into revealing secrets or embarrassing information
- someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
- intense harassment and denigration that includes threats or creates significant fear.
- Intentionally and cruelly excluding someone from an online group
- Sharing someone's secrets or embarrassing information
Down
- Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation
- Repeatedly sending nasty, mean, and insulting messages
- Online fights using electronic messages with angry and vulgar language.
8 Clues: Sharing someone's secrets or embarrassing information • Repeatedly sending nasty, mean, and insulting messages • Intentionally and cruelly excluding someone from an online group • Talking someone into revealing secrets or embarrassing information • Online fights using electronic messages with angry and vulgar language. • ...
cyber crimes 2023-05-04
Across
- personal data should be kept _______ by company's and organization
- can have information data _______
- when some one try stealing data of you by calling or messaging you pretending to be someone else
- data should be used _________
Down
- can request to ____ erased
- sneaking on to someone's computer and intending to committed a crime has 5 years of prison and a ________ fine
- you can request your ________ information
- they are 7 __________
8 Clues: they are 7 __________ • can request to ____ erased • data should be used _________ • can have information data _______ • you can request your ________ information • personal data should be kept _______ by company's and organization • when some one try stealing data of you by calling or messaging you pretending to be someone else • ...
Cyber Crime 2025-02-06
Across
- Kejahatan yang dilakukan dengan cara mengintip atau mengambil informasi pribadi seseorang secara diam-diam.
- Tindakan yang dilakukan untuk menipu orang agar memberikan informasi pribadi melalui email atau situs palsu
- Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat.
- Aksi mengganggu atau menyerang sistem komputer atau jaringan dengan tujuan merusak atau mencuri data.
Down
- Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online.
- Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer.
- Tindakan mengirim pesan atau email berulang kali dengan maksud mengganggu atau mengintimidasi korban.
- Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi.
8 Clues: Penipuan dengan mencuri identitas seseorang untuk kepentingan pribadi. • Penyebaran berita palsu yang menyesatkan atau menimbulkan kepanikan di masyarakat. • Aktivitas ilegal yang melibatkan penipuan kartu kredit atau transaksi keuangan online. • Kejahatan dengan cara menyebarkan virus komputer untuk merusak atau mengambil alih sistem komputer. • ...
cyber ethics 2025-06-07
Across
- Strong code used to protect your digital identity
- : When your personal info is stolen and misused
- Avoid this while using someone else’s digital content
- Posting rude or harmful comments online is called
Down
- Software that defends systems from cyber threats
- Using someone's personal information without permission
- Sending fake emails to trick users into revealing private info
- False online identity to mislead others
8 Clues: False online identity to mislead others • Strong code used to protect your digital identity • : When your personal info is stolen and misused • Avoid this while using someone else’s digital content • Software that defends systems from cyber threats • Posting rude or harmful comments online is called • ...
Cyber-crossing 2024-10-29
Across
- The act of disguising as a trusted entity to obtain information.
- Media that has been adjusted to spread falsified information.
- Steps taken to protect a device from threats.
- 2 Step verification is an example of:
Down
- A secret word or phrase used to gain access.
- Impersonation of another person to commit crimes.
- A type of malware with the ability to spread throughout a system.
- Someone who gains unauthorised access to systems.
8 Clues: 2 Step verification is an example of: • A secret word or phrase used to gain access. • Steps taken to protect a device from threats. • Impersonation of another person to commit crimes. • Someone who gains unauthorised access to systems. • Media that has been adjusted to spread falsified information. • The act of disguising as a trusted entity to obtain information. • ...
Cyber Crossword 2025-09-30
Across
- Keeps network traffic private over the internet.
- Secret string used to access accounts.
- A site pretending to be real to steal credentials.
- Software that self replicates and spreads maliciously.
- A device or software that blocks unauthorized network traffic.
Down
- Process that converts data into unreadable form to protect it.
- A fraudulent message designed to trick recipients into sharing info.
- Software used by attackers to lock files or steal data for ransom.
8 Clues: Secret string used to access accounts. • Keeps network traffic private over the internet. • A site pretending to be real to steal credentials. • Software that self replicates and spreads maliciously. • Process that converts data into unreadable form to protect it. • A device or software that blocks unauthorized network traffic. • ...
FPS Definitions 2023-05-09
Across
- VR A headset used to view virtual reality
- Using reality’s in away not intended
- A interactive video that views the entire visible area
- A system that can give you feedback on your health
- Attract and hold attention
- A term that capitulates other realities
Down
- Motion sickness cause my devices
- A visible form of an idea
- Digital elements used to overview real life
- A code used to program
10 Clues: A code used to program • A visible form of an idea • Attract and hold attention • Motion sickness cause my devices • Using reality’s in away not intended • A term that capitulates other realities • VR A headset used to view virtual reality • Digital elements used to overview real life • A system that can give you feedback on your health • ...
CyberDSA D1 2025-08-14
Across
- Malicious software designed to damage systems
- Malicious program disguised as legitimate software
- Incident where unauthorized access to data occurs
- Fraudulent emails or messages to steal credentials
- Hostile action aimed at exploiting vulnerabilities
Down
- Organization behind the ATT&CK framework for cyber threats.
- Malware that encrypts files and demands payment
- Intelligence gathered from publicly available sources
- Network of compromised devices controlled remotely
- Decoy system set up to lure attackers
10 Clues: Decoy system set up to lure attackers • Malicious software designed to damage systems • Malware that encrypts files and demands payment • Incident where unauthorized access to data occurs • Malicious program disguised as legitimate software • Network of compromised devices controlled remotely • Fraudulent emails or messages to steal credentials • ...
Health 2022-10-24
Across
- A bullying done on social media/internet
- A bullying done by actions physically
- The person who helps the victim
- A person who stands by all the bullies actions.
- being sad for a long period of time
Down
- A person who bullies others
- can recover quickly and not strong as depression
- A bullying done by words
- You joke in a way that makes people smile
- The person the bully bullies
10 Clues: A bullying done by words • A person who bullies others • The person the bully bullies • The person who helps the victim • being sad for a long period of time • A bullying done by actions physically • A bullying done on social media/internet • You joke in a way that makes people smile • A person who stands by all the bullies actions. • ...
Health crossword puzzle 2022-10-24
Across
- a person that stands up to the bully
- the type of bullying that uses violence
- the type of bullying that’s on the internet
- the need to kill yourself
Down
- a person that isn’t involved in the conflict
- the person that hurts the victim physically and mentally
- the type of bullying that uses words
- felling sad for multiple days
- the person that’s getting bullied
- hurting someone physically and mentally
10 Clues: the need to kill yourself • felling sad for multiple days • the person that’s getting bullied • the type of bullying that uses words • a person that stands up to the bully • the type of bullying that uses violence • hurting someone physically and mentally • the type of bullying that’s on the internet • a person that isn’t involved in the conflict • ...
Complete the crossword for words with soft c 2025-09-29
Across
- last month of the year
- move around
- an ordinary person not in the armed forces
- a tank to hold water as in a toilet
Down
- to do with computers, the internet or online world
- do something happy to mark a special day
- very good exceptional
- a special piece of paper to say what you achieved
- a special service at an event such as a wedding
- something happens by mistake
10 Clues: move around • very good exceptional • last month of the year • something happens by mistake • a tank to hold water as in a toilet • do something happy to mark a special day • an ordinary person not in the armed forces • a special service at an event such as a wedding • a special piece of paper to say what you achieved • to do with computers, the internet or online world
12.a 2 2023-04-25
16 Clues: sample • reward • salary • survive • develop • security • quantity • weakness • advantage • market gap • enterprise • independence • office staff • responsibility • time-consuming • market research
U11 - Mod 13 Key Terms 2024-10-21
Across
- access controls that are actual barriers deployed to prevent direct physical contact with systems.
- (4,5) is a comprehensive approach to securing all access across networks, applications, and environments.
- it verifies the identity of each user, to prevent unauthorized access; An administrative access control, one of the three security services.
- (4,3,4) Smart cards and security key fobs are examples of something that users possess
- it keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make; An administrative access control, one of the three security services.
- (4,3,4) Passwords, passphrases, or PINs are all examples
Down
- (6,4,2) solution allows the user to use one set of login credentials to authenticate across multiple applications. This way, the user only needs to remember one strong password.
- it determines which resources users can access, along with the operations that users can perform; An administrative access control, one of the three security services.
- access controls that are the hardware and software solutions used to manage access to resources and systems.
- access controls that are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
- are rules configured to limit folder or file access for an individual or a group and can help secure data.
- (3,3,3) Biometric security compares unique physical characteristics against stored profiles to authenticate users.
12 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples • (4,3,4) Smart cards and security key fobs are examples of something that users possess • access controls that are actual barriers deployed to prevent direct physical contact with systems. • (4,5) is a comprehensive approach to securing all access across networks, applications, and environments. • ...
Finance 1-9 2013-08-22
18 Clues: obrot • wycena • waluta • aktywa • spolka • dluznik • oddzial • wynajem • ujawniac • prowizja • przychod • obligacja • amortyzacja • zobowiazanie • kredyt hipoteczny • ubezpieczenie spoleczne "social ......" • glowna ksiega rachunkowa "nominal ....." • jednoosobowa dzialalnosc gospodarcza "sole ...."
New Insights 4 Glossary: Society and health care 2022-09-05
18 Clues: tuki • köyhyys • emigrant • kuntoutus • enemmistä • sick leave • specialist • vähemmistö • kansalainen • kansalaisuus • syrjäytyminen • private sector • housing benefit • social security • maternity leave • paternity leave • health insurance • student allowance/benefit
Network Security 2021-03-08
Across
- What type of malware is executed through executable files
- protects a network from unauthorised access, can be in hardware or software form
- A way of hiding incoming and outgoing messages/information from other people
- Controls what specific users can and cant do
- the intentional or unintentional release of secure or private/confidential information to an untrusted environment
Down
- The Process of proving who you are in order to get access to something
- A type of malware which is executed through a weakness in the system
- Keystroke logging could be used as a type of what malware?
- What type of malware deceives the user?
9 Clues: What type of malware deceives the user? • Controls what specific users can and cant do • What type of malware is executed through executable files • Keystroke logging could be used as a type of what malware? • A type of malware which is executed through a weakness in the system • The Process of proving who you are in order to get access to something • ...
IT-Security 2016-01-29
Across
- Programme, die Tastatureingaben mitprotokollieren
- Virus, der sich direkt über Netze verbreiten
- Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
- Versteckt in einem scheinbar nützlichen Programm
Down
- Mobbing mit Hilfe von elektronischen Medien
- Datenverarbeitungsregisternummer
- Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
- Viren, die als Programm in ein Dokument/ Datei eingebettet sind
- Überbegriff für unerwünschte, schädliche Software
9 Clues: Datenverarbeitungsregisternummer • Mobbing mit Hilfe von elektronischen Medien • Virus, der sich direkt über Netze verbreiten • Versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Überbegriff für unerwünschte, schädliche Software • Viren, die als Programm in ein Dokument/ Datei eingebettet sind • ...
Computer Security 2024-03-22
Across
- controls flow of network traffic between device and internet
- when unauthorized individuals access data
- giving of 2 pieces of personal information to access data
Down
- detects a physical attribute of an individual allowing/denying them access to data
- malware disguised as legitimate sites
- converts plaintext into ciphertext and vice versa
- detection software which detects malicious activity
- consequence of computer misuse
- data stored in an alternative location to be recovered
9 Clues: consequence of computer misuse • malware disguised as legitimate sites • when unauthorized individuals access data • converts plaintext into ciphertext and vice versa • detection software which detects malicious activity • data stored in an alternative location to be recovered • giving of 2 pieces of personal information to access data • ...
food security 2024-10-17
Across
- - A plant grown by farmers to be eaten.
- - This nutrient is found in foods like bread and rice.
- - The practice of catching fish for food.
- - A place where animals are raised for food, like cows or chickens.
Down
- - The type of farming that grows crops without chemicals.
- - The storage place where food is kept to be sold or given.
- - A place where food is processed and packed before being sent to stores.
- - This happens when people do not have enough food to eat.
- - The act of distributing food to people in need.
9 Clues: - A plant grown by farmers to be eaten. • - The practice of catching fish for food. • - The act of distributing food to people in need. • - This nutrient is found in foods like bread and rice. • - The type of farming that grows crops without chemicals. • - This happens when people do not have enough food to eat. • ...
Food Security 2024-11-28
Across
- which is the crunchy side dish which normally has more oil?
- one vegetable in which we should double check while washing
- Good vegetable for blood nourishing
- Which is Non-healthy material for food wrapping ?
Down
- any substance which is added to look food attractive
- Reportadely India's less hygienic street food
- Which is the natural vegetable for blood sugar control ?
- A not so good food item for our tooth health
- Which is the most iron rich food ?
9 Clues: Which is the most iron rich food ? • Good vegetable for blood nourishing • A not so good food item for our tooth health • Reportadely India's less hygienic street food • Which is Non-healthy material for food wrapping ? • any substance which is added to look food attractive • Which is the natural vegetable for blood sugar control ? • ...
Securities Crossword 2023-01-04
Across
- Type of security that takes care of parks and schools
- People who invest in bonds and stocks
- Type of bond that is internations
- what is the mane for the devaluing of money when too much is in circulation
- Where stocks and bonds can be bought and sold
- this is issued by governments and corporations when they want to raise money.
- a tradable financial asset
Down
- A stock is categorized as this when the price dramatically fluctuates
- another name for money
- who ensures most bonds
- debt obligations issued by the U.S. Department of the Treasury. T-bills have the shortest maturity date of all the debt issued by the federal government
- Investors look to make this when they go into the market
- all the shares by which ownership of a corporation or company is divided
- what type of bond is bought by corporations
- Because of their large denomination this type of security is bought most often by large institutional investors
15 Clues: another name for money • who ensures most bonds • a tradable financial asset • Type of bond that is internations • People who invest in bonds and stocks • what type of bond is bought by corporations • Where stocks and bonds can be bought and sold • Type of security that takes care of parks and schools • Investors look to make this when they go into the market • ...
Technology Collocations 2023-10-18
Across
- Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks.
- Encompasses devices and systems that enhance the automation, control, and efficiency of various household functions, like lighting, heating, and security.
- Involves the process of discovering patterns and information from large sets of data, often used for business intelligence, research, and decision-making.
- Involves the use of remote servers on the internet to store, manage, and process data, providing on-demand access to a shared pool of computing resources.
- Refers to the latest and most advanced technological innovations or developments. It's often used to describe state-of-the-art products or systems.
- Describes the profound and rapid changes brought about by the widespread adoption and integration of digital technology in various aspects of society.
- Describes a design or layout of a technological system or device that is easy for users to navigate and understand without much difficulty.
- Involves using unique physical or behavioral characteristics, such as fingerprints or facial recognition, to verify and grant access to devices or systems.
Down
- Refers to the transfer of information between devices without the need for physical connections, typically using technologies like Wi-Fi or Bluetooth.
- Creates a simulated environment that users can interact with, often through the use of specialized headsets and equipment, providing an immersive and artificial experience.
- Integrates computer-generated information, such as images or data, into the user's view of the real world, enhancing their perception and interaction with the environment.
- Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities.
12 Clues: Refers to fast and reliable internet connections that enable quick data transfer and efficient online activities. • Denotes the steps and precautions taken to protect computer systems, networks, and data from cyber threats and attacks. • ...
Change a verb into a nouns 2023-11-30
14 Clues: success • madness • addition • decision • security • attention • protection • comparison • conclusion • collection • attraction • description • distraction • achievement
Change a nouns into a verb 2023-11-30
14 Clues: success • madness • security • addition • decision • attention • conclusion • attraction • comparison • protection • collection • description • achievement • distraction
2 2024-05-15
National Services Acronyms 2025-02-17
C reading 2021-09-06
SEAT WORK 2022-08-30
Across
- SECURITY PERSONNEL - defined by the IRR of R.A. 5487, as natural persons which include rendering/performing security and/or detective services as employed by private security agencies and/or private firms.
- SECURITY MANAGEMENT - It is established to provide security for installation or facilities and to promote efficiency of security operations and economy in the use of security personnel.
- - The state of being protected or safe from harm; things done to make people or places safe.
- CONTRACT THEORY - Individual agree to live according to certain rules, norms and laws, so that collectively we can enjoy the benefits of living in a society.
Down
- TAYLOR - Father of Scientific Management Theory.
- - latin word “__________” which means “safe, secure, free from care, unworried, unconcerned.
- TAYLOR- he proposed the need to introduce science into managing organizations in order to bring objectivity, precision, order and predictability.
- - According to history, protecting these establishments are almost single-handedly made by the State forces.
- REVOLUTION - The process of change from an agrarian, handicraft economy to one dominated by industry and machine manufacture.
- SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients.
10 Clues: TAYLOR - Father of Scientific Management Theory. • - The state of being protected or safe from harm; things done to make people or places safe. • - latin word “__________” which means “safe, secure, free from care, unworried, unconcerned. • SECURITY AGENCY - they are not just there to serve as a deterrence, but to safeguard their clients. • ...
Cold War 2018-04-26
Unidad 6A 2025-05-22
17 Clues: exit • fare • cloud • cheap • delay • flight • to fly • ticket • to save • to plan • to cross • security • to board • to spend • expensive • to reserve • misunderstanding
Lenovo 3 2021-09-10
Across
- What is the new model for the current and future workforce?
- What is the biggest security threat today?
- One of Lenovo's approaches to security is "Security by ..."
- XDR stands for "_ _ _ _ _ _ _ _ Detection and Response"
Down
- What is the name of Lenovo's security brand?
- What are prime targets for hackers?
- Lenovo Smart Standby understands when you are not using your computer and schedules ... (Bears schedule this in winter!)
- What is most exposed in the hybrid model?
8 Clues: What are prime targets for hackers? • What is most exposed in the hybrid model? • What is the biggest security threat today? • What is the name of Lenovo's security brand? • XDR stands for "_ _ _ _ _ _ _ _ Detection and Response" • What is the new model for the current and future workforce? • One of Lenovo's approaches to security is "Security by ..." • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
CHAPTER 4 CF 2024-09-12
Across
- A formal document outlining security policies, procedures, and guidelines for safeguarding information assets.
- The process involves the continuous implementation and management of security policies, involving regular updates, audits, and adherence to established guidelines.
- The process involves setting access controls on files and folders to restrict their viewing, modification, or deletion permissions.
- The guidelines outline the process for checking out and introducing new employees.
- To manage permissions effectively
- The framework and oversight for security policies are established, outlining roles and responsibilities for policy enforcement and review.
- The guidelines emphasize the importance of honesty and professionalism in employee behavior.
Down
- Rules for regulating access to specific physical spaces, such as offices or server rooms.
- Grouping users based on roles, such as marketing or IT staff, and assigning specific access allows for efficient management of permissions for multiple users simultaneously.
- This ensures the security and compliance of all systems by detecting any errors or misuse of access.
- The process involves creating user accounts and determining the specifics of what each user can access or perform on the system.
- Authentication methods rely on unique biological traits like fingerprints, facial recognition, or iris scans.
- Devices or software that generate one-time codes or credentials for authentication.
13 Clues: To manage permissions effectively • The guidelines outline the process for checking out and introducing new employees. • Devices or software that generate one-time codes or credentials for authentication. • Rules for regulating access to specific physical spaces, such as offices or server rooms. • ...
RU ITEC411 2021-04-12
Across
- Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
- A form of authenticating who you are, by using ones body part.
- A form of stealing that usually involves impersonating someone or something.
- A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
- Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
- Something that you access on the internet, a page of sorts.
- A software that is attached to other software, program, picture, etc., that tends to replicates itself.
- This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
- A way of hiding information that you do not want someone knowing, if intercepted.
- Preventing someone information that may be viewed as harmful from being seen from the public.
Down
- The conduct of a persons character and obligations to others.
- A kind of warfare that is virtual.
- A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
- In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
- A group of people and how they work together as a society.
- Someone that is using a computer is called a what?
- A form of testing a network, database, firewall, etc.
- A way into a system without having to go through the standard protocols.
- A kind of software that looks like the real software you are trying to download, however is actually malware.
- A kind of rule that is usually made up the government to try and keep the peace (for the most part).
20 Clues: A kind of warfare that is virtual. • Someone that is using a computer is called a what? • A form of testing a network, database, firewall, etc. • A group of people and how they work together as a society. • Something that you access on the internet, a page of sorts. • The conduct of a persons character and obligations to others. • ...
Information Technology 2023-05-24
Across
- a person who exploits computer hardware and software for their own purposes
- to modify or arrange something so that it works in a certain way
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- a personal website maintained by an individual
- a computer virus that copies its code over and destroys the files of the original data
- a set of rules that must be followed for the sake of security
- a filter that prevents harmful software from entering a network
- a small application that is embedded in a webpage
- to make copies
- to make sure that it is legitimate
- a piece of code that is used to fix a flaw in a computer program
- any type of media used on a webpage, including images and videos
- the proces of stealing another person’s information and using it for personal gain
- how users communicate with a computer
- the use of the internet for software and other resources
- a collection of icons or pictures that have been organized in a file or page
Down
- changing computer to your needs
- a measurement of how quickly a computer works
- device that converts mechanical information into electronic signals
- the company that produces Macs and other computing products
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- tricking people into giving information through email
- to work at a location away from a main office by using technology
- a word or phrase that makes a computer perform an operation
- a person who uses computers and the internet to commit crimes
- a filter that prevents harmful softaware from leaving a network
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- using a legitimate-looking website to trick people
- a program that restricts access on a network
- an action that results in the loss of another person’s property
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
FITAVocab.CLK 2013-05-15
Across
- society designed to inform people about internet safety and security
- electronic technology
- unit to measure speed of signaling or data transfer
- Comcast;Xfinity
- arrangement of data
- port to connect peripherals to a computer
- document or file with special format
- device that sends data to a computer
- type of port to connect mouse or keyboard to a PC
- 8 bits
- processes hardware instructions
- main circuit board
- "I'm lovin' it!"
- symbol designed for recognition
- slot to slide in cds and other discs
- data delivered to a computer
- data delivered from a computer
- quoting on an authoritative source
- oath taken by a person before undertaking the duties of an office
- quantity of storage in computers
- to start up
- sequence of instructions to be completed by a computer
- flash drive; earbuds
- rules and behaviors designed to keep individuals safe when online
Down
- relating to computer or computer networks
- cords
- program that searches for documents
- bring in and start anew
- amount your computer can hold
- delivers information to a computer
- internet "hosting" service that allows you to make your own website
- wireless networking technology that connects other wireless electronic devices
- preview of file or page
- collection of software that directs a computer's operations
- way in which parts of something are laid out
- port to connect to the internet
- data transmission in which a single wire can carry several channels at one time
- protecting information on computer systems/networks
- Dogpile;Ixquick
- slot that allows you to add more plugins
- program designed to do a certain function
- ID with 32 characters used for naming wireless networks
- port to connect audio devices to a computer
- area network that uses high frequency radio signals to transmit and receive data
- a computer's main storage device that stores all your files
- collection of related data stored on your computer or other storage device
- code of conduct one uses online
47 Clues: cords • 8 bits • to start up • Comcast;Xfinity • Dogpile;Ixquick • "I'm lovin' it!" • main circuit board • arrangement of data • flash drive; earbuds • electronic technology • bring in and start anew • preview of file or page • data delivered to a computer • amount your computer can hold • data delivered from a computer • port to connect to the internet • processes hardware instructions • ...
Chapter 6 - Network Design Elements 2025-05-21
Across
- A cloud-based delivery model for security services like antivirus and firewalls.
- A cloud model offering virtualized computing resources over the internet.
- A network state where a device defaults to open access after failure.
- A solution that enforces security policies before allowing network access.
- A method of dialing many phone numbers to find modems or unsecured lines.
- Impersonating a device's MAC address to bypass security.
- An attack that allows access to traffic on other VLANs.
- A network design using two firewalls to isolate a DMZ.
Down
- A publicly shared list of known cybersecurity vulnerabilities and exposures.
- A cloud model providing a platform for developers to build and deploy applications.
- A protocol that prevents network loops by managing redundant paths.
- A switch memory table that stores MAC-to-port mappings.
- A cloud model where applications are delivered over the internet.
- An attack that overwhelms a switch's memory with fake MAC addresses.
- A one-to-one mapping between a private and public IP address.
- A firewall setup with three interfaces: internal, external, and DMZ.
- A method that modifies IP addresses to allow private devices to access the internet.
- A buffer zone between internal networks and external, untrusted networks.
- A type of NAT that maps multiple private IPs to one public IP using port numbers.
19 Clues: A network design using two firewalls to isolate a DMZ. • A switch memory table that stores MAC-to-port mappings. • An attack that allows access to traffic on other VLANs. • Impersonating a device's MAC address to bypass security. • A one-to-one mapping between a private and public IP address. • A cloud model where applications are delivered over the internet. • ...
Meta 2023-09-12
19 Clues: EHS • APIs@ • Black@ • Women@ • Pride@ • Latin@ • Native@ • Security • Open Arts • IT Support • Facilities • Disability@ • Ship Happens • Transportation • Fitness Center • Culinary / Pastry • Events & Amenities • SEA + BEL Site Team • AV Technical Production
Phising 2024-10-14
Across
- forwarding/Automatically sending emails from one account to another, often exploited by attackers.
- authentication/A security process requiring two types of identification.
- targeted phishing attack aimed at specific individuals.
- activity alert/Notifications for potential security breaches or unusual behaviour.
- operations/Activities aimed at influencing or manipulating information for strategic purposes.
- addresses/Email accounts outside an organisation’s official domain, which may pose risks.
Down
- communication/Messages received without prior request, often phishing-related.
- monitoring/Tracking changes to system or server settings for security purposes.
- a trusted entity to deceive users.
- theft/The act of stealing usernames and passwords.
- awareness training/Educational programs to help users recognise phishing attacks.
- deceptive offer or message designed to attract and manipulate a target.
12 Clues: a trusted entity to deceive users. • theft/The act of stealing usernames and passwords. • targeted phishing attack aimed at specific individuals. • deceptive offer or message designed to attract and manipulate a target. • authentication/A security process requiring two types of identification. • ...
IS and BC Cross-Up Crossword 2021-10-26
Across
- This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
- _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
- Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
- Sending an email, posting photos on a social media site and using your webcam.
- Equipment that offers short term protection against power surges and power outages (acronym).
- conforming to a rule, such as a specification, policy, standard or law.
- Your ________ device often contains more personal information than any other source.
- “ This too good to be true email gives off a false sense of ______”.
- When calls are made by social engineering, they are called _____ .
- A crime where a computer is the object of the crime or is used as a tool to commit an offense.
- Where do UTC employee report their ICT issues (three words).
- Always _______your computer when you leave your desk.
- Facebook and TikTok are types of ________ (two words).
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- A major business disruption; the earth moves, shifts and shakes.
- Who can be the target of a cyber attack.
- Never use your TTUTC________address for personal usage.
- Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- You can call 999, 881 or 990 for _______ services.
- The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
- This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
- The address of a webpage. Check the validity of it before clicking on it (acronym).
- __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
- a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
- BCP's main focus is not preventing incidents but rather the __________ from it.
Down
- The process of adding allowed programs to a list is called_________.
- sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
- __________ Edwards is the Recovery Director and is in charge of BCP.
- An asset like other essential business assets in the Corporation.
- My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
- The staff and the customers are considered.
- A technology that allows us to access our files through the internet from anywhere in the world.
- A list of entities that are blocked or denied privileges or access.
- The art of manipulating people to get access to sensitive information (two words.
- Choose a password that is easy for you to ____________ but hard for you someone to guess.
- information such as legal documents and contracts must be classified as __________information. - (restricted)
- A collection of computers that are controlled on the same network.
- A concept where all things are connected to the internet; household items usually (three words).
- A piece of code put in to correct an error.
- The global system of interconnected computer networks that link billions of devices.
- Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
- Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
- The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
- someone who seeks and exploits weaknesses in a computer system or computer network.
- The UTC hotsite is located here.
- Usually comprises the display device of the computer.
- Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
48 Clues: The UTC hotsite is located here. • Who can be the target of a cyber attack. • The staff and the customers are considered. • A piece of code put in to correct an error. • You can call 999, 881 or 990 for _______ services. • Always _______your computer when you leave your desk. • Usually comprises the display device of the computer. • ...
kuis tentang apa aja 2023-01-25
COLSA Capabilities 2023-04-21
Semester Review 2022-12-14
16 Clues: bonds • Raids • Scare • Jungle • Market • Entente • Stiffens • security • Movement • of Nations • on margin • Service Act • Speakeasies • Conservation • of Versailles • HouseNeutrality
4 2024-05-14
15 Clues: cardan • exists • discuss • special • thereof • outside • wedding • prepared • consider • security • confirmed • circus act • calculated • coordination • circus performance
KPL 3&3.1 2025-02-26
15 Clues: varat • rauha • missio • kunnia • alusta • näkyvä • edistää • ongelma • vaikutus • tasa-arvo • rohkaista • delegaatti • erityisesti • turvallisuus • maailmanlaajuinen
Citera 2026-03-25
Heathrow 2025-11-06
15 Clues: pass • pagas • turva • kohver • tualett • rahakott • nimesilt • sihtkoht • kaelapadi • seljakott • pardakaart • kõrvaklapid • kõrvatropid • ratastega kohver • väljumine, lahkumine
End-of-Semester Crossword 2023-01-24
Across
- novelas, soap operas can be this
- the Monday after Thanksgiving
- Every Wednesday is ___ Day
- The pilgrims arrived on this ship
- Teacher Neil's favorite drink
- Argentina won the ___ Cup.
- I need to give __ smoking!
- His car had a __-n-run in October
- (idiom) ___ in the oven (pregnant)
- MLK was a ___ Rights Leader.
- the British word for 'fall' season
Down
- similar to goal, made on NYE
- another word for cheesy, silly, dumb
- We changed the clocks in Nov. "Fall ___"
- "And then a __ comes along, w/ the strength.."
- The Tuesday after Thanksgiving
- (idiom) turn over a new ___. (new beginning)
- Most people have bad ___
- The __ New Year started on Sunday.
- Being a lazy, you're a couch ___.
- the Friday before Thanksgiving
21 Clues: Most people have bad ___ • Every Wednesday is ___ Day • Argentina won the ___ Cup. • I need to give __ smoking! • similar to goal, made on NYE • MLK was a ___ Rights Leader. • the Monday after Thanksgiving • Teacher Neil's favorite drink • The Tuesday after Thanksgiving • the Friday before Thanksgiving • novelas, soap operas can be this • The pilgrims arrived on this ship • ...
Conspiracy theories 2022-11-02
Across
- to keep a secret, to lie ....
- fit in, mix, merge, blend in
- a concept, a thought
- the killing of 6 million jews across Europe from 1941 to 1945
- the I in CIA
- first man to walk on the moon, Neil ........
- shady, dim, sunless
- another name for covid-19
- keep an eye on, surveil, tail
- princess ........ she was killed in a car crash in Paris in 1997
Down
- secret, confidential
- some people believe that the earth is .......
- a US president who was assassinated
- the f in FBI
- secret organization, secret club or secret .........
- falsify, fabricate, bluff
- when someone is very happy, we say he is over the ......
- doubt, uncertainty
- a digital attack, a ....... attack
- ........ 51
- extraterrestrial, unearthly
21 Clues: ........ 51 • the f in FBI • the I in CIA • doubt, uncertainty • shady, dim, sunless • secret, confidential • a concept, a thought • falsify, fabricate, bluff • another name for covid-19 • extraterrestrial, unearthly • fit in, mix, merge, blend in • to keep a secret, to lie .... • keep an eye on, surveil, tail • a digital attack, a ....... attack • a US president who was assassinated • ...
Love Story 2024-12-10
Across
- Pines Party 2024
- Bathroom funny business
- Chicks
- Serenades in the park
- Make believe pig skin
- Rabbits' favorite pastry
- Food Market or comedienne
- If my priest had a spouse
- family pet cyber thief
- Julia Louis-Meyer
- Don't feed the swines
- Scalding rubadub
- FL, 33301
- School Shooting Romance
- Margaret Rhymes
- Puzzles by the pool
Down
- It's not rice in the hourglass, it's ...
- Summer kickoff weekend
- Beach chouxs
- Cooking in the nude
- Fly Like R Kelly
- White trash beauty pageant
- Up the bean stalk to meet them
- Flames on barrier sand
- Maple Leaves & Gaslighters
- 2 with red noses dance to horse meat
- Singing feng shui money plant
- Indoor galaxies
- White claws without a couch
29 Clues: Chicks • FL, 33301 • Beach chouxs • Indoor galaxies • Margaret Rhymes • Pines Party 2024 • Fly Like R Kelly • Scalding rubadub • Julia Louis-Meyer • Cooking in the nude • Puzzles by the pool • Serenades in the park • Make believe pig skin • Don't feed the swines • Summer kickoff weekend • Flames on barrier sand • family pet cyber thief • Bathroom funny business • School Shooting Romance • ...
ASKING AND GIVING OPINION 2024-07-26
16 Clues: yakin • ujian • masalah • menarik • meminta • khawatir • keuangan • keamanan • pendapat • kejadian • keputusan • menanyakan • menyelidiki • mata pelajaran • menimbulkan perdebatan • mengira-ngira/bertanya-tanya
Computer criminals - types and what they do/how they operate 2016-09-07
Across
- gaining illegal or unauthorized access to a file, computer or network.
- When hackers threaten or harm a website, server, or a computer system using denial of service (DOS)
- Spamming It refers to the use of electronic messaging systems to send unsolicited messages to users
- attack to commit a Cyber Crime can be called as a Cyber Attack
- crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data
- The process of making, adapting, or imitating objects, statistics, or documents, with the intent to deceive
Down
- E-mail fishing for personal and financial information disguised as legitimate business e-mail
- False websites that fish for personal and financial information by planting false URLs in Domain Name Users
- Theft It is one of the most serious frauds as it involves stealing money and obtaining other benefits with the use of a false identity
- as actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
10 Clues: attack to commit a Cyber Crime can be called as a Cyber Attack • gaining illegal or unauthorized access to a file, computer or network. • E-mail fishing for personal and financial information disguised as legitimate business e-mail • When hackers threaten or harm a website, server, or a computer system using denial of service (DOS) • ...
career 2019-01-19
15 Clues: ทหาร • หมอฟัน • นักสืบ • ช่างไฟ • เสมียน • พ่อครัว • นักเขียน • นักเรียน • ช่างตัดผม • ช่างประปา • บรรณาธิการ • นักบินอวกาศ • ช่างถ่ายรูป • doctor หมอตา • guard ยามรักษาความปลอดภัย
funny stuff for the 8.1 2020-03-02
15 Clues: Dürre • Zutat • flamme • Sender • möglich • Ursache • glänzend • verbrannt • Lagerfeuer • Entdeckung • Sicherheit • vergleichen • Genehmigung • unaufhaltsam • eingängig (Melodie,Slogen)
IT English Homework 2020-04-20
15 Clues: hamis • sütik • igazi • csaló • jelkód • zárolt • memória • támogatás • rendőrség • biztonság • frissítés • ellenőrzés • ujjlenyomat • biometrikus adatok • kicsi programhibák
Chapter 7 Vocab Eng 4 2025-11-17
Cyber Information 2020-08-10
Across
- A online app where you post pictures
- A belief or opinion generally held about someone
- A app that can keep the world open and connected with eachother
- A app where you can freely write your opinions
Down
- Posting to much information and details online
- A app where you talk to people and start streaks with friends
- Popular with teenagers, charlie demileo is most popular
- A trail of data you create while using the internet
8 Clues: A online app where you post pictures • Posting to much information and details online • A app where you can freely write your opinions • A belief or opinion generally held about someone • A trail of data you create while using the internet • Popular with teenagers, charlie demileo is most popular • A app where you talk to people and start streaks with friends • ...
Cyber Safety 2023-05-22
Across
- the fraudulent paractice of using another persons name
- pretending to be someone else and sending or posting material
- sharing someone's secrets online
- online fights using electronic messages with angry and volgar language
Down
- the use of devices to bully someone by sending messages or mean post.
- repeatedly sending nasty, mean, and insulting messages
- talking someone into revealing secrets and information about themselves online
- dissing someone online
8 Clues: dissing someone online • sharing someone's secrets online • the fraudulent paractice of using another persons name • repeatedly sending nasty, mean, and insulting messages • pretending to be someone else and sending or posting material • the use of devices to bully someone by sending messages or mean post. • ...
Cyber bullying 2023-10-31
8 Clues: An effect of being bullied • Talk to a person you trust • What you use to talk online • what you use to browse online • Don't pay attention to what they say • Don't share your personal information • How to stop someone from messaging you • Tell the system that this user is bullying you
cyber safety 2025-05-05
Across
- Action taken to block a bully
- Device that filters unwanted internet traffic
- Software that protects your computer system
- Sharing secrets without consent is called
Down
- Repeatedly sending cruel online messages
- Online act of harming someone's reputation
- A fake message to steal data
- Keep this private to stay safe online
8 Clues: A fake message to steal data • Action taken to block a bully • Keep this private to stay safe online • Repeatedly sending cruel online messages • Sharing secrets without consent is called • Online act of harming someone's reputation • Software that protects your computer system • Device that filters unwanted internet traffic
Cyber Test 2024-04-10
8 Clues: Did I do thaaaaat? • Yo Angela whos the boss • My whole team coming clean • These Dudes is comic relief • Then go home and write about • Get Ready for a whale of a tim • And Im the Mother lovin monster • When you see me better cross the street
Cyber Ethics 2025-06-15
Across
- We should avoid clicking on unknown_______.
- An illegal intrusion into a computer system or network.
- The act of using someone else's original work or thoughts.
- A legal right granted by law to the creator for his original work.
Down
- The simplest way to prevent plagiarism is through proper_______.
- The process of transforming data into an unreadable form.
- A digital footprint is also known as a digital________.
- The unwanted bulk emails that come from unknown sources.
8 Clues: We should avoid clicking on unknown_______. • A digital footprint is also known as a digital________. • An illegal intrusion into a computer system or network. • The unwanted bulk emails that come from unknown sources. • The process of transforming data into an unreadable form. • The act of using someone else's original work or thoughts. • ...
CYBER CRIME 2022-10-11
Across
- an expression of intention to damage or to harm
- a person who has committed a crime
- a type of social engineering attack often used to steal user data
- intrusive software that is designed to damage and destroy computers
- a horse malware
Down
- a verb meaning to gain unauthorized acess into a computer system
- the process of proving that something is real
- a technique used by hackers to rediredt users to false websites without their knowledge
8 Clues: a horse malware • a person who has committed a crime • the process of proving that something is real • an expression of intention to damage or to harm • a verb meaning to gain unauthorized acess into a computer system • a type of social engineering attack often used to steal user data • intrusive software that is designed to damage and destroy computers • ...
Cyber-Attacks 2022-01-13
Across
- a spoof or look-alike website
- the most common way hackers gain entry to a company's computer network
- personally identifiable information
- everyone's responsibility to protect company information and assets
Down
- an add on to enhance function of browser
- software that locks up a computer system and then demands a payment to unlock it
- software designed to harm computer
- fraudulent emails designed to obtain PII
8 Clues: a spoof or look-alike website • software designed to harm computer • personally identifiable information • an add on to enhance function of browser • fraudulent emails designed to obtain PII • everyone's responsibility to protect company information and assets • the most common way hackers gain entry to a company's computer network • ...
Cyber Wellness 2023-02-01
9 Clues: Practice _N____________ • Respect others _P__________ • Respect others _O___________ • Do not reveal __P____________ • Post _P___________ information • Do not reveal __U______________ • Say P____________ things online. • Say E____________ remarks online • Do not post S_____________ information online
Cyber Safety 2025-06-25
Across
- Acronym for Two Factor Authentication
- The "Nigerian Prince"
- Cyber attackers are looking for and go after ...
- Action that follows an email phishing attempt at work
Down
- One of the main sources of system vulnerability
- State of mind to prevent falling for scams and phishing attempts
- Among the most targeted industries for ransomware
- Quality of a password that is difficult to hack
8 Clues: The "Nigerian Prince" • Acronym for Two Factor Authentication • One of the main sources of system vulnerability • Quality of a password that is difficult to hack • Cyber attackers are looking for and go after ... • Among the most targeted industries for ransomware • Action that follows an email phishing attempt at work • ...
Lesson 30 Vocabulary 2015-05-18
Across
- Hackers using spyware to control your browser.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
Down
- Complex and secure,containing at least eight characters and at least one letter,one number,and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- A malicious program that records keystrokes.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Encrypts the information in an SSL Certificate.
- A program that hackers use to capture IDs and passwords on a network.
- security feature used for larger networks that controls computers from one point.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
Herzberg Two factor theory 2023-02-28
15 Clues: Wage • Power • Labour • Reward • Thesis • Laudation • Occupation • Overseeing • Protection • Instigators • Basic Needs • Germination • Procurement • Psychologist • Head of staff
RU ITEC411 2021-04-12
Across
- Preventing someone information that may be viewed as harmful from being seen from the public.
- A kind of warfare that is virtual.
- A form of testing a network, database, firewall, etc.
- Virus that collects passwords, deletes files, and effects millions of computers world wide, usually attacking government agencies/big corporations.
- A way into a system without having to go through the standard protocols.
- Currently, this person is called a _____ because they are trying to steal information via the internet and break into company or personal computer(s), database(s), etc.
- A form of authenticating who you are, by using ones body part.
- A kind of software that looks like the real software you are trying to download, however is actually malware.
- A software that is attached to other software, program, picture, etc., that tends to replicates itself.
Down
- Something that you access on the internet, a page of sorts.
- A group of people and how they work together as a society.
- Someone that is using a computer is called a what?
- In order to authenticate oneself on the internet the website might have you use ____ authentication in order to better security and verify who you are.
- A kind of malware that does not need to attach itself to another software, but uses exploits in a system to gain access.
- A kind of software that you need to use in order to use a computer (is booted up automatically when turning on a computer), i.e. Windows, Unix, Linux.
- A way of hiding information that you do not want someone knowing, if intercepted.
- The conduct of a persons character and obligations to others.
- A kind of rule that is usually made up the government to try and keep the peace (for the most part).
- A form of stealing that usually involves impersonating someone or something.
- This is a software or could be a hardware, like a firewall, that looks at incoming transmissions and files to see if they are harmful.
20 Clues: A kind of warfare that is virtual. • Someone that is using a computer is called a what? • A form of testing a network, database, firewall, etc. • A group of people and how they work together as a society. • Something that you access on the internet, a page of sorts. • The conduct of a persons character and obligations to others. • ...
INNOVATION & RESPONSABILITY 2024-09-04
Across
- / Things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet.
- / Technology that proposes to improve capacity and productivity by changing or increasing the normal ranges of human function, through the restoration or extension of human physical, intellectual and social capabilities.
- / The process of performing a scientific procedure, especially in a laboratory, to determine something.
- / Work directed towards the innovation, introduction, and improvement of products and processes.
- / The process of generating a genetically identical copy of a cell or an organism.
- / The use of biology to develop new products, methods and organisms intended to improve human health and society.
- / A government authority or licence conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention.
- / A rule or directive made and maintained by an authority.
- / A sudden advance especially in knowledge or technique.
- / Chat GPT is one of them.
Down
- / The branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules
- / A branch of artificial intelligence (AI) and computer science that focuses on the using data and algorithms to enable AI to imitate the way that humans learn, gradually improving its accuracy.
- / A machine resembling a human being and able to replicate certain human movements and functions automatically.
- / Creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
- / Adaptation of a system, process, etc. to be operated with the use of computers and the internet.
- / A genetically modified organism
- / The simulation of human intelligence processes by machines, especially computer systems.
- / The study of the complete set of DNA (including all of its genes) in a person or other organism.
- / The process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.
- / A person recognising the value of liveable environments for humans and nature.
20 Clues: / Chat GPT is one of them. • / A genetically modified organism • / A rule or directive made and maintained by an authority. • / A sudden advance especially in knowledge or technique. • / A person recognising the value of liveable environments for humans and nature. • / The process of generating a genetically identical copy of a cell or an organism. • ...
2 2023-05-24
Across
- the company that produces Macs and other computing products
- the use of the internet for software and other resources
- a word or phrase that makes a computer perform an operation
- a small application that is embedded in a webpage
- changing computer to your needs
- to make copies
- any type of media used on a webpage, including images and videos
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- an action that results in the loss of another person’s property
- a filter that prevents harmful software from leaving a network
- a person who exploits computer hardware and software for their own purposes
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- tricking people into giving information through email
Down
- to modify or arrange something so that it works in a certain way
- a measurement of how quickly a computer works
- device that converts mechanical information into electronic signals
- how users communicate with a computer
- a personal website maintained by an individual
- to work at a location away from a main office by using technology
- a computer virus that copies its code over and destroys the files of the original data
- a piece of code that is used to fix a flaw in a computer program
- a filter that prevents harmful software from entering a network
- a program that restricts access on a network
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- the proces of stealing another person’s information and using it for personal gain
- a person who uses computers and the internet to commit crimes
- using a legitimate-looking website to trick people
- a set of rules that must be followed for the sake of security
- a collection of icons or pictures that have been organized in a file or page
- to make sure that it is legitimate
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
IT-Security 2016-01-29
Across
- Programme, die Tastatureingaben mitprotokollieren
- Mobbing mit Hilfe von elektronischen Medien
- Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
Down
- Übersetzt Passwort fischen Durch gefälschte Mails wird versucht, Zugang zu Passwörtern zu erlangen
- Versteckt in einem scheinbar nützlichen Programm
- Viren, die als Programm in ein Dokument/ Datei eingebettet sind
- Datenverarbeitungsregisternummer
- Virus, der sich direkt über Netze verbreiten
- Überbegriff für unerwünschte, schädliche Software
9 Clues: Datenverarbeitungsregisternummer • Mobbing mit Hilfe von elektronischen Medien • Virus, der sich direkt über Netze verbreiten • Versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Überbegriff für unerwünschte, schädliche Software • Viren, die als Programm in ein Dokument/ Datei eingebettet sind • ...
Food Security 2018-11-08
Across
- Inequality "if women had the same access to resources as men" is an example of ________.
- one major problem, with only one third of food being consumed.
- Disease stress and poor nutrition can lead to this accumulating in families.
- Single largest employer in the world.
- 281 million undernourished people live on this continent.
Down
- Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
- Four billion people worldwide have no access to _______.
- the world needs to rethink their _______ on how we are growing, sharing and consuming our food.
- Programs support your school ___________ to help food security in your community.
9 Clues: Single largest employer in the world. • Four billion people worldwide have no access to _______. • 281 million undernourished people live on this continent. • one major problem, with only one third of food being consumed. • Disease stress and poor nutrition can lead to this accumulating in families. • ...
Network Security 2024-07-08
Across
- Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- The process of protecting information or data by scrambling it so only those with the key can unscramble it
- A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
- A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
- A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
- An attack where a series of a computers repeatedly send requests to a server to overload a system
- The process of a user confirming that they are who they say they are on a computer system
- Trying to trick someone into giving out information over email
- A computer program that makes lots of copies of itself,
9 Clues: A computer program that makes lots of copies of itself, • Trying to trick someone into giving out information over email • The process of a user confirming that they are who they say they are on a computer system • An attack where a series of a computers repeatedly send requests to a server to overload a system • ...
Security Crossword 2023-05-18
Across
- badge color for a NON U.S citizen that requires an escort
- who do you email for foreign travel concerns
- what visitors must do when they arrive onsite (contains a dash)
- the form that is filled out after foreign travel
Down
- what you earn when completing this puzzle
- when you notify security about a visitor or foreign travel
- color badge for U.S citizen no escort required
- color badge for visitors that require an escort
- who you contact for any security questions, concerns, incidents
9 Clues: what you earn when completing this puzzle • who do you email for foreign travel concerns • color badge for U.S citizen no escort required • color badge for visitors that require an escort • the form that is filled out after foreign travel • badge color for a NON U.S citizen that requires an escort • when you notify security about a visitor or foreign travel • ...
Y8 Security 2021-12-15
Across
- self replicate without any user help meaning they can spread very quickly.
- when data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
- Monitor user actions such as key presses and then send the information back to the hacker
- emails that try to trick you into giving away personal information such as bank details
- attach themselves to files by copying themselves. They are then spread by users who open them and activate them.
Down
- malicious software. A program designed to cause harm to your computer
- malware which is disguised as legitimate software
- two or more devices connected together
- tell the victim their computer has lots of viruses and scare them into paying for the problem to be fixed
9 Clues: two or more devices connected together • malware which is disguised as legitimate software • malicious software. A program designed to cause harm to your computer • self replicate without any user help meaning they can spread very quickly. • emails that try to trick you into giving away personal information such as bank details • ...
Food security 2024-12-17
9 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Small animal raised for meat and fur • Animal raised for wool, meat and milk • Poultry raised for eggs meat and feathers • Pollinator that plays a critical role in food production
