cyber security Crossword Puzzles

Five Nights at Freddy's Movie 2025-10-21

Five Nights at Freddy's Movie crossword puzzle
Across
  1. They might be possessed by:
  2. Bonnie's favorite instrument:
  3. Which shift does the security guard work?
  4. How many souls are trapped in the restaurant?
  5. A younger brother who was kidnapped in the past:
  6. Chicken's best friend:
  7. Little sister who likes to draw:
  8. The security guard actively experiences these:
  9. Red Pirate:
Down
  1. What Type of restaurant is Freddy Fazbear's?
  2. He takes the night guard job at Freddy Fazbear's:
  3. What does the band do when they catch you?
  4. Yellow Chicken animatronic who wears a bib:
  5. Animatronic bear with a hat:
  6. A police officer who knows the restaurant's dark past:
  7. The killer's favorite animal costume:
  8. The true villain who always comes back:
  9. Mysterious man with a convenient job opportunity:

18 Clues: Red Pirate:Chicken's best friend:They might be possessed by:Animatronic bear with a hat:Bonnie's favorite instrument:Little sister who likes to draw:The killer's favorite animal costume:The true villain who always comes back:Which shift does the security guard work?What does the band do when they catch you?...

Airport 2018-05-29

Airport crossword puzzle
Across
  1. other name for cabin crew
  2. terminology for passengers
  3. ID needed to travel internationally
  4. where everyone can access
  5. The people who help you check in
Down
  1. where planes take off
  2. Person incharge of aircraft
  3. Airport code for Hong Kong
  4. name of aviation security
  5. how to access the landslide/airside
  6. after you cross customs and security

11 Clues: where planes take offother name for cabin crewname of aviation securitywhere everyone can accessAirport code for Hong Kongterminology for passengersPerson incharge of aircraftThe people who help you check inhow to access the landslide/airsideID needed to travel internationallyafter you cross customs and security

The Egypt Game from page 80 to 122 2024-05-03

The Egypt Game from page 80 to 122 crossword puzzle
Across
  1. what Marshall wanted to sacrifice as a joke
  2. Kmata's costume
  3. when the story took place
  4. what Ken and Toby calls April
  5. what April wants to sacrifice
  6. Ken and Toby's grade
Down
  1. the reason parents don't let their kids trick or treat by themselves
  2. Toby's costume
  3. who security belongs to
  4. Marshall's costume
  5. April and Melanie's costumes

11 Clues: Toby's costumeKmata's costumeMarshall's costumeKen and Toby's gradewho security belongs towhen the story took placeApril and Melanie's costumeswhat Ken and Toby calls Aprilwhat April wants to sacrificewhat Marshall wanted to sacrifice as a jokethe reason parents don't let their kids trick or treat by themselves

One Best Buy 2023-10-18

One Best Buy crossword puzzle
Across
  1. Geek Mobile driven by most in-home PC Agents
  2. Membership that replaced Totaltech this year.
  3. _____ Barry, current CEO
  4. New Membership for those who more than anything just want a good deal.
  5. Employee Driven Intelligence
  6. The Monday after Thanksgiving, _____ Monday.
  7. Robert _______ founded Geek Squad in 1994
  8. We are the top corporate sponsor for this amazing non profit organization.
Down
  1. Helps Product Flow reach for the stars! I mean, TVs..
  2. Tells us what goes where.
  3. Founded by Richard M. Schulze in 1966
  4. When you need to call for backup.
  5. Replaced ETK
  6. Unleash the _____ of our People!
  7. The smiling face when you walk in to a Best Buy

15 Clues: Replaced ETK_____ Barry, current CEOTells us what goes where.Employee Driven IntelligenceUnleash the _____ of our People!When you need to call for backup.Founded by Richard M. Schulze in 1966Robert _______ founded Geek Squad in 1994Geek Mobile driven by most in-home PC AgentsThe Monday after Thanksgiving, _____ Monday....

BACO Conference Team Builder 2024-11-20

BACO Conference Team Builder crossword puzzle
Across
  1. – The process of identifying and analyzing risks.
  2. – Violation of a law, duty, or agreement.
  3. – Abbreviation for Foreign Corrupt Practices Act.
  4. – Consequences for failing to follow regulations.
  5. – Recording and documenting compliance breaches.
  6. – Procedures to ensure proper operation of systems.
  7. – A professional responsible for managing compliance.
  8. – Protecting systems and data from cyber threats.
Down
  1. – Measures to prevent illicit financial activities.
  2. – A group responsible for overseeing ethical practices.
  3. – An in-house review of processes and systems.
  4. – The act of making information known.
  5. – Adherence to moral and ethical principles.
  6. – A set of rules outlining acceptable behaviors.
  7. – Relating to rules issued by governing bodies.

15 Clues: – The act of making information known.– Violation of a law, duty, or agreement.– Adherence to moral and ethical principles.– An in-house review of processes and systems.– Relating to rules issued by governing bodies.– Recording and documenting compliance breaches.– A set of rules outlining acceptable behaviors....

Crossword 08 2023-10-25

Crossword 08 crossword puzzle
Across
  1. refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
  2. refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
  3. refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
  4. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
  5. refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
  6. refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
  7. refers to a computer or a computer network, the electronic medium in which online communication takes place;
  8. refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
  9. refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic
  10. refers to the DOJ – Office of Cybercrime
  11. refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
Down
  1. refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
  2. refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
  3. refers to a set of instructions executed by the computer to achieve intended results;
  4. refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
  5. refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
  6. refers to the modification or change, in form or substance, of an existing computer data or program;
  7. refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
  8. the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network
  9. refers to gathering and receiving information;

20 Clues: refers to the DOJ – Office of Cybercrimerefers to gathering and receiving information;refers to a set of instructions executed by the computer to achieve intended results;refers to the modification or change, in form or substance, of an existing computer data or program;...

PRSE6212 2025-02-26

PRSE6212 crossword puzzle
Across
  1. A social engineering attack that tricks users into revealing sensitive information.
  2. The principle that ensures information remains accurate and unaltered.
  3. A physical or digital device used to generate or store authentication credentials.
  4. The process of verifying the identity of a user or system.
  5. A technique where an attacker disguises themselves as a trusted entity to deceive victims.
  6. A biometric security feature that ensures the biometric sample is from a real, live person.
  7. A federated identity solution that enables single sign-on (SSO) across different organizations securely.
  8. A biometric technique that identifies users based on their unique typing rhythm.
  9. The process of granting or denying permissions to a user or system.
  10. The principle that ensures information is only accessible to authorized users.
  11. A method of authentication that uses physical or behavioral characteristics.
  12. A biometric authentication method that scans the colored part of the eye.
  13. A cyberattack where an attacker intercepts and alters communication between two parties.
  14. A dynamic authentication method that generates temporary passcodes based on a shared secret and the current time.
Down
  1. A method where an attacker systematically tries common passwords to gain access.
  2. The point at which the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal in a biometric system.
  3. An authentication method that analyzes unique patterns in actions like typing or mouse movement.
  4. A biometric authentication method that uses unique patterns on the fingertip.
  5. A public-key cryptography technique that offers strong security with smaller key sizes, often used in authentication.
  6. A cryptographic technique that adds random data to passwords before hashing to prevent attacks.
  7. The principle that ensures authorized users can access information when needed.
  8. A technique that converts plaintext data into unreadable ciphertext for security.
  9. A secret combination of characters used to verify a user's identity.
  10. A cryptographic method used to verify the authenticity and integrity of a message or document.
  11. A biometric authentication method that analyzes unique facial features.
  12. An authentication method that requires more than one verification factor.
  13. A cryptographic method that allows computations to be performed on encrypted data without decrypting it first.
  14. A security model that assumes no entity should be trusted by default, even inside the network.
  15. A security principle that ensures a user cannot deny performing an action or sending a message.
  16. A cryptographic process that converts data into a fixed-length value, ensuring integrity.

30 Clues: The process of verifying the identity of a user or system.The process of granting or denying permissions to a user or system.A secret combination of characters used to verify a user's identity.The principle that ensures information remains accurate and unaltered.A biometric authentication method that analyzes unique facial features....

Cybersecurity Awareness Month 2024 2024-09-24

Cybersecurity Awareness Month 2024 crossword puzzle
Across
  1. Pop-up malware intent on using fear tactics to get you to perform an action.
  2. Data must be accessible when you need them. Part of the CIA triad.
  3. The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
  4. A flaw in a system that can enable an adversary to compromise the security of that system.
  5. A type of threat that includes authorized system users and disgruntled employees.
  6. "Good guy" hackers.
  7. A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
  8. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
  9. Multiple compromised systems under the control of a single attacker.
  10. A device that permits the flow of authorized data, while keeping unauthorized data out.
  11. A vulnerability or exploit that is unknown to software developers and security professionals.
  12. A team that acts as the adversary during a security assessment.
  13. Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
  14. The broad term for nontraditional, internet-connected smart devices.
  15. A network of devices created for the sole purpose of luring in an attacker.
  16. A protocol used to ensure time synchronization between devices.
Down
  1. The act of moving around, looking for vulnerable Wi-Fi networks.
  2. Hardware and/or software used to capture and record key strokes.
  3. Spear phishing aimed at high-profile targets such as executives.
  4. Cryptography that uses two different keys for encryption and decryption.
  5. Information that can be used to distinguish an individual’s identity.
  6. The act of applying a fix to a software defect.
  7. An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
  8. Cryptography that uses the same shared secret key for both encryption and decryption.
  9. An attack from multiple compromised systems that target a single system, service, or application.
  10. Malware intent on holding your data hostage in an attempt to extort money.
  11. Protecting of information from unauthorized access. Part of the CIA triad.
  12. A team usually involved with the defense of the organization’s infrastructure.
  13. An old method programmers use to bypass security to gain access to a system or software. "War Games"
  14. "Bad guy" hackers.
  15. An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.

31 Clues: "Bad guy" hackers."Good guy" hackers.The act of applying a fix to a software defect.A team that acts as the adversary during a security assessment.A protocol used to ensure time synchronization between devices.The act of moving around, looking for vulnerable Wi-Fi networks.Hardware and/or software used to capture and record key strokes....

Bernardo C. Los Viajes assignment 2024-03-05

Bernardo C. Los Viajes assignment crossword puzzle
Across
  1. traffic jam
  2. tour guide
  3. to return
  4. valid
  5. ecotourism
  6. compass
  7. high season
  8. insurance
  9. expired
Down
  1. hostel
  2. room service
  3. itinerary
  4. customs agent
  5. security measures
  6. lodging
  7. to pack your bags
  8. ruins
  9. to sail

18 Clues: validruinshostellodgingcompassto sailexpireditineraryto returninsurancetour guideecotourismtraffic jamhigh seasonroom servicecustoms agentsecurity measuresto pack your bags

none 2013-09-10

none crossword puzzle
Across
  1. An employee/contractor or individual inside our company who is selling secrets or sensitive information to competitors, foreign governments or terrorist organizations is called an __________ threat.
  2. The RMS-Tucson Facility Security Officer (FSO) is _______ _______.
  3. Top Secret, Secret and __________ are the three levels of U.S. government classified information.
  4. A __________ contact is an individual who is seeking information, who does not hold a proper security clearance level or need-to-know.
  5. How do you protect Raytheon Proprietary, Most Private and Competition Sensitive Information? Lock it in a drawer/cabinet when not working with it. Discard by shredding or placing in a __________ burn barrel. Never place in trash or recycle bin.
Down
  1. Never send classified data to an unclassified information system or computer; this is called a _______ _______.
  2. Security is everyone’s __________.
  3. Always remove your Raytheon ID __________ when leaving an RMS facility.
  4. Information that suggests an individual’s ability to safeguard classified information may be impaired or not in the best interest of national security is called __________ Information.
  5. If you find an unsecured item of classified material, call __________ immediately at 520.794.8313.

10 Clues: Security is everyone’s __________.The RMS-Tucson Facility Security Officer (FSO) is _______ _______.Always remove your Raytheon ID __________ when leaving an RMS facility.Top Secret, Secret and __________ are the three levels of U.S. government classified information....

Cryptober 2022 - Week 4 - Crossword 2022-10-21

Cryptober 2022 - Week 4 - Crossword crossword puzzle
Across
  1. Name the process for ensuring that data retained (in any format) is secure to help avoid a potential breach (e.g., unauthorized access or disclosure).
  2. What is the retention period for email correspondence?
  3. Injection, Broken Authentication and Sensitive Data Exposure are examples of bugs that Chainalysis wants to know about under which public policy?
  4. What's the name of the process of preserving all forms of information relevant to legal proceedings?
Down
  1. What is the first name of Chainalysis’ VP of security?
  2. Which tool helped security to identify many unapproved applications located within Google, Slack and Zoom?
  3. Name one of the industry standards that our security program is structured around?
  4. What is the retention period for Product Development Data such as User Stories, Test Sets and Cases?
  5. Which team should you notify In instances where unauthorized access or disclosure of data occurs?
  6. What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?

10 Clues: What is the first name of Chainalysis’ VP of security?What is the retention period for email correspondence?Name one of the industry standards that our security program is structured around?What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?...

Montgomery Madness 2020-06-11

Montgomery Madness crossword puzzle
Across
  1. Montgomery's Business subject matter Expert
  2. Montgomery's security co-champion
  3. Montgomery's actual AVP
  4. the front desk
  5. our fearless leader
  6. Montgomery's FSR III
  7. Chile's newest citizen
  8. the signal we need to enter the branch
  9. Montgomery's Security Captain
  10. Montgomery's AVP
  11. Montgomery's insurance services champion
  12. HVCU's homepage
Down
  1. offers personal members the convenience of obtaining vehicle financing directly at participating dealerships
  2. A tool that helps personal & business members switch their financial relationship from another institution to HVCU
  3. the last month we helped members on the teller line
  4. HVCU's New Net Promoter Website
  5. Nicole's favorite drink
  6. an individual authorized by the state or federal government to administer oaths/affirmations and to attest the authenticity of signatures

18 Clues: the front deskHVCU's homepageMontgomery's AVPour fearless leaderMontgomery's FSR IIIChile's newest citizenMontgomery's actual AVPNicole's favorite drinkMontgomery's Security CaptainHVCU's New Net Promoter WebsiteMontgomery's security co-championthe signal we need to enter the branchMontgomery's insurance services champion...

Something to do 2024-08-09

Something to do crossword puzzle
Across
  1. Gohan’s Dad
  2. This character died & was reincarnated as a chimera Ant
  3. The name of Yusuke's spirit beast
  4. A private security company consisting of the former Third Group of Chryse Guard Security.
  5. Naurto’s favorite food
  6. Your favorite anime genre (per me)
Down
  1. Super competitive pedophile
  2. Everyone’s favorite anime deadbeat father
  3. When the world needed him most he disappeared
  4. Inosuke breathing/sword style
  5. tanjuro sister
  6. 1st anime we bonded over

12 Clues: Gohan’s Dadtanjuro sisterNaurto’s favorite food1st anime we bonded overSuper competitive pedophileInosuke breathing/sword styleThe name of Yusuke's spirit beastYour favorite anime genre (per me)Everyone’s favorite anime deadbeat fatherWhen the world needed him most he disappearedThis character died & was reincarnated as a chimera Ant...

United Nations 2025-05-25

United Nations crossword puzzle
Across
  1. Arms of the United Nations
  2. The General assembly meets.
  3. Joined on the 18th of September 1793.
  4. General Chief administration officer.
  5. Comprises 193 of these.
  6. Amount of Sustainable Development Goals
  7. The number of permanent members on security council.
Down
  1. Council Principal crisis management body.
  2. Sustainable in nature to be met by 2030.
  3. Nonmembers are called.
  4. change One problem facing the world.
  5. In the business of maintaining world.....

12 Clues: Nonmembers are called.Comprises 193 of these.Arms of the United NationsThe General assembly meets.change One problem facing the world.Joined on the 18th of September 1793.General Chief administration officer.Amount of Sustainable Development GoalsSustainable in nature to be met by 2030.Council Principal crisis management body....

The Egypt Game from page 80 to 122 2024-05-03

The Egypt Game from page 80 to 122 crossword puzzle
Across
  1. what Marshall wanted to sacrifice as a joke
  2. Kmata's costume
  3. when the story took place
  4. what Ken and Toby calls April
  5. what April wants to sacrifice
  6. Ken and Toby's grade
Down
  1. the reason parents don't let their kids trick or treat by themselves
  2. Toby's costume
  3. who security belongs to
  4. Marshall's costume
  5. April and Melanie's costumes

11 Clues: Toby's costumeKmata's costumeMarshall's costumeKen and Toby's gradewho security belongs towhen the story took placeApril and Melanie's costumeswhat Ken and Toby calls Aprilwhat April wants to sacrificewhat Marshall wanted to sacrifice as a jokethe reason parents don't let their kids trick or treat by themselves

The Egypt Game from page 80 to 122 2024-05-03

The Egypt Game from page 80 to 122 crossword puzzle
Across
  1. what Marshall wanted to sacrifice as a joke
  2. Kmata's costume
  3. when the story took place
  4. what Ken and Toby calls April
  5. what April wants to sacrifice
  6. Ken and Toby's grade
Down
  1. the reason parents don't let their kids trick or treat by themselves
  2. Toby's costume
  3. who security belongs to
  4. Marshall's costume
  5. April and Melanie's costumes

11 Clues: Toby's costumeKmata's costumeMarshall's costumeKen and Toby's gradewho security belongs towhen the story took placeApril and Melanie's costumeswhat Ken and Toby calls Aprilwhat April wants to sacrificewhat Marshall wanted to sacrifice as a jokethe reason parents don't let their kids trick or treat by themselves

The Egypt Game from page 80 to 122 2024-05-03

The Egypt Game from page 80 to 122 crossword puzzle
Across
  1. what Marshall wanted to sacrifice as a joke
  2. Kmata's costume
  3. when the story took place
  4. what Ken and Toby calls April
  5. what April wants to sacrifice
  6. Ken and Toby's grade
Down
  1. the reason parents don't let their kids trick or treat by themselves
  2. Toby's costume
  3. who security belongs to
  4. Marshall's costume
  5. April and Melanie's costumes

11 Clues: Toby's costumeKmata's costumeMarshall's costumeKen and Toby's gradewho security belongs towhen the story took placeApril and Melanie's costumeswhat Ken and Toby calls Aprilwhat April wants to sacrificewhat Marshall wanted to sacrifice as a jokethe reason parents don't let their kids trick or treat by themselves

8.3 puzzle 2023-02-09

8.3 puzzle crossword puzzle
Across
  1. KMI and COMSEC ___ Security
  2. badging and CAC issuance ___Security
  3. Classified Material Control & material destruction ___Services
  4. Replaced markings FOUO, PII, SBU, etc.
  5. Manages space Facilities ___ & Budgeting
Down
  1. Develops scopes and cost estimates Facilities __
  2. Manages hazardous materials and waste ___Engineering
  3. Maintains the buildings Facilities ___& Maintenance
  4. Measures taken to deny unauthorized persons information
  5. personnel investigations Personnel & __ Security
  6. Manages mishap program

11 Clues: Manages mishap programKMI and COMSEC ___ Securitybadging and CAC issuance ___SecurityReplaced markings FOUO, PII, SBU, etc.Manages space Facilities ___ & BudgetingDevelops scopes and cost estimates Facilities __personnel investigations Personnel & __ SecurityMaintains the buildings Facilities ___& Maintenance...

Aeropuerto 2021-11-09

Aeropuerto crossword puzzle
Across
  1. departure
  2. station
  3. security
  4. check-in
  5. delay
  6. arrivals
  7. ticket
Down
  1. stop
  2. suitcases
  3. trolley
  4. passport
  5. departures
  6. customs
  7. baggageclaim

14 Clues: stopdelayticketstationtrolleycustomspassportsecuritycheck-inarrivalsdeparturesuitcasesdeparturesbaggageclaim

At the Airport 2017-01-12

At the Airport crossword puzzle
Across
  1. багаж
  2. быстрый
  3. посадочный талон - ... card
  4. показывать
  5. жидкость
  6. пассажир
  7. досматривать
  8. сотрудник службы безопасности
  9. проходить через - go ...
  10. острый
  11. оставлять
  12. пропускать
Down
  1. стойка регистрации - ... desk
  2. опасный
  3. присоединяться
  4. тележка
  5. очередь
  6. прямой
  7. предмет
  8. внимательный
  9. тяжелый
  10. терять

22 Clues: багажпрямойострыйтерятьопасныйтележкабыстрыйочередьпредметтяжелыйжидкостьпассажироставлятьпоказыватьпропускатьвнимательныйдосматриватьприсоединятьсяпроходить через - go ...посадочный талон - ... cardстойка регистрации - ... deskсотрудник службы безопасности

pre-intermediate 3 2022-03-31

pre-intermediate 3 crossword puzzle
Across
  1. mennyország
  2. szolgáltatások, lehetőségek
  3. érkezési kapu (repülőtéren)
  4. indulási kapu (repülőtéren)
  5. tetőterasz
  6. késik
  7. vám
  8. repülőjárat
  9. átvesz, befogad
  10. csengőhang
  11. okostelefon
Down
  1. utas
  2. tábla, jelzés
  3. kapu
  4. beszáll a repülőgépbe
  5. szöveges üzenetet küld
  6. jóslat
  7. csomag
  8. mostanában
  9. biztonsági ellenőrzés

20 Clues: vámutaskapukésikjóslatcsomagtetőteraszmostanábancsengőhangmennyországrepülőjáratokostelefontábla, jelzésátvesz, befogadbeszáll a repülőgépbebiztonsági ellenőrzésszöveges üzenetet küldszolgáltatások, lehetőségekérkezési kapu (repülőtéren)indulási kapu (repülőtéren)

Los viajes 2022-02-28

Los viajes crossword puzzle
Across
  1. ticket
  2. gate
  3. flight
  4. airplane
  5. to help
  6. waiter
  7. view
  8. to arrive
  9. to take off
  10. suitcase
  11. seat
  12. to walk
  13. security
Down
  1. guest
  2. to land
  3. bellboy
  4. luggage
  5. pool
  6. to leave
  7. check-in counter
  8. trip
  9. valet

22 Clues: gatepoolviewtripseatguestvaletticketflightwaiterto landbellboyluggageto helpto walkairplaneto leavesuitcasesecurityto arriveto take offcheck-in counter

Great Depression Crossword 2022-01-21

Great Depression Crossword crossword puzzle
Across
  1. down theory
  2. Tarrif Act
  3. blizzard
  4. Industrial Recovery Act
  5. state
  6. runs
  7. Progress Administration
  8. on Margin
  9. Bowl
Down
  1. Spending
  2. Administration
  3. Reserve System
  4. Flood of 1936
  5. 100 Days
  6. Tuesday
  7. Security Act
  8. Conservation Corps
  9. kitchen
  10. Deal
  11. cycle
  12. Army

21 Clues: DealrunsArmyBowlstatecycleTuesdaykitchenSpending100 Daysblizzardon MarginTarrif Actdown theorySecurity ActFlood of 1936AdministrationReserve SystemConservation CorpsIndustrial Recovery ActProgress Administration

RETIREMENT 2024-07-23

RETIREMENT crossword puzzle
Across
  1. Deductible
  2. Social Security
  3. Qualified
  4. Savers Credit
  5. Defined Contribution
  6. Rollover
  7. Contribution
  8. Early Distribution
  9. Required Minimum Distribution RMD
  10. Nonqualified
  11. Roth IRA
  12. Defined Benefit
Down
  1. Limits
  2. Distribution
  3. Withholding
  4. Employer Sponsored
  5. Individual
  6. Pension
  7. Traditional IRA
  8. Tax Deferred

20 Clues: LimitsPensionRolloverRoth IRAQualifiedDeductibleIndividualWithholdingDistributionContributionTax DeferredNonqualifiedSavers CreditSocial SecurityTraditional IRADefined BenefitEmployer SponsoredEarly DistributionDefined ContributionRequired Minimum Distribution RMD

omputer vocab 2023-03-06

omputer vocab crossword puzzle
Across
  1. ones experiences
  2. itself
  3. local
  4. security
  5. goverment access
  6. imitate
  7. use access
  8. allows
Down
  1. connects
  2. to copy
  3. to edit or change content
  4. getting into
  5. mouse
  6. bad behavuior
  7. parts
  8. stores data
  9. annoying
  10. prevents
  11. wide
  12. secret words

20 Clues: widelocalmousepartsitselfallowsto copyimitateconnectssecurityannoyingpreventsuse accessstores datagetting intosecret wordsbad behavuiorones experiencesgoverment accessto edit or change content

Chose your own vocab. puzzle 2023-04-26

Chose your own vocab. puzzle crossword puzzle
Across
  1. to walk
  2. clothing store
  3. baggage
  4. bomb
  5. perchance
  6. image
  7. tick
  8. hotel
  9. avocado
  10. cliff jump
  11. door
  12. to flip
  13. security
  14. turtle
Down
  1. sunscreen
  2. weather
  3. boat
  4. skier
  5. gum
  6. water bottle
  7. plane
  8. simple
  9. candy
  10. airport

24 Clues: gumboatbombtickdoorskierplaneimagehotelcandysimpleturtleto walkweatherbaggageavocadoairportto flipsecuritysunscreenperchancecliff jumpwater bottleclothing store

IT-Security - Datenschutz/-sicherheit 2016-01-29

IT-Security - Datenschutz/-sicherheit crossword puzzle
Across
  1. forschen das Nutzerverhalten aus
  2. Diebstahl von Daten die weggeworfen wurden
  3. Mobbing mit Hilfe von elektronischen Medien
  4. versteckt in einem scheinbar nützlichen Programm
  5. Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
  6. unerwünschte Werbemails
Down
  1. jemand der illegal in Computersysteme eingreift
  2. Beobachtung bei der Eingabe von Daten
  3. Virus der sich direkt über Netzte im Internet verbreitet
  4. Sicherheitskopie im Falle von Verlust oder dergleichen

10 Clues: unerwünschte Werbemailsforschen das Nutzerverhalten ausBeobachtung bei der Eingabe von DatenDiebstahl von Daten die weggeworfen wurdenMobbing mit Hilfe von elektronischen Medienjemand der illegal in Computersysteme eingreiftversteckt in einem scheinbar nützlichen ProgrammSicherheitskopie im Falle von Verlust oder dergleichen...

PERUNDUNGAN 2024-09-27

PERUNDUNGAN crossword puzzle
Across
  1. Meminta uang atau barang secara paksa disertai dengan ancaman
  2. Bentuk penindasan yang dilakukan seseorang atau sekelompok orang yang lebih kuat terhadap orang lain dengan tujuan untuk menyakiti
  3. Yang dialami korban perundungan
  4. Kata bully berasal dari bahasa
  5. Bullying Bullying dalam media sosial
Down
  1. Cara pencegahan perundungan
  2. Jika kita melihat perundungan
  3. Agar tidak dibully
  4. Bullying dalam bentuk perkataan
  5. Salah satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain

10 Clues: Agar tidak dibullyCara pencegahan perundunganJika kita melihat perundunganKata bully berasal dari bahasaYang dialami korban perundunganBullying dalam bentuk perkataanBullying Bullying dalam media sosialMeminta uang atau barang secara paksa disertai dengan ancaman...

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. This attack centers around an exchange of information or service to convince the victim to act.
  4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

Bullying 2024-02-07

Bullying crossword puzzle
Across
  1. Pushing and shoving someone are signs of which bullying behaviour
  2. Tears coming down your face
  3. How you should feel all the time
  4. Making fun of others
  5. How you feel looking at a scary movie
Down
  1. Someone who is bullied
  2. This involves the use of words to harm someone
  3. When you post mean things online
  4. If you are being bullied talk to your
  5. When you exclude someone from a game or group
  6. The opposite of happy

11 Clues: Making fun of othersThe opposite of happySomeone who is bulliedTears coming down your faceWhen you post mean things onlineHow you should feel all the timeIf you are being bullied talk to yourHow you feel looking at a scary movieWhen you exclude someone from a game or groupThis involves the use of words to harm someone...

H&S crossword 2023-04-27

H&S crossword crossword puzzle
Across
  1. vehicle
  2. substances
  3. source
  4. machinery parts
  5. surfaces
  6. flying objects
  7. overturning
  8. equipment
Down
  1. plant equipment
  2. Handling
  3. powder (occ health)
  4. at height
  5. or stationary object
  6. and trips
  7. objects
  8. space
  9. Security
  10. objects

18 Clues: spacesourcevehicleobjectsobjectsHandlingsurfacesSecurityat heightand tripsequipmentsubstancesoverturningflying objectsplant equipmentmachinery partspowder (occ health)or stationary object

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many credits do you need to graduate from Cristo Rey? (write out number)
  2. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  3. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  4. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  5. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  6. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  7. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
Down
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  3. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  4. Which Cristo Rey sports team won medals at Florida National Competition?
  5. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  6. What is the title of the football team’s hype video on Marist School’s website?
  7. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  8. What type of classes does Northside Hospital offer?
  9. What percent of students at Cristo Rey get accepted to college after graduation?
  10. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  11. How many Cristo Rey students are part of a “team” at their job? (write out number)
  12. Through corporate work study program, students earn ____% of the cost of their education (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many credits do you need to graduate from Cristo Rey? (write out number)
  2. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  3. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  4. How many Cristo Rey students are part of a “team” at their job? (write out number)
  5. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  6. What percent of students at Cristo Rey get accepted to college after graduation?
  7. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  9. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  10. Which Cristo Rey sports team won medals at Florida National Competition?
Down
  1. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  2. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. What type of classes does Northside Hospital offer?
  5. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  6. What is the title of the football team’s hype video on Marist School’s website?
  7. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  8. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  9. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  10. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  2. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  3. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  4. What percent of students at Cristo Rey get accepted to college after graduation?
  5. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  6. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  7. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
Down
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  3. Which Cristo Rey sports team won medals at Florida National Competition?
  4. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  5. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  6. How many Cristo Rey students are part of a “team” at their job? (write out number)
  7. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  8. How many credits do you need to graduate from Cristo Rey? (write out number)
  9. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  10. What is the title of the football team’s hype video on Marist School’s website?
  11. What type of classes does Northside Hospital offer?
  12. What is the last name of the Director of Admissions at Cristo Rey Atlanta?

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. Which Cristo Rey sports team won medals at Florida National Competition?
  2. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  5. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  6. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  7. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  8. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  9. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  10. How many Cristo Rey students are part of a “team” at their job? (write out number)
  11. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  12. What is the title of the football team’s hype video on Marist School’s website?
Down
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  5. What type of classes does Northside Hospital offer?
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  8. What percent of students at Cristo Rey get accepted to college after graduation?

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Cybersecurity 2022-10-15

Cybersecurity crossword puzzle
Across
  1. When online, using a ______ name helps protect your true identity
  2. Secretly watches computer activity
  3. Software that protects computers from virus-related harm
  4. Phishing is malware that asks for personal ___________
  5. Someone who intentionally targets people for harm using online chat rooms or social media
  6. Type of bullying that takes place online
  7. Many features in online _____ can expose players to predators
  8. Rules for interacting politely and responsibly online
  9. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  10. Programs that appear to be useful but damage computers
  11. A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
  12. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  13. ____ passwords contain easy-to-guess information
Down
  1. Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
  2. Programs or code that damage or destroy data by attaching to a program or file in a victim computer
  3. URLs that mislead the user into downloading a virus or visiting a harmful website
  4. Never list your _________ number or home address under contact information online
  5. Illegal ___ of copyrighted material is often referred to as piracy
  6. Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
  7. Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
  8. Your ______ device often contains more personal information than any other device
  9. A password containing at least 10 characters and several unique characters could be described as ______
  10. _______ settings help control things like your profile, contact, and other information relating to your account
  11. A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
  12. Social __________ describes sites or online communities where like-minded people can communicate with each other

25 Clues: Secretly watches computer activityType of bullying that takes place online____ passwords contain easy-to-guess informationRules for interacting politely and responsibly onlinePhishing is malware that asks for personal ___________Programs that appear to be useful but damage computersSoftware that protects computers from virus-related harm...

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  4. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
  5. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
  1. This attack targets individuals who can give the criminal physical access to a secure building or area.
  2. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  3. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  4. This attack centers around an exchange of information or service to convince the victim to act.
  5. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

Kelas 7 Chapter VI (We love what we do) 2023-01-29

Kelas 7 Chapter VI (We love what we do) crossword puzzle
Across
  1. tukang kebun
  2. satpam
  3. sopir
  4. guru
  5. murid
  6. penyanyi
  7. wartawan
Down
  1. nelayan
  2. petani
  3. dokter gigi
  4. hakim
  5. penjual daging
  6. penulis
  7. tukang kayu
  8. pekerjaan

15 Clues: guruhakimsopirmuridpetanisatpamnelayanpenulispenyanyiwartawanpekerjaandokter gigitukang kayutukang kebunpenjual daging

Disruptive Technology 2025-07-24

Disruptive Technology crossword puzzle
Across
  1. Protecting individual network points with continuous monitoring and response.
  2. Tech designed for long-term ecological balance.
  3. Integrated security architecture, not a single wall.
  4. Digital access requiring multiple verification methods
  5. Orchestrated use of AI and RPA for efficiency.
  6. Software and strategies for organizational data analysis.
  7. IT's self-repairing security
  8. Broad term for subscription-based IT offerings.
  9. Software that learns and solves problems
Down
  1. Process of identifying system weaknesses.
  2. Network of dispersed servers.
  3. Virtual shared world.
  4. User interaction across many devices.
  5. Blending real and virtual worlds, for short.
  6. Revolutionary tech for complex problem-solving
  7. Policy for online risks.

16 Clues: Virtual shared world.Policy for online risks.IT's self-repairing securityNetwork of dispersed servers.User interaction across many devices.Software that learns and solves problemsProcess of identifying system weaknesses.Blending real and virtual worlds, for short.Revolutionary tech for complex problem-solving...

Executive Branch Departments Crossword 2020-03-27

Executive Branch Departments Crossword crossword puzzle
Across
  1. (abbr.) keep Americans healthy
  2. (abbr.) administers benefit programs for veterans
  3. responsible for highway programs
  4. handles diplomatic relationships with foreign countries
  5. promotes national education
  6. work to advance the nation's energy security
  7. promote economic growth and security
Down
  1. promotes the nation's economy
  2. prevent terrorist attacks in the U.S.
  3. helps workers get fair wages and working conditions
  4. oversees farming and food (USDA)
  5. handles the conservation of our land by managing national parks, wildlife, etc.
  6. (abbr.) work on housing needs to help poorer families buy homes
  7. provides military to defend our country
  8. job to enforce the law and protect public safety

15 Clues: promotes national educationpromotes the nation's economy(abbr.) keep Americans healthyoversees farming and food (USDA)responsible for highway programspromote economic growth and securityprevent terrorist attacks in the U.S.provides military to defend our countrywork to advance the nation's energy security...

history 2023-12-12

history crossword puzzle
Across
  1. no social classes everything is equal and fair
  2. where all the people who lost their jobs and money went to for a home
  3. women who wore short dresses and did things men did
  4. gang leader in the 1920s that made millions by selling illegal alc
  5. agricultural adjustment act
  6. federal deposit insurance corp.
  7. repealed the 18th amendment
  8. security and extange commicion
Down
  1. pro native american and opposed immigrants
  2. president who made the New Deal Plan
  3. where people would go to get alc
  4. sold alc to speakeasies
  5. works progress administration
  6. civilan conservation act
  7. social security act

15 Clues: social security actsold alc to speakeasiescivilan conservation actagricultural adjustment actrepealed the 18th amendmentworks progress administrationsecurity and extange commicionfederal deposit insurance corp.where people would go to get alcpresident who made the New Deal Planpro native american and opposed immigrants...

UN 2025-03-29

UN crossword puzzle
Across
  1. Power to block Security Council resolutions
  2. Chief administrative officer of the UN
  3. Coordinates global economic and social work
  4. Responsible for maintaining global peace and security
  5. Missions to help countries maintain stability
  6. Aid provided to populations in crisis
  7. Document outlining fundamental human rights
Down
  1. Former body overseeing trust territories
  2. Main deliberative body of the UN
  3. High-level meetings of world leaders
  4. Specialized organizations linked to the UN
  5. 17 global objectives for sustainable development
  6. Judicial organ resolving disputes between countries
  7. Independent organizations partnering with the UN
  8. Founding treaty establishing the UN's principles

15 Clues: Main deliberative body of the UNHigh-level meetings of world leadersAid provided to populations in crisisChief administrative officer of the UNFormer body overseeing trust territoriesSpecialized organizations linked to the UNPower to block Security Council resolutionsCoordinates global economic and social work...

Combat Support 2024-10-09

Combat Support crossword puzzle
Across
  1. This branch conducts operations to protect the force and the nation from weapons of mass destruction and CBRN threats and hazards.
  2. Corps, This branch installs, operates, maintains, secures, and defends the Army’s portion of the Department of Defense Information Networks and Communication Security in support of the United States and multinational forces at all levels of command.
  3. Intelligence, This branch supports commanders and staffs in gaining situational understanding of threats, terrain, weather, and civil considerations.
Down
  1. Police, This branch supports unified land operations including offense, defense, stability and civil support operations. These missions span across the range of military operations from stable peace to major decisive action consisting of lethal or nonlethal engagement against the wide range of threats.
  2. This branch plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations.

5 Clues: This branch plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations.This branch conducts operations to protect the force and the nation from weapons of mass destruction and CBRN threats and hazards....

OT cybersecurity 2024-07-16

OT cybersecurity crossword puzzle
Across
  1. A system that monitors and controls industrial processes
  2. An unauthorized act of bypassing security mechanisms
  3. A secret word or phrase used to authenticate access
  4. A security flaw that can be exploited
  5. Protection of sensitive information from unauthorized access
Down
  1. A unique identifier for a network device
  2. The practice of securing computer systems and networks
  3. An act of gaining unauthorized access to systems and networks
  4. A device used to control the flow of electricity in OT systems
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: A security flaw that can be exploitedA unique identifier for a network deviceA secret word or phrase used to authenticate accessAn unauthorized act of bypassing security mechanismsThe practice of securing computer systems and networksA system that monitors and controls industrial processesProtection of sensitive information from unauthorized access...

Vocabulario de travel 2013-02-07

Vocabulario de travel crossword puzzle
Across
  1. Flight
  2. Baggage claim
  3. Customs
  4. Departure
  5. To go on a trip
  6. Check in counter
  7. Itenerary
  8. Restrooms
  9. waiting room
  10. Ticket
Down
  1. Security
  2. Arrival
  3. Train station
  4. To go on vacation
  5. Destination
  6. To travel
  7. Tour
  8. Airport
  9. Hotel

19 Clues: TourHotelFlightTicketArrivalCustomsAirportSecurityDepartureIteneraryTo travelRestroomsDestinationwaiting roomBaggage claimTrain stationTo go on a tripCheck in counterTo go on vacation

SOCIAL IMPLICATIONS 2016-09-07

SOCIAL IMPLICATIONS crossword puzzle
Across
  1. Risk
  2. Online scams
  3. Promoting health
  4. Safeguards
  5. Security
  6. Criminal attacks
  7. COMPUTING Saving work via internet
  8. Connection
  9. Protection
  10. Healthy
Down
  1. Barries
  2. sharing of hardware devices
  3. Gmail
  4. web
  5. Software crime
  6. Facebook
  7. Connection
  8. Power
  9. Use
  10. Safety

20 Clues: webUseRiskGmailPowerSafetyBarriesHealthyFacebookSecuritySafeguardsConnectionConnectionProtectionOnline scamsSoftware crimePromoting healthCriminal attackssharing of hardware devicesCOMPUTING Saving work via internet

Are you clever? 2019-10-01

Are you clever? crossword puzzle
Across
  1. erraten
  2. Million
  3. schlau, klug
  4. Idiot
  5. insbesondere
  6. Dose, Büchse
  7. Dinosaurier
  8. treten, schießen
  9. Treppe, Treppenstufen
Down
  1. beginnen, anfangen
  2. Polizei
  3. als Nächstes
  4. glücklicherweise
  5. schließen, zumachen
  6. Erdbeben
  7. Sicherheit
  8. Katastrophe, Unglück
  9. halten, behalten, aufbewahren
  10. rufen, anrufen, nennen

19 Clues: IdiotPolizeierratenMillionErdbebenSicherheitDinosaurierals Nächstesschlau, kluginsbesondereDose, Büchseglücklicherweisetreten, schießenbeginnen, anfangenschließen, zumachenKatastrophe, UnglückTreppe, Treppenstufenrufen, anrufen, nennenhalten, behalten, aufbewahren

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. This attack centers around an exchange of information or service to convince the victim to act.
  4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

AMUN Crossword Extravagenza! 2012-12-09

AMUN Crossword Extravagenza! crossword puzzle
Across
  1. 2013 USG-Rapp
  2. 2013 SG, again
  3. 2013 PGA
  4. Department that provides research to Representatives during conference
  5. 2013 USG-Security Council Procedures
  6. 2013 USG-R
  7. Department that creates realistic environment for Security Councils
Down
  1. Department that ensures we have resolutions and reports to debate
  2. The team in front of the room
  3. 2013 USG-A
  4. 2013 USG-P

11 Clues: 2013 PGA2013 USG-A2013 USG-P2013 USG-R2013 USG-Rapp2013 SG, againThe team in front of the room2013 USG-Security Council ProceduresDepartment that ensures we have resolutions and reports to debateDepartment that creates realistic environment for Security CouncilsDepartment that provides research to Representatives during conference

Cybersecurity Awareness 2024-10-25

Cybersecurity Awareness crossword puzzle
Across
  1. Secure connection that hides your online activities
  2. Scrambling data to protect it from prying eyes
  3. Software that helps detect and remove malicious programs
  4. Malware disguised as legitimate software
  5. The ability to use or interact with data or systems
  6. Protects your network by blocking certain traffic
  7. A weakness in a system that can be exploited
  8. An extra layer of security requiring two forms of identification
  9. Manipulating people to gain confidential information
  10. A saved copy of data, used in case of data loss
  11. A risk from someone within the organization
  12. A security event that could harm a system or data
Down
  1. Converting scrambled data back into readable form
  2. Pretending to be someone else to deceive or scam
  3. A secret word or phrase used to access your account
  4. Malicious software that demands payment to release data
  5. Fraudulent emails trying to trick you into revealing information
  6. Criminal activities carried out using computers
  7. Username and password combination used to log in
  8. Software that secretly monitors your online activities
  9. Verifying who you are before gaining access
  10. When sensitive data is accessed without authorization
  11. Information collected and stored digitally
  12. A software update that fixes security vulnerabilities
  13. Someone who tries to gain unauthorized access to systems
  14. A type of malware that spreads by copying itself
  15. Following legal and regulatory cybersecurity standards
  16. Harmful software that damages or infiltrates devices

28 Clues: Malware disguised as legitimate softwareInformation collected and stored digitallyVerifying who you are before gaining accessA risk from someone within the organizationA weakness in a system that can be exploitedScrambling data to protect it from prying eyesCriminal activities carried out using computers...

Investing - Zoey Kleinknecht 2025-03-25

Investing - Zoey Kleinknecht crossword puzzle
Across
  1. Is Crypto a high or low-risk investment?
  2. Currencies that are created and backed by government, but not tied to or backed by the value of any physical commodity
  3. CEO of Berkshire Hathaway
  4. Warren Buffet’s first rule is to never ___ money.
  5. How many days do you have to rollover your 401k funds?
  6. A sum of money made available for a particular purpose
  7. For education expenses
  8. A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.
  9. Nationally or Internationally recognized, Well Established & Financially Sound Company
  10. Market Capitalization is the total ___ of a company’s stock.
  11. A Lump Sum is better for ___ Risk Tolerance Investors
  12. Roth IRA contributions are made ___ tax.
Down
  1. A fund saved for unexpected expenses.
  2. For planned expenses like a new car or vacation
  3. For unexpected events, such as a tornado
  4. A mutual fund takes cash from ___ and invests in stocks, bonds, and other securities.
  5. Age to receive full social security benefits
  6. Traditional IRA contributions are made ___ tax.
  7. Make money with stocks by Buying ___ and selling ___
  8. Which President created Social Security?
  9. A Blue Chip Company is an example of a liquid or illiquid stock?
  10. Markets rising
  11. Social Security and Medicare taxes
  12. Markets falling
  13. A collection of stocks, bonds, or other assets that trades on a stock exchange

25 Clues: Markets risingMarkets fallingFor education expensesCEO of Berkshire HathawaySocial Security and Medicare taxesA fund saved for unexpected expenses.Is Crypto a high or low-risk investment?For unexpected events, such as a tornadoWhich President created Social Security?Roth IRA contributions are made ___ tax....

Five Nights at Freddy's 2024-04-12

Five Nights at Freddy's crossword puzzle
Across
  1. What is your name in night 5 in sisters location
  2. Who was phone guys killer
  3. Who possesses Springtrap
  4. How did William die?
  5. What was the name of the child that got stuffed in chica
  6. what state does the game take place
  7. Who was the victim of the bite of 83
  8. Who was the victim of the bite of 87
  9. Who possesses Golden Freddy
  10. Who is the most aggressive animatronic
Down
  1. Who created FNAF?
  2. Who protects you in Security breach
  3. Who tried to kill cassie
  4. Who got scooped at the end of sister location
  5. Who possesses Lefty
  6. What secret can be rarely seen on cameras
  7. who killed Elizabeth
  8. What is the original chica holding?
  9. What body part does Roxanne lose in Security breach

19 Clues: Who created FNAF?Who possesses LeftyHow did William die?who killed ElizabethWho tried to kill cassieWho possesses SpringtrapWho was phone guys killerWho possesses Golden FreddyWho protects you in Security breachwhat state does the game take placeWhat is the original chica holding?Who was the victim of the bite of 83...

EXTREME SPORTS 2021-09-29

EXTREME SPORTS crossword puzzle
Across
  1. certainty
  2. determination
  3. excitement
  4. mood
  5. environment
  6. power
  7. jumping out of a plane
Down
  1. motive
  2. peripeteia
  3. hope
  4. risk
  5. hormone
  6. advance
  7. high
  8. ability

15 Clues: hoperiskmoodhighpowermotivehormoneadvanceabilitycertaintyperipeteiaexcitementenvironmentdeterminationjumping out of a plane

Evolution plus 2 unit2 w46-60 2018-11-04

Evolution plus 2 unit2 w46-60 crossword puzzle
Across
  1. tłuszcze
  2. porcja
  3. ochroniarz
  4. cukry
  5. wejście
  6. ekscytujący
  7. dieta
Down
  1. witaminy
  2. minerały (mikroelementy)
  3. olbrzymi ekran
  4. głośno
  5. głośnik
  6. gram
  7. białka
  8. zdrowy

15 Clues: gramcukrydietagłośnoporcjabiałkazdrowygłośnikwejściewitaminytłuszczeochroniarzekscytującyolbrzymi ekranminerały (mikroelementy)

FNAF crossword 2024-04-05

FNAF crossword crossword puzzle
Across
  1. Animatronics from the second game
  2. Animatronics from sister location
  3. Who gets a stage of their own
  4. Who causes hallucinations saying "its me"
  5. Animatronics from security breach
  6. What suit does afton get springlocked in
  7. Bonnie's "replacement" in security breach and ruin
Down
  1. Cheapest set of animatronics in pizzeria simulator
  2. Everyones fav black bear
  3. Where is glamrock bonnie hidden in ruin
  4. The most disregarded FNAF game
  5. What role do you play as in FNAF 1-3
  6. Where are you in FNAF 4
  7. *sighs* Who always comes back
  8. Animatronics from the third game

15 Clues: Where are you in FNAF 4Everyones fav black bearWho gets a stage of their own*sighs* Who always comes backThe most disregarded FNAF gameAnimatronics from the third gameAnimatronics from the second gameAnimatronics from sister locationAnimatronics from security breachWhat role do you play as in FNAF 1-3Where is glamrock bonnie hidden in ruin...

Centre, cure, cave 2025-04-28

Centre, cure, cave crossword puzzle
Across
  1. hollowed out as a space
  2. sense of “mentally focus”
  3. position between extreme view
  4. a cosmetic treatment for feet and toenails
  5. is to wonder what is around you
  6. of moderate or intermediate political views
  7. is to hollow out by digging
Down
  1. like in a cabin in size, shape or atmosphere
  2. states security department or ministry
  3. one who is eccentric - unconventional or unusual -
  4. to make safe guard from danger
  5. spiritual guide one responsible fior the care of souls
  6. a concaved surface thats hollow
  7. the epicentre is the point on earths surface
  8. a cavity has the quality of being hollow

15 Clues: hollowed out as a spacesense of “mentally focus”is to hollow out by diggingposition between extreme viewto make safe guard from dangera concaved surface thats hollowis to wonder what is around youstates security department or ministrya cavity has the quality of being hollowa cosmetic treatment for feet and toenails...

Digital rights 2025-11-24

Digital rights crossword puzzle
Across
  1. legal right protecting creative digital works
  2. ability to hide your identity online
  3. free availability of digital content
  4. method of scrambling data to keep it secure
  5. tricking users into giving personal information
  6. online harassment or abuse
Down
  1. principle that internet traffic should be treated equally
  2. extra security step requiring an additional code
  3. record of activities left behind online
  4. policies for keeping user information safe
  5. protection of personal data online
  6. security system that blocks unauthorized access
  7. permission required before collecting data
  8. harmful software designed to damage systems
  9. monitoring user activity across websites

15 Clues: online harassment or abuseprotection of personal data onlineability to hide your identity onlinefree availability of digital contentrecord of activities left behind onlinemonitoring user activity across websitespolicies for keeping user information safepermission required before collecting datamethod of scrambling data to keep it secure...

Employment Basics - Chapter 5 Vocab Test 2020-02-11

Employment Basics - Chapter 5 Vocab Test crossword puzzle
Across
  1. includes sick, vacation, and holiday pay
  2. one time event as a % of sale
  3. encompasses both Social Security and Medicare tax
  4. government required benefit covers employees injured while working at their job
  5. recurring % pay for sales of books, movies, music, etc.
  6. an employee's withholding allowance certificate used for taxes
  7. the money received after all taxes and deductions are made
  8. a given amount of time used to calculate or determine salary and establish benefits available to you by the government, examples Worker's compensation, Medicare, and Social security
  9. used to show potential employers educational and experience background
Down
  1. used as incentives by employers to enhance employment
  2. pay for hours over 40 usually 1.5 or 2 regular rate
  3. artisans method of payment
  4. a type of temporary insurance sponsored by the government to help employees out of work by no fault of their own
  5. typically offered to full time employees - health, life & disability
  6. a 9 digit number issued at birth used to track amount paid to government for FICA taxes
  7. federal and state laws that mandate the lowest compensation for work
  8. Navy, Marine, Army, Coast Guard, and Airforce have these
  9. a record given to you by employer for your records to check for accuracy and track earnings
  10. compensation received from employer after retirement
  11. type of pay before any deductions

20 Clues: artisans method of paymentone time event as a % of saletype of pay before any deductionsincludes sick, vacation, and holiday payencompasses both Social Security and Medicare taxpay for hours over 40 usually 1.5 or 2 regular ratecompensation received from employer after retirementused as incentives by employers to enhance employment...

Cashless society 2024-09-04

Cashless society crossword puzzle
Across
  1. A program that offers discounts or cashback when transacting with cashless methods.
  2. Payment through wearable devices such as smartwatches.
  3. A secret code used for digital transaction security
  4. A type of card used for cashless transactions.
  5. Use of a mobile app to manage and pay routine bills such as electricity and water.
  6. A payment method where the bill is taken directly from the bank balance without using a card.
  7. A digital currency that uses blockchain technology
  8. User identification based on fingerprints or facial recognition for transaction security.
  9. A place where one can pay for products or services without using physical money
Down
  1. A platform that provides online payment and money transfer services.
  2. number used for e-wallet transactions.
  3. Banks that provide digital account services without a physical passbook
  4. Transactions made by scanning a QR code
  5. A unique token or code is generated for each digital transaction as a security measure.
  6. Technology that enables payment by simply attaching a card or device to a payment machine.
  7. popular digital payment tool on smartphones
  8. A payment system that allows users to send money to friends quickly via mobile phone
  9. An institution that oversees and regulates cashless transactions in a country.
  10. Banks that operate online without physical offices.
  11. A platform that allows money transfer between countries without high fees

20 Clues: number used for e-wallet transactions.Transactions made by scanning a QR codepopular digital payment tool on smartphonesA type of card used for cashless transactions.A digital currency that uses blockchain technologyA secret code used for digital transaction securityBanks that operate online without physical offices....

INVESTING Patrick McVeigh 2025-03-25

INVESTING Patrick McVeigh crossword puzzle
Across
  1. personal pre tax max contribution is 7000
  2. traditional IRA contributes are made
  3. THREE maximum age to start IRA
  4. a item of value held up by belief with no physical commodity
  5. at what age can you invest in crypto
  6. currency backed by the government but not tied to physical commodity.
  7. a tax you pay towards the government thats used for retirement.
  8. what category does crypto fall under
  9. before investing in crypto only invest what your willing to… employer manages pensions
  10. measures the price performance of a basket of securities
  11. a digital ledger of transactions that duplicates and distrbutes across a network.
  12. the availability of cash or the ease in which a asset can convert to cash
Down
  1. the total value of a companies stock
  2. you can collect full benefits for social security
  3. what president created social security
  4. warren buffets first rule
  5. a total amount set aside and dedicated for a specific purpose.
  6. is when equal portions are invested at a market in intervals
  7. Roth IRA contributed are made
  8. if you leave your company you can
  9. what percentage of 18-29 invest in crypto
  10. The biggest fraud in U.S history was ..scandal
  11. Managed by employer contributions are made by you and the state.
  12. crypto is a risk investment
  13. social security and medicare together is called
  14. investing all you have into the market at once

26 Clues: warren buffets first rulecrypto is a risk investmentRoth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canthe total value of a companies stocktraditional IRA contributes are madeat what age can you invest in cryptowhat category does crypto fall underwhat president created social security...

Spy Words Crossword 2025-05-20

Spy Words Crossword crossword puzzle
Across
  1. Place where money gets wasted.
  2. A loyal employee who is willing to engage in crime or violence as minion for their leader.
  3. A dramatic and exciting event, leaving the audience in suspense.
  4. Spying or using spies is called…
  5. Covert military or political operations that may employ measures not generally authorized.
  6. Activities designed to prevent or thwart spying by an enemy.
  7. 3 dimensional image formed by the interference of light beams
  8. A small bomb thrown by hand or launched mechanically.
  9. A combination of a miniature radio transmitter with a microphone.
  10. A part of the body that is also referred to as a weapon.
  11. Fancy clothing that every male spy wears.
Down
  1. Automated recognition of individuals using unique physical characteristics, typically for the purposes of security.
  2. Something designated as officially secret and accessible only to authorized people.
  3. A person seized or held as security for the fulfilment of a condition.
  4. A mode of transport including lift and propulsion.
  5. Cloth which acts as a brake.
  6. Someone who has evil actions and intentions.
  7. Important information.
  8. To ask someone a lot of questions.
  9. Someone who uses computers to gain unauthorized access to data.
  10. Device used to reduce the sound of a gun.
  11. A spy who gradually achieves an important position within the security defences of a country.

22 Clues: Important information.Cloth which acts as a brake.Place where money gets wasted.Spying or using spies is called…To ask someone a lot of questions.Device used to reduce the sound of a gun.Fancy clothing that every male spy wears.Someone who has evil actions and intentions.A mode of transport including lift and propulsion....

CONVERSATIONAL SELLING SKILLS 2018-12-13

CONVERSATIONAL SELLING SKILLS crossword puzzle
Across
  1. REISNURANCE COMPANY
  2. ENDORSE
  3. MEETING
  4. SEE
  5. LEAD
  6. MONETARY
  7. FRIENDS DO THIS
  8. NO
  9. FUEL TO THE SALES ENGINE
Down
  1. EXPERT
  2. DISCUSSION
  3. ABILITY
  4. SECURITY
  5. LEAKAGE
  6. CONVERSION
  7. KING

16 Clues: NOSEELEADKINGEXPERTENDORSEABILITYMEETINGLEAKAGESECURITYMONETARYDISCUSSIONCONVERSIONFRIENDS DO THISREISNURANCE COMPANYFUEL TO THE SALES ENGINE

ITSCM 280 Schramm 2022-10-05

ITSCM 280 Schramm crossword puzzle
Across
  1. Cloud where apps and data are business critical
  2. A disadvantage of big data is high ___ rate
  3. Fastest growing cloud service
  4. One disadvantage of cloud computing is loss of __
  5. Cable with inner conductor wire and insulation
  6. Increased __ is a disadvantage of big data
  7. MAC address stands for Media Access ___
  8. Different kinds of data being generated
  9. Abbreviation for Distributed Denial of Service
Down
  1. A security breach activity using email
  2. Emotion security breaches pray on
  3. OSI layer where IP address is used
  4. The ___ layer is the top layer of OSI
  5. The ___ layer is the bottom layer of TCP/IP
  6. network topology with common backbone
  7. Mechanism to bring the meaning out of data
  8. Redundant Array of Independent Drives
  9. RAID 0 name
  10. A password manager tool
  11. Cloud computing service that provide all services

20 Clues: RAID 0 nameA password manager toolFastest growing cloud serviceEmotion security breaches pray onOSI layer where IP address is usedThe ___ layer is the top layer of OSInetwork topology with common backboneRedundant Array of Independent DrivesA security breach activity using emailMAC address stands for Media Access ___...

AT THE AIRPORT 2017-11-08

AT THE AIRPORT crossword puzzle
Across
  1. VÄLILASKU
  2. MÄÄRÄNPÄÄ
  3. LASKEUTUA
  4. VARATTU
  5. TULLI
  6. TURVATARKASTUS
  7. LENTO
  8. KÄYTÄVÄPAIKKA
  9. MATKATAVAROIDEN NOUTOPISTE
  10. VIIVÄSTYNTYT
  11. VIISUMI
Down
  1. ARVIOITU LÄHTÖAIKA
  2. PASSI
  3. MATKATAVARAT
  4. SAAPUVAT LENNOT
  5. PUNNITA
  6. LÄHTEVÄT LENNOT
  7. VAPAA

18 Clues: PASSITULLILENTOVAPAAVARATTUPUNNITAVIISUMIVÄLILASKUMÄÄRÄNPÄÄLASKEUTUAMATKATAVARATVIIVÄSTYNTYTKÄYTÄVÄPAIKKATURVATARKASTUSSAAPUVAT LENNOTLÄHTEVÄT LENNOTARVIOITU LÄHTÖAIKAMATKATAVAROIDEN NOUTOPISTE

Safety 2021-03-25

Safety crossword puzzle
Across
  1. Used to review safety rules annually
  2. To report a code white
  3. Allowed on campus
Down
  1. Ensures computer security
  2. Disaster
  3. Security alert
  4. Sent to report equipment malfunctions
  5. Hazardous spill
  6. Located near the front door

9 Clues: DisasterSecurity alertHazardous spillAllowed on campusTo report a code whiteEnsures computer securityLocated near the front doorUsed to review safety rules annuallySent to report equipment malfunctions

E-SAFETY 2019-03-04

E-SAFETY crossword puzzle
Across
  1. if you don't like a post you can do this
  2. if you share with friends
  3. if you send someone something it is known as this
  4. you download onto your phone
  5. when you don like a post
  6. a picture you put online
Down
  1. when someone sends you hurtful/threatening posts
  2. you need to stay this online
  3. a secret word
  4. button you press when you like a post

10 Clues: a secret wordwhen you don like a posta picture you put onlineif you share with friendsyou need to stay this onlineyou download onto your phonebutton you press when you like a postif you don't like a post you can do thiswhen someone sends you hurtful/threatening postsif you send someone something it is known as this

Cyber Safety 2016-02-10

Cyber Safety crossword puzzle
Across
  1. feed a newer way to receive news
  2. Mostly known as voice telephone
  3. chat you talk with people online
  4. Networking a site that keeps families up to date with things they are interested in
Down
  1. Helps you look up info
  2. Helps sends Messages
  3. video files that can be downloaded
  4. Page on a website that talks about something

8 Clues: Helps sends MessagesHelps you look up infoMostly known as voice telephonefeed a newer way to receive newschat you talk with people onlinevideo files that can be downloadedPage on a website that talks about somethingNetworking a site that keeps families up to date with things they are interested in

Cyber Safety 2020-04-16

Cyber Safety crossword puzzle
Across
  1. Hardware used for a particular purpose. Phone, computer etc.
  2. Transfer an image onto your computer.
  3. Technology used to deliberately hurt someone
Down
  1. Not on the internet
  2. Gain access to unauthorized data
  3. Sound made when you get a notification.
  4. Photo taken of yourself
  5. connected to the internet.

8 Clues: Not on the internetPhoto taken of yourselfconnected to the internet.Gain access to unauthorized dataTransfer an image onto your computer.Sound made when you get a notification.Technology used to deliberately hurt someoneHardware used for a particular purpose. Phone, computer etc.

Cyber Crossword 2020-04-27

Cyber Crossword crossword puzzle
Across
  1. The headquarter of this dedicated EY division is in Amsterdam. Jatin Sehgal leads it. 27K.
  2. It’s as difficult as extracting coal from Earth. It’s valuable but cannot be seen physically. Highly volatile. Satoshi Nakamoto
  3. I target the organizations’ executives by luring them into responding
  4. I have an article dedicated to me. I became popular after 25th May, 2018. My outcome is to help organization identify where the data is stored, who is storing it and how it is stored
Down
  1. Israel-US. Siemens Step7. 500Kilobyte. USB.
  2. Doctors use it. Hackers use it. It’s on the top of the list of 2020!
  3. Marcus Hutchins from Britain tried to slow me down. I caused 92 million pound loss to NHS in UK
  4. One of the co-inventor was “Shamir”. I help organizations in securing their data while at-rest and in-transit. “Dell” is my parent.

8 Clues: Israel-US. Siemens Step7. 500Kilobyte. USB.Doctors use it. Hackers use it. It’s on the top of the list of 2020!I target the organizations’ executives by luring them into respondingThe headquarter of this dedicated EY division is in Amsterdam. Jatin Sehgal leads it. 27K....

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. ______Regulation works by utilising feedback
  2. Shawn Fanning created the______
  3. cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  4. cyber________
Down
  1. according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
  2. some experts regard digital______ as the third industrial revolution
  3. the conversion of analogue data into digital form
  4. wrote Code and Other Laws of Cyberspace

8 Clues: cyber________Shawn Fanning created the______wrote Code and Other Laws of Cyberspace______Regulation works by utilising feedbackthe conversion of analogue data into digital formsome experts regard digital______ as the third industrial revolution...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. ______Regulation works by utilising feedback
  2. Shawn Fanning created the______
  3. cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  4. cyber________
Down
  1. according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
  2. some experts regard digital______ as the third industrial revolution
  3. the conversion of analogue data into digital form
  4. wrote Code and Other Laws of Cyberspace

8 Clues: cyber________Shawn Fanning created the______wrote Code and Other Laws of Cyberspace______Regulation works by utilising feedbackthe conversion of analogue data into digital formsome experts regard digital______ as the third industrial revolution...

Cyber Crime 2022-10-14

Cyber Crime crossword puzzle
Across
  1. crime that involves a computer and a network
  2. a kind of cybercrime that heavily damages an individual psychologically
  3. one study found that 1/3 of college students illegally downloaded _____
  4. these institutions are at high risk for cybercrime
Down
  1. a characteristic of cyber criminals
  2. wrongful or criminal deception intended to result in financial or personal gain.
  3. These kind of costs occur within the company and include the costs of detection, investigation, and recovering data
  4. theft or misappropriation of funds placed in one's trust or belonging to one's employer.

8 Clues: a characteristic of cyber criminalscrime that involves a computer and a networkthese institutions are at high risk for cybercrimea kind of cybercrime that heavily damages an individual psychologicallyone study found that 1/3 of college students illegally downloaded _____...

Cyber Aware 2022-11-17

Cyber Aware crossword puzzle
Across
  1. an email that attempts to gain sensitive data or credentials
  2. software that compromises the operation of a system by performing an unauthorized function or process
  3. hacker with criminal intent
  4. activity or process where information systems are protected from unauthorized use
Down
  1. a person who uses computers to gain unauthorized access to data
  2. a dishonest scheme
  3. disclosure of sensitive information outside organization
  4. an observable occurrence in an information system or network

8 Clues: a dishonest schemehacker with criminal intentdisclosure of sensitive information outside organizationan email that attempts to gain sensitive data or credentialsan observable occurrence in an information system or networka person who uses computers to gain unauthorized access to data...

Cyber-Bullying 2019-07-11

Cyber-Bullying crossword puzzle
Across
  1. Banning people from contacting you over the internet
  2. Sites used to contact people with a computer
  3. Hurting someone physically or emotionally
Down
  1. Use this to talk to or play with other people
  2. A service to help children that are sad
  3. People who you are born with or are related to
  4. People who you hang around with or Like
  5. to play with text someone you must be ______

8 Clues: A service to help children that are sadPeople who you hang around with or LikeHurting someone physically or emotionallySites used to contact people with a computerto play with text someone you must be ______Use this to talk to or play with other peoplePeople who you are born with or are related toBanning people from contacting you over the internet

cyber sec 2023-11-14

cyber sec crossword puzzle
Across
  1. Has a trunk
  2. Large marsupial
  3. Man's best friend
Down
  1. person who send email
  2. Flying mammal
  3. Likes to chase mice
  4. email scam
  5. person for

8 Clues: email scamperson forHas a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceperson who send email

Cyber Quiz 2025-08-29

Cyber Quiz crossword puzzle
Across
  1. attack disrupting services means
  2. shortcut key to insert a function in Excel
  3. invented automatical calculator
  4. creating fake profiles on social media
  5. name of the newly launched AI powered astrology feature by AstroSage AI
  6. when the number of users Sur passes the network capacity this network suffers the most
Down
  1. file extension for a macro enabled template
  2. what is the flow in software that can be exploited

8 Clues: invented automatical calculatorattack disrupting services meanscreating fake profiles on social mediashortcut key to insert a function in Excelfile extension for a macro enabled templatewhat is the flow in software that can be exploitedname of the newly launched AI powered astrology feature by AstroSage AI...

Cyber Quiz 2025-08-29

Cyber Quiz crossword puzzle
Across
  1. attack disrupting services means
  2. file extension for a macro enabled template
  3. creating fake profiles on social media
  4. invented automatical calculator
  5. when the number of users Sur passes the network capacity this network suffers the most
  6. name of the newly launched AI powered astrology feature by AstroSage AI
Down
  1. what is the flow in software that can be exploited
  2. shortcut key to insert a function in Excel

8 Clues: invented automatical calculatorattack disrupting services meanscreating fake profiles on social mediashortcut key to insert a function in Excelfile extension for a macro enabled templatewhat is the flow in software that can be exploitedname of the newly launched AI powered astrology feature by AstroSage AI...

What types of Bullying 2016-02-24

What types of Bullying crossword puzzle
Across
  1. Making up stories of a person?
  2. Pushing people around?
  3. Spreading a rumor about a person?
Down
  1. Calling people names?
  2. Using threats to frighten others?
  3. Bullying on the internet?

6 Clues: Calling people names?Pushing people around?Bullying on the internet?Making up stories of a person?Using threats to frighten others?Spreading a rumor about a person?

EMD Polices & Procedures 2021-02-10

EMD Polices & Procedures crossword puzzle
Across
  1. These passes are issued for a maximum of 5 business days at a time
  2. Form used by employees to declare and drop off incoming business necessary computer storage/media at Central guard.
  3. Application used for alarms and event view
  4. This report is a firsthand account of the activities the security officer performed while on duty.
  5. Form generated by and issued by the Purchasing Department authorizing equipment to be removed from the site
  6. Temporary badges can only be issued and returned to_______
  7. __________ Book is used by CW-EMD security to alert security officers of individuals who previously had access to the site.
  8. Special arrangements have been made to allow_____________ employees to bring company provided cell phones through CW-EMD property
  9. Alarm that sounds like a hockey goal
  10. Type of inspection performed by security officers to ensure that employees are using their assigned badges
  11. All visitors must have a ___________ completed in order to be allowed into the facility or do work on the grounds
  12. Document with information that must be reported to the next officer taking over that post
  13. This badge has a yellow background with red lettering and the Curtiss-Wright logo
  14. This form is used to report a situation that requires greater detail to be investigated
  15. Document needed when taking company property off site
Down
  1. Foreign Nationals are permitted to have electronics in this area and this area only
  2. Post where you control and perform 100% vehicle inspections
  3. Badge worn by visitors who are sole United States citizens who have a business relationship that requires daily or frequent visits but not require access to classified information
  4. Site with no security guard service that is monitored by CW-EMD
  5. __________ are issued if a person’s vehicle information is not registered in the Auto Registration
  6. Issued to employees and long term contractors to identify a vehicle and vehicle owner should there be an issue
  7. __________ is to be completed every time a foreign national enters the shop for a tour
  8. Stickers on personal owned cell phone that have been approved by the FSO/Asst. FSO are this color
  9. CW-EMD cleared employee has a _______ on their badge
  10. Secure area located in Bldg. 3A 2nd floor
  11. required any time work is being done inside the building that could potentially spark a fire
  12. Badge color reserved specifically for Foreign Nationals
  13. only post that is manned from 0630-2230 Monday thru Friday.
  14. __________visitors wearing this badge MUST ALWAYS have an EMD escort with them

29 Clues: Alarm that sounds like a hockey goalSecure area located in Bldg. 3A 2nd floorApplication used for alarms and event viewCW-EMD cleared employee has a _______ on their badgeDocument needed when taking company property off siteBadge color reserved specifically for Foreign NationalsTemporary badges can only be issued and returned to_______...

CS 2025-02-24

CS crossword puzzle
Across
  1. The act of secretly listening to or monitoring communication between two parties, often to steal sensitive data. (13)
  2. A decoy system or server designed to lure cybercriminals and detect malicious activities. (7)
  3. A security technique that isolates applications or processes in a controlled environment to prevent them from affecting the rest of the system. (10)
  4. An open standard for secure, passwordless authentication which is also available for authenticating into EKAMEV from smartphones. (4)
  5. A hidden entry point into a system, often used by attackers. (8)
  6. A policy that allows employees to use personal devices (like smartphones/ laptop) for work, potentially introducing security risks. (4)
  7. A software update designed to fix vulnerabilities. (5)
  8. _____________ Detection System is employed for monitoring network traffic for security breaches. (9)
  9. – The I of the CIA triad of cybersecurity. (9)
  10. A type of social engineering attack where voice communication (usually over the phone) is used to trick individuals into revealing personal information. (7)
  11. A physical security measure involving a small, secure space where individuals are authenticated before entering a facility. (6)
  12. A zone in the network segment that acts as a buffer between an internal network and external networks, often used to host public-facing services (13)
  13. The ChatGPT equivalent application of the office (6)
  14. A testing technique used to identify vulnerabilities in software by inputting random, unexpected, or malformed data. (4)
Down
  1. The individual who controls and directs a botnet to perform malicious activities. (9)
  2. A type of phishing attack that targets high-level executives to steal sensitive information. (7)
  3. A wireless communication protocol often used in IoT devices that can be susceptible to security vulnerabilities. (6)
  4. Malware that records keystrokes on a device to steal sensitive information such as passwords.(9)
  5. A vulnerability that is exploited by attackers before the software developer can patch it. (4-3)
  6. The process of substituting sensitive data with a unique identifier or token that retains its meaning but is useless if breached. (12)
  7. Unauthorized use of a system's resources to mine cryptocurrency. (13)
  8. The certifying authority that issues digital certificates for accessing CBS in the office (5)
  9. Redirecting a website’s traffic to a fake version of the site to steal information. (8)
  10. Malicious software designed to conceal its presence on a compromised system and provide privileged access. (7)
  11. The process of using a magnetic field to destroy data stored on magnetic media like hard drives or tapes. (10)

25 Clues: – The I of the CIA triad of cybersecurity. (9)The ChatGPT equivalent application of the office (6)A software update designed to fix vulnerabilities. (5)A hidden entry point into a system, often used by attackers. (8)Unauthorized use of a system's resources to mine cryptocurrency. (13)...

AT THE AIRPORT 2013-08-19

AT THE AIRPORT crossword puzzle
Across
  1. cel podróży
  2. przylot
  3. odlot
  4. wieża
  5. taśmociąg do bagażu
  6. bramka
  7. lot
Down
  1. odprawiać
  2. bagaż
  3. wózek bagażowy
  4. towarzystwo lotnicze
  5. wsiadanie
  6. hala odlotów
  7. odprawa celna
  8. paszport
  9. port lotniczy
  10. ochrona

17 Clues: lotbagażodlotwieżabramkaprzylotochronapaszportodprawiaćwsiadaniecel podróżyhala odlotówodprawa celnaport lotniczywózek bagażowytaśmociąg do bagażutowarzystwo lotnicze

crossword 2024-05-07

crossword crossword puzzle
Across
  1. Digital representations of users in virtual environments.
  2. Unauthorized use of someone's personal information.
  3. European data protection regulation initials.
  4. Compulsive behavior often linked to substance abuse.
  5. Data security incident.
  6. Online harassment or intimidation.
  7. A digital realm where virtual experiences flourish.
Down
  1. Immersive computer-generated environment.
  2. Monitoring or observing closely.
  3. Criminal activity in the digital world.
  4. Measures taken to safeguard against threats.
  5. Symbolic song of a nation or group.

12 Clues: Data security incident.Monitoring or observing closely.Online harassment or intimidation.Symbolic song of a nation or group.Criminal activity in the digital world.Immersive computer-generated environment.Measures taken to safeguard against threats.European data protection regulation initials.Unauthorized use of someone's personal information....

FIRST WEEK OF SCHOOL CROSSWORD PUZZLE (SY:22-23) 2022-08-17

FIRST WEEK OF SCHOOL CROSSWORD PUZZLE (SY:22-23) crossword puzzle
Across
  1. Guidance Counselor, 8th Grade (Last Name)
  2. New Guidance Counselor ,7th Grade (Last Name)
  3. Guidance Counselor, 6th Grade (Last Name)
  4. Where Principal is located
  5. Glades Middle School Principal (Last Name)
  6. GMS New Reading Coach
  7. Where you go if you're not feeling well
Down
  1. Tallest Security Guard (Last Name)
  2. School Mascot
  3. Head of School Security (Last Name)
  4. Where guidance counselors are located
  5. School Resource Officer (Last Name)

12 Clues: School MascotGMS New Reading CoachWhere Principal is locatedTallest Security Guard (Last Name)Head of School Security (Last Name)School Resource Officer (Last Name)Where guidance counselors are locatedWhere you go if you're not feeling wellGuidance Counselor, 8th Grade (Last Name)Guidance Counselor, 6th Grade (Last Name)...

Poist 2023-10-23

Poist crossword puzzle
Across
  1. judge
  2. electrician
  3. secretary
  4. business person
  5. plumber
  6. scientist
  7. nurse
  8. cleaner
Down
  1. mechanic
  2. security guard
  3. farmer
  4. driver
  5. teacher
  6. engineer

14 Clues: judgenursefarmerdriverteacherplumbercleanermechanicengineersecretaryscientistelectriciansecurity guardbusiness person

Economics 2023-05-03

Economics crossword puzzle
Across
  1. President that signed social security into law
  2. situation where a good is unavailable
  3. Written by Adam Smith
  4. Financial Exchange that houses many tech stocks
  5. Natural resources used to make goods or services
  6. year social security was signed into law
  7. index of 30 prominent US companies
  8. employer retirement account
Down
  1. limited quantities to meet unlimited demand
  2. reward paid to stock holders for their investment
  3. Grows tax free
  4. 500 largest companies in the US
  5. effort people devote to as task for which they get paid
  6. year the Roth IRA was created

14 Clues: Grows tax freeWritten by Adam Smithemployer retirement accountyear the Roth IRA was created500 largest companies in the USindex of 30 prominent US companiessituation where a good is unavailableyear social security was signed into lawlimited quantities to meet unlimited demandPresident that signed social security into law...

dampak sosial informatika 2025-02-07

dampak sosial informatika crossword puzzle
Across
  1. = perangkat lunak yang mampu untuk mendapatkan akses ke suatu sistem komputer
  2. = aknonim robot dan network
  3. = penggunaan dengan menggunakan kata sandi & biometrik
  4. = kata lain dari enkripsi
  5. mandiri = sesuatu yang dimiliki pengguna
  6. jari = sesuatu tentang diri pengguna
Down
  1. = perkakas peretasan
  2. = sistem operasi dikerawanan
  3. = otentikasi dapat diterapkan pada beberapa objektif yaitu?
  4. manusia = kerawanan pada keamanan teknologi
  5. = kata lain dari data terenkripsi
  6. = data kecil yang digunakan untuk menyimpan informasi aktivitas kita dalam penjelajahan situs web
  7. = alat keamanan yang sangat berharga untuk pengamanan data
  8. security = fitur windows security diantaranya
  9. jari (2) kode khusus = metode otentikasi multifaktor menggunakan 2 item dari kategori berbeda yaitu

15 Clues: = perkakas peretasan= kata lain dari enkripsi= aknonim robot dan network= sistem operasi dikerawanan= kata lain dari data terenkripsijari = sesuatu tentang diri penggunamandiri = sesuatu yang dimiliki penggunamanusia = kerawanan pada keamanan teknologisecurity = fitur windows security diantaranya...

Adam Group 1 25-01-24 2024-01-19

Adam Group 1 25-01-24 crossword puzzle
Across
  1. Entscheidung
  2. Zielrichtung (2 Wörter)
  3. Zerstörung
  4. neu aufbauen
  5. Zielgruppe
  6. Tor, Ziel
Down
  1. Ausstellung
  2. Erneuerung
  3. Gleichheit
  4. prüfen, auswerten
  5. mitreißend
  6. Botschaft
  7. Sicherheit
  8. greifen
  9. enttäuschend

15 Clues: greifenBotschaftTor, ZielErneuerungGleichheitZerstörungmitreißendSicherheitZielgruppeAusstellungEntscheidungneu aufbauenenttäuschendprüfen, auswertenZielrichtung (2 Wörter)

Information Security Management 2024-09-03

Information Security Management crossword puzzle
Across
  1. A detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
  2. Instructions that dictate certain behavior within an organization.
  3. The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization’s security efforts; also known as a security program policy, general security policy, IT security policy, high-level InfoSec policy, or simply an InfoSec policy.
  4. A term sometimes used synonymously with objectives; the desired end of a planning cycle.
  5. A managerial program designed to improve the security of information assets by providing targeted knowledge, skills, and guidance for an organization’s employees.
  6. The actions taken by management to specify the intermediate goals and objectives of the organization in order to obtain specified strategic goals, followed by estimates and schedules for the allocation of resources necessary to achieve those goals and objectives.
Down
  1. The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise’s resources are used responsibly.
  2. Examples of actions that illustrate compliance with policies.
  3. Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems.
  4. Specifications of authorization that govern the rights and privileges of users to a particular information asset; includes user access lists, matrices, and capabilities tables.

10 Clues: Examples of actions that illustrate compliance with policies.Instructions that dictate certain behavior within an organization.A term sometimes used synonymously with objectives; the desired end of a planning cycle.Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems....

Aleksi 2024-10-16

Aleksi crossword puzzle
Across
  1. Terveydenhoito
  2. Tasavalta
  3. Yksinäisyys
  4. Sosiaaliturva
  5. Kansainvälinen
  6. Äänestä
Down
  1. Party
  2. Pohjoismaa
  3. Eduskunta
  4. Syrjintä
  5. Oikeuksia
  6. Tehdä
  7. Rasismi
  8. Noudattaa

14 Clues: PartyTehdäRasismiÄänestäSyrjintäTasavaltaEduskuntaOikeuksiaNoudattaaPohjoismaaYksinäisyysSosiaaliturvaTerveydenhoitoKansainvälinen

7th tech vocab quiz 2 2014-10-13

7th tech vocab quiz 2 crossword puzzle
Across
  1. a place in a database record where a category of information can be entered or located
  2. involving questions of tight and wrong behavior, following accepted rules of behavior: morally right and good. “What is moral when using technology?”
  3. An item used to organize files into groups
  4. Using features of word processing/DTP software to format and produce documents, letters, reports, flyers, and newsletters with graphics
  5. a type of computer application program used for storing, organizing, and retrieving information
  6. (Graphics Interchange format) an efficient method for storing graphics, GIF’s take up a small amount of disk space that can be transmitted quickly:(type of file)
  7. The unique address name for an Internet site.
  8. (Hypertext Markup language)- this is the coding language used to create sites on the World Wide Web
  9. a device for storing information in a fixed location within your computer like a filing cabinet in your computer
Down
  1. to set the margins, tabs, font or line spacing in layout of a document
  2. Transfer Protocol) A set of rules that allows two computers to “talk to one another while transferring files from one to the other, this is the protocol used when you transfer files from one computer to another across the Internet
  3. to make changes to a document or presentation
  4. the electronic posting of mean spirited messages about a person often done anonymously
  5. commonly known as E-mail- System designed to send messages and attachments electronically.
  6. (on social media sites such as twitter) a word or phrase proceeded by a hash or pound sign (#) and used to identify messages on a specific topic
  7. the process of transferring software/information from the Internet to you computer
  8. Name System) this is a service that stores, translates, and retrieves the numerical address equivalents of familiar host names that you use everyday (such as www.4teachers.org)
  9. Hardware and/or software that separates a local area network (LAN) into two or more parts for security purposes
  10. Start up a computer from a powered-down state when the computer is not already on

19 Clues: An item used to organize files into groupsto make changes to a document or presentationThe unique address name for an Internet site.to set the margins, tabs, font or line spacing in layout of a documentStart up a computer from a powered-down state when the computer is not already on...

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

Social Security Administration 2023-04-01

Social Security Administration crossword puzzle
Across
  1. Who received the first SSN account?
  2. Who had the lowest ever SS number ever issued?
  3. What was the SSA formally known as? (Abbreviation)
  4. What demographic change rendered traditional economic security unworkable?
  5. What is the abbreviation for the agency?
Down
  1. What created the full-fledged pension system in America? (War name abbreviation)
  2. Who signed the Social Security Act in 1935?
  3. Who were the Social Security Acts supposed to benefit?
  4. Where are payments made?

9 Clues: Where are payments made?Who received the first SSN account?What is the abbreviation for the agency?Who signed the Social Security Act in 1935?Who had the lowest ever SS number ever issued?What was the SSA formally known as? (Abbreviation)Who were the Social Security Acts supposed to benefit?...

Ehre 2020-02-18

Ehre crossword puzzle
Across
  1. Paket
  2. Sicherheit
  3. Verschlüsselung
  4. Daten
  5. Prüfsumme
  6. Sitzung
  7. Kommunikation
Down
  1. kodieren
  2. übertragen
  3. Schwul
  4. Applikation
  5. Analog
  6. kopieren

13 Clues: PaketDatenSchwulAnalogSitzungkodierenkopierenPrüfsummeSicherheitübertragenApplikationKommunikationVerschlüsselung

Biomes and Food Security 2017-04-16

Biomes and Food Security crossword puzzle
Across
  1. Cereal grains are staples as they can be stored for long periods of times without ____________________. (pg. 84)
  2. This biome supports only nomadic reindeer herders.
  3. These people rely on staple crops as they are more resilient and have a low risk of failure. (pg. 84)
  4. This is vital for the survival of other species on Earth. (pg. 84)
  5. This sustains life. (pg. 84)
  6. Cassava contains what poison that can kill unless cooked or grated and left in the open? (pg. 85)
  7. This biome contains some of the richest soils int he world. (pg. 85)
  8. Human eat both plant and animal products and are called... (pg. 84)
  9. With increasing _______________ diets become more varied. (pg. 85)
  10. The ___________________ of food determines the number of people that can live in a region. (pg. 84)
  11. Most staples are ___________ __________. (pg. 84)
  12. The land in this biome is only suitable for grazing as there is a restricted amount of vegetation. (pg. 85)
  13. Staple foods in South America. (pg. 84)
  14. Number of rice crops produced each year in the rich alluvial soils of South-East Asia. (pg. 84)
Down
  1. Name/type of food that is eaten regularly by a community or society as the main part of their diet. (pg. 84)
  2. This varies greatly between biomes and determines the amount of food that can be gained. (pg. 85)
  3. This biome has impoverished soils reliant on decaying material. (pg. 85)
  4. Over one billion people in developing countries depend on _____________ _______ __________ as their staple food. (pg. 84/85)
  5. The fertile ___________ ___________ of South-East Asia support some of the highest rural population densities. (pg. 84)
  6. How many people have rice, maize and wheat as their staple? (pg. 84)
  7. This biome has limited land use due to extreme aridity. (pg. 85)
  8. Staple food in Asia.(pg. 84)
  9. These for the basis of all food chains. (pg. 84)
  10. Staple foods are usually readily available of quite _____________. (pg. 84)
  11. Staple food in Europe. (pg. 84)

25 Clues: This sustains life. (pg. 84)Staple food in Asia.(pg. 84)Staple food in Europe. (pg. 84)Staple foods in South America. (pg. 84)These for the basis of all food chains. (pg. 84)Most staples are ___________ __________. (pg. 84)This biome supports only nomadic reindeer herders.This biome has limited land use due to extreme aridity. (pg. 85)...

TCS Information Security Crossword 2013-01-09

TCS Information Security Crossword crossword puzzle
Across
  1. is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
  2. An update to fix vulnerabilities in software
  3. A piece of software that is malicious or intrusive
  4. ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
  5. Attack preventing availability of a system operation or service to an authorized user
  6. A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
  7. A unique value that is computed and stored or transmitted together with the data, for the purpose of detecting changes in it
  8. Highest category of information classification in TCS
  9. Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
  10. A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
  11. Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
  12. ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
  1. ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
  2. ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
  3. A software that detects, repairs, cleans, or removes infected files from a computer
  4. Act of listening to a private conversation which may reveal information which can provide access to a facility or network
  5. Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
  6. A weakness that can be taken advantage of to obtain unauthorized access to an asset
  7. Minimum password length as per TCS security policy
  8. Process for secure disposal of paper based information
  9. Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
  10. Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
  11. _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.

23 Clues: An update to fix vulnerabilities in softwareA piece of software that is malicious or intrusiveMinimum password length as per TCS security policyHighest category of information classification in TCSProcess for secure disposal of paper based informationA software that detects, repairs, cleans, or removes infected files from a computer...

Security Awareness Puzzle 2015 2015-02-16

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  2. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
  3. Email scam or attempt to trick you into giving your password or personal information.
  4. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  5. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
  6. Desk If you have any question or concerns about an email that you receive you can send it to Spam@ashevillenc.gov or contact _______ _______. (2 words)
  7. To ________ the amount of spam you receive, be careful who you give your email address to.
  8. Healthy email always includes a clear and specific ____________ line.
  9. Do not send __________ information over email unless it is encrypted.
  10. Do not leave your laptop or computer ____________.
  11. A secure password should contain at least one of these.
  12. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
  13. Choose a password that is easy for you to ____________ but hard for someone to guess.
  14. A computer ______ can be considered as the modern counterpart of a paper document.
  15. The state of being free from danger or threat.
  16. When creating a password do not use words from your favorite sport, team, hobby, recording artist or ________.
  17. Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
  18. A software that is designed to detect and destroy computer viruses.
  19. Another word for understanding, knowledge and well-informed.
  20. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  21. Also known as malicious software; any program or file that is harmful to a computer user.
  22. Do not __________ your password or account with anyone.
  23. Always ___________ your computer when you leave your desk.
Down
  1. Never forward any _________ letter.
  2. __________ is a popular web search engine.
  3. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  4. Use __________ passwords for the various accounts that you may have.
  5. Never share your _________ with another person.
  6. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
  7. Passwords should be _________ every 3-4 months.
  8. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  10. Passwords should always be at least this many characters long.
  11. A password is stronger by using a combination of both upper and lower case ___________.
  12. Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?"
  13. Use this tool to dispose of documents that contain personal or financial information.
  14. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
  15. Do not _______ your password down or attach it to your keyword or monitor.
  16. To protect personal information, avoid sending it via_________.
  17. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.

40 Clues: Never forward any _________ letter.__________ is a popular web search engine.The state of being free from danger or threat.Never share your _________ with another person.Passwords should be _________ every 3-4 months.Do not leave your laptop or computer ____________.A secure password should contain at least one of these....

Security Analysis & Portfolio Management 2022-05-15

Security Analysis & Portfolio Management crossword puzzle
Across
  1. The ability to buy or sell an asset quickly at a known price.
  2. The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  3. The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
  4. --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
  5. The market ------------------is used as a benchmark to evaluate the performance of funds.
  6. ------------------------was one of the originators of Capital Asset Pricing model.
  7. The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
  8. ------------------------laid the foundations to the Portfolio theory.
  9. The ----------------------theorem suggests that investment and financing are two different decisions.
Down
  1. The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
  2. Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
  3. A -------------form EMH is when prices reflect all historical information.
  4. ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
  5. A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
  6. The --------------market is used for lending and borrowing short-term funds.
  7. The --------------measure is calculated as excess returns per unit of systematic risk.
  8. The --------------------market line is the graphical representation of CAPM.
  9. -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
  10. --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
  11. The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.

20 Clues: The ability to buy or sell an asset quickly at a known price.------------------------laid the foundations to the Portfolio theory.A -------------form EMH is when prices reflect all historical information.The --------------market is used for lending and borrowing short-term funds....

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. Spyware, Trojan, worm, virus
  2. The Ripper Cracking tool
  3. Famous proxy tool for web penetration testing
  4. decode this hex -> 7365637572697479
  5. 127.0.0.1 IP address
  6. A cat tries to catch it but you can use it with your computer
  7. SSH means
  8. which is the first layer in OSI
  9. init 6
  10. not one
  11. Malware that encrypts data for money
  12. Goddess of Cyprus,Venus...
  13. The M in HTML
Down
  1. Not bind shell
  2. You can use it for anonymity
  3. Famous packet analyzer
  4. control and store your repo
  5. Famous Linux OS for Penetration Testing
  6. IEE 802.11 describes which type of network?
  7. Mac address is a 12 byte. What type of numbers?
  8. Not TCP
  9. TCP & UDP runs in that OSI Layer
  10. Network authentication protocol
  11. Cross Site _____ Attack
  12. name of first virus
  13. Which protocol is used by ping command
  14. Protocol that gives access to a user on a remote system
  15. Swiss army knife of hacking tool/frequently used as backdoor

28 Clues: init 6Not TCPnot oneSSH meansThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoSpyware, Trojan, worm, virusYou can use it for anonymityNetwork authentication protocolwhich is the first layer in OSI...

Chapter 3 Security Plus 2024-09-04

Chapter 3 Security Plus crossword puzzle
Across
  1. The process of changing plaintext into ciphertext
  2. The process of changing encrypted text into the original text
  3. hiding data within an ordinary, non-secret file
  4. Uptime for computers
  5. uses two mathematically related keys
  6. cryptoprocessor
  7. brute force collision attack that exploits the probability theory
  8. Three basic security protections
  9. to implementing an older and less secure mode “fall back”
  10. multiplies two large prime numbers
  11. also called a cipher
  12. two or more different messages that produce the same hash value
  13. The art of writing in cipher
  14. digital fingerprints
  15. protect the entire hard drive using cryptography
Down
  1. An electronic verification of the sender
  2. long-term secret key does not compromise the confidentiality of past communications
  3. denial of the truth or validity of something
  4. a strong symmetric cryptographic algorithm
  5. decentralized, distributed and public digital ledger
  6. evidence or proof of something
  7. The process of sending and receiving secure cryptographic keys
  8. A removable external cryptographic device
  9. data used to describe the content or structure of the actual data
  10. is a finite sequence of rigorous instructions
  11. countermeasure
  12. immutable ledger that facilitates the process of recording transactions
  13. object whose state cannot be modified after it is created
  14. ensure data has not been altered
  15. mathematical value entered into the algorithm to produce ciphertext
  16. A downgrade attack

31 Clues: countermeasurecryptoprocessorA downgrade attackUptime for computersalso called a cipherdigital fingerprintsThe art of writing in cipherevidence or proof of somethingThree basic security protectionsensure data has not been alteredmultiplies two large prime numbersuses two mathematically related keysAn electronic verification of the sender...

Chapter 13 Security Plus 2024-03-28

Chapter 13 Security Plus crossword puzzle
Across
  1. A statistical value that is the average time until a component fails
  2. Combining two or more devices to appear as a single unit
  3. The ability to maintain its operations in the face of a disruptive event
  4. Gathering evidence from a device
  5. Storing copied data away from the production facility
  6. A single scheduled event for copying data
  7. determining whether an event is actually a security incident
  8. The retrieval of difficult-to-obtain data
  9. Using multiple different devices to host or serve an application
  10. The maximum length of time that an organization can tolerate between backups
  11. A process that identifies the business functions and quantifies the impact a loss
Down
  1. An incident response testing exercise that is a monthly 30-minute discussion
  2. A record of events that occur
  3. restoring IT resources following a distruptive event
  4. Verifying that evidence was always under strict control
  5. A device that maintains power to equipment in case of an interruption
  6. Continuously copying data
  7. Making servers always accessible
  8. The process of forecasting the need for future resources
  9. isolating those systems that are impacted by an incident
  10. Taking a “picture” of the state of the data repeatedly
  11. A device powered by gas to generate electricity
  12. temporarily switching to backup procedures after an attack

23 Clues: Continuously copying dataA record of events that occurMaking servers always accessibleGathering evidence from a deviceA single scheduled event for copying dataThe retrieval of difficult-to-obtain dataA device powered by gas to generate electricityrestoring IT resources following a distruptive event...