cyber security Crossword Puzzles

Chapter 14 Security Plus 2024-03-30

Chapter 14 Security Plus crossword puzzle
Across
  1. A document that provides detailed mandatory steps
  2. The withdrawal of a permit to function not following compliance
  3. A list of specific actions to take for threats
  4. proactive human identification of a cyber invasion
  5. The actions to be taken when an employee leaves an enterprise
  6. Identifying and mitigating risks brought on by a third party
  7. damages that are the result of not following compliance standards
  8. A policy that outlines how applications should be developed
  9. The rapid detection and elevation of a threat incident
Down
  1. Subset of the board that manages governance issues
  2. Verification of truth or authenticity
  3. Generating a special document or record
  4. A policy that defines the actions users may perform
  5. Automation used for entire processes instead of for a single task
  6. An agency responsible for enforcing government directives
  7. Practices an organization has in place to assign, oversee, and report
  8. A penalty for not following compliance standards
  9. Automations that constantly watch cloud deployments
  10. ensuring that an organization adheres to laws and regulations
  11. composed of internal directors who approve strategic goals and policies
  12. A formal statement that outlines specific requirements

21 Clues: Verification of truth or authenticityGenerating a special document or recordA list of specific actions to take for threatsA penalty for not following compliance standardsA document that provides detailed mandatory stepsSubset of the board that manages governance issuesproactive human identification of a cyber invasion...

Chapter 5 Security Plus 2024-09-14

Chapter 5 Security Plus crossword puzzle
Across
  1. It only goes off after certain conditions are met
  2. inserts statements to manipulate a database server
  3. An attack that copies data and then uses it
  4. resource that is not possible due to geography
  5. account that is inaccessible through a normal login attempt
  6. A malicious program that uses a computer network to replicate
  7. A cookie that is only sent to the server with an encrypted request
  8. takes advantage of a vulnerability to move to restricted directories
  9. Software installed on a device without the user requesting it
  10. A request that has been fabricated
  11. Malware disguised as something useful or legitimate
Down
  1. An indicator of attack in which data is no longer accessible
  2. store data in RAM beyond the boundaries
  3. threat actor gains illicit access of elevated rights or privileges
  4. An attack in which threat actors introduce something into RAM
  5. An attack in which a website accepts user input without validating it
  6. Closing unused ports and disabling unnecessary protocols
  7. move from the root directory to other restricted directories
  8. hides its presence on the device
  9. depletion of memory or processing capabilities
  10. Installing software security updates
  11. Attack that copies data and then uses it
  12. Secure space for running untrusted software
  13. Malware that replicates by infecting other files or programs
  14. captures and stores each keystroke that a user types on the computer’s keyboard
  15. monitors endpoints and immediately blocks a malicious attack
  16. A sign an attack is currently underway

27 Clues: hides its presence on the deviceA request that has been fabricatedInstalling software security updatesA sign an attack is currently underwaystore data in RAM beyond the boundariesAttack that copies data and then uses itAn attack that copies data and then uses itSecure space for running untrusted software...

2nd Quarter Security training 2023-04-17

2nd Quarter Security training crossword puzzle
Across
  1. Refer media questions to the ___ or community relations director.
  2. The robbery packet is located on the back of the ___ ___.
  3. Inform members of emergency and request they ___ the building.
  4. ____ in a secure location if you cannot escape.
  5. The alternate meeting point is ___ if it is unsafe at the primary.
  6. Ask witnesses to fill out an ___ ___.
  7. A ___ ___ is located under each phone.
Down
  1. If safe, secure cash and ___ ___ information before evacuating.
  2. Use the ___ to document details of the call for bomb and kidnapping threats.
  3. Don't be a ___.
  4. Once the robber leaves ___ the doors and put up closed signs.
  5. During a medical emergency have someone ___ with the member while another calls 911.
  6. Try to ___ sights, sounds, and smells that may help identify your abductors.
  7. Primary meeting point is at the ___ dot.
  8. As a last resort ____ to save yourself.
  9. ___ silent alarms as soon as you feel safe to do so.
  10. Put up a ___ paper used to signal all clear to law enforcement.
  11. ____ if there is an accessible escape path.
  12. ___ you have been robbed.
  13. ___ 911 to report incident only if it is safe.
  14. Always take threats___.
  15. When you see a fire ___ the fire alarm to alert others.
  16. Stay ___ and alert if taken hostage.

23 Clues: Don't be a ___.Always take threats___.___ you have been robbed.Stay ___ and alert if taken hostage.Ask witnesses to fill out an ___ ___.A ___ ___ is located under each phone.As a last resort ____ to save yourself.Primary meeting point is at the ___ dot.____ if there is an accessible escape path.___ 911 to report incident only if it is safe....

CIS178 Participation3-Security Crossword 2023-04-20

CIS178 Participation3-Security Crossword crossword puzzle
Across
  1. Deliberate theft of sensitive data
  2. Hacker successfully exploits network/device
  3. Hidden secuity bypass in code
  4. Waknesses in software hackers exploit
  5. Challenge-response test verifying humanity
  6. Temporary, first-party, third-party
  7. Capture data submitted over network
  8. Website names into machine addresses
  9. Confirming a user's identity
  10. Software installed without user consent
Down
  1. Holds files hostage for money
  2. Audio/video changed for credibility
  3. Personal devices used for work
  4. Malicious computers controlled remotely
  5. Public, private, static, dynamic
  6. Commonplace items connected to internet
  7. Shield user againse harmful spyware
  8. Fraudulent messages for personal gain
  9. Adventatious malicious code attacking vulnerabilities
  10. Monitors and filters network traffic

20 Clues: Confirming a user's identityHolds files hostage for moneyHidden secuity bypass in codePersonal devices used for workPublic, private, static, dynamicDeliberate theft of sensitive dataAudio/video changed for credibilityShield user againse harmful spywareTemporary, first-party, third-partyCapture data submitted over network...

May 2023 Security Training 2023-04-24

May 2023 Security Training crossword puzzle
Across
  1. Security device
  2. One type of robbery
  3. File this if a customer deposits more than $10,000 in cash
  4. The sign you look for before entering the branch
  5. This must be filed by AML if a customer pays for a cashier's check with $4,000 in cash
  6. Two people, two sets of eyes
  7. Must have on your person at all times
  8. Number one deterrent of robberies
  9. We check for this on the ATM when sweeping in the mornings
Down
  1. Every desk and teller unit are equipped with this
  2. Where do you find the bomb threat checklist
  3. What do you call if the all clear sign is still up
  4. Where would you log our internal auditors when they arrive at your branch
  5. Name of the report that you can file if you are suspicious of customer activity
  6. Dual control area
  7. Send email with sensitive information
  8. One example of sensitive information
  9. Name the binder you take with you in case of emergency
  10. One way to send a silent alarm to the police
  11. Placed in a secure bin at the end of the day

20 Clues: Security deviceDual control areaOne type of robberyTwo people, two sets of eyesNumber one deterrent of robberiesOne example of sensitive informationSend email with sensitive informationMust have on your person at all timesWhere do you find the bomb threat checklistOne way to send a silent alarm to the police...

Ehre 2020-02-18

Ehre crossword puzzle
Across
  1. Paket
  2. Sicherheit
  3. Verschlüsselung
  4. Daten
  5. Prüfsumme
  6. Sitzung
  7. Kommunikation
Down
  1. kodieren
  2. übertragen
  3. Schwul
  4. Applikation
  5. Analog
  6. kopieren

13 Clues: PaketDatenSchwulAnalogSitzungkodierenkopierenPrüfsummeSicherheitübertragenApplikationKommunikationVerschlüsselung

Kreuzworträtsel 2022-05-02

Kreuzworträtsel crossword puzzle
Across
  1. KOmplexe und sichere...
  2. Schutz vor Cyberkriminalität
  3. Kann dir dabei helfen Fotos aus dem Internet zu löschen
Down
  1. Bloßstellen im Internet
  2. häufige Angriffsart
  3. Täter gibt sich als geschäftsführerIn aus

6 Clues: häufige AngriffsartBloßstellen im InternetKOmplexe und sichere...Schutz vor CyberkriminalitätTäter gibt sich als geschäftsführerIn ausKann dir dabei helfen Fotos aus dem Internet zu löschen

POG FSP Crossword 2012-12-10

POG FSP Crossword crossword puzzle
Across
  1. Days a DOS is valid at MARSEC III
  2. A breach is to elude, evade and ___ security
  3. A person must have ___ to enter the port
  4. Side by side monitoring
  5. Sceening percent at MARSEC III
  6. Minimum offcers at a gate for MARSEC II
  7. Screening percent at MARSEC II
Down
  1. Survey to determine risk, threat, vulnerability
  2. James Whitehead is currently the
  3. We are a MTSA _____ facilty
  4. Simplest form of security
  5. Days a DOS is valid at MARSEC II
  6. Years the FSP is valid

13 Clues: Years the FSP is validSide by side monitoringSimplest form of securityWe are a MTSA _____ faciltySceening percent at MARSEC IIIScreening percent at MARSEC IIJames Whitehead is currently theDays a DOS is valid at MARSEC IIDays a DOS is valid at MARSEC IIIMinimum offcers at a gate for MARSEC IIA person must have ___ to enter the port...

SCWK 202 Crossword 2021-10-07

SCWK 202 Crossword crossword puzzle
Across
  1. One of the two social movements. Includes the Social Security Act, Unemployment Insurance, etc.
  2. The use of one benefit automatically entitles you to another.
  3. Hint: (_ITC) -- Offers a tax refund to supplement the wages of low-income workers.
  4. _ _ _ _ _ _ _ _ _ disentitlements prevents duplication of services.
  5. Formally Aid to Families with Dependent Children (AFDC)
  6. Individual Development Accounts hinges on this form of philosophy
  7. One of the three viewpoints which discuss "worthy" and "unworthy" poor.
  8. Hint: Social _ _ _ _ _ _ -- One of the social change triggers, helped trigger the Social Security Act in 1935.
  9. Hint: _ _ _ _ _ _ _ _ _ _ _ _ security income --Federal means-tested income support for the aged, blind, and disabled.
Down
  1. Hint: Unemployment _ _ _ _ _ _ _ _ _ -- An income support program that has a hybrid structure, which includes state and federal financing.
  2. Hint: Worker’s _ _ _ _ _ _ _ _ _ _ _ _ -- Provides cash and medical benefits to injured workers on jobs.
  3. Topic of study for class the last three weeks.
  4. Hint: Basic Income _ _ _ _ _ -- Idea that guarantees a universal income.
  5. One of the three viewpoints that discusses the "soundness" of political US institutions.
  6. Hint: 1601 _ _ _ _ _ _ _ _ _ _ _ Poor Laws -- Origins of general assistance.
  7. Largest retirement program, includes old-age pension and disability insurance.
  8. _ _ _ _ _ _ _ _ _ _ entitlement authorizes people to get money from various different sources.

17 Clues: Topic of study for class the last three weeks.Formally Aid to Families with Dependent Children (AFDC)The use of one benefit automatically entitles you to another.Individual Development Accounts hinges on this form of philosophy_ _ _ _ _ _ _ _ _ disentitlements prevents duplication of services....

donnabarata@gmail.com 2024-03-20

donnabarata@gmail.com crossword puzzle
Across
  1. _______ act strengthens HIPAA by having more rules and stricter penalties in privacy and security laws to assure compliance in keeping client's PHI safe and secure.
  2. ePrescribing helps pharmacy staff spend ________ time confirming new prescriptions and refill requests.
  3. ePriscribing helps pharmacy staff alert physicians about possible ________ drug reactions.
  4. technical safeguards of HIPAA's _________ Rule are technology, policies and procedures that protect & control access to ePHI.
  5. _____________ facility group provides care such as emergency care, outpatient surgery and hospital stays.
  6. PHI is any health information regarding treatment which contains information that can reasonably __________ the client.
  7. De-identification of medical records is the __________ of all identifying information.
  8. Is a client's height considered PHI?
  9. a client's _________ is considered PHI.
Down
  1. The HITECH Act outlines the development and _______________ of Electronic Health Records in the healthcare field.
  2. One way HIT affects healthcare providers is by allowing them better ________ over who has access to client information.
  3. stands for Health Insurance Portability and Accountability Act.
  4. HIPAA's Security Rule applies specifically to __________.
  5. ______stands for Electronic Health Record
  6. PHR is health and medical information maintained by the ________.
  7. An EHR system is used to create a ________ digital health record for each client.
  8. There are ____ levels of fault for a HIPAA violation.

17 Clues: Is a client's height considered PHI?a client's _________ is considered PHI.______stands for Electronic Health RecordThere are ____ levels of fault for a HIPAA violation.HIPAA's Security Rule applies specifically to __________.stands for Health Insurance Portability and Accountability Act....

test 2023-09-12

test crossword puzzle
Across
  1. Security
  2. Open Arts
  3. Transportation
  4. Facilities
  5. Women@
  6. Disability@
  7. EHS
  8. Fitness Center
Down
  1. Events & Amenities
  2. SEA + BEL Site Team
  3. IT Support
  4. APIs@
  5. Latin@
  6. Black@
  7. AV Technical Production
  8. Ship Happens
  9. Native@
  10. Pride@

18 Clues: EHSAPIs@Latin@Black@Women@Pride@Native@SecurityOpen ArtsIT SupportFacilitiesDisability@Ship HappensTransportationFitness CenterEvents & AmenitiesSEA + BEL Site TeamAV Technical Production

November 2024-10-18

November crossword puzzle
Across
  1. Katy Perry's number-one hit song
  2. We light ..... on Guy Fawkes Night
  3. Black.....
  4. International ...... Day is Celebrated on 19th November
Down
  1. is an American holiday celebrated on the last Thursday of November
  2. ...... Monday
  3. The flower that reminds us of who we have lost during WW1&WW2
  4. How many days in November?
  5. The day after Halloween and also a famous Girlband in 90's

9 Clues: Black........... MondayHow many days in November?Katy Perry's number-one hit songWe light ..... on Guy Fawkes NightInternational ...... Day is Celebrated on 19th NovemberThe day after Halloween and also a famous Girlband in 90'sThe flower that reminds us of who we have lost during WW1&WW2...

German Crossword 2020-11-09

German Crossword crossword puzzle
Across
  1. traditional
  2. to belong to
  3. role
  4. illegitamate
  5. confidence
  6. source
  7. to be descended from
  8. foster family
  9. surrogate family
Down
  1. living together
  2. security
  3. single parent
  4. adoptive family
  5. between generation family
  6. home
  7. ownership
  8. love match
  9. patchwork family
  10. bond
  11. woman

20 Clues: homerolebondwomansourcesecurityownershiplove matchconfidencetraditionalto belong toillegitamatesingle parentfoster familyliving togetheradoptive familypatchwork familysurrogate familyto be descended frombetween generation family

German Crossword 2020-11-09

German Crossword crossword puzzle
Across
  1. traditional
  2. to belong to
  3. role
  4. illegitamate
  5. confidence
  6. source
  7. to be descended from
  8. foster family
  9. surrogate family
Down
  1. living together
  2. security
  3. single parent
  4. adoptive family
  5. between generation family
  6. home
  7. ownership
  8. love match
  9. patchwork family
  10. bond
  11. woman

20 Clues: homerolebondwomansourcesecurityownershiplove matchconfidencetraditionalto belong toillegitamatesingle parentfoster familyliving togetheradoptive familypatchwork familysurrogate familyto be descended frombetween generation family

Refugee 2022-11-11

Refugee crossword puzzle
Across
  1. decalpsid
  2. noitucesrep
  3. ytilitsoh
  4. enitnarauq
  5. eegufer
  6. epacse
  7. seitlausac
  8. ytiruces
  9. noitargim
  10. RCHNU
  11. sserts
  12. redrob
Down
  1. noitatroped
  2. rekees-mulysa
  3. sudoxe
  4. sisirc
  5. noitargimmi
  6. tnemtaert-lli
  7. ssensselemoh
  8. eeucave
  9. yrautcnas
  10. enimaf
  11. yrtnuoc
  12. retlehs
  13. noitairtaper

25 Clues: RCHNUsudoxesisircepacseenimafssertsredrobeegufereeucaveyrtnuocretlehsytirucesdecalpsidytilitsohyrautcnasnoitargimenitnarauqseitlausacnoitatropednoitucesrepnoitargimmissensselemohnoitairtaperrekees-mulysatnemtaert-lli

Birds & bees 2024-05-20

Birds & bees crossword puzzle
Across
  1. Poesi
  2. Beteende
  3. Bin
  4. Lilja
  5. Emotionell
  6. Solrosor
  7. Skola
  8. Skydda
  9. Känslor
  10. Hygglig
  11. Krokus
  12. Intryck
  13. Värderingar
  14. Respekt
  15. Relationer
Down
  1. Inställning
  2. Rosor
  3. Utbildning
  4. Blåklocka
  5. Humlor
  6. Lämpligt
  7. Blommor
  8. Samarbete
  9. Fåglar
  10. Normer
  11. Säkerhet
  12. Maskros

27 Clues: BinPoesiRosorLiljaSkolaHumlorSkyddaFåglarNormerKrokusBlommorKänslorHyggligIntryckMaskrosRespektBeteendeLämpligtSolrosorSäkerhetBlåklockaSamarbeteUtbildningEmotionellRelationerInställningVärderingar

Vocabulary man 2024-02-27

Vocabulary man crossword puzzle
Across
  1. economic class
  2. passenger
  3. flight crew
  4. pilot
  5. escalator
  6. police
  7. overhead storage
  8. scale
  9. suitcase
  10. immigration
  11. vacation
  12. runway
  13. flight
Down
  1. employee
  2. trip
  3. agent
  4. co pilot
  5. destination
  6. stewardess
  7. passport
  8. customs
  9. security
  10. luggage
  11. airplane
  12. airport

25 Clues: tripagentpilotscalepolicerunwayflightcustomsluggageairportemployeeco pilotpassportsecurityairplanesuitcasevacationpassengerescalatorstewardessdestinationflight crewimmigrationeconomic classoverhead storage

Ενότητα: Σπίτια 2025-10-07

Ενότητα: Σπίτια crossword puzzle
Across
  1. building
  2. comfort
  3. soil
  4. material
  5. apartment building
  6. cost
  7. house
  8. heating
  9. apartment
  10. wood
  11. earthquake
  12. endurance
  13. brick
  14. race
Down
  1. build
  2. architect
  3. column
  4. ideal, perfect
  5. safety, security
  6. ground
  7. stay
  8. floor
  9. resident
  10. clay
  11. civilization
  12. area

26 Clues: soilstaycostclaywoodarearacebuildfloorhousebrickcolumngroundcomfortheatingbuildingmaterialresidentarchitectapartmentenduranceearthquakecivilizationideal, perfectsafety, securityapartment building

PEOPLE AND COMMUNITY 2025-10-31

PEOPLE AND COMMUNITY crossword puzzle
Across
  1. комфорт
  2. довіра
  3. заохочення
  4. рівність
  5. страх
  6. зрада
  7. маніпуляція
  8. підтримка
  9. відчуття справжнього себе
  10. безпека
  11. жадібність
Down
  1. повага
  2. чесність
  3. образа
  4. контроль
  5. вірність
  6. незалежність
  7. спілкування
  8. ревнощі
  9. цькування
  10. щастя
  11. насильство
  12. любов
  13. егоїзм (власна вигода)
  14. тиск

25 Clues: тискщастястрахзрадалюбовповагаобразадовіракомфортревнощібезпекачесністьконтрольвірністьрівністьцькуванняпідтримказаохоченнянасильствожадібністьспілкуванняманіпуляціянезалежністьегоїзм (власна вигода)відчуття справжнього себе

Are you clever? 2019-10-01

Are you clever? crossword puzzle
Across
  1. erraten
  2. rufen, anrufen, nennen
  3. Katastrophe, Unglück
  4. schlau, klug
  5. Idiot
  6. Erdbeben
  7. halten, behalten, aufbewahren
  8. glücklicherweise
  9. Dose, Büchse
Down
  1. Treppe, Treppenstufen
  2. schließen, zumachen
  3. treten, schießen
  4. Dinosaurier
  5. Sicherheit
  6. insbesondere
  7. als Nächstes
  8. Polizei
  9. beginnen, anfangen
  10. Million

19 Clues: IdioterratenPolizeiMillionErdbebenSicherheitDinosaurierschlau, kluginsbesondereals NächstesDose, Büchsetreten, schießenglücklicherweisebeginnen, anfangenschließen, zumachenKatastrophe, UnglückTreppe, Treppenstufenrufen, anrufen, nennenhalten, behalten, aufbewahren

1st Quarter 2022 2021-12-06

1st Quarter 2022 crossword puzzle
Across
  1. , Organization Agent Xu worked for.
  2. , What substance is illegal under Federal Law that is legal in some states?
  3. , The first name of the spy for China that stole secrets from General Electric.
  4. , Where was Oleg's first assignment?
  5. , A jury convicted Robert Hoffman in 2013 and sentenced him to?
  6. , Under the UCMJ article 112A, marijuana along with derived products are Schedule ___ drug.
  7. , What are the most common security violations with IT systems referred to?
  8. , ICD 705 states that Personally Owned Portable Electronic Devices are _______ within SCIFs overseas.
  9. , The term generically used to describe the use of a covert agent to create a romantic relationship to compromise a person.
  10. , What is the difference between walking to the pub and walking home from the pub?
Down
  1. , Oleg _____ was a double agent for MI6.
  2. , Where was agent Xu apprehended?
  3. , Robert Hoffman was a 20 year veteran of?
  4. , Who is appointed to investigate security violations to determine the facts of the incident?
  5. , What does the acronym NTK stand for?
  6. , What location did Hoffman visit that caused concern for the FBI?
  7. , Robert Hoffman believed he was communicating with a Russian Spy named?
  8. , What was the purpose of 'Operation Pimlico'?
  9. , Security Violations are ______ of classified information.
  10. , CBD or THC can be found in dietary supplements, food, and ________.
  11. , In regards to drug use or derivative use not knowing is not an _____.

21 Clues: , Where was agent Xu apprehended?, Organization Agent Xu worked for., Where was Oleg's first assignment?, What does the acronym NTK stand for?, Oleg _____ was a double agent for MI6., Robert Hoffman was a 20 year veteran of?, What was the purpose of 'Operation Pimlico'?, Security Violations are ______ of classified information....

Unite Nations 2025-04-07

Unite Nations crossword puzzle
Across
  1. The official language of the UN that is also widely spoken in Africa.
  2. This country is the most recent member to join the United Nations (as of 2021)
  3. The city where the UN headquarters are located
  4. The economic and social council chamber also called Ecosoc is a gift from .....
  5. Decisions of the General Assembly on important questions shall be made by a ........ majority of the members present and voting.
  6. This is the highest position in the UN.
  7. The country that is a permanent member of the Security Council and has veto power.
  8. The last territory under the Trusteeship Council before gaining independence in 1994
  9. the name 'United Nations' was coined by.....
  10. The number of non-permanent members in the UN Security Council (in letters).
  11. This is the principal organ responsible for the maintenance of international peace and security
Down
  1. UN is an ........ organization.
  2. the term 'United Nations' created ......... the WWII
  3. The UN agency focused on public health (abbreviation)
  4. This UN body oversees the implementation of international law and the legal work of the UN.
  5. The number of official languages in the United Nations (in letters)
  6. The UN organ where each member state has one vote
  7. The country that was the first to sign the UN Charter
  8. The UN agency that promotes education, science, and culture (abbreviation)
  9. How many Vice-President of GA (in letters)

20 Clues: UN is an ........ organization.This is the highest position in the UN.How many Vice-President of GA (in letters)the name 'United Nations' was coined by.....The city where the UN headquarters are locatedThe UN organ where each member state has one votethe term 'United Nations' created ......... the WWII...

War on Terror 2022-06-03

War on Terror crossword puzzle
Across
  1. Mayor of NYC
  2. Washington target
  3. Name given to WTC site
  4. Site of jet recaptured by passengers and crashed
  5. Site of terrorist training camps
  6. Collapsed first
  7. Designation of plane crashed in PA
  8. Blamed but did not have role in attacks
  9. Plane hit first
Down
  1. Last remarks of passenger who helped reclaim PA plane
  2. VP who spoke for administration as the President was returned to Washington
  3. Home to most of the hijackers
  4. Was reading a book to children
  5. Legislative response to attack allowing greater surveillance of people in US
  6. Departure point for two of the crashed jets
  7. Cancelled after second crash
  8. Leader of Al Quaeda
  9. Site of previous al Quada attack on US forces
  10. Security New agency responsible for coordinating surveillance and security in US
  11. Told President of crash

20 Clues: Mayor of NYCCollapsed firstPlane hit firstWashington targetLeader of Al QuaedaName given to WTC siteTold President of crashCancelled after second crashHome to most of the hijackersWas reading a book to childrenSite of terrorist training campsDesignation of plane crashed in PABlamed but did not have role in attacks...

The New Deal 2024-05-11

The New Deal crossword puzzle
Across
  1. United States Housing Authority built public housing
  2. Public Works of Art Project employed artists
  3. Federal Emergency Relief Administration provided direct relief
  4. Civil Works Administration created temporary jobs
  5. Agricultural Adjustment Act helped farmers
  6. Securities and Exchange Commission regulated stock market
  7. National Youth Administration aided students and young people
  8. National Industrial Recovery Act passed
  9. Federal Housing Administration insured mortgages
  10. Federal Deposit Insurance Corporation established
Down
  1. Tennessee Valley Authority built dams and power plants
  2. Social Security Act provided retirement benefits
  3. Works Progress Administration created jobs
  4. Farm Security Administration assisted rural poor
  5. Rural Electrification Administration brought power to farms
  6. Fair Labor Standards Act set minimum wage and maximum hours
  7. Civilian Conservation Corps employed young men
  8. National Labor Relations Act protected unions
  9. National Recovery Administration regulated industries
  10. Home Owners' Loan Corporation refinanced mortgages

20 Clues: National Industrial Recovery Act passedWorks Progress Administration created jobsAgricultural Adjustment Act helped farmersPublic Works of Art Project employed artistsNational Labor Relations Act protected unionsCivilian Conservation Corps employed young menSocial Security Act provided retirement benefits...

Cybersecurity Awareness Month 2024-09-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. Function that converts data into a fixed size
  2. Measures taken to protect data
  3. Impersonating someone or something to deceive
  4. Securing data by converting it into code
  5. Software that records keystrokes
  6. Software that shows unwanted ads
  7. Malware that encrypts files demanding ransom
  8. Attack using trial and error to guess passwords)
  9. Investment scam involving fake accounts
  10. Vulnerabilities exploited before being patched
  11. Fraudulent attempts to steal sensitive information)
Down
  1. Malicious software designed to damage systems
  2. Hidden way of bypassing security controls
  3. Virtual Private Network for secure connections
  4. Software that collects data secretly
  5. Online harassment or bullying
  6. Multi-Factor Authentication
  7. Self-replicating malware that spreads across networks)
  8. Image, video or audio generated by AI
  9. A system that protects networks
  10. Network of compromised computers under attacker control)
  11. Software update to fix security vulnerabilities

22 Clues: Multi-Factor AuthenticationOnline harassment or bullyingMeasures taken to protect dataA system that protects networksSoftware that records keystrokesSoftware that shows unwanted adsSoftware that collects data secretlyImage, video or audio generated by AIInvestment scam involving fake accountsSecuring data by converting it into code...

BY THE NUMBERS 2025-07-28

BY THE NUMBERS crossword puzzle
Across
  1. Obama's number, loudly?
  2. Digits binding a book
  3. Many eggs — or guesses
  4. FINISH Finale worth counting down?
  5. Stationary number that rings back?
  6. SIZE Feet get numbered here
  7. Tiny unit making call?
  8. Cash count for drip?
  9. Proof numbers add up?
  10. PRICE Shocking tag figure?
  11. Twenty or tally?
  12. Numbered ticket abroad?
  13. Coverage with numbers attached?
  14. Typing speed indicator?
Down
  1. Count on these fingers?
  2. COUNT Total number of dead?
  3. Up to them? Stylish!
  4. One up? Take off!
  5. One card to win?
  6. Where country charts rise?
  7. Earned or rotated numbers?
  8. Number with moves?
  9. Sixteen-point code format?
  10. Numbered right to operate?
  11. SECURITY Public safety number?
  12. Numbered top or state?
  13. PIECE Matched pair worn out?
  14. Number to follow up?
  15. Four-digit security key
  16. 2025, in Rome’s eyes?

30 Clues: One card to win?Twenty or tally?One up? Take off!Number with moves?Up to them? Stylish!Cash count for drip?Number to follow up?Digits binding a bookProof numbers add up?2025, in Rome’s eyes?Many eggs — or guessesTiny unit making call?Numbered top or state?Count on these fingers?Obama's number, loudly?Numbered ticket abroad?Four-digit security key...

IT 2025-09-11

IT crossword puzzle
Across
  1. a type of virus
  2. storage on the internet you can accsess from everywhere
  3. a security barrier that save your PC
  4. a type of storage in your PC
  5. a small computer in your pocket
  6. a error in a software
  7. a faster storage in the computer
  8. a software update that fixes bugs
  9. calculate almost everything in the computer
  10. you see on it what you doing on your computer
  11. give electiricy for the computer
Down
  1. a temporary astorage for faster data access
  2. a robot that act like humans
  3. you get WiFi from it
  4. you can write on your comuter with it
  5. the delay of data transfer
  6. a protocol for secure remote access
  7. a sercet word or a code for security
  8. a copy of a data for safety
  9. the short version of the graphics card

20 Clues: a type of virusyou get WiFi from ita error in a softwarethe delay of data transfera copy of a data for safetya robot that act like humansa type of storage in your PCa small computer in your pocketa faster storage in the computergive electiricy for the computera software update that fixes bugsa protocol for secure remote access...

Complexity Cross V3 2024-08-25

Complexity Cross V3 crossword puzzle
Across
  1. What Optic has on his forehead
  2. The artifact that turned Blackwell into Obscurant
  3. One of Cove's hobbies
  4. _____ 2, the planet where the story takes place
  5. Fletcher has two cameras, a regular and a
  6. When Cyber was injured, he was forced to replace his waist, arm, and
  7. Commonly known as "Poof Pods"
Down
  1. Sage's age when he left Misty Forest Island
  2. The Life _____, the object that gives Sage his powers
  3. The Optic's top assassin
  4. The first name of the man who betrayed Stratus

11 Clues: One of Cove's hobbiesThe Optic's top assassinCommonly known as "Poof Pods"What Optic has on his foreheadFletcher has two cameras, a regular and aSage's age when he left Misty Forest IslandThe first name of the man who betrayed Stratus_____ 2, the planet where the story takes placeThe artifact that turned Blackwell into Obscurant...

Bullying Crossword 2023-02-28

Bullying Crossword crossword puzzle
Across
  1. the act of treating another person abusively
  2. using words to promote violence on somebody
  3. a person who is habitually cruel and threatening
  4. this type of bullying is online
  5. facebook, instagram,twitter are all examples
Down
  1. this type of bullying involves hurting them physically
  2. a person who tries to stop the bullying
  3. these are lies that are spread
  4. the person who is getting bullied
  5. this can be low on people who are bullied
  6. people who are bullied can feel this

11 Clues: these are lies that are spreadthis type of bullying is onlinethe person who is getting bulliedpeople who are bullied can feel thisa person who tries to stop the bullyingthis can be low on people who are bulliedusing words to promote violence on somebodythe act of treating another person abusivelyfacebook, instagram,twitter are all examples...

TTS MEDIA DIGITAL QUINSHA 2025-03-14

TTS MEDIA DIGITAL QUINSHA crossword puzzle
Across
  1. sesuatu yang berhubungan dengan sistem komputer dan informasi
  2. sesuatu yg dilindungi
  3. pengambilan karangan org lain
  4. informasi pribadi
Down
  1. tiktok merupakan aplikasi
  2. informasi yang tersedia melalui media atau produk elektronik
  3. tindakan ilegal yang dilakukan melalui internet dan komputer
  4. seperangkat aturan yang harus diikuti saat membuat dan mengelola konten, baik di media sosial maupun di tempat umum.
  5. perangkat lunak atau aplikasi yang memungkinkan berbagai layanan dan aplikasi online untuk saling terhubung.
  6. sekelompok orang yang hadir atau mendengarkan suatu acara, pidato, atau presentasi
  7. berita yg tidak benar

11 Clues: informasi pribadisesuatu yg dilindungiberita yg tidak benartiktok merupakan aplikasipengambilan karangan org laininformasi yang tersedia melalui media atau produk elektroniktindakan ilegal yang dilakukan melalui internet dan komputersesuatu yang berhubungan dengan sistem komputer dan informasi...

SEDSEWWE 2023-11-10

SEDSEWWE crossword puzzle
Across
  1. - Eine positive göttliche Gabe, oft zu besonderen Anlässen gewünscht
  2. - Die festlichen Feierlichkeiten zu besonderen Anlässen
  3. - Eines der Rentiere des Weihnachtsmanns
  4. - Ein festliches Geflügelgericht, oft zu Weihnachten gegessen
  5. - Helle und warme Strahlen vom Himmel
Down
  1. - Das Geben und Empfangen von Geschenken, oft in der Familie
  2. - Ein aromatisches Kraut, oft in Süßigkeiten und Getränken verwendet
  3. - Ein immergrüner Baum, oft als Weihnachtsbaum verwendet
  4. - Ein besonderer Tag, oft arbeits
  5. - Eine angenehme und entspannte Atmosphäre, besonders zu festlichen Zeiten
  6. Montag - Der Montag nach Thanksgiving, bekannt für Online-Shopping-Angebote

11 Clues: - Ein besonderer Tag, oft arbeits- Helle und warme Strahlen vom Himmel- Eines der Rentiere des Weihnachtsmanns- Die festlichen Feierlichkeiten zu besonderen Anlässen- Ein immergrüner Baum, oft als Weihnachtsbaum verwendet- Das Geben und Empfangen von Geschenken, oft in der Familie- Ein festliches Geflügelgericht, oft zu Weihnachten gegessen...

Crossword Gleitzbe 2020-03-02

Crossword Gleitzbe crossword puzzle
Across
  1. Ursache
  2. emotional
  3. Klima
  4. mächtig, kräftig, stark
  5. glänzend
  6. Feuerwehrmann
  7. Dürre, Trockenheit
  8. Reservat, Reservation
  9. sprechend
  10. Entdeckung
  11. Sicherheit
Down
  1. vergleichen
  2. Stille, Schweigen
  3. Schritt
  4. Umwelt
  5. staubig
  6. Ödland
  7. Lagerfeuer
  8. Flamme
  9. neutral
  10. Brühmtheit
  11. verbrannt
  12. Motor, Maschine
  13. Prärie

24 Clues: KlimaUmweltÖdlandFlammePrärieUrsacheSchrittstaubigneutralglänzendemotionalverbranntsprechendLagerfeuerBrühmtheitEntdeckungSicherheitvergleichenFeuerwehrmannMotor, MaschineStille, SchweigenDürre, TrockenheitReservat, Reservationmächtig, kräftig, stark

Do you know the words? 2021-01-08

Do you know the words? crossword puzzle
Across
  1. Sitzplatz
  2. lösen
  3. Privatsphäre
  4. aufsperren
  5. Sicherheit
  6. befördern
  7. Akku
  8. Freiwillige
  9. Kopfkissen
  10. verhindern
  11. Netzwerk
  12. Behinderung
  13. Reifen
  14. kompliziert
  15. Raum
Down
  1. Windschutzscheibe
  2. nachverfolgen
  3. Reparatur
  4. Waren
  5. verbessern
  6. Daten
  7. Drohne
  8. Dach
  9. Haushaltsgeräte
  10. Lautsprecher
  11. Roboter
  12. verringern

27 Clues: DachAkkuRaumlösenWarenDatenDrohneReifenRoboterNetzwerkSitzplatzReparaturbefördernverbessernaufsperrenSicherheitKopfkissenverhindernverringernFreiwilligeBehinderungkompliziertPrivatsphäreLautsprechernachverfolgenHaushaltsgeräteWindschutzscheibe

Vizzard Challenge 2016-12-19

Vizzard Challenge crossword puzzle
Across
  1. r
  2. w
  3. n
  4. v
  5. Final
  6. b
  7. e
  8. q
  9. g
  10. j
  11. d
  12. s
  13. y
Down
  1. h
  2. k
  3. x
  4. t
  5. z
  6. o
  7. c
  8. i
  9. u
  10. l
  11. a
  12. p
  13. f
  14. m

27 Clues: hrkwnvxtzociulabeqgpfjdsmyFinal

gkhvvvlxxv 2021-10-14

gkhvvvlxxv crossword puzzle
Across
  1. hurry
  2. long but more
  3. straight
  4. alone
  5. youtube reaction vid
  6. saving
  7. safety
  8. ball hit target
  9. quizzes
  10. cream
  11. children
Down
  1. car place
  2. sunny city
  3. chicken
  4. carfuel
  5. come over
  6. close
  7. all of the things
  8. just us
  9. staying alive

20 Clues: hurryclosealonecreamsavingsafetychickencarfueljust usquizzesstraightchildrencar placecome oversunny citylong but morestaying aliveball hit targetall of the thingsyoutube reaction vid

unit 2 lesson 4 Sam 2023-12-06

unit 2 lesson 4 Sam crossword puzzle
Across
  1. kogels
  2. monument
  3. marinier
  4. burger
  5. pot
  6. plicht(millitaire dienst}
  7. geschikt
  8. zenuwachtig
  9. je hebt brandweer ambulance en .....
  10. beveiliger
Down
  1. vrijheid
  2. gevecht
  3. je kan er mee vliegen (geen vliegtuig)
  4. verpleegkundige
  5. leger
  6. echt
  7. boete
  8. bom
  9. tegen overgesteld van onveilig
  10. geweer

20 Clues: potbomechtlegerboetekogelsburgergeweergevechtvrijheidmonumentmariniergeschiktbeveiligerzenuwachtigverpleegkundigeplicht(millitaire dienst}tegen overgesteld van onveiligje hebt brandweer ambulance en .....je kan er mee vliegen (geen vliegtuig)

Scene 3 Society 2024-10-08

Scene 3 Society crossword puzzle
Across
  1. oikeus
  2. demokratia
  3. kansalainen
  4. viranomaiset
  5. verot
  6. hyvinvointi
  7. maastamuuttaja
  8. tasa-arvo
  9. sosiaaliturva
  10. tasavalta
  11. yhteiskunta
Down
  1. maahanmuuttaja
  2. yhteisö
  3. terveydenhuolto
  4. yhteiskuntaoppi
  5. köyhyys
  6. pakolainen
  7. koulutus
  8. turvapaikanhakija
  9. epätasa-arvo
  10. velvollisuus
  11. etninen tausta
  12. talous

23 Clues: verotoikeustalousyhteisököyhyyskoulutustasa-arvotasavaltademokratiapakolainenkansalainenhyvinvointiyhteiskuntaviranomaisetepätasa-arvovelvollisuussosiaaliturvamaahanmuuttajamaastamuuttajaetninen taustaterveydenhuoltoyhteiskuntaoppiturvapaikanhakija

Travel Chap 4 vocab 2020-04-02

Travel Chap 4 vocab crossword puzzle
Across
  1. controller
  2. safety belt
  3. flight attendent
  4. to miss
  5. passenger
  6. trip; travel
  7. seat
  8. customs
  9. visa
  10. event ticket
  11. sleeping car
  12. to get/obtain
  13. arrival
  14. to land
  15. bunk
  16. aisle
  17. international airport
  18. to hope
  19. waiting room
  20. flight
  21. to give
  22. to see
  23. second class
  24. security agent
  25. on time
Down
  1. passport
  2. gate
  3. coach
  4. boarding pass
  5. platform
  6. luggage screening
  7. carry-on baggage
  8. in the airport
  9. connection
  10. baggage claim
  11. ticket window
  12. to go through security
  13. departure
  14. delayed
  15. window
  16. to take off
  17. car wagon
  18. first class
  19. suitcase
  20. counter
  21. to board
  22. to check luggage
  23. to go straight
  24. in the train station
  25. stop
  26. ticket
  27. delayed
  28. ticket
  29. to turn

54 Clues: gateseatvisabunkstopcoachaislewindowflightticketto seeticketto misscustomsdelayedarrivalto landcounterto hopeto givedelayedto turnon timepassportplatformsuitcaseto boardpassengerdeparturecar wagoncontrollerconnectionsafety beltto take offfirst classtrip; travelevent ticketsleeping carwaiting roomsecond classboarding passbaggage claimticket window...

aviation 2024-07-01

aviation crossword puzzle
Across
  1. where you go to change your money.
  2. where you get on the plane, or where the plane is sitting.
  3. where you go when you are flying somewhere.
  4. something 2 airlines do.
  5. flight thats destination is within the same country.
  6. to reduce lift and increase drag.
  7. abbreviation for passengers.
  8. flight coming into our country.
  9. abbreviation for on time performance.
Down
  1. main body of the plane.
  2. a crash or collision on the runway.
  3. helps turn the plane.
  4. flight leaving our country.
  5. illegal things like drugs.
  6. after youve gone through security you are here.
  7. where general public can be in an airport.
  8. pockets of disturbed air.
  9. where you and your carry on luggage get checked.
  10. where you go when you first get to the airport.
  11. abbreviation for senior flight attendant.

20 Clues: helps turn the plane.main body of the plane.something 2 airlines do.pockets of disturbed air.illegal things like drugs.flight leaving our country.abbreviation for passengers.flight coming into our country.to reduce lift and increase drag.where you go to change your money.a crash or collision on the runway.abbreviation for on time performance....

Wellbeing 2021-08-22

Wellbeing crossword puzzle
Across
  1. Areas of or occupying different spaces
  2. Being free from danger or threats
  3. The people who live in a certain place
  4. The study of human populations
  5. The ability to be maintained at a certain level
  6. Living without access to basic needs and income
  7. Death
  8. The process of using resources
  9. The facilities needed for a society to function
  10. Something that shows the state of wellbeing
  11. A subjective measurement of perceived value
Down
  1. An objective measurement of numerical value
  2. An individual’s level of health, security and comfort
  3. A prediction about how things will occur
  4. Levels of wealth and social interactions
  5. The ability to reproduce
  6. The patterns in which things are spread out in an area
  7. A process of growth or advancement
  8. Clean water and waste removal systems
  9. A comparison of different rates of an occurrence

20 Clues: DeathThe ability to reproduceThe study of human populationsThe process of using resourcesBeing free from danger or threatsA process of growth or advancementClean water and waste removal systemsAreas of or occupying different spacesThe people who live in a certain placeA prediction about how things will occurLevels of wealth and social interactions...

Thirteen Days 2023-01-22

Thirteen Days crossword puzzle
Across
  1. United States Junior senetor from New York
  2. country with communist government
  3. meeting room for the cabinet secretaries
  4. an unsuccesful invasion of Cuban exiles
  5. United States's prime federal law enforcement agency
  6. was Main security agency for the soviet union
  7. state of political tension between US and soviet
  8. Intergovernmental organization to stop wars
  9. Cuban prime minister from 1959 1976
Down
  1. 35th President of the United States
  2. High-altitude reconnassiance aircraft
  3. Country between Canada and Mexico
  4. John F. Kennedy confrence room in basement
  5. five progressive levels of alerts used by the US
  6. Organisation of the US used for global monitoring
  7. gathers and analyzes national security information
  8. Soviet politician during the cold war
  9. closing off a place by hostile
  10. Country by the gulf of Mexico and the Atlantic ocean
  11. Most commonly refers to the Soviet Union

20 Clues: closing off a place by hostileCountry between Canada and Mexicocountry with communist government35th President of the United StatesCuban prime minister from 1959 1976High-altitude reconnassiance aircraftSoviet politician during the cold waran unsuccesful invasion of Cuban exilesmeeting room for the cabinet secretaries...

cw-13 2025-11-17

cw-13 crossword puzzle
Across
  1. (Duplicate) Tracking origin and consequence of breaches
  2. Unfair AI outcomes affecting certain groups disproportionately
  3. Passing along a risk/job to someone else
  4. Ethical hacking test of defenses
  5. Summarized results or status document
  6. Defensive security professionals
  7. Technical drawing illustrating data processing pathways
  8. Host-based Intrusion Detection System acronym
  9. (Triplicate) Standard plan to survive IT disasters
  10. Unlocking secret messages with the right key
  11. Industry-recognized certification from IAPP .
  12. Platform used at Tekion for employee compliance and workplace training.
Down
  1. Critical security gate in Tekion’s development lifecycle.
  2. Keeping information secret
  3. What to do to fix trouble spots
  4. Company’s process for oversight and control
  5. Process of grouping personal data into collective insights while masking individual identities
  6. (Duplicate) Collected facts for incident investigation
  7. Importance level assigned to system resources
  8. Payments solution developed and secured by Tekion.

20 Clues: Keeping information secretWhat to do to fix trouble spotsEthical hacking test of defensesDefensive security professionalsSummarized results or status documentPassing along a risk/job to someone elseCompany’s process for oversight and controlUnlocking secret messages with the right keyHost-based Intrusion Detection System acronym...

digitales Arbeiten - digitales Leben 2019-07-04

digitales Arbeiten - digitales Leben crossword puzzle
Across
  1. Was betreiben Geräte, sowie Softwaremodule untereinander?
  2. Muss bei der Umsetzung von Digitalisierung besonders berücksichtigt werden.
  3. Grund, aus dem sich Menschen weniger face-to-face unterhalten?
  4. Andres Wort für Flexibilität.
  5. Größte infrastrukturelle Gefahr?
  6. Wir bei digitalem Lernen nicht mehr benötigt.
  7. Was ist die größte Gefahr bei einer staatlichen App?
  8. Entscheidet wer Schuld an einem Unfall bei autonomen Fahren trägt.
Down
  1. Gerät mit den Fahrzeugreparatur dokumentiert wird.
  2. Folge von Konkurrenz und großen Arbeitsmarkt.
  3. Wirtschaftliche Notwendigkeit die Digitalisierung voranzutreiben.
  4. Spezielle Kommunikationsinfrastruktur für Fahrzeug-zu-Fahrzeug-Kommunikation.
  5. Ein Medium für digitale Kommunikation.
  6. In einer transparenten Gesellschaft kaum vorhanden.
  7. Mobiles Programm für den Nutzer.
  8. Wer meldet zukünftig ein Fahrzeug zur Inspektion an?

16 Clues: Andres Wort für Flexibilität.Größte infrastrukturelle Gefahr?Mobiles Programm für den Nutzer.Ein Medium für digitale Kommunikation.Folge von Konkurrenz und großen Arbeitsmarkt.Wir bei digitalem Lernen nicht mehr benötigt.Gerät mit den Fahrzeugreparatur dokumentiert wird.In einer transparenten Gesellschaft kaum vorhanden....

Financial advice 2025-03-25

Financial advice crossword puzzle
Across
  1. personal pre tax max contribution is 7000
  2. traditional IRA contributes are made
  3. THREE maximum age to start IRA
  4. a item of value held up by belief with no physical commodity
  5. at what age can you invest in crypto
  6. currency backed by the government but not tied to physical commodity.
  7. a tax you pay towards the government thats used for retirement.
  8. what category does crypto fall under
  9. before investing in crypto only invest what your willing to… employer manages pensions
  10. measures the price performance of a basket of securities
  11. a digital ledger of transactions that duplicates and distrbutes across a network.
  12. the availability of cash or the ease in which a asset can convert to cash
Down
  1. the total value of a companies stock
  2. you can collect full benefits for social security
  3. what president created social security
  4. warren buffets first rule
  5. a total amount set aside and dedicated for a specific purpose.
  6. is when equal portions are invested at a market in intervals
  7. Roth IRA contributed are made
  8. if you leave your company you can
  9. what percentage of 18-29 invest in crypto
  10. The biggest fraud in U.S history was ..scandal
  11. Managed by employer contributions are made by you and the state.
  12. Crypto is a risk investment.
  13. social security and medicare together is called
  14. investing all you have into the market at once

26 Clues: warren buffets first ruleCrypto is a risk investment.Roth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canthe total value of a companies stocktraditional IRA contributes are madeat what age can you invest in cryptowhat category does crypto fall underwhat president created social security...

Investing Patrick McVeigh 2025-03-25

Investing Patrick McVeigh crossword puzzle
Across
  1. personal pre tax max contribution is 7000
  2. traditional IRA contributes are made
  3. THREE maximum age to start IRA
  4. a item of value held up by belief with no physical commodity
  5. at what age can you invest in crypto
  6. currency backed by the government but not tied to physical commodity.
  7. a tax you pay towards the government thats used for retirement.
  8. what category does crypto fall under
  9. before investing in crypto only invest what your willing to… employer manages pensions
  10. measures the price performance of a basket of securities
  11. a digital ledger of transactions that duplicates and distrbutes across a network.
  12. the availability of cash or the ease in which a asset can convert to cash
Down
  1. the total value of a companies stock
  2. you can collect full benefits for social security
  3. what president created social security
  4. warren buffets first rule
  5. a total amount set aside and dedicated for a specific purpose.
  6. is when equal portions are invested at a market in intervals
  7. Roth IRA contributed are made
  8. if you leave your company you can
  9. what percentage of 18-29 invest in crypto
  10. The biggest fraud in U.S history was ..scandal
  11. Managed by employer contributions are made by you and the state.
  12. Crypto is a risk investment.
  13. social security and medicare together is called
  14. investing all you have into the market at once

26 Clues: warren buffets first ruleCrypto is a risk investment.Roth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canthe total value of a companies stocktraditional IRA contributes are madeat what age can you invest in cryptowhat category does crypto fall underwhat president created social security...

Investing 2025-03-25

Investing crossword puzzle
Across
  1. Is Crypto a high or low-risk investment?
  2. Currencies that are created and backed by government, but not tied to or backed by the value of any physical commodity
  3. CEO of Berkshire Hathaway
  4. Warren Buffet’s first rule is to never ___ money.
  5. How many days do you have to rollover your 401k funds?
  6. A sum of money made available for a particular purpose
  7. For education expenses
  8. A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.
  9. Nationally or Internationally recognized, Well Established & Financially Sound Company
  10. Market Capitalization is the total ___ of a company’s stock.
  11. A Lump Sum is better for ___ Risk Tolerance Investors
  12. Roth IRA contributions are made ___ tax.
Down
  1. A fund saved for unexpected expenses.
  2. For planned expenses like a new car or vacation
  3. For unexpected events, such as a tornado
  4. A mutual fund takes cash from ___ and invests in stocks, bonds, and other securities.
  5. Age to receive full social security benefits
  6. Traditional IRA contributions are made ___ tax.
  7. Make money with stocks by Buying ___ and selling ___
  8. Which President created Social Security?
  9. A Blue Chip Company is an example of a liquid or illiquid stock?
  10. Markets rising
  11. Social Security and Medicare taxes
  12. Markets falling
  13. A collection of stocks, bonds, or other assets that trades on a stock exchange

25 Clues: Markets risingMarkets fallingFor education expensesCEO of Berkshire HathawaySocial Security and Medicare taxesA fund saved for unexpected expenses.Is Crypto a high or low-risk investment?For unexpected events, such as a tornadoWhich President created Social Security?Roth IRA contributions are made ___ tax....

1.8 Summarize evolving use cases for modern network environments 2025-08-06

1.8  Summarize evolving use cases for modern network environments crossword puzzle
Across
  1. Allows one place to manage network rules and settings
  2. Wraps IPv6 traffic so it can travel over an IPv4 network
  3. Auto configures new devices without manual setup
  4. Gives users only the access they absolutely need
  5. Uses code to provision and manage IT infrastructure
  6. Lets devs work on separate features without conflict
  7. Tracks changes made to code and allows rollbacks
  8. Used for Layer 2 over Layer 3 tunneling in data centers
  9. Extends SDN to wide area networks for better performance
  10. Enforces access based on set conditions and user roles
  11. Separates control and data planes to simplify network management
Down
  1. Central place where code is stored and managed
  2. Adjusts network behavior based on type of traffic or app
  3. Designed to replace IPv4 and fix address exhaustion
  4. Grants permission to access network resources
  5. Can use any type of network link like LTE, broadband, or MPLS
  6. Used in automation tools like Ansible for repeatable tasks
  7. Runs IPv4 and IPv6 on the same system side by side
  8. Network security model with no implicit trust
  9. Connects two or more data center locations
  10. Subset of SASE focused purely on security services
  11. Happens when config changes outside the defined code
  12. Dynamic list of systems automatically updated for automation
  13. Framework that combines networking and security in the cloud
  14. Allows IPv6-only devices to communicate with IPv4 hosts

25 Clues: Connects two or more data center locationsGrants permission to access network resourcesNetwork security model with no implicit trustCentral place where code is stored and managedAuto configures new devices without manual setupGives users only the access they absolutely needTracks changes made to code and allows rollbacks...

When will the nations proclaim ‘peace and security’? 2025-11-24

When will the nations proclaim ‘peace and security’? crossword puzzle
Across
  1. Inspired foretelling of events, such as Paul’s words to the Thessalonians
  2. The state of readiness needed to avoid being overtaken like a thief
  3. The apostle who wrote about “peace and security” to the Thessalonians
  4. The illustration Paul used to describe how destruction overtakes the unsuspecting
  5. The congregation that received Paul’s inspired letter about sudden destruction
  6. Modern organization symbolized by the scarlet-colored wild beast (two words)
  7. The attitude Jesus counseled his followers to maintain
  8. The second half of the proclamation that signals sudden destruction
  9. Found in Babylon the Great, symbolizing her guilt for wars and violence
  10. The world empire of false religion, also called the great prostitute
  11. The manner in which destruction will come upon the nations
Down
  1. The great time of distress that begins with the fall of Babylon the Great
  2. The first half of the proclamation mentioned by Paul in 1 Thessalonians 5:3
  3. The one who puts "his thought" into the hearts of the nations
  4. What comes instantly after the cry of “peace and security”
  5. Symbolic political powers that give authority to the wild beast
  6. The state of prophecy once events have actually taken place
  7. The global system opposed to true worship, destined for destruction
  8. The scarlet-colored entity representing the United Nations (two words)
  9. What describes the kind of religion that will be destroyed

20 Clues: The attitude Jesus counseled his followers to maintainWhat comes instantly after the cry of “peace and security”What describes the kind of religion that will be destroyedThe manner in which destruction will come upon the nationsThe state of prophecy once events have actually taken placeThe one who puts "his thought" into the hearts of the nations...

Cursinho crossword 2024-04-29

Cursinho crossword crossword puzzle
Across
  1. The act of including everyone and making them feel welcome.
  2. Consequences or outcomes of bullying behavior.
  3. Bullying involving physical force or harm.
  4. Measures or policies aimed at preventing bullying.
  5. Understanding and sharing the feelings of others.
Down
  1. Repeated aggressive behavior intended to harm others.
  2. Treating others with consideration and admiration.
  3. Bullying involving manipulation of social relationships.
  4. Bullying that occurs online or through digital communication.
  5. Measures taken to stop bullying before it occurs.
  6. A group of people sharing common interests or living in the same area.
  7. Bullying using words to harm others.

12 Clues: Bullying using words to harm others.Bullying involving physical force or harm.Consequences or outcomes of bullying behavior.Measures taken to stop bullying before it occurs.Understanding and sharing the feelings of others.Treating others with consideration and admiration.Measures or policies aimed at preventing bullying....

Bullying 2021-11-15

Bullying crossword puzzle
Across
  1. Threats or verbal abuse
  2. A bully is identified not how they look, but rather by their
  3. _____ someone from a group is a form of bullying.
  4. Being a bully makes you a smaller person. Helping others makes you a ____ person.
  5. Bullies can get you in
  6. Bullies can call you
  7. Bullying can be done by an individual or
Down
  1. Bullying can be physical or
  2. Bullying online is called ____ bullying.
  3. If you are bullied, tell an
  4. Bystanders can make bullying worse when they do not
  5. If you see bullying, do not be a

12 Clues: Bullies can call youBullies can get you inThreats or verbal abuseBullying can be physical orIf you are bullied, tell anIf you see bullying, do not be aBullying online is called ____ bullying.Bullying can be done by an individual or_____ someone from a group is a form of bullying.Bystanders can make bullying worse when they do not...

"INFORMATION TECHNOLOGY" 2025-02-12

"INFORMATION TECHNOLOGY" crossword puzzle
Across
  1. relating to or characteristic of the culture of computers, information technology, and virtual reality
  2. creative ability
  3. tools, machinery, and other durable equipment
  4. a first, typical or preliminary model of something
  5. packed together
Down
  1. quick-drying nonmetallic element
  2. made to appear to exist by the use of computer software
  3. a relationship in which a person, thing, or idea is linked or associated with something else
  4. a small usually thin and flat piece
  5. using radio, microwaves to transmit signals
  6. to enable the fast exchange of information
  7. a small mechanical or electronic device or tool

12 Clues: packed togethercreative abilityquick-drying nonmetallic elementa small usually thin and flat pieceto enable the fast exchange of informationusing radio, microwaves to transmit signalstools, machinery, and other durable equipmenta small mechanical or electronic device or toola first, typical or preliminary model of something...

The Crypt 2025-10-04

The Crypt crossword puzzle
Across
  1. Atomic bomb architect turning fission into global deterrence.
  2. Motion laws founder guiding artillery and missile paths.
  3. Radioactivity isolator whose elements enable dirty bombs.
  4. Optics innovator whose lenses evolved into spy satellites.
  5. Uncertainty expert whose physics secures quantum warfare encryption.
  6. Rocket designer whose trajectories fuel ICBM strikes.
Down
  1. Reactor builder whose chains drive submarine nukes.
  2. Electromagnetism inventor inspiring directed-energy weapons.
  3. Mass-energy pioneer whose equation powers nuclear warheads.
  4. Fertilizer chemist whose gases became WWI trench poisons.
  5. Quantum theorist whose models power laser battlefield tech.
  6. Algorithm genius whose codes birthed cyber attack tools.

12 Clues: Reactor builder whose chains drive submarine nukes.Rocket designer whose trajectories fuel ICBM strikes.Motion laws founder guiding artillery and missile paths.Algorithm genius whose codes birthed cyber attack tools.Radioactivity isolator whose elements enable dirty bombs.Fertilizer chemist whose gases became WWI trench poisons....

En El Aeropuerto 2023-10-26

En El Aeropuerto crossword puzzle
Across
  1. suitcase
  2. terminal
  3. seat
  4. security
  5. pilot
  6. flight attendant
Down
  1. luggage
  2. airport
  3. desk/booth
  4. passport
  5. customs/immigration
  6. flight
  7. airplane
  8. ticket

14 Clues: seatpilotflightticketluggageairportpassportsuitcaseterminalsecurityairplanedesk/boothflight attendantcustoms/immigration

McKnight Crossword 2024-09-27

McKnight Crossword crossword puzzle
Across
  1. at McKnight we are the
  2. bald security guard
  3. teacher who plays French horn
  4. the kind of standing you have to be on to attend dances and events
  5. the Lancer Way is respect, responsibility, integrity, and
  6. one of the tallest seventh graders
  7. name of 8th grade assistant principal
  8. name of 7th grade assistant principal
  9. she's on the Eastside FC soccer team
  10. used to teach math but now teaches PE
Down
  1. security guard with dreads
  2. nice loud best student who plays basketball and has lots of friends
  3. our school colors are black, grey, yellow, and
  4. name of principal
  5. tallest teacher
  6. she'll find your fingerprint because she teaches forensics
  7. likes funko pops and teaches math
  8. teacher who likes classical music
  9. obsessed with Walker Scobell

19 Clues: tallest teachername of principalbald security guardat McKnight we are thesecurity guard with dreadsobsessed with Walker Scobellteacher who plays French hornlikes funko pops and teaches mathteacher who likes classical musicone of the tallest seventh gradersshe's on the Eastside FC soccer teamname of 8th grade assistant principal...

School Crossword 2024-04-17

School Crossword crossword puzzle
Across
  1. Uses painting, sketching, sculpting
  2. Also known as social studies, about the past
  3. Acronym for "Physical Education", sports
  4. Playing a board game with pawns, rooks, knights, etc.
  5. Playing instruments to make songs
  6. Expressing yourself through movement to a song
  7. Some types of it are chemistry, biology, and space
  8. Using numbers and symbols to calculate things
  9. Designing an building structures
  10. Using robots and legos through programming
Down
  1. The things/activity done in PE
  2. Also known as acting
  3. Reading and Writing are both apart of this subject
  4. Designing technology to a cyber level
  5. The language used in Cuba, Puerto Rico, Spain, etc.
  6. The "umbrella term" for chorus, band, dance, etc.
  7. Singing songs and music in a group

17 Clues: Also known as actingThe things/activity done in PEDesigning an building structuresPlaying instruments to make songsSinging songs and music in a groupUses painting, sketching, sculptingDesigning technology to a cyber levelAcronym for "Physical Education", sportsUsing robots and legos through programmingAlso known as social studies, about the past...

Cyber Crossword #2 2024-03-28

Cyber Crossword #2 crossword puzzle
Across
  1. Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future.
  2. The selection of combinations of conditions, parameters, features, and specifications of a system.
  3. A process intended to eliminate as many security risks as possible by implementing security controls (e.g., changing default passwords, enabling security settings, and protecting privileged accounts), patching vulnerabilities, turning off nonessential services, and removing all nonessential software programs, protocols, and utilities from the system.
  4. ​​A physical USB smart card, or hard token, that may be used to log in to your desktop​​​​​​​. YubiKeys offer better security, usability and reliability and can be used as either the primary authentication device or as a companion to a smartphone.
  5. A c​loud based solution with Multi-Factor Authentication (MFA) and Single-Sign On capabilities that grant users access to applications, systems and servers after they have successfully presented one or more forms of verification to prove their identity.
  6. An intentional, deliberate act to misrepresent the truth or conceal a material fact for personal gain, or to persuade another to act upon it to his or her detriment.
Down
  1. ​A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. This is usually done via email.
  2. ​The verification of a user’s identity by a system.
  3. The measure of a system’s ability to handle varying amounts of work by adding or removing resources from the system. For example, a scalable web application is one that works well with one user or many users, and that gracefully handles peaks and dips in traffic.
  4. A broad reference to third-party services that are accessible via the internet. Types of cloud services can include Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS).
  5. The ability to automate scaling up or scaling down. Elasticity is used to meet sudden bursts in capacity while agility is used to address more predictable and even planned demand and workload requirements.
  6. Setting clear expectations for the conduct (behaviors and actions) of the entity being governed and directing, controlling, and strongly influencing the entity to achieve these expectations. This includes specifying a framework for decision making, with assigned decision rights and accountability, intended to consistently produce desired behaviors and actions.

12 Clues: ​The verification of a user’s identity by a system.The selection of combinations of conditions, parameters, features, and specifications of a system.Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future....

Hacktivism Vocabulary Crossword 2 2023-05-09

Hacktivism Vocabulary Crossword 2 crossword puzzle
Across
  1. protecting an organization and its employees against cyber threats
  2. a person or thing likely to cause damage or danger
  3. a hacker with bad intentions
Down
  1. an attempt by hackers to damage or destroy a computer network or system
  2. a legal hacker hired by a company or government
  3. reveal
  4. take something that is not yours
  5. to search

8 Clues: revealto searcha hacker with bad intentionstake something that is not yoursa legal hacker hired by a company or governmenta person or thing likely to cause damage or dangerprotecting an organization and its employees against cyber threatsan attempt by hackers to damage or destroy a computer network or system

stay safe online 2020-05-06

stay safe online crossword puzzle
Across
  1. _ keeping personal information safe
  2. - your own information
Down
  1. - spending to much time online
  2. - when someone asks for pictures
  3. - being bullied online
  4. - making sure your safe

6 Clues: - being bullied online- your own information- making sure your safe- spending to much time online- when someone asks for pictures_ keeping personal information safe

history crossword 7 2022-12-14

history crossword 7 crossword puzzle
Across
  1. AAA
  2. roosevelt
  3. CCC
  4. bank-holiday
  5. demagogues
Down
  1. social-security-act
  2. fireside-chats
  3. new-deal

8 Clues: AAACCCnew-dealrooseveltdemagoguesbank-holidayfireside-chatssocial-security-act

CNSSINST 4009 (2005) 2022-11-30

CNSSINST 4009 (2005) crossword puzzle
Across
  1. What is the PUB CNSSINT 4009 (2015)?
  2. The process of verifying the identity or other attributes claimed by or assumed
  3. The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals.
  4. The property of being accessible and useable upon demand by an authorized entity
  5. an entity (user, process, or device), or to verify the source and integrity of
  6. Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
  7. policy.
  8. A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related
Down
  1. The official management decision given by a senior organizational official to
  2. organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
  3. A category within a given security classification limiting entry or system connectivity to only authorized persons.
  4. Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.
  5. Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the
  6. Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts
  7. operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or
  8. of systems.
  9. The process of granting or denying specefic request:1) for obtaining and using information and related information processing services.

17 Clues: policy.of systems.What is the PUB CNSSINT 4009 (2015)?The official management decision given by a senior organizational official toan entity (user, process, or device), or to verify the source and integrity ofThe process of verifying the identity or other attributes claimed by or assumed...

Ben's Crossword puzzle for Bullying 2014-06-18

Ben's Crossword puzzle for Bullying crossword puzzle
Across
  1. A type of bulling that Is said
  2. Someone you can tell
  3. You can do this to a bully online
  4. A website bulling can happen on
  5. Something you can get when you are being bullied
  6. Another Word for Rude
  7. The Person that watches the bulling happen
  8. The person being bullied
  9. someone else you can tell
Down
  1. You can do this to stop it from happening
  2. these people can stand up for you
  3. The person doing the bullying
  4. A word for over and over again
  5. Another thing you can do to stop it from happening
  6. A type of bulling over the internet
  7. A type of bulling that can involve kicking and punching

16 Clues: Someone you can tellAnother Word for RudeThe person being bulliedsomeone else you can tellThe person doing the bullyingA type of bulling that Is saidA word for over and over againA website bulling can happen onthese people can stand up for youYou can do this to a bully onlineA type of bulling over the internet...

Computer vocabulary and jargon 2024-01-10

Computer vocabulary and jargon crossword puzzle
Across
  1. special words by people who do the same kind of work
  2. a program that destroys your data
  3. the imaginary place where emails exist
  4. related to Internet
  5. the name you use to operate computer system
  6. a connection between one file or documents
  7. software designed to perform a specific task, such as word processing or web browsing
Down
  1. software used to access and view websites
  2. the secret numbers or letters
  3. perform the actions that let you start to use a computer
  4. software that detects and removes viruses and other malware
  5. break someone's computer
  6. move the text on a screen up
  7. software that protects a computer from unauthorized access
  8. unwanted email advertisements
  9. do a search

16 Clues: do a searchrelated to Internetbreak someone's computermove the text on a screen upthe secret numbers or lettersunwanted email advertisementsa program that destroys your datathe imaginary place where emails existsoftware used to access and view websitesa connection between one file or documentsthe name you use to operate computer system...

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. One of the researchers/economists who developed the CAPM model
  2. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  3. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
  4. --------------------is the slope of the security characteristic line
  5. The line representing CAPM is the -----------------market line
  6. A conditional market order to sell stock if it drops to a given price (write without space)
  7. The other name for non-diversifiable risk is -------------------------risk
  8. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  9. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
  10. An opportunity where an investor earns riskless profit without making any net investment
Down
  1. CAPM is a market --------------model
  2. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
  3. In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable
  4. The economist who developed the Arbitrage Pricing Theory (APT) model
  5. The other name for indifference curve is --------------curve
  6. Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
  7. The economist who laid the foundations for the Modern Portfolio theory
  8. In the absence of secondary markets, this risk would be higher
  9. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions

19 Clues: CAPM is a market --------------modelThe other name for indifference curve is --------------curveOne of the researchers/economists who developed the CAPM modelThe line representing CAPM is the -----------------market lineIn the absence of secondary markets, this risk would be higher--------------------is the slope of the security characteristic line...

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  2. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  5. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  8. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  9. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  10. OF SERVICE (DOS)
Down
  1. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  4. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  5. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  6. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  7. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
  8. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  9. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  10. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  11. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.

21 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang....

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  2. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  3. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  4. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  5. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  6. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  7. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
Down
  1. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  2. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  4. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  5. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  6. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  7. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  8. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  9. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  10. OF SERVICE (DOS)
  11. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  12. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

21 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang....

Vocabulario - el aeropuerto crucigrama 2024-05-13

Vocabulario - el aeropuerto crucigrama crossword puzzle
Across
  1. - the hallwaybaggage claim
  2. - the cabin
  3. - suitcase
  4. - the sign
  5. - the ticket
  6. - exit
  7. - arrival
  8. - the counter
  9. - the luggage
Down
  1. - the window
  2. to fly
  3. - begin
  4. - customs
  5. - the flight
  6. - the seat
  7. - security
  8. - the trip
  9. - the passanger
  10. - delay

19 Clues: to fly- exit- begin- delay- customs- arrival- suitcase- the seat- the sign- security- the trip- the cabin- the window- the flight- the ticket- the counter- the luggage- the passanger- the hallwaybaggage claim

11.5 2023-03-28

11.5 crossword puzzle
Across
  1. The implementation name for wireless security that adheres to the 802.11i specifications.
  2. This proves the users identity.
  3. This combines two non-overlapping 20MHZ channels into a single 40MHz channel.
  4. Many networks implement this.
  5. This was developed at MIT and is a key component of Windows Active Directory.
  6. This increases bandwidth by using multiple antennas for both the transmitter and receiver.
  7. This logs what the user accessed while on the network.
Down
  1. This defines what the user can access.
  2. This is the standard for local networks created by IEEE-SA.
  3. This has no authentication and allows anyone to connect to the network.
  4. This was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
  5. This uses radio waves to transmit data from small circuit boards to special scanners.
  6. This is a newer technology that is built on RFID.
  7. This was developed by Cisco to address security concerns in RADIUS.
  8. This is based on the Rijndael algorithm.
  9. This was used with WPA and WPA2 wireless security standards.
  10. This is and enhancement to MIMO that allows users to use the same channel.
  11. This is designed to allow devices to communicate withing a personal area network of close proximity.
  12. This is most commonly used access method.
  13. This is an open standard protocol used to authenticate users onto a network.

20 Clues: Many networks implement this.This proves the users identity.This defines what the user can access.This is based on the Rijndael algorithm.This is most commonly used access method.This is a newer technology that is built on RFID.This logs what the user accessed while on the network.This is the standard for local networks created by IEEE-SA....

Investing Patrick McVeigh 2025-03-25

Investing Patrick McVeigh crossword puzzle
Across
  1. investing all you have into the market at once
  2. what category does crypto fall under
  3. if you leave your company you can
  4. the total value of a companies stock
  5. before investing in crypto only invest what your willing to… employer manages pensions
  6. at what age can you invest in crypto
  7. The biggest fraud in U.S history was ..scandal
  8. a item of value held up by belief with no physical commodity
  9. you can collect full benefits for social security
  10. traditional IRA contributes are made
  11. the availability of cash or the ease in which a asset can convert to cash
  12. currency backed by the government but not tied to physical commodity.
  13. a total amount set aside and dedicated for a specific purpose.
  14. social security and medicare together is called
  15. is when equal portions are invested at a market in intervals
Down
  1. what president created social security
  2. THREE maximum age to start IRA
  3. a tax you pay towards the government thats used for retirement.
  4. personal pre tax max contribution is 7000
  5. warren buffets first rule
  6. Crypto is a risk investment.
  7. measures the price performance of a basket of securities
  8. what percentage of 18-29 invest in crypto
  9. Managed by employer contributions are made by you and the state.
  10. Roth IRA contributed are made
  11. a digital ledger of transactions that duplicates and distrbutes across a network.

26 Clues: warren buffets first ruleCrypto is a risk investment.Roth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canwhat category does crypto fall underthe total value of a companies stockat what age can you invest in cryptotraditional IRA contributes are madewhat president created social security...

Terms 2021-08-20

Terms crossword puzzle
Across
  1. the "P" in PED
  2. the W in JWICS stands for
  3. Signals intelligence is abbreviated as
  4. the "C" in JWICS
  5. FDO is the Foreign _______ Officer
  6. information protected by SI caveat
  7. SIO is the ________ Intelligence Officer
  8. You signed an NDA when you were first read into this information
Down
  1. each facility must have an Emergency _____ Plan
  2. The "A" in SAP stands for
  3. Codeword for the U-2 program in the 50s
  4. CSA is Cognizant Security ________
  5. ORCON stands for ________ Controlled
  6. Each time you are INDOCed into SCI you sign a Non-________ Statement
  7. Codeword for the corona satellite program in the 60s
  8. Sub-compartment of SI
  9. Intelligence gained from human efforts
  10. the "C" in the acronym IC
  11. SSO stands for ______ Security Officer
  12. We mainly work in Sensitive _______ Information Facilities

20 Clues: the "P" in PEDthe "C" in JWICSSub-compartment of SIThe "A" in SAP stands forthe W in JWICS stands forthe "C" in the acronym ICCSA is Cognizant Security ________FDO is the Foreign _______ Officerinformation protected by SI caveatORCON stands for ________ ControlledSignals intelligence is abbreviated asIntelligence gained from human efforts...

Vocabulary test Unit 2 Where Are You Going? กิจกรรม New Language 2022-06-03

Vocabulary test Unit 2 Where Are You Going? กิจกรรม New Language crossword puzzle
Across
  1. สายการบิน
  2. บัตรที่ผู้โดยสารต้องแสดงก่อนขึ้นเครื่องบิน
  3. ขึ้นเรือ เครื่องบิน รถ ฯลฯ
  4. ทางออกสำหรับผู้โดยสารที่เดินทางด้วยเครื่องบิน
  5. ระบบรักษาความปลอดภัย
  6. เคาน์เตอร์
  7. กระดานโต้คลื่น
Down
  1. มาถึง,ไปถึง
  2. ผู้โดยสาร
  3. ออกเดินทาง
  4. ชั้นโดยสารราคาถูกที่สุด
  5. เป้สะพายหลัง
  6. ชั้นธุรกิจ, ผู้โดยสารชั้นธุรกิจ
  7. เที่ยวบิน
  8. ถอด

15 Clues: ถอดผู้โดยสารสายการบินเที่ยวบินออกเดินทางเคาน์เตอร์มาถึง,ไปถึงเป้สะพายหลังกระดานโต้คลื่นระบบรักษาความปลอดภัยชั้นโดยสารราคาถูกที่สุดขึ้นเรือ เครื่องบิน รถ ฯลฯชั้นธุรกิจ, ผู้โดยสารชั้นธุรกิจบัตรที่ผู้โดยสารต้องแสดงก่อนขึ้นเครื่องบินทางออกสำหรับผู้โดยสารที่เดินทางด้วยเครื่องบิน

Tulis dalam Bahasa Indonesia 2022-06-01

Tulis  dalam Bahasa Indonesia crossword puzzle
Across
  1. dentist
  2. a cook
  3. driver
  4. mechanic
  5. fire fighter
  6. gardener
Down
  1. librarian
  2. selfish
  3. smart
  4. shy person
  5. kind hearted
  6. arogant
  7. teacher
  8. nurse
  9. security guard

15 Clues: smartnursea cookdriverselfishdentistarogantteachermechanicgardenerlibrarianshy personkind heartedfire fightersecurity guard

Superb Security Crossword Challenge 2020-05-07

Superb Security Crossword Challenge crossword puzzle
Across
  1. An unpatched laptop is … to an attack or how you feel when you finish watching “The Notebook”
  2. The highest level of privilege which can be exposed (Windows)
  3. Unlawful data exposure
  4. …..engineering refers to the method attackers use to manipulate people into sharing sensitive information
  5. Converts passwords to unreadable strings or a good way to prepare potatoes
  6. What makes your laptop/PC sick
  7. Cybersecurity is our shared...
  8. …..identifiable information is any data that could potentially identify a specific individual
  9. Bad junk emails
  10. European privacy law
  11. Bad for your laptop/PC, but helpful to aerate the garden
Down
  1. Everyone has these and they are unique to each person
  2. Malware that misleads users of its true intent, or a big wooden horse
  3. Technology that extends a private network across a public network
  4. Should contain a minimum of 9 characters using a combination of upper case letters, lower case letters, numbers, and special characters.
  5. A guy in a hoodie, in his mom’s basement, trying to access your personal data
  6. Tool for stealing credit cards
  7. Ransomware that affected NHS in 2017, or what you want to do when you realize you might have this malware
  8. A malicious program designed to record which keys are being pressed on a computer keyboard
  9. Don't click on….within emails from an unknown or untrusted source.

20 Clues: Bad junk emailsEuropean privacy lawUnlawful data exposureTool for stealing credit cardsWhat makes your laptop/PC sickCybersecurity is our shared...Everyone has these and they are unique to each personBad for your laptop/PC, but helpful to aerate the gardenThe highest level of privilege which can be exposed (Windows)...

Check Your Security Mindset 2020-07-15

Check Your Security Mindset crossword puzzle
Across
  1. An official order per POTUS
  2. A great sale or official authorization
  3. close observation
  4. Mid-level classification
  5. Formally found favorable
  6. A threat, intent is not a requirement
  7. Pay a fine, go to jail, etc.
  8. Big government
  9. The "O" in ISOO that can't be overlooked
  10. U.S. Coast Guard operations
Down
  1. Not any kind of secret, not even confidential.
  2. Security Education Training and _____________
  3. Is that a FOIA request? Hang on...
  4. Permission to pass, gain entry
  5. Ironically, a CIA (not DHS) TV drama starring Claire Danes
  6. The DHS ________Weapons of Mass Destruction Office (CWMD)
  7. Info protected per E.O. 13526
  8. Routine risk mitigation process
  9. Requires DHS accreditation
  10. Brand new, "PIV-less" DHS network access

20 Clues: Big governmentclose observationMid-level classificationFormally found favorableRequires DHS accreditationAn official order per POTUSU.S. Coast Guard operationsPay a fine, go to jail, etc.Info protected per E.O. 13526Permission to pass, gain entryRoutine risk mitigation processIs that a FOIA request? Hang on...A threat, intent is not a requirement...

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  2. A type of protocol that allows data to be sent and received securely over the internet.
  3. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  4. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  5. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  6. Web applications or website that allow users to create and edit web pages using any web browser.
  7. Refers to the need to respect other user's views and display common courtesy when posting views online.
  8. Software that gathers data by monitoring key press on the user/s keyboard.
  9. The act of gaining unauthorized access to a computer system.
  10. Uses SMS system of mobile phones to send out fake text messages.
  11. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  12. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
Down
  1. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  2. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  3. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  4. Refers to safety when using the internet like keeping personal data safe.
  5. Authentication that relies on certain unique characteristics of human beings.
  6. Used to verify that data comes from a secure and trusted source.
  7. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  8. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  9. Unsolicited email sent over the internet.
  10. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  11. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  12. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.

24 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

A+ Security Hardware 1 2018-09-23

A+ Security Hardware 1 crossword puzzle
Across
  1. Should go from front to back
  2. Toner compressed onto paper with heat
  3. Find the issue
  4. More than one monitor
  5. Opposites attract when it comes to this
  6. Prevents shock
  7. memorable
  8. Saves cmos information
  9. Allows for packet transmission
  10. All components fit
Down
  1. Specifies physical dimensions of the MB components
  2. Short range low range wireless network solution
  3. Forgets everything when turned off
  4. Number one installation tool
  5. Print jobs in sequence
  6. The brain
  7. Old school
  8. No pins
  9. Sticky stuff on the cpu
  10. The base of it all
  11. High definition multi-media interface
  12. A chip that finds all the components on the pc

22 Clues: No pinsThe brainmemorableOld schoolFind the issuePrevents shockThe base of it allAll components fitMore than one monitorPrint jobs in sequenceSaves cmos informationSticky stuff on the cpuShould go from front to backNumber one installation toolAllows for packet transmissionForgets everything when turned offToner compressed onto paper with heat...

Chapter 9: Fundamental Security 2012-11-29

Chapter 9: Fundamental Security crossword puzzle
Across
  1. Uses network sniffers to extract usernames and passwords to be used at a later date to gain access.
  2. Is a person who is able to gain access to equipment or a network by tricking people.
  3. Prevents unauthorized access to the local computer and the network.
  4. Users outside of an organization that do not have authorized access to the network or resources.
  5. Gains access to resources on devices by pretending to be a trusted computer.
  6. Changes the DNS records on a system to point to false servers where the data is recorded.
  7. Sends abnormally large amounts of requests to a system preventing access to the services.
  8. Is the protocol suite that is used to control all of the communications on the Internet.
  9. Accidental threats are when the user damages data or equipment unintentionally.
  10. Also known as junk mail
  11. Programming language developed to interact with HTML source code to allow interactive websites.
  12. Created by Microsoft to control interactivity on webpages.
Down
  1. Events or attacks that steal, damage, or destroy equipment.
  2. A large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing it.
  3. A software program that displays advertising on your computer.
  4. A file or program other then a virus that can be harmful.
  5. Events or attacks that remove, corrupt, deny access, allow access or steal information.
  6. Distributed without any user knowledge.
  7. Uses "zombies" to make tracing the origin of the DoS attack difficult to locate.
  8. A series of repeated, larger than normal pings that crash the receiving computer.
  9. Intercepts or inserts false information in traffic between two hosts.
  10. Programming language that allows applets to run within a web browser.
  11. Randomly opens TCP ports.
  12. Fundamental Security.
  13. A program that is written with malicious intent and sent out by attackers.

25 Clues: Fundamental Security.Also known as junk mailRandomly opens TCP ports.Distributed without any user knowledge.A file or program other then a virus that can be harmful.Created by Microsoft to control interactivity on webpages.Events or attacks that steal, damage, or destroy equipment.A software program that displays advertising on your computer....

Security Awareness Puzzle 2015 2015-02-17

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. 21. A password is stronger by using a combination of both upper and lower case ___________.
  2. 28. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
  3. 25. A software that is designed to detect and destroy computer viruses.
  4. 24. The state of being free from danger or threat.
  5. 13. Passwords should be _________ every 3-4 months.
  6. 20. Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
  7. 3. __________ is a popular web search engine.
  8. 15. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. 8. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
  10. 5. Use __________ passwords for the various accounts that you may have.
  11. 11. To ________ the amount of spam you receive, be careful who you give your email address to.
  12. 10. Never share your _________ with another person.
  13. 12. Healthy email always includes a clear and specific ____________ line.
  14. 6. Email scam or attempt to trick you into giving your password or personal information.
Down
  1. 18. A secure password should contain at least one of these.
  2. 22. Choose a password that is easy for you to ____________ but hard for someone to guess.
  3. 29. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. 30. Also known as malicious software; any program or file that is harmful to a computer user.
  5. 14. Do not send __________ information over email unless it is encrypted.
  6. 27. Another word for understanding, knowledge and well-informed.
  7. 16. Do not leave your laptop or computer ____________.
  8. 1. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  9. 26. Use this tool to dispose of documents that contain personal or financial information.
  10. 7. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  11. 9. Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
  12. 23. A computer ______ can be considered as the modern counterpart of a paper document.
  13. 19. Passwords should always be at least this many characters long.
  14. 4. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  15. 17. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  16. 2. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.

30 Clues: 3. __________ is a popular web search engine.24. The state of being free from danger or threat.13. Passwords should be _________ every 3-4 months.10. Never share your _________ with another person.16. Do not leave your laptop or computer ____________.18. A secure password should contain at least one of these....

Security+ Crossword Puzzle #1 2014-11-03

Security+ Crossword Puzzle #1 crossword puzzle
Across
  1. indicates exposure to the chance of damage or loss
  2. the countermeasures put in place to avoid, mitigate, or counteract risks
  3. administrator has discretion to allow or not allow access
  4. malicious software that is intended to track and report back on system usage
  5. the security approach of blocking unauthorized access or attacks before they occur
  6. the act of determining if a user has tried to access unauthorized data
  7. any technique used to exploit a vulnerability
  8. process of validating credentials
  9. an attacker accessing your computer system without authorization
  10. process of tracking and recording system activities and resource access
  11. Top Secret, Secret, Confidential
  12. any potential damage to an asset
  13. data that has been encoded with a cipher and is unreadable
Down
  1. self-replicating piece of malicious code that spreads without attching itself to different files
  2. physical or virtual objects that store authentication information
  3. ensuring that who sent the data remains associated and cannot deny sending it
  4. software that displays or downloads advertisements
  5. any condition that leaves a system open to harm
  6. _____ bomb remains dormant until a specific condition occurs
  7. self-replicating piece of malicious code that spreads by attaching itself to different files
  8. process of determining rights and privileges
  9. malicious software that takes full or partial control of a system at the lowest levels
  10. _____ management is a systematic way of reviewing and approving changes
  11. the act of recovering vital data from a system that has crashed, been compromised, or damaged
  12. rule, system, or mechanism used to encrypt or decrypt data
  13. practice of examining logs
  14. access is controlled by a user's role

27 Clues: practice of examining logsTop Secret, Secret, Confidentialany potential damage to an assetprocess of validating credentialsaccess is controlled by a user's roleprocess of determining rights and privilegesany technique used to exploit a vulnerabilityany condition that leaves a system open to harmindicates exposure to the chance of damage or loss...

Digital life and security 2024-01-14

Digital life and security crossword puzzle
Across
  1. значення 'mal' в 'malware'
  2. дурний, безглуздий
  3. безпечний
  4. доступ
  5. обмеження
  6. крадіжка
  7. шкідливе програмне забезпечення
  8. перехоплювати
  9. ненадійний, небезпечний
Down
  1. втішати, заспокоювати
  2. обходити
  3. скинути (пароль)
  4. сучасний, в актуальному стані
  5. зберігати
  6. стильний
  7. красти (2 форма)
  8. здобувати, отримувати
  9. грабіжник
  10. сховище, зберігання
  11. зламати (пароль)

20 Clues: доступобходитистильнийкрадіжкабезпечнийзберігатиобмеженняграбіжникперехоплюватискинути (пароль)красти (2 форма)зламати (пароль)дурний, безглуздийсховище, зберіганнявтішати, заспокоюватиздобувати, отримуватиненадійний, небезпечнийзначення 'mal' в 'malware'сучасний, в актуальному станішкідливе програмне забезпечення

Privacy and Security Online 2024-04-25

Privacy and Security Online crossword puzzle
Across
  1. changes a browser's behavior, settings, or appearance without user consent
  2. theft A type of scam where someone tries to trick you into giving them your personal information
  3. A setting that allows you to control who can see your profile and posts
  4. A type of software that can harm your computer or steal your information
  5. A piece of software that can protect your computer from online threats
  6. A place where you can safely store your passwords and other sensitive information
  7. A symbol or character that represents you online
  8. when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
  1. the safe and responsible use of information and communication technologies
  2. A type of attack where someone pretends to be someone else to gain access to your personal information
  3. sharing photos, videos, and messages with other people
  4. piracy the illegal copying or distribution of copyrighted material via the Internet
  5. users open the app an average of 19 times a day
  6. a collective term for websites and applications that focus on communication
  7. System used to protect computer systems
  8. Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
  9. You should never share this with strangers online
  10. keep your digital doors locked
  11. virus a type of malware that downloads onto a computer disguised as a legitimate program
  12. short and less than 8 characters

20 Clues: keep your digital doors lockedshort and less than 8 charactersSystem used to protect computer systemsusers open the app an average of 19 times a dayA symbol or character that represents you onlineYou should never share this with strangers onlinesharing photos, videos, and messages with other people...

Security-04-30-2024 2024-04-29

Security-04-30-2024 crossword puzzle
Across
  1. ______ engineering is the act of tricking a person into doing something by messing up their emotions and decision-making process
  2. A type of attack where malicious code is inserted into a database query.
  3. The process of verifying the identity of a user or device
  4. A transformation of data into a form that conceals the data's original meaning.
  5. A hidden way to access a system or software.
  6. The practice of concealing messages or information within other nonsecret text or data
  7. A logical or physical discontinuity in a network to prevent unauthorized access.
Down
  1. A network of infected computers controlled by a hacker.
  2. A phishing attack conducted through SMS messages.
  3. Detection technology software to shield users against malware.
  4. A vulnerability that is exploited before the software developer releases a fix.
  5. A generic term for different types of malicious code
  6. An isolated environment used to test potentially dangerous software.
  7. A deceptive system designed to attract and monitor unauthorized access or attacks.
  8. A type of phishing attack carried out through voice calls.
  9. An attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
  10. Developing audio, image, or a video clip that has been edited and manipulated to appear real or believable
  11. A software update that fixes vulnerabilities or bugs.
  12. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function
  13. Use of e-mails that appear legitimate to trick a user into entering valid credentials or clicking a link.

20 Clues: A hidden way to access a system or software.A phishing attack conducted through SMS messages.A generic term for different types of malicious codeA software update that fixes vulnerabilities or bugs.A network of infected computers controlled by a hacker.The process of verifying the identity of a user or device...

Social security and relationships 2023-01-30

Social security and relationships crossword puzzle
Across
  1. anoppi
  2. puoliso
  3. appi
  4. eläkeläinen
  5. alaikäinen
  6. huoltajuus
  7. esi-isä
  8. avoliitto
  9. syntyätodistus
  10. köyhyys
  11. nuorisotilat
Down
  1. KELA
  2. lainsäädäntö
  3. viranomaiset
  4. syrjintä
  5. elatusmaksu
  6. iltapäiväkerho
  7. jälkeläiset
  8. käly
  9. kunta
  10. age eläkeikä

21 Clues: KELAappikälykuntaanoppipuolisoesi-isäköyhyyssyrjintäavoliittoalaikäinenhuoltajuuselatusmaksueläkeläinenjälkeläisetlainsäädäntöviranomaisetage eläkeikänuorisotilatiltapäiväkerhosyntyätodistus

Information Assurance and Security 2025-12-16

Information Assurance and Security crossword puzzle
Across
  1. Ensures systems are accessible when needed (The A in CIA)
  2. A one-way function that turns data into a fixed-length string (used for passwords)
  3. The assurance that someone cannot deny the validity of something (like a signature)
  4. Random data added to a password before hashing it
  5. Malware that replicates itself to spread to other computers (no host needed)
  6. Converting ciphertext back into plaintext
  7. Authentication using physical characteristics like fingerprints
  8. The process of verifying who a user is
  9. Malware disguised as legitimate software
  10. A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
  11. Spyware that records every keystroke made by a user
  12. Ensures data has not been altered or tampered with (The I in CIA)
  13. A list of entities that are approved for unauthorized access
  14. An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
Down
  1. Malware that locks your data and demands payment
  2. Malicious code that attaches itself to a host program to replicate
  3. The process of verifying what a user is allowed to do
  4. Ensures information is not disclosed to unauthorized individuals (The C in CIA)
  5. A potential danger that can exploit a vulnerability
  6. Extends a private network across a public network (Virtual Private Network)
  7. A list of entities that are denied access
  8. Code or a technique that takes advantage of a vulnerability
  9. Converting plaintext into ciphertext to secure it
  10. A network security device that monitors and blocks traffic
  11. A weakness or flaw in a system

25 Clues: A weakness or flaw in a systemThe process of verifying who a user isMalware disguised as legitimate softwareConverting ciphertext back into plaintextA list of entities that are denied accessMalware that locks your data and demands paymentRandom data added to a password before hashing itConverting plaintext into ciphertext to secure it...

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
  2. Datenverarbeitungsregisternummer.
  3. Echtzeit chatten.
  4. Verbreitet sich direkt über Netze.
Down
  1. Personen werden mit Hilfe von elektronischen Medien verletzt.
  2. Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
  3. Sie dringen illegal in Computersysteme ein.
  4. Werbemails die unerwünscht sind nennt man auch?
  5. Diese Viren sind als ein Programm in eine Datei eingebetet?
  6. Diese Programme protokollieren die Tastatureingaben mit.

10 Clues: Echtzeit chatten.Datenverarbeitungsregisternummer.Verbreitet sich direkt über Netze.Sie dringen illegal in Computersysteme ein.Werbemails die unerwünscht sind nennt man auch?Diese Programme protokollieren die Tastatureingaben mit.Diese Viren sind als ein Programm in eine Datei eingebetet?Personen werden mit Hilfe von elektronischen Medien verletzt....

Online Bullying 2024-06-11

Online Bullying crossword puzzle
Across
  1. Someone to talk to
  2. When someone is not letting you get something by putting it close to you then away from you before you catch it
  3. The original meaning of online
  4. Another meaning of online
Down
  1. When someone is being bullied online
  2. Where you can seek help online by parent or anyone else
  3. A meaning of photos
  4. When you write online
  5. When someone does something mean intentionally
  6. A very famous app & website

10 Clues: Someone to talk toA meaning of photosWhen you write onlineAnother meaning of onlineA very famous app & websiteThe original meaning of onlineWhen someone is being bullied onlineWhen someone does something mean intentionallyWhere you can seek help online by parent or anyone else...

Cyber-bully Activity 2021-10-29

Cyber-bully Activity crossword puzzle
Across
  1. A mean saying someone might say about your looks
  2. Two words- the act of staying safe online
  3. Group of people that you hang out with
  4. Something to do if someone is being bullied
Down
  1. Beginning with I - saying hurtful things
  2. A device that someone can be cyber-bullied on
  3. Someone who is mean
  4. A story that is a lie
  5. How someone might feel when you tease them
  6. A feeling of unsure and stress

10 Clues: Someone who is meanA story that is a lieA feeling of unsure and stressGroup of people that you hang out withBeginning with I - saying hurtful thingsTwo words- the act of staying safe onlineHow someone might feel when you tease themSomething to do if someone is being bulliedA device that someone can be cyber-bullied on...

news u8 2024-12-12

news u8 crossword puzzle
Across
  1. How many people took to the skies
  2. News claims of misconducted alcohol abuse against...who?
  3. 13 Billion Spent by who
  4. How much was spent on Cyber Monday
  5. FBI seeks help in what?
Down
  1. Who was the stowaway on a plane to the US to Paris
  2. Picked for FBI director by Donald Trump
  3. Who fought cancer
  4. How many troops were still in Syria
  5. How many people got injured at the holiday parade

10 Clues: Who fought cancer13 Billion Spent by whoFBI seeks help in what?How many people took to the skiesHow much was spent on Cyber MondayHow many troops were still in SyriaPicked for FBI director by Donald TrumpHow many people got injured at the holiday paradeWho was the stowaway on a plane to the US to Paris...

HW crossword puzzle 2022-04-28

HW crossword puzzle crossword puzzle
Across
  1. anything related to the internet
  2. a program that seems harmless but is very dangerous
  3. converting data into a code for unauthorized personnel
  4. mass communication software
  5. affected by a virus
Down
  1. bad software to harm other software
  2. something that doesn't allow bad things to enter a software
  3. a procedure to get something done
  4. a commercial business
  5. when someone acts like they know each other to get a personal gain or financial gain

10 Clues: affected by a virusa commercial businessmass communication softwareanything related to the interneta procedure to get something donebad software to harm other softwarea program that seems harmless but is very dangerousconverting data into a code for unauthorized personnelsomething that doesn't allow bad things to enter a software...

Technology 2025-06-16

Technology crossword puzzle
Across
  1. an important discovery or development
  2. the use of machines to perform tasks without human intervention
  3. easy to use or understand
  4. a small electronic device with a specific function
  5. the trail of data left by users on the internet
  6. introducing new ideas or methods
Down
  1. knowledgeable about modern technology
  2. extremely modern and advanced
  3. measures taken to protect systems from cyber threats
  4. the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsknowledgeable about modern technologyan important discovery or developmentthe trail of data left by users on the internetthe simulation of human intelligence in machinesa small electronic device with a specific function...

Bullying 2023-02-27

Bullying crossword puzzle
Across
  1. Face with emotion
  2. Instagram is the platform
  3. Friendship is one of the causes
Down
  1. talking about others
  2. Another word for words (the start is V)
  3. Another for the body

6 Clues: Face with emotiontalking about othersAnother for the bodyInstagram is the platformFriendship is one of the causesAnother word for words (the start is V)

EUREKA 2012-11-04

EUREKA crossword puzzle
Across
  1. Petroleum=Petra(_____)+Oleum(Oil)(4)
  2. First country to declare itself as small pox free(5)
  3. If you are on the Cassini Division, where are you?(6)
  4. Driest desert on Earth.(7)
  5. A lepidopterist collects a __________(9)
  6. Rarest element on Earth.(8)
  7. The scientist who coined the term ‘Electric Fluid'(8,8)
  8. Ho
Down
  1. Fear of computers - __________phobia(5)
  2. New satellite being developed by ISRO to learn about Sun(6)
  3. The Earth hour was first started in this city(6)
  4. How is ‘Citrullus Vulgaris’ better known to us?(10)
  5. Study of humans.(12)
  6. Oil of Vitriol - __________ acid(9)
  7. Little boy-Uranium, Fatman -_________(9)
  8. Company which has its tagline as ‘Invented for life(5)

16 Clues: HoStudy of humans.(12)Driest desert on Earth.(7)Rarest element on Earth.(8)Oil of Vitriol - __________ acid(9)Petroleum=Petra(_____)+Oleum(Oil)(4)Fear of computers - __________phobia(5)A lepidopterist collects a __________(9)Little boy-Uranium, Fatman -_________(9)The Earth hour was first started in this city(6)...

Cyberbullying 2021-05-05

Cyberbullying crossword puzzle
Across
  1. bully cant contact you after you ___ them
  2. blood relative that can give support
  3. message sent from a phone
  4. leaving out someone on purpose
  5. role model in school that can give support
  6. Handheld device
  7. when someone post constant mean comments they are ___ me
  8. social media plafroms allow you to ___ a negative comment
  9. deliberate act to publically humiliate someone
  10. someone who you trust for support
Down
  1. people post hurtfull_______ underneath my post
  2. when another pretends to be someone they are not
  3. someone who tries constantly to annoy someone on the interent
  4. the most common emotion from being cyberbullied
  5. When getting cyber bullied it is best to seek out ____
  6. not giving attention to the bully

16 Clues: Handheld devicemessage sent from a phoneleaving out someone on purposenot giving attention to the bullysomeone who you trust for supportblood relative that can give supportbully cant contact you after you ___ themrole model in school that can give supportpeople post hurtfull_______ underneath my postdeliberate act to publically humiliate someone...

occupation 2020-02-20

occupation crossword puzzle
Across
  1. chef
  2. lawyer
  3. writer
  4. actress
  5. security
  6. pilot
  7. carpenter
Down
  1. soldier
  2. student
  3. singer
  4. doctor
  5. model
  6. driver

13 Clues: chefmodelpilotlawyersingerdoctorwriterdriversoldierstudentactresssecuritycarpenter

Authorities 2025-05-05

Authorities crossword puzzle
Across
  1. judecǎtor
  2. amendă
  3. avocat
  4. acord
  5. lege
  6. securitate
  7. semnǎturǎ
Down
  1. granițǎ
  2. plângere
  3. ambasadǎ
  4. martor
  5. penalizare
  6. permis

13 Clues: legeacordmartoramendăavocatpermisgranițǎplângereambasadǎjudecǎtorsemnǎturǎpenalizaresecuritate

Artificial Intelligence in Healthcare 2024-09-18

Artificial Intelligence in Healthcare crossword puzzle
Across
  1. Decision
  2. Vendors
  3. Technology
  4. Evaluate
  5. Regulation
  6. Breach
Down
  1. Intelligence
  2. Application
  3. Security
  4. Learning
  5. Training
  6. Accountability
  7. Fairness

13 Clues: BreachVendorsDecisionSecurityLearningTrainingFairnessEvaluateTechnologyRegulationApplicationIntelligenceAccountability

websites 2016-04-25

websites crossword puzzle
Across
  1. Threat, A blended threat is a software exploit which in turn involves a combination of attacks against different vulnerabilities. For example, many worm, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. It is a kind of computer threat.
  2. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  3. a local or restricted communications network, especially a private network created using World Wide Web software.
  4. he global communication network that allows almost all computers worldwide to connect and exchange information. Some of the early impetus for such a network came from the U.S. government network Arpanet
  5. An unauthorized user who attempts to or gains access to an information system.
  6. designed to detect and destroy computer virusesAttack, An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. Code, Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
  8. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
Down
  1. Security, The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  2. software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  3. A digital form of social engineering to deceive individuals into providing sensitive information.
  4. The process of transforming plaintext into cipher text.
  5. A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences.
  6. Horse, A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
  7. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator
  8. A capability to limit network traffic between networks and/or information systems.
  9. Door, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
  10. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.

18 Clues: The process of transforming plaintext into cipher text.An unauthorized user who attempts to or gains access to an information system.A capability to limit network traffic between networks and/or information systems.A digital form of social engineering to deceive individuals into providing sensitive information....

Office of Performance Management and Internal Controls 2021-03-05

Office of Performance Management and Internal Controls crossword puzzle
Across
  1. Intentional deceptive action
  2. Periodic comparison of source documents
  3. Office directed by Lt. Col. Terry
  4. Last name of OPMIC Information Security Officer
  5. Training due April 15th by all employees
Down
  1. Synonym for bloom, blossom and singing birds
  2. Control working in less than optimal condition
  3. Reduces the risk of error and inefficiency
  4. Acronym for Information Security Officer
  5. Complete acronym for internal control standards
  6. Last name of Internal Audit Manager
  7. The end toward which effort is directed
  8. Evaluation document with code of ethics

13 Clues: Intentional deceptive actionOffice directed by Lt. Col. TerryLast name of Internal Audit ManagerPeriodic comparison of source documentsThe end toward which effort is directedEvaluation document with code of ethicsAcronym for Information Security OfficerTraining due April 15th by all employeesReduces the risk of error and inefficiency...

The Outsiders 2021-01-12

The Outsiders crossword puzzle
Across
  1. - entertainment
  2. - place of worship
  3. - snack
  4. - security
  5. - parking
  6. - cancer stick
  7. - dangerous
  8. - clothing
Down
  1. - hood
  2. - educational
  3. - facts
  4. - dessert
  5. - car
  6. - from ur head
  7. - knife
  8. - cool and edgy

16 Clues: - car- hood- facts- snack- knife- dessert- parking- security- clothing- dangerous- educational- from ur head- cancer stick- entertainment- cool and edgy- place of worship

HW 2025-08-13

HW crossword puzzle
Across
  1. база данных
  2. предупреждение
  3. должностное лицо
  4. рассматривать, принимать во внимание
  5. почти
  6. увеличить
  7. в соответсвии с
  8. позволять себе
  9. недавний
  10. предотвратить
Down
  1. среднестатистический
  2. жертва
  3. защита
  4. уязвимый
  5. недостаток (чего-то)
  6. уверенный
  7. безопасность

17 Clues: почтижертвазащитауязвимыйнедавнийуверенныйувеличитьбаза данныхбезопасностьпредотвратитьпредупреждениепозволять себев соответсвии сдолжностное лицосреднестатистическийнедостаток (чего-то)рассматривать, принимать во внимание

Ac and AC 2022-11-04

Ac and AC crossword puzzle
Across
  1. fri
  2. sikkerhed
  3. liv
  4. frihed
  5. forskelsbehandling
  6. ret
  7. uddanelse
  8. undring
  9. uskyldig
  10. lighed
  11. hørt
  12. slaveri
  13. bevægelse
  14. lov
  15. nationalitet
  16. privatliv
Down
  1. værdighed
  2. udtryk
  3. religion
  4. relation
  5. menneske
  6. stemme
  7. umenneskelig
  8. tortur
  9. samtidighed
  10. tro
  11. retfærdig
  12. skyldig

28 Clues: frilivrettrolovhørtudtrykfrihedstemmetorturlighedundringslaveriskyldigreligionrelationmenneskeuskyldigværdighedsikkerheduddanelseretfærdigbevægelseprivatlivsamtidighedumenneskelignationalitetforskelsbehandling