cyber security Crossword Puzzles

Food security 2024-12-18

Food security crossword puzzle
Across
  1. to save food from being wasted.
  2. Niño A weather pattern that can lead to droughts.
  3. a process that turns waste into something that helps plants grow.
  4. You need me to grow plants, but I can be scarce in deserts.
  5. A global issue caused by a lack of food.
Down
  1. am the science of producing food, using land and livestock.
  2. The process of growing plants and raising animals for food. (Agriculture)
  3. The farming method that uses natural fertilizers.
  4. grain that feeds billions of people worldwide, and I grow in flooded fields.

9 Clues: to save food from being wasted.A global issue caused by a lack of food.The farming method that uses natural fertilizers.Niño A weather pattern that can lead to droughts.am the science of producing food, using land and livestock.You need me to grow plants, but I can be scarce in deserts....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. Food that can be used as a resource or is stored to avoid shortages.
  2. The act of growing enough food for the population in a country.
  3. A key principal in food security: ensuring food is available consistently.
  4. The variety and nutritional quality of food grown or available.
Down
  1. A person or group that grows, produces, or distributes food.
  2. A situation where people do not have enough access to safe and nutritious food.
  3. A system for ensuring everyone has access to adequate and nutritious food.
  4. aid Government program to provide food to those in need.
  5. A key resource used in food production, particularly for crops

9 Clues: aid Government program to provide food to those in need.A person or group that grows, produces, or distributes food.A key resource used in food production, particularly for cropsThe act of growing enough food for the population in a country.The variety and nutritional quality of food grown or available....

Software Security 2025-11-01

Software Security crossword puzzle
Across
  1. Isolating system components to contain security breaches.
  2. a power to extend the software on certain implementations considering future growth.
  3. A flaw or weakness that can be exploited to cause harm.
  4. Injection Common attack injecting malicious code into database queries.
Down
  1. Ensuring information is accessible only to authorized users.
  2. arises in software due to uncontrolled expansion in volume and enormous capacity of storage.
  3. The process of verifying the identity of a user or system.
  4. Security model enforcing “no read-up” and “no write-down” rules for confidentiality.
  5. Average time to fix a discovered vulnerability (abbreviation).

9 Clues: A flaw or weakness that can be exploited to cause harm.Isolating system components to contain security breaches.The process of verifying the identity of a user or system.Ensuring information is accessible only to authorized users.Average time to fix a discovered vulnerability (abbreviation)....

Security Password 2025-08-23

Security Password crossword puzzle
Across
  1. What is the name of your favorite musical?
  2. What city was your car stolen in?
  3. What is your maternal grandfather's first name?
Down
  1. What instrument did you inherit from your great grandmother?
  2. What is the name of your best friend from college?
  3. What is your family's favorite NCAA team?
  4. What is the name of your roommate in grad school?
  5. What is your first cats name?
  6. Where did you stay for your first anniversary?

9 Clues: What is your first cats name?What city was your car stolen in?What is your family's favorite NCAA team?What is the name of your favorite musical?Where did you stay for your first anniversary?What is your maternal grandfather's first name?What is the name of your roommate in grad school?What is the name of your best friend from college?...

Hartford Funds Compliance Crossword 2019-05-01

Hartford Funds Compliance Crossword crossword puzzle
Across
  1. A security device used in cars, trucks and corporate networks.
  2. Investment adviser firm that serves as the adviser to certain Hartford Funds.
  3. Working for, or on the board of a start-up company is considered a(n) _____________ and must be reported via MCO prior to any engagement.
  4. Adhere to a rule (policy, standard, law).
  5. Dedicated to investor protection and market integrity through effective and efficient regulation of broker-dealers.
  6. Separation of illicit proceeds from their source by a variation of financial transactions intended to conceal the origin of the proceeds.
  7. Vendor employees use to attest/complete various Compliance related activities (reportable account disclosure, outside business requests, limited partnership requests, etc).
  8. Any technology application that allows users to create, share and exchange information in an online community or forum.
  9. Situation in which a person is in a position to derive personal benefit from decisions made in their official capacity. HINT – 3 words.
  10. Moral principles that govern a person’s behavior.
  11. Hartford Funds Chief Compliance Officer.
Down
  1. Mutual Funds/ETFs should never be described as providing this type of protection.
  2. Unacceptable or improper behavior by an employee.
  3. Compliance is not an act, it’s a _______.
  4. Protection of internet-connected systems from cyber-attacks, protect against unauthorized access to data centers and other computerized systems.
  5. Investment adviser firm that serves as the adviser to separately managed accounts.
  6. All potential conflicts of interest need to be _________.
  7. Who is responsible for making sure all reportable accounts, trades, and holdings are appropriately and timely disclosed in MyComplianceOffice?
  8. Encouraging a Financial Advisor to invest his clients in Hartford Funds Core Equity Fund because the Fund will outperform its benchmark during the next 2 years is inappropriate. Use of such language is considered?
  9. FINRA Registered Broker-Dealer that is the official distributor for Hartford Fund’s ETFs.
  10. Engages in the underwriting and wholesale distribution and marketing of open end investment companies registered under the Investment Company Act of 1940 to third party firms.
  11. Procedures, laws and regulations designed to stop the practice of generating income through illegal actions.
  12. Travel & Expense items are input into this system.

23 Clues: Hartford Funds Chief Compliance Officer.Compliance is not an act, it’s a _______.Adhere to a rule (policy, standard, law).Unacceptable or improper behavior by an employee.Moral principles that govern a person’s behavior.Travel & Expense items are input into this system.All potential conflicts of interest need to be _________....

Semester 1 Intro to Business and Marketing Review 2023-12-06

Semester 1 Intro to Business and Marketing Review crossword puzzle
Across
  1. An economic system in which individuals own and operate the majority of businesses that provide goods and services.
  2. Cyber ____________ refers to the practices and steps that users of computers and IoT devices take to maintain system health and improve online security.
  3. An economic system in which businesses and individuals decide what to produce and buy, and the market determines prices and quantities sold.
  4. This occurs when people's needs and wants are unlimited and the resources to produce the goods and services to meet those needs and wants are limited.
  5. The performance ______________ process is a formal system for reviewing, evaluating, and improving employee performance.
  6. The people who create goods and services are called ___________ resources.
  7. A person who risks time, effort, and money to start and operate a business.
  8. A set of behaviors that utilize a toolbox of techniques, tools, and strategies that allow a person to achieve set goals within a given time.
  9. Things that you think you must have in order to be satisfied.
  10. Types of workplace communication include memos, business letters, _________, and chat platforms.
Down
  1. The inputs and resources used to produce goods and services.
  2. An economy that exhibits elements of both capitalism and socialism.
  3. Things that you must have in order to survive.
  4. Resources that are used in the production of goods and services.
  5. The skill set and process that utilizes a systematic approach to a task, whether answering a question, making a decision, or solving a problem.
  6. What remains after all business expenses have been deducted from sales revenue.
  7. Nonproductive _____________ in teams can cause a breakdown of trust, resentment, lowered efforts and stalled productivity.
  8. The organized effort of individuals to produce and sell, for a profit, the goods and services that satisfy society's needs.
  9. An economic system in which the government decides what goods and services will be produced,how they will be produced, for whom available goods and services will be produced, and who owns and controls the major factors of production.
  10. The way in which people deal with the creation and distribution of wealth.
  11. Raw materials supplied by nature.

21 Clues: Raw materials supplied by nature.Things that you must have in order to survive.The inputs and resources used to produce goods and services.Things that you think you must have in order to be satisfied.Resources that are used in the production of goods and services.An economy that exhibits elements of both capitalism and socialism....

Forensic science charlie 2019-09-25

Forensic science charlie crossword puzzle
Across
  1. $27 million - Dollar amount that is written in illegitimate checks every day
  2. forensics - (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
  3. vouchers/ WIC coupons, Certain bonds, Postage stamps
  4. questioned documents - Checks, Certificates, Wills, Passports, Licenses, Money, Letters, Contracts, Suicide Notes, Receipts, and Even Lottery Tickets
  5. block - Charlie
  6. documents - Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
  7. Spectroscopy - an analytical technique that measures the mass-to-charge ratio of charged particles.
  8. Pressure - Check for pressure on the downward and upward strokes Compare how capital letters are joined to lowercase letters
  9. documents include: - Checks, employment records, legal agreements, licenses, and wills
  10. chemical wash detection systems that change color when a check is altered
  11. analysis comparison - "Learns" to recognize how a person signs; Evaluates speed, pressure, and rhythm of the signatures; Recognizes forgeries by the detection of even slight differences
  12. - A substance that accelerates the rate of a chemical reaction but is not itself permanently changed by the reaction.
  13. - A technique for separating molecules through their migration on a support medium under the influence of an electrical potential
  14. commonly forged today - Currency/paper money, Traveler's checks
  15. resolution borders that are difficult to copy
  16. - writing over top to smear or make original writing unreadable
  17. as well as around the portrait; When the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
  18. testing - also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  19. years - maximum prison term for forgery. Forgery is a federal felony
  20. - a branch of bioscience dealing with the study of the form and structure of organisms and their specific structural features.
  21. case of the 1930s - What was the first known case in which handwriting analysis played a role?
  22. consistency /Ratio - What are the overall height, width, and size of the letters?
  23. composition - the individual chemicals that make up a substance
  24. - any prewritten handwriting samples from a suspect(s)
  25. ninety nine - The year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
  26. Hat Hackers - are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
  27. color patterns on paper
  28. Security Features in US currency - Portrait stands out and appears raised off the paper; Contains clear red and blue fibers woven throughout the bill; Has clear, distinct border edges; Treasury seal is shown with clear, sharp saw-tooth points; Watermark appears on the right side of the bill in the light; The security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it; There is minute printing on the security
  29. - making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
  30. Check Techniques - Directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
  31. phosphatase - An enzyme found in high concentration in semen.
Down
  1. signature pads - stores handwriting samples in databases
  2. - any long connecting marks and or swooshes added to letters
  3. hat hackers - usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
  4. - forgery for material gain
  5. analysis - the examination and comparison of questioned documents with known material
  6. taken to prevent check forgery - Chemically sensitive paper
  7. font size requires more ink and makes alterations more difficult
  8. - any extra caricatures or pictures added to words
  9. - When false documents or other items are copied for the purpose of deception
  10. handwriting - handwriting is difficult to disguise and forge
  11. of documents detection - any changes, erasures, or obliterations that may have occurred
  12. hackers (White hat hackers) - White hat hackers choose to use their powers for good rather than evil. Also known as "ethical hackers," white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
  13. accounting, forensic accountancy or financial forensics - the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation.
  14. and personalized handwriting habits - Similar to fingerprints, every person's handwriting is what it is
  15. Fibers - fiber created from natural materials or by chemical processes, a man-made fiber
  16. Habits (aka. Baseline characteristics) - Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
  17. - a material that changes the color of reflected or transmitted light as the result of wavelength-selective absorption.
  18. Service - the agency that investigates forgery cases
  19. - a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.
  20. - Does the writing tilt to the left or right, or is it straight up and down? Are some letters consistently tilted more or less than others?
  21. - A protein that acts as a catalyst for certain specific reactions.
  22. - Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
  23. Chromatography - Dye or ink is applied to filter or chromatography paper placed in a solvent and pigments are separated
  24. Fibers - fiber derived from plants or animals
  25. - A compound capable of donating a hydrogen ion (H+) to another compound.
  26. fibers that glow under different light
  27. Chromatography - a common type of chromatography used in analytical chemistry for separating and analyzing compounds

58 Clues: block - Charliecolor patterns on paper- forgery for material gainfibers that glow under different lightresolution borders that are difficult to copyFibers - fiber derived from plants or animals- any extra caricatures or pictures added to wordsvouchers/ WIC coupons, Certain bonds, Postage stampsService - the agency that investigates forgery cases...

Change a nouns into a verb 2023-11-30

Change a nouns into a verb crossword puzzle
Across
  1. success
  2. security
  3. attraction
  4. achievement
  5. madness
  6. distraction
  7. protection
Down
  1. description
  2. conclusion
  3. attention
  4. addition
  5. decision
  6. comparison
  7. collection

14 Clues: successmadnesssecurityadditiondecisionattentionconclusionattractioncomparisonprotectioncollectiondescriptionachievementdistraction

Change a nouns into a verb 2023-11-30

Change a nouns into a verb crossword puzzle
Across
  1. conclusion
  2. addition
  3. success
  4. attraction
  5. achievement
  6. security
Down
  1. protection
  2. comparison
  3. description
  4. decision
  5. collection
  6. distraction
  7. madness
  8. attention

14 Clues: successmadnessadditiondecisionsecurityattentionprotectioncomparisonconclusioncollectionattractiondescriptiondistractionachievement

KUIS P5 BANGUNLAH JIWA DAN RAGANYA 2025-01-15

KUIS P5 BANGUNLAH JIWA DAN RAGANYA crossword puzzle
Across
  1. Perundungan melalui media sosial disebut ... bullying
  2. Jenis olahraga yang membutuhkan kecepatan dan keserasian gerakan fisik yang teratur
  3. Contoh makanan yang mengandung protein hewani
  4. Kegiatan untuk menjaga kesehatan dan kebugaran tubuh
  5. Memukul termasuk dalam jenis perundungan ...
  6. Anjuran makan ... kali sehari
  7. Contoh makanan yang mengandung protein nabati
  8. Karbohidrat selain nasi
Down
  1. Untuk menjaga kesehatan tubuh, harus makan makanan bergizi ...
  2. Istilah lain dari makanan cepat saji
  3. Buah dan sayur merupakan jenis makanan yang mengandung ...
  4. Cabang olahraga dengan gerakan mengikuti musik disebut senam ...
  5. Karakter yang kita pelajari dari kegiatan senam
  6. Di dalam tubuh yang sehat, terdapat jiwa yang ...

14 Clues: Karbohidrat selain nasiAnjuran makan ... kali sehariIstilah lain dari makanan cepat sajiMemukul termasuk dalam jenis perundungan ...Contoh makanan yang mengandung protein hewaniContoh makanan yang mengandung protein nabatiKarakter yang kita pelajari dari kegiatan senamDi dalam tubuh yang sehat, terdapat jiwa yang ......

Mechdyne's 30th Anniversary Puzzle 2026-01-05

Mechdyne's 30th Anniversary Puzzle crossword puzzle
Across
  1. A quick discussion at the beginning of a meeting to prevent accidents
  2. One of our core values us Profit and _____
  3. Acronym for Audio Visual
  4. At Mechdyne we strive to "stay ____ the line"
  5. phrase we use to secure and dedicate an assignment to a teammate
Down
  1. Apart of the 4 P's
  2. Mechdyne's headquarters state
  3. One of Mechdyne's sister companies
  4. The college the Mechdyne founders attended
  5. Our people are...
  6. Popular video conferencing platform used for remote meetings\
  7. System that protects against cyber threats
  8. Month dedicated to cybersecurity awareness
  9. The universal “fix” for most tech problems

14 Clues: Our people are...Apart of the 4 P'sAcronym for Audio VisualMechdyne's headquarters stateOne of Mechdyne's sister companiesThe college the Mechdyne founders attendedSystem that protects against cyber threatsMonth dedicated to cybersecurity awarenessThe universal “fix” for most tech problemsOne of our core values us Profit and _____...

Security Awareness Effectiveness 2021-06-21

Security Awareness Effectiveness crossword puzzle
Across
  1. Don’t share your user
  2. before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want it to become publicly available?
  3. __________ is making and storing another copy of data
  4. A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory
  5. the IT security Policies are uploaded on _______
  6. Facts and statistics collected for reference or analysis.
  7. How to safeguard the information stored in laptop; Keep it ______ , when you are not available at desk.
Down
  1. Smishing is related to _____________
  2. The gaining of unauthorized access to data in a system or computer is __________. Down
  3. ________ is a scam that involves Internet fraudsters who send spam or pop-up messages to get the personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims
  4. A _______ Password contains at least 3 of the 4 following characters: Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g. 123), Special/Non-Alphanumeric (e.g. ! $ # %)
  5. Permitted by law is _________
  6. Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
  7. 123456 is ___________ password

14 Clues: Don’t share your userPermitted by law is _________123456 is ___________ passwordSmishing is related to _____________the IT security Policies are uploaded on _________________ is making and storing another copy of dataFacts and statistics collected for reference or analysis....

Social Security Terminology 2022-12-02

Social Security Terminology crossword puzzle
Across
  1. When a tic comes through Barcode that someone has this SSI pay status, the SSIF team usually celebrates!
  2. The SSA program that is required to be filed by ABD
  3. The opposite of approved
  4. The agreement signed by clients to "repay" their ABD with SSA earnings
  5. The Social Security _____
  6. The SSA-3373 form is the _____ Report
Down
  1. If someone's claim is denied, they can request this kind of appeal
  2. The SSA-3369 form is the _____ History Report
  3. A lot of claims get denied for "failure to _____"
  4. This State Date Exchange program
  5. This type of appeal goes before an Administrative Law Judge
  6. The highest level of appeal recognized by both SSA and DSHS is the Appeals Council _____
  7. The other program offered by SSA
  8. This is the first level of filing for SSA benefits

14 Clues: The opposite of approvedThe Social Security _____This State Date Exchange programThe other program offered by SSAThe SSA-3373 form is the _____ ReportThe SSA-3369 form is the _____ History ReportA lot of claims get denied for "failure to _____"This is the first level of filing for SSA benefitsThe SSA program that is required to be filed by ABD...

Information Security Awareness 2020-09-24

Information Security Awareness crossword puzzle
Across
  1. What is not allowed in a DNA password?
  2. Best way to keep track of multiple unique passwords?
  3. The data classification for Employee Handbook, internal phone directory?
  4. This is better and harder to crack than a password
  5. How do you think most evil hackers begin to break into a company’s network?
  6. The best response to password Recovery Questions is a
  7. Minimum number of characters for a network password?
  8. What is the default data? classification
  9. Who is responsible for data security?
Down
  1. The type of email to get you to click on a fraudulent link
  2. Disclosing personal member information may be
  3. Someone that follows closely behind you without using their badge?
  4. If I click on a link I believe was malicious I should
  5. This is better and harder to crack than a password
  6. How might someone evil try to get information from you?

15 Clues: Who is responsible for data security?What is not allowed in a DNA password?What is the default data? classificationDisclosing personal member information may beThis is better and harder to crack than a passwordThis is better and harder to crack than a passwordBest way to keep track of multiple unique passwords?...

Security Crossword Challenge 2015-02-17

Security Crossword Challenge crossword puzzle
Across
  1. Cash or Valuables in Transit
  2. 7th President of the United States
  3. Funny money
  4. First Ambassador to France
  5. Director of Security
  6. 1st President
Down
  1. Opens many doors
  2. Taking of items
  3. 3rd President
  4. Unusual Behavior
  5. 18th President
  6. Secures your money
  7. 7th President
  8. Used to make change

14 Clues: Funny money3rd President7th President1st President18th PresidentTaking of itemsOpens many doorsUnusual BehaviorSecures your moneyUsed to make changeDirector of SecurityFirst Ambassador to FranceCash or Valuables in Transit7th President of the United States

Security Crossword Puzzle 2016-09-26

Security Crossword Puzzle crossword puzzle
Across
  1. / Name of the Site Security Supervisor
  2. / GSK to become _________ neutral by 2050
  3. / GSK Value 4: Operate with ___________
  4. / Last name of newly appointed CEO of GSK
  5. / 4141 is the extension for this?
  6. / Using someone else's badge is a _______ violation.
Down
  1. / Someone you register in Passage Point
  2. / GSK Value 1: Be _______ focused
  3. / Place to pick up visitors?
  4. / Last name of the GSK Security Operations Manager
  5. / GSK Value 2: Act with __________
  6. / What should be displayed at all times?
  7. / GSK Value 3: Demonstrate _________ for people
  8. / First name of the Navy Yard Site Director

14 Clues: / Place to pick up visitors?/ GSK Value 1: Be _______ focused/ 4141 is the extension for this?/ GSK Value 2: Act with __________/ Name of the Site Security Supervisor/ Someone you register in Passage Point/ GSK Value 4: Operate with ___________/ What should be displayed at all times?/ GSK to become _________ neutral by 2050...

Safety and Security 2023-11-14

Safety and Security crossword puzzle
Across
  1. ATM check.
  2. where fire extinguisher is located.
  3. drawer counted if gone for _ days.
  4. how to close day with no computer
  5. if away from drawer, it should be?
  6. where first aid kit is located
  7. where we meet in emergency.
Down
  1. medical note required for any work __
  2. radio station that reports closing
  3. what should be posted on the door for emergency closure.
  4. please call if you are more than _ minutes late.
  5. branch will be audited by whom yearly?
  6. record for opening vault.
  7. grants permission to close bank

14 Clues: ATM check.record for opening vault.where we meet in emergency.where first aid kit is locatedgrants permission to close bankhow to close day with no computerradio station that reports closingdrawer counted if gone for _ days.if away from drawer, it should be?where fire extinguisher is located.medical note required for any work __...

Cyberbullying 2024-09-17

Cyberbullying crossword puzzle
Across
  1. when some one is cyber bulling
  2. 1-404-978-9282,1-877-355-5787, and 650-253-0000.
  3. do this to your parent or guardian
Down
  1. something to do after telling and blocking
  2. something cyberbullies do
  3. actions that are _______ can cause bad things.
  4. the cause
  5. The person who is being cyberbullied

8 Clues: the causesomething cyberbullies dowhen some one is cyber bullingdo this to your parent or guardianThe person who is being cyberbulliedsomething to do after telling and blockingactions that are _______ can cause bad things.1-404-978-9282,1-877-355-5787, and 650-253-0000.

Global challenge 2024-11-12

Global challenge crossword puzzle
Across
  1. spreading in a liquid
  2. devices to transmit informations
  3. cable with glass
Down
  1. the reason you have www
  2. a fight in I.e. economics around the world
  3. platform where you can communicate
  4. bullying in the internet
  5. people who can control your devices from around the world

8 Clues: cable with glassspreading in a liquidthe reason you have wwwbullying in the internetdevices to transmit informationsplatform where you can communicatea fight in I.e. economics around the worldpeople who can control your devices from around the world

Mots croisés Cyber 2024-02-01

Mots croisés Cyber crossword puzzle
Across
  1. Vérification de l'identité.
  2. Outil de sécurité qui crée une connexion sécurisée et cryptée entre vous et Internet (acronyme).
  3. Comportement menaçant facilité par des moyens électroniques tels que les SMS.
  4. Type de logiciel malveillant conçu pour bloquer l'accès à un système informatique jusqu'à ce qu'une somme d'argent soit payée
  5. Une norme de technologie sans fil utilisée sur de courtes distances utilisant des ondes radio UHF de courte longueur d’onde.
  6. Technologie de réseau domestique largement utilisée qui permet une connexion sans fil avec l’interface Internet.
Down
  1. Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible.
  2. Accès non autorisé à un réseau, à des systèmes d'information ou à une application.
  3. L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus.
  4. Matériel ou logiciel conçu pour empêcher tout accès non autorisé vers ou depuis un réseau privé
  5. Une faille ou une faiblesse dans un système informatique qui pourrait être exploitée pour violer la sécurité du système.
  6. Un e-mail frauduleux provenant prétendument d'une entreprise réputée tentant d'obtenir des informations personnelles.

12 Clues: Vérification de l'identité.L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus.Comportement menaçant facilité par des moyens électroniques tels que les SMS.Accès non autorisé à un réseau, à des systèmes d'information ou à une application.Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible....

Cyber sec awareness 2026-01-30

Cyber sec awareness crossword puzzle
Across
  1. An additional step in securing your account
  2. Malicious software that locks your files until you pay
  3. An incident where data is accessed without authorization
  4. Secret word or phrase used to gain access
  5. The process of verifying who you are
Down
  1. Malicious software designed to harm your computer
  2. Fraudulent emails that try to steal your credentials
  3. Network security system that monitors and controls traffic
  4. The process of encoding data to prevent unauthorized access
  5. Someone who gains unauthorizsd access to systems
  6. Our report phishing button
  7. Software update to fix security vulnerabilities

12 Clues: Our report phishing buttonThe process of verifying who you areSecret word or phrase used to gain accessAn additional step in securing your accountSoftware update to fix security vulnerabilitiesSomeone who gains unauthorizsd access to systemsMalicious software designed to harm your computerFraudulent emails that try to steal your credentials...

2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26

2024 OSCE Scholarship for Peace and Security - Crossword puzzle crossword puzzle
Across
  1. Agreement allowing for the conduct oh short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
  2. A key OSCE arms control agreement outlining provisions on annual military information exchange among the OSCE participating States
  3. UN Security Council Resolution on Women, Peace and Security (Acronym)
Down
  1. Cornerstone rule guiding OSCE decision-making processes
  2. The world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy (Acronym)
  3. UN Security Council Resolution on the non-proliferation of weapons of mass destruction and their means of delivery (Acronym)
  4. Agreement which prohibits the possession of nuclear weapons (Acronym)
  5. The world's largest regional security organization (Acronym)
  6. One of the two fissile materials used in nuclear weapons (Abbreviation)
  7. Synonym for firearms (Acronym)

10 Clues: Synonym for firearms (Acronym)Cornerstone rule guiding OSCE decision-making processesThe world's largest regional security organization (Acronym)Agreement which prohibits the possession of nuclear weapons (Acronym)UN Security Council Resolution on Women, Peace and Security (Acronym)...

HOMELAND SECURITY I CROSSWORD 2026-03-26

HOMELAND SECURITY I CROSSWORD crossword puzzle
Across
  1. : Decision made by a jury
  2. : Person who oversees court proceedings
  3. : Information used to prevent threats
  4. : Taking property by law enforcement
  5. : Place where legal cases are decided
  6. : Systems like power, water, and transportation
  7. : Supreme law of the United States
  8. : Agency that handles disaster response and recovery
  9. : Freedom from government control
  10. : Legal document allowing a search or arrest
  11. : Law passed to help prevent terrorism
  12. : Freedoms protected by law
  13. : Agency that enforces immigration laws inside the U.S.
  14. : Request to review a court decision
  15. : Monitoring people or places for security purposes
  16. : Ability to act or speak without unjust restriction
  17. : Federal department responsible for homeland security
  18. : Legal status of being a member of a country
  19. : Potential danger to people or systems
  20. : Process of entering a country to live
  21. : Person who gives testimony in court
  22. : Use of violence to create fear for political purposes
  23. : Fair treatment under the law
  24. : Group of citizens who decide a case
  25. : Agency that provides airport and transportation security
Down
  1. : Taking a person into custody
  2. : Information used to prove facts in court
  3. : Boundary between countries
  4. : Balancing safety with personal freedoms
  5. : Highest court in the United States
  6. : Lawyer who represents the government
  7. : Reasonable belief that a crime occurred
  8. : Rights that protect individuals from discrimination
  9. : Branch that protects waterways and performs rescues
  10. : Legal process to determine guilt or innocence
  11. : Protection from threats or danger
  12. : Agency responsible for border protection and customs
  13. : Agency that protects national leaders
  14. : Looking for evidence
  15. : Person accused of a crime
  16. : Organization within the government with a specific mission
  17. : Agency focused on cybersecurity and infrastructure protection
  18. : Freedoms protected by law
  19. : Protection of computer systems and networks
  20. : Change or addition to the Constitution
  21. : Right to keep personal information protected
  22. : Lawyer who represents a person in court
  23. : Statement made under oath
  24. : Rules created and enforced by government

49 Clues: : Looking for evidence: Decision made by a jury: Freedoms protected by law: Person accused of a crime: Freedoms protected by law: Statement made under oath: Boundary between countries: Taking a person into custody: Fair treatment under the law: Freedom from government control: Supreme law of the United States: Protection from threats or danger...

Information Security 2022-02-11

Information Security crossword puzzle
Across
  1. This filter blocks Java, so you may not be able to access Java content on websites.
  2. protection helps protect your local network from the Internet.
  3. The VPN client(s) on the local network can establish a PPTP VPN tunnel through the Router.
  4. This filter blocks cookies, which are data stored on your computer and used by websites when
  5. interact with them.
Down
  1. This filter blocks ActiveX, so you may not be able to access ActiveX content on websites.
  2. The VPN client(s) on the local network can establish an L2TP VPN tunnel through the Router.
  3. The VPN client(s) on the local network can establish an IPSec VPN tunnel through the Router.
  4. This filter blocks the use of Internet proxy servers.

9 Clues: interact with them.This filter blocks the use of Internet proxy servers.protection helps protect your local network from the Internet.This filter blocks Java, so you may not be able to access Java content on websites.This filter blocks ActiveX, so you may not be able to access ActiveX content on websites....

Security Crossword 2015-06-22

Security Crossword crossword puzzle
Across
  1. City sirens warn of this
  2. When the fire system sounds, do this
  3. highest temperature of the day
  4. These may save your life
  5. ...and report
Down
  1. Patrol Officers do this
  2. "Mr. Brown will not be in today"
  3. For an injury, call this team
  4. if you don't have a valid "BI", you get this

9 Clues: ...and reportPatrol Officers do thisCity sirens warn of thisThese may save your lifeFor an injury, call this teamhighest temperature of the day"Mr. Brown will not be in today"When the fire system sounds, do thisif you don't have a valid "BI", you get this

IT-Security 2020-03-25

IT-Security crossword puzzle
Across
  1. Überbegriff für verschiedene Typen von unerwünschten Programmen
  2. Forscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malware
  3. Eine Methode, über gefälschte Webseite, E-Mails und Kurznachrichten an persönliche Daten eines Internet-Benutzers zu gelangen und damit Identitätsdiebstahl zu begehen.
  4. braucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk
Down
  1. anderes Wort für Computerkriminalität bzw. Internetkriminalität
  2. Ist in einem scheinbar nützlichen Programm versteckt und kann z. B. Passwörter auslesen oder auf Daten im Netzwerk zugreifen und diese an den Auftrageber der Malware übermittteln.
  3. Sicherheitskopien
  4. kleine Textdateien, die Informationen über eine besuchte Webseite auf dem PC des Benutzers abspeichern
  5. unerwünschte Werbemails

9 Clues: Sicherheitskopienunerwünschte Werbemailsanderes Wort für Computerkriminalität bzw. InternetkriminalitätÜberbegriff für verschiedene Typen von unerwünschten ProgrammenForscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malwarebraucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk...

Security Crossword 2022-07-27

Security Crossword crossword puzzle
Across
  1. You find the Bomb Threat Checklist, and Extortion Checklist documents in here.
  2. Lock the branch entry/exit doors, relocking after each member leaves. Do not admit anyone into branch after close
  3. when transaction(s) are done within the same day over 10k.
  4. Alt+Shift+I
Down
  1. While opening branch you carry this through the branch while doing walk through.
  2. Certain duties require atleast 2 employees to do such example: Night drop and opening vault.
  3. You find the Robbery Checklist, Robbery Response, and Robbery witness documents in here.
  4. should inspect the branch exterior for signs of forced entry, suspicious vehicles or people
  5. a report you make if you are suspicious of any activity on member's account

9 Clues: Alt+Shift+Iwhen transaction(s) are done within the same day over 10k.a report you make if you are suspicious of any activity on member's accountYou find the Bomb Threat Checklist, and Extortion Checklist documents in here.While opening branch you carry this through the branch while doing walk through....

FOOD SECURITY 2024-10-17

FOOD SECURITY crossword puzzle
Across
  1. suffering from lacking proper nutrition
  2. - This happens when people do not have enough food to eat.
  3. words)the lack of access to clean water
  4. Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
Down
  1. - The type of farming that grows crops without chemicals.
  2. Most devastating famine that occurred in India was the FAMINE OF _____ in 1943.
  3. 281 million undernourished people live on this continent.
  4. - The practice of catching fish for food.
  5. - The storage place where food is kept to be sold or given.

9 Clues: suffering from lacking proper nutritionwords)the lack of access to clean water- The practice of catching fish for food.- The type of farming that grows crops without chemicals.281 million undernourished people live on this continent.- This happens when people do not have enough food to eat.- The storage place where food is kept to be sold or given....

Security Awareness 2024-10-03

Security Awareness crossword puzzle
Across
  1. A type of software that blocks unauthorized access to a network (9 letters)
  2. A secret word or phrase used to gain access to a system (8 letters)
  3. Software that detects and removes malware (10 letters)
  4. A fix to software that addresses a vulnerability or flaw (5 letters)
Down
  1. A program designed to damage or disrupt a computer (5 letters)
  2. The process of converting information into code to prevent unauthorized access (10 letters)
  3. A technique used to steal sensitive information by pretending to be a trustworthy source (8 letters)
  4. A security measure that requires two forms of verification to access an account (3 letters)
  5. Unsolicited or unwanted email, often used for scams (4 letters)

9 Clues: Software that detects and removes malware (10 letters)A program designed to damage or disrupt a computer (5 letters)Unsolicited or unwanted email, often used for scams (4 letters)A secret word or phrase used to gain access to a system (8 letters)A fix to software that addresses a vulnerability or flaw (5 letters)...

Food security 2024-11-28

Food security crossword puzzle
Across
  1. Aid provided to countries experiencing famine.
  2. The loss of food during production or distribution.
  3. The process of converting agricultural products into packaged food.
  4. Government-subsidized programs to provide basic food.
Down
  1. Crops specifically grown to combat hunger, like fortified rice.
  2. A farming system where trees are integrated with crops.
  3. A harmful practice of overusing soil nutrients.
  4. Farming that avoids deforestation.
  5. A disaster leading to the collapse of food production.

9 Clues: Farming that avoids deforestation.Aid provided to countries experiencing famine.A harmful practice of overusing soil nutrients.The loss of food during production or distribution.Government-subsidized programs to provide basic food.A disaster leading to the collapse of food production.A farming system where trees are integrated with crops....

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Poultry raised for eggs meat and feathers
  2. Small animal raised for meat and fur
  3. Animal raised for wool, meat and milk
  4. Large marsupial
Down
  1. Likes to chase mice
  2. Pollinator that plays a critical role in food production
  3. Has a trunk
  4. Flying mammal
  5. Man's best friend

9 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceSmall animal raised for meat and furAnimal raised for wool, meat and milkPoultry raised for eggs meat and feathersPollinator that plays a critical role in food production

Security Awareness 2025-12-22

Security Awareness crossword puzzle
Across
  1. keep it secret
  2. Physical security breach by skipping card readers.
  3. Alternate for Irrelevant Junk mail.
  4. Hardware that filters data packets through network.
Down
  1. Wireless technology in mobile phones.
  2. 7 letter word. I allow only humans and not robots by protecting sites and fake accounts.
  3. World's First Antivirus program.
  4. I will call & trick you by my speaking skills, emotionally touch your heart and take your personal information.
  5. An animal with no limbs but can crawl.

9 Clues: keep it secretWorld's First Antivirus program.Alternate for Irrelevant Junk mail.Wireless technology in mobile phones.An animal with no limbs but can crawl.Physical security breach by skipping card readers.Hardware that filters data packets through network.7 letter word. I allow only humans and not robots by protecting sites and fake accounts....

Q2 Week 6 Groups 4 and 5 2021-12-08

Q2 Week 6 Groups 4 and 5 crossword puzzle
Across
  1. Being able to do something
  2. More than one familiarity
  3. More than one accuracy
  4. More than one agency
  5. Being exact about something
Down
  1. More than one security
  2. More than one ability
  3. Being familiar with someone or something
  4. Being safe
  5. A type of business

10 Clues: Being safeA type of businessMore than one agencyMore than one abilityMore than one securityMore than one accuracyMore than one familiarityBeing able to do somethingBeing exact about somethingBeing familiar with someone or something

Tecnología 2023-03-22

Tecnología crossword puzzle
Across
  1. message
  2. social-media
  3. device
  4. screen
  5. computer
  6. respond
  7. technology
  8. mail
  9. to enjoy
Down
  1. password
  2. security
  3. risk
  4. to have a good time
  5. access
  6. spend time
  7. send
  8. advice
  9. cell-phone

18 Clues: risksendmaildevicescreenaccessadvicemessagerespondpasswordsecuritycomputerto enjoyspend timetechnologycell-phonesocial-mediato have a good time

FIT E: Technology Vocab 2013-05-16

FIT E: Technology Vocab crossword puzzle
Across
  1. is made up of 1000 gigabytes
  2. the wiring in your computer
  3. is made up of 1000 zetabytes
  4. a type of booklet that advertises a company's products
  5. a company's symbol or graphic design
  6. the location where you can put in a disc
  7. the location on your computer where you can plug in your peripherals
  8. any type of attachment you can plug in your computer
  9. a type of program that allows you to receive internet
  10. anything that is sent out of a computer
  11. a informational paper about you and your history, usually made for a job
  12. the privacy and security of yourself on the internet
  13. is made up of 1000 bits
  14. is made up of 1000 petabytes
  15. is made up of 1000 bytes
  16. a type of search engine that searches all types of other search engine
  17. the main center of your computer where all the data goes
Down
  1. a program that allows you to search the web
  2. anything that has to do with the internet
  3. the device you use to operate your desktop
  4. is made up of 1000 yottabytes
  5. the act of spreading public notice for your product
  6. the brain of your computer, where all the data is stored
  7. the term used for a picture or graphic image that is made up by numbers
  8. a zoomable presentation program
  9. is made up of 1000 exabytes
  10. the screen of your computer
  11. anything that you plug in your computer
  12. a company's words or phrase that is advertised
  13. is made up of 1000 terabytes
  14. a program where you can access any type of media or internet wirelessly
  15. is made up of 1000 kilobytes
  16. is made up of 1000 brontobytes
  17. a portable electronic device that is wireless
  18. the location on your cmputer where you can plug in your headphones or earbuds
  19. the place where you can save files off of any type of device
  20. is made up of 1000 megabytes
  21. the smallest amount of storage you can have

38 Clues: is made up of 1000 bitsis made up of 1000 bytesthe wiring in your computeris made up of 1000 exabytesthe screen of your computeris made up of 1000 gigabytesis made up of 1000 zetabytesis made up of 1000 terabytesis made up of 1000 kilobytesis made up of 1000 petabytesis made up of 1000 megabytesis made up of 1000 yottabytes...

Crossword 3 2023-05-24

Crossword 3 crossword puzzle
Across
  1. to make copies
  2. a piece of code that is used to fix a flaw in a computer program
  3. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  4. the proces of stealing another person’s information and using it for personal gain
  5. to make sure that it is legitimate
  6. any type of media used on a webpage, including images and videos
  7. a person who exploits computer hardware and software for their own purposes
  8. a small application that is embedded in a webpage
  9. a measurement of how quickly a computer works
  10. a collection of icons or pictures that have been organized in a file or page
  11. a person who uses computers and the internet to commit crimes
Down
  1. a computer virus that copies its code over and destroys the files of the original data
  2. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  3. a word or phrase that makes a computer perform an operation
  4. a filter that prevents harmful software from entering a network
  5. device that converts mechanical information into electronic signals
  6. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  7. a filter that prevents harmful software from leaving a network
  8. an action that results in the loss of another person’s property
  9. tricking people into giving information through email
  10. how users communicate with a computer
  11. the use of the internet for software and other resources
  12. the company that produces Macs and other computing products
  13. changing computer to your needs
  14. a program that restricts access on a network
  15. to modify or arrange something so that it works in a certain way
  16. a set of rules that must be followed for the sake of security
  17. using a legitimate-looking website to trick people
  18. a personal website maintained by an individual
  19. to work at a location away from a main office by using technology

30 Clues: to make copieschanging computer to your needsto make sure that it is legitimatehow users communicate with a computera program that restricts access on a networka measurement of how quickly a computer worksa personal website maintained by an individuala small application that is embedded in a webpageusing a legitimate-looking website to trick people...

NATO Crossword 2023-08-03

NATO Crossword crossword puzzle
Across
  1. NATO's largest partnership group is known as the Partnership for ___
  2. NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
  3. Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
  4. NATO is the North ___ Treaty Organization
  5. NATO has been leading a peace-support operation in this country since June 1999
  6. The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
  7. This was the first SACEUR, and was later the 34th President of the United States
  8. The lengthy statement released at Summits is often called this.
  9. US General Christopher Cavoli currently holds this position, the second-highest military position within NATO.
  10. This kind of threat typically does not involve weapons, but can include disinformation, interference in politics, and cyber operations
  11. NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
  12. This ability enables Allied forces from different countries to operate together.
  13. Last month's NATO Summit took place in this city.
Down
  1. This Italian city is home to NATO military command.
  2. NATO's maritime security operation in the Mediterranean is called Operation Sea ___
  3. This is the part of the founding treaty that explains how new members can join
  4. PermReps sit on the NAC, or North Atlantic ___
  5. Allies pledged to devote this much of their GDP to defense spending
  6. NATO's military headquarters in Mons, Belgium
  7. All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.
  8. This country is an official Invitee, but not yet a member
  9. This is one of NATO's closest partners, and its headquarters are right downtown
  10. Allies contribute money to fund NATO programs. This is known as ___ funding.
  11. NATO's current Secretary General is from this country
  12. The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
  13. This Virginia city is home to Allied Command Transformation (ACT)

26 Clues: NATO is the North ___ Treaty OrganizationNATO's military headquarters in Mons, BelgiumPermReps sit on the NAC, or North Atlantic ___Last month's NATO Summit took place in this city.This Italian city is home to NATO military command.NATO's current Secretary General is from this countryThis country is an official Invitee, but not yet a member...

Team Building 2025-06-11

Team Building crossword puzzle
Across
  1. What should we do to every member who walks in?
  2. What form has to be filled out to add a joint owner to an account?
  3. Who do we send wires to?
  4. Monthly Cyber Security training
  5. What are we doing when entering C in the proc code?
  6. What tool do we have to check after placing a hold on a check?
  7. Where our goals are entered
  8. What department is notified of the death of a member?
  9. What has to be pressed on the cash advance machine at the end of the night?
  10. What is the name of the credit cards reward program?
  11. What is the drive thru being replaced with?
  12. Who has to be called to release a vehicle from rep?
Down
  1. What can be up to 50% on auto loans depending on credit score?
  2. Where are checks scanned in at the end of the night?
  3. What would you recommend to a member who needs to do some home remodeling?
  4. What program gives CD's a .05% rate increase?
  5. What kind of ID does someone have to have to do a cash advance?
  6. What has to be filled out on verafin when opening a new account?
  7. What has to be accompany a POA being submitted to the back office?
  8. Who do we contact for questions regarding current loans?
  9. Who can withdraw from a custodial account?
  10. How many cross sells per month do you need to reach the first tier goal?
  11. What is checked each time a cashier's check is made
  12. Who needs to be emailed when giving out or receiving $5,000 in cash?
  13. What does an MSR have to pull to qualify someone for a loan?
  14. What do MSR's add to an auto loan that covers vehicle repairs?
  15. What is added to an auto loan to cover the amount owed on the loan vs the amount paid by insurance coverage after a total loss?
  16. What does the E in HELOC represent?

28 Clues: Who do we send wires to?Where our goals are enteredMonthly Cyber Security trainingWhat does the E in HELOC represent?Who can withdraw from a custodial account?What is the drive thru being replaced with?What program gives CD's a .05% rate increase?What should we do to every member who walks in?What is checked each time a cashier's check is made...

CYBERSECURITY AWARENESS - C40 2024-10-22

CYBERSECURITY AWARENESS - C40 crossword puzzle
Across
  1. The process of analyzing systems for vulnerabilities (8 LETTERS)
  2. A program that replicates itself to spread malware (4 LETTERS)
  3. A security method where each user has specific privileges (6 LETTERS)
  4. Cybercriminals often use this method to monitor network activity (8 LETTERS)
  5. Using multiple types of information to verify identity (14 LETTERS)
  6. Security strategy that requires users to change this regularly (8 LETTERS)
Down
  1. Common method used to protect sensitive data (10 LETTERS)
  2. Fake emails claiming to be from trusted sources (8 LETTERS)
  3. A phrase longer than a password for added security (9 LETTERS)
  4. Network of infected computers controlled remotely (6 LETTERS)
  5. Program designed to prevent unauthorized access (8 LETTERS)

11 Clues: Common method used to protect sensitive data (10 LETTERS)Fake emails claiming to be from trusted sources (8 LETTERS)Program designed to prevent unauthorized access (8 LETTERS)Network of infected computers controlled remotely (6 LETTERS)A phrase longer than a password for added security (9 LETTERS)...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  5. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. Which Cristo Rey sports team won medals at Florida National Competition?
  8. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  9. What is the title of the football team’s hype video on Marist School’s website?
  10. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  11. How many Cristo Rey students are part of a “team” at their job? (write out number)
Down
  1. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  2. What type of classes does Northside Hospital offer?
  3. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  4. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  5. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  6. What percent of students at Cristo Rey get accepted to college after graduation?
  7. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  8. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  9. The Coca Cola Company is devoted to replenishing all the ___ they use during production

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  2. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. What is the title of the football team’s hype video on Marist School’s website?
  5. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. What type of classes does Northside Hospital offer?
  8. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  9. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  10. Which Cristo Rey sports team won medals at Florida National Competition?
  11. The Coca Cola Company is devoted to replenishing all the ___ they use during production
Down
  1. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  2. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  5. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  6. What percent of students at Cristo Rey get accepted to college after graduation?
  7. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  8. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  9. How many Cristo Rey students are part of a “team” at their job? (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Cyber Ethics & Networking Concepts 2025-05-24

Cyber Ethics & Networking Concepts crossword puzzle
Across
  1. Computer network created for an individual person
  2. Bulk emails from unknown sources
  3. Use single user software in multiple system
  4. Stands for Wi-Fi
  5. Delivers message only to the destination
  6. Topology where data travels in a cicular path
  7. Imitating or copying the sources of one's original work to another persons
  8. All nodes connected via a central device
  9. Criminal Activities that involve the use of computers
Down
  1. An impression of information about a person using internet
  2. Responsible behaviour in social media
  3. A type of cyberattack that uses fraudulent email
  4. Simplest form of network topology
  5. Each computer in a network
  6. Illegally copied or distributed software
  7. Internet accessing in an illegal manner
  8. Network within a small area
  9. Harmful program disrupts computer system

18 Clues: Stands for Wi-FiEach computer in a networkNetwork within a small areaBulk emails from unknown sourcesSimplest form of network topologyResponsible behaviour in social mediaInternet accessing in an illegal mannerIllegally copied or distributed softwareDelivers message only to the destinationHarmful program disrupts computer system...

Police - Unit 2 2014-09-24

Police - Unit 2 crossword puzzle
Across
  1. Flugzeug
  2. Befehl
  3. verhaften
  4. Polizist
  5. stehlen
  6. Fingerabdruck
  7. Dieb
  8. losgehen
Down
  1. Pistole
  2. Blut
  3. wichtig
  4. einbrechen
  5. Sicherheit
  6. Wache

14 Clues: BlutDiebWacheBefehlPistolewichtigstehlenFlugzeugPolizistlosgehenverhafteneinbrechenSicherheitFingerabdruck

Bullying 2022-06-06

Bullying crossword puzzle
Across
  1. a single significant act or a pattern of acts by one or more students
  2. intentional repeated feels proud
  3. using threats
  4. use of any electronic means to hurt someone
  5. excluding others from a group
  6. identity of the person who bullies can be kept secret.
Down
  1. sending pictures messages information using electronic devices
  2. accidental occasional feels remorse
  3. secrecy of internet encourages those who might not otherwise bull
  4. pointing out differences
  5. any physical contact that hurts a person
  6. name calling jokes offensive remarks

12 Clues: using threatspointing out differencesexcluding others from a groupintentional repeated feels proudaccidental occasional feels remorsename calling jokes offensive remarksany physical contact that hurts a personuse of any electronic means to hurt someoneidentity of the person who bullies can be kept secret....

Future of Sport 2025-08-21

Future of Sport crossword puzzle
Across
  1. Underground venue for 60-degree Wimbledon (7)
  2. Mechanical horses in volcano racing (5)
  3. What gravity becomes in 2050 tennis matches (4)
  4. Time-traveling referees work across these (7)
  5. Cristiano's six identical fashion moguls (6)
  6. Virtual boxer you can't actually touch (8)
Down
  1. Flying robots that join human footballers on the pitch (6)
  2. Brain-computer links for drone pilots (6)
  3. Ronaldo-Charlie's business speciality (7)
  4. Wearable flight device for cricket batsmen (7)
  5. Transparent beings in boxing rings (6)

11 Clues: Transparent beings in boxing rings (6)Mechanical horses in volcano racing (5)Brain-computer links for drone pilots (6)Ronaldo-Charlie's business speciality (7)Virtual boxer you can't actually touch (8)Cristiano's six identical fashion moguls (6)Underground venue for 60-degree Wimbledon (7)Time-traveling referees work across these (7)...

Cybersecurity Month 2022-10-13

Cybersecurity Month crossword puzzle
Across
  1. ________ Information must be protected from leaks or accidental exposure.
  2. Button in Outlook to report suspicious email or phishing in one click.
  3. _______ Period is the length of time information assets are maintained for an authorized person.
  4. Security _______ is a single or series of unwanted or unexpected information Security Events
Down
  1. What is celebrated in October?
  2. Information is accessible to authorized users.
  3. Information is accurate, complete, and reliable.
  4. Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
  5. A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.

9 Clues: What is celebrated in October?Information is accessible to authorized users.Information is accurate, complete, and reliable.Button in Outlook to report suspicious email or phishing in one click.________ Information must be protected from leaks or accidental exposure....

Appian Developer 2022-11-07

Appian Developer crossword puzzle
Across
  1. An Appian object that stores an expression to be called from other expressions
  2. Configuration option that indicates a processes relative importance over other processes
  3. An Appian object that is a focused work environment for their user
  4. links to process models the user can start directly from a record
  5. Role assigned to the user who starts a given process
  6. the underlying technology that powers Appian Interfaces
  7. An Appian object that stores connection info for an external system
  8. An interface for feeds, tasks, and actions that is available to all Appian users
  9. links to process models the user can start directly from the record list
  10. An object in the process modeler that represents a step in a process
Down
  1. The type of security role given to a user that includes all possible permissions
  2. A specific type of variable that is only available in the context in which it is defined
  3. An Appian object that allows you to create a collection of users with security permissions
  4. An Appian object that connects Appian to external relational databases
  5. A general term for all components that make up the end user experience
  6. any individual who can access and use any of the Appian interfaces
  7. A category of process model nodes which evaluate criteria to determine paths to follow
  8. A type of security role where the user can view and modify the object, but not edit security
  9. A column in a data table that provides a link between data in two tables
  10. Confirmation that an extracted piece of data is correct
  11. A series of tasks linked together to create a wizard which a user can navigate
  12. A user interface component that allows the user to make a binary choice 'yes' or 'no'
  13. A response that occurs when a task is delayed

23 Clues: A response that occurs when a task is delayedRole assigned to the user who starts a given processConfirmation that an extracted piece of data is correctthe underlying technology that powers Appian Interfaceslinks to process models the user can start directly from a recordany individual who can access and use any of the Appian interfaces...

Cybersecurity unit 6 and 7 vocabulary 2026-03-03

Cybersecurity unit 6 and 7 vocabulary crossword puzzle
Across
  1. The practice of sending users to a fraudulent website to gain control over or gain information from a user.
  2. ISPs that use paid transit for more local transit.
  3. Targeting powerful figures such as CEOs and Celebrities to gain the most valuable information.
  4. A security tool that uses multiple one-time passwords to create a much more secure login.
  5. Use of manipulative techniques to gain information from a target such as passwords.
  6. An IP network that can reach every other network on the internet without paying for a transit.
  7. A secure, centralized building that houses computer infrastructure, such as servers and data storage drives.
  8. The set of rules governing how data is transmitted and addressed on the internet,
  9. The largest network in the world, connecting almost every network and device to each
Down
  1. An internet security tool that masks your IP address and sends it through an encrypted tunnel
  2. The practice of sending fraudulent messages in order to trick victims into revealing information.
  3. The vast majority of the internet, it can only be accessed through authorized access such as a password or a paywall.
  4. Any unauthorized activity that compromises the confidentiality, integrity, and availability of data systems.
  5. The part of the internet that can be freely accessed by everyone.
  6. A network security tool that acts as a digital barrier between a trusted network and an untrustworthy network.
  7. The part of the internet that is intentionally hidden and requires special software to access it.
  8. Process of gathering information on a target without directly interacting with its systems.
  9. A security tool that detects, prevents, and removes malicious software.
  10. The final segment of a network that relies on infrastructure that physically connects an ISP’s network to an end user.
  11. A powerful computer that stores data and manages network resources for a network, delivering it to other “client” computers.

20 Clues: ISPs that use paid transit for more local transit.The part of the internet that can be freely accessed by everyone.A security tool that detects, prevents, and removes malicious software.The set of rules governing how data is transmitted and addressed on the internet,Use of manipulative techniques to gain information from a target such as passwords....

MALEWARE 2023-06-19

MALEWARE crossword puzzle
Across
  1. REAPETING SOMETHING TO ANNOY SOMEONE
  2. SPYS ON YOU AND STEALS YOUR PASSWORDS
Down
  1. SPYS ON YOU
  2. HOLDS YOU HOSTAGE ONLINE
  3. ATTAKERS DECIVE POEPLE
  4. SOMEONE HACKS YOU

6 Clues: SPYS ON YOUSOMEONE HACKS YOUATTAKERS DECIVE POEPLEHOLDS YOU HOSTAGE ONLINEREAPETING SOMETHING TO ANNOY SOMEONESPYS ON YOU AND STEALS YOUR PASSWORDS

G8 CrossWord 2013-01-14

G8 CrossWord crossword puzzle
Across
  1. Can't_host_G8_meetings
  2. A_major_concern_at_G8
  3. Location_of_first_G8
  4. The_8th_country_added_to_G8
  5. Large_South_American_Economy_not_in_G8
  6. Common_issue_discussed
  7. Hosted_2007_G8
Down
  1. Large_Asian_Economy_not_in_G8
  2. Leader_who_did_not_attend_2012_G8
  3. Average_number_of_days_of_G8_meetings
  4. Next_host_of_G8
  5. First_North_American_Country_in_G8
  6. Only_Asian_Country
  7. The_7th_country_added_to_G8

14 Clues: Hosted_2007_G8Next_host_of_G8Only_Asian_CountryLocation_of_first_G8A_major_concern_at_G8Can't_host_G8_meetingsCommon_issue_discussedThe_7th_country_added_to_G8The_8th_country_added_to_G8Large_Asian_Economy_not_in_G8Leader_who_did_not_attend_2012_G8First_North_American_Country_in_G8Average_number_of_days_of_G8_meetings...

Airports 2020-03-07

Airports crossword puzzle
Across
  1. 4
  2. 7
  3. 1
  4. 9
  5. 6
  6. 13
  7. 2
  8. 8
  9. 12
Down
  1. 11
  2. 5
  3. 14
  4. 3
  5. 10

14 Clues: 4571936281114131012

Bonds 2014-05-02

Bonds crossword puzzle
Across
  1. The price at which a seller is prepared to sell a security at a particular time.
  2. Unable to pay debts.
  3. Businesses that buy and sell securities.
  4. The price at which a buyer is prepared to buy a security at a particular time.
  5. People or institutions to whom money is owed.
  6. Payments by companies to their shareholders.
Down
  1. Funds operated by investment companies that invest people’s money in various assets.
  2. The length of time for which a bond is issued (until it is repaid).
  3. The amount of capital making up a bond or other loan.
  4. Funds that invest money that will be paid to people after they retire from work.
  5. The amount of interest that a bond pays.
  6. Part ownership of a company in the form of stocks or shares.
  7. The rate of income an investor receives from a security.

13 Clues: Unable to pay debts.Businesses that buy and sell securities.The amount of interest that a bond pays.Payments by companies to their shareholders.People or institutions to whom money is owed.The amount of capital making up a bond or other loan.The rate of income an investor receives from a security....

Air Travel Words 2022-04-18

Air Travel Words crossword puzzle
Across
  1. time The time a plane will leave from an airport.
  2. attendant The airline employee responsible for providing service to passengers and ensuring their in-flight safety.
  3. pass The ticket passengers need to enter the plane and locate their seat.
  4. The area where the pilot sits to operate the plane; remains closed and locked during flight for security reasons.
  5. flight The airplane a passenger catches after a layover.
  6. time The time a plane will land at an airport.
  7. class The section of the plane that offers standard seat size, amenities, and service; typically, the least expensive section. Also called economy class.
  8. A flight that departs late at night and arrives during early morning hours.
  9. class A section of the plane reserved for travelers who want to upgrade from the standard seat size, amenities, and service.
Down
  1. luggage Bags that are put in the cargo area of the plane, which is inaccessible by passengers.
  2. class The section of the plane that offers the largest seat size and highest-quality amenities and service.
  3. ticket A ticket that passengers buy to fly to a destination but not to return.
  4. number The number that identifies a particular flight and that passengers use to find their gate number and plane.
  5. agent An airline employee who checks in passengers, checks luggage, and prints boarding passes.
  6. ticket A ticket that passengers buy to travel to a destination and back again.
  7. The process passengers must go through when first arriving at the airport before going through security.
  8. (Federal Aviation Administration) The federal agency that develops and enforces safety regulations and advancements.
  9. A stop in an airport before reaching the final destination.
  10. The bags passengers bring with them on the plane.
  11. class See coach class.
  12. (Transportation Security Administration) A federal agency that protects transportation systems in the United States and ensures safe air travel; employees serve as security officers in airports.
  13. claim The area in the airport where passengers go to collect their luggage.

22 Clues: class See coach class.time The time a plane will land at an airport.time The time a plane will leave from an airport.The bags passengers bring with them on the plane.flight The airplane a passenger catches after a layover.A stop in an airport before reaching the final destination....

CHAPTER 6 NATIONAL SECURITY AND PEACE EDUCATION 2019-09-30

CHAPTER 6 NATIONAL SECURITY AND PEACE EDUCATION crossword puzzle
Across
  1. the particular condition that someone or something is in at a specific time.
  2. a group of people living in the same place or having a particular characteristic in common.
  3. discussion aimed at reaching an agreement.
  4. WOLFERS- who has a member of the council of the ISS and did much to help the institute was one of the handful of men created the establishment of academic fields of international now politics.
  5. he state of being free from danger or threat.he state of being free from danger or threat.
  6. profession, activity, or skill of managing international relations, typically by a country's representatives abroad.
  7. intense feeling of deep affection.
  8. relating to the government or the public affairs of a country.
  9. PEACE- refers to a state of affairs where peace is permanently established over a certain area. ... The term perpetual peace became acknowledged when German philosopher Immanuel Kant published his 1795 essay Perpetual Peace: A Philosophical Sketch.
Down
  1. the power or right to give orders, make decisions, and enforce obedience.
  2. the power or right to act, speak, or think as one wants without hindrance or restraint.
  3. surroundings or conditions in which a person, animal, or plant lives or operates.
  4. the arts and other manifestations of human intellectual achievement regarded collectively.
  5. a large body of people united by common descent, history, culture, or language, inhabiting a particular country or territory.
  6. the action of protecting, or the state of being protected.
  7. from disturbance; tranquility.
  8. SECURITY-National security is the security of a nation state, including its citizens, economy, and institutions, which is regarded as a duty of government.
  9. The branch of knowledge concerned with the production, consumption, and transfer of wealth.
  10. relating to or characteristic of soldiers or armed forces.
  11. MAIER-served as the director of the Center for European Studies at Harvard, 1994-2001, and currently co-directs (with Sven Beckert, Sugata Bose, and Jean Comaroff) the Weatherhead Initiative in Global History.

20 Clues: from disturbance; tranquility.intense feeling of deep affection.discussion aimed at reaching an agreement.the action of protecting, or the state of being protected.relating to or characteristic of soldiers or armed forces.relating to the government or the public affairs of a country....

Radio Numbers 2 2026-03-27

Radio Numbers 2 crossword puzzle
Across
  1. Amanda Laughery Night Shift Supervisor
  2. Ofc Erica Burns Building Security
  3. Breann Hathaway
  4. Ofc Michael Sheehan
  5. K9 Ofc Jason Ward
  6. Chief Eric Schmitt
  7. Sgt Caleb Teig
  8. Ofc Joshua Gross
  9. Code Norman Teed
  10. Natalie Rodgers
  11. Ofc Darold Donathan
  12. Chaplin Tom Willcox CP1
  13. Ofc Julia Swoboda
  14. PSA Haley Mendoza
  15. SRO Taylor Davisson
  16. Ofc Johnathan Sigmin
  17. Ofc Kory Franklin
  18. Ofc William Huber
  19. Sgt Stanley Kauffman
  20. Ofc Don Bradford Building Security
  21. Ofc Trainee Ashlyn Thom
  22. Allie Bryant
  23. Ofc Sarah Chapman Building Security
  24. Sgt Melissa Stowers
  25. Lt Dale Burnett
  26. Det Zach Hamilton
  27. Ofc Emilee Norris
  28. Det BJ Russell
  29. Ofc James Wood
  30. Code Kirk Standridge
  31. Ofc Michael Wachob
  32. Code Christopher Barber
  33. Sgt Jeremy Dixon
  34. Code Ronnie Bradley
  35. Ofc Steven Parrish
  36. Julie Lowery Records
  37. John Pate Part Time
  38. Ken Watson
  39. Ofc Colton Schmitt
  40. OIT Bodee Hern
  41. Nicole Robinson
Down
  1. Lt Eric Wehmeier
  2. PSA Dave Miller
  3. Det Sgt Tanner Muckenthaler
  4. Ofc Gavin Gannaway
  5. Ofc Christian Urbina
  6. Lt EJ Jones
  7. Ofc Matt Edie
  8. Ofc Wesley Anderson
  9. ACO Ashley Hurst
  10. Ofc Jordan Harder
  11. Ofc Chase Rains
  12. Breanne Benton
  13. K9 Ofc Brendan Gamble
  14. Kayla Lovell
  15. SRO Jesse Wilcox
  16. Ofc Brittney Holt
  17. Sgt Cody Lowery
  18. Ofc Kayla Smith
  19. Ofc Caleb McCarty
  20. Lori Hodge
  21. Ofc Nicholas Brown
  22. Det Cody Foster
  23. Ofc Daniel McKinney
  24. Sgt Gregory Yartz
  25. Ofc Robert Bishop Court Security
  26. Eastyn Buttke
  27. Ofc Austin Simmons
  28. Elijah Emerson
  29. Det Joe Edwards
  30. Ofc Amber Edie
  31. Ofc Alex Kaster
  32. Ofc Kyle Rhea
  33. Det Seth Jenkerson
  34. Ofc Alexander Rose
  35. Ofc Luis Gonzalez
  36. SRO Steve Mobley
  37. Det David Lingscheit
  38. Ofc Austin Williams
  39. Missy Dement Records
  40. Harold Clements Comm Supervisor
  41. Ofc Logan Wilson

82 Clues: Lori HodgeKen WatsonLt EJ JonesKayla LovellAllie BryantOfc Matt EdieEastyn ButtkeOfc Kyle RheaSgt Caleb TeigBreanne BentonElijah EmersonOfc Amber EdieDet BJ RussellOfc James WoodOIT Bodee HernPSA Dave MillerBreann HathawayOfc Chase RainsNatalie RodgersSgt Cody LoweryOfc Kayla SmithDet Cody FosterLt Dale BurnettDet Joe EdwardsOfc Alex Kaster...

French words 2023-04-14

French words crossword puzzle
Across
  1. cash
  2. cue/line
  3. suitcase
  4. bed
  5. baggage
  6. strike
  7. tip
  8. customs
  9. on foot
  10. ticket
  11. castle
  12. post office
Down
  1. car
  2. people
  3. menu
  4. taxi
  5. palace
  6. cathedral
  7. passport
  8. guide
  9. stamp
  10. boat
  11. security
  12. consultant
  13. subway

25 Clues: carbedtipmenucashtaxiboatguidestamppeoplepalacestriketicketsubwaycastlebaggagecustomson footcue/linesuitcasepassportsecuritycathedralconsultantpost office

Career English 1과 2021-03-30

Career English 1과 crossword puzzle
Across
  1. 유대감
  2. 난민
  3. 귀중한
  4. 인정
  5. 보장,안정감
  6. 희생자
  7. 영구적인
  8. 간헐적인
  9. 예산
Down
  1. 청소년기
  2. 자격
  3. 존엄성
  4. 변호사
  5. 희생하다

14 Clues: 자격난민인정예산유대감귀중한존엄성변호사희생자청소년기희생하다영구적인간헐적인보장,안정감

Asdf 2026-03-25

Asdf crossword puzzle
Across
  1. Security
  2. Service
  3. Late
  4. Delay
  5. International
  6. Time
Down
  1. Take off
  2. Takeoff
  3. Compartment
  4. Destination
  5. Land
  6. Delay
  7. Seat
  8. Sign
  9. Runway

15 Clues: LandSeatLateSignTimeDelayDelayRunwayTakeoffServiceTake offSecurityCompartmentDestinationInternational

GSCP 3rd Activities - Key Management 2025-11-04

GSCP 3rd Activities - Key Management crossword puzzle
Across
  1. What was the topic of the second Global Security Culture Program campaign?
  2. The primary purpose of the red zone is to protect what?
  3. Security measure distributed based on roles and business justification.
  4. An alarm that will be triggered when someone opens a door without receiving "access granted" (green light).
  5. Security Zone that is inside the fence line, outside the building.
Down
  1. What type of connector is used as a safety mechanism for lanyards?
  2. How are Media Bin Keys classified in the Key Risk Matrix?
  3. Security Zone that is inside the building, outside of the red zone.
  4. The process by which all individuals and objects are screened going into and out of the Red Zone.
  5. Which system do Amazon data centers use to securely manage physical keys, control access permissions, and track key usage history?

10 Clues: The primary purpose of the red zone is to protect what?How are Media Bin Keys classified in the Key Risk Matrix?What type of connector is used as a safety mechanism for lanyards?Security Zone that is inside the fence line, outside the building.Security Zone that is inside the building, outside of the red zone....

Jordan's Crossword puzzle 2018-11-18

Jordan's Crossword puzzle crossword puzzle
Across
  1. demanding money for information
  2. let's attacker to secretly control the users infected computer
  3. small piece of software that corrupts devices
  4. the programs and other operating info used by a computer
  5. a type of software intended to damage or destroy
Down
  1. a necessity when hacking putting in a virus
  2. uses computer networks to duplicate itself
  3. it claims to be a game
  4. trying to get someone to reveal personal information
  5. denial of service
  6. attacks online
  7. repeatedly showing up on your screen
  8. kids can't fill this gap if it's too large
  9. attacks personal information; also the name of king of gods
  10. uses email addresses to replicate itself

15 Clues: attacks onlinedenial of serviceit claims to be a gamedemanding money for informationrepeatedly showing up on your screenuses email addresses to replicate itselfuses computer networks to duplicate itselfkids can't fill this gap if it's too largea necessity when hacking putting in a virussmall piece of software that corrupts devices...

Networking Concepts & Cyber Ethics 2025-05-30

Networking Concepts & Cyber Ethics crossword puzzle
Across
  1. : We send and get messages here
  2. : We use this to click on computer
  3. : We should not share too many of these
  4. : We should be this when using internet
  5. : We must follow these when we use internet
  6. : It helps our phone or laptop to use internet
  7. : Word used for online world
  8. : We use this to visit websites
  9. : Kids play this on computer or phone
Down
  1. : We use this to study and play
  2. : We watch this on YouTube
  3. : We should keep this secret
  4. : We should only chat with real ____ online
  5. : Talking with friends using phone or computer
  6. : We should not share this with strangers online

15 Clues: : We watch this on YouTube: We should keep this secret: Word used for online world: We use this to study and play: We send and get messages here: We use this to visit websites: We use this to click on computer: Kids play this on computer or phone: We should not share too many of these: We should be this when using internet...

AICyber 2026-01-02

AICyber crossword puzzle
Across
  1. A machine that chats with humans
  2. A harmful program that spreads
  3. Short form of Artificial Intelligence
  4. Barrier that blocks cyber attacks
Down
  1. Person who breaks into systems
  2. Secret word to log in
  3. Attempt to break into a system

7 Clues: Secret word to log inPerson who breaks into systemsA harmful program that spreadsAttempt to break into a systemA machine that chats with humansBarrier that blocks cyber attacksShort form of Artificial Intelligence

E-safety 2020-10-15

E-safety crossword puzzle
Across
  1. how you feel
  2. what everyone uses to interact with people virtually
  3. how you may feel
  4. a mean person who hides behind a screen
Down
  1. what you need to do to keep you information safe
  2. who you could go to
  3. who you could tell
  4. dont make it your real name

8 Clues: how you feelhow you may feelwho you could tellwho you could go todont make it your real namea mean person who hides behind a screenwhat you need to do to keep you information safewhat everyone uses to interact with people virtually

Encryption 2022-01-10

Encryption crossword puzzle
Across
  1. Decoding machine used at Bletchley Park during
  2. an algorithm for performing encryption and
  3. appear
  4. Type of analysis used to determine how often
Down
  1. Code used during WW1/2 comprising dots and dashes
  2. Organisation responsible for UK cyber defence
  3. Person responsible for the first substitution cipher
  4. an encryption method used by the ancient

8 Clues: appearan encryption method used by the ancientan algorithm for performing encryption andType of analysis used to determine how oftenOrganisation responsible for UK cyber defenceDecoding machine used at Bletchley Park duringCode used during WW1/2 comprising dots and dashesPerson responsible for the first substitution cipher

BULLYING 2024-08-10

BULLYING crossword puzzle
Across
  1. bullying perundungan pada sosial media
  2. Orang yang meminta uang dengan disertai ancaman adalah
  3. kata bully berasal dari bahasa
  4. bullying dapat menyebabkan
Down
  1. tindakan yang membully disebut dengan
  2. bullying dalam bentuk perkataan disebut dengan
  3. Pembullyan dalam bentuk kekerasan, seperti menjambak, memukul, dan menendang adalah bentuk bullying
  4. perubahan suasana hati disebut dengan

8 Clues: bullying dapat menyebabkankata bully berasal dari bahasatindakan yang membully disebut denganperubahan suasana hati disebut denganbullying perundungan pada sosial mediabullying dalam bentuk perkataan disebut denganOrang yang meminta uang dengan disertai ancaman adalah...

IS and BC Cross-Up Crossword 2021-10-26

IS and BC Cross-Up Crossword crossword puzzle
Across
  1. Your ________ device often contains more personal information than any other source.
  2. BCP's main focus is not preventing incidents but rather the __________ from it.
  3. A major business disruption; the earth moves, shifts and shakes.
  4. Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
  5. The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
  6. _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
  7. sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
  8. __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
  9. Never use your TTUTC________address for personal usage.
  10. Sending an email, posting photos on a social media site and using your webcam.
  11. The global system of interconnected computer networks that link billions of devices.
  12. a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
  13. This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
  14. The art of manipulating people to get access to sensitive information (two words.
  15. conforming to a rule, such as a specification, policy, standard or law.
  16. A collection of computers that are controlled on the same network.
  17. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  18. The staff and the customers are considered.
  19. The UTC hotsite is located here.
  20. This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
  21. Facebook and TikTok are types of ________ (two words).
Down
  1. A crime where a computer is the object of the crime or is used as a tool to commit an offense.
  2. someone who seeks and exploits weaknesses in a computer system or computer network.
  3. Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
  4. A technology that allows us to access our files through the internet from anywhere in the world.
  5. When calls are made by social engineering, they are called _____ .
  6. Choose a password that is easy for you to ____________ but hard for you someone to guess.
  7. information such as legal documents and contracts must be classified as __________information. - (restricted)
  8. A piece of code put in to correct an error.
  9. Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
  10. Always _______your computer when you leave your desk.
  11. Where do UTC employee report their ICT issues (three words).
  12. My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
  13. The address of a webpage. Check the validity of it before clicking on it (acronym).
  14. Usually comprises the display device of the computer.
  15. An asset like other essential business assets in the Corporation.
  16. Who can be the target of a cyber attack.
  17. A concept where all things are connected to the internet; household items usually (three words).
  18. Equipment that offers short term protection against power surges and power outages (acronym).
  19. __________ Edwards is the Recovery Director and is in charge of BCP.
  20. A fraudulent email purportedly from a reputable company attempting to get personal information.
  21. Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
  22. The process of adding allowed programs to a list is called_________.
  23. You can call 999, 881 or 990 for _______ services.
  24. “ This too good to be true email gives off a false sense of ______”.
  25. Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
  26. A list of entities that are blocked or denied privileges or access.
  27. The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).

48 Clues: The UTC hotsite is located here.Who can be the target of a cyber attack.A piece of code put in to correct an error.The staff and the customers are considered.You can call 999, 881 or 990 for _______ services.Always _______your computer when you leave your desk.Usually comprises the display device of the computer....

Cad Abbreviations 2023-12-27

Cad Abbreviations crossword puzzle
Across
  1. security
  2. traffic
  3. supervisor
  4. last seen wearing
  5. on the phone
  6. number
  7. occupied
  8. on scene
  9. business
Down
  1. accident
  2. Suspect
  3. between
  4. In Front of
  5. voicemail
  6. location
  7. possibly
  8. methed of travel
  9. unknown
  10. no further information

19 Clues: numberSuspectbetweentrafficunknownaccidentsecuritylocationpossiblyoccupiedon scenebusinessvoicemailsupervisorIn Front ofon the phonemethed of travellast seen wearingno further information

crossword 2025-10-27

crossword crossword puzzle
Across
  1. Engineering
  2. Marketing Director
  3. Activities Director
  4. Graphic Design
  5. Spanish
  6. Ivrit
  7. AP English
  8. Associate Principal
  9. Lab
  10. Israel Guidance
Down
  1. Art
  2. Principal
  3. Gym
  4. History
  5. Security
  6. College Guidance
  7. 9th Grade Biology
  8. Rambam
  9. Admissions Coordinator

19 Clues: ArtGymLabIvritRambamHistorySpanishSecurityPrincipalAP EnglishEngineeringGraphic DesignIsrael GuidanceCollege Guidance9th Grade BiologyMarketing DirectorActivities DirectorAssociate PrincipalAdmissions Coordinator

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  2. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  3. Which Cristo Rey sports team won medals at Florida National Competition?
  4. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  5. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  6. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  7. How many Cristo Rey students are part of a “team” at their job? (write out number)
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  9. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  10. What is the title of the football team’s hype video on Marist School’s website?
  11. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
  1. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  2. How many credits do you need to graduate from Cristo Rey? (write out number)
  3. What percent of students at Cristo Rey get accepted to college after graduation?
  4. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  5. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  6. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  7. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  8. What type of classes does Northside Hospital offer?
  9. Through corporate work study program, students earn ____% of the cost of their education (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  2. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  3. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  4. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  5. What type of classes does Northside Hospital offer?
  6. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  7. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  8. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  9. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
  1. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  2. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  3. What is the title of the football team’s hype video on Marist School’s website?
  4. Which Cristo Rey sports team won medals at Florida National Competition?
  5. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  8. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  9. What percent of students at Cristo Rey get accepted to college after graduation?
  10. How many Cristo Rey students are part of a “team” at their job? (write out number)
  11. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cyber Safety 2020-08-21

Cyber Safety crossword puzzle
Across
  1. detects viruses and eliminates them before they get into you computer.
  2. software that is made to damage or gain unauthorized access to a computer
  3. folders within a cite which holds your information (username, password, etc.) about that website without taking other personal information.
Down
  1. a type of software that allows another user to have information about another computer using a hard drive.
  2. bad mails that a made for taking information about your passwords, credit card number, and especially to get into you bank account.
  3. system that blocks not wanted users and mails from getting your information.
  4. a sickness for a computer. When received one, you can’t get into your computer.
  5. junk mail that can also be called “unwanted mail”

8 Clues: junk mail that can also be called “unwanted mail”detects viruses and eliminates them before they get into you computer.software that is made to damage or gain unauthorized access to a computersystem that blocks not wanted users and mails from getting your information.a sickness for a computer. When received one, you can’t get into your computer....

cyber acoso 2021-04-06

cyber acoso crossword puzzle
Across
  1. hacer daño a alguien
  2. alguien hace algo que supera los limites
  3. alguien se mata
  4. intentar entender lo que alguien piensa y siente
  5. ser rudos tanto física como psicológicamente
Down
  1. un adulto intenta contactar un menor con intento sexual
  2. lo que tú piensas de ti
  3. pensar que no hay nadie a nuestro lado

8 Clues: alguien se matahacer daño a alguienlo que tú piensas de tipensar que no hay nadie a nuestro ladoalguien hace algo que supera los limitesser rudos tanto física como psicológicamenteintentar entender lo que alguien piensa y sienteun adulto intenta contactar un menor con intento sexual

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  2. ____Regulation works by utilising feedback
  3. according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
  1. wrote Code and Other Laws of Cyberspace
  2. cyber____
  3. digital___ is the productivity platform that some experts regard as the third industrial revolution
  4. Shawn Fanning created the____
  5. the conversion of analogue data into digital form

8 Clues: cyber____Shawn Fanning created the____wrote Code and Other Laws of Cyberspace____Regulation works by utilising feedbackthe conversion of analogue data into digital formdigital___ is the productivity platform that some experts regard as the third industrial revolution...

Cyber Safety 2022-02-02

Cyber Safety crossword puzzle
Across
  1. SHOT MESSAGE
  2. UNIQUE ADDRESS OF YOUR DEVICE
  3. SMALL TEXT FILES
  4. ATTACK ON INDIVIDUAL OR GROUP
Down
  1. FILE THAT STEAL OR INFECT
  2. HARASS ON INTERNET
  3. SOCIAL NETWORK FOR BUSINESS
  4. ATTACK THAT PREVENT LEGITIMATE USERS

8 Clues: SHOT MESSAGESMALL TEXT FILESHARASS ON INTERNETFILE THAT STEAL OR INFECTSOCIAL NETWORK FOR BUSINESSUNIQUE ADDRESS OF YOUR DEVICEATTACK ON INDIVIDUAL OR GROUPATTACK THAT PREVENT LEGITIMATE USERS

Cyber Safety 2021-09-16

Cyber Safety crossword puzzle
Across
  1. 123moveies.com
  2. Donald Trump Social Media
  3. Middle mother social media
  4. Scam
Down
  1. Social Media
  2. Social Media
  3. Clock
  4. Virus
  5. Market Fraud

9 Clues: ScamClockVirusSocial MediaSocial MediaMarket Fraud123moveies.comDonald Trump Social MediaMiddle mother social media

cyber safety 2019-09-26

cyber safety crossword puzzle
Across
  1. get off online identity theft stealing something
  2. URL www.pizza.com
  3. media instagram snapchat
Down
  1. information it belongs to your
  2. fish
  3. scam scam
  4. balance every once and awhile get off your phone
  5. flag feeling this feels wrong

8 Clues: fishscam scamURL www.pizza.commedia instagram snapchatinformation it belongs to yourflag feeling this feels wrongbalance every once and awhile get off your phoneget off online identity theft stealing something

CYBER BULLYING 2015-02-18

CYBER BULLYING crossword puzzle
Across
  1. Πώς ονομάζεται το άτομο που εκφοβίζεται ;
  2. Οι θύτες έχουν κακή ...
  3. Πώς ονομάζεται το άτομο που εκφοβίζει;
  4. Γίνεται ανάμεσα σε δύο ανθρώπους ...
Down
  1. Υπάρχει λεκτική και σωματική ...
  2. Διαταράσσεται η ... των εφήβων
  3. Κυκλοφορούν κακά ... βασιζόμενα στο θύμα
  4. Κυριαρχεί η ... στον εκφοβισμό

8 Clues: Οι θύτες έχουν κακή ...Διαταράσσεται η ... των εφήβωνΚυριαρχεί η ... στον εκφοβισμόΥπάρχει λεκτική και σωματική ...Γίνεται ανάμεσα σε δύο ανθρώπους ...Πώς ονομάζεται το άτομο που εκφοβίζει;Κυκλοφορούν κακά ... βασιζόμενα στο θύμαΠώς ονομάζεται το άτομο που εκφοβίζεται ;

CYBER CRIME 2022-10-10

CYBER CRIME crossword puzzle
Across
  1. a person who has committed a crime
  2. a technique used by hackers to redirect users to false websites without their knowledge.
  3. a verb meaning to gain unauthorized access into a computer system
  4. a horse malware
Down
  1. the process of proving that something is real
  2. a type of social engineering attack often used to steal user data
  3. intrusive software that is designed to damage and destroy computers
  4. an expression of intention to damage or to harm

8 Clues: a horse malwarea person who has committed a crimethe process of proving that something is realan expression of intention to damage or to harma type of social engineering attack often used to steal user dataa verb meaning to gain unauthorized access into a computer systemintrusive software that is designed to damage and destroy computers...

Cyber Crime 2024-05-29

Cyber Crime crossword puzzle
Across
  1. Pretending to be someone else for bad reasons
  2. Holding your information for money
  3. Pretending to be a real business
  4. = stealing something
  5. You need this on your devices
Down
  1. It can happen to your accounts
  2. to bother someone in a bad way
  3. = not legal

8 Clues: = not legal= stealing somethingYou need this on your devicesIt can happen to your accountsto bother someone in a bad wayPretending to be a real businessHolding your information for moneyPretending to be someone else for bad reasons

Cyber wellness 2023-02-01

Cyber wellness crossword puzzle
Across
  1. Tell an adult if someone is c___________ you
  2. do not leak your p_______ information
  3. R______ other peoples opinions when online
  4. be safe while your playing o_____
Down
  1. dont share your i__________
  2. never reveal your p______
  3. Dont tell random people your a______
  4. think before you p______ online

8 Clues: never reveal your p______dont share your i__________think before you p______ onlinebe safe while your playing o_____Dont tell random people your a______do not leak your p_______ informationR______ other peoples opinions when onlineTell an adult if someone is c___________ you

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. Repeatedly sending nasty, mean, and insulting messages.
  2. Online fights using electronic messages with angry and vulgar language.
  3. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  4. Sharing someone's secrets or embarrassing information or images online.
  5. Repeated, intense harassment and denigration that includes threats or creates significant fear.
Down
  1. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  2. Intentionally and cruelly excluding someone from an online group.
  3. "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.

8 Clues: Repeatedly sending nasty, mean, and insulting messages.Intentionally and cruelly excluding someone from an online group.Sharing someone's secrets or embarrassing information or images online.Online fights using electronic messages with angry and vulgar language....

Cyber Safety 2024-10-09

Cyber Safety crossword puzzle
Across
  1. refers to the responsible and ethical behaviour of individuals when using digital technologies and the internet.
  2. means being safe and responsible online.
  3. It refers to the buying and selling of goods using electronic means, like online shopping.
  4. It refers to the proper and respectful behaviour when using electronic devices and interacting with others online.
Down
  1. This means being able to fully participate in society using electronic devices and the internet.
  2. It is the process of learning and teaching about technology and how to use it effectively.
  3. These are the rules and responsibilities that apply to our actions and behaviour in the digital world.
  4. Continuous and spreading effect of an event or an action.

8 Clues: means being safe and responsible online.Continuous and spreading effect of an event or an action.It is the process of learning and teaching about technology and how to use it effectively.It refers to the buying and selling of goods using electronic means, like online shopping....

Cyber Attack 2024-12-11

Cyber Attack crossword puzzle
Across
  1. A type of malicious software that can spread between computers and damage data
  2. software that cybercriminals use to steal data, damage computers, or destroy systems. It's short for "malicious softwar
  3. social engineering attack that uses fake mobile text messages to trick people. The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind text messages—and “phishing”.
  4. Prevents access to files, systems, or networks, and demands payment to return them
Down
  1. Secretly monitors a user's activities and reports them to the software's author.
  2. are several types of phishing attacks, including:
  3. one that uses fraudulent emails, text messages, phone calls, or websites to trick people into sharing sensitive data, downloading malware, or otherwise exposing themselves to cybercrime. Phishing attacks are a form of social engineering.
  4. Displays unwanted advertisements and pop-ups, and can track online behavior.

8 Clues: are several types of phishing attacks, including:Displays unwanted advertisements and pop-ups, and can track online behavior.A type of malicious software that can spread between computers and damage dataSecretly monitors a user's activities and reports them to the software's author....

Cyber Kindness Week 2024-04-12

Cyber Kindness Week crossword puzzle
Across
  1. Focusing on the good in people and situations.
  2. Providing motivation and uplifting words.
  3. Being open-minded and empathetic.
  4. Giving without expecting anything in return.
  5. Working together for common goals.
  6. Understanding others' feelings.
Down
  1. Showing care and concern.
  2. Thinking about how your actions affect others.
  3. Showing appreciation for others' kindness.
  4. Valuing others' opinions and boundaries.
  5. Offering assistance when needed.
  6. Showing behaviour that is respectful and considerate of other people.

12 Clues: Showing care and concern.Understanding others' feelings.Offering assistance when needed.Being open-minded and empathetic.Working together for common goals.Valuing others' opinions and boundaries.Providing motivation and uplifting words.Showing appreciation for others' kindness.Giving without expecting anything in return....

Unit 2 - The Human Factor 2025-03-14

Unit 2 - The Human Factor crossword puzzle
Across
  1. A social engineering tactic where an attacker fabricates a story to obtain information.
  2. A set of rules that an organization follows to maintain security.
  3. False alarms or fake warnings designed to trick people into taking action.
  4. A documented series of steps to follow for security practices.
  5. Phishing attacks carried out via SMS text messages.
  6. Manipulating people into revealing confidential information.
  7. Unauthorized access to or manipulation of computer systems or networks.
  8. A cyberattack where fraudulent emails trick users into revealing sensitive data.
Down
  1. Malicious software designed to frighten users into downloading harmful programs.
  2. A tactic where an attacker manipulates a target into seeking their help, ultimately gaining access to sensitive information.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. A targeted phishing attack aimed at a specific individual or organization.
  5. The act of spying on someone’s screen or keyboard to obtain sensitive information.
  6. The act of searching through trash to find confidential information.
  7. A social engineering attack that lures victims with a tempting offer to steal their information.
  8. To reduce the impact or risk of a security threat.
  9. Abbreviation for gathering publicly available information to analyze a target.
  10. Phishing attacks conducted over voice calls.
  11. A phishing attack targeting high-profile executives or important individuals.

19 Clues: Phishing attacks conducted over voice calls.To reduce the impact or risk of a security threat.Phishing attacks carried out via SMS text messages.Manipulating people into revealing confidential information.A documented series of steps to follow for security practices.A set of rules that an organization follows to maintain security....

IT-Security - Datenschutz/-sicherheit 2016-01-29

IT-Security - Datenschutz/-sicherheit crossword puzzle
Across
  1. Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
  2. Virus der sich direkt über Netzte im Internet verbreitet
  3. versteckt in einem scheinbar nützlichen Programm
  4. Mobbing mit Hilfe von elektronischen Medien
  5. Beobachtung bei der Eingabe von Daten
Down
  1. Sicherheitskopie im Falle von Verlust oder dergleichen
  2. forschen das Nutzerverhalten aus
  3. Diebstahl von Daten die weggeworfen wurden
  4. jemand der illegal in Computersysteme eingreift
  5. unerwünschte Werbemails

10 Clues: unerwünschte Werbemailsforschen das Nutzerverhalten ausBeobachtung bei der Eingabe von DatenDiebstahl von Daten die weggeworfen wurdenMobbing mit Hilfe von elektronischen Medienjemand der illegal in Computersysteme eingreiftversteckt in einem scheinbar nützlichen ProgrammSicherheitskopie im Falle von Verlust oder dergleichen...

Cyberpuzzle 2023-08-08

Cyberpuzzle crossword puzzle
Across
  1. Substitute_ with numbers, punctuation marks or symbols when creating your password
  2. Phishing attempt directed at specific individuals or companies
  3. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  4. Kind of software used to prevent, scan, detect and delete viruses from a computer
  5. Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
  6. Cybersecurity Awareness Month
  7. Mandatory to wear inside the organisation and to remove outside
Down
  1. Action to do when I receive a suspicious email
  2. When available, use stronger_for an added layer of security
  3. Type of malware that disrupts computers, servers, and other devices
  4. Phishing attack deployed via SMS message
  5. Defensive technology designed to keep the bad guys out

12 Clues: Cybersecurity Awareness MonthPhishing attack deployed via SMS messageAction to do when I receive a suspicious emailDefensive technology designed to keep the bad guys outWhen available, use stronger_for an added layer of securityPhishing attempt directed at specific individuals or companies...

Bernardo C. Los Viajes assignment 2024-03-05

Bernardo C. Los Viajes assignment crossword puzzle
Across
  1. ecotourism
  2. security measures
  3. to sail
  4. customs agent
  5. Border
  6. compass
  7. itinerary
  8. insurance
  9. to return
Down
  1. high season
  2. valid
  3. to pack your bags
  4. tour guide
  5. expired
  6. room service
  7. hostel
  8. lodging
  9. ruins
  10. traffic jam

19 Clues: validruinshostelBorderexpiredto saillodgingcompassitineraryinsuranceto returnecotourismtour guidehigh seasontraffic jamroom servicecustoms agentto pack your bagssecurity measures

Pre-intermediate 3 2022-11-14

Pre-intermediate 3 crossword puzzle
Across
  1. késik
  2. talán
  3. vám
  4. átvesz, befogad
  5. érkezési kapuk
  6. agresszív közúti magatartás
  7. tábla, jelzések
  8. biztonsági ellenörzés
  9. határozott
Down
  1. fiuka
  2. indulási kapuk
  3. egy napot
  4. jóslat
  5. konferencia
  6. hely, helyszin
  7. mostanában
  8. beszáll (repülőbe)
  9. kütyü
  10. utas

19 Clues: vámutasfiukakésiktalánkütyüjóslategy napotmostanábanhatározottkonferenciaindulási kapukhely, helyszinérkezési kapukátvesz, befogadtábla, jelzésekbeszáll (repülőbe)biztonsági ellenörzésagresszív közúti magatartás

Airport vocabulary 2022-11-16

Airport vocabulary crossword puzzle
Across
  1. asiento de pasillo
  2. viaje
  3. asiento de la ventana
  4. turista
  5. equipaje
  6. viajar
  7. seguridad
  8. cancelado
  9. puerta
Down
  1. salidas
  2. demorado
  3. llegadas
  4. esperar
  5. terminal
  6. tarjeta de embarque
  7. peso(kg)
  8. pasaporte
  9. aduana
  10. fecha de nacimiento (contracion)

19 Clues: viajeviajaraduanapuertasalidasesperarturistademoradollegadasterminalpeso(kg)equipajepasaporteseguridadcanceladoasiento de pasillotarjeta de embarqueasiento de la ventanafecha de nacimiento (contracion)

At the Airport 2017-01-12

At the Airport crossword puzzle
Across
  1. жидкость
  2. терять
  3. стойка регистрации - ... desk
  4. присоединяться
  5. пассажир
  6. быстрый
  7. пропускать
  8. багаж
  9. сотрудник службы безопасности
  10. очередь
  11. острый
Down
  1. тележка
  2. досматривать
  3. предмет
  4. показывать
  5. опасный
  6. посадочный талон - ... card
  7. прямой
  8. тяжелый
  9. оставлять
  10. внимательный
  11. проходить через - go ...

22 Clues: багажтерятьпрямойострыйтележкапредметопасныйтяжелыйбыстрыйочередьжидкостьпассажироставлятьпоказыватьпропускатьдосматриватьвнимательныйприсоединятьсяпроходить через - go ...посадочный талон - ... cardстойка регистрации - ... deskсотрудник службы безопасности

o Aeroporto e Uma Viagem de Aviao 2023-03-20

o Aeroporto e Uma Viagem de Aviao crossword puzzle
Across
  1. stewardness
  2. luggage
  3. arrivals
  4. flight
  5. escalator
  6. trip
  7. vacation
  8. pilot
  9. flightcrew
  10. destination
  11. security
  12. runway
  13. fristclass
  14. through
  15. tocheckin
Down
  1. tripticket
  2. domesticflight
  3. carryon
  4. agent
  5. monitor
  6. suitcase
  7. automatic runway
  8. customs
  9. seatnumber
  10. passenger
  11. cart

26 Clues: tripcartagentpilotflightrunwayluggagecarryonmonitorcustomsthrougharrivalssuitcasevacationsecurityescalatorpassengertocheckintripticketflightcrewseatnumberfristclassstewardnessdestinationdomesticflightautomatic runway

Family 2024-01-10

Family crossword puzzle
Across
  1. Support
  2. Respect
  3. Preserves
  4. Understanding
  5. Social
  6. Love
  7. Environment
  8. Security
  9. Traditions
  10. Bases/foundations
  11. Face
  12. Core
Down
  1. Culture
  2. Build
  3. Identity
  4. Empathy
  5. Crucial
  6. Family
  7. Challenges
  8. Learn
  9. Provides
  10. Values
  11. Care
  12. Teaches
  13. Foster
  14. Grow

26 Clues: CareLoveGrowFaceCoreBuildLearnFamilyValuesSocialFosterCultureSupportEmpathyCrucialRespectTeachesIdentityProvidesSecurityPreservesChallengesTraditionsEnvironmentUnderstandingBases/foundations

German homework/crossword 2024-11-21

German homework/crossword crossword puzzle
Across
  1. - environment
  2. - to vault
  3. - to dive
  4. - answer
  5. - mood
  6. - Religion
  7. - to crawl
  8. - economy
  9. - to shake/jiggle
  10. - reason
  11. - to measure
Down
  1. - to deliver
  2. - justice, fairness
  3. - to hit
  4. - strenuous, exhausting
  5. - health
  6. - advantage
  7. - brain
  8. - to catch
  9. - safety, security

20 Clues: - mood- brain- health- answer- reason- to hit- economy- to dive- Religion- to crawl- to catch- to vault- advantage- to measure- environment- to deliver- safety, security- to shake/jiggle- justice, fairness- strenuous, exhausting

Test Your Risk Vocabulary 2021-09-01

Test Your Risk Vocabulary crossword puzzle
Across
  1. Vulnerability
  2. Strain
  3. Conscientiousness
  4. Guarantee
  5. Divergence
  6. Risk grading
  7. Protection
  8. Alertness
  9. Likelihood
  10. Extenuation
  11. Financial wealth
  12. Ratings Agency
  13. Adherence
  14. Average
  15. Debt instrument
Down
  1. Evaluation
  2. Oversight
  3. Supervisory
  4. Payment
  5. Precautionary
  6. Unpredictability
  7. Burden
  8. Deterioration
  9. Profits

24 Clues: StrainBurdenPaymentProfitsAverageOversightGuaranteeAlertnessAdherenceEvaluationDivergenceProtectionLikelihoodSupervisoryExtenuationRisk gradingVulnerabilityPrecautionaryDeteriorationRatings AgencyDebt instrumentUnpredictabilityFinancial wealthConscientiousness

Crossword 2020-12-18

Crossword crossword puzzle
Across
  1. bow
  2. trapped
  3. main character
  4. prince
  5. flowers
  6. the best
  7. Guard
Down
  1. security
  2. endearment
  3. gossip
  4. competition
  5. queen
  6. Take over
  7. opponents
  8. royalty

15 Clues: bowqueenGuardgossipprincetrappedflowersroyaltysecuritythe bestTake overopponentsendearmentcompetitionmain character

Zoom Culture 2021-10-12

Zoom Culture crossword puzzle
Across
  1. medical
  2. security
  3. to cost
  4. to offer
  5. problems
  6. system
  7. function
  8. automatically
Down
  1. doctor
  2. electronic
  3. to visit
  4. social
  5. world
  6. house
  7. better

15 Clues: worldhousedoctorsocialsystembettermedicalto costto visitsecurityto offerproblemsfunctionelectronicautomatically

Vilmenay 2026-03-25

Vilmenay crossword puzzle
Across
  1. international
  2. mask
  3. sign
  4. time
  5. oxygen
  6. To board
Down
  1. security
  2. compartment
  3. belt
  4. runway
  5. overhead
  6. to land
  7. late
  8. service
  9. No smoking

15 Clues: beltmasklatesigntimerunwayoxygento landservicesecurityoverheadTo boardNo smokingcompartmentinternational

Cyber Safety 2019-01-25

Cyber Safety crossword puzzle
Across
  1. Garfield is a large ____ that knows how to stay safe online.
  2. Do not share this information about where you live with strangers.
  3. Nermal loves to play these online.
  4. Always tell your ____ what you are doing online.
Down
  1. Do not share your full ____ online. Use a nickname, instead.
  2. Never share this secret code with anyone.
  3. Your favorite TV ____ are okay to share online.
  4. Only give your ____ number to family and friends you know in real life.

8 Clues: Nermal loves to play these online.Never share this secret code with anyone.Your favorite TV ____ are okay to share online.Always tell your ____ what you are doing online.Garfield is a large ____ that knows how to stay safe online.Do not share your full ____ online. Use a nickname, instead....

Cyber Info 2020-08-10

Cyber Info crossword puzzle
Across
  1. social media app where you can post pictures
  2. how people view you and what they associate you with
  3. instagram for your parents
  4. app where you can give your opinions
Down
  1. when you put out too much information online
  2. snap your friends everyday to start a streak
  3. charli is queen
  4. the mark you leave behind when doing anything online

8 Clues: charli is queeninstagram for your parentsapp where you can give your opinionswhen you put out too much information onlinesnap your friends everyday to start a streaksocial media app where you can post picturesthe mark you leave behind when doing anything onlinehow people view you and what they associate you with