cyber security Crossword Puzzles
Food security 2024-12-18
Across
- to save food from being wasted.
- Niño A weather pattern that can lead to droughts.
- a process that turns waste into something that helps plants grow.
- You need me to grow plants, but I can be scarce in deserts.
- A global issue caused by a lack of food.
Down
- am the science of producing food, using land and livestock.
- The process of growing plants and raising animals for food. (Agriculture)
- The farming method that uses natural fertilizers.
- grain that feeds billions of people worldwide, and I grow in flooded fields.
9 Clues: to save food from being wasted. • A global issue caused by a lack of food. • The farming method that uses natural fertilizers. • Niño A weather pattern that can lead to droughts. • am the science of producing food, using land and livestock. • You need me to grow plants, but I can be scarce in deserts. • ...
Food Security 2024-11-28
Across
- Food that can be used as a resource or is stored to avoid shortages.
- The act of growing enough food for the population in a country.
- A key principal in food security: ensuring food is available consistently.
- The variety and nutritional quality of food grown or available.
Down
- A person or group that grows, produces, or distributes food.
- A situation where people do not have enough access to safe and nutritious food.
- A system for ensuring everyone has access to adequate and nutritious food.
- aid Government program to provide food to those in need.
- A key resource used in food production, particularly for crops
9 Clues: aid Government program to provide food to those in need. • A person or group that grows, produces, or distributes food. • A key resource used in food production, particularly for crops • The act of growing enough food for the population in a country. • The variety and nutritional quality of food grown or available. • ...
Software Security 2025-11-01
Across
- Isolating system components to contain security breaches.
- a power to extend the software on certain implementations considering future growth.
- A flaw or weakness that can be exploited to cause harm.
- Injection Common attack injecting malicious code into database queries.
Down
- Ensuring information is accessible only to authorized users.
- arises in software due to uncontrolled expansion in volume and enormous capacity of storage.
- The process of verifying the identity of a user or system.
- Security model enforcing “no read-up” and “no write-down” rules for confidentiality.
- Average time to fix a discovered vulnerability (abbreviation).
9 Clues: A flaw or weakness that can be exploited to cause harm. • Isolating system components to contain security breaches. • The process of verifying the identity of a user or system. • Ensuring information is accessible only to authorized users. • Average time to fix a discovered vulnerability (abbreviation). • ...
Security Password 2025-08-23
Across
- What is the name of your favorite musical?
- What city was your car stolen in?
- What is your maternal grandfather's first name?
Down
- What instrument did you inherit from your great grandmother?
- What is the name of your best friend from college?
- What is your family's favorite NCAA team?
- What is the name of your roommate in grad school?
- What is your first cats name?
- Where did you stay for your first anniversary?
9 Clues: What is your first cats name? • What city was your car stolen in? • What is your family's favorite NCAA team? • What is the name of your favorite musical? • Where did you stay for your first anniversary? • What is your maternal grandfather's first name? • What is the name of your roommate in grad school? • What is the name of your best friend from college? • ...
Hartford Funds Compliance Crossword 2019-05-01
Across
- A security device used in cars, trucks and corporate networks.
- Investment adviser firm that serves as the adviser to certain Hartford Funds.
- Working for, or on the board of a start-up company is considered a(n) _____________ and must be reported via MCO prior to any engagement.
- Adhere to a rule (policy, standard, law).
- Dedicated to investor protection and market integrity through effective and efficient regulation of broker-dealers.
- Separation of illicit proceeds from their source by a variation of financial transactions intended to conceal the origin of the proceeds.
- Vendor employees use to attest/complete various Compliance related activities (reportable account disclosure, outside business requests, limited partnership requests, etc).
- Any technology application that allows users to create, share and exchange information in an online community or forum.
- Situation in which a person is in a position to derive personal benefit from decisions made in their official capacity. HINT – 3 words.
- Moral principles that govern a person’s behavior.
- Hartford Funds Chief Compliance Officer.
Down
- Mutual Funds/ETFs should never be described as providing this type of protection.
- Unacceptable or improper behavior by an employee.
- Compliance is not an act, it’s a _______.
- Protection of internet-connected systems from cyber-attacks, protect against unauthorized access to data centers and other computerized systems.
- Investment adviser firm that serves as the adviser to separately managed accounts.
- All potential conflicts of interest need to be _________.
- Who is responsible for making sure all reportable accounts, trades, and holdings are appropriately and timely disclosed in MyComplianceOffice?
- Encouraging a Financial Advisor to invest his clients in Hartford Funds Core Equity Fund because the Fund will outperform its benchmark during the next 2 years is inappropriate. Use of such language is considered?
- FINRA Registered Broker-Dealer that is the official distributor for Hartford Fund’s ETFs.
- Engages in the underwriting and wholesale distribution and marketing of open end investment companies registered under the Investment Company Act of 1940 to third party firms.
- Procedures, laws and regulations designed to stop the practice of generating income through illegal actions.
- Travel & Expense items are input into this system.
23 Clues: Hartford Funds Chief Compliance Officer. • Compliance is not an act, it’s a _______. • Adhere to a rule (policy, standard, law). • Unacceptable or improper behavior by an employee. • Moral principles that govern a person’s behavior. • Travel & Expense items are input into this system. • All potential conflicts of interest need to be _________. • ...
Semester 1 Intro to Business and Marketing Review 2023-12-06
Across
- An economic system in which individuals own and operate the majority of businesses that provide goods and services.
- Cyber ____________ refers to the practices and steps that users of computers and IoT devices take to maintain system health and improve online security.
- An economic system in which businesses and individuals decide what to produce and buy, and the market determines prices and quantities sold.
- This occurs when people's needs and wants are unlimited and the resources to produce the goods and services to meet those needs and wants are limited.
- The performance ______________ process is a formal system for reviewing, evaluating, and improving employee performance.
- The people who create goods and services are called ___________ resources.
- A person who risks time, effort, and money to start and operate a business.
- A set of behaviors that utilize a toolbox of techniques, tools, and strategies that allow a person to achieve set goals within a given time.
- Things that you think you must have in order to be satisfied.
- Types of workplace communication include memos, business letters, _________, and chat platforms.
Down
- The inputs and resources used to produce goods and services.
- An economy that exhibits elements of both capitalism and socialism.
- Things that you must have in order to survive.
- Resources that are used in the production of goods and services.
- The skill set and process that utilizes a systematic approach to a task, whether answering a question, making a decision, or solving a problem.
- What remains after all business expenses have been deducted from sales revenue.
- Nonproductive _____________ in teams can cause a breakdown of trust, resentment, lowered efforts and stalled productivity.
- The organized effort of individuals to produce and sell, for a profit, the goods and services that satisfy society's needs.
- An economic system in which the government decides what goods and services will be produced,how they will be produced, for whom available goods and services will be produced, and who owns and controls the major factors of production.
- The way in which people deal with the creation and distribution of wealth.
- Raw materials supplied by nature.
21 Clues: Raw materials supplied by nature. • Things that you must have in order to survive. • The inputs and resources used to produce goods and services. • Things that you think you must have in order to be satisfied. • Resources that are used in the production of goods and services. • An economy that exhibits elements of both capitalism and socialism. • ...
Forensic science charlie 2019-09-25
Across
- $27 million - Dollar amount that is written in illegitimate checks every day
- forensics - (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
- vouchers/ WIC coupons, Certain bonds, Postage stamps
- questioned documents - Checks, Certificates, Wills, Passports, Licenses, Money, Letters, Contracts, Suicide Notes, Receipts, and Even Lottery Tickets
- block - Charlie
- documents - Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
- Spectroscopy - an analytical technique that measures the mass-to-charge ratio of charged particles.
- Pressure - Check for pressure on the downward and upward strokes Compare how capital letters are joined to lowercase letters
- documents include: - Checks, employment records, legal agreements, licenses, and wills
- chemical wash detection systems that change color when a check is altered
- analysis comparison - "Learns" to recognize how a person signs; Evaluates speed, pressure, and rhythm of the signatures; Recognizes forgeries by the detection of even slight differences
- - A substance that accelerates the rate of a chemical reaction but is not itself permanently changed by the reaction.
- - A technique for separating molecules through their migration on a support medium under the influence of an electrical potential
- commonly forged today - Currency/paper money, Traveler's checks
- resolution borders that are difficult to copy
- - writing over top to smear or make original writing unreadable
- as well as around the portrait; When the bill is tilted, the number in the lower right-hand corner makes a color shift from copper to green
- testing - also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
- years - maximum prison term for forgery. Forgery is a federal felony
- - a branch of bioscience dealing with the study of the form and structure of organisms and their specific structural features.
- case of the 1930s - What was the first known case in which handwriting analysis played a role?
- consistency /Ratio - What are the overall height, width, and size of the letters?
- composition - the individual chemicals that make up a substance
- - any prewritten handwriting samples from a suspect(s)
- ninety nine - The year the US Court of Appeals determine that handwriting analysis qualifies as a form of expert testimony
- Hat Hackers - are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
- color patterns on paper
- Security Features in US currency - Portrait stands out and appears raised off the paper; Contains clear red and blue fibers woven throughout the bill; Has clear, distinct border edges; Treasury seal is shown with clear, sharp saw-tooth points; Watermark appears on the right side of the bill in the light; The security thread is evident—a thin embedded vertical strip with the denomination of the bill printed in it; There is minute printing on the security
- - making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
- Check Techniques - Directly altering a check; intercepting someone's check, altering it, and cashing it; creating forged checks from scratch; by ordering someone else's checks from a deposit slip.
- phosphatase - An enzyme found in high concentration in semen.
Down
- signature pads - stores handwriting samples in databases
- - any long connecting marks and or swooshes added to letters
- hat hackers - usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
- - forgery for material gain
- analysis - the examination and comparison of questioned documents with known material
- taken to prevent check forgery - Chemically sensitive paper
- font size requires more ink and makes alterations more difficult
- - any extra caricatures or pictures added to words
- - When false documents or other items are copied for the purpose of deception
- handwriting - handwriting is difficult to disguise and forge
- of documents detection - any changes, erasures, or obliterations that may have occurred
- hackers (White hat hackers) - White hat hackers choose to use their powers for good rather than evil. Also known as "ethical hackers," white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.
- accounting, forensic accountancy or financial forensics - the specialty practice area of accounting that describes engagements that result from actual or anticipated disputes or litigation.
- and personalized handwriting habits - Similar to fingerprints, every person's handwriting is what it is
- Fibers - fiber created from natural materials or by chemical processes, a man-made fiber
- Habits (aka. Baseline characteristics) - Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
- - a material that changes the color of reflected or transmitted light as the result of wavelength-selective absorption.
- Service - the agency that investigates forgery cases
- - a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.
- - Does the writing tilt to the left or right, or is it straight up and down? Are some letters consistently tilted more or less than others?
- - A protein that acts as a catalyst for certain specific reactions.
- - Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
- Chromatography - Dye or ink is applied to filter or chromatography paper placed in a solvent and pigments are separated
- Fibers - fiber derived from plants or animals
- - A compound capable of donating a hydrogen ion (H+) to another compound.
- fibers that glow under different light
- Chromatography - a common type of chromatography used in analytical chemistry for separating and analyzing compounds
58 Clues: block - Charlie • color patterns on paper • - forgery for material gain • fibers that glow under different light • resolution borders that are difficult to copy • Fibers - fiber derived from plants or animals • - any extra caricatures or pictures added to words • vouchers/ WIC coupons, Certain bonds, Postage stamps • Service - the agency that investigates forgery cases • ...
Change a nouns into a verb 2023-11-30
14 Clues: success • madness • security • addition • decision • attention • conclusion • attraction • comparison • protection • collection • description • achievement • distraction
Change a nouns into a verb 2023-11-30
14 Clues: success • madness • addition • decision • security • attention • protection • comparison • conclusion • collection • attraction • description • distraction • achievement
KUIS P5 BANGUNLAH JIWA DAN RAGANYA 2025-01-15
Across
- Perundungan melalui media sosial disebut ... bullying
- Jenis olahraga yang membutuhkan kecepatan dan keserasian gerakan fisik yang teratur
- Contoh makanan yang mengandung protein hewani
- Kegiatan untuk menjaga kesehatan dan kebugaran tubuh
- Memukul termasuk dalam jenis perundungan ...
- Anjuran makan ... kali sehari
- Contoh makanan yang mengandung protein nabati
- Karbohidrat selain nasi
Down
- Untuk menjaga kesehatan tubuh, harus makan makanan bergizi ...
- Istilah lain dari makanan cepat saji
- Buah dan sayur merupakan jenis makanan yang mengandung ...
- Cabang olahraga dengan gerakan mengikuti musik disebut senam ...
- Karakter yang kita pelajari dari kegiatan senam
- Di dalam tubuh yang sehat, terdapat jiwa yang ...
14 Clues: Karbohidrat selain nasi • Anjuran makan ... kali sehari • Istilah lain dari makanan cepat saji • Memukul termasuk dalam jenis perundungan ... • Contoh makanan yang mengandung protein hewani • Contoh makanan yang mengandung protein nabati • Karakter yang kita pelajari dari kegiatan senam • Di dalam tubuh yang sehat, terdapat jiwa yang ... • ...
Mechdyne's 30th Anniversary Puzzle 2026-01-05
Across
- A quick discussion at the beginning of a meeting to prevent accidents
- One of our core values us Profit and _____
- Acronym for Audio Visual
- At Mechdyne we strive to "stay ____ the line"
- phrase we use to secure and dedicate an assignment to a teammate
Down
- Apart of the 4 P's
- Mechdyne's headquarters state
- One of Mechdyne's sister companies
- The college the Mechdyne founders attended
- Our people are...
- Popular video conferencing platform used for remote meetings\
- System that protects against cyber threats
- Month dedicated to cybersecurity awareness
- The universal “fix” for most tech problems
14 Clues: Our people are... • Apart of the 4 P's • Acronym for Audio Visual • Mechdyne's headquarters state • One of Mechdyne's sister companies • The college the Mechdyne founders attended • System that protects against cyber threats • Month dedicated to cybersecurity awareness • The universal “fix” for most tech problems • One of our core values us Profit and _____ • ...
Security Awareness Effectiveness 2021-06-21
Across
- Don’t share your user
- before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want it to become publicly available?
- __________ is making and storing another copy of data
- A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory
- the IT security Policies are uploaded on _______
- Facts and statistics collected for reference or analysis.
- How to safeguard the information stored in laptop; Keep it ______ , when you are not available at desk.
Down
- Smishing is related to _____________
- The gaining of unauthorized access to data in a system or computer is __________. Down
- ________ is a scam that involves Internet fraudsters who send spam or pop-up messages to get the personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims
- A _______ Password contains at least 3 of the 4 following characters: Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g. 123), Special/Non-Alphanumeric (e.g. ! $ # %)
- Permitted by law is _________
- Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
- 123456 is ___________ password
14 Clues: Don’t share your user • Permitted by law is _________ • 123456 is ___________ password • Smishing is related to _____________ • the IT security Policies are uploaded on _______ • __________ is making and storing another copy of data • Facts and statistics collected for reference or analysis. • ...
Social Security Terminology 2022-12-02
Across
- When a tic comes through Barcode that someone has this SSI pay status, the SSIF team usually celebrates!
- The SSA program that is required to be filed by ABD
- The opposite of approved
- The agreement signed by clients to "repay" their ABD with SSA earnings
- The Social Security _____
- The SSA-3373 form is the _____ Report
Down
- If someone's claim is denied, they can request this kind of appeal
- The SSA-3369 form is the _____ History Report
- A lot of claims get denied for "failure to _____"
- This State Date Exchange program
- This type of appeal goes before an Administrative Law Judge
- The highest level of appeal recognized by both SSA and DSHS is the Appeals Council _____
- The other program offered by SSA
- This is the first level of filing for SSA benefits
14 Clues: The opposite of approved • The Social Security _____ • This State Date Exchange program • The other program offered by SSA • The SSA-3373 form is the _____ Report • The SSA-3369 form is the _____ History Report • A lot of claims get denied for "failure to _____" • This is the first level of filing for SSA benefits • The SSA program that is required to be filed by ABD • ...
Information Security Awareness 2020-09-24
Across
- What is not allowed in a DNA password?
- Best way to keep track of multiple unique passwords?
- The data classification for Employee Handbook, internal phone directory?
- This is better and harder to crack than a password
- How do you think most evil hackers begin to break into a company’s network?
- The best response to password Recovery Questions is a
- Minimum number of characters for a network password?
- What is the default data? classification
- Who is responsible for data security?
Down
- The type of email to get you to click on a fraudulent link
- Disclosing personal member information may be
- Someone that follows closely behind you without using their badge?
- If I click on a link I believe was malicious I should
- This is better and harder to crack than a password
- How might someone evil try to get information from you?
15 Clues: Who is responsible for data security? • What is not allowed in a DNA password? • What is the default data? classification • Disclosing personal member information may be • This is better and harder to crack than a password • This is better and harder to crack than a password • Best way to keep track of multiple unique passwords? • ...
Security Crossword Challenge 2015-02-17
14 Clues: Funny money • 3rd President • 7th President • 1st President • 18th President • Taking of items • Opens many doors • Unusual Behavior • Secures your money • Used to make change • Director of Security • First Ambassador to France • Cash or Valuables in Transit • 7th President of the United States
Security Crossword Puzzle 2016-09-26
Across
- / Name of the Site Security Supervisor
- / GSK to become _________ neutral by 2050
- / GSK Value 4: Operate with ___________
- / Last name of newly appointed CEO of GSK
- / 4141 is the extension for this?
- / Using someone else's badge is a _______ violation.
Down
- / Someone you register in Passage Point
- / GSK Value 1: Be _______ focused
- / Place to pick up visitors?
- / Last name of the GSK Security Operations Manager
- / GSK Value 2: Act with __________
- / What should be displayed at all times?
- / GSK Value 3: Demonstrate _________ for people
- / First name of the Navy Yard Site Director
14 Clues: / Place to pick up visitors? • / GSK Value 1: Be _______ focused • / 4141 is the extension for this? • / GSK Value 2: Act with __________ • / Name of the Site Security Supervisor • / Someone you register in Passage Point • / GSK Value 4: Operate with ___________ • / What should be displayed at all times? • / GSK to become _________ neutral by 2050 • ...
Safety and Security 2023-11-14
Across
- ATM check.
- where fire extinguisher is located.
- drawer counted if gone for _ days.
- how to close day with no computer
- if away from drawer, it should be?
- where first aid kit is located
- where we meet in emergency.
Down
- medical note required for any work __
- radio station that reports closing
- what should be posted on the door for emergency closure.
- please call if you are more than _ minutes late.
- branch will be audited by whom yearly?
- record for opening vault.
- grants permission to close bank
14 Clues: ATM check. • record for opening vault. • where we meet in emergency. • where first aid kit is located • grants permission to close bank • how to close day with no computer • radio station that reports closing • drawer counted if gone for _ days. • if away from drawer, it should be? • where fire extinguisher is located. • medical note required for any work __ • ...
Cyberbullying 2024-09-17
8 Clues: the cause • something cyberbullies do • when some one is cyber bulling • do this to your parent or guardian • The person who is being cyberbullied • something to do after telling and blocking • actions that are _______ can cause bad things. • 1-404-978-9282,1-877-355-5787, and 650-253-0000.
Global challenge 2024-11-12
8 Clues: cable with glass • spreading in a liquid • the reason you have www • bullying in the internet • devices to transmit informations • platform where you can communicate • a fight in I.e. economics around the world • people who can control your devices from around the world
Mots croisés Cyber 2024-02-01
Across
- Vérification de l'identité.
- Outil de sécurité qui crée une connexion sécurisée et cryptée entre vous et Internet (acronyme).
- Comportement menaçant facilité par des moyens électroniques tels que les SMS.
- Type de logiciel malveillant conçu pour bloquer l'accès à un système informatique jusqu'à ce qu'une somme d'argent soit payée
- Une norme de technologie sans fil utilisée sur de courtes distances utilisant des ondes radio UHF de courte longueur d’onde.
- Technologie de réseau domestique largement utilisée qui permet une connexion sans fil avec l’interface Internet.
Down
- Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible.
- Accès non autorisé à un réseau, à des systèmes d'information ou à une application.
- L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus.
- Matériel ou logiciel conçu pour empêcher tout accès non autorisé vers ou depuis un réseau privé
- Une faille ou une faiblesse dans un système informatique qui pourrait être exploitée pour violer la sécurité du système.
- Un e-mail frauduleux provenant prétendument d'une entreprise réputée tentant d'obtenir des informations personnelles.
12 Clues: Vérification de l'identité. • L'adresse d'une page Web. Vérifiez sa validité avant de cliquer dessus. • Comportement menaçant facilité par des moyens électroniques tels que les SMS. • Accès non autorisé à un réseau, à des systèmes d'information ou à une application. • Le processus consistant à prendre du texte brut et à le brouiller dans un format illisible. • ...
Cyber sec awareness 2026-01-30
Across
- An additional step in securing your account
- Malicious software that locks your files until you pay
- An incident where data is accessed without authorization
- Secret word or phrase used to gain access
- The process of verifying who you are
Down
- Malicious software designed to harm your computer
- Fraudulent emails that try to steal your credentials
- Network security system that monitors and controls traffic
- The process of encoding data to prevent unauthorized access
- Someone who gains unauthorizsd access to systems
- Our report phishing button
- Software update to fix security vulnerabilities
12 Clues: Our report phishing button • The process of verifying who you are • Secret word or phrase used to gain access • An additional step in securing your account • Software update to fix security vulnerabilities • Someone who gains unauthorizsd access to systems • Malicious software designed to harm your computer • Fraudulent emails that try to steal your credentials • ...
2024 OSCE Scholarship for Peace and Security - Crossword puzzle 2024-11-26
Across
- Agreement allowing for the conduct oh short-notice, unarmed, observation flights by its States Parties over the territories of other States Parties
- A key OSCE arms control agreement outlining provisions on annual military information exchange among the OSCE participating States
- UN Security Council Resolution on Women, Peace and Security (Acronym)
Down
- Cornerstone rule guiding OSCE decision-making processes
- The world's foremost intergovernmental forum for scientific and technical cooperation in the peaceful use of nuclear energy (Acronym)
- UN Security Council Resolution on the non-proliferation of weapons of mass destruction and their means of delivery (Acronym)
- Agreement which prohibits the possession of nuclear weapons (Acronym)
- The world's largest regional security organization (Acronym)
- One of the two fissile materials used in nuclear weapons (Abbreviation)
- Synonym for firearms (Acronym)
10 Clues: Synonym for firearms (Acronym) • Cornerstone rule guiding OSCE decision-making processes • The world's largest regional security organization (Acronym) • Agreement which prohibits the possession of nuclear weapons (Acronym) • UN Security Council Resolution on Women, Peace and Security (Acronym) • ...
HOMELAND SECURITY I CROSSWORD 2026-03-26
Across
- : Decision made by a jury
- : Person who oversees court proceedings
- : Information used to prevent threats
- : Taking property by law enforcement
- : Place where legal cases are decided
- : Systems like power, water, and transportation
- : Supreme law of the United States
- : Agency that handles disaster response and recovery
- : Freedom from government control
- : Legal document allowing a search or arrest
- : Law passed to help prevent terrorism
- : Freedoms protected by law
- : Agency that enforces immigration laws inside the U.S.
- : Request to review a court decision
- : Monitoring people or places for security purposes
- : Ability to act or speak without unjust restriction
- : Federal department responsible for homeland security
- : Legal status of being a member of a country
- : Potential danger to people or systems
- : Process of entering a country to live
- : Person who gives testimony in court
- : Use of violence to create fear for political purposes
- : Fair treatment under the law
- : Group of citizens who decide a case
- : Agency that provides airport and transportation security
Down
- : Taking a person into custody
- : Information used to prove facts in court
- : Boundary between countries
- : Balancing safety with personal freedoms
- : Highest court in the United States
- : Lawyer who represents the government
- : Reasonable belief that a crime occurred
- : Rights that protect individuals from discrimination
- : Branch that protects waterways and performs rescues
- : Legal process to determine guilt or innocence
- : Protection from threats or danger
- : Agency responsible for border protection and customs
- : Agency that protects national leaders
- : Looking for evidence
- : Person accused of a crime
- : Organization within the government with a specific mission
- : Agency focused on cybersecurity and infrastructure protection
- : Freedoms protected by law
- : Protection of computer systems and networks
- : Change or addition to the Constitution
- : Right to keep personal information protected
- : Lawyer who represents a person in court
- : Statement made under oath
- : Rules created and enforced by government
49 Clues: : Looking for evidence • : Decision made by a jury • : Freedoms protected by law • : Person accused of a crime • : Freedoms protected by law • : Statement made under oath • : Boundary between countries • : Taking a person into custody • : Fair treatment under the law • : Freedom from government control • : Supreme law of the United States • : Protection from threats or danger • ...
Information Security 2022-02-11
Across
- This filter blocks Java, so you may not be able to access Java content on websites.
- protection helps protect your local network from the Internet.
- The VPN client(s) on the local network can establish a PPTP VPN tunnel through the Router.
- This filter blocks cookies, which are data stored on your computer and used by websites when
- interact with them.
Down
- This filter blocks ActiveX, so you may not be able to access ActiveX content on websites.
- The VPN client(s) on the local network can establish an L2TP VPN tunnel through the Router.
- The VPN client(s) on the local network can establish an IPSec VPN tunnel through the Router.
- This filter blocks the use of Internet proxy servers.
9 Clues: interact with them. • This filter blocks the use of Internet proxy servers. • protection helps protect your local network from the Internet. • This filter blocks Java, so you may not be able to access Java content on websites. • This filter blocks ActiveX, so you may not be able to access ActiveX content on websites. • ...
Security Crossword 2015-06-22
9 Clues: ...and report • Patrol Officers do this • City sirens warn of this • These may save your life • For an injury, call this team • highest temperature of the day • "Mr. Brown will not be in today" • When the fire system sounds, do this • if you don't have a valid "BI", you get this
IT-Security 2020-03-25
Across
- Überbegriff für verschiedene Typen von unerwünschten Programmen
- Forscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malware
- Eine Methode, über gefälschte Webseite, E-Mails und Kurznachrichten an persönliche Daten eines Internet-Benutzers zu gelangen und damit Identitätsdiebstahl zu begehen.
- braucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk
Down
- anderes Wort für Computerkriminalität bzw. Internetkriminalität
- Ist in einem scheinbar nützlichen Programm versteckt und kann z. B. Passwörter auslesen oder auf Daten im Netzwerk zugreifen und diese an den Auftrageber der Malware übermittteln.
- Sicherheitskopien
- kleine Textdateien, die Informationen über eine besuchte Webseite auf dem PC des Benutzers abspeichern
- unerwünschte Werbemails
9 Clues: Sicherheitskopien • unerwünschte Werbemails • anderes Wort für Computerkriminalität bzw. Internetkriminalität • Überbegriff für verschiedene Typen von unerwünschten Programmen • Forscht das Nutzerverhalten aus und sendet die Daten an den Hersteller der Malware • braucht man für den Zugang zu einer sicheren Webseite oder zur Authentifizierung in einem Netzwerk • ...
Security Crossword 2022-07-27
Across
- You find the Bomb Threat Checklist, and Extortion Checklist documents in here.
- Lock the branch entry/exit doors, relocking after each member leaves. Do not admit anyone into branch after close
- when transaction(s) are done within the same day over 10k.
- Alt+Shift+I
Down
- While opening branch you carry this through the branch while doing walk through.
- Certain duties require atleast 2 employees to do such example: Night drop and opening vault.
- You find the Robbery Checklist, Robbery Response, and Robbery witness documents in here.
- should inspect the branch exterior for signs of forced entry, suspicious vehicles or people
- a report you make if you are suspicious of any activity on member's account
9 Clues: Alt+Shift+I • when transaction(s) are done within the same day over 10k. • a report you make if you are suspicious of any activity on member's account • You find the Bomb Threat Checklist, and Extortion Checklist documents in here. • While opening branch you carry this through the branch while doing walk through. • ...
FOOD SECURITY 2024-10-17
Across
- suffering from lacking proper nutrition
- - This happens when people do not have enough food to eat.
- words)the lack of access to clean water
- Security A condition related to the availability of food, and an individuals accessibility and affordability to it.
Down
- - The type of farming that grows crops without chemicals.
- Most devastating famine that occurred in India was the FAMINE OF _____ in 1943.
- 281 million undernourished people live on this continent.
- - The practice of catching fish for food.
- - The storage place where food is kept to be sold or given.
9 Clues: suffering from lacking proper nutrition • words)the lack of access to clean water • - The practice of catching fish for food. • - The type of farming that grows crops without chemicals. • 281 million undernourished people live on this continent. • - This happens when people do not have enough food to eat. • - The storage place where food is kept to be sold or given. • ...
Security Awareness 2024-10-03
Across
- A type of software that blocks unauthorized access to a network (9 letters)
- A secret word or phrase used to gain access to a system (8 letters)
- Software that detects and removes malware (10 letters)
- A fix to software that addresses a vulnerability or flaw (5 letters)
Down
- A program designed to damage or disrupt a computer (5 letters)
- The process of converting information into code to prevent unauthorized access (10 letters)
- A technique used to steal sensitive information by pretending to be a trustworthy source (8 letters)
- A security measure that requires two forms of verification to access an account (3 letters)
- Unsolicited or unwanted email, often used for scams (4 letters)
9 Clues: Software that detects and removes malware (10 letters) • A program designed to damage or disrupt a computer (5 letters) • Unsolicited or unwanted email, often used for scams (4 letters) • A secret word or phrase used to gain access to a system (8 letters) • A fix to software that addresses a vulnerability or flaw (5 letters) • ...
Food security 2024-11-28
Across
- Aid provided to countries experiencing famine.
- The loss of food during production or distribution.
- The process of converting agricultural products into packaged food.
- Government-subsidized programs to provide basic food.
Down
- Crops specifically grown to combat hunger, like fortified rice.
- A farming system where trees are integrated with crops.
- A harmful practice of overusing soil nutrients.
- Farming that avoids deforestation.
- A disaster leading to the collapse of food production.
9 Clues: Farming that avoids deforestation. • Aid provided to countries experiencing famine. • A harmful practice of overusing soil nutrients. • The loss of food during production or distribution. • Government-subsidized programs to provide basic food. • A disaster leading to the collapse of food production. • A farming system where trees are integrated with crops. • ...
Food security 2024-12-17
9 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Small animal raised for meat and fur • Animal raised for wool, meat and milk • Poultry raised for eggs meat and feathers • Pollinator that plays a critical role in food production
Security Awareness 2025-12-22
Across
- keep it secret
- Physical security breach by skipping card readers.
- Alternate for Irrelevant Junk mail.
- Hardware that filters data packets through network.
Down
- Wireless technology in mobile phones.
- 7 letter word. I allow only humans and not robots by protecting sites and fake accounts.
- World's First Antivirus program.
- I will call & trick you by my speaking skills, emotionally touch your heart and take your personal information.
- An animal with no limbs but can crawl.
9 Clues: keep it secret • World's First Antivirus program. • Alternate for Irrelevant Junk mail. • Wireless technology in mobile phones. • An animal with no limbs but can crawl. • Physical security breach by skipping card readers. • Hardware that filters data packets through network. • 7 letter word. I allow only humans and not robots by protecting sites and fake accounts. • ...
Q2 Week 6 Groups 4 and 5 2021-12-08
10 Clues: Being safe • A type of business • More than one agency • More than one ability • More than one security • More than one accuracy • More than one familiarity • Being able to do something • Being exact about something • Being familiar with someone or something
Tecnología 2023-03-22
18 Clues: risk • send • mail • device • screen • access • advice • message • respond • password • security • computer • to enjoy • spend time • technology • cell-phone • social-media • to have a good time
FIT E: Technology Vocab 2013-05-16
Across
- is made up of 1000 gigabytes
- the wiring in your computer
- is made up of 1000 zetabytes
- a type of booklet that advertises a company's products
- a company's symbol or graphic design
- the location where you can put in a disc
- the location on your computer where you can plug in your peripherals
- any type of attachment you can plug in your computer
- a type of program that allows you to receive internet
- anything that is sent out of a computer
- a informational paper about you and your history, usually made for a job
- the privacy and security of yourself on the internet
- is made up of 1000 bits
- is made up of 1000 petabytes
- is made up of 1000 bytes
- a type of search engine that searches all types of other search engine
- the main center of your computer where all the data goes
Down
- a program that allows you to search the web
- anything that has to do with the internet
- the device you use to operate your desktop
- is made up of 1000 yottabytes
- the act of spreading public notice for your product
- the brain of your computer, where all the data is stored
- the term used for a picture or graphic image that is made up by numbers
- a zoomable presentation program
- is made up of 1000 exabytes
- the screen of your computer
- anything that you plug in your computer
- a company's words or phrase that is advertised
- is made up of 1000 terabytes
- a program where you can access any type of media or internet wirelessly
- is made up of 1000 kilobytes
- is made up of 1000 brontobytes
- a portable electronic device that is wireless
- the location on your cmputer where you can plug in your headphones or earbuds
- the place where you can save files off of any type of device
- is made up of 1000 megabytes
- the smallest amount of storage you can have
38 Clues: is made up of 1000 bits • is made up of 1000 bytes • the wiring in your computer • is made up of 1000 exabytes • the screen of your computer • is made up of 1000 gigabytes • is made up of 1000 zetabytes • is made up of 1000 terabytes • is made up of 1000 kilobytes • is made up of 1000 petabytes • is made up of 1000 megabytes • is made up of 1000 yottabytes • ...
Crossword 3 2023-05-24
Across
- to make copies
- a piece of code that is used to fix a flaw in a computer program
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- the proces of stealing another person’s information and using it for personal gain
- to make sure that it is legitimate
- any type of media used on a webpage, including images and videos
- a person who exploits computer hardware and software for their own purposes
- a small application that is embedded in a webpage
- a measurement of how quickly a computer works
- a collection of icons or pictures that have been organized in a file or page
- a person who uses computers and the internet to commit crimes
Down
- a computer virus that copies its code over and destroys the files of the original data
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- a word or phrase that makes a computer perform an operation
- a filter that prevents harmful software from entering a network
- device that converts mechanical information into electronic signals
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- a filter that prevents harmful software from leaving a network
- an action that results in the loss of another person’s property
- tricking people into giving information through email
- how users communicate with a computer
- the use of the internet for software and other resources
- the company that produces Macs and other computing products
- changing computer to your needs
- a program that restricts access on a network
- to modify or arrange something so that it works in a certain way
- a set of rules that must be followed for the sake of security
- using a legitimate-looking website to trick people
- a personal website maintained by an individual
- to work at a location away from a main office by using technology
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
NATO Crossword 2023-08-03
Across
- NATO's largest partnership group is known as the Partnership for ___
- NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
- Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
- NATO is the North ___ Treaty Organization
- NATO has been leading a peace-support operation in this country since June 1999
- The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
- This was the first SACEUR, and was later the 34th President of the United States
- The lengthy statement released at Summits is often called this.
- US General Christopher Cavoli currently holds this position, the second-highest military position within NATO.
- This kind of threat typically does not involve weapons, but can include disinformation, interference in politics, and cyber operations
- NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
- This ability enables Allied forces from different countries to operate together.
- Last month's NATO Summit took place in this city.
Down
- This Italian city is home to NATO military command.
- NATO's maritime security operation in the Mediterranean is called Operation Sea ___
- This is the part of the founding treaty that explains how new members can join
- PermReps sit on the NAC, or North Atlantic ___
- Allies pledged to devote this much of their GDP to defense spending
- NATO's military headquarters in Mons, Belgium
- All 31 Allies must agree for NATO to do anything. This is known as ___ decision making.
- This country is an official Invitee, but not yet a member
- This is one of NATO's closest partners, and its headquarters are right downtown
- Allies contribute money to fund NATO programs. This is known as ___ funding.
- NATO's current Secretary General is from this country
- The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
- This Virginia city is home to Allied Command Transformation (ACT)
26 Clues: NATO is the North ___ Treaty Organization • NATO's military headquarters in Mons, Belgium • PermReps sit on the NAC, or North Atlantic ___ • Last month's NATO Summit took place in this city. • This Italian city is home to NATO military command. • NATO's current Secretary General is from this country • This country is an official Invitee, but not yet a member • ...
Team Building 2025-06-11
Across
- What should we do to every member who walks in?
- What form has to be filled out to add a joint owner to an account?
- Who do we send wires to?
- Monthly Cyber Security training
- What are we doing when entering C in the proc code?
- What tool do we have to check after placing a hold on a check?
- Where our goals are entered
- What department is notified of the death of a member?
- What has to be pressed on the cash advance machine at the end of the night?
- What is the name of the credit cards reward program?
- What is the drive thru being replaced with?
- Who has to be called to release a vehicle from rep?
Down
- What can be up to 50% on auto loans depending on credit score?
- Where are checks scanned in at the end of the night?
- What would you recommend to a member who needs to do some home remodeling?
- What program gives CD's a .05% rate increase?
- What kind of ID does someone have to have to do a cash advance?
- What has to be filled out on verafin when opening a new account?
- What has to be accompany a POA being submitted to the back office?
- Who do we contact for questions regarding current loans?
- Who can withdraw from a custodial account?
- How many cross sells per month do you need to reach the first tier goal?
- What is checked each time a cashier's check is made
- Who needs to be emailed when giving out or receiving $5,000 in cash?
- What does an MSR have to pull to qualify someone for a loan?
- What do MSR's add to an auto loan that covers vehicle repairs?
- What is added to an auto loan to cover the amount owed on the loan vs the amount paid by insurance coverage after a total loss?
- What does the E in HELOC represent?
28 Clues: Who do we send wires to? • Where our goals are entered • Monthly Cyber Security training • What does the E in HELOC represent? • Who can withdraw from a custodial account? • What is the drive thru being replaced with? • What program gives CD's a .05% rate increase? • What should we do to every member who walks in? • What is checked each time a cashier's check is made • ...
CYBERSECURITY AWARENESS - C40 2024-10-22
Across
- The process of analyzing systems for vulnerabilities (8 LETTERS)
- A program that replicates itself to spread malware (4 LETTERS)
- A security method where each user has specific privileges (6 LETTERS)
- Cybercriminals often use this method to monitor network activity (8 LETTERS)
- Using multiple types of information to verify identity (14 LETTERS)
- Security strategy that requires users to change this regularly (8 LETTERS)
Down
- Common method used to protect sensitive data (10 LETTERS)
- Fake emails claiming to be from trusted sources (8 LETTERS)
- A phrase longer than a password for added security (9 LETTERS)
- Network of infected computers controlled remotely (6 LETTERS)
- Program designed to prevent unauthorized access (8 LETTERS)
11 Clues: Common method used to protect sensitive data (10 LETTERS) • Fake emails claiming to be from trusted sources (8 LETTERS) • Program designed to prevent unauthorized access (8 LETTERS) • Network of infected computers controlled remotely (6 LETTERS) • A phrase longer than a password for added security (9 LETTERS) • ...
Cristo Rey Crossword 2018-06-21
Across
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- How many credits do you need to graduate from Cristo Rey? (write out number)
- Which Cristo Rey sports team won medals at Florida National Competition?
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- What is the title of the football team’s hype video on Marist School’s website?
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- How many Cristo Rey students are part of a “team” at their job? (write out number)
Down
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- What type of classes does Northside Hospital offer?
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- What percent of students at Cristo Rey get accepted to college after graduation?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
Cristo Rey Crossword 2018-06-21
Across
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- What is the title of the football team’s hype video on Marist School’s website?
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What type of classes does Northside Hospital offer?
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- Which Cristo Rey sports team won medals at Florida National Competition?
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
Down
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- What percent of students at Cristo Rey get accepted to college after graduation?
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- How many Cristo Rey students are part of a “team” at their job? (write out number)
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
Cyber Ethics & Networking Concepts 2025-05-24
Across
- Computer network created for an individual person
- Bulk emails from unknown sources
- Use single user software in multiple system
- Stands for Wi-Fi
- Delivers message only to the destination
- Topology where data travels in a cicular path
- Imitating or copying the sources of one's original work to another persons
- All nodes connected via a central device
- Criminal Activities that involve the use of computers
Down
- An impression of information about a person using internet
- Responsible behaviour in social media
- A type of cyberattack that uses fraudulent email
- Simplest form of network topology
- Each computer in a network
- Illegally copied or distributed software
- Internet accessing in an illegal manner
- Network within a small area
- Harmful program disrupts computer system
18 Clues: Stands for Wi-Fi • Each computer in a network • Network within a small area • Bulk emails from unknown sources • Simplest form of network topology • Responsible behaviour in social media • Internet accessing in an illegal manner • Illegally copied or distributed software • Delivers message only to the destination • Harmful program disrupts computer system • ...
Police - Unit 2 2014-09-24
Bullying 2022-06-06
Across
- a single significant act or a pattern of acts by one or more students
- intentional repeated feels proud
- using threats
- use of any electronic means to hurt someone
- excluding others from a group
- identity of the person who bullies can be kept secret.
Down
- sending pictures messages information using electronic devices
- accidental occasional feels remorse
- secrecy of internet encourages those who might not otherwise bull
- pointing out differences
- any physical contact that hurts a person
- name calling jokes offensive remarks
12 Clues: using threats • pointing out differences • excluding others from a group • intentional repeated feels proud • accidental occasional feels remorse • name calling jokes offensive remarks • any physical contact that hurts a person • use of any electronic means to hurt someone • identity of the person who bullies can be kept secret. • ...
Future of Sport 2025-08-21
Across
- Underground venue for 60-degree Wimbledon (7)
- Mechanical horses in volcano racing (5)
- What gravity becomes in 2050 tennis matches (4)
- Time-traveling referees work across these (7)
- Cristiano's six identical fashion moguls (6)
- Virtual boxer you can't actually touch (8)
Down
- Flying robots that join human footballers on the pitch (6)
- Brain-computer links for drone pilots (6)
- Ronaldo-Charlie's business speciality (7)
- Wearable flight device for cricket batsmen (7)
- Transparent beings in boxing rings (6)
11 Clues: Transparent beings in boxing rings (6) • Mechanical horses in volcano racing (5) • Brain-computer links for drone pilots (6) • Ronaldo-Charlie's business speciality (7) • Virtual boxer you can't actually touch (8) • Cristiano's six identical fashion moguls (6) • Underground venue for 60-degree Wimbledon (7) • Time-traveling referees work across these (7) • ...
Cybersecurity Month 2022-10-13
Across
- ________ Information must be protected from leaks or accidental exposure.
- Button in Outlook to report suspicious email or phishing in one click.
- _______ Period is the length of time information assets are maintained for an authorized person.
- Security _______ is a single or series of unwanted or unexpected information Security Events
Down
- What is celebrated in October?
- Information is accessible to authorized users.
- Information is accurate, complete, and reliable.
- Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
- A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.
9 Clues: What is celebrated in October? • Information is accessible to authorized users. • Information is accurate, complete, and reliable. • Button in Outlook to report suspicious email or phishing in one click. • ________ Information must be protected from leaks or accidental exposure. • ...
Appian Developer 2022-11-07
Across
- An Appian object that stores an expression to be called from other expressions
- Configuration option that indicates a processes relative importance over other processes
- An Appian object that is a focused work environment for their user
- links to process models the user can start directly from a record
- Role assigned to the user who starts a given process
- the underlying technology that powers Appian Interfaces
- An Appian object that stores connection info for an external system
- An interface for feeds, tasks, and actions that is available to all Appian users
- links to process models the user can start directly from the record list
- An object in the process modeler that represents a step in a process
Down
- The type of security role given to a user that includes all possible permissions
- A specific type of variable that is only available in the context in which it is defined
- An Appian object that allows you to create a collection of users with security permissions
- An Appian object that connects Appian to external relational databases
- A general term for all components that make up the end user experience
- any individual who can access and use any of the Appian interfaces
- A category of process model nodes which evaluate criteria to determine paths to follow
- A type of security role where the user can view and modify the object, but not edit security
- A column in a data table that provides a link between data in two tables
- Confirmation that an extracted piece of data is correct
- A series of tasks linked together to create a wizard which a user can navigate
- A user interface component that allows the user to make a binary choice 'yes' or 'no'
- A response that occurs when a task is delayed
23 Clues: A response that occurs when a task is delayed • Role assigned to the user who starts a given process • Confirmation that an extracted piece of data is correct • the underlying technology that powers Appian Interfaces • links to process models the user can start directly from a record • any individual who can access and use any of the Appian interfaces • ...
Cybersecurity unit 6 and 7 vocabulary 2026-03-03
Across
- The practice of sending users to a fraudulent website to gain control over or gain information from a user.
- ISPs that use paid transit for more local transit.
- Targeting powerful figures such as CEOs and Celebrities to gain the most valuable information.
- A security tool that uses multiple one-time passwords to create a much more secure login.
- Use of manipulative techniques to gain information from a target such as passwords.
- An IP network that can reach every other network on the internet without paying for a transit.
- A secure, centralized building that houses computer infrastructure, such as servers and data storage drives.
- The set of rules governing how data is transmitted and addressed on the internet,
- The largest network in the world, connecting almost every network and device to each
Down
- An internet security tool that masks your IP address and sends it through an encrypted tunnel
- The practice of sending fraudulent messages in order to trick victims into revealing information.
- The vast majority of the internet, it can only be accessed through authorized access such as a password or a paywall.
- Any unauthorized activity that compromises the confidentiality, integrity, and availability of data systems.
- The part of the internet that can be freely accessed by everyone.
- A network security tool that acts as a digital barrier between a trusted network and an untrustworthy network.
- The part of the internet that is intentionally hidden and requires special software to access it.
- Process of gathering information on a target without directly interacting with its systems.
- A security tool that detects, prevents, and removes malicious software.
- The final segment of a network that relies on infrastructure that physically connects an ISP’s network to an end user.
- A powerful computer that stores data and manages network resources for a network, delivering it to other “client” computers.
20 Clues: ISPs that use paid transit for more local transit. • The part of the internet that can be freely accessed by everyone. • A security tool that detects, prevents, and removes malicious software. • The set of rules governing how data is transmitted and addressed on the internet, • Use of manipulative techniques to gain information from a target such as passwords. • ...
MALEWARE 2023-06-19
6 Clues: SPYS ON YOU • SOMEONE HACKS YOU • ATTAKERS DECIVE POEPLE • HOLDS YOU HOSTAGE ONLINE • REAPETING SOMETHING TO ANNOY SOMEONE • SPYS ON YOU AND STEALS YOUR PASSWORDS
G8 CrossWord 2013-01-14
Across
- Can't_host_G8_meetings
- A_major_concern_at_G8
- Location_of_first_G8
- The_8th_country_added_to_G8
- Large_South_American_Economy_not_in_G8
- Common_issue_discussed
- Hosted_2007_G8
Down
- Large_Asian_Economy_not_in_G8
- Leader_who_did_not_attend_2012_G8
- Average_number_of_days_of_G8_meetings
- Next_host_of_G8
- First_North_American_Country_in_G8
- Only_Asian_Country
- The_7th_country_added_to_G8
14 Clues: Hosted_2007_G8 • Next_host_of_G8 • Only_Asian_Country • Location_of_first_G8 • A_major_concern_at_G8 • Can't_host_G8_meetings • Common_issue_discussed • The_7th_country_added_to_G8 • The_8th_country_added_to_G8 • Large_Asian_Economy_not_in_G8 • Leader_who_did_not_attend_2012_G8 • First_North_American_Country_in_G8 • Average_number_of_days_of_G8_meetings • ...
Airports 2020-03-07
Bonds 2014-05-02
Across
- The price at which a seller is prepared to sell a security at a particular time.
- Unable to pay debts.
- Businesses that buy and sell securities.
- The price at which a buyer is prepared to buy a security at a particular time.
- People or institutions to whom money is owed.
- Payments by companies to their shareholders.
Down
- Funds operated by investment companies that invest people’s money in various assets.
- The length of time for which a bond is issued (until it is repaid).
- The amount of capital making up a bond or other loan.
- Funds that invest money that will be paid to people after they retire from work.
- The amount of interest that a bond pays.
- Part ownership of a company in the form of stocks or shares.
- The rate of income an investor receives from a security.
13 Clues: Unable to pay debts. • Businesses that buy and sell securities. • The amount of interest that a bond pays. • Payments by companies to their shareholders. • People or institutions to whom money is owed. • The amount of capital making up a bond or other loan. • The rate of income an investor receives from a security. • ...
Air Travel Words 2022-04-18
Across
- time The time a plane will leave from an airport.
- attendant The airline employee responsible for providing service to passengers and ensuring their in-flight safety.
- pass The ticket passengers need to enter the plane and locate their seat.
- The area where the pilot sits to operate the plane; remains closed and locked during flight for security reasons.
- flight The airplane a passenger catches after a layover.
- time The time a plane will land at an airport.
- class The section of the plane that offers standard seat size, amenities, and service; typically, the least expensive section. Also called economy class.
- A flight that departs late at night and arrives during early morning hours.
- class A section of the plane reserved for travelers who want to upgrade from the standard seat size, amenities, and service.
Down
- luggage Bags that are put in the cargo area of the plane, which is inaccessible by passengers.
- class The section of the plane that offers the largest seat size and highest-quality amenities and service.
- ticket A ticket that passengers buy to fly to a destination but not to return.
- number The number that identifies a particular flight and that passengers use to find their gate number and plane.
- agent An airline employee who checks in passengers, checks luggage, and prints boarding passes.
- ticket A ticket that passengers buy to travel to a destination and back again.
- The process passengers must go through when first arriving at the airport before going through security.
- (Federal Aviation Administration) The federal agency that develops and enforces safety regulations and advancements.
- A stop in an airport before reaching the final destination.
- The bags passengers bring with them on the plane.
- class See coach class.
- (Transportation Security Administration) A federal agency that protects transportation systems in the United States and ensures safe air travel; employees serve as security officers in airports.
- claim The area in the airport where passengers go to collect their luggage.
22 Clues: class See coach class. • time The time a plane will land at an airport. • time The time a plane will leave from an airport. • The bags passengers bring with them on the plane. • flight The airplane a passenger catches after a layover. • A stop in an airport before reaching the final destination. • ...
CHAPTER 6 NATIONAL SECURITY AND PEACE EDUCATION 2019-09-30
Across
- the particular condition that someone or something is in at a specific time.
- a group of people living in the same place or having a particular characteristic in common.
- discussion aimed at reaching an agreement.
- WOLFERS- who has a member of the council of the ISS and did much to help the institute was one of the handful of men created the establishment of academic fields of international now politics.
- he state of being free from danger or threat.he state of being free from danger or threat.
- profession, activity, or skill of managing international relations, typically by a country's representatives abroad.
- intense feeling of deep affection.
- relating to the government or the public affairs of a country.
- PEACE- refers to a state of affairs where peace is permanently established over a certain area. ... The term perpetual peace became acknowledged when German philosopher Immanuel Kant published his 1795 essay Perpetual Peace: A Philosophical Sketch.
Down
- the power or right to give orders, make decisions, and enforce obedience.
- the power or right to act, speak, or think as one wants without hindrance or restraint.
- surroundings or conditions in which a person, animal, or plant lives or operates.
- the arts and other manifestations of human intellectual achievement regarded collectively.
- a large body of people united by common descent, history, culture, or language, inhabiting a particular country or territory.
- the action of protecting, or the state of being protected.
- from disturbance; tranquility.
- SECURITY-National security is the security of a nation state, including its citizens, economy, and institutions, which is regarded as a duty of government.
- The branch of knowledge concerned with the production, consumption, and transfer of wealth.
- relating to or characteristic of soldiers or armed forces.
- MAIER-served as the director of the Center for European Studies at Harvard, 1994-2001, and currently co-directs (with Sven Beckert, Sugata Bose, and Jean Comaroff) the Weatherhead Initiative in Global History.
20 Clues: from disturbance; tranquility. • intense feeling of deep affection. • discussion aimed at reaching an agreement. • the action of protecting, or the state of being protected. • relating to or characteristic of soldiers or armed forces. • relating to the government or the public affairs of a country. • ...
Radio Numbers 2 2026-03-27
Across
- Amanda Laughery Night Shift Supervisor
- Ofc Erica Burns Building Security
- Breann Hathaway
- Ofc Michael Sheehan
- K9 Ofc Jason Ward
- Chief Eric Schmitt
- Sgt Caleb Teig
- Ofc Joshua Gross
- Code Norman Teed
- Natalie Rodgers
- Ofc Darold Donathan
- Chaplin Tom Willcox CP1
- Ofc Julia Swoboda
- PSA Haley Mendoza
- SRO Taylor Davisson
- Ofc Johnathan Sigmin
- Ofc Kory Franklin
- Ofc William Huber
- Sgt Stanley Kauffman
- Ofc Don Bradford Building Security
- Ofc Trainee Ashlyn Thom
- Allie Bryant
- Ofc Sarah Chapman Building Security
- Sgt Melissa Stowers
- Lt Dale Burnett
- Det Zach Hamilton
- Ofc Emilee Norris
- Det BJ Russell
- Ofc James Wood
- Code Kirk Standridge
- Ofc Michael Wachob
- Code Christopher Barber
- Sgt Jeremy Dixon
- Code Ronnie Bradley
- Ofc Steven Parrish
- Julie Lowery Records
- John Pate Part Time
- Ken Watson
- Ofc Colton Schmitt
- OIT Bodee Hern
- Nicole Robinson
Down
- Lt Eric Wehmeier
- PSA Dave Miller
- Det Sgt Tanner Muckenthaler
- Ofc Gavin Gannaway
- Ofc Christian Urbina
- Lt EJ Jones
- Ofc Matt Edie
- Ofc Wesley Anderson
- ACO Ashley Hurst
- Ofc Jordan Harder
- Ofc Chase Rains
- Breanne Benton
- K9 Ofc Brendan Gamble
- Kayla Lovell
- SRO Jesse Wilcox
- Ofc Brittney Holt
- Sgt Cody Lowery
- Ofc Kayla Smith
- Ofc Caleb McCarty
- Lori Hodge
- Ofc Nicholas Brown
- Det Cody Foster
- Ofc Daniel McKinney
- Sgt Gregory Yartz
- Ofc Robert Bishop Court Security
- Eastyn Buttke
- Ofc Austin Simmons
- Elijah Emerson
- Det Joe Edwards
- Ofc Amber Edie
- Ofc Alex Kaster
- Ofc Kyle Rhea
- Det Seth Jenkerson
- Ofc Alexander Rose
- Ofc Luis Gonzalez
- SRO Steve Mobley
- Det David Lingscheit
- Ofc Austin Williams
- Missy Dement Records
- Harold Clements Comm Supervisor
- Ofc Logan Wilson
82 Clues: Lori Hodge • Ken Watson • Lt EJ Jones • Kayla Lovell • Allie Bryant • Ofc Matt Edie • Eastyn Buttke • Ofc Kyle Rhea • Sgt Caleb Teig • Breanne Benton • Elijah Emerson • Ofc Amber Edie • Det BJ Russell • Ofc James Wood • OIT Bodee Hern • PSA Dave Miller • Breann Hathaway • Ofc Chase Rains • Natalie Rodgers • Sgt Cody Lowery • Ofc Kayla Smith • Det Cody Foster • Lt Dale Burnett • Det Joe Edwards • Ofc Alex Kaster • ...
French words 2023-04-14
25 Clues: car • bed • tip • menu • cash • taxi • boat • guide • stamp • people • palace • strike • ticket • subway • castle • baggage • customs • on foot • cue/line • suitcase • passport • security • cathedral • consultant • post office
Career English 1과 2021-03-30
Asdf 2026-03-25
GSCP 3rd Activities - Key Management 2025-11-04
Across
- What was the topic of the second Global Security Culture Program campaign?
- The primary purpose of the red zone is to protect what?
- Security measure distributed based on roles and business justification.
- An alarm that will be triggered when someone opens a door without receiving "access granted" (green light).
- Security Zone that is inside the fence line, outside the building.
Down
- What type of connector is used as a safety mechanism for lanyards?
- How are Media Bin Keys classified in the Key Risk Matrix?
- Security Zone that is inside the building, outside of the red zone.
- The process by which all individuals and objects are screened going into and out of the Red Zone.
- Which system do Amazon data centers use to securely manage physical keys, control access permissions, and track key usage history?
10 Clues: The primary purpose of the red zone is to protect what? • How are Media Bin Keys classified in the Key Risk Matrix? • What type of connector is used as a safety mechanism for lanyards? • Security Zone that is inside the fence line, outside the building. • Security Zone that is inside the building, outside of the red zone. • ...
Jordan's Crossword puzzle 2018-11-18
Across
- demanding money for information
- let's attacker to secretly control the users infected computer
- small piece of software that corrupts devices
- the programs and other operating info used by a computer
- a type of software intended to damage or destroy
Down
- a necessity when hacking putting in a virus
- uses computer networks to duplicate itself
- it claims to be a game
- trying to get someone to reveal personal information
- denial of service
- attacks online
- repeatedly showing up on your screen
- kids can't fill this gap if it's too large
- attacks personal information; also the name of king of gods
- uses email addresses to replicate itself
15 Clues: attacks online • denial of service • it claims to be a game • demanding money for information • repeatedly showing up on your screen • uses email addresses to replicate itself • uses computer networks to duplicate itself • kids can't fill this gap if it's too large • a necessity when hacking putting in a virus • small piece of software that corrupts devices • ...
Networking Concepts & Cyber Ethics 2025-05-30
Across
- : We send and get messages here
- : We use this to click on computer
- : We should not share too many of these
- : We should be this when using internet
- : We must follow these when we use internet
- : It helps our phone or laptop to use internet
- : Word used for online world
- : We use this to visit websites
- : Kids play this on computer or phone
Down
- : We use this to study and play
- : We watch this on YouTube
- : We should keep this secret
- : We should only chat with real ____ online
- : Talking with friends using phone or computer
- : We should not share this with strangers online
15 Clues: : We watch this on YouTube • : We should keep this secret • : Word used for online world • : We use this to study and play • : We send and get messages here • : We use this to visit websites • : We use this to click on computer • : Kids play this on computer or phone • : We should not share too many of these • : We should be this when using internet • ...
AICyber 2026-01-02
7 Clues: Secret word to log in • Person who breaks into systems • A harmful program that spreads • Attempt to break into a system • A machine that chats with humans • Barrier that blocks cyber attacks • Short form of Artificial Intelligence
E-safety 2020-10-15
8 Clues: how you feel • how you may feel • who you could tell • who you could go to • dont make it your real name • a mean person who hides behind a screen • what you need to do to keep you information safe • what everyone uses to interact with people virtually
Encryption 2022-01-10
Across
- Decoding machine used at Bletchley Park during
- an algorithm for performing encryption and
- appear
- Type of analysis used to determine how often
Down
- Code used during WW1/2 comprising dots and dashes
- Organisation responsible for UK cyber defence
- Person responsible for the first substitution cipher
- an encryption method used by the ancient
8 Clues: appear • an encryption method used by the ancient • an algorithm for performing encryption and • Type of analysis used to determine how often • Organisation responsible for UK cyber defence • Decoding machine used at Bletchley Park during • Code used during WW1/2 comprising dots and dashes • Person responsible for the first substitution cipher
BULLYING 2024-08-10
Across
- bullying perundungan pada sosial media
- Orang yang meminta uang dengan disertai ancaman adalah
- kata bully berasal dari bahasa
- bullying dapat menyebabkan
Down
- tindakan yang membully disebut dengan
- bullying dalam bentuk perkataan disebut dengan
- Pembullyan dalam bentuk kekerasan, seperti menjambak, memukul, dan menendang adalah bentuk bullying
- perubahan suasana hati disebut dengan
8 Clues: bullying dapat menyebabkan • kata bully berasal dari bahasa • tindakan yang membully disebut dengan • perubahan suasana hati disebut dengan • bullying perundungan pada sosial media • bullying dalam bentuk perkataan disebut dengan • Orang yang meminta uang dengan disertai ancaman adalah • ...
IS and BC Cross-Up Crossword 2021-10-26
Across
- Your ________ device often contains more personal information than any other source.
- BCP's main focus is not preventing incidents but rather the __________ from it.
- A major business disruption; the earth moves, shifts and shakes.
- Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc; or you could eat it.
- The Corporation has a _________policy which states all workspaces must be cleared of sensitive documents if unattended (two words).
- _______ Authentication requires more than just a password; usually also needs a token or a generated access code or token (two words).
- sometimes you ask me to use my eye or voice or finger to identify or to grant access to systems, devices or data.
- __________ setting helps control things like your Profile, Contacts, and other information relating to your account.
- Never use your TTUTC________address for personal usage.
- Sending an email, posting photos on a social media site and using your webcam.
- The global system of interconnected computer networks that link billions of devices.
- a malicious party impersonates another device or a user in a network to launch attacks against network hosts, steal data, spread malware, or even bypass access controls.
- This “yummy” treat is generated by a web server and saved to your computer after visiting a website; you can also say no, I’m on a diet.
- The art of manipulating people to get access to sensitive information (two words.
- conforming to a rule, such as a specification, policy, standard or law.
- A collection of computers that are controlled on the same network.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- The staff and the customers are considered.
- The UTC hotsite is located here.
- This horse can stampede our security defenses for the bad guys and make us look sheepish too!! (two words).
- Facebook and TikTok are types of ________ (two words).
Down
- A crime where a computer is the object of the crime or is used as a tool to commit an offense.
- someone who seeks and exploits weaknesses in a computer system or computer network.
- Communication test done by teams to ensure that each person can be reached in the event of an emergency (two words).
- A technology that allows us to access our files through the internet from anywhere in the world.
- When calls are made by social engineering, they are called _____ .
- Choose a password that is easy for you to ____________ but hard for you someone to guess.
- information such as legal documents and contracts must be classified as __________information. - (restricted)
- A piece of code put in to correct an error.
- Non-ICT Security Incidents such as unauthorized data usage and disclosure must be reported to the ______________ Department (acronym).
- Always _______your computer when you leave your desk.
- Where do UTC employee report their ICT issues (three words).
- My nickname is Garbage Pail Kid .I am always _________ searching through trash to retrieve sensitive information (two words).
- The address of a webpage. Check the validity of it before clicking on it (acronym).
- Usually comprises the display device of the computer.
- An asset like other essential business assets in the Corporation.
- Who can be the target of a cyber attack.
- A concept where all things are connected to the internet; household items usually (three words).
- Equipment that offers short term protection against power surges and power outages (acronym).
- __________ Edwards is the Recovery Director and is in charge of BCP.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- Choose the strongest password is password345 , Passw0rd123, P@$sW0rD32!, Pa$$worD562.
- The process of adding allowed programs to a list is called_________.
- You can call 999, 881 or 990 for _______ services.
- “ This too good to be true email gives off a false sense of ______”.
- Harmful computer programs such as viruses, worms, and trojans are used by hackers to gain access to your computer and cause destruction.
- A list of entities that are blocked or denied privileges or access.
- The designated area at which employees, visitors and contractors assemble if evacuated from their building/site; The promenade for example (two words).
48 Clues: The UTC hotsite is located here. • Who can be the target of a cyber attack. • A piece of code put in to correct an error. • The staff and the customers are considered. • You can call 999, 881 or 990 for _______ services. • Always _______your computer when you leave your desk. • Usually comprises the display device of the computer. • ...
Cad Abbreviations 2023-12-27
19 Clues: number • Suspect • between • traffic • unknown • accident • security • location • possibly • occupied • on scene • business • voicemail • supervisor • In Front of • on the phone • methed of travel • last seen wearing • no further information
crossword 2025-10-27
19 Clues: Art • Gym • Lab • Ivrit • Rambam • History • Spanish • Security • Principal • AP English • Engineering • Graphic Design • Israel Guidance • College Guidance • 9th Grade Biology • Marketing Director • Activities Director • Associate Principal • Admissions Coordinator
Cristo Rey Crossword 2018-06-21
Across
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- Which Cristo Rey sports team won medals at Florida National Competition?
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- What is the title of the football team’s hype video on Marist School’s website?
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What percent of students at Cristo Rey get accepted to college after graduation?
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- What type of classes does Northside Hospital offer?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Cristo Rey Crossword 2018-06-21
Across
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- What type of classes does Northside Hospital offer?
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
Down
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- What is the title of the football team’s hype video on Marist School’s website?
- Which Cristo Rey sports team won medals at Florida National Competition?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- How many credits do you need to graduate from Cristo Rey? (write out number)
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- What percent of students at Cristo Rey get accepted to college after graduation?
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Cyber Safety 2020-08-21
Across
- detects viruses and eliminates them before they get into you computer.
- software that is made to damage or gain unauthorized access to a computer
- folders within a cite which holds your information (username, password, etc.) about that website without taking other personal information.
Down
- a type of software that allows another user to have information about another computer using a hard drive.
- bad mails that a made for taking information about your passwords, credit card number, and especially to get into you bank account.
- system that blocks not wanted users and mails from getting your information.
- a sickness for a computer. When received one, you can’t get into your computer.
- junk mail that can also be called “unwanted mail”
8 Clues: junk mail that can also be called “unwanted mail” • detects viruses and eliminates them before they get into you computer. • software that is made to damage or gain unauthorized access to a computer • system that blocks not wanted users and mails from getting your information. • a sickness for a computer. When received one, you can’t get into your computer. • ...
cyber acoso 2021-04-06
8 Clues: alguien se mata • hacer daño a alguien • lo que tú piensas de ti • pensar que no hay nadie a nuestro lado • alguien hace algo que supera los limites • ser rudos tanto física como psicológicamente • intentar entender lo que alguien piensa y siente • un adulto intenta contactar un menor con intento sexual
Cyber Law 2021-09-05
Across
- cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- ____Regulation works by utilising feedback
- according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
Down
- wrote Code and Other Laws of Cyberspace
- cyber____
- digital___ is the productivity platform that some experts regard as the third industrial revolution
- Shawn Fanning created the____
- the conversion of analogue data into digital form
8 Clues: cyber____ • Shawn Fanning created the____ • wrote Code and Other Laws of Cyberspace • ____Regulation works by utilising feedback • the conversion of analogue data into digital form • digital___ is the productivity platform that some experts regard as the third industrial revolution • ...
Cyber Safety 2022-02-02
8 Clues: SHOT MESSAGE • SMALL TEXT FILES • HARASS ON INTERNET • FILE THAT STEAL OR INFECT • SOCIAL NETWORK FOR BUSINESS • UNIQUE ADDRESS OF YOUR DEVICE • ATTACK ON INDIVIDUAL OR GROUP • ATTACK THAT PREVENT LEGITIMATE USERS
Cyber Safety 2021-09-16
cyber safety 2019-09-26
8 Clues: fish • scam scam • URL www.pizza.com • media instagram snapchat • information it belongs to your • flag feeling this feels wrong • balance every once and awhile get off your phone • get off online identity theft stealing something
CYBER BULLYING 2015-02-18
8 Clues: Οι θύτες έχουν κακή ... • Διαταράσσεται η ... των εφήβων • Κυριαρχεί η ... στον εκφοβισμό • Υπάρχει λεκτική και σωματική ... • Γίνεται ανάμεσα σε δύο ανθρώπους ... • Πώς ονομάζεται το άτομο που εκφοβίζει; • Κυκλοφορούν κακά ... βασιζόμενα στο θύμα • Πώς ονομάζεται το άτομο που εκφοβίζεται ;
CYBER CRIME 2022-10-10
Across
- a person who has committed a crime
- a technique used by hackers to redirect users to false websites without their knowledge.
- a verb meaning to gain unauthorized access into a computer system
- a horse malware
Down
- the process of proving that something is real
- a type of social engineering attack often used to steal user data
- intrusive software that is designed to damage and destroy computers
- an expression of intention to damage or to harm
8 Clues: a horse malware • a person who has committed a crime • the process of proving that something is real • an expression of intention to damage or to harm • a type of social engineering attack often used to steal user data • a verb meaning to gain unauthorized access into a computer system • intrusive software that is designed to damage and destroy computers • ...
Cyber Crime 2024-05-29
8 Clues: = not legal • = stealing something • You need this on your devices • It can happen to your accounts • to bother someone in a bad way • Pretending to be a real business • Holding your information for money • Pretending to be someone else for bad reasons
Cyber wellness 2023-02-01
8 Clues: never reveal your p______ • dont share your i__________ • think before you p______ online • be safe while your playing o_____ • Dont tell random people your a______ • do not leak your p_______ information • R______ other peoples opinions when online • Tell an adult if someone is c___________ you
cyber safety 2023-05-22
Across
- Repeatedly sending nasty, mean, and insulting messages.
- Online fights using electronic messages with angry and vulgar language.
- Talking someone into revealing secrets or embarrassing information, then sharing it online.
- Sharing someone's secrets or embarrassing information or images online.
- Repeated, intense harassment and denigration that includes threats or creates significant fear.
Down
- Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
- Intentionally and cruelly excluding someone from an online group.
- "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
8 Clues: Repeatedly sending nasty, mean, and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Sharing someone's secrets or embarrassing information or images online. • Online fights using electronic messages with angry and vulgar language. • ...
Cyber Safety 2024-10-09
Across
- refers to the responsible and ethical behaviour of individuals when using digital technologies and the internet.
- means being safe and responsible online.
- It refers to the buying and selling of goods using electronic means, like online shopping.
- It refers to the proper and respectful behaviour when using electronic devices and interacting with others online.
Down
- This means being able to fully participate in society using electronic devices and the internet.
- It is the process of learning and teaching about technology and how to use it effectively.
- These are the rules and responsibilities that apply to our actions and behaviour in the digital world.
- Continuous and spreading effect of an event or an action.
8 Clues: means being safe and responsible online. • Continuous and spreading effect of an event or an action. • It is the process of learning and teaching about technology and how to use it effectively. • It refers to the buying and selling of goods using electronic means, like online shopping. • ...
Cyber Attack 2024-12-11
Across
- A type of malicious software that can spread between computers and damage data
- software that cybercriminals use to steal data, damage computers, or destroy systems. It's short for "malicious softwar
- social engineering attack that uses fake mobile text messages to trick people. The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind text messages—and “phishing”.
- Prevents access to files, systems, or networks, and demands payment to return them
Down
- Secretly monitors a user's activities and reports them to the software's author.
- are several types of phishing attacks, including:
- one that uses fraudulent emails, text messages, phone calls, or websites to trick people into sharing sensitive data, downloading malware, or otherwise exposing themselves to cybercrime. Phishing attacks are a form of social engineering.
- Displays unwanted advertisements and pop-ups, and can track online behavior.
8 Clues: are several types of phishing attacks, including: • Displays unwanted advertisements and pop-ups, and can track online behavior. • A type of malicious software that can spread between computers and damage data • Secretly monitors a user's activities and reports them to the software's author. • ...
Cyber Kindness Week 2024-04-12
Across
- Focusing on the good in people and situations.
- Providing motivation and uplifting words.
- Being open-minded and empathetic.
- Giving without expecting anything in return.
- Working together for common goals.
- Understanding others' feelings.
Down
- Showing care and concern.
- Thinking about how your actions affect others.
- Showing appreciation for others' kindness.
- Valuing others' opinions and boundaries.
- Offering assistance when needed.
- Showing behaviour that is respectful and considerate of other people.
12 Clues: Showing care and concern. • Understanding others' feelings. • Offering assistance when needed. • Being open-minded and empathetic. • Working together for common goals. • Valuing others' opinions and boundaries. • Providing motivation and uplifting words. • Showing appreciation for others' kindness. • Giving without expecting anything in return. • ...
Unit 2 - The Human Factor 2025-03-14
Across
- A social engineering tactic where an attacker fabricates a story to obtain information.
- A set of rules that an organization follows to maintain security.
- False alarms or fake warnings designed to trick people into taking action.
- A documented series of steps to follow for security practices.
- Phishing attacks carried out via SMS text messages.
- Manipulating people into revealing confidential information.
- Unauthorized access to or manipulation of computer systems or networks.
- A cyberattack where fraudulent emails trick users into revealing sensitive data.
Down
- Malicious software designed to frighten users into downloading harmful programs.
- A tactic where an attacker manipulates a target into seeking their help, ultimately gaining access to sensitive information.
- Gaining unauthorized access to a secured area by following an authorized person.
- A targeted phishing attack aimed at a specific individual or organization.
- The act of spying on someone’s screen or keyboard to obtain sensitive information.
- The act of searching through trash to find confidential information.
- A social engineering attack that lures victims with a tempting offer to steal their information.
- To reduce the impact or risk of a security threat.
- Abbreviation for gathering publicly available information to analyze a target.
- Phishing attacks conducted over voice calls.
- A phishing attack targeting high-profile executives or important individuals.
19 Clues: Phishing attacks conducted over voice calls. • To reduce the impact or risk of a security threat. • Phishing attacks carried out via SMS text messages. • Manipulating people into revealing confidential information. • A documented series of steps to follow for security practices. • A set of rules that an organization follows to maintain security. • ...
IT-Security - Datenschutz/-sicherheit 2016-01-29
Across
- Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
- Virus der sich direkt über Netzte im Internet verbreitet
- versteckt in einem scheinbar nützlichen Programm
- Mobbing mit Hilfe von elektronischen Medien
- Beobachtung bei der Eingabe von Daten
Down
- Sicherheitskopie im Falle von Verlust oder dergleichen
- forschen das Nutzerverhalten aus
- Diebstahl von Daten die weggeworfen wurden
- jemand der illegal in Computersysteme eingreift
- unerwünschte Werbemails
10 Clues: unerwünschte Werbemails • forschen das Nutzerverhalten aus • Beobachtung bei der Eingabe von Daten • Diebstahl von Daten die weggeworfen wurden • Mobbing mit Hilfe von elektronischen Medien • jemand der illegal in Computersysteme eingreift • versteckt in einem scheinbar nützlichen Programm • Sicherheitskopie im Falle von Verlust oder dergleichen • ...
Cyberpuzzle 2023-08-08
Across
- Substitute_ with numbers, punctuation marks or symbols when creating your password
- Phishing attempt directed at specific individuals or companies
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Kind of software used to prevent, scan, detect and delete viruses from a computer
- Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
- Cybersecurity Awareness Month
- Mandatory to wear inside the organisation and to remove outside
Down
- Action to do when I receive a suspicious email
- When available, use stronger_for an added layer of security
- Type of malware that disrupts computers, servers, and other devices
- Phishing attack deployed via SMS message
- Defensive technology designed to keep the bad guys out
12 Clues: Cybersecurity Awareness Month • Phishing attack deployed via SMS message • Action to do when I receive a suspicious email • Defensive technology designed to keep the bad guys out • When available, use stronger_for an added layer of security • Phishing attempt directed at specific individuals or companies • ...
Bernardo C. Los Viajes assignment 2024-03-05
19 Clues: valid • ruins • hostel • Border • expired • to sail • lodging • compass • itinerary • insurance • to return • ecotourism • tour guide • high season • traffic jam • room service • customs agent • to pack your bags • security measures
Pre-intermediate 3 2022-11-14
19 Clues: vám • utas • fiuka • késik • talán • kütyü • jóslat • egy napot • mostanában • határozott • konferencia • indulási kapuk • hely, helyszin • érkezési kapuk • átvesz, befogad • tábla, jelzések • beszáll (repülőbe) • biztonsági ellenörzés • agresszív közúti magatartás
Airport vocabulary 2022-11-16
19 Clues: viaje • viajar • aduana • puerta • salidas • esperar • turista • demorado • llegadas • terminal • peso(kg) • equipaje • pasaporte • seguridad • cancelado • asiento de pasillo • tarjeta de embarque • asiento de la ventana • fecha de nacimiento (contracion)
At the Airport 2017-01-12
22 Clues: багаж • терять • прямой • острый • тележка • предмет • опасный • тяжелый • быстрый • очередь • жидкость • пассажир • оставлять • показывать • пропускать • досматривать • внимательный • присоединяться • проходить через - go ... • посадочный талон - ... card • стойка регистрации - ... desk • сотрудник службы безопасности
o Aeroporto e Uma Viagem de Aviao 2023-03-20
26 Clues: trip • cart • agent • pilot • flight • runway • luggage • carryon • monitor • customs • through • arrivals • suitcase • vacation • security • escalator • passenger • tocheckin • tripticket • flightcrew • seatnumber • fristclass • stewardness • destination • domesticflight • automatic runway
Family 2024-01-10
26 Clues: Care • Love • Grow • Face • Core • Build • Learn • Family • Values • Social • Foster • Culture • Support • Empathy • Crucial • Respect • Teaches • Identity • Provides • Security • Preserves • Challenges • Traditions • Environment • Understanding • Bases/foundations
German homework/crossword 2024-11-21
20 Clues: - mood • - brain • - health • - answer • - reason • - to hit • - economy • - to dive • - Religion • - to crawl • - to catch • - to vault • - advantage • - to measure • - environment • - to deliver • - safety, security • - to shake/jiggle • - justice, fairness • - strenuous, exhausting
Test Your Risk Vocabulary 2021-09-01
24 Clues: Strain • Burden • Payment • Profits • Average • Oversight • Guarantee • Alertness • Adherence • Evaluation • Divergence • Protection • Likelihood • Supervisory • Extenuation • Risk grading • Vulnerability • Precautionary • Deterioration • Ratings Agency • Debt instrument • Unpredictability • Financial wealth • Conscientiousness
Crossword 2020-12-18
Zoom Culture 2021-10-12
Vilmenay 2026-03-25
Cyber Safety 2019-01-25
Across
- Garfield is a large ____ that knows how to stay safe online.
- Do not share this information about where you live with strangers.
- Nermal loves to play these online.
- Always tell your ____ what you are doing online.
Down
- Do not share your full ____ online. Use a nickname, instead.
- Never share this secret code with anyone.
- Your favorite TV ____ are okay to share online.
- Only give your ____ number to family and friends you know in real life.
8 Clues: Nermal loves to play these online. • Never share this secret code with anyone. • Your favorite TV ____ are okay to share online. • Always tell your ____ what you are doing online. • Garfield is a large ____ that knows how to stay safe online. • Do not share your full ____ online. Use a nickname, instead. • ...
Cyber Info 2020-08-10
Across
- social media app where you can post pictures
- how people view you and what they associate you with
- instagram for your parents
- app where you can give your opinions
Down
- when you put out too much information online
- snap your friends everyday to start a streak
- charli is queen
- the mark you leave behind when doing anything online
8 Clues: charli is queen • instagram for your parents • app where you can give your opinions • when you put out too much information online • snap your friends everyday to start a streak • social media app where you can post pictures • the mark you leave behind when doing anything online • how people view you and what they associate you with
