cyber security Crossword Puzzles
Chapter 14 Security Plus 2024-03-30
Across
- A document that provides detailed mandatory steps
- The withdrawal of a permit to function not following compliance
- A list of specific actions to take for threats
- proactive human identification of a cyber invasion
- The actions to be taken when an employee leaves an enterprise
- Identifying and mitigating risks brought on by a third party
- damages that are the result of not following compliance standards
- A policy that outlines how applications should be developed
- The rapid detection and elevation of a threat incident
Down
- Subset of the board that manages governance issues
- Verification of truth or authenticity
- Generating a special document or record
- A policy that defines the actions users may perform
- Automation used for entire processes instead of for a single task
- An agency responsible for enforcing government directives
- Practices an organization has in place to assign, oversee, and report
- A penalty for not following compliance standards
- Automations that constantly watch cloud deployments
- ensuring that an organization adheres to laws and regulations
- composed of internal directors who approve strategic goals and policies
- A formal statement that outlines specific requirements
21 Clues: Verification of truth or authenticity • Generating a special document or record • A list of specific actions to take for threats • A penalty for not following compliance standards • A document that provides detailed mandatory steps • Subset of the board that manages governance issues • proactive human identification of a cyber invasion • ...
Chapter 5 Security Plus 2024-09-14
Across
- It only goes off after certain conditions are met
- inserts statements to manipulate a database server
- An attack that copies data and then uses it
- resource that is not possible due to geography
- account that is inaccessible through a normal login attempt
- A malicious program that uses a computer network to replicate
- A cookie that is only sent to the server with an encrypted request
- takes advantage of a vulnerability to move to restricted directories
- Software installed on a device without the user requesting it
- A request that has been fabricated
- Malware disguised as something useful or legitimate
Down
- An indicator of attack in which data is no longer accessible
- store data in RAM beyond the boundaries
- threat actor gains illicit access of elevated rights or privileges
- An attack in which threat actors introduce something into RAM
- An attack in which a website accepts user input without validating it
- Closing unused ports and disabling unnecessary protocols
- move from the root directory to other restricted directories
- hides its presence on the device
- depletion of memory or processing capabilities
- Installing software security updates
- Attack that copies data and then uses it
- Secure space for running untrusted software
- Malware that replicates by infecting other files or programs
- captures and stores each keystroke that a user types on the computer’s keyboard
- monitors endpoints and immediately blocks a malicious attack
- A sign an attack is currently underway
27 Clues: hides its presence on the device • A request that has been fabricated • Installing software security updates • A sign an attack is currently underway • store data in RAM beyond the boundaries • Attack that copies data and then uses it • An attack that copies data and then uses it • Secure space for running untrusted software • ...
2nd Quarter Security training 2023-04-17
Across
- Refer media questions to the ___ or community relations director.
- The robbery packet is located on the back of the ___ ___.
- Inform members of emergency and request they ___ the building.
- ____ in a secure location if you cannot escape.
- The alternate meeting point is ___ if it is unsafe at the primary.
- Ask witnesses to fill out an ___ ___.
- A ___ ___ is located under each phone.
Down
- If safe, secure cash and ___ ___ information before evacuating.
- Use the ___ to document details of the call for bomb and kidnapping threats.
- Don't be a ___.
- Once the robber leaves ___ the doors and put up closed signs.
- During a medical emergency have someone ___ with the member while another calls 911.
- Try to ___ sights, sounds, and smells that may help identify your abductors.
- Primary meeting point is at the ___ dot.
- As a last resort ____ to save yourself.
- ___ silent alarms as soon as you feel safe to do so.
- Put up a ___ paper used to signal all clear to law enforcement.
- ____ if there is an accessible escape path.
- ___ you have been robbed.
- ___ 911 to report incident only if it is safe.
- Always take threats___.
- When you see a fire ___ the fire alarm to alert others.
- Stay ___ and alert if taken hostage.
23 Clues: Don't be a ___. • Always take threats___. • ___ you have been robbed. • Stay ___ and alert if taken hostage. • Ask witnesses to fill out an ___ ___. • A ___ ___ is located under each phone. • As a last resort ____ to save yourself. • Primary meeting point is at the ___ dot. • ____ if there is an accessible escape path. • ___ 911 to report incident only if it is safe. • ...
CIS178 Participation3-Security Crossword 2023-04-20
Across
- Deliberate theft of sensitive data
- Hacker successfully exploits network/device
- Hidden secuity bypass in code
- Waknesses in software hackers exploit
- Challenge-response test verifying humanity
- Temporary, first-party, third-party
- Capture data submitted over network
- Website names into machine addresses
- Confirming a user's identity
- Software installed without user consent
Down
- Holds files hostage for money
- Audio/video changed for credibility
- Personal devices used for work
- Malicious computers controlled remotely
- Public, private, static, dynamic
- Commonplace items connected to internet
- Shield user againse harmful spyware
- Fraudulent messages for personal gain
- Adventatious malicious code attacking vulnerabilities
- Monitors and filters network traffic
20 Clues: Confirming a user's identity • Holds files hostage for money • Hidden secuity bypass in code • Personal devices used for work • Public, private, static, dynamic • Deliberate theft of sensitive data • Audio/video changed for credibility • Shield user againse harmful spyware • Temporary, first-party, third-party • Capture data submitted over network • ...
May 2023 Security Training 2023-04-24
Across
- Security device
- One type of robbery
- File this if a customer deposits more than $10,000 in cash
- The sign you look for before entering the branch
- This must be filed by AML if a customer pays for a cashier's check with $4,000 in cash
- Two people, two sets of eyes
- Must have on your person at all times
- Number one deterrent of robberies
- We check for this on the ATM when sweeping in the mornings
Down
- Every desk and teller unit are equipped with this
- Where do you find the bomb threat checklist
- What do you call if the all clear sign is still up
- Where would you log our internal auditors when they arrive at your branch
- Name of the report that you can file if you are suspicious of customer activity
- Dual control area
- Send email with sensitive information
- One example of sensitive information
- Name the binder you take with you in case of emergency
- One way to send a silent alarm to the police
- Placed in a secure bin at the end of the day
20 Clues: Security device • Dual control area • One type of robbery • Two people, two sets of eyes • Number one deterrent of robberies • One example of sensitive information • Send email with sensitive information • Must have on your person at all times • Where do you find the bomb threat checklist • One way to send a silent alarm to the police • ...
Ehre 2020-02-18
Kreuzworträtsel 2022-05-02
6 Clues: häufige Angriffsart • Bloßstellen im Internet • KOmplexe und sichere... • Schutz vor Cyberkriminalität • Täter gibt sich als geschäftsführerIn aus • Kann dir dabei helfen Fotos aus dem Internet zu löschen
POG FSP Crossword 2012-12-10
Across
- Days a DOS is valid at MARSEC III
- A breach is to elude, evade and ___ security
- A person must have ___ to enter the port
- Side by side monitoring
- Sceening percent at MARSEC III
- Minimum offcers at a gate for MARSEC II
- Screening percent at MARSEC II
Down
- Survey to determine risk, threat, vulnerability
- James Whitehead is currently the
- We are a MTSA _____ facilty
- Simplest form of security
- Days a DOS is valid at MARSEC II
- Years the FSP is valid
13 Clues: Years the FSP is valid • Side by side monitoring • Simplest form of security • We are a MTSA _____ facilty • Sceening percent at MARSEC III • Screening percent at MARSEC II • James Whitehead is currently the • Days a DOS is valid at MARSEC II • Days a DOS is valid at MARSEC III • Minimum offcers at a gate for MARSEC II • A person must have ___ to enter the port • ...
SCWK 202 Crossword 2021-10-07
Across
- One of the two social movements. Includes the Social Security Act, Unemployment Insurance, etc.
- The use of one benefit automatically entitles you to another.
- Hint: (_ITC) -- Offers a tax refund to supplement the wages of low-income workers.
- _ _ _ _ _ _ _ _ _ disentitlements prevents duplication of services.
- Formally Aid to Families with Dependent Children (AFDC)
- Individual Development Accounts hinges on this form of philosophy
- One of the three viewpoints which discuss "worthy" and "unworthy" poor.
- Hint: Social _ _ _ _ _ _ -- One of the social change triggers, helped trigger the Social Security Act in 1935.
- Hint: _ _ _ _ _ _ _ _ _ _ _ _ security income --Federal means-tested income support for the aged, blind, and disabled.
Down
- Hint: Unemployment _ _ _ _ _ _ _ _ _ -- An income support program that has a hybrid structure, which includes state and federal financing.
- Hint: Worker’s _ _ _ _ _ _ _ _ _ _ _ _ -- Provides cash and medical benefits to injured workers on jobs.
- Topic of study for class the last three weeks.
- Hint: Basic Income _ _ _ _ _ -- Idea that guarantees a universal income.
- One of the three viewpoints that discusses the "soundness" of political US institutions.
- Hint: 1601 _ _ _ _ _ _ _ _ _ _ _ Poor Laws -- Origins of general assistance.
- Largest retirement program, includes old-age pension and disability insurance.
- _ _ _ _ _ _ _ _ _ _ entitlement authorizes people to get money from various different sources.
17 Clues: Topic of study for class the last three weeks. • Formally Aid to Families with Dependent Children (AFDC) • The use of one benefit automatically entitles you to another. • Individual Development Accounts hinges on this form of philosophy • _ _ _ _ _ _ _ _ _ disentitlements prevents duplication of services. • ...
donnabarata@gmail.com 2024-03-20
Across
- _______ act strengthens HIPAA by having more rules and stricter penalties in privacy and security laws to assure compliance in keeping client's PHI safe and secure.
- ePrescribing helps pharmacy staff spend ________ time confirming new prescriptions and refill requests.
- ePriscribing helps pharmacy staff alert physicians about possible ________ drug reactions.
- technical safeguards of HIPAA's _________ Rule are technology, policies and procedures that protect & control access to ePHI.
- _____________ facility group provides care such as emergency care, outpatient surgery and hospital stays.
- PHI is any health information regarding treatment which contains information that can reasonably __________ the client.
- De-identification of medical records is the __________ of all identifying information.
- Is a client's height considered PHI?
- a client's _________ is considered PHI.
Down
- The HITECH Act outlines the development and _______________ of Electronic Health Records in the healthcare field.
- One way HIT affects healthcare providers is by allowing them better ________ over who has access to client information.
- stands for Health Insurance Portability and Accountability Act.
- HIPAA's Security Rule applies specifically to __________.
- ______stands for Electronic Health Record
- PHR is health and medical information maintained by the ________.
- An EHR system is used to create a ________ digital health record for each client.
- There are ____ levels of fault for a HIPAA violation.
17 Clues: Is a client's height considered PHI? • a client's _________ is considered PHI. • ______stands for Electronic Health Record • There are ____ levels of fault for a HIPAA violation. • HIPAA's Security Rule applies specifically to __________. • stands for Health Insurance Portability and Accountability Act. • ...
test 2023-09-12
18 Clues: EHS • APIs@ • Latin@ • Black@ • Women@ • Pride@ • Native@ • Security • Open Arts • IT Support • Facilities • Disability@ • Ship Happens • Transportation • Fitness Center • Events & Amenities • SEA + BEL Site Team • AV Technical Production
November 2024-10-18
Across
- Katy Perry's number-one hit song
- We light ..... on Guy Fawkes Night
- Black.....
- International ...... Day is Celebrated on 19th November
Down
- is an American holiday celebrated on the last Thursday of November
- ...... Monday
- The flower that reminds us of who we have lost during WW1&WW2
- How many days in November?
- The day after Halloween and also a famous Girlband in 90's
9 Clues: Black..... • ...... Monday • How many days in November? • Katy Perry's number-one hit song • We light ..... on Guy Fawkes Night • International ...... Day is Celebrated on 19th November • The day after Halloween and also a famous Girlband in 90's • The flower that reminds us of who we have lost during WW1&WW2 • ...
German Crossword 2020-11-09
20 Clues: home • role • bond • woman • source • security • ownership • love match • confidence • traditional • to belong to • illegitamate • single parent • foster family • living together • adoptive family • patchwork family • surrogate family • to be descended from • between generation family
German Crossword 2020-11-09
20 Clues: home • role • bond • woman • source • security • ownership • love match • confidence • traditional • to belong to • illegitamate • single parent • foster family • living together • adoptive family • patchwork family • surrogate family • to be descended from • between generation family
Refugee 2022-11-11
25 Clues: RCHNU • sudoxe • sisirc • epacse • enimaf • sserts • redrob • eegufer • eeucave • yrtnuoc • retlehs • ytiruces • decalpsid • ytilitsoh • yrautcnas • noitargim • enitnarauq • seitlausac • noitatroped • noitucesrep • noitargimmi • ssensselemoh • noitairtaper • rekees-mulysa • tnemtaert-lli
Birds & bees 2024-05-20
27 Clues: Bin • Poesi • Rosor • Lilja • Skola • Humlor • Skydda • Fåglar • Normer • Krokus • Blommor • Känslor • Hygglig • Intryck • Maskros • Respekt • Beteende • Lämpligt • Solrosor • Säkerhet • Blåklocka • Samarbete • Utbildning • Emotionell • Relationer • Inställning • Värderingar
Vocabulary man 2024-02-27
25 Clues: trip • agent • pilot • scale • police • runway • flight • customs • luggage • airport • employee • co pilot • passport • security • airplane • suitcase • vacation • passenger • escalator • stewardess • destination • flight crew • immigration • economic class • overhead storage
Ενότητα: Σπίτια 2025-10-07
26 Clues: soil • stay • cost • clay • wood • area • race • build • floor • house • brick • column • ground • comfort • heating • building • material • resident • architect • apartment • endurance • earthquake • civilization • ideal, perfect • safety, security • apartment building
PEOPLE AND COMMUNITY 2025-10-31
25 Clues: тиск • щастя • страх • зрада • любов • повага • образа • довіра • комфорт • ревнощі • безпека • чесність • контроль • вірність • рівність • цькування • підтримка • заохочення • насильство • жадібність • спілкування • маніпуляція • незалежність • егоїзм (власна вигода) • відчуття справжнього себе
Are you clever? 2019-10-01
19 Clues: Idiot • erraten • Polizei • Million • Erdbeben • Sicherheit • Dinosaurier • schlau, klug • insbesondere • als Nächstes • Dose, Büchse • treten, schießen • glücklicherweise • beginnen, anfangen • schließen, zumachen • Katastrophe, Unglück • Treppe, Treppenstufen • rufen, anrufen, nennen • halten, behalten, aufbewahren
1st Quarter 2022 2021-12-06
Across
- , Organization Agent Xu worked for.
- , What substance is illegal under Federal Law that is legal in some states?
- , The first name of the spy for China that stole secrets from General Electric.
- , Where was Oleg's first assignment?
- , A jury convicted Robert Hoffman in 2013 and sentenced him to?
- , Under the UCMJ article 112A, marijuana along with derived products are Schedule ___ drug.
- , What are the most common security violations with IT systems referred to?
- , ICD 705 states that Personally Owned Portable Electronic Devices are _______ within SCIFs overseas.
- , The term generically used to describe the use of a covert agent to create a romantic relationship to compromise a person.
- , What is the difference between walking to the pub and walking home from the pub?
Down
- , Oleg _____ was a double agent for MI6.
- , Where was agent Xu apprehended?
- , Robert Hoffman was a 20 year veteran of?
- , Who is appointed to investigate security violations to determine the facts of the incident?
- , What does the acronym NTK stand for?
- , What location did Hoffman visit that caused concern for the FBI?
- , Robert Hoffman believed he was communicating with a Russian Spy named?
- , What was the purpose of 'Operation Pimlico'?
- , Security Violations are ______ of classified information.
- , CBD or THC can be found in dietary supplements, food, and ________.
- , In regards to drug use or derivative use not knowing is not an _____.
21 Clues: , Where was agent Xu apprehended? • , Organization Agent Xu worked for. • , Where was Oleg's first assignment? • , What does the acronym NTK stand for? • , Oleg _____ was a double agent for MI6. • , Robert Hoffman was a 20 year veteran of? • , What was the purpose of 'Operation Pimlico'? • , Security Violations are ______ of classified information. • ...
Unite Nations 2025-04-07
Across
- The official language of the UN that is also widely spoken in Africa.
- This country is the most recent member to join the United Nations (as of 2021)
- The city where the UN headquarters are located
- The economic and social council chamber also called Ecosoc is a gift from .....
- Decisions of the General Assembly on important questions shall be made by a ........ majority of the members present and voting.
- This is the highest position in the UN.
- The country that is a permanent member of the Security Council and has veto power.
- The last territory under the Trusteeship Council before gaining independence in 1994
- the name 'United Nations' was coined by.....
- The number of non-permanent members in the UN Security Council (in letters).
- This is the principal organ responsible for the maintenance of international peace and security
Down
- UN is an ........ organization.
- the term 'United Nations' created ......... the WWII
- The UN agency focused on public health (abbreviation)
- This UN body oversees the implementation of international law and the legal work of the UN.
- The number of official languages in the United Nations (in letters)
- The UN organ where each member state has one vote
- The country that was the first to sign the UN Charter
- The UN agency that promotes education, science, and culture (abbreviation)
- How many Vice-President of GA (in letters)
20 Clues: UN is an ........ organization. • This is the highest position in the UN. • How many Vice-President of GA (in letters) • the name 'United Nations' was coined by..... • The city where the UN headquarters are located • The UN organ where each member state has one vote • the term 'United Nations' created ......... the WWII • ...
War on Terror 2022-06-03
Across
- Mayor of NYC
- Washington target
- Name given to WTC site
- Site of jet recaptured by passengers and crashed
- Site of terrorist training camps
- Collapsed first
- Designation of plane crashed in PA
- Blamed but did not have role in attacks
- Plane hit first
Down
- Last remarks of passenger who helped reclaim PA plane
- VP who spoke for administration as the President was returned to Washington
- Home to most of the hijackers
- Was reading a book to children
- Legislative response to attack allowing greater surveillance of people in US
- Departure point for two of the crashed jets
- Cancelled after second crash
- Leader of Al Quaeda
- Site of previous al Quada attack on US forces
- Security New agency responsible for coordinating surveillance and security in US
- Told President of crash
20 Clues: Mayor of NYC • Collapsed first • Plane hit first • Washington target • Leader of Al Quaeda • Name given to WTC site • Told President of crash • Cancelled after second crash • Home to most of the hijackers • Was reading a book to children • Site of terrorist training camps • Designation of plane crashed in PA • Blamed but did not have role in attacks • ...
The New Deal 2024-05-11
Across
- United States Housing Authority built public housing
- Public Works of Art Project employed artists
- Federal Emergency Relief Administration provided direct relief
- Civil Works Administration created temporary jobs
- Agricultural Adjustment Act helped farmers
- Securities and Exchange Commission regulated stock market
- National Youth Administration aided students and young people
- National Industrial Recovery Act passed
- Federal Housing Administration insured mortgages
- Federal Deposit Insurance Corporation established
Down
- Tennessee Valley Authority built dams and power plants
- Social Security Act provided retirement benefits
- Works Progress Administration created jobs
- Farm Security Administration assisted rural poor
- Rural Electrification Administration brought power to farms
- Fair Labor Standards Act set minimum wage and maximum hours
- Civilian Conservation Corps employed young men
- National Labor Relations Act protected unions
- National Recovery Administration regulated industries
- Home Owners' Loan Corporation refinanced mortgages
20 Clues: National Industrial Recovery Act passed • Works Progress Administration created jobs • Agricultural Adjustment Act helped farmers • Public Works of Art Project employed artists • National Labor Relations Act protected unions • Civilian Conservation Corps employed young men • Social Security Act provided retirement benefits • ...
Cybersecurity Awareness Month 2024-09-16
Across
- Function that converts data into a fixed size
- Measures taken to protect data
- Impersonating someone or something to deceive
- Securing data by converting it into code
- Software that records keystrokes
- Software that shows unwanted ads
- Malware that encrypts files demanding ransom
- Attack using trial and error to guess passwords)
- Investment scam involving fake accounts
- Vulnerabilities exploited before being patched
- Fraudulent attempts to steal sensitive information)
Down
- Malicious software designed to damage systems
- Hidden way of bypassing security controls
- Virtual Private Network for secure connections
- Software that collects data secretly
- Online harassment or bullying
- Multi-Factor Authentication
- Self-replicating malware that spreads across networks)
- Image, video or audio generated by AI
- A system that protects networks
- Network of compromised computers under attacker control)
- Software update to fix security vulnerabilities
22 Clues: Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Image, video or audio generated by AI • Investment scam involving fake accounts • Securing data by converting it into code • ...
BY THE NUMBERS 2025-07-28
Across
- Obama's number, loudly?
- Digits binding a book
- Many eggs — or guesses
- FINISH Finale worth counting down?
- Stationary number that rings back?
- SIZE Feet get numbered here
- Tiny unit making call?
- Cash count for drip?
- Proof numbers add up?
- PRICE Shocking tag figure?
- Twenty or tally?
- Numbered ticket abroad?
- Coverage with numbers attached?
- Typing speed indicator?
Down
- Count on these fingers?
- COUNT Total number of dead?
- Up to them? Stylish!
- One up? Take off!
- One card to win?
- Where country charts rise?
- Earned or rotated numbers?
- Number with moves?
- Sixteen-point code format?
- Numbered right to operate?
- SECURITY Public safety number?
- Numbered top or state?
- PIECE Matched pair worn out?
- Number to follow up?
- Four-digit security key
- 2025, in Rome’s eyes?
30 Clues: One card to win? • Twenty or tally? • One up? Take off! • Number with moves? • Up to them? Stylish! • Cash count for drip? • Number to follow up? • Digits binding a book • Proof numbers add up? • 2025, in Rome’s eyes? • Many eggs — or guesses • Tiny unit making call? • Numbered top or state? • Count on these fingers? • Obama's number, loudly? • Numbered ticket abroad? • Four-digit security key • ...
IT 2025-09-11
Across
- a type of virus
- storage on the internet you can accsess from everywhere
- a security barrier that save your PC
- a type of storage in your PC
- a small computer in your pocket
- a error in a software
- a faster storage in the computer
- a software update that fixes bugs
- calculate almost everything in the computer
- you see on it what you doing on your computer
- give electiricy for the computer
Down
- a temporary astorage for faster data access
- a robot that act like humans
- you get WiFi from it
- you can write on your comuter with it
- the delay of data transfer
- a protocol for secure remote access
- a sercet word or a code for security
- a copy of a data for safety
- the short version of the graphics card
20 Clues: a type of virus • you get WiFi from it • a error in a software • the delay of data transfer • a copy of a data for safety • a robot that act like humans • a type of storage in your PC • a small computer in your pocket • a faster storage in the computer • give electiricy for the computer • a software update that fixes bugs • a protocol for secure remote access • ...
Complexity Cross V3 2024-08-25
Across
- What Optic has on his forehead
- The artifact that turned Blackwell into Obscurant
- One of Cove's hobbies
- _____ 2, the planet where the story takes place
- Fletcher has two cameras, a regular and a
- When Cyber was injured, he was forced to replace his waist, arm, and
- Commonly known as "Poof Pods"
Down
- Sage's age when he left Misty Forest Island
- The Life _____, the object that gives Sage his powers
- The Optic's top assassin
- The first name of the man who betrayed Stratus
11 Clues: One of Cove's hobbies • The Optic's top assassin • Commonly known as "Poof Pods" • What Optic has on his forehead • Fletcher has two cameras, a regular and a • Sage's age when he left Misty Forest Island • The first name of the man who betrayed Stratus • _____ 2, the planet where the story takes place • The artifact that turned Blackwell into Obscurant • ...
Bullying Crossword 2023-02-28
Across
- the act of treating another person abusively
- using words to promote violence on somebody
- a person who is habitually cruel and threatening
- this type of bullying is online
- facebook, instagram,twitter are all examples
Down
- this type of bullying involves hurting them physically
- a person who tries to stop the bullying
- these are lies that are spread
- the person who is getting bullied
- this can be low on people who are bullied
- people who are bullied can feel this
11 Clues: these are lies that are spread • this type of bullying is online • the person who is getting bullied • people who are bullied can feel this • a person who tries to stop the bullying • this can be low on people who are bullied • using words to promote violence on somebody • the act of treating another person abusively • facebook, instagram,twitter are all examples • ...
TTS MEDIA DIGITAL QUINSHA 2025-03-14
Across
- sesuatu yang berhubungan dengan sistem komputer dan informasi
- sesuatu yg dilindungi
- pengambilan karangan org lain
- informasi pribadi
Down
- tiktok merupakan aplikasi
- informasi yang tersedia melalui media atau produk elektronik
- tindakan ilegal yang dilakukan melalui internet dan komputer
- seperangkat aturan yang harus diikuti saat membuat dan mengelola konten, baik di media sosial maupun di tempat umum.
- perangkat lunak atau aplikasi yang memungkinkan berbagai layanan dan aplikasi online untuk saling terhubung.
- sekelompok orang yang hadir atau mendengarkan suatu acara, pidato, atau presentasi
- berita yg tidak benar
11 Clues: informasi pribadi • sesuatu yg dilindungi • berita yg tidak benar • tiktok merupakan aplikasi • pengambilan karangan org lain • informasi yang tersedia melalui media atau produk elektronik • tindakan ilegal yang dilakukan melalui internet dan komputer • sesuatu yang berhubungan dengan sistem komputer dan informasi • ...
SEDSEWWE 2023-11-10
Across
- - Eine positive göttliche Gabe, oft zu besonderen Anlässen gewünscht
- - Die festlichen Feierlichkeiten zu besonderen Anlässen
- - Eines der Rentiere des Weihnachtsmanns
- - Ein festliches Geflügelgericht, oft zu Weihnachten gegessen
- - Helle und warme Strahlen vom Himmel
Down
- - Das Geben und Empfangen von Geschenken, oft in der Familie
- - Ein aromatisches Kraut, oft in Süßigkeiten und Getränken verwendet
- - Ein immergrüner Baum, oft als Weihnachtsbaum verwendet
- - Ein besonderer Tag, oft arbeits
- - Eine angenehme und entspannte Atmosphäre, besonders zu festlichen Zeiten
- Montag - Der Montag nach Thanksgiving, bekannt für Online-Shopping-Angebote
11 Clues: - Ein besonderer Tag, oft arbeits • - Helle und warme Strahlen vom Himmel • - Eines der Rentiere des Weihnachtsmanns • - Die festlichen Feierlichkeiten zu besonderen Anlässen • - Ein immergrüner Baum, oft als Weihnachtsbaum verwendet • - Das Geben und Empfangen von Geschenken, oft in der Familie • - Ein festliches Geflügelgericht, oft zu Weihnachten gegessen • ...
Crossword Gleitzbe 2020-03-02
24 Clues: Klima • Umwelt • Ödland • Flamme • Prärie • Ursache • Schritt • staubig • neutral • glänzend • emotional • verbrannt • sprechend • Lagerfeuer • Brühmtheit • Entdeckung • Sicherheit • vergleichen • Feuerwehrmann • Motor, Maschine • Stille, Schweigen • Dürre, Trockenheit • Reservat, Reservation • mächtig, kräftig, stark
Do you know the words? 2021-01-08
27 Clues: Dach • Akku • Raum • lösen • Waren • Daten • Drohne • Reifen • Roboter • Netzwerk • Sitzplatz • Reparatur • befördern • verbessern • aufsperren • Sicherheit • Kopfkissen • verhindern • verringern • Freiwillige • Behinderung • kompliziert • Privatsphäre • Lautsprecher • nachverfolgen • Haushaltsgeräte • Windschutzscheibe
Vizzard Challenge 2016-12-19
gkhvvvlxxv 2021-10-14
20 Clues: hurry • close • alone • cream • saving • safety • chicken • carfuel • just us • quizzes • straight • children • car place • come over • sunny city • long but more • staying alive • ball hit target • all of the things • youtube reaction vid
unit 2 lesson 4 Sam 2023-12-06
20 Clues: pot • bom • echt • leger • boete • kogels • burger • geweer • gevecht • vrijheid • monument • marinier • geschikt • beveiliger • zenuwachtig • verpleegkundige • plicht(millitaire dienst} • tegen overgesteld van onveilig • je hebt brandweer ambulance en ..... • je kan er mee vliegen (geen vliegtuig)
Scene 3 Society 2024-10-08
23 Clues: verot • oikeus • talous • yhteisö • köyhyys • koulutus • tasa-arvo • tasavalta • demokratia • pakolainen • kansalainen • hyvinvointi • yhteiskunta • viranomaiset • epätasa-arvo • velvollisuus • sosiaaliturva • maahanmuuttaja • maastamuuttaja • etninen tausta • terveydenhuolto • yhteiskuntaoppi • turvapaikanhakija
Travel Chap 4 vocab 2020-04-02
Across
- controller
- safety belt
- flight attendent
- to miss
- passenger
- trip; travel
- seat
- customs
- visa
- event ticket
- sleeping car
- to get/obtain
- arrival
- to land
- bunk
- aisle
- international airport
- to hope
- waiting room
- flight
- to give
- to see
- second class
- security agent
- on time
Down
- passport
- gate
- coach
- boarding pass
- platform
- luggage screening
- carry-on baggage
- in the airport
- connection
- baggage claim
- ticket window
- to go through security
- departure
- delayed
- window
- to take off
- car wagon
- first class
- suitcase
- counter
- to board
- to check luggage
- to go straight
- in the train station
- stop
- ticket
- delayed
- ticket
- to turn
54 Clues: gate • seat • visa • bunk • stop • coach • aisle • window • flight • ticket • to see • ticket • to miss • customs • delayed • arrival • to land • counter • to hope • to give • delayed • to turn • on time • passport • platform • suitcase • to board • passenger • departure • car wagon • controller • connection • safety belt • to take off • first class • trip; travel • event ticket • sleeping car • waiting room • second class • boarding pass • baggage claim • ticket window • ...
aviation 2024-07-01
Across
- where you go to change your money.
- where you get on the plane, or where the plane is sitting.
- where you go when you are flying somewhere.
- something 2 airlines do.
- flight thats destination is within the same country.
- to reduce lift and increase drag.
- abbreviation for passengers.
- flight coming into our country.
- abbreviation for on time performance.
Down
- main body of the plane.
- a crash or collision on the runway.
- helps turn the plane.
- flight leaving our country.
- illegal things like drugs.
- after youve gone through security you are here.
- where general public can be in an airport.
- pockets of disturbed air.
- where you and your carry on luggage get checked.
- where you go when you first get to the airport.
- abbreviation for senior flight attendant.
20 Clues: helps turn the plane. • main body of the plane. • something 2 airlines do. • pockets of disturbed air. • illegal things like drugs. • flight leaving our country. • abbreviation for passengers. • flight coming into our country. • to reduce lift and increase drag. • where you go to change your money. • a crash or collision on the runway. • abbreviation for on time performance. • ...
Wellbeing 2021-08-22
Across
- Areas of or occupying different spaces
- Being free from danger or threats
- The people who live in a certain place
- The study of human populations
- The ability to be maintained at a certain level
- Living without access to basic needs and income
- Death
- The process of using resources
- The facilities needed for a society to function
- Something that shows the state of wellbeing
- A subjective measurement of perceived value
Down
- An objective measurement of numerical value
- An individual’s level of health, security and comfort
- A prediction about how things will occur
- Levels of wealth and social interactions
- The ability to reproduce
- The patterns in which things are spread out in an area
- A process of growth or advancement
- Clean water and waste removal systems
- A comparison of different rates of an occurrence
20 Clues: Death • The ability to reproduce • The study of human populations • The process of using resources • Being free from danger or threats • A process of growth or advancement • Clean water and waste removal systems • Areas of or occupying different spaces • The people who live in a certain place • A prediction about how things will occur • Levels of wealth and social interactions • ...
Thirteen Days 2023-01-22
Across
- United States Junior senetor from New York
- country with communist government
- meeting room for the cabinet secretaries
- an unsuccesful invasion of Cuban exiles
- United States's prime federal law enforcement agency
- was Main security agency for the soviet union
- state of political tension between US and soviet
- Intergovernmental organization to stop wars
- Cuban prime minister from 1959 1976
Down
- 35th President of the United States
- High-altitude reconnassiance aircraft
- Country between Canada and Mexico
- John F. Kennedy confrence room in basement
- five progressive levels of alerts used by the US
- Organisation of the US used for global monitoring
- gathers and analyzes national security information
- Soviet politician during the cold war
- closing off a place by hostile
- Country by the gulf of Mexico and the Atlantic ocean
- Most commonly refers to the Soviet Union
20 Clues: closing off a place by hostile • Country between Canada and Mexico • country with communist government • 35th President of the United States • Cuban prime minister from 1959 1976 • High-altitude reconnassiance aircraft • Soviet politician during the cold war • an unsuccesful invasion of Cuban exiles • meeting room for the cabinet secretaries • ...
cw-13 2025-11-17
Across
- (Duplicate) Tracking origin and consequence of breaches
- Unfair AI outcomes affecting certain groups disproportionately
- Passing along a risk/job to someone else
- Ethical hacking test of defenses
- Summarized results or status document
- Defensive security professionals
- Technical drawing illustrating data processing pathways
- Host-based Intrusion Detection System acronym
- (Triplicate) Standard plan to survive IT disasters
- Unlocking secret messages with the right key
- Industry-recognized certification from IAPP .
- Platform used at Tekion for employee compliance and workplace training.
Down
- Critical security gate in Tekion’s development lifecycle.
- Keeping information secret
- What to do to fix trouble spots
- Company’s process for oversight and control
- Process of grouping personal data into collective insights while masking individual identities
- (Duplicate) Collected facts for incident investigation
- Importance level assigned to system resources
- Payments solution developed and secured by Tekion.
20 Clues: Keeping information secret • What to do to fix trouble spots • Ethical hacking test of defenses • Defensive security professionals • Summarized results or status document • Passing along a risk/job to someone else • Company’s process for oversight and control • Unlocking secret messages with the right key • Host-based Intrusion Detection System acronym • ...
digitales Arbeiten - digitales Leben 2019-07-04
Across
- Was betreiben Geräte, sowie Softwaremodule untereinander?
- Muss bei der Umsetzung von Digitalisierung besonders berücksichtigt werden.
- Grund, aus dem sich Menschen weniger face-to-face unterhalten?
- Andres Wort für Flexibilität.
- Größte infrastrukturelle Gefahr?
- Wir bei digitalem Lernen nicht mehr benötigt.
- Was ist die größte Gefahr bei einer staatlichen App?
- Entscheidet wer Schuld an einem Unfall bei autonomen Fahren trägt.
Down
- Gerät mit den Fahrzeugreparatur dokumentiert wird.
- Folge von Konkurrenz und großen Arbeitsmarkt.
- Wirtschaftliche Notwendigkeit die Digitalisierung voranzutreiben.
- Spezielle Kommunikationsinfrastruktur für Fahrzeug-zu-Fahrzeug-Kommunikation.
- Ein Medium für digitale Kommunikation.
- In einer transparenten Gesellschaft kaum vorhanden.
- Mobiles Programm für den Nutzer.
- Wer meldet zukünftig ein Fahrzeug zur Inspektion an?
16 Clues: Andres Wort für Flexibilität. • Größte infrastrukturelle Gefahr? • Mobiles Programm für den Nutzer. • Ein Medium für digitale Kommunikation. • Folge von Konkurrenz und großen Arbeitsmarkt. • Wir bei digitalem Lernen nicht mehr benötigt. • Gerät mit den Fahrzeugreparatur dokumentiert wird. • In einer transparenten Gesellschaft kaum vorhanden. • ...
Financial advice 2025-03-25
Across
- personal pre tax max contribution is 7000
- traditional IRA contributes are made
- THREE maximum age to start IRA
- a item of value held up by belief with no physical commodity
- at what age can you invest in crypto
- currency backed by the government but not tied to physical commodity.
- a tax you pay towards the government thats used for retirement.
- what category does crypto fall under
- before investing in crypto only invest what your willing to… employer manages pensions
- measures the price performance of a basket of securities
- a digital ledger of transactions that duplicates and distrbutes across a network.
- the availability of cash or the ease in which a asset can convert to cash
Down
- the total value of a companies stock
- you can collect full benefits for social security
- what president created social security
- warren buffets first rule
- a total amount set aside and dedicated for a specific purpose.
- is when equal portions are invested at a market in intervals
- Roth IRA contributed are made
- if you leave your company you can
- what percentage of 18-29 invest in crypto
- The biggest fraud in U.S history was ..scandal
- Managed by employer contributions are made by you and the state.
- Crypto is a risk investment.
- social security and medicare together is called
- investing all you have into the market at once
26 Clues: warren buffets first rule • Crypto is a risk investment. • Roth IRA contributed are made • THREE maximum age to start IRA • if you leave your company you can • the total value of a companies stock • traditional IRA contributes are made • at what age can you invest in crypto • what category does crypto fall under • what president created social security • ...
Investing Patrick McVeigh 2025-03-25
Across
- personal pre tax max contribution is 7000
- traditional IRA contributes are made
- THREE maximum age to start IRA
- a item of value held up by belief with no physical commodity
- at what age can you invest in crypto
- currency backed by the government but not tied to physical commodity.
- a tax you pay towards the government thats used for retirement.
- what category does crypto fall under
- before investing in crypto only invest what your willing to… employer manages pensions
- measures the price performance of a basket of securities
- a digital ledger of transactions that duplicates and distrbutes across a network.
- the availability of cash or the ease in which a asset can convert to cash
Down
- the total value of a companies stock
- you can collect full benefits for social security
- what president created social security
- warren buffets first rule
- a total amount set aside and dedicated for a specific purpose.
- is when equal portions are invested at a market in intervals
- Roth IRA contributed are made
- if you leave your company you can
- what percentage of 18-29 invest in crypto
- The biggest fraud in U.S history was ..scandal
- Managed by employer contributions are made by you and the state.
- Crypto is a risk investment.
- social security and medicare together is called
- investing all you have into the market at once
26 Clues: warren buffets first rule • Crypto is a risk investment. • Roth IRA contributed are made • THREE maximum age to start IRA • if you leave your company you can • the total value of a companies stock • traditional IRA contributes are made • at what age can you invest in crypto • what category does crypto fall under • what president created social security • ...
Investing 2025-03-25
Across
- Is Crypto a high or low-risk investment?
- Currencies that are created and backed by government, but not tied to or backed by the value of any physical commodity
- CEO of Berkshire Hathaway
- Warren Buffet’s first rule is to never ___ money.
- How many days do you have to rollover your 401k funds?
- A sum of money made available for a particular purpose
- For education expenses
- A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.
- Nationally or Internationally recognized, Well Established & Financially Sound Company
- Market Capitalization is the total ___ of a company’s stock.
- A Lump Sum is better for ___ Risk Tolerance Investors
- Roth IRA contributions are made ___ tax.
Down
- A fund saved for unexpected expenses.
- For planned expenses like a new car or vacation
- For unexpected events, such as a tornado
- A mutual fund takes cash from ___ and invests in stocks, bonds, and other securities.
- Age to receive full social security benefits
- Traditional IRA contributions are made ___ tax.
- Make money with stocks by Buying ___ and selling ___
- Which President created Social Security?
- A Blue Chip Company is an example of a liquid or illiquid stock?
- Markets rising
- Social Security and Medicare taxes
- Markets falling
- A collection of stocks, bonds, or other assets that trades on a stock exchange
25 Clues: Markets rising • Markets falling • For education expenses • CEO of Berkshire Hathaway • Social Security and Medicare taxes • A fund saved for unexpected expenses. • Is Crypto a high or low-risk investment? • For unexpected events, such as a tornado • Which President created Social Security? • Roth IRA contributions are made ___ tax. • ...
1.8 Summarize evolving use cases for modern network environments 2025-08-06
Across
- Allows one place to manage network rules and settings
- Wraps IPv6 traffic so it can travel over an IPv4 network
- Auto configures new devices without manual setup
- Gives users only the access they absolutely need
- Uses code to provision and manage IT infrastructure
- Lets devs work on separate features without conflict
- Tracks changes made to code and allows rollbacks
- Used for Layer 2 over Layer 3 tunneling in data centers
- Extends SDN to wide area networks for better performance
- Enforces access based on set conditions and user roles
- Separates control and data planes to simplify network management
Down
- Central place where code is stored and managed
- Adjusts network behavior based on type of traffic or app
- Designed to replace IPv4 and fix address exhaustion
- Grants permission to access network resources
- Can use any type of network link like LTE, broadband, or MPLS
- Used in automation tools like Ansible for repeatable tasks
- Runs IPv4 and IPv6 on the same system side by side
- Network security model with no implicit trust
- Connects two or more data center locations
- Subset of SASE focused purely on security services
- Happens when config changes outside the defined code
- Dynamic list of systems automatically updated for automation
- Framework that combines networking and security in the cloud
- Allows IPv6-only devices to communicate with IPv4 hosts
25 Clues: Connects two or more data center locations • Grants permission to access network resources • Network security model with no implicit trust • Central place where code is stored and managed • Auto configures new devices without manual setup • Gives users only the access they absolutely need • Tracks changes made to code and allows rollbacks • ...
When will the nations proclaim ‘peace and security’? 2025-11-24
Across
- Inspired foretelling of events, such as Paul’s words to the Thessalonians
- The state of readiness needed to avoid being overtaken like a thief
- The apostle who wrote about “peace and security” to the Thessalonians
- The illustration Paul used to describe how destruction overtakes the unsuspecting
- The congregation that received Paul’s inspired letter about sudden destruction
- Modern organization symbolized by the scarlet-colored wild beast (two words)
- The attitude Jesus counseled his followers to maintain
- The second half of the proclamation that signals sudden destruction
- Found in Babylon the Great, symbolizing her guilt for wars and violence
- The world empire of false religion, also called the great prostitute
- The manner in which destruction will come upon the nations
Down
- The great time of distress that begins with the fall of Babylon the Great
- The first half of the proclamation mentioned by Paul in 1 Thessalonians 5:3
- The one who puts "his thought" into the hearts of the nations
- What comes instantly after the cry of “peace and security”
- Symbolic political powers that give authority to the wild beast
- The state of prophecy once events have actually taken place
- The global system opposed to true worship, destined for destruction
- The scarlet-colored entity representing the United Nations (two words)
- What describes the kind of religion that will be destroyed
20 Clues: The attitude Jesus counseled his followers to maintain • What comes instantly after the cry of “peace and security” • What describes the kind of religion that will be destroyed • The manner in which destruction will come upon the nations • The state of prophecy once events have actually taken place • The one who puts "his thought" into the hearts of the nations • ...
Cursinho crossword 2024-04-29
Across
- The act of including everyone and making them feel welcome.
- Consequences or outcomes of bullying behavior.
- Bullying involving physical force or harm.
- Measures or policies aimed at preventing bullying.
- Understanding and sharing the feelings of others.
Down
- Repeated aggressive behavior intended to harm others.
- Treating others with consideration and admiration.
- Bullying involving manipulation of social relationships.
- Bullying that occurs online or through digital communication.
- Measures taken to stop bullying before it occurs.
- A group of people sharing common interests or living in the same area.
- Bullying using words to harm others.
12 Clues: Bullying using words to harm others. • Bullying involving physical force or harm. • Consequences or outcomes of bullying behavior. • Measures taken to stop bullying before it occurs. • Understanding and sharing the feelings of others. • Treating others with consideration and admiration. • Measures or policies aimed at preventing bullying. • ...
Bullying 2021-11-15
Across
- Threats or verbal abuse
- A bully is identified not how they look, but rather by their
- _____ someone from a group is a form of bullying.
- Being a bully makes you a smaller person. Helping others makes you a ____ person.
- Bullies can get you in
- Bullies can call you
- Bullying can be done by an individual or
Down
- Bullying can be physical or
- Bullying online is called ____ bullying.
- If you are bullied, tell an
- Bystanders can make bullying worse when they do not
- If you see bullying, do not be a
12 Clues: Bullies can call you • Bullies can get you in • Threats or verbal abuse • Bullying can be physical or • If you are bullied, tell an • If you see bullying, do not be a • Bullying online is called ____ bullying. • Bullying can be done by an individual or • _____ someone from a group is a form of bullying. • Bystanders can make bullying worse when they do not • ...
"INFORMATION TECHNOLOGY" 2025-02-12
Across
- relating to or characteristic of the culture of computers, information technology, and virtual reality
- creative ability
- tools, machinery, and other durable equipment
- a first, typical or preliminary model of something
- packed together
Down
- quick-drying nonmetallic element
- made to appear to exist by the use of computer software
- a relationship in which a person, thing, or idea is linked or associated with something else
- a small usually thin and flat piece
- using radio, microwaves to transmit signals
- to enable the fast exchange of information
- a small mechanical or electronic device or tool
12 Clues: packed together • creative ability • quick-drying nonmetallic element • a small usually thin and flat piece • to enable the fast exchange of information • using radio, microwaves to transmit signals • tools, machinery, and other durable equipment • a small mechanical or electronic device or tool • a first, typical or preliminary model of something • ...
The Crypt 2025-10-04
Across
- Atomic bomb architect turning fission into global deterrence.
- Motion laws founder guiding artillery and missile paths.
- Radioactivity isolator whose elements enable dirty bombs.
- Optics innovator whose lenses evolved into spy satellites.
- Uncertainty expert whose physics secures quantum warfare encryption.
- Rocket designer whose trajectories fuel ICBM strikes.
Down
- Reactor builder whose chains drive submarine nukes.
- Electromagnetism inventor inspiring directed-energy weapons.
- Mass-energy pioneer whose equation powers nuclear warheads.
- Fertilizer chemist whose gases became WWI trench poisons.
- Quantum theorist whose models power laser battlefield tech.
- Algorithm genius whose codes birthed cyber attack tools.
12 Clues: Reactor builder whose chains drive submarine nukes. • Rocket designer whose trajectories fuel ICBM strikes. • Motion laws founder guiding artillery and missile paths. • Algorithm genius whose codes birthed cyber attack tools. • Radioactivity isolator whose elements enable dirty bombs. • Fertilizer chemist whose gases became WWI trench poisons. • ...
En El Aeropuerto 2023-10-26
McKnight Crossword 2024-09-27
Across
- at McKnight we are the
- bald security guard
- teacher who plays French horn
- the kind of standing you have to be on to attend dances and events
- the Lancer Way is respect, responsibility, integrity, and
- one of the tallest seventh graders
- name of 8th grade assistant principal
- name of 7th grade assistant principal
- she's on the Eastside FC soccer team
- used to teach math but now teaches PE
Down
- security guard with dreads
- nice loud best student who plays basketball and has lots of friends
- our school colors are black, grey, yellow, and
- name of principal
- tallest teacher
- she'll find your fingerprint because she teaches forensics
- likes funko pops and teaches math
- teacher who likes classical music
- obsessed with Walker Scobell
19 Clues: tallest teacher • name of principal • bald security guard • at McKnight we are the • security guard with dreads • obsessed with Walker Scobell • teacher who plays French horn • likes funko pops and teaches math • teacher who likes classical music • one of the tallest seventh graders • she's on the Eastside FC soccer team • name of 8th grade assistant principal • ...
School Crossword 2024-04-17
Across
- Uses painting, sketching, sculpting
- Also known as social studies, about the past
- Acronym for "Physical Education", sports
- Playing a board game with pawns, rooks, knights, etc.
- Playing instruments to make songs
- Expressing yourself through movement to a song
- Some types of it are chemistry, biology, and space
- Using numbers and symbols to calculate things
- Designing an building structures
- Using robots and legos through programming
Down
- The things/activity done in PE
- Also known as acting
- Reading and Writing are both apart of this subject
- Designing technology to a cyber level
- The language used in Cuba, Puerto Rico, Spain, etc.
- The "umbrella term" for chorus, band, dance, etc.
- Singing songs and music in a group
17 Clues: Also known as acting • The things/activity done in PE • Designing an building structures • Playing instruments to make songs • Singing songs and music in a group • Uses painting, sketching, sculpting • Designing technology to a cyber level • Acronym for "Physical Education", sports • Using robots and legos through programming • Also known as social studies, about the past • ...
Cyber Crossword #2 2024-03-28
Across
- Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future.
- The selection of combinations of conditions, parameters, features, and specifications of a system.
- A process intended to eliminate as many security risks as possible by implementing security controls (e.g., changing default passwords, enabling security settings, and protecting privileged accounts), patching vulnerabilities, turning off nonessential services, and removing all nonessential software programs, protocols, and utilities from the system.
- A physical USB smart card, or hard token, that may be used to log in to your desktop. YubiKeys offer better security, usability and reliability and can be used as either the primary authentication device or as a companion to a smartphone.
- A cloud based solution with Multi-Factor Authentication (MFA) and Single-Sign On capabilities that grant users access to applications, systems and servers after they have successfully presented one or more forms of verification to prove their identity.
- An intentional, deliberate act to misrepresent the truth or conceal a material fact for personal gain, or to persuade another to act upon it to his or her detriment.
Down
- A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. This is usually done via email.
- The verification of a user’s identity by a system.
- The measure of a system’s ability to handle varying amounts of work by adding or removing resources from the system. For example, a scalable web application is one that works well with one user or many users, and that gracefully handles peaks and dips in traffic.
- A broad reference to third-party services that are accessible via the internet. Types of cloud services can include Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS).
- The ability to automate scaling up or scaling down. Elasticity is used to meet sudden bursts in capacity while agility is used to address more predictable and even planned demand and workload requirements.
- Setting clear expectations for the conduct (behaviors and actions) of the entity being governed and directing, controlling, and strongly influencing the entity to achieve these expectations. This includes specifying a framework for decision making, with assigned decision rights and accountability, intended to consistently produce desired behaviors and actions.
12 Clues: The verification of a user’s identity by a system. • The selection of combinations of conditions, parameters, features, and specifications of a system. • Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future. • ...
Hacktivism Vocabulary Crossword 2 2023-05-09
Across
- protecting an organization and its employees against cyber threats
- a person or thing likely to cause damage or danger
- a hacker with bad intentions
Down
- an attempt by hackers to damage or destroy a computer network or system
- a legal hacker hired by a company or government
- reveal
- take something that is not yours
- to search
8 Clues: reveal • to search • a hacker with bad intentions • take something that is not yours • a legal hacker hired by a company or government • a person or thing likely to cause damage or danger • protecting an organization and its employees against cyber threats • an attempt by hackers to damage or destroy a computer network or system
stay safe online 2020-05-06
6 Clues: - being bullied online • - your own information • - making sure your safe • - spending to much time online • - when someone asks for pictures • _ keeping personal information safe
history crossword 7 2022-12-14
CNSSINST 4009 (2005) 2022-11-30
Across
- What is the PUB CNSSINT 4009 (2015)?
- The process of verifying the identity or other attributes claimed by or assumed
- The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals.
- The property of being accessible and useable upon demand by an authorized entity
- an entity (user, process, or device), or to verify the source and integrity of
- Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
- policy.
- A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related
Down
- The official management decision given by a senior organizational official to
- organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
- A category within a given security classification limiting entry or system connectivity to only authorized persons.
- Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.
- Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the
- Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts
- operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or
- of systems.
- The process of granting or denying specefic request:1) for obtaining and using information and related information processing services.
17 Clues: policy. • of systems. • What is the PUB CNSSINT 4009 (2015)? • The official management decision given by a senior organizational official to • an entity (user, process, or device), or to verify the source and integrity of • The process of verifying the identity or other attributes claimed by or assumed • ...
Ben's Crossword puzzle for Bullying 2014-06-18
Across
- A type of bulling that Is said
- Someone you can tell
- You can do this to a bully online
- A website bulling can happen on
- Something you can get when you are being bullied
- Another Word for Rude
- The Person that watches the bulling happen
- The person being bullied
- someone else you can tell
Down
- You can do this to stop it from happening
- these people can stand up for you
- The person doing the bullying
- A word for over and over again
- Another thing you can do to stop it from happening
- A type of bulling over the internet
- A type of bulling that can involve kicking and punching
16 Clues: Someone you can tell • Another Word for Rude • The person being bullied • someone else you can tell • The person doing the bullying • A type of bulling that Is said • A word for over and over again • A website bulling can happen on • these people can stand up for you • You can do this to a bully online • A type of bulling over the internet • ...
Computer vocabulary and jargon 2024-01-10
Across
- special words by people who do the same kind of work
- a program that destroys your data
- the imaginary place where emails exist
- related to Internet
- the name you use to operate computer system
- a connection between one file or documents
- software designed to perform a specific task, such as word processing or web browsing
Down
- software used to access and view websites
- the secret numbers or letters
- perform the actions that let you start to use a computer
- software that detects and removes viruses and other malware
- break someone's computer
- move the text on a screen up
- software that protects a computer from unauthorized access
- unwanted email advertisements
- do a search
16 Clues: do a search • related to Internet • break someone's computer • move the text on a screen up • the secret numbers or letters • unwanted email advertisements • a program that destroys your data • the imaginary place where emails exist • software used to access and view websites • a connection between one file or documents • the name you use to operate computer system • ...
SAPM CROSSWORD 2022-06-22
Across
- One of the researchers/economists who developed the CAPM model
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
- --------------------is the slope of the security characteristic line
- The line representing CAPM is the -----------------market line
- A conditional market order to sell stock if it drops to a given price (write without space)
- The other name for non-diversifiable risk is -------------------------risk
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
- An opportunity where an investor earns riskless profit without making any net investment
Down
- CAPM is a market --------------model
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
- In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable
- The economist who developed the Arbitrage Pricing Theory (APT) model
- The other name for indifference curve is --------------curve
- Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
- The economist who laid the foundations for the Modern Portfolio theory
- In the absence of secondary markets, this risk would be higher
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
19 Clues: CAPM is a market --------------model • The other name for indifference curve is --------------curve • One of the researchers/economists who developed the CAPM model • The line representing CAPM is the -----------------market line • In the absence of secondary markets, this risk would be higher • --------------------is the slope of the security characteristic line • ...
Teka teki silang keamanan jaringan 2025-11-28
Across
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- OF SERVICE (DOS)
Down
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
21 Clues: OF SERVICE (DOS) • Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • ...
Teka teki silang keamanan jaringan 2025-11-28
Across
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
Down
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- OF SERVICE (DOS)
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
21 Clues: OF SERVICE (DOS) • Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • ...
Vocabulario - el aeropuerto crucigrama 2024-05-13
19 Clues: to fly • - exit • - begin • - delay • - customs • - arrival • - suitcase • - the seat • - the sign • - security • - the trip • - the cabin • - the window • - the flight • - the ticket • - the counter • - the luggage • - the passanger • - the hallwaybaggage claim
11.5 2023-03-28
Across
- The implementation name for wireless security that adheres to the 802.11i specifications.
- This proves the users identity.
- This combines two non-overlapping 20MHZ channels into a single 40MHz channel.
- Many networks implement this.
- This was developed at MIT and is a key component of Windows Active Directory.
- This increases bandwidth by using multiple antennas for both the transmitter and receiver.
- This logs what the user accessed while on the network.
Down
- This defines what the user can access.
- This is the standard for local networks created by IEEE-SA.
- This has no authentication and allows anyone to connect to the network.
- This was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
- This uses radio waves to transmit data from small circuit boards to special scanners.
- This is a newer technology that is built on RFID.
- This was developed by Cisco to address security concerns in RADIUS.
- This is based on the Rijndael algorithm.
- This was used with WPA and WPA2 wireless security standards.
- This is and enhancement to MIMO that allows users to use the same channel.
- This is designed to allow devices to communicate withing a personal area network of close proximity.
- This is most commonly used access method.
- This is an open standard protocol used to authenticate users onto a network.
20 Clues: Many networks implement this. • This proves the users identity. • This defines what the user can access. • This is based on the Rijndael algorithm. • This is most commonly used access method. • This is a newer technology that is built on RFID. • This logs what the user accessed while on the network. • This is the standard for local networks created by IEEE-SA. • ...
Investing Patrick McVeigh 2025-03-25
Across
- investing all you have into the market at once
- what category does crypto fall under
- if you leave your company you can
- the total value of a companies stock
- before investing in crypto only invest what your willing to… employer manages pensions
- at what age can you invest in crypto
- The biggest fraud in U.S history was ..scandal
- a item of value held up by belief with no physical commodity
- you can collect full benefits for social security
- traditional IRA contributes are made
- the availability of cash or the ease in which a asset can convert to cash
- currency backed by the government but not tied to physical commodity.
- a total amount set aside and dedicated for a specific purpose.
- social security and medicare together is called
- is when equal portions are invested at a market in intervals
Down
- what president created social security
- THREE maximum age to start IRA
- a tax you pay towards the government thats used for retirement.
- personal pre tax max contribution is 7000
- warren buffets first rule
- Crypto is a risk investment.
- measures the price performance of a basket of securities
- what percentage of 18-29 invest in crypto
- Managed by employer contributions are made by you and the state.
- Roth IRA contributed are made
- a digital ledger of transactions that duplicates and distrbutes across a network.
26 Clues: warren buffets first rule • Crypto is a risk investment. • Roth IRA contributed are made • THREE maximum age to start IRA • if you leave your company you can • what category does crypto fall under • the total value of a companies stock • at what age can you invest in crypto • traditional IRA contributes are made • what president created social security • ...
Terms 2021-08-20
Across
- the "P" in PED
- the W in JWICS stands for
- Signals intelligence is abbreviated as
- the "C" in JWICS
- FDO is the Foreign _______ Officer
- information protected by SI caveat
- SIO is the ________ Intelligence Officer
- You signed an NDA when you were first read into this information
Down
- each facility must have an Emergency _____ Plan
- The "A" in SAP stands for
- Codeword for the U-2 program in the 50s
- CSA is Cognizant Security ________
- ORCON stands for ________ Controlled
- Each time you are INDOCed into SCI you sign a Non-________ Statement
- Codeword for the corona satellite program in the 60s
- Sub-compartment of SI
- Intelligence gained from human efforts
- the "C" in the acronym IC
- SSO stands for ______ Security Officer
- We mainly work in Sensitive _______ Information Facilities
20 Clues: the "P" in PED • the "C" in JWICS • Sub-compartment of SI • The "A" in SAP stands for • the W in JWICS stands for • the "C" in the acronym IC • CSA is Cognizant Security ________ • FDO is the Foreign _______ Officer • information protected by SI caveat • ORCON stands for ________ Controlled • Signals intelligence is abbreviated as • Intelligence gained from human efforts • ...
Vocabulary test Unit 2 Where Are You Going? กิจกรรม New Language 2022-06-03
15 Clues: ถอด • ผู้โดยสาร • สายการบิน • เที่ยวบิน • ออกเดินทาง • เคาน์เตอร์ • มาถึง,ไปถึง • เป้สะพายหลัง • กระดานโต้คลื่น • ระบบรักษาความปลอดภัย • ชั้นโดยสารราคาถูกที่สุด • ขึ้นเรือ เครื่องบิน รถ ฯลฯ • ชั้นธุรกิจ, ผู้โดยสารชั้นธุรกิจ • บัตรที่ผู้โดยสารต้องแสดงก่อนขึ้นเครื่องบิน • ทางออกสำหรับผู้โดยสารที่เดินทางด้วยเครื่องบิน
Tulis dalam Bahasa Indonesia 2022-06-01
15 Clues: smart • nurse • a cook • driver • selfish • dentist • arogant • teacher • mechanic • gardener • librarian • shy person • kind hearted • fire fighter • security guard
Superb Security Crossword Challenge 2020-05-07
Across
- An unpatched laptop is … to an attack or how you feel when you finish watching “The Notebook”
- The highest level of privilege which can be exposed (Windows)
- Unlawful data exposure
- …..engineering refers to the method attackers use to manipulate people into sharing sensitive information
- Converts passwords to unreadable strings or a good way to prepare potatoes
- What makes your laptop/PC sick
- Cybersecurity is our shared...
- …..identifiable information is any data that could potentially identify a specific individual
- Bad junk emails
- European privacy law
- Bad for your laptop/PC, but helpful to aerate the garden
Down
- Everyone has these and they are unique to each person
- Malware that misleads users of its true intent, or a big wooden horse
- Technology that extends a private network across a public network
- Should contain a minimum of 9 characters using a combination of upper case letters, lower case letters, numbers, and special characters.
- A guy in a hoodie, in his mom’s basement, trying to access your personal data
- Tool for stealing credit cards
- Ransomware that affected NHS in 2017, or what you want to do when you realize you might have this malware
- A malicious program designed to record which keys are being pressed on a computer keyboard
- Don't click on….within emails from an unknown or untrusted source.
20 Clues: Bad junk emails • European privacy law • Unlawful data exposure • Tool for stealing credit cards • What makes your laptop/PC sick • Cybersecurity is our shared... • Everyone has these and they are unique to each person • Bad for your laptop/PC, but helpful to aerate the garden • The highest level of privilege which can be exposed (Windows) • ...
Check Your Security Mindset 2020-07-15
Across
- An official order per POTUS
- A great sale or official authorization
- close observation
- Mid-level classification
- Formally found favorable
- A threat, intent is not a requirement
- Pay a fine, go to jail, etc.
- Big government
- The "O" in ISOO that can't be overlooked
- U.S. Coast Guard operations
Down
- Not any kind of secret, not even confidential.
- Security Education Training and _____________
- Is that a FOIA request? Hang on...
- Permission to pass, gain entry
- Ironically, a CIA (not DHS) TV drama starring Claire Danes
- The DHS ________Weapons of Mass Destruction Office (CWMD)
- Info protected per E.O. 13526
- Routine risk mitigation process
- Requires DHS accreditation
- Brand new, "PIV-less" DHS network access
20 Clues: Big government • close observation • Mid-level classification • Formally found favorable • Requires DHS accreditation • An official order per POTUS • U.S. Coast Guard operations • Pay a fine, go to jail, etc. • Info protected per E.O. 13526 • Permission to pass, gain entry • Routine risk mitigation process • Is that a FOIA request? Hang on... • A threat, intent is not a requirement • ...
ICT - Security and Communication 2017-11-20
Across
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- A type of protocol that allows data to be sent and received securely over the internet.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- Web applications or website that allow users to create and edit web pages using any web browser.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- Software that gathers data by monitoring key press on the user/s keyboard.
- The act of gaining unauthorized access to a computer system.
- Uses SMS system of mobile phones to send out fake text messages.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
Down
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- Refers to safety when using the internet like keeping personal data safe.
- Authentication that relies on certain unique characteristics of human beings.
- Used to verify that data comes from a secure and trusted source.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- Unsolicited email sent over the internet.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
24 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
A+ Security Hardware 1 2018-09-23
Across
- Should go from front to back
- Toner compressed onto paper with heat
- Find the issue
- More than one monitor
- Opposites attract when it comes to this
- Prevents shock
- memorable
- Saves cmos information
- Allows for packet transmission
- All components fit
Down
- Specifies physical dimensions of the MB components
- Short range low range wireless network solution
- Forgets everything when turned off
- Number one installation tool
- Print jobs in sequence
- The brain
- Old school
- No pins
- Sticky stuff on the cpu
- The base of it all
- High definition multi-media interface
- A chip that finds all the components on the pc
22 Clues: No pins • The brain • memorable • Old school • Find the issue • Prevents shock • The base of it all • All components fit • More than one monitor • Print jobs in sequence • Saves cmos information • Sticky stuff on the cpu • Should go from front to back • Number one installation tool • Allows for packet transmission • Forgets everything when turned off • Toner compressed onto paper with heat • ...
Chapter 9: Fundamental Security 2012-11-29
Across
- Uses network sniffers to extract usernames and passwords to be used at a later date to gain access.
- Is a person who is able to gain access to equipment or a network by tricking people.
- Prevents unauthorized access to the local computer and the network.
- Users outside of an organization that do not have authorized access to the network or resources.
- Gains access to resources on devices by pretending to be a trusted computer.
- Changes the DNS records on a system to point to false servers where the data is recorded.
- Sends abnormally large amounts of requests to a system preventing access to the services.
- Is the protocol suite that is used to control all of the communications on the Internet.
- Accidental threats are when the user damages data or equipment unintentionally.
- Also known as junk mail
- Programming language developed to interact with HTML source code to allow interactive websites.
- Created by Microsoft to control interactivity on webpages.
Down
- Events or attacks that steal, damage, or destroy equipment.
- A large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing it.
- A software program that displays advertising on your computer.
- A file or program other then a virus that can be harmful.
- Events or attacks that remove, corrupt, deny access, allow access or steal information.
- Distributed without any user knowledge.
- Uses "zombies" to make tracing the origin of the DoS attack difficult to locate.
- A series of repeated, larger than normal pings that crash the receiving computer.
- Intercepts or inserts false information in traffic between two hosts.
- Programming language that allows applets to run within a web browser.
- Randomly opens TCP ports.
- Fundamental Security.
- A program that is written with malicious intent and sent out by attackers.
25 Clues: Fundamental Security. • Also known as junk mail • Randomly opens TCP ports. • Distributed without any user knowledge. • A file or program other then a virus that can be harmful. • Created by Microsoft to control interactivity on webpages. • Events or attacks that steal, damage, or destroy equipment. • A software program that displays advertising on your computer. • ...
Security Awareness Puzzle 2015 2015-02-17
Across
- 21. A password is stronger by using a combination of both upper and lower case ___________.
- 28. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
- 25. A software that is designed to detect and destroy computer viruses.
- 24. The state of being free from danger or threat.
- 13. Passwords should be _________ every 3-4 months.
- 20. Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
- 3. __________ is a popular web search engine.
- 15. Applied to data to protect it from unauthorized use in case of theft or loss.
- 8. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
- 5. Use __________ passwords for the various accounts that you may have.
- 11. To ________ the amount of spam you receive, be careful who you give your email address to.
- 10. Never share your _________ with another person.
- 12. Healthy email always includes a clear and specific ____________ line.
- 6. Email scam or attempt to trick you into giving your password or personal information.
Down
- 18. A secure password should contain at least one of these.
- 22. Choose a password that is easy for you to ____________ but hard for someone to guess.
- 29. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- 30. Also known as malicious software; any program or file that is harmful to a computer user.
- 14. Do not send __________ information over email unless it is encrypted.
- 27. Another word for understanding, knowledge and well-informed.
- 16. Do not leave your laptop or computer ____________.
- 1. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- 26. Use this tool to dispose of documents that contain personal or financial information.
- 7. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
- 9. Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
- 23. A computer ______ can be considered as the modern counterpart of a paper document.
- 19. Passwords should always be at least this many characters long.
- 4. A collection of information that is organized so that it can easily be accessed, managed, and updated.
- 17. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- 2. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
30 Clues: 3. __________ is a popular web search engine. • 24. The state of being free from danger or threat. • 13. Passwords should be _________ every 3-4 months. • 10. Never share your _________ with another person. • 16. Do not leave your laptop or computer ____________. • 18. A secure password should contain at least one of these. • ...
Security+ Crossword Puzzle #1 2014-11-03
Across
- indicates exposure to the chance of damage or loss
- the countermeasures put in place to avoid, mitigate, or counteract risks
- administrator has discretion to allow or not allow access
- malicious software that is intended to track and report back on system usage
- the security approach of blocking unauthorized access or attacks before they occur
- the act of determining if a user has tried to access unauthorized data
- any technique used to exploit a vulnerability
- process of validating credentials
- an attacker accessing your computer system without authorization
- process of tracking and recording system activities and resource access
- Top Secret, Secret, Confidential
- any potential damage to an asset
- data that has been encoded with a cipher and is unreadable
Down
- self-replicating piece of malicious code that spreads without attching itself to different files
- physical or virtual objects that store authentication information
- ensuring that who sent the data remains associated and cannot deny sending it
- software that displays or downloads advertisements
- any condition that leaves a system open to harm
- _____ bomb remains dormant until a specific condition occurs
- self-replicating piece of malicious code that spreads by attaching itself to different files
- process of determining rights and privileges
- malicious software that takes full or partial control of a system at the lowest levels
- _____ management is a systematic way of reviewing and approving changes
- the act of recovering vital data from a system that has crashed, been compromised, or damaged
- rule, system, or mechanism used to encrypt or decrypt data
- practice of examining logs
- access is controlled by a user's role
27 Clues: practice of examining logs • Top Secret, Secret, Confidential • any potential damage to an asset • process of validating credentials • access is controlled by a user's role • process of determining rights and privileges • any technique used to exploit a vulnerability • any condition that leaves a system open to harm • indicates exposure to the chance of damage or loss • ...
Digital life and security 2024-01-14
Across
- значення 'mal' в 'malware'
- дурний, безглуздий
- безпечний
- доступ
- обмеження
- крадіжка
- шкідливе програмне забезпечення
- перехоплювати
- ненадійний, небезпечний
Down
- втішати, заспокоювати
- обходити
- скинути (пароль)
- сучасний, в актуальному стані
- зберігати
- стильний
- красти (2 форма)
- здобувати, отримувати
- грабіжник
- сховище, зберігання
- зламати (пароль)
20 Clues: доступ • обходити • стильний • крадіжка • безпечний • зберігати • обмеження • грабіжник • перехоплювати • скинути (пароль) • красти (2 форма) • зламати (пароль) • дурний, безглуздий • сховище, зберігання • втішати, заспокоювати • здобувати, отримувати • ненадійний, небезпечний • значення 'mal' в 'malware' • сучасний, в актуальному стані • шкідливе програмне забезпечення
Privacy and Security Online 2024-04-25
Across
- changes a browser's behavior, settings, or appearance without user consent
- theft A type of scam where someone tries to trick you into giving them your personal information
- A setting that allows you to control who can see your profile and posts
- A type of software that can harm your computer or steal your information
- A piece of software that can protect your computer from online threats
- A place where you can safely store your passwords and other sensitive information
- A symbol or character that represents you online
- when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
- the safe and responsible use of information and communication technologies
- A type of attack where someone pretends to be someone else to gain access to your personal information
- sharing photos, videos, and messages with other people
- piracy the illegal copying or distribution of copyrighted material via the Internet
- users open the app an average of 19 times a day
- a collective term for websites and applications that focus on communication
- System used to protect computer systems
- Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
- You should never share this with strangers online
- keep your digital doors locked
- virus a type of malware that downloads onto a computer disguised as a legitimate program
- short and less than 8 characters
20 Clues: keep your digital doors locked • short and less than 8 characters • System used to protect computer systems • users open the app an average of 19 times a day • A symbol or character that represents you online • You should never share this with strangers online • sharing photos, videos, and messages with other people • ...
Security-04-30-2024 2024-04-29
Across
- ______ engineering is the act of tricking a person into doing something by messing up their emotions and decision-making process
- A type of attack where malicious code is inserted into a database query.
- The process of verifying the identity of a user or device
- A transformation of data into a form that conceals the data's original meaning.
- A hidden way to access a system or software.
- The practice of concealing messages or information within other nonsecret text or data
- A logical or physical discontinuity in a network to prevent unauthorized access.
Down
- A network of infected computers controlled by a hacker.
- A phishing attack conducted through SMS messages.
- Detection technology software to shield users against malware.
- A vulnerability that is exploited before the software developer releases a fix.
- A generic term for different types of malicious code
- An isolated environment used to test potentially dangerous software.
- A deceptive system designed to attract and monitor unauthorized access or attacks.
- A type of phishing attack carried out through voice calls.
- An attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
- Developing audio, image, or a video clip that has been edited and manipulated to appear real or believable
- A software update that fixes vulnerabilities or bugs.
- A computer program that appears to have a useful function, but also has a hidden and potentially malicious function
- Use of e-mails that appear legitimate to trick a user into entering valid credentials or clicking a link.
20 Clues: A hidden way to access a system or software. • A phishing attack conducted through SMS messages. • A generic term for different types of malicious code • A software update that fixes vulnerabilities or bugs. • A network of infected computers controlled by a hacker. • The process of verifying the identity of a user or device • ...
Social security and relationships 2023-01-30
21 Clues: KELA • appi • käly • kunta • anoppi • puoliso • esi-isä • köyhyys • syrjintä • avoliitto • alaikäinen • huoltajuus • elatusmaksu • eläkeläinen • jälkeläiset • lainsäädäntö • viranomaiset • age eläkeikä • nuorisotilat • iltapäiväkerho • syntyätodistus
Information Assurance and Security 2025-12-16
Across
- Ensures systems are accessible when needed (The A in CIA)
- A one-way function that turns data into a fixed-length string (used for passwords)
- The assurance that someone cannot deny the validity of something (like a signature)
- Random data added to a password before hashing it
- Malware that replicates itself to spread to other computers (no host needed)
- Converting ciphertext back into plaintext
- Authentication using physical characteristics like fingerprints
- The process of verifying who a user is
- Malware disguised as legitimate software
- A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
- Spyware that records every keystroke made by a user
- Ensures data has not been altered or tampered with (The I in CIA)
- A list of entities that are approved for unauthorized access
- An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
Down
- Malware that locks your data and demands payment
- Malicious code that attaches itself to a host program to replicate
- The process of verifying what a user is allowed to do
- Ensures information is not disclosed to unauthorized individuals (The C in CIA)
- A potential danger that can exploit a vulnerability
- Extends a private network across a public network (Virtual Private Network)
- A list of entities that are denied access
- Code or a technique that takes advantage of a vulnerability
- Converting plaintext into ciphertext to secure it
- A network security device that monitors and blocks traffic
- A weakness or flaw in a system
25 Clues: A weakness or flaw in a system • The process of verifying who a user is • Malware disguised as legitimate software • Converting ciphertext back into plaintext • A list of entities that are denied access • Malware that locks your data and demands payment • Random data added to a password before hashing it • Converting plaintext into ciphertext to secure it • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
- Datenverarbeitungsregisternummer.
- Echtzeit chatten.
- Verbreitet sich direkt über Netze.
Down
- Personen werden mit Hilfe von elektronischen Medien verletzt.
- Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
- Sie dringen illegal in Computersysteme ein.
- Werbemails die unerwünscht sind nennt man auch?
- Diese Viren sind als ein Programm in eine Datei eingebetet?
- Diese Programme protokollieren die Tastatureingaben mit.
10 Clues: Echtzeit chatten. • Datenverarbeitungsregisternummer. • Verbreitet sich direkt über Netze. • Sie dringen illegal in Computersysteme ein. • Werbemails die unerwünscht sind nennt man auch? • Diese Programme protokollieren die Tastatureingaben mit. • Diese Viren sind als ein Programm in eine Datei eingebetet? • Personen werden mit Hilfe von elektronischen Medien verletzt. • ...
Online Bullying 2024-06-11
Across
- Someone to talk to
- When someone is not letting you get something by putting it close to you then away from you before you catch it
- The original meaning of online
- Another meaning of online
Down
- When someone is being bullied online
- Where you can seek help online by parent or anyone else
- A meaning of photos
- When you write online
- When someone does something mean intentionally
- A very famous app & website
10 Clues: Someone to talk to • A meaning of photos • When you write online • Another meaning of online • A very famous app & website • The original meaning of online • When someone is being bullied online • When someone does something mean intentionally • Where you can seek help online by parent or anyone else • ...
Cyber-bully Activity 2021-10-29
Across
- A mean saying someone might say about your looks
- Two words- the act of staying safe online
- Group of people that you hang out with
- Something to do if someone is being bullied
Down
- Beginning with I - saying hurtful things
- A device that someone can be cyber-bullied on
- Someone who is mean
- A story that is a lie
- How someone might feel when you tease them
- A feeling of unsure and stress
10 Clues: Someone who is mean • A story that is a lie • A feeling of unsure and stress • Group of people that you hang out with • Beginning with I - saying hurtful things • Two words- the act of staying safe online • How someone might feel when you tease them • Something to do if someone is being bullied • A device that someone can be cyber-bullied on • ...
news u8 2024-12-12
Across
- How many people took to the skies
- News claims of misconducted alcohol abuse against...who?
- 13 Billion Spent by who
- How much was spent on Cyber Monday
- FBI seeks help in what?
Down
- Who was the stowaway on a plane to the US to Paris
- Picked for FBI director by Donald Trump
- Who fought cancer
- How many troops were still in Syria
- How many people got injured at the holiday parade
10 Clues: Who fought cancer • 13 Billion Spent by who • FBI seeks help in what? • How many people took to the skies • How much was spent on Cyber Monday • How many troops were still in Syria • Picked for FBI director by Donald Trump • How many people got injured at the holiday parade • Who was the stowaway on a plane to the US to Paris • ...
HW crossword puzzle 2022-04-28
Across
- anything related to the internet
- a program that seems harmless but is very dangerous
- converting data into a code for unauthorized personnel
- mass communication software
- affected by a virus
Down
- bad software to harm other software
- something that doesn't allow bad things to enter a software
- a procedure to get something done
- a commercial business
- when someone acts like they know each other to get a personal gain or financial gain
10 Clues: affected by a virus • a commercial business • mass communication software • anything related to the internet • a procedure to get something done • bad software to harm other software • a program that seems harmless but is very dangerous • converting data into a code for unauthorized personnel • something that doesn't allow bad things to enter a software • ...
Technology 2025-06-16
Across
- an important discovery or development
- the use of machines to perform tasks without human intervention
- easy to use or understand
- a small electronic device with a specific function
- the trail of data left by users on the internet
- introducing new ideas or methods
Down
- knowledgeable about modern technology
- extremely modern and advanced
- measures taken to protect systems from cyber threats
- the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • knowledgeable about modern technology • an important discovery or development • the trail of data left by users on the internet • the simulation of human intelligence in machines • a small electronic device with a specific function • ...
Bullying 2023-02-27
6 Clues: Face with emotion • talking about others • Another for the body • Instagram is the platform • Friendship is one of the causes • Another word for words (the start is V)
EUREKA 2012-11-04
Across
- Petroleum=Petra(_____)+Oleum(Oil)(4)
- First country to declare itself as small pox free(5)
- If you are on the Cassini Division, where are you?(6)
- Driest desert on Earth.(7)
- A lepidopterist collects a __________(9)
- Rarest element on Earth.(8)
- The scientist who coined the term ‘Electric Fluid'(8,8)
- Ho
Down
- Fear of computers - __________phobia(5)
- New satellite being developed by ISRO to learn about Sun(6)
- The Earth hour was first started in this city(6)
- How is ‘Citrullus Vulgaris’ better known to us?(10)
- Study of humans.(12)
- Oil of Vitriol - __________ acid(9)
- Little boy-Uranium, Fatman -_________(9)
- Company which has its tagline as ‘Invented for life(5)
16 Clues: Ho • Study of humans.(12) • Driest desert on Earth.(7) • Rarest element on Earth.(8) • Oil of Vitriol - __________ acid(9) • Petroleum=Petra(_____)+Oleum(Oil)(4) • Fear of computers - __________phobia(5) • A lepidopterist collects a __________(9) • Little boy-Uranium, Fatman -_________(9) • The Earth hour was first started in this city(6) • ...
Cyberbullying 2021-05-05
Across
- bully cant contact you after you ___ them
- blood relative that can give support
- message sent from a phone
- leaving out someone on purpose
- role model in school that can give support
- Handheld device
- when someone post constant mean comments they are ___ me
- social media plafroms allow you to ___ a negative comment
- deliberate act to publically humiliate someone
- someone who you trust for support
Down
- people post hurtfull_______ underneath my post
- when another pretends to be someone they are not
- someone who tries constantly to annoy someone on the interent
- the most common emotion from being cyberbullied
- When getting cyber bullied it is best to seek out ____
- not giving attention to the bully
16 Clues: Handheld device • message sent from a phone • leaving out someone on purpose • not giving attention to the bully • someone who you trust for support • blood relative that can give support • bully cant contact you after you ___ them • role model in school that can give support • people post hurtfull_______ underneath my post • deliberate act to publically humiliate someone • ...
occupation 2020-02-20
Authorities 2025-05-05
Artificial Intelligence in Healthcare 2024-09-18
websites 2016-04-25
Across
- Threat, A blended threat is a software exploit which in turn involves a combination of attacks against different vulnerabilities. For example, many worm, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. It is a kind of computer threat.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- he global communication network that allows almost all computers worldwide to connect and exchange information. Some of the early impetus for such a network came from the U.S. government network Arpanet
- An unauthorized user who attempts to or gains access to an information system.
- designed to detect and destroy computer virusesAttack, An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- Code, Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
- A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
Down
- Security, The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- A digital form of social engineering to deceive individuals into providing sensitive information.
- The process of transforming plaintext into cipher text.
- A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences.
- Horse, A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
- A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator
- A capability to limit network traffic between networks and/or information systems.
- Door, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
- A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
18 Clues: The process of transforming plaintext into cipher text. • An unauthorized user who attempts to or gains access to an information system. • A capability to limit network traffic between networks and/or information systems. • A digital form of social engineering to deceive individuals into providing sensitive information. • ...
Office of Performance Management and Internal Controls 2021-03-05
Across
- Intentional deceptive action
- Periodic comparison of source documents
- Office directed by Lt. Col. Terry
- Last name of OPMIC Information Security Officer
- Training due April 15th by all employees
Down
- Synonym for bloom, blossom and singing birds
- Control working in less than optimal condition
- Reduces the risk of error and inefficiency
- Acronym for Information Security Officer
- Complete acronym for internal control standards
- Last name of Internal Audit Manager
- The end toward which effort is directed
- Evaluation document with code of ethics
13 Clues: Intentional deceptive action • Office directed by Lt. Col. Terry • Last name of Internal Audit Manager • Periodic comparison of source documents • The end toward which effort is directed • Evaluation document with code of ethics • Acronym for Information Security Officer • Training due April 15th by all employees • Reduces the risk of error and inefficiency • ...
The Outsiders 2021-01-12
16 Clues: - car • - hood • - facts • - snack • - knife • - dessert • - parking • - security • - clothing • - dangerous • - educational • - from ur head • - cancer stick • - entertainment • - cool and edgy • - place of worship
HW 2025-08-13
17 Clues: почти • жертва • защита • уязвимый • недавний • уверенный • увеличить • база данных • безопасность • предотвратить • предупреждение • позволять себе • в соответсвии с • должностное лицо • среднестатистический • недостаток (чего-то) • рассматривать, принимать во внимание
Ac and AC 2022-11-04
28 Clues: fri • liv • ret • tro • lov • hørt • udtryk • frihed • stemme • tortur • lighed • undring • slaveri • skyldig • religion • relation • menneske • uskyldig • værdighed • sikkerhed • uddanelse • retfærdig • bevægelse • privatliv • samtidighed • umenneskelig • nationalitet • forskelsbehandling
