cyber security Crossword Puzzles

Unit 3: the golden state 2020-03-01

Unit 3: the golden state crossword puzzle
Across
  1. Flamme
  2. entspannt
  3. Umwelt
  4. Zitat
  5. Prozess
  6. Drehbuch
  7. häufig
  8. Waldbrand
  9. Mittag
  10. niedlich,süß
  11. Landschaft
  12. Mikrofon
  13. wechseln
  14. very important person
Down
  1. Jahrgangsstufe
  2. Sicherheit
  3. obwohl
  4. Erklärung
  5. the year has to of them
  6. fließen
  7. Aufenthalt
  8. Berühmtheit
  9. glänzend

23 Clues: ZitatFlammeobwohlUmwelthäufigMittagProzessfließenDrehbuchMikrofonwechselnglänzendentspanntErklärungWaldbrandSicherheitAufenthaltLandschaftBerühmtheitniedlich,süßJahrgangsstufevery important personthe year has to of them

Nouns 1: Introducing yourself 2023-03-08

Nouns 1: Introducing yourself crossword puzzle
Across
  1. home
  2. gender
  3. divorced
  4. unmarried
  5. married
  6. social security number
  7. age
  8. first language
  9. last name
  10. phone number
  11. date of birth
Down
  1. email address
  2. language
  3. nationality
  4. personal details
  5. single
  6. country, land
  7. city, town
  8. name
  9. first name
  10. address

21 Clues: agehomenamegendersinglemarriedaddresslanguagedivorcedunmarriedlast namecity, townfirst namenationalityphone numberemail addresscountry, landdate of birthfirst languagepersonal detailssocial security number

April 12 Homework menu 2023-04-12

April 12 Homework menu crossword puzzle
Across
  1. customs
  2. security
  3. stamp
  4. maid
  5. castle
  6. tip
  7. guide
  8. suitcase
  9. oppened
  10. pillow
  11. Poste_office
  12. boat
Down
  1. post_card
  2. blanket
  3. closed
  4. cash
  5. bottle of water
  6. cathedral
  7. taxi
  8. Station
  9. hand luggage
  10. consulate
  11. bed
  12. subway/metro
  13. palace

25 Clues: tipbedmaidcashtaxiboatstampguideclosedcastlepillowpalaceblanketcustomsStationoppenedsecuritysuitcasepost_cardcathedralconsulatehand luggagesubway/metroPoste_officebottle of water

1.1 Vocab - Sp 3 2022-01-12

1.1 Vocab - Sp 3 crossword puzzle
Across
  1. ticket
  2. ID
  3. departure
  4. luggage
  5. To make a mistake
  6. passport
  7. gate
  8. To confirm
  9. arrival
  10. To board
Down
  1. security
  2. customs
  3. flight
  4. To travel
  5. male passenger
  6. suitcase
  7. female passenger
  8. airport
  9. screen/monitor
  10. To believe
  11. To forget
  12. itinerary

22 Clues: IDgateticketflightcustomsluggageairportarrivalsecuritysuitcasepassportTo boardTo traveldepartureTo forgetitineraryTo believeTo confirmmale passengerscreen/monitorfemale passengerTo make a mistake

E-safety 2020-05-06

E-safety crossword puzzle
Across
  1. something designs to break your computer
  2. don't share any ..... information
  3. you don't know these people
  4. these people try to get your personal information
Down
  1. what is bullying online
  2. something you should have in a password
  3. don't open any ..... from strangers
  4. something lots of people worldwide use
  5. what kind of person do you talk to when you are worried

9 Clues: what is bullying onlineyou don't know these peopledon't share any ..... informationdon't open any ..... from strangerssomething lots of people worldwide usesomething you should have in a passwordsomething designs to break your computerthese people try to get your personal informationwhat kind of person do you talk to when you are worried

Chapter 2 notes 2022-11-21

Chapter 2 notes crossword puzzle
Across
  1. vast majority of US corporations
  2. people who work
  3. financial investment
  4. money for realestate
  5. services related to money
  6. buyers and sellers of stock
  7. public info
  8. account owner makes deposit
  9. withdraw cash and pay
  10. trading small daily
  11. agreed-upon amount within specified time
  12. illegal private gained info
  13. pay for security purchases
  14. customers required to apply
Down
  1. manage supply of money and intrest
  2. face value of stock
  3. interest over 10 years
  4. directly to public investors
  5. investors who borrow money
  6. accepts money from customers
  7. nonprofit institution
  8. largest category deposit
  9. investing long term
  10. document guaranteeing money
  11. people who lend money
  12. shares openly traded
  13. quick investing gains
  14. assist you with purchasing stocks and bonds
  15. money directly in account
  16. report given annualy

30 Clues: public infopeople who workface value of stockinvesting long termtrading small dailyfinancial investmentmoney for realestateshares openly tradedreport given annualynonprofit institutionpeople who lend moneyquick investing gainswithdraw cash and payinterest over 10 yearslargest category depositservices related to moneymoney directly in account...

Domestic & International Airports 2019-06-13

Domestic & International Airports crossword puzzle
Across
  1. an airline
  2. the place you pass before you become airside
  3. what did the resuce team use for splints after flight 801's crash
  4. a limit on something
  5. get on the plane
  6. anyone can access this part of the airport
  7. ______ controller
  8. passenger
  9. a covered walkway which allows passengers to get to aircraft
Down
  1. very first phase of flight
  2. what does FAA believe is the most common cause of runway incursion
  3. ideal solution for evacuating passengers from a stricken aircraft
  4. greenlights indicate the start of runway, red indicates the end
  5. germanys national carrier
  6. ID you present to the CSA while getting boarding pass
  7. phonetic alphabet W
  8. people with the glow sticks and help with ramps
  9. abbreviation for liquids, aerosols and gels
  10. main class in a flight
  11. abbreviation for aviation security service

20 Clues: passengeran airlineget on the plane______ controllerphonetic alphabet Wa limit on somethingmain class in a flightgermanys national carriervery first phase of flightanyone can access this part of the airportabbreviation for aviation security serviceabbreviation for liquids, aerosols and gelsthe place you pass before you become airside...

DO YOU KNOW SOUTH? 2023-06-22

DO YOU KNOW SOUTH? crossword puzzle
Across
  1. what everyone was given and few gave back
  2. seat for you to sit and wait (near the security desk)
  3. best meal on Wednesdays
  4. Field day on the last day
  5. Security guard at the "T"
  6. tallest sixth grade teacher
  7. tests you must pass to move on
  8. outdoor area to eat
  9. loudest room in the building
Down
  1. principal at the beginning of the year
  2. Street name where South is located
  3. The boss
  4. yearly event to get free food and books
  5. Where most exercise happens
  6. place to store your things
  7. must be off and not seen
  8. Administator who played in the Faculty/staff Basketball game
  9. often asked to be removed
  10. grade level when starting at South
  11. A quiet place to go when your teacher asks you to leave

20 Clues: The bossoutdoor area to eatbest meal on Wednesdaysmust be off and not seenField day on the last daySecurity guard at the "T"often asked to be removedplace to store your thingsWhere most exercise happenstallest sixth grade teacherloudest room in the buildingtests you must pass to move onStreet name where South is located...

Aviation workplace 2023-11-14

Aviation workplace crossword puzzle
Across
  1. Place at the airport after security
  2. The plane taking off
  3. Lining up to get on the plane
  4. Where the public can go
  5. Thing to do/ you may need
  6. Travelling outside your country
  7. Flying or operate of an aircraft
  8. Going to another country/city/town
  9. Making sure you keep yourself and others safe
  10. Fun time away
Down
  1. Certain aeroplane company
  2. A place you go to catch a flight
  3. X-ray to see if you're carrying any dangerous goods
  4. Customer on a plane
  5. A form of Identification to travel internationally
  6. Your belongings you're bringing with you
  7. Travelling in the same country
  8. Where the plane takes off and lands
  9. Confirmation that a citizen can enter leave or stay somewhere
  10. A child travelling alone under the age of 12

20 Clues: Fun time awayCustomer on a planeThe plane taking offWhere the public can goCertain aeroplane companyThing to do/ you may needLining up to get on the planeTravelling in the same countryTravelling outside your countryA place you go to catch a flightFlying or operate of an aircraftGoing to another country/city/townPlace at the airport after security...

Decode the Cloud: The SUSE Mastermind Challenge 2025-10-18

Decode the Cloud: The SUSE Mastermind Challenge crossword puzzle
Across
  1. Program members who resell and integrate SUSE solutions
  2. A key partner offering for enterprise customers
  3. SUSE long-term-release named after a season
  4. SUSE Rancher tool used to manage bare-metal and virtualized clusters
  5. Container orchestration platform widely used with SUSE
  6. SUSE's enterprise Linux product (abbreviation)
  7. Lightweight virtualization units for microservices
  8. SUSE product for Kubernetes management
  9. Process improved using Ansible & automation tooling
  10. Default snapshot-capable filesystem used by SUSE
  11. SUSE command-line package manager
Down
  1. Critical non-functional requirement for enterprise platforms
  2. Community Linux distribution sponsored by SUSE
  3. Annual SUSE user and partner conference
  4. Rolling-release distro from SUSE
  5. Core of the operating system
  6. Tool for lifecycle and patch management
  7. Deliverable for security and bug fixes
  8. SUSE system administration tool (4 letters)
  9. Open Build Service (abbreviation)

20 Clues: Core of the operating systemRolling-release distro from SUSEOpen Build Service (abbreviation)SUSE command-line package managerDeliverable for security and bug fixesSUSE product for Kubernetes managementAnnual SUSE user and partner conferenceTool for lifecycle and patch managementSUSE long-term-release named after a season...

Network+ 10-09 Wirelesss 2024-07-24

Network+ 10-09 Wirelesss crossword puzzle
Across
  1. parabolic,yagi,cantenna,omni to name a few
  2. type of WPA wifi security for home
  3. data amount thats transferred at layer 3
  4. 2wrds, recon of area for AP placement
  5. signal bounces
  6. topology where stations connect to a base
  7. frame to notify party to end connection
  8. data transfer achieved at layer 7
  9. too many devices connect to AP
  10. 2wrds, combining to channels
Down
  1. radio wave is reduced as it passes through
  2. GSM and CDMA , uses radio towers
  3. WMN..all devices connected together forms
  4. free space path loss
  5. background environment interference to wireless
  6. AP type that needs a WLC
  7. type of wifi security for organazations
  8. making signal unreadable or scrambled
  9. signal or radio wave bends
  10. multiplexing signals from 2-4 antennas
  11. broadcast frame sent out by AP

21 Clues: signal bouncesfree space path lossAP type that needs a WLCsignal or radio wave bends2wrds, combining to channelsbroadcast frame sent out by APtoo many devices connect to APGSM and CDMA , uses radio towersdata transfer achieved at layer 7type of WPA wifi security for home2wrds, recon of area for AP placementmaking signal unreadable or scrambled...

III L - crossword 2 M. Klocek; K. Mandecki 2015-04-27

III L - crossword 2 M. Klocek; K. Mandecki crossword puzzle
Across
  1. prom
  2. bezpieczeństwo
  3. przewoźnik
  4. organizować
  5. główny
  6. załadunek
Down
  1. cło
  2. strata
  3. dostawa
  4. zawartość
  5. pilne
  6. umowa
  7. naklejka

13 Clues: cłoprompilneumowastratagłównydostawanaklejkazawartośćzaładunekprzewoźnikorganizowaćbezpieczeństwo

3 2024-05-14

3 crossword puzzle
Across
  1. consider
  2. discuss
  3. required
  4. limitation
  5. charged
  6. wedding
Down
  1. prepared
  2. security
  3. calculated
  4. special
  5. exists
  6. confirmed
  7. outside

13 Clues: existsdiscussspecialoutsidechargedweddingpreparedconsidersecurityrequiredconfirmedcalculatedlimitation

Authorities 2025-02-11

Authorities crossword puzzle
Across
  1. acord
  2. permis
  3. lege
  4. plângere
  5. martor
  6. amendă
Down
  1. judecător
  2. hotar
  3. securitate
  4. penalizare
  5. semnătură
  6. ambasadă
  7. avocat

13 Clues: legehotaracordpermisavocatmartoramendăambasadăplângerejudecătorsemnăturăsecuritatepenalizare

Chapter 1 Vocab 2015-09-22

Chapter 1 Vocab crossword puzzle
Across
  1. services are delivered from a business' data center to internal users. This model offers versatility and convenience, while preserving management, control and security.
  2. (Quality of Service) the capability of a network to provide better service to selected network traffic over various technologies
  3. large secure locations for server farms
  4. plugging a machine in which secures a frequency in your power line that is used for data transfer
  5. security software that protects a system from malicious software
  6. (Access Control Lists) a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee
  7. Firewalls that allow only certain ports to be used
  8. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it
  9. using smartphones to control functions of your house
  10. cloud technology that can be changed to adapt to the needs of the user
Down
  1. the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
  2. that covertly steals personal information from one computer
  3. the property that enables a system to continue operating properly in the event of the failure of some components
  4. allows companies to use computers as a utility that they get services for and from on demand rather than having to maintain their own infrastructure
  5. the ability to add your own device onto a network, separate from the other machines on the network.
  6. a third-party provider delivers the cloud service over the Internet, sold on-demand, typically by the minute or the hour.
  7. (Virtual Private Network) a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
  8. self-replicating piece of code used for malicious purposes
  9. the design of the communication on a network. It is a framework for the specification of the network’s physical components and their roles on the network
  10. wireless ISP, get all data from an antenna outside your house
  11. (Intrusion Prevention System) a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
  12. The authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority.
  13. a combination of public cloud services and on-premises private cloud – with orchestration and automation between the two. Companies can run mission-critical workloads or sensitive applications on the private cloud while using the public cloud for bursty workloads that must scale on-demand. The goal of hybrid cloud is to create a unified, automated, scalable environment which takes advantage of all that a public cloud infrastructure can provide, while still maintaining control over mission-critical data.

23 Clues: large secure locations for server farmsFirewalls that allow only certain ports to be usedusing smartphones to control functions of your houseself-replicating piece of code used for malicious purposesthat covertly steals personal information from one computerwireless ISP, get all data from an antenna outside your house...

Cisco Product Advanced Security Puzzle 2024-10-16

Cisco Product Advanced Security Puzzle crossword puzzle
Across
  1. Threat detection engine paired with Kyverno for container security
  2. A solution that leverages AI to detect and block identity spoofing attacks on endpoints
  3. Tool used by Cisco to improve customer experience in vulnerability management
  4. Software list that tracks components for security and compliance purposes
Down
  1. Standards and certifications that ensure product security and regulatory compliance
  2. The process of securing network telemetry with gRPC Dial-Out
  3. Security platform integrating networking and security in Cisco’s architecture

7 Clues: The process of securing network telemetry with gRPC Dial-OutThreat detection engine paired with Kyverno for container securitySoftware list that tracks components for security and compliance purposesSecurity platform integrating networking and security in Cisco’s architecture...

CHAPTER #13 2014-12-26

CHAPTER #13 crossword puzzle
Across
  1. Describes a sentence where the defendant is credited immediately after the guilty verdict with the time spent in jail awaiting trial.
  2. Jails that allow for the continuous observation for inmates.
  3. Used when all prisoners are locked in their cells to prevent a riot or unrest from spreading or during an emergency.
  4. Allow for continuous observation for inmates.
  5. Designed for prisoners regarded as being less dangerous; having fewer restrictions.
  6. Facilities that provide the highest level of prison security.
  7. Prisoners are together, side by side, during work, meals, and prayer but return to solitary cells at night.
  8. A theory that involves information collecting, individualization, treatment, relaxation of rules.
Down
  1. Heightened classification based on inmate's crime and behavior while incarcerated.
  2. Time period that you are incarcerated between being arrested and your trial.
  3. Place of punishment for offenses against the state, also a place of penance or house of correction.
  4. is a form of prison management based on the principle of keeping prisoners in solitary confinement.
  5. Cells are clustered around a common area and a control booth from which an officer observes inmate activity.
  6. A person responsible for the supervision of a prison, for ensuring that regulations associated with it are obeyed.
  7. Place in which individuals are physically confined or interned by a third party that is contracted by a government agency.
  8. The most secure levels of custody in the prison systems.
  9. A place for the confinement of people accused or convicted of a crime, a sentence is usually a year or less.

17 Clues: Allow for continuous observation for inmates.The most secure levels of custody in the prison systems.Jails that allow for the continuous observation for inmates.Facilities that provide the highest level of prison security.Time period that you are incarcerated between being arrested and your trial....

TTS FIREWALL 2022-11-09

TTS FIREWALL crossword puzzle
Across
  1. Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
  2. firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
  3. Perubahan terhadap tampilan suatu website secara illegal disebut..
  4. fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
  5. kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
  6. berapakah element pada host hardening …
Down
  1. firewall terbagi menjadi ... jenis
  2. Yang termasuk jenis metode enkripsi adalah …
  3. Terdiri dari database security, data security, dan device security adalah keamanan di level …
  4. ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
  5. arti dari kata firewall
  6. Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
  7. firewall bekerja dengan cara ... seluruh data yang masuk

13 Clues: arti dari kata firewallfirewall terbagi menjadi ... jenisberapakah element pada host hardening …Yang termasuk jenis metode enkripsi adalah …firewall bekerja dengan cara ... seluruh data yang masukPerubahan terhadap tampilan suatu website secara illegal disebut..kelebihan firewall berbasis jaringan adalah menjaga jaringan secara......

Pieter's Business Finder Quiz 2025-09-01

Pieter's Business Finder Quiz crossword puzzle
Across
  1. A sudden and unexpected event causing loss
  2. A modern threat covered by specialized insurance policies
  3. A key metric comparing claims paid to premiums earned
  4. Government-backed insurer for special risks like riots and strikes
  5. Intentional deception for financial gain in insurance
  6. Assessment of an asset’s worth for insurance purposes
  7. Temporary vehicle provided during repairs
Down
  1. Professional who advises clients on insurance solutions
  2. What insurance helps manage and transfer
  3. Legal responsibility for damage or injury
  4. The process of evaluating and accepting insurance risk
  5. Brand identity – Brokers No.1
  6. Amount paid by the insured before coverage kicks in

13 Clues: Brand identity – Brokers No.1What insurance helps manage and transferLegal responsibility for damage or injuryTemporary vehicle provided during repairsA sudden and unexpected event causing lossAmount paid by the insured before coverage kicks inA key metric comparing claims paid to premiums earnedIntentional deception for financial gain in insurance...

Do you know the words? 2021-01-08

Do you know the words? crossword puzzle
Across
  1. Sitzplatz
  2. lösen
  3. Privatsphäre
  4. aufsperren
  5. Sicherheit
  6. befördern
  7. Akku
  8. Freiwillige
  9. Kopfkissen
  10. verhindern
  11. Netzwerk
  12. Behinderung
  13. Reifen
  14. kompliziert
  15. Raum
Down
  1. Windschutzscheibe
  2. nachverfolgen
  3. Reparatur
  4. Waren
  5. verbessern
  6. Daten
  7. Drohne
  8. Dach
  9. Haushaltsgeräte
  10. Lautsprecher
  11. Roboter
  12. verringern

27 Clues: DachAkkuRaumlösenWarenDatenDrohneReifenRoboterNetzwerkSitzplatzReparaturbefördernverbessernaufsperrenSicherheitKopfkissenverhindernverringernFreiwilligeBehinderungkompliziertPrivatsphäreLautsprechernachverfolgenHaushaltsgeräteWindschutzscheibe

Spanish 2 Unit 2 Vocab Crossword 2020-11-04

Spanish 2 Unit 2 Vocab Crossword crossword puzzle
Across
  1. soldado
  2. la oficina
  3. mandar
  4. enfermero
  5. la disciplina
  6. mecánico
  7. la autonomia
  8. movil
  9. la rutina
  10. recibir
  11. la securidad
  12. ingeniero
Down
  1. flexible
  2. comunicar
  3. hombre
  4. bombero
  5. policia
  6. medico
  7. músico
  8. artista
  9. abogado
  10. dentista
  11. cocinero
  12. escritor
  13. compartir

25 Clues: movilhombremandarmedicomúsicosoldadobomberopoliciaartistaabogadorecibirflexiblemecánicodentistacocineroescritorcomunicarenfermerola rutinacompartiringenierola oficinala autonomiala securidadla disciplina

Glossary: The United Nations 2022-02-15

Glossary: The United Nations crossword puzzle
Across
  1. arvo
  2. toimintaperiaate, käytäntö
  3. arvokkuus, ihmisarvo
  4. kääntää (kielestä toiseen)
  5. jäsenvaltio
  6. aktiivinen kansalainen
  7. edistää, tukea
  8. rauhanturvaaja
Down
  1. kestävä kehitys
  2. suojella
  3. ulkomaanasiat
  4. tasa-arvo
  5. konflikti, ristiriita
  6. tehdä yhteistyötä
  7. parantua, edistyä
  8. kääntäjä
  9. ihmisoikeudet
  10. turvallisuus
  11. tulkki
  12. kansainvälinen laki
  13. määrätä, säätää

21 Clues: arvotulkkisuojellakääntäjätasa-arvojäsenvaltioturvallisuusulkomaanasiatihmisoikeudetedistää, tukearauhanturvaajakestävä kehitysmäärätä, säätäätehdä yhteistyötäparantua, edistyäkansainvälinen lakiarvokkuus, ihmisarvokonflikti, ristiriitaaktiivinen kansalainentoimintaperiaate, käytäntökääntää (kielestä toiseen)

Family 2024-06-25

Family crossword puzzle
Across
  1. bread
  2. hunter
  3. cat lover
  4. loves Theo
  5. mechanical
  6. frugal
  7. boy scouts dad
  8. artistic
  9. swimmer
  10. farmer
  11. canine security
Down
  1. boatmover
  2. don't forget about
  3. chickens
  4. reader
  5. homestyle cook
  6. piano
  7. wastes nothing
  8. sings
  9. sheds
  10. animal expert
  11. gamer

22 Clues: breadpianosingsshedsgamerhunterreaderfrugalfarmerswimmerchickensartisticboatmovercat loverloves Theomechanicalanimal experthomestyle cookwastes nothingboy scouts dadcanine securitydon't forget about

French II Crossword 2023-04-20

French II Crossword crossword puzzle
Across
  1. strike
  2. consulate
  3. train station
  4. taxi
  5. embassy
  6. card
  7. airplane
  8. job/position
  9. foot
  10. cathedral
  11. ticket giver
  12. passport
  13. security
  14. cue/line
Down
  1. baggage
  2. castle
  3. customs
  4. car
  5. suitcase
  6. airport
  7. subway
  8. ticket
  9. palace
  10. boat/ship
  11. cash

25 Clues: cartaxicardfootcashcastlestrikesubwayticketpalacebaggagecustomsembassyairportsuitcaseairplanepassportsecuritycue/lineconsulatecathedralboat/shipjob/positionticket givertrain station

Refugee 2022-11-11

Refugee crossword puzzle
Across
  1. decalpsid
  2. noitucesrep
  3. ytilitsoh
  4. enitnarauq
  5. eegufer
  6. epacse
  7. seitlausac
  8. ytiruces
  9. noitargim
  10. RCHNU
  11. sserts
  12. redrob
Down
  1. noitatroped
  2. rekees-mulysa
  3. sudoxe
  4. sisirc
  5. noitargimmi
  6. tnemtaert-lli
  7. ssensselemoh
  8. eeucave
  9. yrautcnas
  10. enimaf
  11. yrtnuoc
  12. retlehs
  13. noitairtaper

25 Clues: RCHNUsudoxesisircepacseenimafssertsredrobeegufereeucaveyrtnuocretlehsytirucesdecalpsidytilitsohyrautcnasnoitargimenitnarauqseitlausacnoitatropednoitucesrepnoitargimmissensselemohnoitairtaperrekees-mulysatnemtaert-lli

Occupations 2022-05-12

Occupations crossword puzzle
Across
  1. artist
  2. employee/staff
  3. athlete
  4. Pilot
  5. Dancer
  6. Police
  7. professor
  8. Dentist
  9. musician
  10. movie star
  11. Female chef
  12. Male seller
  13. nurse
Down
  1. missionary
  2. security guard
  3. driver
  4. preacher
  5. Male chef
  6. Officer/government official
  7. Doctor
  8. Soldier
  9. Singer
  10. Female seller

23 Clues: PilotnurseartistdriverDancerPoliceDoctorSingerathleteSoldierDentistpreachermusicianMale chefprofessormissionarymovie starFemale chefMale sellerFemale sellersecurity guardemployee/staffOfficer/government official

kuis globalisasi dan masyarakat digital 2024-09-17

kuis globalisasi dan masyarakat digital crossword puzzle
Across
  1. Proses pembelajaran yang semakin sering menggunakan ____
  2. Alat komunikasi yang memudahkan ____ pesan secara elektronik
  3. Sistem nilai dan norma yang diwariskan melalui ____
  4. Bidang yang terpengaruh oleh perdagangan ____ internasional
  5. Sistem ____ yang menghubungkan berbagai perangkat komputer
  6. Saluran untuk menyampaikan ____ ke publik
  7. Individu yang mengakses sistem komputer tanpa ____
  8. Jaringan global yang menghubungkan ____
  9. Proses yang menghubungkan berbagai negara melalui ____
Down
  1. Tempat atau ____ untuk berbagi konten secara online
  2. Cara orang ____ dan bertukar informasi
  3. Jaringan ____ menghubungkan orang secara virtual
  4. Data yang telah diproses dan dimaknai untuk ____
  5. Perdagangan yang dilakukan melalui ____
  6. Dunia ____ merujuk pada segala hal yang berkaitan dengan internet
  7. Proses mengubah informasi dari bentuk analog ke ____
  8. Hak untuk menjaga ____ informasi pribadi di dunia maya
  9. Alat atau sistem yang digunakan untuk mempermudah ____
  10. Informasi yang dikumpulkan dan dianalisis untuk ____ keputusan
  11. Bersifat ____ yang mencakup seluruh dunia

20 Clues: Cara orang ____ dan bertukar informasiPerdagangan yang dilakukan melalui ____Jaringan global yang menghubungkan ____Saluran untuk menyampaikan ____ ke publikBersifat ____ yang mencakup seluruh duniaJaringan ____ menghubungkan orang secara virtualData yang telah diproses dan dimaknai untuk ____Individu yang mengakses sistem komputer tanpa ____...

computers and kodu 2024-01-10

computers and kodu crossword puzzle
Across
  1. here you would find google and all your apps on a computer
  2. your computer's short-term memory
  3. a basic game making software
  4. a texting app that most pepole use
  5. the code inside your computer
  6. a physical way of protecting your computer
  7. a populer battle royale game
  8. a formal messaging app
  9. invisible graphic squares
Down
  1. a console made by microsoft
  2. a type of worded password
  3. the right order of code
  4. images made up of pixels
  5. a set of instructions for a computer
  6. someone breaking in toyour computer
  7. using yourself to unlock a eletric device
  8. bullying on the internet
  9. fake prospering adverts sent to yourself
  10. stands for the Central Processing Unit
  11. a popular platforming game with lots of smaller games in it made by the pepole using it

20 Clues: a formal messaging appthe right order of codeimages made up of pixelsbullying on the interneta type of worded passwordinvisible graphic squaresa console made by microsofta basic game making softwarea populer battle royale gamethe code inside your computeryour computer's short-term memorya texting app that most pepole use...

Cybercrime and ICT Laws 2025-03-21

Cybercrime and ICT Laws crossword puzzle
Across
  1. Law that protects individuals' personal information
  2. Crime of using domain names in bad faith
  3. Crime involving explicit materials of minors
  4. The agency that oversees ICT governance in the Philippines
  5. Act of intercepting data transmissions without permission
  6. Data Privacy Act of 2012
  7. Police unit that investigates online crimes
  8. Law penalizing cyber libel and hacking
  9. Investigation unit for online crimes
  10. Spreading false information about someone online
  11. Crime involving defamation on the internet
Down
  1. Interfering with or damaging a computer system
  2. Online fraud involving fake websites or emails
  3. Unauthorized access to a computer system
  4. Financial fraud using computers
  5. The unauthorized modification or destruction of computer data
  6. Government agency that investigates cybercrimes
  7. A system of rules established by a government
  8. Anti-Child Pornography Act of 2009
  9. Organization responsible for enforcing the Data Privacy Act
  10. Online sexual exploitation for money or favors
  11. Government agency that enforces data privacy laws

22 Clues: Data Privacy Act of 2012Financial fraud using computersAnti-Child Pornography Act of 2009Investigation unit for online crimesLaw penalizing cyber libel and hackingCrime of using domain names in bad faithUnauthorized access to a computer systemCrime involving defamation on the internetPolice unit that investigates online crimes...

news 2022-10-16

news crossword puzzle
Across
  1. joshua killer
  2. kdrt perpetrator
  3. take other people's lives
  4. the price goes up
  5. where did the 2004 tsunami occur
  6. car crash is called
  7. sexual crimes
  8. earth's surface vibrations
  9. lava coming out of volcano is called
  10. what's being talked about
  11. criminal act
  12. people who saw the incident
  13. big water wave
Down
  1. hacker name
  2. overflowing river
  3. bomb attack in jakarta 2016
  4. stadium name in malang
  5. conditions in 2020
  6. ground shift
  7. heroin,morphine,etc
  8. news tv channel in indonesia
  9. news being discussed
  10. actions taken by individual from a party to enrich themselves
  11. the person who reads the news
  12. form of oppresion
  13. cyber crime
  14. take people's things without permission
  15. things we use during a pandemic
  16. kdrt victim
  17. international news channel

30 Clues: hacker namecyber crimekdrt victimground shiftcriminal actjoshua killersexual crimesbig water wavekdrt perpetratoroverflowing riverthe price goes upform of oppresionconditions in 2020car crash is calledheroin,morphine,etcnews being discussedstadium name in malangtake other people's liveswhat's being talked aboutearth's surface vibrations...

spanish uniut 4 2021-12-14

spanish uniut 4 crossword puzzle
Across
  1. flight
  2. train station
  3. airport
  4. service
  5. airplane
  6. train
  7. i will visit
  8. map
Down
  1. destination
  2. i will go
  3. tourtrip
  4. itenerary
  5. customs
  6. security
  7. departures

15 Clues: maptrainflightairportservicecustomstourtripsecurityairplanei will goitenerarydeparturesdestinationi will visittrain station

DTB Tanzania-2020 2020-12-10

DTB Tanzania-2020 crossword puzzle
Across
  1. A city with 2 branches of DTB Tanzania
  2. The period for credit repayment
  3. Institutions offering financial services by disrupting traditional banking
  4. Non-service of a loan facility
  5. Interest-bearing account for short,long-term goals and emergencies.
  6. A foreign current savings product
  7. A cheque with no date marked
  8. Product for not-for-profits
  9. Security against credit
Down
  1. Sales of insurance policies in bank
  2. A product for students
  3. A cheque presented after 6 months of mention
  4. Measurement for credit rating
  5. Swahili for peace
  6. A collateral against loan
  7. latest branch of the bank
  8. ATMs,POS,mobile banking and wakala's
  9. A bank serving interest of another bank in a foreign country.
  10. Detailed account on financial position of a business at a particular point in time
  11. Accounting and financial reporting standard

20 Clues: Swahili for peaceA product for studentsSecurity against creditA collateral against loanlatest branch of the bankProduct for not-for-profitsA cheque with no date markedMeasurement for credit ratingNon-service of a loan facilityThe period for credit repaymentA foreign current savings productSales of insurance policies in bank...

Travel Vocab 2020-04-10

Travel Vocab crossword puzzle
Across
  1. safety belt
  2. counter
  3. sleeping car
  4. car wagon
  5. window
  6. ticket
  7. flight
  8. trip travel
  9. passport
  10. aisle
  11. controller
  12. on time
  13. to turn
  14. luggage
  15. gate
  16. layover
  17. second class
  18. luggage screening
  19. stop
  20. coach
  21. visa
  22. to go through security
  23. international airport
Down
  1. boarding pass
  2. to take off
  3. in the train station
  4. to check luggage
  5. flight attendent
  6. suitcase
  7. to get/obtain
  8. seat
  9. ticket
  10. first class
  11. to go straight
  12. delayed
  13. arrival
  14. security agent
  15. to hope
  16. carry-on luggage
  17. to miss a flight
  18. to land
  19. event ticket
  20. platform
  21. in the airport
  22. waiting room
  23. baggage claim
  24. passenger
  25. connection
  26. departure
  27. ticket window
  28. bunk
  29. customs
  30. to board
  31. to see
  32. to give

55 Clues: seatgatebunkstopvisaaislecoachticketwindowticketflightto seecounterdelayedarrivalto hopeto landon timeto turnluggagelayovercustomsto givesuitcasepassportplatformto boardcar wagonpassengerdeparturecontrollerconnectionto take offsafety beltfirst classtrip travelsleeping carevent ticketwaiting roomsecond classboarding passto get/obtainbaggage claim...

Travel Vocab 2020-04-10

Travel Vocab crossword puzzle
Across
  1. safety belt
  2. counter
  3. sleeping car
  4. car wagon
  5. window
  6. ticket
  7. flight
  8. trip travel
  9. passport
  10. aisle
  11. controller
  12. on time
  13. to turn
  14. luggage
  15. gate
  16. layover
  17. second class
  18. luggage screening
  19. stop
  20. coach
  21. visa
  22. to go through security
  23. international airport
Down
  1. boarding pass
  2. to take off
  3. in the train station
  4. to check luggage
  5. flight attendent
  6. suitcase
  7. to get/obtain
  8. seat
  9. ticket
  10. first class
  11. to go straight
  12. delayed
  13. arrival
  14. security agent
  15. to hope
  16. carry-on luggage
  17. to miss a flight
  18. to land
  19. event ticket
  20. platform
  21. in the airport
  22. waiting room
  23. baggage claim
  24. passenger
  25. connection
  26. departure
  27. ticket window
  28. bunk
  29. customs
  30. to board
  31. to see
  32. to give

55 Clues: seatgatebunkstopvisaaislecoachticketwindowticketflightto seecounterdelayedarrivalto hopeto landon timeto turnluggagelayovercustomsto givesuitcasepassportplatformto boardcar wagonpassengerdeparturecontrollerconnectionto take offsafety beltfirst classtrip travelsleeping carevent ticketwaiting roomsecond classboarding passto get/obtainbaggage claim...

Travel Chap 4 vocab 2020-04-02

Travel Chap 4 vocab crossword puzzle
Across
  1. controller
  2. safety belt
  3. flight attendent
  4. to miss
  5. passenger
  6. trip; travel
  7. seat
  8. customs
  9. visa
  10. event ticket
  11. sleeping car
  12. to get/obtain
  13. arrival
  14. to land
  15. bunk
  16. aisle
  17. international airport
  18. to hope
  19. waiting room
  20. flight
  21. to give
  22. to see
  23. second class
  24. security agent
  25. on time
Down
  1. passport
  2. gate
  3. coach
  4. boarding pass
  5. platform
  6. luggage screening
  7. carry-on baggage
  8. in the airport
  9. connection
  10. baggage claim
  11. ticket window
  12. to go through security
  13. departure
  14. delayed
  15. window
  16. to take off
  17. car wagon
  18. first class
  19. suitcase
  20. counter
  21. to board
  22. to check luggage
  23. to go straight
  24. in the train station
  25. stop
  26. ticket
  27. delayed
  28. ticket
  29. to turn

54 Clues: gateseatvisabunkstopcoachaislewindowflightticketto seeticketto misscustomsdelayedarrivalto landcounterto hopeto givedelayedto turnon timepassportplatformsuitcaseto boardpassengerdeparturecar wagoncontrollerconnectionsafety beltto take offfirst classtrip; travelevent ticketsleeping carwaiting roomsecond classboarding passbaggage claimticket window...

The Maghrib Times Crossword Puzzle Vol. 3 Iss. 2 2025-03-08

The Maghrib Times Crossword Puzzle Vol. 3 Iss. 2 crossword puzzle
Across
  1. Evidence not from direct knowledge.
  2. A member of a jury.
  3. To formally accuse of a crime.
  4. Security given for the release of a prisoner.
  5. A request made to a court.
  6. One who receives a grant.
  7. To annul or set aside.
  8. An official who certifies documents.
  9. A formal order or decree.
  10. To make a legal argument in court.
Down
  1. A written document transferring property.
  2. To officially call someone to court.
  3. A civil wrong causing harm to another.
  4. A legal claim on property as security for a debt.
  5. To assert or declare without proof.
  6. A solemn promise, often before a court.
  7. Fairness as applied in legal cases.
  8. The location where a case is heard.
  9. To send a case back to a lower court.
  10. A demand for something as a right.

20 Clues: A member of a jury.To annul or set aside.One who receives a grant.A formal order or decree.A request made to a court.To formally accuse of a crime.A demand for something as a right.To make a legal argument in court.Evidence not from direct knowledge.To assert or declare without proof.Fairness as applied in legal cases....

Using computers 2024-01-09

Using computers crossword puzzle
Across
  1. to scramble up messages
  2. you use it to click on things
  3. a type of biometric security
  4. like a website
  5. physical parts of a computer
  6. an online texting or sharing app
Down
  1. typing
  2. to protect the users account
  3. a physical security method using your body
  4. a sequence of numbers or letters
  5. a method of sending a digital copy of a letter

11 Clues: typinglike a websiteto scramble up messagesto protect the users accounta type of biometric securityphysical parts of a computeryou use it to click on thingsa sequence of numbers or lettersan online texting or sharing appa physical security method using your bodya method of sending a digital copy of a letter

TCS Information Security Crossword 2013-01-10

TCS Information Security Crossword crossword puzzle
Across
  1. A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
  2. _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
  3. Process for secure disposal of paper based information
  4. ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
  5. Attack preventing availability of a system operation or service to an authorized user
  6. A piece of software that is malicious or intrusive
  7. Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
  8. Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
  9. A software that detects, repairs, cleans, or removes infected files from a computer
  10. Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
  11. ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
  1. A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
  2. Act of listening to a private conversation which may reveal information which can provide access to a facility or network
  3. Highest category of information classification in TCS
  4. ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
  5. An update to fix vulnerabilities in software
  6. Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
  7. Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
  8. ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
  9. A weakness that can be taken advantage of to obtain unauthorized access to an asset
  10. Minimum password length as per TCS security policy
  11. is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.

22 Clues: An update to fix vulnerabilities in softwareMinimum password length as per TCS security policyA piece of software that is malicious or intrusiveHighest category of information classification in TCSProcess for secure disposal of paper based informationA weakness that can be taken advantage of to obtain unauthorized access to an asset...

Data centres and security 2013-03-29

Data centres and security crossword puzzle
Across
  1. It is a process that has completed execution but still has an entry in the process table.
  2. It is a program can collect and transmit personal information, often without the user being aware.
  3. It is a resource intended to provide the customer or end user with information and support related to a company's or institution's products and services.
  4. sections of a centre sealed off from other sections.
  5. It is a secret word or string of characters that is used for user authentication to prove identity.
  6. duplication of equipment in case one part fails.
  7. using physical characteristics for ID.
  8. It is a method of exchanging digital messages from an author to one or more recipients.
Down
  1. It is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.
  2. It is a portable computer with a built-in screen, integrated keyboard, and battery power.
  3. It is a family of computer networking technologies for local area networks.
  4. having different and unconnected cables to a network.
  5. It is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
  6. ability to withstand unexpected problems or setbacks.
  7. It is the process of encoding messages.
  8. time when the equipment is not functioning.
  9. It is a collection of computers interconnected by communication channels that allow sharing of resources and information.
  10. It is an attacker's attack intended to redirect a website's traffic to another, bogus site.
  11. It is a computer worm targeting the Microsoft Windows operating system.
  12. It is the action of recording (or logging) the keys struck on a keyboard.

20 Clues: using physical characteristics for ID.It is the process of encoding messages.time when the equipment is not functioning.duplication of equipment in case one part fails.sections of a centre sealed off from other sections.having different and unconnected cables to a network.ability to withstand unexpected problems or setbacks....

Computer Security and Viruses 2014-08-10

Computer Security and Viruses crossword puzzle
Across
  1. A group of two or more computer systems linked together.
  2. The study of people's efficiency in their working environment.
  3. The process by which you store the files on a single storage media with no secondary copies.
  4. A program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
  5. A program designed to detect and destroy computer viruses.
  6. A way of backing up the computer that allows you to store the entire computer, including the operating system and programs, in a single file (an “image”) that can be used to restore the computer to exactly the way it was when the image was made.
  7. The process of using an algorithm to transform information to make it unreadable for unauthorized users.
  8. An act of crime in which a computer is the object of the crime.
  9. an electronic discovery technique used to determine and reveal technical criminal evidence.
  10. The act of making set of instructions.
  11. The programs and other operating information used by a computer.
  12. A software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  13. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  14. A feature or defect of a computer system that allows surreptitious unauthorized access to data.
  15. It is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
  16. Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Down
  1. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or PDA.
  2. The acto of gaining unauthorized access to protected data.
  3. A software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
  4. An act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords.
  5. A person within a group or organization, especially someone privy to information unavailable to others.
  6. It refers to the physical parts of a computer system.
  7. The state of being free from danger or threat.
  8. The distinct pieces of digital information.
  9. An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
  10. The use of computers and related resources in an environmentally responsible manner.
  11. A person who breaks into a computer system, typically for an illegal purpose.
  12. The Father of Computers.
  13. A person that codes the set of instructions for the computer.
  14. A software that is intended to damage or disable computers and computer systems.
  15. Refers to tricking or deceiving computer systems or other computer users
  16. An organized collection of data.
  17. A type of network, the "V" in VPN.
  18. An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  19. A person who uses computers to gain unauthorized access to protected data.

35 Clues: The Father of Computers.An organized collection of data.A type of network, the "V" in VPN.The act of making set of instructions.The distinct pieces of digital information.The state of being free from danger or threat.It refers to the physical parts of a computer system.A group of two or more computer systems linked together....

knowhere's head of security 2016-01-13

knowhere's head of security crossword puzzle
Across
  1. Wolverine’s bones are laced with __________
  2. Famously quoted: “I am ______”
  3. Famously quoted: “No more mutants”
  4. First Appearance: New Mutants #98
  5. Son of Cyclops; time-traveler
  6. Aka The Accuser
  7. Earth’s Mightiest Heroes
  8. Gems: Time, Space, Power, Reality, Mind, and ____
  9. Evil alter-ego of Adam Warlock
  10. Eye of Agamotto wielder
  11. Wielder of Mjolnir
  12. King of Wakanda, aka ____________
  13. Peter Parker is the Amazing _________
  14. Aka Jennifer Walters, attorney at law
  15. Son of Mephisto
  16. Before Adam Warlock, his “name” was ___
  17. Created solely to kill Thanos
  18. Captain America’s shield is made of this
  19. Aka Kamala Khan, inhuman
  20. Jewel, AKA _______ _____
Down
  1. Fist of Khonshu; aka Marc Spector
  2. The “most dangerous woman in the galaxy”
  3. Creator of the Four Horsemen
  4. The best there is at what he does
  5. Daughter of Drax the Destroyer
  6. Knowhere’s head of security
  7. Alien race; creators of inhumans
  8. Johnny Blaze or Daniel Ketch
  9. Captain Britain’s sister
  10. Team organized by Charles Xavier
  11. Captain Marvel, aka Carol _______
  12. Avatar of Death; Mad Titan
  13. The Watcher, aka ___
  14. Secret Wars (1984) main villain, The ________
  15. Richard Rider or Sam Alexander
  16. Shapechanger; foster mother of Rogue
  17. The 2nd herald of Galactus

37 Clues: Aka The AccuserSon of MephistoWielder of MjolnirThe Watcher, aka ___Eye of Agamotto wielderEarth’s Mightiest HeroesCaptain Britain’s sisterAka Kamala Khan, inhumanJewel, AKA _______ _____Avatar of Death; Mad TitanThe 2nd herald of GalactusKnowhere’s head of securityCreator of the Four HorsemenJohnny Blaze or Daniel Ketch...

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. The M in HTML
  2. an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
  3. IEE 802.11 describes which type of network?
  4. Network authentication protocol
  5. A cat tries to catch it but you can use it with your computer
  6. The Ripper Cracking tool
  7. Famous packet analyzer
  8. Protocol that gives access to a user on a remote system
  9. Malware that encrypts data for money
  10. init 6
  11. Famous proxy tool for web penetration testing
  12. Goddess of Cyprus,Venus...
  13. which is the first layer in OSI
  14. Database attack, ____ Injection
Down
  1. You can use it for anonymity
  2. Spyware, Trojan, worm, virus
  3. name of first virus
  4. 127.0.0.1 IP address
  5. decode this hex -> 7365637572697479
  6. Cross Site _____ Attack
  7. Swiss army knife of hacking tool/frequently used as backdoor
  8. Mac address is a 12 byte. What type of numbers?
  9. Famous Debian Distribution for Penetration Testing
  10. TCP & UDP runs in that OSI Layer
  11. Not bind shell
  12. Not TCP
  13. control and store your repo
  14. Which protocol is used by ping command

28 Clues: init 6Not TCPThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoYou can use it for anonymitySpyware, Trojan, worm, virusNetwork authentication protocolwhich is the first layer in OSIDatabase attack, ____ Injection...

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  2. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  3. Uses SMS system of mobile phones to send out fake text messages.
  4. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  5. Authentication that relies on certain unique characteristics of human beings.
  6. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  7. Refers to safety when using the internet like keeping personal data safe.
  8. Used to verify that data comes from a secure and trusted source.
  9. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  10. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  11. The act of gaining unauthorized access to a computer system.
  12. Unsolicited email sent over the internet.
Down
  1. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  2. A type of protocol that allows data to be sent and received securely over the internet.
  3. Software that gathers data by monitoring key press on the user/s keyboard.
  4. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  5. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  6. Web applications or website that allow users to create and edit web pages using any web browser.
  7. Refers to the need to respect other user's views and display common courtesy when posting views online.
  8. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  9. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  10. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  11. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  12. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  13. A cloud where the storage is provided by a dedicated environment behind a company firewall.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Uses SMS system of mobile phones to send out fake text messages.Used to verify that data comes from a secure and trusted source.Refers to safety when using the internet like keeping personal data safe....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  2. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  3. Authentication that relies on certain unique characteristics of human beings.
  4. Refers to the need to respect other user's views and display common courtesy when posting views online.
  5. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  6. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  7. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  8. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  9. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  10. Uses SMS system of mobile phones to send out fake text messages.
  11. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  12. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
Down
  1. Software that gathers data by monitoring key press on the user/s keyboard.
  2. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  3. Used to verify that data comes from a secure and trusted source.
  4. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  5. Refers to safety when using the internet like keeping personal data safe.
  6. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  7. Web applications or website that allow users to create and edit web pages using any web browser.
  8. A type of protocol that allows data to be sent and received securely over the internet.
  9. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  10. The act of gaining unauthorized access to a computer system.
  11. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  12. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  13. Unsolicited email sent over the internet.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

Security Markets (Chapter 2) 2018-01-29

Security Markets (Chapter 2) crossword puzzle
Across
  1. will shut down the markets or a stock in the event that it takes a pre-defined drop
  2. serves as the middleman in the process of raising funds
  3. a stock exchange in New York that began as a physical location
  4. closed-end funds and structured products i.e. Standard and Poors 500 index and the DJIA
  5. an automated system that matches, buys, and sells orders for securities
  6. formed in 2005 as an ECN and was granted exchange status by the SEC
  7. allows NYSE member firms to electronically transmit all market and limit orders directly to the specialist at the trading post or the member trading booth
Down
  1. markets for existing assets that can be traded between investors i.e. NYSE
  2. a way of exchanging assets
  3. first electronic stock market listing over 5000 companies
  4. distinguished by the flow of funds between the market participants
  5. basis where the issuing firm assumes the risk and simply takes back an securities not sold after a fixed period
  6. regulates the organized markets
  7. electronic quotation service that gathers and publishes bid and ask quotation prices
  8. a database that keeps track of limit orders and market orders for the specialist
  9. where the company sells its stock to the public without the help of an investment bank
  10. bring private companies public for the first time
  11. occurs when prices respond to new information, when each successive trade is made at a price close to the preceding price
  12. a non organized exchange with limited rules and regulations
  13. guarantee the investment banking firm gives the selling firm to purchase its securities at a fixed price
  14. gives the owner the right to buy 100 shares of the underlying common stock at a set price for a certain period

21 Clues: a way of exchanging assetsregulates the organized marketsbring private companies public for the first timeserves as the middleman in the process of raising fundsfirst electronic stock market listing over 5000 companiesa non organized exchange with limited rules and regulationsa stock exchange in New York that began as a physical location...

Security Manual – Chapter 3 2021-08-04

Security Manual – Chapter 3 crossword puzzle
Across
  1. No _____ robberies are alike.
  2. Make no statements to the them; refer them to Marketing
  3. A theft, which does not involve a person directly
  4. Varying your _____ to work will also help.
  5. Try to _____ the robber’s physical features, voice, accent, mannerism, dress and other characteristics
  6. Vault bait should be _____ hundred dollars.
  7. _____ _____ is a robbery prevention tool (two words)
  8. Remember that robberies usually last 30 to 90 ____ and the robber will quickly leave the bank
  9. Place this on your window signal you’ve been robbed (two words)
  10. ______ is the most important preliminary to an attack.
Down
  1. Write down any ____ from during the robbery that you can later advise the police of
  2. Always lock the _____ when you are not at your window.
  3. A theft involving force or threat of force
  4. _____ of any kind are to be avoided
  5. theft doesn’t involve force or threat of force
  6. Preserve any _____
  7. Obey The Robber’s _____; Don’t Be A Hero
  8. This ____ system can provide evidence
  9. If ____ include the bait money
  10. Every ____ months the office must record ____.(two words)

20 Clues: Preserve any _____No _____ robberies are alike.If ____ include the bait money_____ of any kind are to be avoidedThis ____ system can provide evidenceObey The Robber’s _____; Don’t Be A HeroA theft involving force or threat of forceVarying your _____ to work will also help.Vault bait should be _____ hundred dollars....

Personnel security crossword puzzle 2024-02-12

Personnel security crossword puzzle crossword puzzle
Across
  1. - reduce the risk of your assets being lost, damaged or compromised
  2. - keep operations from devolving into complete chaos
  3. - the process of actively seeking out, finding and hiring candidates for a specific position or job
  4. - someone who has malicious intent to harm the organization from the inside
  5. - employees or third parties who make a mistake that causes a problem
  6. - a set of general guidelines that outline the organizations plan for tackling the issues
  7. - Carrying out a new policy often falls to entities that were not the ones that formulated or adopted it
  8. - it should undergo detailed analysis regarding the time, cost and resources needed to bring about new policy
  9. - will help guide which course of action pursue
  10. - Every industry has its own set of laws, regulations, standards and best practices that business need to abide
  11. - it is a group strongly suggest drafting the following set of corporate policies and procedures
  12. - it needs to be noted that the policies do not provide instant solutions
  13. - know key assets get the details right
  14. - unauthorized disclosure of official, private, or proprietary information
  15. - reduce the risk of harm to your people, customers and partners
Down
  1. - someone whose account has been taken over by an outside attacker
  2. - reduce the risk of your information being lost, damaged or compromised
  3. -these purposes can encompass many forms of criminal activity,from minor theft through to terrorism
  4. - explains a specific action plan for carrying out a policy
  5. - any person who exploits or intend to exploit to harm the security
  6. - an issue must be clearly delineated and started as a discrete issue to receive support from various entities
  7. - all measured designed to prevent unsuitable individuals of doubtful loyalty
  8. - as companies expand and evolve globally can be challenging to follow
  9. policies and procedures keep operations from developing into complete chaos
  10. - weakest link in the security chain
  11. - Workplace policies have received a poor reputation, sometimes for being long or voluminous
  12. - can prevent workplace incidents with the correct safety measures in place if or when an incident occurs
  13. - policies need to be monitored to ensure they are working correctly that they are properly implemented
  14. act of intentionally trying to stop someone from achieving something or to stop something from developing
  15. - ket to right and wrong

30 Clues: - ket to right and wrong- weakest link in the security chain- know key assets get the details right- will help guide which course of action pursue- keep operations from devolving into complete chaos- explains a specific action plan for carrying out a policy- reduce the risk of harm to your people, customers and partners...

Contemporary Policing and Security 2023-04-19

Contemporary Policing and Security crossword puzzle
Across
  1. A campaign of spending cuts to reduce budget deficits and size of government
  2. A type of police culture that makes officers default to violence and aggression
  3. A term used for militarizing the police
  4. Something that is managed more and more in policing
  5. First Female Police Officer Hired by the Met
  6. Type of cameras that officers wear to ensure accountability
  7. Illegal acts committed by the crew of a private ship or vessel
  8. Ensuring that police effectively deliver services lawfully
  9. A part of the internet where illicit goods can be traded anonymously
Down
  1. A form of criminality operating across national borders
  2. Person shot by police in 2011 leading to the London riots
  3. A static or expandable weapon used for temporary incapacitation
  4. Country with the highest average police shootings in the world
  5. An outcome and also reason for use of force
  6. A cartel responsible for 80% of the global cocaine supply in 1994
  7. A controversial Act of Parliament proposed in 2021
  8. Criminal activities involving two of more individuals often across national borders
  9. A reason why almost 800m jobs could be lost by 2030
  10. A major form of crime that was 53% of all crimes in 2021
  11. Police cannot take this action despite pay disputes

20 Clues: A term used for militarizing the policeAn outcome and also reason for use of forceFirst Female Police Officer Hired by the MetA controversial Act of Parliament proposed in 2021A reason why almost 800m jobs could be lost by 2030Something that is managed more and more in policingPolice cannot take this action despite pay disputes...

Ch. 14 Security Crossword 2023-03-16

Ch. 14 Security Crossword crossword puzzle
Across
  1. Android trusted websites use this type files to create installation software.
  2. Sensitive information (student records)kept by educational institution.
  3. chip built onto the motherboard and generates and stores encryption keys to protect boot files.
  4. Social engineering attack that takes place over the phone.
  5. An Act that keeps individuals healthcare information private.
  6. Disables security features of a mobile device.
  7. Consists of programs that give the hacker root access to the target machine.
  8. Type of DDoS attack that tries to overload network devices like a firewall.
  9. Policy allows the administrator to remotely lock the device if it has been lost or stolen.
  10. Type of authentication that requires two authentication credentials to access an account.
  11. Collects and then forwards information regarding the victim's computer activities.
  12. Type of malware is self replicating, modify existing programs, and must be attached to a legitimate program to run.
  13. Network monitoring device or software that monitors and filters inbound and outbound traffic.
  14. Targeted phishing attack.
  15. Used to bypass building access control measures, such as a badge reader.
  16. Type of detection that the organization is actively looking for security flaws in its systems.
Down
  1. Type of data destruction that actual destroys the HDD.
  2. Logs every keystroke the user makes and then sends the keystroke report to the hacker.
  3. An algorithm that generates a value that represents the password.
  4. Malware that uses the victim computer's resources to mine for cryptocurrency on behalf of the hacker.
  5. Program that is hidden inside a legitimate program.
  6. Most vulnerable part of any network.
  7. Type of server that exists outside of a network that forwards all traffic through its gateway on the behalf of the user or the network.
  8. Type of formatting that uses tools in the operating system.
  9. Type of formatting that writes new sectors and tracks to the drive.
  10. Immediately removing the device from the network; disconnect shared drives and connections with other devices.
  11. Scans a victim's computer for files and encrypts the files so the user is unable to access them.
  12. Occurs when an attacker sends out an email that looks legitimate but has a malicious payload.
  13. An attacker can gather sensitive information by shoulder surfing on conversations.
  14. Type of detection that occurs when the security incident is discovered when not actively looking for it.

30 Clues: Targeted phishing attack.Most vulnerable part of any network.Disables security features of a mobile device.Program that is hidden inside a legitimate program.Type of data destruction that actual destroys the HDD.Social engineering attack that takes place over the phone.Type of formatting that uses tools in the operating system....

Security Awareness Crossword Puzzle 2021-09-15

Security Awareness Crossword Puzzle crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. The process of taking plain text and scrambling it into an unreadable format.
  3. A fraudulent email purportedly from a reputable company attempting to get personal information.
  4. The "C" in the CIA Triad. Protection of information from unauthorized access.
  5. Should be constructed of upper and lower case letters, numbers, and special characters.
  6. The address of a webpage.
  7. when a person tags along with another person who is authorized to gain entry into restricted areas.
  8. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  9. a malicious act that seeks to damage data, steal data, or disrupt digital life in general (two words)
  10. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the systems security.
  2. Verifying identity.
  3. A sequence of words or text used to control access to a computer; similar to a password.
  4. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. The "I" in the CIA Triad. Protection from unauthorized changes.
  6. The "A" in the CIA Triad. It ensures authorized users have access.
  7. an act of disguising a communication from an unknown source as being from a known, trusted source.
  8. Security took that creates a secure, encrypted connection between you and the Internet (acronym).
  9. the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.
  10. Facebook, Twitter, Instagram, etc. (two words)

20 Clues: Verifying identity.The address of a webpage.Facebook, Twitter, Instagram, etc. (two words)The "I" in the CIA Triad. Protection from unauthorized changes.The "A" in the CIA Triad. It ensures authorized users have access.The process of taking plain text and scrambling it into an unreadable format....

Food Security and Interconnections 2024-09-12

Food Security and Interconnections crossword puzzle
Across
  1. if people suffer from food insecurity, they may have a lack of this
  2. a situation where war exists between two countries
  3. the reduction in the amount of food produced due to things such as drought and floods
  4. having economic access to enough food due to enough money
  5. name of the country attacked by Russia which is experiencing food insecurity
  6. item used by refugees to plan their journey to another country
  7. name of the lake in Africa which is drying out causing food insecurity for communities
  8. a state where not everyone has consistent access to enough safe and nutritious food
  9. a tax placed on goods from overseas to make them more expensive and less appealing to buy
  10. the name of the place where leather goods are made
  11. the continent where many countries bought grain off Ukraine before the war
  12. the name given to people who take food from large bins outside supermarkets
  13. something people in poorer countries can't do online without a lap top
  14. word used when two countries buy and sell goods to each other
  15. something that is typical in factories in Bangladesh
  16. name of the device being placed by Russia on Ukrainian farms to stop farming
  17. name given to an item brought into Australia from overseas
  18. weather event that could cause food loss in northern Australia
Down
  1. food that is thrown out by a seller or producer
  2. having enough food of decent quality for sale in shops and markets
  3. something farm workers have done in areas of Ukraine attacked by Russia
  4. a word associated with clothes and shoes from Bangladesh
  5. unequal levels of access to communication technologies such as the internet in different countries
  6. the name given to a corporation which has factories in more than one country
  7. name given to an item sold by Australia to overseas countries
  8. the planting of trees and using technology to help plants grow is desert areas
  9. fruit that is an example of food waste in Australia
  10. a type of connection people feel to a place if they link the place to their religious beliefs
  11. name of the desert where a green revolution is taking place
  12. the name given to people who are linked to places outside their own country
  13. a type of connection people feel to a place if they make money from it
  14. continent with the lowest amount of food security

32 Clues: food that is thrown out by a seller or producercontinent with the lowest amount of food securitya situation where war exists between two countriesthe name of the place where leather goods are madefruit that is an example of food waste in Australiasomething that is typical in factories in Bangladesh...

Chapter 6 Security Plus 2024-09-21

Chapter 6 Security Plus crossword puzzle
Across
  1. instrumentation used for industrial process control
  2. involves isolating sensitive enterprise data
  3. Downloading unofficial and unapproved apps
  4. make a real-time operating system more resilient to attacks
  5. Examining code after the source code
  6. A coding technique for accounting for errors
  7. facilitates communication between devices and the cloud
  8. Circumventing the installed built-in limitations on Apple iOS devices
  9. Office policy allowing personal tech
  10. designed to replace or supplement a wired local area network
  11. security constraint in which a device’s small size results in low processing
Down
  1. testing software before the source code is compiled
  2. refers to integrating security into the application
  3. OS that guarantees real-time applications a certain capability within a specified deadline
  4. Sharing a phone's internet with another device
  5. Employee choose from company-approved devices
  6. Process ensuring data accuracy before processing
  7. computer hardware and software contained within a larger system
  8. Tools that allow a device to be managed remotely by an organization
  9. The ability of a system to handle growth efficiently
  10. coverage area is divided into hexagon-shaped cells
  11. The ability to resist attacks
  12. ensuring timely and reliable access to devices
  13. A system that controls multiple industrial control systems (ICS)

24 Clues: The ability to resist attacksExamining code after the source codeOffice policy allowing personal techDownloading unofficial and unapproved appsinvolves isolating sensitive enterprise dataA coding technique for accounting for errorsEmployee choose from company-approved devicesSharing a phone's internet with another device...

Security Summit Crossword Puzzle 2021-08-18

Security Summit Crossword Puzzle crossword puzzle
Across
  1. The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
  2. An acronym for volatile memory within a computer that holds active processes, data, and applications.
  3. This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
  4. Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
  5. A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
  6. A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
  7. This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
  8. A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
  9. ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
  10. ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Down
  1. _________________@lowes.com and the
  2. _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
  3. Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
  4. This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
  5. An access control model that restricts system access to authorized users based on job function(s).
  6. Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
  7. Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
  8. Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
  9. Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
  10. Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
  11. Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.

21 Clues: _________________@lowes.com and thePhish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.An access control model that restricts system access to authorized users based on job function(s).An acronym for volatile memory within a computer that holds active processes, data, and applications....

GSM ARchitecture,Frame,Security 2025-07-11

GSM ARchitecture,Frame,Security crossword puzzle
Across
  1. A cloak of anonymity for your true identity — frequently changed for stealth.
  2. A ritual of trust – proving you are who you claim, without shouting your name to the world.
  3. A repetitive rhythm of 26 TDMA pulses forming a foundational transmission structure.
  4. A short-lived encryption spell, generated every session using your private key and a random challenge.
  5. Time-based compartments that let multiple users talk without shouting over each other.
  6. A busy bee channel handling the behind-the-scenes chatter — call setup, handovers, and more.
  7. The chaotic spark of randomness used to ensure your identity check is truly fresh.
  8. This channel is like a digital loudspeaker, always shouting the cell ID and system info to everyone.
  9. The cell tower's brainchild — transmits and receives radio waves for user connectivity
Down
  1. A tiny memory wizard plugged into your phone, carrying your GSM passport.
  2. The heartbeat of a GSM frame — ticking every 4.615 milliseconds.
  3. A special burst whispering “stay in sync” to your device’s internal clock.
  4. The digital invisibility cloak – transforms voice and messages into unintelligible gibberish.
  5. A gateway node that acts as the diplomatic bridge between GSM and the outside PSTN/ISDN world.
  6. A nomadic guest list of users visiting a foreign GSM land.
  7. A digital fingerprint burned into your SIM card — your GSM identity number.
  8. The core nerve center — switching calls, handling mobility, and ensuring connections don’t drop.
  9. A digital vault storing your identity, subscriptions, and history permanently.
  10. The secret keeper — verifies you and helps encrypt your communications.
  11. The invisible conductor (orchestrator) managing multiple transceivers in a GSM symphony

20 Clues: A nomadic guest list of users visiting a foreign GSM land.The heartbeat of a GSM frame — ticking every 4.615 milliseconds.The secret keeper — verifies you and helps encrypt your communications.A tiny memory wizard plugged into your phone, carrying your GSM passport.A special burst whispering “stay in sync” to your device’s internal clock....

Information Security-unit-1 2022-11-18

Information Security-unit-1 crossword puzzle
Across
  1. first phase of sec sdlc
  2. probability of threat to system
  3. replicating malicious software that spreads throughout system
  4. makes server unavailable by flooding
  5. provides assurance that user has authority to access update or delete
  6. intentional or unintentional attempt to compromise information
  7. using social skills to access credentials
  8. program that monitor data travelling over a network
  9. a pillar of IS
  10. attacker routes large quantities of email to targer
Down
  1. automated process that interacts with other network services
  2. bypasses normal authentication process
  3. only those with sufficient privilege can access
  4. weakness or faults in a system
  5. intruder assumes a trusted ip address
  6. organizational Resources that is being protected
  7. attack which uses trial and error
  8. unsolicited commercial email
  9. proving identity that he or she claims
  10. potential danger to an asset

20 Clues: a pillar of ISfirst phase of sec sdlcunsolicited commercial emailpotential danger to an assetweakness or faults in a systemprobability of threat to systemattack which uses trial and errormakes server unavailable by floodingintruder assumes a trusted ip addressbypasses normal authentication processproving identity that he or she claims...

Pipsographer 8 2023-10-31

Pipsographer 8 crossword puzzle
Across
  1. The is the price a seller is willing to accept for a security
  2. A written order to a bank to pay a specific amount of money from one account to another
  3. A person who owns shares in a corporation
  4. The total value of final goods and services produced by a country's citizens, regardless of their location
  5. Efforts to provide banking and financial services to all segments of the population
  6. This happens when someone dies without leaving a will
  7. Rivalry among sellers trying to achieve goals such as profit
Down
  1. Costs incurred in the process of generating revenue
  2. The process by which financial transactions are settled
  3. An upward movement in the price or value of a security or asset
  4. A company having a group of subsidiaries engaged in unrelated activities
  5. Satisfaction or happiness derived from consuming goods and services
  6. The maximum price that a buyer is willing to pay for a security

13 Clues: A person who owns shares in a corporationCosts incurred in the process of generating revenueThis happens when someone dies without leaving a willThe process by which financial transactions are settledRivalry among sellers trying to achieve goals such as profitThe is the price a seller is willing to accept for a security...

Bank Protection Act 2015-07-22

Bank Protection Act crossword puzzle
Across
  1. What frequently used machine must meet all applicable UL standards of the bank?
  2. A requirement of the BPA is using ______ devices, such as prerecorded serial-numbered bills, or chemical and electronic devices.
  3. A requirement of the BPA is retaining a record of any robbery, ______, or larceny committed against the bank.
  4. A requirement of the BPA is maintaining a _______ that records activity in the banking office
Down
  1. The bank's security program shall designate a Bank Security _______
  2. Sixty Eight In what year was the BPA Passed?
  3. The BPA was passed by?
  4. The bank's security program shall designate a Bank Security ________
  5. of Directors It is the responsibility of the bank's ____ of ______ to comply with the BPA

9 Clues: The BPA was passed by?Sixty Eight In what year was the BPA Passed?The bank's security program shall designate a Bank Security _______The bank's security program shall designate a Bank Security ________What frequently used machine must meet all applicable UL standards of the bank?...

Entitlement Programs 2022-03-24

Entitlement Programs crossword puzzle
Across
  1. The form of Social Security meant for elderly people (based on age).
  2. Political issues important to most working class Americans (ex. wages and tax rates).
  3. Committees that decide how much money to spend on authorized programs.
  4. Annual cost of living adjustment mandated by law in welfare programs and Social Security.
  5. Committees that decide which programs to fund.
  6. Law that changed AFDC to TANF and tightened eligibility requirements.
Down
  1. Social Programs that distribute federal funds to all people who meet eligibility requirements.
  2. The form of Social Security meant for the disabled (people have to prove their disability to get this).
  3. Provides retirement benefits, health insurance, and support for the disabled and orphans.

9 Clues: Committees that decide which programs to fund.The form of Social Security meant for elderly people (based on age).Law that changed AFDC to TANF and tightened eligibility requirements.Committees that decide how much money to spend on authorized programs.Political issues important to most working class Americans (ex. wages and tax rates)....

Australia's connection with the world. 2017-03-02

Australia's connection with the world. crossword puzzle
Across
  1. emblem
  2. armor
  3. transporting
  4. shield
  5. gain
  6. information technology
  7. outward looking out
Down
  1. exchange
  2. employment
  3. Nation
  4. purchase
  5. computer
  6. recession
  7. ship

14 Clues: gainshiparmoremblemNationshieldexchangepurchasecomputerrecessionemploymenttransportingoutward looking outinformation technology

Health All the Way 2024-11-14

Health All the Way crossword puzzle
Across
  1. manner of living
  2. security
  3. pressure
  4. smile
  5. action
  6. intestines
Down
  1. disease
  2. tired
  3. supplements
  4. largest organ
  5. tension
  6. relatives
  7. fit
  8. delicious

14 Clues: fittiredsmileactiondiseasetensionsecuritypressurerelativesdeliciousintestinessupplementslargest organmanner of living

ICT Password 2024-03-06

ICT Password crossword puzzle
Across
  1. Voice Over Internet Protocol
  2. Example of a crypto currency
  3. World Wide Web
Down
  1. Information Communictaion Technology
  2. Technology to hide Ip address and location
  3. Crime Crime carried out using computer

6 Clues: World Wide WebVoice Over Internet ProtocolExample of a crypto currencyInformation Communictaion TechnologyCrime Crime carried out using computerTechnology to hide Ip address and location

Cloud Computing 2015-05-08

Cloud Computing crossword puzzle
Across
  1. Anbieter
  2. Wolke
  3. Berechtigung
  4. Verbindung
  5. Sicherheit
  6. zugreifen
Down
  1. nutzen
  2. Virtualisierung
  3. Anwendung
  4. stabilisieren
  5. Datenbank
  6. Nutzer
  7. aufbewahren

13 Clues: WolkenutzenNutzerAnbieterAnwendungDatenbankzugreifenVerbindungSicherheitaufbewahrenBerechtigungstabilisierenVirtualisierung

Authorities 2025-02-07

Authorities crossword puzzle
Across
  1. plângere
  2. ambasadă
  3. acord
  4. lege
  5. securitate
  6. penalizare
Down
  1. graniță
  2. semnătură
  3. amendă
  4. judecător
  5. permis
  6. martor
  7. avocat

13 Clues: legeacordamendăpermismartoravocatgranițăplângereambasadăsemnăturăjudecătorsecuritatepenalizare

Kaleidoscope 2025-03-25

Kaleidoscope crossword puzzle
Across
  1. attitude
  2. efforts
  3. future
  4. income
  5. diversity
  6. nature
Down
  1. difficulties
  2. shfit
  3. chances
  4. approach
  5. risks
  6. hierarchy
  7. safety

13 Clues: shfitrisksfuturesafetyincomenatureeffortschancesattitudeapproachhierarchydiversitydifficulties

Blackbird Girls Vocabulary 2024-03-11

Blackbird Girls Vocabulary crossword puzzle
Across
  1. A visible suspension of particles in the air, typically produced by burning or combustion.
  2. impossibility A situation that is extremely unlikely to occur based on statistical analysis.
  3. A deep red color.
  4. The Committee for State Security, the main security agency of the Soviet Union from 1954 to 1991, responsible for intelligence, counterintelligence, and internal security.
  5. drill A practice exercise conducted to prepare individuals for emergencies or hazardous situations.
  6. police A government agency responsible for intelligence gathering, surveillance, and maintaining internal security, often with extensive powers and operating covertly.
  7. A type of cured sausage, typically made of fermented and air-dried meat.
  8. jays A species of bird characterized by their blue plumage and noisy calls.
Down
  1. A building material made from a mixture of cement, aggregate (such as gravel or sand), water, and sometimes additives.
  2. A type of bird, often referring to the common blackbird, known for its black plumage and melodious song.
  3. Small birds belonging to the family Passeridae, typically brown or gray in color.
  4. power station A facility that generates electricity through nuclear reactions, usually involving the splitting of atoms in a reactor.
  5. Union Former socialist state in Eurasia, existing from 1922 to 1991, comprising several republics including Russia, Ukraine, Belarus, and others.
  6. The horizontal piece at the bottom of a window frame, often where objects can be placed.

14 Clues: A deep red color.A type of cured sausage, typically made of fermented and air-dried meat.jays A species of bird characterized by their blue plumage and noisy calls.Small birds belonging to the family Passeridae, typically brown or gray in color.The horizontal piece at the bottom of a window frame, often where objects can be placed....

Security and Safety 2022-11-02

Security and Safety crossword puzzle
Across
  1. person responsible for cost of lost keys
  2. responsible for overall safety/security of facility
  3. network ___________ center
  4. part of the NACI application
  5. this is always removed on a sign in sheet
  6. annual training for information security
  7. always secure me before walking away
Down
  1. created by CIM and given to employees
  2. this is everyone's responsibility!
  3. number of FTST counselors required at remote local
  4. three letter acronym for client information
  5. workstations are for ______ use only
  6. red over black and we'll be back (two words)

13 Clues: network ___________ centerpart of the NACI applicationthis is everyone's responsibility!workstations are for ______ use onlyalways secure me before walking awaycreated by CIM and given to employeesperson responsible for cost of lost keysannual training for information securitythis is always removed on a sign in sheet...

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. The economist who developed the Arbitrage Pricing Theory (APT) model
  2. The other name for non-diversifiable risk is -------------------------risk
  3. The economist who laid the foundations for the Modern Portfolio theory
  4. An opportunity where an investor earns riskless profit without making any net investment
  5. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  6. In the absence of secondary markets, this risk would be higher
  7. One of the researchers/economists who developed the CAPM model
  8. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
Down
  1. Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
  2. The other name for indifference curve is --------------curve
  3. --------------------is the slope of the security characteristic line
  4. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
  5. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  6. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
  7. CAPM is a market --------------model
  8. The line representing CAPM is the -----------------market line
  9. A conditional market order to sell stock if it drops to a given price (write without space)
  10. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
  11. In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable

19 Clues: CAPM is a market --------------modelThe other name for indifference curve is --------------curveThe line representing CAPM is the -----------------market lineIn the absence of secondary markets, this risk would be higherOne of the researchers/economists who developed the CAPM modelThe economist who developed the Arbitrage Pricing Theory (APT) model...

ONLY US 2021-10-19

ONLY US crossword puzzle
Across
  1. FEMALE SECURITY
  2. MUSICIAL
  3. MAN U!
  4. CONCIERGE
  5. VENDING
  6. CATERING SUPERVISOR
  7. SCOTTS LASSIE
  8. LANGUAGE EXPERT
  9. SCOOTER KING
  10. NEWLY MARRIED
  11. CHEEKY
Down
  1. COFFEE
  2. THE BOSS
  3. MR FIX IT
  4. ELECTRICIAN
  5. HEALTH & SAFETY
  6. RUGBY
  7. SANDWICHES
  8. PLUMBING
  9. HEAVY METAL
  10. RECEPTIONIST TC1

21 Clues: RUGBYCOFFEEMAN U!CHEEKYVENDINGTHE BOSSMUSICIALPLUMBINGMR FIX ITCONCIERGESANDWICHESELECTRICIANHEAVY METALSCOOTER KINGSCOTTS LASSIENEWLY MARRIEDFEMALE SECURITYHEALTH & SAFETYLANGUAGE EXPERTRECEPTIONIST TC1CATERING SUPERVISOR

gkhvvvlxxv 2021-10-14

gkhvvvlxxv crossword puzzle
Across
  1. hurry
  2. long but more
  3. straight
  4. alone
  5. youtube reaction vid
  6. saving
  7. safety
  8. ball hit target
  9. quizzes
  10. cream
  11. children
Down
  1. car place
  2. sunny city
  3. chicken
  4. carfuel
  5. come over
  6. close
  7. all of the things
  8. just us
  9. staying alive

20 Clues: hurryclosealonecreamsavingsafetychickencarfueljust usquizzesstraightchildrencar placecome oversunny citylong but morestaying aliveball hit targetall of the thingsyoutube reaction vid

German Crossword 2020-11-09

German Crossword crossword puzzle
Across
  1. traditional
  2. to belong to
  3. role
  4. illegitamate
  5. confidence
  6. source
  7. to be descended from
  8. foster family
  9. surrogate family
Down
  1. living together
  2. security
  3. single parent
  4. adoptive family
  5. between generation family
  6. home
  7. ownership
  8. love match
  9. patchwork family
  10. bond
  11. woman

20 Clues: homerolebondwomansourcesecurityownershiplove matchconfidencetraditionalto belong toillegitamatesingle parentfoster familyliving togetheradoptive familypatchwork familysurrogate familyto be descended frombetween generation family

Spotlight 8, 7A, kirjoita kaikki sanat yhteen ilman sanavälejä 2020-04-16

Spotlight 8, 7A, kirjoita kaikki sanat yhteen ilman sanavälejä crossword puzzle
Across
  1. uskoa
  2. kateellinen
  3. keskustelu
  4. rasistinen
  5. oppitunti
  6. valehtelija
  7. lupa
  8. pitkään aikaan
  9. saada selville
  10. onnistua
  11. epäystävällinen
Down
  1. katsoa
  2. turvallisuus
  3. ilman
  4. suosikki
  5. kiusallinen
  6. ongelmat
  7. keskusta
  8. keskustella
  9. pyytää anteeksi
  10. koe
  11. edessä
  12. selittää
  13. jutut
  14. kiusaaja
  15. viimeisin

26 Clues: koelupailmanuskoajututkatsoaedessäsuosikkiongelmatkeskustaselittääkiusaajaonnistuaoppituntiviimeisinkeskustelurasistinenkateellinenkiusallinenkeskustellavalehtelijaturvallisuuspitkään aikaansaada selvillepyytää anteeksiepäystävällinen

Vocab List #7 2023-04-26

Vocab List #7 crossword puzzle
Across
  1. - boat
  2. - gum
  3. - sun
  4. - suitcase
  5. - to walk
  6. - hotel
  7. - cloud
  8. - snake
  9. - security
  10. - butterfly
  11. - train
  12. - snorkle
Down
  1. - trick
  2. - rude
  3. - energy
  4. - fly
  5. - Photo/Image
  6. - airport
  7. - Perchance
  8. - candy
  9. - to fish
  10. - door
  11. - bomb
  12. - turtle
  13. - to board

25 Clues: - fly- gum- sun- rude- boat- door- bomb- trick- hotel- candy- cloud- snake- train- energy- turtle- airport- to walk- to fish- snorkle- suitcase- security- to board- Perchance- butterfly- Photo/Image

Travel Vocab 2020-04-10

Travel Vocab crossword puzzle
Across
  1. luggage
  2. ticket
  3. aisle
  4. delayed
  5. to land
  6. waiting room
  7. platform
  8. passenger
  9. arrival
  10. carry-on luggage
  11. sleeping car
  12. controller
  13. to take off
  14. international airport
  15. security agent
  16. departure
  17. on time
  18. flight
  19. seat
  20. bunk
  21. baggage claim
  22. to hope
  23. flight attendent
  24. to get/obtain
  25. luggage screening
Down
  1. customs
  2. in the train station
  3. first class
  4. trip travel
  5. derecho to go straight
  6. coach
  7. to give
  8. to check luggage
  9. safety belt
  10. event ticket
  11. passport
  12. boarding pass
  13. in the airport
  14. stop
  15. connection
  16. second class
  17. to miss a flight
  18. visa
  19. car wagon
  20. to go through security
  21. suitcase
  22. ticket
  23. window
  24. layover
  25. to see
  26. gate
  27. to turn
  28. ticket window
  29. counter

54 Clues: stopvisagateseatbunkaislecoachticketticketflightwindowto seecustomsluggagedelayedto giveto landarrivalon timelayoverto turncounterto hopeplatformpassportsuitcasepassengercar wagondepartureconnectioncontrollerfirst classtrip travelsafety beltto take offwaiting roomevent ticketsleeping carsecond classboarding passticket windowbaggage claim...

Foundation of Security and Cybercrimes 2024-11-20

Foundation of Security and Cybercrimes crossword puzzle
Across
  1. ensuring authorized personnel only
  2. accessible without delay
  3. steals, change, or destroy information
  4. unauthorized collection of information
  5. mass distribution of unsolicited messages
  6. unauthorized access to electronic data
  7. supplements the precautionary measures
  8. exclusive legal right to utilize artistic or musical material
  9. use of electronic communication to bully
  10. illegal threats
  11. restricts access to your computer to demand payment
  12. ensuring accuracy
  13. works without attaching to files
  14. allows logged in users use an application
Down
  1. method of breaching
  2. electronic lascivious exhibition of sexual activity
  3. imitating language or thought without authorization
  4. fraudulent sending of emails
  5. weakness
  6. assurance of the origin of information
  7. state of well-being
  8. violate security
  9. infects your computer
  10. action to protect the system
  11. anticipating threats
  12. common online fraud
  13. Someone cannot deny something

27 Clues: weaknessillegal threatsviolate securityensuring accuracymethod of breachingstate of well-beingcommon online fraudanticipating threatsinfects your computeraccessible without delayfraudulent sending of emailsaction to protect the systemSomeone cannot deny somethingworks without attaching to filesensuring authorized personnel only...

Dispatch Crossword 2025-08-28

Dispatch Crossword crossword puzzle
Across
  1. A place you might find our NYC team members
  2. To steal or check in
  3. The data of a system that must be saved because of its value
  4. Any person seeking to compromise a function or structure
  5. Tells you something is amiss
  6. Shows the elements that make up the assembly
  7. What are we known for?
  8. source of electric power
Down
  1. What we aim to prevent
  2. A type of security camera
  3. A type of security camera
  4. A place you might find our ROC team members
  5. 7 down
  6. onsite or offsite
  7. A string of characters used to confirm a user's identity
  8. A grocery store we work with
  9. A place you might find our FL team members
  10. A drawing of the worksite
  11. Something we install
  12. To interfere with in order to cause damage
  13. Device that detects a change

21 Clues: 7 downonsite or offsiteTo steal or check inSomething we installWhat we aim to preventWhat are we known for?source of electric powerA type of security cameraA type of security cameraA drawing of the worksiteA grocery store we work withTells you something is amissDevice that detects a changeA place you might find our FL team members...

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  2. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  5. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  8. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  9. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  10. OF SERVICE (DOS)
Down
  1. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  4. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  5. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  6. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  7. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
  8. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  9. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  10. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  11. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.

21 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang....

Privacy And Security 2022-11-15

Privacy And Security crossword puzzle
Across
  1. permission that patients give in order to disclose protected health information.
  2. It provides detailed instructions for handling and protecting a patient’s personal health information
  3. what are these considered Additional hardware, software, and licensing costs, resistance to giving up paper records, difficult data entry, training,computer downtime, such as expected failure or routine servicing, and confidentiality and security concerns, such as access of information to unauthorized individuals.
  4. The Health Insurance Portability and Accountability Act of 1996
  5. what are these considered… not leaving printers unattended, not coping confidential information if unauthorized, contacting the receiver and verifying the fax number.
  6. Hitting, kicking, shaking, pulling hair, pinching, choking,biting, burning, scalding,threatening with a weapon,inappropriate restraint, withholding food/water, not providing physical care, and abandonment.
Down
  1. information that is shared within a protected relationship
  2. How long are medical records kept for ?
  3. contain all personal information such as…full name,Living address,Medical history etc.
  4. rule It provides regulations that make sure that confidential records are kept secure
  5. includes protected health information, privacy, confidentiality, and disclosure
  6. Excessive demands, insults, humiliation,jealousy, control, isolation,stalking/threats,and lack of affection and support.
  7. Using sexual gestures, suggesting sexual behavior, and unwanted sexual touching or acts

13 Clues: How long are medical records kept for ?information that is shared within a protected relationshipThe Health Insurance Portability and Accountability Act of 1996includes protected health information, privacy, confidentiality, and disclosurepermission that patients give in order to disclose protected health information....

World of security 2021-05-01

World of security crossword puzzle
Across
  1. a holder of supplies for manufacturers
  2. to buy or sell goods or services
  3. the fact or condition of being regarded or treated as more important than others
  4. declared in law as unable to pay their debts
  5. a part or portion of a larger amount which is divided among a number of people
  6. a number of connected items or names written or printed consecutively, typically one below the other
  7. an amount of smth expressed as a number out of 100
Down
  1. a fact that shows that smth exists or is true
  2. a thing that is needed or wanted
  3. occurring once every year
  4. happening four times a year
  5. a large sum of money which you use to start a business
  6. to give your voice to somebody or register your choice

13 Clues: occurring once every yearhappening four times a yeara thing that is needed or wantedto buy or sell goods or servicesa holder of supplies for manufacturersdeclared in law as unable to pay their debtsa fact that shows that smth exists or is truean amount of smth expressed as a number out of 100a large sum of money which you use to start a business...

World of security 2021-05-01

World of security crossword puzzle
Across
  1. to buy or sell goods or services
  2. a thing that is needed or wanted
  3. a fact that shows that smth exists or is true
  4. declared in law as unable to pay their debts
  5. a number of connected items or names written or printed consecutively, typically one below the other
  6. a part or portion of a larger amount which is divided among a number of people
Down
  1. happening four times a year
  2. an amount of smth expressed as a number out of 100
  3. the fact or condition of being regarded or treated as more important than others
  4. a holder of supplies for manufacturers
  5. a large sum of money which you use to start a business
  6. occurring once every year
  7. to give your voice to somebody or register your choice

13 Clues: occurring once every yearhappening four times a yearto buy or sell goods or servicesa thing that is needed or wanteda holder of supplies for manufacturersdeclared in law as unable to pay their debtsa fact that shows that smth exists or is truean amount of smth expressed as a number out of 100a large sum of money which you use to start a business...

Social Security Puzzle 2024-02-22

Social Security Puzzle crossword puzzle
Across
  1. enforcers
  2. ______ age
  3. meets requirements
  4. not a pension
  5. out with the old (system)
  6. Short-term benefit
Down
  1. Pension changes (2012)
  2. DSS' Birthday
  3. 1 week's contribution
  4. Quantum of Pension
  5. long term benefit
  6. street location
  7. In with the new

13 Clues: enforcers______ ageDSS' Birthdaynot a pensionstreet locationIn with the newlong term benefitQuantum of Pensionmeets requirementsShort-term benefit1 week's contributionPension changes (2012)out with the old (system)

Water Security Crossword! 2020-04-14

Water Security Crossword! crossword puzzle
Across
  1. the quantity of water that can be used for human purposes without significant harm to ecosystems or other users.
  2. the measure of the total amount of water used by the customers within the water system.
  3. Issues related to agriculture, industry (including energy production), oil, fecal matter, and litter, may all contribute to this problem.
  4. the most common method used to desalinate water
  5. the collection of precipitation which falls on the roof of buildings.
  6. used to increase the amount of water stored in aquifers. It is widely used in some countries to enhance water supplies, such as in the Netherlands, Germany, and the USA.
  7. the removal of salt from seawater to make it suitable for drinking. It is an energy-intensive process and therefore usually expensive.
Down
  1. This is what is causing a shift in water availability and why some areas that previously had sufficient water now face droughts. These droughts are becoming more frequent and prolonged, causing water insecurity.
  2. used water that is not clean enough to be used again. This water usually originates from toilets.
  3. A ratio that rates countries from 0 to 5: the higher the number, the higher the water stress. The ratio compares total withdrawals to total available renewable supply on an annual basis (demand/supply).
  4. natural or artificially created lakes, used to collect and store water.
  5. used water that is clean enough to be used again. This water originates from baths, showers, washbasins, and washing machines
  6. access to sufficient, sustainable quantities of clean water and sanitation.

13 Clues: the most common method used to desalinate waterthe collection of precipitation which falls on the roof of buildings.natural or artificially created lakes, used to collect and store water.access to sufficient, sustainable quantities of clean water and sanitation.the measure of the total amount of water used by the customers within the water system....

p.46 2025-08-13

p.46 crossword puzzle
Across
  1. база данных
  2. предупреждение
  3. должностное лицо
  4. рассматривать, принимать во внимание
  5. почти
  6. увеличить
  7. в соответсвии с
  8. позволять себе
  9. недавний
  10. предотвратить
Down
  1. среднестатистический
  2. жертва
  3. защита
  4. уязвимый
  5. недостаток (чего-то)
  6. уверенный
  7. безопасность

17 Clues: почтижертвазащитауязвимыйнедавнийуверенныйувеличитьбаза данныхбезопасностьпредотвратитьпредупреждениепозволять себев соответсвии сдолжностное лицосреднестатистическийнедостаток (чего-то)рассматривать, принимать во внимание

Pluralsight Security Post Orders 2020-09-04

Pluralsight Security Post Orders crossword puzzle
Across
  1. Use this program to send passdowns
  2. Leave all animals ____
  3. We observe and _______
  4. Form once per shift (2 wds)
  5. Your pants must be black _____ slacks
  6. Use this program to clock-in/out
  7. Be ____ and aware of your surrounding
  8. Send these to Devon every shift (2 wds)
  9. Wear it or you might share it
  10. Keep these on you during shift
Down
  1. Patrol that checks EVERYTHING (2 wds)
  2. ___ your patrol; do not jog or run
  3. Wear these so you can see...s
  4. ___ Perimeter patrols per 8 hr shift
  5. Excellent ____ customer service
  6. Duck, ___, and Hold during an earthquake.
  7. Should always be your first priority.
  8. Check this throughout your shift.
  9. No electronic devices unless __
  10. Your shoes must be black and _____
  11. Documents and tracks EVERYTHING.
  12. Stay off of these while on patrol

22 Clues: Leave all animals ____We observe and _______Form once per shift (2 wds)Wear these so you can see...sWear it or you might share itKeep these on you during shiftExcellent ____ customer serviceNo electronic devices unless __Use this program to clock-in/outDocuments and tracks EVERYTHING.Check this throughout your shift....

Security Awareness Puzzle 2015 2015-02-17

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
  2. Passwords should be _________ every 3-4 months.
  3. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. Never share your _________ with another person.
  5. A password is stronger by using a combination of both upper and lower case ___________.
  6. A software that is designed to detect and destroy computer viruses.
  7. Applied to data to protect it from unauthorized use in case of theft or loss.
  8. Use __________ passwords for the various accounts that you may have.
  9. Also known as malicious software; any program or file that is harmful to a computer user.
  10. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  11. A computer ______ can be considered as the modern counterpart of a paper document.
  12. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  13. Healthy email always includes a clear and specific ____________ line.
  14. Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
  15. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
Down
  1. __________ is a popular web search engine.
  2. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  3. Use this tool to dispose of documents that contain personal or financial information.
  4. Do not send __________ information over email unless it is encrypted.
  5. A secure password should contain at least one of these.
  6. Email scam or attempt to trick you into giving your password or personal information.
  7. Do not leave your laptop or computer ____________.
  8. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  9. Choose a password that is easy for you to ____________ but hard for someone to guess.
  10. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
  11. To ________ the amount of spam you receive, be careful who you give your email address to.
  12. The state of being free from danger or threat.
  13. Another word for understanding, knowledge and well-informed.
  14. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
  15. Passwords should always be at least this many characters long.

30 Clues: __________ is a popular web search engine.The state of being free from danger or threat.Passwords should be _________ every 3-4 months.Never share your _________ with another person.Do not leave your laptop or computer ____________.A secure password should contain at least one of these.Another word for understanding, knowledge and well-informed....

Security Awareness Puzzle 2015 2015-02-11

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. To protect personal information, avoid sending it via_________.
  2. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
  3. Never share your _________ with another person.
  4. Healthy email always includes a clear and specific ____________ line.
  5. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  6. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  7. Choose a password that is easy for you to ____________ but hard for someone to guess.
  8. Do not leave your laptop or computer ____________.
  9. Passwords should be _________ every 3-4 months.
  10. To ________ the amount of spam you receive, be careful who you give your email address to.
  11. When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
  12. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
  13. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
  14. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  15. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
  16. Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
  17. Email scam or attempt to trick you into giving your password or personal information.
Down
  1. A computer ______ can be considered as the modern counterpart of a paper document.
  2. Also known as malicious software; any program or file that is harmful to a computer user.
  3. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
  4. Passwords should always be at least this many characters long.
  5. A secure password should contain at least one of these.
  6. Do not send __________ information over email unless it is encrypted.
  7. A software that is designed to detect and destroy computer viruses.
  8. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. A password is stronger by using a combination of both upper and lower case ___________.
  10. Use this tool to dispose of documents that contain personal or financial information.
  11. Use __________ passwords for the various accounts that you may have.
  12. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  13. Do not _______ your password down or attach it to your keyword or monitor.
  14. Do not __________ your password or account with anyone.
  15. Never forward any _________ letter.
  16. Always ___________ your computer when you leave your desk.
  17. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.

34 Clues: Never forward any _________ letter.Never share your _________ with another person.Passwords should be _________ every 3-4 months.Do not leave your laptop or computer ____________.A secure password should contain at least one of these.Do not __________ your password or account with anyone.Always ___________ your computer when you leave your desk....

Food Security Ft. Nestle 2015-11-29

Food Security Ft. Nestle crossword puzzle
Across
  1. Rights Fundamental rights belonging to individuals in which the government may not interfere
  2. A system that maintains its own viability by using techniques that allow for continual reuse
  3. Ease of use, approach, reach
  4. Providing nourishment, especially to a high degree
  5. A diligent and systematic investigation into a subject in order to discover facts, theories, etc.
  6. Meeting minimum requirements
  7. An endangering, especially of one's reputation; A settlement as a result of mutual concession
  8. Involving one's personal resources of money
Down
  1. Suitable or ready for use
  2. Barely sufficient; as much as necessary
  3. Dependable, secure, free from danger
  4. Fundamental systems and facilities servicing an area
  5. Adequate for the purpose; enough
  6. The state of being free from danger or threat
  7. The entire body of individuals born and living at the same time
  8. Living in companionship as opposed to in isolation
  9. Performing in the best possible manner with least waste of time and effort
  10. The planning, implementation, and coordination of the details of an operation
  11. Of or relating to that which is material
  12. Relative standing; rank

20 Clues: Relative standing; rankSuitable or ready for useEase of use, approach, reachMeeting minimum requirementsAdequate for the purpose; enoughDependable, secure, free from dangerBarely sufficient; as much as necessaryOf or relating to that which is materialInvolving one's personal resources of moneyThe state of being free from danger or threat...

IT Security Awareness Contest 2022-04-15

IT Security Awareness Contest crossword puzzle
Across
  1. the use of two different components to verify your identity
  2. type of tolerance rkmiles has to any actions that create a hostile work environment
  3. type of grammar that typically raise a red flag for phishing emails
  4. the first line of defense against cyber criminals
  5. what you should not let anyone do when you type in your password
  6. a math function to make data only available with a key
  7. malicious software that makes date or systems unusable until the victim makes a payment
  8. where data can be accessed as a service
  9. when you use the internet you leave this type of footprint behind
  10. recently discovered vulnerabilities, not yet known to vendors or antivirus companies that hackers can exploit
Down
  1. can be hardware or software
  2. program that can automate task
  3. mass emails sent to many people asking for sensitive information
  4. virus disguised as legit software
  5. type of consequence that a sender is asking from you to avoid
  6. software to assist in detecting virus's
  7. what you do with your mouse to see where a hyperlink will take you
  8. email designed to look like it's from a person you know
  9. what department should you get approval from for downloading software
  10. what a password should be

20 Clues: what a password should becan be hardware or softwareprogram that can automate taskvirus disguised as legit softwaresoftware to assist in detecting virus'swhere data can be accessed as a servicethe first line of defense against cyber criminalsa math function to make data only available with a key...

Security N.1 bis 2023-01-29

Security N.1 bis crossword puzzle
Across
  1. L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
  2. Una delle password più comuni nel 2022: un evergreen!
  3. Genera e memorizza in modo sicuro password complesse in un unico luogo
  4. Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
  5. Malware che si replica per diffondersi ad altri computer della rete
  6. Quando i criminali usano gli sms truffa stanno cercando di fare….
  7. Simile a una password, ma generalmente più lunga per una maggiore sicurezza
  8. Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
  9. Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
Down
  1. _________ sempre il computer quando si lascia la scrivania
  2. Non aprire se non ci si fida del mittente
  3. Programma che registra i tasti premuti da un utente
  4. Il computer avrà molti popup se ne viene infettato
  5. Un programma software progettato per prevenire i virus
  6. Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
  7. Chiamate o messaggi vocali fraudolente
  8. Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
  9. Quella a 2 fattori è un tipo di ....... forte
  10. Una persona che prende o usa le informazioni del vostro computer
  11. L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
  12. Interazione online ostile che comporta messaggi di insulto tra gli utenti

21 Clues: Chiamate o messaggi vocali fraudolenteNon aprire se non ci si fida del mittenteQuella a 2 fattori è un tipo di ....... forteIl computer avrà molti popup se ne viene infettatoProgramma che registra i tasti premuti da un utenteUna delle password più comuni nel 2022: un evergreen!Un programma software progettato per prevenire i virus...

2nd Quarter Security training 2023-04-17

2nd Quarter Security training crossword puzzle
Across
  1. Refer media questions to the CEO or ___ ___ ___.
  2. ____ if there is an accessible escape path
  3. Always take threats___.
  4. ___ silent alarms as soon as you feel safe to do so.
  5. Inform members of emergency and request they ___ the building.
  6. Ask witnesses to fill out an ___ ___.
  7. Once the robber leaves ___ the doors and put up closed signs.
  8. During a medical emergency have someone ___ with the member while another calls 911.
  9. If safe, secure cash and ___ ___ information before evacuating.
Down
  1. ___ you have been robbed.
  2. When you see a fire ___ the fire alarm to alert others.
  3. Dial ___ to report incident only if it is safe.
  4. A ____ is located under each phone.
  5. The robbery packet is located on the back of the ___ ___.
  6. Use the ___ to document details of the call for bomb and kidnapping threats.
  7. ____ in a secure location if you cannot escape
  8. Primary meeting point is at the ___ dot.
  9. The alternate meeting point is ___ if it is unsafe at the primary.
  10. As a last resort ____ to save yourself
  11. Don't be a ___.
  12. Put up a ___ paper used to signal all clear to law enforcement.

21 Clues: Don't be a ___.Always take threats___.___ you have been robbed.A ____ is located under each phone.Ask witnesses to fill out an ___ ___.As a last resort ____ to save yourselfPrimary meeting point is at the ___ dot.____ if there is an accessible escape path____ in a secure location if you cannot escapeDial ___ to report incident only if it is safe....

Security Analysis & Portfolio Management 2022-05-15

Security Analysis & Portfolio Management crossword puzzle
Across
  1. The ability to buy or sell an asset quickly at a known price.
  2. The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  3. The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
  4. --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
  5. The market ------------------is used as a benchmark to evaluate the performance of funds.
  6. ------------------------was one of the originators of Capital Asset Pricing model.
  7. The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
  8. ------------------------laid the foundations to the Portfolio theory.
  9. The ----------------------theorem suggests that investment and financing are two different decisions.
Down
  1. The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
  2. Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
  3. A -------------form EMH is when prices reflect all historical information.
  4. ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
  5. A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
  6. The --------------market is used for lending and borrowing short-term funds.
  7. The --------------measure is calculated as excess returns per unit of systematic risk.
  8. The --------------------market line is the graphical representation of CAPM.
  9. -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
  10. --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
  11. The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.

20 Clues: The ability to buy or sell an asset quickly at a known price.------------------------laid the foundations to the Portfolio theory.A -------------form EMH is when prices reflect all historical information.The --------------market is used for lending and borrowing short-term funds....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Software that gathers data by monitoring key press on the user/s keyboard.
  2. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  3. Unsolicited email sent over the internet.
  4. Used to verify that data comes from a secure and trusted source.
  5. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  6. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  7. Authentication that relies on certain unique characteristics of human beings.
  8. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  9. Refers to safety when using the internet like keeping personal data safe.
  10. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  11. Web applications or website that allow users to create and edit web pages using any web browser.
  12. The act of gaining unauthorized access to a computer system.
Down
  1. Refers to the need to respect other user's views and display common courtesy when posting views online.
  2. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  3. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  4. A type of protocol that allows data to be sent and received securely over the internet.
  5. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  6. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  8. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  9. Uses SMS system of mobile phones to send out fake text messages.
  10. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.

22 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Web applications or website that allow users to create and edit web pages using any web browser.
  2. Software that gathers data by monitoring key press on the user/s keyboard.
  3. Uses SMS system of mobile phones to send out fake text messages.
  4. A type of protocol that allows data to be sent and received securely over the internet.
  5. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  6. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  8. Authentication that relies on certain unique characteristics of human beings.
  9. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  10. Used to verify that data comes from a secure and trusted source.
  11. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  12. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
  1. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  2. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  3. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  4. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  5. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  6. Refers to the need to respect other user's views and display common courtesy when posting views online.
  7. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  8. The act of gaining unauthorized access to a computer system.
  9. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  10. Unsolicited email sent over the internet.
  11. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  12. Refers to safety when using the internet like keeping personal data safe.

24 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Uses SMS system of mobile phones to send out fake text messages.Used to verify that data comes from a secure and trusted source.Refers to safety when using the internet like keeping personal data safe....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  2. Used to verify that data comes from a secure and trusted source.
  3. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  4. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  5. A type of protocol that allows data to be sent and received securely over the internet.
  6. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  7. Uses SMS system of mobile phones to send out fake text messages.
  8. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  9. Web applications or website that allow users to create and edit web pages using any web browser.
  10. Refers to safety when using the internet like keeping personal data safe.
  11. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  12. Software that gathers data by monitoring key press on the user/s keyboard.
Down
  1. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  2. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  3. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  4. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  5. Authentication that relies on certain unique characteristics of human beings.
  6. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  7. The act of gaining unauthorized access to a computer system.
  8. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  9. Refers to the need to respect other user's views and display common courtesy when posting views online.
  10. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  11. Unsolicited email sent over the internet.
  12. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  13. A combination of letters, symbols and numbers that protects a system and allows a user to login.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. The M in HTML
  2. Famous Linux OS for Penetration Testing
  3. Mac address is a 12 byte. What type of numbers?
  4. Not bind shell
  5. Malware that encrypts data for money
  6. TCP & UDP runs in that OSI Layer
  7. Network authentication protocol
  8. Famous proxy tool for web penetration testing
  9. which is the first layer in OSI
  10. Goddess of Cyprus,Venus...
  11. decode this hex -> 7365637572697479
  12. 127.0.0.1 IP address
  13. You can use it for anonymity
Down
  1. name of first virus
  2. Swiss army knife of hacking tool/frequently used as backdoor
  3. Spyware, Trojan, worm, virus
  4. SSH means
  5. A cat tries to catch it but you can use it with your computer
  6. Cross Site _____ Attack
  7. Famous packet analyzer
  8. init 6
  9. IEE 802.11 describes which type of network?
  10. control and store your repo
  11. not one
  12. Which protocol is used by ping command
  13. The Ripper Cracking tool
  14. Not TCP
  15. Protocol that gives access to a user on a remote system

28 Clues: init 6not oneNot TCPSSH meansThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoSpyware, Trojan, worm, virusYou can use it for anonymityNetwork authentication protocolwhich is the first layer in OSI...

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
  2. The M in HTML
  3. Famous Debian Distribution for Penetration Testing
  4. A cat tries to catch it but you can use it with your computer
  5. Which protocol is used by ping command
  6. Goddess of Cyprus,Venus...
  7. name of first virus
  8. Malware that encrypts data for money
  9. Famous proxy tool for web penetration testing
  10. Not bind shell
  11. Famous packet analyzer
  12. You can use it for anonymity
  13. which is the first layer in OSI
  14. decode this hex -> 7365637572697479
  15. Swiss army knife of hacking tool/frequently used as backdoor
Down
  1. control and store your repo
  2. Spyware, Trojan, worm, virus
  3. init 6
  4. 127.0.0.1 IP address
  5. Network authentication protocol
  6. IEE 802.11 describes which type of network?
  7. Not TCP
  8. TCP & UDP runs in that OSI Layer
  9. Mac address is a 12 byte. What type of numbers?
  10. The Ripper Cracking tool
  11. Cross Site _____ Attack
  12. Protocol that gives access to a user on a remote system

27 Clues: init 6Not TCPThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoSpyware, Trojan, worm, virusYou can use it for anonymityNetwork authentication protocolwhich is the first layer in OSI...

Final Crossword Security Plus 2024-06-04

Final Crossword Security Plus crossword puzzle
Across
  1. inserts statements to manipulate a database server
  2. hiding data within an ordinary, nonsecret file
  3. Removing user accounts
  4. ensuring that an organization adheres to laws and regulations
  5. It only goes off after certain conditions are met
  6. Subset of the board that manages governance issues
  7. bruteforce collision attack that exploits the probability theory
  8. Threat actors who are strongly motivated by philosophical or political beliefs.
  9. involves isolating sensitive enterprise data
  10. pose a threat from the position of a trusted entity
  11. refers to integrating security into the application
  12. A device that distributes work across a network
  13. An attack that copies data and then uses it
  14. The entity that is responsible for digital certificates
  15. Individual or entity who is responsible for attacks
  16. is a finite sequence of rigorous instructions
  17. Data that is encapsulated within a secure outer shell
  18. Threat actors who are employed by their own government to carry out attacks
Down
  1. Vulnerability for which there are no days of advanced warning
  2. The rapid detection and elevation of a threat incident
  3. A downgrade attack
  4. server within the DMZ that is used to connect two dissimilar security zones
  5. features and characteristics of the individual
  6. two or more different messages that produce the same hash value
  7. Standard preconfigured passwords
  8. decentralized, distributed and public digital ledger
  9. An AP set up by an attacker to mimic an authorized AP
  10. A malicious program that uses a computer network to replicate
  11. Closing unused ports and disabling unnecessary protocols
  12. resource that is not possible due to geography
  13. An unauthorized AP that allows an attacker to bypass many of the network security
  14. denial of the truth or validity of something
  15. validate a main domain along with all subdomains
  16. evidence or proof of something
  17. A product that consolidates real-time security monitoring and management
  18. performs a real-time lookup of a certificate’s status
  19. unauthorized copying of data
  20. object whose state cannot be modified after it is created
  21. Identifying and mitigating risks brought on by a third party
  22. retains historical documents

40 Clues: A downgrade attackRemoving user accountsunauthorized copying of dataretains historical documentsevidence or proof of somethingStandard preconfigured passwordsAn attack that copies data and then uses itdenial of the truth or validity of somethinginvolves isolating sensitive enterprise datais a finite sequence of rigorous instructions...

Privacy and Security Online 2024-04-25

Privacy and Security Online crossword puzzle
Across
  1. changes a browser's behavior, settings, or appearance without user consent
  2. theft A type of scam where someone tries to trick you into giving them your personal information
  3. A setting that allows you to control who can see your profile and posts
  4. A type of software that can harm your computer or steal your information
  5. A piece of software that can protect your computer from online threats
  6. A place where you can safely store your passwords and other sensitive information
  7. A symbol or character that represents you online
  8. when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
  1. the safe and responsible use of information and communication technologies
  2. A type of attack where someone pretends to be someone else to gain access to your personal information
  3. sharing photos, videos, and messages with other people
  4. piracy the illegal copying or distribution of copyrighted material via the Internet
  5. users open the app an average of 19 times a day
  6. a collective term for websites and applications that focus on communication
  7. System used to protect computer systems
  8. Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
  9. You should never share this with strangers online
  10. keep your digital doors locked
  11. virus a type of malware that downloads onto a computer disguised as a legitimate program
  12. short and less than 8 characters

20 Clues: keep your digital doors lockedshort and less than 8 charactersSystem used to protect computer systemsusers open the app an average of 19 times a dayA symbol or character that represents you onlineYou should never share this with strangers onlinesharing photos, videos, and messages with other people...

Hopsital safety and security 2024-10-14

Hopsital safety and security crossword puzzle
Across
  1. Summoning Security.
  2. Measures taken to ensure only authorized personnel can enter certain areas.
  3. Personal Protective Equipment used to protect healthcare workers from infection.
  4. An identification card worn by hospital staff.
  5. A strict isolation imposed to prevent the spread of disease.
  6. The provision of fresh air to a room, building, etc., which is crucial in preventing the spread of airborne diseases.
  7. A substance or product used to reduce the number of germs on surfaces or skin.
  8. The presence of an infectious agent on a body surface, surgical instrument, or other inanimate articles.
  9. A set of rules or procedures to be followed in medical or clinical settings.
  10. A person employed to protect the premises and ensure safety.
Down
  1. Continuous observation of a place, person, or activity.
  2. An emergency protocol to prevent people from entering or leaving.
  3. A part of PPE that protects hands from contamination.
  4. A designated route for leaving a building in case of an emergency.
  5. The process of separating sick individuals from healthy ones to prevent the spread of disease.
  6. The process of making something free from bacteria or other living microorganisms.
  7. Practices to maintain health and prevent disease, especially through cleanliness.
  8. A temporary identification issued to visitors.
  9. Closed-circuit television used for monitoring.
  10. A device that signals the presence of a security breach.

20 Clues: Summoning Security.An identification card worn by hospital staff.A temporary identification issued to visitors.Closed-circuit television used for monitoring.A part of PPE that protects hands from contamination.Continuous observation of a place, person, or activity.A device that signals the presence of a security breach....

Chapter 5 security Plus 2025-03-22

Chapter 5 security Plus crossword puzzle
Across
  1. A request that has been fabricated
  2. takes advantage of a vulnerability to move to restricted directories
  3. store data in RAM beyond the boundaries
  4. An attack in which a website accepts user input without validating it
  5. hides its presence on the device
  6. A sign an attack is currently underway
  7. A malicious program that uses a computer network to replicate
  8. move from the root directory to other restricted directories
  9. An attack that copies data and then uses it
  10. account that is inaccessible through a normal login attempt
  11. Malware that replicates by infecting other files or programs
  12. An indicator of attack in which data is no longer accessible
  13. An attack in which threat actors introduce something into RAM
  14. Closing unused ports and disabling unnecessary protocols
  15. inserts statements to manipulate a database server
Down
  1. depletion of memory or processing capabilities
  2. resource that is not possible due to geography
  3. It only goes off after certain conditions are met
  4. threat actor gains illicit access of elevated rights or privileges
  5. Software installed on a device without the user requesting it
  6. Malware disguised as something useful or legitimate
  7. A cookie that is only sent to the server with an encrypted request
  8. Installing software security updates
  9. captures and stores each keystroke that a user types on the computer’s keyboard
  10. Secure space for running untrusted software
  11. monitors endpoints and immediately blocks a malicious attack

26 Clues: hides its presence on the deviceA request that has been fabricatedInstalling software security updatesA sign an attack is currently underwaystore data in RAM beyond the boundariesAn attack that copies data and then uses itSecure space for running untrusted softwaredepletion of memory or processing capabilities...

The Function and Structure of the United Nations 2024-07-21

The Function and Structure of the United Nations crossword puzzle
Across
  1. Adopted by the UN International Court of Justice, fundamental human rights and freedoms. Universal ___ of Human Rights
  2. Where all 193 member states meet, (General_)
  3. UN staff are international civil ___
  4. Carries out day-to-day work, administers programs, and services other principal organs of the UN.
  5. Location of the International Court of Justice
  6. Established to supervise Trust Territories, ensuring their preparation for self-government or independence. (___ council)
  7. Responsible for maintaining international peace and security. It has 15 members, and its decisions are binding.
Down
  1. The principal judicial organ of the UN, settling legal disputes between states and providing advisory opinions. (4 words)
  2. Ambitious targets set by the UN to address global challenges like poverty, health, and education.
  3. Permanent members can vote "no" to any decision suggested by the Security Council.
  4. ____ forces may prevent conflict through mediation and dispute resolution
  5. UN's efforts to prevent conflicts and maintain peace in troubled regions.
  6. Members China, France, Russia, UK and USA
  7. A specialized agency within the UN system, focusing on education, science, culture, and communication.

14 Clues: UN staff are international civil ___Members China, France, Russia, UK and USAWhere all 193 member states meet, (General_)Location of the International Court of Justice____ forces may prevent conflict through mediation and dispute resolutionUN's efforts to prevent conflicts and maintain peace in troubled regions....