cyber security Crossword Puzzles
Unit 3: the golden state 2020-03-01
23 Clues: Zitat • Flamme • obwohl • Umwelt • häufig • Mittag • Prozess • fließen • Drehbuch • Mikrofon • wechseln • glänzend • entspannt • Erklärung • Waldbrand • Sicherheit • Aufenthalt • Landschaft • Berühmtheit • niedlich,süß • Jahrgangsstufe • very important person • the year has to of them
Nouns 1: Introducing yourself 2023-03-08
21 Clues: age • home • name • gender • single • married • address • language • divorced • unmarried • last name • city, town • first name • nationality • phone number • email address • country, land • date of birth • first language • personal details • social security number
April 12 Homework menu 2023-04-12
25 Clues: tip • bed • maid • cash • taxi • boat • stamp • guide • closed • castle • pillow • palace • blanket • customs • Station • oppened • security • suitcase • post_card • cathedral • consulate • hand luggage • subway/metro • Poste_office • bottle of water
1.1 Vocab - Sp 3 2022-01-12
22 Clues: ID • gate • ticket • flight • customs • luggage • airport • arrival • security • suitcase • passport • To board • To travel • departure • To forget • itinerary • To believe • To confirm • male passenger • screen/monitor • female passenger • To make a mistake
E-safety 2020-05-06
Across
- something designs to break your computer
- don't share any ..... information
- you don't know these people
- these people try to get your personal information
Down
- what is bullying online
- something you should have in a password
- don't open any ..... from strangers
- something lots of people worldwide use
- what kind of person do you talk to when you are worried
9 Clues: what is bullying online • you don't know these people • don't share any ..... information • don't open any ..... from strangers • something lots of people worldwide use • something you should have in a password • something designs to break your computer • these people try to get your personal information • what kind of person do you talk to when you are worried
Chapter 2 notes 2022-11-21
Across
- vast majority of US corporations
- people who work
- financial investment
- money for realestate
- services related to money
- buyers and sellers of stock
- public info
- account owner makes deposit
- withdraw cash and pay
- trading small daily
- agreed-upon amount within specified time
- illegal private gained info
- pay for security purchases
- customers required to apply
Down
- manage supply of money and intrest
- face value of stock
- interest over 10 years
- directly to public investors
- investors who borrow money
- accepts money from customers
- nonprofit institution
- largest category deposit
- investing long term
- document guaranteeing money
- people who lend money
- shares openly traded
- quick investing gains
- assist you with purchasing stocks and bonds
- money directly in account
- report given annualy
30 Clues: public info • people who work • face value of stock • investing long term • trading small daily • financial investment • money for realestate • shares openly traded • report given annualy • nonprofit institution • people who lend money • quick investing gains • withdraw cash and pay • interest over 10 years • largest category deposit • services related to money • money directly in account • ...
Domestic & International Airports 2019-06-13
Across
- an airline
- the place you pass before you become airside
- what did the resuce team use for splints after flight 801's crash
- a limit on something
- get on the plane
- anyone can access this part of the airport
- ______ controller
- passenger
- a covered walkway which allows passengers to get to aircraft
Down
- very first phase of flight
- what does FAA believe is the most common cause of runway incursion
- ideal solution for evacuating passengers from a stricken aircraft
- greenlights indicate the start of runway, red indicates the end
- germanys national carrier
- ID you present to the CSA while getting boarding pass
- phonetic alphabet W
- people with the glow sticks and help with ramps
- abbreviation for liquids, aerosols and gels
- main class in a flight
- abbreviation for aviation security service
20 Clues: passenger • an airline • get on the plane • ______ controller • phonetic alphabet W • a limit on something • main class in a flight • germanys national carrier • very first phase of flight • anyone can access this part of the airport • abbreviation for aviation security service • abbreviation for liquids, aerosols and gels • the place you pass before you become airside • ...
DO YOU KNOW SOUTH? 2023-06-22
Across
- what everyone was given and few gave back
- seat for you to sit and wait (near the security desk)
- best meal on Wednesdays
- Field day on the last day
- Security guard at the "T"
- tallest sixth grade teacher
- tests you must pass to move on
- outdoor area to eat
- loudest room in the building
Down
- principal at the beginning of the year
- Street name where South is located
- The boss
- yearly event to get free food and books
- Where most exercise happens
- place to store your things
- must be off and not seen
- Administator who played in the Faculty/staff Basketball game
- often asked to be removed
- grade level when starting at South
- A quiet place to go when your teacher asks you to leave
20 Clues: The boss • outdoor area to eat • best meal on Wednesdays • must be off and not seen • Field day on the last day • Security guard at the "T" • often asked to be removed • place to store your things • Where most exercise happens • tallest sixth grade teacher • loudest room in the building • tests you must pass to move on • Street name where South is located • ...
Aviation workplace 2023-11-14
Across
- Place at the airport after security
- The plane taking off
- Lining up to get on the plane
- Where the public can go
- Thing to do/ you may need
- Travelling outside your country
- Flying or operate of an aircraft
- Going to another country/city/town
- Making sure you keep yourself and others safe
- Fun time away
Down
- Certain aeroplane company
- A place you go to catch a flight
- X-ray to see if you're carrying any dangerous goods
- Customer on a plane
- A form of Identification to travel internationally
- Your belongings you're bringing with you
- Travelling in the same country
- Where the plane takes off and lands
- Confirmation that a citizen can enter leave or stay somewhere
- A child travelling alone under the age of 12
20 Clues: Fun time away • Customer on a plane • The plane taking off • Where the public can go • Certain aeroplane company • Thing to do/ you may need • Lining up to get on the plane • Travelling in the same country • Travelling outside your country • A place you go to catch a flight • Flying or operate of an aircraft • Going to another country/city/town • Place at the airport after security • ...
Decode the Cloud: The SUSE Mastermind Challenge 2025-10-18
Across
- Program members who resell and integrate SUSE solutions
- A key partner offering for enterprise customers
- SUSE long-term-release named after a season
- SUSE Rancher tool used to manage bare-metal and virtualized clusters
- Container orchestration platform widely used with SUSE
- SUSE's enterprise Linux product (abbreviation)
- Lightweight virtualization units for microservices
- SUSE product for Kubernetes management
- Process improved using Ansible & automation tooling
- Default snapshot-capable filesystem used by SUSE
- SUSE command-line package manager
Down
- Critical non-functional requirement for enterprise platforms
- Community Linux distribution sponsored by SUSE
- Annual SUSE user and partner conference
- Rolling-release distro from SUSE
- Core of the operating system
- Tool for lifecycle and patch management
- Deliverable for security and bug fixes
- SUSE system administration tool (4 letters)
- Open Build Service (abbreviation)
20 Clues: Core of the operating system • Rolling-release distro from SUSE • Open Build Service (abbreviation) • SUSE command-line package manager • Deliverable for security and bug fixes • SUSE product for Kubernetes management • Annual SUSE user and partner conference • Tool for lifecycle and patch management • SUSE long-term-release named after a season • ...
Network+ 10-09 Wirelesss 2024-07-24
Across
- parabolic,yagi,cantenna,omni to name a few
- type of WPA wifi security for home
- data amount thats transferred at layer 3
- 2wrds, recon of area for AP placement
- signal bounces
- topology where stations connect to a base
- frame to notify party to end connection
- data transfer achieved at layer 7
- too many devices connect to AP
- 2wrds, combining to channels
Down
- radio wave is reduced as it passes through
- GSM and CDMA , uses radio towers
- WMN..all devices connected together forms
- free space path loss
- background environment interference to wireless
- AP type that needs a WLC
- type of wifi security for organazations
- making signal unreadable or scrambled
- signal or radio wave bends
- multiplexing signals from 2-4 antennas
- broadcast frame sent out by AP
21 Clues: signal bounces • free space path loss • AP type that needs a WLC • signal or radio wave bends • 2wrds, combining to channels • broadcast frame sent out by AP • too many devices connect to AP • GSM and CDMA , uses radio towers • data transfer achieved at layer 7 • type of WPA wifi security for home • 2wrds, recon of area for AP placement • making signal unreadable or scrambled • ...
III L - crossword 2 M. Klocek; K. Mandecki 2015-04-27
3 2024-05-14
Authorities 2025-02-11
Chapter 1 Vocab 2015-09-22
Across
- services are delivered from a business' data center to internal users. This model offers versatility and convenience, while preserving management, control and security.
- (Quality of Service) the capability of a network to provide better service to selected network traffic over various technologies
- large secure locations for server farms
- plugging a machine in which secures a frequency in your power line that is used for data transfer
- security software that protects a system from malicious software
- (Access Control Lists) a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee
- Firewalls that allow only certain ports to be used
- A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it
- using smartphones to control functions of your house
- cloud technology that can be changed to adapt to the needs of the user
Down
- the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
- that covertly steals personal information from one computer
- the property that enables a system to continue operating properly in the event of the failure of some components
- allows companies to use computers as a utility that they get services for and from on demand rather than having to maintain their own infrastructure
- the ability to add your own device onto a network, separate from the other machines on the network.
- a third-party provider delivers the cloud service over the Internet, sold on-demand, typically by the minute or the hour.
- (Virtual Private Network) a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
- self-replicating piece of code used for malicious purposes
- the design of the communication on a network. It is a framework for the specification of the network’s physical components and their roles on the network
- wireless ISP, get all data from an antenna outside your house
- (Intrusion Prevention System) a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
- The authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority.
- a combination of public cloud services and on-premises private cloud – with orchestration and automation between the two. Companies can run mission-critical workloads or sensitive applications on the private cloud while using the public cloud for bursty workloads that must scale on-demand. The goal of hybrid cloud is to create a unified, automated, scalable environment which takes advantage of all that a public cloud infrastructure can provide, while still maintaining control over mission-critical data.
23 Clues: large secure locations for server farms • Firewalls that allow only certain ports to be used • using smartphones to control functions of your house • self-replicating piece of code used for malicious purposes • that covertly steals personal information from one computer • wireless ISP, get all data from an antenna outside your house • ...
Cisco Product Advanced Security Puzzle 2024-10-16
Across
- Threat detection engine paired with Kyverno for container security
- A solution that leverages AI to detect and block identity spoofing attacks on endpoints
- Tool used by Cisco to improve customer experience in vulnerability management
- Software list that tracks components for security and compliance purposes
Down
- Standards and certifications that ensure product security and regulatory compliance
- The process of securing network telemetry with gRPC Dial-Out
- Security platform integrating networking and security in Cisco’s architecture
7 Clues: The process of securing network telemetry with gRPC Dial-Out • Threat detection engine paired with Kyverno for container security • Software list that tracks components for security and compliance purposes • Security platform integrating networking and security in Cisco’s architecture • ...
CHAPTER #13 2014-12-26
Across
- Describes a sentence where the defendant is credited immediately after the guilty verdict with the time spent in jail awaiting trial.
- Jails that allow for the continuous observation for inmates.
- Used when all prisoners are locked in their cells to prevent a riot or unrest from spreading or during an emergency.
- Allow for continuous observation for inmates.
- Designed for prisoners regarded as being less dangerous; having fewer restrictions.
- Facilities that provide the highest level of prison security.
- Prisoners are together, side by side, during work, meals, and prayer but return to solitary cells at night.
- A theory that involves information collecting, individualization, treatment, relaxation of rules.
Down
- Heightened classification based on inmate's crime and behavior while incarcerated.
- Time period that you are incarcerated between being arrested and your trial.
- Place of punishment for offenses against the state, also a place of penance or house of correction.
- is a form of prison management based on the principle of keeping prisoners in solitary confinement.
- Cells are clustered around a common area and a control booth from which an officer observes inmate activity.
- A person responsible for the supervision of a prison, for ensuring that regulations associated with it are obeyed.
- Place in which individuals are physically confined or interned by a third party that is contracted by a government agency.
- The most secure levels of custody in the prison systems.
- A place for the confinement of people accused or convicted of a crime, a sentence is usually a year or less.
17 Clues: Allow for continuous observation for inmates. • The most secure levels of custody in the prison systems. • Jails that allow for the continuous observation for inmates. • Facilities that provide the highest level of prison security. • Time period that you are incarcerated between being arrested and your trial. • ...
TTS FIREWALL 2022-11-09
Across
- Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
- firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
- Perubahan terhadap tampilan suatu website secara illegal disebut..
- fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
- kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
- berapakah element pada host hardening …
Down
- firewall terbagi menjadi ... jenis
- Yang termasuk jenis metode enkripsi adalah …
- Terdiri dari database security, data security, dan device security adalah keamanan di level …
- ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
- arti dari kata firewall
- Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
- firewall bekerja dengan cara ... seluruh data yang masuk
13 Clues: arti dari kata firewall • firewall terbagi menjadi ... jenis • berapakah element pada host hardening … • Yang termasuk jenis metode enkripsi adalah … • firewall bekerja dengan cara ... seluruh data yang masuk • Perubahan terhadap tampilan suatu website secara illegal disebut.. • kelebihan firewall berbasis jaringan adalah menjaga jaringan secara... • ...
Pieter's Business Finder Quiz 2025-09-01
Across
- A sudden and unexpected event causing loss
- A modern threat covered by specialized insurance policies
- A key metric comparing claims paid to premiums earned
- Government-backed insurer for special risks like riots and strikes
- Intentional deception for financial gain in insurance
- Assessment of an asset’s worth for insurance purposes
- Temporary vehicle provided during repairs
Down
- Professional who advises clients on insurance solutions
- What insurance helps manage and transfer
- Legal responsibility for damage or injury
- The process of evaluating and accepting insurance risk
- Brand identity – Brokers No.1
- Amount paid by the insured before coverage kicks in
13 Clues: Brand identity – Brokers No.1 • What insurance helps manage and transfer • Legal responsibility for damage or injury • Temporary vehicle provided during repairs • A sudden and unexpected event causing loss • Amount paid by the insured before coverage kicks in • A key metric comparing claims paid to premiums earned • Intentional deception for financial gain in insurance • ...
Do you know the words? 2021-01-08
27 Clues: Dach • Akku • Raum • lösen • Waren • Daten • Drohne • Reifen • Roboter • Netzwerk • Sitzplatz • Reparatur • befördern • verbessern • aufsperren • Sicherheit • Kopfkissen • verhindern • verringern • Freiwillige • Behinderung • kompliziert • Privatsphäre • Lautsprecher • nachverfolgen • Haushaltsgeräte • Windschutzscheibe
Spanish 2 Unit 2 Vocab Crossword 2020-11-04
25 Clues: movil • hombre • mandar • medico • músico • soldado • bombero • policia • artista • abogado • recibir • flexible • mecánico • dentista • cocinero • escritor • comunicar • enfermero • la rutina • compartir • ingeniero • la oficina • la autonomia • la securidad • la disciplina
Glossary: The United Nations 2022-02-15
Across
- arvo
- toimintaperiaate, käytäntö
- arvokkuus, ihmisarvo
- kääntää (kielestä toiseen)
- jäsenvaltio
- aktiivinen kansalainen
- edistää, tukea
- rauhanturvaaja
Down
- kestävä kehitys
- suojella
- ulkomaanasiat
- tasa-arvo
- konflikti, ristiriita
- tehdä yhteistyötä
- parantua, edistyä
- kääntäjä
- ihmisoikeudet
- turvallisuus
- tulkki
- kansainvälinen laki
- määrätä, säätää
21 Clues: arvo • tulkki • suojella • kääntäjä • tasa-arvo • jäsenvaltio • turvallisuus • ulkomaanasiat • ihmisoikeudet • edistää, tukea • rauhanturvaaja • kestävä kehitys • määrätä, säätää • tehdä yhteistyötä • parantua, edistyä • kansainvälinen laki • arvokkuus, ihmisarvo • konflikti, ristiriita • aktiivinen kansalainen • toimintaperiaate, käytäntö • kääntää (kielestä toiseen)
Family 2024-06-25
22 Clues: bread • piano • sings • sheds • gamer • hunter • reader • frugal • farmer • swimmer • chickens • artistic • boatmover • cat lover • loves Theo • mechanical • animal expert • homestyle cook • wastes nothing • boy scouts dad • canine security • don't forget about
French II Crossword 2023-04-20
25 Clues: car • taxi • card • foot • cash • castle • strike • subway • ticket • palace • baggage • customs • embassy • airport • suitcase • airplane • passport • security • cue/line • consulate • cathedral • boat/ship • job/position • ticket giver • train station
Refugee 2022-11-11
25 Clues: RCHNU • sudoxe • sisirc • epacse • enimaf • sserts • redrob • eegufer • eeucave • yrtnuoc • retlehs • ytiruces • decalpsid • ytilitsoh • yrautcnas • noitargim • enitnarauq • seitlausac • noitatroped • noitucesrep • noitargimmi • ssensselemoh • noitairtaper • rekees-mulysa • tnemtaert-lli
Occupations 2022-05-12
23 Clues: Pilot • nurse • artist • driver • Dancer • Police • Doctor • Singer • athlete • Soldier • Dentist • preacher • musician • Male chef • professor • missionary • movie star • Female chef • Male seller • Female seller • security guard • employee/staff • Officer/government official
kuis globalisasi dan masyarakat digital 2024-09-17
Across
- Proses pembelajaran yang semakin sering menggunakan ____
- Alat komunikasi yang memudahkan ____ pesan secara elektronik
- Sistem nilai dan norma yang diwariskan melalui ____
- Bidang yang terpengaruh oleh perdagangan ____ internasional
- Sistem ____ yang menghubungkan berbagai perangkat komputer
- Saluran untuk menyampaikan ____ ke publik
- Individu yang mengakses sistem komputer tanpa ____
- Jaringan global yang menghubungkan ____
- Proses yang menghubungkan berbagai negara melalui ____
Down
- Tempat atau ____ untuk berbagi konten secara online
- Cara orang ____ dan bertukar informasi
- Jaringan ____ menghubungkan orang secara virtual
- Data yang telah diproses dan dimaknai untuk ____
- Perdagangan yang dilakukan melalui ____
- Dunia ____ merujuk pada segala hal yang berkaitan dengan internet
- Proses mengubah informasi dari bentuk analog ke ____
- Hak untuk menjaga ____ informasi pribadi di dunia maya
- Alat atau sistem yang digunakan untuk mempermudah ____
- Informasi yang dikumpulkan dan dianalisis untuk ____ keputusan
- Bersifat ____ yang mencakup seluruh dunia
20 Clues: Cara orang ____ dan bertukar informasi • Perdagangan yang dilakukan melalui ____ • Jaringan global yang menghubungkan ____ • Saluran untuk menyampaikan ____ ke publik • Bersifat ____ yang mencakup seluruh dunia • Jaringan ____ menghubungkan orang secara virtual • Data yang telah diproses dan dimaknai untuk ____ • Individu yang mengakses sistem komputer tanpa ____ • ...
computers and kodu 2024-01-10
Across
- here you would find google and all your apps on a computer
- your computer's short-term memory
- a basic game making software
- a texting app that most pepole use
- the code inside your computer
- a physical way of protecting your computer
- a populer battle royale game
- a formal messaging app
- invisible graphic squares
Down
- a console made by microsoft
- a type of worded password
- the right order of code
- images made up of pixels
- a set of instructions for a computer
- someone breaking in toyour computer
- using yourself to unlock a eletric device
- bullying on the internet
- fake prospering adverts sent to yourself
- stands for the Central Processing Unit
- a popular platforming game with lots of smaller games in it made by the pepole using it
20 Clues: a formal messaging app • the right order of code • images made up of pixels • bullying on the internet • a type of worded password • invisible graphic squares • a console made by microsoft • a basic game making software • a populer battle royale game • the code inside your computer • your computer's short-term memory • a texting app that most pepole use • ...
Cybercrime and ICT Laws 2025-03-21
Across
- Law that protects individuals' personal information
- Crime of using domain names in bad faith
- Crime involving explicit materials of minors
- The agency that oversees ICT governance in the Philippines
- Act of intercepting data transmissions without permission
- Data Privacy Act of 2012
- Police unit that investigates online crimes
- Law penalizing cyber libel and hacking
- Investigation unit for online crimes
- Spreading false information about someone online
- Crime involving defamation on the internet
Down
- Interfering with or damaging a computer system
- Online fraud involving fake websites or emails
- Unauthorized access to a computer system
- Financial fraud using computers
- The unauthorized modification or destruction of computer data
- Government agency that investigates cybercrimes
- A system of rules established by a government
- Anti-Child Pornography Act of 2009
- Organization responsible for enforcing the Data Privacy Act
- Online sexual exploitation for money or favors
- Government agency that enforces data privacy laws
22 Clues: Data Privacy Act of 2012 • Financial fraud using computers • Anti-Child Pornography Act of 2009 • Investigation unit for online crimes • Law penalizing cyber libel and hacking • Crime of using domain names in bad faith • Unauthorized access to a computer system • Crime involving defamation on the internet • Police unit that investigates online crimes • ...
news 2022-10-16
Across
- joshua killer
- kdrt perpetrator
- take other people's lives
- the price goes up
- where did the 2004 tsunami occur
- car crash is called
- sexual crimes
- earth's surface vibrations
- lava coming out of volcano is called
- what's being talked about
- criminal act
- people who saw the incident
- big water wave
Down
- hacker name
- overflowing river
- bomb attack in jakarta 2016
- stadium name in malang
- conditions in 2020
- ground shift
- heroin,morphine,etc
- news tv channel in indonesia
- news being discussed
- actions taken by individual from a party to enrich themselves
- the person who reads the news
- form of oppresion
- cyber crime
- take people's things without permission
- things we use during a pandemic
- kdrt victim
- international news channel
30 Clues: hacker name • cyber crime • kdrt victim • ground shift • criminal act • joshua killer • sexual crimes • big water wave • kdrt perpetrator • overflowing river • the price goes up • form of oppresion • conditions in 2020 • car crash is called • heroin,morphine,etc • news being discussed • stadium name in malang • take other people's lives • what's being talked about • earth's surface vibrations • ...
spanish uniut 4 2021-12-14
15 Clues: map • train • flight • airport • service • customs • tourtrip • security • airplane • i will go • itenerary • departures • destination • i will visit • train station
DTB Tanzania-2020 2020-12-10
Across
- A city with 2 branches of DTB Tanzania
- The period for credit repayment
- Institutions offering financial services by disrupting traditional banking
- Non-service of a loan facility
- Interest-bearing account for short,long-term goals and emergencies.
- A foreign current savings product
- A cheque with no date marked
- Product for not-for-profits
- Security against credit
Down
- Sales of insurance policies in bank
- A product for students
- A cheque presented after 6 months of mention
- Measurement for credit rating
- Swahili for peace
- A collateral against loan
- latest branch of the bank
- ATMs,POS,mobile banking and wakala's
- A bank serving interest of another bank in a foreign country.
- Detailed account on financial position of a business at a particular point in time
- Accounting and financial reporting standard
20 Clues: Swahili for peace • A product for students • Security against credit • A collateral against loan • latest branch of the bank • Product for not-for-profits • A cheque with no date marked • Measurement for credit rating • Non-service of a loan facility • The period for credit repayment • A foreign current savings product • Sales of insurance policies in bank • ...
Travel Vocab 2020-04-10
Across
- safety belt
- counter
- sleeping car
- car wagon
- window
- ticket
- flight
- trip travel
- passport
- aisle
- controller
- on time
- to turn
- luggage
- gate
- layover
- second class
- luggage screening
- stop
- coach
- visa
- to go through security
- international airport
Down
- boarding pass
- to take off
- in the train station
- to check luggage
- flight attendent
- suitcase
- to get/obtain
- seat
- ticket
- first class
- to go straight
- delayed
- arrival
- security agent
- to hope
- carry-on luggage
- to miss a flight
- to land
- event ticket
- platform
- in the airport
- waiting room
- baggage claim
- passenger
- connection
- departure
- ticket window
- bunk
- customs
- to board
- to see
- to give
55 Clues: seat • gate • bunk • stop • visa • aisle • coach • ticket • window • ticket • flight • to see • counter • delayed • arrival • to hope • to land • on time • to turn • luggage • layover • customs • to give • suitcase • passport • platform • to board • car wagon • passenger • departure • controller • connection • to take off • safety belt • first class • trip travel • sleeping car • event ticket • waiting room • second class • boarding pass • to get/obtain • baggage claim • ...
Travel Vocab 2020-04-10
Across
- safety belt
- counter
- sleeping car
- car wagon
- window
- ticket
- flight
- trip travel
- passport
- aisle
- controller
- on time
- to turn
- luggage
- gate
- layover
- second class
- luggage screening
- stop
- coach
- visa
- to go through security
- international airport
Down
- boarding pass
- to take off
- in the train station
- to check luggage
- flight attendent
- suitcase
- to get/obtain
- seat
- ticket
- first class
- to go straight
- delayed
- arrival
- security agent
- to hope
- carry-on luggage
- to miss a flight
- to land
- event ticket
- platform
- in the airport
- waiting room
- baggage claim
- passenger
- connection
- departure
- ticket window
- bunk
- customs
- to board
- to see
- to give
55 Clues: seat • gate • bunk • stop • visa • aisle • coach • ticket • window • ticket • flight • to see • counter • delayed • arrival • to hope • to land • on time • to turn • luggage • layover • customs • to give • suitcase • passport • platform • to board • car wagon • passenger • departure • controller • connection • to take off • safety belt • first class • trip travel • sleeping car • event ticket • waiting room • second class • boarding pass • to get/obtain • baggage claim • ...
Travel Chap 4 vocab 2020-04-02
Across
- controller
- safety belt
- flight attendent
- to miss
- passenger
- trip; travel
- seat
- customs
- visa
- event ticket
- sleeping car
- to get/obtain
- arrival
- to land
- bunk
- aisle
- international airport
- to hope
- waiting room
- flight
- to give
- to see
- second class
- security agent
- on time
Down
- passport
- gate
- coach
- boarding pass
- platform
- luggage screening
- carry-on baggage
- in the airport
- connection
- baggage claim
- ticket window
- to go through security
- departure
- delayed
- window
- to take off
- car wagon
- first class
- suitcase
- counter
- to board
- to check luggage
- to go straight
- in the train station
- stop
- ticket
- delayed
- ticket
- to turn
54 Clues: gate • seat • visa • bunk • stop • coach • aisle • window • flight • ticket • to see • ticket • to miss • customs • delayed • arrival • to land • counter • to hope • to give • delayed • to turn • on time • passport • platform • suitcase • to board • passenger • departure • car wagon • controller • connection • safety belt • to take off • first class • trip; travel • event ticket • sleeping car • waiting room • second class • boarding pass • baggage claim • ticket window • ...
The Maghrib Times Crossword Puzzle Vol. 3 Iss. 2 2025-03-08
Across
- Evidence not from direct knowledge.
- A member of a jury.
- To formally accuse of a crime.
- Security given for the release of a prisoner.
- A request made to a court.
- One who receives a grant.
- To annul or set aside.
- An official who certifies documents.
- A formal order or decree.
- To make a legal argument in court.
Down
- A written document transferring property.
- To officially call someone to court.
- A civil wrong causing harm to another.
- A legal claim on property as security for a debt.
- To assert or declare without proof.
- A solemn promise, often before a court.
- Fairness as applied in legal cases.
- The location where a case is heard.
- To send a case back to a lower court.
- A demand for something as a right.
20 Clues: A member of a jury. • To annul or set aside. • One who receives a grant. • A formal order or decree. • A request made to a court. • To formally accuse of a crime. • A demand for something as a right. • To make a legal argument in court. • Evidence not from direct knowledge. • To assert or declare without proof. • Fairness as applied in legal cases. • ...
Using computers 2024-01-09
Across
- to scramble up messages
- you use it to click on things
- a type of biometric security
- like a website
- physical parts of a computer
- an online texting or sharing app
Down
- typing
- to protect the users account
- a physical security method using your body
- a sequence of numbers or letters
- a method of sending a digital copy of a letter
11 Clues: typing • like a website • to scramble up messages • to protect the users account • a type of biometric security • physical parts of a computer • you use it to click on things • a sequence of numbers or letters • an online texting or sharing app • a physical security method using your body • a method of sending a digital copy of a letter
TCS Information Security Crossword 2013-01-10
Across
- A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
- _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
- Process for secure disposal of paper based information
- ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
- Attack preventing availability of a system operation or service to an authorized user
- A piece of software that is malicious or intrusive
- Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
- Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
- A software that detects, repairs, cleans, or removes infected files from a computer
- Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
- ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
- A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
- Act of listening to a private conversation which may reveal information which can provide access to a facility or network
- Highest category of information classification in TCS
- ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
- An update to fix vulnerabilities in software
- Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
- Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
- ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
- A weakness that can be taken advantage of to obtain unauthorized access to an asset
- Minimum password length as per TCS security policy
- is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
22 Clues: An update to fix vulnerabilities in software • Minimum password length as per TCS security policy • A piece of software that is malicious or intrusive • Highest category of information classification in TCS • Process for secure disposal of paper based information • A weakness that can be taken advantage of to obtain unauthorized access to an asset • ...
Data centres and security 2013-03-29
Across
- It is a process that has completed execution but still has an entry in the process table.
- It is a program can collect and transmit personal information, often without the user being aware.
- It is a resource intended to provide the customer or end user with information and support related to a company's or institution's products and services.
- sections of a centre sealed off from other sections.
- It is a secret word or string of characters that is used for user authentication to prove identity.
- duplication of equipment in case one part fails.
- using physical characteristics for ID.
- It is a method of exchanging digital messages from an author to one or more recipients.
Down
- It is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.
- It is a portable computer with a built-in screen, integrated keyboard, and battery power.
- It is a family of computer networking technologies for local area networks.
- having different and unconnected cables to a network.
- It is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
- ability to withstand unexpected problems or setbacks.
- It is the process of encoding messages.
- time when the equipment is not functioning.
- It is a collection of computers interconnected by communication channels that allow sharing of resources and information.
- It is an attacker's attack intended to redirect a website's traffic to another, bogus site.
- It is a computer worm targeting the Microsoft Windows operating system.
- It is the action of recording (or logging) the keys struck on a keyboard.
20 Clues: using physical characteristics for ID. • It is the process of encoding messages. • time when the equipment is not functioning. • duplication of equipment in case one part fails. • sections of a centre sealed off from other sections. • having different and unconnected cables to a network. • ability to withstand unexpected problems or setbacks. • ...
Computer Security and Viruses 2014-08-10
Across
- A group of two or more computer systems linked together.
- The study of people's efficiency in their working environment.
- The process by which you store the files on a single storage media with no secondary copies.
- A program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
- A program designed to detect and destroy computer viruses.
- A way of backing up the computer that allows you to store the entire computer, including the operating system and programs, in a single file (an “image”) that can be used to restore the computer to exactly the way it was when the image was made.
- The process of using an algorithm to transform information to make it unreadable for unauthorized users.
- An act of crime in which a computer is the object of the crime.
- an electronic discovery technique used to determine and reveal technical criminal evidence.
- The act of making set of instructions.
- The programs and other operating information used by a computer.
- A software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- A feature or defect of a computer system that allows surreptitious unauthorized access to data.
- It is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
- Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Down
- The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or PDA.
- The acto of gaining unauthorized access to protected data.
- A software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
- An act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords.
- A person within a group or organization, especially someone privy to information unavailable to others.
- It refers to the physical parts of a computer system.
- The state of being free from danger or threat.
- The distinct pieces of digital information.
- An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
- The use of computers and related resources in an environmentally responsible manner.
- A person who breaks into a computer system, typically for an illegal purpose.
- The Father of Computers.
- A person that codes the set of instructions for the computer.
- A software that is intended to damage or disable computers and computer systems.
- Refers to tricking or deceiving computer systems or other computer users
- An organized collection of data.
- A type of network, the "V" in VPN.
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- A person who uses computers to gain unauthorized access to protected data.
35 Clues: The Father of Computers. • An organized collection of data. • A type of network, the "V" in VPN. • The act of making set of instructions. • The distinct pieces of digital information. • The state of being free from danger or threat. • It refers to the physical parts of a computer system. • A group of two or more computer systems linked together. • ...
knowhere's head of security 2016-01-13
Across
- Wolverine’s bones are laced with __________
- Famously quoted: “I am ______”
- Famously quoted: “No more mutants”
- First Appearance: New Mutants #98
- Son of Cyclops; time-traveler
- Aka The Accuser
- Earth’s Mightiest Heroes
- Gems: Time, Space, Power, Reality, Mind, and ____
- Evil alter-ego of Adam Warlock
- Eye of Agamotto wielder
- Wielder of Mjolnir
- King of Wakanda, aka ____________
- Peter Parker is the Amazing _________
- Aka Jennifer Walters, attorney at law
- Son of Mephisto
- Before Adam Warlock, his “name” was ___
- Created solely to kill Thanos
- Captain America’s shield is made of this
- Aka Kamala Khan, inhuman
- Jewel, AKA _______ _____
Down
- Fist of Khonshu; aka Marc Spector
- The “most dangerous woman in the galaxy”
- Creator of the Four Horsemen
- The best there is at what he does
- Daughter of Drax the Destroyer
- Knowhere’s head of security
- Alien race; creators of inhumans
- Johnny Blaze or Daniel Ketch
- Captain Britain’s sister
- Team organized by Charles Xavier
- Captain Marvel, aka Carol _______
- Avatar of Death; Mad Titan
- The Watcher, aka ___
- Secret Wars (1984) main villain, The ________
- Richard Rider or Sam Alexander
- Shapechanger; foster mother of Rogue
- The 2nd herald of Galactus
37 Clues: Aka The Accuser • Son of Mephisto • Wielder of Mjolnir • The Watcher, aka ___ • Eye of Agamotto wielder • Earth’s Mightiest Heroes • Captain Britain’s sister • Aka Kamala Khan, inhuman • Jewel, AKA _______ _____ • Avatar of Death; Mad Titan • The 2nd herald of Galactus • Knowhere’s head of security • Creator of the Four Horsemen • Johnny Blaze or Daniel Ketch • ...
Security Bsides Cyprus 2019 2019-09-21
Across
- The M in HTML
- an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
- IEE 802.11 describes which type of network?
- Network authentication protocol
- A cat tries to catch it but you can use it with your computer
- The Ripper Cracking tool
- Famous packet analyzer
- Protocol that gives access to a user on a remote system
- Malware that encrypts data for money
- init 6
- Famous proxy tool for web penetration testing
- Goddess of Cyprus,Venus...
- which is the first layer in OSI
- Database attack, ____ Injection
Down
- You can use it for anonymity
- Spyware, Trojan, worm, virus
- name of first virus
- 127.0.0.1 IP address
- decode this hex -> 7365637572697479
- Cross Site _____ Attack
- Swiss army knife of hacking tool/frequently used as backdoor
- Mac address is a 12 byte. What type of numbers?
- Famous Debian Distribution for Penetration Testing
- TCP & UDP runs in that OSI Layer
- Not bind shell
- Not TCP
- control and store your repo
- Which protocol is used by ping command
28 Clues: init 6 • Not TCP • The M in HTML • Not bind shell • name of first virus • 127.0.0.1 IP address • Famous packet analyzer • Cross Site _____ Attack • The Ripper Cracking tool • Goddess of Cyprus,Venus... • control and store your repo • You can use it for anonymity • Spyware, Trojan, worm, virus • Network authentication protocol • which is the first layer in OSI • Database attack, ____ Injection • ...
ICT - Security and Communication 2017-11-20
Across
- Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Uses SMS system of mobile phones to send out fake text messages.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Authentication that relies on certain unique characteristics of human beings.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
- Refers to safety when using the internet like keeping personal data safe.
- Used to verify that data comes from a secure and trusted source.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- The act of gaining unauthorized access to a computer system.
- Unsolicited email sent over the internet.
Down
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- A type of protocol that allows data to be sent and received securely over the internet.
- Software that gathers data by monitoring key press on the user/s keyboard.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Web applications or website that allow users to create and edit web pages using any web browser.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
25 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Uses SMS system of mobile phones to send out fake text messages. • Used to verify that data comes from a secure and trusted source. • Refers to safety when using the internet like keeping personal data safe. • ...
ICT - Security and Communication 2017-11-20
Across
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- Authentication that relies on certain unique characteristics of human beings.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Uses SMS system of mobile phones to send out fake text messages.
- Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
Down
- Software that gathers data by monitoring key press on the user/s keyboard.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Used to verify that data comes from a secure and trusted source.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- Refers to safety when using the internet like keeping personal data safe.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
- Web applications or website that allow users to create and edit web pages using any web browser.
- A type of protocol that allows data to be sent and received securely over the internet.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- The act of gaining unauthorized access to a computer system.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- Unsolicited email sent over the internet.
25 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
Security Markets (Chapter 2) 2018-01-29
Across
- will shut down the markets or a stock in the event that it takes a pre-defined drop
- serves as the middleman in the process of raising funds
- a stock exchange in New York that began as a physical location
- closed-end funds and structured products i.e. Standard and Poors 500 index and the DJIA
- an automated system that matches, buys, and sells orders for securities
- formed in 2005 as an ECN and was granted exchange status by the SEC
- allows NYSE member firms to electronically transmit all market and limit orders directly to the specialist at the trading post or the member trading booth
Down
- markets for existing assets that can be traded between investors i.e. NYSE
- a way of exchanging assets
- first electronic stock market listing over 5000 companies
- distinguished by the flow of funds between the market participants
- basis where the issuing firm assumes the risk and simply takes back an securities not sold after a fixed period
- regulates the organized markets
- electronic quotation service that gathers and publishes bid and ask quotation prices
- a database that keeps track of limit orders and market orders for the specialist
- where the company sells its stock to the public without the help of an investment bank
- bring private companies public for the first time
- occurs when prices respond to new information, when each successive trade is made at a price close to the preceding price
- a non organized exchange with limited rules and regulations
- guarantee the investment banking firm gives the selling firm to purchase its securities at a fixed price
- gives the owner the right to buy 100 shares of the underlying common stock at a set price for a certain period
21 Clues: a way of exchanging assets • regulates the organized markets • bring private companies public for the first time • serves as the middleman in the process of raising funds • first electronic stock market listing over 5000 companies • a non organized exchange with limited rules and regulations • a stock exchange in New York that began as a physical location • ...
Security Manual – Chapter 3 2021-08-04
Across
- No _____ robberies are alike.
- Make no statements to the them; refer them to Marketing
- A theft, which does not involve a person directly
- Varying your _____ to work will also help.
- Try to _____ the robber’s physical features, voice, accent, mannerism, dress and other characteristics
- Vault bait should be _____ hundred dollars.
- _____ _____ is a robbery prevention tool (two words)
- Remember that robberies usually last 30 to 90 ____ and the robber will quickly leave the bank
- Place this on your window signal you’ve been robbed (two words)
- ______ is the most important preliminary to an attack.
Down
- Write down any ____ from during the robbery that you can later advise the police of
- Always lock the _____ when you are not at your window.
- A theft involving force or threat of force
- _____ of any kind are to be avoided
- theft doesn’t involve force or threat of force
- Preserve any _____
- Obey The Robber’s _____; Don’t Be A Hero
- This ____ system can provide evidence
- If ____ include the bait money
- Every ____ months the office must record ____.(two words)
20 Clues: Preserve any _____ • No _____ robberies are alike. • If ____ include the bait money • _____ of any kind are to be avoided • This ____ system can provide evidence • Obey The Robber’s _____; Don’t Be A Hero • A theft involving force or threat of force • Varying your _____ to work will also help. • Vault bait should be _____ hundred dollars. • ...
Personnel security crossword puzzle 2024-02-12
Across
- - reduce the risk of your assets being lost, damaged or compromised
- - keep operations from devolving into complete chaos
- - the process of actively seeking out, finding and hiring candidates for a specific position or job
- - someone who has malicious intent to harm the organization from the inside
- - employees or third parties who make a mistake that causes a problem
- - a set of general guidelines that outline the organizations plan for tackling the issues
- - Carrying out a new policy often falls to entities that were not the ones that formulated or adopted it
- - it should undergo detailed analysis regarding the time, cost and resources needed to bring about new policy
- - will help guide which course of action pursue
- - Every industry has its own set of laws, regulations, standards and best practices that business need to abide
- - it is a group strongly suggest drafting the following set of corporate policies and procedures
- - it needs to be noted that the policies do not provide instant solutions
- - know key assets get the details right
- - unauthorized disclosure of official, private, or proprietary information
- - reduce the risk of harm to your people, customers and partners
Down
- - someone whose account has been taken over by an outside attacker
- - reduce the risk of your information being lost, damaged or compromised
- -these purposes can encompass many forms of criminal activity,from minor theft through to terrorism
- - explains a specific action plan for carrying out a policy
- - any person who exploits or intend to exploit to harm the security
- - an issue must be clearly delineated and started as a discrete issue to receive support from various entities
- - all measured designed to prevent unsuitable individuals of doubtful loyalty
- - as companies expand and evolve globally can be challenging to follow
- policies and procedures keep operations from developing into complete chaos
- - weakest link in the security chain
- - Workplace policies have received a poor reputation, sometimes for being long or voluminous
- - can prevent workplace incidents with the correct safety measures in place if or when an incident occurs
- - policies need to be monitored to ensure they are working correctly that they are properly implemented
- act of intentionally trying to stop someone from achieving something or to stop something from developing
- - ket to right and wrong
30 Clues: - ket to right and wrong • - weakest link in the security chain • - know key assets get the details right • - will help guide which course of action pursue • - keep operations from devolving into complete chaos • - explains a specific action plan for carrying out a policy • - reduce the risk of harm to your people, customers and partners • ...
Contemporary Policing and Security 2023-04-19
Across
- A campaign of spending cuts to reduce budget deficits and size of government
- A type of police culture that makes officers default to violence and aggression
- A term used for militarizing the police
- Something that is managed more and more in policing
- First Female Police Officer Hired by the Met
- Type of cameras that officers wear to ensure accountability
- Illegal acts committed by the crew of a private ship or vessel
- Ensuring that police effectively deliver services lawfully
- A part of the internet where illicit goods can be traded anonymously
Down
- A form of criminality operating across national borders
- Person shot by police in 2011 leading to the London riots
- A static or expandable weapon used for temporary incapacitation
- Country with the highest average police shootings in the world
- An outcome and also reason for use of force
- A cartel responsible for 80% of the global cocaine supply in 1994
- A controversial Act of Parliament proposed in 2021
- Criminal activities involving two of more individuals often across national borders
- A reason why almost 800m jobs could be lost by 2030
- A major form of crime that was 53% of all crimes in 2021
- Police cannot take this action despite pay disputes
20 Clues: A term used for militarizing the police • An outcome and also reason for use of force • First Female Police Officer Hired by the Met • A controversial Act of Parliament proposed in 2021 • A reason why almost 800m jobs could be lost by 2030 • Something that is managed more and more in policing • Police cannot take this action despite pay disputes • ...
Ch. 14 Security Crossword 2023-03-16
Across
- Android trusted websites use this type files to create installation software.
- Sensitive information (student records)kept by educational institution.
- chip built onto the motherboard and generates and stores encryption keys to protect boot files.
- Social engineering attack that takes place over the phone.
- An Act that keeps individuals healthcare information private.
- Disables security features of a mobile device.
- Consists of programs that give the hacker root access to the target machine.
- Type of DDoS attack that tries to overload network devices like a firewall.
- Policy allows the administrator to remotely lock the device if it has been lost or stolen.
- Type of authentication that requires two authentication credentials to access an account.
- Collects and then forwards information regarding the victim's computer activities.
- Type of malware is self replicating, modify existing programs, and must be attached to a legitimate program to run.
- Network monitoring device or software that monitors and filters inbound and outbound traffic.
- Targeted phishing attack.
- Used to bypass building access control measures, such as a badge reader.
- Type of detection that the organization is actively looking for security flaws in its systems.
Down
- Type of data destruction that actual destroys the HDD.
- Logs every keystroke the user makes and then sends the keystroke report to the hacker.
- An algorithm that generates a value that represents the password.
- Malware that uses the victim computer's resources to mine for cryptocurrency on behalf of the hacker.
- Program that is hidden inside a legitimate program.
- Most vulnerable part of any network.
- Type of server that exists outside of a network that forwards all traffic through its gateway on the behalf of the user or the network.
- Type of formatting that uses tools in the operating system.
- Type of formatting that writes new sectors and tracks to the drive.
- Immediately removing the device from the network; disconnect shared drives and connections with other devices.
- Scans a victim's computer for files and encrypts the files so the user is unable to access them.
- Occurs when an attacker sends out an email that looks legitimate but has a malicious payload.
- An attacker can gather sensitive information by shoulder surfing on conversations.
- Type of detection that occurs when the security incident is discovered when not actively looking for it.
30 Clues: Targeted phishing attack. • Most vulnerable part of any network. • Disables security features of a mobile device. • Program that is hidden inside a legitimate program. • Type of data destruction that actual destroys the HDD. • Social engineering attack that takes place over the phone. • Type of formatting that uses tools in the operating system. • ...
Security Awareness Crossword Puzzle 2021-09-15
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- The process of taking plain text and scrambling it into an unreadable format.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- The "C" in the CIA Triad. Protection of information from unauthorized access.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- The address of a webpage.
- when a person tags along with another person who is authorized to gain entry into restricted areas.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- a malicious act that seeks to damage data, steal data, or disrupt digital life in general (two words)
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
Down
- A flaw or weakness in a computer system that could be exploited to violate the systems security.
- Verifying identity.
- A sequence of words or text used to control access to a computer; similar to a password.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- The "I" in the CIA Triad. Protection from unauthorized changes.
- The "A" in the CIA Triad. It ensures authorized users have access.
- an act of disguising a communication from an unknown source as being from a known, trusted source.
- Security took that creates a secure, encrypted connection between you and the Internet (acronym).
- the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.
- Facebook, Twitter, Instagram, etc. (two words)
20 Clues: Verifying identity. • The address of a webpage. • Facebook, Twitter, Instagram, etc. (two words) • The "I" in the CIA Triad. Protection from unauthorized changes. • The "A" in the CIA Triad. It ensures authorized users have access. • The process of taking plain text and scrambling it into an unreadable format. • ...
Food Security and Interconnections 2024-09-12
Across
- if people suffer from food insecurity, they may have a lack of this
- a situation where war exists between two countries
- the reduction in the amount of food produced due to things such as drought and floods
- having economic access to enough food due to enough money
- name of the country attacked by Russia which is experiencing food insecurity
- item used by refugees to plan their journey to another country
- name of the lake in Africa which is drying out causing food insecurity for communities
- a state where not everyone has consistent access to enough safe and nutritious food
- a tax placed on goods from overseas to make them more expensive and less appealing to buy
- the name of the place where leather goods are made
- the continent where many countries bought grain off Ukraine before the war
- the name given to people who take food from large bins outside supermarkets
- something people in poorer countries can't do online without a lap top
- word used when two countries buy and sell goods to each other
- something that is typical in factories in Bangladesh
- name of the device being placed by Russia on Ukrainian farms to stop farming
- name given to an item brought into Australia from overseas
- weather event that could cause food loss in northern Australia
Down
- food that is thrown out by a seller or producer
- having enough food of decent quality for sale in shops and markets
- something farm workers have done in areas of Ukraine attacked by Russia
- a word associated with clothes and shoes from Bangladesh
- unequal levels of access to communication technologies such as the internet in different countries
- the name given to a corporation which has factories in more than one country
- name given to an item sold by Australia to overseas countries
- the planting of trees and using technology to help plants grow is desert areas
- fruit that is an example of food waste in Australia
- a type of connection people feel to a place if they link the place to their religious beliefs
- name of the desert where a green revolution is taking place
- the name given to people who are linked to places outside their own country
- a type of connection people feel to a place if they make money from it
- continent with the lowest amount of food security
32 Clues: food that is thrown out by a seller or producer • continent with the lowest amount of food security • a situation where war exists between two countries • the name of the place where leather goods are made • fruit that is an example of food waste in Australia • something that is typical in factories in Bangladesh • ...
Chapter 6 Security Plus 2024-09-21
Across
- instrumentation used for industrial process control
- involves isolating sensitive enterprise data
- Downloading unofficial and unapproved apps
- make a real-time operating system more resilient to attacks
- Examining code after the source code
- A coding technique for accounting for errors
- facilitates communication between devices and the cloud
- Circumventing the installed built-in limitations on Apple iOS devices
- Office policy allowing personal tech
- designed to replace or supplement a wired local area network
- security constraint in which a device’s small size results in low processing
Down
- testing software before the source code is compiled
- refers to integrating security into the application
- OS that guarantees real-time applications a certain capability within a specified deadline
- Sharing a phone's internet with another device
- Employee choose from company-approved devices
- Process ensuring data accuracy before processing
- computer hardware and software contained within a larger system
- Tools that allow a device to be managed remotely by an organization
- The ability of a system to handle growth efficiently
- coverage area is divided into hexagon-shaped cells
- The ability to resist attacks
- ensuring timely and reliable access to devices
- A system that controls multiple industrial control systems (ICS)
24 Clues: The ability to resist attacks • Examining code after the source code • Office policy allowing personal tech • Downloading unofficial and unapproved apps • involves isolating sensitive enterprise data • A coding technique for accounting for errors • Employee choose from company-approved devices • Sharing a phone's internet with another device • ...
Security Summit Crossword Puzzle 2021-08-18
Across
- The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
- An acronym for volatile memory within a computer that holds active processes, data, and applications.
- This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
- Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
- A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
- A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
- This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
- A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
- ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
- ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Down
- _________________@lowes.com and the
- _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
- Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
- This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
- An access control model that restricts system access to authorized users based on job function(s).
- Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
- Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
- Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
- Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
- Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
- Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.
21 Clues: _________________@lowes.com and the • Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails. • An access control model that restricts system access to authorized users based on job function(s). • An acronym for volatile memory within a computer that holds active processes, data, and applications. • ...
GSM ARchitecture,Frame,Security 2025-07-11
Across
- A cloak of anonymity for your true identity — frequently changed for stealth.
- A ritual of trust – proving you are who you claim, without shouting your name to the world.
- A repetitive rhythm of 26 TDMA pulses forming a foundational transmission structure.
- A short-lived encryption spell, generated every session using your private key and a random challenge.
- Time-based compartments that let multiple users talk without shouting over each other.
- A busy bee channel handling the behind-the-scenes chatter — call setup, handovers, and more.
- The chaotic spark of randomness used to ensure your identity check is truly fresh.
- This channel is like a digital loudspeaker, always shouting the cell ID and system info to everyone.
- The cell tower's brainchild — transmits and receives radio waves for user connectivity
Down
- A tiny memory wizard plugged into your phone, carrying your GSM passport.
- The heartbeat of a GSM frame — ticking every 4.615 milliseconds.
- A special burst whispering “stay in sync” to your device’s internal clock.
- The digital invisibility cloak – transforms voice and messages into unintelligible gibberish.
- A gateway node that acts as the diplomatic bridge between GSM and the outside PSTN/ISDN world.
- A nomadic guest list of users visiting a foreign GSM land.
- A digital fingerprint burned into your SIM card — your GSM identity number.
- The core nerve center — switching calls, handling mobility, and ensuring connections don’t drop.
- A digital vault storing your identity, subscriptions, and history permanently.
- The secret keeper — verifies you and helps encrypt your communications.
- The invisible conductor (orchestrator) managing multiple transceivers in a GSM symphony
20 Clues: A nomadic guest list of users visiting a foreign GSM land. • The heartbeat of a GSM frame — ticking every 4.615 milliseconds. • The secret keeper — verifies you and helps encrypt your communications. • A tiny memory wizard plugged into your phone, carrying your GSM passport. • A special burst whispering “stay in sync” to your device’s internal clock. • ...
Information Security-unit-1 2022-11-18
Across
- first phase of sec sdlc
- probability of threat to system
- replicating malicious software that spreads throughout system
- makes server unavailable by flooding
- provides assurance that user has authority to access update or delete
- intentional or unintentional attempt to compromise information
- using social skills to access credentials
- program that monitor data travelling over a network
- a pillar of IS
- attacker routes large quantities of email to targer
Down
- automated process that interacts with other network services
- bypasses normal authentication process
- only those with sufficient privilege can access
- weakness or faults in a system
- intruder assumes a trusted ip address
- organizational Resources that is being protected
- attack which uses trial and error
- unsolicited commercial email
- proving identity that he or she claims
- potential danger to an asset
20 Clues: a pillar of IS • first phase of sec sdlc • unsolicited commercial email • potential danger to an asset • weakness or faults in a system • probability of threat to system • attack which uses trial and error • makes server unavailable by flooding • intruder assumes a trusted ip address • bypasses normal authentication process • proving identity that he or she claims • ...
Pipsographer 8 2023-10-31
Across
- The is the price a seller is willing to accept for a security
- A written order to a bank to pay a specific amount of money from one account to another
- A person who owns shares in a corporation
- The total value of final goods and services produced by a country's citizens, regardless of their location
- Efforts to provide banking and financial services to all segments of the population
- This happens when someone dies without leaving a will
- Rivalry among sellers trying to achieve goals such as profit
Down
- Costs incurred in the process of generating revenue
- The process by which financial transactions are settled
- An upward movement in the price or value of a security or asset
- A company having a group of subsidiaries engaged in unrelated activities
- Satisfaction or happiness derived from consuming goods and services
- The maximum price that a buyer is willing to pay for a security
13 Clues: A person who owns shares in a corporation • Costs incurred in the process of generating revenue • This happens when someone dies without leaving a will • The process by which financial transactions are settled • Rivalry among sellers trying to achieve goals such as profit • The is the price a seller is willing to accept for a security • ...
Bank Protection Act 2015-07-22
Across
- What frequently used machine must meet all applicable UL standards of the bank?
- A requirement of the BPA is using ______ devices, such as prerecorded serial-numbered bills, or chemical and electronic devices.
- A requirement of the BPA is retaining a record of any robbery, ______, or larceny committed against the bank.
- A requirement of the BPA is maintaining a _______ that records activity in the banking office
Down
- The bank's security program shall designate a Bank Security _______
- Sixty Eight In what year was the BPA Passed?
- The BPA was passed by?
- The bank's security program shall designate a Bank Security ________
- of Directors It is the responsibility of the bank's ____ of ______ to comply with the BPA
9 Clues: The BPA was passed by? • Sixty Eight In what year was the BPA Passed? • The bank's security program shall designate a Bank Security _______ • The bank's security program shall designate a Bank Security ________ • What frequently used machine must meet all applicable UL standards of the bank? • ...
Entitlement Programs 2022-03-24
Across
- The form of Social Security meant for elderly people (based on age).
- Political issues important to most working class Americans (ex. wages and tax rates).
- Committees that decide how much money to spend on authorized programs.
- Annual cost of living adjustment mandated by law in welfare programs and Social Security.
- Committees that decide which programs to fund.
- Law that changed AFDC to TANF and tightened eligibility requirements.
Down
- Social Programs that distribute federal funds to all people who meet eligibility requirements.
- The form of Social Security meant for the disabled (people have to prove their disability to get this).
- Provides retirement benefits, health insurance, and support for the disabled and orphans.
9 Clues: Committees that decide which programs to fund. • The form of Social Security meant for elderly people (based on age). • Law that changed AFDC to TANF and tightened eligibility requirements. • Committees that decide how much money to spend on authorized programs. • Political issues important to most working class Americans (ex. wages and tax rates). • ...
Australia's connection with the world. 2017-03-02
14 Clues: gain • ship • armor • emblem • Nation • shield • exchange • purchase • computer • recession • employment • transporting • outward looking out • information technology
Health All the Way 2024-11-14
ICT Password 2024-03-06
6 Clues: World Wide Web • Voice Over Internet Protocol • Example of a crypto currency • Information Communictaion Technology • Crime Crime carried out using computer • Technology to hide Ip address and location
Cloud Computing 2015-05-08
13 Clues: Wolke • nutzen • Nutzer • Anbieter • Anwendung • Datenbank • zugreifen • Verbindung • Sicherheit • aufbewahren • Berechtigung • stabilisieren • Virtualisierung
Authorities 2025-02-07
Kaleidoscope 2025-03-25
Blackbird Girls Vocabulary 2024-03-11
Across
- A visible suspension of particles in the air, typically produced by burning or combustion.
- impossibility A situation that is extremely unlikely to occur based on statistical analysis.
- A deep red color.
- The Committee for State Security, the main security agency of the Soviet Union from 1954 to 1991, responsible for intelligence, counterintelligence, and internal security.
- drill A practice exercise conducted to prepare individuals for emergencies or hazardous situations.
- police A government agency responsible for intelligence gathering, surveillance, and maintaining internal security, often with extensive powers and operating covertly.
- A type of cured sausage, typically made of fermented and air-dried meat.
- jays A species of bird characterized by their blue plumage and noisy calls.
Down
- A building material made from a mixture of cement, aggregate (such as gravel or sand), water, and sometimes additives.
- A type of bird, often referring to the common blackbird, known for its black plumage and melodious song.
- Small birds belonging to the family Passeridae, typically brown or gray in color.
- power station A facility that generates electricity through nuclear reactions, usually involving the splitting of atoms in a reactor.
- Union Former socialist state in Eurasia, existing from 1922 to 1991, comprising several republics including Russia, Ukraine, Belarus, and others.
- The horizontal piece at the bottom of a window frame, often where objects can be placed.
14 Clues: A deep red color. • A type of cured sausage, typically made of fermented and air-dried meat. • jays A species of bird characterized by their blue plumage and noisy calls. • Small birds belonging to the family Passeridae, typically brown or gray in color. • The horizontal piece at the bottom of a window frame, often where objects can be placed. • ...
Security and Safety 2022-11-02
Across
- person responsible for cost of lost keys
- responsible for overall safety/security of facility
- network ___________ center
- part of the NACI application
- this is always removed on a sign in sheet
- annual training for information security
- always secure me before walking away
Down
- created by CIM and given to employees
- this is everyone's responsibility!
- number of FTST counselors required at remote local
- three letter acronym for client information
- workstations are for ______ use only
- red over black and we'll be back (two words)
13 Clues: network ___________ center • part of the NACI application • this is everyone's responsibility! • workstations are for ______ use only • always secure me before walking away • created by CIM and given to employees • person responsible for cost of lost keys • annual training for information security • this is always removed on a sign in sheet • ...
SAPM CROSSWORD 2022-06-22
Across
- The economist who developed the Arbitrage Pricing Theory (APT) model
- The other name for non-diversifiable risk is -------------------------risk
- The economist who laid the foundations for the Modern Portfolio theory
- An opportunity where an investor earns riskless profit without making any net investment
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- In the absence of secondary markets, this risk would be higher
- One of the researchers/economists who developed the CAPM model
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
Down
- Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
- The other name for indifference curve is --------------curve
- --------------------is the slope of the security characteristic line
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
- CAPM is a market --------------model
- The line representing CAPM is the -----------------market line
- A conditional market order to sell stock if it drops to a given price (write without space)
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
- In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable
19 Clues: CAPM is a market --------------model • The other name for indifference curve is --------------curve • The line representing CAPM is the -----------------market line • In the absence of secondary markets, this risk would be higher • One of the researchers/economists who developed the CAPM model • The economist who developed the Arbitrage Pricing Theory (APT) model • ...
ONLY US 2021-10-19
21 Clues: RUGBY • COFFEE • MAN U! • CHEEKY • VENDING • THE BOSS • MUSICIAL • PLUMBING • MR FIX IT • CONCIERGE • SANDWICHES • ELECTRICIAN • HEAVY METAL • SCOOTER KING • SCOTTS LASSIE • NEWLY MARRIED • FEMALE SECURITY • HEALTH & SAFETY • LANGUAGE EXPERT • RECEPTIONIST TC1 • CATERING SUPERVISOR
gkhvvvlxxv 2021-10-14
20 Clues: hurry • close • alone • cream • saving • safety • chicken • carfuel • just us • quizzes • straight • children • car place • come over • sunny city • long but more • staying alive • ball hit target • all of the things • youtube reaction vid
German Crossword 2020-11-09
20 Clues: home • role • bond • woman • source • security • ownership • love match • confidence • traditional • to belong to • illegitamate • single parent • foster family • living together • adoptive family • patchwork family • surrogate family • to be descended from • between generation family
Spotlight 8, 7A, kirjoita kaikki sanat yhteen ilman sanavälejä 2020-04-16
26 Clues: koe • lupa • ilman • uskoa • jutut • katsoa • edessä • suosikki • ongelmat • keskusta • selittää • kiusaaja • onnistua • oppitunti • viimeisin • keskustelu • rasistinen • kateellinen • kiusallinen • keskustella • valehtelija • turvallisuus • pitkään aikaan • saada selville • pyytää anteeksi • epäystävällinen
Vocab List #7 2023-04-26
25 Clues: - fly • - gum • - sun • - rude • - boat • - door • - bomb • - trick • - hotel • - candy • - cloud • - snake • - train • - energy • - turtle • - airport • - to walk • - to fish • - snorkle • - suitcase • - security • - to board • - Perchance • - butterfly • - Photo/Image
Travel Vocab 2020-04-10
Across
- luggage
- ticket
- aisle
- delayed
- to land
- waiting room
- platform
- passenger
- arrival
- carry-on luggage
- sleeping car
- controller
- to take off
- international airport
- security agent
- departure
- on time
- flight
- seat
- bunk
- baggage claim
- to hope
- flight attendent
- to get/obtain
- luggage screening
Down
- customs
- in the train station
- first class
- trip travel
- derecho to go straight
- coach
- to give
- to check luggage
- safety belt
- event ticket
- passport
- boarding pass
- in the airport
- stop
- connection
- second class
- to miss a flight
- visa
- car wagon
- to go through security
- suitcase
- ticket
- window
- layover
- to see
- gate
- to turn
- ticket window
- counter
54 Clues: stop • visa • gate • seat • bunk • aisle • coach • ticket • ticket • flight • window • to see • customs • luggage • delayed • to give • to land • arrival • on time • layover • to turn • counter • to hope • platform • passport • suitcase • passenger • car wagon • departure • connection • controller • first class • trip travel • safety belt • to take off • waiting room • event ticket • sleeping car • second class • boarding pass • ticket window • baggage claim • ...
Foundation of Security and Cybercrimes 2024-11-20
Across
- ensuring authorized personnel only
- accessible without delay
- steals, change, or destroy information
- unauthorized collection of information
- mass distribution of unsolicited messages
- unauthorized access to electronic data
- supplements the precautionary measures
- exclusive legal right to utilize artistic or musical material
- use of electronic communication to bully
- illegal threats
- restricts access to your computer to demand payment
- ensuring accuracy
- works without attaching to files
- allows logged in users use an application
Down
- method of breaching
- electronic lascivious exhibition of sexual activity
- imitating language or thought without authorization
- fraudulent sending of emails
- weakness
- assurance of the origin of information
- state of well-being
- violate security
- infects your computer
- action to protect the system
- anticipating threats
- common online fraud
- Someone cannot deny something
27 Clues: weakness • illegal threats • violate security • ensuring accuracy • method of breaching • state of well-being • common online fraud • anticipating threats • infects your computer • accessible without delay • fraudulent sending of emails • action to protect the system • Someone cannot deny something • works without attaching to files • ensuring authorized personnel only • ...
Dispatch Crossword 2025-08-28
Across
- A place you might find our NYC team members
- To steal or check in
- The data of a system that must be saved because of its value
- Any person seeking to compromise a function or structure
- Tells you something is amiss
- Shows the elements that make up the assembly
- What are we known for?
- source of electric power
Down
- What we aim to prevent
- A type of security camera
- A type of security camera
- A place you might find our ROC team members
- 7 down
- onsite or offsite
- A string of characters used to confirm a user's identity
- A grocery store we work with
- A place you might find our FL team members
- A drawing of the worksite
- Something we install
- To interfere with in order to cause damage
- Device that detects a change
21 Clues: 7 down • onsite or offsite • To steal or check in • Something we install • What we aim to prevent • What are we known for? • source of electric power • A type of security camera • A type of security camera • A drawing of the worksite • A grocery store we work with • Tells you something is amiss • Device that detects a change • A place you might find our FL team members • ...
Teka teki silang keamanan jaringan 2025-11-28
Across
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- OF SERVICE (DOS)
Down
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
21 Clues: OF SERVICE (DOS) • Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • ...
Privacy And Security 2022-11-15
Across
- permission that patients give in order to disclose protected health information.
- It provides detailed instructions for handling and protecting a patient’s personal health information
- what are these considered Additional hardware, software, and licensing costs, resistance to giving up paper records, difficult data entry, training,computer downtime, such as expected failure or routine servicing, and confidentiality and security concerns, such as access of information to unauthorized individuals.
- The Health Insurance Portability and Accountability Act of 1996
- what are these considered… not leaving printers unattended, not coping confidential information if unauthorized, contacting the receiver and verifying the fax number.
- Hitting, kicking, shaking, pulling hair, pinching, choking,biting, burning, scalding,threatening with a weapon,inappropriate restraint, withholding food/water, not providing physical care, and abandonment.
Down
- information that is shared within a protected relationship
- How long are medical records kept for ?
- contain all personal information such as…full name,Living address,Medical history etc.
- rule It provides regulations that make sure that confidential records are kept secure
- includes protected health information, privacy, confidentiality, and disclosure
- Excessive demands, insults, humiliation,jealousy, control, isolation,stalking/threats,and lack of affection and support.
- Using sexual gestures, suggesting sexual behavior, and unwanted sexual touching or acts
13 Clues: How long are medical records kept for ? • information that is shared within a protected relationship • The Health Insurance Portability and Accountability Act of 1996 • includes protected health information, privacy, confidentiality, and disclosure • permission that patients give in order to disclose protected health information. • ...
World of security 2021-05-01
Across
- a holder of supplies for manufacturers
- to buy or sell goods or services
- the fact or condition of being regarded or treated as more important than others
- declared in law as unable to pay their debts
- a part or portion of a larger amount which is divided among a number of people
- a number of connected items or names written or printed consecutively, typically one below the other
- an amount of smth expressed as a number out of 100
Down
- a fact that shows that smth exists or is true
- a thing that is needed or wanted
- occurring once every year
- happening four times a year
- a large sum of money which you use to start a business
- to give your voice to somebody or register your choice
13 Clues: occurring once every year • happening four times a year • a thing that is needed or wanted • to buy or sell goods or services • a holder of supplies for manufacturers • declared in law as unable to pay their debts • a fact that shows that smth exists or is true • an amount of smth expressed as a number out of 100 • a large sum of money which you use to start a business • ...
World of security 2021-05-01
Across
- to buy or sell goods or services
- a thing that is needed or wanted
- a fact that shows that smth exists or is true
- declared in law as unable to pay their debts
- a number of connected items or names written or printed consecutively, typically one below the other
- a part or portion of a larger amount which is divided among a number of people
Down
- happening four times a year
- an amount of smth expressed as a number out of 100
- the fact or condition of being regarded or treated as more important than others
- a holder of supplies for manufacturers
- a large sum of money which you use to start a business
- occurring once every year
- to give your voice to somebody or register your choice
13 Clues: occurring once every year • happening four times a year • to buy or sell goods or services • a thing that is needed or wanted • a holder of supplies for manufacturers • declared in law as unable to pay their debts • a fact that shows that smth exists or is true • an amount of smth expressed as a number out of 100 • a large sum of money which you use to start a business • ...
Social Security Puzzle 2024-02-22
13 Clues: enforcers • ______ age • DSS' Birthday • not a pension • street location • In with the new • long term benefit • Quantum of Pension • meets requirements • Short-term benefit • 1 week's contribution • Pension changes (2012) • out with the old (system)
Water Security Crossword! 2020-04-14
Across
- the quantity of water that can be used for human purposes without significant harm to ecosystems or other users.
- the measure of the total amount of water used by the customers within the water system.
- Issues related to agriculture, industry (including energy production), oil, fecal matter, and litter, may all contribute to this problem.
- the most common method used to desalinate water
- the collection of precipitation which falls on the roof of buildings.
- used to increase the amount of water stored in aquifers. It is widely used in some countries to enhance water supplies, such as in the Netherlands, Germany, and the USA.
- the removal of salt from seawater to make it suitable for drinking. It is an energy-intensive process and therefore usually expensive.
Down
- This is what is causing a shift in water availability and why some areas that previously had sufficient water now face droughts. These droughts are becoming more frequent and prolonged, causing water insecurity.
- used water that is not clean enough to be used again. This water usually originates from toilets.
- A ratio that rates countries from 0 to 5: the higher the number, the higher the water stress. The ratio compares total withdrawals to total available renewable supply on an annual basis (demand/supply).
- natural or artificially created lakes, used to collect and store water.
- used water that is clean enough to be used again. This water originates from baths, showers, washbasins, and washing machines
- access to sufficient, sustainable quantities of clean water and sanitation.
13 Clues: the most common method used to desalinate water • the collection of precipitation which falls on the roof of buildings. • natural or artificially created lakes, used to collect and store water. • access to sufficient, sustainable quantities of clean water and sanitation. • the measure of the total amount of water used by the customers within the water system. • ...
p.46 2025-08-13
17 Clues: почти • жертва • защита • уязвимый • недавний • уверенный • увеличить • база данных • безопасность • предотвратить • предупреждение • позволять себе • в соответсвии с • должностное лицо • среднестатистический • недостаток (чего-то) • рассматривать, принимать во внимание
Pluralsight Security Post Orders 2020-09-04
Across
- Use this program to send passdowns
- Leave all animals ____
- We observe and _______
- Form once per shift (2 wds)
- Your pants must be black _____ slacks
- Use this program to clock-in/out
- Be ____ and aware of your surrounding
- Send these to Devon every shift (2 wds)
- Wear it or you might share it
- Keep these on you during shift
Down
- Patrol that checks EVERYTHING (2 wds)
- ___ your patrol; do not jog or run
- Wear these so you can see...s
- ___ Perimeter patrols per 8 hr shift
- Excellent ____ customer service
- Duck, ___, and Hold during an earthquake.
- Should always be your first priority.
- Check this throughout your shift.
- No electronic devices unless __
- Your shoes must be black and _____
- Documents and tracks EVERYTHING.
- Stay off of these while on patrol
22 Clues: Leave all animals ____ • We observe and _______ • Form once per shift (2 wds) • Wear these so you can see...s • Wear it or you might share it • Keep these on you during shift • Excellent ____ customer service • No electronic devices unless __ • Use this program to clock-in/out • Documents and tracks EVERYTHING. • Check this throughout your shift. • ...
Security Awareness Puzzle 2015 2015-02-17
Across
- Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
- Passwords should be _________ every 3-4 months.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- Never share your _________ with another person.
- A password is stronger by using a combination of both upper and lower case ___________.
- A software that is designed to detect and destroy computer viruses.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- Use __________ passwords for the various accounts that you may have.
- Also known as malicious software; any program or file that is harmful to a computer user.
- ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
- A computer ______ can be considered as the modern counterpart of a paper document.
- A collection of information that is organized so that it can easily be accessed, managed, and updated.
- Healthy email always includes a clear and specific ____________ line.
- Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
- ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
Down
- __________ is a popular web search engine.
- Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- Use this tool to dispose of documents that contain personal or financial information.
- Do not send __________ information over email unless it is encrypted.
- A secure password should contain at least one of these.
- Email scam or attempt to trick you into giving your password or personal information.
- Do not leave your laptop or computer ____________.
- __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- Choose a password that is easy for you to ____________ but hard for someone to guess.
- A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
- To ________ the amount of spam you receive, be careful who you give your email address to.
- The state of being free from danger or threat.
- Another word for understanding, knowledge and well-informed.
- A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
- Passwords should always be at least this many characters long.
30 Clues: __________ is a popular web search engine. • The state of being free from danger or threat. • Passwords should be _________ every 3-4 months. • Never share your _________ with another person. • Do not leave your laptop or computer ____________. • A secure password should contain at least one of these. • Another word for understanding, knowledge and well-informed. • ...
Security Awareness Puzzle 2015 2015-02-11
Across
- To protect personal information, avoid sending it via_________.
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- Never share your _________ with another person.
- Healthy email always includes a clear and specific ____________ line.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- A collection of information that is organized so that it can easily be accessed, managed, and updated.
- Choose a password that is easy for you to ____________ but hard for someone to guess.
- Do not leave your laptop or computer ____________.
- Passwords should be _________ every 3-4 months.
- To ________ the amount of spam you receive, be careful who you give your email address to.
- When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
- A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
- _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
- Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
- Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
- Email scam or attempt to trick you into giving your password or personal information.
Down
- A computer ______ can be considered as the modern counterpart of a paper document.
- Also known as malicious software; any program or file that is harmful to a computer user.
- Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
- Passwords should always be at least this many characters long.
- A secure password should contain at least one of these.
- Do not send __________ information over email unless it is encrypted.
- A software that is designed to detect and destroy computer viruses.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- A password is stronger by using a combination of both upper and lower case ___________.
- Use this tool to dispose of documents that contain personal or financial information.
- Use __________ passwords for the various accounts that you may have.
- __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- Do not _______ your password down or attach it to your keyword or monitor.
- Do not __________ your password or account with anyone.
- Never forward any _________ letter.
- Always ___________ your computer when you leave your desk.
- ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
34 Clues: Never forward any _________ letter. • Never share your _________ with another person. • Passwords should be _________ every 3-4 months. • Do not leave your laptop or computer ____________. • A secure password should contain at least one of these. • Do not __________ your password or account with anyone. • Always ___________ your computer when you leave your desk. • ...
Food Security Ft. Nestle 2015-11-29
Across
- Rights Fundamental rights belonging to individuals in which the government may not interfere
- A system that maintains its own viability by using techniques that allow for continual reuse
- Ease of use, approach, reach
- Providing nourishment, especially to a high degree
- A diligent and systematic investigation into a subject in order to discover facts, theories, etc.
- Meeting minimum requirements
- An endangering, especially of one's reputation; A settlement as a result of mutual concession
- Involving one's personal resources of money
Down
- Suitable or ready for use
- Barely sufficient; as much as necessary
- Dependable, secure, free from danger
- Fundamental systems and facilities servicing an area
- Adequate for the purpose; enough
- The state of being free from danger or threat
- The entire body of individuals born and living at the same time
- Living in companionship as opposed to in isolation
- Performing in the best possible manner with least waste of time and effort
- The planning, implementation, and coordination of the details of an operation
- Of or relating to that which is material
- Relative standing; rank
20 Clues: Relative standing; rank • Suitable or ready for use • Ease of use, approach, reach • Meeting minimum requirements • Adequate for the purpose; enough • Dependable, secure, free from danger • Barely sufficient; as much as necessary • Of or relating to that which is material • Involving one's personal resources of money • The state of being free from danger or threat • ...
IT Security Awareness Contest 2022-04-15
Across
- the use of two different components to verify your identity
- type of tolerance rkmiles has to any actions that create a hostile work environment
- type of grammar that typically raise a red flag for phishing emails
- the first line of defense against cyber criminals
- what you should not let anyone do when you type in your password
- a math function to make data only available with a key
- malicious software that makes date or systems unusable until the victim makes a payment
- where data can be accessed as a service
- when you use the internet you leave this type of footprint behind
- recently discovered vulnerabilities, not yet known to vendors or antivirus companies that hackers can exploit
Down
- can be hardware or software
- program that can automate task
- mass emails sent to many people asking for sensitive information
- virus disguised as legit software
- type of consequence that a sender is asking from you to avoid
- software to assist in detecting virus's
- what you do with your mouse to see where a hyperlink will take you
- email designed to look like it's from a person you know
- what department should you get approval from for downloading software
- what a password should be
20 Clues: what a password should be • can be hardware or software • program that can automate task • virus disguised as legit software • software to assist in detecting virus's • where data can be accessed as a service • the first line of defense against cyber criminals • a math function to make data only available with a key • ...
Security N.1 bis 2023-01-29
Across
- L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
- Una delle password più comuni nel 2022: un evergreen!
- Genera e memorizza in modo sicuro password complesse in un unico luogo
- Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
- Malware che si replica per diffondersi ad altri computer della rete
- Quando i criminali usano gli sms truffa stanno cercando di fare….
- Simile a una password, ma generalmente più lunga per una maggiore sicurezza
- Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
- Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
Down
- _________ sempre il computer quando si lascia la scrivania
- Non aprire se non ci si fida del mittente
- Programma che registra i tasti premuti da un utente
- Il computer avrà molti popup se ne viene infettato
- Un programma software progettato per prevenire i virus
- Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
- Chiamate o messaggi vocali fraudolente
- Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
- Quella a 2 fattori è un tipo di ....... forte
- Una persona che prende o usa le informazioni del vostro computer
- L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
- Interazione online ostile che comporta messaggi di insulto tra gli utenti
21 Clues: Chiamate o messaggi vocali fraudolente • Non aprire se non ci si fida del mittente • Quella a 2 fattori è un tipo di ....... forte • Il computer avrà molti popup se ne viene infettato • Programma che registra i tasti premuti da un utente • Una delle password più comuni nel 2022: un evergreen! • Un programma software progettato per prevenire i virus • ...
2nd Quarter Security training 2023-04-17
Across
- Refer media questions to the CEO or ___ ___ ___.
- ____ if there is an accessible escape path
- Always take threats___.
- ___ silent alarms as soon as you feel safe to do so.
- Inform members of emergency and request they ___ the building.
- Ask witnesses to fill out an ___ ___.
- Once the robber leaves ___ the doors and put up closed signs.
- During a medical emergency have someone ___ with the member while another calls 911.
- If safe, secure cash and ___ ___ information before evacuating.
Down
- ___ you have been robbed.
- When you see a fire ___ the fire alarm to alert others.
- Dial ___ to report incident only if it is safe.
- A ____ is located under each phone.
- The robbery packet is located on the back of the ___ ___.
- Use the ___ to document details of the call for bomb and kidnapping threats.
- ____ in a secure location if you cannot escape
- Primary meeting point is at the ___ dot.
- The alternate meeting point is ___ if it is unsafe at the primary.
- As a last resort ____ to save yourself
- Don't be a ___.
- Put up a ___ paper used to signal all clear to law enforcement.
21 Clues: Don't be a ___. • Always take threats___. • ___ you have been robbed. • A ____ is located under each phone. • Ask witnesses to fill out an ___ ___. • As a last resort ____ to save yourself • Primary meeting point is at the ___ dot. • ____ if there is an accessible escape path • ____ in a secure location if you cannot escape • Dial ___ to report incident only if it is safe. • ...
Security Analysis & Portfolio Management 2022-05-15
Across
- The ability to buy or sell an asset quickly at a known price.
- The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
- --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
- The market ------------------is used as a benchmark to evaluate the performance of funds.
- ------------------------was one of the originators of Capital Asset Pricing model.
- The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
- ------------------------laid the foundations to the Portfolio theory.
- The ----------------------theorem suggests that investment and financing are two different decisions.
Down
- The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
- Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
- A -------------form EMH is when prices reflect all historical information.
- ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
- A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
- The --------------market is used for lending and borrowing short-term funds.
- The --------------measure is calculated as excess returns per unit of systematic risk.
- The --------------------market line is the graphical representation of CAPM.
- -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
- --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
- The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.
20 Clues: The ability to buy or sell an asset quickly at a known price. • ------------------------laid the foundations to the Portfolio theory. • A -------------form EMH is when prices reflect all historical information. • The --------------market is used for lending and borrowing short-term funds. • ...
ICT - Security and Communication 2017-11-20
Across
- Software that gathers data by monitoring key press on the user/s keyboard.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Unsolicited email sent over the internet.
- Used to verify that data comes from a secure and trusted source.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Authentication that relies on certain unique characteristics of human beings.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Refers to safety when using the internet like keeping personal data safe.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- Web applications or website that allow users to create and edit web pages using any web browser.
- The act of gaining unauthorized access to a computer system.
Down
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- A type of protocol that allows data to be sent and received securely over the internet.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Uses SMS system of mobile phones to send out fake text messages.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
22 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
ICT - Security and Communication 2017-11-20
Across
- Web applications or website that allow users to create and edit web pages using any web browser.
- Software that gathers data by monitoring key press on the user/s keyboard.
- Uses SMS system of mobile phones to send out fake text messages.
- A type of protocol that allows data to be sent and received securely over the internet.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Authentication that relies on certain unique characteristics of human beings.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Used to verify that data comes from a secure and trusted source.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- The act of gaining unauthorized access to a computer system.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Unsolicited email sent over the internet.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Refers to safety when using the internet like keeping personal data safe.
24 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Uses SMS system of mobile phones to send out fake text messages. • Used to verify that data comes from a secure and trusted source. • Refers to safety when using the internet like keeping personal data safe. • ...
ICT - Security and Communication 2017-11-20
Across
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- Used to verify that data comes from a secure and trusted source.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- A type of protocol that allows data to be sent and received securely over the internet.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Uses SMS system of mobile phones to send out fake text messages.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Web applications or website that allow users to create and edit web pages using any web browser.
- Refers to safety when using the internet like keeping personal data safe.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
- Software that gathers data by monitoring key press on the user/s keyboard.
Down
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- Authentication that relies on certain unique characteristics of human beings.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- The act of gaining unauthorized access to a computer system.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Unsolicited email sent over the internet.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
25 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
Security Bsides Cyprus 2019 2019-09-21
Across
- The M in HTML
- Famous Linux OS for Penetration Testing
- Mac address is a 12 byte. What type of numbers?
- Not bind shell
- Malware that encrypts data for money
- TCP & UDP runs in that OSI Layer
- Network authentication protocol
- Famous proxy tool for web penetration testing
- which is the first layer in OSI
- Goddess of Cyprus,Venus...
- decode this hex -> 7365637572697479
- 127.0.0.1 IP address
- You can use it for anonymity
Down
- name of first virus
- Swiss army knife of hacking tool/frequently used as backdoor
- Spyware, Trojan, worm, virus
- SSH means
- A cat tries to catch it but you can use it with your computer
- Cross Site _____ Attack
- Famous packet analyzer
- init 6
- IEE 802.11 describes which type of network?
- control and store your repo
- not one
- Which protocol is used by ping command
- The Ripper Cracking tool
- Not TCP
- Protocol that gives access to a user on a remote system
28 Clues: init 6 • not one • Not TCP • SSH means • The M in HTML • Not bind shell • name of first virus • 127.0.0.1 IP address • Famous packet analyzer • Cross Site _____ Attack • The Ripper Cracking tool • Goddess of Cyprus,Venus... • control and store your repo • Spyware, Trojan, worm, virus • You can use it for anonymity • Network authentication protocol • which is the first layer in OSI • ...
Security Bsides Cyprus 2019 2019-09-21
Across
- an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
- The M in HTML
- Famous Debian Distribution for Penetration Testing
- A cat tries to catch it but you can use it with your computer
- Which protocol is used by ping command
- Goddess of Cyprus,Venus...
- name of first virus
- Malware that encrypts data for money
- Famous proxy tool for web penetration testing
- Not bind shell
- Famous packet analyzer
- You can use it for anonymity
- which is the first layer in OSI
- decode this hex -> 7365637572697479
- Swiss army knife of hacking tool/frequently used as backdoor
Down
- control and store your repo
- Spyware, Trojan, worm, virus
- init 6
- 127.0.0.1 IP address
- Network authentication protocol
- IEE 802.11 describes which type of network?
- Not TCP
- TCP & UDP runs in that OSI Layer
- Mac address is a 12 byte. What type of numbers?
- The Ripper Cracking tool
- Cross Site _____ Attack
- Protocol that gives access to a user on a remote system
27 Clues: init 6 • Not TCP • The M in HTML • Not bind shell • name of first virus • 127.0.0.1 IP address • Famous packet analyzer • Cross Site _____ Attack • The Ripper Cracking tool • Goddess of Cyprus,Venus... • control and store your repo • Spyware, Trojan, worm, virus • You can use it for anonymity • Network authentication protocol • which is the first layer in OSI • ...
Final Crossword Security Plus 2024-06-04
Across
- inserts statements to manipulate a database server
- hiding data within an ordinary, nonsecret file
- Removing user accounts
- ensuring that an organization adheres to laws and regulations
- It only goes off after certain conditions are met
- Subset of the board that manages governance issues
- bruteforce collision attack that exploits the probability theory
- Threat actors who are strongly motivated by philosophical or political beliefs.
- involves isolating sensitive enterprise data
- pose a threat from the position of a trusted entity
- refers to integrating security into the application
- A device that distributes work across a network
- An attack that copies data and then uses it
- The entity that is responsible for digital certificates
- Individual or entity who is responsible for attacks
- is a finite sequence of rigorous instructions
- Data that is encapsulated within a secure outer shell
- Threat actors who are employed by their own government to carry out attacks
Down
- Vulnerability for which there are no days of advanced warning
- The rapid detection and elevation of a threat incident
- A downgrade attack
- server within the DMZ that is used to connect two dissimilar security zones
- features and characteristics of the individual
- two or more different messages that produce the same hash value
- Standard preconfigured passwords
- decentralized, distributed and public digital ledger
- An AP set up by an attacker to mimic an authorized AP
- A malicious program that uses a computer network to replicate
- Closing unused ports and disabling unnecessary protocols
- resource that is not possible due to geography
- An unauthorized AP that allows an attacker to bypass many of the network security
- denial of the truth or validity of something
- validate a main domain along with all subdomains
- evidence or proof of something
- A product that consolidates real-time security monitoring and management
- performs a real-time lookup of a certificate’s status
- unauthorized copying of data
- object whose state cannot be modified after it is created
- Identifying and mitigating risks brought on by a third party
- retains historical documents
40 Clues: A downgrade attack • Removing user accounts • unauthorized copying of data • retains historical documents • evidence or proof of something • Standard preconfigured passwords • An attack that copies data and then uses it • denial of the truth or validity of something • involves isolating sensitive enterprise data • is a finite sequence of rigorous instructions • ...
Privacy and Security Online 2024-04-25
Across
- changes a browser's behavior, settings, or appearance without user consent
- theft A type of scam where someone tries to trick you into giving them your personal information
- A setting that allows you to control who can see your profile and posts
- A type of software that can harm your computer or steal your information
- A piece of software that can protect your computer from online threats
- A place where you can safely store your passwords and other sensitive information
- A symbol or character that represents you online
- when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
- the safe and responsible use of information and communication technologies
- A type of attack where someone pretends to be someone else to gain access to your personal information
- sharing photos, videos, and messages with other people
- piracy the illegal copying or distribution of copyrighted material via the Internet
- users open the app an average of 19 times a day
- a collective term for websites and applications that focus on communication
- System used to protect computer systems
- Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
- You should never share this with strangers online
- keep your digital doors locked
- virus a type of malware that downloads onto a computer disguised as a legitimate program
- short and less than 8 characters
20 Clues: keep your digital doors locked • short and less than 8 characters • System used to protect computer systems • users open the app an average of 19 times a day • A symbol or character that represents you online • You should never share this with strangers online • sharing photos, videos, and messages with other people • ...
Hopsital safety and security 2024-10-14
Across
- Summoning Security.
- Measures taken to ensure only authorized personnel can enter certain areas.
- Personal Protective Equipment used to protect healthcare workers from infection.
- An identification card worn by hospital staff.
- A strict isolation imposed to prevent the spread of disease.
- The provision of fresh air to a room, building, etc., which is crucial in preventing the spread of airborne diseases.
- A substance or product used to reduce the number of germs on surfaces or skin.
- The presence of an infectious agent on a body surface, surgical instrument, or other inanimate articles.
- A set of rules or procedures to be followed in medical or clinical settings.
- A person employed to protect the premises and ensure safety.
Down
- Continuous observation of a place, person, or activity.
- An emergency protocol to prevent people from entering or leaving.
- A part of PPE that protects hands from contamination.
- A designated route for leaving a building in case of an emergency.
- The process of separating sick individuals from healthy ones to prevent the spread of disease.
- The process of making something free from bacteria or other living microorganisms.
- Practices to maintain health and prevent disease, especially through cleanliness.
- A temporary identification issued to visitors.
- Closed-circuit television used for monitoring.
- A device that signals the presence of a security breach.
20 Clues: Summoning Security. • An identification card worn by hospital staff. • A temporary identification issued to visitors. • Closed-circuit television used for monitoring. • A part of PPE that protects hands from contamination. • Continuous observation of a place, person, or activity. • A device that signals the presence of a security breach. • ...
Chapter 5 security Plus 2025-03-22
Across
- A request that has been fabricated
- takes advantage of a vulnerability to move to restricted directories
- store data in RAM beyond the boundaries
- An attack in which a website accepts user input without validating it
- hides its presence on the device
- A sign an attack is currently underway
- A malicious program that uses a computer network to replicate
- move from the root directory to other restricted directories
- An attack that copies data and then uses it
- account that is inaccessible through a normal login attempt
- Malware that replicates by infecting other files or programs
- An indicator of attack in which data is no longer accessible
- An attack in which threat actors introduce something into RAM
- Closing unused ports and disabling unnecessary protocols
- inserts statements to manipulate a database server
Down
- depletion of memory or processing capabilities
- resource that is not possible due to geography
- It only goes off after certain conditions are met
- threat actor gains illicit access of elevated rights or privileges
- Software installed on a device without the user requesting it
- Malware disguised as something useful or legitimate
- A cookie that is only sent to the server with an encrypted request
- Installing software security updates
- captures and stores each keystroke that a user types on the computer’s keyboard
- Secure space for running untrusted software
- monitors endpoints and immediately blocks a malicious attack
26 Clues: hides its presence on the device • A request that has been fabricated • Installing software security updates • A sign an attack is currently underway • store data in RAM beyond the boundaries • An attack that copies data and then uses it • Secure space for running untrusted software • depletion of memory or processing capabilities • ...
The Function and Structure of the United Nations 2024-07-21
Across
- Adopted by the UN International Court of Justice, fundamental human rights and freedoms. Universal ___ of Human Rights
- Where all 193 member states meet, (General_)
- UN staff are international civil ___
- Carries out day-to-day work, administers programs, and services other principal organs of the UN.
- Location of the International Court of Justice
- Established to supervise Trust Territories, ensuring their preparation for self-government or independence. (___ council)
- Responsible for maintaining international peace and security. It has 15 members, and its decisions are binding.
Down
- The principal judicial organ of the UN, settling legal disputes between states and providing advisory opinions. (4 words)
- Ambitious targets set by the UN to address global challenges like poverty, health, and education.
- Permanent members can vote "no" to any decision suggested by the Security Council.
- ____ forces may prevent conflict through mediation and dispute resolution
- UN's efforts to prevent conflicts and maintain peace in troubled regions.
- Members China, France, Russia, UK and USA
- A specialized agency within the UN system, focusing on education, science, culture, and communication.
14 Clues: UN staff are international civil ___ • Members China, France, Russia, UK and USA • Where all 193 member states meet, (General_) • Location of the International Court of Justice • ____ forces may prevent conflict through mediation and dispute resolution • UN's efforts to prevent conflicts and maintain peace in troubled regions. • ...
