cyber security Crossword Puzzles

Cyber ethics 2025-06-14

Cyber ethics crossword puzzle
Across
  1. A legal right granted by the law to the creator for his original work.
  2. Purchasing a single lisenced copy of the software and loading it into several computers.
  3. Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
  1. An illegal intrution into a computer system Or network.
  2. Vital information resources under seize.
  3. An act of sending to an user, misleading him to belive that it is from a trusted organisation.
  4. Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
  5. Unwanted bulk emails that comes from unknown sources.

8 Clues: Vital information resources under seize.Unwanted bulk emails that comes from unknown sources.An illegal intrution into a computer system Or network.A legal right granted by the law to the creator for his original work.Purchasing a single lisenced copy of the software and loading it into several computers....

Cyber Safety 2024-08-06

Cyber Safety crossword puzzle
Across
  1. - Bullying online
  2. - Being safe online
  3. - Putting agressive presure on someone
  4. - Stands up against bullies
Down
  1. - Protecting systems
  2. - Supporting bullies
  3. - Sites that are accessed using a web browser
  4. - Connected computers share resources

8 Clues: - Bullying online- Being safe online- Protecting systems- Supporting bullies- Stands up against bullies- Connected computers share resources- Putting agressive presure on someone- Sites that are accessed using a web browser

Sicherheit im Netz 2025-04-22

Sicherheit im Netz crossword puzzle
Across
  1. Beispiel für Cyber-Mobbing
  2. Viren infizieren deinen Computer.
  3. Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?
  4. Das häufigste Mittel Menschen zu manipulieren.
Down
  1. Ein Grund warum gemobbt wird.
  2. Was solltest du bei unangemessenen Inhalten tun?
  3. Wie nennt man Mobbing im Internet?
  4. Mache ... von unangenehmen Nachrichten/Bildern oder Chats.

8 Clues: Beispiel für Cyber-MobbingEin Grund warum gemobbt wird.Viren infizieren deinen Computer.Wie nennt man Mobbing im Internet?Das häufigste Mittel Menschen zu manipulieren.Was solltest du bei unangemessenen Inhalten tun?Mache ... von unangenehmen Nachrichten/Bildern oder Chats.Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?

class puzzle 2023-08-28

class puzzle crossword puzzle
Across
  1. short for "malicious software" and covers threats such as viruses, worms, Trojanhorses, ransomware and the numerous other programs used by hackers to gainaccess to or damage sensitive information on a computer
  2. intent of doing harm
  3. gap or weakness which undermines an organization’s security efforts
  4. making sure a person is who they say they are
  5. rights an individual or organization has over information and how it is used
  6. procedure used to determine user privileges or access levels to the system
Down
  1. Virus macros which have been programmed to carry out malicious intent
  2. how information is protected
  3. information or data which can be accessed when needed
  4. state of being complete or uncorrupted
  5. calculated assessment of potential threats to an organization’s security
  6. network of computers and devices managed as a unit with the same proceduresand rules
  7. requirement of being private or secret

13 Clues: intent of doing harmhow information is protectedstate of being complete or uncorruptedrequirement of being private or secretmaking sure a person is who they say they areinformation or data which can be accessed when neededgap or weakness which undermines an organization’s security efforts...

Chapter 14: Taxes 2017-04-26

Chapter 14: Taxes crossword puzzle
Across
  1. (2) form used to pay taxes
  2. amounts subtracted from income
  3. (2) taxable income, property, good or service
  4. imported goods tax
  5. government income from taxes
  6. (2) tax paid upon purchasing a good or service
  7. spending levels can be adjusted
  8. tax payments before receiving pay
  9. pays for government programs and services
Down
  1. example: Social Security and Medicare
  2. programs you must qualify for to receive services
  3. (2) example: sales tax
  4. funds Medicare and Social Security

13 Clues: imported goods tax(2) example: sales tax(2) form used to pay taxesgovernment income from taxesamounts subtracted from incomespending levels can be adjustedtax payments before receiving payfunds Medicare and Social Securityexample: Social Security and Medicarepays for government programs and services(2) taxable income, property, good or service...

CIS Controls & Technicians 2024-05-14

CIS Controls & Technicians crossword puzzle
Across
  1. track and manage hardware devices
  2. protect the organization's info through measures such as encryption and access controls
  3. educate users on safe-handling of information
  4. regularly test the security controls by simulating attacks on systems and networks
  5. manage the security life cycle of acquired software
Down
  1. only authorized to be installed and executed
  2. continuously acquire, assess and take action
  3. defense of this is to control the installation, spread and execution of malicious code
  4. part of inventory and control of enterprise assets
  5. protect the organization's info, by developing and implementing an incident response capability
  6. test of security controls to ensure they are effective and updated as needed

11 Clues: track and manage hardware devicesonly authorized to be installed and executedcontinuously acquire, assess and take actioneducate users on safe-handling of informationpart of inventory and control of enterprise assetsmanage the security life cycle of acquired softwaretest of security controls to ensure they are effective and updated as needed...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many Cristo Rey students are part of a “team” at their job? (write out number)
  2. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  5. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  8. What type of classes does Northside Hospital offer?
  9. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
Down
  1. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  2. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. Which Cristo Rey sports team won medals at Florida National Competition?
  5. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  6. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  7. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  8. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  9. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  10. What percent of students at Cristo Rey get accepted to college after graduation?
  11. What is the title of the football team’s hype video on Marist School’s website?

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

HistoryPuzzlebyLP 2022-01-14

HistoryPuzzlebyLP crossword puzzle
Across
  1. Abbreviation for Public Works Act
  2. 2nd day of the week
  3. last name of the 32nd US president
  4. AKA National Labor Relations Act
  5. getting a loan then investing which is known as "_____ on margin"
  6. "National ______ Act"
  7. "____ Cabinet" & "____ Tuesday" (one word)
  8. Wife of the 32nd US president's first name
  9. the beginning of a politician's term in office (____ 100 days)
Down
  1. the first word in AAA (____ Adjustment Act)
  2. Organization that provides assistance & relief
  3. Jobless WW1 veterans organized a group called
  4. Series of programs often summed up by the the three R's which was enacted by President Roosevelt
  5. "Tennessee _____ Authority" (TVA)
  6. "____ security" + ism
  7. "Social _____ Act"

16 Clues: "Social _____ Act"2nd day of the week"____ security" + ism"National ______ Act"AKA National Labor Relations ActAbbreviation for Public Works Act"Tennessee _____ Authority" (TVA)last name of the 32nd US president"____ Cabinet" & "____ Tuesday" (one word)Wife of the 32nd US president's first namethe first word in AAA (____ Adjustment Act)...

INFORMATION TECHNOLOGY 2021-02-09

INFORMATION TECHNOLOGY crossword puzzle
Across
  1. any number of computers and devices joined together by a communications link
  2. Internet Service Provider
  3. Career and Technical Education
  4. Hypertext Markup Language
  5. physical components of a computer
  6. Operating System
  7. fake emails to try and get personal information
  8. Local Area Network, single building or location
  9. 2-year college degree or training
  10. malicious code that secretly watches what you send over the internet
Down
  1. writes code to create software programs
  2. 4-year college degree
  3. programs that make a computer useful, Word, Excel, PowerPoint, etc.
  4. Wide Area Network, connects computer devices over dispersed locations
  5. pertaining to the world wide web culture
  6. Wireless LAN, radio, microware or infrared links take the place of physical cables

16 Clues: Operating System4-year college degreeInternet Service ProviderHypertext Markup LanguageCareer and Technical Educationphysical components of a computer2-year college degree or trainingwrites code to create software programspertaining to the world wide web culturefake emails to try and get personal information...

Tugas ppkn 2023-11-02

Tugas ppkn crossword puzzle
Across
  1. UU no 11 tahun 2008 berisi tentang informasi dan transaksi...
  2. kejahatan yang menyalahgunakan teknologi internet
  3. salah satu sarana efektif untuk mencegah dampak negatif kemajuan IPTEK dengan penanaman nilai-nilai
  4. Ilmu pengetahuan dan teknologi
  5. pembuat pesawat Indonesia
  6. Candi yang berada di Jawa tengah
  7. 1984 Apple menghasilkan komputer
Down
  1. sebelum ditemukan orang zaman dulu berkomunikasi melalui
  2. Lembaga ilmu pengetahuan Indonesia
  3. Bidang yang berkaitan dengan pemerintahan dan kebijakan pemerintah
  4. warga yang mulai mengembangkan sistem pertanian belasan tahun yang lalu
  5. Sistem Komunikasi Satelit Domestik
  6. salah satu bukti nyata adanya kemudahan berbelanja melalui toko
  7. Meningkatkan devisa negara termasuk dalam bidang
  8. Johannes Gutenberg pada 1440 mulai mengembangkan mesin
  9. siapa yang mengeluarkan komputer seri 650dan700

16 Clues: pembuat pesawat IndonesiaIlmu pengetahuan dan teknologiCandi yang berada di Jawa tengah1984 Apple menghasilkan komputerLembaga ilmu pengetahuan IndonesiaSistem Komunikasi Satelit Domestiksiapa yang mengeluarkan komputer seri 650dan700Meningkatkan devisa negara termasuk dalam bidangkejahatan yang menyalahgunakan teknologi internet...

Types of Markets 2022-01-25

Types of Markets crossword puzzle
Across
  1. The ___(issuing stocks for the first time) typically occurs in a primary market.
  2. Primary and secondary ___ are sold in a primary market.
  3. Zero-coupon bonds do not earn ____ within the bond market.
  4. Within bond markets in the US, bonds have a ___ value of $1000.
  5. ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
  6. The most populated exchange in the U.S who owns trading rights with listed companies
  7. Future markets help protect against ___ of uncertain markets.
  8. In a secondary market shares of stock are ___ to the public
Down
  1. ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
  2. buy orders at a ____ price.
  3. Corporations issue debt securities to be traded within ____ markets.
  4. A security is sold in a ___ market when it is first issued.
  5. ____ exchanges are markets that do not have a location.
  6. The purpose of trading within security markets is
  7. Raising capital within public and private markets is a goal within the ___ market.]
  8. Who must register bonds within the bond market?

16 Clues: buy orders at a ____ price.Who must register bonds within the bond market?____ exchanges are markets that do not have a location.The purpose of trading within security markets isPrimary and secondary ___ are sold in a primary market.Zero-coupon bonds do not earn ____ within the bond market....

Airport 2024-06-12

Airport crossword puzzle
Across
  1. Before security, put your __________ bag.
  2. To spend time looking at items in the airport shops, you_________.
  3. To give extra money for a heavy bag, you need to ______________.
  4. To make sure your shoes are secure, ______ your shoelaces.
  5. To go through security, you need to ______________ the scanner.
  6. If your baggage is too heavy, it is called ______________.
Down
  1. To arrive at the airport early so you don't ______________.
  2. To wait in line with other passengers, you need to ______________.
  3. To check the flight times, look at the ______________.
  4. Security staff might ____ you ____ for safety.

10 Clues: Before security, put your __________ bag.Security staff might ____ you ____ for safety.To check the flight times, look at the ______________.To make sure your shoes are secure, ______ your shoelaces.If your baggage is too heavy, it is called ______________.To arrive at the airport early so you don't ______________....

DevSecOps Crossword 2024-04-26

DevSecOps Crossword crossword puzzle
Across
  1. Continuous ..... is a development practice that requires team member to integrate code into repository at least once a day
  2. ..... Engineer enables the developer with automation and CI/CD pipeline
  3. Practices that emphasize security as code and everyone is responsible for security
  4. Activity or anything that does not add value
  5. The most popular Agile Framework
  6. One of the most popular DevSecOps orchestration tool
Down
  1. Simple,lightweight and loosely coupled architectural style
  2. Agile Methodology that introduces Continuous Integration
  3. White box security scan approach in DevSecOps pipeline
  4. Team to ensure service reliability, introduced by Google in 2003

10 Clues: The most popular Agile FrameworkActivity or anything that does not add valueOne of the most popular DevSecOps orchestration toolWhite box security scan approach in DevSecOps pipelineAgile Methodology that introduces Continuous IntegrationSimple,lightweight and loosely coupled architectural style...

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

The Crowned Mystic 2026-01-04

The Crowned Mystic crossword puzzle
Across
  1. A synonym for “magic”
  2. Elena’s best friend
  3. Alexei’s enhanced power
  4. The name of the Director of Security
  5. City Elena grew up in
Down
  1. What Elena wears on her head
  2. Elena’s magical power
  3. The queen lives here
  4. The name of Elena’s country
  5. Alexei’s job

10 Clues: Alexei’s jobElena’s best friendThe queen lives hereElena’s magical powerA synonym for “magic”City Elena grew up inAlexei’s enhanced powerThe name of Elena’s countryWhat Elena wears on her headThe name of the Director of Security

BusFin Chapter 1 2024-08-19

BusFin Chapter 1 crossword puzzle
Across
  1. a security that represents ownership in a company
  2. setting financial goals is the _____ step in the financial planning process
  3. a factor that affects financial activities; related to inflation
  4. supply and demand, risk, and liquidity are some factors that affect the value of this
  5. the ease in which an investment can be converted to cash
  6. when a country imports more than it exports
Down
  1. financial market where short-term debt is bought and sold
  2. what you give up by making a choice
  3. a debt security
  4. ________, investor funds, and borrowing are all sources of funds
  5. a commercial bank is an example of a ___________institution

11 Clues: a debt securitywhat you give up by making a choicewhen a country imports more than it exportsa security that represents ownership in a companythe ease in which an investment can be converted to cashfinancial market where short-term debt is bought and solda commercial bank is an example of a ___________institution...

The Online World 2015-09-21

The Online World crossword puzzle
Across
  1. Search Engine
  2. A website connected to another via a link
  3. One system to another
  4. Movement of files from a system to your computer
  5. Recipient of a small fee for traffic clicking through an add
Down
  1. Set of online rules for the cyber net
  2. The format of a file after compression
  3. Only a readable version of a file
  4. Type of online communication
  5. Name for and education online site
  6. A online collection of personal

11 Clues: Search EngineOne system to anotherType of online communicationA online collection of personalOnly a readable version of a fileName for and education online siteSet of online rules for the cyber netThe format of a file after compressionA website connected to another via a linkMovement of files from a system to your computer...

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

Practica 8A 2023-02-14

Practica 8A crossword puzzle
Across
  1. arrival
  2. suitcase
  3. to last
  4. customs
  5. to inspect, to search
  6. airport
  7. security checkpoint
  8. flight
Down
  1. to check (luggage)
  2. aisle
  3. to board
  4. customs officer
  5. tourist
  6. passenger
  7. reservation
  8. delay
  9. pilot

17 Clues: aisledelaypilotflightarrivaltouristto lastcustomsairportto boardsuitcasepassengerreservationcustoms officerto check (luggage)security checkpointto inspect, to search

Chemical Process Engineer 2023-09-17

Chemical Process Engineer crossword puzzle
Across
  1. relevance
  2. a sort of variation
  3. device
  4. outcome
  5. fluently
  6. adjustment
Down
  1. timetable
  2. care
  3. improvement
  4. procedure
  5. security
  6. solving issues
  7. analyse
  8. arrangement
  9. supervision
  10. unit
  11. you receive it at work

17 Clues: careunitdeviceanalyseoutcomesecurityfluentlytimetableprocedurerelevanceadjustmentimprovementarrangementsupervisionsolving issuesa sort of variationyou receive it at work

Crossword 08 2023-10-25

Crossword 08 crossword puzzle
Across
  1. refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
  2. refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
  3. refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
  4. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
  5. refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
  6. refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
  7. refers to a computer or a computer network, the electronic medium in which online communication takes place;
  8. refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
  9. refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic
  10. refers to the DOJ – Office of Cybercrime
  11. refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
Down
  1. refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
  2. refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
  3. refers to a set of instructions executed by the computer to achieve intended results;
  4. refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
  5. refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
  6. refers to the modification or change, in form or substance, of an existing computer data or program;
  7. refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
  8. the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network
  9. refers to gathering and receiving information;

20 Clues: refers to the DOJ – Office of Cybercrimerefers to gathering and receiving information;refers to a set of instructions executed by the computer to achieve intended results;refers to the modification or change, in form or substance, of an existing computer data or program;...

Food Security 2022-07-08

Food Security crossword puzzle
Across
  1. liquid used to water plants and grow animals.
  2. to be able to get something
  3. the long term shifts in temperature and weather patterns.
  4. the state of being unable to buy necessary things to survive easily
Down
  1. art of growing crops and raising live stock.
  2. need for food.
  3. long time of dry weather and lack of water.
  4. when something can be accessed
  5. movement of food or goods from one area to another.

9 Clues: need for food.to be able to get somethingwhen something can be accessedlong time of dry weather and lack of water.art of growing crops and raising live stock.liquid used to water plants and grow animals.movement of food or goods from one area to another.the long term shifts in temperature and weather patterns....

Security Issues 2019-01-29

Security Issues crossword puzzle
Across
  1. Everything is backed up at once.
  2. In this type of backup, only two image files are required to restore the system!
  3. Faster backup time as only amended files need to be copied.
  4. A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
  1. Useful when backing up large amounts of data.
  2. Procedures or measures taken to ensure the safety of an organisation.
  3. This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
  4. This is information that is still important but it is not needed for immediate use.
  5. A very important element to a company/organisation!

9 Clues: Everything is backed up at once.Useful when backing up large amounts of data.A very important element to a company/organisation!Faster backup time as only amended files need to be copied.Procedures or measures taken to ensure the safety of an organisation.In this type of backup, only two image files are required to restore the system!...

Information security 2020-08-26

Information security crossword puzzle
Across
  1. potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
  2. Is the process of determining and assigning privileges to various resources, objects or data.
  3. the action of stopping any form of attack from happening.
  4. An internet scam that targets unsuspecting users through email.
  5. Is a technique that is used to exploit a vulnerability in any application attack gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Down
  1. a way of injecting malicious scripts into web pages.
  2. Are small files that Web sites put on your computer hard disk drive when you first visit.
  3. the process of tracking recording system activities and resource access.
  4. People, property, and information that needed to be protected asset Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.

9 Clues: a way of injecting malicious scripts into web pages.the action of stopping any form of attack from happening.An internet scam that targets unsuspecting users through email.the process of tracking recording system activities and resource access.Are small files that Web sites put on your computer hard disk drive when you first visit....

Security Department 2020-03-28

Security Department crossword puzzle
Across
  1. a person who monitor that the hotel areas are in order
  2. a metal box in which valuable objects are stored
  3. a objet that records images in or outside a building or in a public place, in order to prevent or help solve situation in the future
  4. a device such as a bell or siren that warns the people in a building that the building is on fire
  5. the careful watching of a person or place
  6. a place in a hotel where things that people have lost are stored
Down
  1. prepare the annual security program and inspect the operation of the alarms
  2. a person who guard employed by the hotel
  3. the crime of stealing from somewhere or someone

9 Clues: a person who guard employed by the hotelthe careful watching of a person or placethe crime of stealing from somewhere or someonea metal box in which valuable objects are storeda person who monitor that the hotel areas are in ordera place in a hotel where things that people have lost are stored...

Security percutions 2020-11-26

Security percutions crossword puzzle
Across
  1. s a method of changing the original numbers and characters so that they are hidden or disguised. This is important if you are sending sensitive information.
  2. an expert at programming and solving problems with a computer
  3. It helps you prevent viruses
  4. is a law that determines whether people are allowed to access computers and modify the data on the computer system.
Down
  1. are used to check packets of data as they are received by a computer system from a network or the internet
  2. small malicious program that can alter and delete files
  3. An internet worm is a program that spreads across the internet by replicating itself on computers via their network connections.
  4. This type of malicious software pretends to be a useful program while secretly performing another function
  5. Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

9 Clues: It helps you prevent virusessmall malicious program that can alter and delete filesan expert at programming and solving problems with a computerare used to check packets of data as they are received by a computer system from a network or the internet...

Security Matters 2023-10-02

Security Matters crossword puzzle
Across
  1. You'll need a pole for this
  2. You might use a wasp sord to protect this
  3. If I were doing my Bruce Forsythe impression I would be?
  4. I might be called this on the golf course
  5. What caused the lockdowns
Down
  1. Holding clothes hostage
  2. Trying desperately to get a compliment
  3. IF you dont have this you might go to your cry suite
  4. Tin of processed meat

9 Clues: Tin of processed meatHolding clothes hostageWhat caused the lockdownsYou'll need a pole for thisTrying desperately to get a complimentYou might use a wasp sord to protect thisI might be called this on the golf courseIF you dont have this you might go to your cry suiteIf I were doing my Bruce Forsythe impression I would be?

Social Security 2023-12-15

Social Security crossword puzzle
Across
  1. A federal insurance program
  2. You can earn a maximum of four of these per year and you need 40 to qualify for future Social Security benefits
  3. It’s the tax withheld from your wages that funds the Social Security and Medicare programs.
  4. Primary Insurance Amount
Down
  1. Social security has five types of __
  2. A joint federal and state program that helps with medical costs for people with low incomes and limited resources.
  3. Programs that provide monthly cash benefits to workers and their dependents when they retire, become disabled, or die
  4. An index prepared by the U. S. Department of Labor that charts the rise in costs for selected goods and services
  5. Documents you must submit to support a factor of entitlement or payment amount

9 Clues: Primary Insurance AmountA federal insurance programSocial security has five types of __Documents you must submit to support a factor of entitlement or payment amountIt’s the tax withheld from your wages that funds the Social Security and Medicare programs....

Security Meeting 2025-01-22

Security Meeting crossword puzzle
Across
  1. Found in the top drawer at LC desk.
  2. Opener does this in the morning to clear the branch.
  3. Number of hand-held alarms in branch.
  4. The robbery folder color.
Down
  1. "Alt +___ + I" is used in TCR during robbery.
  2. The Extortion folder color.
  3. The phone we use to call 911.
  4. Color of our "All Clear" sign.
  5. Where to meet during evacuation.

9 Clues: The robbery folder color.The Extortion folder color.The phone we use to call 911.Color of our "All Clear" sign.Where to meet during evacuation.Found in the top drawer at LC desk.Number of hand-held alarms in branch."Alt +___ + I" is used in TCR during robbery.Opener does this in the morning to clear the branch.

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. what is NFSA
  2. Introduced Pradhan Mantri Garib Kalyan Anna Yojana
  3. How many kgs under AAY
Down
  1. What is the price/kg
  2. What is AAY
  3. beneficiaries
  4. How many kg/person
  5. how many years
  6. how it is distributed
  7. When it was started

10 Clues: What is AAYwhat is NFSAbeneficiarieshow many yearsHow many kg/personWhen it was startedWhat is the price/kghow it is distributedHow many kgs under AAYIntroduced Pradhan Mantri Garib Kalyan Anna Yojana

OffDig 2024-12-17

OffDig crossword puzzle
Across
  1. Kort for teknologi og AI-platforme
  2. Kunstig intelligens til at styrke konkurrenceevne
  3. En essentiel teknologi til moderne AI-løsninger
  4. Automatisering af processer gennem avancerede digitale værktøjer
  5. AI-løsninger, der skaber reel forretningsværdi
Down
  1. Hjælper virksomheder med AI-strategi og transformation
  2. En ledende aktør inden for digital og AI-transformation
  3. AI som kernen i fremtidens nytænkning
  4. Beskytter organisationer mod digitale trusler
  5. Bruges til at drive strategi og vækst

10 Clues: Kort for teknologi og AI-platformeAI som kernen i fremtidens nytænkningBruges til at drive strategi og vækstBeskytter organisationer mod digitale truslerAI-løsninger, der skaber reel forretningsværdiEn essentiel teknologi til moderne AI-løsningerKunstig intelligens til at styrke konkurrenceevneHjælper virksomheder med AI-strategi og transformation...

Industrial Cryptic 2026-01-20

Industrial Cryptic crossword puzzle
Across
  1. Automaton formed from Dragos CEO and OT
  2. Initially, some cyber alerts disrupt automation control system
  3. Safety-critical broadcasts enter Scottish lake
  4. Rare minerals opt for Caribbean spirits
  5. Industrial routine scrambled in DoD grid call
Down
  1. Stage 2 pivot orders dessert, Ken Burns?
  2. Throttles as wolf inverts, trapped in rival vendor
  3. Mickey overheard full malware module
  4. Package installer adds final code including strangely armed hallucination
  5. Noisy attempt joins sibling malware

10 Clues: Noisy attempt joins sibling malwareMickey overheard full malware moduleAutomaton formed from Dragos CEO and OTRare minerals opt for Caribbean spiritsStage 2 pivot orders dessert, Ken Burns?Industrial routine scrambled in DoD grid callSafety-critical broadcasts enter Scottish lakeThrottles as wolf inverts, trapped in rival vendor...

FNAF 2024-03-28

FNAF crossword puzzle
Across
  1. What do you use to watch the animatronics?
  2. The ____ of 1987
  3. Who serves ice cream?
  4. FNAF___ was Scotts most controversial FNAF game.
  5. Old Man ____ (he fishes)
  6. Who is the purple guy?
  7. Which character has a cupcake?
Down
  1. Who is the security guard in Security Breach?
  2. Who is the pirate?
  3. Who wants to be beautiful?
  4. Who originally plays the electric guitar?
  5. Which child possesses Golden Freddy?
  6. What is the name of William Afton's daughter?

13 Clues: The ____ of 1987Who is the pirate?Who serves ice cream?Who is the purple guy?Old Man ____ (he fishes)Who wants to be beautiful?Which character has a cupcake?Which child possesses Golden Freddy?Who originally plays the electric guitar?What do you use to watch the animatronics?Who is the security guard in Security Breach?...

Airport vocab Elliot 2026-03-25

Airport vocab Elliot crossword puzzle
Across
  1. mask
  2. service
  3. time
  4. seat
  5. security
  6. delay
  7. to land
Down
  1. window
  2. oxygen
  3. track
  4. assistant
  5. afternoon
  6. aisle
  7. flight
  8. to take off

15 Clues: masktimeseattrackaisledelaywindowoxygenflightserviceto landsecurityassistantafternoonto take off

"The Tale of Jenny and the Coffee Juggler" 2024-09-11

"The Tale of Jenny and the Coffee Juggler" crossword puzzle
Across
  1. What Carl really wants.
  2. How Jenny feels when enforcing security.
  3. What Jenny's sticking to like glue.
  4. What Carl forgot to show.
  5. What you're trying to prevent.
  6. That feeling you should ignore when enforcing security.
Down
  1. What you need to ask for ID.
  2. A classic security no-no.

8 Clues: What Carl really wants.A classic security no-no.What Carl forgot to show.What you need to ask for ID.What you're trying to prevent.What Jenny's sticking to like glue.How Jenny feels when enforcing security.That feeling you should ignore when enforcing security.

FNAF crossword 2024-04-05

FNAF crossword crossword puzzle
Across
  1. Animatronics from security breach
  2. Animatronics from the second game
  3. Cheapest set of animatronics in pizzeria simulator
  4. Where is glamrock bonnie hidden in ruin
  5. What role do you play as in FNAF 1-3
  6. What suit does afton get springlocked in
  7. Where are you in FNAF 4
Down
  1. Animatronics from sister location
  2. Animatronics from the third game
  3. The most disregarded FNAF game
  4. Everyones fav black bear
  5. Who causes hallucinations saying "its me"
  6. Who gets a stage of their own
  7. Bonnie's "replacement" in security breach and ruin
  8. *sighs* Who always comes back

15 Clues: Where are you in FNAF 4Everyones fav black bearWho gets a stage of their own*sighs* Who always comes backThe most disregarded FNAF gameAnimatronics from the third gameAnimatronics from sister locationAnimatronics from security breachAnimatronics from the second gameWhat role do you play as in FNAF 1-3Where is glamrock bonnie hidden in ruin...

Cashless society 2024-09-12

Cashless society crossword puzzle
Across
  1. System ........... that causes payment issues
  2. The convenience of not carrying.....physically
  3. Cash transactions leave .......... to be tracked
  4. Electronic ............ criminals
  5. A payment method that eliminates...
  6. loundering A financial crime that's harder to commit without ...........
  7. ....................interest rate affecting bank customers
  8. .................transaksi elektronik yang digunakan sebagai alternatif kartu kredit dan debit
Down
  1. Security .............. to protect cash
  2. Every ............ recorded makes it hard to hide
  3. Transaction ............... to avoid this crime
  4. ...............that needs to be converted when traveling
  5. Type of ............ banks may increase without cash
  6. ................associated with physical currency management
  7. ...................state of not using physical money
  8. gambling A common activity where ........... is used and tracked

16 Clues: Electronic ............ criminalsA payment method that eliminates...Security .............. to protect cashSystem ........... that causes payment issuesThe convenience of not carrying.....physicallyTransaction ............... to avoid this crimeCash transactions leave .......... to be trackedEvery ............ recorded makes it hard to hide...

THINK BEFORE YOU CLICK 2025-04-06

THINK BEFORE YOU CLICK crossword puzzle
Across
  1. Necessary to ensure continuity.
  2. Helps avoid phishing and maintain security.
  3. Describes the identity or message in phishing.
  4. Often disguised in phishing emails.
  5. Essential to protect data and systems.
  6. Crucial during disruptions for transparency.
  7. Red flag in scam messages to pressure action.
  8. What scammers ask victims to do to steal info.
Down
  1. Key to avoiding phishing and ensuring business stability.
  2. Result of falling for a scam.
  3. System to keep business running during disruptions.
  4. Core goal of BCMS.
  5. Common platform used in phishing attacks.
  6. Deceptive scheme or trick.
  7. Fraudulent attempt to obtain sensitive information.

15 Clues: Core goal of BCMS.Deceptive scheme or trick.Result of falling for a scam.Necessary to ensure continuity.Often disguised in phishing emails.Essential to protect data and systems.Common platform used in phishing attacks.Helps avoid phishing and maintain security.Crucial during disruptions for transparency.Red flag in scam messages to pressure action....

One Best Buy 2023-10-18

One Best Buy crossword puzzle
Across
  1. Geek Mobile driven by most in-home PC Agents
  2. Membership that replaced Totaltech this year.
  3. _____ Barry, current CEO
  4. New Membership for those who more than anything just want a good deal.
  5. Employee Driven Intelligence
  6. The Monday after Thanksgiving, _____ Monday.
  7. Robert _______ founded Geek Squad in 1994
  8. We are the top corporate sponsor for this amazing non profit organization.
Down
  1. Helps Product Flow reach for the stars! I mean, TVs..
  2. Tells us what goes where.
  3. Founded by Richard M. Schulze in 1966
  4. When you need to call for backup.
  5. Replaced ETK
  6. Unleash the _____ of our People!
  7. The smiling face when you walk in to a Best Buy

15 Clues: Replaced ETK_____ Barry, current CEOTells us what goes where.Employee Driven IntelligenceUnleash the _____ of our People!When you need to call for backup.Founded by Richard M. Schulze in 1966Robert _______ founded Geek Squad in 1994Geek Mobile driven by most in-home PC AgentsThe Monday after Thanksgiving, _____ Monday....

BACO Conference Team Builder 2024-11-20

BACO Conference Team Builder crossword puzzle
Across
  1. – The process of identifying and analyzing risks.
  2. – Violation of a law, duty, or agreement.
  3. – Abbreviation for Foreign Corrupt Practices Act.
  4. – Consequences for failing to follow regulations.
  5. – Recording and documenting compliance breaches.
  6. – Procedures to ensure proper operation of systems.
  7. – A professional responsible for managing compliance.
  8. – Protecting systems and data from cyber threats.
Down
  1. – Measures to prevent illicit financial activities.
  2. – A group responsible for overseeing ethical practices.
  3. – An in-house review of processes and systems.
  4. – The act of making information known.
  5. – Adherence to moral and ethical principles.
  6. – A set of rules outlining acceptable behaviors.
  7. – Relating to rules issued by governing bodies.

15 Clues: – The act of making information known.– Violation of a law, duty, or agreement.– Adherence to moral and ethical principles.– An in-house review of processes and systems.– Relating to rules issued by governing bodies.– Recording and documenting compliance breaches.– A set of rules outlining acceptable behaviors....

33 Pieces of Greatness 2025-04-03

33 Pieces of Greatness crossword puzzle
Across
  1. The security tool you've been working on
  2. A protective security measure in networking
  3. Favorite anime character
  4. Favorite Arsenal player
  5. Favorite drink
  6. Favorite person in the world
  7. All time favorite game console
Down
  1. Arsenal’s nickname
  2. All is well in the world, as long as you can eat
  3. The first city you had your passport stamped
  4. When you're stressed, you play..
  5. A luxury item you always splurge on
  6. Strategy-based board game you love

13 Clues: Favorite drinkArsenal’s nicknameFavorite Arsenal playerFavorite anime characterFavorite person in the worldAll time favorite game consoleWhen you're stressed, you play..Strategy-based board game you loveA luxury item you always splurge onThe security tool you've been working onA protective security measure in networking...

Team FIRU 2021-07-20

Team FIRU crossword puzzle
Across
  1. Often found hanging in the office
  2. Make the best salad sandwich in Greenacre
  3. Town and former maximum security gaol
  4. Where is the big prawn?
  5. Must be checked and filed
  6. Provided the entertainment at the 1990 AFL grand final
  7. Has the odd drive by shooting
  8. Their job is to is to investigate and solve crime
Down
  1. Sang the song I'm too sexy?
  2. What do they call a quarter pounder with cheese in France?
  3. Famous Goulburn inmate
  4. Who opened the Big Merino in 1985?
  5. How many to a cell in Goulburn Maximum Security cells?
  6. Not in Northern Ireland
  7. Former FBEU secretary
  8. Rays favourite swear word?

16 Clues: Former FBEU secretaryFamous Goulburn inmateWhere is the big prawn?Not in Northern IrelandMust be checked and filedRays favourite swear word?Sang the song I'm too sexy?Has the odd drive by shootingOften found hanging in the officeWho opened the Big Merino in 1985?Town and former maximum security gaolMake the best salad sandwich in Greenacre...

Spanish 2023-12-18

Spanish crossword puzzle
Across
  1. engineer
  2. inner tube
  3. itinerary
  4. to pack
  5. inn
  6. flip plops
  7. streetcar
  8. in flight service
  9. terminal
  10. luggage claim
  11. ferry
  12. sled
  13. stwerdess
Down
  1. subway
  2. conductor
  3. recline
  4. security
  5. platform
  6. to slide
  7. turnstile
  8. to tour
  9. guest houes

22 Clues: innsledferrysubwayreclineto packto tourengineersecurityplatformto slideterminalconductoritineraryturnstilestreetcarstwerdessinner tubeflip plopsguest houesluggage claimin flight service

Neighbourhood Watchers 2025-08-04

Neighbourhood Watchers crossword puzzle
Across
  1. кузнец
  2. предотвратить
  3. изолированный
  4. ежегодный
  5. ___measures принимать меры
  6. охрана
  7. гражданство
  8. добровольный
  9. уязвимый
  10. пословица
  11. имущество
  12. поведение
Down
  1. кража со взломом
  2. улучшить
  3. убедиться
  4. меры
  5. участник
  6. шанс, возможность
  7. район
  8. установить
  9. включать в себя
  10. обеспечить
  11. награда

23 Clues: мерырайонкузнецохрананаградаулучшитьучастникуязвимыйубедитьсяежегодныйпословицаимуществоповедениеустановитьобеспечитьгражданстводобровольныйпредотвратитьизолированныйвключать в себякража со взломомшанс, возможность___measures принимать меры

Viajes 2024-04-25

Viajes crossword puzzle
Across
  1. gate
  2. flight
  3. seat
  4. plane
  5. arrivals
  6. travel agent
  7. to land
  8. to travel
  9. row
  10. departures
  11. passport
  12. suitcase
  13. airport
Down
  1. destination
  2. layover
  3. travel
  4. to take off
  5. round trip
  6. security
  7. luggage
  8. customs
  9. aisle
  10. passenger

23 Clues: rowgateseatplaneaisleflighttravellayoverluggageto landcustomsairportarrivalssecuritypassportsuitcaseto travelpassengerround tripdeparturesdestinationto take offtravel agent

Traveling 2023-03-16

Traveling crossword puzzle
Across
  1. chegadas
  2. bagagem
  3. dinheiro
  4. alfândega
  5. vacinação
  6. troco
  7. partidas
  8. passaporte
Down
  1. voo
  2. casa de câmbio
  3. caixa eletrônico
  4. moeda
  5. visto
  6. card cartão de crédito
  7. segurança
  8. carteira

16 Clues: voomoedavistotrocobagagemchegadasdinheiropartidascarteiraalfândegavacinaçãosegurançapassaportecasa de câmbiocaixa eletrônicocard cartão de crédito

EMD Polices & Procedures 2021-02-11

EMD Polices & Procedures crossword puzzle
Across
  1. Type of inspection performed by security officers to ensure that employees are using their assigned badges
  2. CW-EMD cleared employee has a _______ on their badge
  3. Special arrangements have been made to allow_____________ employees to bring company provided cell phones through CW-EMD property
  4. Issued to employees and long term contractors to identify a vehicle and vehicle owner should there be an issue
  5. Application used for alarms and event view
  6. Document with information that must be reported to the next officer taking over that post
  7. All visitors must have a ___________ completed in order to be allowed into the facility or do work on the grounds
  8. Alarm that sounds like a hockey goal
  9. This report is a firsthand account of the activities the security officer performed while on duty.
  10. This type of report is used for a situation that requires greater detail to be investigated
  11. only post that is manned from 0630-2230 Monday thru Friday.
  12. __________ is to be completed every time a foreign national enters the shop for a tour
  13. Badge color reserved specifically for Foreign Nationals
  14. Site with no on-site security that is monitored by CW-EMD
  15. These passes are issued for a maximum of 5 business days at a time
  16. Temporary badges can only be issued and returned to_______
Down
  1. Has a yellow background with red lettering and the Curtiss-Wright logo
  2. __________ Book is used by CW-EMD security to alert security officers of individuals who previously had access to the site.
  3. Form used by employees to have incoming media scanned for viruses
  4. Stickers on personal owned cell phone that have been approved by the FSO/Asst. FSO are this color
  5. __________ are issued if a person’s vehicle information is not registered in the Auto Registration
  6. Form generated by and issued by the Purchasing Department authorizing equipment to be removed from the site
  7. Foreign Nationals are permitted to have approved electronics in this area and this area only
  8. __________visitors wearing this badge MUST ALWAYS have an EMD escort with them
  9. Post where you control and perform 100% vehicle inspections
  10. required any time work is being done inside the building that could potentially spark a fire
  11. Document needed when taking company property off site
  12. Secure area located in Bldg. 3A 2nd floor
  13. type of visitor that is required to have a video date

29 Clues: Alarm that sounds like a hockey goalSecure area located in Bldg. 3A 2nd floorApplication used for alarms and event viewCW-EMD cleared employee has a _______ on their badgeDocument needed when taking company property off sitetype of visitor that is required to have a video dateBadge color reserved specifically for Foreign Nationals...

Cybersecurity Awareness 2024-12-13

Cybersecurity Awareness crossword puzzle
Across
  1. A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
  2. Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
  3. A type of malware that locks a user’s files or system, demanding payment to restore access.
  4. A fix or update to software that addresses security vulnerabilities or bugs.
  5. Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
  6. A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
  7. Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
  8. Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
  9. Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
  10. Software that secretly gathers information about you or your device without your consent.
  11. (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
  12. A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
  13. The process of converting data into a secret code to prevent unauthorized access.
  14. Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
  1. Software designed to detect, prevent, and remove malicious programs from your computer or network.
  2. Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
  3. Any potential danger or risk that could exploit vulnerabilities in a system or network.
  4. Malicious software designed to harm or exploit devices, systems, or networks.
  5. Breach An incident where confidential data is accessed or disclosed without authorization.
  6. Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
  7. A security vulnerability that is unknown to the software maker and has no fix or patch available.
  8. Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
  9. Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
  10. A copy of important data or files that can be restored in case of loss, damage, or attack.
  11. (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.

25 Clues: A fix or update to software that addresses security vulnerabilities or bugs.Malicious software designed to harm or exploit devices, systems, or networks.The process of converting data into a secret code to prevent unauthorized access.Any potential danger or risk that could exploit vulnerabilities in a system or network....

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many credits do you need to graduate from Cristo Rey? (write out number)
  2. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  3. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  4. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  5. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  6. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  7. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
Down
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  3. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  4. Which Cristo Rey sports team won medals at Florida National Competition?
  5. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  6. What is the title of the football team’s hype video on Marist School’s website?
  7. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  8. What type of classes does Northside Hospital offer?
  9. What percent of students at Cristo Rey get accepted to college after graduation?
  10. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  11. How many Cristo Rey students are part of a “team” at their job? (write out number)
  12. Through corporate work study program, students earn ____% of the cost of their education (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. How many credits do you need to graduate from Cristo Rey? (write out number)
  2. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  3. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  4. How many Cristo Rey students are part of a “team” at their job? (write out number)
  5. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  6. What percent of students at Cristo Rey get accepted to college after graduation?
  7. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  9. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  10. Which Cristo Rey sports team won medals at Florida National Competition?
Down
  1. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  2. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. What type of classes does Northside Hospital offer?
  5. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  6. What is the title of the football team’s hype video on Marist School’s website?
  7. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  8. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  9. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  10. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  2. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  3. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  4. What percent of students at Cristo Rey get accepted to college after graduation?
  5. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  6. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  7. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  8. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
Down
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  3. Which Cristo Rey sports team won medals at Florida National Competition?
  4. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  5. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  6. How many Cristo Rey students are part of a “team” at their job? (write out number)
  7. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  8. How many credits do you need to graduate from Cristo Rey? (write out number)
  9. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  10. What is the title of the football team’s hype video on Marist School’s website?
  11. What type of classes does Northside Hospital offer?
  12. What is the last name of the Director of Admissions at Cristo Rey Atlanta?

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?How many credits do you need to graduate from Cristo Rey? (write out number)Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year...

Cristo Rey Crossword 2018-06-21

Cristo Rey Crossword crossword puzzle
Across
  1. Which Cristo Rey sports team won medals at Florida National Competition?
  2. Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
  3. Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
  4. In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
  5. How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
  6. Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
  7. Through corporate work study program, students earn ____% of the cost of their education (write out number)
  8. SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
  9. In 2015, Arby’s created a ___ hotline after the release of their new sandwich
  10. How many Cristo Rey students are part of a “team” at their job? (write out number)
  11. The Coca Cola Company is devoted to replenishing all the ___ they use during production
  12. What is the title of the football team’s hype video on Marist School’s website?
Down
  1. UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
  2. Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
  3. Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
  4. What is the last name of the Director of Admissions at Cristo Rey Atlanta?
  5. What type of classes does Northside Hospital offer?
  6. How many credits do you need to graduate from Cristo Rey? (write out number)
  7. What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
  8. What percent of students at Cristo Rey get accepted to college after graduation?

20 Clues: What type of classes does Northside Hospital offer?Which Cristo Rey sports team won medals at Florida National Competition?What is the last name of the Director of Admissions at Cristo Rey Atlanta?Expeditors has reduced their _____ by 23%, saving 7.5 million pages per yearHow many credits do you need to graduate from Cristo Rey? (write out number)...

Cybersecurity 2022-10-15

Cybersecurity crossword puzzle
Across
  1. When online, using a ______ name helps protect your true identity
  2. Secretly watches computer activity
  3. Software that protects computers from virus-related harm
  4. Phishing is malware that asks for personal ___________
  5. Someone who intentionally targets people for harm using online chat rooms or social media
  6. Type of bullying that takes place online
  7. Many features in online _____ can expose players to predators
  8. Rules for interacting politely and responsibly online
  9. Any program, website, or file that is designed to damage or gain unauthorized access to a device
  10. Programs that appear to be useful but damage computers
  11. A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
  12. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
  13. ____ passwords contain easy-to-guess information
Down
  1. Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
  2. Programs or code that damage or destroy data by attaching to a program or file in a victim computer
  3. URLs that mislead the user into downloading a virus or visiting a harmful website
  4. Never list your _________ number or home address under contact information online
  5. Illegal ___ of copyrighted material is often referred to as piracy
  6. Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
  7. Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
  8. Your ______ device often contains more personal information than any other device
  9. A password containing at least 10 characters and several unique characters could be described as ______
  10. _______ settings help control things like your profile, contact, and other information relating to your account
  11. A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
  12. Social __________ describes sites or online communities where like-minded people can communicate with each other

25 Clues: Secretly watches computer activityType of bullying that takes place online____ passwords contain easy-to-guess informationRules for interacting politely and responsibly onlinePhishing is malware that asks for personal ___________Programs that appear to be useful but damage computersSoftware that protects computers from virus-related harm...

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. This attack centers around an exchange of information or service to convince the victim to act.
  4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

Chapter 2 2020-08-22

Chapter 2 crossword puzzle
Across
  1. threat actor that seeks to harm the government
  2. reduce the risk of a threat
  3. individual who gains unauthorized access
  4. when different employees take over job tasks
  5. this privilege principal limits access to work tasks
  6. after an attack perform a memory
Down
  1. media preparation technique
  2. this document states who has had access to the evidence
  3. this security measure is AKA defense-in-depth
  4. identifies traffic on your network
  5. important aspect of evidence gathering
  6. separation of ___
  7. testing tool to validate bandwidth
  8. this testing type simulates a large number of clients
  9. privileges resulting from of privilege escalation
  10. are the greatest threat to network security
  11. changes the position of characters

17 Clues: separation of ___media preparation techniquereduce the risk of a threatafter an attack perform a memoryidentifies traffic on your networktesting tool to validate bandwidthchanges the position of charactersimportant aspect of evidence gatheringindividual who gains unauthorized accessare the greatest threat to network security...

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  4. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
  5. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
  1. This attack targets individuals who can give the criminal physical access to a secure building or area.
  2. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  3. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  4. This attack centers around an exchange of information or service to convince the victim to act.
  5. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

Mamas Bank Account 2026-02-17

Mamas Bank Account crossword puzzle
Across
  1. אבא
  2. המחאה
  3. תקציב
  4. קצב
  5. ערימה
  6. בטחון
  7. מהגר
  8. הכותבת של הסיפור
  9. משכורת
  10. לגלות\לחשוף
Down
  1. Account חשבון בנק
  2. אמא
  3. שכר דירה
  4. מקרה חירום
  5. למשוך כסף
  6. הזמן והמקום
  7. הקלה

17 Clues: אמאאבאקצבמהגרהקלההמחאהתקציבערימהבטחוןמשכורתשכר דירהלמשוך כסףמקרה חירוםהזמן והמקוםלגלות\לחשוףהכותבת של הסיפורAccount חשבון בנק

Five Nights at Freddy's Movie 2025-10-21

Five Nights at Freddy's Movie crossword puzzle
Across
  1. They might be possessed by:
  2. Bonnie's favorite instrument:
  3. Which shift does the security guard work?
  4. How many souls are trapped in the restaurant?
  5. A younger brother who was kidnapped in the past:
  6. Chicken's best friend:
  7. Little sister who likes to draw:
  8. The security guard actively experiences these:
  9. Red Pirate:
Down
  1. What Type of restaurant is Freddy Fazbear's?
  2. He takes the night guard job at Freddy Fazbear's:
  3. What does the band do when they catch you?
  4. Yellow Chicken animatronic who wears a bib:
  5. Animatronic bear with a hat:
  6. A police officer who knows the restaurant's dark past:
  7. The killer's favorite animal costume:
  8. The true villain who always comes back:
  9. Mysterious man with a convenient job opportunity:

18 Clues: Red Pirate:Chicken's best friend:They might be possessed by:Animatronic bear with a hat:Bonnie's favorite instrument:Little sister who likes to draw:The killer's favorite animal costume:The true villain who always comes back:Which shift does the security guard work?What does the band do when they catch you?...

Navigate Unit 1.1+1.2 2021-08-31

Navigate Unit 1.1+1.2 crossword puzzle
Across
  1. Kunde (Kundin), Käufer
  2. Verletzung
  3. Meinung
  4. Vertrauen
  5. etw. zugeben, eingestehen
  6. Abenteuer
  7. schuldig
  8. Sicherheit, Sicherheitsdienst
  9. jdn überzeugen
  10. Angestellte/r
Down
  1. Rabatt, Preisnachlass
  2. Streit
  3. Almosen, Barmherzigkeit, Benefiz-
  4. Internet
  5. Therapie
  6. zuverlässig
  7. sich entwickeln
  8. treu

18 Clues: treuStreitMeinungInternetTherapieschuldigVertrauenAbenteuerVerletzungzuverlässigAngestellte/rjdn überzeugensich entwickelnRabatt, PreisnachlassKunde (Kundin), Käuferetw. zugeben, eingestehenSicherheit, SicherheitsdienstAlmosen, Barmherzigkeit, Benefiz-

AT THE AIRPORT 2017-11-08

AT THE AIRPORT crossword puzzle
Across
  1. LASKEUTUA
  2. MATKATAVARAT
  3. SAAPUVAT LENNOT
  4. TURVATARKASTUS
  5. VIISUMI
  6. KÄYTÄVÄPAIKKA
  7. ARVIOITU LÄHTÖAIKA
  8. VAPAA
  9. VÄLILASKU
Down
  1. PUNNITA
  2. MATKATAVAROIDEN NOUTOPISTE
  3. LÄHTEVÄT LENNOT
  4. VIIVÄSTYNTYT
  5. PASSI
  6. VARATTU
  7. LENTO
  8. TULLI
  9. MÄÄRÄNPÄÄ

18 Clues: PASSILENTOTULLIVAPAAPUNNITAVARATTUVIISUMILASKEUTUAMÄÄRÄNPÄÄVÄLILASKUMATKATAVARATVIIVÄSTYNTYTKÄYTÄVÄPAIKKATURVATARKASTUSLÄHTEVÄT LENNOTSAAPUVAT LENNOTARVIOITU LÄHTÖAIKAMATKATAVAROIDEN NOUTOPISTE

Bullying 2024-02-07

Bullying crossword puzzle
Across
  1. Pushing and shoving someone are signs of which bullying behaviour
  2. Tears coming down your face
  3. How you should feel all the time
  4. Making fun of others
  5. How you feel looking at a scary movie
Down
  1. Someone who is bullied
  2. This involves the use of words to harm someone
  3. When you post mean things online
  4. If you are being bullied talk to your
  5. When you exclude someone from a game or group
  6. The opposite of happy

11 Clues: Making fun of othersThe opposite of happySomeone who is bulliedTears coming down your faceWhen you post mean things onlineHow you should feel all the timeIf you are being bullied talk to yourHow you feel looking at a scary movieWhen you exclude someone from a game or groupThis involves the use of words to harm someone...

Airports 2022-07-21

Airports crossword puzzle
Across
  1. city with the code SIN
  2. the airline code for cathay pacific
  3. most common cause of runway incursions
  4. country of the world's busiest airport
  5. you can carry up to 100ml of this
  6. first international Airport opened in
Down
  1. ideal solution for evacuating passengers
  2. the area where aircraft park
  3. the area after check-in and passport control
  4. vertical guidance system to guide planes
  5. the security of aviation as a whole
  6. man family tried to sneak this through the airport
  7. customs officers intercept this
  8. the area before security
  9. makes up 50% of Auckland Airports' income

15 Clues: city with the code SINthe area before securitythe area where aircraft parkcustoms officers intercept thisyou can carry up to 100ml of thisthe security of aviation as a wholethe airline code for cathay pacificfirst international Airport opened inmost common cause of runway incursionscountry of the world's busiest airport...

IT-Security - Datenschutz/-sicherheit 2016-01-29

IT-Security - Datenschutz/-sicherheit crossword puzzle
Across
  1. forschen das Nutzerverhalten aus
  2. Diebstahl von Daten die weggeworfen wurden
  3. Mobbing mit Hilfe von elektronischen Medien
  4. versteckt in einem scheinbar nützlichen Programm
  5. Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
  6. unerwünschte Werbemails
Down
  1. jemand der illegal in Computersysteme eingreift
  2. Beobachtung bei der Eingabe von Daten
  3. Virus der sich direkt über Netzte im Internet verbreitet
  4. Sicherheitskopie im Falle von Verlust oder dergleichen

10 Clues: unerwünschte Werbemailsforschen das Nutzerverhalten ausBeobachtung bei der Eingabe von DatenDiebstahl von Daten die weggeworfen wurdenMobbing mit Hilfe von elektronischen Medienjemand der illegal in Computersysteme eingreiftversteckt in einem scheinbar nützlichen ProgrammSicherheitskopie im Falle von Verlust oder dergleichen...

PERUNDUNGAN 2024-09-27

PERUNDUNGAN crossword puzzle
Across
  1. Meminta uang atau barang secara paksa disertai dengan ancaman
  2. Bentuk penindasan yang dilakukan seseorang atau sekelompok orang yang lebih kuat terhadap orang lain dengan tujuan untuk menyakiti
  3. Yang dialami korban perundungan
  4. Kata bully berasal dari bahasa
  5. Bullying Bullying dalam media sosial
Down
  1. Cara pencegahan perundungan
  2. Jika kita melihat perundungan
  3. Agar tidak dibully
  4. Bullying dalam bentuk perkataan
  5. Salah satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain

10 Clues: Agar tidak dibullyCara pencegahan perundunganJika kita melihat perundunganKata bully berasal dari bahasaYang dialami korban perundunganBullying dalam bentuk perkataanBullying Bullying dalam media sosialMeminta uang atau barang secara paksa disertai dengan ancaman...

Англ.яз. 2020-03-10

Англ.яз. crossword puzzle
Across
  1. защита
  2. хранить
  3. результат, проблема
  4. безопасность
  5. враг, нарушитель
  6. производительный
  7. конфиденциальность
  8. способ, средство
  9. достоверность, подлинность
  10. программное обеспечение
  11. оборудование, аппаратное обеспечение
Down
  1. полезность
  2. защищённость
  3. последствие, результат
  4. невозможный отказ от авторства
  5. содержимое
  6. применение
  7. быстрый
  8. обрабатывать
  9. нарушитель, взломщик

20 Clues: защитахранитьбыстрыйполезностьсодержимоеприменениезащищённостьбезопасностьобрабатыватьвраг, нарушительпроизводительныйспособ, средствоконфиденциальностьрезультат, проблеманарушитель, взломщикпоследствие, результатпрограммное обеспечениедостоверность, подлинностьневозможный отказ от авторстваоборудование, аппаратное обеспечение

At the Airport 2017-01-12

At the Airport crossword puzzle
Across
  1. предмет
  2. острый
  3. очередь
  4. стойка регистрации - ... desk
  5. внимательный
  6. тележка
  7. прямой
  8. быстрый
  9. оставлять
  10. пропускать
  11. опасный
  12. посадочный талон - ... card
Down
  1. показывать
  2. багаж
  3. досматривать
  4. проходить через - go ...
  5. тяжелый
  6. сотрудник службы безопасности
  7. пассажир
  8. терять
  9. жидкость
  10. присоединяться

22 Clues: багажострыйтерятьпрямойпредметтяжелыйочередьтележкабыстрыйопасныйпассажиржидкостьоставлятьпоказыватьпропускатьдосматриватьвнимательныйприсоединятьсяпроходить через - go ...посадочный талон - ... cardсотрудник службы безопасностистойка регистрации - ... desk

What You Wanna Be? (Transcribe the phonetic symbol to the box) 2024-01-07

What You Wanna Be? (Transcribe the phonetic symbol to the box) crossword puzzle
Across
  1. sɪˈkjʊrəti
  2. ʌnɪmˈplɔɪd
  3. laɪˈbreriən
  4. ɑːrkɪtekt
  5. sekrəteri
  6. æθliːt
  7. faɪərfaɪtər
  8. flɔːrɪst
  9. bæŋkər
  10. raɪtər
  11. nɜːrs
Down
  1. bʊtʃər
  2. ɡeɪmər
  3. plʌmər
  4. dentɪst
  5. ʌndərteɪkər
  6. vet
  7. beɪkər
  8. teɪlər
  9. tiːtʃər
  10. əˈkaʊntənt
  11. fɪʃmʌŋɡər
  12. dɑːktər
  13. draɪvər
  14. beɡər
  15. lɔɪər

26 Clues: vetbeɡərlɔɪərnɜːrsbʊtʃərɡeɪmərplʌmərbeɪkərteɪləræθliːtbæŋkərraɪtərdentɪsttiːtʃərdɑːktərdraɪvərflɔːrɪstɑːrkɪtektsekrəterifɪʃmʌŋɡərsɪˈkjʊrətiʌnɪmˈplɔɪdəˈkaʊntəntʌndərteɪkərlaɪˈbreriənfaɪərfaɪtər

GTA5 2023-07-05

GTA5 crossword puzzle
Across
  1. government
  2. franklin dog
  3. marina hights
  4. Trevorfriend
  5. weapon stash
  6. autoshop
  7. michaelson
  8. flying bike
  9. airport
  10. sandy shores
  11. newjet
  12. hacker
Down
  1. carsalesmen
  2. jetcar
  3. high end clothes
  4. gta5map
  5. eastlossantos
  6. security
  7. tall building
  8. police
  9. clothes store
  10. oldjet

22 Clues: jetcarpoliceoldjetnewjethackergta5mapairportautoshopsecuritygovernmentmichaelsoncarsalesmenflying bikefranklin dogTrevorfriendweapon stashsandy shoresmarina hightseastlossantostall buildingclothes storehigh end clothes

ACEBA 2020-09-23

ACEBA crossword puzzle
Across
  1. boss
  2. designing
  3. pushers
  4. shopping
  5. training
  6. donor
Down
  1. travel
  2. award
  3. technology
  4. risk
  5. money
  6. EAs
  7. indicators
  8. project name

14 Clues: EAsbossriskawardmoneydonortravelpushersshoppingtrainingdesigningtechnologyindicatorsproject name

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

Receptionist Essentials 2025-03-19

Receptionist Essentials crossword puzzle
Across
  1. / Security risk where an unauthorized person follows an employee through a secure door
  2. / The process of handling unexpected situations professionally
  3. / An important security step before issuing a guest badge
  4. / The designated area where visitors check in
  5. / The internal resource where you can find answers to policies and procedures
Down
  1. / What you must remain during a workplace emergency
  2. / The software used for internal messaging at Apple
  3. / A common security measure for Apple employees
  4. / What you provide when guiding guests to a meeting room
  5. / The first person guests interact with at the front desk

10 Clues: / The designated area where visitors check in/ A common security measure for Apple employees/ What you must remain during a workplace emergency/ The software used for internal messaging at Apple/ What you provide when guiding guests to a meeting room/ The first person guests interact with at the front desk...

ICT Password 2024-03-06

ICT Password crossword puzzle
Across
  1. Voice Over Internet Protocol
  2. Example of a crypto currency
  3. World Wide Web
Down
  1. Information Communictaion Technology
  2. Technology to hide Ip address and location
  3. Crime Crime carried out using computer

6 Clues: World Wide WebVoice Over Internet ProtocolExample of a crypto currencyInformation Communictaion TechnologyCrime Crime carried out using computerTechnology to hide Ip address and location

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. This attack centers around an exchange of information or service to convince the victim to act.
  4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

PRSE6212 2025-02-26

PRSE6212 crossword puzzle
Across
  1. A social engineering attack that tricks users into revealing sensitive information.
  2. The principle that ensures information remains accurate and unaltered.
  3. A physical or digital device used to generate or store authentication credentials.
  4. The process of verifying the identity of a user or system.
  5. A technique where an attacker disguises themselves as a trusted entity to deceive victims.
  6. A biometric security feature that ensures the biometric sample is from a real, live person.
  7. A federated identity solution that enables single sign-on (SSO) across different organizations securely.
  8. A biometric technique that identifies users based on their unique typing rhythm.
  9. The process of granting or denying permissions to a user or system.
  10. The principle that ensures information is only accessible to authorized users.
  11. A method of authentication that uses physical or behavioral characteristics.
  12. A biometric authentication method that scans the colored part of the eye.
  13. A cyberattack where an attacker intercepts and alters communication between two parties.
  14. A dynamic authentication method that generates temporary passcodes based on a shared secret and the current time.
Down
  1. A method where an attacker systematically tries common passwords to gain access.
  2. The point at which the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal in a biometric system.
  3. An authentication method that analyzes unique patterns in actions like typing or mouse movement.
  4. A biometric authentication method that uses unique patterns on the fingertip.
  5. A public-key cryptography technique that offers strong security with smaller key sizes, often used in authentication.
  6. A cryptographic technique that adds random data to passwords before hashing to prevent attacks.
  7. The principle that ensures authorized users can access information when needed.
  8. A technique that converts plaintext data into unreadable ciphertext for security.
  9. A secret combination of characters used to verify a user's identity.
  10. A cryptographic method used to verify the authenticity and integrity of a message or document.
  11. A biometric authentication method that analyzes unique facial features.
  12. An authentication method that requires more than one verification factor.
  13. A cryptographic method that allows computations to be performed on encrypted data without decrypting it first.
  14. A security model that assumes no entity should be trusted by default, even inside the network.
  15. A security principle that ensures a user cannot deny performing an action or sending a message.
  16. A cryptographic process that converts data into a fixed-length value, ensuring integrity.

30 Clues: The process of verifying the identity of a user or system.The process of granting or denying permissions to a user or system.A secret combination of characters used to verify a user's identity.The principle that ensures information remains accurate and unaltered.A biometric authentication method that analyzes unique facial features....

Cybersecurity Awareness Month 2024 2024-09-24

Cybersecurity Awareness Month 2024 crossword puzzle
Across
  1. Pop-up malware intent on using fear tactics to get you to perform an action.
  2. Data must be accessible when you need them. Part of the CIA triad.
  3. The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
  4. A flaw in a system that can enable an adversary to compromise the security of that system.
  5. A type of threat that includes authorized system users and disgruntled employees.
  6. "Good guy" hackers.
  7. A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
  8. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
  9. Multiple compromised systems under the control of a single attacker.
  10. A device that permits the flow of authorized data, while keeping unauthorized data out.
  11. A vulnerability or exploit that is unknown to software developers and security professionals.
  12. A team that acts as the adversary during a security assessment.
  13. Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
  14. The broad term for nontraditional, internet-connected smart devices.
  15. A network of devices created for the sole purpose of luring in an attacker.
  16. A protocol used to ensure time synchronization between devices.
Down
  1. The act of moving around, looking for vulnerable Wi-Fi networks.
  2. Hardware and/or software used to capture and record key strokes.
  3. Spear phishing aimed at high-profile targets such as executives.
  4. Cryptography that uses two different keys for encryption and decryption.
  5. Information that can be used to distinguish an individual’s identity.
  6. The act of applying a fix to a software defect.
  7. An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
  8. Cryptography that uses the same shared secret key for both encryption and decryption.
  9. An attack from multiple compromised systems that target a single system, service, or application.
  10. Malware intent on holding your data hostage in an attempt to extort money.
  11. Protecting of information from unauthorized access. Part of the CIA triad.
  12. A team usually involved with the defense of the organization’s infrastructure.
  13. An old method programmers use to bypass security to gain access to a system or software. "War Games"
  14. "Bad guy" hackers.
  15. An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.

31 Clues: "Bad guy" hackers."Good guy" hackers.The act of applying a fix to a software defect.A team that acts as the adversary during a security assessment.A protocol used to ensure time synchronization between devices.The act of moving around, looking for vulnerable Wi-Fi networks.Hardware and/or software used to capture and record key strokes....

Airport 2018-05-29

Airport crossword puzzle
Across
  1. other name for cabin crew
  2. terminology for passengers
  3. ID needed to travel internationally
  4. where everyone can access
  5. The people who help you check in
Down
  1. where planes take off
  2. Person incharge of aircraft
  3. Airport code for Hong Kong
  4. name of aviation security
  5. how to access the landslide/airside
  6. after you cross customs and security

11 Clues: where planes take offother name for cabin crewname of aviation securitywhere everyone can accessAirport code for Hong Kongterminology for passengersPerson incharge of aircraftThe people who help you check inhow to access the landslide/airsideID needed to travel internationallyafter you cross customs and security

The Egypt Game from page 80 to 122 2024-05-03

The Egypt Game from page 80 to 122 crossword puzzle
Across
  1. what Marshall wanted to sacrifice as a joke
  2. Kmata's costume
  3. when the story took place
  4. what Ken and Toby calls April
  5. what April wants to sacrifice
  6. Ken and Toby's grade
Down
  1. the reason parents don't let their kids trick or treat by themselves
  2. Toby's costume
  3. who security belongs to
  4. Marshall's costume
  5. April and Melanie's costumes

11 Clues: Toby's costumeKmata's costumeMarshall's costumeKen and Toby's gradewho security belongs towhen the story took placeApril and Melanie's costumeswhat Ken and Toby calls Aprilwhat April wants to sacrificewhat Marshall wanted to sacrifice as a jokethe reason parents don't let their kids trick or treat by themselves

At the Airport 2017-01-12

At the Airport crossword puzzle
Across
  1. багаж
  2. быстрый
  3. посадочный талон - ... card
  4. показывать
  5. жидкость
  6. пассажир
  7. досматривать
  8. сотрудник службы безопасности
  9. проходить через - go ...
  10. острый
  11. оставлять
  12. пропускать
Down
  1. стойка регистрации - ... desk
  2. опасный
  3. присоединяться
  4. тележка
  5. очередь
  6. прямой
  7. предмет
  8. внимательный
  9. тяжелый
  10. терять

22 Clues: багажпрямойострыйтерятьопасныйтележкабыстрыйочередьпредметтяжелыйжидкостьпассажироставлятьпоказыватьпропускатьвнимательныйдосматриватьприсоединятьсяпроходить через - go ...посадочный талон - ... cardстойка регистрации - ... deskсотрудник службы безопасности

pre-intermediate 3 2022-03-31

pre-intermediate 3 crossword puzzle
Across
  1. mennyország
  2. szolgáltatások, lehetőségek
  3. érkezési kapu (repülőtéren)
  4. indulási kapu (repülőtéren)
  5. tetőterasz
  6. késik
  7. vám
  8. repülőjárat
  9. átvesz, befogad
  10. csengőhang
  11. okostelefon
Down
  1. utas
  2. tábla, jelzés
  3. kapu
  4. beszáll a repülőgépbe
  5. szöveges üzenetet küld
  6. jóslat
  7. csomag
  8. mostanában
  9. biztonsági ellenőrzés

20 Clues: vámutaskapukésikjóslatcsomagtetőteraszmostanábancsengőhangmennyországrepülőjáratokostelefontábla, jelzésátvesz, befogadbeszáll a repülőgépbebiztonsági ellenőrzésszöveges üzenetet küldszolgáltatások, lehetőségekérkezési kapu (repülőtéren)indulási kapu (repülőtéren)

Los viajes 2022-02-28

Los viajes crossword puzzle
Across
  1. ticket
  2. gate
  3. flight
  4. airplane
  5. to help
  6. waiter
  7. view
  8. to arrive
  9. to take off
  10. suitcase
  11. seat
  12. to walk
  13. security
Down
  1. guest
  2. to land
  3. bellboy
  4. luggage
  5. pool
  6. to leave
  7. check-in counter
  8. trip
  9. valet

22 Clues: gatepoolviewtripseatguestvaletticketflightwaiterto landbellboyluggageto helpto walkairplaneto leavesuitcasesecurityto arriveto take offcheck-in counter

Great Depression Crossword 2022-01-21

Great Depression Crossword crossword puzzle
Across
  1. down theory
  2. Tarrif Act
  3. blizzard
  4. Industrial Recovery Act
  5. state
  6. runs
  7. Progress Administration
  8. on Margin
  9. Bowl
Down
  1. Spending
  2. Administration
  3. Reserve System
  4. Flood of 1936
  5. 100 Days
  6. Tuesday
  7. Security Act
  8. Conservation Corps
  9. kitchen
  10. Deal
  11. cycle
  12. Army

21 Clues: DealrunsArmyBowlstatecycleTuesdaykitchenSpending100 Daysblizzardon MarginTarrif Actdown theorySecurity ActFlood of 1936AdministrationReserve SystemConservation CorpsIndustrial Recovery ActProgress Administration

RETIREMENT 2024-07-23

RETIREMENT crossword puzzle
Across
  1. Deductible
  2. Social Security
  3. Qualified
  4. Savers Credit
  5. Defined Contribution
  6. Rollover
  7. Contribution
  8. Early Distribution
  9. Required Minimum Distribution RMD
  10. Nonqualified
  11. Roth IRA
  12. Defined Benefit
Down
  1. Limits
  2. Distribution
  3. Withholding
  4. Employer Sponsored
  5. Individual
  6. Pension
  7. Traditional IRA
  8. Tax Deferred

20 Clues: LimitsPensionRolloverRoth IRAQualifiedDeductibleIndividualWithholdingDistributionContributionTax DeferredNonqualifiedSavers CreditSocial SecurityTraditional IRADefined BenefitEmployer SponsoredEarly DistributionDefined ContributionRequired Minimum Distribution RMD

omputer vocab 2023-03-06

omputer vocab crossword puzzle
Across
  1. ones experiences
  2. itself
  3. local
  4. security
  5. goverment access
  6. imitate
  7. use access
  8. allows
Down
  1. connects
  2. to copy
  3. to edit or change content
  4. getting into
  5. mouse
  6. bad behavuior
  7. parts
  8. stores data
  9. annoying
  10. prevents
  11. wide
  12. secret words

20 Clues: widelocalmousepartsitselfallowsto copyimitateconnectssecurityannoyingpreventsuse accessstores datagetting intosecret wordsbad behavuiorones experiencesgoverment accessto edit or change content

Chose your own vocab. puzzle 2023-04-26

Chose your own vocab. puzzle crossword puzzle
Across
  1. to walk
  2. clothing store
  3. baggage
  4. bomb
  5. perchance
  6. image
  7. tick
  8. hotel
  9. avocado
  10. cliff jump
  11. door
  12. to flip
  13. security
  14. turtle
Down
  1. sunscreen
  2. weather
  3. boat
  4. skier
  5. gum
  6. water bottle
  7. plane
  8. simple
  9. candy
  10. airport

24 Clues: gumboatbombtickdoorskierplaneimagehotelcandysimpleturtleto walkweatherbaggageavocadoairportto flipsecuritysunscreenperchancecliff jumpwater bottleclothing store

Aeropuerto 2021-11-09

Aeropuerto crossword puzzle
Across
  1. departure
  2. station
  3. security
  4. check-in
  5. delay
  6. arrivals
  7. ticket
Down
  1. stop
  2. suitcases
  3. trolley
  4. passport
  5. departures
  6. customs
  7. baggageclaim

14 Clues: stopdelayticketstationtrolleycustomspassportsecuritycheck-inarrivalsdeparturesuitcasesdeparturesbaggageclaim

JetBlue Crossword Puzzle 2026-02-13

JetBlue Crossword Puzzle crossword puzzle
Across
  1. Jetblue Value
  2. Manual for everyone working ground operations
  3. Tool used to checking the flight load plan
  4. Standard security program
  5. Must be typed up and cleared by BSO agent for each flight
  6. Must point to this during your checkin process
  7. Tool used by BSO Agent when dealing with claims, MBR's etc.
Down
  1. Tool used for checking flight & crew information
  2. Brock
  3. Mama Carry A Bag!
  4. Reward for getting first place in the competition
  5. Aircraft uses three flight attendants
  6. Uniform guideline that all crewmembers must adhere to
  7. Aircraft security search checklist

14 Clues: BrockJetblue ValueMama Carry A Bag!Standard security programAircraft security search checklistAircraft uses three flight attendantsTool used to checking the flight load planManual for everyone working ground operationsMust point to this during your checkin processTool used for checking flight & crew information...

Montgomery Madness 2020-06-11

Montgomery Madness crossword puzzle
Across
  1. Montgomery's Business subject matter Expert
  2. Montgomery's security co-champion
  3. Montgomery's actual AVP
  4. the front desk
  5. our fearless leader
  6. Montgomery's FSR III
  7. Chile's newest citizen
  8. the signal we need to enter the branch
  9. Montgomery's Security Captain
  10. Montgomery's AVP
  11. Montgomery's insurance services champion
  12. HVCU's homepage
Down
  1. offers personal members the convenience of obtaining vehicle financing directly at participating dealerships
  2. A tool that helps personal & business members switch their financial relationship from another institution to HVCU
  3. the last month we helped members on the teller line
  4. HVCU's New Net Promoter Website
  5. Nicole's favorite drink
  6. an individual authorized by the state or federal government to administer oaths/affirmations and to attest the authenticity of signatures

18 Clues: the front deskHVCU's homepageMontgomery's AVPour fearless leaderMontgomery's FSR IIIChile's newest citizenMontgomery's actual AVPNicole's favorite drinkMontgomery's Security CaptainHVCU's New Net Promoter WebsiteMontgomery's security co-championthe signal we need to enter the branchMontgomery's insurance services champion...

Cryptober 2022 - Week 4 - Crossword 2022-10-21

Cryptober 2022 - Week 4 - Crossword crossword puzzle
Across
  1. Name the process for ensuring that data retained (in any format) is secure to help avoid a potential breach (e.g., unauthorized access or disclosure).
  2. What is the retention period for email correspondence?
  3. Injection, Broken Authentication and Sensitive Data Exposure are examples of bugs that Chainalysis wants to know about under which public policy?
  4. What's the name of the process of preserving all forms of information relevant to legal proceedings?
Down
  1. What is the first name of Chainalysis’ VP of security?
  2. Which tool helped security to identify many unapproved applications located within Google, Slack and Zoom?
  3. Name one of the industry standards that our security program is structured around?
  4. What is the retention period for Product Development Data such as User Stories, Test Sets and Cases?
  5. Which team should you notify In instances where unauthorized access or disclosure of data occurs?
  6. What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?

10 Clues: What is the first name of Chainalysis’ VP of security?What is the retention period for email correspondence?Name one of the industry standards that our security program is structured around?What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?...

Bernardo C. Los Viajes assignment 2024-03-05

Bernardo C. Los Viajes assignment crossword puzzle
Across
  1. traffic jam
  2. tour guide
  3. to return
  4. valid
  5. ecotourism
  6. compass
  7. high season
  8. insurance
  9. expired
Down
  1. hostel
  2. room service
  3. itinerary
  4. customs agent
  5. security measures
  6. lodging
  7. to pack your bags
  8. ruins
  9. to sail

18 Clues: validruinshostellodgingcompassto sailexpireditineraryto returninsurancetour guideecotourismtraffic jamhigh seasonroom servicecustoms agentsecurity measuresto pack your bags

none 2013-09-10

none crossword puzzle
Across
  1. An employee/contractor or individual inside our company who is selling secrets or sensitive information to competitors, foreign governments or terrorist organizations is called an __________ threat.
  2. The RMS-Tucson Facility Security Officer (FSO) is _______ _______.
  3. Top Secret, Secret and __________ are the three levels of U.S. government classified information.
  4. A __________ contact is an individual who is seeking information, who does not hold a proper security clearance level or need-to-know.
  5. How do you protect Raytheon Proprietary, Most Private and Competition Sensitive Information? Lock it in a drawer/cabinet when not working with it. Discard by shredding or placing in a __________ burn barrel. Never place in trash or recycle bin.
Down
  1. Never send classified data to an unclassified information system or computer; this is called a _______ _______.
  2. Security is everyone’s __________.
  3. Always remove your Raytheon ID __________ when leaving an RMS facility.
  4. Information that suggests an individual’s ability to safeguard classified information may be impaired or not in the best interest of national security is called __________ Information.
  5. If you find an unsecured item of classified material, call __________ immediately at 520.794.8313.

10 Clues: Security is everyone’s __________.The RMS-Tucson Facility Security Officer (FSO) is _______ _______.Always remove your Raytheon ID __________ when leaving an RMS facility.Top Secret, Secret and __________ are the three levels of U.S. government classified information....

Something to do 2024-08-09

Something to do crossword puzzle
Across
  1. Gohan’s Dad
  2. This character died & was reincarnated as a chimera Ant
  3. The name of Yusuke's spirit beast
  4. A private security company consisting of the former Third Group of Chryse Guard Security.
  5. Naurto’s favorite food
  6. Your favorite anime genre (per me)
Down
  1. Super competitive pedophile
  2. Everyone’s favorite anime deadbeat father
  3. When the world needed him most he disappeared
  4. Inosuke breathing/sword style
  5. tanjuro sister
  6. 1st anime we bonded over

12 Clues: Gohan’s Dadtanjuro sisterNaurto’s favorite food1st anime we bonded overSuper competitive pedophileInosuke breathing/sword styleThe name of Yusuke's spirit beastYour favorite anime genre (per me)Everyone’s favorite anime deadbeat fatherWhen the world needed him most he disappearedThis character died & was reincarnated as a chimera Ant...

United Nations 2025-05-25

United Nations crossword puzzle
Across
  1. Arms of the United Nations
  2. The General assembly meets.
  3. Joined on the 18th of September 1793.
  4. General Chief administration officer.
  5. Comprises 193 of these.
  6. Amount of Sustainable Development Goals
  7. The number of permanent members on security council.
Down
  1. Council Principal crisis management body.
  2. Sustainable in nature to be met by 2030.
  3. Nonmembers are called.
  4. change One problem facing the world.
  5. In the business of maintaining world.....

12 Clues: Nonmembers are called.Comprises 193 of these.Arms of the United NationsThe General assembly meets.change One problem facing the world.Joined on the 18th of September 1793.General Chief administration officer.Amount of Sustainable Development GoalsSustainable in nature to be met by 2030.Council Principal crisis management body....

Cyber Safety 2016-02-10

Cyber Safety crossword puzzle
Across
  1. feed a newer way to receive news
  2. Mostly known as voice telephone
  3. chat you talk with people online
  4. Networking a site that keeps families up to date with things they are interested in
Down
  1. Helps you look up info
  2. Helps sends Messages
  3. video files that can be downloaded
  4. Page on a website that talks about something

8 Clues: Helps sends MessagesHelps you look up infoMostly known as voice telephonefeed a newer way to receive newschat you talk with people onlinevideo files that can be downloadedPage on a website that talks about somethingNetworking a site that keeps families up to date with things they are interested in

Cyber Safety 2020-04-16

Cyber Safety crossword puzzle
Across
  1. Hardware used for a particular purpose. Phone, computer etc.
  2. Transfer an image onto your computer.
  3. Technology used to deliberately hurt someone
Down
  1. Not on the internet
  2. Gain access to unauthorized data
  3. Sound made when you get a notification.
  4. Photo taken of yourself
  5. connected to the internet.

8 Clues: Not on the internetPhoto taken of yourselfconnected to the internet.Gain access to unauthorized dataTransfer an image onto your computer.Sound made when you get a notification.Technology used to deliberately hurt someoneHardware used for a particular purpose. Phone, computer etc.

Cyber Crossword 2020-04-27

Cyber Crossword crossword puzzle
Across
  1. The headquarter of this dedicated EY division is in Amsterdam. Jatin Sehgal leads it. 27K.
  2. It’s as difficult as extracting coal from Earth. It’s valuable but cannot be seen physically. Highly volatile. Satoshi Nakamoto
  3. I target the organizations’ executives by luring them into responding
  4. I have an article dedicated to me. I became popular after 25th May, 2018. My outcome is to help organization identify where the data is stored, who is storing it and how it is stored
Down
  1. Israel-US. Siemens Step7. 500Kilobyte. USB.
  2. Doctors use it. Hackers use it. It’s on the top of the list of 2020!
  3. Marcus Hutchins from Britain tried to slow me down. I caused 92 million pound loss to NHS in UK
  4. One of the co-inventor was “Shamir”. I help organizations in securing their data while at-rest and in-transit. “Dell” is my parent.

8 Clues: Israel-US. Siemens Step7. 500Kilobyte. USB.Doctors use it. Hackers use it. It’s on the top of the list of 2020!I target the organizations’ executives by luring them into respondingThe headquarter of this dedicated EY division is in Amsterdam. Jatin Sehgal leads it. 27K....

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. ______Regulation works by utilising feedback
  2. Shawn Fanning created the______
  3. cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  4. cyber________
Down
  1. according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
  2. some experts regard digital______ as the third industrial revolution
  3. the conversion of analogue data into digital form
  4. wrote Code and Other Laws of Cyberspace

8 Clues: cyber________Shawn Fanning created the______wrote Code and Other Laws of Cyberspace______Regulation works by utilising feedbackthe conversion of analogue data into digital formsome experts regard digital______ as the third industrial revolution...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. ______Regulation works by utilising feedback
  2. Shawn Fanning created the______
  3. cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
  4. cyber________
Down
  1. according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
  2. some experts regard digital______ as the third industrial revolution
  3. the conversion of analogue data into digital form
  4. wrote Code and Other Laws of Cyberspace

8 Clues: cyber________Shawn Fanning created the______wrote Code and Other Laws of Cyberspace______Regulation works by utilising feedbackthe conversion of analogue data into digital formsome experts regard digital______ as the third industrial revolution...

Cyber Crime 2022-10-14

Cyber Crime crossword puzzle
Across
  1. crime that involves a computer and a network
  2. a kind of cybercrime that heavily damages an individual psychologically
  3. one study found that 1/3 of college students illegally downloaded _____
  4. these institutions are at high risk for cybercrime
Down
  1. a characteristic of cyber criminals
  2. wrongful or criminal deception intended to result in financial or personal gain.
  3. These kind of costs occur within the company and include the costs of detection, investigation, and recovering data
  4. theft or misappropriation of funds placed in one's trust or belonging to one's employer.

8 Clues: a characteristic of cyber criminalscrime that involves a computer and a networkthese institutions are at high risk for cybercrimea kind of cybercrime that heavily damages an individual psychologicallyone study found that 1/3 of college students illegally downloaded _____...

Cyber Aware 2022-11-17

Cyber Aware crossword puzzle
Across
  1. an email that attempts to gain sensitive data or credentials
  2. software that compromises the operation of a system by performing an unauthorized function or process
  3. hacker with criminal intent
  4. activity or process where information systems are protected from unauthorized use
Down
  1. a person who uses computers to gain unauthorized access to data
  2. a dishonest scheme
  3. disclosure of sensitive information outside organization
  4. an observable occurrence in an information system or network

8 Clues: a dishonest schemehacker with criminal intentdisclosure of sensitive information outside organizationan email that attempts to gain sensitive data or credentialsan observable occurrence in an information system or networka person who uses computers to gain unauthorized access to data...