cyber security Crossword Puzzles
Cyber ethics 2025-06-14
Across
- A legal right granted by the law to the creator for his original work.
- Purchasing a single lisenced copy of the software and loading it into several computers.
- Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
- An illegal intrution into a computer system Or network.
- Vital information resources under seize.
- An act of sending to an user, misleading him to belive that it is from a trusted organisation.
- Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
- Unwanted bulk emails that comes from unknown sources.
8 Clues: Vital information resources under seize. • Unwanted bulk emails that comes from unknown sources. • An illegal intrution into a computer system Or network. • A legal right granted by the law to the creator for his original work. • Purchasing a single lisenced copy of the software and loading it into several computers. • ...
Cyber Safety 2024-08-06
8 Clues: - Bullying online • - Being safe online • - Protecting systems • - Supporting bullies • - Stands up against bullies • - Connected computers share resources • - Putting agressive presure on someone • - Sites that are accessed using a web browser
Sicherheit im Netz 2025-04-22
Across
- Beispiel für Cyber-Mobbing
- Viren infizieren deinen Computer.
- Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?
- Das häufigste Mittel Menschen zu manipulieren.
Down
- Ein Grund warum gemobbt wird.
- Was solltest du bei unangemessenen Inhalten tun?
- Wie nennt man Mobbing im Internet?
- Mache ... von unangenehmen Nachrichten/Bildern oder Chats.
8 Clues: Beispiel für Cyber-Mobbing • Ein Grund warum gemobbt wird. • Viren infizieren deinen Computer. • Wie nennt man Mobbing im Internet? • Das häufigste Mittel Menschen zu manipulieren. • Was solltest du bei unangemessenen Inhalten tun? • Mache ... von unangenehmen Nachrichten/Bildern oder Chats. • Was schützt du, wenn du Inhalte nur bestimmten Leuten zeigst?
class puzzle 2023-08-28
Across
- short for "malicious software" and covers threats such as viruses, worms, Trojanhorses, ransomware and the numerous other programs used by hackers to gainaccess to or damage sensitive information on a computer
- intent of doing harm
- gap or weakness which undermines an organization’s security efforts
- making sure a person is who they say they are
- rights an individual or organization has over information and how it is used
- procedure used to determine user privileges or access levels to the system
Down
- Virus macros which have been programmed to carry out malicious intent
- how information is protected
- information or data which can be accessed when needed
- state of being complete or uncorrupted
- calculated assessment of potential threats to an organization’s security
- network of computers and devices managed as a unit with the same proceduresand rules
- requirement of being private or secret
13 Clues: intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • information or data which can be accessed when needed • gap or weakness which undermines an organization’s security efforts • ...
Chapter 14: Taxes 2017-04-26
Across
- (2) form used to pay taxes
- amounts subtracted from income
- (2) taxable income, property, good or service
- imported goods tax
- government income from taxes
- (2) tax paid upon purchasing a good or service
- spending levels can be adjusted
- tax payments before receiving pay
- pays for government programs and services
Down
- example: Social Security and Medicare
- programs you must qualify for to receive services
- (2) example: sales tax
- funds Medicare and Social Security
13 Clues: imported goods tax • (2) example: sales tax • (2) form used to pay taxes • government income from taxes • amounts subtracted from income • spending levels can be adjusted • tax payments before receiving pay • funds Medicare and Social Security • example: Social Security and Medicare • pays for government programs and services • (2) taxable income, property, good or service • ...
CIS Controls & Technicians 2024-05-14
Across
- track and manage hardware devices
- protect the organization's info through measures such as encryption and access controls
- educate users on safe-handling of information
- regularly test the security controls by simulating attacks on systems and networks
- manage the security life cycle of acquired software
Down
- only authorized to be installed and executed
- continuously acquire, assess and take action
- defense of this is to control the installation, spread and execution of malicious code
- part of inventory and control of enterprise assets
- protect the organization's info, by developing and implementing an incident response capability
- test of security controls to ensure they are effective and updated as needed
11 Clues: track and manage hardware devices • only authorized to be installed and executed • continuously acquire, assess and take action • educate users on safe-handling of information • part of inventory and control of enterprise assets • manage the security life cycle of acquired software • test of security controls to ensure they are effective and updated as needed • ...
Cristo Rey Crossword 2018-06-21
Across
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- What type of classes does Northside Hospital offer?
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
Down
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- Which Cristo Rey sports team won medals at Florida National Competition?
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- What percent of students at Cristo Rey get accepted to college after graduation?
- What is the title of the football team’s hype video on Marist School’s website?
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
HistoryPuzzlebyLP 2022-01-14
Across
- Abbreviation for Public Works Act
- 2nd day of the week
- last name of the 32nd US president
- AKA National Labor Relations Act
- getting a loan then investing which is known as "_____ on margin"
- "National ______ Act"
- "____ Cabinet" & "____ Tuesday" (one word)
- Wife of the 32nd US president's first name
- the beginning of a politician's term in office (____ 100 days)
Down
- the first word in AAA (____ Adjustment Act)
- Organization that provides assistance & relief
- Jobless WW1 veterans organized a group called
- Series of programs often summed up by the the three R's which was enacted by President Roosevelt
- "Tennessee _____ Authority" (TVA)
- "____ security" + ism
- "Social _____ Act"
16 Clues: "Social _____ Act" • 2nd day of the week • "____ security" + ism • "National ______ Act" • AKA National Labor Relations Act • Abbreviation for Public Works Act • "Tennessee _____ Authority" (TVA) • last name of the 32nd US president • "____ Cabinet" & "____ Tuesday" (one word) • Wife of the 32nd US president's first name • the first word in AAA (____ Adjustment Act) • ...
INFORMATION TECHNOLOGY 2021-02-09
Across
- any number of computers and devices joined together by a communications link
- Internet Service Provider
- Career and Technical Education
- Hypertext Markup Language
- physical components of a computer
- Operating System
- fake emails to try and get personal information
- Local Area Network, single building or location
- 2-year college degree or training
- malicious code that secretly watches what you send over the internet
Down
- writes code to create software programs
- 4-year college degree
- programs that make a computer useful, Word, Excel, PowerPoint, etc.
- Wide Area Network, connects computer devices over dispersed locations
- pertaining to the world wide web culture
- Wireless LAN, radio, microware or infrared links take the place of physical cables
16 Clues: Operating System • 4-year college degree • Internet Service Provider • Hypertext Markup Language • Career and Technical Education • physical components of a computer • 2-year college degree or training • writes code to create software programs • pertaining to the world wide web culture • fake emails to try and get personal information • ...
Tugas ppkn 2023-11-02
Across
- UU no 11 tahun 2008 berisi tentang informasi dan transaksi...
- kejahatan yang menyalahgunakan teknologi internet
- salah satu sarana efektif untuk mencegah dampak negatif kemajuan IPTEK dengan penanaman nilai-nilai
- Ilmu pengetahuan dan teknologi
- pembuat pesawat Indonesia
- Candi yang berada di Jawa tengah
- 1984 Apple menghasilkan komputer
Down
- sebelum ditemukan orang zaman dulu berkomunikasi melalui
- Lembaga ilmu pengetahuan Indonesia
- Bidang yang berkaitan dengan pemerintahan dan kebijakan pemerintah
- warga yang mulai mengembangkan sistem pertanian belasan tahun yang lalu
- Sistem Komunikasi Satelit Domestik
- salah satu bukti nyata adanya kemudahan berbelanja melalui toko
- Meningkatkan devisa negara termasuk dalam bidang
- Johannes Gutenberg pada 1440 mulai mengembangkan mesin
- siapa yang mengeluarkan komputer seri 650dan700
16 Clues: pembuat pesawat Indonesia • Ilmu pengetahuan dan teknologi • Candi yang berada di Jawa tengah • 1984 Apple menghasilkan komputer • Lembaga ilmu pengetahuan Indonesia • Sistem Komunikasi Satelit Domestik • siapa yang mengeluarkan komputer seri 650dan700 • Meningkatkan devisa negara termasuk dalam bidang • kejahatan yang menyalahgunakan teknologi internet • ...
Types of Markets 2022-01-25
Across
- The ___(issuing stocks for the first time) typically occurs in a primary market.
- Primary and secondary ___ are sold in a primary market.
- Zero-coupon bonds do not earn ____ within the bond market.
- Within bond markets in the US, bonds have a ___ value of $1000.
- ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
- The most populated exchange in the U.S who owns trading rights with listed companies
- Future markets help protect against ___ of uncertain markets.
- In a secondary market shares of stock are ___ to the public
Down
- ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
- buy orders at a ____ price.
- Corporations issue debt securities to be traded within ____ markets.
- A security is sold in a ___ market when it is first issued.
- ____ exchanges are markets that do not have a location.
- The purpose of trading within security markets is
- Raising capital within public and private markets is a goal within the ___ market.]
- Who must register bonds within the bond market?
16 Clues: buy orders at a ____ price. • Who must register bonds within the bond market? • ____ exchanges are markets that do not have a location. • The purpose of trading within security markets is • Primary and secondary ___ are sold in a primary market. • Zero-coupon bonds do not earn ____ within the bond market. • ...
Airport 2024-06-12
Across
- Before security, put your __________ bag.
- To spend time looking at items in the airport shops, you_________.
- To give extra money for a heavy bag, you need to ______________.
- To make sure your shoes are secure, ______ your shoelaces.
- To go through security, you need to ______________ the scanner.
- If your baggage is too heavy, it is called ______________.
Down
- To arrive at the airport early so you don't ______________.
- To wait in line with other passengers, you need to ______________.
- To check the flight times, look at the ______________.
- Security staff might ____ you ____ for safety.
10 Clues: Before security, put your __________ bag. • Security staff might ____ you ____ for safety. • To check the flight times, look at the ______________. • To make sure your shoes are secure, ______ your shoelaces. • If your baggage is too heavy, it is called ______________. • To arrive at the airport early so you don't ______________. • ...
DevSecOps Crossword 2024-04-26
Across
- Continuous ..... is a development practice that requires team member to integrate code into repository at least once a day
- ..... Engineer enables the developer with automation and CI/CD pipeline
- Practices that emphasize security as code and everyone is responsible for security
- Activity or anything that does not add value
- The most popular Agile Framework
- One of the most popular DevSecOps orchestration tool
Down
- Simple,lightweight and loosely coupled architectural style
- Agile Methodology that introduces Continuous Integration
- White box security scan approach in DevSecOps pipeline
- Team to ensure service reliability, introduced by Google in 2003
10 Clues: The most popular Agile Framework • Activity or anything that does not add value • One of the most popular DevSecOps orchestration tool • White box security scan approach in DevSecOps pipeline • Agile Methodology that introduces Continuous Integration • Simple,lightweight and loosely coupled architectural style • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
The Crowned Mystic 2026-01-04
10 Clues: Alexei’s job • Elena’s best friend • The queen lives here • Elena’s magical power • A synonym for “magic” • City Elena grew up in • Alexei’s enhanced power • The name of Elena’s country • What Elena wears on her head • The name of the Director of Security
BusFin Chapter 1 2024-08-19
Across
- a security that represents ownership in a company
- setting financial goals is the _____ step in the financial planning process
- a factor that affects financial activities; related to inflation
- supply and demand, risk, and liquidity are some factors that affect the value of this
- the ease in which an investment can be converted to cash
- when a country imports more than it exports
Down
- financial market where short-term debt is bought and sold
- what you give up by making a choice
- a debt security
- ________, investor funds, and borrowing are all sources of funds
- a commercial bank is an example of a ___________institution
11 Clues: a debt security • what you give up by making a choice • when a country imports more than it exports • a security that represents ownership in a company • the ease in which an investment can be converted to cash • financial market where short-term debt is bought and sold • a commercial bank is an example of a ___________institution • ...
The Online World 2015-09-21
Across
- Search Engine
- A website connected to another via a link
- One system to another
- Movement of files from a system to your computer
- Recipient of a small fee for traffic clicking through an add
Down
- Set of online rules for the cyber net
- The format of a file after compression
- Only a readable version of a file
- Type of online communication
- Name for and education online site
- A online collection of personal
11 Clues: Search Engine • One system to another • Type of online communication • A online collection of personal • Only a readable version of a file • Name for and education online site • Set of online rules for the cyber net • The format of a file after compression • A website connected to another via a link • Movement of files from a system to your computer • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
Practica 8A 2023-02-14
17 Clues: aisle • delay • pilot • flight • arrival • tourist • to last • customs • airport • to board • suitcase • passenger • reservation • customs officer • to check (luggage) • security checkpoint • to inspect, to search
Chemical Process Engineer 2023-09-17
17 Clues: care • unit • device • analyse • outcome • security • fluently • timetable • procedure • relevance • adjustment • improvement • arrangement • supervision • solving issues • a sort of variation • you receive it at work
Crossword 08 2023-10-25
Across
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
- refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
- refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
- refers to a computer or a computer network, the electronic medium in which online communication takes place;
- refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
- refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic
- refers to the DOJ – Office of Cybercrime
- refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
Down
- refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
- refers to a set of instructions executed by the computer to achieve intended results;
- refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
- refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
- refers to the modification or change, in form or substance, of an existing computer data or program;
- refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
- the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network
- refers to gathering and receiving information;
20 Clues: refers to the DOJ – Office of Cybercrime • refers to gathering and receiving information; • refers to a set of instructions executed by the computer to achieve intended results; • refers to the modification or change, in form or substance, of an existing computer data or program; • ...
Food Security 2022-07-08
Across
- liquid used to water plants and grow animals.
- to be able to get something
- the long term shifts in temperature and weather patterns.
- the state of being unable to buy necessary things to survive easily
Down
- art of growing crops and raising live stock.
- need for food.
- long time of dry weather and lack of water.
- when something can be accessed
- movement of food or goods from one area to another.
9 Clues: need for food. • to be able to get something • when something can be accessed • long time of dry weather and lack of water. • art of growing crops and raising live stock. • liquid used to water plants and grow animals. • movement of food or goods from one area to another. • the long term shifts in temperature and weather patterns. • ...
Security Issues 2019-01-29
Across
- Everything is backed up at once.
- In this type of backup, only two image files are required to restore the system!
- Faster backup time as only amended files need to be copied.
- A document designed to ensure uptime, diminish data loss, and maximise productivity in the midst of an attack, or natural disaster.
Down
- Useful when backing up large amounts of data.
- Procedures or measures taken to ensure the safety of an organisation.
- This is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible.
- This is information that is still important but it is not needed for immediate use.
- A very important element to a company/organisation!
9 Clues: Everything is backed up at once. • Useful when backing up large amounts of data. • A very important element to a company/organisation! • Faster backup time as only amended files need to be copied. • Procedures or measures taken to ensure the safety of an organisation. • In this type of backup, only two image files are required to restore the system! • ...
Information security 2020-08-26
Across
- potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
- Is the process of determining and assigning privileges to various resources, objects or data.
- the action of stopping any form of attack from happening.
- An internet scam that targets unsuspecting users through email.
- Is a technique that is used to exploit a vulnerability in any application attack gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Down
- a way of injecting malicious scripts into web pages.
- Are small files that Web sites put on your computer hard disk drive when you first visit.
- the process of tracking recording system activities and resource access.
- People, property, and information that needed to be protected asset Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
9 Clues: a way of injecting malicious scripts into web pages. • the action of stopping any form of attack from happening. • An internet scam that targets unsuspecting users through email. • the process of tracking recording system activities and resource access. • Are small files that Web sites put on your computer hard disk drive when you first visit. • ...
Security Department 2020-03-28
Across
- a person who monitor that the hotel areas are in order
- a metal box in which valuable objects are stored
- a objet that records images in or outside a building or in a public place, in order to prevent or help solve situation in the future
- a device such as a bell or siren that warns the people in a building that the building is on fire
- the careful watching of a person or place
- a place in a hotel where things that people have lost are stored
Down
- prepare the annual security program and inspect the operation of the alarms
- a person who guard employed by the hotel
- the crime of stealing from somewhere or someone
9 Clues: a person who guard employed by the hotel • the careful watching of a person or place • the crime of stealing from somewhere or someone • a metal box in which valuable objects are stored • a person who monitor that the hotel areas are in order • a place in a hotel where things that people have lost are stored • ...
Security percutions 2020-11-26
Across
- s a method of changing the original numbers and characters so that they are hidden or disguised. This is important if you are sending sensitive information.
- an expert at programming and solving problems with a computer
- It helps you prevent viruses
- is a law that determines whether people are allowed to access computers and modify the data on the computer system.
Down
- are used to check packets of data as they are received by a computer system from a network or the internet
- small malicious program that can alter and delete files
- An internet worm is a program that spreads across the internet by replicating itself on computers via their network connections.
- This type of malicious software pretends to be a useful program while secretly performing another function
- Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
9 Clues: It helps you prevent viruses • small malicious program that can alter and delete files • an expert at programming and solving problems with a computer • are used to check packets of data as they are received by a computer system from a network or the internet • ...
Security Matters 2023-10-02
Across
- You'll need a pole for this
- You might use a wasp sord to protect this
- If I were doing my Bruce Forsythe impression I would be?
- I might be called this on the golf course
- What caused the lockdowns
Down
- Holding clothes hostage
- Trying desperately to get a compliment
- IF you dont have this you might go to your cry suite
- Tin of processed meat
9 Clues: Tin of processed meat • Holding clothes hostage • What caused the lockdowns • You'll need a pole for this • Trying desperately to get a compliment • You might use a wasp sord to protect this • I might be called this on the golf course • IF you dont have this you might go to your cry suite • If I were doing my Bruce Forsythe impression I would be?
Social Security 2023-12-15
Across
- A federal insurance program
- You can earn a maximum of four of these per year and you need 40 to qualify for future Social Security benefits
- It’s the tax withheld from your wages that funds the Social Security and Medicare programs.
- Primary Insurance Amount
Down
- Social security has five types of __
- A joint federal and state program that helps with medical costs for people with low incomes and limited resources.
- Programs that provide monthly cash benefits to workers and their dependents when they retire, become disabled, or die
- An index prepared by the U. S. Department of Labor that charts the rise in costs for selected goods and services
- Documents you must submit to support a factor of entitlement or payment amount
9 Clues: Primary Insurance Amount • A federal insurance program • Social security has five types of __ • Documents you must submit to support a factor of entitlement or payment amount • It’s the tax withheld from your wages that funds the Social Security and Medicare programs. • ...
Security Meeting 2025-01-22
Across
- Found in the top drawer at LC desk.
- Opener does this in the morning to clear the branch.
- Number of hand-held alarms in branch.
- The robbery folder color.
Down
- "Alt +___ + I" is used in TCR during robbery.
- The Extortion folder color.
- The phone we use to call 911.
- Color of our "All Clear" sign.
- Where to meet during evacuation.
9 Clues: The robbery folder color. • The Extortion folder color. • The phone we use to call 911. • Color of our "All Clear" sign. • Where to meet during evacuation. • Found in the top drawer at LC desk. • Number of hand-held alarms in branch. • "Alt +___ + I" is used in TCR during robbery. • Opener does this in the morning to clear the branch.
Food Security 2024-10-17
10 Clues: What is AAY • what is NFSA • beneficiaries • how many years • How many kg/person • When it was started • What is the price/kg • how it is distributed • How many kgs under AAY • Introduced Pradhan Mantri Garib Kalyan Anna Yojana
OffDig 2024-12-17
Across
- Kort for teknologi og AI-platforme
- Kunstig intelligens til at styrke konkurrenceevne
- En essentiel teknologi til moderne AI-løsninger
- Automatisering af processer gennem avancerede digitale værktøjer
- AI-løsninger, der skaber reel forretningsværdi
Down
- Hjælper virksomheder med AI-strategi og transformation
- En ledende aktør inden for digital og AI-transformation
- AI som kernen i fremtidens nytænkning
- Beskytter organisationer mod digitale trusler
- Bruges til at drive strategi og vækst
10 Clues: Kort for teknologi og AI-platforme • AI som kernen i fremtidens nytænkning • Bruges til at drive strategi og vækst • Beskytter organisationer mod digitale trusler • AI-løsninger, der skaber reel forretningsværdi • En essentiel teknologi til moderne AI-løsninger • Kunstig intelligens til at styrke konkurrenceevne • Hjælper virksomheder med AI-strategi og transformation • ...
Industrial Cryptic 2026-01-20
Across
- Automaton formed from Dragos CEO and OT
- Initially, some cyber alerts disrupt automation control system
- Safety-critical broadcasts enter Scottish lake
- Rare minerals opt for Caribbean spirits
- Industrial routine scrambled in DoD grid call
Down
- Stage 2 pivot orders dessert, Ken Burns?
- Throttles as wolf inverts, trapped in rival vendor
- Mickey overheard full malware module
- Package installer adds final code including strangely armed hallucination
- Noisy attempt joins sibling malware
10 Clues: Noisy attempt joins sibling malware • Mickey overheard full malware module • Automaton formed from Dragos CEO and OT • Rare minerals opt for Caribbean spirits • Stage 2 pivot orders dessert, Ken Burns? • Industrial routine scrambled in DoD grid call • Safety-critical broadcasts enter Scottish lake • Throttles as wolf inverts, trapped in rival vendor • ...
FNAF 2024-03-28
Across
- What do you use to watch the animatronics?
- The ____ of 1987
- Who serves ice cream?
- FNAF___ was Scotts most controversial FNAF game.
- Old Man ____ (he fishes)
- Who is the purple guy?
- Which character has a cupcake?
Down
- Who is the security guard in Security Breach?
- Who is the pirate?
- Who wants to be beautiful?
- Who originally plays the electric guitar?
- Which child possesses Golden Freddy?
- What is the name of William Afton's daughter?
13 Clues: The ____ of 1987 • Who is the pirate? • Who serves ice cream? • Who is the purple guy? • Old Man ____ (he fishes) • Who wants to be beautiful? • Which character has a cupcake? • Which child possesses Golden Freddy? • Who originally plays the electric guitar? • What do you use to watch the animatronics? • Who is the security guard in Security Breach? • ...
Airport vocab Elliot 2026-03-25
"The Tale of Jenny and the Coffee Juggler" 2024-09-11
8 Clues: What Carl really wants. • A classic security no-no. • What Carl forgot to show. • What you need to ask for ID. • What you're trying to prevent. • What Jenny's sticking to like glue. • How Jenny feels when enforcing security. • That feeling you should ignore when enforcing security.
FNAF crossword 2024-04-05
Across
- Animatronics from security breach
- Animatronics from the second game
- Cheapest set of animatronics in pizzeria simulator
- Where is glamrock bonnie hidden in ruin
- What role do you play as in FNAF 1-3
- What suit does afton get springlocked in
- Where are you in FNAF 4
Down
- Animatronics from sister location
- Animatronics from the third game
- The most disregarded FNAF game
- Everyones fav black bear
- Who causes hallucinations saying "its me"
- Who gets a stage of their own
- Bonnie's "replacement" in security breach and ruin
- *sighs* Who always comes back
15 Clues: Where are you in FNAF 4 • Everyones fav black bear • Who gets a stage of their own • *sighs* Who always comes back • The most disregarded FNAF game • Animatronics from the third game • Animatronics from sister location • Animatronics from security breach • Animatronics from the second game • What role do you play as in FNAF 1-3 • Where is glamrock bonnie hidden in ruin • ...
Cashless society 2024-09-12
Across
- System ........... that causes payment issues
- The convenience of not carrying.....physically
- Cash transactions leave .......... to be tracked
- Electronic ............ criminals
- A payment method that eliminates...
- loundering A financial crime that's harder to commit without ...........
- ....................interest rate affecting bank customers
- .................transaksi elektronik yang digunakan sebagai alternatif kartu kredit dan debit
Down
- Security .............. to protect cash
- Every ............ recorded makes it hard to hide
- Transaction ............... to avoid this crime
- ...............that needs to be converted when traveling
- Type of ............ banks may increase without cash
- ................associated with physical currency management
- ...................state of not using physical money
- gambling A common activity where ........... is used and tracked
16 Clues: Electronic ............ criminals • A payment method that eliminates... • Security .............. to protect cash • System ........... that causes payment issues • The convenience of not carrying.....physically • Transaction ............... to avoid this crime • Cash transactions leave .......... to be tracked • Every ............ recorded makes it hard to hide • ...
THINK BEFORE YOU CLICK 2025-04-06
Across
- Necessary to ensure continuity.
- Helps avoid phishing and maintain security.
- Describes the identity or message in phishing.
- Often disguised in phishing emails.
- Essential to protect data and systems.
- Crucial during disruptions for transparency.
- Red flag in scam messages to pressure action.
- What scammers ask victims to do to steal info.
Down
- Key to avoiding phishing and ensuring business stability.
- Result of falling for a scam.
- System to keep business running during disruptions.
- Core goal of BCMS.
- Common platform used in phishing attacks.
- Deceptive scheme or trick.
- Fraudulent attempt to obtain sensitive information.
15 Clues: Core goal of BCMS. • Deceptive scheme or trick. • Result of falling for a scam. • Necessary to ensure continuity. • Often disguised in phishing emails. • Essential to protect data and systems. • Common platform used in phishing attacks. • Helps avoid phishing and maintain security. • Crucial during disruptions for transparency. • Red flag in scam messages to pressure action. • ...
One Best Buy 2023-10-18
Across
- Geek Mobile driven by most in-home PC Agents
- Membership that replaced Totaltech this year.
- _____ Barry, current CEO
- New Membership for those who more than anything just want a good deal.
- Employee Driven Intelligence
- The Monday after Thanksgiving, _____ Monday.
- Robert _______ founded Geek Squad in 1994
- We are the top corporate sponsor for this amazing non profit organization.
Down
- Helps Product Flow reach for the stars! I mean, TVs..
- Tells us what goes where.
- Founded by Richard M. Schulze in 1966
- When you need to call for backup.
- Replaced ETK
- Unleash the _____ of our People!
- The smiling face when you walk in to a Best Buy
15 Clues: Replaced ETK • _____ Barry, current CEO • Tells us what goes where. • Employee Driven Intelligence • Unleash the _____ of our People! • When you need to call for backup. • Founded by Richard M. Schulze in 1966 • Robert _______ founded Geek Squad in 1994 • Geek Mobile driven by most in-home PC Agents • The Monday after Thanksgiving, _____ Monday. • ...
BACO Conference Team Builder 2024-11-20
Across
- – The process of identifying and analyzing risks.
- – Violation of a law, duty, or agreement.
- – Abbreviation for Foreign Corrupt Practices Act.
- – Consequences for failing to follow regulations.
- – Recording and documenting compliance breaches.
- – Procedures to ensure proper operation of systems.
- – A professional responsible for managing compliance.
- – Protecting systems and data from cyber threats.
Down
- – Measures to prevent illicit financial activities.
- – A group responsible for overseeing ethical practices.
- – An in-house review of processes and systems.
- – The act of making information known.
- – Adherence to moral and ethical principles.
- – A set of rules outlining acceptable behaviors.
- – Relating to rules issued by governing bodies.
15 Clues: – The act of making information known. • – Violation of a law, duty, or agreement. • – Adherence to moral and ethical principles. • – An in-house review of processes and systems. • – Relating to rules issued by governing bodies. • – Recording and documenting compliance breaches. • – A set of rules outlining acceptable behaviors. • ...
33 Pieces of Greatness 2025-04-03
Across
- The security tool you've been working on
- A protective security measure in networking
- Favorite anime character
- Favorite Arsenal player
- Favorite drink
- Favorite person in the world
- All time favorite game console
Down
- Arsenal’s nickname
- All is well in the world, as long as you can eat
- The first city you had your passport stamped
- When you're stressed, you play..
- A luxury item you always splurge on
- Strategy-based board game you love
13 Clues: Favorite drink • Arsenal’s nickname • Favorite Arsenal player • Favorite anime character • Favorite person in the world • All time favorite game console • When you're stressed, you play.. • Strategy-based board game you love • A luxury item you always splurge on • The security tool you've been working on • A protective security measure in networking • ...
Team FIRU 2021-07-20
Across
- Often found hanging in the office
- Make the best salad sandwich in Greenacre
- Town and former maximum security gaol
- Where is the big prawn?
- Must be checked and filed
- Provided the entertainment at the 1990 AFL grand final
- Has the odd drive by shooting
- Their job is to is to investigate and solve crime
Down
- Sang the song I'm too sexy?
- What do they call a quarter pounder with cheese in France?
- Famous Goulburn inmate
- Who opened the Big Merino in 1985?
- How many to a cell in Goulburn Maximum Security cells?
- Not in Northern Ireland
- Former FBEU secretary
- Rays favourite swear word?
16 Clues: Former FBEU secretary • Famous Goulburn inmate • Where is the big prawn? • Not in Northern Ireland • Must be checked and filed • Rays favourite swear word? • Sang the song I'm too sexy? • Has the odd drive by shooting • Often found hanging in the office • Who opened the Big Merino in 1985? • Town and former maximum security gaol • Make the best salad sandwich in Greenacre • ...
Spanish 2023-12-18
22 Clues: inn • sled • ferry • subway • recline • to pack • to tour • engineer • security • platform • to slide • terminal • conductor • itinerary • turnstile • streetcar • stwerdess • inner tube • flip plops • guest houes • luggage claim • in flight service
Neighbourhood Watchers 2025-08-04
23 Clues: меры • район • кузнец • охрана • награда • улучшить • участник • уязвимый • убедиться • ежегодный • пословица • имущество • поведение • установить • обеспечить • гражданство • добровольный • предотвратить • изолированный • включать в себя • кража со взломом • шанс, возможность • ___measures принимать меры
Viajes 2024-04-25
23 Clues: row • gate • seat • plane • aisle • flight • travel • layover • luggage • to land • customs • airport • arrivals • security • passport • suitcase • to travel • passenger • round trip • departures • destination • to take off • travel agent
Traveling 2023-03-16
16 Clues: voo • moeda • visto • troco • bagagem • chegadas • dinheiro • partidas • carteira • alfândega • vacinação • segurança • passaporte • casa de câmbio • caixa eletrônico • card cartão de crédito
EMD Polices & Procedures 2021-02-11
Across
- Type of inspection performed by security officers to ensure that employees are using their assigned badges
- CW-EMD cleared employee has a _______ on their badge
- Special arrangements have been made to allow_____________ employees to bring company provided cell phones through CW-EMD property
- Issued to employees and long term contractors to identify a vehicle and vehicle owner should there be an issue
- Application used for alarms and event view
- Document with information that must be reported to the next officer taking over that post
- All visitors must have a ___________ completed in order to be allowed into the facility or do work on the grounds
- Alarm that sounds like a hockey goal
- This report is a firsthand account of the activities the security officer performed while on duty.
- This type of report is used for a situation that requires greater detail to be investigated
- only post that is manned from 0630-2230 Monday thru Friday.
- __________ is to be completed every time a foreign national enters the shop for a tour
- Badge color reserved specifically for Foreign Nationals
- Site with no on-site security that is monitored by CW-EMD
- These passes are issued for a maximum of 5 business days at a time
- Temporary badges can only be issued and returned to_______
Down
- Has a yellow background with red lettering and the Curtiss-Wright logo
- __________ Book is used by CW-EMD security to alert security officers of individuals who previously had access to the site.
- Form used by employees to have incoming media scanned for viruses
- Stickers on personal owned cell phone that have been approved by the FSO/Asst. FSO are this color
- __________ are issued if a person’s vehicle information is not registered in the Auto Registration
- Form generated by and issued by the Purchasing Department authorizing equipment to be removed from the site
- Foreign Nationals are permitted to have approved electronics in this area and this area only
- __________visitors wearing this badge MUST ALWAYS have an EMD escort with them
- Post where you control and perform 100% vehicle inspections
- required any time work is being done inside the building that could potentially spark a fire
- Document needed when taking company property off site
- Secure area located in Bldg. 3A 2nd floor
- type of visitor that is required to have a video date
29 Clues: Alarm that sounds like a hockey goal • Secure area located in Bldg. 3A 2nd floor • Application used for alarms and event view • CW-EMD cleared employee has a _______ on their badge • Document needed when taking company property off site • type of visitor that is required to have a video date • Badge color reserved specifically for Foreign Nationals • ...
Cybersecurity Awareness 2024-12-13
Across
- A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
- Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
- A type of malware that locks a user’s files or system, demanding payment to restore access.
- A fix or update to software that addresses security vulnerabilities or bugs.
- Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
- A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
- Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
- Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
- Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
- Software that secretly gathers information about you or your device without your consent.
- (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
- A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
- The process of converting data into a secret code to prevent unauthorized access.
- Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
- Software designed to detect, prevent, and remove malicious programs from your computer or network.
- Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
- Any potential danger or risk that could exploit vulnerabilities in a system or network.
- Malicious software designed to harm or exploit devices, systems, or networks.
- Breach An incident where confidential data is accessed or disclosed without authorization.
- Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
- A security vulnerability that is unknown to the software maker and has no fix or patch available.
- Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
- Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
- A copy of important data or files that can be restored in case of loss, damage, or attack.
- (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.
25 Clues: A fix or update to software that addresses security vulnerabilities or bugs. • Malicious software designed to harm or exploit devices, systems, or networks. • The process of converting data into a secret code to prevent unauthorized access. • Any potential danger or risk that could exploit vulnerabilities in a system or network. • ...
Cristo Rey Crossword 2018-06-21
Across
- How many credits do you need to graduate from Cristo Rey? (write out number)
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
Down
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- Which Cristo Rey sports team won medals at Florida National Competition?
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- What is the title of the football team’s hype video on Marist School’s website?
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- What type of classes does Northside Hospital offer?
- What percent of students at Cristo Rey get accepted to college after graduation?
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Cristo Rey Crossword 2018-06-21
Across
- How many credits do you need to graduate from Cristo Rey? (write out number)
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- What percent of students at Cristo Rey get accepted to college after graduation?
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- Which Cristo Rey sports team won medals at Florida National Competition?
Down
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- What type of classes does Northside Hospital offer?
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- What is the title of the football team’s hype video on Marist School’s website?
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Cristo Rey Crossword 2018-06-21
Across
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- What percent of students at Cristo Rey get accepted to college after graduation?
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
Down
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- Which Cristo Rey sports team won medals at Florida National Competition?
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- How many credits do you need to graduate from Cristo Rey? (write out number)
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- What is the title of the football team’s hype video on Marist School’s website?
- What type of classes does Northside Hospital offer?
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • How many credits do you need to graduate from Cristo Rey? (write out number) • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • ...
Cristo Rey Crossword 2018-06-21
Across
- Which Cristo Rey sports team won medals at Florida National Competition?
- Hope Atlanta’s mission is to provide a comprehensive approach to address ___ and provide solutions that promote lifelong stability
- Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year
- In 1981, Moore Colson’s first office had only four people: two professionals, one bookkeeper, and one _____
- How many Cristo Rey High Schools in the United States are Jesuit? (write out number)
- Eversheds Sutherland had all but ____ of their partners enlisted to fight in World War II (write out number)
- Through corporate work study program, students earn ____% of the cost of their education (write out number)
- SecureWorks processes 250 ___ cyber events each day to protect their clients from cyber attacks.
- In 2015, Arby’s created a ___ hotline after the release of their new sandwich
- How many Cristo Rey students are part of a “team” at their job? (write out number)
- The Coca Cola Company is devoted to replenishing all the ___ they use during production
- What is the title of the football team’s hype video on Marist School’s website?
Down
- UPS Capital has a way of shipping valuable goods. What is the name of this shipment?
- Aderant devotes a day each year where their 450 employees take the day off to do service in their ____
- Jones Day is the only firm in the history of the BTI survey to win “___” status in all 17 activities that drive superior client service two years in a row
- What is the last name of the Director of Admissions at Cristo Rey Atlanta?
- What type of classes does Northside Hospital offer?
- How many credits do you need to graduate from Cristo Rey? (write out number)
- What is the only service that Piedmont Atlanta Hospital provides that starts with a “F”?
- What percent of students at Cristo Rey get accepted to college after graduation?
20 Clues: What type of classes does Northside Hospital offer? • Which Cristo Rey sports team won medals at Florida National Competition? • What is the last name of the Director of Admissions at Cristo Rey Atlanta? • Expeditors has reduced their _____ by 23%, saving 7.5 million pages per year • How many credits do you need to graduate from Cristo Rey? (write out number) • ...
Cybersecurity 2022-10-15
Across
- When online, using a ______ name helps protect your true identity
- Secretly watches computer activity
- Software that protects computers from virus-related harm
- Phishing is malware that asks for personal ___________
- Someone who intentionally targets people for harm using online chat rooms or social media
- Type of bullying that takes place online
- Many features in online _____ can expose players to predators
- Rules for interacting politely and responsibly online
- Any program, website, or file that is designed to damage or gain unauthorized access to a device
- Programs that appear to be useful but damage computers
- A form of malware that deliberately prevents you from accessing files on your computer until they are decrypted, usually at a cost
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- ____ passwords contain easy-to-guess information
Down
- Cyber ______ is the ability to act in a safe and responsible manner on the Internet and other connected environments
- Programs or code that damage or destroy data by attaching to a program or file in a victim computer
- URLs that mislead the user into downloading a virus or visiting a harmful website
- Never list your _________ number or home address under contact information online
- Illegal ___ of copyrighted material is often referred to as piracy
- Your digital _________ is a collection of all information that you leave behind on the internet and cannot be removed by deleting or setting as private
- Type of profile image used as an alternative to a photograph of a user's face, to help protect their privacy
- Your ______ device often contains more personal information than any other device
- A password containing at least 10 characters and several unique characters could be described as ______
- _______ settings help control things like your profile, contact, and other information relating to your account
- A piece of malware that can replicate itself in order to spread the infection to other connected computers without human interaaction
- Social __________ describes sites or online communities where like-minded people can communicate with each other
25 Clues: Secretly watches computer activity • Type of bullying that takes place online • ____ passwords contain easy-to-guess information • Rules for interacting politely and responsibly online • Phishing is malware that asks for personal ___________ • Programs that appear to be useful but damage computers • Software that protects computers from virus-related harm • ...
Types of Social Engineering Tactics 2022-05-11
Across
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- This attack centers around an exchange of information or service to convince the victim to act.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- A type of monitoring software designed to record keystrokes made by a user.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
13 Clues: A type of monitoring software designed to record keystrokes made by a user. • This attack centers around an exchange of information or service to convince the victim to act. • A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email. • ...
Chapter 2 2020-08-22
Across
- threat actor that seeks to harm the government
- reduce the risk of a threat
- individual who gains unauthorized access
- when different employees take over job tasks
- this privilege principal limits access to work tasks
- after an attack perform a memory
Down
- media preparation technique
- this document states who has had access to the evidence
- this security measure is AKA defense-in-depth
- identifies traffic on your network
- important aspect of evidence gathering
- separation of ___
- testing tool to validate bandwidth
- this testing type simulates a large number of clients
- privileges resulting from of privilege escalation
- are the greatest threat to network security
- changes the position of characters
17 Clues: separation of ___ • media preparation technique • reduce the risk of a threat • after an attack perform a memory • identifies traffic on your network • testing tool to validate bandwidth • changes the position of characters • important aspect of evidence gathering • individual who gains unauthorized access • are the greatest threat to network security • ...
Types of Social Engineering Tactics 2022-05-11
Across
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- This attack centers around an exchange of information or service to convince the victim to act.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- A type of monitoring software designed to record keystrokes made by a user.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
13 Clues: A type of monitoring software designed to record keystrokes made by a user. • This attack centers around an exchange of information or service to convince the victim to act. • A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email. • ...
Mamas Bank Account 2026-02-17
17 Clues: אמא • אבא • קצב • מהגר • הקלה • המחאה • תקציב • ערימה • בטחון • משכורת • שכר דירה • למשוך כסף • מקרה חירום • הזמן והמקום • לגלות\לחשוף • הכותבת של הסיפור • Account חשבון בנק
Five Nights at Freddy's Movie 2025-10-21
Across
- They might be possessed by:
- Bonnie's favorite instrument:
- Which shift does the security guard work?
- How many souls are trapped in the restaurant?
- A younger brother who was kidnapped in the past:
- Chicken's best friend:
- Little sister who likes to draw:
- The security guard actively experiences these:
- Red Pirate:
Down
- What Type of restaurant is Freddy Fazbear's?
- He takes the night guard job at Freddy Fazbear's:
- What does the band do when they catch you?
- Yellow Chicken animatronic who wears a bib:
- Animatronic bear with a hat:
- A police officer who knows the restaurant's dark past:
- The killer's favorite animal costume:
- The true villain who always comes back:
- Mysterious man with a convenient job opportunity:
18 Clues: Red Pirate: • Chicken's best friend: • They might be possessed by: • Animatronic bear with a hat: • Bonnie's favorite instrument: • Little sister who likes to draw: • The killer's favorite animal costume: • The true villain who always comes back: • Which shift does the security guard work? • What does the band do when they catch you? • ...
Navigate Unit 1.1+1.2 2021-08-31
18 Clues: treu • Streit • Meinung • Internet • Therapie • schuldig • Vertrauen • Abenteuer • Verletzung • zuverlässig • Angestellte/r • jdn überzeugen • sich entwickeln • Rabatt, Preisnachlass • Kunde (Kundin), Käufer • etw. zugeben, eingestehen • Sicherheit, Sicherheitsdienst • Almosen, Barmherzigkeit, Benefiz-
AT THE AIRPORT 2017-11-08
18 Clues: PASSI • LENTO • TULLI • VAPAA • PUNNITA • VARATTU • VIISUMI • LASKEUTUA • MÄÄRÄNPÄÄ • VÄLILASKU • MATKATAVARAT • VIIVÄSTYNTYT • KÄYTÄVÄPAIKKA • TURVATARKASTUS • LÄHTEVÄT LENNOT • SAAPUVAT LENNOT • ARVIOITU LÄHTÖAIKA • MATKATAVAROIDEN NOUTOPISTE
Bullying 2024-02-07
Across
- Pushing and shoving someone are signs of which bullying behaviour
- Tears coming down your face
- How you should feel all the time
- Making fun of others
- How you feel looking at a scary movie
Down
- Someone who is bullied
- This involves the use of words to harm someone
- When you post mean things online
- If you are being bullied talk to your
- When you exclude someone from a game or group
- The opposite of happy
11 Clues: Making fun of others • The opposite of happy • Someone who is bullied • Tears coming down your face • When you post mean things online • How you should feel all the time • If you are being bullied talk to your • How you feel looking at a scary movie • When you exclude someone from a game or group • This involves the use of words to harm someone • ...
Airports 2022-07-21
Across
- city with the code SIN
- the airline code for cathay pacific
- most common cause of runway incursions
- country of the world's busiest airport
- you can carry up to 100ml of this
- first international Airport opened in
Down
- ideal solution for evacuating passengers
- the area where aircraft park
- the area after check-in and passport control
- vertical guidance system to guide planes
- the security of aviation as a whole
- man family tried to sneak this through the airport
- customs officers intercept this
- the area before security
- makes up 50% of Auckland Airports' income
15 Clues: city with the code SIN • the area before security • the area where aircraft park • customs officers intercept this • you can carry up to 100ml of this • the security of aviation as a whole • the airline code for cathay pacific • first international Airport opened in • most common cause of runway incursions • country of the world's busiest airport • ...
IT-Security - Datenschutz/-sicherheit 2016-01-29
Across
- forschen das Nutzerverhalten aus
- Diebstahl von Daten die weggeworfen wurden
- Mobbing mit Hilfe von elektronischen Medien
- versteckt in einem scheinbar nützlichen Programm
- Informationen die gespeichert und beim erneuten anklicken der Website wieder erscheinen
- unerwünschte Werbemails
Down
- jemand der illegal in Computersysteme eingreift
- Beobachtung bei der Eingabe von Daten
- Virus der sich direkt über Netzte im Internet verbreitet
- Sicherheitskopie im Falle von Verlust oder dergleichen
10 Clues: unerwünschte Werbemails • forschen das Nutzerverhalten aus • Beobachtung bei der Eingabe von Daten • Diebstahl von Daten die weggeworfen wurden • Mobbing mit Hilfe von elektronischen Medien • jemand der illegal in Computersysteme eingreift • versteckt in einem scheinbar nützlichen Programm • Sicherheitskopie im Falle von Verlust oder dergleichen • ...
PERUNDUNGAN 2024-09-27
Across
- Meminta uang atau barang secara paksa disertai dengan ancaman
- Bentuk penindasan yang dilakukan seseorang atau sekelompok orang yang lebih kuat terhadap orang lain dengan tujuan untuk menyakiti
- Yang dialami korban perundungan
- Kata bully berasal dari bahasa
- Bullying Bullying dalam media sosial
Down
- Cara pencegahan perundungan
- Jika kita melihat perundungan
- Agar tidak dibully
- Bullying dalam bentuk perkataan
- Salah satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain
10 Clues: Agar tidak dibully • Cara pencegahan perundungan • Jika kita melihat perundungan • Kata bully berasal dari bahasa • Yang dialami korban perundungan • Bullying dalam bentuk perkataan • Bullying Bullying dalam media sosial • Meminta uang atau barang secara paksa disertai dengan ancaman • ...
Англ.яз. 2020-03-10
Across
- защита
- хранить
- результат, проблема
- безопасность
- враг, нарушитель
- производительный
- конфиденциальность
- способ, средство
- достоверность, подлинность
- программное обеспечение
- оборудование, аппаратное обеспечение
Down
- полезность
- защищённость
- последствие, результат
- невозможный отказ от авторства
- содержимое
- применение
- быстрый
- обрабатывать
- нарушитель, взломщик
20 Clues: защита • хранить • быстрый • полезность • содержимое • применение • защищённость • безопасность • обрабатывать • враг, нарушитель • производительный • способ, средство • конфиденциальность • результат, проблема • нарушитель, взломщик • последствие, результат • программное обеспечение • достоверность, подлинность • невозможный отказ от авторства • оборудование, аппаратное обеспечение
At the Airport 2017-01-12
22 Clues: багаж • острый • терять • прямой • предмет • тяжелый • очередь • тележка • быстрый • опасный • пассажир • жидкость • оставлять • показывать • пропускать • досматривать • внимательный • присоединяться • проходить через - go ... • посадочный талон - ... card • сотрудник службы безопасности • стойка регистрации - ... desk
What You Wanna Be? (Transcribe the phonetic symbol to the box) 2024-01-07
26 Clues: vet • beɡər • lɔɪər • nɜːrs • bʊtʃər • ɡeɪmər • plʌmər • beɪkər • teɪlər • æθliːt • bæŋkər • raɪtər • dentɪst • tiːtʃər • dɑːktər • draɪvər • flɔːrɪst • ɑːrkɪtekt • sekrəteri • fɪʃmʌŋɡər • sɪˈkjʊrəti • ʌnɪmˈplɔɪd • əˈkaʊntənt • ʌndərteɪkər • laɪˈbreriən • faɪərfaɪtər
GTA5 2023-07-05
22 Clues: jetcar • police • oldjet • newjet • hacker • gta5map • airport • autoshop • security • government • michaelson • carsalesmen • flying bike • franklin dog • Trevorfriend • weapon stash • sandy shores • marina hights • eastlossantos • tall building • clothes store • high end clothes
ACEBA 2020-09-23
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
Receptionist Essentials 2025-03-19
Across
- / Security risk where an unauthorized person follows an employee through a secure door
- / The process of handling unexpected situations professionally
- / An important security step before issuing a guest badge
- / The designated area where visitors check in
- / The internal resource where you can find answers to policies and procedures
Down
- / What you must remain during a workplace emergency
- / The software used for internal messaging at Apple
- / A common security measure for Apple employees
- / What you provide when guiding guests to a meeting room
- / The first person guests interact with at the front desk
10 Clues: / The designated area where visitors check in • / A common security measure for Apple employees • / What you must remain during a workplace emergency • / The software used for internal messaging at Apple • / What you provide when guiding guests to a meeting room • / The first person guests interact with at the front desk • ...
ICT Password 2024-03-06
6 Clues: World Wide Web • Voice Over Internet Protocol • Example of a crypto currency • Information Communictaion Technology • Crime Crime carried out using computer • Technology to hide Ip address and location
Types of Social Engineering Tactics 2022-05-11
Across
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- This attack centers around an exchange of information or service to convince the victim to act.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- A type of monitoring software designed to record keystrokes made by a user.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
13 Clues: A type of monitoring software designed to record keystrokes made by a user. • This attack centers around an exchange of information or service to convince the victim to act. • A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email. • ...
PRSE6212 2025-02-26
Across
- A social engineering attack that tricks users into revealing sensitive information.
- The principle that ensures information remains accurate and unaltered.
- A physical or digital device used to generate or store authentication credentials.
- The process of verifying the identity of a user or system.
- A technique where an attacker disguises themselves as a trusted entity to deceive victims.
- A biometric security feature that ensures the biometric sample is from a real, live person.
- A federated identity solution that enables single sign-on (SSO) across different organizations securely.
- A biometric technique that identifies users based on their unique typing rhythm.
- The process of granting or denying permissions to a user or system.
- The principle that ensures information is only accessible to authorized users.
- A method of authentication that uses physical or behavioral characteristics.
- A biometric authentication method that scans the colored part of the eye.
- A cyberattack where an attacker intercepts and alters communication between two parties.
- A dynamic authentication method that generates temporary passcodes based on a shared secret and the current time.
Down
- A method where an attacker systematically tries common passwords to gain access.
- The point at which the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal in a biometric system.
- An authentication method that analyzes unique patterns in actions like typing or mouse movement.
- A biometric authentication method that uses unique patterns on the fingertip.
- A public-key cryptography technique that offers strong security with smaller key sizes, often used in authentication.
- A cryptographic technique that adds random data to passwords before hashing to prevent attacks.
- The principle that ensures authorized users can access information when needed.
- A technique that converts plaintext data into unreadable ciphertext for security.
- A secret combination of characters used to verify a user's identity.
- A cryptographic method used to verify the authenticity and integrity of a message or document.
- A biometric authentication method that analyzes unique facial features.
- An authentication method that requires more than one verification factor.
- A cryptographic method that allows computations to be performed on encrypted data without decrypting it first.
- A security model that assumes no entity should be trusted by default, even inside the network.
- A security principle that ensures a user cannot deny performing an action or sending a message.
- A cryptographic process that converts data into a fixed-length value, ensuring integrity.
30 Clues: The process of verifying the identity of a user or system. • The process of granting or denying permissions to a user or system. • A secret combination of characters used to verify a user's identity. • The principle that ensures information remains accurate and unaltered. • A biometric authentication method that analyzes unique facial features. • ...
Cybersecurity Awareness Month 2024 2024-09-24
Across
- Pop-up malware intent on using fear tactics to get you to perform an action.
- Data must be accessible when you need them. Part of the CIA triad.
- The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
- A flaw in a system that can enable an adversary to compromise the security of that system.
- A type of threat that includes authorized system users and disgruntled employees.
- "Good guy" hackers.
- A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
- Multiple compromised systems under the control of a single attacker.
- A device that permits the flow of authorized data, while keeping unauthorized data out.
- A vulnerability or exploit that is unknown to software developers and security professionals.
- A team that acts as the adversary during a security assessment.
- Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
- The broad term for nontraditional, internet-connected smart devices.
- A network of devices created for the sole purpose of luring in an attacker.
- A protocol used to ensure time synchronization between devices.
Down
- The act of moving around, looking for vulnerable Wi-Fi networks.
- Hardware and/or software used to capture and record key strokes.
- Spear phishing aimed at high-profile targets such as executives.
- Cryptography that uses two different keys for encryption and decryption.
- Information that can be used to distinguish an individual’s identity.
- The act of applying a fix to a software defect.
- An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
- Cryptography that uses the same shared secret key for both encryption and decryption.
- An attack from multiple compromised systems that target a single system, service, or application.
- Malware intent on holding your data hostage in an attempt to extort money.
- Protecting of information from unauthorized access. Part of the CIA triad.
- A team usually involved with the defense of the organization’s infrastructure.
- An old method programmers use to bypass security to gain access to a system or software. "War Games"
- "Bad guy" hackers.
- An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.
31 Clues: "Bad guy" hackers. • "Good guy" hackers. • The act of applying a fix to a software defect. • A team that acts as the adversary during a security assessment. • A protocol used to ensure time synchronization between devices. • The act of moving around, looking for vulnerable Wi-Fi networks. • Hardware and/or software used to capture and record key strokes. • ...
Airport 2018-05-29
Across
- other name for cabin crew
- terminology for passengers
- ID needed to travel internationally
- where everyone can access
- The people who help you check in
Down
- where planes take off
- Person incharge of aircraft
- Airport code for Hong Kong
- name of aviation security
- how to access the landslide/airside
- after you cross customs and security
11 Clues: where planes take off • other name for cabin crew • name of aviation security • where everyone can access • Airport code for Hong Kong • terminology for passengers • Person incharge of aircraft • The people who help you check in • how to access the landslide/airside • ID needed to travel internationally • after you cross customs and security
The Egypt Game from page 80 to 122 2024-05-03
Across
- what Marshall wanted to sacrifice as a joke
- Kmata's costume
- when the story took place
- what Ken and Toby calls April
- what April wants to sacrifice
- Ken and Toby's grade
Down
- the reason parents don't let their kids trick or treat by themselves
- Toby's costume
- who security belongs to
- Marshall's costume
- April and Melanie's costumes
11 Clues: Toby's costume • Kmata's costume • Marshall's costume • Ken and Toby's grade • who security belongs to • when the story took place • April and Melanie's costumes • what Ken and Toby calls April • what April wants to sacrifice • what Marshall wanted to sacrifice as a joke • the reason parents don't let their kids trick or treat by themselves
At the Airport 2017-01-12
22 Clues: багаж • прямой • острый • терять • опасный • тележка • быстрый • очередь • предмет • тяжелый • жидкость • пассажир • оставлять • показывать • пропускать • внимательный • досматривать • присоединяться • проходить через - go ... • посадочный талон - ... card • стойка регистрации - ... desk • сотрудник службы безопасности
pre-intermediate 3 2022-03-31
20 Clues: vám • utas • kapu • késik • jóslat • csomag • tetőterasz • mostanában • csengőhang • mennyország • repülőjárat • okostelefon • tábla, jelzés • átvesz, befogad • beszáll a repülőgépbe • biztonsági ellenőrzés • szöveges üzenetet küld • szolgáltatások, lehetőségek • érkezési kapu (repülőtéren) • indulási kapu (repülőtéren)
Los viajes 2022-02-28
22 Clues: gate • pool • view • trip • seat • guest • valet • ticket • flight • waiter • to land • bellboy • luggage • to help • to walk • airplane • to leave • suitcase • security • to arrive • to take off • check-in counter
Great Depression Crossword 2022-01-21
21 Clues: Deal • runs • Army • Bowl • state • cycle • Tuesday • kitchen • Spending • 100 Days • blizzard • on Margin • Tarrif Act • down theory • Security Act • Flood of 1936 • Administration • Reserve System • Conservation Corps • Industrial Recovery Act • Progress Administration
RETIREMENT 2024-07-23
20 Clues: Limits • Pension • Rollover • Roth IRA • Qualified • Deductible • Individual • Withholding • Distribution • Contribution • Tax Deferred • Nonqualified • Savers Credit • Social Security • Traditional IRA • Defined Benefit • Employer Sponsored • Early Distribution • Defined Contribution • Required Minimum Distribution RMD
omputer vocab 2023-03-06
20 Clues: wide • local • mouse • parts • itself • allows • to copy • imitate • connects • security • annoying • prevents • use access • stores data • getting into • secret words • bad behavuior • ones experiences • goverment access • to edit or change content
Chose your own vocab. puzzle 2023-04-26
24 Clues: gum • boat • bomb • tick • door • skier • plane • image • hotel • candy • simple • turtle • to walk • weather • baggage • avocado • airport • to flip • security • sunscreen • perchance • cliff jump • water bottle • clothing store
Aeropuerto 2021-11-09
JetBlue Crossword Puzzle 2026-02-13
Across
- Jetblue Value
- Manual for everyone working ground operations
- Tool used to checking the flight load plan
- Standard security program
- Must be typed up and cleared by BSO agent for each flight
- Must point to this during your checkin process
- Tool used by BSO Agent when dealing with claims, MBR's etc.
Down
- Tool used for checking flight & crew information
- Brock
- Mama Carry A Bag!
- Reward for getting first place in the competition
- Aircraft uses three flight attendants
- Uniform guideline that all crewmembers must adhere to
- Aircraft security search checklist
14 Clues: Brock • Jetblue Value • Mama Carry A Bag! • Standard security program • Aircraft security search checklist • Aircraft uses three flight attendants • Tool used to checking the flight load plan • Manual for everyone working ground operations • Must point to this during your checkin process • Tool used for checking flight & crew information • ...
Montgomery Madness 2020-06-11
Across
- Montgomery's Business subject matter Expert
- Montgomery's security co-champion
- Montgomery's actual AVP
- the front desk
- our fearless leader
- Montgomery's FSR III
- Chile's newest citizen
- the signal we need to enter the branch
- Montgomery's Security Captain
- Montgomery's AVP
- Montgomery's insurance services champion
- HVCU's homepage
Down
- offers personal members the convenience of obtaining vehicle financing directly at participating dealerships
- A tool that helps personal & business members switch their financial relationship from another institution to HVCU
- the last month we helped members on the teller line
- HVCU's New Net Promoter Website
- Nicole's favorite drink
- an individual authorized by the state or federal government to administer oaths/affirmations and to attest the authenticity of signatures
18 Clues: the front desk • HVCU's homepage • Montgomery's AVP • our fearless leader • Montgomery's FSR III • Chile's newest citizen • Montgomery's actual AVP • Nicole's favorite drink • Montgomery's Security Captain • HVCU's New Net Promoter Website • Montgomery's security co-champion • the signal we need to enter the branch • Montgomery's insurance services champion • ...
Cryptober 2022 - Week 4 - Crossword 2022-10-21
Across
- Name the process for ensuring that data retained (in any format) is secure to help avoid a potential breach (e.g., unauthorized access or disclosure).
- What is the retention period for email correspondence?
- Injection, Broken Authentication and Sensitive Data Exposure are examples of bugs that Chainalysis wants to know about under which public policy?
- What's the name of the process of preserving all forms of information relevant to legal proceedings?
Down
- What is the first name of Chainalysis’ VP of security?
- Which tool helped security to identify many unapproved applications located within Google, Slack and Zoom?
- Name one of the industry standards that our security program is structured around?
- What is the retention period for Product Development Data such as User Stories, Test Sets and Cases?
- Which team should you notify In instances where unauthorized access or disclosure of data occurs?
- What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?
10 Clues: What is the first name of Chainalysis’ VP of security? • What is the retention period for email correspondence? • Name one of the industry standards that our security program is structured around? • What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy? • ...
Bernardo C. Los Viajes assignment 2024-03-05
18 Clues: valid • ruins • hostel • lodging • compass • to sail • expired • itinerary • to return • insurance • tour guide • ecotourism • traffic jam • high season • room service • customs agent • security measures • to pack your bags
none 2013-09-10
Across
- An employee/contractor or individual inside our company who is selling secrets or sensitive information to competitors, foreign governments or terrorist organizations is called an __________ threat.
- The RMS-Tucson Facility Security Officer (FSO) is _______ _______.
- Top Secret, Secret and __________ are the three levels of U.S. government classified information.
- A __________ contact is an individual who is seeking information, who does not hold a proper security clearance level or need-to-know.
- How do you protect Raytheon Proprietary, Most Private and Competition Sensitive Information? Lock it in a drawer/cabinet when not working with it. Discard by shredding or placing in a __________ burn barrel. Never place in trash or recycle bin.
Down
- Never send classified data to an unclassified information system or computer; this is called a _______ _______.
- Security is everyone’s __________.
- Always remove your Raytheon ID __________ when leaving an RMS facility.
- Information that suggests an individual’s ability to safeguard classified information may be impaired or not in the best interest of national security is called __________ Information.
- If you find an unsecured item of classified material, call __________ immediately at 520.794.8313.
10 Clues: Security is everyone’s __________. • The RMS-Tucson Facility Security Officer (FSO) is _______ _______. • Always remove your Raytheon ID __________ when leaving an RMS facility. • Top Secret, Secret and __________ are the three levels of U.S. government classified information. • ...
Something to do 2024-08-09
Across
- Gohan’s Dad
- This character died & was reincarnated as a chimera Ant
- The name of Yusuke's spirit beast
- A private security company consisting of the former Third Group of Chryse Guard Security.
- Naurto’s favorite food
- Your favorite anime genre (per me)
Down
- Super competitive pedophile
- Everyone’s favorite anime deadbeat father
- When the world needed him most he disappeared
- Inosuke breathing/sword style
- tanjuro sister
- 1st anime we bonded over
12 Clues: Gohan’s Dad • tanjuro sister • Naurto’s favorite food • 1st anime we bonded over • Super competitive pedophile • Inosuke breathing/sword style • The name of Yusuke's spirit beast • Your favorite anime genre (per me) • Everyone’s favorite anime deadbeat father • When the world needed him most he disappeared • This character died & was reincarnated as a chimera Ant • ...
United Nations 2025-05-25
Across
- Arms of the United Nations
- The General assembly meets.
- Joined on the 18th of September 1793.
- General Chief administration officer.
- Comprises 193 of these.
- Amount of Sustainable Development Goals
- The number of permanent members on security council.
Down
- Council Principal crisis management body.
- Sustainable in nature to be met by 2030.
- Nonmembers are called.
- change One problem facing the world.
- In the business of maintaining world.....
12 Clues: Nonmembers are called. • Comprises 193 of these. • Arms of the United Nations • The General assembly meets. • change One problem facing the world. • Joined on the 18th of September 1793. • General Chief administration officer. • Amount of Sustainable Development Goals • Sustainable in nature to be met by 2030. • Council Principal crisis management body. • ...
Cyber Safety 2016-02-10
Across
- feed a newer way to receive news
- Mostly known as voice telephone
- chat you talk with people online
- Networking a site that keeps families up to date with things they are interested in
Down
- Helps you look up info
- Helps sends Messages
- video files that can be downloaded
- Page on a website that talks about something
8 Clues: Helps sends Messages • Helps you look up info • Mostly known as voice telephone • feed a newer way to receive news • chat you talk with people online • video files that can be downloaded • Page on a website that talks about something • Networking a site that keeps families up to date with things they are interested in
Cyber Safety 2020-04-16
8 Clues: Not on the internet • Photo taken of yourself • connected to the internet. • Gain access to unauthorized data • Transfer an image onto your computer. • Sound made when you get a notification. • Technology used to deliberately hurt someone • Hardware used for a particular purpose. Phone, computer etc.
Cyber Crossword 2020-04-27
Across
- The headquarter of this dedicated EY division is in Amsterdam. Jatin Sehgal leads it. 27K.
- It’s as difficult as extracting coal from Earth. It’s valuable but cannot be seen physically. Highly volatile. Satoshi Nakamoto
- I target the organizations’ executives by luring them into responding
- I have an article dedicated to me. I became popular after 25th May, 2018. My outcome is to help organization identify where the data is stored, who is storing it and how it is stored
Down
- Israel-US. Siemens Step7. 500Kilobyte. USB.
- Doctors use it. Hackers use it. It’s on the top of the list of 2020!
- Marcus Hutchins from Britain tried to slow me down. I caused 92 million pound loss to NHS in UK
- One of the co-inventor was “Shamir”. I help organizations in securing their data while at-rest and in-transit. “Dell” is my parent.
8 Clues: Israel-US. Siemens Step7. 500Kilobyte. USB. • Doctors use it. Hackers use it. It’s on the top of the list of 2020! • I target the organizations’ executives by luring them into responding • The headquarter of this dedicated EY division is in Amsterdam. Jatin Sehgal leads it. 27K. • ...
Cyber Law 2021-09-05
Across
- ______Regulation works by utilising feedback
- Shawn Fanning created the______
- cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- cyber________
Down
- according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
- some experts regard digital______ as the third industrial revolution
- the conversion of analogue data into digital form
- wrote Code and Other Laws of Cyberspace
8 Clues: cyber________ • Shawn Fanning created the______ • wrote Code and Other Laws of Cyberspace • ______Regulation works by utilising feedback • the conversion of analogue data into digital form • some experts regard digital______ as the third industrial revolution • ...
Cyber Law 2021-09-05
Across
- ______Regulation works by utilising feedback
- Shawn Fanning created the______
- cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- cyber________
Down
- according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
- some experts regard digital______ as the third industrial revolution
- the conversion of analogue data into digital form
- wrote Code and Other Laws of Cyberspace
8 Clues: cyber________ • Shawn Fanning created the______ • wrote Code and Other Laws of Cyberspace • ______Regulation works by utilising feedback • the conversion of analogue data into digital form • some experts regard digital______ as the third industrial revolution • ...
Cyber Crime 2022-10-14
Across
- crime that involves a computer and a network
- a kind of cybercrime that heavily damages an individual psychologically
- one study found that 1/3 of college students illegally downloaded _____
- these institutions are at high risk for cybercrime
Down
- a characteristic of cyber criminals
- wrongful or criminal deception intended to result in financial or personal gain.
- These kind of costs occur within the company and include the costs of detection, investigation, and recovering data
- theft or misappropriation of funds placed in one's trust or belonging to one's employer.
8 Clues: a characteristic of cyber criminals • crime that involves a computer and a network • these institutions are at high risk for cybercrime • a kind of cybercrime that heavily damages an individual psychologically • one study found that 1/3 of college students illegally downloaded _____ • ...
Cyber Aware 2022-11-17
Across
- an email that attempts to gain sensitive data or credentials
- software that compromises the operation of a system by performing an unauthorized function or process
- hacker with criminal intent
- activity or process where information systems are protected from unauthorized use
Down
- a person who uses computers to gain unauthorized access to data
- a dishonest scheme
- disclosure of sensitive information outside organization
- an observable occurrence in an information system or network
8 Clues: a dishonest scheme • hacker with criminal intent • disclosure of sensitive information outside organization • an email that attempts to gain sensitive data or credentials • an observable occurrence in an information system or network • a person who uses computers to gain unauthorized access to data • ...
