cyber security Crossword Puzzles
model UN 2024-05-20
Across
- With what should an operative clause end? (punctuation)
- This committie of the UN has a variation of the greek parthanon on its flag
- The first UN peasekeeping mission was in responce to this nation's war for indipendence
- What does a preambulatory clause in a resolution state?
- As of 2005, this continent was 'host' to the majority of ongoing UN peacekeeping missions
- Nation in africa that was a member of the first security council
- after what war was the UN established
Down
- members of the secuirty counsil not including the 5 perminate members
- The UN consists of this many original principal organs which was established under the UN charter in 1945
- Last name of the president who ispired the creation of the UN
- Which institution carries out the day-to-day running of the UN?
- Number of perminate members of the security council
- Normally, the elected members of the Security Council serve two-year terms, this country is the exception to the rule
- Headquarters of the UN
14 Clues: Headquarters of the UN • after what war was the UN established • Number of perminate members of the security council • With what should an operative clause end? (punctuation) • What does a preambulatory clause in a resolution state? • Last name of the president who ispired the creation of the UN • Which institution carries out the day-to-day running of the UN? • ...
Spanish 2022-11-29
19 Clues: gate • plane • board • flight • travel • luggage • arrival • airport • suitcase • itinerary • departure • bathing suit • travel agency • boarding pass • to take a taxi • identification • to get in line • to go on vacation • to go through security
Sampo 2024-10-16
14 Clues: Rasismi • köyhyys • koulutus • hallitus • koulutus • oikeukia • Demokratia • Työtttömyys • rikollisuus • presidentti • Epätasa-arvo • poliitikkoja • sosiaaliturva • Terveydenhoito
Security Awareness Challenge 2014-05-08
Across
- Who is the President of Global Security?
- What is the guidebook for Industrial Security?
- What does DSS stand for?
- What does SAP stand for?
- Who is the FSO for Burlington?
- What does a blue stripe on a badge signify?
- What is the data base for DoD clearances called?
- Who is the KMP for Burlington?
Down
- What is ITATS used for?
- What does PCL stand for?
- What is the contract between Raytheon and the Government called?
- What does VRS stand for?
- What is the investigation for a clearance called?
13 Clues: What is ITATS used for? • What does PCL stand for? • What does VRS stand for? • What does DSS stand for? • What does SAP stand for? • Who is the FSO for Burlington? • Who is the KMP for Burlington? • Who is the President of Global Security? • What does a blue stripe on a badge signify? • What is the guidebook for Industrial Security? • ...
Security Awareness Quiz 2015-05-31
Across
- Approval from --------is needed to take photographs inside TCS premises(3)
- Password Should be minimum of -------Characters(5)
- Mails that should not be propagated(5)
- Manipulate people to give up confidential information(17)
- Isecurity quiz must be completed successfully atleast ------a year(4)
- Deleting important data/files with malicious intent is security---(6)
- Misuse of confidential data should be reported to ----(3)
Down
- Acceptance of ----- makes you liable for all activities done from the system using your ID(11)
- All sensitive information should be ----before disposing them(8)
- Client confidential information should be stored in ----(7)
- Security breach will lead to ------action(12)
- Use of unlicensed software is a breach of copyright and is ---------(7)
- Internet browsing is logged and monitored by -----(6)
13 Clues: Mails that should not be propagated(5) • Security breach will lead to ------action(12) • Password Should be minimum of -------Characters(5) • Internet browsing is logged and monitored by -----(6) • Manipulate people to give up confidential information(17) • Misuse of confidential data should be reported to ----(3) • ...
Information Security Policy 2017-06-14
Across
- The component of an effective EISP that answers the question, "What is this policy for?"
- ISSP stands for _ -Specific Security Policies.
- In the Bull's Eye Model, this is the center-most layer.
- NIST stands for the National Institute of Standards and _ .
- A _ is a detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
- In the Bull's Eye Model, this is one of the middle layers.
Down
- In the pyramid relationship for policies, practices, procedures, and guidelines; the two Industry, government, and regulatory exemplars standards and _ .
- Policy must be able to stand up in _ if challenged.
- In the pyramid relationship for policies, practices, procedures, and guidelines; these are the Practices sanctioned by management.
- EISP stands for Enterprise Information Security _ .
- Policy must be properly supported and _ .
- In the Bull's Eye Model, this is one of the middle layers.
- In the pyramid relationship for policies, practices, procedures, and guidelines; these influence an organizations documents?
- Policy should never conflict with this.
14 Clues: Policy should never conflict with this. • Policy must be properly supported and _ . • ISSP stands for _ -Specific Security Policies. • Policy must be able to stand up in _ if challenged. • EISP stands for Enterprise Information Security _ . • In the Bull's Eye Model, this is the center-most layer. • In the Bull's Eye Model, this is one of the middle layers. • ...
STAAR Test Security 2021-06-29
Across
- A campus test administrator forgot to add speech to text on a student's online test,what type of procedural error is this?
- Account for every _____ document. Make sure the number of answer documents matches the number of students scheduled to test.
- Make a “_____ hour” check of all test sessions to ensure that all students are in the correct location, have been issued the correct assessments, and that oral administrations are being administered appropriately.
- On the _____ chart the location of the test session must be recorded and the room designation. Provide a brief description of the testing area (e.g., classroom, library, cafeteria.
- This status may be lowered by the state if violation of test security or confidential integrity if found.
- Raters for the Texas English Language Proficiency Assessment System (TELPAS) did not follow proper training or calibration procedures is an _______ irregularity.
- The person the CTC reports testing irregularities to.
Down
- A student was issued ______ test materials (e.g., test booklet, answer document, or test ticket) belonging to another student.
- Be familiar with the ___ resources and read the test administrator manuals.
- A test administrator reinforced testing strategies is what type of procedural error?
- A specific test was administered on the incorrect day, what type of procedural incident is this?
- Once test sessions have been completed,immediately collect and _____ any scratch paper, graph paper, or reference materials that students wrote on during the test, as well as any recordings.
- If this is found, the CTC must "other" the test and fill out the Locally Determined Disciplinary Action (LDDA) form.
13 Clues: The person the CTC reports testing irregularities to. • Be familiar with the ___ resources and read the test administrator manuals. • A test administrator reinforced testing strategies is what type of procedural error? • A specific test was administered on the incorrect day, what type of procedural incident is this? • ...
FNaF Security Breach 2022-05-31
13 Clues: Furry • Aligator • Night Guard • Protagonist • A White Bird • Such a nice fello • MOLTEN FREDDY?!?! • The "Best" of the 4 • DARNIT HE CAME BACK! • Wind-up vent annoyance • Caused Freddy's Mental Crisis • The Tidy & Light-Sensitive One • The Orange Bear with a thunderbolt
Colorado voter security 2024-11-04
Across
- – Judges undergo up to 12 hours of this before election day
- – All votes are cast using these types of ballots
- – Required on ballot boxes during transport
- – Identifying feature election judges wear
- – Equipment used to upload results to the Election Night Reporting website
- – Election judges must pass this check
Down
- – Judges who verify signatures work in these types of teams
- – Audit completed after the election to verify results
- – Party leaders appoint two people to this board for accuracy testing
- – Used to track ballots from printing to delivery
- – Required for voting in person
- – Type of test to ensure voting accuracy before and after the election
- – The place where ballots are stored and monitored
13 Clues: – Required for voting in person • – Election judges must pass this check • – Identifying feature election judges wear • – Required on ballot boxes during transport • – All votes are cast using these types of ballots • – Used to track ballots from printing to delivery • – The place where ballots are stored and monitored • ...
Browsing Safely 2025-06-19
Across
- that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
- or junk messages, usually advertisements, sent over the internet, often in large amounts.
- method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
- process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
- use of electronic communication to bully or harass someone, typically by sending threatening
- software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
- list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
Down
- security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
- Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
- who commit crimes using the internet or computers.
- type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.
- activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
- list of approved or trusted websites, programs, or users that are allowed to access a system or network.
- files stored on your computer by websites to remember information about you, like login details or site preferences.
- Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.
15 Clues: who commit crimes using the internet or computers. • or junk messages, usually advertisements, sent over the internet, often in large amounts. • use of electronic communication to bully or harass someone, typically by sending threatening • list of approved or trusted websites, programs, or users that are allowed to access a system or network. • ...
Social Media Safety 2023-10-26
Across
- Treating others with _ _ _ _ _ _ _online can prevent cyberbullying
- the opposite of public
- the person doing the bullying
- taking action to alert media platforms about cyberbullying
- be _ _ _ _ to everyone online
Down
- victims of cyber bullying feel like there is no _ _ _ _ _ _
- the person suffering the online harrasment
- it is important to think before you _ _ _ _ _ _ _
- Protecting your personal information is essential to stay _ _ _ _online.
- Persistent, unwelcome online behaviour aimed at causing harm to another person.
- how to prevent a specific user from communicating with you
11 Clues: the opposite of public • the person doing the bullying • be _ _ _ _ to everyone online • the person suffering the online harrasment • it is important to think before you _ _ _ _ _ _ _ • how to prevent a specific user from communicating with you • taking action to alert media platforms about cyberbullying • victims of cyber bullying feel like there is no _ _ _ _ _ _ • ...
Communication in the future 2024-11-24
Across
- difference When people from different places do things differently.
- language Using hands and face to show ideas.
- barrier When people cannot understand each other’s language.
- To talk or work with someone.
- breakdown When people cannot understand each other.
- phone A phone with a wire at home or work.
- Pictures, sounds, and videos together.
Down
- Talking with someone in person.
- To talk or share ideas with someone.
- room A place online where people talk.
- channel A way to send or get messages.
- world The internet and things we do online.
12 Clues: To talk or work with someone. • Talking with someone in person. • To talk or share ideas with someone. • Pictures, sounds, and videos together. • channel A way to send or get messages. • breakdown When people cannot understand each other. • phone A phone with a wire at home or work. • room A place online where people talk. • ...
Digitalni Tragovi i Elektronično Nasilje 2022-06-13
Across
- Svako se treba držati svog _____ ugleda.
- Informacija koju postavljam o sebi na mrežnim stranicama zove se digitalni ____
- Jeste li ikad upisali nečije ime i prezime u _____ tražilicu?
- kako nazivamo pravila lijepog ponašanja na internetu?
Down
- Opći pojam za svaku komunikacijsku aktivnost cyber tehnologijom koja se može smatrati štetnom.
- Drugi naziv za internetski bonton
- svaki korisnik na internetu ima svoj digitalni ____
- Koga treba obavijestiti zbog uhođenja?
- Svjetska komunikacijska mreža.
- Internetom kruže razlčite vrste _____
10 Clues: Svjetska komunikacijska mreža. • Drugi naziv za internetski bonton • Internetom kruže razlčite vrste _____ • Koga treba obavijestiti zbog uhođenja? • Svako se treba držati svog _____ ugleda. • svaki korisnik na internetu ima svoj digitalni ____ • kako nazivamo pravila lijepog ponašanja na internetu? • Jeste li ikad upisali nečije ime i prezime u _____ tražilicu? • ...
Online bullying 2024-06-13
Across
- When someone is being bullied online
- A meaning of photos
- When someone does something mean intentionally
- Where you can seek help online by parent or anyone else
- A very famous app & website
- When someone is not letting you get something by putting it close to you then away from you before you catch it
Down
- Another meaning of online
- The original meaning of online
- Someone to talk to
- When you write online
10 Clues: Someone to talk to • A meaning of photos • When you write online • Another meaning of online • A very famous app & website • The original meaning of online • When someone is being bullied online • When someone does something mean intentionally • Where you can seek help online by parent or anyone else • ...
June Crossword: How to Secure the Manufacturing Edge 2025-05-27
Across
- Feature of edge solutions that helps in maintaining data privacy
- Method to protect data both in transit and at rest
- Company providing edge computing solutions for manufacturing cybersecurity
- Type of computing that processes data locally to reduce network transmission
Down
- Advanced capability to identify and respond to security incidents
- Critical aspect of manufacturing cybersecurity involving GDPR and ISO standards
- Process to ensure the integrity of the system and prevent unauthorized access
- Unified security practices help in minimizing this
- Frequent actions to patch vulnerabilities and protect against new threats
- Regular checks to identify and address security vulnerabilities
10 Clues: Unified security practices help in minimizing this • Method to protect data both in transit and at rest • Regular checks to identify and address security vulnerabilities • Feature of edge solutions that helps in maintaining data privacy • Frequent actions to patch vulnerabilities and protect against new threats • ...
The IPO Process 2022-01-25
Across
- Lists the number of shares of stock a company can sell
- Shares held by investors are called ________ shares
- Market in which a security is sold for the first time
- The type of corporations that tend to use private placement
- A document showing the legal and financial situation of a company to the public
- In a private ________, a company knows who exactly will buy its securities
- One of the things an investor must consider before investing in a company during an IPO
- Stocks that have previously been sold in the marketplace are called _________ shares
Down
- Offering of shares that occurs after the company's initial public offering
- Name for stock a company has bought back
- The issue price of a share during an IPO is known as the __________ price
- This type of investor may purchase a security from a company using private placement
- Where stock must be registered prior to being sold
- A red ______ is used to show financial information to the public while a security is awaiting SEC approval
- Shares of stock that a company can sell are called ________ shares
15 Clues: Name for stock a company has bought back • Where stock must be registered prior to being sold • Shares held by investors are called ________ shares • Market in which a security is sold for the first time • Lists the number of shares of stock a company can sell • The type of corporations that tend to use private placement • ...
""United in Defense, Unbreakable in Bytes" 2025-10-05
Across
- – Common MUN procedure before a MOD.
- – The EU aims to regulate this to counter fake news.
- – Russia’s favorite non-traditional weapon.
- – EU member that proposed the “Drone Wall” initiative.
- – System that guards against digital intrusions.
- – Small states rely on this to resist hybrid attacks.
Down
- – Term for combined military, cyber, and info warfare.
- – 2030 event that shocked the Union.
- – France’s key concern in the Drone Wall debate.
- – Belgium warned the EU could collapse if this breaks.
- – Debate format focused on specific subtopics.
- – Nordic supporter of the Drone Wall plan.
12 Clues: – 2030 event that shocked the Union. • – Common MUN procedure before a MOD. • – Nordic supporter of the Drone Wall plan. • – Russia’s favorite non-traditional weapon. • – Debate format focused on specific subtopics. • – France’s key concern in the Drone Wall debate. • – System that guards against digital intrusions. • ...
DCT D&D 2026 2025-12-18
Across
- Unplanned interruption of IT services
- Device used to connect multiple networked computers
- First digital tool most staff check in the morning
- Document sent to clients detailing cost and scope
- Secure method used to access company systems remotely VPN
Down
- Protection against malware, ransomware, and cyber threats
- The process of identifying and resolving technical issues
- A system update meant to fix bugs or vulnerabilities
- A formal agreement signed by client and company
- Financial document required for reimbursement claims
- Slow system response that frustrates users
- Central location where company data is stored
12 Clues: Unplanned interruption of IT services • Slow system response that frustrates users • Central location where company data is stored • A formal agreement signed by client and company • Document sent to clients detailing cost and scope • First digital tool most staff check in the morning • Device used to connect multiple networked computers • ...
Information Security 2025-01-06
7 Clues: Malicious Software • Acceptable Use Policy • Malware that attaches to programs • Protection of ownership and reputation • Designed to lessen the risk of cyber attack • Protect with strong passwords and password storage • Protect with up to date software, encrypted information, limited employee access
World Powers 2017-06-17
Across
- type of devastating weapon used during WW2
- solving of problems through talking
- a country that exerts influence over the rest of the world
- a word describing improvements in how things are done
- a term referring to army, navy and air force
Down
- refers to culture and tradition
- includes the study of life expectancy, age, gender
- making money through trade describes this type of power
- relating to governments
- type of attack using the internet
10 Clues: relating to governments • refers to culture and tradition • type of attack using the internet • solving of problems through talking • type of devastating weapon used during WW2 • a term referring to army, navy and air force • includes the study of life expectancy, age, gender • a word describing improvements in how things are done • ...
digital citizenship 2016-03-29
Across
- technology with a big screen
- social media site with a bird as its logo
- a creator of things
- a social media site that you can post photos
- a person who bullies someone in cyber space
- world wrestling entertainment
Down
- social media site where people can watch or upload videos
- social media site that people use to post photos
- a watcher or someone who uses things
- a social media site owned by mark zuckerberg
10 Clues: a creator of things • technology with a big screen • world wrestling entertainment • a watcher or someone who uses things • social media site with a bird as its logo • a person who bullies someone in cyber space • a social media site owned by mark zuckerberg • a social media site that you can post photos • social media site that people use to post photos • ...
Siti Mardhiyah 2025-07-24
Across
- seorang pencetus istilah big data
- kemampuan menggunakan berbagai macam alat digital dengan baik
- kemampuan yang dapat dengan cepat dan elastis ditetapkan
- tempat untuk menyimpan aplikasi beserta database
- sistem kecerdasan buatan yang telah dilatih untuk berinteraksi dalam percakapan berbasis teks
- kecerdasan buatan disebut juga
Down
- hard driver komputer lokal
- cyber physical sistem
- pemahaman tentang keamanan digital, privasi, dan etika dalam penggunaN teknologi digital
- konsep berpikir yang melibatkan kerangka dan proses berpikir komputasional
10 Clues: cyber physical sistem • hard driver komputer lokal • kecerdasan buatan disebut juga • seorang pencetus istilah big data • tempat untuk menyimpan aplikasi beserta database • kemampuan yang dapat dengan cepat dan elastis ditetapkan • kemampuan menggunakan berbagai macam alat digital dengan baik • konsep berpikir yang melibatkan kerangka dan proses berpikir komputasional • ...
Bullying 2025-09-30
Across
- Bullying melalui media internet disebut bullying
- Orang yang melakukan bullying disebut
- Bullying dengan cara mengucilkan disebut bullying
- Bullying dengan cara memukul disebut bullying
- Bullying dengan cara mengejek disebut bullying
- Orang yang menjadi sasaran bullying disebut
Down
- Sikap yang harus dimiliki untuk mencegah bullying adalah
- Salah satu tempat yang paling sering terjadi bullying di sekolah adalah
- Lawan kata “teman” yang sering muncul dalam bullying adalah
- Perasaan takut, cemas, atau tertekan akibat bullying disebut
10 Clues: Orang yang melakukan bullying disebut • Orang yang menjadi sasaran bullying disebut • Bullying dengan cara memukul disebut bullying • Bullying dengan cara mengejek disebut bullying • Bullying melalui media internet disebut bullying • Bullying dengan cara mengucilkan disebut bullying • Sikap yang harus dimiliki untuk mencegah bullying adalah • ...
MeMe & Me 2025-11-13
Across
- smooth and glossy.
- confess to be true or to be the case.
- offering the promise of an attractive or enjoyable experience.
- relating to or characteristic of the culture of computers, the internet, and virtual reality.
- loud, harsh piercing cries or noises.
Down
- crackling or hissing from telecommunication systems.
- grouping of keyboard characters
- at once, instantly, as soon as
- past and past participle of earn.
- an announcement or signal warning of danger.
10 Clues: smooth and glossy. • at once, instantly, as soon as • grouping of keyboard characters • past and past participle of earn. • confess to be true or to be the case. • loud, harsh piercing cries or noises. • an announcement or signal warning of danger. • crackling or hissing from telecommunication systems. • offering the promise of an attractive or enjoyable experience. • ...
Navy Federal 2024-02-26
Across
- Used to quickly identify and respond to suspicious transactions
- System that assigns risk levels to transactions and customers based on various factors
- Understanding normal customer behavior in order to distinguish from fraudulent activity and common customer pattern
- Practice ______ to ensure legal adherence and best practices for security
- Used to track location of transactions and flag unusual/unexpected location changes
- An extra layer of security used alongside credentials
- Performed to identify vulnerabilities in bank's systems and processes
- Making sure data and transaction from customer are kept secure and encrypted from unauthorized access
- Machine learning models that can help identify patterns and anomalies indicative of fraudulent activity.
Down
- Steps to take in the event of a security incident
- This collective approach can help in early detection and prevention.
- Informing customers of ways to recognize phishing and other fraudulent activity
- Needs to stay updated in order to stay ahead of evolving fraud tactics
- Training bank staff to recognize and report potential fraudulent activity
- Update and review to incorporate latest technologies and best practices
15 Clues: Steps to take in the event of a security incident • An extra layer of security used alongside credentials • Used to quickly identify and respond to suspicious transactions • This collective approach can help in early detection and prevention. • Performed to identify vulnerabilities in bank's systems and processes • ...
Types of Markets 2022-01-25
Across
- ____ exchanges are markets that do not have a location.
- Within bond markets in the US, bonds have a ___ value of $1000.
- Corporations issue debt securities to be traded within ____ markets.
- Future markets help protect against ___ of uncertain markets.
- Raising capital within public and private markets is a goal within the ___ market.
- A security is sold in a ___ market when it is first issued.
- ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
- Who must register bonds within the bond market?
- The purpose of trading within security markets is to buy orders at a ____ price.
Down
- Primary and secondary ___ are sold in a primary market.
- The most populated exchange in the U.S who owns trading rights with listed companies is known as the ____
- Zero-coupon bonds do not earn ____ within the bond market.
- ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
- The ___(issuing stocks for the first time) typically occurs in a primary market.
- In a secondary market shares of stock are ___ to the public
15 Clues: Who must register bonds within the bond market? • ____ exchanges are markets that do not have a location. • Primary and secondary ___ are sold in a primary market. • Zero-coupon bonds do not earn ____ within the bond market. • A security is sold in a ___ market when it is first issued. • Future markets help protect against ___ of uncertain markets. • ...
IT-Security 2016-01-29
Across
- und Junk E-Mail unerwünschte Werbemails
- versteckt in einem scheinbar nützlichen Programm
- Programme, die Tastatureingaben mitprotokollieren
- Mobbing mithilfe von elektronischen Medien
- Überbegriff für unerwünschte, schädliche Stoffe
Down
- Personen die illegalen Computersysteme eindringen und Sicherheitssysteme überwinden
- Betrugsmethode, bei der User auf gefälschte Webseiten umgeleitet wird
- Viren, die als Programm in ein Dokument eingebettet sind
8 Clues: und Junk E-Mail unerwünschte Werbemails • Mobbing mithilfe von elektronischen Medien • Überbegriff für unerwünschte, schädliche Stoffe • versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Viren, die als Programm in ein Dokument eingebettet sind • Betrugsmethode, bei der User auf gefälschte Webseiten umgeleitet wird • ...
Cyberbullying 2024-10-08
Across
- Where does cyberbullying take place?
- Occurs when a cyberbully continues to bully.
- Someone that harms someone through a device.
Down
- An electronic device that people have at home.
- Something that can provided to a cyber victim.
- Cyberbullying is generally undertaken ______
- Who can be a cyberbully?
- What should you do if you see cyberbullying?
8 Clues: Who can be a cyberbully? • Where does cyberbullying take place? • Cyberbullying is generally undertaken ______ • Occurs when a cyberbully continues to bully. • What should you do if you see cyberbullying? • Someone that harms someone through a device. • An electronic device that people have at home. • Something that can provided to a cyber victim.
En el aeropuerto 2022-05-24
19 Clues: gate • flight • airport • customs • arrival • to board • passport • airplane • passenger • departure • plane ticket • waiting room • baggage claim • boarding pass • security check • public bathrooms • to check luggage • to pack a suitcase • to exchange currency
NPO Crossword-2 2023-08-13
Across
- Fellow members are sometimes referred to as this
- Pacifica ____!
- After our enemies claimed we ate these we adopted it as a joke tradition
- Foxos are made into this
- First CN Emperor
- Color team the NPO has resided on for its existence in Cyber Nations
- Wrote the Proper Francoist Thought, also known as Unlimited
- Tebeat’s favourite place
- Peace, Strength, _______
Down
- Our first initiative to reorganize ourselves into a broader gaming group was named ____ Gaming
- Our public IRC channel, #nsa, was an acronym for
- People who own a real life NPO flag
- Defunct philosophy of the NPO
13 Clues: Pacifica ____! • First CN Emperor • Foxos are made into this • Tebeat’s favourite place • Peace, Strength, _______ • Defunct philosophy of the NPO • People who own a real life NPO flag • Our public IRC channel, #nsa, was an acronym for • Fellow members are sometimes referred to as this • Wrote the Proper Francoist Thought, also known as Unlimited • ...
Experis Consultant Connection Crossword February 2025 2025-02-17
Across
- March 14th
- A symbolic offering exchanged on a certain day in February.
- When February gets an extra day
- A professional matchmaker for jobs
- Furry forecaster of spring’s arrival
Down
- Wireless protocol enabling device connectivity over radio waves.
- Software designed to mess up your day
- A hug you wear… until it gets too itchy.
- That thing you reset every time because you forgot it again.
- A cyber attack disguised as a legitimate request for credentials.
- February’s birthstone
- The process of directing a candidate to a specific person or organization based on qualifications or needs.
- Born between 1996-2012
13 Clues: March 14th • February’s birthstone • Born between 1996-2012 • When February gets an extra day • A professional matchmaker for jobs • Furry forecaster of spring’s arrival • Software designed to mess up your day • A hug you wear… until it gets too itchy. • A symbolic offering exchanged on a certain day in February. • That thing you reset every time because you forgot it again. • ...
Qatar Cross Word 2021-11-24
6 Clues: Full Form of QNA • Slogan Raised In Qatar • Thing related to Cyber bullying • Historic Visit To Break Blockade • Thing that happened with Saudi Arabia • capital of independent Palestinian state
Word formation 2024-02-24
6 Clues: used to eat • related to cyber attacks • used when you are laughing • which is conducted in colleges • with out this your phone wont open • Our childhood incomplete with this
Cyber Challenge Week 2 2023-09-21
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates.
- Method of converting plain text into a code that can only be read by authorised parties.
- Malicious software that can cause damage to systems or data
- _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
- A form of malware in which files are locked until a payment is made to the attacker
- Malicious emails that request sensitive information or opening of attachments
- a string of random words that are a more secure version of passwords.
Down
- A type of software designed to protect against malware and other threats
- Always _ _ _ _ your computer when you leave your desk.
- A method of logon that requires you to present two or more pieces of evidence to prove your identity.
- An update to software that fixes a vulnerability or bug.
- Online harassment.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
- A passwordless option for logging into devices
- A form of phishing that targets high profile individuals
- _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
- Errors or vulnerabilities in software
17 Clues: Online harassment. • Errors or vulnerabilities in software • A passwordless option for logging into devices • Always _ _ _ _ your computer when you leave your desk. • An update to software that fixes a vulnerability or bug. • A form of phishing that targets high profile individuals • Malicious software that can cause damage to systems or data • ...
Secured Credit Card 2022-03-22
Across
- Annual Fee
- Under this age you have to submit a paper application
- this card cannot be used as this type of protection for a checking account
- Minimum security deposit
Down
- $2500 is the _________ security deposit
- balance transfer fee
- Increments a security deposit can be made in after the minimum deposit
- amount of annual fee broke down into a monthly charge
8 Clues: Annual Fee • balance transfer fee • Minimum security deposit • $2500 is the _________ security deposit • Under this age you have to submit a paper application • amount of annual fee broke down into a monthly charge • Increments a security deposit can be made in after the minimum deposit • this card cannot be used as this type of protection for a checking account
Senior 2024 2024-03-22
Across
- Plans to be a nurse practitioner.
- Might get a degree in early childhood at later date.
- Interested in Cyber Safety.
- Attending Wichita State University.
- Already completed senior coursework. Working.
- Plans to be a firefighter.
- Wants to attend OSU Institute of Technology
- currently working. Graduating a year early.
- Plans to be a Physical Therapist.
- Getting a full time job.
- Thinking about being an Esthetician.
- Plans to be a Radiologist Technician
Down
- plans to be a Phlebotomist.
- Thinking about Safety degree.
- Attending NOC Tonkawa.
- Joining National Guard.
- Attending Vo-Tech for welding.
- Plans to go into education.
- Wants to get a job in IT.
- pursing a degree as a speech pathologist.
- Pursuing a welding career.
- Currently working. Hasn't attended campsus Sr.yr.
- Wants to be a Forensic Scientist
23 Clues: Attending NOC Tonkawa. • Joining National Guard. • Getting a full time job. • Wants to get a job in IT. • Plans to be a firefighter. • Pursuing a welding career. • plans to be a Phlebotomist. • Interested in Cyber Safety. • Plans to go into education. • Thinking about Safety degree. • Attending Vo-Tech for welding. • Wants to be a Forensic Scientist • ...
Vocab Crossword 2022-05-04
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
Cyber Security 2024-10-21
2 Clues: the identity of a user attempting to access a system Authnetication • process of converting plain text or data into ciphertext using cryptographic Encryption algorithms
CYBER SECURITY 2022-10-21
Executive Branch 2022-12-07
16 Clues: System • System • Policy • College • Agencies • Security • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers • - Executive Order • decision - pardon • to elect - Electors
Information Misuse 2024-03-18
Skibinska 3a 2023-03-22
Across
- zbiór zasad dotyczących dobrego i bezpiecznego zachowania w internecie
- zamieszczanie kontrowersyjnych, napastliwych treści w celu zwrócenia na siebie uwagi
- lęk przed wypadnięciem z obiegu
- technika obróbki obrazu polegająca na łączeniu ludzkich twarzy
- mylne informacje rozpowszechniane bez złej intencji
- wysyłanie wielu niechcianych wiadomości do dużej ilości osób w celu reklamy
- forma komunikacji elektronicznej w której przekazem jest seksualnie sugestywny obraz
- dynamiczne regularnie aktualizowanie strony internetowe na dany temat
Down
- nieprawdziwa informacja, fake news
- zabezpieczenie programu
- przemoc z użyciem urządzeń elektronicznych
- rodzaj cyber ataku
- rodzaj rozmowy między dwoma lub wieloma użytkowników za pośrednictwem internetu
13 Clues: rodzaj cyber ataku • zabezpieczenie programu • lęk przed wypadnięciem z obiegu • nieprawdziwa informacja, fake news • przemoc z użyciem urządzeń elektronicznych • mylne informacje rozpowszechniane bez złej intencji • technika obróbki obrazu polegająca na łączeniu ludzkich twarzy • dynamiczne regularnie aktualizowanie strony internetowe na dany temat • ...
Government Acronyms 2023-01-21
21 Clues: mail • banks • taxes • pills • parcel • attorneys • farm loans • snow plows • Aeronautics • plant police • intelligence • investigation • water and air • covid monsters • disaster relief • labor relations • retaliation force • security alliance • financing paintings • global peace-makers • inner-city home development
Aeropuerto Game || No spaces No caps 2023-04-19
23 Clues: sign • seat • gate • aisle • window • ticket • screen • luggage • arrival • check in • terminal • passport • security • seat belt • documents • passenger • round trip • boarding pass • metal detector • departure/exit • first class seat • flight attendant • economy class seat
Citizens Bank & Trust 2012-12-09
21 Clues: Rate • Family • Office • Plastic • A Branch • Security • President • Necessity • Home Loan • Latt Maxey • Scrutinize • Childs Bank • Paper money • First Office • Pencil Pusher • First Contact • Loan Decision • Biggest Asset • Legal Document • Trust Services • Manager of Assets
Unit 5 - Architechture 2014-04-21
28 Clues: Lohn • Lift • Wärme • Decke • Eisen • Angst • Stahl • Termin • Bauland • anstatt • Werkzeug • Stockwerk • pünktlich • Kilometer • Baustelle • Verbindung • Sicherheit • Beleuchtung • Klimaanlage • Ziegelstein • Kühlschrank • ungewöhnlich • Architekt/in • Wolkenkratzer • Geschäftsmann • Herausforderung • Stadtsilhouette • entwerfen,entworf
1.1. Signs and Warnings 2017-04-17
28 Clues: kust • druk • buik • gemak • drijf • motor • afval • zwaai • pakjes • bewijs • begaat • doeuit • gebogen • spieren • terrein • proberen • betekent • ongewone • voertuig • stroming • rijbewijs • gifslangen • veiligheid • vuurwapens • ontsnappen • strandwacht • overtreding • brandblusser
VOCAB LESSON#4-CROSSWORD PUZZLE 2023-11-05
20 Clues: Stale • Holder • Infamy • Shabby • Earthly • Rounded • Display • Covering • Security • Throwback • Innocence • Compassion • Appreciate • Undercover • Short Fuse • Easily cured • In the flesh • Greedy to share • Godly or higher than a peasant • Manner or position in moving around
révision vocabulaire S1 anglais 2024-11-21
28 Clues: Fee • Trip • Task • Mark • Unit • Grant • Tasks • Class • Study • Safety • Attempt • Succeed • Teacher • Newcomer • Register • Due date • Elective • Commuter • Transport • Resources • Inspection • Internship • Requirement • Scholarship • Association • Reading room • Certification • Aviation company
Discover the Future 2024-06-16
Social Media 2021-01-11
Across
- Social media can give you a negative __________
- Things that are shared on youtube and tiktok
- You can use social media on your _____
- Social media can be bad for your _____ health
- A social media platform where you share videos and dances
- A social media platform where you share photos
Down
- Social media platform, owned by Mark Zuckerberg
- Stories that are not true
- Online harassment is another word for cyber-______
- You can do this with friends on social media
- Social media can make you _____
11 Clues: Stories that are not true • Social media can make you _____ • You can use social media on your _____ • Things that are shared on youtube and tiktok • You can do this with friends on social media • Social media can be bad for your _____ health • A social media platform where you share photos • Social media platform, owned by Mark Zuckerberg • ...
Security Summer Fun 2021-07-30
Across
- Allows TAD PGS, Inc. to operate with a clearance while having a foreign parent
- Threat that an employee or a contractor will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States.
- One of the Affiliates of a foreign interest (Adecco)
- How many days the Intra-Company Visit request should be submitted to Security before a meeting can take place between TAD PGS employees and Adecco affiliates
Down
- A type of social engineering where an attacker sends a fraudulent message designed to trick a human victim
- The briefing that must be submitted before you leave on international travel
- Foreign Ownership Control and Influence
- Information or material of which unauthorized disclosure could be expected to cause serious damage to the national security
- The database the DOD uses to store clearance information
- The form that is submitted to Security with the associate information, worksite, recruiter, sales manager, and visit requirements
10 Clues: Foreign Ownership Control and Influence • One of the Affiliates of a foreign interest (Adecco) • The database the DOD uses to store clearance information • The briefing that must be submitted before you leave on international travel • Allows TAD PGS, Inc. to operate with a clearance while having a foreign parent • ...
Farm To Table Session 1 2022-03-10
Across
- A pigment in leaves which traps sunlight.
- The process in which a shoot grows out of a seed.
- Food security is the state of having __________ access to sufficient quantity of affordable, nutritious food.
- Process in which plants make glucose and oxygen.
Down
- The compound in which energy is stored in plants.
- The change in __________ can cause disruptions to food supply change.
- In order to ensure food security, Singapore has plans to grow _________.
- Leaves trap _______ energy during photosynthesis.
- Global food systems may be ________ and this causes challenges to food security.
- We need to __________ food import sources to reduce reliance on one single source.
10 Clues: A pigment in leaves which traps sunlight. • Process in which plants make glucose and oxygen. • The compound in which energy is stored in plants. • Leaves trap _______ energy during photosynthesis. • The process in which a shoot grows out of a seed. • The change in __________ can cause disruptions to food supply change. • ...
Profiles 2 text 1 Alisa 2014-12-03
15 Clues: esine • varaus • tavara • suunta • rukous • paikka • rokotus • mainita • matkustaja • turvallisuus • kokemus,kokea • näköala,maisema • toimittaa,luovuttaa • olla mukana,esiintyä • pahoillaan oleva,katuva
At the airport 2024-11-30
15 Clues: небо • крыло • пассажир • двигатель • безопасный • рейс, полёт • безопасность • утомительный • приземляться • захватывающий • полагаться на • занятой,людный • чрезвычайная ситуация • аккуратный, внимательный • обслуживать, разносить (напитки)
Social Media 2014-05-12
Across
- search engine
- an application
- a type of bird vocalization
- A type of bullying that is a risk of social networking
- Social media requires the use of
- old fashioned newsfeed
- Famous Social Community Site
- site that allows you to share your story
- #
- if a business is going to use social media they should implement a ------
- A benefit of social networking is being able to _ _ _ _ _ things with your friends and family
- free video and instant messaging site
Down
- a diary like post
- an online photo-sharing, video-sharing and social networking service
- negative feedback
- Famous social content site for videos
- a microblogging platform and social networking website owned by Yahoo!
- most popular online social networking service
- pictures & ideas pin board
- self-portrait photograph
- an act of online robbery
- social media can help increase a businesses -----
22 Clues: # • search engine • an application • a diary like post • negative feedback • old fashioned newsfeed • self-portrait photograph • an act of online robbery • pictures & ideas pin board • a type of bird vocalization • Famous Social Community Site • Social media requires the use of • Famous social content site for videos • free video and instant messaging site • ...
ffff 2024-01-05
Across
- extortionist - electronically extorts u
- - a small text file
- Strategist - person hwo intergrates mobile stuff
- Device Convergence - technologies that overlap
- - a series of statements
- Line - an always on physcial connection
- Device- ardware component that allows you to enter data
- - comparing stuff to create criteria
- - A MORE EXPENSIVE DVD
- deleivers requested webpages Online
- - a compromised computer
- memory - can be erashed faster
Down
- sandwiches a liquid compund
- - measure of suitability
- - apples operationg system
- Device - hardware component that conveys information
- - saves data
- Network - to share their interests, ideas, stories, photos, music, and videos with other registered users.
- - an flying electronic
- - time to travel from one place to another
- - a sound
- - a small program
- - wirelless comunications
- - application of human intelligence to computers
- - makes inernet faster
- System - 1s and 0s
26 Clues: - a sound • - saves data • - a small program • System - 1s and 0s • - a small text file • - an flying electronic • - A MORE EXPENSIVE DVD • - makes inernet faster • - measure of suitability • - a series of statements • - a compromised computer • - wirelless comunications • - apples operationg system • sandwiches a liquid compund • memory - can be erashed faster • ...
Zach's Movie Madness 2023-02-10
Across
- Extremely rare mineral
- "That's some ___!"
- You have heard of him
- Cyber-savior
- Bat country
- Christmas classic, to some
- No Merlot!
- Airplane terrorists
- Sensei of Bruce Lee
- Island companion
- It's a mad, mad, mad, mad movie
- Poetic applause, or mass murder
- Wordle, sort of
- FBI Student
- Test for space cadets
- Rodney's house
- Art medium
- Montana's export
- Cool eating competition food
Down
- Goblin king
- "The hills are alive"
- Navy bird
- Elegant weapon
- High school football team
- Scorsese, Coppola, Lucas, etc.
- French Flag
- Hairy detective
- Bellagio, Mirage, MGM Grand enemies
- Nostromo Crewmember
- Dirty cop
- Adventurer, or cheap
- Student, conqueror
- Aquatic adventurer
- The old new evolution of film
- Spooky FBI Agent
- Tricksy
- Officer stabbed by Santa
37 Clues: Tricksy • Navy bird • Dirty cop • No Merlot! • Art medium • Goblin king • French Flag • Bat country • FBI Student • Cyber-savior • Elegant weapon • Rodney's house • Hairy detective • Wordle, sort of • Island companion • Spooky FBI Agent • Montana's export • "That's some ___!" • Student, conqueror • Aquatic adventurer • Nostromo Crewmember • Airplane terrorists • Sensei of Bruce Lee • Adventurer, or cheap • ...
Teacher Appreciation Week Crossword Puzzle 2023-04-20
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Teacher Appreciation Crossword Answers 2023-05-01
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Crossword Puzzle 2022-12-04
Across
- An adorable name for Hershey Bars
- Metal Gear character who likes to wrestle senators
- A holiday treat
- Family known for their Vacations
- An 80s “Vice”
- “I see you enjoy Super Mario…”
- Fails QTE
- Subject of your greatest cyber crime
- Connor’s mission in Detroit Become Human
- 1988’s olympic winter
- Early 90s Kindergarten teacher
- The edgier Battle Star
Down
- Lost with Bentsen in ’88
- a renowned piece of art
- A double entendre TV show
- Dating sim meets supernatural teen adventure
- A wholesome healthy breakfast
- “Resident” Albert
- Not the coffee shop
- 1,000 watts aren’t enough
- No___ GTA RP
- Themed Oreos are highly…
- A rare candy bar
- Your on a first name basis with this Galactica Admiral
- MultiVersus competitor and semi-retired Fortnite pro
25 Clues: Fails QTE • No___ GTA RP • An 80s “Vice” • A holiday treat • A rare candy bar • “Resident” Albert • Not the coffee shop • 1988’s olympic winter • The edgier Battle Star • a renowned piece of art • Lost with Bentsen in ’88 • Themed Oreos are highly… • A double entendre TV show • 1,000 watts aren’t enough • A wholesome healthy breakfast • “I see you enjoy Super Mario…” • ...
Eagle 101 topics 2025-10-06
Across
- the happiness chemical
- a strong feeling of annoyance and hostile behavior
- the act of working together for a common purpose to achieve something
- she was the vaping lessons speaker
- achieve something successfully
- Friday videos
- being nice and considerate to someone
- the feeling that something good can and will happen
- an intense and irrational fear of something
- a natural response to fear or stress
- an unstoppable habit
Down
- the action of organizing something
- The ability to share feelings of another
- Online bullying
- believing in your self
- Standing up aginst behaviors that are mean and harmful happening over and over agin
- looking at someone while their talking
- a response to lifes pressures
- able to be rellied on as honest and truthful
- Drug Abuse resistance education
20 Clues: Friday videos • Online bullying • an unstoppable habit • the happiness chemical • believing in your self • a response to lifes pressures • achieve something successfully • Drug Abuse resistance education • the action of organizing something • she was the vaping lessons speaker • a natural response to fear or stress • being nice and considerate to someone • ...
Security in Cognizant 2012-11-19
Across
- General term for software programs that have been designed with or can be used for malicious intent
- What sort of secure communication can be used to send code or project-critical documents
- When access to a work area is no longer required, it should be informed immediately to the Manager and
- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be
- individuals other than Associates who enter Cognizant workplaces
Down
- The property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- reserves the right to monitor, access, and disclose any IM communication
- The property of safeguarding the accuracy and completeness of assets
- Any Person Working for Cognizant utilizing Cognizant Email Infrastructure
- Anything that has value to the organization
- What should be done with the project related documents that are no longer needed
- Associates can download software for business use only after obtaining approval from their manager and
- The property of being accessible and usable upon demand by an authorized entity
13 Clues: Anything that has value to the organization • individuals other than Associates who enter Cognizant workplaces • The property of safeguarding the accuracy and completeness of assets • reserves the right to monitor, access, and disclose any IM communication • Any Person Working for Cognizant utilizing Cognizant Email Infrastructure • ...
July Security Crossword 2021-07-27
Across
- The body who awards World Heritage status
- the purposeful killing of a monarch or sovereign
- an intergovernmental military alliance between 28 European countries and 2 North American
- (5,10) type of security focused entirely on protecting an individual
- COVID Variant & 4th letter in Greek & Phonetic alphabet
- Military organization seeking power in Afghanistan
Down
- a device that gives a high energy electric shock to the heart
- Sports festival originated in Ancient Greece
- a large country house with lands.
- A flaming Cocktail used as a weapon
- Psychoactive drug with numbing properties
- the act of judging or deciding the amount, value, quality, or importance of something
- Name of a hand-held metal detector
13 Clues: a large country house with lands. • Name of a hand-held metal detector • A flaming Cocktail used as a weapon • The body who awards World Heritage status • Psychoactive drug with numbing properties • Sports festival originated in Ancient Greece • the purposeful killing of a monarch or sovereign • Military organization seeking power in Afghanistan • ...
Security+ Questions 1 2024-03-15
Across
- An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of
- A function that converts an input (or 'message') into a fixed-size string of bytes, typically a digest that is unique to each unique input. It is used in various security processes to ensure data integrity
- A type of control that are designed to prevent an attacker from attempting to violate security policies
- Procedural mechanisms that focus on the mechanics of the risk management process
- functions or codes that are placed inside of other programs that will activate when set conditions are met instead of independent malicious programs
- Groups of remotely controlled systems that are used by attackers who control them to perform various actions such as additional infections and denial of service attacks
- Malware that takes over a computer then demands a ransom or payment
- Malware that is specifically designed to allow attackers to access a system through a backdoor
Down
- A cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
- The process of converting information or data into a code, especially to prevent unauthorized access. It secures data by making it unreadable without the proper decryption key
- Programs that capture keystrokes from keyboards, mouse movement, touchscreen inputs, or credit card swipes from attached devices
- Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications
- A term that describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users
13 Clues: Malware that takes over a computer then demands a ransom or payment • Procedural mechanisms that focus on the mechanics of the risk management process • Malware that is specifically designed to allow attackers to access a system through a backdoor • A type of control that are designed to prevent an attacker from attempting to violate security policies • ...
cyber security 2017-06-30
Cyber Security 2022-06-15
CYBER SECURITY 2023-09-01
CYBER SECURITY 2023-09-01
Roles & Jobs 2024-06-19
Across
- Dogs that provide comfort and support to people.
- Following a scent trail to locate a person or object.
- Dogs trained to assist individuals with disabilities.
- Used to monitor areas for safety.
- General term for dogs trained to locate persons or objects.
- Employed in private security roles.
- Trained to locate deceased individuals.
- Trained to detect explosives, drugs, or other substances.
- Role of guarding property and people.
Down
- Traditional job of managing livestock.
- Assists visually impaired individuals.
- Role involving locating missing persons.
- German Shepherds used in armed forces.
- General term for dogs aiding individuals in various ta
- German Shepherds trained for law enforcement duties.
- Dogs used to detect contraband at borders.
16 Clues: Used to monitor areas for safety. • Employed in private security roles. • Role of guarding property and people. • Traditional job of managing livestock. • Assists visually impaired individuals. • German Shepherds used in armed forces. • Trained to locate deceased individuals. • Role involving locating missing persons. • Dogs used to detect contraband at borders. • ...
Daily Crossword 2023-05-12
Across
- Type of software program or code designed to harm, exploit, or damage computer systems, networks, or devices. It can be spread through various means, such as email attachments, malicious websites, infected software downloads, or even through physical devices such as USB drives. Can cause a range of problems, including data loss, system crashes, identity theft, and financial loss.
- A secret code or phrase that is used to gain access to a computer system, network, website, or other digital resource. Are typically created by users and are kept confidential to prevent unauthorized access to their accounts or data. Should consist of a combination of letters, numbers, and special characters, and to be sufficiently complex and unique in order make it difficult for others to guess or crack. It's important to do so and to change them regularly to help protect against security threats, such as hacking and identity theft.
- Type of online scam in which attackers use fraudulent emails, websites, or other forms of electronic communication to trick individuals into providing sensitive information, such as passwords, credit card numbers, or social security numbers. Will appear to come from a legitimate source, such as a bank or online service provider, and will request that the recipient click on a link or provide personal information.
- Refers to wireless internet access that is provided in public places such as cafes, airports, libraries, hotels, and other locations. Are typically free or provided for a fee, and allow users to connect to the internet wirelessly using their mobile devices or laptops. While it can be convenient and accessible, it also carries some security risks, as it is often unsecured and open to anyone within range. This can make it easy for hackers and cybercriminals to intercept and access data transmitted over the network, such as login credentials, credit card numbers, or personal information.
- Type of cyber attack in which an attacker impersonates a legitimate entity or source, such as a website, email address, or IP address, to deceive users and gain access to sensitive information or systems.
Down
- A security system that is designed to monitor and control incoming and outgoing network traffic between a computer or network and the internet. Are used to prevent unauthorized access to a network or device by blocking potentially malicious traffic, such as viruses, malware, and hackers. Works by examining packets of data as they move through the network and enforcing a set of rules or policies that determine which packets are allowed to pass through and which are blocked.
- Type of program designed to detect, prevent, and remove malicious software from computer systems and networks. The software works by scanning files and programs for known patterns of malicious code, and then either quarantining or removing any identified threats.
- Technology that creates a secure, encrypted connection between two devices or networks over the internet. Your device connects to a server run by the provider, which then forwards your internet traffic to the destination website or service. The encryption provided helps protect your online privacy and security by preventing unauthorized access to your data and hiding your IP address.
8 Clues: Type of cyber attack in which an attacker impersonates a legitimate entity or source, such as a website, email address, or IP address, to deceive users and gain access to sensitive information or systems. • ...
Puzzle Thingy 2021-01-12
Across
- Reserve System a group consisted of 12 independent regional banks that could lend to other banks in times of need
- income tax pay as you earn system
- Taxes tax on the estate or total property of person who has died
- Money increase money supply will lower interest rates thus encouraging investment spending
- Spending Social security, medicare, medicaid, government must pay the amount required
- policy the use of government spending and revenue collection to influence the economy.
- national health insurance program in the United States, begun in 1966 under the Social Security Administration
- Policy Drops GDP and used to drop demand
- taxes out of work still collecting money to live off of, have to be looking for a new job
- tax tax on money or property that one living person gives to another
Down
- Policy used to expand the economy, initiate growth, and increase output
- taxes General revenue tax on the sale or manufacture of a good
- income Person’s gross income-including salaries, and wages
- taxes a tax that charges a higher rate for people who earn a higher income
- GDP
- Policy Actions the Federal Reserve takes to influence inflation
- Year October 1st to September 30th
- security tax used to fund old age, survivors, and disability insurance
- budget written document estimating the federal government’s spending in the coming year
- Money reduce the money supply will increase interest rates and cause spending to
- taxes imported goods brought into the country
21 Clues: GDP • income tax pay as you earn system • Year October 1st to September 30th • Policy Drops GDP and used to drop demand • taxes imported goods brought into the country • income Person’s gross income-including salaries, and wages • taxes General revenue tax on the sale or manufacture of a good • Policy Actions the Federal Reserve takes to influence inflation • ...
MY MOTHER AT 66 & ELEMENTARY......SLUM 2020-08-04
20 Clues: pale • sleep • safety • running • twisted • dead body • closed in • bad, mean • well bred • scattering • well known • burial places • giving rewards • unwanted plants • pale like an ash • opposite of wide • luring, attracting • stopped abnormally • clear, unclouded sky • fast moving, forceful
Las Noticias 2021-10-26
22 Clues: war • link • news • tweet • to say • source • to lie • because • to lack • to give • reliable • disorder • security • magazines • to follow • verifiable • to publish • to navigate • to look for • to interview • to broadcast • to prove, to confirm
November 2 2021-11-02
Across
- guard - охранник
- - отвлекать
- - хропеть
- - салфетка
- - заворачивать
- - чудо
- - выкрикивать
- - заставлять
- - агрессивный
- pig - морская свинка
- - разрушать
- - мопс
- - палатка
- up - подводить итоги/заканчивать
Down
- - общее слово для братьев и сестер
- - доказательство
- - копать
- - внешность
- - бухгалтер
- attendant - стюард/-есса
- - бесполезный
- - совершать побег/ убегать
- - кричать
- - общежитие
24 Clues: - чудо • - мопс • - копать • - хропеть • - кричать • - палатка • - салфетка • - отвлекать • - бухгалтер • - общежитие • - разрушать • - внешность • - заставлять • - выкрикивать • - бесполезный • - агрессивный • - заворачивать • guard - охранник • - доказательство • pig - морская свинка • attendant - стюард/-есса • - совершать побег/ убегать • up - подводить итоги/заканчивать • - общее слово для братьев и сестер
NI 2 Unit 2 Lessons 3&4 2021-11-28
28 Clues: Welt • Reis • Zelt • Kerze • Abfall • Koffer • werfen • zelten • bringen • reizend • Schlamm • Kontakt • Ankunft • brennen • anzünden • schlafen • anstehen • klingeln • verdienen • Umschlage • Tradition • Sicherheit • gefährlich • Feuerwerke • schliessen • traditionel • Portmonnaie • Unterwäsche
Prueba de vocabulario útil p. 61-63 2018-02-11
20 Clues: seat • aisle • fault • window • weapon • to solve • tax, duty • to explain • To line up • flight crew • to take off • to threaten • sign/signal • security guard • That’s enough! • passanger (male) • flight attendant • cautious (female) • suspicious (male) • to claim your luggage
Vocabulary 9 2012-11-04
20 Clues: plan • attention • character • protected • community • real life • first time • being seen • allegiance • make smaller • indifference • continued use • special skill • decision maker • firm conviction • electric current • free from danger • educational institution • representation of a person • contract to receive something
Unit 5 - Architechture 2014-04-21
28 Clues: Lohn • Lift • Eisen • Decke • Angst • Wärme • Stahl • Termin • anstatt • Bauland • Werkzeug • Baustelle • pünktlich • Stockwerk • Kilometer • Sicherheit • Verbindung • Ziegelstein • Kühlschrank • Beleuchtung • Klimaanlage • ungewöhnlich • Architekt/in • Geschäftsmann • Wolkenkratzer • Herausforderung • Stadtsilhouette • entwerfen,entworf
Unit 5 - Architechture 2014-04-21
28 Clues: Lohn • Lift • Wärme • Angst • Decke • Eisen • Stahl • Termin • Bauland • anstatt • Werkzeug • Kilometer • pünktlich • Stockwerk • Baustelle • Verbindung • Sicherheit • Ziegelstein • Klimaanlage • Kühlschrank • Beleuchtung • Architekt/in • ungewöhnlich • Geschäftsmann • Wolkenkratzer • Stadtsilhouette • Herausforderung • entwerfen,entworf
banking 11 2023-11-14
Across
- adókulcs
- alapkamat
- kőltságvetési politika
- részvény
- kötelező tartalékráta
- élénkítő politika
- kamatláb
- valuta
- pénzkínálat
- kormányzati kiadás
- általánosan elfogadott
Down
- hitelt nyújt
- monetáris eszközök
- biztosító társaság
- intézményi befektető
- kamatmarzs
- committee monetáris tanács
- kétszintű
- osztalék
- folyószámla
- kibocsát
- értékpapír
- jegybank
23 Clues: valuta • adókulcs • részvény • osztalék • kamatláb • kibocsát • jegybank • alapkamat • kétszintű • kamatmarzs • értékpapír • folyószámla • pénzkínálat • hitelt nyújt • élénkítő politika • monetáris eszközök • biztosító társaság • kormányzati kiadás • intézményi befektető • kötelező tartalékráta • kőltságvetési politika • általánosan elfogadott • committee monetáris tanács
LA TECNOLOGIA y LA RED 2025-05-15
27 Clues: key • call • link • file • users • group • email • mouse • tweet • event • screen • camera • photos • message • comment • profile • website • username • password • keyboard • internet • security • followers • headphones • cell-phone • speaker-phone • mute/silent mode
Digital media literacy 2023-09-14
Across
- something unwed to accept cokies to use
- a app based on a red and white logo that’s starts with a p
- a social media app based on a blue logo
- a practical subject in our school
- bullying a type of bullying in line
- something u can take pictures on
- a social media app known for its dances
Down
- a social media app that you post on
- an app that goes tweet tweet
- you can listen to music from
- games that. U play on ur phone
- something that we use daily
12 Clues: something that we use daily • an app that goes tweet tweet • you can listen to music from • games that. U play on ur phone • something u can take pictures on • a practical subject in our school • a social media app that you post on • bullying a type of bullying in line • something unwed to accept cokies to use • a social media app based on a blue logo • ...
Bullying 2024-05-08
Across
- someone who uses strength, power or words to harm or intimidate others
- a preconceived opinion or feeling
- someone what to do if somebody is bullying you
- an organized group of criminal activity
- a popular belief about specific types of individuals
- a reason somebody would bully
Down
- type of bullying where you call somebody names
- type of bullying where you hit somebody
- up what to do if you are a bystander
- bullying over the internet
- someone who is present at an event
- to put up with something or somebody unpleasant
12 Clues: bullying over the internet • a reason somebody would bully • a preconceived opinion or feeling • someone who is present at an event • up what to do if you are a bystander • type of bullying where you hit somebody • an organized group of criminal activity • type of bullying where you call somebody names • someone what to do if somebody is bullying you • ...
Pre-Test Awareness 2014 2014-10-13
Across
- An ISO standard is a ____________ agreement containing technical specifications or other precise criteria to be used consistently
- Customer Satisfaction is customer’s ________ of the degree to which the customer’s requirements have been fulfilled
- One of the benefit of ISO Certification is it Strengthens business ________
- Register Document where all non-conformance are identified in the process and opportunities to improve process
- _______ Action to eliminate the cause of a potential nonconformity
Down
- defines have the overall process flows for the service /Product
- Extent to which planned activities are realized and planned results achieved can be termed as _____
- 27001 Information Security Management System
- Information Security ___ is -An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant
- Is a systematic approach to managing sensitive company information so that it remains secure
- International Organization For Standardization is
- 9001 Quality Management System
12 Clues: 9001 Quality Management System • 27001 Information Security Management System • International Organization For Standardization is • defines have the overall process flows for the service /Product • _______ Action to eliminate the cause of a potential nonconformity • One of the benefit of ISO Certification is it Strengthens business ________ • ...
Sara Acman 2025-06-12
16 Clues: gulf • brook • stone • effect • battle • recall • worker • debris • powerful • inhabitant • firefighter • monthly pay • to be caught • to be situated • Security camera • a person who treats people
codi bullying crossword 2023-03-21
Across
- bullying getting physically picked on everyday
- bullying some teases you verbally everyday
- someone who stands around and watches someone getting bullied
- a sore from being punched or kicked
Down
- someone teases you and picks on you everyday
- a type of physical bullying
- a type of psychological bullying
- bullying getting picked on online everyday
8 Clues: a type of physical bullying • a type of psychological bullying • a sore from being punched or kicked • bullying some teases you verbally everyday • bullying getting picked on online everyday • someone teases you and picks on you everyday • bullying getting physically picked on everyday • someone who stands around and watches someone getting bullied
Kianasearch 6-18-24 2024-06-18
8 Clues: “can somebody match my” • the best way to cook an egg • my underdog team for the euros • the type of attack on Ascension • my profile name on my peacock account • the best person on Love Island Season 11 • the name of the Crystal that powers lightsabers • NYC borough where the UGA photographer is moving to
Law and Public Safety 2025-11-10
Pengantar Teknologi Informasi 2023-09-06
6 Clues: Informasi • Topologi yang menyerupai bintang • Alamat pada jaringan Internet. • Salahsatu bagian dari AI adalah ... Humanly • Menjaga data agar tidak terjadi adanya perubahan • Pemalsuan data pada aktivitas Cyber Crime adalah Data...
NSA Crossword 2014-05-17
Across
- not being observed or disturbed by other people
- set of information that gives information about other data
- information or documents designated as secret
- collection of valuable information
- keeping tabs on people, a close observation
- feeling that you are safe
- electronic surveillance program Snowden had been working on
- group of people that make decisions for a country or state
- person wanted by authorities of a another nation or state
Down
- country Snowden is currently staying in
- law that Snowden violated
- National Security Agency
- NSA agent that leaked governments top-secret documents
- state of being free within society
- what the NSA is trying to prevent
- crime of betraying one's country
- what every person is entitled to
17 Clues: National Security Agency • law that Snowden violated • feeling that you are safe • crime of betraying one's country • what every person is entitled to • what the NSA is trying to prevent • collection of valuable information • state of being free within society • country Snowden is currently staying in • keeping tabs on people, a close observation • ...
Bullying Crossword! 2014-06-22
Across
- When you have committed bullying you are ______
- When you are excluded from a group
- A type of bullying that happens online
- Something that is unpleasant, angering or irritating is _________
- A type of bullying where the bully is calling someone nasty names or saying nasty comments
- Something that happens over and over again
- Knowingly causing pain or distress to others is being _____
Down
- A person that bullies
- When someone uses their fists to hurt someone it is ________
- Done deliberately
- A person that sees bullying happen
- A nasty comment can be very _______
- When you call someone nasty names you _____ them
- A person that gets bullied
- When you are by yourself you are _____
15 Clues: Done deliberately • A person that bullies • A person that gets bullied • A person that sees bullying happen • When you are excluded from a group • A nasty comment can be very _______ • A type of bullying that happens online • When you are by yourself you are _____ • Something that happens over and over again • When you have committed bullying you are ______ • ...
IT terms 2019-06-24
Across
- Main, starting page of a website
- Web page containing journal entries
- The company who produces IOS technology
- Social network originally created for college students
- Trail if data left when you use the internet
- Used to type on a computer
Down
- Website that is used to share and view videos
- A word that is used to secure private information when creating a profile on any online platform
- Copy, pasting someone’s work and not referencing
- World’s best and most popular search engine
- A machine that can make 3D objects out of materials
- A number system that only uses the numbers 0, 1. Helps computers operate
- Online encyclopedia
- Electronic mail
- bullying Bullying online
15 Clues: Electronic mail • Online encyclopedia • bullying Bullying online • Used to type on a computer • Main, starting page of a website • Web page containing journal entries • The company who produces IOS technology • World’s best and most popular search engine • Trail if data left when you use the internet • Website that is used to share and view videos • ...
CAB 2021-05-04
Across
- Someone watching the bullying happening.
- When no one is having fun.
- Spreading rumors, excluding people from games and groups
- When someone is being hurt on purpose.
- What is the A of the ABC's of bullying?
- What is the D of the ABC's of bullying?
- Someone that doesn't have a nice life, so they ___ to make them feel better.
Down
- Writing mean things on peoples Facebook, Instagram... etc
- What is the B of the ABC's of bullying?
- What is the C of the ABC's of bullying?
- When everyone is having fun.
- This is standing up to someone.
- Punching, kicking, or spitting.
- Name calling, threating.
- Attacked physically, socially,or emotionally.
15 Clues: Name calling, threating. • When no one is having fun. • When everyone is having fun. • This is standing up to someone. • Punching, kicking, or spitting. • When someone is being hurt on purpose. • What is the B of the ABC's of bullying? • What is the C of the ABC's of bullying? • What is the A of the ABC's of bullying? • What is the D of the ABC's of bullying? • ...
Types of Markets 2022-01-25
Across
- ____ exchanges are markets that do not have a location.
- Within bond markets in the US, bonds have a ___ value of $1000.
- Corporations issue debt securities to be traded within ____ markets.
- Future markets help protect against ___ of uncertain markets.
- Raising capital within public and private markets is a goal within the ___ market.]
- A security is sold in a ___ market when it is first issued.
- ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
- Who must register bonds within the bond market?
- The purpose of trading within security markets is to buy orders at a ____ price.
Down
- Primary and secondary ___ are sold in a primary market.
- The most populated exchange in the U.S who owns trading rights with listed companies
- Zero-coupon bonds do not earn ____ within the bond market.
- ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
- The ___(issuing stocks for the first time) typically occurs in a primary market.
- In a secondary market shares of stock are ___ to the public
15 Clues: Who must register bonds within the bond market? • ____ exchanges are markets that do not have a location. • Primary and secondary ___ are sold in a primary market. • Zero-coupon bonds do not earn ____ within the bond market. • A security is sold in a ___ market when it is first issued. • Future markets help protect against ___ of uncertain markets. • ...
Hotel crossword puzzle 2024-05-01
15 Clues: lobi • Koper • masuk • Taman • Sarapan • Pelayan • Keamanan • fasilitas • Pemandangan • Ruang santai • uang tambahan • Kamar tipe VIP • Biaya Tambahan • kamar mandi uap • Meja resepsionis
Teacher Appreciation Week Crossword Puzzle 2023-04-25
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Teacher Appreciation Crossword 2023-04-28
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
