cyber security Crossword Puzzles

Superb Security Crossword Challenge 2020-05-07

Superb Security Crossword Challenge crossword puzzle
Across
  1. An unpatched laptop is … to an attack or how you feel when you finish watching “The Notebook”
  2. The highest level of privilege which can be exposed (Windows)
  3. Unlawful data exposure
  4. …..engineering refers to the method attackers use to manipulate people into sharing sensitive information
  5. Converts passwords to unreadable strings or a good way to prepare potatoes
  6. What makes your laptop/PC sick
  7. Cybersecurity is our shared...
  8. …..identifiable information is any data that could potentially identify a specific individual
  9. Bad junk emails
  10. European privacy law
  11. Bad for your laptop/PC, but helpful to aerate the garden
Down
  1. Everyone has these and they are unique to each person
  2. Malware that misleads users of its true intent, or a big wooden horse
  3. Technology that extends a private network across a public network
  4. Should contain a minimum of 9 characters using a combination of upper case letters, lower case letters, numbers, and special characters.
  5. A guy in a hoodie, in his mom’s basement, trying to access your personal data
  6. Tool for stealing credit cards
  7. Ransomware that affected NHS in 2017, or what you want to do when you realize you might have this malware
  8. A malicious program designed to record which keys are being pressed on a computer keyboard
  9. Don't click on….within emails from an unknown or untrusted source.

20 Clues: Bad junk emailsEuropean privacy lawUnlawful data exposureTool for stealing credit cardsWhat makes your laptop/PC sickCybersecurity is our shared...Everyone has these and they are unique to each personBad for your laptop/PC, but helpful to aerate the gardenThe highest level of privilege which can be exposed (Windows)...

Check Your Security Mindset 2020-07-15

Check Your Security Mindset crossword puzzle
Across
  1. An official order per POTUS
  2. A great sale or official authorization
  3. close observation
  4. Mid-level classification
  5. Formally found favorable
  6. A threat, intent is not a requirement
  7. Pay a fine, go to jail, etc.
  8. Big government
  9. The "O" in ISOO that can't be overlooked
  10. U.S. Coast Guard operations
Down
  1. Not any kind of secret, not even confidential.
  2. Security Education Training and _____________
  3. Is that a FOIA request? Hang on...
  4. Permission to pass, gain entry
  5. Ironically, a CIA (not DHS) TV drama starring Claire Danes
  6. The DHS ________Weapons of Mass Destruction Office (CWMD)
  7. Info protected per E.O. 13526
  8. Routine risk mitigation process
  9. Requires DHS accreditation
  10. Brand new, "PIV-less" DHS network access

20 Clues: Big governmentclose observationMid-level classificationFormally found favorableRequires DHS accreditationAn official order per POTUSU.S. Coast Guard operationsPay a fine, go to jail, etc.Info protected per E.O. 13526Permission to pass, gain entryRoutine risk mitigation processIs that a FOIA request? Hang on...A threat, intent is not a requirement...

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  2. A type of protocol that allows data to be sent and received securely over the internet.
  3. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  4. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  5. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  6. Web applications or website that allow users to create and edit web pages using any web browser.
  7. Refers to the need to respect other user's views and display common courtesy when posting views online.
  8. Software that gathers data by monitoring key press on the user/s keyboard.
  9. The act of gaining unauthorized access to a computer system.
  10. Uses SMS system of mobile phones to send out fake text messages.
  11. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  12. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
Down
  1. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  2. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  3. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  4. Refers to safety when using the internet like keeping personal data safe.
  5. Authentication that relies on certain unique characteristics of human beings.
  6. Used to verify that data comes from a secure and trusted source.
  7. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  8. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  9. Unsolicited email sent over the internet.
  10. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  11. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  12. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.

24 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

A+ Security Hardware 1 2018-09-23

A+ Security Hardware 1 crossword puzzle
Across
  1. Should go from front to back
  2. Toner compressed onto paper with heat
  3. Find the issue
  4. More than one monitor
  5. Opposites attract when it comes to this
  6. Prevents shock
  7. memorable
  8. Saves cmos information
  9. Allows for packet transmission
  10. All components fit
Down
  1. Specifies physical dimensions of the MB components
  2. Short range low range wireless network solution
  3. Forgets everything when turned off
  4. Number one installation tool
  5. Print jobs in sequence
  6. The brain
  7. Old school
  8. No pins
  9. Sticky stuff on the cpu
  10. The base of it all
  11. High definition multi-media interface
  12. A chip that finds all the components on the pc

22 Clues: No pinsThe brainmemorableOld schoolFind the issuePrevents shockThe base of it allAll components fitMore than one monitorPrint jobs in sequenceSaves cmos informationSticky stuff on the cpuShould go from front to backNumber one installation toolAllows for packet transmissionForgets everything when turned offToner compressed onto paper with heat...

Chapter 9: Fundamental Security 2012-11-29

Chapter 9: Fundamental Security crossword puzzle
Across
  1. Uses network sniffers to extract usernames and passwords to be used at a later date to gain access.
  2. Is a person who is able to gain access to equipment or a network by tricking people.
  3. Prevents unauthorized access to the local computer and the network.
  4. Users outside of an organization that do not have authorized access to the network or resources.
  5. Gains access to resources on devices by pretending to be a trusted computer.
  6. Changes the DNS records on a system to point to false servers where the data is recorded.
  7. Sends abnormally large amounts of requests to a system preventing access to the services.
  8. Is the protocol suite that is used to control all of the communications on the Internet.
  9. Accidental threats are when the user damages data or equipment unintentionally.
  10. Also known as junk mail
  11. Programming language developed to interact with HTML source code to allow interactive websites.
  12. Created by Microsoft to control interactivity on webpages.
Down
  1. Events or attacks that steal, damage, or destroy equipment.
  2. A large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing it.
  3. A software program that displays advertising on your computer.
  4. A file or program other then a virus that can be harmful.
  5. Events or attacks that remove, corrupt, deny access, allow access or steal information.
  6. Distributed without any user knowledge.
  7. Uses "zombies" to make tracing the origin of the DoS attack difficult to locate.
  8. A series of repeated, larger than normal pings that crash the receiving computer.
  9. Intercepts or inserts false information in traffic between two hosts.
  10. Programming language that allows applets to run within a web browser.
  11. Randomly opens TCP ports.
  12. Fundamental Security.
  13. A program that is written with malicious intent and sent out by attackers.

25 Clues: Fundamental Security.Also known as junk mailRandomly opens TCP ports.Distributed without any user knowledge.A file or program other then a virus that can be harmful.Created by Microsoft to control interactivity on webpages.Events or attacks that steal, damage, or destroy equipment.A software program that displays advertising on your computer....

Security Awareness Puzzle 2015 2015-02-17

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. 21. A password is stronger by using a combination of both upper and lower case ___________.
  2. 28. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
  3. 25. A software that is designed to detect and destroy computer viruses.
  4. 24. The state of being free from danger or threat.
  5. 13. Passwords should be _________ every 3-4 months.
  6. 20. Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
  7. 3. __________ is a popular web search engine.
  8. 15. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. 8. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
  10. 5. Use __________ passwords for the various accounts that you may have.
  11. 11. To ________ the amount of spam you receive, be careful who you give your email address to.
  12. 10. Never share your _________ with another person.
  13. 12. Healthy email always includes a clear and specific ____________ line.
  14. 6. Email scam or attempt to trick you into giving your password or personal information.
Down
  1. 18. A secure password should contain at least one of these.
  2. 22. Choose a password that is easy for you to ____________ but hard for someone to guess.
  3. 29. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. 30. Also known as malicious software; any program or file that is harmful to a computer user.
  5. 14. Do not send __________ information over email unless it is encrypted.
  6. 27. Another word for understanding, knowledge and well-informed.
  7. 16. Do not leave your laptop or computer ____________.
  8. 1. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  9. 26. Use this tool to dispose of documents that contain personal or financial information.
  10. 7. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  11. 9. Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
  12. 23. A computer ______ can be considered as the modern counterpart of a paper document.
  13. 19. Passwords should always be at least this many characters long.
  14. 4. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  15. 17. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  16. 2. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.

30 Clues: 3. __________ is a popular web search engine.24. The state of being free from danger or threat.13. Passwords should be _________ every 3-4 months.10. Never share your _________ with another person.16. Do not leave your laptop or computer ____________.18. A secure password should contain at least one of these....

Security+ Crossword Puzzle #1 2014-11-03

Security+ Crossword Puzzle #1 crossword puzzle
Across
  1. indicates exposure to the chance of damage or loss
  2. the countermeasures put in place to avoid, mitigate, or counteract risks
  3. administrator has discretion to allow or not allow access
  4. malicious software that is intended to track and report back on system usage
  5. the security approach of blocking unauthorized access or attacks before they occur
  6. the act of determining if a user has tried to access unauthorized data
  7. any technique used to exploit a vulnerability
  8. process of validating credentials
  9. an attacker accessing your computer system without authorization
  10. process of tracking and recording system activities and resource access
  11. Top Secret, Secret, Confidential
  12. any potential damage to an asset
  13. data that has been encoded with a cipher and is unreadable
Down
  1. self-replicating piece of malicious code that spreads without attching itself to different files
  2. physical or virtual objects that store authentication information
  3. ensuring that who sent the data remains associated and cannot deny sending it
  4. software that displays or downloads advertisements
  5. any condition that leaves a system open to harm
  6. _____ bomb remains dormant until a specific condition occurs
  7. self-replicating piece of malicious code that spreads by attaching itself to different files
  8. process of determining rights and privileges
  9. malicious software that takes full or partial control of a system at the lowest levels
  10. _____ management is a systematic way of reviewing and approving changes
  11. the act of recovering vital data from a system that has crashed, been compromised, or damaged
  12. rule, system, or mechanism used to encrypt or decrypt data
  13. practice of examining logs
  14. access is controlled by a user's role

27 Clues: practice of examining logsTop Secret, Secret, Confidentialany potential damage to an assetprocess of validating credentialsaccess is controlled by a user's roleprocess of determining rights and privilegesany technique used to exploit a vulnerabilityany condition that leaves a system open to harmindicates exposure to the chance of damage or loss...

Digital life and security 2024-01-14

Digital life and security crossword puzzle
Across
  1. значення 'mal' в 'malware'
  2. дурний, безглуздий
  3. безпечний
  4. доступ
  5. обмеження
  6. крадіжка
  7. шкідливе програмне забезпечення
  8. перехоплювати
  9. ненадійний, небезпечний
Down
  1. втішати, заспокоювати
  2. обходити
  3. скинути (пароль)
  4. сучасний, в актуальному стані
  5. зберігати
  6. стильний
  7. красти (2 форма)
  8. здобувати, отримувати
  9. грабіжник
  10. сховище, зберігання
  11. зламати (пароль)

20 Clues: доступобходитистильнийкрадіжкабезпечнийзберігатиобмеженняграбіжникперехоплюватискинути (пароль)красти (2 форма)зламати (пароль)дурний, безглуздийсховище, зберіганнявтішати, заспокоюватиздобувати, отримуватиненадійний, небезпечнийзначення 'mal' в 'malware'сучасний, в актуальному станішкідливе програмне забезпечення

Privacy and Security Online 2024-04-25

Privacy and Security Online crossword puzzle
Across
  1. changes a browser's behavior, settings, or appearance without user consent
  2. theft A type of scam where someone tries to trick you into giving them your personal information
  3. A setting that allows you to control who can see your profile and posts
  4. A type of software that can harm your computer or steal your information
  5. A piece of software that can protect your computer from online threats
  6. A place where you can safely store your passwords and other sensitive information
  7. A symbol or character that represents you online
  8. when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
  1. the safe and responsible use of information and communication technologies
  2. A type of attack where someone pretends to be someone else to gain access to your personal information
  3. sharing photos, videos, and messages with other people
  4. piracy the illegal copying or distribution of copyrighted material via the Internet
  5. users open the app an average of 19 times a day
  6. a collective term for websites and applications that focus on communication
  7. System used to protect computer systems
  8. Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
  9. You should never share this with strangers online
  10. keep your digital doors locked
  11. virus a type of malware that downloads onto a computer disguised as a legitimate program
  12. short and less than 8 characters

20 Clues: keep your digital doors lockedshort and less than 8 charactersSystem used to protect computer systemsusers open the app an average of 19 times a dayA symbol or character that represents you onlineYou should never share this with strangers onlinesharing photos, videos, and messages with other people...

Security-04-30-2024 2024-04-29

Security-04-30-2024 crossword puzzle
Across
  1. ______ engineering is the act of tricking a person into doing something by messing up their emotions and decision-making process
  2. A type of attack where malicious code is inserted into a database query.
  3. The process of verifying the identity of a user or device
  4. A transformation of data into a form that conceals the data's original meaning.
  5. A hidden way to access a system or software.
  6. The practice of concealing messages or information within other nonsecret text or data
  7. A logical or physical discontinuity in a network to prevent unauthorized access.
Down
  1. A network of infected computers controlled by a hacker.
  2. A phishing attack conducted through SMS messages.
  3. Detection technology software to shield users against malware.
  4. A vulnerability that is exploited before the software developer releases a fix.
  5. A generic term for different types of malicious code
  6. An isolated environment used to test potentially dangerous software.
  7. A deceptive system designed to attract and monitor unauthorized access or attacks.
  8. A type of phishing attack carried out through voice calls.
  9. An attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
  10. Developing audio, image, or a video clip that has been edited and manipulated to appear real or believable
  11. A software update that fixes vulnerabilities or bugs.
  12. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function
  13. Use of e-mails that appear legitimate to trick a user into entering valid credentials or clicking a link.

20 Clues: A hidden way to access a system or software.A phishing attack conducted through SMS messages.A generic term for different types of malicious codeA software update that fixes vulnerabilities or bugs.A network of infected computers controlled by a hacker.The process of verifying the identity of a user or device...

Social security and relationships 2023-01-30

Social security and relationships crossword puzzle
Across
  1. anoppi
  2. puoliso
  3. appi
  4. eläkeläinen
  5. alaikäinen
  6. huoltajuus
  7. esi-isä
  8. avoliitto
  9. syntyätodistus
  10. köyhyys
  11. nuorisotilat
Down
  1. KELA
  2. lainsäädäntö
  3. viranomaiset
  4. syrjintä
  5. elatusmaksu
  6. iltapäiväkerho
  7. jälkeläiset
  8. käly
  9. kunta
  10. age eläkeikä

21 Clues: KELAappikälykuntaanoppipuolisoesi-isäköyhyyssyrjintäavoliittoalaikäinenhuoltajuuselatusmaksueläkeläinenjälkeläisetlainsäädäntöviranomaisetage eläkeikänuorisotilatiltapäiväkerhosyntyätodistus

Information Assurance and Security 2025-12-16

Information Assurance and Security crossword puzzle
Across
  1. Ensures systems are accessible when needed (The A in CIA)
  2. A one-way function that turns data into a fixed-length string (used for passwords)
  3. The assurance that someone cannot deny the validity of something (like a signature)
  4. Random data added to a password before hashing it
  5. Malware that replicates itself to spread to other computers (no host needed)
  6. Converting ciphertext back into plaintext
  7. Authentication using physical characteristics like fingerprints
  8. The process of verifying who a user is
  9. Malware disguised as legitimate software
  10. A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
  11. Spyware that records every keystroke made by a user
  12. Ensures data has not been altered or tampered with (The I in CIA)
  13. A list of entities that are approved for unauthorized access
  14. An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
Down
  1. Malware that locks your data and demands payment
  2. Malicious code that attaches itself to a host program to replicate
  3. The process of verifying what a user is allowed to do
  4. Ensures information is not disclosed to unauthorized individuals (The C in CIA)
  5. A potential danger that can exploit a vulnerability
  6. Extends a private network across a public network (Virtual Private Network)
  7. A list of entities that are denied access
  8. Code or a technique that takes advantage of a vulnerability
  9. Converting plaintext into ciphertext to secure it
  10. A network security device that monitors and blocks traffic
  11. A weakness or flaw in a system

25 Clues: A weakness or flaw in a systemThe process of verifying who a user isMalware disguised as legitimate softwareConverting ciphertext back into plaintextA list of entities that are denied accessMalware that locks your data and demands paymentRandom data added to a password before hashing itConverting plaintext into ciphertext to secure it...

Kreuzworträtsel 2022-05-02

Kreuzworträtsel crossword puzzle
Across
  1. KOmplexe und sichere...
  2. Schutz vor Cyberkriminalität
  3. Kann dir dabei helfen Fotos aus dem Internet zu löschen
Down
  1. Bloßstellen im Internet
  2. häufige Angriffsart
  3. Täter gibt sich als geschäftsführerIn aus

6 Clues: häufige AngriffsartBloßstellen im InternetKOmplexe und sichere...Schutz vor CyberkriminalitätTäter gibt sich als geschäftsführerIn ausKann dir dabei helfen Fotos aus dem Internet zu löschen

Complexity Cross V3 2024-08-25

Complexity Cross V3 crossword puzzle
Across
  1. What Optic has on his forehead
  2. The artifact that turned Blackwell into Obscurant
  3. One of Cove's hobbies
  4. _____ 2, the planet where the story takes place
  5. Fletcher has two cameras, a regular and a
  6. When Cyber was injured, he was forced to replace his waist, arm, and
  7. Commonly known as "Poof Pods"
Down
  1. Sage's age when he left Misty Forest Island
  2. The Life _____, the object that gives Sage his powers
  3. The Optic's top assassin
  4. The first name of the man who betrayed Stratus

11 Clues: One of Cove's hobbiesThe Optic's top assassinCommonly known as "Poof Pods"What Optic has on his foreheadFletcher has two cameras, a regular and aSage's age when he left Misty Forest IslandThe first name of the man who betrayed Stratus_____ 2, the planet where the story takes placeThe artifact that turned Blackwell into Obscurant...

Bullying Crossword 2023-02-28

Bullying Crossword crossword puzzle
Across
  1. the act of treating another person abusively
  2. using words to promote violence on somebody
  3. a person who is habitually cruel and threatening
  4. this type of bullying is online
  5. facebook, instagram,twitter are all examples
Down
  1. this type of bullying involves hurting them physically
  2. a person who tries to stop the bullying
  3. these are lies that are spread
  4. the person who is getting bullied
  5. this can be low on people who are bullied
  6. people who are bullied can feel this

11 Clues: these are lies that are spreadthis type of bullying is onlinethe person who is getting bulliedpeople who are bullied can feel thisa person who tries to stop the bullyingthis can be low on people who are bulliedusing words to promote violence on somebodythe act of treating another person abusivelyfacebook, instagram,twitter are all examples...

TTS MEDIA DIGITAL QUINSHA 2025-03-14

TTS MEDIA DIGITAL QUINSHA crossword puzzle
Across
  1. sesuatu yang berhubungan dengan sistem komputer dan informasi
  2. sesuatu yg dilindungi
  3. pengambilan karangan org lain
  4. informasi pribadi
Down
  1. tiktok merupakan aplikasi
  2. informasi yang tersedia melalui media atau produk elektronik
  3. tindakan ilegal yang dilakukan melalui internet dan komputer
  4. seperangkat aturan yang harus diikuti saat membuat dan mengelola konten, baik di media sosial maupun di tempat umum.
  5. perangkat lunak atau aplikasi yang memungkinkan berbagai layanan dan aplikasi online untuk saling terhubung.
  6. sekelompok orang yang hadir atau mendengarkan suatu acara, pidato, atau presentasi
  7. berita yg tidak benar

11 Clues: informasi pribadisesuatu yg dilindungiberita yg tidak benartiktok merupakan aplikasipengambilan karangan org laininformasi yang tersedia melalui media atau produk elektroniktindakan ilegal yang dilakukan melalui internet dan komputersesuatu yang berhubungan dengan sistem komputer dan informasi...

SEDSEWWE 2023-11-10

SEDSEWWE crossword puzzle
Across
  1. - Eine positive göttliche Gabe, oft zu besonderen Anlässen gewünscht
  2. - Die festlichen Feierlichkeiten zu besonderen Anlässen
  3. - Eines der Rentiere des Weihnachtsmanns
  4. - Ein festliches Geflügelgericht, oft zu Weihnachten gegessen
  5. - Helle und warme Strahlen vom Himmel
Down
  1. - Das Geben und Empfangen von Geschenken, oft in der Familie
  2. - Ein aromatisches Kraut, oft in Süßigkeiten und Getränken verwendet
  3. - Ein immergrüner Baum, oft als Weihnachtsbaum verwendet
  4. - Ein besonderer Tag, oft arbeits
  5. - Eine angenehme und entspannte Atmosphäre, besonders zu festlichen Zeiten
  6. Montag - Der Montag nach Thanksgiving, bekannt für Online-Shopping-Angebote

11 Clues: - Ein besonderer Tag, oft arbeits- Helle und warme Strahlen vom Himmel- Eines der Rentiere des Weihnachtsmanns- Die festlichen Feierlichkeiten zu besonderen Anlässen- Ein immergrüner Baum, oft als Weihnachtsbaum verwendet- Das Geben und Empfangen von Geschenken, oft in der Familie- Ein festliches Geflügelgericht, oft zu Weihnachten gegessen...

Bullying 2023-02-27

Bullying crossword puzzle
Across
  1. Face with emotion
  2. Instagram is the platform
  3. Friendship is one of the causes
Down
  1. talking about others
  2. Another word for words (the start is V)
  3. Another for the body

6 Clues: Face with emotiontalking about othersAnother for the bodyInstagram is the platformFriendship is one of the causesAnother word for words (the start is V)

websites 2016-04-25

websites crossword puzzle
Across
  1. Threat, A blended threat is a software exploit which in turn involves a combination of attacks against different vulnerabilities. For example, many worm, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. It is a kind of computer threat.
  2. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  3. a local or restricted communications network, especially a private network created using World Wide Web software.
  4. he global communication network that allows almost all computers worldwide to connect and exchange information. Some of the early impetus for such a network came from the U.S. government network Arpanet
  5. An unauthorized user who attempts to or gains access to an information system.
  6. designed to detect and destroy computer virusesAttack, An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. Code, Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
  8. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
Down
  1. Security, The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  2. software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  3. A digital form of social engineering to deceive individuals into providing sensitive information.
  4. The process of transforming plaintext into cipher text.
  5. A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences.
  6. Horse, A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
  7. A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator
  8. A capability to limit network traffic between networks and/or information systems.
  9. Door, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
  10. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.

18 Clues: The process of transforming plaintext into cipher text.An unauthorized user who attempts to or gains access to an information system.A capability to limit network traffic between networks and/or information systems.A digital form of social engineering to deceive individuals into providing sensitive information....

Financial advice 2025-03-25

Financial advice crossword puzzle
Across
  1. personal pre tax max contribution is 7000
  2. traditional IRA contributes are made
  3. THREE maximum age to start IRA
  4. a item of value held up by belief with no physical commodity
  5. at what age can you invest in crypto
  6. currency backed by the government but not tied to physical commodity.
  7. a tax you pay towards the government thats used for retirement.
  8. what category does crypto fall under
  9. before investing in crypto only invest what your willing to… employer manages pensions
  10. measures the price performance of a basket of securities
  11. a digital ledger of transactions that duplicates and distrbutes across a network.
  12. the availability of cash or the ease in which a asset can convert to cash
Down
  1. the total value of a companies stock
  2. you can collect full benefits for social security
  3. what president created social security
  4. warren buffets first rule
  5. a total amount set aside and dedicated for a specific purpose.
  6. is when equal portions are invested at a market in intervals
  7. Roth IRA contributed are made
  8. if you leave your company you can
  9. what percentage of 18-29 invest in crypto
  10. The biggest fraud in U.S history was ..scandal
  11. Managed by employer contributions are made by you and the state.
  12. Crypto is a risk investment.
  13. social security and medicare together is called
  14. investing all you have into the market at once

26 Clues: warren buffets first ruleCrypto is a risk investment.Roth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canthe total value of a companies stocktraditional IRA contributes are madeat what age can you invest in cryptowhat category does crypto fall underwhat president created social security...

Investing Patrick McVeigh 2025-03-25

Investing Patrick McVeigh crossword puzzle
Across
  1. personal pre tax max contribution is 7000
  2. traditional IRA contributes are made
  3. THREE maximum age to start IRA
  4. a item of value held up by belief with no physical commodity
  5. at what age can you invest in crypto
  6. currency backed by the government but not tied to physical commodity.
  7. a tax you pay towards the government thats used for retirement.
  8. what category does crypto fall under
  9. before investing in crypto only invest what your willing to… employer manages pensions
  10. measures the price performance of a basket of securities
  11. a digital ledger of transactions that duplicates and distrbutes across a network.
  12. the availability of cash or the ease in which a asset can convert to cash
Down
  1. the total value of a companies stock
  2. you can collect full benefits for social security
  3. what president created social security
  4. warren buffets first rule
  5. a total amount set aside and dedicated for a specific purpose.
  6. is when equal portions are invested at a market in intervals
  7. Roth IRA contributed are made
  8. if you leave your company you can
  9. what percentage of 18-29 invest in crypto
  10. The biggest fraud in U.S history was ..scandal
  11. Managed by employer contributions are made by you and the state.
  12. Crypto is a risk investment.
  13. social security and medicare together is called
  14. investing all you have into the market at once

26 Clues: warren buffets first ruleCrypto is a risk investment.Roth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canthe total value of a companies stocktraditional IRA contributes are madeat what age can you invest in cryptowhat category does crypto fall underwhat president created social security...

Investing 2025-03-25

Investing crossword puzzle
Across
  1. Is Crypto a high or low-risk investment?
  2. Currencies that are created and backed by government, but not tied to or backed by the value of any physical commodity
  3. CEO of Berkshire Hathaway
  4. Warren Buffet’s first rule is to never ___ money.
  5. How many days do you have to rollover your 401k funds?
  6. A sum of money made available for a particular purpose
  7. For education expenses
  8. A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.
  9. Nationally or Internationally recognized, Well Established & Financially Sound Company
  10. Market Capitalization is the total ___ of a company’s stock.
  11. A Lump Sum is better for ___ Risk Tolerance Investors
  12. Roth IRA contributions are made ___ tax.
Down
  1. A fund saved for unexpected expenses.
  2. For planned expenses like a new car or vacation
  3. For unexpected events, such as a tornado
  4. A mutual fund takes cash from ___ and invests in stocks, bonds, and other securities.
  5. Age to receive full social security benefits
  6. Traditional IRA contributions are made ___ tax.
  7. Make money with stocks by Buying ___ and selling ___
  8. Which President created Social Security?
  9. A Blue Chip Company is an example of a liquid or illiquid stock?
  10. Markets rising
  11. Social Security and Medicare taxes
  12. Markets falling
  13. A collection of stocks, bonds, or other assets that trades on a stock exchange

25 Clues: Markets risingMarkets fallingFor education expensesCEO of Berkshire HathawaySocial Security and Medicare taxesA fund saved for unexpected expenses.Is Crypto a high or low-risk investment?For unexpected events, such as a tornadoWhich President created Social Security?Roth IRA contributions are made ___ tax....

1.8 Summarize evolving use cases for modern network environments 2025-08-06

1.8  Summarize evolving use cases for modern network environments crossword puzzle
Across
  1. Allows one place to manage network rules and settings
  2. Wraps IPv6 traffic so it can travel over an IPv4 network
  3. Auto configures new devices without manual setup
  4. Gives users only the access they absolutely need
  5. Uses code to provision and manage IT infrastructure
  6. Lets devs work on separate features without conflict
  7. Tracks changes made to code and allows rollbacks
  8. Used for Layer 2 over Layer 3 tunneling in data centers
  9. Extends SDN to wide area networks for better performance
  10. Enforces access based on set conditions and user roles
  11. Separates control and data planes to simplify network management
Down
  1. Central place where code is stored and managed
  2. Adjusts network behavior based on type of traffic or app
  3. Designed to replace IPv4 and fix address exhaustion
  4. Grants permission to access network resources
  5. Can use any type of network link like LTE, broadband, or MPLS
  6. Used in automation tools like Ansible for repeatable tasks
  7. Runs IPv4 and IPv6 on the same system side by side
  8. Network security model with no implicit trust
  9. Connects two or more data center locations
  10. Subset of SASE focused purely on security services
  11. Happens when config changes outside the defined code
  12. Dynamic list of systems automatically updated for automation
  13. Framework that combines networking and security in the cloud
  14. Allows IPv6-only devices to communicate with IPv4 hosts

25 Clues: Connects two or more data center locationsGrants permission to access network resourcesNetwork security model with no implicit trustCentral place where code is stored and managedAuto configures new devices without manual setupGives users only the access they absolutely needTracks changes made to code and allows rollbacks...

When will the nations proclaim ‘peace and security’? 2025-11-24

When will the nations proclaim ‘peace and security’? crossword puzzle
Across
  1. Inspired foretelling of events, such as Paul’s words to the Thessalonians
  2. The state of readiness needed to avoid being overtaken like a thief
  3. The apostle who wrote about “peace and security” to the Thessalonians
  4. The illustration Paul used to describe how destruction overtakes the unsuspecting
  5. The congregation that received Paul’s inspired letter about sudden destruction
  6. Modern organization symbolized by the scarlet-colored wild beast (two words)
  7. The attitude Jesus counseled his followers to maintain
  8. The second half of the proclamation that signals sudden destruction
  9. Found in Babylon the Great, symbolizing her guilt for wars and violence
  10. The world empire of false religion, also called the great prostitute
  11. The manner in which destruction will come upon the nations
Down
  1. The great time of distress that begins with the fall of Babylon the Great
  2. The first half of the proclamation mentioned by Paul in 1 Thessalonians 5:3
  3. The one who puts "his thought" into the hearts of the nations
  4. What comes instantly after the cry of “peace and security”
  5. Symbolic political powers that give authority to the wild beast
  6. The state of prophecy once events have actually taken place
  7. The global system opposed to true worship, destined for destruction
  8. The scarlet-colored entity representing the United Nations (two words)
  9. What describes the kind of religion that will be destroyed

20 Clues: The attitude Jesus counseled his followers to maintainWhat comes instantly after the cry of “peace and security”What describes the kind of religion that will be destroyedThe manner in which destruction will come upon the nationsThe state of prophecy once events have actually taken placeThe one who puts "his thought" into the hearts of the nations...

En El Aeropuerto 2023-10-26

En El Aeropuerto crossword puzzle
Across
  1. suitcase
  2. terminal
  3. seat
  4. security
  5. pilot
  6. flight attendant
Down
  1. luggage
  2. airport
  3. desk/booth
  4. passport
  5. customs/immigration
  6. flight
  7. airplane
  8. ticket

14 Clues: seatpilotflightticketluggageairportpassportsuitcaseterminalsecurityairplanedesk/boothflight attendantcustoms/immigration

Travel Chap 4 vocab 2020-04-02

Travel Chap 4 vocab crossword puzzle
Across
  1. controller
  2. safety belt
  3. flight attendent
  4. to miss
  5. passenger
  6. trip; travel
  7. seat
  8. customs
  9. visa
  10. event ticket
  11. sleeping car
  12. to get/obtain
  13. arrival
  14. to land
  15. bunk
  16. aisle
  17. international airport
  18. to hope
  19. waiting room
  20. flight
  21. to give
  22. to see
  23. second class
  24. security agent
  25. on time
Down
  1. passport
  2. gate
  3. coach
  4. boarding pass
  5. platform
  6. luggage screening
  7. carry-on baggage
  8. in the airport
  9. connection
  10. baggage claim
  11. ticket window
  12. to go through security
  13. departure
  14. delayed
  15. window
  16. to take off
  17. car wagon
  18. first class
  19. suitcase
  20. counter
  21. to board
  22. to check luggage
  23. to go straight
  24. in the train station
  25. stop
  26. ticket
  27. delayed
  28. ticket
  29. to turn

54 Clues: gateseatvisabunkstopcoachaislewindowflightticketto seeticketto misscustomsdelayedarrivalto landcounterto hopeto givedelayedto turnon timepassportplatformsuitcaseto boardpassengerdeparturecar wagoncontrollerconnectionsafety beltto take offfirst classtrip; travelevent ticketsleeping carwaiting roomsecond classboarding passbaggage claimticket window...

aviation 2024-07-01

aviation crossword puzzle
Across
  1. where you go to change your money.
  2. where you get on the plane, or where the plane is sitting.
  3. where you go when you are flying somewhere.
  4. something 2 airlines do.
  5. flight thats destination is within the same country.
  6. to reduce lift and increase drag.
  7. abbreviation for passengers.
  8. flight coming into our country.
  9. abbreviation for on time performance.
Down
  1. main body of the plane.
  2. a crash or collision on the runway.
  3. helps turn the plane.
  4. flight leaving our country.
  5. illegal things like drugs.
  6. after youve gone through security you are here.
  7. where general public can be in an airport.
  8. pockets of disturbed air.
  9. where you and your carry on luggage get checked.
  10. where you go when you first get to the airport.
  11. abbreviation for senior flight attendant.

20 Clues: helps turn the plane.main body of the plane.something 2 airlines do.pockets of disturbed air.illegal things like drugs.flight leaving our country.abbreviation for passengers.flight coming into our country.to reduce lift and increase drag.where you go to change your money.a crash or collision on the runway.abbreviation for on time performance....

Wellbeing 2021-08-22

Wellbeing crossword puzzle
Across
  1. Areas of or occupying different spaces
  2. Being free from danger or threats
  3. The people who live in a certain place
  4. The study of human populations
  5. The ability to be maintained at a certain level
  6. Living without access to basic needs and income
  7. Death
  8. The process of using resources
  9. The facilities needed for a society to function
  10. Something that shows the state of wellbeing
  11. A subjective measurement of perceived value
Down
  1. An objective measurement of numerical value
  2. An individual’s level of health, security and comfort
  3. A prediction about how things will occur
  4. Levels of wealth and social interactions
  5. The ability to reproduce
  6. The patterns in which things are spread out in an area
  7. A process of growth or advancement
  8. Clean water and waste removal systems
  9. A comparison of different rates of an occurrence

20 Clues: DeathThe ability to reproduceThe study of human populationsThe process of using resourcesBeing free from danger or threatsA process of growth or advancementClean water and waste removal systemsAreas of or occupying different spacesThe people who live in a certain placeA prediction about how things will occurLevels of wealth and social interactions...

Thirteen Days 2023-01-22

Thirteen Days crossword puzzle
Across
  1. United States Junior senetor from New York
  2. country with communist government
  3. meeting room for the cabinet secretaries
  4. an unsuccesful invasion of Cuban exiles
  5. United States's prime federal law enforcement agency
  6. was Main security agency for the soviet union
  7. state of political tension between US and soviet
  8. Intergovernmental organization to stop wars
  9. Cuban prime minister from 1959 1976
Down
  1. 35th President of the United States
  2. High-altitude reconnassiance aircraft
  3. Country between Canada and Mexico
  4. John F. Kennedy confrence room in basement
  5. five progressive levels of alerts used by the US
  6. Organisation of the US used for global monitoring
  7. gathers and analyzes national security information
  8. Soviet politician during the cold war
  9. closing off a place by hostile
  10. Country by the gulf of Mexico and the Atlantic ocean
  11. Most commonly refers to the Soviet Union

20 Clues: closing off a place by hostileCountry between Canada and Mexicocountry with communist government35th President of the United StatesCuban prime minister from 1959 1976High-altitude reconnassiance aircraftSoviet politician during the cold waran unsuccesful invasion of Cuban exilesmeeting room for the cabinet secretaries...

cw-13 2025-11-17

cw-13 crossword puzzle
Across
  1. (Duplicate) Tracking origin and consequence of breaches
  2. Unfair AI outcomes affecting certain groups disproportionately
  3. Passing along a risk/job to someone else
  4. Ethical hacking test of defenses
  5. Summarized results or status document
  6. Defensive security professionals
  7. Technical drawing illustrating data processing pathways
  8. Host-based Intrusion Detection System acronym
  9. (Triplicate) Standard plan to survive IT disasters
  10. Unlocking secret messages with the right key
  11. Industry-recognized certification from IAPP .
  12. Platform used at Tekion for employee compliance and workplace training.
Down
  1. Critical security gate in Tekion’s development lifecycle.
  2. Keeping information secret
  3. What to do to fix trouble spots
  4. Company’s process for oversight and control
  5. Process of grouping personal data into collective insights while masking individual identities
  6. (Duplicate) Collected facts for incident investigation
  7. Importance level assigned to system resources
  8. Payments solution developed and secured by Tekion.

20 Clues: Keeping information secretWhat to do to fix trouble spotsEthical hacking test of defensesDefensive security professionalsSummarized results or status documentPassing along a risk/job to someone elseCompany’s process for oversight and controlUnlocking secret messages with the right keyHost-based Intrusion Detection System acronym...

McKnight Crossword 2024-09-27

McKnight Crossword crossword puzzle
Across
  1. at McKnight we are the
  2. bald security guard
  3. teacher who plays French horn
  4. the kind of standing you have to be on to attend dances and events
  5. the Lancer Way is respect, responsibility, integrity, and
  6. one of the tallest seventh graders
  7. name of 8th grade assistant principal
  8. name of 7th grade assistant principal
  9. she's on the Eastside FC soccer team
  10. used to teach math but now teaches PE
Down
  1. security guard with dreads
  2. nice loud best student who plays basketball and has lots of friends
  3. our school colors are black, grey, yellow, and
  4. name of principal
  5. tallest teacher
  6. she'll find your fingerprint because she teaches forensics
  7. likes funko pops and teaches math
  8. teacher who likes classical music
  9. obsessed with Walker Scobell

19 Clues: tallest teachername of principalbald security guardat McKnight we are thesecurity guard with dreadsobsessed with Walker Scobellteacher who plays French hornlikes funko pops and teaches mathteacher who likes classical musicone of the tallest seventh gradersshe's on the Eastside FC soccer teamname of 8th grade assistant principal...

Cursinho crossword 2024-04-29

Cursinho crossword crossword puzzle
Across
  1. The act of including everyone and making them feel welcome.
  2. Consequences or outcomes of bullying behavior.
  3. Bullying involving physical force or harm.
  4. Measures or policies aimed at preventing bullying.
  5. Understanding and sharing the feelings of others.
Down
  1. Repeated aggressive behavior intended to harm others.
  2. Treating others with consideration and admiration.
  3. Bullying involving manipulation of social relationships.
  4. Bullying that occurs online or through digital communication.
  5. Measures taken to stop bullying before it occurs.
  6. A group of people sharing common interests or living in the same area.
  7. Bullying using words to harm others.

12 Clues: Bullying using words to harm others.Bullying involving physical force or harm.Consequences or outcomes of bullying behavior.Measures taken to stop bullying before it occurs.Understanding and sharing the feelings of others.Treating others with consideration and admiration.Measures or policies aimed at preventing bullying....

Bullying 2021-11-15

Bullying crossword puzzle
Across
  1. Threats or verbal abuse
  2. A bully is identified not how they look, but rather by their
  3. _____ someone from a group is a form of bullying.
  4. Being a bully makes you a smaller person. Helping others makes you a ____ person.
  5. Bullies can get you in
  6. Bullies can call you
  7. Bullying can be done by an individual or
Down
  1. Bullying can be physical or
  2. Bullying online is called ____ bullying.
  3. If you are bullied, tell an
  4. Bystanders can make bullying worse when they do not
  5. If you see bullying, do not be a

12 Clues: Bullies can call youBullies can get you inThreats or verbal abuseBullying can be physical orIf you are bullied, tell anIf you see bullying, do not be aBullying online is called ____ bullying.Bullying can be done by an individual or_____ someone from a group is a form of bullying.Bystanders can make bullying worse when they do not...

"INFORMATION TECHNOLOGY" 2025-02-12

"INFORMATION TECHNOLOGY" crossword puzzle
Across
  1. relating to or characteristic of the culture of computers, information technology, and virtual reality
  2. creative ability
  3. tools, machinery, and other durable equipment
  4. a first, typical or preliminary model of something
  5. packed together
Down
  1. quick-drying nonmetallic element
  2. made to appear to exist by the use of computer software
  3. a relationship in which a person, thing, or idea is linked or associated with something else
  4. a small usually thin and flat piece
  5. using radio, microwaves to transmit signals
  6. to enable the fast exchange of information
  7. a small mechanical or electronic device or tool

12 Clues: packed togethercreative abilityquick-drying nonmetallic elementa small usually thin and flat pieceto enable the fast exchange of informationusing radio, microwaves to transmit signalstools, machinery, and other durable equipmenta small mechanical or electronic device or toola first, typical or preliminary model of something...

The Crypt 2025-10-04

The Crypt crossword puzzle
Across
  1. Atomic bomb architect turning fission into global deterrence.
  2. Motion laws founder guiding artillery and missile paths.
  3. Radioactivity isolator whose elements enable dirty bombs.
  4. Optics innovator whose lenses evolved into spy satellites.
  5. Uncertainty expert whose physics secures quantum warfare encryption.
  6. Rocket designer whose trajectories fuel ICBM strikes.
Down
  1. Reactor builder whose chains drive submarine nukes.
  2. Electromagnetism inventor inspiring directed-energy weapons.
  3. Mass-energy pioneer whose equation powers nuclear warheads.
  4. Fertilizer chemist whose gases became WWI trench poisons.
  5. Quantum theorist whose models power laser battlefield tech.
  6. Algorithm genius whose codes birthed cyber attack tools.

12 Clues: Reactor builder whose chains drive submarine nukes.Rocket designer whose trajectories fuel ICBM strikes.Motion laws founder guiding artillery and missile paths.Algorithm genius whose codes birthed cyber attack tools.Radioactivity isolator whose elements enable dirty bombs.Fertilizer chemist whose gases became WWI trench poisons....

School Crossword 2024-04-17

School Crossword crossword puzzle
Across
  1. Uses painting, sketching, sculpting
  2. Also known as social studies, about the past
  3. Acronym for "Physical Education", sports
  4. Playing a board game with pawns, rooks, knights, etc.
  5. Playing instruments to make songs
  6. Expressing yourself through movement to a song
  7. Some types of it are chemistry, biology, and space
  8. Using numbers and symbols to calculate things
  9. Designing an building structures
  10. Using robots and legos through programming
Down
  1. The things/activity done in PE
  2. Also known as acting
  3. Reading and Writing are both apart of this subject
  4. Designing technology to a cyber level
  5. The language used in Cuba, Puerto Rico, Spain, etc.
  6. The "umbrella term" for chorus, band, dance, etc.
  7. Singing songs and music in a group

17 Clues: Also known as actingThe things/activity done in PEDesigning an building structuresPlaying instruments to make songsSinging songs and music in a groupUses painting, sketching, sculptingDesigning technology to a cyber levelAcronym for "Physical Education", sportsUsing robots and legos through programmingAlso known as social studies, about the past...

Crossword Gleitzbe 2020-03-02

Crossword Gleitzbe crossword puzzle
Across
  1. Ursache
  2. emotional
  3. Klima
  4. mächtig, kräftig, stark
  5. glänzend
  6. Feuerwehrmann
  7. Dürre, Trockenheit
  8. Reservat, Reservation
  9. sprechend
  10. Entdeckung
  11. Sicherheit
Down
  1. vergleichen
  2. Stille, Schweigen
  3. Schritt
  4. Umwelt
  5. staubig
  6. Ödland
  7. Lagerfeuer
  8. Flamme
  9. neutral
  10. Brühmtheit
  11. verbrannt
  12. Motor, Maschine
  13. Prärie

24 Clues: KlimaUmweltÖdlandFlammePrärieUrsacheSchrittstaubigneutralglänzendemotionalverbranntsprechendLagerfeuerBrühmtheitEntdeckungSicherheitvergleichenFeuerwehrmannMotor, MaschineStille, SchweigenDürre, TrockenheitReservat, Reservationmächtig, kräftig, stark

Do you know the words? 2021-01-08

Do you know the words? crossword puzzle
Across
  1. Sitzplatz
  2. lösen
  3. Privatsphäre
  4. aufsperren
  5. Sicherheit
  6. befördern
  7. Akku
  8. Freiwillige
  9. Kopfkissen
  10. verhindern
  11. Netzwerk
  12. Behinderung
  13. Reifen
  14. kompliziert
  15. Raum
Down
  1. Windschutzscheibe
  2. nachverfolgen
  3. Reparatur
  4. Waren
  5. verbessern
  6. Daten
  7. Drohne
  8. Dach
  9. Haushaltsgeräte
  10. Lautsprecher
  11. Roboter
  12. verringern

27 Clues: DachAkkuRaumlösenWarenDatenDrohneReifenRoboterNetzwerkSitzplatzReparaturbefördernverbessernaufsperrenSicherheitKopfkissenverhindernverringernFreiwilligeBehinderungkompliziertPrivatsphäreLautsprechernachverfolgenHaushaltsgeräteWindschutzscheibe

Vizzard Challenge 2016-12-19

Vizzard Challenge crossword puzzle
Across
  1. r
  2. w
  3. n
  4. v
  5. Final
  6. b
  7. e
  8. q
  9. g
  10. j
  11. d
  12. s
  13. y
Down
  1. h
  2. k
  3. x
  4. t
  5. z
  6. o
  7. c
  8. i
  9. u
  10. l
  11. a
  12. p
  13. f
  14. m

27 Clues: hrkwnvxtzociulabeqgpfjdsmyFinal

gkhvvvlxxv 2021-10-14

gkhvvvlxxv crossword puzzle
Across
  1. hurry
  2. long but more
  3. straight
  4. alone
  5. youtube reaction vid
  6. saving
  7. safety
  8. ball hit target
  9. quizzes
  10. cream
  11. children
Down
  1. car place
  2. sunny city
  3. chicken
  4. carfuel
  5. come over
  6. close
  7. all of the things
  8. just us
  9. staying alive

20 Clues: hurryclosealonecreamsavingsafetychickencarfueljust usquizzesstraightchildrencar placecome oversunny citylong but morestaying aliveball hit targetall of the thingsyoutube reaction vid

unit 2 lesson 4 Sam 2023-12-06

unit 2 lesson 4 Sam crossword puzzle
Across
  1. kogels
  2. monument
  3. marinier
  4. burger
  5. pot
  6. plicht(millitaire dienst}
  7. geschikt
  8. zenuwachtig
  9. je hebt brandweer ambulance en .....
  10. beveiliger
Down
  1. vrijheid
  2. gevecht
  3. je kan er mee vliegen (geen vliegtuig)
  4. verpleegkundige
  5. leger
  6. echt
  7. boete
  8. bom
  9. tegen overgesteld van onveilig
  10. geweer

20 Clues: potbomechtlegerboetekogelsburgergeweergevechtvrijheidmonumentmariniergeschiktbeveiligerzenuwachtigverpleegkundigeplicht(millitaire dienst}tegen overgesteld van onveiligje hebt brandweer ambulance en .....je kan er mee vliegen (geen vliegtuig)

Scene 3 Society 2024-10-08

Scene 3 Society crossword puzzle
Across
  1. oikeus
  2. demokratia
  3. kansalainen
  4. viranomaiset
  5. verot
  6. hyvinvointi
  7. maastamuuttaja
  8. tasa-arvo
  9. sosiaaliturva
  10. tasavalta
  11. yhteiskunta
Down
  1. maahanmuuttaja
  2. yhteisö
  3. terveydenhuolto
  4. yhteiskuntaoppi
  5. köyhyys
  6. pakolainen
  7. koulutus
  8. turvapaikanhakija
  9. epätasa-arvo
  10. velvollisuus
  11. etninen tausta
  12. talous

23 Clues: verotoikeustalousyhteisököyhyyskoulutustasa-arvotasavaltademokratiapakolainenkansalainenhyvinvointiyhteiskuntaviranomaisetepätasa-arvovelvollisuussosiaaliturvamaahanmuuttajamaastamuuttajaetninen taustaterveydenhuoltoyhteiskuntaoppiturvapaikanhakija

Taxes Vocabulary Crossword 2026-02-20

Taxes Vocabulary Crossword crossword puzzle
Across
  1. Money your employer takes from your paycheck for taxes.
  2. Document detailing gross pay, taxes withheld, and net pay. (Note The text sometimes uses the two-word "pay stub," but "PAYSTUB" is standard for crossword entries ).
  3. Spending required by law for programs like Social Security.
  4. Money given back to you if you overpaid your taxes.
  5. A fixed dollar amount that lowers your taxable income (Standard Deduction).
  6. Spending the government must approve annually, like education.
  7. Total take-home pay after all deductions have been subtracted.
  8. An official request for more time to file a tax return, usually until October.
Down
  1. Total earnings before taxes and other deductions are removed.
  2. Tax (Self-Employment Contributions Act) that self-employed people pay for Social Security and Medicare.
  3. Payroll taxes (Federal Insurance Contributions Act) that fund Social Security and Medicare.
  4. The act of sending your completed tax return to the IRS.
  5. Tax system where the tax rate increases as income increases.
  6. Federal health insurance program for seniors funded by FICA taxes.
  7. Tax system where all taxpayers pay the same percentage.
  8. Any amount taken from your gross pay for taxes or benefits.
  9. A person supported financially who allows a tax benefit.

17 Clues: Money given back to you if you overpaid your taxes.Money your employer takes from your paycheck for taxes.Tax system where all taxpayers pay the same percentage.The act of sending your completed tax return to the IRS.A person supported financially who allows a tax benefit.Spending required by law for programs like Social Security....

EUREKA 2012-11-04

EUREKA crossword puzzle
Across
  1. Petroleum=Petra(_____)+Oleum(Oil)(4)
  2. First country to declare itself as small pox free(5)
  3. If you are on the Cassini Division, where are you?(6)
  4. Driest desert on Earth.(7)
  5. A lepidopterist collects a __________(9)
  6. Rarest element on Earth.(8)
  7. The scientist who coined the term ‘Electric Fluid'(8,8)
  8. Ho
Down
  1. Fear of computers - __________phobia(5)
  2. New satellite being developed by ISRO to learn about Sun(6)
  3. The Earth hour was first started in this city(6)
  4. How is ‘Citrullus Vulgaris’ better known to us?(10)
  5. Study of humans.(12)
  6. Oil of Vitriol - __________ acid(9)
  7. Little boy-Uranium, Fatman -_________(9)
  8. Company which has its tagline as ‘Invented for life(5)

16 Clues: HoStudy of humans.(12)Driest desert on Earth.(7)Rarest element on Earth.(8)Oil of Vitriol - __________ acid(9)Petroleum=Petra(_____)+Oleum(Oil)(4)Fear of computers - __________phobia(5)A lepidopterist collects a __________(9)Little boy-Uranium, Fatman -_________(9)The Earth hour was first started in this city(6)...

Cyberbullying 2021-05-05

Cyberbullying crossword puzzle
Across
  1. bully cant contact you after you ___ them
  2. blood relative that can give support
  3. message sent from a phone
  4. leaving out someone on purpose
  5. role model in school that can give support
  6. Handheld device
  7. when someone post constant mean comments they are ___ me
  8. social media plafroms allow you to ___ a negative comment
  9. deliberate act to publically humiliate someone
  10. someone who you trust for support
Down
  1. people post hurtfull_______ underneath my post
  2. when another pretends to be someone they are not
  3. someone who tries constantly to annoy someone on the interent
  4. the most common emotion from being cyberbullied
  5. When getting cyber bullied it is best to seek out ____
  6. not giving attention to the bully

16 Clues: Handheld devicemessage sent from a phoneleaving out someone on purposenot giving attention to the bullysomeone who you trust for supportblood relative that can give supportbully cant contact you after you ___ themrole model in school that can give supportpeople post hurtfull_______ underneath my postdeliberate act to publically humiliate someone...

CNSSINST 4009 (2005) 2022-11-30

CNSSINST 4009 (2005) crossword puzzle
Across
  1. What is the PUB CNSSINT 4009 (2015)?
  2. The process of verifying the identity or other attributes claimed by or assumed
  3. The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals.
  4. The property of being accessible and useable upon demand by an authorized entity
  5. an entity (user, process, or device), or to verify the source and integrity of
  6. Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
  7. policy.
  8. A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related
Down
  1. The official management decision given by a senior organizational official to
  2. organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
  3. A category within a given security classification limiting entry or system connectivity to only authorized persons.
  4. Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.
  5. Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the
  6. Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts
  7. operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or
  8. of systems.
  9. The process of granting or denying specefic request:1) for obtaining and using information and related information processing services.

17 Clues: policy.of systems.What is the PUB CNSSINT 4009 (2015)?The official management decision given by a senior organizational official toan entity (user, process, or device), or to verify the source and integrity ofThe process of verifying the identity or other attributes claimed by or assumed...

11.5 2023-03-28

11.5 crossword puzzle
Across
  1. The implementation name for wireless security that adheres to the 802.11i specifications.
  2. This proves the users identity.
  3. This combines two non-overlapping 20MHZ channels into a single 40MHz channel.
  4. Many networks implement this.
  5. This was developed at MIT and is a key component of Windows Active Directory.
  6. This increases bandwidth by using multiple antennas for both the transmitter and receiver.
  7. This logs what the user accessed while on the network.
Down
  1. This defines what the user can access.
  2. This is the standard for local networks created by IEEE-SA.
  3. This has no authentication and allows anyone to connect to the network.
  4. This was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
  5. This uses radio waves to transmit data from small circuit boards to special scanners.
  6. This is a newer technology that is built on RFID.
  7. This was developed by Cisco to address security concerns in RADIUS.
  8. This is based on the Rijndael algorithm.
  9. This was used with WPA and WPA2 wireless security standards.
  10. This is and enhancement to MIMO that allows users to use the same channel.
  11. This is designed to allow devices to communicate withing a personal area network of close proximity.
  12. This is most commonly used access method.
  13. This is an open standard protocol used to authenticate users onto a network.

20 Clues: Many networks implement this.This proves the users identity.This defines what the user can access.This is based on the Rijndael algorithm.This is most commonly used access method.This is a newer technology that is built on RFID.This logs what the user accessed while on the network.This is the standard for local networks created by IEEE-SA....

Investing Patrick McVeigh 2025-03-25

Investing Patrick McVeigh crossword puzzle
Across
  1. investing all you have into the market at once
  2. what category does crypto fall under
  3. if you leave your company you can
  4. the total value of a companies stock
  5. before investing in crypto only invest what your willing to… employer manages pensions
  6. at what age can you invest in crypto
  7. The biggest fraud in U.S history was ..scandal
  8. a item of value held up by belief with no physical commodity
  9. you can collect full benefits for social security
  10. traditional IRA contributes are made
  11. the availability of cash or the ease in which a asset can convert to cash
  12. currency backed by the government but not tied to physical commodity.
  13. a total amount set aside and dedicated for a specific purpose.
  14. social security and medicare together is called
  15. is when equal portions are invested at a market in intervals
Down
  1. what president created social security
  2. THREE maximum age to start IRA
  3. a tax you pay towards the government thats used for retirement.
  4. personal pre tax max contribution is 7000
  5. warren buffets first rule
  6. Crypto is a risk investment.
  7. measures the price performance of a basket of securities
  8. what percentage of 18-29 invest in crypto
  9. Managed by employer contributions are made by you and the state.
  10. Roth IRA contributed are made
  11. a digital ledger of transactions that duplicates and distrbutes across a network.

26 Clues: warren buffets first ruleCrypto is a risk investment.Roth IRA contributed are madeTHREE maximum age to start IRAif you leave your company you canwhat category does crypto fall underthe total value of a companies stockat what age can you invest in cryptotraditional IRA contributes are madewhat president created social security...

Snyky Clues 2026-04-08

Snyky Clues crossword puzzle
Across
  1. Existing vulnerabilities not yet remediated
  2. Action taken to remediate a vulnerability
  3. Tool that scans code and dependencies for vulnerabilities
  4. Security scanning for infrastructure defined through code
  5. Backlog burndown target of ninety days for external exposures
  6. Ticket opened for exception requests such as risk acceptance, SLA extensions, or complex fixes needing review
  7. Reducing risk through controls or changes without fully fixing the vulnerability
  8. Publicly exposed repositories require stricter SLAs
  9. What engineers do to categorize repositories and determine applicable SLAs and priorities
  10. Non-public repositories allow more context-based prioritization
  11. Team that supports, reviews, and helps guide risk decisions and exceptions
  12. Finding that appears to be a vulnerability but is not actually exploitable
Down
  1. Formal decision to accept a risk instead of fixing it
  2. Teams responsible for addressing vulnerabilities as part of the development workflow
  3. Where fixes and vulnerability findings appear in development workflow
  4. Individual or team accountable for evaluating and accepting a specific risk
  5. High severity SLA in days for external exposures
  6. Record used to document and track accepted risks over time
  7. Backlog burndown target of sixty days for external exposures
  8. Medium severity SLA in days for external exposures
  9. Defined timeframe to address new vulnerabilities
  10. Backlog burndown target of thirty days for external exposures
  11. Critical severity SLA in days for external exposures
  12. Security testing performed directly on application source code

24 Clues: Action taken to remediate a vulnerabilityExisting vulnerabilities not yet remediatedHigh severity SLA in days for external exposuresDefined timeframe to address new vulnerabilitiesMedium severity SLA in days for external exposuresPublicly exposed repositories require stricter SLAsCritical severity SLA in days for external exposures...

history crossword 7 2022-12-14

history crossword 7 crossword puzzle
Across
  1. AAA
  2. roosevelt
  3. CCC
  4. bank-holiday
  5. demagogues
Down
  1. social-security-act
  2. fireside-chats
  3. new-deal

8 Clues: AAACCCnew-dealrooseveltdemagoguesbank-holidayfireside-chatssocial-security-act

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. One of the researchers/economists who developed the CAPM model
  2. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  3. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
  4. --------------------is the slope of the security characteristic line
  5. The line representing CAPM is the -----------------market line
  6. A conditional market order to sell stock if it drops to a given price (write without space)
  7. The other name for non-diversifiable risk is -------------------------risk
  8. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  9. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
  10. An opportunity where an investor earns riskless profit without making any net investment
Down
  1. CAPM is a market --------------model
  2. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
  3. In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable
  4. The economist who developed the Arbitrage Pricing Theory (APT) model
  5. The other name for indifference curve is --------------curve
  6. Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
  7. The economist who laid the foundations for the Modern Portfolio theory
  8. In the absence of secondary markets, this risk would be higher
  9. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions

19 Clues: CAPM is a market --------------modelThe other name for indifference curve is --------------curveOne of the researchers/economists who developed the CAPM modelThe line representing CAPM is the -----------------market lineIn the absence of secondary markets, this risk would be higher--------------------is the slope of the security characteristic line...

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  2. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  5. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  8. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  9. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  10. OF SERVICE (DOS)
Down
  1. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  4. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  5. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  6. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  7. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
  8. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  9. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  10. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  11. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.

21 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang....

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  2. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  3. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  4. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  5. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  6. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  7. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  8. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  9. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
Down
  1. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  2. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  4. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  5. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  6. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  7. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  8. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  9. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  10. OF SERVICE (DOS)
  11. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  12. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.

21 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang....

Terms 2021-08-20

Terms crossword puzzle
Across
  1. the "P" in PED
  2. the W in JWICS stands for
  3. Signals intelligence is abbreviated as
  4. the "C" in JWICS
  5. FDO is the Foreign _______ Officer
  6. information protected by SI caveat
  7. SIO is the ________ Intelligence Officer
  8. You signed an NDA when you were first read into this information
Down
  1. each facility must have an Emergency _____ Plan
  2. The "A" in SAP stands for
  3. Codeword for the U-2 program in the 50s
  4. CSA is Cognizant Security ________
  5. ORCON stands for ________ Controlled
  6. Each time you are INDOCed into SCI you sign a Non-________ Statement
  7. Codeword for the corona satellite program in the 60s
  8. Sub-compartment of SI
  9. Intelligence gained from human efforts
  10. the "C" in the acronym IC
  11. SSO stands for ______ Security Officer
  12. We mainly work in Sensitive _______ Information Facilities

20 Clues: the "P" in PEDthe "C" in JWICSSub-compartment of SIThe "A" in SAP stands forthe W in JWICS stands forthe "C" in the acronym ICCSA is Cognizant Security ________FDO is the Foreign _______ Officerinformation protected by SI caveatORCON stands for ________ ControlledSignals intelligence is abbreviated asIntelligence gained from human efforts...

E-safety 2020-05-06

E-safety crossword puzzle
Across
  1. something designs to break your computer
  2. don't share any ..... information
  3. you don't know these people
  4. these people try to get your personal information
Down
  1. what is bullying online
  2. something you should have in a password
  3. don't open any ..... from strangers
  4. something lots of people worldwide use
  5. what kind of person do you talk to when you are worried

9 Clues: what is bullying onlineyou don't know these peopledon't share any ..... informationdon't open any ..... from strangerssomething lots of people worldwide usesomething you should have in a passwordsomething designs to break your computerthese people try to get your personal informationwhat kind of person do you talk to when you are worried

Hacktivism Vocabulary Crossword 2 2023-05-09

Hacktivism Vocabulary Crossword 2 crossword puzzle
Across
  1. protecting an organization and its employees against cyber threats
  2. a person or thing likely to cause damage or danger
  3. a hacker with bad intentions
Down
  1. an attempt by hackers to damage or destroy a computer network or system
  2. a legal hacker hired by a company or government
  3. reveal
  4. take something that is not yours
  5. to search

8 Clues: revealto searcha hacker with bad intentionstake something that is not yoursa legal hacker hired by a company or governmenta person or thing likely to cause damage or dangerprotecting an organization and its employees against cyber threatsan attempt by hackers to damage or destroy a computer network or system

Vocabulario - el aeropuerto crucigrama 2024-05-13

Vocabulario - el aeropuerto crucigrama crossword puzzle
Across
  1. - the hallwaybaggage claim
  2. - the cabin
  3. - suitcase
  4. - the sign
  5. - the ticket
  6. - exit
  7. - arrival
  8. - the counter
  9. - the luggage
Down
  1. - the window
  2. to fly
  3. - begin
  4. - customs
  5. - the flight
  6. - the seat
  7. - security
  8. - the trip
  9. - the passanger
  10. - delay

19 Clues: to fly- exit- begin- delay- customs- arrival- suitcase- the seat- the sign- security- the trip- the cabin- the window- the flight- the ticket- the counter- the luggage- the passanger- the hallwaybaggage claim

The Outsiders 2021-01-12

The Outsiders crossword puzzle
Across
  1. - entertainment
  2. - place of worship
  3. - snack
  4. - security
  5. - parking
  6. - cancer stick
  7. - dangerous
  8. - clothing
Down
  1. - hood
  2. - educational
  3. - facts
  4. - dessert
  5. - car
  6. - from ur head
  7. - knife
  8. - cool and edgy

16 Clues: - car- hood- facts- snack- knife- dessert- parking- security- clothing- dangerous- educational- from ur head- cancer stick- entertainment- cool and edgy- place of worship

CHAPTER #13 2014-12-26

CHAPTER #13 crossword puzzle
Across
  1. Describes a sentence where the defendant is credited immediately after the guilty verdict with the time spent in jail awaiting trial.
  2. Jails that allow for the continuous observation for inmates.
  3. Used when all prisoners are locked in their cells to prevent a riot or unrest from spreading or during an emergency.
  4. Allow for continuous observation for inmates.
  5. Designed for prisoners regarded as being less dangerous; having fewer restrictions.
  6. Facilities that provide the highest level of prison security.
  7. Prisoners are together, side by side, during work, meals, and prayer but return to solitary cells at night.
  8. A theory that involves information collecting, individualization, treatment, relaxation of rules.
Down
  1. Heightened classification based on inmate's crime and behavior while incarcerated.
  2. Time period that you are incarcerated between being arrested and your trial.
  3. Place of punishment for offenses against the state, also a place of penance or house of correction.
  4. is a form of prison management based on the principle of keeping prisoners in solitary confinement.
  5. Cells are clustered around a common area and a control booth from which an officer observes inmate activity.
  6. A person responsible for the supervision of a prison, for ensuring that regulations associated with it are obeyed.
  7. Place in which individuals are physically confined or interned by a third party that is contracted by a government agency.
  8. The most secure levels of custody in the prison systems.
  9. A place for the confinement of people accused or convicted of a crime, a sentence is usually a year or less.

17 Clues: Allow for continuous observation for inmates.The most secure levels of custody in the prison systems.Jails that allow for the continuous observation for inmates.Facilities that provide the highest level of prison security.Time period that you are incarcerated between being arrested and your trial....

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
  2. Datenverarbeitungsregisternummer.
  3. Echtzeit chatten.
  4. Verbreitet sich direkt über Netze.
Down
  1. Personen werden mit Hilfe von elektronischen Medien verletzt.
  2. Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
  3. Sie dringen illegal in Computersysteme ein.
  4. Werbemails die unerwünscht sind nennt man auch?
  5. Diese Viren sind als ein Programm in eine Datei eingebetet?
  6. Diese Programme protokollieren die Tastatureingaben mit.

10 Clues: Echtzeit chatten.Datenverarbeitungsregisternummer.Verbreitet sich direkt über Netze.Sie dringen illegal in Computersysteme ein.Werbemails die unerwünscht sind nennt man auch?Diese Programme protokollieren die Tastatureingaben mit.Diese Viren sind als ein Programm in eine Datei eingebetet?Personen werden mit Hilfe von elektronischen Medien verletzt....

Online Bullying 2024-06-11

Online Bullying crossword puzzle
Across
  1. Someone to talk to
  2. When someone is not letting you get something by putting it close to you then away from you before you catch it
  3. The original meaning of online
  4. Another meaning of online
Down
  1. When someone is being bullied online
  2. Where you can seek help online by parent or anyone else
  3. A meaning of photos
  4. When you write online
  5. When someone does something mean intentionally
  6. A very famous app & website

10 Clues: Someone to talk toA meaning of photosWhen you write onlineAnother meaning of onlineA very famous app & websiteThe original meaning of onlineWhen someone is being bullied onlineWhen someone does something mean intentionallyWhere you can seek help online by parent or anyone else...

Cyber-bully Activity 2021-10-29

Cyber-bully Activity crossword puzzle
Across
  1. A mean saying someone might say about your looks
  2. Two words- the act of staying safe online
  3. Group of people that you hang out with
  4. Something to do if someone is being bullied
Down
  1. Beginning with I - saying hurtful things
  2. A device that someone can be cyber-bullied on
  3. Someone who is mean
  4. A story that is a lie
  5. How someone might feel when you tease them
  6. A feeling of unsure and stress

10 Clues: Someone who is meanA story that is a lieA feeling of unsure and stressGroup of people that you hang out withBeginning with I - saying hurtful thingsTwo words- the act of staying safe onlineHow someone might feel when you tease themSomething to do if someone is being bulliedA device that someone can be cyber-bullied on...

news u8 2024-12-12

news u8 crossword puzzle
Across
  1. How many people took to the skies
  2. News claims of misconducted alcohol abuse against...who?
  3. 13 Billion Spent by who
  4. How much was spent on Cyber Monday
  5. FBI seeks help in what?
Down
  1. Who was the stowaway on a plane to the US to Paris
  2. Picked for FBI director by Donald Trump
  3. Who fought cancer
  4. How many troops were still in Syria
  5. How many people got injured at the holiday parade

10 Clues: Who fought cancer13 Billion Spent by whoFBI seeks help in what?How many people took to the skiesHow much was spent on Cyber MondayHow many troops were still in SyriaPicked for FBI director by Donald TrumpHow many people got injured at the holiday paradeWho was the stowaway on a plane to the US to Paris...

HW crossword puzzle 2022-04-28

HW crossword puzzle crossword puzzle
Across
  1. anything related to the internet
  2. a program that seems harmless but is very dangerous
  3. converting data into a code for unauthorized personnel
  4. mass communication software
  5. affected by a virus
Down
  1. bad software to harm other software
  2. something that doesn't allow bad things to enter a software
  3. a procedure to get something done
  4. a commercial business
  5. when someone acts like they know each other to get a personal gain or financial gain

10 Clues: affected by a virusa commercial businessmass communication softwareanything related to the interneta procedure to get something donebad software to harm other softwarea program that seems harmless but is very dangerousconverting data into a code for unauthorized personnelsomething that doesn't allow bad things to enter a software...

Technology 2025-06-16

Technology crossword puzzle
Across
  1. an important discovery or development
  2. the use of machines to perform tasks without human intervention
  3. easy to use or understand
  4. a small electronic device with a specific function
  5. the trail of data left by users on the internet
  6. introducing new ideas or methods
Down
  1. knowledgeable about modern technology
  2. extremely modern and advanced
  3. measures taken to protect systems from cyber threats
  4. the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsknowledgeable about modern technologyan important discovery or developmentthe trail of data left by users on the internetthe simulation of human intelligence in machinesa small electronic device with a specific function...

HW 2025-08-13

HW crossword puzzle
Across
  1. база данных
  2. предупреждение
  3. должностное лицо
  4. рассматривать, принимать во внимание
  5. почти
  6. увеличить
  7. в соответсвии с
  8. позволять себе
  9. недавний
  10. предотвратить
Down
  1. среднестатистический
  2. жертва
  3. защита
  4. уязвимый
  5. недостаток (чего-то)
  6. уверенный
  7. безопасность

17 Clues: почтижертвазащитауязвимыйнедавнийуверенныйувеличитьбаза данныхбезопасностьпредотвратитьпредупреждениепозволять себев соответсвии сдолжностное лицосреднестатистическийнедостаток (чего-то)рассматривать, принимать во внимание

Vocabulary test Unit 2 Where Are You Going? กิจกรรม New Language 2022-06-03

Vocabulary test Unit 2 Where Are You Going? กิจกรรม New Language crossword puzzle
Across
  1. สายการบิน
  2. บัตรที่ผู้โดยสารต้องแสดงก่อนขึ้นเครื่องบิน
  3. ขึ้นเรือ เครื่องบิน รถ ฯลฯ
  4. ทางออกสำหรับผู้โดยสารที่เดินทางด้วยเครื่องบิน
  5. ระบบรักษาความปลอดภัย
  6. เคาน์เตอร์
  7. กระดานโต้คลื่น
Down
  1. มาถึง,ไปถึง
  2. ผู้โดยสาร
  3. ออกเดินทาง
  4. ชั้นโดยสารราคาถูกที่สุด
  5. เป้สะพายหลัง
  6. ชั้นธุรกิจ, ผู้โดยสารชั้นธุรกิจ
  7. เที่ยวบิน
  8. ถอด

15 Clues: ถอดผู้โดยสารสายการบินเที่ยวบินออกเดินทางเคาน์เตอร์มาถึง,ไปถึงเป้สะพายหลังกระดานโต้คลื่นระบบรักษาความปลอดภัยชั้นโดยสารราคาถูกที่สุดขึ้นเรือ เครื่องบิน รถ ฯลฯชั้นธุรกิจ, ผู้โดยสารชั้นธุรกิจบัตรที่ผู้โดยสารต้องแสดงก่อนขึ้นเครื่องบินทางออกสำหรับผู้โดยสารที่เดินทางด้วยเครื่องบิน

Tulis dalam Bahasa Indonesia 2022-06-01

Tulis  dalam Bahasa Indonesia crossword puzzle
Across
  1. dentist
  2. a cook
  3. driver
  4. mechanic
  5. fire fighter
  6. gardener
Down
  1. librarian
  2. selfish
  3. smart
  4. shy person
  5. kind hearted
  6. arogant
  7. teacher
  8. nurse
  9. security guard

15 Clues: smartnursea cookdriverselfishdentistarogantteachermechanicgardenerlibrarianshy personkind heartedfire fightersecurity guard

TCS Information Security Crossword 2013-01-10

TCS Information Security Crossword crossword puzzle
Across
  1. A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
  2. _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
  3. Process for secure disposal of paper based information
  4. ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
  5. Attack preventing availability of a system operation or service to an authorized user
  6. A piece of software that is malicious or intrusive
  7. Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
  8. Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
  9. A software that detects, repairs, cleans, or removes infected files from a computer
  10. Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
  11. ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
  1. A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
  2. Act of listening to a private conversation which may reveal information which can provide access to a facility or network
  3. Highest category of information classification in TCS
  4. ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
  5. An update to fix vulnerabilities in software
  6. Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
  7. Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
  8. ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
  9. A weakness that can be taken advantage of to obtain unauthorized access to an asset
  10. Minimum password length as per TCS security policy
  11. is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.

22 Clues: An update to fix vulnerabilities in softwareMinimum password length as per TCS security policyA piece of software that is malicious or intrusiveHighest category of information classification in TCSProcess for secure disposal of paper based informationA weakness that can be taken advantage of to obtain unauthorized access to an asset...

Data centres and security 2013-03-29

Data centres and security crossword puzzle
Across
  1. It is a process that has completed execution but still has an entry in the process table.
  2. It is a program can collect and transmit personal information, often without the user being aware.
  3. It is a resource intended to provide the customer or end user with information and support related to a company's or institution's products and services.
  4. sections of a centre sealed off from other sections.
  5. It is a secret word or string of characters that is used for user authentication to prove identity.
  6. duplication of equipment in case one part fails.
  7. using physical characteristics for ID.
  8. It is a method of exchanging digital messages from an author to one or more recipients.
Down
  1. It is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.
  2. It is a portable computer with a built-in screen, integrated keyboard, and battery power.
  3. It is a family of computer networking technologies for local area networks.
  4. having different and unconnected cables to a network.
  5. It is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
  6. ability to withstand unexpected problems or setbacks.
  7. It is the process of encoding messages.
  8. time when the equipment is not functioning.
  9. It is a collection of computers interconnected by communication channels that allow sharing of resources and information.
  10. It is an attacker's attack intended to redirect a website's traffic to another, bogus site.
  11. It is a computer worm targeting the Microsoft Windows operating system.
  12. It is the action of recording (or logging) the keys struck on a keyboard.

20 Clues: using physical characteristics for ID.It is the process of encoding messages.time when the equipment is not functioning.duplication of equipment in case one part fails.sections of a centre sealed off from other sections.having different and unconnected cables to a network.ability to withstand unexpected problems or setbacks....

Computer Security and Viruses 2014-08-10

Computer Security and Viruses crossword puzzle
Across
  1. A group of two or more computer systems linked together.
  2. The study of people's efficiency in their working environment.
  3. The process by which you store the files on a single storage media with no secondary copies.
  4. A program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
  5. A program designed to detect and destroy computer viruses.
  6. A way of backing up the computer that allows you to store the entire computer, including the operating system and programs, in a single file (an “image”) that can be used to restore the computer to exactly the way it was when the image was made.
  7. The process of using an algorithm to transform information to make it unreadable for unauthorized users.
  8. An act of crime in which a computer is the object of the crime.
  9. an electronic discovery technique used to determine and reveal technical criminal evidence.
  10. The act of making set of instructions.
  11. The programs and other operating information used by a computer.
  12. A software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  13. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  14. A feature or defect of a computer system that allows surreptitious unauthorized access to data.
  15. It is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
  16. Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Down
  1. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or PDA.
  2. The acto of gaining unauthorized access to protected data.
  3. A software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
  4. An act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords.
  5. A person within a group or organization, especially someone privy to information unavailable to others.
  6. It refers to the physical parts of a computer system.
  7. The state of being free from danger or threat.
  8. The distinct pieces of digital information.
  9. An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
  10. The use of computers and related resources in an environmentally responsible manner.
  11. A person who breaks into a computer system, typically for an illegal purpose.
  12. The Father of Computers.
  13. A person that codes the set of instructions for the computer.
  14. A software that is intended to damage or disable computers and computer systems.
  15. Refers to tricking or deceiving computer systems or other computer users
  16. An organized collection of data.
  17. A type of network, the "V" in VPN.
  18. An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  19. A person who uses computers to gain unauthorized access to protected data.

35 Clues: The Father of Computers.An organized collection of data.A type of network, the "V" in VPN.The act of making set of instructions.The distinct pieces of digital information.The state of being free from danger or threat.It refers to the physical parts of a computer system.A group of two or more computer systems linked together....

knowhere's head of security 2016-01-13

knowhere's head of security crossword puzzle
Across
  1. Wolverine’s bones are laced with __________
  2. Famously quoted: “I am ______”
  3. Famously quoted: “No more mutants”
  4. First Appearance: New Mutants #98
  5. Son of Cyclops; time-traveler
  6. Aka The Accuser
  7. Earth’s Mightiest Heroes
  8. Gems: Time, Space, Power, Reality, Mind, and ____
  9. Evil alter-ego of Adam Warlock
  10. Eye of Agamotto wielder
  11. Wielder of Mjolnir
  12. King of Wakanda, aka ____________
  13. Peter Parker is the Amazing _________
  14. Aka Jennifer Walters, attorney at law
  15. Son of Mephisto
  16. Before Adam Warlock, his “name” was ___
  17. Created solely to kill Thanos
  18. Captain America’s shield is made of this
  19. Aka Kamala Khan, inhuman
  20. Jewel, AKA _______ _____
Down
  1. Fist of Khonshu; aka Marc Spector
  2. The “most dangerous woman in the galaxy”
  3. Creator of the Four Horsemen
  4. The best there is at what he does
  5. Daughter of Drax the Destroyer
  6. Knowhere’s head of security
  7. Alien race; creators of inhumans
  8. Johnny Blaze or Daniel Ketch
  9. Captain Britain’s sister
  10. Team organized by Charles Xavier
  11. Captain Marvel, aka Carol _______
  12. Avatar of Death; Mad Titan
  13. The Watcher, aka ___
  14. Secret Wars (1984) main villain, The ________
  15. Richard Rider or Sam Alexander
  16. Shapechanger; foster mother of Rogue
  17. The 2nd herald of Galactus

37 Clues: Aka The AccuserSon of MephistoWielder of MjolnirThe Watcher, aka ___Eye of Agamotto wielderEarth’s Mightiest HeroesCaptain Britain’s sisterAka Kamala Khan, inhumanJewel, AKA _______ _____Avatar of Death; Mad TitanThe 2nd herald of GalactusKnowhere’s head of securityCreator of the Four HorsemenJohnny Blaze or Daniel Ketch...

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. The M in HTML
  2. an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
  3. IEE 802.11 describes which type of network?
  4. Network authentication protocol
  5. A cat tries to catch it but you can use it with your computer
  6. The Ripper Cracking tool
  7. Famous packet analyzer
  8. Protocol that gives access to a user on a remote system
  9. Malware that encrypts data for money
  10. init 6
  11. Famous proxy tool for web penetration testing
  12. Goddess of Cyprus,Venus...
  13. which is the first layer in OSI
  14. Database attack, ____ Injection
Down
  1. You can use it for anonymity
  2. Spyware, Trojan, worm, virus
  3. name of first virus
  4. 127.0.0.1 IP address
  5. decode this hex -> 7365637572697479
  6. Cross Site _____ Attack
  7. Swiss army knife of hacking tool/frequently used as backdoor
  8. Mac address is a 12 byte. What type of numbers?
  9. Famous Debian Distribution for Penetration Testing
  10. TCP & UDP runs in that OSI Layer
  11. Not bind shell
  12. Not TCP
  13. control and store your repo
  14. Which protocol is used by ping command

28 Clues: init 6Not TCPThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoYou can use it for anonymitySpyware, Trojan, worm, virusNetwork authentication protocolwhich is the first layer in OSIDatabase attack, ____ Injection...

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  2. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  3. Uses SMS system of mobile phones to send out fake text messages.
  4. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  5. Authentication that relies on certain unique characteristics of human beings.
  6. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  7. Refers to safety when using the internet like keeping personal data safe.
  8. Used to verify that data comes from a secure and trusted source.
  9. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  10. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  11. The act of gaining unauthorized access to a computer system.
  12. Unsolicited email sent over the internet.
Down
  1. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  2. A type of protocol that allows data to be sent and received securely over the internet.
  3. Software that gathers data by monitoring key press on the user/s keyboard.
  4. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  5. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  6. Web applications or website that allow users to create and edit web pages using any web browser.
  7. Refers to the need to respect other user's views and display common courtesy when posting views online.
  8. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  9. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  10. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  11. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  12. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  13. A cloud where the storage is provided by a dedicated environment behind a company firewall.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Uses SMS system of mobile phones to send out fake text messages.Used to verify that data comes from a secure and trusted source.Refers to safety when using the internet like keeping personal data safe....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  2. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  3. Authentication that relies on certain unique characteristics of human beings.
  4. Refers to the need to respect other user's views and display common courtesy when posting views online.
  5. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  6. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  7. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  8. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  9. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  10. Uses SMS system of mobile phones to send out fake text messages.
  11. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  12. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
Down
  1. Software that gathers data by monitoring key press on the user/s keyboard.
  2. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  3. Used to verify that data comes from a secure and trusted source.
  4. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  5. Refers to safety when using the internet like keeping personal data safe.
  6. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  7. Web applications or website that allow users to create and edit web pages using any web browser.
  8. A type of protocol that allows data to be sent and received securely over the internet.
  9. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  10. The act of gaining unauthorized access to a computer system.
  11. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  12. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  13. Unsolicited email sent over the internet.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

Security Markets (Chapter 2) 2018-01-29

Security Markets (Chapter 2) crossword puzzle
Across
  1. will shut down the markets or a stock in the event that it takes a pre-defined drop
  2. serves as the middleman in the process of raising funds
  3. a stock exchange in New York that began as a physical location
  4. closed-end funds and structured products i.e. Standard and Poors 500 index and the DJIA
  5. an automated system that matches, buys, and sells orders for securities
  6. formed in 2005 as an ECN and was granted exchange status by the SEC
  7. allows NYSE member firms to electronically transmit all market and limit orders directly to the specialist at the trading post or the member trading booth
Down
  1. markets for existing assets that can be traded between investors i.e. NYSE
  2. a way of exchanging assets
  3. first electronic stock market listing over 5000 companies
  4. distinguished by the flow of funds between the market participants
  5. basis where the issuing firm assumes the risk and simply takes back an securities not sold after a fixed period
  6. regulates the organized markets
  7. electronic quotation service that gathers and publishes bid and ask quotation prices
  8. a database that keeps track of limit orders and market orders for the specialist
  9. where the company sells its stock to the public without the help of an investment bank
  10. bring private companies public for the first time
  11. occurs when prices respond to new information, when each successive trade is made at a price close to the preceding price
  12. a non organized exchange with limited rules and regulations
  13. guarantee the investment banking firm gives the selling firm to purchase its securities at a fixed price
  14. gives the owner the right to buy 100 shares of the underlying common stock at a set price for a certain period

21 Clues: a way of exchanging assetsregulates the organized marketsbring private companies public for the first timeserves as the middleman in the process of raising fundsfirst electronic stock market listing over 5000 companiesa non organized exchange with limited rules and regulationsa stock exchange in New York that began as a physical location...

Security Manual – Chapter 3 2021-08-04

Security Manual – Chapter 3 crossword puzzle
Across
  1. No _____ robberies are alike.
  2. Make no statements to the them; refer them to Marketing
  3. A theft, which does not involve a person directly
  4. Varying your _____ to work will also help.
  5. Try to _____ the robber’s physical features, voice, accent, mannerism, dress and other characteristics
  6. Vault bait should be _____ hundred dollars.
  7. _____ _____ is a robbery prevention tool (two words)
  8. Remember that robberies usually last 30 to 90 ____ and the robber will quickly leave the bank
  9. Place this on your window signal you’ve been robbed (two words)
  10. ______ is the most important preliminary to an attack.
Down
  1. Write down any ____ from during the robbery that you can later advise the police of
  2. Always lock the _____ when you are not at your window.
  3. A theft involving force or threat of force
  4. _____ of any kind are to be avoided
  5. theft doesn’t involve force or threat of force
  6. Preserve any _____
  7. Obey The Robber’s _____; Don’t Be A Hero
  8. This ____ system can provide evidence
  9. If ____ include the bait money
  10. Every ____ months the office must record ____.(two words)

20 Clues: Preserve any _____No _____ robberies are alike.If ____ include the bait money_____ of any kind are to be avoidedThis ____ system can provide evidenceObey The Robber’s _____; Don’t Be A HeroA theft involving force or threat of forceVarying your _____ to work will also help.Vault bait should be _____ hundred dollars....

Personnel security crossword puzzle 2024-02-12

Personnel security crossword puzzle crossword puzzle
Across
  1. - reduce the risk of your assets being lost, damaged or compromised
  2. - keep operations from devolving into complete chaos
  3. - the process of actively seeking out, finding and hiring candidates for a specific position or job
  4. - someone who has malicious intent to harm the organization from the inside
  5. - employees or third parties who make a mistake that causes a problem
  6. - a set of general guidelines that outline the organizations plan for tackling the issues
  7. - Carrying out a new policy often falls to entities that were not the ones that formulated or adopted it
  8. - it should undergo detailed analysis regarding the time, cost and resources needed to bring about new policy
  9. - will help guide which course of action pursue
  10. - Every industry has its own set of laws, regulations, standards and best practices that business need to abide
  11. - it is a group strongly suggest drafting the following set of corporate policies and procedures
  12. - it needs to be noted that the policies do not provide instant solutions
  13. - know key assets get the details right
  14. - unauthorized disclosure of official, private, or proprietary information
  15. - reduce the risk of harm to your people, customers and partners
Down
  1. - someone whose account has been taken over by an outside attacker
  2. - reduce the risk of your information being lost, damaged or compromised
  3. -these purposes can encompass many forms of criminal activity,from minor theft through to terrorism
  4. - explains a specific action plan for carrying out a policy
  5. - any person who exploits or intend to exploit to harm the security
  6. - an issue must be clearly delineated and started as a discrete issue to receive support from various entities
  7. - all measured designed to prevent unsuitable individuals of doubtful loyalty
  8. - as companies expand and evolve globally can be challenging to follow
  9. policies and procedures keep operations from developing into complete chaos
  10. - weakest link in the security chain
  11. - Workplace policies have received a poor reputation, sometimes for being long or voluminous
  12. - can prevent workplace incidents with the correct safety measures in place if or when an incident occurs
  13. - policies need to be monitored to ensure they are working correctly that they are properly implemented
  14. act of intentionally trying to stop someone from achieving something or to stop something from developing
  15. - ket to right and wrong

30 Clues: - ket to right and wrong- weakest link in the security chain- know key assets get the details right- will help guide which course of action pursue- keep operations from devolving into complete chaos- explains a specific action plan for carrying out a policy- reduce the risk of harm to your people, customers and partners...

Contemporary Policing and Security 2023-04-19

Contemporary Policing and Security crossword puzzle
Across
  1. A campaign of spending cuts to reduce budget deficits and size of government
  2. A type of police culture that makes officers default to violence and aggression
  3. A term used for militarizing the police
  4. Something that is managed more and more in policing
  5. First Female Police Officer Hired by the Met
  6. Type of cameras that officers wear to ensure accountability
  7. Illegal acts committed by the crew of a private ship or vessel
  8. Ensuring that police effectively deliver services lawfully
  9. A part of the internet where illicit goods can be traded anonymously
Down
  1. A form of criminality operating across national borders
  2. Person shot by police in 2011 leading to the London riots
  3. A static or expandable weapon used for temporary incapacitation
  4. Country with the highest average police shootings in the world
  5. An outcome and also reason for use of force
  6. A cartel responsible for 80% of the global cocaine supply in 1994
  7. A controversial Act of Parliament proposed in 2021
  8. Criminal activities involving two of more individuals often across national borders
  9. A reason why almost 800m jobs could be lost by 2030
  10. A major form of crime that was 53% of all crimes in 2021
  11. Police cannot take this action despite pay disputes

20 Clues: A term used for militarizing the policeAn outcome and also reason for use of forceFirst Female Police Officer Hired by the MetA controversial Act of Parliament proposed in 2021A reason why almost 800m jobs could be lost by 2030Something that is managed more and more in policingPolice cannot take this action despite pay disputes...

Ch. 14 Security Crossword 2023-03-16

Ch. 14 Security Crossword crossword puzzle
Across
  1. Android trusted websites use this type files to create installation software.
  2. Sensitive information (student records)kept by educational institution.
  3. chip built onto the motherboard and generates and stores encryption keys to protect boot files.
  4. Social engineering attack that takes place over the phone.
  5. An Act that keeps individuals healthcare information private.
  6. Disables security features of a mobile device.
  7. Consists of programs that give the hacker root access to the target machine.
  8. Type of DDoS attack that tries to overload network devices like a firewall.
  9. Policy allows the administrator to remotely lock the device if it has been lost or stolen.
  10. Type of authentication that requires two authentication credentials to access an account.
  11. Collects and then forwards information regarding the victim's computer activities.
  12. Type of malware is self replicating, modify existing programs, and must be attached to a legitimate program to run.
  13. Network monitoring device or software that monitors and filters inbound and outbound traffic.
  14. Targeted phishing attack.
  15. Used to bypass building access control measures, such as a badge reader.
  16. Type of detection that the organization is actively looking for security flaws in its systems.
Down
  1. Type of data destruction that actual destroys the HDD.
  2. Logs every keystroke the user makes and then sends the keystroke report to the hacker.
  3. An algorithm that generates a value that represents the password.
  4. Malware that uses the victim computer's resources to mine for cryptocurrency on behalf of the hacker.
  5. Program that is hidden inside a legitimate program.
  6. Most vulnerable part of any network.
  7. Type of server that exists outside of a network that forwards all traffic through its gateway on the behalf of the user or the network.
  8. Type of formatting that uses tools in the operating system.
  9. Type of formatting that writes new sectors and tracks to the drive.
  10. Immediately removing the device from the network; disconnect shared drives and connections with other devices.
  11. Scans a victim's computer for files and encrypts the files so the user is unable to access them.
  12. Occurs when an attacker sends out an email that looks legitimate but has a malicious payload.
  13. An attacker can gather sensitive information by shoulder surfing on conversations.
  14. Type of detection that occurs when the security incident is discovered when not actively looking for it.

30 Clues: Targeted phishing attack.Most vulnerable part of any network.Disables security features of a mobile device.Program that is hidden inside a legitimate program.Type of data destruction that actual destroys the HDD.Social engineering attack that takes place over the phone.Type of formatting that uses tools in the operating system....

Security Awareness Crossword Puzzle 2021-09-15

Security Awareness Crossword Puzzle crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. The process of taking plain text and scrambling it into an unreadable format.
  3. A fraudulent email purportedly from a reputable company attempting to get personal information.
  4. The "C" in the CIA Triad. Protection of information from unauthorized access.
  5. Should be constructed of upper and lower case letters, numbers, and special characters.
  6. The address of a webpage.
  7. when a person tags along with another person who is authorized to gain entry into restricted areas.
  8. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  9. a malicious act that seeks to damage data, steal data, or disrupt digital life in general (two words)
  10. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the systems security.
  2. Verifying identity.
  3. A sequence of words or text used to control access to a computer; similar to a password.
  4. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. The "I" in the CIA Triad. Protection from unauthorized changes.
  6. The "A" in the CIA Triad. It ensures authorized users have access.
  7. an act of disguising a communication from an unknown source as being from a known, trusted source.
  8. Security took that creates a secure, encrypted connection between you and the Internet (acronym).
  9. the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.
  10. Facebook, Twitter, Instagram, etc. (two words)

20 Clues: Verifying identity.The address of a webpage.Facebook, Twitter, Instagram, etc. (two words)The "I" in the CIA Triad. Protection from unauthorized changes.The "A" in the CIA Triad. It ensures authorized users have access.The process of taking plain text and scrambling it into an unreadable format....

Food Security and Interconnections 2024-09-12

Food Security and Interconnections crossword puzzle
Across
  1. if people suffer from food insecurity, they may have a lack of this
  2. a situation where war exists between two countries
  3. the reduction in the amount of food produced due to things such as drought and floods
  4. having economic access to enough food due to enough money
  5. name of the country attacked by Russia which is experiencing food insecurity
  6. item used by refugees to plan their journey to another country
  7. name of the lake in Africa which is drying out causing food insecurity for communities
  8. a state where not everyone has consistent access to enough safe and nutritious food
  9. a tax placed on goods from overseas to make them more expensive and less appealing to buy
  10. the name of the place where leather goods are made
  11. the continent where many countries bought grain off Ukraine before the war
  12. the name given to people who take food from large bins outside supermarkets
  13. something people in poorer countries can't do online without a lap top
  14. word used when two countries buy and sell goods to each other
  15. something that is typical in factories in Bangladesh
  16. name of the device being placed by Russia on Ukrainian farms to stop farming
  17. name given to an item brought into Australia from overseas
  18. weather event that could cause food loss in northern Australia
Down
  1. food that is thrown out by a seller or producer
  2. having enough food of decent quality for sale in shops and markets
  3. something farm workers have done in areas of Ukraine attacked by Russia
  4. a word associated with clothes and shoes from Bangladesh
  5. unequal levels of access to communication technologies such as the internet in different countries
  6. the name given to a corporation which has factories in more than one country
  7. name given to an item sold by Australia to overseas countries
  8. the planting of trees and using technology to help plants grow is desert areas
  9. fruit that is an example of food waste in Australia
  10. a type of connection people feel to a place if they link the place to their religious beliefs
  11. name of the desert where a green revolution is taking place
  12. the name given to people who are linked to places outside their own country
  13. a type of connection people feel to a place if they make money from it
  14. continent with the lowest amount of food security

32 Clues: food that is thrown out by a seller or producercontinent with the lowest amount of food securitya situation where war exists between two countriesthe name of the place where leather goods are madefruit that is an example of food waste in Australiasomething that is typical in factories in Bangladesh...

Chapter 6 Security Plus 2024-09-21

Chapter 6 Security Plus crossword puzzle
Across
  1. instrumentation used for industrial process control
  2. involves isolating sensitive enterprise data
  3. Downloading unofficial and unapproved apps
  4. make a real-time operating system more resilient to attacks
  5. Examining code after the source code
  6. A coding technique for accounting for errors
  7. facilitates communication between devices and the cloud
  8. Circumventing the installed built-in limitations on Apple iOS devices
  9. Office policy allowing personal tech
  10. designed to replace or supplement a wired local area network
  11. security constraint in which a device’s small size results in low processing
Down
  1. testing software before the source code is compiled
  2. refers to integrating security into the application
  3. OS that guarantees real-time applications a certain capability within a specified deadline
  4. Sharing a phone's internet with another device
  5. Employee choose from company-approved devices
  6. Process ensuring data accuracy before processing
  7. computer hardware and software contained within a larger system
  8. Tools that allow a device to be managed remotely by an organization
  9. The ability of a system to handle growth efficiently
  10. coverage area is divided into hexagon-shaped cells
  11. The ability to resist attacks
  12. ensuring timely and reliable access to devices
  13. A system that controls multiple industrial control systems (ICS)

24 Clues: The ability to resist attacksExamining code after the source codeOffice policy allowing personal techDownloading unofficial and unapproved appsinvolves isolating sensitive enterprise dataA coding technique for accounting for errorsEmployee choose from company-approved devicesSharing a phone's internet with another device...

Security Summit Crossword Puzzle 2021-08-18

Security Summit Crossword Puzzle crossword puzzle
Across
  1. The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
  2. An acronym for volatile memory within a computer that holds active processes, data, and applications.
  3. This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
  4. Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
  5. A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
  6. A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
  7. This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
  8. A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
  9. ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
  10. ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Down
  1. _________________@lowes.com and the
  2. _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
  3. Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
  4. This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
  5. An access control model that restricts system access to authorized users based on job function(s).
  6. Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
  7. Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
  8. Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
  9. Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
  10. Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
  11. Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.

21 Clues: _________________@lowes.com and thePhish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.An access control model that restricts system access to authorized users based on job function(s).An acronym for volatile memory within a computer that holds active processes, data, and applications....

GSM ARchitecture,Frame,Security 2025-07-11

GSM ARchitecture,Frame,Security crossword puzzle
Across
  1. A cloak of anonymity for your true identity — frequently changed for stealth.
  2. A ritual of trust – proving you are who you claim, without shouting your name to the world.
  3. A repetitive rhythm of 26 TDMA pulses forming a foundational transmission structure.
  4. A short-lived encryption spell, generated every session using your private key and a random challenge.
  5. Time-based compartments that let multiple users talk without shouting over each other.
  6. A busy bee channel handling the behind-the-scenes chatter — call setup, handovers, and more.
  7. The chaotic spark of randomness used to ensure your identity check is truly fresh.
  8. This channel is like a digital loudspeaker, always shouting the cell ID and system info to everyone.
  9. The cell tower's brainchild — transmits and receives radio waves for user connectivity
Down
  1. A tiny memory wizard plugged into your phone, carrying your GSM passport.
  2. The heartbeat of a GSM frame — ticking every 4.615 milliseconds.
  3. A special burst whispering “stay in sync” to your device’s internal clock.
  4. The digital invisibility cloak – transforms voice and messages into unintelligible gibberish.
  5. A gateway node that acts as the diplomatic bridge between GSM and the outside PSTN/ISDN world.
  6. A nomadic guest list of users visiting a foreign GSM land.
  7. A digital fingerprint burned into your SIM card — your GSM identity number.
  8. The core nerve center — switching calls, handling mobility, and ensuring connections don’t drop.
  9. A digital vault storing your identity, subscriptions, and history permanently.
  10. The secret keeper — verifies you and helps encrypt your communications.
  11. The invisible conductor (orchestrator) managing multiple transceivers in a GSM symphony

20 Clues: A nomadic guest list of users visiting a foreign GSM land.The heartbeat of a GSM frame — ticking every 4.615 milliseconds.The secret keeper — verifies you and helps encrypt your communications.A tiny memory wizard plugged into your phone, carrying your GSM passport.A special burst whispering “stay in sync” to your device’s internal clock....

Information Security-unit-1 2022-11-18

Information Security-unit-1 crossword puzzle
Across
  1. first phase of sec sdlc
  2. probability of threat to system
  3. replicating malicious software that spreads throughout system
  4. makes server unavailable by flooding
  5. provides assurance that user has authority to access update or delete
  6. intentional or unintentional attempt to compromise information
  7. using social skills to access credentials
  8. program that monitor data travelling over a network
  9. a pillar of IS
  10. attacker routes large quantities of email to targer
Down
  1. automated process that interacts with other network services
  2. bypasses normal authentication process
  3. only those with sufficient privilege can access
  4. weakness or faults in a system
  5. intruder assumes a trusted ip address
  6. organizational Resources that is being protected
  7. attack which uses trial and error
  8. unsolicited commercial email
  9. proving identity that he or she claims
  10. potential danger to an asset

20 Clues: a pillar of ISfirst phase of sec sdlcunsolicited commercial emailpotential danger to an assetweakness or faults in a systemprobability of threat to systemattack which uses trial and errormakes server unavailable by floodingintruder assumes a trusted ip addressbypasses normal authentication processproving identity that he or she claims...

Chapter 1 Vocab 2015-09-22

Chapter 1 Vocab crossword puzzle
Across
  1. services are delivered from a business' data center to internal users. This model offers versatility and convenience, while preserving management, control and security.
  2. (Quality of Service) the capability of a network to provide better service to selected network traffic over various technologies
  3. large secure locations for server farms
  4. plugging a machine in which secures a frequency in your power line that is used for data transfer
  5. security software that protects a system from malicious software
  6. (Access Control Lists) a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee
  7. Firewalls that allow only certain ports to be used
  8. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it
  9. using smartphones to control functions of your house
  10. cloud technology that can be changed to adapt to the needs of the user
Down
  1. the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
  2. that covertly steals personal information from one computer
  3. the property that enables a system to continue operating properly in the event of the failure of some components
  4. allows companies to use computers as a utility that they get services for and from on demand rather than having to maintain their own infrastructure
  5. the ability to add your own device onto a network, separate from the other machines on the network.
  6. a third-party provider delivers the cloud service over the Internet, sold on-demand, typically by the minute or the hour.
  7. (Virtual Private Network) a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
  8. self-replicating piece of code used for malicious purposes
  9. the design of the communication on a network. It is a framework for the specification of the network’s physical components and their roles on the network
  10. wireless ISP, get all data from an antenna outside your house
  11. (Intrusion Prevention System) a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
  12. The authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority.
  13. a combination of public cloud services and on-premises private cloud – with orchestration and automation between the two. Companies can run mission-critical workloads or sensitive applications on the private cloud while using the public cloud for bursty workloads that must scale on-demand. The goal of hybrid cloud is to create a unified, automated, scalable environment which takes advantage of all that a public cloud infrastructure can provide, while still maintaining control over mission-critical data.

23 Clues: large secure locations for server farmsFirewalls that allow only certain ports to be usedusing smartphones to control functions of your houseself-replicating piece of code used for malicious purposesthat covertly steals personal information from one computerwireless ISP, get all data from an antenna outside your house...

CyberCitizen 2026-03-06

CyberCitizen crossword puzzle
Across
  1. A security method that uses physical characteristics like fingerprints or facial recognition to secure devices or accounts.
  2. Making sure information and systems can be used when needed.
  3. Creating a copy of your digital information (files, folders, databases, applications, etc.) and storing it in a separate location.
  4. Ensuring information stays correct and unchanged.
  5. Records that document each visitor's entry and exit, typically capturing essential information such as the visitor's name, the date and time of arrival, the purpose of their visit, who they are visiting, and their departure time.
  6. Strange actions or performance on a computer that could signal a cyberattack.
  7. The process of sending data from one device or location to another.
  8. A long-term cyberattack where hackers secretly gather information.
  9. A type of phishing attack where malicious links or deceptive content are embedded within an image in an email or on a website, rather than in plain text.
  10. A digital service or system that enables users to store, access, and distribute electronic files with others.(GDPR) An EU law protecting the personal data and privacy of individuals within the European Union, with global impact.
  11. A senior-level executive responsible for establishing and maintaining an organization's information security program. They are the ultimate authority and expert on data protection within the company.
Down
  1. A team of cybersecurity experts who monitor, detect, and respond to threats targeting an organization’s networks, systems, and data.
  2. The act of adhering to rules, regulations, laws, standards, and ethical guidelines that are applicable to an organization, industry, or individual.
  3. designed to detect and remove computer viruses.
  4. The process of deleting stored data from websites in your web browser. This helps remove personal information, login details, and browsing history, enhancing privacy and security.
  5. Rules that define and control who (users, applications, services) can access specific resources (data, applications, infrastructure) and what actions they are allowed to perform within the cloud environment.
  6. A security process that requires users to provide two or more verification factors to gain access to an online account, application, network, or other resource.
  7. A Canadian federal law that governs how private-sector organizations collect, use, and disclose personal information during commercial activities.
  8. Electronic keys that grant or restrict entry to specific areas or resources.
  9. A US-based law protecting the privacy and security of individuals' health information.
  10. A misleading or exaggerated headline, image, or link designed to attract clicks, often by creating curiosity or excitement.
  11. A computer program that automatically performs tasks, often used to send spam or create fake accounts.
  12. Errors in computer programs that cause problems or slow performance.
  13. A feature in cloud storage and file-sharing platforms that allows users to generate a unique web link (URL) to a specific file or folder stored in the cloud. This link can then be shared with others, granting them access to view, download, and sometimes even edit the content, depending on the permissions set by the owner.
  14. A security tool used by websites to differentiate humans from computer programs or bots.

25 Clues: designed to detect and remove computer viruses.Ensuring information stays correct and unchanged.Making sure information and systems can be used when needed.A long-term cyberattack where hackers secretly gather information.The process of sending data from one device or location to another....

Office of Performance Management and Internal Controls 2021-03-05

Office of Performance Management and Internal Controls crossword puzzle
Across
  1. Intentional deceptive action
  2. Periodic comparison of source documents
  3. Office directed by Lt. Col. Terry
  4. Last name of OPMIC Information Security Officer
  5. Training due April 15th by all employees
Down
  1. Synonym for bloom, blossom and singing birds
  2. Control working in less than optimal condition
  3. Reduces the risk of error and inefficiency
  4. Acronym for Information Security Officer
  5. Complete acronym for internal control standards
  6. Last name of Internal Audit Manager
  7. The end toward which effort is directed
  8. Evaluation document with code of ethics

13 Clues: Intentional deceptive actionOffice directed by Lt. Col. TerryLast name of Internal Audit ManagerPeriodic comparison of source documentsThe end toward which effort is directedEvaluation document with code of ethicsAcronym for Information Security OfficerTraining due April 15th by all employeesReduces the risk of error and inefficiency...

investing - Travis Perkins 2026-03-20

investing - Travis Perkins crossword puzzle
Across
  1. a security of social interaction.
  2. someone who buys stock for the long term.
  3. potential high problems.
  4. CHAIN connected through a digital seal
  5. that are created and backed up but not tied.
  6. COST AVERAGING putting all wealth at given time.
  7. a virtual wealth that gains a lot.
  8. a special type of tax.
Down
  1. it’s managed by someone.
  2. CAP the total importance of information.
  3. retirement and survivor benefits.
  4. something that puts out in exchange.
  5. a network of recorded information.

13 Clues: a special type of tax.it’s managed by someone.potential high problems.a security of social interaction.retirement and survivor benefits.a network of recorded information.a virtual wealth that gains a lot.something that puts out in exchange.CHAIN connected through a digital sealCAP the total importance of information....

Chapter 2 notes 2022-11-21

Chapter 2 notes crossword puzzle
Across
  1. vast majority of US corporations
  2. people who work
  3. financial investment
  4. money for realestate
  5. services related to money
  6. buyers and sellers of stock
  7. public info
  8. account owner makes deposit
  9. withdraw cash and pay
  10. trading small daily
  11. agreed-upon amount within specified time
  12. illegal private gained info
  13. pay for security purchases
  14. customers required to apply
Down
  1. manage supply of money and intrest
  2. face value of stock
  3. interest over 10 years
  4. directly to public investors
  5. investors who borrow money
  6. accepts money from customers
  7. nonprofit institution
  8. largest category deposit
  9. investing long term
  10. document guaranteeing money
  11. people who lend money
  12. shares openly traded
  13. quick investing gains
  14. assist you with purchasing stocks and bonds
  15. money directly in account
  16. report given annualy

30 Clues: public infopeople who workface value of stockinvesting long termtrading small dailyfinancial investmentmoney for realestateshares openly tradedreport given annualynonprofit institutionpeople who lend moneyquick investing gainswithdraw cash and payinterest over 10 yearslargest category depositservices related to moneymoney directly in account...

Domestic & International Airports 2019-06-13

Domestic & International Airports crossword puzzle
Across
  1. an airline
  2. the place you pass before you become airside
  3. what did the resuce team use for splints after flight 801's crash
  4. a limit on something
  5. get on the plane
  6. anyone can access this part of the airport
  7. ______ controller
  8. passenger
  9. a covered walkway which allows passengers to get to aircraft
Down
  1. very first phase of flight
  2. what does FAA believe is the most common cause of runway incursion
  3. ideal solution for evacuating passengers from a stricken aircraft
  4. greenlights indicate the start of runway, red indicates the end
  5. germanys national carrier
  6. ID you present to the CSA while getting boarding pass
  7. phonetic alphabet W
  8. people with the glow sticks and help with ramps
  9. abbreviation for liquids, aerosols and gels
  10. main class in a flight
  11. abbreviation for aviation security service

20 Clues: passengeran airlineget on the plane______ controllerphonetic alphabet Wa limit on somethingmain class in a flightgermanys national carriervery first phase of flightanyone can access this part of the airportabbreviation for aviation security serviceabbreviation for liquids, aerosols and gelsthe place you pass before you become airside...

DO YOU KNOW SOUTH? 2023-06-22

DO YOU KNOW SOUTH? crossword puzzle
Across
  1. what everyone was given and few gave back
  2. seat for you to sit and wait (near the security desk)
  3. best meal on Wednesdays
  4. Field day on the last day
  5. Security guard at the "T"
  6. tallest sixth grade teacher
  7. tests you must pass to move on
  8. outdoor area to eat
  9. loudest room in the building
Down
  1. principal at the beginning of the year
  2. Street name where South is located
  3. The boss
  4. yearly event to get free food and books
  5. Where most exercise happens
  6. place to store your things
  7. must be off and not seen
  8. Administator who played in the Faculty/staff Basketball game
  9. often asked to be removed
  10. grade level when starting at South
  11. A quiet place to go when your teacher asks you to leave

20 Clues: The bossoutdoor area to eatbest meal on Wednesdaysmust be off and not seenField day on the last daySecurity guard at the "T"often asked to be removedplace to store your thingsWhere most exercise happenstallest sixth grade teacherloudest room in the buildingtests you must pass to move onStreet name where South is located...

Aviation workplace 2023-11-14

Aviation workplace crossword puzzle
Across
  1. Place at the airport after security
  2. The plane taking off
  3. Lining up to get on the plane
  4. Where the public can go
  5. Thing to do/ you may need
  6. Travelling outside your country
  7. Flying or operate of an aircraft
  8. Going to another country/city/town
  9. Making sure you keep yourself and others safe
  10. Fun time away
Down
  1. Certain aeroplane company
  2. A place you go to catch a flight
  3. X-ray to see if you're carrying any dangerous goods
  4. Customer on a plane
  5. A form of Identification to travel internationally
  6. Your belongings you're bringing with you
  7. Travelling in the same country
  8. Where the plane takes off and lands
  9. Confirmation that a citizen can enter leave or stay somewhere
  10. A child travelling alone under the age of 12

20 Clues: Fun time awayCustomer on a planeThe plane taking offWhere the public can goCertain aeroplane companyThing to do/ you may needLining up to get on the planeTravelling in the same countryTravelling outside your countryA place you go to catch a flightFlying or operate of an aircraftGoing to another country/city/townPlace at the airport after security...

Decode the Cloud: The SUSE Mastermind Challenge 2025-10-18

Decode the Cloud: The SUSE Mastermind Challenge crossword puzzle
Across
  1. Program members who resell and integrate SUSE solutions
  2. A key partner offering for enterprise customers
  3. SUSE long-term-release named after a season
  4. SUSE Rancher tool used to manage bare-metal and virtualized clusters
  5. Container orchestration platform widely used with SUSE
  6. SUSE's enterprise Linux product (abbreviation)
  7. Lightweight virtualization units for microservices
  8. SUSE product for Kubernetes management
  9. Process improved using Ansible & automation tooling
  10. Default snapshot-capable filesystem used by SUSE
  11. SUSE command-line package manager
Down
  1. Critical non-functional requirement for enterprise platforms
  2. Community Linux distribution sponsored by SUSE
  3. Annual SUSE user and partner conference
  4. Rolling-release distro from SUSE
  5. Core of the operating system
  6. Tool for lifecycle and patch management
  7. Deliverable for security and bug fixes
  8. SUSE system administration tool (4 letters)
  9. Open Build Service (abbreviation)

20 Clues: Core of the operating systemRolling-release distro from SUSEOpen Build Service (abbreviation)SUSE command-line package managerDeliverable for security and bug fixesSUSE product for Kubernetes managementAnnual SUSE user and partner conferenceTool for lifecycle and patch managementSUSE long-term-release named after a season...

Network+ 10-09 Wirelesss 2024-07-24

Network+ 10-09 Wirelesss crossword puzzle
Across
  1. parabolic,yagi,cantenna,omni to name a few
  2. type of WPA wifi security for home
  3. data amount thats transferred at layer 3
  4. 2wrds, recon of area for AP placement
  5. signal bounces
  6. topology where stations connect to a base
  7. frame to notify party to end connection
  8. data transfer achieved at layer 7
  9. too many devices connect to AP
  10. 2wrds, combining to channels
Down
  1. radio wave is reduced as it passes through
  2. GSM and CDMA , uses radio towers
  3. WMN..all devices connected together forms
  4. free space path loss
  5. background environment interference to wireless
  6. AP type that needs a WLC
  7. type of wifi security for organazations
  8. making signal unreadable or scrambled
  9. signal or radio wave bends
  10. multiplexing signals from 2-4 antennas
  11. broadcast frame sent out by AP

21 Clues: signal bouncesfree space path lossAP type that needs a WLCsignal or radio wave bends2wrds, combining to channelsbroadcast frame sent out by APtoo many devices connect to APGSM and CDMA , uses radio towersdata transfer achieved at layer 7type of WPA wifi security for home2wrds, recon of area for AP placementmaking signal unreadable or scrambled...

TTS FIREWALL 2022-11-09

TTS FIREWALL crossword puzzle
Across
  1. Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
  2. firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
  3. Perubahan terhadap tampilan suatu website secara illegal disebut..
  4. fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
  5. kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
  6. berapakah element pada host hardening …
Down
  1. firewall terbagi menjadi ... jenis
  2. Yang termasuk jenis metode enkripsi adalah …
  3. Terdiri dari database security, data security, dan device security adalah keamanan di level …
  4. ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
  5. arti dari kata firewall
  6. Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
  7. firewall bekerja dengan cara ... seluruh data yang masuk

13 Clues: arti dari kata firewallfirewall terbagi menjadi ... jenisberapakah element pada host hardening …Yang termasuk jenis metode enkripsi adalah …firewall bekerja dengan cara ... seluruh data yang masukPerubahan terhadap tampilan suatu website secara illegal disebut..kelebihan firewall berbasis jaringan adalah menjaga jaringan secara......

occupation 2020-02-20

occupation crossword puzzle
Across
  1. chef
  2. lawyer
  3. writer
  4. actress
  5. security
  6. pilot
  7. carpenter
Down
  1. soldier
  2. student
  3. singer
  4. doctor
  5. model
  6. driver

13 Clues: chefmodelpilotlawyersingerdoctorwriterdriversoldierstudentactresssecuritycarpenter

Authorities 2025-05-05

Authorities crossword puzzle
Across
  1. judecǎtor
  2. amendă
  3. avocat
  4. acord
  5. lege
  6. securitate
  7. semnǎturǎ
Down
  1. granițǎ
  2. plângere
  3. ambasadǎ
  4. martor
  5. penalizare
  6. permis

13 Clues: legeacordmartoramendăavocatpermisgranițǎplângereambasadǎjudecǎtorsemnǎturǎpenalizaresecuritate

Artificial Intelligence in Healthcare 2024-09-18

Artificial Intelligence in Healthcare crossword puzzle
Across
  1. Decision
  2. Vendors
  3. Technology
  4. Evaluate
  5. Regulation
  6. Breach
Down
  1. Intelligence
  2. Application
  3. Security
  4. Learning
  5. Training
  6. Accountability
  7. Fairness

13 Clues: BreachVendorsDecisionSecurityLearningTrainingFairnessEvaluateTechnologyRegulationApplicationIntelligenceAccountability