cyber security Crossword Puzzles
Technology Words 2024-10-09
Across
- Computer Camera
- Used to type
- You call people on it
- Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Communicate with others vocally
- Coded software
- Analyze and solve problems
- Prevents viruses
- Provides entertainment
- Something that you can transfer digital info to
- Stores information
- Another word for apps
Down
- Gain unauthorized access
- Random Access Memory
- Decode a code
- Also an animal
- Requires a router
- Protects from cyber attacks
- The use of computer technology
- Remote connection
- Communication technology tool
- Central Processing Unit
- Look through the web
- Creates apps/websites
- Find locations
- Amount of data your internet connection can handle
- Accessed from a browser
- Protects your computer from virus
- Convert data into a code
- Social feed
30 Clues: Social feed • Used to type • Decode a code • Also an animal • Coded software • Find locations • Computer Camera • Prevents viruses • Requires a router • Remote connection • Stores information • Random Access Memory • Look through the web • You call people on it • Creates apps/websites • Another word for apps • Provides entertainment • Central Processing Unit • Accessed from a browser • ...
Review Weeks 1-6 2022-12-06
Across
- a big meal, often eaten during holidays
- (adj) when you don't sleep enough, feeling
- this Monday people buy on online
- name of San Diego baseball team
- this Tuesday people give back
- Teacher Neil's home state
- US __ their first two World Cup Games
- It was Hispanic ___ Month 09/15-10/15
- the early bid catches this
- another word for ancestors
Down
- 11/3 was Nat'l ___ Day
- the host of the World Cup this year
- to show off artwork or verb to show
- Bob Marley is the king of this music
- Jet __ when you travel between time zones
- Similar to Homemaker
- 10/17 was Nat'l ___ Day
- Isla means this in English
- Online you can many "___ and deals"
- Japanese word for big water wave
- heavy rain, idiom, "___ and dogs"
21 Clues: Similar to Homemaker • 11/3 was Nat'l ___ Day • 10/17 was Nat'l ___ Day • Teacher Neil's home state • Isla means this in English • the early bid catches this • another word for ancestors • this Tuesday people give back • name of San Diego baseball team • this Monday people buy on online • Japanese word for big water wave • heavy rain, idiom, "___ and dogs" • ...
DCO Review 2024-01-11
Airports 2019-06-06
Across
- what you bring with you on holiday?
- what does Avsec look for?
- Taupo city code
- check passengers ....
- what you fly on?
- nelson city code
- only offered to departing and arriving international travellers
- what is the amount if alcohol you can bring into nz
- what your bag goes through to get checked
Down
- is the area before departing passengers through security
- who is responsible for directing all ground traffic
- what is a hazard to aircrafts
- Kapiti Coast city code
- what does biosecurity look for?
- is the area where you go through security & hand over your passport and departure card
15 Clues: Taupo city code • what you fly on? • nelson city code • check passengers .... • Kapiti Coast city code • what does Avsec look for? • what is a hazard to aircrafts • what does biosecurity look for? • what you bring with you on holiday? • what your bag goes through to get checked • who is responsible for directing all ground traffic • ...
Custody and settlement 2025-10-13
Across
- Who securities are lent to
- The key role of a custodian for assets
- A custody account used by multiple clients
- The D in CSD
- When a settlement does not occur
- common transaction type attracting collateral
- what is the process of preparing for settlement
Down
- the point when a security formally changes hand
- a retail fund investment strategy
- The C in OTC
- type of agent responsible for fund compliance
- the addition of information required to settle a tracaction
- Assets taken as protection against default
- the date a security starts to trade without a dividend attached
- A fund that mirrors the NYSE or the FTSE
15 Clues: The C in OTC • The D in CSD • Who securities are lent to • When a settlement does not occur • a retail fund investment strategy • The key role of a custodian for assets • A fund that mirrors the NYSE or the FTSE • Assets taken as protection against default • A custody account used by multiple clients • type of agent responsible for fund compliance • ...
Security Newsletter Puzzle 2021-05-19
Across
- the unauthorized disclosure could be expected to cause serious damage to national security
- a threat an employee will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States
Down
- _________ Counterintelligence and Security Agency
- Communication Security
- Formally FOUO
- Form that is placed inside the safe
- One method to ship Top Secret material
7 Clues: Formally FOUO • Communication Security • Form that is placed inside the safe • One method to ship Top Secret material • _________ Counterintelligence and Security Agency • the unauthorized disclosure could be expected to cause serious damage to national security • ...
Social Security Puzzle 2024-01-19
13 Clues: 1 week • location • Birthday • enforcers • ______ age • not a pension. • ______ pension • In with the new • Out with the old • long term benefit • Short term benefit • meets requirements. • pension ______ (2012)
cyber 2021-04-05
유형독해(고급) 4차시 단어시험 2016-07-27
26 Clues: 접근 • 전기 • 보안 • 전기의 • 가상의 • 정교한 • 반도체 • 익명의 • 특허권 • 주변의 • 전자의 • 계기판 • 회복하다 • 해독하다 • 재택근무 • 고안하다 • 설치하다 • 발명하다 • 호환가능한 • 최대화하다 • 세계화하다 • 문명화하다 • 전자상거래 • 연결을 끊다 • 광대역 회선 • 전송하다, 앞으로
Lesson 5 Deck 1 2018-03-01
23 Clues: ruins • island • tourist • lodging • welcome • to sail • expired • traveler • seatbelt • passport • accident • to return • dangerous • itinerary • campground • to be full • adventurer • to take off • high quality • room service • to take a trip • excursion; tour • safety; security
Las Noticias 2021-10-26
21 Clues: war • news • link • source • to lie • to say • to lack • because • to give • reliable • security • magazines • to follow • verifiable • to publish • to look for • to navigate • to interview • to broadcast • desorden disorder • to prove, to confirm
Spanish Vocabulary 2022-10-31
22 Clues: name • late • expect • hugged • On time • Landing • to show • airport • security • The seat • automatic • sometimes • The track • the plane • The flight • the window • The service • The hallway • the counter • the passport • the assistant • the electronic ticket
New Deal 2022-12-01
Across
- the first "R"
- ________ farming
- collective bargaining
- the second "R"
- court________
- Social__________
- 1932
- the third "R"
- NRA STAMP
- ______chats
Down
- overspending
- Banking__________
- alphabet______
- New Deal President
- retirement payment
- _______days
- virus
- ________Valley Authority
- government______
- __________Conservation Corps
- __________Adjustment Act
- "_______ itself"
22 Clues: 1932 • virus • NRA STAMP • _______days • ______chats • overspending • the first "R" • court________ • the third "R" • alphabet______ • the second "R" • ________ farming • Social__________ • government______ • "_______ itself" • Banking__________ • New Deal President • retirement payment • collective bargaining • ________Valley Authority • __________Adjustment Act • __________Conservation Corps
NAME:........................................................................... 2019-03-26
25 Clues: @ • tlen • błąd • plik • ekran • hasło • ciecz • komórka • głośnik • trójkąt • drukarka • skasować • załącznik • para wodna • środowisko • ustawienia • szczepionka • ciało stałe • zawiesić się • bezpieczeństwo • oprogramowanie • układ słoneczny • strona internetowa • pierwiastek chemiczny • wyszukiwarka internetowa
U7 How could you do that? 2020-03-30
27 Clues: koe • lupa • nolo • jutut • edessä • pettää • arvata • luvata • viesti • ihastus • juliste • salasana • tapahtua • ongelmat • selittää • kiusaaja • selittää • viimeisin • kiireinen • salaisuus • valehtelija • kateellinen • keskustella • turvallisuus • halaus, halata • pyytää anteeksi • poissa tolaltaan, järkyttynyt
Spanish Vocab 2023-04-26
26 Clues: gum • boat • bomb • door • hotel • candy • trick • shade • plane • to fly • turtle • simple • energy • weather • snorkle • airport • to fish • to walk • to flip • avocado • baggage • security • butterfly • water bottle • vez perchance • clothing store
Strange Stories Vocabulary 2024-10-24
22 Clues: UOF • sulec • fieht • reoyht • olicpe • tarser • beboryr • sestniw • lualaveb • fratcira • revoscid • cerutear • denecevi • rdaiseapp • edisin/boj • tsniprtoof • etagtisevni • ralam/mesyst • stinprergnif • veha/a/ryoeht • oklo/rof/esclu • cuseryit/mecara
Economics Vocabulary 2023-04-14
20 Clues: after • hourly • annual • before • taken out • collectors • tax season • contribution • income based • self employed • illegal fraud • money received • money generated • national programs • verifies employment • reports withholdings • allowances/dependents • medicare/social security • permanent workers/residents • money earned minus deductions
ICT Crossword 2019-07-08
Across
- a diagram used to visually organize information.
- search for information about (someone or something) on the Internet using this search engine
- a hacker who violates computer security for personal gain or maliciousness.
- an interactive computer application for organization, analysis and storage of data in tabular form.
- an electronic device for storing and processing data
- a project management tool that provides a graphical representation of a project's timeline.
- A bad phone company
Down
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- an organized collection of data, generally stored and accessed electronically from a computer system
- that ensures the security of an organization's information systems.
- a type of bar chart that illustrates a project schedule
- Where you create a database
- computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- specific measurable achievable relevent timely
- Where you create a spreadsheet
15 Clues: A bad phone company • Where you create a database • Where you create a spreadsheet • specific measurable achievable relevent timely • a diagram used to visually organize information. • an electronic device for storing and processing data • a type of bar chart that illustrates a project schedule • that ensures the security of an organization's information systems. • ...
Travelling 2019-02-19
18 Clues: lend • toll • mugav • kohver • mündid • saabuma • vedelikud • eemaldama • deklareerima • pillow lisapadi • pass pardakaart • luggage käsipagas • check turvakontroll • seat aknapoolne koht • a train rongile jõudma • lennule registreerimine • seat vahekäigupoolne koht • ukseava (turvakontrollis)
종윤 2023-02-15
Avancemos: 1.1 Vamos de vacaciones 2023-11-06
18 Clues: - Arrival • - Customs • - Security • - To board • - Suitcase • - Departure • - Passanger • - To travel • - The ticket • - The airport • - Travel Agent • - The passport • - The itinerary • - Travel agency • - Identification • - To go on a trip • - Flight attendant • - To check baggage
MSA Crossword 2022-02-15
18 Clues: dog • smell • agent • freight • finding • Xray tool • certainty • see inside • try to find • surveillance • .38 revolver • flying robot • metal detector • blasting agent • explosive stick • explosive device • MSA canine program • volatile chemical compound
Vamos De Viaje Vocab Quiz 2016-10-01
15 Clues: gate • ticket • screen • flight • luggage • airport • to arive • passport • suitcase • passenger • departure • bathing suit • to get in line • identification • to go through security
CYBERCRIME 2021-07-11
Across
- A politically- or ideologically-motivated cyber attack or hack.
- A way to access electonic system by bypassing some or all security mechanisms.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- Malicious software, such as a virus or worm, that attacks a target computer.
- The overaching program that runs all the functions on a computer or other electronic device.
- A company that offers access the internet.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Resource to be accessed, often expressed as a time period.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- Determining the identity or location of an attacker or an attacker's intermediary.
- The interdependent network of information technology, infrastructures that includes internet.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- A network point that acts an entrance to another network
- A unique internet identifier registered
- An online journal.
- A program used to access the internet.
- Assurance that remains private and no one sees it except for those expected to see it.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
- Attempting to mimic an official email from a trusted organization to lire individuals.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A unique internet identifier registered to an entity.
- An information packet sent from website to a web browser that records a user's activity on the website.
- algorithm against data to produce a numeric value that is representative that data.
- Stands for "Wireless Fidelity".
- A software robot that performs automated tasks.
- The act of one individual harrasing or intimidating another individual via the interner.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A massed data that is used to describe large amounts of other internet data.
- A grou of computers that is linked to share data and othe information.
- A website that finds information across the Internet based on a set of search criteria.
- an entity.
- A network security measure in which information is encoded or scrambled prior to transmission.
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- Aim to overwhelm the resources of a targeted system to crash that system.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
CYBERCRIME 2021-07-11
Across
- The interdependent network of information technology, infrastructures that includes internet.
- A grou of computers that is linked to share data and othe information.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- The act of one individual harrasing or intimidating another individual via the interner.
- Resource to be accessed, often expressed as a time period.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A company that offers access the internet.
- A network point that acts an entrance to another network
- A website that finds information across the Internet based on a set of search criteria.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- A massed data that is used to describe large amounts of other internet data.
- Stands for "Wireless Fidelity".
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- An online journal.
- Aim to overwhelm the resources of a targeted system to crash that system.
- The overaching program that runs all the functions on a computer or other electronic device.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- An information packet sent from website to a web browser that records a user's activity on the website.
Down
- Assurance that remains private and no one sees it except for those expected to see it.
- algorithm against data to produce a numeric value that is representative that data.
- A program used to access the internet.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A politically- or ideologically-motivated cyber attack or hack.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- A unique internet identifier registered
- A network security measure in which information is encoded or scrambled prior to transmission.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- an entity.
- A software robot that performs automated tasks.
- A unique internet identifier registered to an entity.
- A way to access electonic system by bypassing some or all security mechanisms.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Determining the identity or location of an attacker or an attacker's intermediary.
- Unsolicited advertising or other information sent out via email or other messaging service.
- Malicious software, such as a virus or worm, that attacks a target computer.
- Attempting to mimic an official email from a trusted organization to lire individuals.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
Digital Tech 2023 Final 2023-05-11
Across
- A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.
- Irrelevant or unimportant messages to a large group of people.
- The standard of conduct expected by other tech users.
- Free web based site in which documents can be created, edited, and shared.
- Document that is stored on your computer, usually in a related collection/coordination.
- The crime of taking someone's personal information and using it to become them. Usually for financial gain.
- The legal rights and restrictions governing tech users.
- Local Area Network
- Large computer network connected over the internet for server redundancy.
- Spoofing, internet fraud in the form of emails and pop-ups designed to steal personal information
- Instructions/programs that tell your computer what to do.
- Online journals in which create interaction from readers. Consists of interest groups, business, and others.
- The act of stealing someone else's work in an attempt to pass it off as your own.
- A site that allows users to add content using their own browser. Collaborative Site.
- Universal serial bus.
- The buying and selling of goods online.
- Provides Storage for free
- Arranging all folders files, and other documents in an arranged order.
- Physical equipment that makes up your computer system.
- Wide Area Network
- Type of file that has been created or saved by an application.
- Used to store a group of files and folders in an organized fashion.
- Free online storage service that is intertwined with the company and other sites.
- Method of identity theft where people try to obtain personal information via phone calls.
Down
- The use of online communication to harass or threaten someone. STOP BLOCK TELL
- A link that can be added or clipped onto a document.
- The capability of using tech and knowing when and how to use it.
- The elements of physical and phycological well being related to digital tech use.
- The output of the device that lets you see all of your work as you go.
- The electronic exchange of info.
- The precautions that all tech users must go through in order to ensure their personal safety and security of their network.
- The privileges' and freedom extended to all tech users.
- Central processing unit, part of the computer system that carries out instructions given by the software. Microprocessor, single chip.
- The act of stealing someone else's work in an attempt to pass it off as your own.
- The applied science of design to better improve productivity
- Someone who knows what is write and wrong to do in the Tec world.
- Malicious software, designed to steel information, inflict damage, commit fraud, and spread spam.
- The exclusive legal right given to someone who both created and owns a piece of work.
- Document created by a program or system file which make us the operating system
- Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.
40 Clues: Wide Area Network • Local Area Network • Universal serial bus. • Provides Storage for free • The electronic exchange of info. • The buying and selling of goods online. • A link that can be added or clipped onto a document. • The standard of conduct expected by other tech users. • Physical equipment that makes up your computer system. • ...
The Virtual World 2024-02-28
Across
- A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user.
- Communication in real-time over the internet, typically text-based.
- Controls that allow users to determine how much information they want to share with others on digital platforms.
- A security process in which users provide two different authentication factors to verify themselves.
- A live, visual communication between two or more people via computer or mobile device.
- A security system designed to prevent unauthorized access to or from a private network.
- The network of physical devices embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A collection of web pages accessible via the internet.
- The identification or estimation of the real-world geographic location of an object, such as a mobile device or internet-connected computer.
- A secret word or phrase used for authentication and to gain access to a system.
- Measures taken to protect computer systems and data from unauthorized access or cyber attacks
- A machine that processes data and performs tasks according to a set of instructions.
- The unauthorized access, disclosure, or acquisition of sensitive information.
- A software agent that assists users with tasks or provides information in a virtual environment.
- Connected to or accessible via the internet.
- Transfer data from a remote computer to a local device.
- A unique name used to identify oneself on a computer system or online platform.
- The process of converting information or data into a code to prevent unauthorized access.
Down
- A global network connecting millions of computers worldwide.
- The fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- The trail of data left behind by users when they interact with digital platforms.
- A digital representation of a user in a virtual environment.
- A simulated experience that can be similar to or completely different from the real world.
- An enhanced version of reality where computer-generated information is overlaid on the real world.
- The online representation of an individual's identity, based on data attributes and activities associated with that individual.
- Electronic mail sent and received via the internet.
- The virtual environment created by interconnected computer systems.
- Transfer data from a local device to a remote computer.
- The delivery of computing services—such as servers, storage, databases, networking, software, and analytics—over the internet.
- The act of playing electronic games, often on devices such as computers, consoles, or mobile phones.
- Transmitting or receiving data, typically audio or video, over a computer network in real-time.
- Software used to access and view websites on the internet.
- Websites and applications that enable users to create and share content or participate in social networking.
35 Clues: Connected to or accessible via the internet. • Electronic mail sent and received via the internet. • A collection of web pages accessible via the internet. • Transfer data from a local device to a remote computer. • Transfer data from a remote computer to a local device. • Software used to access and view websites on the internet. • ...
Cyber Stalking Crossword 2016-06-29
Across
- The stalker
- When a stalker claims the victim is hurting them, it is called False ___
- Cyberstalking is against the ___
- The minimum age for Instagram
Down
- Someone who defends the victim
- What is done when a stalker accesses the victim's social media or email, and can edit it
- Most cyber stalking happens on ____
- The person being stalked online
- Women make up _____ percent of victims
- This social media platform allows users to post pictures mainly
10 Clues: The stalker • The minimum age for Instagram • Someone who defends the victim • The person being stalked online • Cyberstalking is against the ___ • Most cyber stalking happens on ____ • Women make up _____ percent of victims • This social media platform allows users to post pictures mainly • When a stalker claims the victim is hurting them, it is called False ___ • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
- Sie dringen illegal in Computersysteme ein.
- Diese Programme protokollieren die Tastatureingaben mit.
- Echtzeit chatten.
- Datenverarbeitungsregisternummer.
Down
- Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
- Personen werden mit Hilfe von elektronischen Medien verletzt.
- Diese Viren sind als ein Programm in eine Datei eingebetet?
- Verbreitet sich direkt über Netze.
- Werbemails die unerwünscht sind nennt man auch?
10 Clues: Echtzeit chatten. • Datenverarbeitungsregisternummer. • Verbreitet sich direkt über Netze. • Sie dringen illegal in Computersysteme ein. • Werbemails die unerwünscht sind nennt man auch? • Diese Programme protokollieren die Tastatureingaben mit. • Diese Viren sind als ein Programm in eine Datei eingebetet? • Personen werden mit Hilfe von elektronischen Medien verletzt. • ...
digital citizenship 2017-09-08
Across
- presence the existence of individual business that can be found online
- bullying using technology to bully someone
- the correct way to communicate on the internet
- safety the knowledge of the user’s personal safety
Down
- domain being available to the public
- Passwords passwords that would throw someone off
- media instagram, snapchat, twitter, facebook
- Danger the danger to children from strangers
- citizenship the responsible behavior regard to technology use
- copyright taking someone's image without citing it
10 Clues: domain being available to the public • bullying using technology to bully someone • media instagram, snapchat, twitter, facebook • Danger the danger to children from strangers • the correct way to communicate on the internet • Passwords passwords that would throw someone off • copyright taking someone's image without citing it • ...
Bullying 2022-10-24
Across
- a form of bullying on the internet
- a form of bullying with weird touches
- a form of bullying used with words
- Something that can make or break bullying
- a form of bullying to hurt the victims social life
- the target of the bullying
- the person who makes fun of/hurts people
Down
- person who intimidates the victim
- The process of the bully bullying
- a form of bullying that hurts the victim
10 Clues: the target of the bullying • person who intimidates the victim • The process of the bully bullying • a form of bullying on the internet • a form of bullying used with words • a form of bullying with weird touches • a form of bullying that hurts the victim • the person who makes fun of/hurts people • Something that can make or break bullying • ...
TECHNOLOGY 2025-01-29
Across
- easy to use or understand
- the use of machines to perform tasks without human intervention
- knowledgeable about modern technology
- the trail of data left by users on the internet
- a small electronic device with a specific function
Down
- measures taken to protect systems from cyber threats
- an important discovery or development
- introducing new ideas or methods
- extremely modern and advanced
- Intelligence (AI) the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • an important discovery or development • knowledgeable about modern technology • the trail of data left by users on the internet • a small electronic device with a specific function • measures taken to protect systems from cyber threats • ...
CRISS-CROSS PUZZLE 2025-01-18
Across
- Who cut Thanos' head off in the movie Avengers:End Game?
- How does the bishop move on the chessboard?
- Unwanted messages flooding your inbox
- Digital brain that thinks like humans, briefly
- Planet in the solar system that has the shortest day
- Guard against cyber attacks
Down
- Element with a symbol Au
- Malicious software that holds your files hostage
- How many years is the tenure of a Rajya Sabha member?
- Web address in short
10 Clues: Web address in short • Element with a symbol Au • Guard against cyber attacks • Unwanted messages flooding your inbox • How does the bishop move on the chessboard? • Digital brain that thinks like humans, briefly • Malicious software that holds your files hostage • Planet in the solar system that has the shortest day • How many years is the tenure of a Rajya Sabha member? • ...
Health crossword (safety words) 2025-04-14
Across
- Mild traumatic injury caused to the brain
- injury caused by a spine injury
- What do you put on when riding a motorcycle
- What do you put on when you get in a car
- a material used to patch up a cut
Down
- Bullying conducted online
- another word for "taking it easy"
- Occupational Safety and Health Administration
- acronym for traumatic spinal cord injury
- Hours How much sleep a teenager needs
10 Clues: Bullying conducted online • injury caused by a spine injury • another word for "taking it easy" • a material used to patch up a cut • Hours How much sleep a teenager needs • acronym for traumatic spinal cord injury • What do you put on when you get in a car • Mild traumatic injury caused to the brain • What do you put on when riding a motorcycle • ...
Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10
Across
- also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
- is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
- is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
- is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
- attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
- is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
- should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
Down
- is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
- recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
- is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
- is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
- in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
- in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization. • also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment. • ...
Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10
Across
- attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
- in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
- is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
- is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
- also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
Down
- is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
- is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
- is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
- in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
- is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
- should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
- recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
- is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization. • also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment. • ...
2003 2013-01-18
Across
- This position controls entry to restricted areas. They perform duties in one of the most sensitive positions in the Air Force Installation Security Program. They must apply controls that ensure only authorized personnel are admitted to restricted areas
- _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements.
- HQ Air Force Security Force Center provides Air Force commanders with guidance on implementation of DAF Civilian Police and Security Guard program to include guidance on organizing, training, and _________ DAF Civilian Police and Security Guards.
- AF/A7S serves as _____________of DAF CP/SG career field.
Down
- ___________ are required at all installations supporting Protection Level 1, 2, or 3 resources. These teams are response elements consisting of two properly armed and equipped Security Forces members.
- These individuals establish command unique programs and policies to ensure the effective use of the DAF Civilian Police and Security Guards in the protection of command installations, personnel and resources. Responsible for primarily managing and guiding Security Forces programs within their commands.
- This position consists of four Security Forces members on one team, or any combination of internal and external SRTs who respond to situations involving protection level resources and may work in smaller teams.
- This position is responsible for base security and protection outside of restricted/controlled areas in addition to the following: responds to emergencies and calls for assistance, secures crime scenes and collects evidence, utilizes specialized equipment, takes reports and statements, conducts building checks, and finally accomplishes any other assigned duties.
8 Clues: AF/A7S serves as _____________of DAF CP/SG career field. • _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements. • ...
2003 2013-01-18
Across
- This position controls entry to restricted areas. They perform duties in one of the most sensitive positions in the Air Force Installation Security Program. They must apply controls that ensure only authorized personnel are admitted to restricted areas
- AF/A7S serves as _____________of DAF CP/SG career field.
- _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements.
- HQ Air Force Security Force Center provides Air Force commanders with guidance on implementation of DAF Civilian Police and Security Guard program to include guidance on organizing, training, and _________ DAF Civilian Police and Security Guards.
- These individuals establish command unique programs and policies to ensure the effective use of the DAF Civilian Police and Security Guards in the protection of command installations, personnel and resources. Responsible for primarily managing and guiding Security Forces programs within their commands.
Down
- This position consists of four Security Forces members on one team, or any combination of internal and external SRTs who respond to situations involving protection level resources and may work in smaller teams.
- ___________ are required at all installations supporting Protection Level 1, 2, or 3 resources. These teams are response elements consisting of two properly armed and equipped Security Forces members.
- Patrols _______ Patrols are responsible for base security and protection outside of restricted/controlled areas in addition to the following: responds to emergencies and calls for assistance, secures crime scenes and collects evidence, utilizes specialized equipment, takes reports and statements, conducts building checks, and finally accomplishes any other assigned duties.
8 Clues: AF/A7S serves as _____________of DAF CP/SG career field. • _______supervise and are responsible for ensuring the training of the following personnel. Training includes on-the-job and proficiency training requirements. • ...
Marie Van Brittan Brown 2023-02-28
10 Clues: system • There were also ? • when was it invented? • was marie a ever a nurse? • what were some of the things? • who helped Marie Van Brittan Brown? • That helped some people check thier? • who were the future inventors of home • American inventor marie was the first?? • Brown who invetned home security systems?
Work and jobs - 1 2021-11-26
14 Clues: cook • artist • soldier • outdoors • goldsmith • carpenter • paramedic • undertaker • car mechanic • sportsperson • police officer • security guard • shop assistant • construction worker
abcd 2023-12-22
CYBERCRIME 2021-07-11
Across
- A politically- or ideologically-motivated cyber attack or hack.
- A way to access electonic system by bypassing some or all security mechanisms.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- Malicious software, such as a virus or worm, that attacks a target computer.
- The overaching program that runs all the functions on a computer or other electronic device.
- A company that offers access the internet.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Resource to be accessed, often expressed as a time period.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- Determining the identity or location of an attacker or an attacker's intermediary.
- The interdependent network of information technology, infrastructures that includes internet.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- A network point that acts an entrance to another network
- A unique internet identifier registered
- An online journal.
- A program used to access the internet.
- Assurance that remains private and no one sees it except for those expected to see it.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
- Attempting to mimic an official email from a trusted organization to lire individuals.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A unique internet identifier registered to an entity.
- An information packet sent from website to a web browser that records a user's activity on the website.
- algorithm against data to produce a numeric value that is representative that data.
- Stands for "Wireless Fidelity".
- A software robot that performs automated tasks.
- The act of one individual harrasing or intimidating another individual via the interner.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A massed data that is used to describe large amounts of other internet data.
- A grou of computers that is linked to share data and othe information.
- A website that finds information across the Internet based on a set of search criteria.
- an entity.
- A network security measure in which information is encoded or scrambled prior to transmission.
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- Aim to overwhelm the resources of a targeted system to crash that system.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
CYBERCRIME 2021-07-11
Across
- The interdependent network of information technology, infrastructures that includes internet.
- A grou of computers that is linked to share data and othe information.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- The act of one individual harrasing or intimidating another individual via the interner.
- Resource to be accessed, often expressed as a time period.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A company that offers access the internet.
- A network point that acts an entrance to another network
- A website that finds information across the Internet based on a set of search criteria.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- A massed data that is used to describe large amounts of other internet data.
- Stands for "Wireless Fidelity".
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- An online journal.
- Aim to overwhelm the resources of a targeted system to crash that system.
- The overaching program that runs all the functions on a computer or other electronic device.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- An information packet sent from website to a web browser that records a user's activity on the website.
Down
- Assurance that remains private and no one sees it except for those expected to see it.
- algorithm against data to produce a numeric value that is representative that data.
- A program used to access the internet.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A politically- or ideologically-motivated cyber attack or hack.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- A unique internet identifier registered
- A network security measure in which information is encoded or scrambled prior to transmission.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- an entity.
- A software robot that performs automated tasks.
- A unique internet identifier registered to an entity.
- A way to access electonic system by bypassing some or all security mechanisms.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Determining the identity or location of an attacker or an attacker's intermediary.
- Unsolicited advertising or other information sent out via email or other messaging service.
- Malicious software, such as a virus or worm, that attacks a target computer.
- Attempting to mimic an official email from a trusted organization to lire individuals.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
Computer Terminology 2024-08-26
Across
- An organized collection of data that can be easily accessed, managed, and updated, often used for storing and retrieving information.
- The software that manages a computer’s hardware and provides services for other software. Examples include Windows, macOS, and Linux.
- The amount of data that can be transmitted over a network in a given period of time, affecting the speed and performance of internet connections.
- A set of instructions that a computer follows to perform a specific task, also known as software or an application.
- A virtual container used to organize files on a computer.
- A collection of data or information stored on a computer, such as a document, image, or video.
- Computing Using remote servers on the internet to store, manage, and process data, rather than relying on local servers or personal computers.
- A software program designed to perform a specific function or task, like a word processor or a game.
- The address used to access a specific website or resource on the internet.
- A small piece of data stored by a web browser that helps remember user preferences and login information.
- A step-by-step set of instructions designed to perform a task or solve a problem.
- Interface (UI) The means by which a user interacts with a computer or software, including elements like buttons, menus, and icons.
- Software used to access and navigate the internet, such as Google Chrome, Mozilla Firefox, or Safari.
- A type of malicious software designed to harm or exploit computers, often by corrupting or deleting data.
- The standard language used to create and design webpages.
Down
- The process of converting data into a code to prevent unauthorized access, ensuring privacy and security.
- A programming language commonly used to create interactive effects within web browsers.
- A language used to describe the presentation of a document written in HTML, including layout, colors, and fonts.
- The process of finding and fixing errors or bugs in a computer program.
- Any external device connected to a computer, such as a mouse, keyboard, or external hard drive.
- A security system designed to prevent unauthorized access to or from a network, often used to protect computers from cyber threats.
- A key combination or icon that provides quick access to a function or application.
- A program or application used to organize, analyze, and store data in tabular form, such as Microsoft Excel or Google Sheets.
- Device A hardware device used to provide data to a computer, such as a keyboard, mouse, or scanner.
- The physical components of a computer system, such as the monitor, keyboard, and processor.
- Device A hardware device used to receive and display data from a computer, such as a monitor, printer, or speakers.
- Storage A service that allows users to save and access their files over the internet instead of on a local hard drive.
- A group of interconnected computers and devices that share resources and information.
- Programs and applications that run on a computer and perform various tasks, like word processing or web browsing.
- A global network of interconnected computers that communicate using standardized protocols, allowing access to websites and online services.
30 Clues: A virtual container used to organize files on a computer. • The standard language used to create and design webpages. • The process of finding and fixing errors or bugs in a computer program. • The address used to access a specific website or resource on the internet. • A step-by-step set of instructions designed to perform a task or solve a problem. • ...
Security Plus Chapter 4 2024-03-07
Across
- validate a main domain along with all subdomains
- An entity that is trusted by others
- digitally sign a program
- A list of certificate serial numbers that have been revoked
- an extension to X.509 that allows various values to be associated with a security certificate
- replaces SSL
- Tracing a certificate back to the highest level of a CA
- publicly accessible centralized directory of digital certificates
- Data that is encapsulated within a secure outer shell
- A method of controlling public keys
- performs a real-time lookup of a certificate’s status
Down
- multiple CAs that sign digital certificates
- management of keys and digital certificates at scale
- web servers send queries to the OCSP Responder
- confidence in or reliance on another person/entity
- associate a user’s identity to a public key
- The entity that is responsible for digital certificates
- A process in which keys are managed by a third party
- A protocol suite for securing Internet Protocol (IP) communications
19 Clues: replaces SSL • digitally sign a program • An entity that is trusted by others • A method of controlling public keys • multiple CAs that sign digital certificates • associate a user’s identity to a public key • web servers send queries to the OCSP Responder • validate a main domain along with all subdomains • confidence in or reliance on another person/entity • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Cyber Security 2017-06-30
jobs 2015-12-10
9-1-1 Officer Ch 4 Police Overview 2023-03-15
Across
- The misappropriation of money
- Forcibly taking someone's vehicle
- Geographical area of authority
- _______ Services Division includes vehicle maintenance
- Division that includes Chief or Sheriff
- _______Process includes child support warrants
Down
- Division that handles safe transfer of inmates
- _______ Patrol Division is primarily sworn officers
- Security provides security for judges
- ________ Warrants handles execution of warrants
10 Clues: The misappropriation of money • Geographical area of authority • Forcibly taking someone's vehicle • Security provides security for judges • Division that includes Chief or Sheriff • Division that handles safe transfer of inmates • _______Process includes child support warrants • ________ Warrants handles execution of warrants • ...
Credit Card 2024-05-23
Across
- The measure of your credit health.
- The cost sometimes charged for card use or for missing payments.
- The security code that shows you are in possession of the card.
- The time between a purchase and when the bill must be paid.
- The agreement to use money from a financial institution with an agreement to pay it back.
- Your credit history can be requested by an _______________ for hiring decisions.
- How much you pay for ________________ may be related to your credit history.
- The bonus returned to you for regular use of the credit card.
Down
- A risk of credit card convenience can be ___________________.
- A security device in your credit card.
- Money owed for purchases made with a financial loan.
- The percentage rate of the debt when you don't pay your bill in full.
- Your minimum payment amount can be found on your credit card _______.
- You will not have to pay any ________________ if you pay your bill in-full before the first due date.
- The plastic tool that contains security features and your credit account name and number.
15 Clues: The measure of your credit health. • A security device in your credit card. • Money owed for purchases made with a financial loan. • The time between a purchase and when the bill must be paid. • A risk of credit card convenience can be ___________________. • The bonus returned to you for regular use of the credit card. • ...
SOAL KABINET SUKIMAN 2024-10-17
Across
- tugas utama dari Kabinet Sukiman adalah menjaga stabilitas keamanan...
- Siapa yang menjadi Wakil Perdana Menteri dalam Kabinet Sukiman?
- Apakah nama perjanjian bantuan militer yang ditandatangani oleh Kabinet Sukiman dengan Amerika Serikat?
- Kabinet sukiman suwiryo bertugas selama...bulan
- Tujuan dari penyelenggaraan pemilihan umum yang direncanakan Kabinet Sukiman adalah untuk membentuk dewan?
- Kabinet Sukiman-Suwirjo diumumkan pada 26...1951
- Perjanjian Mutual Security Act membuat Indonesia dianggap sebagai bagian dari?
- Salah satu program Kabinet Sukiman-Suwirjo adalah mempercepat penempatan mantan pejuang dalam...
Down
- Kebijakan politik luar negeri yang dijalankan oleh Kabinet Sukiman-Suwirjo bersifat?
- Akibat dari kritik dan tekanan terhadap ditandatanganinya perjanjian Mutual Security Act adalah Kabinet Soekiman mengembalikan amanat kepada?
- Wilayah apa yang ingin dimasukkan ke dalam Republik Indonesia dalam waktu sesingkat-singkatnya menurut Kabinet Sukiman-Suwirjo?
- Program kemakmuran nasional jangka pendek yang dicanangkan Kabinet Sukiman bertujuan untuk meningkatkan kehidupan?
- Siapa yang menandatangani perjanjian Mutual Security Act di pihak Amerika Serikat?
- Langkah pertama yang diambil Kabinet Sukiman-Suwirjo adalah Menjalankan tindakan tegas sebagai negara hukum untuk menjamin...
- Kabinet Sukiman-Suwirjo adalah kabinet ke berapa setelah pembubaran Republik Indonesia Serikat (RIS)?
15 Clues: Kabinet sukiman suwiryo bertugas selama...bulan • Kabinet Sukiman-Suwirjo diumumkan pada 26...1951 • Siapa yang menjadi Wakil Perdana Menteri dalam Kabinet Sukiman? • tugas utama dari Kabinet Sukiman adalah menjaga stabilitas keamanan... • Perjanjian Mutual Security Act membuat Indonesia dianggap sebagai bagian dari? • ...
Carson 2021-03-04
Across
- bullying is?
- d of bullying there is an intent to hurt them
- punching kicking spitting.
- spreading rumors, exuding people from games.
- making fun of how someone looks and moves.
- pretending to be someone else on the internet.
Down
- no one is having fun, there is a solution.
- name calling
- b of bullying taller or shorter than someone else and think he or she is an easy target.
- everyone is having fun no one is hurt.
- c of bullying bullying constantly
- writing mean things about people on social media.
- a of bullying physical bully
13 Clues: name calling • bullying is? • punching kicking spitting. • a of bullying physical bully • c of bullying bullying constantly • everyone is having fun no one is hurt. • no one is having fun, there is a solution. • making fun of how someone looks and moves. • spreading rumors, exuding people from games. • d of bullying there is an intent to hurt them • ...
Mystery, Fashion, Business, Japan, Gaming 2025-05-08
Across
- To interact with followers' content
- To kill an enemy player in Valorant
- Your online identity and information
- Feeling that someone can't be trusted; important for online safety
- Bright, glowing colors often used in cyber aesthetics
- Popular topic or style that many people follow online
- Winning against the odds, often alone in gaming
Down
- A certain style or look for your online presence
- A cool, futuristic electronic device
- Your unique identity and style online
- The tech system that decides what content people see
- Being genuine and true to yourself online
- To earn money from online content
13 Clues: To earn money from online content • To interact with followers' content • To kill an enemy player in Valorant • A cool, futuristic electronic device • Your online identity and information • Your unique identity and style online • Being genuine and true to yourself online • Winning against the odds, often alone in gaming • A certain style or look for your online presence • ...
Chapter 1 part 1 2023-09-23
16 Clues: man • name • woman • gender • address • language • last name • city, town • first name • nationality • postal code • phone number • date of birth • email address • personal details • social security number
mc 2025-03-19
Across
- WTLS provides this to verify the identity of the communicating parties
- The layer in WAP responsible for managing session states
- The layer in WAP responsible for security
- WTLS provides this to ensure data is private
- The protocol used in the Security Layer of WAP
- WTLS is optimized for this type of bandwidth
Down
- WTLS is designed to work efficiently in this type of delay network
- WTLS is based on this protocol
- WTLS provides this to ensure data has not been tampered with
- WTLS is based on this protocol
10 Clues: WTLS is based on this protocol • WTLS is based on this protocol • The layer in WAP responsible for security • WTLS provides this to ensure data is private • WTLS is optimized for this type of bandwidth • The protocol used in the Security Layer of WAP • The layer in WAP responsible for managing session states • ...
CASP - Governance 2022-01-26
Across
- protects patient's healthcare information
- International standard on how to manage information security
- Guide to test, training, and exercise programs for IT Plans and capabilities
- International framework and process for managing risk
Down
- protects the data of financial institution customers
- supplementary standard that provides advice on how to implement security controls
- covers the steps in the RMF that address security control selection for federal information systems
- protects financial information of public companies
- 27031 Guidelines for information and communication technology readiness for business continuity
9 Clues: protects patient's healthcare information • protects financial information of public companies • protects the data of financial institution customers • International framework and process for managing risk • International standard on how to manage information security • Guide to test, training, and exercise programs for IT Plans and capabilities • ...
CIS Knowledge Hub 2025-02-20
Across
- Which Microsoft-owned SAST platform focuses on secure code analysis?
- Which security test simulates a real attack on a system?
- Which testing mixes internal knowledge and external behavior?
- Which testing checks functionality without seeing the internal code?
- Which analysis tests security while the application is running?
- Which free DAST tool from OWASP scans running web apps?
Down
- Which testing is done with full visibility of code?
- Which analysis scans source code for vulnerabilities?
- Which DAST tool by PortSwigger is used widely for web security testing?
9 Clues: Which testing is done with full visibility of code? • Which analysis scans source code for vulnerabilities? • Which free DAST tool from OWASP scans running web apps? • Which security test simulates a real attack on a system? • Which testing mixes internal knowledge and external behavior? • Which analysis tests security while the application is running? • ...
EXERCISE 4.1 2020-03-30
Across
- who created the Banaue Rice Terraces
- this president created the National Grains Authority
- mode of transportation during the prehistoric Philippines
- Who created the videophone?
- dubbed as the gloden age of science and technology
- implemented the Universal Access to Quality Tertiary Education Act
- implemented the cyber act of 1999
- Roberto del rosario invented the ___?
- what field of science given priority in the Spanish era
Down
- created the prject " doctors to the bario"
- fe del mundo invented the ___?
- described as dark, brown and short prehistoric people in the philippines
- Most advance civilization during the prehistoric philippines
- Dr. Abelardo aguilar created the _____?
14 Clues: Who created the videophone? • fe del mundo invented the ___? • implemented the cyber act of 1999 • who created the Banaue Rice Terraces • Roberto del rosario invented the ___? • Dr. Abelardo aguilar created the _____? • created the prject " doctors to the bario" • dubbed as the gloden age of science and technology • this president created the National Grains Authority • ...
Bullying Crossword Puzzle 2020-11-30
Across
- what is the c in bullying
- someone is being hurt in an isolated event
- spreading rumors excluding people from games and groups
- punching,kicking, and spitting
- what is the b in bullying
- someone who stands by and lets something happen
Down
- No one is having fun there is a possible solution
- Name calling, threatning
- what is the a in bullying
- uneaqual balance of power and is rude over and over again
- what is the d in bullying
- writing mean things on someones facebook, instagram, or twitter, and texting
- stands up to a bully
- everyone is having fun and no one is getting hurt
14 Clues: stands up to a bully • Name calling, threatning • what is the c in bullying • what is the a in bullying • what is the d in bullying • what is the b in bullying • punching,kicking, and spitting • someone is being hurt in an isolated event • someone who stands by and lets something happen • No one is having fun there is a possible solution • ...
Scorpion 2025-08-22
Across
- Human calculator, math genius with OCD
- Homeland Security agent who mentors and protects the team
- Toby’s profession
- Walter’s main skill, besides inventing solutions
- What eventually grows between Walter and Paige
- Former waitress who helps the team connect emotionally
- Team shrink and behaviorist with gambling issues
- What the group calls themselves, despite constant clashes
Down
- Paige’s genius son mentored by Walter
- Word often used to describe the group’s members
- Team leader with a genius IQ of 197
- Security agency Cabe works for
- Name of the genius team in the show
- Happy’s area of expertise
- Mechanical prodigy and only female genius on the team
- What Sylvester is often compared to
- Walter’s sister, battled multiple sclerosis
17 Clues: Toby’s profession • Happy’s area of expertise • Security agency Cabe works for • Team leader with a genius IQ of 197 • Name of the genius team in the show • What Sylvester is often compared to • Paige’s genius son mentored by Walter • Human calculator, math genius with OCD • Walter’s sister, battled multiple sclerosis • What eventually grows between Walter and Paige • ...
Thanksgiving Crossword 2021-10-07
Across
- A yellow vegetable grown by the Aboriginals
- ___ a pie in the oven
- A dessert eaten at Thanksgiving
- ___ the table before dinner
- A long journey over the ocean
- An object used to frighten birds
- ___ a turkey in the oven
- The month of Thanksgiving in Canada
- Something cooked inside the turkey
- Macy's has this festival every year
- Online shopping is popular on ___ Monday
- Gather the crops
Down
- The sound a turkey makes
- A popular sport played on Thanksgiving
- The early settlers who came to America in 1620
- The evening meal
- A large dinner celebration
- ___ Frobisher was an English explorer
- The nut of an oak tree
- A sauce that is poured over the turkey
- Americans ___ Thanksgiving in November
- Use a knife to ___ the turkey
- A white vegetable that resembles a pumpkin
23 Clues: The evening meal • Gather the crops • ___ a pie in the oven • The nut of an oak tree • The sound a turkey makes • ___ a turkey in the oven • A large dinner celebration • ___ the table before dinner • A long journey over the ocean • Use a knife to ___ the turkey • A dessert eaten at Thanksgiving • An object used to frighten birds • Something cooked inside the turkey • ...
BFCM 2024 2024-11-25
Across
- Pop artist Keith ......
- Our Bridgerton collection includes a design Fit For A .....
- Our Holiday Steals sale code ....24
- Rainbow rug name
- Black Friday/.... Monday
- Copenhagen is the capital city of this country.
- City that is home to our Australian plant.
- Who is the most inspirational frog?
- Customer Care Cup team led by Paul, ..... Finessers
- Jungalow founder and Ruggable collaborator Justina .....
- Customer Care Cup team led Lessly, Resolution .....
Down
- Nicki and Paris
- Day of the week our sale ends
- Large doormats
- Main color of the South Korean flag.
- Fun channel on Slack.
- Kamran Blue ...... Rug
- Customer Care Cup team led by Aja, Customer Support ...
- Customer Care Cup team led by Nohemi, The .... Crew
- Type of mattress in our pet beds.
- 2.5'x7' & 2.5'x10' rugs for example.
21 Clues: Large doormats • Nicki and Paris • Rainbow rug name • Fun channel on Slack. • Pop artist Keith ...... • Kamran Blue ...... Rug • Black Friday/.... Monday • Day of the week our sale ends • Type of mattress in our pet beds. • Our Holiday Steals sale code ....24 • Who is the most inspirational frog? • Main color of the South Korean flag. • 2.5'x7' & 2.5'x10' rugs for example. • ...
Browsing Safely 2025-06-19
Across
- who commit crimes using the internet or computers.
- list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
- process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
- list of approved or trusted websites, programs, or users that are allowed to access a system or network.
- or junk messages, usually advertisements, sent over the internet, often in large amounts.
- Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
- files stored on your computer by websites to remember information about you, like login details or site preferences.
- use of electronic communication to bully or harass someone, typically by sending threatening
- software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
Down
- activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
- method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
- Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.
- security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
- that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
- type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.
15 Clues: who commit crimes using the internet or computers. • or junk messages, usually advertisements, sent over the internet, often in large amounts. • use of electronic communication to bully or harass someone, typically by sending threatening • list of approved or trusted websites, programs, or users that are allowed to access a system or network. • ...
Museum 2023-05-23
13 Clues: Карта • Билет • Лондон • Охрана • звезда • выставка • кафетерий • Посетитель • скульптура • экскурсовод • Ложные новости • Магазин сувениров • произведение искусства
No privacy 2024-04-19
13 Clues: цель • почти • чтобы • хранить • улучшить • повысить • проводить • наблюдение • приватность • исследование • безопасность • записывать (на аудио) • покупательские привычки
Time for the Updates! 2023-09-13
Across
- Companies will often release an update to ______ a specific security vulnerability.
- Attackers use security vulnerabilities to _______ weaknesses and gain access to your system or network.
- All software eventually reaches _______ __ ______ where it is no longer supported with updates and patches. You should avoid using this software at this point.
- It’s important to install updates as soon as possible. They are usually released to fix ________ vulnerabilities.
- Not updating your software can make your system _______ to hackers or malware.
Down
- Whenever possible, you should always enable ______-updates on your computer or cellphone.
- Only download and install software updates from _______ sources.
- Some software updates may require a device or system ______ to fully install.
- It’s very important to install _____ as soon as they are available. This reduces possible security vulnerabilities.
9 Clues: Only download and install software updates from _______ sources. • Some software updates may require a device or system ______ to fully install. • Not updating your software can make your system _______ to hackers or malware. • Companies will often release an update to ______ a specific security vulnerability. • ...
dinny be a bully or a will smash ya head in 2018-11-23
Across
- how many people have experienced bullying under the age of 25
- how many people have suffered on line bullying
- bulling What is the name of internet bulling
- what is the biggest killer of males under 40
- how many people have experienced verbal bullying
Down
- what is louie
- what is the form hittng someone
- what people are most likely to get target
- the well being of your mind
9 Clues: what is louie • the well being of your mind • what is the form hittng someone • what people are most likely to get target • bulling What is the name of internet bulling • what is the biggest killer of males under 40 • how many people have suffered on line bullying • how many people have experienced verbal bullying • ...
the Kennedys 2022-02-13
17 Clues: wife • shedder • gf girl • two dads • the best • the baby • St Lukes • security • detective • southwest • first born • has a wife • girl friend • almost bald • oldest twin • future badge • youngest twin
Vocabulario 1 2021-09-27
Airport Cristina 2019-11-28
New Deal Legacy 2024-03-24
Chashless society 2024-09-02
Across
- How non-cash make it easier to travel?
- Reason for declining cash?
- What is the dark side of a cashless society?
- The impact of cashless on business?
- Why is printing money considered a loss?
- Why are non-cash payment instruments easier to use than money?
- Why are illegal transactions easier with cash?
- What are the disadvantages of the non-cash payment system?
- Risk of system failure?
- Why is cashless more efficient?
- Impact of system failure on traders?
Down
- What is the main disadvantage of non-cash payments?
- What are the main advantages of a cashless system?
- What is easy money laundered?
- Why do banks need high security in the cash system?
- What are the risks of electronic money?
- How does cash affect bank security
- Cashless concerns?
- What are the benefits of going cashless while traveling?
- The impact of negative interest rates?
20 Clues: Cashless concerns? • Risk of system failure? • Reason for declining cash? • What is easy money laundered? • Why is cashless more efficient? • How does cash affect bank security • The impact of cashless on business? • Impact of system failure on traders? • How non-cash make it easier to travel? • The impact of negative interest rates? • What are the risks of electronic money? • ...
Five Nights at Freddy's 2023-09-07
Across
- How do you defend against animatronic attacks in FNaF Special Delivery
- What is the name of the protagonist in Five Nights at Freddy's 3
- The main thing you have to do to animatronics in the game in FNaF 6
- The security guard's shift lasts for this many hours
- What is the objective of the player in "Security Breach"
- The animatronic that hides in the dark corners of the restaurant in FNaF 1
- The animatronics' objective during the night in FNaF 1
- What is the highest difficulty level in Ultimate Custom Night
- The animatronic who performs on the Ballora Gallery stage in SL
- What animatronic does The Puppet reside in FNaF 6
- The animatronic that moves frequently in FNaF 1
- The main character you play as in FNaF 2
- What is the setting of "Tales From the Pizzaplex"
- How many different mini-games are there in "Five Nights at Freddy's: Help Wanted"
- The newspaper headlines often seen in the game in FNaF 1
- What is the DLC for FNaF Security Breach
- The protagonist's primary defense mechanism in FNaF 1
- The 2nd most popular Withered animatronic in FNaF 2
- What is the ultimate goal of the organization responsible for creating and experimenting on the animatronics
- The animatronic that frequently appears in the East Hall in FNaF 1
- What is the title of the second novel in the Five Nights at Freddy's book series by Scott Cawthon and Kira Breed-Wrisley, known for its eerie and unsettling characters
- The main character and protagonist of FNAF 6, known as the "Cassette Man" in FNaF 6
- The room where you wind up the music box to keep the Puppet at bay in FNaF 2
- The animatronic that hides in the closet in FNaF 4
- Who is the main protagonist in FNaF Silver Eyes
- What is the name of Charlie's childhood friend and love interest in "The Silver Eyes"
- The creepy marionette that haunts the establishment in FNaF 2
- What was the "Curse of Dreadbear" DLC in FNaF: Help Wanted made for
- What happens to you when the ventilation system fails in FNaF 3
- The task of burning down the establishment is carried out on this night in FNaF 6
- In the story, what tragic event from the past continues to haunt the characters and plays a pivotal role in the plot
- The name of the horror attraction where the game is set in FNaF 3
- What is the purpose of collecting tapes in the game in HW
- What is the primary gameplay mechanic in FNaF Special Delivery
- The main protagonist of Five Nights at Freddy's 4
- Phone Guy is replaced by who in FNaF 3
- What is the name of the animatronic who copy's Gregory's voice in SBR
- A life-size animatronic bear who entertains during the day in FNaF 2
- Who saves you from the Mimic in SBR
- Who do you play as in FNaF Security Breach Ruin
- What animatronic does William Afton reside in in FNaF Security Breach
- What type of animatronics replace the normal ones in FNaF 3
- In what year did Five Nights at Freddy's 4 take place
- What Twisted animatronic did Foxy dismantle in "The Twisted Ones" Novel
Down
- The name of the restaurant where the game takes place in FNaF 1
- The name of the underground facility in Sister Location
- Who does the player play as in FNaF Security Breach
- The animatronic that resembles a Funtime Freddy, with several animatronic parts merged in FNaF 6
- The day shift security guard, who leaves recorded messages in FNaF 1
- The main character and security guard in FNaF 1
- The name of the pizzeria where FNAF 2 takes place
- The phone guy's profession
- What character do the Minireenas crawl into in "Room for one more"
- What is the name of the minigame where you play as Balloon Boy in FNaF 3
- What is the Acronym for Five Night at Freddy's
- What Twisted animatronic killed Charlie in the "The Twisted Ones" Novel
- The room where you access the Ennard control module in SL
- What type of game is Freddy in Space 1
- Who makes the Fnaf games?
- What type of animatronics are in FNaF world
- The name of the terrifying yellow animatronic bear in Five Nights at Freddy's 4
- The animatronic who is responsible for "scooping" Mike in Sister Location
- What is the specific event from Charlie's past that drives her to return to her hometown and investigate the dark history of Freddy Fazbear's Pizza in "The Silver Eyes"
- The technician who assists you throughout the game in SL
- What role does the player take on in the game's story mode in HW
- What is the title of the first book in the Fazbear Frights series
- What is the main platform people play Ultimate Custom Night on
- What model is Glamrock Freddy in FNaF Security Breach Ruin
- The security office's primary source of information in FNaF 1
- The animatronic who has a rabbit on his hand in SL
- The room where you encounter Funtime Freddy in SL
- The animatronic that resembles a broken clown and is a central character in the game in FNaF 6
- Who is the main antagonist in "FNaF: Help Wanted"
- The man behind the mask
- What is the name of the animatronic that replaces Foxy in FNaF Security Breach
- In the novel, what is the primary objective of the clandestine organization that experiments on animatronics
- Where does the creepy laughter of the animatronics come from
- In "Fetch," what is the name of the animatronic dog
- The important event that many believe to happen in FNaF 2
- How many animatronic characters can you choose from in Ultimate Custom Night
80 Clues: The man behind the mask • Who makes the Fnaf games? • The phone guy's profession • Who saves you from the Mimic in SBR • What type of game is Freddy in Space 1 • Phone Guy is replaced by who in FNaF 3 • The main character you play as in FNaF 2 • What is the DLC for FNaF Security Breach • What type of animatronics are in FNaF world • ...
NSA Crossword 2014-05-17
Across
- information or documents designated as secret
- country Snowden is currently staying in
- keeping tabs on people, a close observation
- collection of valuable information
- what every person is entitled to
- what the NSA is trying to prevent
Down
- electronic surveillance program Snowden had been working on
- person wanted by authorities of a another nation or state
- National Security Agency
- NSA agent that leaked governments top-secret documents
- not being observed or disturbed by other people
- law that Snowden violated
- feeling that you are safe
- state of being free within society
- group of people that make decisions for a country or state
- crime of betraying one's country
- set of information that gives information about other data
17 Clues: National Security Agency • law that Snowden violated • feeling that you are safe • what every person is entitled to • crime of betraying one's country • what the NSA is trying to prevent • state of being free within society • collection of valuable information • country Snowden is currently staying in • keeping tabs on people, a close observation • ...
Schramm ITSCM 280 rev 2023-02-14
Across
- Redundant Array of Independent Drives
- Different kind of data being generated
- A disadvantage of big data is high ____ rate.
- The ____ layer is the top layer of the OSI model
- Network topology with common backbone
- Cable with inner conductor wire and insulation
- RAID 0 name
- The ____ layer is the bottom layer of the OSI model
- Emotion security breacher pray on
Down
- Cloud where apps and data are business critical
- One disadvantage of cloud computing is loss of ___
- Mechanism to bring the meaning out of big data
- Fastest growing cloud service
- A security breach activity using email
- OSI layer where IP address is used
- MAC address stands for Media Access _____
- Increase ____ is a disadvantage of big data
- Abbreviation for Distributed Denial of Service
18 Clues: RAID 0 name • Fastest growing cloud service • Emotion security breacher pray on • OSI layer where IP address is used • Redundant Array of Independent Drives • Network topology with common backbone • Different kind of data being generated • A security breach activity using email • MAC address stands for Media Access _____ • Increase ____ is a disadvantage of big data • ...
JOBS OR OCCUPATIONS 2023-11-10
Across
- A person who spends his/her mental or physical power
- A person who reports events
- A person who deals with people's lives
- A person who can use transportation vehicles
- A person who maintains security of country
- A person who designs and maintains machines
Down
- A person who produces fruits, vegetables
- Woman serving in restaurants
- Men serving in restaurants
- A person who designs home, cities
- A person who vaccinates people
- A person who maintains security of city
12 Clues: Men serving in restaurants • A person who reports events • Woman serving in restaurants • A person who vaccinates people • A person who designs home, cities • A person who deals with people's lives • A person who maintains security of city • A person who produces fruits, vegetables • A person who maintains security of country • A person who designs and maintains machines • ...
worlsa 2025-01-13
technology vocabulary 2021-08-13
Across
- put into format that can be read or processed by computers
- set up for a particular purpose
- a unit of measurement of information
- crime commited using a computer and the internet
- transfer a file or program to a smaller computer
- space a world wide network of of computer networks
- any small compartment
- an organized body of related information
Down
- a program thatgives a computer instrucctions
- a listing of the computer files stored in memory
- the exclusive right to sell a work
- locate and correct errors in a computer program code
- transfer a file or program to a smaller computer
- restore something reduced in volume to it's full volume
- a data transmmision rate for modems
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmmision rate for modems • a unit of measurement of information • an organized body of related information • a program thatgives a computer instrucctions • a listing of the computer files stored in memory • crime commited using a computer and the internet • ...
Reisen 2021-04-28
18 Clues: seat • visit • aisle • sights • arrive • travel • to wait • customs • airport • security • passport • destination • boarding pass • to take a trip • plane passenger • Have a good trip • to go on vacation • to pack a suitcase
passcode to win the Spanish war 2021-11-01
16 Clues: Maine • policy • Policy • Riders • security • Soldiers • Doctrine • Amendment • Roosevelt • Aguinaldo • journalism • Lome Letter • of the Maine • Randolph Hearst • of San Juan Hill • William McKinley
Tech definitions 2016-08-31
Across
- Computer-aid design for techs and artists
- The code to let us run the software.
- It is a common measurement for data speed
- A network security system
- The first page you get to when you open the internet
- Local area network
- It is the most effective way to get data security
- To prepare a chosen partition on the drive.
Down
- printing A printer that prints a 3 dimensional figure
- the indicator that is on the screen
- It is used to create complete applications
- management systems
- the most widely used internet in that local area
- The measurement of data that is transferred in a second
- A person who gets into someone else's account.
- the internet
- Joint Photographic Experts Group
- Domain name system
18 Clues: the internet • management systems • Local area network • Domain name system • A network security system • Joint Photographic Experts Group • the indicator that is on the screen • The code to let us run the software. • Computer-aid design for techs and artists • It is a common measurement for data speed • It is used to create complete applications • ...
2025 Cybersecurity Awareness Month 2025-09-08
Across
- Fake system set up to lure hackers.
- Unauthorized access to data or systems
- Fake emails or messages to steal information
- Malware that locks files and demands payment.
- Code used to take advantage of a vulnerability.
- Hacker intercepts communication between two parties.
- Securing data by converting it into unreadable code.
- Encrypts internet traffic for secure browsing
Down
- Authentication Verifying identity using two methods.
- EU law protecting personal data privacy.
- Security barrier between trusted and untrusted networks.
- Process of verifying a user’s identity.
- Username and password for authentication.
- Malicious code that spreads through files or programs
- Software that protects against malicious programs.
- Malware disguised as legitimate software.
- Isolated environment for testing suspicious files
- Security rules for handling credit card data.
18 Clues: Fake system set up to lure hackers. • Unauthorized access to data or systems • Process of verifying a user’s identity. • EU law protecting personal data privacy. • Username and password for authentication. • Malware disguised as legitimate software. • Fake emails or messages to steal information • Malware that locks files and demands payment. • ...
Alliances 2019-01-23
Across
- many countries are apart of it
- a necessity to bored a plane
- has a death penalty
- a list of true statements
- a storage unit for keeping items whilst traveling
- another word for company
- shortened for European Union
- A form of defense for citizens
- another word for an army or a troop of modern soldiers
Down
- an area that contains helpful information
- what was the end of the title of the first slide on the board
- Shortened for International Security Assistance Force
- an agreement between two or more states or countries
- can leak out of airport body scanners
- headquarters are located in the Netherlands
15 Clues: has a death penalty • another word for company • a list of true statements • a necessity to bored a plane • shortened for European Union • many countries are apart of it • A form of defense for citizens • can leak out of airport body scanners • an area that contains helpful information • headquarters are located in the Netherlands • ...
Alliances 2019-01-23
Across
- many countries are apart of it
- a necessity to bored a plane
- has a death penalty
- a list of true statements
- a storage unit for keeping items whilst traveling
- another word for company
- shortened for European Union
- A form of defense for citizens
- another word for an army or a troop of modern soldiers
Down
- an area that contains helpful information
- what was the end of the title of the first slide on the board
- Shortened for International Security Assistance Force
- an agreement between two or more states or countries
- can leak out of airport body scanners
- headquarters are located in the Netherlands
15 Clues: has a death penalty • another word for company • a list of true statements • a necessity to bored a plane • shortened for European Union • many countries are apart of it • A form of defense for citizens • can leak out of airport body scanners • an area that contains helpful information • headquarters are located in the Netherlands • ...
Jobs Are Here 2015-04-27
14 Clues: Cook • Fire • Farm • Game • Healty • School • Justice • Security • Good Sound • Mrs Doctor • Electricity • Draw - Paint • Mystery - Murder • Find Precious Stones
chapter 5 2022-10-24
14 Clues: reeve • peels • bureau • system • Vollmer • services • security • marshals • Policing • Police Model • watch system • patrol model • principles of policing • enforcement administration
Staff Meeting 11/8 2013-11-07
Across
- is being served at the Nov. 14th Town Hall
- make sure you write you ____ on the document going around
- put the tutor evals. in the ____ binder
- you need to be back from winter break on January
- will be giving residents evaluations
Down
- are due November 10th
- is on call next week
- water bottles in the Cyber are not
- request shift off is due November
9 Clues: is on call next week • are due November 10th • request shift off is due November • water bottles in the Cyber are not • will be giving residents evaluations • put the tutor evals. in the ____ binder • is being served at the Nov. 14th Town Hall • you need to be back from winter break on January • make sure you write you ____ on the document going around
Compliance Program 2021-05-04
Across
- The Federal Aviation Administration (FAA) sets regulations to adopt specific rules for the operation of small Unmanned Aircraft Systems for this compliance category
- if required by a contract requirements may apply to purchases of iron, steel and other manufactured products permanently incorporated into infrastructure projects. Further, these projects must be undertaken by U.S. states and municipalities with funds issued by certain U.S. federal departments and agencies
- The use of cranes and similar types of lifting equipment can pose special hazards for the Company and its employees. To avoid the risk of serious accidents, employees are required to follow policies within the Corporate Crane Procedures
- Kiewit is required by the USCG to periodically provide a Certificate of Financial Responsibility(COFR), Certificate of Inspection (COI) and Certificate of Documentation(COD) for this category.
- Kiewit utilizes a USDOT number and requires an operator to be licensed to be able to operate commercial motor vehicles
- deals with cyber security and often is related to phishing attacks
Down
- This category defines the process to transport equipment and material internationally
- Engage a team (Legal and operation stakeholders) in developing, reviewing, and/or updating processes, procedures, and controls that best meet the Company’s needs, and can be consistently applied by operations groups and other stakeholders
- Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids
- deals with the payment requirements to employees who work for contractors that work on federal and public buildings, typically related to the Davis-Bacon Act
- deals with the training of operators and the plans for how to operate manlifts (abbreviation)
- The document will assist each location to assemble a functional set of procedures, monitoring measures, and training requirements that, when implemented, will minimize their compliance risk
12 Clues: deals with cyber security and often is related to phishing attacks • This category defines the process to transport equipment and material internationally • Relates to Price fixing, comparing bids, agreements to be noncompetitive or allocating bids • deals with the training of operators and the plans for how to operate manlifts (abbreviation) • ...
Unit 2 Odd Pages 2013-04-25
Across
- A collection of multimedia resources accessible via the internet
- Service that enhance security of the data processing systems and the data transfers of an organisation. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the services
- Small simple network device that allows multiple computers to communicate. They are an inexpensive piece of network equipment often found in home wired networks and small businesses
- Most commonly used type of interface which uses icons and pictures that are easily understood by the user and can be clicked using an input device. They vary between manufactures but are generally seen as the most intuitive way of using a computer giving access to users with different levels of knowledge
- A piece of malicious code that is written by programmers and used to corrupt data and systems it comes in different forms such as Trojans, Logic Bombs and Worms
- The link between the user and the technology that they are using both hardware and software
- Technology that enables instant automatic payment directly from the customers bank account when a debit card is used
Down
- When an organisations computer system is interrupted by some form of disaster including power cuts, Fire, Floods, Terrorist Attacks
- When an employee goes against the company ICT code of practice e.g. Leaving a workstation logging on creating the opportunity for an unauthorised individual to access their account
- When individuals or organisations break the law through using computers to illegally access a computer system e.g. to break in and change the payroll figures on the internal database
- Mechanism that is designed to detect and prevent or recover from a security attack
- Hardware devices that join multiple computers together at the data link network protocol layer
- One of the main defences against online problems from internal and external threats it continually scans for viruses including Trojans and worms and can be set to run at particular times of the day. To be effective it must be kept up to date. there are many free and affordable virus checkers.
- Any action that compromises the security of data held by an organisation
- Acts as a barrier between the public internet and your private computer or network and block threats including some viruses. A firewall is a preventive measure against external threats and is a first line of defence but must be used with care and in conjunction with other security measures to be effective
15 Clues: A collection of multimedia resources accessible via the internet • Any action that compromises the security of data held by an organisation • Mechanism that is designed to detect and prevent or recover from a security attack • The link between the user and the technology that they are using both hardware and software • ...
JOBS 2023-09-18
What would you find on a military base? 2023-07-28
Across
- medical services are provided here
- a small convenience store or shop within the base
- large structure for housing military aircraft
- area where military vehicles are found
- religious facility
- Barriers used for access control and security purposes
- area on base for military families
Down
- area designated for weapons training and qualification
- on-base retail stores for military members
- a place to purchase groceries
- facilities & activities provided for leisure and relaxation
- storage facility for weapons & ammunition
- buildings or housing facilities where soldiers reside
- entry and exit points of the base, oft manned by security
14 Clues: religious facility • a place to purchase groceries • medical services are provided here • area on base for military families • area where military vehicles are found • storage facility for weapons & ammunition • on-base retail stores for military members • large structure for housing military aircraft • a small convenience store or shop within the base • ...
worlsa 2025-01-13
Katrina Webber 2020-01-28
Across
- Talking/interacting with people online
- Your usage of the internet
- Buying and selling online
- Enables users to share content online
- Computer network that provides information communication to users
Down
- Beginning connected to another computer or network
- Full electronic participation in society.
- The usage of technology
- The security level of personal things posted to the internet
- The safety of users against security risks
- Portable electronic device
- Rumors spread on the internet by unreliable sources
12 Clues: The usage of technology • Buying and selling online • Your usage of the internet • Portable electronic device • Enables users to share content online • Talking/interacting with people online • Full electronic participation in society. • The safety of users against security risks • Beginning connected to another computer or network • ...
Lesson 1: Introduction to Java 2016-04-24
Across
- For small and memory-constrained devices is ___ Edition
- For large-scale is ___ Edition
- Responsible for security is called ___ Manager
- A simple, general purpose, object-oriented language.
- Portable applications for desktop is ___ Edition
- A software for developing, editing, compiling, building, and debugging
Down
- Java was developed by
- The first line of defense is ___ verifier
- Once Run Anywhere
- Responsible for loading the classes into the interpreter is called ___ Loader
- Java was developed at ___ Microsystems
- It contains JVM
12 Clues: It contains JVM • Once Run Anywhere • Java was developed by • For large-scale is ___ Edition • Java was developed at ___ Microsystems • The first line of defense is ___ verifier • Responsible for security is called ___ Manager • Portable applications for desktop is ___ Edition • A simple, general purpose, object-oriented language. • ...
Medical-Legal Partnership 2025-10-31
Across
- Abbreviation for Supplemental Security Income
- Legal end of a marriage
- Money or help from a program or job
- Legal document that distributes property after death
- A person over the age of 18
- Legal right to care for a child
- A person who inherits
Down
- A choice you make about your life
- Money you receive
- Disability insurance program by Social Security
- Person who helps with legal problems
- Person chosen to make decisions for someone who can’t
12 Clues: Money you receive • A person who inherits • Legal end of a marriage • A person over the age of 18 • Legal right to care for a child • A choice you make about your life • Money or help from a program or job • Person who helps with legal problems • Abbreviation for Supplemental Security Income • Disability insurance program by Social Security • ...
Das Internet 2017-03-09
7 Clues: Wann wurde Facebook gegründet? • Welcher Firmer gehört Yoututbe? • Eine aktuelle Gefahr im Internet • Von wem wurde Youtube gegründet? • Was war die erste Sociale plattform? • Wie laute die erste App mit einer Story? • Mit was zahlen große Konzerne ihre Rechnungen
Computing Test 2019-06-17
7 Clues: hacking • bullying online • a law or a set of laws • intelligence that is not human • someone who has data stored about them • the divide between people with internet and not • hackers putting bad things in files to hack you
Types of Bullying 2013-08-12
7 Clues: someone. • a person's feelings. • someone like an outcast. • calling, saying hurtful things. • hurting a person such as spreading rumours. • information and communication technologies to bullying someone. • someone's relationship, excluding, making the person feel left out etc.
ELSABET CROSS WORD QUESTI 2025-03-06
Across
- computing is a networking model in which data, applications, and processing power are managed by servers on the Internet
- - Refers to cloud functions that process data in some way. This typically refers primarily to running VMs or applications in the cloud, and can also refer to developer tools used to create, test, and deploy applications.
- – Cloud services can be designed to auto-scale in order to avoid capacity-related problems. If this auto-scaling is not adjusting to current demands, you might need to adjust the related configurations or check for security issues that might be causing unexpected problems.
- vNICs(virtual NICs Virtual switch(vSwitch),Common networking modes
- – The ISP might be down. Other problems can originate from your local network hardware, or from endpoint configurations. Or you might have dedicated connections to a public exchange, and your connectivity is suffering from a routing misconfiguration
- also called “hosted infrastructure”, it allows a company to use storage or entire virtual servers
Down
- Compute,Storage,Network,Security
- reduced physical plant costs, reduced upfront costs, reduced personnel costs (employment)
- AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com)
- – Slow or delayed connectivity. Latency is often caused by poor routing, insufficient bandwidth, or a bottleneck. Latency might be the ISP’s responsibility, or you might need to upgrade your service with either your ISP or your CSP.
- Usually offered as a subscription based on the number of users
- – Cloud computing brings its own set of security vulnerabilities. When troubleshooting cloud services, you’ll need to become familiar with the unique indicators of cloud-based security issues.
12 Clues: Compute,Storage,Network,Security • Usually offered as a subscription based on the number of users • vNICs(virtual NICs Virtual switch(vSwitch),Common networking modes • reduced physical plant costs, reduced upfront costs, reduced personnel costs (employment) • AWS (aws.amazon.com),Oracle Cloud (cloud.oracle.com),Microsoft Azure (azure.microsoft.com) • ...
