cyber security Crossword Puzzles
Ac and AC 2022-11-04
28 Clues: fri • liv • ret • tro • lov • hørt • udtryk • frihed • stemme • tortur • lighed • undring • slaveri • skyldig • religion • relation • menneske • uskyldig • værdighed • sikkerhed • uddanelse • retfærdig • bevægelse • privatliv • samtidighed • umenneskelig • nationalitet • forskelsbehandling
Refugee 2022-11-16
25 Clues: RCHNU • redrob • epacse • sserts • sisirc • enimaf • sudoxe • eeucave • eegufer • retlehs • yrtnuoc • ytiruces • ytilitsoh • yrautcnas • decalpsid • noitargim • seitlausac • enitnarauq • noitucesrep • noitargimmi • noitatroped • ssensselemoh • noitairtaper • tnemtaert-lli • rekees-mulysa
Al Aeropuerto - Emma Han 2022-10-13
20 Clues: gate • screen • ticket • airport • arrival • passport • suitcase • to board • security • itinerary • departure • to travel • passenger • the airplane • bathing suit • identification • to get in line • to take a taki • to call someone • confirm the flight
Unit 3: the golden state 2020-03-01
23 Clues: Zitat • Flamme • obwohl • Umwelt • häufig • Mittag • Prozess • fließen • Drehbuch • Mikrofon • wechseln • glänzend • entspannt • Erklärung • Waldbrand • Sicherheit • Aufenthalt • Landschaft • Berühmtheit • niedlich,süß • Jahrgangsstufe • very important person • the year has to of them
Nouns 1: Introducing yourself 2023-03-08
21 Clues: age • home • name • gender • single • married • address • language • divorced • unmarried • last name • city, town • first name • nationality • phone number • email address • country, land • date of birth • first language • personal details • social security number
April 12 Homework menu 2023-04-12
25 Clues: tip • bed • maid • cash • taxi • boat • stamp • guide • closed • castle • pillow • palace • blanket • customs • Station • oppened • security • suitcase • post_card • cathedral • consulate • hand luggage • subway/metro • Poste_office • bottle of water
1.1 Vocab - Sp 3 2022-01-12
22 Clues: ID • gate • ticket • flight • customs • luggage • airport • arrival • security • suitcase • passport • To board • To travel • departure • To forget • itinerary • To believe • To confirm • male passenger • screen/monitor • female passenger • To make a mistake
2: kpl 4 2026-02-11
26 Clues: tulli • lippu • ohjeet • kyltti • portti • haaste • unohtaa • uupunut • poistaa • tehtävä • saapuvat • kilpailu • onnistua • ratkaista • matkustaja • kirjekuori • eksyksissä • rauhoittua • kilpailija • matkalaukku • epäonnistua • tarpeellinen • mahdollisuus • istumapaikka • maihinnousukortti • check turvatarkastus
Pluralsight Security Post Orders 2020-09-04
Across
- Use this program to send passdowns
- Leave all animals ____
- We observe and _______
- Form once per shift (2 wds)
- Your pants must be black _____ slacks
- Use this program to clock-in/out
- Be ____ and aware of your surrounding
- Send these to Devon every shift (2 wds)
- Wear it or you might share it
- Keep these on you during shift
Down
- Patrol that checks EVERYTHING (2 wds)
- ___ your patrol; do not jog or run
- Wear these so you can see...s
- ___ Perimeter patrols per 8 hr shift
- Excellent ____ customer service
- Duck, ___, and Hold during an earthquake.
- Should always be your first priority.
- Check this throughout your shift.
- No electronic devices unless __
- Your shoes must be black and _____
- Documents and tracks EVERYTHING.
- Stay off of these while on patrol
22 Clues: Leave all animals ____ • We observe and _______ • Form once per shift (2 wds) • Wear these so you can see...s • Wear it or you might share it • Keep these on you during shift • Excellent ____ customer service • No electronic devices unless __ • Use this program to clock-in/out • Documents and tracks EVERYTHING. • Check this throughout your shift. • ...
Security Awareness Puzzle 2015 2015-02-17
Across
- Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
- Passwords should be _________ every 3-4 months.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- Never share your _________ with another person.
- A password is stronger by using a combination of both upper and lower case ___________.
- A software that is designed to detect and destroy computer viruses.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- Use __________ passwords for the various accounts that you may have.
- Also known as malicious software; any program or file that is harmful to a computer user.
- ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
- A computer ______ can be considered as the modern counterpart of a paper document.
- A collection of information that is organized so that it can easily be accessed, managed, and updated.
- Healthy email always includes a clear and specific ____________ line.
- Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
- ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
Down
- __________ is a popular web search engine.
- Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- Use this tool to dispose of documents that contain personal or financial information.
- Do not send __________ information over email unless it is encrypted.
- A secure password should contain at least one of these.
- Email scam or attempt to trick you into giving your password or personal information.
- Do not leave your laptop or computer ____________.
- __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- Choose a password that is easy for you to ____________ but hard for someone to guess.
- A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
- To ________ the amount of spam you receive, be careful who you give your email address to.
- The state of being free from danger or threat.
- Another word for understanding, knowledge and well-informed.
- A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
- Passwords should always be at least this many characters long.
30 Clues: __________ is a popular web search engine. • The state of being free from danger or threat. • Passwords should be _________ every 3-4 months. • Never share your _________ with another person. • Do not leave your laptop or computer ____________. • A secure password should contain at least one of these. • Another word for understanding, knowledge and well-informed. • ...
Security Awareness Puzzle 2015 2015-02-11
Across
- To protect personal information, avoid sending it via_________.
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- Never share your _________ with another person.
- Healthy email always includes a clear and specific ____________ line.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- A collection of information that is organized so that it can easily be accessed, managed, and updated.
- Choose a password that is easy for you to ____________ but hard for someone to guess.
- Do not leave your laptop or computer ____________.
- Passwords should be _________ every 3-4 months.
- To ________ the amount of spam you receive, be careful who you give your email address to.
- When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
- A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
- _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
- Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
- Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
- Email scam or attempt to trick you into giving your password or personal information.
Down
- A computer ______ can be considered as the modern counterpart of a paper document.
- Also known as malicious software; any program or file that is harmful to a computer user.
- Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
- Passwords should always be at least this many characters long.
- A secure password should contain at least one of these.
- Do not send __________ information over email unless it is encrypted.
- A software that is designed to detect and destroy computer viruses.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- A password is stronger by using a combination of both upper and lower case ___________.
- Use this tool to dispose of documents that contain personal or financial information.
- Use __________ passwords for the various accounts that you may have.
- __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- Do not _______ your password down or attach it to your keyword or monitor.
- Do not __________ your password or account with anyone.
- Never forward any _________ letter.
- Always ___________ your computer when you leave your desk.
- ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
34 Clues: Never forward any _________ letter. • Never share your _________ with another person. • Passwords should be _________ every 3-4 months. • Do not leave your laptop or computer ____________. • A secure password should contain at least one of these. • Do not __________ your password or account with anyone. • Always ___________ your computer when you leave your desk. • ...
Food Security Ft. Nestle 2015-11-29
Across
- Rights Fundamental rights belonging to individuals in which the government may not interfere
- A system that maintains its own viability by using techniques that allow for continual reuse
- Ease of use, approach, reach
- Providing nourishment, especially to a high degree
- A diligent and systematic investigation into a subject in order to discover facts, theories, etc.
- Meeting minimum requirements
- An endangering, especially of one's reputation; A settlement as a result of mutual concession
- Involving one's personal resources of money
Down
- Suitable or ready for use
- Barely sufficient; as much as necessary
- Dependable, secure, free from danger
- Fundamental systems and facilities servicing an area
- Adequate for the purpose; enough
- The state of being free from danger or threat
- The entire body of individuals born and living at the same time
- Living in companionship as opposed to in isolation
- Performing in the best possible manner with least waste of time and effort
- The planning, implementation, and coordination of the details of an operation
- Of or relating to that which is material
- Relative standing; rank
20 Clues: Relative standing; rank • Suitable or ready for use • Ease of use, approach, reach • Meeting minimum requirements • Adequate for the purpose; enough • Dependable, secure, free from danger • Barely sufficient; as much as necessary • Of or relating to that which is material • Involving one's personal resources of money • The state of being free from danger or threat • ...
IT Security Awareness Contest 2022-04-15
Across
- the use of two different components to verify your identity
- type of tolerance rkmiles has to any actions that create a hostile work environment
- type of grammar that typically raise a red flag for phishing emails
- the first line of defense against cyber criminals
- what you should not let anyone do when you type in your password
- a math function to make data only available with a key
- malicious software that makes date or systems unusable until the victim makes a payment
- where data can be accessed as a service
- when you use the internet you leave this type of footprint behind
- recently discovered vulnerabilities, not yet known to vendors or antivirus companies that hackers can exploit
Down
- can be hardware or software
- program that can automate task
- mass emails sent to many people asking for sensitive information
- virus disguised as legit software
- type of consequence that a sender is asking from you to avoid
- software to assist in detecting virus's
- what you do with your mouse to see where a hyperlink will take you
- email designed to look like it's from a person you know
- what department should you get approval from for downloading software
- what a password should be
20 Clues: what a password should be • can be hardware or software • program that can automate task • virus disguised as legit software • software to assist in detecting virus's • where data can be accessed as a service • the first line of defense against cyber criminals • a math function to make data only available with a key • ...
Security N.1 bis 2023-01-29
Across
- L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
- Una delle password più comuni nel 2022: un evergreen!
- Genera e memorizza in modo sicuro password complesse in un unico luogo
- Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
- Malware che si replica per diffondersi ad altri computer della rete
- Quando i criminali usano gli sms truffa stanno cercando di fare….
- Simile a una password, ma generalmente più lunga per una maggiore sicurezza
- Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
- Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
Down
- _________ sempre il computer quando si lascia la scrivania
- Non aprire se non ci si fida del mittente
- Programma che registra i tasti premuti da un utente
- Il computer avrà molti popup se ne viene infettato
- Un programma software progettato per prevenire i virus
- Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
- Chiamate o messaggi vocali fraudolente
- Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
- Quella a 2 fattori è un tipo di ....... forte
- Una persona che prende o usa le informazioni del vostro computer
- L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
- Interazione online ostile che comporta messaggi di insulto tra gli utenti
21 Clues: Chiamate o messaggi vocali fraudolente • Non aprire se non ci si fida del mittente • Quella a 2 fattori è un tipo di ....... forte • Il computer avrà molti popup se ne viene infettato • Programma che registra i tasti premuti da un utente • Una delle password più comuni nel 2022: un evergreen! • Un programma software progettato per prevenire i virus • ...
2nd Quarter Security training 2023-04-17
Across
- Refer media questions to the CEO or ___ ___ ___.
- ____ if there is an accessible escape path
- Always take threats___.
- ___ silent alarms as soon as you feel safe to do so.
- Inform members of emergency and request they ___ the building.
- Ask witnesses to fill out an ___ ___.
- Once the robber leaves ___ the doors and put up closed signs.
- During a medical emergency have someone ___ with the member while another calls 911.
- If safe, secure cash and ___ ___ information before evacuating.
Down
- ___ you have been robbed.
- When you see a fire ___ the fire alarm to alert others.
- Dial ___ to report incident only if it is safe.
- A ____ is located under each phone.
- The robbery packet is located on the back of the ___ ___.
- Use the ___ to document details of the call for bomb and kidnapping threats.
- ____ in a secure location if you cannot escape
- Primary meeting point is at the ___ dot.
- The alternate meeting point is ___ if it is unsafe at the primary.
- As a last resort ____ to save yourself
- Don't be a ___.
- Put up a ___ paper used to signal all clear to law enforcement.
21 Clues: Don't be a ___. • Always take threats___. • ___ you have been robbed. • A ____ is located under each phone. • Ask witnesses to fill out an ___ ___. • As a last resort ____ to save yourself • Primary meeting point is at the ___ dot. • ____ if there is an accessible escape path • ____ in a secure location if you cannot escape • Dial ___ to report incident only if it is safe. • ...
Security Analysis & Portfolio Management 2022-05-15
Across
- The ability to buy or sell an asset quickly at a known price.
- The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
- --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
- The market ------------------is used as a benchmark to evaluate the performance of funds.
- ------------------------was one of the originators of Capital Asset Pricing model.
- The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
- ------------------------laid the foundations to the Portfolio theory.
- The ----------------------theorem suggests that investment and financing are two different decisions.
Down
- The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
- Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
- A -------------form EMH is when prices reflect all historical information.
- ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
- A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
- The --------------market is used for lending and borrowing short-term funds.
- The --------------measure is calculated as excess returns per unit of systematic risk.
- The --------------------market line is the graphical representation of CAPM.
- -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
- --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
- The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.
20 Clues: The ability to buy or sell an asset quickly at a known price. • ------------------------laid the foundations to the Portfolio theory. • A -------------form EMH is when prices reflect all historical information. • The --------------market is used for lending and borrowing short-term funds. • ...
ICT - Security and Communication 2017-11-20
Across
- Software that gathers data by monitoring key press on the user/s keyboard.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Unsolicited email sent over the internet.
- Used to verify that data comes from a secure and trusted source.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Authentication that relies on certain unique characteristics of human beings.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Refers to safety when using the internet like keeping personal data safe.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- Web applications or website that allow users to create and edit web pages using any web browser.
- The act of gaining unauthorized access to a computer system.
Down
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- A type of protocol that allows data to be sent and received securely over the internet.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Uses SMS system of mobile phones to send out fake text messages.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
22 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
ICT - Security and Communication 2017-11-20
Across
- Web applications or website that allow users to create and edit web pages using any web browser.
- Software that gathers data by monitoring key press on the user/s keyboard.
- Uses SMS system of mobile phones to send out fake text messages.
- A type of protocol that allows data to be sent and received securely over the internet.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Authentication that relies on certain unique characteristics of human beings.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Used to verify that data comes from a secure and trusted source.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- The act of gaining unauthorized access to a computer system.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Unsolicited email sent over the internet.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Refers to safety when using the internet like keeping personal data safe.
24 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Uses SMS system of mobile phones to send out fake text messages. • Used to verify that data comes from a secure and trusted source. • Refers to safety when using the internet like keeping personal data safe. • ...
ICT - Security and Communication 2017-11-20
Across
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- Used to verify that data comes from a secure and trusted source.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
- A type of protocol that allows data to be sent and received securely over the internet.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- Uses SMS system of mobile phones to send out fake text messages.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Web applications or website that allow users to create and edit web pages using any web browser.
- Refers to safety when using the internet like keeping personal data safe.
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
- Software that gathers data by monitoring key press on the user/s keyboard.
Down
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- Authentication that relies on certain unique characteristics of human beings.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- The act of gaining unauthorized access to a computer system.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Unsolicited email sent over the internet.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
25 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
Security Bsides Cyprus 2019 2019-09-21
Across
- The M in HTML
- Famous Linux OS for Penetration Testing
- Mac address is a 12 byte. What type of numbers?
- Not bind shell
- Malware that encrypts data for money
- TCP & UDP runs in that OSI Layer
- Network authentication protocol
- Famous proxy tool for web penetration testing
- which is the first layer in OSI
- Goddess of Cyprus,Venus...
- decode this hex -> 7365637572697479
- 127.0.0.1 IP address
- You can use it for anonymity
Down
- name of first virus
- Swiss army knife of hacking tool/frequently used as backdoor
- Spyware, Trojan, worm, virus
- SSH means
- A cat tries to catch it but you can use it with your computer
- Cross Site _____ Attack
- Famous packet analyzer
- init 6
- IEE 802.11 describes which type of network?
- control and store your repo
- not one
- Which protocol is used by ping command
- The Ripper Cracking tool
- Not TCP
- Protocol that gives access to a user on a remote system
28 Clues: init 6 • not one • Not TCP • SSH means • The M in HTML • Not bind shell • name of first virus • 127.0.0.1 IP address • Famous packet analyzer • Cross Site _____ Attack • The Ripper Cracking tool • Goddess of Cyprus,Venus... • control and store your repo • Spyware, Trojan, worm, virus • You can use it for anonymity • Network authentication protocol • which is the first layer in OSI • ...
Security Bsides Cyprus 2019 2019-09-21
Across
- an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
- The M in HTML
- Famous Debian Distribution for Penetration Testing
- A cat tries to catch it but you can use it with your computer
- Which protocol is used by ping command
- Goddess of Cyprus,Venus...
- name of first virus
- Malware that encrypts data for money
- Famous proxy tool for web penetration testing
- Not bind shell
- Famous packet analyzer
- You can use it for anonymity
- which is the first layer in OSI
- decode this hex -> 7365637572697479
- Swiss army knife of hacking tool/frequently used as backdoor
Down
- control and store your repo
- Spyware, Trojan, worm, virus
- init 6
- 127.0.0.1 IP address
- Network authentication protocol
- IEE 802.11 describes which type of network?
- Not TCP
- TCP & UDP runs in that OSI Layer
- Mac address is a 12 byte. What type of numbers?
- The Ripper Cracking tool
- Cross Site _____ Attack
- Protocol that gives access to a user on a remote system
27 Clues: init 6 • Not TCP • The M in HTML • Not bind shell • name of first virus • 127.0.0.1 IP address • Famous packet analyzer • Cross Site _____ Attack • The Ripper Cracking tool • Goddess of Cyprus,Venus... • control and store your repo • Spyware, Trojan, worm, virus • You can use it for anonymity • Network authentication protocol • which is the first layer in OSI • ...
Final Crossword Security Plus 2024-06-04
Across
- inserts statements to manipulate a database server
- hiding data within an ordinary, nonsecret file
- Removing user accounts
- ensuring that an organization adheres to laws and regulations
- It only goes off after certain conditions are met
- Subset of the board that manages governance issues
- bruteforce collision attack that exploits the probability theory
- Threat actors who are strongly motivated by philosophical or political beliefs.
- involves isolating sensitive enterprise data
- pose a threat from the position of a trusted entity
- refers to integrating security into the application
- A device that distributes work across a network
- An attack that copies data and then uses it
- The entity that is responsible for digital certificates
- Individual or entity who is responsible for attacks
- is a finite sequence of rigorous instructions
- Data that is encapsulated within a secure outer shell
- Threat actors who are employed by their own government to carry out attacks
Down
- Vulnerability for which there are no days of advanced warning
- The rapid detection and elevation of a threat incident
- A downgrade attack
- server within the DMZ that is used to connect two dissimilar security zones
- features and characteristics of the individual
- two or more different messages that produce the same hash value
- Standard preconfigured passwords
- decentralized, distributed and public digital ledger
- An AP set up by an attacker to mimic an authorized AP
- A malicious program that uses a computer network to replicate
- Closing unused ports and disabling unnecessary protocols
- resource that is not possible due to geography
- An unauthorized AP that allows an attacker to bypass many of the network security
- denial of the truth or validity of something
- validate a main domain along with all subdomains
- evidence or proof of something
- A product that consolidates real-time security monitoring and management
- performs a real-time lookup of a certificate’s status
- unauthorized copying of data
- object whose state cannot be modified after it is created
- Identifying and mitigating risks brought on by a third party
- retains historical documents
40 Clues: A downgrade attack • Removing user accounts • unauthorized copying of data • retains historical documents • evidence or proof of something • Standard preconfigured passwords • An attack that copies data and then uses it • denial of the truth or validity of something • involves isolating sensitive enterprise data • is a finite sequence of rigorous instructions • ...
Privacy and Security Online 2024-04-25
Across
- changes a browser's behavior, settings, or appearance without user consent
- theft A type of scam where someone tries to trick you into giving them your personal information
- A setting that allows you to control who can see your profile and posts
- A type of software that can harm your computer or steal your information
- A piece of software that can protect your computer from online threats
- A place where you can safely store your passwords and other sensitive information
- A symbol or character that represents you online
- when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
- the safe and responsible use of information and communication technologies
- A type of attack where someone pretends to be someone else to gain access to your personal information
- sharing photos, videos, and messages with other people
- piracy the illegal copying or distribution of copyrighted material via the Internet
- users open the app an average of 19 times a day
- a collective term for websites and applications that focus on communication
- System used to protect computer systems
- Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
- You should never share this with strangers online
- keep your digital doors locked
- virus a type of malware that downloads onto a computer disguised as a legitimate program
- short and less than 8 characters
20 Clues: keep your digital doors locked • short and less than 8 characters • System used to protect computer systems • users open the app an average of 19 times a day • A symbol or character that represents you online • You should never share this with strangers online • sharing photos, videos, and messages with other people • ...
Hopsital safety and security 2024-10-14
Across
- Summoning Security.
- Measures taken to ensure only authorized personnel can enter certain areas.
- Personal Protective Equipment used to protect healthcare workers from infection.
- An identification card worn by hospital staff.
- A strict isolation imposed to prevent the spread of disease.
- The provision of fresh air to a room, building, etc., which is crucial in preventing the spread of airborne diseases.
- A substance or product used to reduce the number of germs on surfaces or skin.
- The presence of an infectious agent on a body surface, surgical instrument, or other inanimate articles.
- A set of rules or procedures to be followed in medical or clinical settings.
- A person employed to protect the premises and ensure safety.
Down
- Continuous observation of a place, person, or activity.
- An emergency protocol to prevent people from entering or leaving.
- A part of PPE that protects hands from contamination.
- A designated route for leaving a building in case of an emergency.
- The process of separating sick individuals from healthy ones to prevent the spread of disease.
- The process of making something free from bacteria or other living microorganisms.
- Practices to maintain health and prevent disease, especially through cleanliness.
- A temporary identification issued to visitors.
- Closed-circuit television used for monitoring.
- A device that signals the presence of a security breach.
20 Clues: Summoning Security. • An identification card worn by hospital staff. • A temporary identification issued to visitors. • Closed-circuit television used for monitoring. • A part of PPE that protects hands from contamination. • Continuous observation of a place, person, or activity. • A device that signals the presence of a security breach. • ...
Chapter 5 security Plus 2025-03-22
Across
- A request that has been fabricated
- takes advantage of a vulnerability to move to restricted directories
- store data in RAM beyond the boundaries
- An attack in which a website accepts user input without validating it
- hides its presence on the device
- A sign an attack is currently underway
- A malicious program that uses a computer network to replicate
- move from the root directory to other restricted directories
- An attack that copies data and then uses it
- account that is inaccessible through a normal login attempt
- Malware that replicates by infecting other files or programs
- An indicator of attack in which data is no longer accessible
- An attack in which threat actors introduce something into RAM
- Closing unused ports and disabling unnecessary protocols
- inserts statements to manipulate a database server
Down
- depletion of memory or processing capabilities
- resource that is not possible due to geography
- It only goes off after certain conditions are met
- threat actor gains illicit access of elevated rights or privileges
- Software installed on a device without the user requesting it
- Malware disguised as something useful or legitimate
- A cookie that is only sent to the server with an encrypted request
- Installing software security updates
- captures and stores each keystroke that a user types on the computer’s keyboard
- Secure space for running untrusted software
- monitors endpoints and immediately blocks a malicious attack
26 Clues: hides its presence on the device • A request that has been fabricated • Installing software security updates • A sign an attack is currently underway • store data in RAM beyond the boundaries • An attack that copies data and then uses it • Secure space for running untrusted software • depletion of memory or processing capabilities • ...
Cisco Product Advanced Security Puzzle 2024-10-16
Across
- Threat detection engine paired with Kyverno for container security
- A solution that leverages AI to detect and block identity spoofing attacks on endpoints
- Tool used by Cisco to improve customer experience in vulnerability management
- Software list that tracks components for security and compliance purposes
Down
- Standards and certifications that ensure product security and regulatory compliance
- The process of securing network telemetry with gRPC Dial-Out
- Security platform integrating networking and security in Cisco’s architecture
7 Clues: The process of securing network telemetry with gRPC Dial-Out • Threat detection engine paired with Kyverno for container security • Software list that tracks components for security and compliance purposes • Security platform integrating networking and security in Cisco’s architecture • ...
spanish uniut 4 2021-12-14
15 Clues: map • train • flight • airport • service • customs • tourtrip • security • airplane • i will go • itenerary • departures • destination • i will visit • train station
Pieter's Business Finder Quiz 2025-09-01
Across
- A sudden and unexpected event causing loss
- A modern threat covered by specialized insurance policies
- A key metric comparing claims paid to premiums earned
- Government-backed insurer for special risks like riots and strikes
- Intentional deception for financial gain in insurance
- Assessment of an asset’s worth for insurance purposes
- Temporary vehicle provided during repairs
Down
- Professional who advises clients on insurance solutions
- What insurance helps manage and transfer
- Legal responsibility for damage or injury
- The process of evaluating and accepting insurance risk
- Brand identity – Brokers No.1
- Amount paid by the insured before coverage kicks in
13 Clues: Brand identity – Brokers No.1 • What insurance helps manage and transfer • Legal responsibility for damage or injury • Temporary vehicle provided during repairs • A sudden and unexpected event causing loss • Amount paid by the insured before coverage kicks in • A key metric comparing claims paid to premiums earned • Intentional deception for financial gain in insurance • ...
kuis globalisasi dan masyarakat digital 2024-09-17
Across
- Proses pembelajaran yang semakin sering menggunakan ____
- Alat komunikasi yang memudahkan ____ pesan secara elektronik
- Sistem nilai dan norma yang diwariskan melalui ____
- Bidang yang terpengaruh oleh perdagangan ____ internasional
- Sistem ____ yang menghubungkan berbagai perangkat komputer
- Saluran untuk menyampaikan ____ ke publik
- Individu yang mengakses sistem komputer tanpa ____
- Jaringan global yang menghubungkan ____
- Proses yang menghubungkan berbagai negara melalui ____
Down
- Tempat atau ____ untuk berbagi konten secara online
- Cara orang ____ dan bertukar informasi
- Jaringan ____ menghubungkan orang secara virtual
- Data yang telah diproses dan dimaknai untuk ____
- Perdagangan yang dilakukan melalui ____
- Dunia ____ merujuk pada segala hal yang berkaitan dengan internet
- Proses mengubah informasi dari bentuk analog ke ____
- Hak untuk menjaga ____ informasi pribadi di dunia maya
- Alat atau sistem yang digunakan untuk mempermudah ____
- Informasi yang dikumpulkan dan dianalisis untuk ____ keputusan
- Bersifat ____ yang mencakup seluruh dunia
20 Clues: Cara orang ____ dan bertukar informasi • Perdagangan yang dilakukan melalui ____ • Jaringan global yang menghubungkan ____ • Saluran untuk menyampaikan ____ ke publik • Bersifat ____ yang mencakup seluruh dunia • Jaringan ____ menghubungkan orang secara virtual • Data yang telah diproses dan dimaknai untuk ____ • Individu yang mengakses sistem komputer tanpa ____ • ...
computers and kodu 2024-01-10
Across
- here you would find google and all your apps on a computer
- your computer's short-term memory
- a basic game making software
- a texting app that most pepole use
- the code inside your computer
- a physical way of protecting your computer
- a populer battle royale game
- a formal messaging app
- invisible graphic squares
Down
- a console made by microsoft
- a type of worded password
- the right order of code
- images made up of pixels
- a set of instructions for a computer
- someone breaking in toyour computer
- using yourself to unlock a eletric device
- bullying on the internet
- fake prospering adverts sent to yourself
- stands for the Central Processing Unit
- a popular platforming game with lots of smaller games in it made by the pepole using it
20 Clues: a formal messaging app • the right order of code • images made up of pixels • bullying on the internet • a type of worded password • invisible graphic squares • a console made by microsoft • a basic game making software • a populer battle royale game • the code inside your computer • your computer's short-term memory • a texting app that most pepole use • ...
Cybercrime and ICT Laws 2025-03-21
Across
- Law that protects individuals' personal information
- Crime of using domain names in bad faith
- Crime involving explicit materials of minors
- The agency that oversees ICT governance in the Philippines
- Act of intercepting data transmissions without permission
- Data Privacy Act of 2012
- Police unit that investigates online crimes
- Law penalizing cyber libel and hacking
- Investigation unit for online crimes
- Spreading false information about someone online
- Crime involving defamation on the internet
Down
- Interfering with or damaging a computer system
- Online fraud involving fake websites or emails
- Unauthorized access to a computer system
- Financial fraud using computers
- The unauthorized modification or destruction of computer data
- Government agency that investigates cybercrimes
- A system of rules established by a government
- Anti-Child Pornography Act of 2009
- Organization responsible for enforcing the Data Privacy Act
- Online sexual exploitation for money or favors
- Government agency that enforces data privacy laws
22 Clues: Data Privacy Act of 2012 • Financial fraud using computers • Anti-Child Pornography Act of 2009 • Investigation unit for online crimes • Law penalizing cyber libel and hacking • Crime of using domain names in bad faith • Unauthorized access to a computer system • Crime involving defamation on the internet • Police unit that investigates online crimes • ...
news 2022-10-16
Across
- joshua killer
- kdrt perpetrator
- take other people's lives
- the price goes up
- where did the 2004 tsunami occur
- car crash is called
- sexual crimes
- earth's surface vibrations
- lava coming out of volcano is called
- what's being talked about
- criminal act
- people who saw the incident
- big water wave
Down
- hacker name
- overflowing river
- bomb attack in jakarta 2016
- stadium name in malang
- conditions in 2020
- ground shift
- heroin,morphine,etc
- news tv channel in indonesia
- news being discussed
- actions taken by individual from a party to enrich themselves
- the person who reads the news
- form of oppresion
- cyber crime
- take people's things without permission
- things we use during a pandemic
- kdrt victim
- international news channel
30 Clues: hacker name • cyber crime • kdrt victim • ground shift • criminal act • joshua killer • sexual crimes • big water wave • kdrt perpetrator • overflowing river • the price goes up • form of oppresion • conditions in 2020 • car crash is called • heroin,morphine,etc • news being discussed • stadium name in malang • take other people's lives • what's being talked about • earth's surface vibrations • ...
ICT Password 2024-03-06
6 Clues: World Wide Web • Voice Over Internet Protocol • Example of a crypto currency • Information Communictaion Technology • Crime Crime carried out using computer • Technology to hide Ip address and location
DTB Tanzania-2020 2020-12-10
Across
- A city with 2 branches of DTB Tanzania
- The period for credit repayment
- Institutions offering financial services by disrupting traditional banking
- Non-service of a loan facility
- Interest-bearing account for short,long-term goals and emergencies.
- A foreign current savings product
- A cheque with no date marked
- Product for not-for-profits
- Security against credit
Down
- Sales of insurance policies in bank
- A product for students
- A cheque presented after 6 months of mention
- Measurement for credit rating
- Swahili for peace
- A collateral against loan
- latest branch of the bank
- ATMs,POS,mobile banking and wakala's
- A bank serving interest of another bank in a foreign country.
- Detailed account on financial position of a business at a particular point in time
- Accounting and financial reporting standard
20 Clues: Swahili for peace • A product for students • Security against credit • A collateral against loan • latest branch of the bank • Product for not-for-profits • A cheque with no date marked • Measurement for credit rating • Non-service of a loan facility • The period for credit repayment • A foreign current savings product • Sales of insurance policies in bank • ...
Travel Vocab 2020-04-10
Across
- safety belt
- counter
- sleeping car
- car wagon
- window
- ticket
- flight
- trip travel
- passport
- aisle
- controller
- on time
- to turn
- luggage
- gate
- layover
- second class
- luggage screening
- stop
- coach
- visa
- to go through security
- international airport
Down
- boarding pass
- to take off
- in the train station
- to check luggage
- flight attendent
- suitcase
- to get/obtain
- seat
- ticket
- first class
- to go straight
- delayed
- arrival
- security agent
- to hope
- carry-on luggage
- to miss a flight
- to land
- event ticket
- platform
- in the airport
- waiting room
- baggage claim
- passenger
- connection
- departure
- ticket window
- bunk
- customs
- to board
- to see
- to give
55 Clues: seat • gate • bunk • stop • visa • aisle • coach • ticket • window • ticket • flight • to see • counter • delayed • arrival • to hope • to land • on time • to turn • luggage • layover • customs • to give • suitcase • passport • platform • to board • car wagon • passenger • departure • controller • connection • to take off • safety belt • first class • trip travel • sleeping car • event ticket • waiting room • second class • boarding pass • to get/obtain • baggage claim • ...
Travel Vocab 2020-04-10
Across
- safety belt
- counter
- sleeping car
- car wagon
- window
- ticket
- flight
- trip travel
- passport
- aisle
- controller
- on time
- to turn
- luggage
- gate
- layover
- second class
- luggage screening
- stop
- coach
- visa
- to go through security
- international airport
Down
- boarding pass
- to take off
- in the train station
- to check luggage
- flight attendent
- suitcase
- to get/obtain
- seat
- ticket
- first class
- to go straight
- delayed
- arrival
- security agent
- to hope
- carry-on luggage
- to miss a flight
- to land
- event ticket
- platform
- in the airport
- waiting room
- baggage claim
- passenger
- connection
- departure
- ticket window
- bunk
- customs
- to board
- to see
- to give
55 Clues: seat • gate • bunk • stop • visa • aisle • coach • ticket • window • ticket • flight • to see • counter • delayed • arrival • to hope • to land • on time • to turn • luggage • layover • customs • to give • suitcase • passport • platform • to board • car wagon • passenger • departure • controller • connection • to take off • safety belt • first class • trip travel • sleeping car • event ticket • waiting room • second class • boarding pass • to get/obtain • baggage claim • ...
Travel Chap 4 vocab 2020-04-02
Across
- controller
- safety belt
- flight attendent
- to miss
- passenger
- trip; travel
- seat
- customs
- visa
- event ticket
- sleeping car
- to get/obtain
- arrival
- to land
- bunk
- aisle
- international airport
- to hope
- waiting room
- flight
- to give
- to see
- second class
- security agent
- on time
Down
- passport
- gate
- coach
- boarding pass
- platform
- luggage screening
- carry-on baggage
- in the airport
- connection
- baggage claim
- ticket window
- to go through security
- departure
- delayed
- window
- to take off
- car wagon
- first class
- suitcase
- counter
- to board
- to check luggage
- to go straight
- in the train station
- stop
- ticket
- delayed
- ticket
- to turn
54 Clues: gate • seat • visa • bunk • stop • coach • aisle • window • flight • ticket • to see • ticket • to miss • customs • delayed • arrival • to land • counter • to hope • to give • delayed • to turn • on time • passport • platform • suitcase • to board • passenger • departure • car wagon • controller • connection • safety belt • to take off • first class • trip; travel • event ticket • sleeping car • waiting room • second class • boarding pass • baggage claim • ticket window • ...
The Maghrib Times Crossword Puzzle Vol. 3 Iss. 2 2025-03-08
Across
- Evidence not from direct knowledge.
- A member of a jury.
- To formally accuse of a crime.
- Security given for the release of a prisoner.
- A request made to a court.
- One who receives a grant.
- To annul or set aside.
- An official who certifies documents.
- A formal order or decree.
- To make a legal argument in court.
Down
- A written document transferring property.
- To officially call someone to court.
- A civil wrong causing harm to another.
- A legal claim on property as security for a debt.
- To assert or declare without proof.
- A solemn promise, often before a court.
- Fairness as applied in legal cases.
- The location where a case is heard.
- To send a case back to a lower court.
- A demand for something as a right.
20 Clues: A member of a jury. • To annul or set aside. • One who receives a grant. • A formal order or decree. • A request made to a court. • To formally accuse of a crime. • A demand for something as a right. • To make a legal argument in court. • Evidence not from direct knowledge. • To assert or declare without proof. • Fairness as applied in legal cases. • ...
Safety Practices 2026-02-22
Across
- Protection from danger.
- Used to cover and protect a wound.
- A potential source of danger.
- Used to clean wounds and prevent infection.
- A person’s physical well-being.
- Items used to ensure safety during sports.
- The first aim of first aid – to protect life.
- The action taken in an emergency situation.
- Recommended rules to follow for safety.
Down
- Physical harm that may occur during sports.
- Initial assistance given before professional medical help arrives.
- To stop further harm from happening.
- Rules used to prevent injuries during sports and exercise.
- Help given during an emergency.
- Worn to protect hands during first aid.
- Used to secure bandages.
- Used to remove small objects from wounds.
- A situation that poses an immediate threat to health or security.
- Helping an injured person heal.
- Used to cut bandages or tape.
20 Clues: Protection from danger. • Used to secure bandages. • Helping an injured person heal. • Used to cut bandages or tape. • Help given during an emergency. • A potential source of danger. • Recommended rules to follow for safety. • Used to cover and protect a wound. • A person’s physical well-being. • ...
III L - crossword 2 M. Klocek; K. Mandecki 2015-04-27
3 2024-05-14
Authorities 2025-02-11
Do you know the words? 2021-01-08
27 Clues: Dach • Akku • Raum • lösen • Waren • Daten • Drohne • Reifen • Roboter • Netzwerk • Sitzplatz • Reparatur • befördern • verbessern • aufsperren • Sicherheit • Kopfkissen • verhindern • verringern • Freiwillige • Behinderung • kompliziert • Privatsphäre • Lautsprecher • nachverfolgen • Haushaltsgeräte • Windschutzscheibe
Spanish 2 Unit 2 Vocab Crossword 2020-11-04
25 Clues: movil • hombre • mandar • medico • músico • soldado • bombero • policia • artista • abogado • recibir • flexible • mecánico • dentista • cocinero • escritor • comunicar • enfermero • la rutina • compartir • ingeniero • la oficina • la autonomia • la securidad • la disciplina
Glossary: The United Nations 2022-02-15
Across
- arvo
- toimintaperiaate, käytäntö
- arvokkuus, ihmisarvo
- kääntää (kielestä toiseen)
- jäsenvaltio
- aktiivinen kansalainen
- edistää, tukea
- rauhanturvaaja
Down
- kestävä kehitys
- suojella
- ulkomaanasiat
- tasa-arvo
- konflikti, ristiriita
- tehdä yhteistyötä
- parantua, edistyä
- kääntäjä
- ihmisoikeudet
- turvallisuus
- tulkki
- kansainvälinen laki
- määrätä, säätää
21 Clues: arvo • tulkki • suojella • kääntäjä • tasa-arvo • jäsenvaltio • turvallisuus • ulkomaanasiat • ihmisoikeudet • edistää, tukea • rauhanturvaaja • kestävä kehitys • määrätä, säätää • tehdä yhteistyötä • parantua, edistyä • kansainvälinen laki • arvokkuus, ihmisarvo • konflikti, ristiriita • aktiivinen kansalainen • toimintaperiaate, käytäntö • kääntää (kielestä toiseen)
Family 2024-06-25
22 Clues: bread • piano • sings • sheds • gamer • hunter • reader • frugal • farmer • swimmer • chickens • artistic • boatmover • cat lover • loves Theo • mechanical • animal expert • homestyle cook • wastes nothing • boy scouts dad • canine security • don't forget about
French II Crossword 2023-04-20
25 Clues: car • taxi • card • foot • cash • castle • strike • subway • ticket • palace • baggage • customs • embassy • airport • suitcase • airplane • passport • security • cue/line • consulate • cathedral • boat/ship • job/position • ticket giver • train station
Refugee 2022-11-11
25 Clues: RCHNU • sudoxe • sisirc • epacse • enimaf • sserts • redrob • eegufer • eeucave • yrtnuoc • retlehs • ytiruces • decalpsid • ytilitsoh • yrautcnas • noitargim • enitnarauq • seitlausac • noitatroped • noitucesrep • noitargimmi • ssensselemoh • noitairtaper • rekees-mulysa • tnemtaert-lli
Occupations 2022-05-12
23 Clues: Pilot • nurse • artist • driver • Dancer • Police • Doctor • Singer • athlete • Soldier • Dentist • preacher • musician • Male chef • professor • missionary • movie star • Female chef • Male seller • Female seller • security guard • employee/staff • Officer/government official
Bank Protection Act 2015-07-22
Across
- What frequently used machine must meet all applicable UL standards of the bank?
- A requirement of the BPA is using ______ devices, such as prerecorded serial-numbered bills, or chemical and electronic devices.
- A requirement of the BPA is retaining a record of any robbery, ______, or larceny committed against the bank.
- A requirement of the BPA is maintaining a _______ that records activity in the banking office
Down
- The bank's security program shall designate a Bank Security _______
- Sixty Eight In what year was the BPA Passed?
- The BPA was passed by?
- The bank's security program shall designate a Bank Security ________
- of Directors It is the responsibility of the bank's ____ of ______ to comply with the BPA
9 Clues: The BPA was passed by? • Sixty Eight In what year was the BPA Passed? • The bank's security program shall designate a Bank Security _______ • The bank's security program shall designate a Bank Security ________ • What frequently used machine must meet all applicable UL standards of the bank? • ...
Entitlement Programs 2022-03-24
Across
- The form of Social Security meant for elderly people (based on age).
- Political issues important to most working class Americans (ex. wages and tax rates).
- Committees that decide how much money to spend on authorized programs.
- Annual cost of living adjustment mandated by law in welfare programs and Social Security.
- Committees that decide which programs to fund.
- Law that changed AFDC to TANF and tightened eligibility requirements.
Down
- Social Programs that distribute federal funds to all people who meet eligibility requirements.
- The form of Social Security meant for the disabled (people have to prove their disability to get this).
- Provides retirement benefits, health insurance, and support for the disabled and orphans.
9 Clues: Committees that decide which programs to fund. • The form of Social Security meant for elderly people (based on age). • Law that changed AFDC to TANF and tightened eligibility requirements. • Committees that decide how much money to spend on authorized programs. • Political issues important to most working class Americans (ex. wages and tax rates). • ...
Pipsographer 8 2023-10-31
Across
- The is the price a seller is willing to accept for a security
- A written order to a bank to pay a specific amount of money from one account to another
- A person who owns shares in a corporation
- The total value of final goods and services produced by a country's citizens, regardless of their location
- Efforts to provide banking and financial services to all segments of the population
- This happens when someone dies without leaving a will
- Rivalry among sellers trying to achieve goals such as profit
Down
- Costs incurred in the process of generating revenue
- The process by which financial transactions are settled
- An upward movement in the price or value of a security or asset
- A company having a group of subsidiaries engaged in unrelated activities
- Satisfaction or happiness derived from consuming goods and services
- The maximum price that a buyer is willing to pay for a security
13 Clues: A person who owns shares in a corporation • Costs incurred in the process of generating revenue • This happens when someone dies without leaving a will • The process by which financial transactions are settled • Rivalry among sellers trying to achieve goals such as profit • The is the price a seller is willing to accept for a security • ...
CROSSWORD 2026-03-23
Across
- — The six official languages of the UN include Arabic, ______, Spanish, English, Chinese, and Russian as part of its multilingual system
- — INTERPOL notice that warns of serious threats to public safety such as dangerous materials, events, or individuals
- — What administrative body supports the day-to-day operations of international organizations like INTERPOL by handling coordination and management
- — What organization promotes police cooperation among ASEAN member states to combat transnational crime and enhance regional security
- — The ASEANAPOL Secretariat became fully operational in January ______ marking a milestone in institutional development
- — ______ notice provides warning about persons likely to commit crimes and alerts member countries for preventive action
- — Known as ______ crime, it threatens peace and security across nations by crossing borders and jurisdictions
- — ______ notice helps locate missing persons, often involving minors or vulnerable individuals
- — INTERPOL notice used to collect additional identity information about a person of interest in criminal investigations
- — Originated with the first International Criminal Police Congress in 1914 as the organization that facilitates international police cooperation
- NATIONS — United Nations (abbreviation) which is the global organization responsible for maintaining international peace and security
- — Kuala ______ is the location of ASEANAPOL Secretariat, serving as its headquarters in Malaysia
- — The main function of the UN is to maintain peace and ______ around the world through cooperation and diplomacy
- — The Big 5 or P5 of the UN has the power to ______ which allows them to block substantive resolutions in the Security Council
- — What slogan is used by INTERPOL: “Connecting police for a safer world” which reflects its mission and global purpose
Down
- — A notice used to locate a wanted person for arrest with a view to extradition or similar legal action
- — Signed by ASEAN Chiefs of Police during the 25th ASEANAPOL Conference as a formal statement of cooperation and commitment
- — What political and economic union established EUROPOL to enhance law enforcement cooperation among its member states
- — The Big 5 include China, France, ______, United Kingdom, and United States as permanent members of the UN Security Council
- -NOTICE TO SEEK INFORMATIPON ON UNIDENTIFIED BODIES
- — What is the name of the global police cooperation network that connects law enforcement agencies worldwide
- — Europol headquarters is in ______, Netherlands, known as a center for international law and justice
- — What role provides expert guidance to law enforcement leadership in making strategic and operational decisions
- — The 29th ASEANAPOL Conference was held in ______, Vietnam (2009), bringing together regional police leaders
- — In which French city is INTERPOL headquarters located, serving as the central hub of its operations
- — Europol’s Executive Director is assisted by three ______ directors who help manage operations and administration
- — Which small European country hosts the INTERPOL Congress and played a key role in its early formation
- — What acronym stands for the International Association of Chiefs of Police, a global professional organization for police leaders
- — The Latin verb for terrorism is ______ meaning “to frighten or cause fear,” which is the root of the term terrorism
- — A team that supports member states after a terrorist act or critical incident by providing rapid response assistance
- — Who serves as Secretary General of INTERPOL (recent), providing leadership and direction for the organization
31 Clues: -NOTICE TO SEEK INFORMATIPON ON UNIDENTIFIED BODIES • — ______ notice helps locate missing persons, often involving minors or vulnerable individuals • — Kuala ______ is the location of ASEANAPOL Secretariat, serving as its headquarters in Malaysia • — Europol headquarters is in ______, Netherlands, known as a center for international law and justice • ...
Using computers 2024-01-09
Across
- to scramble up messages
- you use it to click on things
- a type of biometric security
- like a website
- physical parts of a computer
- an online texting or sharing app
Down
- typing
- to protect the users account
- a physical security method using your body
- a sequence of numbers or letters
- a method of sending a digital copy of a letter
11 Clues: typing • like a website • to scramble up messages • to protect the users account • a type of biometric security • physical parts of a computer • you use it to click on things • a sequence of numbers or letters • an online texting or sharing app • a physical security method using your body • a method of sending a digital copy of a letter
Travel Vocab 2020-04-10
Across
- luggage
- ticket
- aisle
- delayed
- to land
- waiting room
- platform
- passenger
- arrival
- carry-on luggage
- sleeping car
- controller
- to take off
- international airport
- security agent
- departure
- on time
- flight
- seat
- bunk
- baggage claim
- to hope
- flight attendent
- to get/obtain
- luggage screening
Down
- customs
- in the train station
- first class
- trip travel
- derecho to go straight
- coach
- to give
- to check luggage
- safety belt
- event ticket
- passport
- boarding pass
- in the airport
- stop
- connection
- second class
- to miss a flight
- visa
- car wagon
- to go through security
- suitcase
- ticket
- window
- layover
- to see
- gate
- to turn
- ticket window
- counter
54 Clues: stop • visa • gate • seat • bunk • aisle • coach • ticket • ticket • flight • window • to see • customs • luggage • delayed • to give • to land • arrival • on time • layover • to turn • counter • to hope • platform • passport • suitcase • passenger • car wagon • departure • connection • controller • first class • trip travel • safety belt • to take off • waiting room • event ticket • sleeping car • second class • boarding pass • ticket window • baggage claim • ...
Foundation of Security and Cybercrimes 2024-11-20
Across
- ensuring authorized personnel only
- accessible without delay
- steals, change, or destroy information
- unauthorized collection of information
- mass distribution of unsolicited messages
- unauthorized access to electronic data
- supplements the precautionary measures
- exclusive legal right to utilize artistic or musical material
- use of electronic communication to bully
- illegal threats
- restricts access to your computer to demand payment
- ensuring accuracy
- works without attaching to files
- allows logged in users use an application
Down
- method of breaching
- electronic lascivious exhibition of sexual activity
- imitating language or thought without authorization
- fraudulent sending of emails
- weakness
- assurance of the origin of information
- state of well-being
- violate security
- infects your computer
- action to protect the system
- anticipating threats
- common online fraud
- Someone cannot deny something
27 Clues: weakness • illegal threats • violate security • ensuring accuracy • method of breaching • state of well-being • common online fraud • anticipating threats • infects your computer • accessible without delay • fraudulent sending of emails • action to protect the system • Someone cannot deny something • works without attaching to files • ensuring authorized personnel only • ...
Dispatch Crossword 2025-08-28
Across
- A place you might find our NYC team members
- To steal or check in
- The data of a system that must be saved because of its value
- Any person seeking to compromise a function or structure
- Tells you something is amiss
- Shows the elements that make up the assembly
- What are we known for?
- source of electric power
Down
- What we aim to prevent
- A type of security camera
- A type of security camera
- A place you might find our ROC team members
- 7 down
- onsite or offsite
- A string of characters used to confirm a user's identity
- A grocery store we work with
- A place you might find our FL team members
- A drawing of the worksite
- Something we install
- To interfere with in order to cause damage
- Device that detects a change
21 Clues: 7 down • onsite or offsite • To steal or check in • Something we install • What we aim to prevent • What are we known for? • source of electric power • A type of security camera • A type of security camera • A drawing of the worksite • A grocery store we work with • Tells you something is amiss • Device that detects a change • A place you might find our FL team members • ...
Security and Safety 2022-11-02
Across
- person responsible for cost of lost keys
- responsible for overall safety/security of facility
- network ___________ center
- part of the NACI application
- this is always removed on a sign in sheet
- annual training for information security
- always secure me before walking away
Down
- created by CIM and given to employees
- this is everyone's responsibility!
- number of FTST counselors required at remote local
- three letter acronym for client information
- workstations are for ______ use only
- red over black and we'll be back (two words)
13 Clues: network ___________ center • part of the NACI application • this is everyone's responsibility! • workstations are for ______ use only • always secure me before walking away • created by CIM and given to employees • person responsible for cost of lost keys • annual training for information security • this is always removed on a sign in sheet • ...
INVESTING - Travis Perkins 2026-03-20
Across
- that are created and backed up but not tied.
- potential high problems.
- a virtual wealth that gains a lot.
- it’s managed by someone.
- COST AVERAGING putting all wealth at given time.
- CHAIN connected through a digital seal
Down
- a security of social interaction.
- someone who buys stock for the long term.
- something that puts out in exchange.
- a special type of tax.
- retirement and survivor benefits.
- CAP the total importance of information.
- a network of recorded information.
13 Clues: a special type of tax. • potential high problems. • it’s managed by someone. • a security of social interaction. • retirement and survivor benefits. • a virtual wealth that gains a lot. • a network of recorded information. • something that puts out in exchange. • CHAIN connected through a digital seal • CAP the total importance of information. • ...
ONLY US 2021-10-19
21 Clues: RUGBY • COFFEE • MAN U! • CHEEKY • VENDING • THE BOSS • MUSICIAL • PLUMBING • MR FIX IT • CONCIERGE • SANDWICHES • ELECTRICIAN • HEAVY METAL • SCOOTER KING • SCOTTS LASSIE • NEWLY MARRIED • FEMALE SECURITY • HEALTH & SAFETY • LANGUAGE EXPERT • RECEPTIONIST TC1 • CATERING SUPERVISOR
gkhvvvlxxv 2021-10-14
20 Clues: hurry • close • alone • cream • saving • safety • chicken • carfuel • just us • quizzes • straight • children • car place • come over • sunny city • long but more • staying alive • ball hit target • all of the things • youtube reaction vid
German Crossword 2020-11-09
20 Clues: home • role • bond • woman • source • security • ownership • love match • confidence • traditional • to belong to • illegitamate • single parent • foster family • living together • adoptive family • patchwork family • surrogate family • to be descended from • between generation family
Spotlight 8, 7A, kirjoita kaikki sanat yhteen ilman sanavälejä 2020-04-16
26 Clues: koe • lupa • ilman • uskoa • jutut • katsoa • edessä • suosikki • ongelmat • keskusta • selittää • kiusaaja • onnistua • oppitunti • viimeisin • keskustelu • rasistinen • kateellinen • kiusallinen • keskustella • valehtelija • turvallisuus • pitkään aikaan • saada selville • pyytää anteeksi • epäystävällinen
Vocab List #7 2023-04-26
25 Clues: - fly • - gum • - sun • - rude • - boat • - door • - bomb • - trick • - hotel • - candy • - cloud • - snake • - train • - energy • - turtle • - airport • - to walk • - to fish • - snorkle • - suitcase • - security • - to board • - Perchance • - butterfly • - Photo/Image
Cloud Computing 2015-05-08
13 Clues: Wolke • nutzen • Nutzer • Anbieter • Anwendung • Datenbank • zugreifen • Verbindung • Sicherheit • aufbewahren • Berechtigung • stabilisieren • Virtualisierung
Authorities 2025-02-07
Kaleidoscope 2025-03-25
SAPM CROSSWORD 2022-06-22
Across
- The economist who developed the Arbitrage Pricing Theory (APT) model
- The other name for non-diversifiable risk is -------------------------risk
- The economist who laid the foundations for the Modern Portfolio theory
- An opportunity where an investor earns riskless profit without making any net investment
- Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
- In the absence of secondary markets, this risk would be higher
- One of the researchers/economists who developed the CAPM model
- The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
Down
- Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
- The other name for indifference curve is --------------curve
- --------------------is the slope of the security characteristic line
- A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
- The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
- CAPM is a market --------------model
- The line representing CAPM is the -----------------market line
- A conditional market order to sell stock if it drops to a given price (write without space)
- The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
- In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable
19 Clues: CAPM is a market --------------model • The other name for indifference curve is --------------curve • The line representing CAPM is the -----------------market line • In the absence of secondary markets, this risk would be higher • One of the researchers/economists who developed the CAPM model • The economist who developed the Arbitrage Pricing Theory (APT) model • ...
RP vs AE 2026-01-08
15 Clues: Vest • Shrimp • Tuxedo • Raisin • Costume • Eggplant • Raincoat • Crosswalk • Yard sale • Comforter • Two weeks • Execuse me • Undershirt • Stuffed animal • Social Security Number
Blackbird Girls Vocabulary 2024-03-11
Across
- A visible suspension of particles in the air, typically produced by burning or combustion.
- impossibility A situation that is extremely unlikely to occur based on statistical analysis.
- A deep red color.
- The Committee for State Security, the main security agency of the Soviet Union from 1954 to 1991, responsible for intelligence, counterintelligence, and internal security.
- drill A practice exercise conducted to prepare individuals for emergencies or hazardous situations.
- police A government agency responsible for intelligence gathering, surveillance, and maintaining internal security, often with extensive powers and operating covertly.
- A type of cured sausage, typically made of fermented and air-dried meat.
- jays A species of bird characterized by their blue plumage and noisy calls.
Down
- A building material made from a mixture of cement, aggregate (such as gravel or sand), water, and sometimes additives.
- A type of bird, often referring to the common blackbird, known for its black plumage and melodious song.
- Small birds belonging to the family Passeridae, typically brown or gray in color.
- power station A facility that generates electricity through nuclear reactions, usually involving the splitting of atoms in a reactor.
- Union Former socialist state in Eurasia, existing from 1922 to 1991, comprising several republics including Russia, Ukraine, Belarus, and others.
- The horizontal piece at the bottom of a window frame, often where objects can be placed.
14 Clues: A deep red color. • A type of cured sausage, typically made of fermented and air-dried meat. • jays A species of bird characterized by their blue plumage and noisy calls. • Small birds belonging to the family Passeridae, typically brown or gray in color. • The horizontal piece at the bottom of a window frame, often where objects can be placed. • ...
Australia's connection with the world. 2017-03-02
14 Clues: gain • ship • armor • emblem • Nation • shield • exchange • purchase • computer • recession • employment • transporting • outward looking out • information technology
Health All the Way 2024-11-14
Moderne Technologien 2016-11-22
6 Clues: Sucht • Prozess des einsam Werdens • Fähigkeit im Gehirn zu speichern • verkörpert die künstliche Intelligenz • absichtliche Bedrohen oder Belästigen auf Internet z.B. • Fokussierung der Aufmerksamkeit auf bestimmte Tätigkeit
Teka teki silang keamanan jaringan 2025-11-28
Across
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- OF SERVICE (DOS)
Down
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
21 Clues: OF SERVICE (DOS) • Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • ...
Privacy And Security 2022-11-15
Across
- permission that patients give in order to disclose protected health information.
- It provides detailed instructions for handling and protecting a patient’s personal health information
- what are these considered Additional hardware, software, and licensing costs, resistance to giving up paper records, difficult data entry, training,computer downtime, such as expected failure or routine servicing, and confidentiality and security concerns, such as access of information to unauthorized individuals.
- The Health Insurance Portability and Accountability Act of 1996
- what are these considered… not leaving printers unattended, not coping confidential information if unauthorized, contacting the receiver and verifying the fax number.
- Hitting, kicking, shaking, pulling hair, pinching, choking,biting, burning, scalding,threatening with a weapon,inappropriate restraint, withholding food/water, not providing physical care, and abandonment.
Down
- information that is shared within a protected relationship
- How long are medical records kept for ?
- contain all personal information such as…full name,Living address,Medical history etc.
- rule It provides regulations that make sure that confidential records are kept secure
- includes protected health information, privacy, confidentiality, and disclosure
- Excessive demands, insults, humiliation,jealousy, control, isolation,stalking/threats,and lack of affection and support.
- Using sexual gestures, suggesting sexual behavior, and unwanted sexual touching or acts
13 Clues: How long are medical records kept for ? • information that is shared within a protected relationship • The Health Insurance Portability and Accountability Act of 1996 • includes protected health information, privacy, confidentiality, and disclosure • permission that patients give in order to disclose protected health information. • ...
World of security 2021-05-01
Across
- a holder of supplies for manufacturers
- to buy or sell goods or services
- the fact or condition of being regarded or treated as more important than others
- declared in law as unable to pay their debts
- a part or portion of a larger amount which is divided among a number of people
- a number of connected items or names written or printed consecutively, typically one below the other
- an amount of smth expressed as a number out of 100
Down
- a fact that shows that smth exists or is true
- a thing that is needed or wanted
- occurring once every year
- happening four times a year
- a large sum of money which you use to start a business
- to give your voice to somebody or register your choice
13 Clues: occurring once every year • happening four times a year • a thing that is needed or wanted • to buy or sell goods or services • a holder of supplies for manufacturers • declared in law as unable to pay their debts • a fact that shows that smth exists or is true • an amount of smth expressed as a number out of 100 • a large sum of money which you use to start a business • ...
World of security 2021-05-01
Across
- to buy or sell goods or services
- a thing that is needed or wanted
- a fact that shows that smth exists or is true
- declared in law as unable to pay their debts
- a number of connected items or names written or printed consecutively, typically one below the other
- a part or portion of a larger amount which is divided among a number of people
Down
- happening four times a year
- an amount of smth expressed as a number out of 100
- the fact or condition of being regarded or treated as more important than others
- a holder of supplies for manufacturers
- a large sum of money which you use to start a business
- occurring once every year
- to give your voice to somebody or register your choice
13 Clues: occurring once every year • happening four times a year • to buy or sell goods or services • a thing that is needed or wanted • a holder of supplies for manufacturers • declared in law as unable to pay their debts • a fact that shows that smth exists or is true • an amount of smth expressed as a number out of 100 • a large sum of money which you use to start a business • ...
Social Security Puzzle 2024-02-22
13 Clues: enforcers • ______ age • DSS' Birthday • not a pension • street location • In with the new • long term benefit • Quantum of Pension • meets requirements • Short-term benefit • 1 week's contribution • Pension changes (2012) • out with the old (system)
Water Security Crossword! 2020-04-14
Across
- the quantity of water that can be used for human purposes without significant harm to ecosystems or other users.
- the measure of the total amount of water used by the customers within the water system.
- Issues related to agriculture, industry (including energy production), oil, fecal matter, and litter, may all contribute to this problem.
- the most common method used to desalinate water
- the collection of precipitation which falls on the roof of buildings.
- used to increase the amount of water stored in aquifers. It is widely used in some countries to enhance water supplies, such as in the Netherlands, Germany, and the USA.
- the removal of salt from seawater to make it suitable for drinking. It is an energy-intensive process and therefore usually expensive.
Down
- This is what is causing a shift in water availability and why some areas that previously had sufficient water now face droughts. These droughts are becoming more frequent and prolonged, causing water insecurity.
- used water that is not clean enough to be used again. This water usually originates from toilets.
- A ratio that rates countries from 0 to 5: the higher the number, the higher the water stress. The ratio compares total withdrawals to total available renewable supply on an annual basis (demand/supply).
- natural or artificially created lakes, used to collect and store water.
- used water that is clean enough to be used again. This water originates from baths, showers, washbasins, and washing machines
- access to sufficient, sustainable quantities of clean water and sanitation.
13 Clues: the most common method used to desalinate water • the collection of precipitation which falls on the roof of buildings. • natural or artificially created lakes, used to collect and store water. • access to sufficient, sustainable quantities of clean water and sanitation. • the measure of the total amount of water used by the customers within the water system. • ...
ITSS Cup: Mission Possible Edition 2026-03-24
Across
- Spy proof your data with this.
- Mission Impossible version of turn it off and on again.
- Security alerter from mission control.
- First agent in the ITSS organization.
- Agent's secure communication channel.
- Controlled access to classified files.
Down
- Hidden entry point for agents or attackers.
- Command line for missions.
- Double agent that looks safe.
- Security layer that acts like a force field
- Digital notebook for mission intel.
- Encrypted message scrambling algorithm.
12 Clues: Command line for missions. • Double agent that looks safe. • Spy proof your data with this. • Digital notebook for mission intel. • First agent in the ITSS organization. • Agent's secure communication channel. • Security alerter from mission control. • Controlled access to classified files. • Encrypted message scrambling algorithm. • ...
Qatar Cross Word 2021-11-24
6 Clues: Full Form of QNA • Slogan Raised In Qatar • Thing related to Cyber bullying • Historic Visit To Break Blockade • Thing that happened with Saudi Arabia • capital of independent Palestinian state
ethan is gay 2024-12-25
Across
- the toys emmi and ethan played with when she was very small
- ethans favorite animal
- a beautiful french lover
- our forbidden stinky secret (hint: in the Meijer parking lot)(2 words)
- the best gift ethan got for emmi
Down
- a creepy boy who had a crush on emmi so ethan cyber bullied him (2 words)
- ethans favorite barbie movie
- our fluffy emotionally charged disagreement
- wanna go shoot some ____?
- where emmi found love and lost it (digitally)
- acronym for ethans favorite childhood midnight snack
11 Clues: ethans favorite animal • a beautiful french lover • wanna go shoot some ____? • ethans favorite barbie movie • the best gift ethan got for emmi • our fluffy emotionally charged disagreement • where emmi found love and lost it (digitally) • acronym for ethans favorite childhood midnight snack • the toys emmi and ethan played with when she was very small • ...
GO EXPO Crossword 2025-10-11
Across
- Foundation for strong teamwork
- Where you can find AQS's biggest solar installation
- Common entry point for cyber attacks
- Klikk delivery promise
- Technology-enabled support service that uses devices and sensors to help people live safely and independently in their own homes
Down
- Brain of a solar energy system
- Driving a digital Malta, where no-one is left behind
- Cybersift flagship product
- Heating, ventilation, and air conditioning
- One of the three benefits of SENS
- The second of BMIT’s 3 Es
11 Clues: Klikk delivery promise • The second of BMIT’s 3 Es • Cybersift flagship product • Brain of a solar energy system • Foundation for strong teamwork • One of the three benefits of SENS • Common entry point for cyber attacks • Heating, ventilation, and air conditioning • Where you can find AQS's biggest solar installation • Driving a digital Malta, where no-one is left behind • ...
My crossword puzzle 2026-03-04
Across
- a school club that uses robots
- money for online
- we use it to play video games or download apps
- a computer similar to a chromebook
Down
- a person that bullies online
- a character in despicable me but also uses direction and magnetism
- a machine you controll or command
- a little piece that you plug into your computer to save information or download information
- involves being online
- a part of technology that we use every day
- what you use to type on a computer
11 Clues: money for online • involves being online • a person that bullies online • a school club that uses robots • a machine you controll or command • what you use to type on a computer • a computer similar to a chromebook • a part of technology that we use every day • we use it to play video games or download apps • a character in despicable me but also uses direction and magnetism • ...
The Function and Structure of the United Nations 2024-07-21
Across
- Adopted by the UN International Court of Justice, fundamental human rights and freedoms. Universal ___ of Human Rights
- Where all 193 member states meet, (General_)
- UN staff are international civil ___
- Carries out day-to-day work, administers programs, and services other principal organs of the UN.
- Location of the International Court of Justice
- Established to supervise Trust Territories, ensuring their preparation for self-government or independence. (___ council)
- Responsible for maintaining international peace and security. It has 15 members, and its decisions are binding.
Down
- The principal judicial organ of the UN, settling legal disputes between states and providing advisory opinions. (4 words)
- Ambitious targets set by the UN to address global challenges like poverty, health, and education.
- Permanent members can vote "no" to any decision suggested by the Security Council.
- ____ forces may prevent conflict through mediation and dispute resolution
- UN's efforts to prevent conflicts and maintain peace in troubled regions.
- Members China, France, Russia, UK and USA
- A specialized agency within the UN system, focusing on education, science, culture, and communication.
14 Clues: UN staff are international civil ___ • Members China, France, Russia, UK and USA • Where all 193 member states meet, (General_) • Location of the International Court of Justice • ____ forces may prevent conflict through mediation and dispute resolution • UN's efforts to prevent conflicts and maintain peace in troubled regions. • ...
Cybersecurity and Compliance Week! 2025-11-10
Across
- What emails are you supposed to report to IT?
- What is a security measure that requires at least two forms of identification?
- Who is a person who gains unauthorized access to computer systems?
- What is the process of converting data into a secure format?
- Who is the HR Reporting Officer?
- What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
- What is the term for the agreement between covered entities and business associates?
- You are the first line of ___ in protection of DDID and AHS
Down
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is a central concept of HIPAA that protects individuals' health information?
- Who is the HIPAA Privacy Officer?
- What is the term for malicious software?
- Who is the Security Officer?
- What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?
14 Clues: Who is the Security Officer? • Who is the HR Reporting Officer? • Who is the HIPAA Privacy Officer? • What is the term for malicious software? • What emails are you supposed to report to IT? • You are the first line of ___ in protection of DDID and AHS • What is the process of converting data into a secure format? • ...
p.46 2025-08-13
17 Clues: почти • жертва • защита • уязвимый • недавний • уверенный • увеличить • база данных • безопасность • предотвратить • предупреждение • позволять себе • в соответсвии с • должностное лицо • среднестатистический • недостаток (чего-то) • рассматривать, принимать во внимание
The Good, The Bad, And The Ugly 2015-04-19
Across
- The not-so-good aspects from social media.
- This skill is tested when social media comes into play.
- Justice This is achieved through the various channels of social media.
- The positive aspects that arise from social media.
- Fake relationships.
- The rumors that are spread are sent though this.
- The worst effects from social media.
Down
- This is improved through a world wide data base for information.
- Crude pictures with harmful captions.
- The improved communication through technology.
- Bullying Bullying over social media.
- Hackers are now easily able to invade this.
12 Clues: Fake relationships. • Bullying Bullying over social media. • The worst effects from social media. • Crude pictures with harmful captions. • The not-so-good aspects from social media. • Hackers are now easily able to invade this. • The improved communication through technology. • The rumors that are spread are sent though this. • ...
The Fourth Stall 2023-10-10
Across
- The Place in which Mac's business takes place
- The Bully that starts all the rumors.
- The main Protagonist of the story
- The place that Staples takes Mac to get beaten up. Supposedly haunted
Down
- Middle school bully. He gets called "deranged"
- The cyber bully
- The main antagonist of the story
- Mac's bodyguard that keeps him out of trouble
- What Barnaby Willis is known as
- Staples' Right hand man, normally beats up Mac
- Mac's best friend
- Staples' inside man on Mac, turns goo in the end
12 Clues: The cyber bully • Mac's best friend • What Barnaby Willis is known as • The main antagonist of the story • The main Protagonist of the story • The Bully that starts all the rumors. • Mac's bodyguard that keeps him out of trouble • The Place in which Mac's business takes place • Middle school bully. He gets called "deranged" • Staples' Right hand man, normally beats up Mac • ...
Communication in the future 2024-11-24
Across
- room A place online where people talk.
- difference When people from different places do things differently.
- To talk or work with someone.
- phone A phone with a wire at home or work.
- channel A way to send or get messages.
- world The internet and things we do online.
- Pictures, sounds, and videos together.
Down
- Talking with someone in person.
- breakdown When people cannot understand each other.
- To talk or share ideas with someone.
- board A website where people leave messages.
- barrier When people cannot understand each other’s language.
- language Using hands and face to show ideas.
13 Clues: To talk or work with someone. • Talking with someone in person. • To talk or share ideas with someone. • Pictures, sounds, and videos together. • channel A way to send or get messages. • breakdown When people cannot understand each other. • phone A phone with a wire at home or work. • room A place online where people talk. • ...
ACCESS CONTROL 2025-05-29
Across
- Subway .......... are the example of physical access control.
- Unlocking a smartphone with a ..........scan is an example of information access control.
- The guest’s keycard ........them access to their room, the guest elevator, and the pool
- Information access control ........... access to data and the software used to manipulate that data.
- Physical access control is a set of ............ to control who is granted access to a physical location.
- a hotel .......... scanner only grants access to authorized guests who have a hotel key.
Down
- The security practice of confirming that someone is who they claim to be.
- financial holdings
- the process of determining which level of access each user is granted.
- ............ access control establishes strict security policies for individual users and the resources, systems, or data they are allowed to access.
- worker
- Security ..........is an official determination that an individual may access information
- extra
13 Clues: extra • worker • financial holdings • Subway .......... are the example of physical access control. • the process of determining which level of access each user is granted. • The security practice of confirming that someone is who they claim to be. • The guest’s keycard ........them access to their room, the guest elevator, and the pool • ...
The Korean War 2022-06-22
Across
- Capital of North Korea
- Action of not turning up to something in protest (Soviet Union at the Security Council)
- Name of vote needed to agree on military intervention by the UN Security Council
- Country banned from taking up its seat at the UN Security Council following its Communist takeover.
- Pocket that South Korean troops were pushed into by the North Korean invasion
- The name of the UN commander who was sacked by US President Harry Truman
- Leader of South Korea
Down
- Political system that operated in South Korea
- Political system that operated in North Korea
- Port city attacked by the UN Taskforce in September 1950
- The 38th ___________ separated North and South Korea
11 Clues: Leader of South Korea • Capital of North Korea • Political system that operated in South Korea • Political system that operated in North Korea • The 38th ___________ separated North and South Korea • Port city attacked by the UN Taskforce in September 1950 • The name of the UN commander who was sacked by US President Harry Truman • ...
Cybersecurity Week 2022-10-14
Across
- a service that creates a secure tunnel between your device and the internet
- a malicious software that spreads from one computer to another
- the process of verifying a users identity
- malicious code or software
Down
- taking readable plaintext, and converting it into ciphertext
- when attackers send malicious emails to trick people into a scam
- a software update that fixes bugs or updates security
- a security technique that requires multiple methods of authentication
- a malware that encrypts user data, and requires payment to get back
- a secret word or phrase that must be used to gain access to something
- a network security device that monitors traffic to or from your network
11 Clues: malicious code or software • the process of verifying a users identity • a software update that fixes bugs or updates security • taking readable plaintext, and converting it into ciphertext • a malicious software that spreads from one computer to another • when attackers send malicious emails to trick people into a scam • ...
Bullying 2017-02-19
7 Clues: kicking and Pushing • bad use of technology • do bad face moviments • say bad words and offences • don`t talk or play with others • say or act in a bad way affecting others • ask classmates in bad modos for money or lunch
fnaf security breach 2022-02-24
13 Clues: wolf • bear • chicken • aligator • lazer gun • sun and moon • the security guard • dancing rabit lady • no flash photography • found in each office • the spider in the vents • the Dj of the west arcade • the "red light green light bots"
Safety and Security 2023-10-25
Across
- What is it called when someone receives an email from a fraudster pretending to be from a reputable company in order to obtain personal information?
- How much is the total teller drawer limit at a branch without TCRs?
- What is the morning glory alarm code?
- What is the Metro Region's safe word for Banker's Security?
- When can you plug a flash drive into your computer?
Down
- What kind of control is needed to log and process night drop?
- Where is the robbery kit located at EVERY branch?
- How many associates need to be present at open and close?
- How much is the teller top drawer cash limit?
- What is it called when a robber follows you in to the branch at open?
- What phone number do you call after a robbery when it is safe to do so?
- What percentage of elder abuse is committed by a family member?
- What month is CCBs Safety and Security month?
13 Clues: What is the morning glory alarm code? • How much is the teller top drawer cash limit? • What month is CCBs Safety and Security month? • Where is the robbery kit located at EVERY branch? • When can you plug a flash drive into your computer? • How many associates need to be present at open and close? • What is the Metro Region's safe word for Banker's Security? • ...
Safety and Security 2023-03-09
Across
- If you see a _________ person and they seem unapproachable, do not make contact.
- When using the _________ button at the door, make sure the door is securely shut before walking on.
- If the person seems unpleasant or abusive, do not ______.
- It may be necessary to provide a ____________ of the suspicious person. Take note of things like, gender, hair color, race, clothing, unique characteristics.
- If safe to do so, __________ the suspicious person from a distance.
- All visitors must always be __________ through the laboratory.
Down
- Never let anyone ___________ after you, when entering the facility.
- If you are trying to report a suspicious person and a supervisor is unavailable, report it to the ____________ Administrative Office or the Bureau Chief.
- If you see someone without a badge and they seem unapproachable, report it to a _______.
- All ___________ must sign in and out at the building 4 entrance.
- If you are working during non-business hours, you must sign in AND______.
- If you see someone not wearing a _______ and they seem approachable, ask them if you can help them.
- Direct all deliveries to be taken to the ______.
13 Clues: Direct all deliveries to be taken to the ______. • If the person seems unpleasant or abusive, do not ______. • All visitors must always be __________ through the laboratory. • All ___________ must sign in and out at the building 4 entrance. • Never let anyone ___________ after you, when entering the facility. • ...
FNaF Security Breach 2022-05-31
13 Clues: Furry • Aligator • Protagonist • Night Guard • A White Bird • Such a nice fello • MOLTEN FREDDY?!?! • The "Best" of the 4 • DARNIT HE CAME BACK! • Wind-up vent annoyance • Caused Freddy's Mental Crisis • The Tidy & Light-Sensitive One • The Orange Bear with a thunderbolt
FNaF Security Breach 2022-05-31
13 Clues: Furry • Aligator • Protagonist • Night Guard • A White Bird • Such a nice fello • MOLTEN FREDDY?!?! • The "Best" of the 4 • DARNIT HE CAME BACK! • Wind-up vent annoyance • Caused Freddy's Mental Crisis • The Tidy & Light-Sensitive One • The Orange Bear with a thunderbolt
Information Security Crossword 2024-10-28
Across
- An attack that exploits software flaws before developers can release a patch or fix.
- The process of confirming the identity of a user, typically before granting access to resources.
- An unauthorized action that exposes, steals, or compromises data from a system.
- The process of testing a system, network, or web application to find security vulnerabilities.
- A cryptographic process of converting data into unreadable code to protect it from unauthorized access.
- A security mechanism that prevents unauthorized access to a network by filtering traffic.
- A type of malicious software designed to gain unauthorized access to a computer system.
Down
- A program that secretly records everything typed on a computer, usually for malicious purposes.
- A cyberattack where the perpetrator floods a server with excessive traffic
- A malicious attack where data is encrypted by criminals to demand payment for its release.
- Which term is used to describe the “cargo” that malware brings with it when it infects a device?
- What is a term for a group of computers that is networked together and used by hackers to steal information?
- A malicious program disguised as legitimate software, often used to gain unauthorized access.
13 Clues: A cyberattack where the perpetrator floods a server with excessive traffic • An unauthorized action that exposes, steals, or compromises data from a system. • An attack that exploits software flaws before developers can release a patch or fix. • A type of malicious software designed to gain unauthorized access to a computer system. • ...
