cyber security Crossword Puzzles

Ac and AC 2022-11-04

Ac and AC crossword puzzle
Across
  1. fri
  2. sikkerhed
  3. liv
  4. frihed
  5. forskelsbehandling
  6. ret
  7. uddanelse
  8. undring
  9. uskyldig
  10. lighed
  11. hørt
  12. slaveri
  13. bevægelse
  14. lov
  15. nationalitet
  16. privatliv
Down
  1. værdighed
  2. udtryk
  3. religion
  4. relation
  5. menneske
  6. stemme
  7. umenneskelig
  8. tortur
  9. samtidighed
  10. tro
  11. retfærdig
  12. skyldig

28 Clues: frilivrettrolovhørtudtrykfrihedstemmetorturlighedundringslaveriskyldigreligionrelationmenneskeuskyldigværdighedsikkerheduddanelseretfærdigbevægelseprivatlivsamtidighedumenneskelignationalitetforskelsbehandling

Refugee 2022-11-16

Refugee crossword puzzle
Across
  1. RCHNU
  2. ytilitsoh
  3. sserts
  4. noitucesrep
  5. ssensselemoh
  6. ytiruces
  7. enitnarauq
  8. eegufer
  9. rekees-mulysa
  10. sisirc
  11. noitatroped
  12. enimaf
  13. yrtnuoc
  14. noitargim
Down
  1. redrob
  2. seitlausac
  3. tnemtaert-lli
  4. epacse
  5. yrautcnas
  6. decalpsid
  7. eeucave
  8. noitargimmi
  9. noitairtaper
  10. retlehs
  11. sudoxe

25 Clues: RCHNUredrobepacsessertssisircenimafsudoxeeeucaveeeguferretlehsyrtnuocytirucesytilitsohyrautcnasdecalpsidnoitargimseitlausacenitnarauqnoitucesrepnoitargimminoitatropedssensselemohnoitairtapertnemtaert-llirekees-mulysa

Al Aeropuerto - Emma Han 2022-10-13

Al Aeropuerto - Emma Han crossword puzzle
Across
  1. identification
  2. passport
  3. suitcase
  4. departure
  5. arrival
  6. gate
  7. confirm the flight
  8. passenger
  9. ticket
Down
  1. itinerary
  2. screen
  3. airport
  4. to board
  5. the airplane
  6. to call someone
  7. to get in line
  8. bathing suit
  9. security
  10. to take a taki
  11. to travel

20 Clues: gatescreenticketairportarrivalpassportsuitcaseto boardsecurityitinerarydepartureto travelpassengerthe airplanebathing suitidentificationto get in lineto take a takito call someoneconfirm the flight

Unit 3: the golden state 2020-03-01

Unit 3: the golden state crossword puzzle
Across
  1. Flamme
  2. entspannt
  3. Umwelt
  4. Zitat
  5. Prozess
  6. Drehbuch
  7. häufig
  8. Waldbrand
  9. Mittag
  10. niedlich,süß
  11. Landschaft
  12. Mikrofon
  13. wechseln
  14. very important person
Down
  1. Jahrgangsstufe
  2. Sicherheit
  3. obwohl
  4. Erklärung
  5. the year has to of them
  6. fließen
  7. Aufenthalt
  8. Berühmtheit
  9. glänzend

23 Clues: ZitatFlammeobwohlUmwelthäufigMittagProzessfließenDrehbuchMikrofonwechselnglänzendentspanntErklärungWaldbrandSicherheitAufenthaltLandschaftBerühmtheitniedlich,süßJahrgangsstufevery important personthe year has to of them

Nouns 1: Introducing yourself 2023-03-08

Nouns 1: Introducing yourself crossword puzzle
Across
  1. home
  2. gender
  3. divorced
  4. unmarried
  5. married
  6. social security number
  7. age
  8. first language
  9. last name
  10. phone number
  11. date of birth
Down
  1. email address
  2. language
  3. nationality
  4. personal details
  5. single
  6. country, land
  7. city, town
  8. name
  9. first name
  10. address

21 Clues: agehomenamegendersinglemarriedaddresslanguagedivorcedunmarriedlast namecity, townfirst namenationalityphone numberemail addresscountry, landdate of birthfirst languagepersonal detailssocial security number

April 12 Homework menu 2023-04-12

April 12 Homework menu crossword puzzle
Across
  1. customs
  2. security
  3. stamp
  4. maid
  5. castle
  6. tip
  7. guide
  8. suitcase
  9. oppened
  10. pillow
  11. Poste_office
  12. boat
Down
  1. post_card
  2. blanket
  3. closed
  4. cash
  5. bottle of water
  6. cathedral
  7. taxi
  8. Station
  9. hand luggage
  10. consulate
  11. bed
  12. subway/metro
  13. palace

25 Clues: tipbedmaidcashtaxiboatstampguideclosedcastlepillowpalaceblanketcustomsStationoppenedsecuritysuitcasepost_cardcathedralconsulatehand luggagesubway/metroPoste_officebottle of water

1.1 Vocab - Sp 3 2022-01-12

1.1 Vocab - Sp 3 crossword puzzle
Across
  1. ticket
  2. ID
  3. departure
  4. luggage
  5. To make a mistake
  6. passport
  7. gate
  8. To confirm
  9. arrival
  10. To board
Down
  1. security
  2. customs
  3. flight
  4. To travel
  5. male passenger
  6. suitcase
  7. female passenger
  8. airport
  9. screen/monitor
  10. To believe
  11. To forget
  12. itinerary

22 Clues: IDgateticketflightcustomsluggageairportarrivalsecuritysuitcasepassportTo boardTo traveldepartureTo forgetitineraryTo believeTo confirmmale passengerscreen/monitorfemale passengerTo make a mistake

2: kpl 4 2026-02-11

2: kpl 4 crossword puzzle
Across
  1. tulli
  2. maihinnousukortti
  3. check turvatarkastus
  4. lippu
  5. matkustaja
  6. kirjekuori
  7. poistaa
  8. kyltti
  9. onnistua
  10. haaste
  11. kilpailija
  12. tehtävä
Down
  1. tarpeellinen
  2. matkalaukku
  3. saapuvat
  4. unohtaa
  5. epäonnistua
  6. mahdollisuus
  7. kilpailu
  8. ratkaista
  9. ohjeet
  10. uupunut
  11. istumapaikka
  12. eksyksissä
  13. portti
  14. rauhoittua

26 Clues: tullilippuohjeetkylttiporttihaasteunohtaauupunutpoistaatehtäväsaapuvatkilpailuonnistuaratkaistamatkustajakirjekuorieksyksissärauhoittuakilpailijamatkalaukkuepäonnistuatarpeellinenmahdollisuusistumapaikkamaihinnousukortticheck turvatarkastus

Pluralsight Security Post Orders 2020-09-04

Pluralsight Security Post Orders crossword puzzle
Across
  1. Use this program to send passdowns
  2. Leave all animals ____
  3. We observe and _______
  4. Form once per shift (2 wds)
  5. Your pants must be black _____ slacks
  6. Use this program to clock-in/out
  7. Be ____ and aware of your surrounding
  8. Send these to Devon every shift (2 wds)
  9. Wear it or you might share it
  10. Keep these on you during shift
Down
  1. Patrol that checks EVERYTHING (2 wds)
  2. ___ your patrol; do not jog or run
  3. Wear these so you can see...s
  4. ___ Perimeter patrols per 8 hr shift
  5. Excellent ____ customer service
  6. Duck, ___, and Hold during an earthquake.
  7. Should always be your first priority.
  8. Check this throughout your shift.
  9. No electronic devices unless __
  10. Your shoes must be black and _____
  11. Documents and tracks EVERYTHING.
  12. Stay off of these while on patrol

22 Clues: Leave all animals ____We observe and _______Form once per shift (2 wds)Wear these so you can see...sWear it or you might share itKeep these on you during shiftExcellent ____ customer serviceNo electronic devices unless __Use this program to clock-in/outDocuments and tracks EVERYTHING.Check this throughout your shift....

Security Awareness Puzzle 2015 2015-02-17

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. Engineering The art of tricking or manipulating people into providing information that they normally would not provide.
  2. Passwords should be _________ every 3-4 months.
  3. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. Never share your _________ with another person.
  5. A password is stronger by using a combination of both upper and lower case ___________.
  6. A software that is designed to detect and destroy computer viruses.
  7. Applied to data to protect it from unauthorized use in case of theft or loss.
  8. Use __________ passwords for the various accounts that you may have.
  9. Also known as malicious software; any program or file that is harmful to a computer user.
  10. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  11. A computer ______ can be considered as the modern counterpart of a paper document.
  12. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  13. Healthy email always includes a clear and specific ____________ line.
  14. Desk If you have any question or concerns about an email that you receive you can send it to spam@ashevillenc.gov or contact for _______.
  15. ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
Down
  1. __________ is a popular web search engine.
  2. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  3. Use this tool to dispose of documents that contain personal or financial information.
  4. Do not send __________ information over email unless it is encrypted.
  5. A secure password should contain at least one of these.
  6. Email scam or attempt to trick you into giving your password or personal information.
  7. Do not leave your laptop or computer ____________.
  8. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  9. Choose a password that is easy for you to ____________ but hard for someone to guess.
  10. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
  11. To ________ the amount of spam you receive, be careful who you give your email address to.
  12. The state of being free from danger or threat.
  13. Another word for understanding, knowledge and well-informed.
  14. A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
  15. Passwords should always be at least this many characters long.

30 Clues: __________ is a popular web search engine.The state of being free from danger or threat.Passwords should be _________ every 3-4 months.Never share your _________ with another person.Do not leave your laptop or computer ____________.A secure password should contain at least one of these.Another word for understanding, knowledge and well-informed....

Security Awareness Puzzle 2015 2015-02-11

Security Awareness Puzzle 2015 crossword puzzle
Across
  1. To protect personal information, avoid sending it via_________.
  2. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
  3. Never share your _________ with another person.
  4. Healthy email always includes a clear and specific ____________ line.
  5. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  6. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  7. Choose a password that is easy for you to ____________ but hard for someone to guess.
  8. Do not leave your laptop or computer ____________.
  9. Passwords should be _________ every 3-4 months.
  10. To ________ the amount of spam you receive, be careful who you give your email address to.
  11. When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
  12. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
  13. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
  14. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  15. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
  16. Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
  17. Email scam or attempt to trick you into giving your password or personal information.
Down
  1. A computer ______ can be considered as the modern counterpart of a paper document.
  2. Also known as malicious software; any program or file that is harmful to a computer user.
  3. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
  4. Passwords should always be at least this many characters long.
  5. A secure password should contain at least one of these.
  6. Do not send __________ information over email unless it is encrypted.
  7. A software that is designed to detect and destroy computer viruses.
  8. Applied to data to protect it from unauthorized use in case of theft or loss.
  9. A password is stronger by using a combination of both upper and lower case ___________.
  10. Use this tool to dispose of documents that contain personal or financial information.
  11. Use __________ passwords for the various accounts that you may have.
  12. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
  13. Do not _______ your password down or attach it to your keyword or monitor.
  14. Do not __________ your password or account with anyone.
  15. Never forward any _________ letter.
  16. Always ___________ your computer when you leave your desk.
  17. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.

34 Clues: Never forward any _________ letter.Never share your _________ with another person.Passwords should be _________ every 3-4 months.Do not leave your laptop or computer ____________.A secure password should contain at least one of these.Do not __________ your password or account with anyone.Always ___________ your computer when you leave your desk....

Food Security Ft. Nestle 2015-11-29

Food Security Ft. Nestle crossword puzzle
Across
  1. Rights Fundamental rights belonging to individuals in which the government may not interfere
  2. A system that maintains its own viability by using techniques that allow for continual reuse
  3. Ease of use, approach, reach
  4. Providing nourishment, especially to a high degree
  5. A diligent and systematic investigation into a subject in order to discover facts, theories, etc.
  6. Meeting minimum requirements
  7. An endangering, especially of one's reputation; A settlement as a result of mutual concession
  8. Involving one's personal resources of money
Down
  1. Suitable or ready for use
  2. Barely sufficient; as much as necessary
  3. Dependable, secure, free from danger
  4. Fundamental systems and facilities servicing an area
  5. Adequate for the purpose; enough
  6. The state of being free from danger or threat
  7. The entire body of individuals born and living at the same time
  8. Living in companionship as opposed to in isolation
  9. Performing in the best possible manner with least waste of time and effort
  10. The planning, implementation, and coordination of the details of an operation
  11. Of or relating to that which is material
  12. Relative standing; rank

20 Clues: Relative standing; rankSuitable or ready for useEase of use, approach, reachMeeting minimum requirementsAdequate for the purpose; enoughDependable, secure, free from dangerBarely sufficient; as much as necessaryOf or relating to that which is materialInvolving one's personal resources of moneyThe state of being free from danger or threat...

IT Security Awareness Contest 2022-04-15

IT Security Awareness Contest crossword puzzle
Across
  1. the use of two different components to verify your identity
  2. type of tolerance rkmiles has to any actions that create a hostile work environment
  3. type of grammar that typically raise a red flag for phishing emails
  4. the first line of defense against cyber criminals
  5. what you should not let anyone do when you type in your password
  6. a math function to make data only available with a key
  7. malicious software that makes date or systems unusable until the victim makes a payment
  8. where data can be accessed as a service
  9. when you use the internet you leave this type of footprint behind
  10. recently discovered vulnerabilities, not yet known to vendors or antivirus companies that hackers can exploit
Down
  1. can be hardware or software
  2. program that can automate task
  3. mass emails sent to many people asking for sensitive information
  4. virus disguised as legit software
  5. type of consequence that a sender is asking from you to avoid
  6. software to assist in detecting virus's
  7. what you do with your mouse to see where a hyperlink will take you
  8. email designed to look like it's from a person you know
  9. what department should you get approval from for downloading software
  10. what a password should be

20 Clues: what a password should becan be hardware or softwareprogram that can automate taskvirus disguised as legit softwaresoftware to assist in detecting virus'swhere data can be accessed as a servicethe first line of defense against cyber criminalsa math function to make data only available with a key...

Security N.1 bis 2023-01-29

Security N.1 bis crossword puzzle
Across
  1. L'autenticazione_________ è un processo di sicurezza che si basa sulle caratteristiche biologiche uniche di un individuo per verificare che sia chi dice di essere
  2. Una delle password più comuni nel 2022: un evergreen!
  3. Genera e memorizza in modo sicuro password complesse in un unico luogo
  4. Ricerca e pubblicazione su Internet di informazioni private o identificative di un particolare individuo
  5. Malware che si replica per diffondersi ad altri computer della rete
  6. Quando i criminali usano gli sms truffa stanno cercando di fare….
  7. Simile a una password, ma generalmente più lunga per una maggiore sicurezza
  8. Truffa via e-mail o tentativo di ingannare l'utente per indurlo a fornire la sua password o le sue informazioni personali
  9. Un tipo di software dannoso progettato per estorcere denaro alle vittime, bloccando l'accesso al computer o criptando i dati in esso contenuti
Down
  1. _________ sempre il computer quando si lascia la scrivania
  2. Non aprire se non ci si fida del mittente
  3. Programma che registra i tasti premuti da un utente
  4. Il computer avrà molti popup se ne viene infettato
  5. Un programma software progettato per prevenire i virus
  6. Attacco che tenta di scoprire una password provando sistematicamente tutte le combinazioni possibili
  7. Chiamate o messaggi vocali fraudolente
  8. Programma utilizzato per rilevare le e-mail non richieste, indesiderate e infette da virus è un filtro ......
  9. Quella a 2 fattori è un tipo di ....... forte
  10. Una persona che prende o usa le informazioni del vostro computer
  11. L'utilizzo di un nome utente o di un handle sociale di una persona o di un'azienda in un post o in una foto
  12. Interazione online ostile che comporta messaggi di insulto tra gli utenti

21 Clues: Chiamate o messaggi vocali fraudolenteNon aprire se non ci si fida del mittenteQuella a 2 fattori è un tipo di ....... forteIl computer avrà molti popup se ne viene infettatoProgramma che registra i tasti premuti da un utenteUna delle password più comuni nel 2022: un evergreen!Un programma software progettato per prevenire i virus...

2nd Quarter Security training 2023-04-17

2nd Quarter Security training crossword puzzle
Across
  1. Refer media questions to the CEO or ___ ___ ___.
  2. ____ if there is an accessible escape path
  3. Always take threats___.
  4. ___ silent alarms as soon as you feel safe to do so.
  5. Inform members of emergency and request they ___ the building.
  6. Ask witnesses to fill out an ___ ___.
  7. Once the robber leaves ___ the doors and put up closed signs.
  8. During a medical emergency have someone ___ with the member while another calls 911.
  9. If safe, secure cash and ___ ___ information before evacuating.
Down
  1. ___ you have been robbed.
  2. When you see a fire ___ the fire alarm to alert others.
  3. Dial ___ to report incident only if it is safe.
  4. A ____ is located under each phone.
  5. The robbery packet is located on the back of the ___ ___.
  6. Use the ___ to document details of the call for bomb and kidnapping threats.
  7. ____ in a secure location if you cannot escape
  8. Primary meeting point is at the ___ dot.
  9. The alternate meeting point is ___ if it is unsafe at the primary.
  10. As a last resort ____ to save yourself
  11. Don't be a ___.
  12. Put up a ___ paper used to signal all clear to law enforcement.

21 Clues: Don't be a ___.Always take threats___.___ you have been robbed.A ____ is located under each phone.Ask witnesses to fill out an ___ ___.As a last resort ____ to save yourselfPrimary meeting point is at the ___ dot.____ if there is an accessible escape path____ in a secure location if you cannot escapeDial ___ to report incident only if it is safe....

Security Analysis & Portfolio Management 2022-05-15

Security Analysis & Portfolio Management crossword puzzle
Across
  1. The ability to buy or sell an asset quickly at a known price.
  2. The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  3. The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
  4. --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
  5. The market ------------------is used as a benchmark to evaluate the performance of funds.
  6. ------------------------was one of the originators of Capital Asset Pricing model.
  7. The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
  8. ------------------------laid the foundations to the Portfolio theory.
  9. The ----------------------theorem suggests that investment and financing are two different decisions.
Down
  1. The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
  2. Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
  3. A -------------form EMH is when prices reflect all historical information.
  4. ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
  5. A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
  6. The --------------market is used for lending and borrowing short-term funds.
  7. The --------------measure is calculated as excess returns per unit of systematic risk.
  8. The --------------------market line is the graphical representation of CAPM.
  9. -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
  10. --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
  11. The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.

20 Clues: The ability to buy or sell an asset quickly at a known price.------------------------laid the foundations to the Portfolio theory.A -------------form EMH is when prices reflect all historical information.The --------------market is used for lending and borrowing short-term funds....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Software that gathers data by monitoring key press on the user/s keyboard.
  2. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  3. Unsolicited email sent over the internet.
  4. Used to verify that data comes from a secure and trusted source.
  5. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  6. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  7. Authentication that relies on certain unique characteristics of human beings.
  8. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  9. Refers to safety when using the internet like keeping personal data safe.
  10. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  11. Web applications or website that allow users to create and edit web pages using any web browser.
  12. The act of gaining unauthorized access to a computer system.
Down
  1. Refers to the need to respect other user's views and display common courtesy when posting views online.
  2. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  3. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  4. A type of protocol that allows data to be sent and received securely over the internet.
  5. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  6. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  8. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  9. Uses SMS system of mobile phones to send out fake text messages.
  10. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.

22 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. Web applications or website that allow users to create and edit web pages using any web browser.
  2. Software that gathers data by monitoring key press on the user/s keyboard.
  3. Uses SMS system of mobile phones to send out fake text messages.
  4. A type of protocol that allows data to be sent and received securely over the internet.
  5. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  6. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  8. Authentication that relies on certain unique characteristics of human beings.
  9. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  10. Used to verify that data comes from a secure and trusted source.
  11. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  12. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
  1. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  2. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  3. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  4. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  5. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  6. Refers to the need to respect other user's views and display common courtesy when posting views online.
  7. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  8. The act of gaining unauthorized access to a computer system.
  9. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  10. Unsolicited email sent over the internet.
  11. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  12. Refers to safety when using the internet like keeping personal data safe.

24 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Uses SMS system of mobile phones to send out fake text messages.Used to verify that data comes from a secure and trusted source.Refers to safety when using the internet like keeping personal data safe....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  2. Used to verify that data comes from a secure and trusted source.
  3. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  4. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  5. A type of protocol that allows data to be sent and received securely over the internet.
  6. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  7. Uses SMS system of mobile phones to send out fake text messages.
  8. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  9. Web applications or website that allow users to create and edit web pages using any web browser.
  10. Refers to safety when using the internet like keeping personal data safe.
  11. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  12. Software that gathers data by monitoring key press on the user/s keyboard.
Down
  1. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  2. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  3. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  4. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  5. Authentication that relies on certain unique characteristics of human beings.
  6. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  7. The act of gaining unauthorized access to a computer system.
  8. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  9. Refers to the need to respect other user's views and display common courtesy when posting views online.
  10. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  11. Unsolicited email sent over the internet.
  12. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  13. A combination of letters, symbols and numbers that protects a system and allows a user to login.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. The M in HTML
  2. Famous Linux OS for Penetration Testing
  3. Mac address is a 12 byte. What type of numbers?
  4. Not bind shell
  5. Malware that encrypts data for money
  6. TCP & UDP runs in that OSI Layer
  7. Network authentication protocol
  8. Famous proxy tool for web penetration testing
  9. which is the first layer in OSI
  10. Goddess of Cyprus,Venus...
  11. decode this hex -> 7365637572697479
  12. 127.0.0.1 IP address
  13. You can use it for anonymity
Down
  1. name of first virus
  2. Swiss army knife of hacking tool/frequently used as backdoor
  3. Spyware, Trojan, worm, virus
  4. SSH means
  5. A cat tries to catch it but you can use it with your computer
  6. Cross Site _____ Attack
  7. Famous packet analyzer
  8. init 6
  9. IEE 802.11 describes which type of network?
  10. control and store your repo
  11. not one
  12. Which protocol is used by ping command
  13. The Ripper Cracking tool
  14. Not TCP
  15. Protocol that gives access to a user on a remote system

28 Clues: init 6not oneNot TCPSSH meansThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoSpyware, Trojan, worm, virusYou can use it for anonymityNetwork authentication protocolwhich is the first layer in OSI...

Security Bsides Cyprus 2019 2019-09-21

Security Bsides Cyprus 2019 crossword puzzle
Across
  1. an enterprise-class open source distributed monitoring solution, created by Alexei Vladishev
  2. The M in HTML
  3. Famous Debian Distribution for Penetration Testing
  4. A cat tries to catch it but you can use it with your computer
  5. Which protocol is used by ping command
  6. Goddess of Cyprus,Venus...
  7. name of first virus
  8. Malware that encrypts data for money
  9. Famous proxy tool for web penetration testing
  10. Not bind shell
  11. Famous packet analyzer
  12. You can use it for anonymity
  13. which is the first layer in OSI
  14. decode this hex -> 7365637572697479
  15. Swiss army knife of hacking tool/frequently used as backdoor
Down
  1. control and store your repo
  2. Spyware, Trojan, worm, virus
  3. init 6
  4. 127.0.0.1 IP address
  5. Network authentication protocol
  6. IEE 802.11 describes which type of network?
  7. Not TCP
  8. TCP & UDP runs in that OSI Layer
  9. Mac address is a 12 byte. What type of numbers?
  10. The Ripper Cracking tool
  11. Cross Site _____ Attack
  12. Protocol that gives access to a user on a remote system

27 Clues: init 6Not TCPThe M in HTMLNot bind shellname of first virus127.0.0.1 IP addressFamous packet analyzerCross Site _____ AttackThe Ripper Cracking toolGoddess of Cyprus,Venus...control and store your repoSpyware, Trojan, worm, virusYou can use it for anonymityNetwork authentication protocolwhich is the first layer in OSI...

Final Crossword Security Plus 2024-06-04

Final Crossword Security Plus crossword puzzle
Across
  1. inserts statements to manipulate a database server
  2. hiding data within an ordinary, nonsecret file
  3. Removing user accounts
  4. ensuring that an organization adheres to laws and regulations
  5. It only goes off after certain conditions are met
  6. Subset of the board that manages governance issues
  7. bruteforce collision attack that exploits the probability theory
  8. Threat actors who are strongly motivated by philosophical or political beliefs.
  9. involves isolating sensitive enterprise data
  10. pose a threat from the position of a trusted entity
  11. refers to integrating security into the application
  12. A device that distributes work across a network
  13. An attack that copies data and then uses it
  14. The entity that is responsible for digital certificates
  15. Individual or entity who is responsible for attacks
  16. is a finite sequence of rigorous instructions
  17. Data that is encapsulated within a secure outer shell
  18. Threat actors who are employed by their own government to carry out attacks
Down
  1. Vulnerability for which there are no days of advanced warning
  2. The rapid detection and elevation of a threat incident
  3. A downgrade attack
  4. server within the DMZ that is used to connect two dissimilar security zones
  5. features and characteristics of the individual
  6. two or more different messages that produce the same hash value
  7. Standard preconfigured passwords
  8. decentralized, distributed and public digital ledger
  9. An AP set up by an attacker to mimic an authorized AP
  10. A malicious program that uses a computer network to replicate
  11. Closing unused ports and disabling unnecessary protocols
  12. resource that is not possible due to geography
  13. An unauthorized AP that allows an attacker to bypass many of the network security
  14. denial of the truth or validity of something
  15. validate a main domain along with all subdomains
  16. evidence or proof of something
  17. A product that consolidates real-time security monitoring and management
  18. performs a real-time lookup of a certificate’s status
  19. unauthorized copying of data
  20. object whose state cannot be modified after it is created
  21. Identifying and mitigating risks brought on by a third party
  22. retains historical documents

40 Clues: A downgrade attackRemoving user accountsunauthorized copying of dataretains historical documentsevidence or proof of somethingStandard preconfigured passwordsAn attack that copies data and then uses itdenial of the truth or validity of somethinginvolves isolating sensitive enterprise datais a finite sequence of rigorous instructions...

Privacy and Security Online 2024-04-25

Privacy and Security Online crossword puzzle
Across
  1. changes a browser's behavior, settings, or appearance without user consent
  2. theft A type of scam where someone tries to trick you into giving them your personal information
  3. A setting that allows you to control who can see your profile and posts
  4. A type of software that can harm your computer or steal your information
  5. A piece of software that can protect your computer from online threats
  6. A place where you can safely store your passwords and other sensitive information
  7. A symbol or character that represents you online
  8. when someone online builds your trust and makes a connection with you to get you to do something sexual or illegal
Down
  1. the safe and responsible use of information and communication technologies
  2. A type of attack where someone pretends to be someone else to gain access to your personal information
  3. sharing photos, videos, and messages with other people
  4. piracy the illegal copying or distribution of copyrighted material via the Internet
  5. users open the app an average of 19 times a day
  6. a collective term for websites and applications that focus on communication
  7. System used to protect computer systems
  8. Software developed by cybercriminals to steal data and damage or destroy computers and computer systems
  9. You should never share this with strangers online
  10. keep your digital doors locked
  11. virus a type of malware that downloads onto a computer disguised as a legitimate program
  12. short and less than 8 characters

20 Clues: keep your digital doors lockedshort and less than 8 charactersSystem used to protect computer systemsusers open the app an average of 19 times a dayA symbol or character that represents you onlineYou should never share this with strangers onlinesharing photos, videos, and messages with other people...

Hopsital safety and security 2024-10-14

Hopsital safety and security crossword puzzle
Across
  1. Summoning Security.
  2. Measures taken to ensure only authorized personnel can enter certain areas.
  3. Personal Protective Equipment used to protect healthcare workers from infection.
  4. An identification card worn by hospital staff.
  5. A strict isolation imposed to prevent the spread of disease.
  6. The provision of fresh air to a room, building, etc., which is crucial in preventing the spread of airborne diseases.
  7. A substance or product used to reduce the number of germs on surfaces or skin.
  8. The presence of an infectious agent on a body surface, surgical instrument, or other inanimate articles.
  9. A set of rules or procedures to be followed in medical or clinical settings.
  10. A person employed to protect the premises and ensure safety.
Down
  1. Continuous observation of a place, person, or activity.
  2. An emergency protocol to prevent people from entering or leaving.
  3. A part of PPE that protects hands from contamination.
  4. A designated route for leaving a building in case of an emergency.
  5. The process of separating sick individuals from healthy ones to prevent the spread of disease.
  6. The process of making something free from bacteria or other living microorganisms.
  7. Practices to maintain health and prevent disease, especially through cleanliness.
  8. A temporary identification issued to visitors.
  9. Closed-circuit television used for monitoring.
  10. A device that signals the presence of a security breach.

20 Clues: Summoning Security.An identification card worn by hospital staff.A temporary identification issued to visitors.Closed-circuit television used for monitoring.A part of PPE that protects hands from contamination.Continuous observation of a place, person, or activity.A device that signals the presence of a security breach....

Chapter 5 security Plus 2025-03-22

Chapter 5 security Plus crossword puzzle
Across
  1. A request that has been fabricated
  2. takes advantage of a vulnerability to move to restricted directories
  3. store data in RAM beyond the boundaries
  4. An attack in which a website accepts user input without validating it
  5. hides its presence on the device
  6. A sign an attack is currently underway
  7. A malicious program that uses a computer network to replicate
  8. move from the root directory to other restricted directories
  9. An attack that copies data and then uses it
  10. account that is inaccessible through a normal login attempt
  11. Malware that replicates by infecting other files or programs
  12. An indicator of attack in which data is no longer accessible
  13. An attack in which threat actors introduce something into RAM
  14. Closing unused ports and disabling unnecessary protocols
  15. inserts statements to manipulate a database server
Down
  1. depletion of memory or processing capabilities
  2. resource that is not possible due to geography
  3. It only goes off after certain conditions are met
  4. threat actor gains illicit access of elevated rights or privileges
  5. Software installed on a device without the user requesting it
  6. Malware disguised as something useful or legitimate
  7. A cookie that is only sent to the server with an encrypted request
  8. Installing software security updates
  9. captures and stores each keystroke that a user types on the computer’s keyboard
  10. Secure space for running untrusted software
  11. monitors endpoints and immediately blocks a malicious attack

26 Clues: hides its presence on the deviceA request that has been fabricatedInstalling software security updatesA sign an attack is currently underwaystore data in RAM beyond the boundariesAn attack that copies data and then uses itSecure space for running untrusted softwaredepletion of memory or processing capabilities...

Cisco Product Advanced Security Puzzle 2024-10-16

Cisco Product Advanced Security Puzzle crossword puzzle
Across
  1. Threat detection engine paired with Kyverno for container security
  2. A solution that leverages AI to detect and block identity spoofing attacks on endpoints
  3. Tool used by Cisco to improve customer experience in vulnerability management
  4. Software list that tracks components for security and compliance purposes
Down
  1. Standards and certifications that ensure product security and regulatory compliance
  2. The process of securing network telemetry with gRPC Dial-Out
  3. Security platform integrating networking and security in Cisco’s architecture

7 Clues: The process of securing network telemetry with gRPC Dial-OutThreat detection engine paired with Kyverno for container securitySoftware list that tracks components for security and compliance purposesSecurity platform integrating networking and security in Cisco’s architecture...

spanish uniut 4 2021-12-14

spanish uniut 4 crossword puzzle
Across
  1. flight
  2. train station
  3. airport
  4. service
  5. airplane
  6. train
  7. i will visit
  8. map
Down
  1. destination
  2. i will go
  3. tourtrip
  4. itenerary
  5. customs
  6. security
  7. departures

15 Clues: maptrainflightairportservicecustomstourtripsecurityairplanei will goitenerarydeparturesdestinationi will visittrain station

Pieter's Business Finder Quiz 2025-09-01

Pieter's Business Finder Quiz crossword puzzle
Across
  1. A sudden and unexpected event causing loss
  2. A modern threat covered by specialized insurance policies
  3. A key metric comparing claims paid to premiums earned
  4. Government-backed insurer for special risks like riots and strikes
  5. Intentional deception for financial gain in insurance
  6. Assessment of an asset’s worth for insurance purposes
  7. Temporary vehicle provided during repairs
Down
  1. Professional who advises clients on insurance solutions
  2. What insurance helps manage and transfer
  3. Legal responsibility for damage or injury
  4. The process of evaluating and accepting insurance risk
  5. Brand identity – Brokers No.1
  6. Amount paid by the insured before coverage kicks in

13 Clues: Brand identity – Brokers No.1What insurance helps manage and transferLegal responsibility for damage or injuryTemporary vehicle provided during repairsA sudden and unexpected event causing lossAmount paid by the insured before coverage kicks inA key metric comparing claims paid to premiums earnedIntentional deception for financial gain in insurance...

kuis globalisasi dan masyarakat digital 2024-09-17

kuis globalisasi dan masyarakat digital crossword puzzle
Across
  1. Proses pembelajaran yang semakin sering menggunakan ____
  2. Alat komunikasi yang memudahkan ____ pesan secara elektronik
  3. Sistem nilai dan norma yang diwariskan melalui ____
  4. Bidang yang terpengaruh oleh perdagangan ____ internasional
  5. Sistem ____ yang menghubungkan berbagai perangkat komputer
  6. Saluran untuk menyampaikan ____ ke publik
  7. Individu yang mengakses sistem komputer tanpa ____
  8. Jaringan global yang menghubungkan ____
  9. Proses yang menghubungkan berbagai negara melalui ____
Down
  1. Tempat atau ____ untuk berbagi konten secara online
  2. Cara orang ____ dan bertukar informasi
  3. Jaringan ____ menghubungkan orang secara virtual
  4. Data yang telah diproses dan dimaknai untuk ____
  5. Perdagangan yang dilakukan melalui ____
  6. Dunia ____ merujuk pada segala hal yang berkaitan dengan internet
  7. Proses mengubah informasi dari bentuk analog ke ____
  8. Hak untuk menjaga ____ informasi pribadi di dunia maya
  9. Alat atau sistem yang digunakan untuk mempermudah ____
  10. Informasi yang dikumpulkan dan dianalisis untuk ____ keputusan
  11. Bersifat ____ yang mencakup seluruh dunia

20 Clues: Cara orang ____ dan bertukar informasiPerdagangan yang dilakukan melalui ____Jaringan global yang menghubungkan ____Saluran untuk menyampaikan ____ ke publikBersifat ____ yang mencakup seluruh duniaJaringan ____ menghubungkan orang secara virtualData yang telah diproses dan dimaknai untuk ____Individu yang mengakses sistem komputer tanpa ____...

computers and kodu 2024-01-10

computers and kodu crossword puzzle
Across
  1. here you would find google and all your apps on a computer
  2. your computer's short-term memory
  3. a basic game making software
  4. a texting app that most pepole use
  5. the code inside your computer
  6. a physical way of protecting your computer
  7. a populer battle royale game
  8. a formal messaging app
  9. invisible graphic squares
Down
  1. a console made by microsoft
  2. a type of worded password
  3. the right order of code
  4. images made up of pixels
  5. a set of instructions for a computer
  6. someone breaking in toyour computer
  7. using yourself to unlock a eletric device
  8. bullying on the internet
  9. fake prospering adverts sent to yourself
  10. stands for the Central Processing Unit
  11. a popular platforming game with lots of smaller games in it made by the pepole using it

20 Clues: a formal messaging appthe right order of codeimages made up of pixelsbullying on the interneta type of worded passwordinvisible graphic squaresa console made by microsofta basic game making softwarea populer battle royale gamethe code inside your computeryour computer's short-term memorya texting app that most pepole use...

Cybercrime and ICT Laws 2025-03-21

Cybercrime and ICT Laws crossword puzzle
Across
  1. Law that protects individuals' personal information
  2. Crime of using domain names in bad faith
  3. Crime involving explicit materials of minors
  4. The agency that oversees ICT governance in the Philippines
  5. Act of intercepting data transmissions without permission
  6. Data Privacy Act of 2012
  7. Police unit that investigates online crimes
  8. Law penalizing cyber libel and hacking
  9. Investigation unit for online crimes
  10. Spreading false information about someone online
  11. Crime involving defamation on the internet
Down
  1. Interfering with or damaging a computer system
  2. Online fraud involving fake websites or emails
  3. Unauthorized access to a computer system
  4. Financial fraud using computers
  5. The unauthorized modification or destruction of computer data
  6. Government agency that investigates cybercrimes
  7. A system of rules established by a government
  8. Anti-Child Pornography Act of 2009
  9. Organization responsible for enforcing the Data Privacy Act
  10. Online sexual exploitation for money or favors
  11. Government agency that enforces data privacy laws

22 Clues: Data Privacy Act of 2012Financial fraud using computersAnti-Child Pornography Act of 2009Investigation unit for online crimesLaw penalizing cyber libel and hackingCrime of using domain names in bad faithUnauthorized access to a computer systemCrime involving defamation on the internetPolice unit that investigates online crimes...

news 2022-10-16

news crossword puzzle
Across
  1. joshua killer
  2. kdrt perpetrator
  3. take other people's lives
  4. the price goes up
  5. where did the 2004 tsunami occur
  6. car crash is called
  7. sexual crimes
  8. earth's surface vibrations
  9. lava coming out of volcano is called
  10. what's being talked about
  11. criminal act
  12. people who saw the incident
  13. big water wave
Down
  1. hacker name
  2. overflowing river
  3. bomb attack in jakarta 2016
  4. stadium name in malang
  5. conditions in 2020
  6. ground shift
  7. heroin,morphine,etc
  8. news tv channel in indonesia
  9. news being discussed
  10. actions taken by individual from a party to enrich themselves
  11. the person who reads the news
  12. form of oppresion
  13. cyber crime
  14. take people's things without permission
  15. things we use during a pandemic
  16. kdrt victim
  17. international news channel

30 Clues: hacker namecyber crimekdrt victimground shiftcriminal actjoshua killersexual crimesbig water wavekdrt perpetratoroverflowing riverthe price goes upform of oppresionconditions in 2020car crash is calledheroin,morphine,etcnews being discussedstadium name in malangtake other people's liveswhat's being talked aboutearth's surface vibrations...

ICT Password 2024-03-06

ICT Password crossword puzzle
Across
  1. Voice Over Internet Protocol
  2. Example of a crypto currency
  3. World Wide Web
Down
  1. Information Communictaion Technology
  2. Technology to hide Ip address and location
  3. Crime Crime carried out using computer

6 Clues: World Wide WebVoice Over Internet ProtocolExample of a crypto currencyInformation Communictaion TechnologyCrime Crime carried out using computerTechnology to hide Ip address and location

DTB Tanzania-2020 2020-12-10

DTB Tanzania-2020 crossword puzzle
Across
  1. A city with 2 branches of DTB Tanzania
  2. The period for credit repayment
  3. Institutions offering financial services by disrupting traditional banking
  4. Non-service of a loan facility
  5. Interest-bearing account for short,long-term goals and emergencies.
  6. A foreign current savings product
  7. A cheque with no date marked
  8. Product for not-for-profits
  9. Security against credit
Down
  1. Sales of insurance policies in bank
  2. A product for students
  3. A cheque presented after 6 months of mention
  4. Measurement for credit rating
  5. Swahili for peace
  6. A collateral against loan
  7. latest branch of the bank
  8. ATMs,POS,mobile banking and wakala's
  9. A bank serving interest of another bank in a foreign country.
  10. Detailed account on financial position of a business at a particular point in time
  11. Accounting and financial reporting standard

20 Clues: Swahili for peaceA product for studentsSecurity against creditA collateral against loanlatest branch of the bankProduct for not-for-profitsA cheque with no date markedMeasurement for credit ratingNon-service of a loan facilityThe period for credit repaymentA foreign current savings productSales of insurance policies in bank...

Travel Vocab 2020-04-10

Travel Vocab crossword puzzle
Across
  1. safety belt
  2. counter
  3. sleeping car
  4. car wagon
  5. window
  6. ticket
  7. flight
  8. trip travel
  9. passport
  10. aisle
  11. controller
  12. on time
  13. to turn
  14. luggage
  15. gate
  16. layover
  17. second class
  18. luggage screening
  19. stop
  20. coach
  21. visa
  22. to go through security
  23. international airport
Down
  1. boarding pass
  2. to take off
  3. in the train station
  4. to check luggage
  5. flight attendent
  6. suitcase
  7. to get/obtain
  8. seat
  9. ticket
  10. first class
  11. to go straight
  12. delayed
  13. arrival
  14. security agent
  15. to hope
  16. carry-on luggage
  17. to miss a flight
  18. to land
  19. event ticket
  20. platform
  21. in the airport
  22. waiting room
  23. baggage claim
  24. passenger
  25. connection
  26. departure
  27. ticket window
  28. bunk
  29. customs
  30. to board
  31. to see
  32. to give

55 Clues: seatgatebunkstopvisaaislecoachticketwindowticketflightto seecounterdelayedarrivalto hopeto landon timeto turnluggagelayovercustomsto givesuitcasepassportplatformto boardcar wagonpassengerdeparturecontrollerconnectionto take offsafety beltfirst classtrip travelsleeping carevent ticketwaiting roomsecond classboarding passto get/obtainbaggage claim...

Travel Vocab 2020-04-10

Travel Vocab crossword puzzle
Across
  1. safety belt
  2. counter
  3. sleeping car
  4. car wagon
  5. window
  6. ticket
  7. flight
  8. trip travel
  9. passport
  10. aisle
  11. controller
  12. on time
  13. to turn
  14. luggage
  15. gate
  16. layover
  17. second class
  18. luggage screening
  19. stop
  20. coach
  21. visa
  22. to go through security
  23. international airport
Down
  1. boarding pass
  2. to take off
  3. in the train station
  4. to check luggage
  5. flight attendent
  6. suitcase
  7. to get/obtain
  8. seat
  9. ticket
  10. first class
  11. to go straight
  12. delayed
  13. arrival
  14. security agent
  15. to hope
  16. carry-on luggage
  17. to miss a flight
  18. to land
  19. event ticket
  20. platform
  21. in the airport
  22. waiting room
  23. baggage claim
  24. passenger
  25. connection
  26. departure
  27. ticket window
  28. bunk
  29. customs
  30. to board
  31. to see
  32. to give

55 Clues: seatgatebunkstopvisaaislecoachticketwindowticketflightto seecounterdelayedarrivalto hopeto landon timeto turnluggagelayovercustomsto givesuitcasepassportplatformto boardcar wagonpassengerdeparturecontrollerconnectionto take offsafety beltfirst classtrip travelsleeping carevent ticketwaiting roomsecond classboarding passto get/obtainbaggage claim...

Travel Chap 4 vocab 2020-04-02

Travel Chap 4 vocab crossword puzzle
Across
  1. controller
  2. safety belt
  3. flight attendent
  4. to miss
  5. passenger
  6. trip; travel
  7. seat
  8. customs
  9. visa
  10. event ticket
  11. sleeping car
  12. to get/obtain
  13. arrival
  14. to land
  15. bunk
  16. aisle
  17. international airport
  18. to hope
  19. waiting room
  20. flight
  21. to give
  22. to see
  23. second class
  24. security agent
  25. on time
Down
  1. passport
  2. gate
  3. coach
  4. boarding pass
  5. platform
  6. luggage screening
  7. carry-on baggage
  8. in the airport
  9. connection
  10. baggage claim
  11. ticket window
  12. to go through security
  13. departure
  14. delayed
  15. window
  16. to take off
  17. car wagon
  18. first class
  19. suitcase
  20. counter
  21. to board
  22. to check luggage
  23. to go straight
  24. in the train station
  25. stop
  26. ticket
  27. delayed
  28. ticket
  29. to turn

54 Clues: gateseatvisabunkstopcoachaislewindowflightticketto seeticketto misscustomsdelayedarrivalto landcounterto hopeto givedelayedto turnon timepassportplatformsuitcaseto boardpassengerdeparturecar wagoncontrollerconnectionsafety beltto take offfirst classtrip; travelevent ticketsleeping carwaiting roomsecond classboarding passbaggage claimticket window...

The Maghrib Times Crossword Puzzle Vol. 3 Iss. 2 2025-03-08

The Maghrib Times Crossword Puzzle Vol. 3 Iss. 2 crossword puzzle
Across
  1. Evidence not from direct knowledge.
  2. A member of a jury.
  3. To formally accuse of a crime.
  4. Security given for the release of a prisoner.
  5. A request made to a court.
  6. One who receives a grant.
  7. To annul or set aside.
  8. An official who certifies documents.
  9. A formal order or decree.
  10. To make a legal argument in court.
Down
  1. A written document transferring property.
  2. To officially call someone to court.
  3. A civil wrong causing harm to another.
  4. A legal claim on property as security for a debt.
  5. To assert or declare without proof.
  6. A solemn promise, often before a court.
  7. Fairness as applied in legal cases.
  8. The location where a case is heard.
  9. To send a case back to a lower court.
  10. A demand for something as a right.

20 Clues: A member of a jury.To annul or set aside.One who receives a grant.A formal order or decree.A request made to a court.To formally accuse of a crime.A demand for something as a right.To make a legal argument in court.Evidence not from direct knowledge.To assert or declare without proof.Fairness as applied in legal cases....

Safety Practices 2026-02-22

Safety Practices crossword puzzle
Across
  1. Protection from danger.
  2. Used to cover and protect a wound.
  3. A potential source of danger.
  4. Used to clean wounds and prevent infection.
  5. A person’s physical well-being.
  6. Items used to ensure safety during sports.
  7. The first aim of first aid – to protect life.
  8. The action taken in an emergency situation.
  9. Recommended rules to follow for safety.
Down
  1. Physical harm that may occur during sports.
  2. Initial assistance given before professional medical help arrives.
  3. To stop further harm from happening.
  4. Rules used to prevent injuries during sports and exercise.
  5. Help given during an emergency.
  6. Worn to protect hands during first aid.
  7. Used to secure bandages.
  8. Used to remove small objects from wounds.
  9. A situation that poses an immediate threat to health or security.
  10. Helping an injured person heal.
  11. Used to cut bandages or tape.

20 Clues: Protection from danger.Used to secure bandages.Helping an injured person heal.Used to cut bandages or tape.Help given during an emergency.A potential source of danger.Recommended rules to follow for safety.Used to cover and protect a wound.A person’s physical well-being....

III L - crossword 2 M. Klocek; K. Mandecki 2015-04-27

III L - crossword 2 M. Klocek; K. Mandecki crossword puzzle
Across
  1. prom
  2. bezpieczeństwo
  3. przewoźnik
  4. organizować
  5. główny
  6. załadunek
Down
  1. cło
  2. strata
  3. dostawa
  4. zawartość
  5. pilne
  6. umowa
  7. naklejka

13 Clues: cłoprompilneumowastratagłównydostawanaklejkazawartośćzaładunekprzewoźnikorganizowaćbezpieczeństwo

3 2024-05-14

3 crossword puzzle
Across
  1. consider
  2. discuss
  3. required
  4. limitation
  5. charged
  6. wedding
Down
  1. prepared
  2. security
  3. calculated
  4. special
  5. exists
  6. confirmed
  7. outside

13 Clues: existsdiscussspecialoutsidechargedweddingpreparedconsidersecurityrequiredconfirmedcalculatedlimitation

Authorities 2025-02-11

Authorities crossword puzzle
Across
  1. acord
  2. permis
  3. lege
  4. plângere
  5. martor
  6. amendă
Down
  1. judecător
  2. hotar
  3. securitate
  4. penalizare
  5. semnătură
  6. ambasadă
  7. avocat

13 Clues: legehotaracordpermisavocatmartoramendăambasadăplângerejudecătorsemnăturăsecuritatepenalizare

Do you know the words? 2021-01-08

Do you know the words? crossword puzzle
Across
  1. Sitzplatz
  2. lösen
  3. Privatsphäre
  4. aufsperren
  5. Sicherheit
  6. befördern
  7. Akku
  8. Freiwillige
  9. Kopfkissen
  10. verhindern
  11. Netzwerk
  12. Behinderung
  13. Reifen
  14. kompliziert
  15. Raum
Down
  1. Windschutzscheibe
  2. nachverfolgen
  3. Reparatur
  4. Waren
  5. verbessern
  6. Daten
  7. Drohne
  8. Dach
  9. Haushaltsgeräte
  10. Lautsprecher
  11. Roboter
  12. verringern

27 Clues: DachAkkuRaumlösenWarenDatenDrohneReifenRoboterNetzwerkSitzplatzReparaturbefördernverbessernaufsperrenSicherheitKopfkissenverhindernverringernFreiwilligeBehinderungkompliziertPrivatsphäreLautsprechernachverfolgenHaushaltsgeräteWindschutzscheibe

Spanish 2 Unit 2 Vocab Crossword 2020-11-04

Spanish 2 Unit 2 Vocab Crossword crossword puzzle
Across
  1. soldado
  2. la oficina
  3. mandar
  4. enfermero
  5. la disciplina
  6. mecánico
  7. la autonomia
  8. movil
  9. la rutina
  10. recibir
  11. la securidad
  12. ingeniero
Down
  1. flexible
  2. comunicar
  3. hombre
  4. bombero
  5. policia
  6. medico
  7. músico
  8. artista
  9. abogado
  10. dentista
  11. cocinero
  12. escritor
  13. compartir

25 Clues: movilhombremandarmedicomúsicosoldadobomberopoliciaartistaabogadorecibirflexiblemecánicodentistacocineroescritorcomunicarenfermerola rutinacompartiringenierola oficinala autonomiala securidadla disciplina

Glossary: The United Nations 2022-02-15

Glossary: The United Nations crossword puzzle
Across
  1. arvo
  2. toimintaperiaate, käytäntö
  3. arvokkuus, ihmisarvo
  4. kääntää (kielestä toiseen)
  5. jäsenvaltio
  6. aktiivinen kansalainen
  7. edistää, tukea
  8. rauhanturvaaja
Down
  1. kestävä kehitys
  2. suojella
  3. ulkomaanasiat
  4. tasa-arvo
  5. konflikti, ristiriita
  6. tehdä yhteistyötä
  7. parantua, edistyä
  8. kääntäjä
  9. ihmisoikeudet
  10. turvallisuus
  11. tulkki
  12. kansainvälinen laki
  13. määrätä, säätää

21 Clues: arvotulkkisuojellakääntäjätasa-arvojäsenvaltioturvallisuusulkomaanasiatihmisoikeudetedistää, tukearauhanturvaajakestävä kehitysmäärätä, säätäätehdä yhteistyötäparantua, edistyäkansainvälinen lakiarvokkuus, ihmisarvokonflikti, ristiriitaaktiivinen kansalainentoimintaperiaate, käytäntökääntää (kielestä toiseen)

Family 2024-06-25

Family crossword puzzle
Across
  1. bread
  2. hunter
  3. cat lover
  4. loves Theo
  5. mechanical
  6. frugal
  7. boy scouts dad
  8. artistic
  9. swimmer
  10. farmer
  11. canine security
Down
  1. boatmover
  2. don't forget about
  3. chickens
  4. reader
  5. homestyle cook
  6. piano
  7. wastes nothing
  8. sings
  9. sheds
  10. animal expert
  11. gamer

22 Clues: breadpianosingsshedsgamerhunterreaderfrugalfarmerswimmerchickensartisticboatmovercat loverloves Theomechanicalanimal experthomestyle cookwastes nothingboy scouts dadcanine securitydon't forget about

French II Crossword 2023-04-20

French II Crossword crossword puzzle
Across
  1. strike
  2. consulate
  3. train station
  4. taxi
  5. embassy
  6. card
  7. airplane
  8. job/position
  9. foot
  10. cathedral
  11. ticket giver
  12. passport
  13. security
  14. cue/line
Down
  1. baggage
  2. castle
  3. customs
  4. car
  5. suitcase
  6. airport
  7. subway
  8. ticket
  9. palace
  10. boat/ship
  11. cash

25 Clues: cartaxicardfootcashcastlestrikesubwayticketpalacebaggagecustomsembassyairportsuitcaseairplanepassportsecuritycue/lineconsulatecathedralboat/shipjob/positionticket givertrain station

Refugee 2022-11-11

Refugee crossword puzzle
Across
  1. decalpsid
  2. noitucesrep
  3. ytilitsoh
  4. enitnarauq
  5. eegufer
  6. epacse
  7. seitlausac
  8. ytiruces
  9. noitargim
  10. RCHNU
  11. sserts
  12. redrob
Down
  1. noitatroped
  2. rekees-mulysa
  3. sudoxe
  4. sisirc
  5. noitargimmi
  6. tnemtaert-lli
  7. ssensselemoh
  8. eeucave
  9. yrautcnas
  10. enimaf
  11. yrtnuoc
  12. retlehs
  13. noitairtaper

25 Clues: RCHNUsudoxesisircepacseenimafssertsredrobeegufereeucaveyrtnuocretlehsytirucesdecalpsidytilitsohyrautcnasnoitargimenitnarauqseitlausacnoitatropednoitucesrepnoitargimmissensselemohnoitairtaperrekees-mulysatnemtaert-lli

Occupations 2022-05-12

Occupations crossword puzzle
Across
  1. artist
  2. employee/staff
  3. athlete
  4. Pilot
  5. Dancer
  6. Police
  7. professor
  8. Dentist
  9. musician
  10. movie star
  11. Female chef
  12. Male seller
  13. nurse
Down
  1. missionary
  2. security guard
  3. driver
  4. preacher
  5. Male chef
  6. Officer/government official
  7. Doctor
  8. Soldier
  9. Singer
  10. Female seller

23 Clues: PilotnurseartistdriverDancerPoliceDoctorSingerathleteSoldierDentistpreachermusicianMale chefprofessormissionarymovie starFemale chefMale sellerFemale sellersecurity guardemployee/staffOfficer/government official

Bank Protection Act 2015-07-22

Bank Protection Act crossword puzzle
Across
  1. What frequently used machine must meet all applicable UL standards of the bank?
  2. A requirement of the BPA is using ______ devices, such as prerecorded serial-numbered bills, or chemical and electronic devices.
  3. A requirement of the BPA is retaining a record of any robbery, ______, or larceny committed against the bank.
  4. A requirement of the BPA is maintaining a _______ that records activity in the banking office
Down
  1. The bank's security program shall designate a Bank Security _______
  2. Sixty Eight In what year was the BPA Passed?
  3. The BPA was passed by?
  4. The bank's security program shall designate a Bank Security ________
  5. of Directors It is the responsibility of the bank's ____ of ______ to comply with the BPA

9 Clues: The BPA was passed by?Sixty Eight In what year was the BPA Passed?The bank's security program shall designate a Bank Security _______The bank's security program shall designate a Bank Security ________What frequently used machine must meet all applicable UL standards of the bank?...

Entitlement Programs 2022-03-24

Entitlement Programs crossword puzzle
Across
  1. The form of Social Security meant for elderly people (based on age).
  2. Political issues important to most working class Americans (ex. wages and tax rates).
  3. Committees that decide how much money to spend on authorized programs.
  4. Annual cost of living adjustment mandated by law in welfare programs and Social Security.
  5. Committees that decide which programs to fund.
  6. Law that changed AFDC to TANF and tightened eligibility requirements.
Down
  1. Social Programs that distribute federal funds to all people who meet eligibility requirements.
  2. The form of Social Security meant for the disabled (people have to prove their disability to get this).
  3. Provides retirement benefits, health insurance, and support for the disabled and orphans.

9 Clues: Committees that decide which programs to fund.The form of Social Security meant for elderly people (based on age).Law that changed AFDC to TANF and tightened eligibility requirements.Committees that decide how much money to spend on authorized programs.Political issues important to most working class Americans (ex. wages and tax rates)....

Pipsographer 8 2023-10-31

Pipsographer 8 crossword puzzle
Across
  1. The is the price a seller is willing to accept for a security
  2. A written order to a bank to pay a specific amount of money from one account to another
  3. A person who owns shares in a corporation
  4. The total value of final goods and services produced by a country's citizens, regardless of their location
  5. Efforts to provide banking and financial services to all segments of the population
  6. This happens when someone dies without leaving a will
  7. Rivalry among sellers trying to achieve goals such as profit
Down
  1. Costs incurred in the process of generating revenue
  2. The process by which financial transactions are settled
  3. An upward movement in the price or value of a security or asset
  4. A company having a group of subsidiaries engaged in unrelated activities
  5. Satisfaction or happiness derived from consuming goods and services
  6. The maximum price that a buyer is willing to pay for a security

13 Clues: A person who owns shares in a corporationCosts incurred in the process of generating revenueThis happens when someone dies without leaving a willThe process by which financial transactions are settledRivalry among sellers trying to achieve goals such as profitThe is the price a seller is willing to accept for a security...

CROSSWORD 2026-03-23

CROSSWORD crossword puzzle
Across
  1. — The six official languages of the UN include Arabic, ______, Spanish, English, Chinese, and Russian as part of its multilingual system
  2. — INTERPOL notice that warns of serious threats to public safety such as dangerous materials, events, or individuals
  3. — What administrative body supports the day-to-day operations of international organizations like INTERPOL by handling coordination and management
  4. — What organization promotes police cooperation among ASEAN member states to combat transnational crime and enhance regional security
  5. — The ASEANAPOL Secretariat became fully operational in January ______ marking a milestone in institutional development
  6. — ______ notice provides warning about persons likely to commit crimes and alerts member countries for preventive action
  7. — Known as ______ crime, it threatens peace and security across nations by crossing borders and jurisdictions
  8. — ______ notice helps locate missing persons, often involving minors or vulnerable individuals
  9. — INTERPOL notice used to collect additional identity information about a person of interest in criminal investigations
  10. — Originated with the first International Criminal Police Congress in 1914 as the organization that facilitates international police cooperation
  11. NATIONS — United Nations (abbreviation) which is the global organization responsible for maintaining international peace and security
  12. — Kuala ______ is the location of ASEANAPOL Secretariat, serving as its headquarters in Malaysia
  13. — The main function of the UN is to maintain peace and ______ around the world through cooperation and diplomacy
  14. — The Big 5 or P5 of the UN has the power to ______ which allows them to block substantive resolutions in the Security Council
  15. — What slogan is used by INTERPOL: “Connecting police for a safer world” which reflects its mission and global purpose
Down
  1. — A notice used to locate a wanted person for arrest with a view to extradition or similar legal action
  2. — Signed by ASEAN Chiefs of Police during the 25th ASEANAPOL Conference as a formal statement of cooperation and commitment
  3. — What political and economic union established EUROPOL to enhance law enforcement cooperation among its member states
  4. — The Big 5 include China, France, ______, United Kingdom, and United States as permanent members of the UN Security Council
  5. -NOTICE TO SEEK INFORMATIPON ON UNIDENTIFIED BODIES
  6. — What is the name of the global police cooperation network that connects law enforcement agencies worldwide
  7. — Europol headquarters is in ______, Netherlands, known as a center for international law and justice
  8. — What role provides expert guidance to law enforcement leadership in making strategic and operational decisions
  9. — The 29th ASEANAPOL Conference was held in ______, Vietnam (2009), bringing together regional police leaders
  10. — In which French city is INTERPOL headquarters located, serving as the central hub of its operations
  11. — Europol’s Executive Director is assisted by three ______ directors who help manage operations and administration
  12. — Which small European country hosts the INTERPOL Congress and played a key role in its early formation
  13. — What acronym stands for the International Association of Chiefs of Police, a global professional organization for police leaders
  14. — The Latin verb for terrorism is ______ meaning “to frighten or cause fear,” which is the root of the term terrorism
  15. — A team that supports member states after a terrorist act or critical incident by providing rapid response assistance
  16. — Who serves as Secretary General of INTERPOL (recent), providing leadership and direction for the organization

31 Clues: -NOTICE TO SEEK INFORMATIPON ON UNIDENTIFIED BODIES— ______ notice helps locate missing persons, often involving minors or vulnerable individuals— Kuala ______ is the location of ASEANAPOL Secretariat, serving as its headquarters in Malaysia— Europol headquarters is in ______, Netherlands, known as a center for international law and justice...

Using computers 2024-01-09

Using computers crossword puzzle
Across
  1. to scramble up messages
  2. you use it to click on things
  3. a type of biometric security
  4. like a website
  5. physical parts of a computer
  6. an online texting or sharing app
Down
  1. typing
  2. to protect the users account
  3. a physical security method using your body
  4. a sequence of numbers or letters
  5. a method of sending a digital copy of a letter

11 Clues: typinglike a websiteto scramble up messagesto protect the users accounta type of biometric securityphysical parts of a computeryou use it to click on thingsa sequence of numbers or lettersan online texting or sharing appa physical security method using your bodya method of sending a digital copy of a letter

Travel Vocab 2020-04-10

Travel Vocab crossword puzzle
Across
  1. luggage
  2. ticket
  3. aisle
  4. delayed
  5. to land
  6. waiting room
  7. platform
  8. passenger
  9. arrival
  10. carry-on luggage
  11. sleeping car
  12. controller
  13. to take off
  14. international airport
  15. security agent
  16. departure
  17. on time
  18. flight
  19. seat
  20. bunk
  21. baggage claim
  22. to hope
  23. flight attendent
  24. to get/obtain
  25. luggage screening
Down
  1. customs
  2. in the train station
  3. first class
  4. trip travel
  5. derecho to go straight
  6. coach
  7. to give
  8. to check luggage
  9. safety belt
  10. event ticket
  11. passport
  12. boarding pass
  13. in the airport
  14. stop
  15. connection
  16. second class
  17. to miss a flight
  18. visa
  19. car wagon
  20. to go through security
  21. suitcase
  22. ticket
  23. window
  24. layover
  25. to see
  26. gate
  27. to turn
  28. ticket window
  29. counter

54 Clues: stopvisagateseatbunkaislecoachticketticketflightwindowto seecustomsluggagedelayedto giveto landarrivalon timelayoverto turncounterto hopeplatformpassportsuitcasepassengercar wagondepartureconnectioncontrollerfirst classtrip travelsafety beltto take offwaiting roomevent ticketsleeping carsecond classboarding passticket windowbaggage claim...

Foundation of Security and Cybercrimes 2024-11-20

Foundation of Security and Cybercrimes crossword puzzle
Across
  1. ensuring authorized personnel only
  2. accessible without delay
  3. steals, change, or destroy information
  4. unauthorized collection of information
  5. mass distribution of unsolicited messages
  6. unauthorized access to electronic data
  7. supplements the precautionary measures
  8. exclusive legal right to utilize artistic or musical material
  9. use of electronic communication to bully
  10. illegal threats
  11. restricts access to your computer to demand payment
  12. ensuring accuracy
  13. works without attaching to files
  14. allows logged in users use an application
Down
  1. method of breaching
  2. electronic lascivious exhibition of sexual activity
  3. imitating language or thought without authorization
  4. fraudulent sending of emails
  5. weakness
  6. assurance of the origin of information
  7. state of well-being
  8. violate security
  9. infects your computer
  10. action to protect the system
  11. anticipating threats
  12. common online fraud
  13. Someone cannot deny something

27 Clues: weaknessillegal threatsviolate securityensuring accuracymethod of breachingstate of well-beingcommon online fraudanticipating threatsinfects your computeraccessible without delayfraudulent sending of emailsaction to protect the systemSomeone cannot deny somethingworks without attaching to filesensuring authorized personnel only...

Dispatch Crossword 2025-08-28

Dispatch Crossword crossword puzzle
Across
  1. A place you might find our NYC team members
  2. To steal or check in
  3. The data of a system that must be saved because of its value
  4. Any person seeking to compromise a function or structure
  5. Tells you something is amiss
  6. Shows the elements that make up the assembly
  7. What are we known for?
  8. source of electric power
Down
  1. What we aim to prevent
  2. A type of security camera
  3. A type of security camera
  4. A place you might find our ROC team members
  5. 7 down
  6. onsite or offsite
  7. A string of characters used to confirm a user's identity
  8. A grocery store we work with
  9. A place you might find our FL team members
  10. A drawing of the worksite
  11. Something we install
  12. To interfere with in order to cause damage
  13. Device that detects a change

21 Clues: 7 downonsite or offsiteTo steal or check inSomething we installWhat we aim to preventWhat are we known for?source of electric powerA type of security cameraA type of security cameraA drawing of the worksiteA grocery store we work withTells you something is amissDevice that detects a changeA place you might find our FL team members...

Security and Safety 2022-11-02

Security and Safety crossword puzzle
Across
  1. person responsible for cost of lost keys
  2. responsible for overall safety/security of facility
  3. network ___________ center
  4. part of the NACI application
  5. this is always removed on a sign in sheet
  6. annual training for information security
  7. always secure me before walking away
Down
  1. created by CIM and given to employees
  2. this is everyone's responsibility!
  3. number of FTST counselors required at remote local
  4. three letter acronym for client information
  5. workstations are for ______ use only
  6. red over black and we'll be back (two words)

13 Clues: network ___________ centerpart of the NACI applicationthis is everyone's responsibility!workstations are for ______ use onlyalways secure me before walking awaycreated by CIM and given to employeesperson responsible for cost of lost keysannual training for information securitythis is always removed on a sign in sheet...

INVESTING - Travis Perkins 2026-03-20

INVESTING - Travis Perkins crossword puzzle
Across
  1. that are created and backed up but not tied.
  2. potential high problems.
  3. a virtual wealth that gains a lot.
  4. it’s managed by someone.
  5. COST AVERAGING putting all wealth at given time.
  6. CHAIN connected through a digital seal
Down
  1. a security of social interaction.
  2. someone who buys stock for the long term.
  3. something that puts out in exchange.
  4. a special type of tax.
  5. retirement and survivor benefits.
  6. CAP the total importance of information.
  7. a network of recorded information.

13 Clues: a special type of tax.potential high problems.it’s managed by someone.a security of social interaction.retirement and survivor benefits.a virtual wealth that gains a lot.a network of recorded information.something that puts out in exchange.CHAIN connected through a digital sealCAP the total importance of information....

ONLY US 2021-10-19

ONLY US crossword puzzle
Across
  1. FEMALE SECURITY
  2. MUSICIAL
  3. MAN U!
  4. CONCIERGE
  5. VENDING
  6. CATERING SUPERVISOR
  7. SCOTTS LASSIE
  8. LANGUAGE EXPERT
  9. SCOOTER KING
  10. NEWLY MARRIED
  11. CHEEKY
Down
  1. COFFEE
  2. THE BOSS
  3. MR FIX IT
  4. ELECTRICIAN
  5. HEALTH & SAFETY
  6. RUGBY
  7. SANDWICHES
  8. PLUMBING
  9. HEAVY METAL
  10. RECEPTIONIST TC1

21 Clues: RUGBYCOFFEEMAN U!CHEEKYVENDINGTHE BOSSMUSICIALPLUMBINGMR FIX ITCONCIERGESANDWICHESELECTRICIANHEAVY METALSCOOTER KINGSCOTTS LASSIENEWLY MARRIEDFEMALE SECURITYHEALTH & SAFETYLANGUAGE EXPERTRECEPTIONIST TC1CATERING SUPERVISOR

gkhvvvlxxv 2021-10-14

gkhvvvlxxv crossword puzzle
Across
  1. hurry
  2. long but more
  3. straight
  4. alone
  5. youtube reaction vid
  6. saving
  7. safety
  8. ball hit target
  9. quizzes
  10. cream
  11. children
Down
  1. car place
  2. sunny city
  3. chicken
  4. carfuel
  5. come over
  6. close
  7. all of the things
  8. just us
  9. staying alive

20 Clues: hurryclosealonecreamsavingsafetychickencarfueljust usquizzesstraightchildrencar placecome oversunny citylong but morestaying aliveball hit targetall of the thingsyoutube reaction vid

German Crossword 2020-11-09

German Crossword crossword puzzle
Across
  1. traditional
  2. to belong to
  3. role
  4. illegitamate
  5. confidence
  6. source
  7. to be descended from
  8. foster family
  9. surrogate family
Down
  1. living together
  2. security
  3. single parent
  4. adoptive family
  5. between generation family
  6. home
  7. ownership
  8. love match
  9. patchwork family
  10. bond
  11. woman

20 Clues: homerolebondwomansourcesecurityownershiplove matchconfidencetraditionalto belong toillegitamatesingle parentfoster familyliving togetheradoptive familypatchwork familysurrogate familyto be descended frombetween generation family

Spotlight 8, 7A, kirjoita kaikki sanat yhteen ilman sanavälejä 2020-04-16

Spotlight 8, 7A, kirjoita kaikki sanat yhteen ilman sanavälejä crossword puzzle
Across
  1. uskoa
  2. kateellinen
  3. keskustelu
  4. rasistinen
  5. oppitunti
  6. valehtelija
  7. lupa
  8. pitkään aikaan
  9. saada selville
  10. onnistua
  11. epäystävällinen
Down
  1. katsoa
  2. turvallisuus
  3. ilman
  4. suosikki
  5. kiusallinen
  6. ongelmat
  7. keskusta
  8. keskustella
  9. pyytää anteeksi
  10. koe
  11. edessä
  12. selittää
  13. jutut
  14. kiusaaja
  15. viimeisin

26 Clues: koelupailmanuskoajututkatsoaedessäsuosikkiongelmatkeskustaselittääkiusaajaonnistuaoppituntiviimeisinkeskustelurasistinenkateellinenkiusallinenkeskustellavalehtelijaturvallisuuspitkään aikaansaada selvillepyytää anteeksiepäystävällinen

Vocab List #7 2023-04-26

Vocab List #7 crossword puzzle
Across
  1. - boat
  2. - gum
  3. - sun
  4. - suitcase
  5. - to walk
  6. - hotel
  7. - cloud
  8. - snake
  9. - security
  10. - butterfly
  11. - train
  12. - snorkle
Down
  1. - trick
  2. - rude
  3. - energy
  4. - fly
  5. - Photo/Image
  6. - airport
  7. - Perchance
  8. - candy
  9. - to fish
  10. - door
  11. - bomb
  12. - turtle
  13. - to board

25 Clues: - fly- gum- sun- rude- boat- door- bomb- trick- hotel- candy- cloud- snake- train- energy- turtle- airport- to walk- to fish- snorkle- suitcase- security- to board- Perchance- butterfly- Photo/Image

Cloud Computing 2015-05-08

Cloud Computing crossword puzzle
Across
  1. Anbieter
  2. Wolke
  3. Berechtigung
  4. Verbindung
  5. Sicherheit
  6. zugreifen
Down
  1. nutzen
  2. Virtualisierung
  3. Anwendung
  4. stabilisieren
  5. Datenbank
  6. Nutzer
  7. aufbewahren

13 Clues: WolkenutzenNutzerAnbieterAnwendungDatenbankzugreifenVerbindungSicherheitaufbewahrenBerechtigungstabilisierenVirtualisierung

Authorities 2025-02-07

Authorities crossword puzzle
Across
  1. plângere
  2. ambasadă
  3. acord
  4. lege
  5. securitate
  6. penalizare
Down
  1. graniță
  2. semnătură
  3. amendă
  4. judecător
  5. permis
  6. martor
  7. avocat

13 Clues: legeacordamendăpermismartoravocatgranițăplângereambasadăsemnăturăjudecătorsecuritatepenalizare

Kaleidoscope 2025-03-25

Kaleidoscope crossword puzzle
Across
  1. attitude
  2. efforts
  3. future
  4. income
  5. diversity
  6. nature
Down
  1. difficulties
  2. shfit
  3. chances
  4. approach
  5. risks
  6. hierarchy
  7. safety

13 Clues: shfitrisksfuturesafetyincomenatureeffortschancesattitudeapproachhierarchydiversitydifficulties

SAPM CROSSWORD 2022-06-22

SAPM CROSSWORD crossword puzzle
Across
  1. The economist who developed the Arbitrage Pricing Theory (APT) model
  2. The other name for non-diversifiable risk is -------------------------risk
  3. The economist who laid the foundations for the Modern Portfolio theory
  4. An opportunity where an investor earns riskless profit without making any net investment
  5. Researchers came up with the Single index model to reduce the ----------------errors in the Mean-variance model
  6. In the absence of secondary markets, this risk would be higher
  7. One of the researchers/economists who developed the CAPM model
  8. The tendency of winning stocks to continue performing well in the near term which is also one of the factors in the 4 factor Fama-French model or the Carhart 4 factor model of asset pricing
Down
  1. Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
  2. The other name for indifference curve is --------------curve
  3. --------------------is the slope of the security characteristic line
  4. A short ---------- occurs when a stock moves sharply higher, prompting traders who bet its price would fall to buy it in order to avoid greater losses
  5. The efficient line where riskless lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index is called the ----------------market line
  6. On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
  7. CAPM is a market --------------model
  8. The line representing CAPM is the -----------------market line
  9. A conditional market order to sell stock if it drops to a given price (write without space)
  10. The frontier which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return
  11. In order to diversify, we look for security returns that are related ------------------Unique The ------------risk of the firm is diversifiable

19 Clues: CAPM is a market --------------modelThe other name for indifference curve is --------------curveThe line representing CAPM is the -----------------market lineIn the absence of secondary markets, this risk would be higherOne of the researchers/economists who developed the CAPM modelThe economist who developed the Arbitrage Pricing Theory (APT) model...

RP vs AE 2026-01-08

RP vs AE crossword puzzle
Across
  1. Yard sale
  2. Costume
  3. Two weeks
  4. Social Security Number
  5. Undershirt
  6. Raisin
Down
  1. Eggplant
  2. Shrimp
  3. Stuffed animal
  4. Vest
  5. Crosswalk
  6. Raincoat
  7. Execuse me
  8. Comforter
  9. Tuxedo

15 Clues: VestShrimpTuxedoRaisinCostumeEggplantRaincoatCrosswalkYard saleComforterTwo weeksExecuse meUndershirtStuffed animalSocial Security Number

Blackbird Girls Vocabulary 2024-03-11

Blackbird Girls Vocabulary crossword puzzle
Across
  1. A visible suspension of particles in the air, typically produced by burning or combustion.
  2. impossibility A situation that is extremely unlikely to occur based on statistical analysis.
  3. A deep red color.
  4. The Committee for State Security, the main security agency of the Soviet Union from 1954 to 1991, responsible for intelligence, counterintelligence, and internal security.
  5. drill A practice exercise conducted to prepare individuals for emergencies or hazardous situations.
  6. police A government agency responsible for intelligence gathering, surveillance, and maintaining internal security, often with extensive powers and operating covertly.
  7. A type of cured sausage, typically made of fermented and air-dried meat.
  8. jays A species of bird characterized by their blue plumage and noisy calls.
Down
  1. A building material made from a mixture of cement, aggregate (such as gravel or sand), water, and sometimes additives.
  2. A type of bird, often referring to the common blackbird, known for its black plumage and melodious song.
  3. Small birds belonging to the family Passeridae, typically brown or gray in color.
  4. power station A facility that generates electricity through nuclear reactions, usually involving the splitting of atoms in a reactor.
  5. Union Former socialist state in Eurasia, existing from 1922 to 1991, comprising several republics including Russia, Ukraine, Belarus, and others.
  6. The horizontal piece at the bottom of a window frame, often where objects can be placed.

14 Clues: A deep red color.A type of cured sausage, typically made of fermented and air-dried meat.jays A species of bird characterized by their blue plumage and noisy calls.Small birds belonging to the family Passeridae, typically brown or gray in color.The horizontal piece at the bottom of a window frame, often where objects can be placed....

Australia's connection with the world. 2017-03-02

Australia's connection with the world. crossword puzzle
Across
  1. emblem
  2. armor
  3. transporting
  4. shield
  5. gain
  6. information technology
  7. outward looking out
Down
  1. exchange
  2. employment
  3. Nation
  4. purchase
  5. computer
  6. recession
  7. ship

14 Clues: gainshiparmoremblemNationshieldexchangepurchasecomputerrecessionemploymenttransportingoutward looking outinformation technology

Health All the Way 2024-11-14

Health All the Way crossword puzzle
Across
  1. manner of living
  2. security
  3. pressure
  4. smile
  5. action
  6. intestines
Down
  1. disease
  2. tired
  3. supplements
  4. largest organ
  5. tension
  6. relatives
  7. fit
  8. delicious

14 Clues: fittiredsmileactiondiseasetensionsecuritypressurerelativesdeliciousintestinessupplementslargest organmanner of living

Moderne Technologien 2016-11-22

Moderne Technologien crossword puzzle
Across
  1. verkörpert die künstliche Intelligenz
  2. Sucht
  3. Fokussierung der Aufmerksamkeit auf bestimmte Tätigkeit
Down
  1. Fähigkeit im Gehirn zu speichern
  2. Prozess des einsam Werdens
  3. absichtliche Bedrohen oder Belästigen auf Internet z.B.

6 Clues: SuchtProzess des einsam WerdensFähigkeit im Gehirn zu speichernverkörpert die künstliche Intelligenzabsichtliche Bedrohen oder Belästigen auf Internet z.B.Fokussierung der Aufmerksamkeit auf bestimmte Tätigkeit

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  2. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  4. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
  5. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  6. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  7. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  8. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  9. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  10. OF SERVICE (DOS)
Down
  1. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  2. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  3. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  4. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  5. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  6. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  7. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
  8. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  9. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  10. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  11. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.

21 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang....

Privacy And Security 2022-11-15

Privacy And Security crossword puzzle
Across
  1. permission that patients give in order to disclose protected health information.
  2. It provides detailed instructions for handling and protecting a patient’s personal health information
  3. what are these considered Additional hardware, software, and licensing costs, resistance to giving up paper records, difficult data entry, training,computer downtime, such as expected failure or routine servicing, and confidentiality and security concerns, such as access of information to unauthorized individuals.
  4. The Health Insurance Portability and Accountability Act of 1996
  5. what are these considered… not leaving printers unattended, not coping confidential information if unauthorized, contacting the receiver and verifying the fax number.
  6. Hitting, kicking, shaking, pulling hair, pinching, choking,biting, burning, scalding,threatening with a weapon,inappropriate restraint, withholding food/water, not providing physical care, and abandonment.
Down
  1. information that is shared within a protected relationship
  2. How long are medical records kept for ?
  3. contain all personal information such as…full name,Living address,Medical history etc.
  4. rule It provides regulations that make sure that confidential records are kept secure
  5. includes protected health information, privacy, confidentiality, and disclosure
  6. Excessive demands, insults, humiliation,jealousy, control, isolation,stalking/threats,and lack of affection and support.
  7. Using sexual gestures, suggesting sexual behavior, and unwanted sexual touching or acts

13 Clues: How long are medical records kept for ?information that is shared within a protected relationshipThe Health Insurance Portability and Accountability Act of 1996includes protected health information, privacy, confidentiality, and disclosurepermission that patients give in order to disclose protected health information....

World of security 2021-05-01

World of security crossword puzzle
Across
  1. a holder of supplies for manufacturers
  2. to buy or sell goods or services
  3. the fact or condition of being regarded or treated as more important than others
  4. declared in law as unable to pay their debts
  5. a part or portion of a larger amount which is divided among a number of people
  6. a number of connected items or names written or printed consecutively, typically one below the other
  7. an amount of smth expressed as a number out of 100
Down
  1. a fact that shows that smth exists or is true
  2. a thing that is needed or wanted
  3. occurring once every year
  4. happening four times a year
  5. a large sum of money which you use to start a business
  6. to give your voice to somebody or register your choice

13 Clues: occurring once every yearhappening four times a yeara thing that is needed or wantedto buy or sell goods or servicesa holder of supplies for manufacturersdeclared in law as unable to pay their debtsa fact that shows that smth exists or is truean amount of smth expressed as a number out of 100a large sum of money which you use to start a business...

World of security 2021-05-01

World of security crossword puzzle
Across
  1. to buy or sell goods or services
  2. a thing that is needed or wanted
  3. a fact that shows that smth exists or is true
  4. declared in law as unable to pay their debts
  5. a number of connected items or names written or printed consecutively, typically one below the other
  6. a part or portion of a larger amount which is divided among a number of people
Down
  1. happening four times a year
  2. an amount of smth expressed as a number out of 100
  3. the fact or condition of being regarded or treated as more important than others
  4. a holder of supplies for manufacturers
  5. a large sum of money which you use to start a business
  6. occurring once every year
  7. to give your voice to somebody or register your choice

13 Clues: occurring once every yearhappening four times a yearto buy or sell goods or servicesa thing that is needed or wanteda holder of supplies for manufacturersdeclared in law as unable to pay their debtsa fact that shows that smth exists or is truean amount of smth expressed as a number out of 100a large sum of money which you use to start a business...

Social Security Puzzle 2024-02-22

Social Security Puzzle crossword puzzle
Across
  1. enforcers
  2. ______ age
  3. meets requirements
  4. not a pension
  5. out with the old (system)
  6. Short-term benefit
Down
  1. Pension changes (2012)
  2. DSS' Birthday
  3. 1 week's contribution
  4. Quantum of Pension
  5. long term benefit
  6. street location
  7. In with the new

13 Clues: enforcers______ ageDSS' Birthdaynot a pensionstreet locationIn with the newlong term benefitQuantum of Pensionmeets requirementsShort-term benefit1 week's contributionPension changes (2012)out with the old (system)

Water Security Crossword! 2020-04-14

Water Security Crossword! crossword puzzle
Across
  1. the quantity of water that can be used for human purposes without significant harm to ecosystems or other users.
  2. the measure of the total amount of water used by the customers within the water system.
  3. Issues related to agriculture, industry (including energy production), oil, fecal matter, and litter, may all contribute to this problem.
  4. the most common method used to desalinate water
  5. the collection of precipitation which falls on the roof of buildings.
  6. used to increase the amount of water stored in aquifers. It is widely used in some countries to enhance water supplies, such as in the Netherlands, Germany, and the USA.
  7. the removal of salt from seawater to make it suitable for drinking. It is an energy-intensive process and therefore usually expensive.
Down
  1. This is what is causing a shift in water availability and why some areas that previously had sufficient water now face droughts. These droughts are becoming more frequent and prolonged, causing water insecurity.
  2. used water that is not clean enough to be used again. This water usually originates from toilets.
  3. A ratio that rates countries from 0 to 5: the higher the number, the higher the water stress. The ratio compares total withdrawals to total available renewable supply on an annual basis (demand/supply).
  4. natural or artificially created lakes, used to collect and store water.
  5. used water that is clean enough to be used again. This water originates from baths, showers, washbasins, and washing machines
  6. access to sufficient, sustainable quantities of clean water and sanitation.

13 Clues: the most common method used to desalinate waterthe collection of precipitation which falls on the roof of buildings.natural or artificially created lakes, used to collect and store water.access to sufficient, sustainable quantities of clean water and sanitation.the measure of the total amount of water used by the customers within the water system....

ITSS Cup: Mission Possible Edition 2026-03-24

ITSS Cup:  Mission Possible Edition crossword puzzle
Across
  1. Spy proof your data with this.
  2. Mission Impossible version of turn it off and on again.
  3. Security alerter from mission control.
  4. First agent in the ITSS organization.
  5. Agent's secure communication channel.
  6. Controlled access to classified files.
Down
  1. Hidden entry point for agents or attackers.
  2. Command line for missions.
  3. Double agent that looks safe.
  4. Security layer that acts like a force field
  5. Digital notebook for mission intel.
  6. Encrypted message scrambling algorithm.

12 Clues: Command line for missions.Double agent that looks safe.Spy proof your data with this.Digital notebook for mission intel.First agent in the ITSS organization.Agent's secure communication channel.Security alerter from mission control.Controlled access to classified files.Encrypted message scrambling algorithm....

Qatar Cross Word 2021-11-24

Qatar Cross Word crossword puzzle
Across
  1. Slogan Raised In Qatar
  2. Thing related to Cyber bullying
  3. capital of independent Palestinian state
Down
  1. Thing that happened with Saudi Arabia
  2. Historic Visit To Break Blockade
  3. Full Form of QNA

6 Clues: Full Form of QNASlogan Raised In QatarThing related to Cyber bullyingHistoric Visit To Break BlockadeThing that happened with Saudi Arabiacapital of independent Palestinian state

ethan is gay 2024-12-25

ethan is gay crossword puzzle
Across
  1. the toys emmi and ethan played with when she was very small
  2. ethans favorite animal
  3. a beautiful french lover
  4. our forbidden stinky secret (hint: in the Meijer parking lot)(2 words)
  5. the best gift ethan got for emmi
Down
  1. a creepy boy who had a crush on emmi so ethan cyber bullied him (2 words)
  2. ethans favorite barbie movie
  3. our fluffy emotionally charged disagreement
  4. wanna go shoot some ____?
  5. where emmi found love and lost it (digitally)
  6. acronym for ethans favorite childhood midnight snack

11 Clues: ethans favorite animala beautiful french loverwanna go shoot some ____?ethans favorite barbie moviethe best gift ethan got for emmiour fluffy emotionally charged disagreementwhere emmi found love and lost it (digitally)acronym for ethans favorite childhood midnight snackthe toys emmi and ethan played with when she was very small...

GO EXPO Crossword 2025-10-11

GO EXPO Crossword crossword puzzle
Across
  1. Foundation for strong teamwork
  2. Where you can find AQS's biggest solar installation
  3. Common entry point for cyber attacks
  4. Klikk delivery promise
  5. Technology-enabled support service that uses devices and sensors to help people live safely and independently in their own homes
Down
  1. Brain of a solar energy system
  2. Driving a digital Malta, where no-one is left behind
  3. Cybersift flagship product
  4. Heating, ventilation, and air conditioning
  5. One of the three benefits of SENS
  6. The second of BMIT’s 3 Es

11 Clues: Klikk delivery promiseThe second of BMIT’s 3 EsCybersift flagship productBrain of a solar energy systemFoundation for strong teamworkOne of the three benefits of SENSCommon entry point for cyber attacksHeating, ventilation, and air conditioningWhere you can find AQS's biggest solar installationDriving a digital Malta, where no-one is left behind...

My crossword puzzle 2026-03-04

My crossword puzzle crossword puzzle
Across
  1. a school club that uses robots
  2. money for online
  3. we use it to play video games or download apps
  4. a computer similar to a chromebook
Down
  1. a person that bullies online
  2. a character in despicable me but also uses direction and magnetism
  3. a machine you controll or command
  4. a little piece that you plug into your computer to save information or download information
  5. involves being online
  6. a part of technology that we use every day
  7. what you use to type on a computer

11 Clues: money for onlineinvolves being onlinea person that bullies onlinea school club that uses robotsa machine you controll or commandwhat you use to type on a computera computer similar to a chromebooka part of technology that we use every daywe use it to play video games or download appsa character in despicable me but also uses direction and magnetism...

The Function and Structure of the United Nations 2024-07-21

The Function and Structure of the United Nations crossword puzzle
Across
  1. Adopted by the UN International Court of Justice, fundamental human rights and freedoms. Universal ___ of Human Rights
  2. Where all 193 member states meet, (General_)
  3. UN staff are international civil ___
  4. Carries out day-to-day work, administers programs, and services other principal organs of the UN.
  5. Location of the International Court of Justice
  6. Established to supervise Trust Territories, ensuring their preparation for self-government or independence. (___ council)
  7. Responsible for maintaining international peace and security. It has 15 members, and its decisions are binding.
Down
  1. The principal judicial organ of the UN, settling legal disputes between states and providing advisory opinions. (4 words)
  2. Ambitious targets set by the UN to address global challenges like poverty, health, and education.
  3. Permanent members can vote "no" to any decision suggested by the Security Council.
  4. ____ forces may prevent conflict through mediation and dispute resolution
  5. UN's efforts to prevent conflicts and maintain peace in troubled regions.
  6. Members China, France, Russia, UK and USA
  7. A specialized agency within the UN system, focusing on education, science, culture, and communication.

14 Clues: UN staff are international civil ___Members China, France, Russia, UK and USAWhere all 193 member states meet, (General_)Location of the International Court of Justice____ forces may prevent conflict through mediation and dispute resolutionUN's efforts to prevent conflicts and maintain peace in troubled regions....

Cybersecurity and Compliance Week! 2025-11-10

Cybersecurity and Compliance Week! crossword puzzle
Across
  1. What emails are you supposed to report to IT?
  2. What is a security measure that requires at least two forms of identification?
  3. Who is a person who gains unauthorized access to computer systems?
  4. What is the process of converting data into a secure format?
  5. Who is the HR Reporting Officer?
  6. What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
  7. What is the term for the agreement between covered entities and business associates?
  8. You are the first line of ___ in protection of DDID and AHS
Down
  1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. What is a central concept of HIPAA that protects individuals' health information?
  3. Who is the HIPAA Privacy Officer?
  4. What is the term for malicious software?
  5. Who is the Security Officer?
  6. What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?

14 Clues: Who is the Security Officer?Who is the HR Reporting Officer?Who is the HIPAA Privacy Officer?What is the term for malicious software?What emails are you supposed to report to IT?You are the first line of ___ in protection of DDID and AHSWhat is the process of converting data into a secure format?...

p.46 2025-08-13

p.46 crossword puzzle
Across
  1. база данных
  2. предупреждение
  3. должностное лицо
  4. рассматривать, принимать во внимание
  5. почти
  6. увеличить
  7. в соответсвии с
  8. позволять себе
  9. недавний
  10. предотвратить
Down
  1. среднестатистический
  2. жертва
  3. защита
  4. уязвимый
  5. недостаток (чего-то)
  6. уверенный
  7. безопасность

17 Clues: почтижертвазащитауязвимыйнедавнийуверенныйувеличитьбаза данныхбезопасностьпредотвратитьпредупреждениепозволять себев соответсвии сдолжностное лицосреднестатистическийнедостаток (чего-то)рассматривать, принимать во внимание

The Good, The Bad, And The Ugly 2015-04-19

The Good, The Bad, And The Ugly crossword puzzle
Across
  1. The not-so-good aspects from social media.
  2. This skill is tested when social media comes into play.
  3. Justice This is achieved through the various channels of social media.
  4. The positive aspects that arise from social media.
  5. Fake relationships.
  6. The rumors that are spread are sent though this.
  7. The worst effects from social media.
Down
  1. This is improved through a world wide data base for information.
  2. Crude pictures with harmful captions.
  3. The improved communication through technology.
  4. Bullying Bullying over social media.
  5. Hackers are now easily able to invade this.

12 Clues: Fake relationships.Bullying Bullying over social media.The worst effects from social media.Crude pictures with harmful captions.The not-so-good aspects from social media.Hackers are now easily able to invade this.The improved communication through technology.The rumors that are spread are sent though this....

The Fourth Stall 2023-10-10

The Fourth Stall crossword puzzle
Across
  1. The Place in which Mac's business takes place
  2. The Bully that starts all the rumors.
  3. The main Protagonist of the story
  4. The place that Staples takes Mac to get beaten up. Supposedly haunted
Down
  1. Middle school bully. He gets called "deranged"
  2. The cyber bully
  3. The main antagonist of the story
  4. Mac's bodyguard that keeps him out of trouble
  5. What Barnaby Willis is known as
  6. Staples' Right hand man, normally beats up Mac
  7. Mac's best friend
  8. Staples' inside man on Mac, turns goo in the end

12 Clues: The cyber bullyMac's best friendWhat Barnaby Willis is known asThe main antagonist of the storyThe main Protagonist of the storyThe Bully that starts all the rumors.Mac's bodyguard that keeps him out of troubleThe Place in which Mac's business takes placeMiddle school bully. He gets called "deranged"Staples' Right hand man, normally beats up Mac...

Communication in the future 2024-11-24

Communication in the future crossword puzzle
Across
  1. room A place online where people talk.
  2. difference When people from different places do things differently.
  3. To talk or work with someone.
  4. phone A phone with a wire at home or work.
  5. channel A way to send or get messages.
  6. world The internet and things we do online.
  7. Pictures, sounds, and videos together.
Down
  1. Talking with someone in person.
  2. breakdown When people cannot understand each other.
  3. To talk or share ideas with someone.
  4. board A website where people leave messages.
  5. barrier When people cannot understand each other’s language.
  6. language Using hands and face to show ideas.

13 Clues: To talk or work with someone.Talking with someone in person.To talk or share ideas with someone.Pictures, sounds, and videos together.channel A way to send or get messages.breakdown When people cannot understand each other.phone A phone with a wire at home or work.room A place online where people talk....

ACCESS CONTROL 2025-05-29

ACCESS CONTROL crossword puzzle
Across
  1. Subway .......... are the example of physical access control.
  2. Unlocking a smartphone with a ..........scan is an example of information access control.
  3. The guest’s keycard ........them access to their room, the guest elevator, and the pool
  4. Information access control ........... access to data and the software used to manipulate that data.
  5. Physical access control is a set of ............ to control who is granted access to a physical location.
  6. a hotel .......... scanner only grants access to authorized guests who have a hotel key.
Down
  1. The security practice of confirming that someone is who they claim to be.
  2. financial holdings
  3. the process of determining which level of access each user is granted.
  4. ............ access control establishes strict security policies for individual users and the resources, systems, or data they are allowed to access.
  5. worker
  6. Security ..........is an official determination that an individual may access information
  7. extra

13 Clues: extraworkerfinancial holdingsSubway .......... are the example of physical access control.the process of determining which level of access each user is granted.The security practice of confirming that someone is who they claim to be.The guest’s keycard ........them access to their room, the guest elevator, and the pool...

The Korean War 2022-06-22

The Korean War crossword puzzle
Across
  1. Capital of North Korea
  2. Action of not turning up to something in protest (Soviet Union at the Security Council)
  3. Name of vote needed to agree on military intervention by the UN Security Council
  4. Country banned from taking up its seat at the UN Security Council following its Communist takeover.
  5. Pocket that South Korean troops were pushed into by the North Korean invasion
  6. The name of the UN commander who was sacked by US President Harry Truman
  7. Leader of South Korea
Down
  1. Political system that operated in South Korea
  2. Political system that operated in North Korea
  3. Port city attacked by the UN Taskforce in September 1950
  4. The 38th ___________ separated North and South Korea

11 Clues: Leader of South KoreaCapital of North KoreaPolitical system that operated in South KoreaPolitical system that operated in North KoreaThe 38th ___________ separated North and South KoreaPort city attacked by the UN Taskforce in September 1950The name of the UN commander who was sacked by US President Harry Truman...

Cybersecurity Week 2022-10-14

Cybersecurity Week crossword puzzle
Across
  1. a service that creates a secure tunnel between your device and the internet
  2. a malicious software that spreads from one computer to another
  3. the process of verifying a users identity
  4. malicious code or software
Down
  1. taking readable plaintext, and converting it into ciphertext
  2. when attackers send malicious emails to trick people into a scam
  3. a software update that fixes bugs or updates security
  4. a security technique that requires multiple methods of authentication
  5. a malware that encrypts user data, and requires payment to get back
  6. a secret word or phrase that must be used to gain access to something
  7. a network security device that monitors traffic to or from your network

11 Clues: malicious code or softwarethe process of verifying a users identitya software update that fixes bugs or updates securitytaking readable plaintext, and converting it into ciphertexta malicious software that spreads from one computer to anotherwhen attackers send malicious emails to trick people into a scam...

Bullying 2017-02-19

Bullying crossword puzzle
Across
  1. kicking and Pushing
  2. ask classmates in bad modos for money or lunch
  3. don`t talk or play with others
  4. say bad words and offences
Down
  1. say or act in a bad way affecting others
  2. bad use of technology
  3. do bad face moviments

7 Clues: kicking and Pushingbad use of technologydo bad face movimentssay bad words and offencesdon`t talk or play with otherssay or act in a bad way affecting othersask classmates in bad modos for money or lunch

fnaf security breach 2022-02-24

fnaf security breach crossword puzzle
Across
  1. the security guard
  2. lazer gun
  3. sun and moon
  4. found in each office
  5. aligator
Down
  1. the spider in the vents
  2. the Dj of the west arcade
  3. wolf
  4. bear
  5. the "red light green light bots"
  6. dancing rabit lady
  7. chicken
  8. no flash photography

13 Clues: wolfbearchickenaligatorlazer gunsun and moonthe security guarddancing rabit ladyno flash photographyfound in each officethe spider in the ventsthe Dj of the west arcadethe "red light green light bots"

Safety and Security 2023-10-25

Safety and Security crossword puzzle
Across
  1. What is it called when someone receives an email from a fraudster pretending to be from a reputable company in order to obtain personal information?
  2. How much is the total teller drawer limit at a branch without TCRs?
  3. What is the morning glory alarm code?
  4. What is the Metro Region's safe word for Banker's Security?
  5. When can you plug a flash drive into your computer?
Down
  1. What kind of control is needed to log and process night drop?
  2. Where is the robbery kit located at EVERY branch?
  3. How many associates need to be present at open and close?
  4. How much is the teller top drawer cash limit?
  5. What is it called when a robber follows you in to the branch at open?
  6. What phone number do you call after a robbery when it is safe to do so?
  7. What percentage of elder abuse is committed by a family member?
  8. What month is CCBs Safety and Security month?

13 Clues: What is the morning glory alarm code?How much is the teller top drawer cash limit?What month is CCBs Safety and Security month?Where is the robbery kit located at EVERY branch?When can you plug a flash drive into your computer?How many associates need to be present at open and close?What is the Metro Region's safe word for Banker's Security?...

Safety and Security 2023-03-09

Safety and Security crossword puzzle
Across
  1. If you see a _________ person and they seem unapproachable, do not make contact.
  2. When using the _________ button at the door, make sure the door is securely shut before walking on.
  3. If the person seems unpleasant or abusive, do not ______.
  4. It may be necessary to provide a ____________ of the suspicious person. Take note of things like, gender, hair color, race, clothing, unique characteristics.
  5. If safe to do so, __________ the suspicious person from a distance.
  6. All visitors must always be __________ through the laboratory.
Down
  1. Never let anyone ___________ after you, when entering the facility.
  2. If you are trying to report a suspicious person and a supervisor is unavailable, report it to the ____________ Administrative Office or the Bureau Chief.
  3. If you see someone without a badge and they seem unapproachable, report it to a _______.
  4. All ___________ must sign in and out at the building 4 entrance.
  5. If you are working during non-business hours, you must sign in AND______.
  6. If you see someone not wearing a _______ and they seem approachable, ask them if you can help them.
  7. Direct all deliveries to be taken to the ______.

13 Clues: Direct all deliveries to be taken to the ______.If the person seems unpleasant or abusive, do not ______.All visitors must always be __________ through the laboratory.All ___________ must sign in and out at the building 4 entrance.Never let anyone ___________ after you, when entering the facility....

FNaF Security Breach 2022-05-31

FNaF Security Breach crossword puzzle
Across
  1. Caused Freddy's Mental Crisis
  2. Such a nice fello
  3. Protagonist
  4. Night Guard
  5. The "Best" of the 4
  6. A White Bird
  7. Furry
  8. The Orange Bear with a thunderbolt
Down
  1. The Tidy & Light-Sensitive One
  2. Wind-up vent annoyance
  3. Aligator
  4. MOLTEN FREDDY?!?!
  5. DARNIT HE CAME BACK!

13 Clues: FurryAligatorProtagonistNight GuardA White BirdSuch a nice felloMOLTEN FREDDY?!?!The "Best" of the 4DARNIT HE CAME BACK!Wind-up vent annoyanceCaused Freddy's Mental CrisisThe Tidy & Light-Sensitive OneThe Orange Bear with a thunderbolt

FNaF Security Breach 2022-05-31

FNaF Security Breach crossword puzzle
Across
  1. Caused Freddy's Mental Crisis
  2. Such a nice fello
  3. Protagonist
  4. Night Guard
  5. The "Best" of the 4
  6. A White Bird
  7. Furry
  8. The Orange Bear with a thunderbolt
Down
  1. The Tidy & Light-Sensitive One
  2. Wind-up vent annoyance
  3. Aligator
  4. MOLTEN FREDDY?!?!
  5. DARNIT HE CAME BACK!

13 Clues: FurryAligatorProtagonistNight GuardA White BirdSuch a nice felloMOLTEN FREDDY?!?!The "Best" of the 4DARNIT HE CAME BACK!Wind-up vent annoyanceCaused Freddy's Mental CrisisThe Tidy & Light-Sensitive OneThe Orange Bear with a thunderbolt

Information Security Crossword 2024-10-28

Information Security Crossword crossword puzzle
Across
  1. An attack that exploits software flaws before developers can release a patch or fix.
  2. The process of confirming the identity of a user, typically before granting access to resources.
  3. An unauthorized action that exposes, steals, or compromises data from a system.
  4. The process of testing a system, network, or web application to find security vulnerabilities.
  5. A cryptographic process of converting data into unreadable code to protect it from unauthorized access.
  6. A security mechanism that prevents unauthorized access to a network by filtering traffic.
  7. A type of malicious software designed to gain unauthorized access to a computer system.
Down
  1. A program that secretly records everything typed on a computer, usually for malicious purposes.
  2. A cyberattack where the perpetrator floods a server with excessive traffic
  3. A malicious attack where data is encrypted by criminals to demand payment for its release.
  4. Which term is used to describe the “cargo” that malware brings with it when it infects a device?
  5. What is a term for a group of computers that is networked together and used by hackers to steal information?
  6. A malicious program disguised as legitimate software, often used to gain unauthorized access.

13 Clues: A cyberattack where the perpetrator floods a server with excessive trafficAn unauthorized action that exposes, steals, or compromises data from a system.An attack that exploits software flaws before developers can release a patch or fix.A type of malicious software designed to gain unauthorized access to a computer system....