cyber security Crossword Puzzles
Security Fortnight Crossword 2025-07-18
Across
- Protective footwear used in hazardous work environments.
- Regular rounds to monitor and ensure safety.
- Vehicle used to transport patients in emergencies.
- Physical inspection by patting down a person.
- Tunnel-like device that inspects bags using X-rays.
Down
- Scans individuals for hidden metallic objects.
- Initial treatment provided before medical professionals arrive.
- Door Clearly marked route for emergency evacuation.
- Group trained to act quickly during emergencies.
- Provides support while ascending or descending stairs.
- Used to block or control access temporarily.
- Gaining unauthorized access by closely following someone.
- Activates during power failure to guide evacuation.
13 Clues: Used to block or control access temporarily. • Regular rounds to monitor and ensure safety. • Physical inspection by patting down a person. • Scans individuals for hidden metallic objects. • Group trained to act quickly during emergencies. • Vehicle used to transport patients in emergencies. • Door Clearly marked route for emergency evacuation. • ...
E Security G11 2026-02-01
Across
- The most commonly known type of malware.
- Is voice phishing
- / A common technique used in pharming.
- Example of Face ID
- / An Example of Ransomware.
- logger/ Is an example of spyware
Down
- An encrypted connection that can be used to send data more securely across a network.
- / An example of Rootkit
- Is an example of computer worm
- malware/ Software that is used to identify malware on a computer and remove it.
- / Is a bot that will pretend to be humans on sites such as social networking.
- .........exploit security holes and issues in a computer.
- / short for robot
13 Clues: Is voice phishing • / short for robot • Example of Face ID • / An example of Rootkit • / An Example of Ransomware. • Is an example of computer worm • logger/ Is an example of spyware • / A common technique used in pharming. • The most commonly known type of malware. • .........exploit security holes and issues in a computer. • ...
airport vocab 2025-04-15
16 Clues: ticket • luggage • jet lag • allowed • airport • toilets • boarding • on board • canceled • car rental • destination • flight number • metal detector • passport control • emergency landing • security screening
CompTIA Cloud+ Ch. 9 2025-01-06
Across
- Tool for filtering network traffic.
- Reviewing logs to identify security issues.
- Adherence to legal and regulatory standards.
- Measures to protect data and systems.
- Securely connects users to a private network.
Down
- Digital document proving identity.
- Replacing sensitive data with non-sensitive equivalents.
- Authentication requiring more than one verification method.
- Encoding data to prevent unauthorized access.
- Ensuring data accuracy and consistency.
- Identity and Access Management.
- Updating software to fix vulnerabilities.
12 Clues: Identity and Access Management. • Digital document proving identity. • Tool for filtering network traffic. • Measures to protect data and systems. • Ensuring data accuracy and consistency. • Updating software to fix vulnerabilities. • Reviewing logs to identify security issues. • Adherence to legal and regulatory standards. • Encoding data to prevent unauthorized access. • ...
Goodbye to Childhood 2021-10-20
Across
- change (para.1)
- disagreement (para.4)
- capable of thinking or acting for oneself (para.1)
- related to the body (para.2)
Down
- uncomfortably think of oneself as an object of the observation of others (para.3)
- feeling of security (para.4)
- very (para.4)
- resolution (para.4)
- related to the mind (para.3)
- small round marks on the skin (para.3)
- worrying (para.1)
- sudden increase (para.2)
12 Clues: very (para.4) • change (para.1) • worrying (para.1) • resolution (para.4) • disagreement (para.4) • sudden increase (para.2) • feeling of security (para.4) • related to the mind (para.3) • related to the body (para.2) • small round marks on the skin (para.3) • capable of thinking or acting for oneself (para.1) • ...
Conspiring Cities of India 2018-03-08
Across
- From winds to cannons, forts to sands.
- Famous for its Cyber Hub, but also has a great Ambience.
- Diamond capital of India.
- Largest city of the smallest state.
Down
- Also known as "Saketa", one of the Saptapuri for Hindus.
- beaches and skyscrapers, virtual and real.
- 30 JEE aspirants gather here.
- Coromandel Coast of Bay of Bengal.
8 Clues: Diamond capital of India. • 30 JEE aspirants gather here. • Coromandel Coast of Bay of Bengal. • Largest city of the smallest state. • From winds to cannons, forts to sands. • beaches and skyscrapers, virtual and real. • Also known as "Saketa", one of the Saptapuri for Hindus. • Famous for its Cyber Hub, but also has a great Ambience.
ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ (ΤΑΣΟΣ ΚΟΥΚΛΙΔΗΣ Α2) 2022-01-31
Across
- ΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣ
- ΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑ
- H ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYING
- ΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ
- ΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING?
Down
- ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑ
- ΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝ
- ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟ
8 Clues: ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑ • ΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑ • ΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING? • ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟ • H ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYING • ΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝ • ΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣ • ΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ
Bullying Recap 2023-11-08
Across
- ......... up to bulling!
- When a person seeks to harm, intimidate, or coerce someone
- A cause, explanation, or justification for an action or event
- Have been bullied in the last 12 months
Down
- Another type of bullying
- When someone says something hurtful once!
- A type of bullying
- How might being bullied make someone react?
8 Clues: A type of bullying • Another type of bullying • ......... up to bulling! • Have been bullied in the last 12 months • When someone says something hurtful once! • How might being bullied make someone react? • When a person seeks to harm, intimidate, or coerce someone • A cause, explanation, or justification for an action or event
Operate a personal computer 2025-05-24
8 Clues: Command to copy • I am use to type • You use me to scan things • Another name for the monitor • Used to prevent a cyber attack • Small portable device use to store files • The physical components of a computer system • The Ctrl and Alt keys are always used in combination with other keys.
Kianasearch 6-18-24 2024-06-18
8 Clues: “can somebody match my” • the best way to cook an egg • my underdog team for the euros • the type of attack on Ascension • my profile name on my peacock account • the best person on Love Island Season 11 • the name of the Crystal that powers lightsabers • NYC borough where the UGA photographer is moving to
InfoSec Puzzle Quest 2025-09-04
Across
- A type of malicious software that can replicate and spread.
- Security Protecting data and systems hosted on remote servers.
- Following rules, regulations, and standards in cybersecurity.
- A formal review of systems and processes to ensure security and compliance.
- Manipulating people into giving up confidential information.
Down
- The practice of protecting systems, networks, and data from digital threats.
- Ensuring data is accurate and has not been tampered with.
- Surfing A sneaky way to steal information by watching someone type their password.
- An unexpected event that compromises the integrity or availability of data.
- Software designed to detect and remove malicious programs.
10 Clues: Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
Realism 2023-10-04
Across
- Thinker that established the different types of balance of power: unpolar, bipolar, multipolar.
- No hierarchically superior, coercive authority.
- Thinker that placed that the international system is anarchic.
- Also called structural realism,focuses its studies in the analysis of the structure of the international system.
- Thinker that established the dynamism in realism-history = cycles of dominant powers.
- Sum zero game, where a gain in security for one state means a loss for another.
- balancing Gaining power by building up its own military resources.
- Type of realists that say that war is an inevitable result to balancing
- A process explained by offensive realists as joining an unlikely ally to avoid war with it.
- According to realists, this is the states' main focus.
Down
- For this thinker, the state is the principal actor, it is unitary, rational and focused on protecting themselves.
- balancing Gaining power by allying with other states.
- Focuses mostly on the state and the international system.
- How much more one state gains over another.
14 Clues: How much more one state gains over another. • No hierarchically superior, coercive authority. • balancing Gaining power by allying with other states. • According to realists, this is the states' main focus. • Focuses mostly on the state and the international system. • Thinker that placed that the international system is anarchic. • ...
ICT - Security and Communication 2017-11-20
Across
- A type of protocol that allows data to be sent and received securely over the internet.
- Software that gathers data by monitoring key press on the user/s keyboard.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- Web applications or website that allow users to create and edit web pages using any web browser.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Authentication that relies on certain unique characteristics of human beings.
- Uses SMS system of mobile phones to send out fake text messages.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Refers to safety when using the internet like keeping personal data safe.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Unsolicited email sent over the internet.
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- Used to verify that data comes from a secure and trusted source.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- The act of gaining unauthorized access to a computer system.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
25 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
Fnaf Security Breach Crossword 2022-02-12
Across
- Stuns only one animatronic at a time
- All animatronics need this to keep moving around
- Mexican bear
- The arcade game where you see a glitched version of the daycare attendant
- This is what the animatronics are
- You broke the rules
- An attraction that is constantly under maintenance
- The gator's full name
- No longer allowed inside
- A warning given to the main character by the daycare attendant
- The player uses this to scramble the yellow console that gives out passes
- Needed to get into the daycare
- A cool place for a cool sport
- An attraction with no animatronic
- The daycare attendant says this twice when he throws you out of the daycare or if you try to enter again
- An attraction that has a statue of three animatronics inside
- The main villain that makes an appearance in an area below the pizzaplex
- Freddy's way of saying 'good job'
- Loves to entertain children at the Daycare
- Survive until then
- Moon says this before he starts chasing you
Down
- Every horror game needs this
- The part you take from the gator to upgrade Freddy
- This animatronic's catchphrase is 'Rock and Roll'
- Makes an appearance in cardboard cutouts, but never as an animatronic in the game
- The animatronics patrolling the halls
- The child you play as in Security Breach
- The name of the building
- Eats garbage
- Stuns a large group of animatronics at a time
- The tallest animatronic in the game
- The bear misses him
- A bunny that is after the player in the game
- You find these throughout the game
- Defend the galaxy
- In charge of nap time in the Daycare
- The part you take from the chicken to upgrade Freddy
- Where the main four perform
- Where the player can upgrade Freddy
- The nightguard
- Don't get lost
- The father figure of the entire game
- The instrument the gator plays
- The name of the game
- Bright and vibrant colors
- Take a map
- Has a very big ego, but is self conscious
- The small animatronic that chases you through the vents
- The part you take from the wolf to upgrade Freddy
- The instrument the wolf plays
- Use this to see security cams, talk to Freddy, view missions, or see confidential messages towards Fazbear Entertainment
- The instrument the chicken plays
52 Clues: Take a map • Mexican bear • Eats garbage • The nightguard • Don't get lost • Defend the galaxy • Survive until then • You broke the rules • The bear misses him • The name of the game • The gator's full name • The name of the building • No longer allowed inside • Bright and vibrant colors • Where the main four perform • Every horror game needs this • A cool place for a cool sport • ...
Security Analysis & Portfolio Management 2022-05-15
Across
- The ability to buy or sell an asset quickly at a known price.
- The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
- --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
- The market ------------------is used as a benchmark to evaluate the performance of funds.
- ------------------------was one of the originators of Capital Asset Pricing model.
- The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
- ------------------------laid the foundations to the Portfolio theory.
- The ----------------------theorem suggests that investment and financing are two different decisions.
Down
- The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
- Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
- A -------------form EMH is when prices reflect all historical information.
- ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
- A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
- The --------------market is used for lending and borrowing short-term funds.
- The --------------measure is calculated as excess returns per unit of systematic risk.
- The --------------------market line is the graphical representation of CAPM.
- -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
- --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
- The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.
20 Clues: The ability to buy or sell an asset quickly at a known price. • ------------------------laid the foundations to the Portfolio theory. • A -------------form EMH is when prices reflect all historical information. • The --------------market is used for lending and borrowing short-term funds. • ...
Cryptography And Network Security 2023-09-18
Across
- In base 26, multiplication of YES by NO gives –
- _______ is the science and art of transforming messages to make them secure and immune to attacks
- The ciphers of today are called round ciphers because they involve---------round
- ----------round constants (RCs) are required in Whirlpool?
- ---------is not a type of symmetric-key cryptography technique?
- Divide (HAPPY)26 by (SAD)26. We get quotient –
- The ________ is the message after transformation
- ---------round provides linear diffusion in the Whirlpool Algorithm?
- In symmetric-key cryptography, the key locks and unlocks the box is
- The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
Down
- . A/an ________ algorithm transforms ciphertext to plaintext
- In asymmetric key cryptography, the private key is kept by ________
- The shift cipher is sometimes reffered to as a ---------
- What is the number of round computation steps in the SHA-256 algorithm?
- can be considered as the class of computer threats
- The ________ is the original message before transformation
- Another name for the Whirlpool key is
- is considered as the unsolicited commercial email?
- An asymmetric-key (or public-key) cipher uses
- Symmetric-key cryptography started thousands of years ago when people needed to exchange
20 Clues: Another name for the Whirlpool key is • An asymmetric-key (or public-key) cipher uses • Divide (HAPPY)26 by (SAD)26. We get quotient – • In base 26, multiplication of YES by NO gives – • The ________ is the message after transformation • can be considered as the class of computer threats • is considered as the unsolicited commercial email? • ...
IT Systems and Security 2025-07-21
Across
- Ranking tasks or risks by importance
- Public perception that can be damaged by breaches
- A fine or consequence for non-compliance
- I am harmful
- System settings that affect performance
- Programs and applications
- loss Critical information is erased or inaccessible
- The users who interact with and operate in an environment
- How often a certain risk or issue occurs
- Ordering risks based on severity and likelihood
- Numerical estimate of potential loss
- Unintentional harmful events affecting systems
- You need to identify this before setting up an IS
- Likelihood of a specific event occurring
- Flaws that can be exploited by threats
Down
- Organized collections of structured information
- Physical parts of a computer or system
- I am important for your network
- Example: Routers, switches, cables in connectivity, etc.
- disasters Earthquakes or floods that disrupt systems
- Enhancements to improve system
- Evaluation of consequences of an incident
- What do you do after completing a task?
- Gaps in security or system design
- Series of steps to accomplish tasks in systems
- System A coordinated set of components to manage data
- What else do you need other than physical components?
- Period when a system is unavailable/offline
28 Clues: I am harmful • Programs and applications • Enhancements to improve system • I am important for your network • Gaps in security or system design • Ranking tasks or risks by importance • Numerical estimate of potential loss • Physical parts of a computer or system • Flaws that can be exploited by threats • System settings that affect performance • ...
Chapter 7 Security Plus 2024-10-03
Across
- An access control scheme that is the least restrictive
- injects stolen username and password across multiple websites
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
- small device that looks like a thumb drive which can be used for verification
- enables users to access a network resource through a directory service
- small number of passwords used when trying several different user accounts
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- features and characteristics of the individual
- Removing user accounts
- An access control scheme that is the most restrictive
- password attack attempting thousands of combinations per second
Down
- Single sign-on for networks owned by different organizations
- software designed to break passwords
- Using more than one type of authentication credential
- Requiring the user to provide proof that they are the unique user.
- Granting access that is limited
- key stretching algorithms
- Standard preconfigured passwords
- evidence or proof of something
- allows secure web domains to exchange user authentication and authorization data
- The point in time when a password is no longer valid
- An open-source federation framework
- provide control over user validation and the resources that may be accessed
25 Clues: Removing user accounts • key stretching algorithms • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • software designed to break passwords • A key pair “burned” into a security key • The ability of systems to exchange information • features and characteristics of the individual • ...
Chapter 4 Security Plus 2024-09-10
Across
- multiple CAs that sign digital certificates
- management of keys and digital certificates at scale
- An certificate that uses an asterisk to cover multiple subdomains
- The entity that is responsible for digital certificates
- one master CA called the root
- associate a user’s identity to a public key
- confidence in or reliance on another person/entity
- published set of rules that govern operation of a PKI
- A process in which keys are managed by a third party
- A protocol suite for securing Internet Protocol (IP) communications
- securely distributing encryption keys between two parties
- Tracing a certificate back to the highest level of a CA
- An entity that is trusted by others
- The common file types for storing X.509 certificates
- A list of certificate serial numbers that have been revoked
- an extension to X.509 that allows various values to be associated with a security certificate
- Data that is encapsulated within a secure outer shell
Down
- replaces SSL
- Encrypts only the payload preserves the original IP header
- digitally sign a program
- M of N
- A method of controlling public keys
- publicly accessible centralized directory of digital certificates
- performs a real-time lookup of a certificate’s status
- A request submitted to a Certificate Authority for an TLS/SSL certificate
- Encrypts the entire IP packet and encapsulates it within a new IP packet
- web servers send queries to the OCSP Responder
27 Clues: M of N • replaces SSL • digitally sign a program • one master CA called the root • A method of controlling public keys • An entity that is trusted by others • multiple CAs that sign digital certificates • associate a user’s identity to a public key • web servers send queries to the OCSP Responder • confidence in or reliance on another person/entity • ...
Chapter 10 Security Plus 2024-10-23
Across
- A framework for transporting authentication protocols
- uses digital certificates for authentication
- Unauthorized users could listen in on communications between RFID tags and readers
- The encryption protocol used for WPA2
- accesses unauthorized information from a Bluetooth connection
- An in-depth examination and analysis of a WLAN site
- securely tunnels any credential form for authentication using TLS
- A wireless attack in which false deauthentication
- can be used to detect a rogue AP
- standards used to transmit information from tags to a proximity reader
- not recommended as a security protection for SSID
- tool that provides a visual representation of the wireless signal
Down
- web page that is displayed to users when they attempt to access a public network
- sends unsolicited messages to Bluetooth-enabled devices
- commonly called Wi-Fi
- usage in contactless payments
- A wireless technology that uses short-range radio frequency
- An EAP method designed to simplify the deployment of 802.1x
- Intentionally flooding the radio frequency spectrum
- 200 milliwatts (mW)
- minimum amount of wireless signal should extend beyond the walls of the building
- An AP set up by an attacker to mimic an authorized AP
- can mitigate against man-in-the-middle (MITM) attacks and is an optional WPA3 enhancement
- A unique name identifying a Wi-Fi network
- IEEE 802.1x standard
- no longer support WEP
- An unauthorized AP that allows an attacker to bypass many of the network security
27 Clues: 200 milliwatts (mW) • IEEE 802.1x standard • commonly called Wi-Fi • no longer support WEP • usage in contactless payments • can be used to detect a rogue AP • The encryption protocol used for WPA2 • A unique name identifying a Wi-Fi network • uses digital certificates for authentication • A wireless attack in which false deauthentication • ...
Appsec and AI Security 2025-06-19
Across
- The paid add-on that includes vulnerabilities, policies, and red-teaming (15 letters)
- AI that is designed to interact with humans using natural language (17 letters)
- Pre-built libraries, tools, and services that provide the necessary infrastructure to develop, train, and deploy AI systems efficiently (11 letters)
- A document that lists all components in a software application (4 letters)
- Single word to encompass the fundamental building blocks that enable an AI system to perform its functions, such as AI models, frameworks, agents, or architectures like RAGs (13 letters)
- The unauthorized extraction of data from a system (15 letters)
- Analysis of application source code to identify security vulnerabilities before deployment (4 letters)
- Risks such as hallucinations, data leakage, prompt injections, and biases that are present only in the context of a given application and how it is configured, connected, and customized (19 letters)
- A standardized set of rules that helps an AI remember what's been said or what's happening right now (18 letters)
- Development environments where AI capabilities are deeply integrated throughout the software development lifecycle for tasks like code generation, debugging, and refactoring (12 letters)
- Analysis of third-party and open-source components in applications (3 letters)
Down
- Mathematical structures trained to perform specific tasks by learning patterns in data (9 letters)
- A type of AI framework that enhances LLMs by retrieving relevant external data to generate more accurate, factual, and contextual responses (28 letters)
- Name of the overall product, when referring to Mend AI capabilities in the platform and Mend AI Premium together (7 letters)
- Technique to manipulate AI systems by crafting inputs that bypass security controls (14 letters)
- Unauthorized use of AI tools and components by employees/teams without formal approval (10 letters)
- The name of our platform, fundamentally re-architected to operate in a world where AI is integral (18 letters)
- Autonomous AI entities that perceive their environment, make decisions, and take actions to achieve specific goals, often without human intervention (9 letters)
- When AI systems generate content that isn't grounded in factual information (13 letters)
- Applications or processes that integrate and utilize artificial intelligence components like AI models, AI agents, RAGs and MCPs (10 letters)
20 Clues: The unauthorized extraction of data from a system (15 letters) • A document that lists all components in a software application (4 letters) • Analysis of third-party and open-source components in applications (3 letters) • AI that is designed to interact with humans using natural language (17 letters) • ...
Chapter 2 Crossword 2025-09-29
17 Clues: race • actors • powers • powers • system • Treaty. • sharing • dilemma • system. • dilemma • cohesion • Morality • analysis • interest • of power • of Ideas. • transition theory
TTS Firewall Rizky A Dahlan 2022-11-09
Across
- Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
- firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
- Perubahan terhadap tampilan suatu website secara illegal disebut..
- fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
- kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
- berapakah element pada host hardening …
Down
- firewall terbagi menjadi ... jenis
- Yang termasuk jenis metode enkripsi adalah …
- Terdiri dari database security, data security, dan device security adalah keamanan di level …
- ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
- arti dari kata firewall
- Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
- firewall bekerja dengan cara ... seluruh data yang masuk
13 Clues: arti dari kata firewall • firewall terbagi menjadi ... jenis • berapakah element pada host hardening … • Yang termasuk jenis metode enkripsi adalah … • firewall bekerja dengan cara ... seluruh data yang masuk • Perubahan terhadap tampilan suatu website secara illegal disebut.. • kelebihan firewall berbasis jaringan adalah menjaga jaringan secara... • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- This security tool identified and removes malicious programs
- The individuals who control access to people, data, and systems
- This attack occurs when cybercriminals research and track which sites employees visit the most
- What should you do when a workstation or device is no longer in use
- Any scenario that triggers emotions should also trigger your __________
Down
- Stealing money is the main goal behind this type of malware
- Failure to run these equals failure to patch security vulnerabilities
- You can help fight cybercrime by becoming a ________________
- ____are the last line of defense
- Kwiktrip's password policy requires that coworkers change their passwords _____days
- The future of security is____,not machines
- This attack occurs when someone sneaks into a secured area behind someone else
- This dangerous attack targets specific people or organization, often with custom made email or messages
- These are designed to maintain the security of everyone associated with an organization
14 Clues: ____are the last line of defense • The future of security is____,not machines • Stealing money is the main goal behind this type of malware • You can help fight cybercrime by becoming a ________________ • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
You Don't Know What You Don't Know 2021-01-12
Across
- Needs to be posted by 5pm Wednesday, February 3rd
- Provides PD opportunities for staff for all of MCPS
- Link to email grade sheets to parents through Synergy
- Publishes a Professional Newsletter regularly
- Long Term Sub in AOHP
Down
- Who will receive PDF of "Mark Verification by Teacher" report
- Birthday on January 22
- A 2nd Semester 1.0 Position recently posted
- The # of rounds to find a Cyber Teacher
- Color of the Edit Final Grade option in Synergy
- Where you register for staff development trainings
11 Clues: Long Term Sub in AOHP • Birthday on January 22 • The # of rounds to find a Cyber Teacher • A 2nd Semester 1.0 Position recently posted • Publishes a Professional Newsletter regularly • Color of the Edit Final Grade option in Synergy • Needs to be posted by 5pm Wednesday, February 3rd • Where you register for staff development trainings • ...
Cyber-Bullying is a crime 2014-11-05
Across
- Includes pushing, slapping or hitting someone
- A person harmed or injured
- Involves the use of communication technologies
- Exploitation (two words) includes sharing videos or photos with nudity of persons 18years and under
- Ready or likely to attack or confront
- Observer or spectator
Down
- Communication of a false statement that harms
- A person who has committed a crime
- The action of harming someone because they have harmed you
- Intentional behavior which is found threatening or disturbing
- Carried out because of despair
11 Clues: Observer or spectator • A person harmed or injured • Carried out because of despair • A person who has committed a crime • Ready or likely to attack or confront • Communication of a false statement that harms • Includes pushing, slapping or hitting someone • Involves the use of communication technologies • The action of harming someone because they have harmed you • ...
BULLYING 2024-07-25
4 Clues: If the cyber bullying persist you? • What if you are being cyber bullied?? • What to do if you see a person being bullied • What to do if someone else is getting bullied on the internet?
Accounting: Payroll/Tax 2025-06-14
Across
- Taxes paid (medicare or social security)
- For journalizing earnings in payroll
- rates When employers contribute equal amount to the retirement plan as employee
- Journalizing income tax
- A common retirement plan that deducts a select amount regularly
- Paid every 3 months
Down
- Journalizing social security
- Paid every month
- Your actual salary after deductions
- Paid every two weeks
- Paid every week
11 Clues: Paid every week • Paid every month • Paid every 3 months • Paid every two weeks • Journalizing income tax • Journalizing social security • Your actual salary after deductions • For journalizing earnings in payroll • Taxes paid (medicare or social security) • A common retirement plan that deducts a select amount regularly • ...
Un Viaje Memorable 2023-04-19
18 Clues: seat • plane • aisle • window • ticket • airport • passport • terminal • seat belt • passenger • boarding pass • screen / sign • metal detector • first class seat • flight attendant • suitcase / luggage • economy class seat • security control / check
cyber 2025-11-19
Cyber safety-AGNES MATRIN 2016-05-26
Across
- information about a particular subject that is available on the internet
- an ad that comes up on a device randomly
- a piece of information
- the fact of being who or what a person is
- helps you when inappropriate things come up on a device at home
- data from one computer system
- security system
- secures a system from virus
Down
- a global computer network providing a variety of information
- the condition of being protected
- to enter your username or password
- a short article giving a description about a person
- that allows you to access into a system
- in a place or situation that allows you to do things without other people seeing you
- sending or posting mean messages
- a device that is connected to the internet
- damaging systems
17 Clues: security system • damaging systems • a piece of information • secures a system from virus • data from one computer system • the condition of being protected • sending or posting mean messages • to enter your username or password • that allows you to access into a system • an ad that comes up on a device randomly • the fact of being who or what a person is • ...
Jenifer Ximena Hernandez Morales 2013-05-01
Across
- security.
- to the average employee.
- and network security help to keep data and equipment
- their data and computer
Down
- computer can be harmed
- are secure.
- technician to try to gain entry into a facility
- might repair, adjust, and install equipment.
- by attackers
- primary responsibilities of a technician include data and
10 Clues: security. • are secure. • by attackers • computer can be harmed • their data and computer • to the average employee. • might repair, adjust, and install equipment. • technician to try to gain entry into a facility • and network security help to keep data and equipment • primary responsibilities of a technician include data and
Digital Responsibility 2018-09-07
Across
- what do you keep safe
- what do you do when you see someone get cyber bullied
- never believe what online
- Important to you
- When you are getting weird messages who do you tell
- if you see someone you know online getting harrassed what do you do
- who do you not meet up with online
- who do you be nice to online
Down
- what do you not post
- who do you not talk too
- what never leaves the internet
- what do you do before you post
12 Clues: Important to you • what do you not post • what do you keep safe • who do you not talk too • never believe what online • who do you be nice to online • what never leaves the internet • what do you do before you post • who do you not meet up with online • When you are getting weird messages who do you tell • what do you do when you see someone get cyber bullied • ...
The Good, The Bad, And The Ugly 2015-04-19
Across
- Bullying Bullying over social media.
- Fake relationships.
- The improved communication through technology.
- Crude pictures with harmful captions.
- The rumors that are spread are sent though this.
- The not-so-good aspects from social media.
Down
- The worst effects from social media.
- This skill is tested when social media comes into play.
- This is improved through a world wide data base for information.
- Justice This is achieved through the various channels of social media.
- The positive aspects that arise from social media.
- Hackers are now easily able to invade this.
12 Clues: Fake relationships. • The worst effects from social media. • Bullying Bullying over social media. • Crude pictures with harmful captions. • The not-so-good aspects from social media. • Hackers are now easily able to invade this. • The improved communication through technology. • The rumors that are spread are sent though this. • ...
malware 2023-06-19
Across
- your definition of unauthorized access data
- using the internet to talk to someone
- alows users to convert information
- online fraud that involves use of a malicious code
- sending emails or messages as fake companys
- trial of data when using the internet
Down
- network allows users to talk and make releationships
- when a person takes images or information
- malicious program sending through a network
- fraud crimes commited by cyberattackers
- constantlely getting messages or emails
- its a word phrase or numbers that allow you to enter things such as your phone tablet or computer
12 Clues: alows users to convert information • using the internet to talk to someone • trial of data when using the internet • fraud crimes commited by cyberattackers • constantlely getting messages or emails • when a person takes images or information • your definition of unauthorized access data • malicious program sending through a network • ...
Network Based Attacks 2025-01-31
Across
- intercepting two way communications between 2 parties
- exploiting weaknesses in ARP
- translates domain names into ip addresses
- capturing information from communications you shouldn't
- tools used to scan for vulnerabilities and open ports
Down
- cyber attack that first scans for vulnerabilities in a system
- exploits a vulnerability before vendor is aware of it
- identifies hosts in a network
- attack by stealing a session key or cookie
- posing as something you're not
- group of infected computers that work together without the owners knowledge
- denial of service attack
12 Clues: denial of service attack • exploiting weaknesses in ARP • identifies hosts in a network • posing as something you're not • translates domain names into ip addresses • attack by stealing a session key or cookie • intercepting two way communications between 2 parties • exploits a vulnerability before vendor is aware of it • ...
Respectful Relationships 2025-08-03
Across
- available on or performed using the internet
- that which is morally correct or just
- main means of mass communication
- way in which one acts or conducts oneself
- system of rules regulating the actions of its members
- sharing a nude or a naked selfie
- seek to harm, intimidate, or coerce
Down
- connection between 2 people
- process of receiving or giving systematic instruction, like school
- a feeling of deep admiration for someone
- forbidden by law, especially criminal law
- relating to the culture of computers, IT, and virtual reality
12 Clues: connection between 2 people • main means of mass communication • sharing a nude or a naked selfie • seek to harm, intimidate, or coerce • that which is morally correct or just • a feeling of deep admiration for someone • way in which one acts or conducts oneself • forbidden by law, especially criminal law • available on or performed using the internet • ...
słówka 2025-06-24
15 Clues: spokój • zranić • ukraść • według • pewien • strach • ochrona • wchodzić • kaloryfer • zagrożenie • kupić (nabyć) • odwracać uwagę • at...... w końcu • spokojny/pokojowe • at...... przynajmniej
Bentley Cannon 2026-03-25
Kaylynn Boggs - Bullying 2022-05-17
Across
- name calling, insults, teasing, intimidation, homophobic or racist remarks
- happens more than once over a period of time
- what is the C in the ABCD's of bullying
- watching it happen
- hitting,kicking,tripping,pinching and pushing or damaging property.
- berate
- somebody is being hurt on purpose
- everybody is having fun,nobody gets hurt.
Down
- the attacker
- what is the D in the ABCD's of bullying
- being attacked
- Whats the A in the abcd's of bullying
- abusive or hurtful texts
- nobody is having fun,equal balance of power
- lying and spreading rumors playing nasty jokes to embarrass and humiliate
- Standing up for somebody
- of power whats the B in the abcd's of bullying
17 Clues: berate • the attacker • being attacked • watching it happen • abusive or hurtful texts • Standing up for somebody • somebody is being hurt on purpose • Whats the A in the abcd's of bullying • what is the D in the ABCD's of bullying • what is the C in the ABCD's of bullying • everybody is having fun,nobody gets hurt. • nobody is having fun,equal balance of power • ...
Digital citizenship topics 2017-09-08
Across
- legal use of copyrighted material
- playing nice online
- rules you should be following when you are online
- use passwords that only you would understand
- keeping your accounts private
- the buying and selling of items online
Down
- the trail left in cyber space that never goes away
- doing the right thing online
- dont talk to people you have never met before
- being mean to people repetitively online
- using the internet for the right purposes
- using someone elses work and taking credit for it
- apps used to share information and talk with others
- you can put anything on the internet for people to use
14 Clues: playing nice online • doing the right thing online • keeping your accounts private • legal use of copyrighted material • the buying and selling of items online • being mean to people repetitively online • using the internet for the right purposes • use passwords that only you would understand • dont talk to people you have never met before • ...
Middle Childhood 2017-10-27
Across
- Realizing things can be arranged in a logical series.
- Child over 95th percentile for their age group.
- Type of bullying including hitting.
- Type of bullying that effects peer relationships.
- Family with relatives living with parents and children.
Down
- Organizing things into groups based off characteristics.
- Child over 85th percentile weight for their age group.
- Family with two married parents and children.
- Type of bullying done through words.
- These children typically bully through their words.
- Unusual difficulty with reading.
- These children bully more physically
- One husband and two or more wives in a family.
- Type of bullying done through technology.
14 Clues: Unusual difficulty with reading. • Type of bullying including hitting. • Type of bullying done through words. • These children bully more physically • Type of bullying done through technology. • Family with two married parents and children. • One husband and two or more wives in a family. • Child over 95th percentile for their age group. • ...
Cyber 2024-05-03
Digitalni Tragovi i Elektronično Nasilje 2022-06-13
Across
- Svako se treba držati svog _____ ugleda.
- Informacija koju postavljam o sebi na mrežnim stranicama zove se digitalni ____
- Jeste li ikad upisali nečije ime i prezime u _____ tražilicu?
- kako nazivamo pravila lijepog ponašanja na internetu?
Down
- Opći pojam za svaku komunikacijsku aktivnost cyber tehnologijom koja se može smatrati štetnom.
- Drugi naziv za internetski bonton
- svaki korisnik na internetu ima svoj digitalni ____
- Koga treba obavijestiti zbog uhođenja?
- Svjetska komunikacijska mreža.
- Internetom kruže razlčite vrste _____
10 Clues: Svjetska komunikacijska mreža. • Drugi naziv za internetski bonton • Internetom kruže razlčite vrste _____ • Koga treba obavijestiti zbog uhođenja? • Svako se treba držati svog _____ ugleda. • svaki korisnik na internetu ima svoj digitalni ____ • kako nazivamo pravila lijepog ponašanja na internetu? • Jeste li ikad upisali nečije ime i prezime u _____ tražilicu? • ...
Online bullying 2024-06-13
Across
- When someone is being bullied online
- A meaning of photos
- When someone does something mean intentionally
- Where you can seek help online by parent or anyone else
- A very famous app & website
- When someone is not letting you get something by putting it close to you then away from you before you catch it
Down
- Another meaning of online
- The original meaning of online
- Someone to talk to
- When you write online
10 Clues: Someone to talk to • A meaning of photos • When you write online • Another meaning of online • A very famous app & website • The original meaning of online • When someone is being bullied online • When someone does something mean intentionally • Where you can seek help online by parent or anyone else • ...
Splunk Education Crossword for Enterprise Security 2021-06-18
Across
- One type of thresholding in a correlation search
- Security _______, main high level dashboard showing current notable events
- The engine that is used to search for multiple notable events and creates a specific type of event when they are found
- One of the things that the CIM does
- Used to hide events from incident review
- A chronological collection of activities and notes to help determine the root cause of a threat or breach
- A Splunk app that can be used to capture traffic without the use of an agent
- One of many CIM compliant data models showing data such as success and failure
Down
- A person, host, filetype or url used in investigations
- A cumulative metric to help determine what assets and identities are worth investigating
- Used within risk to map to a known security framework
- You can add assets, identities and websites to this to highlight their use within your systems
- Search used to discover security anomalies within your data
- A type of event which can be triggered from a correlation search
- You should enable this on all data models being used by ES
- Calculated using severity and priority
- When deploying, you need one of these dedicated to ES
- Imperative to prevent false positives and negatives showing within your correlation searches
18 Clues: One of the things that the CIM does • Calculated using severity and priority • Used to hide events from incident review • One type of thresholding in a correlation search • Used within risk to map to a known security framework • When deploying, you need one of these dedicated to ES • A person, host, filetype or url used in investigations • ...
US Armed Forces 2026-02-18
Across
- branch of the military that focuses on naval warfare and operates at sea.
- Force that is a branch of the armed forces
- someone who serves in the armed forces; a member of a military forces.
- Military advisory group composed of the chiefs of staff of the army and air force, the chief of naval operations, and sometimes the commandant of the marine corps.
- Relating or belonging to a person who is not a member of the police or the armed forces.
- maritime security, search and rescue, and law enforcement agency.
Down
- specialized military branch trained for amphibious operations, such as beach landings, and often serving as an expeditionary force.
- Usually an executive branch governmental body responsible for coordinating policy on national security issues and advising chief executives on matters related to national security.
- Group of people who gather information about other countries and help the President and National Security Council make decisions about keeping our country safe.
- Member of the President's cabinet who is responsible for leading the U.S. Department of War.
- Military personnel who are not part of the regular, full-time force but can be called upon in times of need or crisis.
- branch of the military that deals with aerial warfare and operates aircraft.
- branch of the military that specializes in ground warfare and defense.
13 Clues: Force that is a branch of the armed forces • maritime security, search and rescue, and law enforcement agency. • someone who serves in the armed forces; a member of a military forces. • branch of the military that specializes in ground warfare and defense. • branch of the military that focuses on naval warfare and operates at sea. • ...
BANKING 2025-04-23
13 Clues: - cuota • - saldo • - emitir • - cajero • - cuenta • - extraer • - préstamo • - garantía • - sucursal • - depositar • - transferir • - descubierto • - extracto bancario
spainsh 10 2025-03-18
15 Clues: agent • money • ticket • wallet • arrival • customs • airport • luggage • ID badge • airplane • purse/bag • ATM machine • airplane ticket • disposabel camera • security checkpoint
bullying-by Harvey.B 2023-11-28
Across
- when you be unkind to a person
- bulling when you bully someone online
- when you are really angry
- when you make someone attack you
Down
- this is called when a person watches someone get bullied
- stander when you tell on the person when they are bulling someone
- when you are getting hurt
- when you bully someone for there skin color
- when you are the one being bullied
9 Clues: when you are getting hurt • when you are really angry • when you be unkind to a person • when you make someone attack you • when you are the one being bullied • bulling when you bully someone online • when you bully someone for there skin color • this is called when a person watches someone get bullied • stander when you tell on the person when they are bulling someone
CYBERCRIME 2021-07-11
Across
- A politically- or ideologically-motivated cyber attack or hack.
- A way to access electonic system by bypassing some or all security mechanisms.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- Malicious software, such as a virus or worm, that attacks a target computer.
- The overaching program that runs all the functions on a computer or other electronic device.
- A company that offers access the internet.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Resource to be accessed, often expressed as a time period.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- Determining the identity or location of an attacker or an attacker's intermediary.
- The interdependent network of information technology, infrastructures that includes internet.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- A network point that acts an entrance to another network
- A unique internet identifier registered
- An online journal.
- A program used to access the internet.
- Assurance that remains private and no one sees it except for those expected to see it.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
- Attempting to mimic an official email from a trusted organization to lire individuals.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A unique internet identifier registered to an entity.
- An information packet sent from website to a web browser that records a user's activity on the website.
- algorithm against data to produce a numeric value that is representative that data.
- Stands for "Wireless Fidelity".
- A software robot that performs automated tasks.
- The act of one individual harrasing or intimidating another individual via the interner.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A massed data that is used to describe large amounts of other internet data.
- A grou of computers that is linked to share data and othe information.
- A website that finds information across the Internet based on a set of search criteria.
- an entity.
- A network security measure in which information is encoded or scrambled prior to transmission.
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- Aim to overwhelm the resources of a targeted system to crash that system.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
codi bullying crossword 2023-03-21
Across
- bullying getting physically picked on everyday
- bullying some teases you verbally everyday
- someone who stands around and watches someone getting bullied
- a sore from being punched or kicked
Down
- someone teases you and picks on you everyday
- a type of physical bullying
- a type of psychological bullying
- bullying getting picked on online everyday
8 Clues: a type of physical bullying • a type of psychological bullying • a sore from being punched or kicked • someone teases you and picks on you everyday • bullying some teases you verbally everyday • bullying getting picked on online everyday • bullying getting physically picked on everyday • someone who stands around and watches someone getting bullied
Internet Term Crossword Puzzle 2013-09-03
15 Clues: saving • typing • letters • hacking • security • advertise • criticism • main page • communicate • significance • linking files • file,edit,view • filing program • testing program • posting comments
TRANSFORM 2022-12-02
15 Clues: data • money • bette • Fraude • answer • suppor • quickest • eveeryone • less cost • data base • in business • of Mobility. • doing better • to Information. • opportunity cost
Vocabulary Recap ch 9 & theme vocabulary human welfare & religion 2025-09-10
15 Clues: parish • asukas • maallinen • vilkaista • avoliitto • constable • kyyristyä • nervously • hold back • tosin/vaikka • (arvo)merkki • child support • social security • jäädä eläkkeelle • kevyt/pinnallinen
Unit 5 - Architechture 2014-04-21
28 Clues: Lift • Lohn • Wärme • Angst • Stahl • Eisen • Decke • Termin • anstatt • Bauland • Werkzeug • Stockwerk • Kilometer • pünktlich • Baustelle • Sicherheit • Verbindung • Ziegelstein • Klimaanlage • Kühlschrank • Beleuchtung • Architekt/in • ungewöhnlich • Wolkenkratzer • Geschäftsmann • Herausforderung • Stadtsilhouette • entwerfen,entworf
8A Vocab pg 422 2014-05-18
26 Clues: open • pilot • delay • aisle • ready • closed • direct • flight • to last • luggage • customs • to plan • tourist • foreign • airport • arrival • passport • suitcase • employee • to check • to board • passenger • departure • to insist • announcement • security checkpoint
Government Acronyms 2023-01-21
21 Clues: mail • banks • taxes • pills • parcel • attorneys • farm loans • snow plows • Aeronautics • plant police • intelligence • investigation • water and air • covid monsters • disaster relief • labor relations • retaliation force • security alliance • financing paintings • global peace-makers • inner-city home development
Airport Spanish Vocab - Reya C 2022-10-13
20 Clues: line • gate • ticket • passport • swimsuit • airplane • suitcase • security • to board • passenger • departure • intinerary • train station • monitor;screen • to take a trip • to get in line • tourist office • to call someone • flight attendant • can you please tell me where
French Vocab Crossword 2020-01-12
22 Clues: agent • plane • verify • ticket • flight • customs • airport • to land • suitcase • passport • transfer • take off • to serve • passenger • boarding gate • boarding pass • identification • check in kiosk • security check • ticket counter • male flight attendant • female flight attendant
Woordjes 2023-12-06
30 Clues: rel • straf • gebouw • aanval • bewijs • moorde • inbraak • dronken • getuige • rechter • verdacht • beroving • verdacht • dreiging • bewapend • rechtzaak • roekeloos • uitspraak • rechtzaak • aggressief • slachtoffer • gewelddadig • toeschouwer • overtreding • per ongeluk • beveiliging • onruststoker • gerechtigheid • hulpverleners • brandstichting
vocabularry 2023-09-20
28 Clues: Seni • Alam • Film • Jelek • Dunia • Kecil • Bodoh • Besar • Benda • Lembut • Cantik • Cerita • Tinggi • Pemain • Pendek • Pintar • Masalah • Ekonomi • Keamanan • Keluarga • Industri • Kemampuan • Kekuasaan • Kesehatan • Masyarakat • Pengertian • Pengetahuan • Orang-orang
SP8 Unit 7 2024-05-10
27 Clues: lupa • ilman • uskoa • pettää • luvata • ongelma • muistaa • ihastus • salasana • keskusta • selittää • skandaali • kommentti • käyttäytyä • keskustelu • häpeissään • rasistinen • kateellinen • keskustella • turvallisuus • antaa anteeksi • persoonallisuus • roska, pötypuhe • epäystävällinen • pyytää anteeksi • kiusallinen, nolo • ongelmat, hankaluudet
Economics Vocabulary 2024-03-04
20 Clues: after • hourly • annual • before • taken out • collectors • tax season • contribution • income based • self employed • illegal fraud • money received • money generated • national programs • verifies employment • reports withholdings • allowances/dependents • medicare/social security • permanent workers/residents • money earned minus deductions
Advisor 2023-10-17
p.28-29 2025-04-15
22 Clues: знак • выход • взлет • мягкий • чемодан • очередь • выяснить • удобство • огромный • следовать • запыхавшись • безопасность • приземляться • относительно • средневековый • вагон-ресторан • взять, поднять • садиться на борт • место (в самолете) • ___car, bus, plane • отправиться в путешествие • ____of schedule раньше графика
Bahasa Indonesia BIPA B2 2025-11-20
29 Clues: far • sea • eyes • head • west • nose • turn • east • train • north • close • plane • south • bored • across • waiter • teacher • usually • airport • holiday • headache • shopping • security • straight • interested • grandfather • grandmother • circle/round • unfortunately
Unit 8 2026-02-27
23 Clues: věci • wave • vážit • brána • station • přistát • letiště • harbour • motorway • slightly • take off • submarine • ctižádost • nástupiště • ovlivňovat • dopravní zácpa • kruhový objezd • palubní lístek • traffic lights • bezpečnostní pás • bezpečnostní prohlídka • přihlásit se k odbavení • hrubý, nerovný, hrbolatý
Word formation 2024-02-24
6 Clues: used to eat • related to cyber attacks • used when you are laughing • which is conducted in colleges • with out this your phone wont open • Our childhood incomplete with this
Social Media Safety 2023-10-26
Across
- Treating others with _ _ _ _ _ _ _online can prevent cyberbullying
- the opposite of public
- the person doing the bullying
- taking action to alert media platforms about cyberbullying
- be _ _ _ _ to everyone online
Down
- victims of cyber bullying feel like there is no _ _ _ _ _ _
- the person suffering the online harrasment
- it is important to think before you _ _ _ _ _ _ _
- Protecting your personal information is essential to stay _ _ _ _online.
- Persistent, unwelcome online behaviour aimed at causing harm to another person.
- how to prevent a specific user from communicating with you
11 Clues: the opposite of public • the person doing the bullying • be _ _ _ _ to everyone online • the person suffering the online harrasment • it is important to think before you _ _ _ _ _ _ _ • how to prevent a specific user from communicating with you • taking action to alert media platforms about cyberbullying • victims of cyber bullying feel like there is no _ _ _ _ _ _ • ...
Communication in the future 2024-11-24
Across
- difference When people from different places do things differently.
- language Using hands and face to show ideas.
- barrier When people cannot understand each other’s language.
- To talk or work with someone.
- breakdown When people cannot understand each other.
- phone A phone with a wire at home or work.
- Pictures, sounds, and videos together.
Down
- Talking with someone in person.
- To talk or share ideas with someone.
- room A place online where people talk.
- channel A way to send or get messages.
- world The internet and things we do online.
12 Clues: To talk or work with someone. • Talking with someone in person. • To talk or share ideas with someone. • Pictures, sounds, and videos together. • channel A way to send or get messages. • breakdown When people cannot understand each other. • phone A phone with a wire at home or work. • room A place online where people talk. • ...
NPO Crossword-2 2023-08-13
Across
- Fellow members are sometimes referred to as this
- Pacifica ____!
- After our enemies claimed we ate these we adopted it as a joke tradition
- Foxos are made into this
- First CN Emperor
- Color team the NPO has resided on for its existence in Cyber Nations
- Wrote the Proper Francoist Thought, also known as Unlimited
- Tebeat’s favourite place
- Peace, Strength, _______
Down
- Our first initiative to reorganize ourselves into a broader gaming group was named ____ Gaming
- Our public IRC channel, #nsa, was an acronym for
- People who own a real life NPO flag
- Defunct philosophy of the NPO
13 Clues: Pacifica ____! • First CN Emperor • Foxos are made into this • Tebeat’s favourite place • Peace, Strength, _______ • Defunct philosophy of the NPO • People who own a real life NPO flag • Our public IRC channel, #nsa, was an acronym for • Fellow members are sometimes referred to as this • Wrote the Proper Francoist Thought, also known as Unlimited • ...
Experis Consultant Connection Crossword February 2025 2025-02-17
Across
- March 14th
- A symbolic offering exchanged on a certain day in February.
- When February gets an extra day
- A professional matchmaker for jobs
- Furry forecaster of spring’s arrival
Down
- Wireless protocol enabling device connectivity over radio waves.
- Software designed to mess up your day
- A hug you wear… until it gets too itchy.
- That thing you reset every time because you forgot it again.
- A cyber attack disguised as a legitimate request for credentials.
- February’s birthstone
- The process of directing a candidate to a specific person or organization based on qualifications or needs.
- Born between 1996-2012
13 Clues: March 14th • February’s birthstone • Born between 1996-2012 • When February gets an extra day • A professional matchmaker for jobs • Furry forecaster of spring’s arrival • Software designed to mess up your day • A hug you wear… until it gets too itchy. • A symbolic offering exchanged on a certain day in February. • That thing you reset every time because you forgot it again. • ...
9GEO FOOD- Noah Lawrence 2017-09-14
Across
- Long term weather effect
- An edible substance
- The practice of growing and farming crops
- A substance providing nourishment
- A liquid essential to life
Down
- Factors of an areas food security
- The condition defining the difference between plant and animals from inorganic materials
- A catastrophe causing large damage or loss of life
- In short supply of something
- being free from danger or threat
- Growing, advancing, etc
- A factor relating to wealth
12 Clues: An edible substance • Growing, advancing, etc • Long term weather effect • A liquid essential to life • A factor relating to wealth • In short supply of something • being free from danger or threat • Factors of an areas food security • A substance providing nourishment • The practice of growing and farming crops • A catastrophe causing large damage or loss of life • ...
ITSS Cup: Mission Possible Edition 2026-03-26
Across
- Hidden entry point for agents and attackers.
- Digital notebook for mission intel.
- Spy proof your data with this.
- Security layer that acts like a force field.
- Agent's secure communication channel.
Down
- Controlled access to classified files.
- Command line for missions.
- Security alerter from mission control.
- First agent in the ITSS organization.
- Mission Impossible version of turn it off and on again.
- Encrypted message scrambling algorithm.
- Double agent that looks safe.
12 Clues: Command line for missions. • Double agent that looks safe. • Spy proof your data with this. • Digital notebook for mission intel. • First agent in the ITSS organization. • Agent's secure communication channel. • Controlled access to classified files. • Security alerter from mission control. • Encrypted message scrambling algorithm. • ...
How well do you know MUN. 2017-11-26
Across
- Refers to the UN Security Council's five permanent members.
- What is the oldest Polish MUN?
- Council A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
- A change to a draft resolution that is on the floor.
- A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
Down
- of Order These are used if you believe there was a mistake made in the rules of procedure.
- League of Nations At the very beginning, it was called ...
- Caucus A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
- General The head of the MUN.
- Nations An organization of independent states formed in 1945 to promote international peace and security.
10 Clues: General The head of the MUN. • What is the oldest Polish MUN? • A change to a draft resolution that is on the floor. • Refers to the UN Security Council's five permanent members. • League of Nations At the very beginning, it was called ... • of Order These are used if you believe there was a mistake made in the rules of procedure. • ...
Senior 2024 2024-03-22
Across
- Plans to be a nurse practitioner.
- Might get a degree in early childhood at later date.
- Interested in Cyber Safety.
- Attending Wichita State University.
- Already completed senior coursework. Working.
- Plans to be a firefighter.
- Wants to attend OSU Institute of Technology
- currently working. Graduating a year early.
- Plans to be a Physical Therapist.
- Getting a full time job.
- Thinking about being an Esthetician.
- Plans to be a Radiologist Technician
Down
- plans to be a Phlebotomist.
- Thinking about Safety degree.
- Attending NOC Tonkawa.
- Joining National Guard.
- Attending Vo-Tech for welding.
- Plans to go into education.
- Wants to get a job in IT.
- pursing a degree as a speech pathologist.
- Pursuing a welding career.
- Currently working. Hasn't attended campsus Sr.yr.
- Wants to be a Forensic Scientist
23 Clues: Attending NOC Tonkawa. • Joining National Guard. • Getting a full time job. • Wants to get a job in IT. • Plans to be a firefighter. • Pursuing a welding career. • plans to be a Phlebotomist. • Interested in Cyber Safety. • Plans to go into education. • Thinking about Safety degree. • Attending Vo-Tech for welding. • Wants to be a Forensic Scientist • ...
Types of Bullying 2013-08-12
Across
- Using information and communication technologies to bullying someone.
- Treating someone like an outcast.
- Secretly hurting a person such as spreading rumours.
- Affecting someone's relationship, excluding, making the person feel left out etc.
Down
- Name calling, saying hurtful things.
- Hurting someone.
- Hurting a person's feelings.
7 Clues: Hurting someone. • Hurting a person's feelings. • Treating someone like an outcast. • Name calling, saying hurtful things. • Secretly hurting a person such as spreading rumours. • Using information and communication technologies to bullying someone. • Affecting someone's relationship, excluding, making the person feel left out etc.
Computing Test 2019-06-17
7 Clues: hacking • bullying online • a law or a set of laws • intelligence that is not human • someone who has data stored about them • hackers putting bad things in files to hack you • the divide between people with internet and not
Security Awareness Challenge 2014-05-08
Across
- Who is the President of Global Security?
- What is the guidebook for Industrial Security?
- What does DSS stand for?
- What does SAP stand for?
- Who is the FSO for Burlington?
- What does a blue stripe on a badge signify?
- What is the data base for DoD clearances called?
- Who is the KMP for Burlington?
Down
- What is ITATS used for?
- What does PCL stand for?
- What is the contract between Raytheon and the Government called?
- What does VRS stand for?
- What is the investigation for a clearance called?
13 Clues: What is ITATS used for? • What does PCL stand for? • What does VRS stand for? • What does DSS stand for? • What does SAP stand for? • Who is the FSO for Burlington? • Who is the KMP for Burlington? • Who is the President of Global Security? • What does a blue stripe on a badge signify? • What is the guidebook for Industrial Security? • ...
Security Awareness Quiz 2015-05-31
Across
- Approval from --------is needed to take photographs inside TCS premises(3)
- Password Should be minimum of -------Characters(5)
- Mails that should not be propagated(5)
- Manipulate people to give up confidential information(17)
- Isecurity quiz must be completed successfully atleast ------a year(4)
- Deleting important data/files with malicious intent is security---(6)
- Misuse of confidential data should be reported to ----(3)
Down
- Acceptance of ----- makes you liable for all activities done from the system using your ID(11)
- All sensitive information should be ----before disposing them(8)
- Client confidential information should be stored in ----(7)
- Security breach will lead to ------action(12)
- Use of unlicensed software is a breach of copyright and is ---------(7)
- Internet browsing is logged and monitored by -----(6)
13 Clues: Mails that should not be propagated(5) • Security breach will lead to ------action(12) • Password Should be minimum of -------Characters(5) • Internet browsing is logged and monitored by -----(6) • Manipulate people to give up confidential information(17) • Misuse of confidential data should be reported to ----(3) • ...
Information Security Policy 2017-06-14
Across
- The component of an effective EISP that answers the question, "What is this policy for?"
- ISSP stands for _ -Specific Security Policies.
- In the Bull's Eye Model, this is the center-most layer.
- NIST stands for the National Institute of Standards and _ .
- A _ is a detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
- In the Bull's Eye Model, this is one of the middle layers.
Down
- In the pyramid relationship for policies, practices, procedures, and guidelines; the two Industry, government, and regulatory exemplars standards and _ .
- Policy must be able to stand up in _ if challenged.
- In the pyramid relationship for policies, practices, procedures, and guidelines; these are the Practices sanctioned by management.
- EISP stands for Enterprise Information Security _ .
- Policy must be properly supported and _ .
- In the Bull's Eye Model, this is one of the middle layers.
- In the pyramid relationship for policies, practices, procedures, and guidelines; these influence an organizations documents?
- Policy should never conflict with this.
14 Clues: Policy should never conflict with this. • Policy must be properly supported and _ . • ISSP stands for _ -Specific Security Policies. • Policy must be able to stand up in _ if challenged. • EISP stands for Enterprise Information Security _ . • In the Bull's Eye Model, this is the center-most layer. • In the Bull's Eye Model, this is one of the middle layers. • ...
STAAR Test Security 2021-06-29
Across
- A campus test administrator forgot to add speech to text on a student's online test,what type of procedural error is this?
- Account for every _____ document. Make sure the number of answer documents matches the number of students scheduled to test.
- Make a “_____ hour” check of all test sessions to ensure that all students are in the correct location, have been issued the correct assessments, and that oral administrations are being administered appropriately.
- On the _____ chart the location of the test session must be recorded and the room designation. Provide a brief description of the testing area (e.g., classroom, library, cafeteria.
- This status may be lowered by the state if violation of test security or confidential integrity if found.
- Raters for the Texas English Language Proficiency Assessment System (TELPAS) did not follow proper training or calibration procedures is an _______ irregularity.
- The person the CTC reports testing irregularities to.
Down
- A student was issued ______ test materials (e.g., test booklet, answer document, or test ticket) belonging to another student.
- Be familiar with the ___ resources and read the test administrator manuals.
- A test administrator reinforced testing strategies is what type of procedural error?
- A specific test was administered on the incorrect day, what type of procedural incident is this?
- Once test sessions have been completed,immediately collect and _____ any scratch paper, graph paper, or reference materials that students wrote on during the test, as well as any recordings.
- If this is found, the CTC must "other" the test and fill out the Locally Determined Disciplinary Action (LDDA) form.
13 Clues: The person the CTC reports testing irregularities to. • Be familiar with the ___ resources and read the test administrator manuals. • A test administrator reinforced testing strategies is what type of procedural error? • A specific test was administered on the incorrect day, what type of procedural incident is this? • ...
FNaF Security Breach 2022-05-31
13 Clues: Furry • Aligator • Night Guard • Protagonist • A White Bird • Such a nice fello • MOLTEN FREDDY?!?! • The "Best" of the 4 • DARNIT HE CAME BACK! • Wind-up vent annoyance • Caused Freddy's Mental Crisis • The Tidy & Light-Sensitive One • The Orange Bear with a thunderbolt
Colorado voter security 2024-11-04
Across
- – Judges undergo up to 12 hours of this before election day
- – All votes are cast using these types of ballots
- – Required on ballot boxes during transport
- – Identifying feature election judges wear
- – Equipment used to upload results to the Election Night Reporting website
- – Election judges must pass this check
Down
- – Judges who verify signatures work in these types of teams
- – Audit completed after the election to verify results
- – Party leaders appoint two people to this board for accuracy testing
- – Used to track ballots from printing to delivery
- – Required for voting in person
- – Type of test to ensure voting accuracy before and after the election
- – The place where ballots are stored and monitored
13 Clues: – Required for voting in person • – Election judges must pass this check • – Identifying feature election judges wear • – Required on ballot boxes during transport • – All votes are cast using these types of ballots • – Used to track ballots from printing to delivery • – The place where ballots are stored and monitored • ...
Return of ISIS Fighters who are Canadian Back to Canada Worksheet 2019-10-18
Across
- ISIS aims to create an _____ _____across Iraq, Syria and beyond.
- ISIS is trying to implement what type of law?
- ISIS fighters want to return back as the conditions in the prison camps are_____ for their families.
- Many security experts reported that this is a major ______ threat for Canada
- What does the acronym ISIS stand for?
- ISIS is a splinter sell of _______.
- Currently Canada is providing ______ ______ centers to rehabilitate ISIS fighters.
- ISIS is classified as what type of group?
Down
- ISIL stands for?
- Foreign women that marry ISIS fighters
- Women that marry ISIS fighters often meet them ________.
- Currently in Canada you can be persecuted for _______ if you try to leave to join ISIS, and get caught before you are able to.
- Canadian government is struggling to prosecute ISIS fighters due to lack of what?
- Currently the High Risk Returnee Interdepartmental Taskforce with help of the ______ is providing security and monitoring for returned ISIS fighters, as they go through rehabilitation programs.
14 Clues: ISIL stands for? • ISIS is a splinter sell of _______. • What does the acronym ISIS stand for? • Foreign women that marry ISIS fighters • ISIS is classified as what type of group? • ISIS is trying to implement what type of law? • Women that marry ISIS fighters often meet them ________. • ISIS aims to create an _____ _____across Iraq, Syria and beyond. • ...
Airport 2022-05-18
""United in Defense, Unbreakable in Bytes" 2025-10-05
Across
- – Common MUN procedure before a MOD.
- – The EU aims to regulate this to counter fake news.
- – Russia’s favorite non-traditional weapon.
- – EU member that proposed the “Drone Wall” initiative.
- – System that guards against digital intrusions.
- – Small states rely on this to resist hybrid attacks.
Down
- – Term for combined military, cyber, and info warfare.
- – 2030 event that shocked the Union.
- – France’s key concern in the Drone Wall debate.
- – Belgium warned the EU could collapse if this breaks.
- – Debate format focused on specific subtopics.
- – Nordic supporter of the Drone Wall plan.
12 Clues: – 2030 event that shocked the Union. • – Common MUN procedure before a MOD. • – Nordic supporter of the Drone Wall plan. • – Russia’s favorite non-traditional weapon. • – Debate format focused on specific subtopics. • – France’s key concern in the Drone Wall debate. • – System that guards against digital intrusions. • ...
DCT Crossword Puzzle 2025-12-18
Across
- Unplanned interruption of IT services
- Device used to connect multiple networked computers
- First application most staff check in the morning
- Document sent to clients detailing cost and scope
- Secure method used to access company systems remotely
Down
- Protection against malware, ransomware, and cyber threats
- The process of identifying and resolving technical issues
- A system update meant to fix bugs or vulnerabilities
- A formal agreement signed by client and company
- Financial document required for reimbursement claims
- Slow system response that frustrates users
- Central location where company data is stored
12 Clues: Unplanned interruption of IT services • Slow system response that frustrates users • Central location where company data is stored • A formal agreement signed by client and company • First application most staff check in the morning • Document sent to clients detailing cost and scope • Device used to connect multiple networked computers • ...
Browsing Safely 2025-06-19
Across
- that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
- or junk messages, usually advertisements, sent over the internet, often in large amounts.
- method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
- process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
- use of electronic communication to bully or harass someone, typically by sending threatening
- software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
- list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
Down
- security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
- Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
- who commit crimes using the internet or computers.
- type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.
- activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
- list of approved or trusted websites, programs, or users that are allowed to access a system or network.
- files stored on your computer by websites to remember information about you, like login details or site preferences.
- Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.
15 Clues: who commit crimes using the internet or computers. • or junk messages, usually advertisements, sent over the internet, often in large amounts. • use of electronic communication to bully or harass someone, typically by sending threatening • list of approved or trusted websites, programs, or users that are allowed to access a system or network. • ...
World Powers 2017-06-17
Across
- type of devastating weapon used during WW2
- solving of problems through talking
- a country that exerts influence over the rest of the world
- a word describing improvements in how things are done
- a term referring to army, navy and air force
Down
- refers to culture and tradition
- includes the study of life expectancy, age, gender
- making money through trade describes this type of power
- relating to governments
- type of attack using the internet
10 Clues: relating to governments • refers to culture and tradition • type of attack using the internet • solving of problems through talking • type of devastating weapon used during WW2 • a term referring to army, navy and air force • includes the study of life expectancy, age, gender • a word describing improvements in how things are done • ...
digital citizenship 2016-03-29
Across
- technology with a big screen
- social media site with a bird as its logo
- a creator of things
- a social media site that you can post photos
- a person who bullies someone in cyber space
- world wrestling entertainment
Down
- social media site where people can watch or upload videos
- social media site that people use to post photos
- a watcher or someone who uses things
- a social media site owned by mark zuckerberg
10 Clues: a creator of things • technology with a big screen • world wrestling entertainment • a watcher or someone who uses things • social media site with a bird as its logo • a person who bullies someone in cyber space • a social media site owned by mark zuckerberg • a social media site that you can post photos • social media site that people use to post photos • ...
Siti Mardhiyah 2025-07-24
Across
- seorang pencetus istilah big data
- kemampuan menggunakan berbagai macam alat digital dengan baik
- kemampuan yang dapat dengan cepat dan elastis ditetapkan
- tempat untuk menyimpan aplikasi beserta database
- sistem kecerdasan buatan yang telah dilatih untuk berinteraksi dalam percakapan berbasis teks
- kecerdasan buatan disebut juga
Down
- hard driver komputer lokal
- cyber physical sistem
- pemahaman tentang keamanan digital, privasi, dan etika dalam penggunaN teknologi digital
- konsep berpikir yang melibatkan kerangka dan proses berpikir komputasional
10 Clues: cyber physical sistem • hard driver komputer lokal • kecerdasan buatan disebut juga • seorang pencetus istilah big data • tempat untuk menyimpan aplikasi beserta database • kemampuan yang dapat dengan cepat dan elastis ditetapkan • kemampuan menggunakan berbagai macam alat digital dengan baik • konsep berpikir yang melibatkan kerangka dan proses berpikir komputasional • ...
Bullying 2025-09-30
Across
- Bullying melalui media internet disebut bullying
- Orang yang melakukan bullying disebut
- Bullying dengan cara mengucilkan disebut bullying
- Bullying dengan cara memukul disebut bullying
- Bullying dengan cara mengejek disebut bullying
- Orang yang menjadi sasaran bullying disebut
Down
- Sikap yang harus dimiliki untuk mencegah bullying adalah
- Salah satu tempat yang paling sering terjadi bullying di sekolah adalah
- Lawan kata “teman” yang sering muncul dalam bullying adalah
- Perasaan takut, cemas, atau tertekan akibat bullying disebut
10 Clues: Orang yang melakukan bullying disebut • Orang yang menjadi sasaran bullying disebut • Bullying dengan cara memukul disebut bullying • Bullying dengan cara mengejek disebut bullying • Bullying melalui media internet disebut bullying • Bullying dengan cara mengucilkan disebut bullying • Sikap yang harus dimiliki untuk mencegah bullying adalah • ...
MeMe & Me 2025-11-13
Across
- smooth and glossy.
- confess to be true or to be the case.
- offering the promise of an attractive or enjoyable experience.
- relating to or characteristic of the culture of computers, the internet, and virtual reality.
- loud, harsh piercing cries or noises.
Down
- crackling or hissing from telecommunication systems.
- grouping of keyboard characters
- at once, instantly, as soon as
- past and past participle of earn.
- an announcement or signal warning of danger.
10 Clues: smooth and glossy. • at once, instantly, as soon as • grouping of keyboard characters • past and past participle of earn. • confess to be true or to be the case. • loud, harsh piercing cries or noises. • an announcement or signal warning of danger. • crackling or hissing from telecommunication systems. • offering the promise of an attractive or enjoyable experience. • ...
Security in Cognizant 2012-11-19
Across
- General term for software programs that have been designed with or can be used for malicious intent
- What sort of secure communication can be used to send code or project-critical documents
- When access to a work area is no longer required, it should be informed immediately to the Manager and
- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be
- individuals other than Associates who enter Cognizant workplaces
Down
- The property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- reserves the right to monitor, access, and disclose any IM communication
- The property of safeguarding the accuracy and completeness of assets
- Any Person Working for Cognizant utilizing Cognizant Email Infrastructure
- Anything that has value to the organization
- What should be done with the project related documents that are no longer needed
- Associates can download software for business use only after obtaining approval from their manager and
- The property of being accessible and usable upon demand by an authorized entity
13 Clues: Anything that has value to the organization • individuals other than Associates who enter Cognizant workplaces • The property of safeguarding the accuracy and completeness of assets • reserves the right to monitor, access, and disclose any IM communication • Any Person Working for Cognizant utilizing Cognizant Email Infrastructure • ...
July Security Crossword 2021-07-27
Across
- The body who awards World Heritage status
- the purposeful killing of a monarch or sovereign
- an intergovernmental military alliance between 28 European countries and 2 North American
- (5,10) type of security focused entirely on protecting an individual
- COVID Variant & 4th letter in Greek & Phonetic alphabet
- Military organization seeking power in Afghanistan
Down
- a device that gives a high energy electric shock to the heart
- Sports festival originated in Ancient Greece
- a large country house with lands.
- A flaming Cocktail used as a weapon
- Psychoactive drug with numbing properties
- the act of judging or deciding the amount, value, quality, or importance of something
- Name of a hand-held metal detector
13 Clues: a large country house with lands. • Name of a hand-held metal detector • A flaming Cocktail used as a weapon • The body who awards World Heritage status • Psychoactive drug with numbing properties • Sports festival originated in Ancient Greece • the purposeful killing of a monarch or sovereign • Military organization seeking power in Afghanistan • ...
Security+ Questions 1 2024-03-15
Across
- An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of
- A function that converts an input (or 'message') into a fixed-size string of bytes, typically a digest that is unique to each unique input. It is used in various security processes to ensure data integrity
- A type of control that are designed to prevent an attacker from attempting to violate security policies
- Procedural mechanisms that focus on the mechanics of the risk management process
- functions or codes that are placed inside of other programs that will activate when set conditions are met instead of independent malicious programs
- Groups of remotely controlled systems that are used by attackers who control them to perform various actions such as additional infections and denial of service attacks
- Malware that takes over a computer then demands a ransom or payment
- Malware that is specifically designed to allow attackers to access a system through a backdoor
Down
- A cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
- The process of converting information or data into a code, especially to prevent unauthorized access. It secures data by making it unreadable without the proper decryption key
- Programs that capture keystrokes from keyboards, mouse movement, touchscreen inputs, or credit card swipes from attached devices
- Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications
- A term that describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users
13 Clues: Malware that takes over a computer then demands a ransom or payment • Procedural mechanisms that focus on the mechanics of the risk management process • Malware that is specifically designed to allow attackers to access a system through a backdoor • A type of control that are designed to prevent an attacker from attempting to violate security policies • ...
Information Security 2025-01-06
7 Clues: Malicious Software • Acceptable Use Policy • Malware that attaches to programs • Protection of ownership and reputation • Designed to lessen the risk of cyber attack • Protect with strong passwords and password storage • Protect with up to date software, encrypted information, limited employee access
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
