cyber security Crossword Puzzles

Security Fortnight Crossword 2025-07-18

Security Fortnight Crossword crossword puzzle
Across
  1. Protective footwear used in hazardous work environments.
  2. Regular rounds to monitor and ensure safety.
  3. Vehicle used to transport patients in emergencies.
  4. Physical inspection by patting down a person.
  5. Tunnel-like device that inspects bags using X-rays.
Down
  1. Scans individuals for hidden metallic objects.
  2. Initial treatment provided before medical professionals arrive.
  3. Door Clearly marked route for emergency evacuation.
  4. Group trained to act quickly during emergencies.
  5. Provides support while ascending or descending stairs.
  6. Used to block or control access temporarily.
  7. Gaining unauthorized access by closely following someone.
  8. Activates during power failure to guide evacuation.

13 Clues: Used to block or control access temporarily.Regular rounds to monitor and ensure safety.Physical inspection by patting down a person.Scans individuals for hidden metallic objects.Group trained to act quickly during emergencies.Vehicle used to transport patients in emergencies.Door Clearly marked route for emergency evacuation....

E Security G11 2026-02-01

E Security G11 crossword puzzle
Across
  1. The most commonly known type of malware.
  2. Is voice phishing
  3. / A common technique used in pharming.
  4. Example of Face ID
  5. / An Example of Ransomware.
  6. logger/ Is an example of spyware
Down
  1. An encrypted connection that can be used to send data more securely across a network.
  2. / An example of Rootkit
  3. Is an example of computer worm
  4. malware/ Software that is used to identify malware on a computer and remove it.
  5. / Is a bot that will pretend to be humans on sites such as social networking.
  6. .........exploit security holes and issues in a computer.
  7. / short for robot

13 Clues: Is voice phishing/ short for robotExample of Face ID/ An example of Rootkit/ An Example of Ransomware.Is an example of computer wormlogger/ Is an example of spyware/ A common technique used in pharming.The most commonly known type of malware..........exploit security holes and issues in a computer....

airport vocab 2025-04-15

airport vocab crossword puzzle
Across
  1. luggage
  2. emergency landing
  3. jet lag
  4. passport control
  5. flight number
  6. airport
  7. canceled
  8. toilets
Down
  1. boarding
  2. car rental
  3. metal detector
  4. security screening
  5. allowed
  6. ticket
  7. on board
  8. destination

16 Clues: ticketluggagejet lagallowedairporttoiletsboardingon boardcanceledcar rentaldestinationflight numbermetal detectorpassport controlemergency landingsecurity screening

CompTIA Cloud+ Ch. 9 2025-01-06

CompTIA Cloud+ Ch. 9 crossword puzzle
Across
  1. Tool for filtering network traffic.
  2. Reviewing logs to identify security issues.
  3. Adherence to legal and regulatory standards.
  4. Measures to protect data and systems.
  5. Securely connects users to a private network.
Down
  1. Digital document proving identity.
  2. Replacing sensitive data with non-sensitive equivalents.
  3. Authentication requiring more than one verification method.
  4. Encoding data to prevent unauthorized access.
  5. Ensuring data accuracy and consistency.
  6. Identity and Access Management.
  7. Updating software to fix vulnerabilities.

12 Clues: Identity and Access Management.Digital document proving identity.Tool for filtering network traffic.Measures to protect data and systems.Ensuring data accuracy and consistency.Updating software to fix vulnerabilities.Reviewing logs to identify security issues.Adherence to legal and regulatory standards.Encoding data to prevent unauthorized access....

Goodbye to Childhood 2021-10-20

Goodbye to Childhood crossword puzzle
Across
  1. change (para.1)
  2. disagreement (para.4)
  3. capable of thinking or acting for oneself (para.1)
  4. related to the body (para.2)
Down
  1. uncomfortably think of oneself as an object of the observation of others (para.3)
  2. feeling of security (para.4)
  3. very (para.4)
  4. resolution (para.4)
  5. related to the mind (para.3)
  6. small round marks on the skin (para.3)
  7. worrying (para.1)
  8. sudden increase (para.2)

12 Clues: very (para.4)change (para.1)worrying (para.1)resolution (para.4)disagreement (para.4)sudden increase (para.2)feeling of security (para.4)related to the mind (para.3)related to the body (para.2)small round marks on the skin (para.3)capable of thinking or acting for oneself (para.1)...

Conspiring Cities of India 2018-03-08

Conspiring Cities of India crossword puzzle
Across
  1. From winds to cannons, forts to sands.
  2. Famous for its Cyber Hub, but also has a great Ambience.
  3. Diamond capital of India.
  4. Largest city of the smallest state.
Down
  1. Also known as "Saketa", one of the Saptapuri for Hindus.
  2. beaches and skyscrapers, virtual and real.
  3. 30 JEE aspirants gather here.
  4. Coromandel Coast of Bay of Bengal.

8 Clues: Diamond capital of India.30 JEE aspirants gather here.Coromandel Coast of Bay of Bengal.Largest city of the smallest state.From winds to cannons, forts to sands.beaches and skyscrapers, virtual and real.Also known as "Saketa", one of the Saptapuri for Hindus.Famous for its Cyber Hub, but also has a great Ambience.

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ (ΤΑΣΟΣ ΚΟΥΚΛΙΔΗΣ Α2) 2022-01-31

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ (ΤΑΣΟΣ ΚΟΥΚΛΙΔΗΣ Α2) crossword puzzle
Across
  1. ΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣ
  2. ΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑ
  3. H ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYING
  4. ΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ
  5. ΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING?
Down
  1. ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑ
  2. ΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝ
  3. ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟ

8 Clues: ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING?ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟH ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYINGΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ

Bullying Recap 2023-11-08

Bullying Recap crossword puzzle
Across
  1. ......... up to bulling!
  2. When a person seeks to harm, intimidate, or coerce someone
  3. A cause, explanation, or justification for an action or event
  4. Have been bullied in the last 12 months
Down
  1. Another type of bullying
  2. When someone says something hurtful once!
  3. A type of bullying
  4. How might being bullied make someone react?

8 Clues: A type of bullyingAnother type of bullying......... up to bulling!Have been bullied in the last 12 monthsWhen someone says something hurtful once!How might being bullied make someone react?When a person seeks to harm, intimidate, or coerce someoneA cause, explanation, or justification for an action or event

Operate a personal computer 2025-05-24

Operate a personal computer crossword puzzle
Across
  1. Another name for the monitor
  2. Used to prevent a cyber attack
  3. The Ctrl and Alt keys are always used in combination with other keys.
  4. I am use to type
Down
  1. Command to copy
  2. Small portable device use to store files
  3. You use me to scan things
  4. The physical components of a computer system

8 Clues: Command to copyI am use to typeYou use me to scan thingsAnother name for the monitorUsed to prevent a cyber attackSmall portable device use to store filesThe physical components of a computer systemThe Ctrl and Alt keys are always used in combination with other keys.

Kianasearch 6-18-24 2024-06-18

Kianasearch 6-18-24 crossword puzzle
Across
  1. NYC borough where the UGA photographer is moving to
  2. the type of attack on Ascension
  3. my underdog team for the euros
  4. the best way to cook an egg
Down
  1. my profile name on my peacock account
  2. the name of the Crystal that powers lightsabers
  3. the best person on Love Island Season 11
  4. “can somebody match my”

8 Clues: “can somebody match my”the best way to cook an eggmy underdog team for the eurosthe type of attack on Ascensionmy profile name on my peacock accountthe best person on Love Island Season 11the name of the Crystal that powers lightsabersNYC borough where the UGA photographer is moving to

InfoSec Puzzle Quest 2025-09-04

InfoSec Puzzle Quest crossword puzzle
Across
  1. A type of malicious software that can replicate and spread.
  2. Security Protecting data and systems hosted on remote servers.
  3. Following rules, regulations, and standards in cybersecurity.
  4. A formal review of systems and processes to ensure security and compliance.
  5. Manipulating people into giving up confidential information.
Down
  1. The practice of protecting systems, networks, and data from digital threats.
  2. Ensuring data is accurate and has not been tampered with.
  3. Surfing A sneaky way to steal information by watching someone type their password.
  4. An unexpected event that compromises the integrity or availability of data.
  5. Software designed to detect and remove malicious programs.

10 Clues: Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

Realism 2023-10-04

Realism crossword puzzle
Across
  1. Thinker that established the different types of balance of power: unpolar, bipolar, multipolar.
  2. No hierarchically superior, coercive authority.
  3. Thinker that placed that the international system is anarchic.
  4. Also called structural realism,focuses its studies in the analysis of the structure of the international system.
  5. Thinker that established the dynamism in realism-history = cycles of dominant powers.
  6. Sum zero game, where a gain in security for one state means a loss for another.
  7. balancing Gaining power by building up its own military resources.
  8. Type of realists that say that war is an inevitable result to balancing
  9. A process explained by offensive realists as joining an unlikely ally to avoid war with it.
  10. According to realists, this is the states' main focus.
Down
  1. For this thinker, the state is the principal actor, it is unitary, rational and focused on protecting themselves.
  2. balancing Gaining power by allying with other states.
  3. Focuses mostly on the state and the international system.
  4. How much more one state gains over another.

14 Clues: How much more one state gains over another.No hierarchically superior, coercive authority.balancing Gaining power by allying with other states.According to realists, this is the states' main focus.Focuses mostly on the state and the international system.Thinker that placed that the international system is anarchic....

ICT - Security and Communication 2017-11-20

ICT - Security and Communication crossword puzzle
Across
  1. A type of protocol that allows data to be sent and received securely over the internet.
  2. Software that gathers data by monitoring key press on the user/s keyboard.
  3. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  4. Refers to the need to respect other user's views and display common courtesy when posting views online.
  5. Web applications or website that allow users to create and edit web pages using any web browser.
  6. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  7. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  8. Authentication that relies on certain unique characteristics of human beings.
  9. Uses SMS system of mobile phones to send out fake text messages.
  10. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  11. Refers to safety when using the internet like keeping personal data safe.
  12. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  13. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
  1. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
  2. Unsolicited email sent over the internet.
  3. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  4. Used to verify that data comes from a secure and trusted source.
  5. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  6. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  7. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  8. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  9. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  10. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  11. The act of gaining unauthorized access to a computer system.
  12. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.

25 Clues: Unsolicited email sent over the internet.The act of gaining unauthorized access to a computer system.Used to verify that data comes from a secure and trusted source.Uses SMS system of mobile phones to send out fake text messages.Refers to safety when using the internet like keeping personal data safe....

Fnaf Security Breach Crossword 2022-02-12

Fnaf Security Breach Crossword crossword puzzle
Across
  1. Stuns only one animatronic at a time
  2. All animatronics need this to keep moving around
  3. Mexican bear
  4. The arcade game where you see a glitched version of the daycare attendant
  5. This is what the animatronics are
  6. You broke the rules
  7. An attraction that is constantly under maintenance
  8. The gator's full name
  9. No longer allowed inside
  10. A warning given to the main character by the daycare attendant
  11. The player uses this to scramble the yellow console that gives out passes
  12. Needed to get into the daycare
  13. A cool place for a cool sport
  14. An attraction with no animatronic
  15. The daycare attendant says this twice when he throws you out of the daycare or if you try to enter again
  16. An attraction that has a statue of three animatronics inside
  17. The main villain that makes an appearance in an area below the pizzaplex
  18. Freddy's way of saying 'good job'
  19. Loves to entertain children at the Daycare
  20. Survive until then
  21. Moon says this before he starts chasing you
Down
  1. Every horror game needs this
  2. The part you take from the gator to upgrade Freddy
  3. This animatronic's catchphrase is 'Rock and Roll'
  4. Makes an appearance in cardboard cutouts, but never as an animatronic in the game
  5. The animatronics patrolling the halls
  6. The child you play as in Security Breach
  7. The name of the building
  8. Eats garbage
  9. Stuns a large group of animatronics at a time
  10. The tallest animatronic in the game
  11. The bear misses him
  12. A bunny that is after the player in the game
  13. You find these throughout the game
  14. Defend the galaxy
  15. In charge of nap time in the Daycare
  16. The part you take from the chicken to upgrade Freddy
  17. Where the main four perform
  18. Where the player can upgrade Freddy
  19. The nightguard
  20. Don't get lost
  21. The father figure of the entire game
  22. The instrument the gator plays
  23. The name of the game
  24. Bright and vibrant colors
  25. Take a map
  26. Has a very big ego, but is self conscious
  27. The small animatronic that chases you through the vents
  28. The part you take from the wolf to upgrade Freddy
  29. The instrument the wolf plays
  30. Use this to see security cams, talk to Freddy, view missions, or see confidential messages towards Fazbear Entertainment
  31. The instrument the chicken plays

52 Clues: Take a mapMexican bearEats garbageThe nightguardDon't get lostDefend the galaxySurvive until thenYou broke the rulesThe bear misses himThe name of the gameThe gator's full nameThe name of the buildingNo longer allowed insideBright and vibrant colorsWhere the main four performEvery horror game needs thisA cool place for a cool sport...

Security Analysis & Portfolio Management 2022-05-15

Security Analysis & Portfolio Management crossword puzzle
Across
  1. The ability to buy or sell an asset quickly at a known price.
  2. The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
  3. The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
  4. --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
  5. The market ------------------is used as a benchmark to evaluate the performance of funds.
  6. ------------------------was one of the originators of Capital Asset Pricing model.
  7. The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
  8. ------------------------laid the foundations to the Portfolio theory.
  9. The ----------------------theorem suggests that investment and financing are two different decisions.
Down
  1. The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
  2. Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
  3. A -------------form EMH is when prices reflect all historical information.
  4. ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
  5. A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
  6. The --------------market is used for lending and borrowing short-term funds.
  7. The --------------measure is calculated as excess returns per unit of systematic risk.
  8. The --------------------market line is the graphical representation of CAPM.
  9. -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
  10. --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
  11. The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.

20 Clues: The ability to buy or sell an asset quickly at a known price.------------------------laid the foundations to the Portfolio theory.A -------------form EMH is when prices reflect all historical information.The --------------market is used for lending and borrowing short-term funds....

Cryptography And Network Security 2023-09-18

Cryptography And Network Security crossword puzzle
Across
  1. In base 26, multiplication of YES by NO gives –
  2. _______ is the science and art of transforming messages to make them secure and immune to attacks
  3. The ciphers of today are called round ciphers because they involve---------round
  4. ----------round constants (RCs) are required in Whirlpool?
  5. ---------is not a type of symmetric-key cryptography technique?
  6. Divide (HAPPY)26 by (SAD)26. We get quotient –
  7. The ________ is the message after transformation
  8. ---------round provides linear diffusion in the Whirlpool Algorithm?
  9. In symmetric-key cryptography, the key locks and unlocks the box is
  10. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
Down
  1. . A/an ________ algorithm transforms ciphertext to plaintext
  2. In asymmetric key cryptography, the private key is kept by ________
  3. The shift cipher is sometimes reffered to as a ---------
  4. What is the number of round computation steps in the SHA-256 algorithm?
  5. can be considered as the class of computer threats
  6. The ________ is the original message before transformation
  7. Another name for the Whirlpool key is
  8. is considered as the unsolicited commercial email?
  9. An asymmetric-key (or public-key) cipher uses
  10. Symmetric-key cryptography started thousands of years ago when people needed to exchange

20 Clues: Another name for the Whirlpool key isAn asymmetric-key (or public-key) cipher usesDivide (HAPPY)26 by (SAD)26. We get quotient –In base 26, multiplication of YES by NO gives –The ________ is the message after transformationcan be considered as the class of computer threatsis considered as the unsolicited commercial email?...

IT Systems and Security 2025-07-21

IT Systems and Security crossword puzzle
Across
  1. Ranking tasks or risks by importance
  2. Public perception that can be damaged by breaches
  3. A fine or consequence for non-compliance
  4. I am harmful
  5. System settings that affect performance
  6. Programs and applications
  7. loss Critical information is erased or inaccessible
  8. The users who interact with and operate in an environment
  9. How often a certain risk or issue occurs
  10. Ordering risks based on severity and likelihood
  11. Numerical estimate of potential loss
  12. Unintentional harmful events affecting systems
  13. You need to identify this before setting up an IS
  14. Likelihood of a specific event occurring
  15. Flaws that can be exploited by threats
Down
  1. Organized collections of structured information
  2. Physical parts of a computer or system
  3. I am important for your network
  4. Example: Routers, switches, cables in connectivity, etc.
  5. disasters Earthquakes or floods that disrupt systems
  6. Enhancements to improve system
  7. Evaluation of consequences of an incident
  8. What do you do after completing a task?
  9. Gaps in security or system design
  10. Series of steps to accomplish tasks in systems
  11. System A coordinated set of components to manage data
  12. What else do you need other than physical components?
  13. Period when a system is unavailable/offline

28 Clues: I am harmfulPrograms and applicationsEnhancements to improve systemI am important for your networkGaps in security or system designRanking tasks or risks by importanceNumerical estimate of potential lossPhysical parts of a computer or systemFlaws that can be exploited by threatsSystem settings that affect performance...

Chapter 7 Security Plus 2024-10-03

Chapter 7 Security Plus crossword puzzle
Across
  1. An access control scheme that is the least restrictive
  2. injects stolen username and password across multiple websites
  3. Granting or denying approval to use specific resources
  4. The ability of systems to exchange information
  5. small device that looks like a thumb drive which can be used for verification
  6. enables users to access a network resource through a directory service
  7. small number of passwords used when trying several different user accounts
  8. Adding a random string to a hash algorithm for enhanced security
  9. A key pair “burned” into a security key
  10. features and characteristics of the individual
  11. Removing user accounts
  12. An access control scheme that is the most restrictive
  13. password attack attempting thousands of combinations per second
Down
  1. Single sign-on for networks owned by different organizations
  2. software designed to break passwords
  3. Using more than one type of authentication credential
  4. Requiring the user to provide proof that they are the unique user.
  5. Granting access that is limited
  6. key stretching algorithms
  7. Standard preconfigured passwords
  8. evidence or proof of something
  9. allows secure web domains to exchange user authentication and authorization data
  10. The point in time when a password is no longer valid
  11. An open-source federation framework
  12. provide control over user validation and the resources that may be accessed

25 Clues: Removing user accountskey stretching algorithmsevidence or proof of somethingGranting access that is limitedStandard preconfigured passwordsAn open-source federation frameworksoftware designed to break passwordsA key pair “burned” into a security keyThe ability of systems to exchange informationfeatures and characteristics of the individual...

Chapter 4 Security Plus 2024-09-10

Chapter 4 Security Plus crossword puzzle
Across
  1. multiple CAs that sign digital certificates
  2. management of keys and digital certificates at scale
  3. An certificate that uses an asterisk to cover multiple subdomains
  4. The entity that is responsible for digital certificates
  5. one master CA called the root
  6. associate a user’s identity to a public key
  7. confidence in or reliance on another person/entity
  8. published set of rules that govern operation of a PKI
  9. A process in which keys are managed by a third party
  10. A protocol suite for securing Internet Protocol (IP) communications
  11. securely distributing encryption keys between two parties
  12. Tracing a certificate back to the highest level of a CA
  13. An entity that is trusted by others
  14. The common file types for storing X.509 certificates
  15. A list of certificate serial numbers that have been revoked
  16. an extension to X.509 that allows various values to be associated with a security certificate
  17. Data that is encapsulated within a secure outer shell
Down
  1. replaces SSL
  2. Encrypts only the payload preserves the original IP header
  3. digitally sign a program
  4. M of N
  5. A method of controlling public keys
  6. publicly accessible centralized directory of digital certificates
  7. performs a real-time lookup of a certificate’s status
  8. A request submitted to a Certificate Authority for an TLS/SSL certificate
  9. Encrypts the entire IP packet and encapsulates it within a new IP packet
  10. web servers send queries to the OCSP Responder

27 Clues: M of Nreplaces SSLdigitally sign a programone master CA called the rootA method of controlling public keysAn entity that is trusted by othersmultiple CAs that sign digital certificatesassociate a user’s identity to a public keyweb servers send queries to the OCSP Responderconfidence in or reliance on another person/entity...

Chapter 10 Security Plus 2024-10-23

Chapter 10 Security Plus crossword puzzle
Across
  1. A framework for transporting authentication protocols
  2. uses digital certificates for authentication
  3. Unauthorized users could listen in on communications between RFID tags and readers
  4. The encryption protocol used for WPA2
  5. accesses unauthorized information from a Bluetooth connection
  6. An in-depth examination and analysis of a WLAN site
  7. securely tunnels any credential form for authentication using TLS
  8. A wireless attack in which false deauthentication
  9. can be used to detect a rogue AP
  10. standards used to transmit information from tags to a proximity reader
  11. not recommended as a security protection for SSID
  12. tool that provides a visual representation of the wireless signal
Down
  1. web page that is displayed to users when they attempt to access a public network
  2. sends unsolicited messages to Bluetooth-enabled devices
  3. commonly called Wi-Fi
  4. usage in contactless payments
  5. A wireless technology that uses short-range radio frequency
  6. An EAP method designed to simplify the deployment of 802.1x
  7. Intentionally flooding the radio frequency spectrum
  8. 200 milliwatts (mW)
  9. minimum amount of wireless signal should extend beyond the walls of the building
  10. An AP set up by an attacker to mimic an authorized AP
  11. can mitigate against man-in-the-middle (MITM) attacks and is an optional WPA3 enhancement
  12. A unique name identifying a Wi-Fi network
  13. IEEE 802.1x standard
  14. no longer support WEP
  15. An unauthorized AP that allows an attacker to bypass many of the network security

27 Clues: 200 milliwatts (mW)IEEE 802.1x standardcommonly called Wi-Fino longer support WEPusage in contactless paymentscan be used to detect a rogue APThe encryption protocol used for WPA2A unique name identifying a Wi-Fi networkuses digital certificates for authenticationA wireless attack in which false deauthentication...

Appsec and AI Security 2025-06-19

Appsec and AI Security crossword puzzle
Across
  1. The paid add-on that includes vulnerabilities, policies, and red-teaming (15 letters)
  2. AI that is designed to interact with humans using natural language (17 letters)
  3. Pre-built libraries, tools, and services that provide the necessary infrastructure to develop, train, and deploy AI systems efficiently (11 letters)
  4. A document that lists all components in a software application (4 letters)
  5. Single word to encompass the fundamental building blocks that enable an AI system to perform its functions, such as AI models, frameworks, agents, or architectures like RAGs (13 letters)
  6. The unauthorized extraction of data from a system (15 letters)
  7. Analysis of application source code to identify security vulnerabilities before deployment (4 letters)
  8. Risks such as hallucinations, data leakage, prompt injections, and biases that are present only in the context of a given application and how it is configured, connected, and customized (19 letters)
  9. A standardized set of rules that helps an AI remember what's been said or what's happening right now (18 letters)
  10. Development environments where AI capabilities are deeply integrated throughout the software development lifecycle for tasks like code generation, debugging, and refactoring (12 letters)
  11. Analysis of third-party and open-source components in applications (3 letters)
Down
  1. Mathematical structures trained to perform specific tasks by learning patterns in data (9 letters)
  2. A type of AI framework that enhances LLMs by retrieving relevant external data to generate more accurate, factual, and contextual responses (28 letters)
  3. Name of the overall product, when referring to Mend AI capabilities in the platform and Mend AI Premium together (7 letters)
  4. Technique to manipulate AI systems by crafting inputs that bypass security controls (14 letters)
  5. Unauthorized use of AI tools and components by employees/teams without formal approval (10 letters)
  6. The name of our platform, fundamentally re-architected to operate in a world where AI is integral (18 letters)
  7. Autonomous AI entities that perceive their environment, make decisions, and take actions to achieve specific goals, often without human intervention (9 letters)
  8. When AI systems generate content that isn't grounded in factual information (13 letters)
  9. Applications or processes that integrate and utilize artificial intelligence components like AI models, AI agents, RAGs and MCPs (10 letters)

20 Clues: The unauthorized extraction of data from a system (15 letters)A document that lists all components in a software application (4 letters)Analysis of third-party and open-source components in applications (3 letters)AI that is designed to interact with humans using natural language (17 letters)...

Chapter 2 Crossword 2025-09-29

Chapter 2 Crossword crossword puzzle
Across
  1. actors
  2. sharing
  3. race
  4. cohesion
  5. analysis
  6. dilemma
  7. of power
  8. dilemma
  9. system
Down
  1. Treaty.
  2. powers
  3. powers
  4. Morality
  5. transition theory
  6. interest
  7. system.
  8. of Ideas.

17 Clues: raceactorspowerspowerssystemTreaty.sharingdilemmasystem.dilemmacohesionMoralityanalysisinterestof powerof Ideas.transition theory

TTS Firewall Rizky A Dahlan 2022-11-09

TTS Firewall Rizky A Dahlan crossword puzzle
Across
  1. Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
  2. firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
  3. Perubahan terhadap tampilan suatu website secara illegal disebut..
  4. fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
  5. kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
  6. berapakah element pada host hardening …
Down
  1. firewall terbagi menjadi ... jenis
  2. Yang termasuk jenis metode enkripsi adalah …
  3. Terdiri dari database security, data security, dan device security adalah keamanan di level …
  4. ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
  5. arti dari kata firewall
  6. Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
  7. firewall bekerja dengan cara ... seluruh data yang masuk

13 Clues: arti dari kata firewallfirewall terbagi menjadi ... jenisberapakah element pada host hardening …Yang termasuk jenis metode enkripsi adalah …firewall bekerja dengan cara ... seluruh data yang masukPerubahan terhadap tampilan suatu website secara illegal disebut..kelebihan firewall berbasis jaringan adalah menjaga jaringan secara......

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. This security tool identified and removes malicious programs
  2. The individuals who control access to people, data, and systems
  3. This attack occurs when cybercriminals research and track which sites employees visit the most
  4. What should you do when a workstation or device is no longer in use
  5. Any scenario that triggers emotions should also trigger your __________
Down
  1. Stealing money is the main goal behind this type of malware
  2. Failure to run these equals failure to patch security vulnerabilities
  3. You can help fight cybercrime by becoming a ________________
  4. ____are the last line of defense
  5. Kwiktrip's password policy requires that coworkers change their passwords _____days
  6. The future of security is____,not machines
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. This dangerous attack targets specific people or organization, often with custom made email or messages
  9. These are designed to maintain the security of everyone associated with an organization

14 Clues: ____are the last line of defenseThe future of security is____,not machinesStealing money is the main goal behind this type of malwareYou can help fight cybercrime by becoming a ________________This security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

You Don't Know What You Don't Know 2021-01-12

You Don't Know What You Don't Know crossword puzzle
Across
  1. Needs to be posted by 5pm Wednesday, February 3rd
  2. Provides PD opportunities for staff for all of MCPS
  3. Link to email grade sheets to parents through Synergy
  4. Publishes a Professional Newsletter regularly
  5. Long Term Sub in AOHP
Down
  1. Who will receive PDF of "Mark Verification by Teacher" report
  2. Birthday on January 22
  3. A 2nd Semester 1.0 Position recently posted
  4. The # of rounds to find a Cyber Teacher
  5. Color of the Edit Final Grade option in Synergy
  6. Where you register for staff development trainings

11 Clues: Long Term Sub in AOHPBirthday on January 22The # of rounds to find a Cyber TeacherA 2nd Semester 1.0 Position recently postedPublishes a Professional Newsletter regularlyColor of the Edit Final Grade option in SynergyNeeds to be posted by 5pm Wednesday, February 3rdWhere you register for staff development trainings...

Cyber-Bullying is a crime 2014-11-05

Cyber-Bullying is a crime crossword puzzle
Across
  1. Includes pushing, slapping or hitting someone
  2. A person harmed or injured
  3. Involves the use of communication technologies
  4. Exploitation (two words) includes sharing videos or photos with nudity of persons 18years and under
  5. Ready or likely to attack or confront
  6. Observer or spectator
Down
  1. Communication of a false statement that harms
  2. A person who has committed a crime
  3. The action of harming someone because they have harmed you
  4. Intentional behavior which is found threatening or disturbing
  5. Carried out because of despair

11 Clues: Observer or spectatorA person harmed or injuredCarried out because of despairA person who has committed a crimeReady or likely to attack or confrontCommunication of a false statement that harmsIncludes pushing, slapping or hitting someoneInvolves the use of communication technologiesThe action of harming someone because they have harmed you...

BULLYING 2024-07-25

BULLYING crossword puzzle
Across
  1. What if you are being cyber bullied??
Down
  1. What to do if someone else is getting bullied on the internet?
  2. What to do if you see a person being bullied
  3. If the cyber bullying persist you?

4 Clues: If the cyber bullying persist you?What if you are being cyber bullied??What to do if you see a person being bulliedWhat to do if someone else is getting bullied on the internet?

Accounting: Payroll/Tax 2025-06-14

Accounting: Payroll/Tax crossword puzzle
Across
  1. Taxes paid (medicare or social security)
  2. For journalizing earnings in payroll
  3. rates When employers contribute equal amount to the retirement plan as employee
  4. Journalizing income tax
  5. A common retirement plan that deducts a select amount regularly
  6. Paid every 3 months
Down
  1. Journalizing social security
  2. Paid every month
  3. Your actual salary after deductions
  4. Paid every two weeks
  5. Paid every week

11 Clues: Paid every weekPaid every monthPaid every 3 monthsPaid every two weeksJournalizing income taxJournalizing social securityYour actual salary after deductionsFor journalizing earnings in payrollTaxes paid (medicare or social security)A common retirement plan that deducts a select amount regularly...

Un Viaje Memorable 2023-04-19

Un Viaje Memorable crossword puzzle
Across
  1. suitcase / luggage
  2. plane
  3. window
  4. aisle
  5. terminal
  6. airport
  7. metal detector
  8. flight attendant
  9. ticket
  10. economy class seat
Down
  1. boarding pass
  2. seat belt
  3. screen / sign
  4. passport
  5. security control / check
  6. seat
  7. passenger
  8. first class seat

18 Clues: seatplaneaislewindowticketairportpassportterminalseat beltpassengerboarding passscreen / signmetal detectorfirst class seatflight attendantsuitcase / luggageeconomy class seatsecurity control / check

cyber 2025-11-19

cyber crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cyber safety-AGNES MATRIN 2016-05-26

Cyber safety-AGNES MATRIN crossword puzzle
Across
  1. information about a particular subject that is available on the internet
  2. an ad that comes up on a device randomly
  3. a piece of information
  4. the fact of being who or what a person is
  5. helps you when inappropriate things come up on a device at home
  6. data from one computer system
  7. security system
  8. secures a system from virus
Down
  1. a global computer network providing a variety of information
  2. the condition of being protected
  3. to enter your username or password
  4. a short article giving a description about a person
  5. that allows you to access into a system
  6. in a place or situation that allows you to do things without other people seeing you
  7. sending or posting mean messages
  8. a device that is connected to the internet
  9. damaging systems

17 Clues: security systemdamaging systemsa piece of informationsecures a system from virusdata from one computer systemthe condition of being protectedsending or posting mean messagesto enter your username or passwordthat allows you to access into a systeman ad that comes up on a device randomlythe fact of being who or what a person is...

Jenifer Ximena Hernandez Morales 2013-05-01

Jenifer Ximena Hernandez Morales crossword puzzle
Across
  1. security.
  2. to the average employee.
  3. and network security help to keep data and equipment
  4. their data and computer
Down
  1. computer can be harmed
  2. are secure.
  3. technician to try to gain entry into a facility
  4. might repair, adjust, and install equipment.
  5. by attackers
  6. primary responsibilities of a technician include data and

10 Clues: security.are secure.by attackerscomputer can be harmedtheir data and computerto the average employee.might repair, adjust, and install equipment.technician to try to gain entry into a facilityand network security help to keep data and equipmentprimary responsibilities of a technician include data and

Digital Responsibility 2018-09-07

Digital Responsibility crossword puzzle
Across
  1. what do you keep safe
  2. what do you do when you see someone get cyber bullied
  3. never believe what online
  4. Important to you
  5. When you are getting weird messages who do you tell
  6. if you see someone you know online getting harrassed what do you do
  7. who do you not meet up with online
  8. who do you be nice to online
Down
  1. what do you not post
  2. who do you not talk too
  3. what never leaves the internet
  4. what do you do before you post

12 Clues: Important to youwhat do you not postwhat do you keep safewho do you not talk toonever believe what onlinewho do you be nice to onlinewhat never leaves the internetwhat do you do before you postwho do you not meet up with onlineWhen you are getting weird messages who do you tellwhat do you do when you see someone get cyber bullied...

The Good, The Bad, And The Ugly 2015-04-19

The Good, The Bad, And The Ugly crossword puzzle
Across
  1. Bullying Bullying over social media.
  2. Fake relationships.
  3. The improved communication through technology.
  4. Crude pictures with harmful captions.
  5. The rumors that are spread are sent though this.
  6. The not-so-good aspects from social media.
Down
  1. The worst effects from social media.
  2. This skill is tested when social media comes into play.
  3. This is improved through a world wide data base for information.
  4. Justice This is achieved through the various channels of social media.
  5. The positive aspects that arise from social media.
  6. Hackers are now easily able to invade this.

12 Clues: Fake relationships.The worst effects from social media.Bullying Bullying over social media.Crude pictures with harmful captions.The not-so-good aspects from social media.Hackers are now easily able to invade this.The improved communication through technology.The rumors that are spread are sent though this....

malware 2023-06-19

malware crossword puzzle
Across
  1. your definition of unauthorized access data
  2. using the internet to talk to someone
  3. alows users to convert information
  4. online fraud that involves use of a malicious code
  5. sending emails or messages as fake companys
  6. trial of data when using the internet
Down
  1. network allows users to talk and make releationships
  2. when a person takes images or information
  3. malicious program sending through a network
  4. fraud crimes commited by cyberattackers
  5. constantlely getting messages or emails
  6. its a word phrase or numbers that allow you to enter things such as your phone tablet or computer

12 Clues: alows users to convert informationusing the internet to talk to someonetrial of data when using the internetfraud crimes commited by cyberattackersconstantlely getting messages or emailswhen a person takes images or informationyour definition of unauthorized access datamalicious program sending through a network...

Network Based Attacks 2025-01-31

Network Based Attacks crossword puzzle
Across
  1. intercepting two way communications between 2 parties
  2. exploiting weaknesses in ARP
  3. translates domain names into ip addresses
  4. capturing information from communications you shouldn't
  5. tools used to scan for vulnerabilities and open ports
Down
  1. cyber attack that first scans for vulnerabilities in a system
  2. exploits a vulnerability before vendor is aware of it
  3. identifies hosts in a network
  4. attack by stealing a session key or cookie
  5. posing as something you're not
  6. group of infected computers that work together without the owners knowledge
  7. denial of service attack

12 Clues: denial of service attackexploiting weaknesses in ARPidentifies hosts in a networkposing as something you're nottranslates domain names into ip addressesattack by stealing a session key or cookieintercepting two way communications between 2 partiesexploits a vulnerability before vendor is aware of it...

Respectful Relationships 2025-08-03

Respectful Relationships crossword puzzle
Across
  1. available on or performed using the internet
  2. that which is morally correct or just
  3. main means of mass communication
  4. way in which one acts or conducts oneself
  5. system of rules regulating the actions of its members
  6. sharing a nude or a naked selfie
  7. seek to harm, intimidate, or coerce
Down
  1. connection between 2 people
  2. process of receiving or giving systematic instruction, like school
  3. a feeling of deep admiration for someone
  4. forbidden by law, especially criminal law
  5. relating to the culture of computers, IT, and virtual reality

12 Clues: connection between 2 peoplemain means of mass communicationsharing a nude or a naked selfieseek to harm, intimidate, or coercethat which is morally correct or justa feeling of deep admiration for someoneway in which one acts or conducts oneselfforbidden by law, especially criminal lawavailable on or performed using the internet...

słówka 2025-06-24

słówka crossword puzzle
Across
  1. spokój
  2. zranić
  3. odwracać uwagę
  4. kaloryfer
  5. ukraść
  6. spokojny/pokojowe
  7. pewien
  8. strach
Down
  1. at...... w końcu
  2. ochrona
  3. kupić (nabyć)
  4. zagrożenie
  5. at...... przynajmniej
  6. według
  7. wchodzić

15 Clues: spokójzranićukraśćwedługpewienstrachochronawchodzićkaloryferzagrożeniekupić (nabyć)odwracać uwagęat...... w końcuspokojny/pokojoweat...... przynajmniej

Bentley Cannon 2026-03-25

Bentley Cannon crossword puzzle
Across
  1. Takeoff
  2. Oxygen mask
  3. Landing
  4. Aisle
  5. International
Down
  1. Security
  2. runway
  3. to land
  4. Window
  5. to take off
  6. late
  7. Seat
  8. on board
  9. on time
  10. Service

15 Clues: lateSeatAislerunwayWindowto landTakeoffLandingon timeServiceSecurityon boardto take offOxygen maskInternational

Kaylynn Boggs - Bullying 2022-05-17

Kaylynn Boggs - Bullying crossword puzzle
Across
  1. name calling, insults, teasing, intimidation, homophobic or racist remarks
  2. happens more than once over a period of time
  3. what is the C in the ABCD's of bullying
  4. watching it happen
  5. hitting,kicking,tripping,pinching and pushing or damaging property.
  6. berate
  7. somebody is being hurt on purpose
  8. everybody is having fun,nobody gets hurt.
Down
  1. the attacker
  2. what is the D in the ABCD's of bullying
  3. being attacked
  4. Whats the A in the abcd's of bullying
  5. abusive or hurtful texts
  6. nobody is having fun,equal balance of power
  7. lying and spreading rumors playing nasty jokes to embarrass and humiliate
  8. Standing up for somebody
  9. of power whats the B in the abcd's of bullying

17 Clues: beratethe attackerbeing attackedwatching it happenabusive or hurtful textsStanding up for somebodysomebody is being hurt on purposeWhats the A in the abcd's of bullyingwhat is the D in the ABCD's of bullyingwhat is the C in the ABCD's of bullyingeverybody is having fun,nobody gets hurt.nobody is having fun,equal balance of power...

Digital citizenship topics 2017-09-08

Digital citizenship topics crossword puzzle
Across
  1. legal use of copyrighted material
  2. playing nice online
  3. rules you should be following when you are online
  4. use passwords that only you would understand
  5. keeping your accounts private
  6. the buying and selling of items online
Down
  1. the trail left in cyber space that never goes away
  2. doing the right thing online
  3. dont talk to people you have never met before
  4. being mean to people repetitively online
  5. using the internet for the right purposes
  6. using someone elses work and taking credit for it
  7. apps used to share information and talk with others
  8. you can put anything on the internet for people to use

14 Clues: playing nice onlinedoing the right thing onlinekeeping your accounts privatelegal use of copyrighted materialthe buying and selling of items onlinebeing mean to people repetitively onlineusing the internet for the right purposesuse passwords that only you would understanddont talk to people you have never met before...

Middle Childhood 2017-10-27

Middle Childhood crossword puzzle
Across
  1. Realizing things can be arranged in a logical series.
  2. Child over 95th percentile for their age group.
  3. Type of bullying including hitting.
  4. Type of bullying that effects peer relationships.
  5. Family with relatives living with parents and children.
Down
  1. Organizing things into groups based off characteristics.
  2. Child over 85th percentile weight for their age group.
  3. Family with two married parents and children.
  4. Type of bullying done through words.
  5. These children typically bully through their words.
  6. Unusual difficulty with reading.
  7. These children bully more physically
  8. One husband and two or more wives in a family.
  9. Type of bullying done through technology.

14 Clues: Unusual difficulty with reading.Type of bullying including hitting.Type of bullying done through words.These children bully more physicallyType of bullying done through technology.Family with two married parents and children.One husband and two or more wives in a family.Child over 95th percentile for their age group....

Cyber 2024-05-03

Cyber crossword puzzle
Across
  1. Flying mammal
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Digitalni Tragovi i Elektronično Nasilje 2022-06-13

Digitalni Tragovi i Elektronično Nasilje crossword puzzle
Across
  1. Svako se treba držati svog _____ ugleda.
  2. Informacija koju postavljam o sebi na mrežnim stranicama zove se digitalni ____
  3. Jeste li ikad upisali nečije ime i prezime u _____ tražilicu?
  4. kako nazivamo pravila lijepog ponašanja na internetu?
Down
  1. Opći pojam za svaku komunikacijsku aktivnost cyber tehnologijom koja se može smatrati štetnom.
  2. Drugi naziv za internetski bonton
  3. svaki korisnik na internetu ima svoj digitalni ____
  4. Koga treba obavijestiti zbog uhođenja?
  5. Svjetska komunikacijska mreža.
  6. Internetom kruže razlčite vrste _____

10 Clues: Svjetska komunikacijska mreža.Drugi naziv za internetski bontonInternetom kruže razlčite vrste _____Koga treba obavijestiti zbog uhođenja?Svako se treba držati svog _____ ugleda.svaki korisnik na internetu ima svoj digitalni ____kako nazivamo pravila lijepog ponašanja na internetu?Jeste li ikad upisali nečije ime i prezime u _____ tražilicu?...

Online bullying 2024-06-13

Online bullying crossword puzzle
Across
  1. When someone is being bullied online
  2. A meaning of photos
  3. When someone does something mean intentionally
  4. Where you can seek help online by parent or anyone else
  5. A very famous app & website
  6. When someone is not letting you get something by putting it close to you then away from you before you catch it
Down
  1. Another meaning of online
  2. The original meaning of online
  3. Someone to talk to
  4. When you write online

10 Clues: Someone to talk toA meaning of photosWhen you write onlineAnother meaning of onlineA very famous app & websiteThe original meaning of onlineWhen someone is being bullied onlineWhen someone does something mean intentionallyWhere you can seek help online by parent or anyone else...

Splunk Education Crossword for Enterprise Security 2021-06-18

Splunk Education Crossword for Enterprise Security crossword puzzle
Across
  1. One type of thresholding in a correlation search
  2. Security _______, main high level dashboard showing current notable events
  3. The engine that is used to search for multiple notable events and creates a specific type of event when they are found
  4. One of the things that the CIM does
  5. Used to hide events from incident review
  6. A chronological collection of activities and notes to help determine the root cause of a threat or breach
  7. A Splunk app that can be used to capture traffic without the use of an agent
  8. One of many CIM compliant data models showing data such as success and failure
Down
  1. A person, host, filetype or url used in investigations
  2. A cumulative metric to help determine what assets and identities are worth investigating
  3. Used within risk to map to a known security framework
  4. You can add assets, identities and websites to this to highlight their use within your systems
  5. Search used to discover security anomalies within your data
  6. A type of event which can be triggered from a correlation search
  7. You should enable this on all data models being used by ES
  8. Calculated using severity and priority
  9. When deploying, you need one of these dedicated to ES
  10. Imperative to prevent false positives and negatives showing within your correlation searches

18 Clues: One of the things that the CIM doesCalculated using severity and priorityUsed to hide events from incident reviewOne type of thresholding in a correlation searchUsed within risk to map to a known security frameworkWhen deploying, you need one of these dedicated to ESA person, host, filetype or url used in investigations...

US Armed Forces 2026-02-18

US Armed Forces crossword puzzle
Across
  1. branch of the military that focuses on naval warfare and operates at sea.
  2. Force that is a branch of the armed forces
  3. someone who serves in the armed forces; a member of a military forces.
  4. Military advisory group composed of the chiefs of staff of the army and air force, the chief of naval operations, and sometimes the commandant of the marine corps.
  5. Relating or belonging to a person who is not a member of the police or the armed forces.
  6. maritime security, search and rescue, and law enforcement agency.
Down
  1. specialized military branch trained for amphibious operations, such as beach landings, and often serving as an expeditionary force.
  2. Usually an executive branch governmental body responsible for coordinating policy on national security issues and advising chief executives on matters related to national security.
  3. Group of people who gather information about other countries and help the President and National Security Council make decisions about keeping our country safe.
  4. Member of the President's cabinet who is responsible for leading the U.S. Department of War.
  5. Military personnel who are not part of the regular, full-time force but can be called upon in times of need or crisis.
  6. branch of the military that deals with aerial warfare and operates aircraft.
  7. branch of the military that specializes in ground warfare and defense.

13 Clues: Force that is a branch of the armed forcesmaritime security, search and rescue, and law enforcement agency.someone who serves in the armed forces; a member of a military forces.branch of the military that specializes in ground warfare and defense.branch of the military that focuses on naval warfare and operates at sea....

BANKING 2025-04-23

BANKING crossword puzzle
Across
  1. - descubierto
  2. - extracto bancario
  3. - cuota
  4. - sucursal
  5. - extraer
  6. - cuenta
Down
  1. - préstamo
  2. - depositar
  3. - transferir
  4. - garantía
  5. - saldo
  6. - emitir
  7. - cajero

13 Clues: - cuota- saldo- emitir- cajero- cuenta- extraer- préstamo- garantía- sucursal- depositar- transferir- descubierto- extracto bancario

spainsh 10 2025-03-18

spainsh 10 crossword puzzle
Across
  1. purse/bag
  2. customs
  3. airplane
  4. agent
  5. ticket
  6. disposabel camera
  7. ATM machine
  8. wallet
  9. luggage
Down
  1. security checkpoint
  2. ID badge
  3. arrival
  4. airport
  5. airplane ticket
  6. money

15 Clues: agentmoneyticketwalletarrivalcustomsairportluggageID badgeairplanepurse/bagATM machineairplane ticketdisposabel camerasecurity checkpoint

bullying-by Harvey.B 2023-11-28

bullying-by Harvey.B crossword puzzle
Across
  1. when you be unkind to a person
  2. bulling when you bully someone online
  3. when you are really angry
  4. when you make someone attack you
Down
  1. this is called when a person watches someone get bullied
  2. stander when you tell on the person when they are bulling someone
  3. when you are getting hurt
  4. when you bully someone for there skin color
  5. when you are the one being bullied

9 Clues: when you are getting hurtwhen you are really angrywhen you be unkind to a personwhen you make someone attack youwhen you are the one being bulliedbulling when you bully someone onlinewhen you bully someone for there skin colorthis is called when a person watches someone get bulliedstander when you tell on the person when they are bulling someone

CYBERCRIME 2021-07-11

CYBERCRIME crossword puzzle
Across
  1. A politically- or ideologically-motivated cyber attack or hack.
  2. A way to access electonic system by bypassing some or all security mechanisms.
  3. A satellite navigation system that indentifies the precise lovation of the transmitting device.
  4. The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
  5. Malicious software, such as a virus or worm, that attacks a target computer.
  6. The overaching program that runs all the functions on a computer or other electronic device.
  7. A company that offers access the internet.
  8. A camera connectee to computer l, generally used to then stream videos to the internet.
  9. Resource to be accessed, often expressed as a time period.
  10. Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
  11. The process ofnusing a
  12. Determining the identity or location of an attacker or an attacker's intermediary.
  13. The interdependent network of information technology, infrastructures that includes internet.
  14. Hardware or software designed to prevent unathorized users from accessing a computer system.
  15. A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
  16. A network point that acts an entrance to another network
  17. A unique internet identifier registered
  18. An online journal.
  19. A program used to access the internet.
  20. Assurance that remains private and no one sees it except for those expected to see it.
  21. A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
  1. Attempting to mimic an official email from a trusted organization to lire individuals.
  2. Refer to someone who gains access to a system, software, or hardware without permission.
  3. A log that chronicles any changes made to a document, presentation, software applications, etc.
  4. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
  5. Are a botnet of comprised hosts, controlled by a single intentity.
  6. A unique internet identifier registered to an entity.
  7. An information packet sent from website to a web browser that records a user's activity on the website.
  8. algorithm against data to produce a numeric value that is representative that data.
  9. Stands for "Wireless Fidelity".
  10. A software robot that performs automated tasks.
  11. The act of one individual harrasing or intimidating another individual via the interner.
  12. Unsolicited advertising or other information sent out via email or other messaging service.
  13. A massed data that is used to describe large amounts of other internet data.
  14. A grou of computers that is linked to share data and othe information.
  15. A website that finds information across the Internet based on a set of search criteria.
  16. an entity.
  17. A network security measure in which information is encoded or scrambled prior to transmission.
  18. Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
  19. The changes in data caused by an intruder or investigator accessing files and running applications or process.
  20. Aim to overwhelm the resources of a targeted system to crash that system.

41 Clues: an entity.An online journal.The process ofnusing aStands for "Wireless Fidelity".A program used to access the internet.A unique internet identifier registeredA company that offers access the internet.A software robot that performs automated tasks.A unique internet identifier registered to an entity....

codi bullying crossword 2023-03-21

codi bullying crossword crossword puzzle
Across
  1. bullying getting physically picked on everyday
  2. bullying some teases you verbally everyday
  3. someone who stands around and watches someone getting bullied
  4. a sore from being punched or kicked
Down
  1. someone teases you and picks on you everyday
  2. a type of physical bullying
  3. a type of psychological bullying
  4. bullying getting picked on online everyday

8 Clues: a type of physical bullyinga type of psychological bullyinga sore from being punched or kickedsomeone teases you and picks on you everydaybullying some teases you verbally everydaybullying getting picked on online everydaybullying getting physically picked on everydaysomeone who stands around and watches someone getting bullied

Internet Term Crossword Puzzle 2013-09-03

Internet Term Crossword Puzzle crossword puzzle
Across
  1. advertise
  2. security
  3. criticism
  4. linking files
  5. communicate
  6. saving
  7. filing program
  8. typing
Down
  1. file,edit,view
  2. letters
  3. hacking
  4. main page
  5. testing program
  6. significance
  7. posting comments

15 Clues: savingtypinglettershackingsecurityadvertisecriticismmain pagecommunicatesignificancelinking filesfile,edit,viewfiling programtesting programposting comments

TRANSFORM 2022-12-02

TRANSFORM crossword puzzle
Across
  1. money
  2. opportunity cost
  3. answer
  4. suppor
  5. doing better
  6. to Information.
  7. in business
Down
  1. eveeryone
  2. bette
  3. less cost
  4. Fraude
  5. data
  6. quickest
  7. data base
  8. of Mobility.

15 Clues: datamoneybetteFraudeanswersupporquickesteveeryoneless costdata basein businessof Mobility.doing betterto Information.opportunity cost

Vocabulary Recap ch 9 & theme vocabulary human welfare & religion 2025-09-10

Vocabulary Recap ch 9 & theme vocabulary human welfare & religion crossword puzzle
Across
  1. kevyt/pinnallinen
  2. avoliitto
  3. parish
  4. kyyristyä
  5. nervously
  6. social security
  7. (arvo)merkki
  8. asukas
Down
  1. maallinen
  2. tosin/vaikka
  3. vilkaista
  4. constable
  5. child support
  6. hold back
  7. jäädä eläkkeelle

15 Clues: parishasukasmaallinenvilkaistaavoliittoconstablekyyristyänervouslyhold backtosin/vaikka(arvo)merkkichild supportsocial securityjäädä eläkkeellekevyt/pinnallinen

Unit 5 - Architechture 2014-04-21

Unit 5 - Architechture crossword puzzle
Across
  1. Lift
  2. Ziegelstein
  3. Werkzeug
  4. Kilometer
  5. Architekt/in
  6. entwerfen,entworf
  7. Wärme
  8. Termin
  9. Verbindung
  10. Stahl
  11. Stadtsilhouette
  12. ungewöhnlich
  13. Baustelle
  14. Decke
Down
  1. Stockwerk
  2. Wolkenkratzer
  3. Klimaanlage
  4. pünktlich
  5. Kühlschrank
  6. Beleuchtung
  7. Sicherheit
  8. Geschäftsmann
  9. anstatt
  10. Angst
  11. Herausforderung
  12. Bauland
  13. Eisen
  14. Lohn

28 Clues: LiftLohnWärmeAngstStahlEisenDeckeTerminanstattBaulandWerkzeugStockwerkKilometerpünktlichBaustelleSicherheitVerbindungZiegelsteinKlimaanlageKühlschrankBeleuchtungArchitekt/inungewöhnlichWolkenkratzerGeschäftsmannHerausforderungStadtsilhouetteentwerfen,entworf

8A Vocab pg 422 2014-05-18

8A Vocab pg 422 crossword puzzle
Across
  1. closed
  2. customs
  3. passport
  4. pilot
  5. suitcase
  6. foreign
  7. to check
  8. aisle
  9. announcement
  10. arrival
  11. ready
  12. to insist
  13. to board
Down
  1. passenger
  2. to last
  3. luggage
  4. security checkpoint
  5. departure
  6. to plan
  7. tourist
  8. delay
  9. direct
  10. airport
  11. employee
  12. flight
  13. open

26 Clues: openpilotdelayaislereadycloseddirectflightto lastluggagecustomsto plantouristforeignairportarrivalpassportsuitcaseemployeeto checkto boardpassengerdepartureto insistannouncementsecurity checkpoint

Government Acronyms 2023-01-21

Government Acronyms crossword puzzle
Across
  1. inner-city home development
  2. parcel
  3. retaliation force
  4. security alliance
  5. investigation
  6. intelligence
  7. Aeronautics
  8. global peace-makers
  9. pills
Down
  1. mail
  2. plant police
  3. covid monsters
  4. banks
  5. attorneys
  6. disaster relief
  7. financing paintings
  8. farm loans
  9. taxes
  10. labor relations
  11. water and air
  12. snow plows

21 Clues: mailbankstaxespillsparcelattorneysfarm loanssnow plowsAeronauticsplant policeintelligenceinvestigationwater and aircovid monstersdisaster relieflabor relationsretaliation forcesecurity alliancefinancing paintingsglobal peace-makersinner-city home development

Airport Spanish Vocab - Reya C 2022-10-13

Airport Spanish Vocab - Reya C crossword puzzle
Across
  1. passenger
  2. airplane
  3. gate
  4. monitor;screen
  5. suitcase
  6. can you please tell me where
  7. security
  8. train station
  9. ticket
  10. tourist office
Down
  1. flight attendant
  2. intinerary
  3. passport
  4. to call someone
  5. line
  6. swimsuit
  7. to take a trip
  8. to get in line
  9. departure
  10. to board

20 Clues: linegateticketpassportswimsuitairplanesuitcasesecurityto boardpassengerdepartureintinerarytrain stationmonitor;screento take a tripto get in linetourist officeto call someoneflight attendantcan you please tell me where

French Vocab Crossword 2020-01-12

French Vocab Crossword crossword puzzle
Across
  1. check in kiosk
  2. transfer
  3. male flight attendant
  4. plane
  5. boarding pass
  6. ticket counter
  7. ticket
  8. airport
  9. flight
  10. to land
Down
  1. boarding gate
  2. passenger
  3. female flight attendant
  4. customs
  5. suitcase
  6. passport
  7. agent
  8. verify
  9. identification
  10. security check
  11. take off
  12. to serve

22 Clues: agentplaneverifyticketflightcustomsairportto landsuitcasepassporttransfertake offto servepassengerboarding gateboarding passidentificationcheck in kiosksecurity checkticket countermale flight attendantfemale flight attendant

Woordjes 2023-12-06

Woordjes crossword puzzle
Across
  1. inbraak
  2. verdacht
  3. beroving
  4. roekeloos
  5. gewelddadig
  6. verdacht
  7. aggressief
  8. overtreding
  9. per ongeluk
  10. dreiging
  11. getuige
  12. moorde
  13. rechter
  14. bewapend
  15. rechtzaak
  16. beveiliging
Down
  1. rechtzaak
  2. straf
  3. slachtoffer
  4. gerechtigheid
  5. onruststoker
  6. gebouw
  7. brandstichting
  8. dronken
  9. toeschouwer
  10. hulpverleners
  11. aanval
  12. uitspraak
  13. bewijs
  14. rel

30 Clues: relstrafgebouwaanvalbewijsmoordeinbraakdronkengetuigerechterverdachtberovingverdachtdreigingbewapendrechtzaakroekeloosuitspraakrechtzaakaggressiefslachtoffergewelddadigtoeschouwerovertredingper ongelukbeveiligingonruststokergerechtigheidhulpverlenersbrandstichting

vocabularry 2023-09-20

vocabularry crossword puzzle
Across
  1. Pengetahuan
  2. Cantik
  3. Kemampuan
  4. Dunia
  5. Keluarga
  6. Bodoh
  7. Benda
  8. Orang-orang
  9. Pengertian
  10. Kekuasaan
  11. Pemain
  12. Film
  13. Kesehatan
  14. Pendek
Down
  1. Keamanan
  2. Lembut
  3. Jelek
  4. Masyarakat
  5. Kecil
  6. Cerita
  7. Seni
  8. Industri
  9. Besar
  10. Masalah
  11. Ekonomi
  12. Alam
  13. Tinggi
  14. Pintar

28 Clues: SeniAlamFilmJelekDuniaKecilBodohBesarBendaLembutCantikCeritaTinggiPemainPendekPintarMasalahEkonomiKeamananKeluargaIndustriKemampuanKekuasaanKesehatanMasyarakatPengertianPengetahuanOrang-orang

SP8 Unit 7 2024-05-10

SP8 Unit 7 crossword puzzle
Across
  1. ongelma
  2. persoonallisuus
  3. epäystävällinen
  4. keskustelu
  5. häpeissään
  6. pyytää anteeksi
  7. ilman
  8. kommentti
  9. luvata
  10. ongelmat, hankaluudet
  11. keskustella
Down
  1. käyttäytyä
  2. antaa anteeksi
  3. skandaali
  4. kiusallinen, nolo
  5. lupa
  6. salasana
  7. keskusta
  8. roska, pötypuhe
  9. turvallisuus
  10. kateellinen
  11. muistaa
  12. pettää
  13. ihastus
  14. selittää
  15. uskoa
  16. rasistinen

27 Clues: lupailmanuskoapettääluvataongelmamuistaaihastussalasanakeskustaselittääskandaalikommenttikäyttäytyäkeskusteluhäpeissäänrasistinenkateellinenkeskustellaturvallisuusantaa anteeksipersoonallisuusroska, pötypuheepäystävällinenpyytää anteeksikiusallinen, noloongelmat, hankaluudet

Economics Vocabulary 2024-03-04

Economics Vocabulary crossword puzzle
Across
  1. allowances/dependents
  2. permanent workers/residents
  3. taken out
  4. collectors
  5. tax season
  6. income based
  7. before
Down
  1. reports withholdings
  2. self employed
  3. national programs
  4. money generated
  5. medicare/social security
  6. illegal fraud
  7. money received
  8. after
  9. hourly
  10. money earned minus deductions
  11. contribution
  12. annual
  13. verifies employment

20 Clues: afterhourlyannualbeforetaken outcollectorstax seasoncontributionincome basedself employedillegal fraudmoney receivedmoney generatednational programsverifies employmentreports withholdingsallowances/dependentsmedicare/social securitypermanent workers/residentsmoney earned minus deductions

Advisor 2023-10-17

Advisor crossword puzzle
Across
  1. N
  2. E
  3. G
  4. AF
  5. V
  6. C
  7. B
  8. O
  9. W
  10. C
  11. AC
  12. AB
  13. U
  14. T
Down
  1. K
  2. AD
  3. AE
  4. H
  5. Z
  6. M
  7. P
  8. Q
  9. L
  10. AA
  11. J
  12. F
  13. I
  14. D
  15. R
  16. A

30 Clues: KNEHZGMPVQLCBOJWFCIDRAUTADAEAFAAACAB

p.28-29 2025-04-15

p.28-29 crossword puzzle
Across
  1. удобство
  2. мягкий
  3. чемодан
  4. взять, поднять
  5. ___car, bus, plane
  6. запыхавшись
  7. огромный
  8. взлет
  9. следовать
  10. ____of schedule раньше графика
Down
  1. выяснить
  2. место (в самолете)
  3. безопасность
  4. очередь
  5. вагон-ресторан
  6. садиться на борт
  7. знак
  8. выход
  9. отправиться в путешествие
  10. средневековый
  11. приземляться
  12. относительно

22 Clues: знаквыходвзлетмягкийчемоданочередьвыяснитьудобствоогромныйследоватьзапыхавшисьбезопасностьприземлятьсяотносительносредневековыйвагон-ресторанвзять, поднятьсадиться на бортместо (в самолете)___car, bus, planeотправиться в путешествие____of schedule раньше графика

Bahasa Indonesia BIPA B2 2025-11-20

Bahasa Indonesia BIPA B2 crossword puzzle
Across
  1. headache
  2. close
  3. plane
  4. usually
  5. interested
  6. shopping
  7. west
  8. circle/round
  9. nose
  10. unfortunately
  11. waiter
  12. holiday
  13. grandmother
  14. straight
Down
  1. eyes
  2. across
  3. train
  4. head
  5. north
  6. grandfather
  7. teacher
  8. far
  9. airport
  10. security
  11. south
  12. bored
  13. turn
  14. sea
  15. east

29 Clues: farseaeyesheadwestnoseturneasttrainnorthcloseplanesouthboredacrosswaiterteacherusuallyairportholidayheadacheshoppingsecuritystraightinterestedgrandfathergrandmothercircle/roundunfortunately

Unit 8 2026-02-27

Unit 8 crossword puzzle
Across
  1. bezpečnostní prohlídka
  2. slightly
  3. přihlásit se k odbavení
  4. věci
  5. ovlivňovat
  6. palubní lístek
  7. traffic lights
  8. ctižádost
  9. letiště
  10. brána
  11. harbour
Down
  1. motorway
  2. vážit
  3. station
  4. nástupiště
  5. dopravní zácpa
  6. kruhový objezd
  7. take off
  8. wave
  9. submarine
  10. bezpečnostní pás
  11. přistát
  12. hrubý, nerovný, hrbolatý

23 Clues: věciwavevážitbránastationpřistátletištěharbourmotorwayslightlytake offsubmarinectižádostnástupištěovlivňovatdopravní zácpakruhový objezdpalubní lístektraffic lightsbezpečnostní pásbezpečnostní prohlídkapřihlásit se k odbaveníhrubý, nerovný, hrbolatý

Word formation 2024-02-24

Word formation crossword puzzle
Across
  1. used to eat
  2. with out this your phone wont open
  3. Our childhood incomplete with this
Down
  1. which is conducted in colleges
  2. used when you are laughing
  3. related to cyber attacks

6 Clues: used to eatrelated to cyber attacksused when you are laughingwhich is conducted in collegeswith out this your phone wont openOur childhood incomplete with this

Social Media Safety 2023-10-26

Social Media Safety crossword puzzle
Across
  1. Treating others with _ _ _ _ _ _ _online can prevent cyberbullying
  2. the opposite of public
  3. the person doing the bullying
  4. taking action to alert media platforms about cyberbullying
  5. be _ _ _ _ to everyone online
Down
  1. victims of cyber bullying feel like there is no _ _ _ _ _ _
  2. the person suffering the online harrasment
  3. it is important to think before you _ _ _ _ _ _ _
  4. Protecting your personal information is essential to stay _ _ _ _online.
  5. Persistent, unwelcome online behaviour aimed at causing harm to another person.
  6. how to prevent a specific user from communicating with you

11 Clues: the opposite of publicthe person doing the bullyingbe _ _ _ _ to everyone onlinethe person suffering the online harrasmentit is important to think before you _ _ _ _ _ _ _how to prevent a specific user from communicating with youtaking action to alert media platforms about cyberbullyingvictims of cyber bullying feel like there is no _ _ _ _ _ _...

Communication in the future 2024-11-24

Communication in the future crossword puzzle
Across
  1. difference When people from different places do things differently.
  2. language Using hands and face to show ideas.
  3. barrier When people cannot understand each other’s language.
  4. To talk or work with someone.
  5. breakdown When people cannot understand each other.
  6. phone A phone with a wire at home or work.
  7. Pictures, sounds, and videos together.
Down
  1. Talking with someone in person.
  2. To talk or share ideas with someone.
  3. room A place online where people talk.
  4. channel A way to send or get messages.
  5. world The internet and things we do online.

12 Clues: To talk or work with someone.Talking with someone in person.To talk or share ideas with someone.Pictures, sounds, and videos together.channel A way to send or get messages.breakdown When people cannot understand each other.phone A phone with a wire at home or work.room A place online where people talk....

NPO Crossword-2 2023-08-13

NPO Crossword-2 crossword puzzle
Across
  1. Fellow members are sometimes referred to as this
  2. Pacifica ____!
  3. After our enemies claimed we ate these we adopted it as a joke tradition
  4. Foxos are made into this
  5. First CN Emperor
  6. Color team the NPO has resided on for its existence in Cyber Nations
  7. Wrote the Proper Francoist Thought, also known as Unlimited
  8. Tebeat’s favourite place
  9. Peace, Strength, _______
Down
  1. Our first initiative to reorganize ourselves into a broader gaming group was named ____ Gaming
  2. Our public IRC channel, #nsa, was an acronym for
  3. People who own a real life NPO flag
  4. Defunct philosophy of the NPO

13 Clues: Pacifica ____!First CN EmperorFoxos are made into thisTebeat’s favourite placePeace, Strength, _______Defunct philosophy of the NPOPeople who own a real life NPO flagOur public IRC channel, #nsa, was an acronym forFellow members are sometimes referred to as thisWrote the Proper Francoist Thought, also known as Unlimited...

Experis Consultant Connection Crossword February 2025 2025-02-17

Experis Consultant Connection Crossword February 2025 crossword puzzle
Across
  1. March 14th
  2. A symbolic offering exchanged on a certain day in February.
  3. When February gets an extra day
  4. A professional matchmaker for jobs
  5. Furry forecaster of spring’s arrival
Down
  1. Wireless protocol enabling device connectivity over radio waves.
  2. Software designed to mess up your day
  3. A hug you wear… until it gets too itchy.
  4. That thing you reset every time because you forgot it again.
  5. A cyber attack disguised as a legitimate request for credentials.
  6. February’s birthstone
  7. The process of directing a candidate to a specific person or organization based on qualifications or needs.
  8. Born between 1996-2012

13 Clues: March 14thFebruary’s birthstoneBorn between 1996-2012When February gets an extra dayA professional matchmaker for jobsFurry forecaster of spring’s arrivalSoftware designed to mess up your dayA hug you wear… until it gets too itchy.A symbolic offering exchanged on a certain day in February.That thing you reset every time because you forgot it again....

9GEO FOOD- Noah Lawrence 2017-09-14

9GEO FOOD- Noah Lawrence crossword puzzle
Across
  1. Long term weather effect
  2. An edible substance
  3. The practice of growing and farming crops
  4. A substance providing nourishment
  5. A liquid essential to life
Down
  1. Factors of an areas food security
  2. The condition defining the difference between plant and animals from inorganic materials
  3. A catastrophe causing large damage or loss of life
  4. In short supply of something
  5. being free from danger or threat
  6. Growing, advancing, etc
  7. A factor relating to wealth

12 Clues: An edible substanceGrowing, advancing, etcLong term weather effectA liquid essential to lifeA factor relating to wealthIn short supply of somethingbeing free from danger or threatFactors of an areas food securityA substance providing nourishmentThe practice of growing and farming cropsA catastrophe causing large damage or loss of life...

ITSS Cup: Mission Possible Edition 2026-03-26

ITSS Cup:  Mission Possible Edition crossword puzzle
Across
  1. Hidden entry point for agents and attackers.
  2. Digital notebook for mission intel.
  3. Spy proof your data with this.
  4. Security layer that acts like a force field.
  5. Agent's secure communication channel.
Down
  1. Controlled access to classified files.
  2. Command line for missions.
  3. Security alerter from mission control.
  4. First agent in the ITSS organization.
  5. Mission Impossible version of turn it off and on again.
  6. Encrypted message scrambling algorithm.
  7. Double agent that looks safe.

12 Clues: Command line for missions.Double agent that looks safe.Spy proof your data with this.Digital notebook for mission intel.First agent in the ITSS organization.Agent's secure communication channel.Controlled access to classified files.Security alerter from mission control.Encrypted message scrambling algorithm....

How well do you know MUN. 2017-11-26

How well do you know MUN. crossword puzzle
Across
  1. Refers to the UN Security Council's five permanent members.
  2. What is the oldest Polish MUN?
  3. Council A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
  4. A change to a draft resolution that is on the floor.
  5. A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
Down
  1. of Order These are used if you believe there was a mistake made in the rules of procedure.
  2. League of Nations At the very beginning, it was called ...
  3. Caucus A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
  4. General The head of the MUN.
  5. Nations An organization of independent states formed in 1945 to promote international peace and security.

10 Clues: General The head of the MUN.What is the oldest Polish MUN?A change to a draft resolution that is on the floor.Refers to the UN Security Council's five permanent members.League of Nations At the very beginning, it was called ...of Order These are used if you believe there was a mistake made in the rules of procedure....

Senior 2024 2024-03-22

Senior 2024 crossword puzzle
Across
  1. Plans to be a nurse practitioner.
  2. Might get a degree in early childhood at later date.
  3. Interested in Cyber Safety.
  4. Attending Wichita State University.
  5. Already completed senior coursework. Working.
  6. Plans to be a firefighter.
  7. Wants to attend OSU Institute of Technology
  8. currently working. Graduating a year early.
  9. Plans to be a Physical Therapist.
  10. Getting a full time job.
  11. Thinking about being an Esthetician.
  12. Plans to be a Radiologist Technician
Down
  1. plans to be a Phlebotomist.
  2. Thinking about Safety degree.
  3. Attending NOC Tonkawa.
  4. Joining National Guard.
  5. Attending Vo-Tech for welding.
  6. Plans to go into education.
  7. Wants to get a job in IT.
  8. pursing a degree as a speech pathologist.
  9. Pursuing a welding career.
  10. Currently working. Hasn't attended campsus Sr.yr.
  11. Wants to be a Forensic Scientist

23 Clues: Attending NOC Tonkawa.Joining National Guard.Getting a full time job.Wants to get a job in IT.Plans to be a firefighter.Pursuing a welding career.plans to be a Phlebotomist.Interested in Cyber Safety.Plans to go into education.Thinking about Safety degree.Attending Vo-Tech for welding.Wants to be a Forensic Scientist...

Types of Bullying 2013-08-12

Types of Bullying crossword puzzle
Across
  1. Using information and communication technologies to bullying someone.
  2. Treating someone like an outcast.
  3. Secretly hurting a person such as spreading rumours.
  4. Affecting someone's relationship, excluding, making the person feel left out etc.
Down
  1. Name calling, saying hurtful things.
  2. Hurting someone.
  3. Hurting a person's feelings.

7 Clues: Hurting someone.Hurting a person's feelings.Treating someone like an outcast.Name calling, saying hurtful things.Secretly hurting a person such as spreading rumours.Using information and communication technologies to bullying someone.Affecting someone's relationship, excluding, making the person feel left out etc.

Computing Test 2019-06-17

Computing Test crossword puzzle
Across
  1. hackers putting bad things in files to hack you
  2. the divide between people with internet and not
  3. hacking
  4. a law or a set of laws
  5. bullying online
Down
  1. intelligence that is not human
  2. someone who has data stored about them

7 Clues: hackingbullying onlinea law or a set of lawsintelligence that is not humansomeone who has data stored about themhackers putting bad things in files to hack youthe divide between people with internet and not

Security Awareness Challenge 2014-05-08

Security Awareness Challenge crossword puzzle
Across
  1. Who is the President of Global Security?
  2. What is the guidebook for Industrial Security?
  3. What does DSS stand for?
  4. What does SAP stand for?
  5. Who is the FSO for Burlington?
  6. What does a blue stripe on a badge signify?
  7. What is the data base for DoD clearances called?
  8. Who is the KMP for Burlington?
Down
  1. What is ITATS used for?
  2. What does PCL stand for?
  3. What is the contract between Raytheon and the Government called?
  4. What does VRS stand for?
  5. What is the investigation for a clearance called?

13 Clues: What is ITATS used for?What does PCL stand for?What does VRS stand for?What does DSS stand for?What does SAP stand for?Who is the FSO for Burlington?Who is the KMP for Burlington?Who is the President of Global Security?What does a blue stripe on a badge signify?What is the guidebook for Industrial Security?...

Security Awareness Quiz 2015-05-31

Security Awareness Quiz crossword puzzle
Across
  1. Approval from --------is needed to take photographs inside TCS premises(3)
  2. Password Should be minimum of -------Characters(5)
  3. Mails that should not be propagated(5)
  4. Manipulate people to give up confidential information(17)
  5. Isecurity quiz must be completed successfully atleast ------a year(4)
  6. Deleting important data/files with malicious intent is security---(6)
  7. Misuse of confidential data should be reported to ----(3)
Down
  1. Acceptance of ----- makes you liable for all activities done from the system using your ID(11)
  2. All sensitive information should be ----before disposing them(8)
  3. Client confidential information should be stored in ----(7)
  4. Security breach will lead to ------action(12)
  5. Use of unlicensed software is a breach of copyright and is ---------(7)
  6. Internet browsing is logged and monitored by -----(6)

13 Clues: Mails that should not be propagated(5)Security breach will lead to ------action(12)Password Should be minimum of -------Characters(5)Internet browsing is logged and monitored by -----(6)Manipulate people to give up confidential information(17)Misuse of confidential data should be reported to ----(3)...

Information Security Policy 2017-06-14

Information Security Policy crossword puzzle
Across
  1. The component of an effective EISP that answers the question, "What is this policy for?"
  2. ISSP stands for _ -Specific Security Policies.
  3. In the Bull's Eye Model, this is the center-most layer.
  4. NIST stands for the National Institute of Standards and _ .
  5. A _ is a detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
  6. In the Bull's Eye Model, this is one of the middle layers.
Down
  1. In the pyramid relationship for policies, practices, procedures, and guidelines; the two Industry, government, and regulatory exemplars standards and _ .
  2. Policy must be able to stand up in _ if challenged.
  3. In the pyramid relationship for policies, practices, procedures, and guidelines; these are the Practices sanctioned by management.
  4. EISP stands for Enterprise Information Security _ .
  5. Policy must be properly supported and _ .
  6. In the Bull's Eye Model, this is one of the middle layers.
  7. In the pyramid relationship for policies, practices, procedures, and guidelines; these influence an organizations documents?
  8. Policy should never conflict with this.

14 Clues: Policy should never conflict with this.Policy must be properly supported and _ .ISSP stands for _ -Specific Security Policies.Policy must be able to stand up in _ if challenged.EISP stands for Enterprise Information Security _ .In the Bull's Eye Model, this is the center-most layer.In the Bull's Eye Model, this is one of the middle layers....

STAAR Test Security 2021-06-29

STAAR Test Security crossword puzzle
Across
  1. A campus test administrator forgot to add speech to text on a student's online test,what type of procedural error is this?
  2. Account for every _____ document. Make sure the number of answer documents matches the number of students scheduled to test.
  3. Make a “_____ hour” check of all test sessions to ensure that all students are in the correct location, have been issued the correct assessments, and that oral administrations are being administered appropriately.
  4. On the _____ chart the location of the test session must be recorded and the room designation. Provide a brief description of the testing area (e.g., classroom, library, cafeteria.
  5. This status may be lowered by the state if violation of test security or confidential integrity if found.
  6. Raters for the Texas English Language Proficiency Assessment System (TELPAS) did not follow proper training or calibration procedures is an _______ irregularity.
  7. The person the CTC reports testing irregularities to.
Down
  1. A student was issued ______ test materials (e.g., test booklet, answer document, or test ticket) belonging to another student.
  2. Be familiar with the ___ resources and read the test administrator manuals.
  3. A test administrator reinforced testing strategies is what type of procedural error?
  4. A specific test was administered on the incorrect day, what type of procedural incident is this?
  5. Once test sessions have been completed,immediately collect and _____ any scratch paper, graph paper, or reference materials that students wrote on during the test, as well as any recordings.
  6. If this is found, the CTC must "other" the test and fill out the Locally Determined Disciplinary Action (LDDA) form.

13 Clues: The person the CTC reports testing irregularities to.Be familiar with the ___ resources and read the test administrator manuals.A test administrator reinforced testing strategies is what type of procedural error?A specific test was administered on the incorrect day, what type of procedural incident is this?...

FNaF Security Breach 2022-05-31

FNaF Security Breach crossword puzzle
Across
  1. Such a nice fello
  2. Aligator
  3. Night Guard
  4. The Orange Bear with a thunderbolt
  5. MOLTEN FREDDY?!?!
  6. A White Bird
  7. Protagonist
Down
  1. The "Best" of the 4
  2. Caused Freddy's Mental Crisis
  3. The Tidy & Light-Sensitive One
  4. Wind-up vent annoyance
  5. Furry
  6. DARNIT HE CAME BACK!

13 Clues: FurryAligatorNight GuardProtagonistA White BirdSuch a nice felloMOLTEN FREDDY?!?!The "Best" of the 4DARNIT HE CAME BACK!Wind-up vent annoyanceCaused Freddy's Mental CrisisThe Tidy & Light-Sensitive OneThe Orange Bear with a thunderbolt

Colorado voter security 2024-11-04

Colorado voter security crossword puzzle
Across
  1. – Judges undergo up to 12 hours of this before election day
  2. – All votes are cast using these types of ballots
  3. – Required on ballot boxes during transport
  4. – Identifying feature election judges wear
  5. – Equipment used to upload results to the Election Night Reporting website
  6. – Election judges must pass this check
Down
  1. – Judges who verify signatures work in these types of teams
  2. – Audit completed after the election to verify results
  3. – Party leaders appoint two people to this board for accuracy testing
  4. – Used to track ballots from printing to delivery
  5. – Required for voting in person
  6. – Type of test to ensure voting accuracy before and after the election
  7. – The place where ballots are stored and monitored

13 Clues: – Required for voting in person– Election judges must pass this check– Identifying feature election judges wear– Required on ballot boxes during transport– All votes are cast using these types of ballots– Used to track ballots from printing to delivery– The place where ballots are stored and monitored...

Return of ISIS Fighters who are Canadian Back to Canada Worksheet 2019-10-18

Return of ISIS Fighters who are Canadian Back to Canada Worksheet crossword puzzle
Across
  1. ISIS aims to create an _____ _____across Iraq, Syria and beyond.
  2. ISIS is trying to implement what type of law?
  3. ISIS fighters want to return back as the conditions in the prison camps are_____ for their families.
  4. Many security experts reported that this is a major ______ threat for Canada
  5. What does the acronym ISIS stand for?
  6. ISIS is a splinter sell of _______.
  7. Currently Canada is providing ______ ______ centers to rehabilitate ISIS fighters.
  8. ISIS is classified as what type of group?
Down
  1. ISIL stands for?
  2. Foreign women that marry ISIS fighters
  3. Women that marry ISIS fighters often meet them ________.
  4. Currently in Canada you can be persecuted for _______ if you try to leave to join ISIS, and get caught before you are able to.
  5. Canadian government is struggling to prosecute ISIS fighters due to lack of what?
  6. Currently the High Risk Returnee Interdepartmental Taskforce with help of the ______ is providing security and monitoring for returned ISIS fighters, as they go through rehabilitation programs.

14 Clues: ISIL stands for?ISIS is a splinter sell of _______.What does the acronym ISIS stand for?Foreign women that marry ISIS fightersISIS is classified as what type of group?ISIS is trying to implement what type of law?Women that marry ISIS fighters often meet them ________.ISIS aims to create an _____ _____across Iraq, Syria and beyond....

Airport 2022-05-18

Airport crossword puzzle
Across
  1. baggage
  2. place
  3. paper
  4. entering
  5. Control
  6. vehicle
  7. official
  8. baggage
Down
  1. GOL
  2. arriving
  3. womens'
  4. leaving
  5. car
  6. agents
  7. people

15 Clues: GOLcarplacepaperagentspeoplebaggagewomens'leavingControlvehiclebaggagearrivingenteringofficial

""United in Defense, Unbreakable in Bytes" 2025-10-05

""United in Defense, Unbreakable in Bytes" crossword puzzle
Across
  1. – Common MUN procedure before a MOD.
  2. – The EU aims to regulate this to counter fake news.
  3. – Russia’s favorite non-traditional weapon.
  4. – EU member that proposed the “Drone Wall” initiative.
  5. – System that guards against digital intrusions.
  6. – Small states rely on this to resist hybrid attacks.
Down
  1. – Term for combined military, cyber, and info warfare.
  2. – 2030 event that shocked the Union.
  3. – France’s key concern in the Drone Wall debate.
  4. – Belgium warned the EU could collapse if this breaks.
  5. – Debate format focused on specific subtopics.
  6. – Nordic supporter of the Drone Wall plan.

12 Clues: – 2030 event that shocked the Union.– Common MUN procedure before a MOD.– Nordic supporter of the Drone Wall plan.– Russia’s favorite non-traditional weapon.– Debate format focused on specific subtopics.– France’s key concern in the Drone Wall debate.– System that guards against digital intrusions....

DCT Crossword Puzzle 2025-12-18

DCT Crossword Puzzle crossword puzzle
Across
  1. Unplanned interruption of IT services
  2. Device used to connect multiple networked computers
  3. First application most staff check in the morning
  4. Document sent to clients detailing cost and scope
  5. Secure method used to access company systems remotely
Down
  1. Protection against malware, ransomware, and cyber threats
  2. The process of identifying and resolving technical issues
  3. A system update meant to fix bugs or vulnerabilities
  4. A formal agreement signed by client and company
  5. Financial document required for reimbursement claims
  6. Slow system response that frustrates users
  7. Central location where company data is stored

12 Clues: Unplanned interruption of IT servicesSlow system response that frustrates usersCentral location where company data is storedA formal agreement signed by client and companyFirst application most staff check in the morningDocument sent to clients detailing cost and scopeDevice used to connect multiple networked computers...

Browsing Safely 2025-06-19

Browsing Safely crossword puzzle
Across
  1. that automatically displays or downloads advertisements when you're online, often without your full knowledge or consent.
  2. or junk messages, usually advertisements, sent over the internet, often in large amounts.
  3. method used by cybercriminals to trick people into revealing sensitive information (like passwords or bank details) by pretending to be a trustworthy source (like a bank or company).
  4. process of converting information into a secret code to prevent unauthorized access. It helps keep data safe when sent over the internet.
  5. use of electronic communication to bully or harass someone, typically by sending threatening
  6. software designed to damage, disrupt, or gain unauthorized access to computers or networks (examples: viruses, worms, spyware).
  7. list of websites, programs, or users that are blocked or denied access to a system or network because they are considered harmful or untrustworthy.
Down
  1. security system (software or hardware) that blocks unauthorized access to or from a private network or computer, helping to protect against cyber threats.
  2. Theft-Stealing someone’s personal information (like name, credit card number, or password) to commit fraud or crimes.
  3. who commit crimes using the internet or computers.
  4. type of malware that secretly gathers information from your device (like browsing habits or personal data) without your permission.
  5. activities carried out using computers or the internet, such as hacking, data theft, or spreading viruses.
  6. list of approved or trusted websites, programs, or users that are allowed to access a system or network.
  7. files stored on your computer by websites to remember information about you, like login details or site preferences.
  8. Password-A password that is hard to guess, usually made up of a mix of uppercase and lowercase letters, numbers, and special characters (e.g., P@ssw0rd!123), and is at least 8–12 characters long.

15 Clues: who commit crimes using the internet or computers.or junk messages, usually advertisements, sent over the internet, often in large amounts.use of electronic communication to bully or harass someone, typically by sending threateninglist of approved or trusted websites, programs, or users that are allowed to access a system or network....

World Powers 2017-06-17

World Powers crossword puzzle
Across
  1. type of devastating weapon used during WW2
  2. solving of problems through talking
  3. a country that exerts influence over the rest of the world
  4. a word describing improvements in how things are done
  5. a term referring to army, navy and air force
Down
  1. refers to culture and tradition
  2. includes the study of life expectancy, age, gender
  3. making money through trade describes this type of power
  4. relating to governments
  5. type of attack using the internet

10 Clues: relating to governmentsrefers to culture and traditiontype of attack using the internetsolving of problems through talkingtype of devastating weapon used during WW2a term referring to army, navy and air forceincludes the study of life expectancy, age, gendera word describing improvements in how things are done...

digital citizenship 2016-03-29

digital citizenship crossword puzzle
Across
  1. technology with a big screen
  2. social media site with a bird as its logo
  3. a creator of things
  4. a social media site that you can post photos
  5. a person who bullies someone in cyber space
  6. world wrestling entertainment
Down
  1. social media site where people can watch or upload videos
  2. social media site that people use to post photos
  3. a watcher or someone who uses things
  4. a social media site owned by mark zuckerberg

10 Clues: a creator of thingstechnology with a big screenworld wrestling entertainmenta watcher or someone who uses thingssocial media site with a bird as its logoa person who bullies someone in cyber spacea social media site owned by mark zuckerberga social media site that you can post photossocial media site that people use to post photos...

Siti Mardhiyah 2025-07-24

Siti Mardhiyah crossword puzzle
Across
  1. seorang pencetus istilah big data
  2. kemampuan menggunakan berbagai macam alat digital dengan baik
  3. kemampuan yang dapat dengan cepat dan elastis ditetapkan
  4. tempat untuk menyimpan aplikasi beserta database
  5. sistem kecerdasan buatan yang telah dilatih untuk berinteraksi dalam percakapan berbasis teks
  6. kecerdasan buatan disebut juga
Down
  1. hard driver komputer lokal
  2. cyber physical sistem
  3. pemahaman tentang keamanan digital, privasi, dan etika dalam penggunaN teknologi digital
  4. konsep berpikir yang melibatkan kerangka dan proses berpikir komputasional

10 Clues: cyber physical sistemhard driver komputer lokalkecerdasan buatan disebut jugaseorang pencetus istilah big datatempat untuk menyimpan aplikasi beserta databasekemampuan yang dapat dengan cepat dan elastis ditetapkankemampuan menggunakan berbagai macam alat digital dengan baikkonsep berpikir yang melibatkan kerangka dan proses berpikir komputasional...

Bullying 2025-09-30

Bullying crossword puzzle
Across
  1. Bullying melalui media internet disebut bullying
  2. Orang yang melakukan bullying disebut
  3. Bullying dengan cara mengucilkan disebut bullying
  4. Bullying dengan cara memukul disebut bullying
  5. Bullying dengan cara mengejek disebut bullying
  6. Orang yang menjadi sasaran bullying disebut
Down
  1. Sikap yang harus dimiliki untuk mencegah bullying adalah
  2. Salah satu tempat yang paling sering terjadi bullying di sekolah adalah
  3. Lawan kata “teman” yang sering muncul dalam bullying adalah
  4. Perasaan takut, cemas, atau tertekan akibat bullying disebut

10 Clues: Orang yang melakukan bullying disebutOrang yang menjadi sasaran bullying disebutBullying dengan cara memukul disebut bullyingBullying dengan cara mengejek disebut bullyingBullying melalui media internet disebut bullyingBullying dengan cara mengucilkan disebut bullyingSikap yang harus dimiliki untuk mencegah bullying adalah...

MeMe & Me 2025-11-13

MeMe & Me crossword puzzle
Across
  1. smooth and glossy.
  2. confess to be true or to be the case.
  3. offering the promise of an attractive or enjoyable experience.
  4. relating to or characteristic of the culture of computers, the internet, and virtual reality.
  5. loud, harsh piercing cries or noises.
Down
  1. crackling or hissing from telecommunication systems.
  2. grouping of keyboard characters
  3. at once, instantly, as soon as
  4. past and past participle of earn.
  5. an announcement or signal warning of danger.

10 Clues: smooth and glossy.at once, instantly, as soon asgrouping of keyboard characterspast and past participle of earn.confess to be true or to be the case.loud, harsh piercing cries or noises.an announcement or signal warning of danger.crackling or hissing from telecommunication systems.offering the promise of an attractive or enjoyable experience....

Security in Cognizant 2012-11-19

Security in Cognizant crossword puzzle
Across
  1. General term for software programs that have been designed with or can be used for malicious intent
  2. What sort of secure communication can be used to send code or project-critical documents
  3. When access to a work area is no longer required, it should be informed immediately to the Manager and
  4. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be
  5. individuals other than Associates who enter Cognizant workplaces
Down
  1. The property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  2. reserves the right to monitor, access, and disclose any IM communication
  3. The property of safeguarding the accuracy and completeness of assets
  4. Any Person Working for Cognizant utilizing Cognizant Email Infrastructure
  5. Anything that has value to the organization
  6. What should be done with the project related documents that are no longer needed
  7. Associates can download software for business use only after obtaining approval from their manager and
  8. The property of being accessible and usable upon demand by an authorized entity

13 Clues: Anything that has value to the organizationindividuals other than Associates who enter Cognizant workplacesThe property of safeguarding the accuracy and completeness of assetsreserves the right to monitor, access, and disclose any IM communicationAny Person Working for Cognizant utilizing Cognizant Email Infrastructure...

July Security Crossword 2021-07-27

July Security Crossword crossword puzzle
Across
  1. The body who awards World Heritage status
  2. the purposeful killing of a monarch or sovereign
  3. an intergovernmental military alliance between 28 European countries and 2 North American
  4. (5,10) type of security focused entirely on protecting an individual
  5. COVID Variant & 4th letter in Greek & Phonetic alphabet
  6. Military organization seeking power in Afghanistan
Down
  1. a device that gives a high energy electric shock to the heart
  2. Sports festival originated in Ancient Greece
  3. a large country house with lands.
  4. A flaming Cocktail used as a weapon
  5. Psychoactive drug with numbing properties
  6. the act of judging or deciding the amount, value, quality, or importance of something
  7. Name of a hand-held metal detector

13 Clues: a large country house with lands.Name of a hand-held metal detectorA flaming Cocktail used as a weaponThe body who awards World Heritage statusPsychoactive drug with numbing propertiesSports festival originated in Ancient Greecethe purposeful killing of a monarch or sovereignMilitary organization seeking power in Afghanistan...

Security+ Questions 1 2024-03-15

Security+ Questions 1 crossword puzzle
Across
  1. An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of
  2. A function that converts an input (or 'message') into a fixed-size string of bytes, typically a digest that is unique to each unique input. It is used in various security processes to ensure data integrity
  3. A type of control that are designed to prevent an attacker from attempting to violate security policies
  4. Procedural mechanisms that focus on the mechanics of the risk management process
  5. functions or codes that are placed inside of other programs that will activate when set conditions are met instead of independent malicious programs
  6. Groups of remotely controlled systems that are used by attackers who control them to perform various actions such as additional infections and denial of service attacks
  7. Malware that takes over a computer then demands a ransom or payment
  8. Malware that is specifically designed to allow attackers to access a system through a backdoor
Down
  1. A cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
  2. The process of converting information or data into a code, especially to prevent unauthorized access. It secures data by making it unreadable without the proper decryption key
  3. Programs that capture keystrokes from keyboards, mouse movement, touchscreen inputs, or credit card swipes from attached devices
  4. Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications
  5. A term that describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users

13 Clues: Malware that takes over a computer then demands a ransom or paymentProcedural mechanisms that focus on the mechanics of the risk management processMalware that is specifically designed to allow attackers to access a system through a backdoorA type of control that are designed to prevent an attacker from attempting to violate security policies...

Information Security 2025-01-06

Information Security crossword puzzle
Across
  1. Malicious Software
  2. Malware that attaches to programs
  3. Designed to lessen the risk of cyber attack
  4. Protect with up to date software, encrypted information, limited employee access
Down
  1. Protect with strong passwords and password storage
  2. Protection of ownership and reputation
  3. Acceptable Use Policy

7 Clues: Malicious SoftwareAcceptable Use PolicyMalware that attaches to programsProtection of ownership and reputationDesigned to lessen the risk of cyber attackProtect with strong passwords and password storageProtect with up to date software, encrypted information, limited employee access

Unit 8 2024-05-08

Unit 8 crossword puzzle
Across
  1. Banks
  2. Japanese attack
  3. Youngest govenor
  4. Major crop
  5. Rural
  6. Transport
  7. Airplane
Down
  1. exports
  2. increase demand
  3. Social Security
  4. Civilian
  5. Agricultural
  6. Georgia representative
  7. Programs
  8. Insect

15 Clues: BanksRuralInsectexportsCivilianProgramsAirplaneTransportMajor cropAgriculturalincrease demandSocial SecurityJapanese attackYoungest govenorGeorgia representative