cyber security Crossword Puzzles
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
cybersicuritie eng briac 2024-03-13
Across
- A barrier against network threats
- Harmful software
- is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
- Fixing software vulnerabilities
- Protection against online threats
- Leaking sensitive information have 1 space (_)
- Unauthorized access
Down
- Double security confirmation for login have 1 space (_)
- Online assault
- Weakness in security
- Tricking people to reveal private information
- Scrambling data to keep it secret
12 Clues: Online assault • Harmful software • Unauthorized access • Weakness in security • Fixing software vulnerabilities • A barrier against network threats • Scrambling data to keep it secret • Protection against online threats • Tricking people to reveal private information • Leaking sensitive information have 1 space (_) • Double security confirmation for login have 1 space (_) • ...
Cyber Challenge Week 2 2023-09-21
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates.
- Method of converting plain text into a code that can only be read by authorised parties.
- Malicious software that can cause damage to systems or data
- _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
- A form of malware in which files are locked until a payment is made to the attacker
- Malicious emails that request sensitive information or opening of attachments
- a string of random words that are a more secure version of passwords.
Down
- A type of software designed to protect against malware and other threats
- Always _ _ _ _ your computer when you leave your desk.
- A method of logon that requires you to present two or more pieces of evidence to prove your identity.
- An update to software that fixes a vulnerability or bug.
- Online harassment.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
- A passwordless option for logging into devices
- A form of phishing that targets high profile individuals
- _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
- Errors or vulnerabilities in software
17 Clues: Online harassment. • Errors or vulnerabilities in software • A passwordless option for logging into devices • Always _ _ _ _ your computer when you leave your desk. • An update to software that fixes a vulnerability or bug. • A form of phishing that targets high profile individuals • Malicious software that can cause damage to systems or data • ...
Financial Vocabulary 2013-10-13
24 Clues: obrót • spółka • aktywa • wycena • waluta • czynsz • oddział • podatek • prowizja • bankomat • zatrzymać • inwentarz • amortyzacja • tygodniówka • zobowiązanie • wypłacalność • ustalanie ceny • kapitał własny • kredyt hipoteczny • dźwignia finansowa • płynność finansowa • koszty nieprodukcyjne • zasiłek social ........ • wyciągać (pieniądze z konta)
Woordenschat Periode 6 Deel 3 2020-12-07
24 Clues: wet • arm • privé • tiener • mening • oorlog • beleid • moslims • armoede • koningin • politiek • getrouwd • wettelijk • veiligheid • maatregelen • bibliotheek • maatschappij • macht, kracht • interpretatie • maatschappelijk • scène, wereldje • systeem, stelsel • plaatselijk, lokaal • methode, manieren om iets te doen
words 2021-03-16
26 Clues: 3d • au • padi • nõrk • hull • eelis • idioom • kandik • hapnik • lähedal • haarama • asundus • karistus • kihlatud • somebody • suudlema • memoriaal • something • ülemkohus • katuseala • turvalisus • kohustuslik • tähistamine • uusarendusala • suhtlemisoskused • kohtamine(musimusi kalli kalli)
Smart moves 2 kpl 17 2017-05-10
Across
- osoittaa
- luokkakaveri
- lentää
- tuskin
- saapua (jonnekin)
- (tässä:) toimia
- lentokenttä
- varusteet, tavarat
- poikki, ’rättiväsynyt’
- kiivetä
- maisemat
- kotikaupunki
Down
- näky, näkeminen
- nuorisohotelli
- silti, kuitenkin
- kolkko
- ylellisyys
- lopen uupunut
- läpi
- innostunut, jännittynyt
- matkustaa
- turvatarkastus
- mennä joltakin ohi
- laskeutua
24 Clues: läpi • kolkko • lentää • tuskin • kiivetä • osoittaa • maisemat • matkustaa • laskeutua • ylellisyys • lentokenttä • luokkakaveri • kotikaupunki • lopen uupunut • nuorisohotelli • turvatarkastus • näky, näkeminen • (tässä:) toimia • silti, kuitenkin • saapua (jonnekin) • varusteet, tavarat • mennä joltakin ohi • poikki, ’rättiväsynyt’ • innostunut, jännittynyt
english-dutch 141 2018-07-26
26 Clues: no • job • not • soup • sick • sure • about • those • always • theory • trained • airport • infected • succcess • stricter • complete • saturday • locations • dangerous • something • work area • government • selection days • security guards • to asks, questions • almost, rather well
9/11 2024-09-11
26 Clues: Vol • Peur • Choc • Avion • Crash • Attaque • Enquête • Victimes • Héroïsme • Invasion • Sécurité • Mémorial • Pompiers • Pentagone • Survivant • Sauvetage • Évacuation • Terrorisme • Patriotisme • Traumatisme • Surveillance • Détournement • Effondrement • Tours Jumelles • Centre du Commerce Mondial • épicentre(site de l'attentat)
Alfa Company 1st 2025-10-28
24 Clues: E-1 • E-4 • SIR • SIR • OPEN • CODE • SNAP • CODE • STAFF • 5 1911 • VALUES • CLOSED • GENERAL • SELFLESS • PHONETIC • REPORTING • SAFETY S2 • LET US TRY • TO ENCOURAGE • STAR-SPANGLED • OF ALLEGIENCE • DEFINITION OF • UNITED STATES • EDWIN ALEXANDER
The UK - A divided country Level 2 2026-02-20
20 Clues: Lønn • Utvide • Forbli • Misnøye • Å skille • Forskning • Anstendig • Forsyning • Sikkerhet • Tidsepoke • Vesentlig • Muligheter • Tilstrekkelig • Folkeavstemning • Minke/gå nedover • Et skille/avstand • Befolkningssammensetning • Economic and political union • The UK leaving the European Union • Being sceptic to the European Union
model UN 2024-05-20
Across
- With what should an operative clause end? (punctuation)
- This committie of the UN has a variation of the greek parthanon on its flag
- The first UN peasekeeping mission was in responce to this nation's war for indipendence
- What does a preambulatory clause in a resolution state?
- As of 2005, this continent was 'host' to the majority of ongoing UN peacekeeping missions
- Nation in africa that was a member of the first security council
- after what war was the UN established
Down
- members of the secuirty counsil not including the 5 perminate members
- The UN consists of this many original principal organs which was established under the UN charter in 1945
- Last name of the president who ispired the creation of the UN
- Which institution carries out the day-to-day running of the UN?
- Number of perminate members of the security council
- Normally, the elected members of the Security Council serve two-year terms, this country is the exception to the rule
- Headquarters of the UN
14 Clues: Headquarters of the UN • after what war was the UN established • Number of perminate members of the security council • With what should an operative clause end? (punctuation) • What does a preambulatory clause in a resolution state? • Last name of the president who ispired the creation of the UN • Which institution carries out the day-to-day running of the UN? • ...
Sampo 2024-10-16
14 Clues: Rasismi • köyhyys • koulutus • hallitus • koulutus • oikeukia • Demokratia • Työtttömyys • rikollisuus • presidentti • Epätasa-arvo • poliitikkoja • sosiaaliturva • Terveydenhoito
The IPO Process 2022-01-25
Across
- Lists the number of shares of stock a company can sell
- Shares held by investors are called ________ shares
- Market in which a security is sold for the first time
- The type of corporations that tend to use private placement
- A document showing the legal and financial situation of a company to the public
- In a private ________, a company knows who exactly will buy its securities
- One of the things an investor must consider before investing in a company during an IPO
- Stocks that have previously been sold in the marketplace are called _________ shares
Down
- Offering of shares that occurs after the company's initial public offering
- Name for stock a company has bought back
- The issue price of a share during an IPO is known as the __________ price
- This type of investor may purchase a security from a company using private placement
- Where stock must be registered prior to being sold
- A red ______ is used to show financial information to the public while a security is awaiting SEC approval
- Shares of stock that a company can sell are called ________ shares
15 Clues: Name for stock a company has bought back • Where stock must be registered prior to being sold • Shares held by investors are called ________ shares • Market in which a security is sold for the first time • Lists the number of shares of stock a company can sell • The type of corporations that tend to use private placement • ...
IT-Security 2016-01-29
Across
- und Junk E-Mail unerwünschte Werbemails
- versteckt in einem scheinbar nützlichen Programm
- Programme, die Tastatureingaben mitprotokollieren
- Mobbing mithilfe von elektronischen Medien
- Überbegriff für unerwünschte, schädliche Stoffe
Down
- Personen die illegalen Computersysteme eindringen und Sicherheitssysteme überwinden
- Betrugsmethode, bei der User auf gefälschte Webseiten umgeleitet wird
- Viren, die als Programm in ein Dokument eingebettet sind
8 Clues: und Junk E-Mail unerwünschte Werbemails • Mobbing mithilfe von elektronischen Medien • Überbegriff für unerwünschte, schädliche Stoffe • versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Viren, die als Programm in ein Dokument eingebettet sind • Betrugsmethode, bei der User auf gefälschte Webseiten umgeleitet wird • ...
Cyberbullying 2024-10-08
Across
- Where does cyberbullying take place?
- Occurs when a cyberbully continues to bully.
- Someone that harms someone through a device.
Down
- An electronic device that people have at home.
- Something that can provided to a cyber victim.
- Cyberbullying is generally undertaken ______
- Who can be a cyberbully?
- What should you do if you see cyberbullying?
8 Clues: Who can be a cyberbully? • Where does cyberbullying take place? • Cyberbullying is generally undertaken ______ • Occurs when a cyberbully continues to bully. • What should you do if you see cyberbullying? • Someone that harms someone through a device. • An electronic device that people have at home. • Something that can provided to a cyber victim.
Qatar Cross Word 2021-11-24
6 Clues: Full Form of QNA • Slogan Raised In Qatar • Thing related to Cyber bullying • Historic Visit To Break Blockade • Thing that happened with Saudi Arabia • capital of independent Palestinian state
Word formation 2024-02-24
6 Clues: used to eat • related to cyber attacks • used when you are laughing • which is conducted in colleges • with out this your phone wont open • Our childhood incomplete with this
BULLYINH 2023-09-22
6 Clues: : ----- BULLYING; online bullying • : someone who watches bullying happen • : A online service to help with bullying • : -------- BULLYING; harming someone's body • : ------ BULLYING; bullying someone with words • : --------- BULLYING: controlling someone's use of money
Solve Me M. 2023-08-11
6 Clues: A's Easter Egg • M's Easter Egg • What did I put inside? • What is missing from cyber? • Colour of A's drink from clue 5? • What is the mistake in the treasure hunt?
IT Professions 2024-04-17
Across
- Designs, develops, and maintains software applications or systems.
- Analyzes an organization's IT systems and processes to improve efficiency and functionality through technology solutions.
- Protects computer systems and networks from security breaches, investigates security incidents, and implements security measures to safeguard data.
- Analyzes and interprets complex data sets to extract insights and inform business decisions, using statistical analysis, machine learning, and data visualization techniques.
Down
- Designs and manages cloud computing infrastructure and solutions, including deployment, integration, and optimization of cloud services.
- Manages and maintains an organization's computer networks, including hardware, software, and security protocols.
- Administers, maintains, and secures databases, ensuring data integrity and accessibility.
- Oversees and manages IT projects from initiation to completion, ensuring they are delivered on time, within budget, and meet quality standards.
- Provides technical assistance, troubleshoots hardware and software issues, and assists users with IT-related problems.
- Designs, builds, and maintains websites and web applications using programming languages, frameworks, and technologies.
10 Clues: Designs, develops, and maintains software applications or systems. • Administers, maintains, and secures databases, ensuring data integrity and accessibility. • Manages and maintains an organization's computer networks, including hardware, software, and security protocols. • ...
Spanish 2022-11-29
19 Clues: gate • plane • board • flight • travel • luggage • arrival • airport • suitcase • itinerary • departure • bathing suit • travel agency • boarding pass • to take a taxi • identification • to get in line • to go on vacation • to go through security
Social Media 2021-01-11
Across
- Social media can give you a negative __________
- Things that are shared on youtube and tiktok
- You can use social media on your _____
- Social media can be bad for your _____ health
- A social media platform where you share videos and dances
- A social media platform where you share photos
Down
- Social media platform, owned by Mark Zuckerberg
- Stories that are not true
- Online harassment is another word for cyber-______
- You can do this with friends on social media
- Social media can make you _____
11 Clues: Stories that are not true • Social media can make you _____ • You can use social media on your _____ • Things that are shared on youtube and tiktok • You can do this with friends on social media • Social media can be bad for your _____ health • A social media platform where you share photos • Social media platform, owned by Mark Zuckerberg • ...
Skibinska 3a 2023-03-22
Across
- zbiór zasad dotyczących dobrego i bezpiecznego zachowania w internecie
- zamieszczanie kontrowersyjnych, napastliwych treści w celu zwrócenia na siebie uwagi
- lęk przed wypadnięciem z obiegu
- technika obróbki obrazu polegająca na łączeniu ludzkich twarzy
- mylne informacje rozpowszechniane bez złej intencji
- wysyłanie wielu niechcianych wiadomości do dużej ilości osób w celu reklamy
- forma komunikacji elektronicznej w której przekazem jest seksualnie sugestywny obraz
- dynamiczne regularnie aktualizowanie strony internetowe na dany temat
Down
- nieprawdziwa informacja, fake news
- zabezpieczenie programu
- przemoc z użyciem urządzeń elektronicznych
- rodzaj cyber ataku
- rodzaj rozmowy między dwoma lub wieloma użytkowników za pośrednictwem internetu
13 Clues: rodzaj cyber ataku • zabezpieczenie programu • lęk przed wypadnięciem z obiegu • nieprawdziwa informacja, fake news • przemoc z użyciem urządzeń elektronicznych • mylne informacje rozpowszechniane bez złej intencji • technika obróbki obrazu polegająca na łączeniu ludzkich twarzy • dynamiczne regularnie aktualizowanie strony internetowe na dany temat • ...
June Crossword: How to Secure the Manufacturing Edge 2025-05-27
Across
- Feature of edge solutions that helps in maintaining data privacy
- Method to protect data both in transit and at rest
- Company providing edge computing solutions for manufacturing cybersecurity
- Type of computing that processes data locally to reduce network transmission
Down
- Advanced capability to identify and respond to security incidents
- Critical aspect of manufacturing cybersecurity involving GDPR and ISO standards
- Process to ensure the integrity of the system and prevent unauthorized access
- Unified security practices help in minimizing this
- Frequent actions to patch vulnerabilities and protect against new threats
- Regular checks to identify and address security vulnerabilities
10 Clues: Unified security practices help in minimizing this • Method to protect data both in transit and at rest • Regular checks to identify and address security vulnerabilities • Feature of edge solutions that helps in maintaining data privacy • Frequent actions to patch vulnerabilities and protect against new threats • ...
Social Media 2014-05-12
Across
- search engine
- an application
- a type of bird vocalization
- A type of bullying that is a risk of social networking
- Social media requires the use of
- old fashioned newsfeed
- Famous Social Community Site
- site that allows you to share your story
- #
- if a business is going to use social media they should implement a ------
- A benefit of social networking is being able to _ _ _ _ _ things with your friends and family
- free video and instant messaging site
Down
- a diary like post
- an online photo-sharing, video-sharing and social networking service
- negative feedback
- Famous social content site for videos
- a microblogging platform and social networking website owned by Yahoo!
- most popular online social networking service
- pictures & ideas pin board
- self-portrait photograph
- an act of online robbery
- social media can help increase a businesses -----
22 Clues: # • search engine • an application • a diary like post • negative feedback • old fashioned newsfeed • self-portrait photograph • an act of online robbery • pictures & ideas pin board • a type of bird vocalization • Famous Social Community Site • Social media requires the use of • Famous social content site for videos • free video and instant messaging site • ...
ffff 2024-01-05
Across
- extortionist - electronically extorts u
- - a small text file
- Strategist - person hwo intergrates mobile stuff
- Device Convergence - technologies that overlap
- - a series of statements
- Line - an always on physcial connection
- Device- ardware component that allows you to enter data
- - comparing stuff to create criteria
- - A MORE EXPENSIVE DVD
- deleivers requested webpages Online
- - a compromised computer
- memory - can be erashed faster
Down
- sandwiches a liquid compund
- - measure of suitability
- - apples operationg system
- Device - hardware component that conveys information
- - saves data
- Network - to share their interests, ideas, stories, photos, music, and videos with other registered users.
- - an flying electronic
- - time to travel from one place to another
- - a sound
- - a small program
- - wirelless comunications
- - application of human intelligence to computers
- - makes inernet faster
- System - 1s and 0s
26 Clues: - a sound • - saves data • - a small program • System - 1s and 0s • - a small text file • - an flying electronic • - A MORE EXPENSIVE DVD • - makes inernet faster • - measure of suitability • - a series of statements • - a compromised computer • - wirelless comunications • - apples operationg system • sandwiches a liquid compund • memory - can be erashed faster • ...
Zach's Movie Madness 2023-02-10
Across
- Extremely rare mineral
- "That's some ___!"
- You have heard of him
- Cyber-savior
- Bat country
- Christmas classic, to some
- No Merlot!
- Airplane terrorists
- Sensei of Bruce Lee
- Island companion
- It's a mad, mad, mad, mad movie
- Poetic applause, or mass murder
- Wordle, sort of
- FBI Student
- Test for space cadets
- Rodney's house
- Art medium
- Montana's export
- Cool eating competition food
Down
- Goblin king
- "The hills are alive"
- Navy bird
- Elegant weapon
- High school football team
- Scorsese, Coppola, Lucas, etc.
- French Flag
- Hairy detective
- Bellagio, Mirage, MGM Grand enemies
- Nostromo Crewmember
- Dirty cop
- Adventurer, or cheap
- Student, conqueror
- Aquatic adventurer
- The old new evolution of film
- Spooky FBI Agent
- Tricksy
- Officer stabbed by Santa
37 Clues: Tricksy • Navy bird • Dirty cop • No Merlot! • Art medium • Goblin king • French Flag • Bat country • FBI Student • Cyber-savior • Elegant weapon • Rodney's house • Hairy detective • Wordle, sort of • Island companion • Spooky FBI Agent • Montana's export • "That's some ___!" • Student, conqueror • Aquatic adventurer • Nostromo Crewmember • Airplane terrorists • Sensei of Bruce Lee • Adventurer, or cheap • ...
Teacher Appreciation Week Crossword Puzzle 2023-04-20
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Teacher Appreciation Crossword Answers 2023-05-01
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Crossword Puzzle 2022-12-04
Across
- An adorable name for Hershey Bars
- Metal Gear character who likes to wrestle senators
- A holiday treat
- Family known for their Vacations
- An 80s “Vice”
- “I see you enjoy Super Mario…”
- Fails QTE
- Subject of your greatest cyber crime
- Connor’s mission in Detroit Become Human
- 1988’s olympic winter
- Early 90s Kindergarten teacher
- The edgier Battle Star
Down
- Lost with Bentsen in ’88
- a renowned piece of art
- A double entendre TV show
- Dating sim meets supernatural teen adventure
- A wholesome healthy breakfast
- “Resident” Albert
- Not the coffee shop
- 1,000 watts aren’t enough
- No___ GTA RP
- Themed Oreos are highly…
- A rare candy bar
- Your on a first name basis with this Galactica Admiral
- MultiVersus competitor and semi-retired Fortnite pro
25 Clues: Fails QTE • No___ GTA RP • An 80s “Vice” • A holiday treat • A rare candy bar • “Resident” Albert • Not the coffee shop • 1988’s olympic winter • The edgier Battle Star • a renowned piece of art • Lost with Bentsen in ’88 • Themed Oreos are highly… • A double entendre TV show • 1,000 watts aren’t enough • A wholesome healthy breakfast • “I see you enjoy Super Mario…” • ...
Eagle 101 topics 2025-10-06
Across
- the happiness chemical
- a strong feeling of annoyance and hostile behavior
- the act of working together for a common purpose to achieve something
- she was the vaping lessons speaker
- achieve something successfully
- Friday videos
- being nice and considerate to someone
- the feeling that something good can and will happen
- an intense and irrational fear of something
- a natural response to fear or stress
- an unstoppable habit
Down
- the action of organizing something
- The ability to share feelings of another
- Online bullying
- believing in your self
- Standing up aginst behaviors that are mean and harmful happening over and over agin
- looking at someone while their talking
- a response to lifes pressures
- able to be rellied on as honest and truthful
- Drug Abuse resistance education
20 Clues: Friday videos • Online bullying • an unstoppable habit • the happiness chemical • believing in your self • a response to lifes pressures • achieve something successfully • Drug Abuse resistance education • the action of organizing something • she was the vaping lessons speaker • a natural response to fear or stress • being nice and considerate to someone • ...
Cyber Security 2024-10-21
2 Clues: the identity of a user attempting to access a system Authnetication • process of converting plain text or data into ciphertext using cryptographic Encryption algorithms
CYBER SECURITY 2022-10-21
En el aeropuerto 2022-05-24
19 Clues: gate • flight • airport • customs • arrival • to board • passport • airplane • passenger • departure • plane ticket • waiting room • baggage claim • boarding pass • security check • public bathrooms • to check luggage • to pack a suitcase • to exchange currency
Information Misuse 2024-03-18
Digital media literacy 2023-09-14
Across
- something unwed to accept cokies to use
- a app based on a red and white logo that’s starts with a p
- a social media app based on a blue logo
- a practical subject in our school
- bullying a type of bullying in line
- something u can take pictures on
- a social media app known for its dances
Down
- a social media app that you post on
- an app that goes tweet tweet
- you can listen to music from
- games that. U play on ur phone
- something that we use daily
12 Clues: something that we use daily • an app that goes tweet tweet • you can listen to music from • games that. U play on ur phone • something u can take pictures on • a practical subject in our school • a social media app that you post on • bullying a type of bullying in line • something unwed to accept cokies to use • a social media app based on a blue logo • ...
Bullying 2024-05-08
Across
- someone who uses strength, power or words to harm or intimidate others
- a preconceived opinion or feeling
- someone what to do if somebody is bullying you
- an organized group of criminal activity
- a popular belief about specific types of individuals
- a reason somebody would bully
Down
- type of bullying where you call somebody names
- type of bullying where you hit somebody
- up what to do if you are a bystander
- bullying over the internet
- someone who is present at an event
- to put up with something or somebody unpleasant
12 Clues: bullying over the internet • a reason somebody would bully • a preconceived opinion or feeling • someone who is present at an event • up what to do if you are a bystander • type of bullying where you hit somebody • an organized group of criminal activity • type of bullying where you call somebody names • someone what to do if somebody is bullying you • ...
cyber security 2017-06-30
Cyber Security 2022-06-15
CYBER SECURITY 2023-09-01
CYBER SECURITY 2023-09-01
Daily Crossword 2023-05-12
Across
- Type of software program or code designed to harm, exploit, or damage computer systems, networks, or devices. It can be spread through various means, such as email attachments, malicious websites, infected software downloads, or even through physical devices such as USB drives. Can cause a range of problems, including data loss, system crashes, identity theft, and financial loss.
- A secret code or phrase that is used to gain access to a computer system, network, website, or other digital resource. Are typically created by users and are kept confidential to prevent unauthorized access to their accounts or data. Should consist of a combination of letters, numbers, and special characters, and to be sufficiently complex and unique in order make it difficult for others to guess or crack. It's important to do so and to change them regularly to help protect against security threats, such as hacking and identity theft.
- Type of online scam in which attackers use fraudulent emails, websites, or other forms of electronic communication to trick individuals into providing sensitive information, such as passwords, credit card numbers, or social security numbers. Will appear to come from a legitimate source, such as a bank or online service provider, and will request that the recipient click on a link or provide personal information.
- Refers to wireless internet access that is provided in public places such as cafes, airports, libraries, hotels, and other locations. Are typically free or provided for a fee, and allow users to connect to the internet wirelessly using their mobile devices or laptops. While it can be convenient and accessible, it also carries some security risks, as it is often unsecured and open to anyone within range. This can make it easy for hackers and cybercriminals to intercept and access data transmitted over the network, such as login credentials, credit card numbers, or personal information.
- Type of cyber attack in which an attacker impersonates a legitimate entity or source, such as a website, email address, or IP address, to deceive users and gain access to sensitive information or systems.
Down
- A security system that is designed to monitor and control incoming and outgoing network traffic between a computer or network and the internet. Are used to prevent unauthorized access to a network or device by blocking potentially malicious traffic, such as viruses, malware, and hackers. Works by examining packets of data as they move through the network and enforcing a set of rules or policies that determine which packets are allowed to pass through and which are blocked.
- Type of program designed to detect, prevent, and remove malicious software from computer systems and networks. The software works by scanning files and programs for known patterns of malicious code, and then either quarantining or removing any identified threats.
- Technology that creates a secure, encrypted connection between two devices or networks over the internet. Your device connects to a server run by the provider, which then forwards your internet traffic to the destination website or service. The encryption provided helps protect your online privacy and security by preventing unauthorized access to your data and hiding your IP address.
8 Clues: Type of cyber attack in which an attacker impersonates a legitimate entity or source, such as a website, email address, or IP address, to deceive users and gain access to sensitive information or systems. • ...
Navy Federal 2024-02-26
Across
- Used to quickly identify and respond to suspicious transactions
- System that assigns risk levels to transactions and customers based on various factors
- Understanding normal customer behavior in order to distinguish from fraudulent activity and common customer pattern
- Practice ______ to ensure legal adherence and best practices for security
- Used to track location of transactions and flag unusual/unexpected location changes
- An extra layer of security used alongside credentials
- Performed to identify vulnerabilities in bank's systems and processes
- Making sure data and transaction from customer are kept secure and encrypted from unauthorized access
- Machine learning models that can help identify patterns and anomalies indicative of fraudulent activity.
Down
- Steps to take in the event of a security incident
- This collective approach can help in early detection and prevention.
- Informing customers of ways to recognize phishing and other fraudulent activity
- Needs to stay updated in order to stay ahead of evolving fraud tactics
- Training bank staff to recognize and report potential fraudulent activity
- Update and review to incorporate latest technologies and best practices
15 Clues: Steps to take in the event of a security incident • An extra layer of security used alongside credentials • Used to quickly identify and respond to suspicious transactions • This collective approach can help in early detection and prevention. • Performed to identify vulnerabilities in bank's systems and processes • ...
Types of Markets 2022-01-25
Across
- ____ exchanges are markets that do not have a location.
- Within bond markets in the US, bonds have a ___ value of $1000.
- Corporations issue debt securities to be traded within ____ markets.
- Future markets help protect against ___ of uncertain markets.
- Raising capital within public and private markets is a goal within the ___ market.
- A security is sold in a ___ market when it is first issued.
- ___ markets have the ability to purchase, sell, and deliver products at a rapid rate.
- Who must register bonds within the bond market?
- The purpose of trading within security markets is to buy orders at a ____ price.
Down
- Primary and secondary ___ are sold in a primary market.
- The most populated exchange in the U.S who owns trading rights with listed companies is known as the ____
- Zero-coupon bonds do not earn ____ within the bond market.
- ___ exchanges are formal secondary markets where sellers auction off orders and sell them at a high price.
- The ___(issuing stocks for the first time) typically occurs in a primary market.
- In a secondary market shares of stock are ___ to the public
15 Clues: Who must register bonds within the bond market? • ____ exchanges are markets that do not have a location. • Primary and secondary ___ are sold in a primary market. • Zero-coupon bonds do not earn ____ within the bond market. • A security is sold in a ___ market when it is first issued. • Future markets help protect against ___ of uncertain markets. • ...
codi bullying crossword 2023-03-21
Across
- bullying getting physically picked on everyday
- bullying some teases you verbally everyday
- someone who stands around and watches someone getting bullied
- a sore from being punched or kicked
Down
- someone teases you and picks on you everyday
- a type of physical bullying
- a type of psychological bullying
- bullying getting picked on online everyday
8 Clues: a type of physical bullying • a type of psychological bullying • a sore from being punched or kicked • bullying some teases you verbally everyday • bullying getting picked on online everyday • someone teases you and picks on you everyday • bullying getting physically picked on everyday • someone who stands around and watches someone getting bullied
Kianasearch 6-18-24 2024-06-18
8 Clues: “can somebody match my” • the best way to cook an egg • my underdog team for the euros • the type of attack on Ascension • my profile name on my peacock account • the best person on Love Island Season 11 • the name of the Crystal that powers lightsabers • NYC borough where the UGA photographer is moving to
Vocab Crossword 2022-05-04
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
Farm To Table Session 1 2022-03-10
Across
- A pigment in leaves which traps sunlight.
- The process in which a shoot grows out of a seed.
- Food security is the state of having __________ access to sufficient quantity of affordable, nutritious food.
- Process in which plants make glucose and oxygen.
Down
- The compound in which energy is stored in plants.
- The change in __________ can cause disruptions to food supply change.
- In order to ensure food security, Singapore has plans to grow _________.
- Leaves trap _______ energy during photosynthesis.
- Global food systems may be ________ and this causes challenges to food security.
- We need to __________ food import sources to reduce reliance on one single source.
10 Clues: A pigment in leaves which traps sunlight. • Process in which plants make glucose and oxygen. • The compound in which energy is stored in plants. • Leaves trap _______ energy during photosynthesis. • The process in which a shoot grows out of a seed. • The change in __________ can cause disruptions to food supply change. • ...
Teacher Appreciation Week Crossword Puzzle 2023-04-25
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Teacher Appreciation Crossword 2023-04-28
Across
- helped plan the D.C trip
- advisor of ASB
- teaches 8th grade Pre-Ap science
- teaches special education in E-22
- teaches 7A and AVID
- 7th grade P.E teacher
- special education teacher in room 12
- teaches band and orchestra
- newest math teacher
- They usually say "Have a day
- teaches young living
Down
- favorite book is the outsiders
- has a beard, loves art
- loves surfing and is radical
- teaches 7th grade Pre-AP and 8th grade science
- teaches cyber patriot
- teaches geometry
- room is next to the former boy's restroom
- room l-46 brown hair
- teaches three different english classes
- loves singing, plays piano
- speaks and teaches Vietnamese
- room is behind Mrs. C Nguyen's room.
- plays League of Legends
- dyed her hair black
- journalism teacher
26 Clues: advisor of ASB • teaches geometry • journalism teacher • teaches 7A and AVID • newest math teacher • dyed her hair black • room l-46 brown hair • teaches young living • teaches cyber patriot • 7th grade P.E teacher • has a beard, loves art • plays League of Legends • helped plan the D.C trip • loves singing, plays piano • teaches band and orchestra • loves surfing and is radical • ...
Technology Words 2024-10-09
Across
- Computer Camera
- Used to type
- You call people on it
- Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Communicate with others vocally
- Coded software
- Analyze and solve problems
- Prevents viruses
- Provides entertainment
- Something that you can transfer digital info to
- Stores information
- Another word for apps
Down
- Gain unauthorized access
- Random Access Memory
- Decode a code
- Also an animal
- Requires a router
- Protects from cyber attacks
- The use of computer technology
- Remote connection
- Communication technology tool
- Central Processing Unit
- Look through the web
- Creates apps/websites
- Find locations
- Amount of data your internet connection can handle
- Accessed from a browser
- Protects your computer from virus
- Convert data into a code
- Social feed
30 Clues: Social feed • Used to type • Decode a code • Also an animal • Coded software • Find locations • Computer Camera • Prevents viruses • Requires a router • Remote connection • Stores information • Random Access Memory • Look through the web • You call people on it • Creates apps/websites • Another word for apps • Provides entertainment • Central Processing Unit • Accessed from a browser • ...
Review Weeks 1-6 2022-12-06
Across
- a big meal, often eaten during holidays
- (adj) when you don't sleep enough, feeling
- this Monday people buy on online
- name of San Diego baseball team
- this Tuesday people give back
- Teacher Neil's home state
- US __ their first two World Cup Games
- It was Hispanic ___ Month 09/15-10/15
- the early bid catches this
- another word for ancestors
Down
- 11/3 was Nat'l ___ Day
- the host of the World Cup this year
- to show off artwork or verb to show
- Bob Marley is the king of this music
- Jet __ when you travel between time zones
- Similar to Homemaker
- 10/17 was Nat'l ___ Day
- Isla means this in English
- Online you can many "___ and deals"
- Japanese word for big water wave
- heavy rain, idiom, "___ and dogs"
21 Clues: Similar to Homemaker • 11/3 was Nat'l ___ Day • 10/17 was Nat'l ___ Day • Teacher Neil's home state • Isla means this in English • the early bid catches this • another word for ancestors • this Tuesday people give back • name of San Diego baseball team • this Monday people buy on online • Japanese word for big water wave • heavy rain, idiom, "___ and dogs" • ...
Puzzle Thingy 2021-01-12
Across
- Reserve System a group consisted of 12 independent regional banks that could lend to other banks in times of need
- income tax pay as you earn system
- Taxes tax on the estate or total property of person who has died
- Money increase money supply will lower interest rates thus encouraging investment spending
- Spending Social security, medicare, medicaid, government must pay the amount required
- policy the use of government spending and revenue collection to influence the economy.
- national health insurance program in the United States, begun in 1966 under the Social Security Administration
- Policy Drops GDP and used to drop demand
- taxes out of work still collecting money to live off of, have to be looking for a new job
- tax tax on money or property that one living person gives to another
Down
- Policy used to expand the economy, initiate growth, and increase output
- taxes General revenue tax on the sale or manufacture of a good
- income Person’s gross income-including salaries, and wages
- taxes a tax that charges a higher rate for people who earn a higher income
- GDP
- Policy Actions the Federal Reserve takes to influence inflation
- Year October 1st to September 30th
- security tax used to fund old age, survivors, and disability insurance
- budget written document estimating the federal government’s spending in the coming year
- Money reduce the money supply will increase interest rates and cause spending to
- taxes imported goods brought into the country
21 Clues: GDP • income tax pay as you earn system • Year October 1st to September 30th • Policy Drops GDP and used to drop demand • taxes imported goods brought into the country • income Person’s gross income-including salaries, and wages • taxes General revenue tax on the sale or manufacture of a good • Policy Actions the Federal Reserve takes to influence inflation • ...
CYBERCRIME 2021-07-11
Across
- A politically- or ideologically-motivated cyber attack or hack.
- A way to access electonic system by bypassing some or all security mechanisms.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- Malicious software, such as a virus or worm, that attacks a target computer.
- The overaching program that runs all the functions on a computer or other electronic device.
- A company that offers access the internet.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Resource to be accessed, often expressed as a time period.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- Determining the identity or location of an attacker or an attacker's intermediary.
- The interdependent network of information technology, infrastructures that includes internet.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- A network point that acts an entrance to another network
- A unique internet identifier registered
- An online journal.
- A program used to access the internet.
- Assurance that remains private and no one sees it except for those expected to see it.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
- Attempting to mimic an official email from a trusted organization to lire individuals.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A unique internet identifier registered to an entity.
- An information packet sent from website to a web browser that records a user's activity on the website.
- algorithm against data to produce a numeric value that is representative that data.
- Stands for "Wireless Fidelity".
- A software robot that performs automated tasks.
- The act of one individual harrasing or intimidating another individual via the interner.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A massed data that is used to describe large amounts of other internet data.
- A grou of computers that is linked to share data and othe information.
- A website that finds information across the Internet based on a set of search criteria.
- an entity.
- A network security measure in which information is encoded or scrambled prior to transmission.
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- Aim to overwhelm the resources of a targeted system to crash that system.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
CYBERCRIME 2021-07-11
Across
- The interdependent network of information technology, infrastructures that includes internet.
- A grou of computers that is linked to share data and othe information.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- The act of one individual harrasing or intimidating another individual via the interner.
- Resource to be accessed, often expressed as a time period.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A company that offers access the internet.
- A network point that acts an entrance to another network
- A website that finds information across the Internet based on a set of search criteria.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- A massed data that is used to describe large amounts of other internet data.
- Stands for "Wireless Fidelity".
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- An online journal.
- Aim to overwhelm the resources of a targeted system to crash that system.
- The overaching program that runs all the functions on a computer or other electronic device.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- An information packet sent from website to a web browser that records a user's activity on the website.
Down
- Assurance that remains private and no one sees it except for those expected to see it.
- algorithm against data to produce a numeric value that is representative that data.
- A program used to access the internet.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A politically- or ideologically-motivated cyber attack or hack.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- A unique internet identifier registered
- A network security measure in which information is encoded or scrambled prior to transmission.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- an entity.
- A software robot that performs automated tasks.
- A unique internet identifier registered to an entity.
- A way to access electonic system by bypassing some or all security mechanisms.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Determining the identity or location of an attacker or an attacker's intermediary.
- Unsolicited advertising or other information sent out via email or other messaging service.
- Malicious software, such as a virus or worm, that attacks a target computer.
- Attempting to mimic an official email from a trusted organization to lire individuals.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
Digital Tech 2023 Final 2023-05-11
Across
- A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.
- Irrelevant or unimportant messages to a large group of people.
- The standard of conduct expected by other tech users.
- Free web based site in which documents can be created, edited, and shared.
- Document that is stored on your computer, usually in a related collection/coordination.
- The crime of taking someone's personal information and using it to become them. Usually for financial gain.
- The legal rights and restrictions governing tech users.
- Local Area Network
- Large computer network connected over the internet for server redundancy.
- Spoofing, internet fraud in the form of emails and pop-ups designed to steal personal information
- Instructions/programs that tell your computer what to do.
- Online journals in which create interaction from readers. Consists of interest groups, business, and others.
- The act of stealing someone else's work in an attempt to pass it off as your own.
- A site that allows users to add content using their own browser. Collaborative Site.
- Universal serial bus.
- The buying and selling of goods online.
- Provides Storage for free
- Arranging all folders files, and other documents in an arranged order.
- Physical equipment that makes up your computer system.
- Wide Area Network
- Type of file that has been created or saved by an application.
- Used to store a group of files and folders in an organized fashion.
- Free online storage service that is intertwined with the company and other sites.
- Method of identity theft where people try to obtain personal information via phone calls.
Down
- The use of online communication to harass or threaten someone. STOP BLOCK TELL
- A link that can be added or clipped onto a document.
- The capability of using tech and knowing when and how to use it.
- The elements of physical and phycological well being related to digital tech use.
- The output of the device that lets you see all of your work as you go.
- The electronic exchange of info.
- The precautions that all tech users must go through in order to ensure their personal safety and security of their network.
- The privileges' and freedom extended to all tech users.
- Central processing unit, part of the computer system that carries out instructions given by the software. Microprocessor, single chip.
- The act of stealing someone else's work in an attempt to pass it off as your own.
- The applied science of design to better improve productivity
- Someone who knows what is write and wrong to do in the Tec world.
- Malicious software, designed to steel information, inflict damage, commit fraud, and spread spam.
- The exclusive legal right given to someone who both created and owns a piece of work.
- Document created by a program or system file which make us the operating system
- Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.
40 Clues: Wide Area Network • Local Area Network • Universal serial bus. • Provides Storage for free • The electronic exchange of info. • The buying and selling of goods online. • A link that can be added or clipped onto a document. • The standard of conduct expected by other tech users. • Physical equipment that makes up your computer system. • ...
The Virtual World 2024-02-28
Across
- A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user.
- Communication in real-time over the internet, typically text-based.
- Controls that allow users to determine how much information they want to share with others on digital platforms.
- A security process in which users provide two different authentication factors to verify themselves.
- A live, visual communication between two or more people via computer or mobile device.
- A security system designed to prevent unauthorized access to or from a private network.
- The network of physical devices embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A collection of web pages accessible via the internet.
- The identification or estimation of the real-world geographic location of an object, such as a mobile device or internet-connected computer.
- A secret word or phrase used for authentication and to gain access to a system.
- Measures taken to protect computer systems and data from unauthorized access or cyber attacks
- A machine that processes data and performs tasks according to a set of instructions.
- The unauthorized access, disclosure, or acquisition of sensitive information.
- A software agent that assists users with tasks or provides information in a virtual environment.
- Connected to or accessible via the internet.
- Transfer data from a remote computer to a local device.
- A unique name used to identify oneself on a computer system or online platform.
- The process of converting information or data into a code to prevent unauthorized access.
Down
- A global network connecting millions of computers worldwide.
- The fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- The trail of data left behind by users when they interact with digital platforms.
- A digital representation of a user in a virtual environment.
- A simulated experience that can be similar to or completely different from the real world.
- An enhanced version of reality where computer-generated information is overlaid on the real world.
- The online representation of an individual's identity, based on data attributes and activities associated with that individual.
- Electronic mail sent and received via the internet.
- The virtual environment created by interconnected computer systems.
- Transfer data from a local device to a remote computer.
- The delivery of computing services—such as servers, storage, databases, networking, software, and analytics—over the internet.
- The act of playing electronic games, often on devices such as computers, consoles, or mobile phones.
- Transmitting or receiving data, typically audio or video, over a computer network in real-time.
- Software used to access and view websites on the internet.
- Websites and applications that enable users to create and share content or participate in social networking.
35 Clues: Connected to or accessible via the internet. • Electronic mail sent and received via the internet. • A collection of web pages accessible via the internet. • Transfer data from a local device to a remote computer. • Transfer data from a remote computer to a local device. • Software used to access and view websites on the internet. • ...
Chapter 9: Computer Security Technology Master Crossword 2026-03-05
Across
- A suite of protocols used to secure and encrypt Virtual Private Network (VPN) traffic.
- Malicious software specifically designed to cause harm, disrupt operations, or steal data.
- A system that only monitors and alerts administrators about malicious network traffic, but does not actively block it (Abbreviation).
- A potential danger, such as a hacker or a virus, that could exploit a weakness in a computer system.
- A system that collects, correlates, and analyzes security logs from various devices like firewalls and endpoints (Abbreviation).
- A decoy system or network set up to look attractive to cyber attackers in order to study their tactics.
- The zone where external-facing servers (like web and email) are placed to keep them separate from the secure internal network (Abbreviation).
- The secure, encrypted path that a Virtual Private Network (VPN) creates through an untrusted network like the internet.
- A logical connection point that firewalls can block to prevent certain types of traffic, such as 80 for web traffic.
- A defense mechanism designed to intentionally slow down network connections to frustrate automated scanning tools.
- A vulnerability or attack that is unknown to the software vendor and has no patch available yet (No spaces).
- A mode that allows a network interface card (NIC) to read all traffic passing on the network segment, not just traffic addressed to it.
- A security system that actively blocks or drops malicious traffic, rather than just alerting administrators (Abbreviation).
- A stealthy type of malware designed to hide its presence deep within the operating system to avoid detection by standard antivirus.
- A technology that hides multiple internal private IP addresses behind a single public IP address (Abbreviation).
- The type of inspection firewall that remembers the context of active network connections.
Down
- Creates a secure, encrypted tunnel through an untrusted network like the internet (Abbreviation).
- The physical or logical device that collects network traffic data for an Intrusion Detection System to analyze.
- A device that combines a firewall, intrusion prevention, and antivirus capabilities into one single physical appliance (Abbreviation).
- The type of detection that relies on a constantly updated database of known threat patterns to identify malicious activity.
- An intermediary server that makes web requests on behalf of internal users and hides internal IP addresses.
- The process of verifying a user's identity before granting them access to a system.
- A secure, isolated virtual environment used to safely run and test untrusted code without risking the main computer.
- The physical hardware address assigned to a network interface card (Abbreviation).
- The secure holding area where antivirus software places an infected file so it cannot execute and spread.
- The modern, advanced replacement for traditional antivirus that monitors behavior and responds to threats (Abbreviation).
- The type of detection that learns what "normal" network traffic looks like and triggers an alert when something deviates from that baseline.
- A basic filtering firewall inspects these individual units of data passing through the network.
28 Clues: The physical hardware address assigned to a network interface card (Abbreviation). • The process of verifying a user's identity before granting them access to a system. • A suite of protocols used to secure and encrypt Virtual Private Network (VPN) traffic. • The type of inspection firewall that remembers the context of active network connections. • ...
Pengantar Teknologi Informasi 2023-09-06
6 Clues: Informasi • Topologi yang menyerupai bintang • Alamat pada jaringan Internet. • Salahsatu bagian dari AI adalah ... Humanly • Menjaga data agar tidak terjadi adanya perubahan • Pemalsuan data pada aktivitas Cyber Crime adalah Data...
Government Acronyms 2023-01-21
21 Clues: mail • banks • taxes • pills • parcel • attorneys • farm loans • snow plows • Aeronautics • plant police • intelligence • investigation • water and air • covid monsters • disaster relief • labor relations • retaliation force • security alliance • financing paintings • global peace-makers • inner-city home development
Aeropuerto Game || No spaces No caps 2023-04-19
23 Clues: sign • seat • gate • aisle • window • ticket • screen • luggage • arrival • check in • terminal • passport • security • seat belt • documents • passenger • round trip • boarding pass • metal detector • departure/exit • first class seat • flight attendant • economy class seat
Citizens Bank & Trust 2012-12-09
21 Clues: Rate • Family • Office • Plastic • A Branch • Security • President • Necessity • Home Loan • Latt Maxey • Scrutinize • Childs Bank • Paper money • First Office • Pencil Pusher • First Contact • Loan Decision • Biggest Asset • Legal Document • Trust Services • Manager of Assets
Unit 5 - Architechture 2014-04-21
28 Clues: Lohn • Lift • Wärme • Decke • Eisen • Angst • Stahl • Termin • Bauland • anstatt • Werkzeug • Stockwerk • pünktlich • Kilometer • Baustelle • Verbindung • Sicherheit • Beleuchtung • Klimaanlage • Ziegelstein • Kühlschrank • ungewöhnlich • Architekt/in • Wolkenkratzer • Geschäftsmann • Herausforderung • Stadtsilhouette • entwerfen,entworf
1.1. Signs and Warnings 2017-04-17
28 Clues: kust • druk • buik • gemak • drijf • motor • afval • zwaai • pakjes • bewijs • begaat • doeuit • gebogen • spieren • terrein • proberen • betekent • ongewone • voertuig • stroming • rijbewijs • gifslangen • veiligheid • vuurwapens • ontsnappen • strandwacht • overtreding • brandblusser
VOCAB LESSON#4-CROSSWORD PUZZLE 2023-11-05
20 Clues: Stale • Holder • Infamy • Shabby • Earthly • Rounded • Display • Covering • Security • Throwback • Innocence • Compassion • Appreciate • Undercover • Short Fuse • Easily cured • In the flesh • Greedy to share • Godly or higher than a peasant • Manner or position in moving around
révision vocabulaire S1 anglais 2024-11-21
28 Clues: Fee • Trip • Task • Mark • Unit • Grant • Tasks • Class • Study • Safety • Attempt • Succeed • Teacher • Newcomer • Register • Due date • Elective • Commuter • Transport • Resources • Inspection • Internship • Requirement • Scholarship • Association • Reading room • Certification • Aviation company
Discover the Future 2024-06-16
junior 1 2026-03-30
29 Clues: - 2 • - 6 • - 9 • -27 • - 8 • - 7 • - 4 • - 5 • - 3 • - 1 • - 25 • - 21 • - 26 • - 11 • - 12 • - 22 • - 28 • - 15 • - 20 • - 29 • - 19 • - 10 • - 23 • - 24 • - 17 • - 13 • - 16 • - 14 • - 18
cyber 2021-04-05
Roles & Jobs 2024-06-19
Across
- Dogs that provide comfort and support to people.
- Following a scent trail to locate a person or object.
- Dogs trained to assist individuals with disabilities.
- Used to monitor areas for safety.
- General term for dogs trained to locate persons or objects.
- Employed in private security roles.
- Trained to locate deceased individuals.
- Trained to detect explosives, drugs, or other substances.
- Role of guarding property and people.
Down
- Traditional job of managing livestock.
- Assists visually impaired individuals.
- Role involving locating missing persons.
- German Shepherds used in armed forces.
- General term for dogs aiding individuals in various ta
- German Shepherds trained for law enforcement duties.
- Dogs used to detect contraband at borders.
16 Clues: Used to monitor areas for safety. • Employed in private security roles. • Role of guarding property and people. • Traditional job of managing livestock. • Assists visually impaired individuals. • German Shepherds used in armed forces. • Trained to locate deceased individuals. • Role involving locating missing persons. • Dogs used to detect contraband at borders. • ...
Secured Credit Card 2022-03-22
Across
- Annual Fee
- Under this age you have to submit a paper application
- this card cannot be used as this type of protection for a checking account
- Minimum security deposit
Down
- $2500 is the _________ security deposit
- balance transfer fee
- Increments a security deposit can be made in after the minimum deposit
- amount of annual fee broke down into a monthly charge
8 Clues: Annual Fee • balance transfer fee • Minimum security deposit • $2500 is the _________ security deposit • Under this age you have to submit a paper application • amount of annual fee broke down into a monthly charge • Increments a security deposit can be made in after the minimum deposit • this card cannot be used as this type of protection for a checking account
Executive Branch 2022-12-07
16 Clues: System • System • Policy • College • Agencies • Security • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers • - Executive Order • decision - pardon • to elect - Electors
Security Summer Fun 2021-07-30
Across
- Allows TAD PGS, Inc. to operate with a clearance while having a foreign parent
- Threat that an employee or a contractor will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States.
- One of the Affiliates of a foreign interest (Adecco)
- How many days the Intra-Company Visit request should be submitted to Security before a meeting can take place between TAD PGS employees and Adecco affiliates
Down
- A type of social engineering where an attacker sends a fraudulent message designed to trick a human victim
- The briefing that must be submitted before you leave on international travel
- Foreign Ownership Control and Influence
- Information or material of which unauthorized disclosure could be expected to cause serious damage to the national security
- The database the DOD uses to store clearance information
- The form that is submitted to Security with the associate information, worksite, recruiter, sales manager, and visit requirements
10 Clues: Foreign Ownership Control and Influence • One of the Affiliates of a foreign interest (Adecco) • The database the DOD uses to store clearance information • The briefing that must be submitted before you leave on international travel • Allows TAD PGS, Inc. to operate with a clearance while having a foreign parent • ...
Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10
Across
- also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
- is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
- is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
- is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
- attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
- is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
- should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
Down
- is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
- recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
- is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
- is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
- in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
- in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization. • also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment. • ...
Cyber Stalking Crossword 2016-06-29
Across
- The stalker
- When a stalker claims the victim is hurting them, it is called False ___
- Cyberstalking is against the ___
- The minimum age for Instagram
Down
- Someone who defends the victim
- What is done when a stalker accesses the victim's social media or email, and can edit it
- Most cyber stalking happens on ____
- The person being stalked online
- Women make up _____ percent of victims
- This social media platform allows users to post pictures mainly
10 Clues: The stalker • The minimum age for Instagram • Someone who defends the victim • The person being stalked online • Cyberstalking is against the ___ • Most cyber stalking happens on ____ • Women make up _____ percent of victims • This social media platform allows users to post pictures mainly • When a stalker claims the victim is hurting them, it is called False ___ • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Wenn Daten doppelt gespeichert werden(Sicherheitskopie auf Festplatte oder USB-Sticks).
- Sie dringen illegal in Computersysteme ein.
- Diese Programme protokollieren die Tastatureingaben mit.
- Echtzeit chatten.
- Datenverarbeitungsregisternummer.
Down
- Die Sicherheitsexperten untersuchen deinen Computer auf Sicherheitslücken, wie nennt man Sie noch?
- Personen werden mit Hilfe von elektronischen Medien verletzt.
- Diese Viren sind als ein Programm in eine Datei eingebetet?
- Verbreitet sich direkt über Netze.
- Werbemails die unerwünscht sind nennt man auch?
10 Clues: Echtzeit chatten. • Datenverarbeitungsregisternummer. • Verbreitet sich direkt über Netze. • Sie dringen illegal in Computersysteme ein. • Werbemails die unerwünscht sind nennt man auch? • Diese Programme protokollieren die Tastatureingaben mit. • Diese Viren sind als ein Programm in eine Datei eingebetet? • Personen werden mit Hilfe von elektronischen Medien verletzt. • ...
digital citizenship 2017-09-08
Across
- presence the existence of individual business that can be found online
- bullying using technology to bully someone
- the correct way to communicate on the internet
- safety the knowledge of the user’s personal safety
Down
- domain being available to the public
- Passwords passwords that would throw someone off
- media instagram, snapchat, twitter, facebook
- Danger the danger to children from strangers
- citizenship the responsible behavior regard to technology use
- copyright taking someone's image without citing it
10 Clues: domain being available to the public • bullying using technology to bully someone • media instagram, snapchat, twitter, facebook • Danger the danger to children from strangers • the correct way to communicate on the internet • Passwords passwords that would throw someone off • copyright taking someone's image without citing it • ...
Bullying 2022-10-24
Across
- a form of bullying on the internet
- a form of bullying with weird touches
- a form of bullying used with words
- Something that can make or break bullying
- a form of bullying to hurt the victims social life
- the target of the bullying
- the person who makes fun of/hurts people
Down
- person who intimidates the victim
- The process of the bully bullying
- a form of bullying that hurts the victim
10 Clues: the target of the bullying • person who intimidates the victim • The process of the bully bullying • a form of bullying on the internet • a form of bullying used with words • a form of bullying with weird touches • a form of bullying that hurts the victim • the person who makes fun of/hurts people • Something that can make or break bullying • ...
TECHNOLOGY 2025-01-29
Across
- easy to use or understand
- the use of machines to perform tasks without human intervention
- knowledgeable about modern technology
- the trail of data left by users on the internet
- a small electronic device with a specific function
Down
- measures taken to protect systems from cyber threats
- an important discovery or development
- introducing new ideas or methods
- extremely modern and advanced
- Intelligence (AI) the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • an important discovery or development • knowledgeable about modern technology • the trail of data left by users on the internet • a small electronic device with a specific function • measures taken to protect systems from cyber threats • ...
CRISS-CROSS PUZZLE 2025-01-18
Across
- Who cut Thanos' head off in the movie Avengers:End Game?
- How does the bishop move on the chessboard?
- Unwanted messages flooding your inbox
- Digital brain that thinks like humans, briefly
- Planet in the solar system that has the shortest day
- Guard against cyber attacks
Down
- Element with a symbol Au
- Malicious software that holds your files hostage
- How many years is the tenure of a Rajya Sabha member?
- Web address in short
10 Clues: Web address in short • Element with a symbol Au • Guard against cyber attacks • Unwanted messages flooding your inbox • How does the bishop move on the chessboard? • Digital brain that thinks like humans, briefly • Malicious software that holds your files hostage • Planet in the solar system that has the shortest day • How many years is the tenure of a Rajya Sabha member? • ...
Health crossword (safety words) 2025-04-14
Across
- Mild traumatic injury caused to the brain
- injury caused by a spine injury
- What do you put on when riding a motorcycle
- What do you put on when you get in a car
- a material used to patch up a cut
Down
- Bullying conducted online
- another word for "taking it easy"
- Occupational Safety and Health Administration
- acronym for traumatic spinal cord injury
- Hours How much sleep a teenager needs
10 Clues: Bullying conducted online • injury caused by a spine injury • another word for "taking it easy" • a material used to patch up a cut • Hours How much sleep a teenager needs • acronym for traumatic spinal cord injury • What do you put on when you get in a car • Mild traumatic injury caused to the brain • What do you put on when riding a motorcycle • ...
Profiles 2 text 1 Alisa 2014-12-03
15 Clues: esine • varaus • tavara • suunta • rukous • paikka • rokotus • mainita • matkustaja • turvallisuus • kokemus,kokea • näköala,maisema • toimittaa,luovuttaa • olla mukana,esiintyä • pahoillaan oleva,katuva
At the airport 2024-11-30
15 Clues: небо • крыло • пассажир • двигатель • безопасный • рейс, полёт • безопасность • утомительный • приземляться • захватывающий • полагаться на • занятой,людный • чрезвычайная ситуация • аккуратный, внимательный • обслуживать, разносить (напитки)
MY MOTHER AT 66 & ELEMENTARY......SLUM 2020-08-04
20 Clues: pale • sleep • safety • running • twisted • dead body • closed in • bad, mean • well bred • scattering • well known • burial places • giving rewards • unwanted plants • pale like an ash • opposite of wide • luring, attracting • stopped abnormally • clear, unclouded sky • fast moving, forceful
Las Noticias 2021-10-26
22 Clues: war • link • news • tweet • to say • source • to lie • because • to lack • to give • reliable • disorder • security • magazines • to follow • verifiable • to publish • to navigate • to look for • to interview • to broadcast • to prove, to confirm
November 2 2021-11-02
Across
- guard - охранник
- - отвлекать
- - хропеть
- - салфетка
- - заворачивать
- - чудо
- - выкрикивать
- - заставлять
- - агрессивный
- pig - морская свинка
- - разрушать
- - мопс
- - палатка
- up - подводить итоги/заканчивать
Down
- - общее слово для братьев и сестер
- - доказательство
- - копать
- - внешность
- - бухгалтер
- attendant - стюард/-есса
- - бесполезный
- - совершать побег/ убегать
- - кричать
- - общежитие
24 Clues: - чудо • - мопс • - копать • - хропеть • - кричать • - палатка • - салфетка • - отвлекать • - бухгалтер • - общежитие • - разрушать • - внешность • - заставлять • - выкрикивать • - бесполезный • - агрессивный • - заворачивать • guard - охранник • - доказательство • pig - морская свинка • attendant - стюард/-есса • - совершать побег/ убегать • up - подводить итоги/заканчивать • - общее слово для братьев и сестер
NI 2 Unit 2 Lessons 3&4 2021-11-28
28 Clues: Welt • Reis • Zelt • Kerze • Abfall • Koffer • werfen • zelten • bringen • reizend • Schlamm • Kontakt • Ankunft • brennen • anzünden • schlafen • anstehen • klingeln • verdienen • Umschlage • Tradition • Sicherheit • gefährlich • Feuerwerke • schliessen • traditionel • Portmonnaie • Unterwäsche
Prueba de vocabulario útil p. 61-63 2018-02-11
20 Clues: seat • aisle • fault • window • weapon • to solve • tax, duty • to explain • To line up • flight crew • to take off • to threaten • sign/signal • security guard • That’s enough! • passanger (male) • flight attendant • cautious (female) • suspicious (male) • to claim your luggage
Vocabulary 9 2012-11-04
20 Clues: plan • attention • character • protected • community • real life • first time • being seen • allegiance • make smaller • indifference • continued use • special skill • decision maker • firm conviction • electric current • free from danger • educational institution • representation of a person • contract to receive something
Unit 5 - Architechture 2014-04-21
28 Clues: Lohn • Lift • Eisen • Decke • Angst • Wärme • Stahl • Termin • anstatt • Bauland • Werkzeug • Baustelle • pünktlich • Stockwerk • Kilometer • Sicherheit • Verbindung • Ziegelstein • Kühlschrank • Beleuchtung • Klimaanlage • ungewöhnlich • Architekt/in • Geschäftsmann • Wolkenkratzer • Herausforderung • Stadtsilhouette • entwerfen,entworf
Unit 5 - Architechture 2014-04-21
28 Clues: Lohn • Lift • Wärme • Angst • Decke • Eisen • Stahl • Termin • Bauland • anstatt • Werkzeug • Kilometer • pünktlich • Stockwerk • Baustelle • Verbindung • Sicherheit • Ziegelstein • Klimaanlage • Kühlschrank • Beleuchtung • Architekt/in • ungewöhnlich • Geschäftsmann • Wolkenkratzer • Stadtsilhouette • Herausforderung • entwerfen,entworf
banking 11 2023-11-14
Across
- adókulcs
- alapkamat
- kőltságvetési politika
- részvény
- kötelező tartalékráta
- élénkítő politika
- kamatláb
- valuta
- pénzkínálat
- kormányzati kiadás
- általánosan elfogadott
Down
- hitelt nyújt
- monetáris eszközök
- biztosító társaság
- intézményi befektető
- kamatmarzs
- committee monetáris tanács
- kétszintű
- osztalék
- folyószámla
- kibocsát
- értékpapír
- jegybank
23 Clues: valuta • adókulcs • részvény • osztalék • kamatláb • kibocsát • jegybank • alapkamat • kétszintű • kamatmarzs • értékpapír • folyószámla • pénzkínálat • hitelt nyújt • élénkítő politika • monetáris eszközök • biztosító társaság • kormányzati kiadás • intézményi befektető • kötelező tartalékráta • kőltságvetési politika • általánosan elfogadott • committee monetáris tanács
LA TECNOLOGIA y LA RED 2025-05-15
27 Clues: key • call • link • file • users • group • email • mouse • tweet • event • screen • camera • photos • message • comment • profile • website • username • password • keyboard • internet • security • followers • headphones • cell-phone • speaker-phone • mute/silent mode
Learning Units Learning Unit 2: The risk management lifecycle 2023-03-10
Across
- attempts to define what the estimated risk actually means to people concerned with or affected by the risk. A large part of this evaluation will be the consideration of how people perceive risks.
- in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization.
- is the structured process used to identify the sources of currency risk and to define the goals of a hedging program aimed at eliminating or minimising the impact of this risk.
- is assessing the risks involved in the daily activities of a business and classifying them (low, medium, high risk) based on the impact on the business. It enables a business to look for control measures that would help in curing or mitigating the impact of the risk and, in some cases negating the risk altogether.
- also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.
Down
- is the practice of reducing the impact of potential risks by developing a plan to manage, eliminate, or limit setbacks as much as possible. After management creates and carries out the plan, they'll monitor progress and assess whether or not they need to modify any actions if necessary.
- is the process of determining the criticality of business activities and associated resource requirements to ensure operational resilience and continuity of operations during and after a business disruption.
- is the possibility of something bad happening. ________ involves uncertainty about the effects/implications of an activity with respect to something that humans value, often focusing on negative, undesirable consequences.
- in computer security, a _____________ is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
- is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
- should be carried out by anyone who is trained and competent to do so; someone who understands the circumstances, the potential harm and the deviations.
- recognizes the areas where you are not compliant with regard to laws, policies or regulations. The resources are at risk for exposure to malicious activity and/or for penalties issued due to non-compliance.
- is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
13 Clues: in cyber security refers to any weakness in an information system, system processes, or internal controls of an organization. • also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment. • ...
EXERCISE 4.1 2020-03-30
Across
- who created the Banaue Rice Terraces
- this president created the National Grains Authority
- mode of transportation during the prehistoric Philippines
- Who created the videophone?
- dubbed as the gloden age of science and technology
- implemented the Universal Access to Quality Tertiary Education Act
- implemented the cyber act of 1999
- Roberto del rosario invented the ___?
- what field of science given priority in the Spanish era
Down
- created the prject " doctors to the bario"
- fe del mundo invented the ___?
- described as dark, brown and short prehistoric people in the philippines
- Most advance civilization during the prehistoric philippines
- Dr. Abelardo aguilar created the _____?
14 Clues: Who created the videophone? • fe del mundo invented the ___? • implemented the cyber act of 1999 • who created the Banaue Rice Terraces • Roberto del rosario invented the ___? • Dr. Abelardo aguilar created the _____? • created the prject " doctors to the bario" • dubbed as the gloden age of science and technology • this president created the National Grains Authority • ...
Bullying Crossword Puzzle 2020-11-30
Across
- what is the c in bullying
- someone is being hurt in an isolated event
- spreading rumors excluding people from games and groups
- punching,kicking, and spitting
- what is the b in bullying
- someone who stands by and lets something happen
Down
- No one is having fun there is a possible solution
- Name calling, threatning
- what is the a in bullying
- uneaqual balance of power and is rude over and over again
- what is the d in bullying
- writing mean things on someones facebook, instagram, or twitter, and texting
- stands up to a bully
- everyone is having fun and no one is getting hurt
14 Clues: stands up to a bully • Name calling, threatning • what is the c in bullying • what is the a in bullying • what is the d in bullying • what is the b in bullying • punching,kicking, and spitting • someone is being hurt in an isolated event • someone who stands by and lets something happen • No one is having fun there is a possible solution • ...
Pre-Test Awareness 2014 2014-10-13
Across
- An ISO standard is a ____________ agreement containing technical specifications or other precise criteria to be used consistently
- Customer Satisfaction is customer’s ________ of the degree to which the customer’s requirements have been fulfilled
- One of the benefit of ISO Certification is it Strengthens business ________
- Register Document where all non-conformance are identified in the process and opportunities to improve process
- _______ Action to eliminate the cause of a potential nonconformity
Down
- defines have the overall process flows for the service /Product
- Extent to which planned activities are realized and planned results achieved can be termed as _____
- 27001 Information Security Management System
- Information Security ___ is -An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant
- Is a systematic approach to managing sensitive company information so that it remains secure
- International Organization For Standardization is
- 9001 Quality Management System
12 Clues: 9001 Quality Management System • 27001 Information Security Management System • International Organization For Standardization is • defines have the overall process flows for the service /Product • _______ Action to eliminate the cause of a potential nonconformity • One of the benefit of ISO Certification is it Strengthens business ________ • ...
