cyber security Crossword Puzzles

CLA Environ 2017-09-30

CLA Environ crossword puzzle
Across
  1. Most commonly used type of dock
  2. Straight line material flow through docks at both ends
  3. Limit access to certain areas
  4. First global supply chain security initiative
  5. Requires both importers and exporters to send AMRs
  6. A company must register as a hazmat transporter to carry this
  7. Focus is on developing more secure containers
  8. Substance posing a risk to health
Down
  1. Most basic form of security
  2. Agency responsible for developing HAZMAT rules
  3. Major deterrent to would-be thieves
  4. These docks provide most protection from theft and weather
  5. Volume of goods expected to move through a warehouse
  6. Occur more often in dock areas than other areas of warehouse
  7. Pays for remediation of toxic waste sites
  8. Process for turning old products into new products
  9. One guard monitors this
  10. Between US, Canada and Mexico

18 Clues: One guard monitors thisMost basic form of securityLimit access to certain areasBetween US, Canada and MexicoMost commonly used type of dockSubstance posing a risk to healthMajor deterrent to would-be thievesPays for remediation of toxic waste sitesFirst global supply chain security initiativeFocus is on developing more secure containers...

Words for computer class. 2021-10-06

Words for computer class. crossword puzzle
Across
  1. is a central processing unit.
  2. use The right way to use things. To make it fair to everyone.
  3. COMPARES CAPACITY AND COSTS.
  4. A part of something
  5. Device storage.
  6. is a wide area network.
  7. Drive is a small device that can restore memory.
  8. SOlid state drive. They store things.
  9. The right way of using the internet.
  10. A informational site.
Down
  1. Copying something and stealing its creations.
  2. It's when you rapidly send the same message.
  3. A security app that sees what's going in and out of the computer.
  4. Doing something bad or illegal to someone else online.
  5. Copying someone's work without crediting them.
  6. is a local area network.
  7. Security How secure all your networks are. It makes it so it secules what goes by.
  8. is a device for transferring data from one device to another.

18 Clues: Device storage.A part of somethingA informational site.is a wide area network.is a local area network.COMPARES CAPACITY AND COSTS.is a central processing unit.The right way of using the internet.SOlid state drive. They store things.It's when you rapidly send the same message.Copying something and stealing its creations....

Unit#4 Vocab 1 2023-12-13

Unit#4 Vocab 1 crossword puzzle
Across
  1. Work, Progress, act
  2. The election between Herbert hoover and FDR
  3. This event kicked off the great depression and happened on oct 29 1929
  4. Civilian, Concentration, corp
  5. Makeshift towns of homeless and jobless
  6. Social, security, Administration
  7. Security, exchange, commission
  8. A combination of poor farmers and a natural drought
  9. The president that served for 4 terms
  10. this man was deemed the worst president in american history
  11. Spending more than you make in income
Down
  1. A way to help feed the needy set up by the social gospel group
  2. A time of global economic struggle
  3. This plan was also called Alphabet soup because of FDR's love for acronyms
  4. when FDR would talk to the country through the radio
  5. buying and selling stock quick
  6. Agricultural, adjustment, act
  7. Federal, Deposit, insurance, corporation

18 Clues: Work, Progress, actCivilian, Concentration, corpAgricultural, adjustment, actSecurity, exchange, commissionbuying and selling stock quickSocial, security, AdministrationA time of global economic struggleThe president that served for 4 termsSpending more than you make in incomeMakeshift towns of homeless and jobless...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

spanish vocab thingy 2023-04-20

spanish vocab thingy crossword puzzle
Across
  1. take off
  2. delay
  3. layover
  4. passport
  5. avion airplane
Down
  1. flight
  2. flight attendent
  3. customs
  4. gate
  5. security
  6. wind
  7. arrival

12 Clues: gatewinddelayflightcustomslayoverarrivaltake offsecuritypassportavion airplaneflight attendent

11.5 Vocab 2023-03-30

11.5 Vocab crossword puzzle
Across
  1. Allows devices to connect in a PAN
  2. The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access
  3. combines two, non-overlapping 20 MHz channels into a single 40 MHz channel
  4. used with the WPA and WPA2 wireless security standards
  5. a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3)
  6. increases bandwidth by using multiple antennas for both the transmitter and receiver
  7. developed by Cisco to address security concerns in RADIUS
  8. a key component of windows active directory
  9. a standard for local area networks created by IEEE-SA
Down
  1. a network that requires no authentication to connect to and is used in public
  2. introducd in 2018, and update to WPA2
  3. an open standard protocol used to authenticate users onto a network
  4. A communication method used on cards with a range of 2 inches
  5. the most commonly used access method
  6. introduced in 2004, a wireless security service
  7. an enhancement to MIMO that allows multiple users to use the same channel
  8. Data encryption protocol that uses 128,192,256 bits and encrypts in 128bit chunks
  9. uses radio waves to transmit data from small circuit boards called RFID tags to special scanners

18 Clues: Allows devices to connect in a PANthe most commonly used access methodintroducd in 2018, and update to WPA2a key component of windows active directoryintroduced in 2004, a wireless security servicea standard for local area networks created by IEEE-SAused with the WPA and WPA2 wireless security standards...

test 2023-09-12

test crossword puzzle
Across
  1. Equivalent ot EU Data Protection Bill in India
  2. These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
  3. A digital form of social engineering to deceive individuals into providing sensitive information
  4. The process of transforming plaintext into ciphertext
  5. Old way of breaking phone
  6. Computer Malicious Program
  7. attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
  8. in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
  1. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
  2. secure online service that allows users to connect remotely to another network
  3. spyware software that records every keystroke made on a computer’s keyboard
  4. security framework that controls access to computer resources, enforces policies, and audits usage
  5. algorithms to create convincing fake videos or audio recordings
  6. Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
  7. type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
  8. type of attack which uses a fraudulent server with a relay address
  9. model that forms the basis for the development of security systems
  10. A capability to limit network traffic between networks and/or information systems

18 Clues: Old way of breaking phoneComputer Malicious ProgramEquivalent ot EU Data Protection Bill in IndiaThe process of transforming plaintext into ciphertextalgorithms to create convincing fake videos or audio recordingstype of attack which uses a fraudulent server with a relay addressmodel that forms the basis for the development of security systems...

Mobile Security 2024-05-06

Mobile Security crossword puzzle
Across
  1. Trend Micro Mobile Security provides ______ by including anti-theft tools to locate, lock, and wipe lost or stolen devices
  2. Trend Micro Mobile Security provides privacy scanning to identify apps that may be accessing ______ information without permission
  3. Trend Micro Mobile Security provides Web browsing protection to block ______ websites and phishing attempts
Down
  1. Trend Micro Mobile Security provides ______ controls to manage children's device usage and restrict access to inappropriate content
  2. Trend Micro Mobile Security provides safe _____ features to protect users from online threats while browsing the internet
  3. Trend Micro Mobile Security provides malware scanning and detection to find _____

6 Clues: Trend Micro Mobile Security provides malware scanning and detection to find _____Trend Micro Mobile Security provides Web browsing protection to block ______ websites and phishing attemptsTrend Micro Mobile Security provides safe _____ features to protect users from online threats while browsing the internet...

Security&Privacy 2018-10-31

Security&Privacy crossword puzzle
Across
  1. You get an email from a bank asking for your personal information.(8)
  2. Two countries decide to fight war through computers(8).
  3. Tricking people into believing to gather valuable information(6,11)
  4. The system administrator informs you that a Trojan horse has infected your computer. Which program did the system administrator use to determine this?(9)
Down
  1. A hacker decides to steal money from the account holders of a bank.(6)
  2. No antivirus is smart enough to catch all my patterns.(10)
  3. Whatever you type is read by a hacker using this malware.(7)
  4. A friend of yours is protesting against a cosmetics company using online methods.(10)

8 Clues: Two countries decide to fight war through computers(8).No antivirus is smart enough to catch all my patterns.(10)Whatever you type is read by a hacker using this malware.(7)Tricking people into believing to gather valuable information(6,11)You get an email from a bank asking for your personal information.(8)...

ELECTRICIAN SECURITY 2013-03-13

ELECTRICIAN SECURITY crossword puzzle
Across
  1. connected to electricity
  2. opposite of insulator
  3. damage
Down
  1. measured in volts
  2. result of touching a live part
  3. connected to earth
  4. source of electricity
  5. result of fire or heat

8 Clues: damagemeasured in voltsconnected to earthsource of electricityopposite of insulatorresult of fire or heatconnected to electricityresult of touching a live part

Network security 2013-09-12

Network security crossword puzzle
Across
  1. sensitive informationon hard drives are destroyed
  2. The network element that can interconnect two gsm network.
  3. application protocol Push which is basically and specially used to encoded message which includes a link to a WAP addreSS
  4. anonymity Designed to protect the user against someone
Down
  1. system for mobile communication which allows users to roam seamlessly between network and separate the user identify from phone equipment
  2. Feasibility of USIM component tested using
  3. Enhanced authentication protocol for 3G security
  4. station controller which allow all control function and physical link between MCS and BTS

8 Clues: Feasibility of USIM component tested usingsensitive informationon hard drives are destroyedEnhanced authentication protocol for 3G securityanonymity Designed to protect the user against someoneThe network element that can interconnect two gsm network.station controller which allow all control function and physical link between MCS and BTS...

Network security 2013-09-12

Network security crossword puzzle
Across
  1. fields othername for finite fields
  2. used to implement a mechanism that automates ip configuration
  3. it is a single point of defense between two networks.
  4. website which site is blocked by dos atack
  5. it is designed to provide security and compression services to data generated from the application layer.
  6. horse which virus comes through downloading file form internet.
Down
  1. level firewall it is third generation firewall technology that evaluates network packets for valid data.
  2. attack it is one of particular variant of flooding dos attack on a public internet.

8 Clues: fields othername for finite fieldswebsite which site is blocked by dos atackit is a single point of defense between two networks.used to implement a mechanism that automates ip configurationhorse which virus comes through downloading file form internet.attack it is one of particular variant of flooding dos attack on a public internet....

Security Issues 2015-11-18

Security Issues crossword puzzle
Across
  1. graffiti on a website
  2. finding signals or to gain entry on the advantage of others (e.g. WIFI)
  3. you details (credit card etc )stolen and used
  4. mistakes made while development systems
Down
  1. sending messages to a server until it "falls over"
  2. false website to ascertain you personal details which can lead to other criminal activities
  3. unauthorised access of this person either by using code or other means
  4. goods sold on the black market

8 Clues: graffiti on a websitegoods sold on the black marketmistakes made while development systemsyou details (credit card etc )stolen and usedsending messages to a server until it "falls over"unauthorised access of this person either by using code or other meansfinding signals or to gain entry on the advantage of others (e.g. WIFI)...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Datenverarbeitungsregisternummer
  2. schützt den Computer von Zugriff fremder Nutzer
  3. chatten
Down
  1. Beobachtung bei der Eingabe von Daten
  2. Personen die illegal in Computersysteme eindringen
  3. Betrugsmethode
  4. Überbegriff für unerwünschte, schädliche Software
  5. Programme, die Tastatureingaben mitprotokolieren

8 Clues: chattenBetrugsmethodeDatenverarbeitungsregisternummerBeobachtung bei der Eingabe von Datenschützt den Computer von Zugriff fremder NutzerProgramme, die Tastatureingaben mitprotokolierenÜberbegriff für unerwünschte, schädliche SoftwarePersonen die illegal in Computersysteme eindringen

nutrition security 2024-07-21

nutrition security crossword puzzle
Across
  1. The nutrients you use in large amounts
  2. Lack of this can lead to anemia
  3. Food produced without synthetic chemicals
  4. Essential nutrient needed for strong bones and teeth
Down
  1. The state of having reliable access to a sufficient quantity of affordable, nutritious food
  2. Eating a balanced diet to maintain health and prevent disease
  3. Lack of sufficient food leading to hunger and malnutrition
  4. Vitamin found in citrus fruits, important for immune function

8 Clues: Lack of this can lead to anemiaThe nutrients you use in large amountsFood produced without synthetic chemicalsEssential nutrient needed for strong bones and teethLack of sufficient food leading to hunger and malnutritionEating a balanced diet to maintain health and prevent diseaseVitamin found in citrus fruits, important for immune function...

Food security 2024-10-17

Food security crossword puzzle
Across
  1. It is a foodborne illness caused by bacteria
  2. It is a biological food hazard
  3. It is an example of a common symptom of foodborne illness
  4. It is the pathogen most associated with undercooked beef and hamburger
  5. Where should you store raw meat in your fridge?
  6. It is a common food allergen
Down
  1. It is the primary source of Campylobacter contamination in food
  2. It is chemical food hazard
  3. It can multiply in cooked rice or pasta that's left at room temperature and cause food poisoning
  4. Which pathogen in raw poultry poses the greatest risk to foodborne illness?

10 Clues: It is chemical food hazardIt is a common food allergenIt is a biological food hazardIt is a foodborne illness caused by bacteriaWhere should you store raw meat in your fridge?It is an example of a common symptom of foodborne illnessIt is the primary source of Campylobacter contamination in food...

Airport security 2022-10-20

Airport security crossword puzzle
Across
  1. a tool that sees inside things
  2. a tool that sees metal passes throuht it
  3. to use something to keep people from going into a space
  4. a machine that records people
  5. official rules
Down
  1. baggage that no one is watching
  2. someone WHO travels with you
  3. official announcement

8 Clues: official rulesofficial announcementsomeone WHO travels with youa machine that records peoplea tool that sees inside thingsbaggage that no one is watchinga tool that sees metal passes throuht itto use something to keep people from going into a space

Security Questions 2025-10-12

Security Questions crossword puzzle
Across
  1. The first name of my best friend in childhood
  2. The name of my first school
  3. The first name of my favorite author
  4. The last name of my favorite teacher
Down
  1. My nickname in secondary school
  2. The name of my first pet
  3. The middle name of my oldest sibling
  4. The first name of my first celebrity crush

8 Clues: The name of my first petThe name of my first schoolMy nickname in secondary schoolThe middle name of my oldest siblingThe first name of my favorite authorThe last name of my favorite teacherThe first name of my first celebrity crushThe first name of my best friend in childhood

Julia Zorrilla, block 6 2024-05-09

Julia Zorrilla, block 6 crossword puzzle
Across
  1. Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
  2. Is a security that pays interest over terms ranging from 2-10 years.
  3. Means that money is the common measure of worth or price of a good.
  4. Is the process of transferring from one individual/organization to another.
  5. Is money used in exchange for goods and services needed by individuals and governments.
  6. Allows customers to pay for a purchase directly from their checking account.
  7. Is a security that matures in a year or less.
Down
  1. Is a transfer of money from one bank account to another one.
  2. Means money can also be save and stored for later.
  3. Is the mechanism a nation uses to provide and manage money for itself.
  4. Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
  5. Is the name of currency in the U.S
  6. Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
  7. Is the state of being or feeling secure; freedom from fear, anxiety, and danger.

14 Clues: Is the name of currency in the U.SIs a security that matures in a year or less.Means money can also be save and stored for later.Is a transfer of money from one bank account to another one.Means that money is the common measure of worth or price of a good.Is a security that pays interest over terms ranging from 2-10 years....

Julia Zorrilla, block 6 2024-05-09

Julia Zorrilla, block 6 crossword puzzle
Across
  1. Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
  2. Is a security that pays interest over terms ranging from 2-10 years.
  3. Means that money is the common measure of worth or price of a good.
  4. Is the process of transferring from one individual/organization to another.
  5. Is money used in exchange for goods and services needed by individuals and governments.
  6. Allows customers to pay for a purchase directly from their checking account.
  7. Is a security that matures in a year or less.
Down
  1. Is a transfer of money from one bank account to another one.
  2. Means money can also be save and stored for later.
  3. Is the mechanism a nation uses to provide and manage money for itself.
  4. Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
  5. Is the name of currency in the U.S
  6. Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
  7. Is the state of being or feeling secure; freedom from fear, anxiety, and danger.

14 Clues: Is the name of currency in the U.SIs a security that matures in a year or less.Means money can also be save and stored for later.Is a transfer of money from one bank account to another one.Means that money is the common measure of worth or price of a good.Is a security that pays interest over terms ranging from 2-10 years....

Julia Zorrilla, block 6 2024-05-09

Julia Zorrilla, block 6 crossword puzzle
Across
  1. Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
  2. Is a security that pays interest over terms ranging from 2-10 years.
  3. Means that money is the common measure of worth or price of a good.
  4. Is the process of transferring from one individual/organization to another.
  5. Is money used in exchange for goods and services needed by individuals and governments.
  6. Allows customers to pay for a purchase directly from their checking account.
  7. Is a security that matures in a year or less.
Down
  1. Is a transfer of money from one bank account to another one.
  2. Means money can also be save and stored for later.
  3. Is the mechanism a nation uses to provide and manage money for itself.
  4. Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
  5. Is the name of currency in the U.S
  6. Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
  7. Is the state of being or feeling secure; freedom from fear, anxiety, and danger.

14 Clues: Is the name of currency in the U.SIs a security that matures in a year or less.Means money can also be save and stored for later.Is a transfer of money from one bank account to another one.Means that money is the common measure of worth or price of a good.Is a security that pays interest over terms ranging from 2-10 years....

SAFETY AND SECURITY 2021-09-08

SAFETY AND SECURITY crossword puzzle
Across
  1. SYSTEM USED TO TRACK KEYS AND PATROLS
  2. A FABRIC LIKE ITEM IN THE FIRST AID KIT
  3. THIS IS USED FOR COMMUNICATING WITH OTHERS
  4. YOU USE THIS WHEN CARRYING HEAVY LOADS
  5. ABBREVIATED METHOD FOR USE OF A FIRE EXTINGUISHER
  6. HOW OFTEN DOES MARRIOTT REQUIRE A PATROL
  7. WHEN ONE PRACTICES HOW TO DO SOMETHING IN AN EMERGENCY
Down
  1. WHEN SOMETHING HAPPENS THAT IS A SAFETY AND SECURITY ISSUE
  2. WHAT IS CHECKED ON ARRIVAL OF AN ASSOCIATE
  3. PPE FOR YOUR EYES
  4. FAKE EMAILS YOU RECEIVE ASKING FOR INFORMATION
  5. THE PROCESS OF CHECKING AREAS FOR SAFETY AND SECURITY

12 Clues: PPE FOR YOUR EYESSYSTEM USED TO TRACK KEYS AND PATROLSYOU USE THIS WHEN CARRYING HEAVY LOADSA FABRIC LIKE ITEM IN THE FIRST AID KITHOW OFTEN DOES MARRIOTT REQUIRE A PATROLWHAT IS CHECKED ON ARRIVAL OF AN ASSOCIATETHIS IS USED FOR COMMUNICATING WITH OTHERSFAKE EMAILS YOU RECEIVE ASKING FOR INFORMATIONABBREVIATED METHOD FOR USE OF A FIRE EXTINGUISHER...

Aug Security Crossword 2021-09-06

Aug Security Crossword crossword puzzle
Across
  1. Hosts of this years Olympics & Paralympics
  2. The state of being legally responsible for something.
  3. Abbreviation of "involuntary celibate"
  4. (acronym)Operates independently of any government.
  5. The action or business of promoting & selling products or services.
  6. The holding of extreme political or religious views.
  7. An ex-member of the armed forces.
Down
  1. (4,6)Aerospace company that broke records last month.
  2. A formal meeting of people with a shared interest.
  3. A clash of interests or a prolonged armed struggle.
  4. City in Switzerland. Treatment of Prisoners of War 1929.
  5. An official inspection of an organization.

12 Clues: An ex-member of the armed forces.Abbreviation of "involuntary celibate"Hosts of this years Olympics & ParalympicsAn official inspection of an organization.A formal meeting of people with a shared interest.(acronym)Operates independently of any government.A clash of interests or a prolonged armed struggle....

1.2.2 Security Aspects 2021-10-22

1.2.2 Security Aspects crossword puzzle
Across
  1. How would you stop the introduction of software that self-replicates and can cause data loss?
  2. True or False, cookies are only used for advertising
  3. True or False, cookies act in the same way as a virus
  4. Illegally gaining access to a persons files
  5. Editing the source code of a legitimate piece of software in order to use it without paying for it
  6. a piece of software that self replicates in order to fill your hard drive causing your computer to crash or perform slowly, it can also delete your files
  7. How would you stop software that logs or records all key presses on your computer without knowing?
  8. A piece of hardware or software which records keystrokes and can automatically send them to somebody who wants to steal your personal information
  9. How can you help prevent people hacking into files and changing or deleting them
Down
  1. How could you stop someone from reading illegally accessed documents?
  2. True or False, cookies are a form of spyware
  3. State what is meant by MAC
  4. How could you prevent data loss caused by a hard disk head crash?
  5. True or False, cookies track browser use

14 Clues: State what is meant by MACTrue or False, cookies track browser useIllegally gaining access to a persons filesTrue or False, cookies are a form of spywareTrue or False, cookies are only used for advertisingTrue or False, cookies act in the same way as a virusHow could you prevent data loss caused by a hard disk head crash?...

Security Testing Concepts 2021-05-05

Security Testing Concepts crossword puzzle
Across
  1. An attack that use fraudulent emails that appear to be from trusted sources to try to trick victims into divulging sensitive data over email. (Hint: --a----)
  2. A mechanism of assigning the user account to an unknown user. (Hint: -----s-------)
  3. It is a malicious program triggered when a logical condition is met. (Hint: ----c----)
  4. Name the hacker who uses hacking to send social, religious, and political, etc messages. (Hint: ---k------)
  5. A program provides a means for ethical hackers to test an organization's website, mobile app, or software for security bugs. (Hint: ---b-----)
  6. It is a malware type in which security system is bypassed to access a system. (Hint: ---k----)
Down
  1. It is one of the common attacking techniques used by hackers to get critical data. (Hint: -----j------)
  2. It is an open source platform and most widely used SAST tool. (Hint: ----r----)
  3. It is a fake computer system that behaves like a real system and attracts hackers to attack it. (Hint: --n-----)
  4. A malicious software that allows an unauthorized user to have access to a computer and restricted areas of its software. (Hint: ---t---)
  5. An information security standard for organizations that handles branded credit cards from the major card schemes. (Hint: ---d--)
  6. A program that will serve pop up ads, can change browser's homepage and bombard your device with advertisements. (Hint: -d----)

12 Clues: It is an open source platform and most widely used SAST tool. (Hint: ----r----)A mechanism of assigning the user account to an unknown user. (Hint: -----s-------)It is a malicious program triggered when a logical condition is met. (Hint: ----c----)It is a malware type in which security system is bypassed to access a system. (Hint: ---k----)...

Security Awareness Crossword 2021-04-20

Security Awareness Crossword crossword puzzle
Across
  1. What do hackers love to find? Weak _______
  2. Which one of these passwords is the strongest? P@55w0rd1, haaatePasswords!!, =Myf@v3P^sz!e, Easy2Remb3r
  3. A clean desk policy is important in order to protect ___________ information from being revealed
  4. Who is Target's Chief Information Security Officer?
  5. This is when you know you are speaking to the right person
  6. Target may _______ your internet usage
  7. When someone sends a link to a site you think is fine
Down
  1. 007 can really watch what you do on your computer with this app
  2. You are annoyed that someone else is on your computer too!
  3. Personal data sent by email must always be __________
  4. Beware of Greeks bearing gifts and horsing around
  5. Always _______ your computer screen while away from your desk

12 Clues: Target may _______ your internet usageWhat do hackers love to find? Weak _______Beware of Greeks bearing gifts and horsing aroundWho is Target's Chief Information Security Officer?Personal data sent by email must always be __________When someone sends a link to a site you think is fineYou are annoyed that someone else is on your computer too!...

Security in Jesus 2024-02-19

Security in Jesus crossword puzzle
Across
  1. Where is our inheritance kept? (1 Peter 1:4)
  2. Jesus came to _____ the world. (John 3:17)
  3. There is no condemnation when we _____ to Jesus.(Romans 8:1)
  4. Who does god command to guard us? (Psalm 91: 9-11)
  5. Believers will never ______ (John 10: 28-29)
  6. How are we saved? (Ephesians 2:8)
  7. Eternal life is a free ______. (Romans 6:23)
Down
  1. What does the Holy Spirit guarantee? (Ephesians 1:14)
  2. Believers will never be ____ for their sins. (John 5:24)
  3. What can separate us from God's love? (Romans 8:39)
  4. We are ________ God's children.(1 John 3:2)
  5. What is a believer's seal? (Ephesians 1:13)

12 Clues: How are we saved? (Ephesians 2:8)Jesus came to _____ the world. (John 3:17)We are ________ God's children.(1 John 3:2)What is a believer's seal? (Ephesians 1:13)Where is our inheritance kept? (1 Peter 1:4)Believers will never ______ (John 10: 28-29)Eternal life is a free ______. (Romans 6:23)Who does god command to guard us? (Psalm 91: 9-11)...

Food Security nuggets 2024-12-17

Food Security nuggets crossword puzzle
Across
  1. These crops usually consist of Rice and Taro grown in feilds
  2. The type of farming that uses machinery and technology to perform agricultural tasks
  3. These crops are gaining importance in Food-security due to their significantly lesser water consumption
  4. A condition that develops when your body doesn't get the right amount of vitamins, minerals, and other nutrients required for healthy function.
  5. India is largest exporter of this crop
  6. Ragi, a popular crop is called a _____ millet
Down
  1. The biggest employment sector in India
  2. The second largest staple crop cultivated in India
  3. A situation where people lack basic food intake for a long time
  4. The largest cropping season in India
  5. India remains a net importer of these categories of crops
  6. This is where plants grow, made of rock and organic matter

12 Clues: The largest cropping season in IndiaThe biggest employment sector in IndiaIndia is largest exporter of this cropRagi, a popular crop is called a _____ milletThe second largest staple crop cultivated in IndiaIndia remains a net importer of these categories of cropsThis is where plants grow, made of rock and organic matter...

Felicity's Crossword 2018-01-29

Felicity's Crossword crossword puzzle
Across
  1. Check or prove the accuracy of something
  2. writer duplicates another writer's language
  3. full electronic participation in society
  4. used in information security and privacy laws
  5. the knowledge of maximizing the user's personal safety against security risks
  6. relating to understanding
  7. Correct way of communicating on the Internet
  8. a particular place or position.
Down
  1. a verbal, written, or recorded communication
  2. the electronic responsibility for actions
  3. the use of electronic communication to bully a person
  4. a trail of data you create while using the Internet
  5. websites and applications that enable users to create and share content
  6. Children's online privacy and protection act
  7. permission for something to happen

15 Clues: relating to understandinga particular place or position.permission for something to happenCheck or prove the accuracy of somethingfull electronic participation in societythe electronic responsibility for actionswriter duplicates another writer's languagea verbal, written, or recorded communicationChildren's online privacy and protection act...

Problem solving 2024-02-08

Problem solving crossword puzzle
Across
  1. a programming paradigm.
  2. defines a division or section in an HTML document.
  3. Extra hours worked beyond the standard working time.
  4. A numeric data type.
  5. ibrary for building user interfaces.
  6. A tool used to continuously inspect code quality and security.
  7. procedure or formula for solving a problem.
Down
  1. high-level programming language still used in legacy systems.
  2. A data type.
  3. the most basic version of a product
  4. operating system known for its stability and security.
  5. A methodology that combines software development with IT operations.
  6. A platform as a service (PaaS) product that uses OS-level virtualization.
  7. the process of restructuring existing code without changing its external behavior.
  8. identifying and fixing errors.

15 Clues: A data type.A numeric data type.a programming paradigm.identifying and fixing errors.the most basic version of a productibrary for building user interfaces.procedure or formula for solving a problem.defines a division or section in an HTML document.Extra hours worked beyond the standard working time....

IT 2025-12-14

IT crossword puzzle
Across
  1. A set of instructions for solving a problem
  2. A security system that blocks unauthorized access
  3. The act of entering your username and password
  4. Converting information into a code for security
  5. A computer that provides data or services to others
  6. A secret word or phrase to access an account
  7. An organized collection of information
Down
  1. A program that can damage files or systems
  2. Software designed to harm a computer or network
  3. Programs that run on a computer
  4. A copy of data to prevent loss
  5. A device that directs data between networks
  6. A group of connected computers
  7. The physical parts of a computer
  8. Storing data online instead of on a local device

15 Clues: A copy of data to prevent lossA group of connected computersPrograms that run on a computerThe physical parts of a computerAn organized collection of informationA program that can damage files or systemsA set of instructions for solving a problemA device that directs data between networksA secret word or phrase to access an account...

Responds & Report Security Risks 2023-11-13

Responds & Report Security Risks crossword puzzle
Across
  1. IT or tech professionals who can fix security issues.
  2. Action to take when you suspect a security problem – like turning off the water in a leaky house.
  3. Potential threats or vulnerabilities that could harm digital systems.
  4. Staying watchful and alert to potential security threats.
Down
  1. Unauthorized access
  2. One of the aspects compromised by security risks, involves protecting sensitive information.
  3. A collective effort to create a safer digital environment by addressing potential risks.

7 Clues: Unauthorized accessIT or tech professionals who can fix security issues.Staying watchful and alert to potential security threats.Potential threats or vulnerabilities that could harm digital systems.A collective effort to create a safer digital environment by addressing potential risks....

BIL Processes 2024-06-12

BIL Processes crossword puzzle
Across
  1. Standard forms in the insurance industry
  2. An intermediary between you and the insured
  3. The company providing the insurance
  4. The person making a judgment about the amount of risk on a policy
Down
  1. The type of coverage to help a company recover losses from a data breach
  2. Proof of Insurance
  3. Our main Program sells _________ Liability
  4. A change to an in-force policy
  5. Pearl belongs to this part of One80

9 Clues: Proof of InsuranceA change to an in-force policyThe company providing the insurancePearl belongs to this part of One80Standard forms in the insurance industryOur main Program sells _________ LiabilityAn intermediary between you and the insuredThe person making a judgment about the amount of risk on a policy...

Anti-bullying 2023-05-05

Anti-bullying crossword puzzle
Across
  1. unwanted touching, hitting, spittng, tripping, shoving, pushing, being agrresive
  2. name calling, teasing, racial comments, sarcasm, rumors, mean spirited comments
  3. similar to verbal bullying but is done online or thorugh texting
  4. bullying that involves a group
  5. a witness to bullying that does nothing or joins in
Down
  1. a witness to bullying that helps to stop the bullying behavior
  2. a repeated, negative unwanted action toward another individual
  3. on purpose
  4. intentionally leaving someone out

9 Clues: on purposebullying that involves a groupintentionally leaving someone outa witness to bullying that does nothing or joins ina witness to bullying that helps to stop the bullying behaviora repeated, negative unwanted action toward another individualsimilar to verbal bullying but is done online or thorugh texting...

BIT&BYTE CROSSWORD 2023-12-14

BIT&BYTE CROSSWORD crossword puzzle
Across
  1. Unwanted emails sent in bulk to promote a product
  2. Short for "virtual private network"
  3. A way to protect data by scrambling it
  4. A backup copy of data in case of loss
  5. Hacking into a system without permission.
  6. Keeping data safe from unauthorized access, modification, and deletion
  7. Attack that encrypts files and demands payment
  8. Impersonating a trusted entity to steal information
Down
  1. Short for "denial-of-service" attack
  2. The process of identifying and fixing security vulnerabilities
  3. Software that protects against viruses and malware
  4. A sequence of characters used to gain access to a system
  5. Weak point in a system that can be exploited
  6. Malicious software disguised as a legitimate program
  7. Network filtering system to control traffic
  8. Two-factor authentication often uses this
  9. A device that blocks unauthorized access to a network
  10. Social engineering technique using deception to gain information
  11. Strong passwords should include these

19 Clues: Short for "virtual private network"Short for "denial-of-service" attackA backup copy of data in case of lossStrong passwords should include theseA way to protect data by scrambling itTwo-factor authentication often uses thisHacking into a system without permission.Network filtering system to control traffic...

SJC Kid's Crossword 2024-06-23

SJC Kid's Crossword crossword puzzle
Across
  1. When you put money in the basket
  2. Our bass player
  3. He preaches sometimes and his first name is David
  4. The color of the carpet in the sanctuary
  5. The street our church is on
  6. Our lead a/v tech, or the guy runs sound!
  7. Our Deacon of Outreach and Discipleship
  8. Our second security guard and a Freedom Arts Youth Leader
  9. Our pastor and main preacher
Down
  1. She sings every week and is your substitute kids class teacher
  2. Our Head of Security / Deacon of Defense
  3. Your kids class teacher!
  4. Our lead piano player
  5. The name of our neighborhood
  6. Our drummer and music coordinator
  7. Minister and Ms. Toni's mom!
  8. Our Minister of Administration, or the guy who puts out the snacks!
  9. The President of our church
  10. When we eat crackers and drink juice to remember Jesus' crucifixion

19 Clues: Our bass playerOur lead piano playerYour kids class teacher!The street our church is onThe President of our churchThe name of our neighborhoodMinister and Ms. Toni's mom!Our pastor and main preacherWhen you put money in the basketOur drummer and music coordinatorOur Deacon of Outreach and DiscipleshipOur Head of Security / Deacon of Defense...

CyberHarassment 2016-02-23

CyberHarassment crossword puzzle
Across
  1. ________ Addiction: A compulsive behavior.
  2. stalking This includes threats and identity theft.
  3. _____ Speech: Speech against a certain race.
Down
  1. A crime committed via Internet.
  2. Are believed to be more addicted to internet.
  3. _____ Harm: The promotion of drug abuse.

6 Clues: A crime committed via Internet._____ Harm: The promotion of drug abuse.________ Addiction: A compulsive behavior._____ Speech: Speech against a certain race.Are believed to be more addicted to internet.stalking This includes threats and identity theft.

Unit 4 Crossword 2022-03-16

Unit 4 Crossword crossword puzzle
Across
  1. meeting Conference between the highest-ranking officials of different nations
  2. A policy of nonparticipation in international economic and political relations
  3. Policy A nation's overall plan for dealing with other nations
  4. A large, complex organization composed of appointed officials
  5. A group of advisers to the president.
  6. The easing of hostility or strained relations, especially between countries.
  7. A position of not taking sides in a conflict
  8. agreements Agreements with other countries that do not need senate approval
  9. Veto or Line Item Veto Constitutional power available to more than forty of America's governors, under which they may disapprove some provisions of a bill while approving the others.
  10. Security Council An office created in 1947 to coordinate the president's foreign and military policy advisers. Its formal members are the president, vice president, secretary of state, and secretary of defense, and it is managed by the president's national security assistant.
Down
  1. Policy Plans for dealing with national problems
  2. Negotiation Between nations
  3. American policy of resisting further expansion of communism around the world
  4. theories massive retaliation and mutually assured destruction
  5. aid Money, food, or other resources given or lent by one country to another.
  6. a formally concluded and ratified agreement between countries.
  7. privilege An implied presidential power that allows the president to refuse to disclose information regarding confidential conversations or national security to Congress or the judiciary.
  8. Governor an elected official serving as deputy to the governor of a state of the United States
  9. Branch (President) Carries out the laws
  10. Restrictions intended to enforce international law
  11. Highest-ranking officials representing a government in a foreign country.

21 Clues: Negotiation Between nationsA group of advisers to the president.Branch (President) Carries out the lawsA position of not taking sides in a conflictPolicy Plans for dealing with national problemsRestrictions intended to enforce international lawtheories massive retaliation and mutually assured destruction...

CyberSecurity 2024-10-10

CyberSecurity crossword puzzle
Across
  1. Router Security Protocol
  2. Action for infected computer
  3. One part of user's credentials
  4. social engineering by phone
Down
  1. malware lockouts
  2. Dual Authentication
  3. security of non-public data
  4. Social engineering by text

8 Clues: malware lockoutsDual AuthenticationRouter Security ProtocolSocial engineering by textsecurity of non-public datasocial engineering by phoneAction for infected computerOne part of user's credentials

Death Star Security Matrix 2022-08-06

Death Star Security Matrix crossword puzzle
Across
  1. Desert Planet with 2 Suns
  2. The oldest Forest Path Cabin
  3. Luke _________
  4. A Jedi's Weapon
  5. A water specialty at camp
  6. A Hot Place on the Island
  7. The last period of the day
  8. When we do cabin offerings
  9. The oldest Lake path cabin
Down
  1. When the twinkies go to sleep early
  2. A Revolt or Uprising
  3. The main field at camp
  4. The character trait of being able to wait
  5. A specialty program at camp
  6. Darth _____
  7. A stormtrooper's weapon
  8. What today is called
  9. ___ Solo

18 Clues: ___ SoloDarth _____Luke _________A Jedi's WeaponA Revolt or UprisingWhat today is calledThe main field at campA stormtrooper's weaponDesert Planet with 2 SunsA water specialty at campA Hot Place on the IslandThe last period of the dayWhen we do cabin offeringsThe oldest Lake path cabinA specialty program at campThe oldest Forest Path Cabin...

Chapter 5: Crime & Security 2022-10-19

Chapter 5: Crime & Security crossword puzzle
Across
  1. A virus that encrypts data on a device and demanding a ransom in order to unlock said data
  2. emails convincing victims to use a fake website that appears to be well known
  3. Manipulating people to voilate security protocols
  4. creating fake website to lure uninformed victems in order to steal personal data
  5. malware that attaches or spreads itself to infect other software
  6. process of converting data files into an unreadable code to prevent unauthorized access and viewership
  7. (CFAA)
  8. software that does not attach itself ,created to exploit software/system flaws
  9. Illegal malware that monitors and steals data without the knowledge or consent of an individual
  10. (CERT)developed standards for coding and software development
Down
  1. Illegally breaking into devices and releasing viruses
  2. hacking in order to display support or promote a political cause.
  3. A US&Isreal government collaboration project used to successfully destroy irans nuclear weapons production
  4. (OS),controls access to hardware/software avaible to users
  5. malware that appear to be harmless software
  6. Biological markers of an individual used for identification
  7. Crashing servers by overwhelming data traffic with packets and frames
  8. legally breaking into computer systems/software to test security/software integrity

18 Clues: (CFAA)malware that appear to be harmless softwareManipulating people to voilate security protocolsIllegally breaking into devices and releasing viruses(OS),controls access to hardware/software avaible to usersBiological markers of an individual used for identification(CERT)developed standards for coding and software development...

data security and integrity 2025-10-07

data security and integrity crossword puzzle
Across
  1. check – method to check data has been transferred correctly even or odd
  2. software that seeks to damage
  3. method used to ensure entered data is reasonable and meets certain input criteria.
  4. software that detects and removes spyware programs installed
  5. digit additional digit appended to a number to check if entered data is error free.
  6. Reverse process of decryption
  7. the accuracy, completeness and consistency of data.
  8. a way of proving somebody or something is who or what they claim to be.
  9. legitimate-looking emails designed to trick a recipient
  10. method used to calculate a check digit based on modulus division by 11.
Down
  1. software or hardware that is between a computer and externalnetwork that
  2. the privacy of personal information,
  3. verification method used to check if data transferred has been altered
  4. illegal access to a computer system without the owner’s permission.
  5. method used to ensure data is correct by using double entry or visual checks.
  6. use of unique human characteristics to identify a user
  7. methods taken to prevent unauthorised access to data
  8. redirecting a user to a fake website in order to illegally obtain personal data

18 Clues: software that seeks to damageReverse process of decryptionthe privacy of personal information,the accuracy, completeness and consistency of data.methods taken to prevent unauthorised access to datause of unique human characteristics to identify a userlegitimate-looking emails designed to trick a recipient...

Security Issues 2015-11-18

Security Issues crossword puzzle
Across
  1. false website to ascertain you personal details which can lead to other criminal activities
  2. graffiti on a website
  3. finding signals or to gain entry on the advantage of others (e.g. WIFI)
Down
  1. goods sold on the black market
  2. mistakes made while development systems
  3. sending messages to a server until it "falls over"
  4. you details (credit card etc )stolen and used
  5. unauthorised access of this person either by using code or other means

8 Clues: graffiti on a websitegoods sold on the black marketmistakes made while development systemsyou details (credit card etc )stolen and usedsending messages to a server until it "falls over"unauthorised access of this person either by using code or other meansfinding signals or to gain entry on the advantage of others (e.g. WIFI)...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Personen die illegal in Computersysteme eindringen
  2. Überbegriff für unerwünschte, schädliche Software
  3. schützt den Computer von Zugriff fremder
  4. Messaging chatten
  5. Datenverarbeitungsregisternummer
  6. Programme, die Tastatureingaben mitprotokolieren
Down
  1. Beobachtung bei der Eingabe von Daten
  2. Betrugsmethode

8 Clues: BetrugsmethodeMessaging chattenDatenverarbeitungsregisternummerBeobachtung bei der Eingabe von Datenschützt den Computer von Zugriff fremderProgramme, die Tastatureingaben mitprotokolierenÜberbegriff für unerwünschte, schädliche SoftwarePersonen die illegal in Computersysteme eindringen

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Beobachtung bei der Eingabe von Daten
  2. Datenverarbeitungsregisternummer
  3. schützt den Computer von Zugriff fremder Nutzer
Down
  1. Programme, die Tastatureingaben mitprotokolieren
  2. Personen die illegal in Computersysteme eindringen
  3. Betrugsmethode
  4. chatten
  5. Überbegriff für unerwünschte, schädliche Software

8 Clues: chattenBetrugsmethodeDatenverarbeitungsregisternummerBeobachtung bei der Eingabe von Datenschützt den Computer von Zugriff fremder NutzerProgramme, die Tastatureingaben mitprotokolierenÜberbegriff für unerwünschte, schädliche SoftwarePersonen die illegal in Computersysteme eindringen

Platform security 2020-11-27

Platform security crossword puzzle
Across
  1. asynchronous event that can occur at any time, irrespective of what processor is doing
  2. , processes running in the background, started by the kernel itself.
  3. synchronous condition that results from a particularly undesirable situation.
  4. , separate low-level system software running on the host machine to perform visualization.
Down
  1. , the process responsible for secure logon.
  2. , a real-time operating system used in mission-critical applications
  3. , linux uses this technique to define the priority of processes
  4. , one method to block buffer overflow attacks

8 Clues: , the process responsible for secure logon., one method to block buffer overflow attacks, linux uses this technique to define the priority of processes, a real-time operating system used in mission-critical applications, processes running in the background, started by the kernel itself....

Security Awareness 2019-05-09

Security Awareness crossword puzzle
Across
  1. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge,
  2. the fraudulent practice of sending emails to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.
  3. an attack or entry into computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.
  4. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
Down
  1. violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."
  2. a string of words that must be used to gain access to a computer system or service.
  3. a person who uses computers to gain unauthorized access to data.
  4. a string of characters that allows access to a computer system or service.

8 Clues: a person who uses computers to gain unauthorized access to data.a string of characters that allows access to a computer system or service.a string of words that must be used to gain access to a computer system or service.convert (information or data) into a cipher or code, especially to prevent unauthorized access....

Work Security 2020-10-25

Work Security crossword puzzle
Across
  1. to convert (information or data) into a code, especially to prevent unauthorized access
  2. making you feel that something illegal is happening or that something is wrong
  3. (of access)gaining logical or physical access without permission to a network, system, etc.
Down
  1. (verb+preposition)to do things that you hope will stop something unpleasant from happening
  2. (verb+preposition) to stop from
  3. (of information)data that must be guarded from unauthorized access, protected
  4. wrongful or criminal deception intended to result in financial or personal gain
  5. a person who uses computers to gain unauthorized access to data

8 Clues: (verb+preposition) to stop froma person who uses computers to gain unauthorized access to data(of information)data that must be guarded from unauthorized access, protectedmaking you feel that something illegal is happening or that something is wrongwrongful or criminal deception intended to result in financial or personal gain...

Security Crossword 2021-07-26

Security Crossword crossword puzzle
Across
  1. This team will lock doors and post a 'Temporarily Closed' sign at all entrances and the drive-thru window
  2. How often must we review security procedures used at financial centers with all employees
  3. These packs are wrapped with $50 bills
  4. This team will protect the areas where the robber/bandit was known to have been with chairs, ropes, tables or other objects
Down
  1. This team will obtain the Financial Center's list of bait money and make a copy of the serial numbers of the bait money of the teller(s) who was robbed to give to the police
  2. How many response teams are there
  3. All cash drawers must be kept ____ when the teller is not at his/her station
  4. This team will distribute the Bandit Description Forms and pencils or pens

8 Clues: How many response teams are thereThese packs are wrapped with $50 billsThis team will distribute the Bandit Description Forms and pencils or pensAll cash drawers must be kept ____ when the teller is not at his/her stationHow often must we review security procedures used at financial centers with all employees...

Security - Easy 2023-11-28

Security - Easy crossword puzzle
Across
  1. computer's favourite snack
  2. What is the term for a secret combination of letters, numbers, and symbols used to access a system?
  3. term for a security mechanism that restricts access based on the user's identity
  4. Security measure tracking and recording system activities
  5. type of software protects a computer from malicious programs by scanning and removing them
Down
  1. practice of converting readable data into unreadable characters to prevent unauthorized access
  2. acronym VPN stands for
  3. practice of controlling access by permitting only approved programs.

8 Clues: acronym VPN stands forcomputer's favourite snackSecurity measure tracking and recording system activitiespractice of controlling access by permitting only approved programs.term for a security mechanism that restricts access based on the user's identitytype of software protects a computer from malicious programs by scanning and removing them...

Computer security 2023-04-11

Computer security crossword puzzle
Across
  1. of using multiple methods to authenticate a user's identity before granting access to a computer system.
  2. of analyzing and identifying potential vulnerabilities in computer systems.
  3. of computer systems and data from damage or destruction caused by natural disasters, accidents, or deliberate attacks.
  4. of rules or protocols that dictate how data is transmitted and received over a network.
  5. method that uses a single secret key to both encrypt and decrypt data.
  6. software that is designed to harm or exploit computer systems.
Down
  1. of keeping software up-to-date with the latest security patches and updates to protect against known vulnerabilities.
  2. of encoding messages or information in such a way that only authorized parties can read it.
  3. of computer systems from unauthorized access and theft of data (two words).
  4. designed to prevent unauthorized access to a computer or network.

10 Clues: software that is designed to harm or exploit computer systems.designed to prevent unauthorized access to a computer or network.method that uses a single secret key to both encrypt and decrypt data.of analyzing and identifying potential vulnerabilities in computer systems.of computer systems from unauthorized access and theft of data (two words)....

TTS security 2023-06-05

TTS security crossword puzzle
Across
  1. Tim yang terlatih dan siap memberikan bantuan pertama dalam situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall
  2. Ketika kerugian atau kehilangan terjadi dari tenant, pihak .......... berperan sebagai mediator dan membantu dalam proses investigasi, namun keputusan akhir tetap berada di tangan tenant itu sendiri
  3. kondisi kejadian yang melibatkan para pengunjung dan tenant Mall, mencakup situasi seperti tabrakan kendaraan atau perselisihan antara pengunjung dan karyawan tenant
  4. Tanggung jawab pihak manajemen Mall dalam menangani situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall, termasuk pengaturan pertolongan pertama dan pemindahan korban ke fasilitas medis yang sesuai disebut
  5. Dokumen yang terdiri dari pengakuan pelaku, pengakuan kerusakan atau kehilangan barang dari korban, serta kesaksian dari saksi yang melihat kejadian tersebut
  6. Tempat yang menjadi magnet bagi para pengunjung, di mana mereka dapat berbelanja, bersantai, dan menikmati berbagai aktivitas
Down
  1. Orang-orang yang memasuki Mall dengan berbagai tujuan, termasuk para pelanggan, karyawan tenant, karyawan vendor, dan tamu lainnya
  2. Kejadian yang mengganggu kelancaran dan keselamatan operasional Mall, serta berpotensi merusak aset berharga disebut

8 Clues: Kejadian yang mengganggu kelancaran dan keselamatan operasional Mall, serta berpotensi merusak aset berharga disebutTim yang terlatih dan siap memberikan bantuan pertama dalam situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall...

data security 2025-01-15

data security crossword puzzle
Across
  1. The potential for loss or damage.
  2. Adhering to data protection regulations.
  3. Maintaining the accuracy and completeness of data.
Down
  1. Ensuring that information is accessible only to those authorized to have access.
  2. A weakness that can be exploited.
  3. An event that compromises data security.
  4. Data Loss Prevention, strategies to prevent data breaches.
  5. The technique of obscuring specific data within a database to protect sensitive information.

8 Clues: A weakness that can be exploited.The potential for loss or damage.An event that compromises data security.Adhering to data protection regulations.Maintaining the accuracy and completeness of data.Data Loss Prevention, strategies to prevent data breaches.Ensuring that information is accessible only to those authorized to have access....

Data Security 2024-10-14

Data Security crossword puzzle
Across
  1. A program that filters the information coming through your computer
  2. The unauthorised access and use of networked
  3. This involves the use of websites and email messages that try to trick you into entering your personal information.
  4. This is the use of electronic devices to monitor electronic communications between two or more groups without the permission of any of the communicating parties.
  5. A special type of software used to remove viruses from a computer's hard disk
Down
  1. The illegal use, sharing, selling or distribution of copies of software or music.
  2. Criminals use computerised systems to steal people's credit card information
  3. A program that uses computer network and weakness to repeatedly copy itself into computer's memory

8 Clues: The unauthorised access and use of networkedA program that filters the information coming through your computerCriminals use computerised systems to steal people's credit card informationA special type of software used to remove viruses from a computer's hard diskThe illegal use, sharing, selling or distribution of copies of software or music....

Security Awareness 2024-04-16

Security Awareness crossword puzzle
Across
  1. Testing environment.
  2. Protect sensitive information from being leaked by users.
  3. "M" Computer security company.
  4. Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
  5. Most common cyberattack on internet.
Down
  1. Social __ when actors trick others into revealing sensitive info.
  2. An attack where a person allows themselves to be identified as someone else.
  3. As cybersecurity threats grow, sites include this increased security feature.

8 Clues: Testing environment."M" Computer security company.Most common cyberattack on internet.Protect sensitive information from being leaked by users.Social __ when actors trick others into revealing sensitive info.An attack where a person allows themselves to be identified as someone else....

Airport security 2022-10-20

Airport security crossword puzzle
Across
  1. a place where they inspect your luggage
  2. official rules
Down
  1. someone who travels with you
  2. baggage that no one is watching
  3. a machine that sets off where it detects metal
  4. a machine that looks through things
  5. to use something to key people going into a space
  6. a machine that records what’s happening around

8 Clues: official rulessomeone who travels with youbaggage that no one is watchinga machine that looks through thingsa place where they inspect your luggagea machine that sets off where it detects metala machine that records what’s happening aroundto use something to key people going into a space

Security Elements 2025-09-25

Security Elements crossword puzzle
Across
  1. A sequence of numbers or letters used to open a lock
  2. Access to areas where there is cannabis, security elements, confidential information, is BLANK to persons whose presence in those areas is required by their work responsibilities
  3. system in the areas to be accessed.
Down
  1. The first BLANK employee to enter the building enters his/her code to disarm the intrusion
  2. Employees are required to present a valid BLANK to gain access to the facility.
  3. Stands for Head Of Security
  4. A word, phrase, or string of characters intended to differentiate an authorized user or process, for the purpose of permitting access
  5. BLANK using the designated security phone in order to have your designated security element enabled for further access.

8 Clues: Stands for Head Of Securitysystem in the areas to be accessed.A sequence of numbers or letters used to open a lockEmployees are required to present a valid BLANK to gain access to the facility.The first BLANK employee to enter the building enters his/her code to disarm the intrusion...

Computer security 2025-11-18

Computer security crossword puzzle
Across
  1. A small moving arrow on the screen. cursor
  2. A small button you press on a keyboard. key
  3. Another word for a small button on a keyboard. key
  4. A screen you use to see information. monitor
  5. To press the mouse button. click
Down
  1. A bar at the bottom of the screen with icons and open programs.taskbar
  2. A place on your computer where you can store files. folder
  3. The name you use to log in to a computer or website. username
  4. A device you use to type letters on a computer. keyboard

9 Clues: To press the mouse button. clickA small moving arrow on the screen. cursorA small button you press on a keyboard. keyA screen you use to see information. monitorAnother word for a small button on a keyboard. keyA device you use to type letters on a computer. keyboardA place on your computer where you can store files. folder...

Social Security Principles 2013-12-05

Social Security Principles crossword puzzle
Across
  1. a type of redistribution from rich to poor
  2. transferring money from one group to another
  3. feeling safe and secure is known as social "what"
  4. stopping someone from become poor is another key aspect of social security, what is it called
Down
  1. social security is also used to alter how people act thus changing their "what"
  2. a type of redistribution from childless families to families with children
  3. spreading income over your lifetime
  4. this refers to provision against injury or illness
  5. what is social security usually said to be relieving

9 Clues: spreading income over your lifetimea type of redistribution from rich to poortransferring money from one group to anotherfeeling safe and secure is known as social "what"this refers to provision against injury or illnesswhat is social security usually said to be relievinga type of redistribution from childless families to families with children...

UN Crossword Puzzle 2024-10-10

UN Crossword Puzzle crossword puzzle
Across
  1. Last name of the current UN Secretary-General
  2. Asian country holding a permanent seat in the Security Council
  3. Principal judicial organ of the UN for resolving international disputes
  4. Group of five permanent members with veto power in the Security Council
Down
  1. Main deliberative organ of the UN where all member states participate
  2. Unique power allowing P5 members to block decisions in the UNSC
  3. UN body responsible for maintaining international peace and security
  4. International organization founded in 1945 to promote peace and cooperation
  5. Legal status of certain UNSC decisions that member states must follow

9 Clues: Last name of the current UN Secretary-GeneralAsian country holding a permanent seat in the Security CouncilUnique power allowing P5 members to block decisions in the UNSCUN body responsible for maintaining international peace and securityMain deliberative organ of the UN where all member states participate...

Airport terminology 2018-11-12

Airport terminology crossword puzzle
Across
  1. Retail outlets which is exempt from the payment of certain local or national taxes and duties
  2. Where would you find security dogs?
  3. What does F&B stand for?
  4. The area where you go through security and hand over your passport and departure card for inspection.
Down
  1. An area of the airport on airside which has more comfortable seating than the terminal.
  2. What bridge allows passengers to leave the gate and board the aircraft?
  3. Where would you find the Muslim prayer room at AKL Airport INT Terminal?
  4. The first 30 minutes are FREE, then if you require more you may also pay to use the services
  5. The action of registering one's presence, typically as a passenger at an airport
  6. What is the name of the worlds foreign exchange specialist?
  7. Where would you find an aircraft parked?
  8. Rectangular area on a land aerodrome prepared for the landing and takeoff of aircraft

12 Clues: What does F&B stand for?Where would you find security dogs?Where would you find an aircraft parked?What is the name of the worlds foreign exchange specialist?What bridge allows passengers to leave the gate and board the aircraft?Where would you find the Muslim prayer room at AKL Airport INT Terminal?...

Security Crossword Puzzle 2018-08-03

Security Crossword Puzzle crossword puzzle
Across
  1. Clearance level of our facility.
  2. Badge Foreign Visitors - Escort Required.
  3. Unclassified Information Sensitive information that includes, but not limited to, Export Control Information.
  4. Information Must be protected at all times.
  5. Aguirre Facility Security Officer.
Down
  1. Contact Effort to gain illegal or unauthorized access to classified and/or other sensitive technology.
  2. A foreign interest that has the power, direct or indirect, to affect the management or operations of a company. (FOCI)
  3. Control Plan Specifies how we endure proper control and exchange of technical data-applies to all interaction with all foreign persons, not just Leonardo or its subsidiaries.
  4. Control Plan DRS policy that outlines compliance and validation for electronic communications.
  5. Security Service Provides oversight and annual security reviews to DRS.
  6. Information Jeopardizes integrity/character of a cleared employee. The ability to safeguard classified information may be at risk.
  7. Training Required annually as a part of the mitigation between DRS, Leonardo, and the US Government.

12 Clues: Clearance level of our facility.Aguirre Facility Security Officer.Badge Foreign Visitors - Escort Required.Information Must be protected at all times.Security Service Provides oversight and annual security reviews to DRS.Control Plan DRS policy that outlines compliance and validation for electronic communications....

Technology Engineering 2018-03-06

Technology Engineering crossword puzzle
Across
  1. copy one computer information to another
  2. a global computer network providing a verity of information
  3. machines, wiring and other physical components of a computer
  4. a instruction connecting one part of a program to another
  5. relating to he culture of computers and information technology
Down
  1. controlled by or connected to another computer or network
  2. programs and other information used by computers
  3. a program used to view documents
  4. fix a computer program piecemeal until it works
  5. a symbolic arrangement of data in a computer program

10 Clues: a program used to view documentscopy one computer information to anotherfix a computer program piecemeal until it worksprograms and other information used by computersa symbolic arrangement of data in a computer programcontrolled by or connected to another computer or networka instruction connecting one part of a program to another...

Bab 3 2025-09-08

Bab 3 crossword puzzle
Across
  1. Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi
  2. perilaku yang memperlakukan seseorang secara beda
  3. warga negara saling mengetahui hak dan kewajibannya secara tepat dan
  4. mempromosikan kampanye anti pelanggaran hak dan pengingkaran
  5. merupakan tindakan semena-mena berupa menyakiti, mempersulit atau melenyapkan seseorang
Down
  1. salah satu upaya yang dapat dilakukan oleh negara untuk mencegah kasus pelanggaran hak adalah
  2. BULLYING bentuk pelanggaran hak
  3. hak yang didapat setiap manusia
  4. ketentuan mengenai hal dan kewajiban warga negara bersifat
  5. UUD NRI tahun 1945 berperan sebagai hukum

10 Clues: BULLYING bentuk pelanggaran hakhak yang didapat setiap manusiaUUD NRI tahun 1945 berperan sebagai hukumperilaku yang memperlakukan seseorang secara bedaketentuan mengenai hal dan kewajiban warga negara bersifatmempromosikan kampanye anti pelanggaran hak dan pengingkaranHak atas pembangunan ini pun dinyatakan kembali melalui deklarasi...

vocab 2022-02-16

vocab crossword puzzle
Across
  1. bank you make money off of accounts
  2. physical form of currency
  3. people that manage credit
  4. you write money out to people on it
  5. used if you want to pay later
  6. manage accounts of loans and savings
  7. put money in a bank account
  8. protection of something
  9. guarantee from bank that you will pay the money back on time
Down
  1. to move money somewhere else
  2. bank account if you plan to spend
  3. lets you borrow money when you need it
  4. institute you can't deposity money into
  5. where security is
  6. bank account if you plan to save
  7. a unit of value
  8. let you buy without carrying cash

17 Clues: a unit of valuewhere security isprotection of somethingphysical form of currencypeople that manage creditput money in a bank accountto move money somewhere elseused if you want to pay laterbank account if you plan to savebank account if you plan to spendlet you buy without carrying cashbank you make money off of accounts...

Crossword - Chapter 3 2024-08-12

Crossword - Chapter 3 crossword puzzle
Across
  1. health care services at discounted prices and controls to reduce costs
  2. before 1965 this type of insurance was available to working people
  3. govt policy with primary aim to expand health insurance to the uninsured
  4. quarantined people with contagious diseases
  5. provide coverage for physicians and outpatient services under medicare
  6. larger group practices including strategic partnerships and corporatization of health delivery
  7. various forms of cross border economic activities
  8. first hospital insurance network
  9. administers both medicare and medicaid
Down
  1. health care information and services over the internet
  2. title 18 of the Social Security Act of 1965
  3. voluntary health insurance
  4. obamacare
  5. title 19 of the Social Security Act of 1965
  6. provide coverage to hospitals under medicare
  7. served the destitute and known as the poorhouse
  8. first plan to cover for physician fees

17 Clues: obamacarevoluntary health insurancefirst hospital insurance networkfirst plan to cover for physician feesadministers both medicare and medicaidtitle 18 of the Social Security Act of 1965quarantined people with contagious diseasestitle 19 of the Social Security Act of 1965provide coverage to hospitals under medicare...

SSA 2023-05-24

SSA crossword puzzle
Across
  1. which way did Black Sunday move?
  2. Who signed the Medicare and Medicaid Act? Last name
  3. healthcare for low incomes
  4. 5 ___ dollars were earmarked for the WPA
  5. Social security __ were made to track workers' benefits and wages
  6. one in ___ older americans had health insurance in 1950
  7. The WPA existed for 8 ____
  8. up to ___ million tons of topsoil blew off the great plains on black sunday
  9. The Social Security Act was signed in 19__
Down
  1. The P in WPA stands for..
  2. The dust bowl was named after Black __
  3. What were the Oklahoma migrants called during the dust bowl?
  4. where did the Black Sunday soil start?
  5. healthcare for ages 65+
  6. The WPA created the Federal Project ___
  7. The unemployment rate in 1935 was __%

16 Clues: healthcare for ages 65+The P in WPA stands for..healthcare for low incomesThe WPA existed for 8 ____which way did Black Sunday move?The unemployment rate in 1935 was __%The dust bowl was named after Black __where did the Black Sunday soil start?The WPA created the Federal Project ___5 ___ dollars were earmarked for the WPA...

SSA 2023-05-24

SSA crossword puzzle
Across
  1. which way did Black Sunday move?
  2. Who signed the Medicare and Medicaid Act? Last name
  3. healthcare for low incomes
  4. 5 ___ dollars were earmarked for the WPA
  5. Social security __ were made to track workers' benefits and wages
  6. one in ___ older americans had health insurance in 1950
  7. The WPA existed for 8 ____
  8. up to ___ million tons of topsoil blew off the great plains on black sunday
  9. The Social Security Act was signed in 19__
Down
  1. The P in WPA stands for..
  2. The dust bowl was named after Black __
  3. What were the Oklahoma migrants called during the dust bowl?
  4. where did the Black Sunday soil start?
  5. healthcare for ages 65+
  6. The WPA created the Federal Project ___
  7. The unemployment rate in 1935 was __%

16 Clues: healthcare for ages 65+The P in WPA stands for..healthcare for low incomesThe WPA existed for 8 ____which way did Black Sunday move?The unemployment rate in 1935 was __%The dust bowl was named after Black __where did the Black Sunday soil start?The WPA created the Federal Project ___5 ___ dollars were earmarked for the WPA...

SSA 2023-05-24

SSA crossword puzzle
Across
  1. which way did Black Sunday move?
  2. Who signed the Medicare and Medicaid Act? Last name
  3. healthcare for low incomes
  4. 5 ___ dollars were earmarked for the WPA
  5. Social security __ were made to track workers' benefits and wages
  6. one in ___ older americans had health insurance in 1950
  7. The WPA existed for 8 ____
  8. up to ___ million tons of topsoil blew off the great plains on black sunday
  9. The Social Security Act was signed in 19__
Down
  1. The P in WPA stands for..
  2. The dust bowl was named after Black __
  3. What were the Oklahoma migrants called during the dust bowl?
  4. where did the Black Sunday soil start?
  5. healthcare for ages 65+
  6. The WPA created the Federal Project ___
  7. The unemployment rate in 1935 was __%

16 Clues: healthcare for ages 65+The P in WPA stands for..healthcare for low incomesThe WPA existed for 8 ____which way did Black Sunday move?The unemployment rate in 1935 was __%The dust bowl was named after Black __where did the Black Sunday soil start?The WPA created the Federal Project ___5 ___ dollars were earmarked for the WPA...

Storage of Electronic Data 2022-04-14

Storage of Electronic Data crossword puzzle
Across
  1. data,
  2. storage,
  3. incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
  4. commit data as retrievable records.
  5. may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
  1. by the university and maintained by ITS for the purpose of electronically retaining university data.
  2. The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
  3. security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
  4. and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
  5. Office,

10 Clues: data,Office,storage,commit data as retrievable records.by the university and maintained by ITS for the purpose of electronically retaining university data.and all data and records created, collected, stored and/or managed in connection with the operation and management of the university...

Travel 2023-05-09

Travel crossword puzzle
Across
  1. välis-, ülemere-
  2. sihtkohta jõudma
  3. trahv, trahvima
  4. võõrastemaja, noortehotell
  5. pagas
  6. käsipagas
  7. registreerima, lennujaamas/ hotellis
  8. sadam
Down
  1. tolliametnik
  2. pardapääse
  3. deklareerima, kuulutama
  4. karistus
  5. padi
  6. kohver
  7. turvakontrolli läbima
  8. sadam
  9. reisiterminal
  10. vahekäik

18 Clues: padipagassadamsadamkohverkaristusvahekäikkäsipagaspardapääsetolliametnikreisiterminaltrahv, trahvimavälis-, ülemere-sihtkohta jõudmaturvakontrolli läbimadeklareerima, kuulutamavõõrastemaja, noortehotellregistreerima, lennujaamas/ hotellis

FSB Crossword Puzzle 2020-06-17

FSB Crossword Puzzle crossword puzzle
Across
  1. Who is our Conway Market President/CEO?
  2. How may locations are in the Conway Market?
  3. When did FSB expand into Clinton and Vilonia?
  4. When did we launch Only in Ark.com?
  5. How many employees does FSB have?
  6. When did FSB acquire Crew's and Associates?
  7. What was FSB Conway's name before we merged with Searcy?
  8. How many locations does FSB have?
  9. How many sons does Reynie Rutledge have?
  10. Who is our Kids Club Mascot
Down
  1. When did the Rutledge Family purchase First Security Bank?
  2. what location is our newest in the state?
  3. Who is our Gold Club Director?
  4. When did we expand into Mayflower?
  5. How many employees does FSB have?
  6. billion, What is the banks asset size?
  7. When was the Teal Grill introduced?
  8. When did First Security Bank get its charter?

18 Clues: Who is our Kids Club MascotWho is our Gold Club Director?How many employees does FSB have?How many employees does FSB have?How many locations does FSB have?When did we expand into Mayflower?When did we launch Only in Ark.com?When was the Teal Grill introduced?billion, What is the banks asset size?Who is our Conway Market President/CEO?...

unit 6; 2014-04-13

unit 6; crossword puzzle
Across
  1. a camera system used to maintain security
  2. a kitchen device that keeps food fresh and cold
  3. a card which resembles a debt to your bank
  4. somebody who steals things from pockets and purses
  5. somebody who is incredibly stupid
  6. a group of people who protect humans and things
  7. to force somebody to hand over things that aren't yours
  8. to have done something you shouldn't
  9. breaking things that aren't yours
Down
  1. a commited action which was illigal
  2. to be your own boss
  3. a very sharp blade you use to shave body hair
  4. to steel object from a shop
  5. somebody who investigates crimes
  6. a person who does or has done illigal things
  7. a short coat
  8. a card which shows your personal information
  9. a person who owns a shop

18 Clues: a short coatto be your own bossa person who owns a shopto steel object from a shopsomebody who investigates crimessomebody who is incredibly stupidbreaking things that aren't yoursa commited action which was illigalto have done something you shouldn'ta camera system used to maintain securitya card which resembles a debt to your bank...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

CRIMINOLOGY 2 2022-05-20

CRIMINOLOGY 2 crossword puzzle
Across
  1. and Maintenance
  2. Pattern Theory
  3. Security
  4. Era
  5. Space
  6. Foundation
Down
  1. Control
  2. Violating
  3. By Ordeal
  4. Act
  5. Utilitarianism
  6. Utilitarianism
  7. Bentham

13 Clues: ActEraSpaceControlBenthamSecurityViolatingBy OrdealFoundationPattern TheoryUtilitarianismUtilitarianismand Maintenance

IT ETHICS 2016-09-11

IT ETHICS crossword puzzle
Across
  1. SAFETY
  2. STEALING
  3. MORAL ALIAS
  4. TRACELESS
  5. MEASURE
  6. EXCLUSIVITY
Down
  1. ALIEN
  2. REIMBURSEMENT
  3. INFORMATION SAFEGUARDING
  4. PRACTISE
  5. XEROX
  6. NOT FALSE

12 Clues: ALIENXEROXSAFETYMEASURESTEALINGPRACTISETRACELESSNOT FALSEMORAL ALIASEXCLUSIVITYREIMBURSEMENTINFORMATION SAFEGUARDING

En Ávion 2023-09-27

En Ávion crossword puzzle
Across
  1. SUITCASE
  2. A TRIP
  3. DELAY
  4. WINDOW
  5. FLIGHT
  6. SECURITY
Down
  1. ON TIME
  2. LATE
  3. TRUNK
  4. SOMETIMES
  5. AISLE
  6. TO WAIT

12 Clues: LATETRUNKDELAYAISLEA TRIPWINDOWFLIGHTON TIMETO WAITSUITCASESECURITYSOMETIMES

TTS: BULLYING 2025-08-05

TTS: BULLYING crossword puzzle
Across
  1. Bullying bisa menyebabkan anak menjadi kurang...
  2. Sering jadi korban bullying karena minoritas
  3. Memfitnah,mengatakan hal buruk tentang orang lain dapat merusak...nya
  4. Orang tua harus memberikan...kepada anak
  5. pelaku tindakan bullying disebut...
  6. Pelaku merasa lebih... dari korban
  7. Memberikan komentar negatif terhadap postingan di Instagram teman termasuk bullying...
  8. Memukul, menendang, atau kekerasan tubuh lainnya termasuk bullying...
  9. Reaksi emosional korban bullying misalnya...
  10. Penyelesaian masalah tanpa kekerasan
  11. Dampak psikologis dari bullying yang sering muncul
  12. Bullying bisa menyebabkan anak menjadi kurang...
  13. Tempat di sekolah yang sering terjadi lokasi bullying
  14. Tindakan bullying bisa menimbulkan...dalam jangka waktu lama
  15. Lawan dari egois penting dalam pencegahan bullying
  16. Cyber Bullying merupakan bentuk bullying yang dilakukan melalui...
  17. Orang yang melakukan bullying karena pernah di bully
  18. Sikap yang dibutuhkan untuk melawan bullying adalah...
  19. Pelaku bullying sering merasa punya kekuasaan
  20. Aksi menunjukkan dukungan kepada korban
  21. Sikap tidak peduli terhadap bullying
  22. Korban merasa tidak...oleh orang lain
  23. Bullying secara diam - diam dan mengucilkan
  24. Bentuk penghinaan dalam tulisan di medsos
  25. Sikap diam terhadap bullying disebut budaya...
Down
  1. Kata lain dari ejekan fisik terhadap bentuk tubuh
  2. Salah satu peran penting guru adalah sebagai
  3. Lawan dari kata penindas adalah
  4. Tindakan untuk menghentikan bullying
  5. Tindakan menyakiti orang lain secara sengaja dan berulang
  6. Siswa yang menjadi korban bullying di sekolah bisa melapor kepada...
  7. bullying melalui Medsos atau Internet
  8. Program di sekolahnuntuk mencegah bullying
  9. Raut muka pelaku saat mengejek
  10. Orang yang menyaksikan bullying tanpa bertindak
  11. Proses belajar mencegah bullying
  12. Kata lain dari kerja sama dalam mencegah bullying
  13. Nilai pelajaran bisa turun karena bullying yaitu menurunnya...
  14. Jenis bullying yang menyebarkan gosip jahat adalah...
  15. Teman yang mendukung dan membela saat bullying
  16. Kata lunci dari stop bullying:"Stop, Speak,..."
  17. Kata lain dari pelecehan atau hinaan
  18. Tempat yang sering terjadi cyber bullying
  19. Organisasi atau lembaga yang bisa bantu korban bullying
  20. Kata lain dari kekerasan terus menerus
  21. Lembaga tempat bullying sering terjadi
  22. bentuk bantuan dari psikolog untuk korban
  23. Korban bullying sering merasa... dari lingkungan
  24. Menjelekkan teman dengan memanggil nama orang tuanya termasuk bullying...
  25. Teman sebaya bisa berpotensi sebagai pelaku bullying di lingkungan...
  26. Lawan dari kekerasan adalah...
  27. Bentuk kampanye singkat untuk ajakan anti bullying

52 Clues: Raut muka pelaku saat mengejekLawan dari kekerasan adalah...Lawan dari kata penindas adalahProses belajar mencegah bullyingPelaku merasa lebih... dari korbanpelaku tindakan bullying disebut...Tindakan untuk menghentikan bullyingPenyelesaian masalah tanpa kekerasanKata lain dari pelecehan atau hinaanSikap tidak peduli terhadap bullying...

SSA 2023-05-24

SSA crossword puzzle
Across
  1. which way did Black Sunday move?
  2. Who signed the Medicare and Medicaid Act? Last name
  3. healthcare for low incomes
  4. 5 ___ dollars were earmarked for the WPA
  5. Social security __ were made to track workers' benefits and wages
  6. one in ___ older americans had health insurance in 1950
  7. The WPA existed for 8 ____
  8. up to ___ million tons of topsoil blew off the great plains on black sunday
  9. The Social Security Act was signed in 19__
Down
  1. The P in WPA stands for..
  2. The dust bowl was named after Black __
  3. What were the Oklahoma migrants called during the dust bowl?
  4. where did the Black Sunday soil start?
  5. healthcare for ages 65+
  6. The WPA created the Federal Project ___
  7. The unemployment rate in 1935 was __%

16 Clues: healthcare for ages 65+The P in WPA stands for..healthcare for low incomesThe WPA existed for 8 ____which way did Black Sunday move?The unemployment rate in 1935 was __%The dust bowl was named after Black __where did the Black Sunday soil start?The WPA created the Federal Project ___5 ___ dollars were earmarked for the WPA...

FICO Scores 2025-03-05

FICO Scores crossword puzzle
Across
  1. transunion, experian, equifax
  2. when an asset loses value over time
  3. lowest score on the FICO scale
  4. money you pay back for the use of borrowing money
  5. something used as security for a loan
  6. when an asset goes up in value over time
Down
  1. when you fail to repay a loan on time
  2. when you have to put down a security deposit
  3. a number between 300-850
  4. making fixed payments on a loan
  5. highest score on the FICO scale
  6. the amount of time you have to pay back a loan
  7. Fair Isaac and Company
  8. the amount of the loan including taxes and fees
  9. student loans through FAFSA
  10. when an item is worth less than what you owe

16 Clues: Fair Isaac and Companya number between 300-850student loans through FAFSAtransunion, experian, equifaxlowest score on the FICO scalemaking fixed payments on a loanhighest score on the FICO scalewhen an asset loses value over timewhen you fail to repay a loan on timesomething used as security for a loanwhen an asset goes up in value over time...

Types of bullying 2023-12-05

Types of bullying crossword puzzle
Across
  1. When you bully someone online
  2. When you bully someone due to a physical difference
  3. When you bully someone based on stereotypes
Down
  1. When you bully someone verbally
  2. When you bully someone due to religion
  3. When you bully someone by spreading lies
  4. When you bully someone due to race

7 Clues: When you bully someone onlineWhen you bully someone verballyWhen you bully someone due to raceWhen you bully someone due to religionWhen you bully someone by spreading liesWhen you bully someone based on stereotypesWhen you bully someone due to a physical difference

RansomWare activity 2025-05-23

RansomWare activity crossword puzzle
Across
  1. / Plants malicious encryption software
  2. / New Years ransomware attack
  3. / Locksdevices and causing data across the network to be encrypted
  4. / U.S. workforce management
  5. / Attacked by the Darkside group
Down
  1. / Receive an on-screen notification from the cyber criminal
  2. / blocks access to a computer system until a sum of money is paid

7 Clues: / Attacked by the Darkside group/ U.S. workforce management/ New Years ransomware attack/ Plants malicious encryption software/ Receive an on-screen notification from the cyber criminal/ blocks access to a computer system until a sum of money is paid...

food and animals 2017-10-31

food and animals crossword puzzle
Across
  1. love to other people
  2. i love chicken
  3. it is a cold time
  4. lion are very big
Down
  1. we are using chrome
  2. i go and wash my hands at the bathroom
  3. we have security gaurds
  4. we buy food at the shop
  5. lab we are there

9 Clues: i love chickenlab we are thereit is a cold timelion are very bigwe are using chromelove to other peoplewe buy food at the shopwe have security gaurdsi go and wash my hands at the bathroom

unit 3 2022-04-21

unit 3 crossword puzzle
Across
  1. tetőterasz
  2. konferencia
  3. érkezési kapuk
  4. beszáll a repülőgépbe
  5. talán
  6. biztonsági ellenörzés
  7. rémálom
  8. csatlakozó járat (2 szó)
  9. indulási kapuk
  10. késik
Down
  1. jóslat
  2. agresszív közúti magatartás (2 szó)
  3. megbeszél egy nappot (3 szó)
  4. utasok
  5. csomagkiadó (2 szó)
  6. átvesz, befogad
  7. vám
  8. kapu

18 Clues: vámkaputalánkésikjóslatutasokrémálomtetőteraszkonferenciaérkezési kapukindulási kapukátvesz, befogadcsomagkiadó (2 szó)beszáll a repülőgépbebiztonsági ellenörzéscsatlakozó járat (2 szó)megbeszél egy nappot (3 szó)agresszív közúti magatartás (2 szó)

EC- SP 4 Voc 6.1-6.4 2024-04-24

EC- SP 4 Voc 6.1-6.4 crossword puzzle
Across
  1. punishment
  2. education or training
  3. career opportunity
  4. safety,security
  5. ideology
  6. to treat people
Down
  1. equality
  2. belief
  3. punctual
  4. treatment
  5. coexist
  6. delay
  7. infer

13 Clues: delayinferbeliefcoexistequalitypunctualideologytreatmentpunishmentsafety,securityto treat peoplecareer opportunityeducation or training

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

vocabulary pg 72 2024-04-17

vocabulary pg 72 crossword puzzle
Across
  1. - its something that is clean and maybe is a clue
  2. - in the act of killing something
  3. - a mark left by a foot, as in earth or sand:
  4. - look for
  5. - go after someone
  6. officers - is a person who arrest criminals
  7. - the police catch somebody
  8. - You see a lot of details of security
  9. - is an arm that police man use
Down
  1. - is a desing that all people have in her hands
  2. - a police officer or a private investigator whose job is to get information and evidence about crime
  3. - to seize or capture a criminal
  4. - the act of stealling
  5. - catch something that isn´t yours
  6. guard - a person who works in a place triying to prevent a crimen
  7. - find the solution
  8. - is a place where the criminals go
  9. - is a person who steal something

18 Clues: - look for- go after someone- find the solution- the act of stealling- the police catch somebody- is an arm that police man use- to seize or capture a criminal- in the act of killing something- is a person who steal something- catch something that isn´t yours- is a place where the criminals go- You see a lot of details of security...

Crossword Puzzle 2023-02-16

Crossword Puzzle crossword puzzle
Across
  1. 11.
  2. 4.
  3. 1.
  4. 7.
Down
  1. 9.
  2. 6.
  3. 3.
  4. 5.
  5. 8.
  6. 10.
  7. 2.

11 Clues: 9.6.3.5.4.8.1.2.7.11.10.

Computer Security Risk 2020-10-18

Computer Security Risk crossword puzzle
Across
  1. A malicious program which replicates by making copies of itself and filling up RAM and secondary storage sometimes propagating across a network
  2. A malicious program which replicates by injecting its own code into other files
  3. Passing text thorough a maths algorithm to scramble text
  4. a malicious program which masquerades as a legitimate program but causes harmful execution when run
  5. A malicious program which encrypts all of the data on a computer system and demands payment in order to decrypt the data
  6. a characteristic of information security
  7. fake emails or websites that look like real emails and websites and try to steal your data.
  8. Software that protects your device from viruses and malware
Down
  1. Manipulating people through voice or text into sharing private information
  2. Software which is designed to cause damage to a system or systems
  3. A way of concealing text
  4. Unsolicited emails sent to many email addresses that try to get you buy something or share private information

12 Clues: A way of concealing texta characteristic of information securityPassing text thorough a maths algorithm to scramble textSoftware that protects your device from viruses and malwareSoftware which is designed to cause damage to a system or systemsManipulating people through voice or text into sharing private information...

April Security Crossword 2021-05-28

April Security Crossword crossword puzzle
Across
  1. the inkblot test psychologists use to test a subject’s perceptions & mental health.
  2. (5,3) immediate assistance given to any person suffering from injury it illness
  3. ... is another man's freedom fighter
  4. a short, thick stick carried as a weapon by a police officer
  5. Website where you can purchase tickets to our training courses or the IAASF event
  6. (•••••, ••••-)dots and dashes
Down
  1. make sure someone leaves or arrives safely
  2. malicious software designed to exploit any device, service or network
  3. Alert state used by US Armed Forces
  4. (3,7) needed to work within the private security industry
  5. make (something bad) less severe, serious, or painful
  6. to steal something from a place or person.

12 Clues: (•••••, ••••-)dots and dashesAlert state used by US Armed Forces... is another man's freedom fightermake sure someone leaves or arrives safelyto steal something from a place or person.make (something bad) less severe, serious, or painful(3,7) needed to work within the private security industry...

Information Security 3 2019-04-11

Information Security 3 crossword puzzle
Across
  1. what forms on a website should do to prevent SQL injection
  2. to change in a bad way
  3. hackers who help companies
  4. not fake; genuine; real
  5. to be leading the progress in an industry (idiom)
  6. ssl that protects the whole website (not just one page)
  7. to cancel a project (idiom)
Down
  1. about; not exact
  2. BIOS
  3. a weakness a hacker can use to infect a device
  4. a medical device which helps people with weak hearts
  5. not found

12 Clues: BIOSnot foundabout; not exactto change in a bad waynot fake; genuine; realhackers who help companiesto cancel a project (idiom)a weakness a hacker can use to infect a deviceto be leading the progress in an industry (idiom)a medical device which helps people with weak heartsssl that protects the whole website (not just one page)...

Unit 4: Security 2022-07-06

Unit 4: Security crossword puzzle
Across
  1. ___________ are people who purposely try to steal your private information.
  2. You should stick to __________ websites.
  3. Phishing emails or pop-ups may try to trick you by saying you have won a ________.
  4. Your password should combine letters, numbers, and _________.
  5. Before visiting a new place online, be sure to ask your _________.
  6. _________ is when hackers try to trick you into giving away your private information.
Down
  1. An adult can help you ________ websites to decide if they are safe.
  2. Use a __________ password for each account.
  3. Many websites and apps keep your private information safe by asking you to create a ____________.
  4. The links in phishing emails or pop-ups may give your computer a _________.
  5. If a student borrows your Chromebook and damages it, who pays for the repairs?
  6. To keep your information safe, your password should be __________.

12 Clues: You should stick to __________ websites.Use a __________ password for each account.Your password should combine letters, numbers, and _________.To keep your information safe, your password should be __________.Before visiting a new place online, be sure to ask your _________.An adult can help you ________ websites to decide if they are safe....

Lead Star Security 2022-11-15

Lead Star Security crossword puzzle
Across
  1. , Company Name
  2. , The Time?
  3. , Personal Data, Benefits.
  4. , Time keeping record.
  5. , Improper conduct towards others.
  6. , Security must maintain visibility and ____ on site.
  7. , How or ____?
Down
  1. , Personal Conduct.
  2. , The Location?
  3. , The outcome?
  4. , When should workplace issues be reported?
  5. , Persons Involved

12 Clues: , The Time?, Company Name, The outcome?, How or ____?, The Location?, Personal Conduct., Time keeping record., Personal Data, Benefits., Persons Involved, Improper conduct towards others., When should workplace issues be reported?, Security must maintain visibility and ____ on site.

Online Data Security 2025-02-13

Online Data Security crossword puzzle
Across
  1. To break into a computer or network without permission.
  2. Information that defines a person, like name or ID number.
  3. To trick someone into revealing personal information online.
  4. To pretend to be someone else to deceive others.
  5. To threaten someone with harm unless they do something or give information.
  6. The process of converting data into a secret code for security.
  7. To secretly watch or gather information about someone.
Down
  1. A secret word or code used to protect an account or device.
  2. A potential danger or risk to online security.
  3. To take something without permission, often referring to data or information.
  4. Software designed to harm or disrupt computers and networks.
  5. To secretly watch or gather information about someone.
  6. Malicious software designed to damage or disrupt computers.

13 Clues: A potential danger or risk to online security.To pretend to be someone else to deceive others.To secretly watch or gather information about someone.To secretly watch or gather information about someone.To break into a computer or network without permission.Information that defines a person, like name or ID number....

privacy and security 2025-12-09

privacy and security crossword puzzle
Across
  1. Digital code used to prove identity
  2. Using body measurements for ID
  3. Secret string for user authentication
  4. Person who exploits system weaknesses
  5. Software designed to damage computers
  6. Converting data into secret code
  7. Malware that demands payment to unlock files
Down
  1. Files that track website activity
  2. Software recording user actions secretly
  3. Fraudulent emails to steal sensitive data
  4. Security system monitoring network traffic
  5. Secure tunnel for internet connection

12 Clues: Using body measurements for IDConverting data into secret codeFiles that track website activityDigital code used to prove identitySecret string for user authenticationPerson who exploits system weaknessesSoftware designed to damage computersSecure tunnel for internet connectionSoftware recording user actions secretly...

Group Security Crossword Puzzle 2022-10-03

Group Security Crossword Puzzle crossword puzzle
Across
  1. keep watch over by regularly walking or travelling around it
  2. another word for human beings
  3. close observation, especially of a suspected spy or criminal
  4. barrier or railing, or other upright structure made of any material enclosing an area of ground to control or prevent unauthorized access
  5. facts provided or learned about something or someone
  6. a thing or things belonging to someone
  7. long-term shifts in temperatures and weather patterns
  8. common type of scam that people fall prey to
  9. body measurements and calculations related to human characteristics
Down
  1. the action of protecting, or the state of being protected
  2. an unmanned aerial vehicle
  3. formal or systematic examination or research
  4. the action of functioning or the fact of being active or in effect
  5. zero tolerance
  6. the action or process of identifying someone or something
  7. a conference or meeting to discuss a particular subject
  8. the act of compelling observance of or compliance with a law, rule, or obligation
  9. a device for recording visual images in the form of photographs or films

18 Clues: zero tolerancean unmanned aerial vehicleanother word for human beingsa thing or things belonging to someoneformal or systematic examination or researchcommon type of scam that people fall prey tofacts provided or learned about something or someonelong-term shifts in temperatures and weather patterns...

People Connection Center 2020-03-17

People Connection Center crossword puzzle
Across
  1. Where would you find FAQ about Paychecks?
  2. is a Team Member of HR.
  3. _____is a Field Operations Manager.
  4. _____is a common type of cyber-attack.
  5. For a current list of Policies, what page do you visit?
  6. ___is a Account Service Coordinator
  7. The Associate Referral Program can be found on what page?
  8. What page did you find this puzzle?
Down
  1. Does your driver license have a ____ on it?
  2. Interested in Pet Insurance? Where do you find the link?
  3. What is the last name of a new team member for February?
  4. ____is a Call Administrator
  5. What PCC Page can you find the 2020 Holiday Calendar?
  6. The "C" in CREW represents?

14 Clues: is a Team Member of HR.____is a Call AdministratorThe "C" in CREW represents?_____is a Field Operations Manager.___is a Account Service CoordinatorWhat page did you find this puzzle?_____is a common type of cyber-attack.Where would you find FAQ about Paychecks?Does your driver license have a ____ on it?...

Cruciverba - Puntata 19 2025-12-02

Cruciverba - Puntata 19 crossword puzzle
Across
  1. La copia di sicurezza dei vostri dati
  2. La combinazione che usi come prima linea di difesa
  3. L'antivirus che protegge i nostri dispositivi
Down
  1. Vi sembra un video reale? Attenti a non cascarci!
  2. Vi blocca, vi ricatta e minaccia di pubblicare i vostri dati
  3. L'esca digitale creata per farvi abboccare
  4. Il nostro cyber gufo

7 Clues: Il nostro cyber gufoLa copia di sicurezza dei vostri datiL'esca digitale creata per farvi abboccareL'antivirus che protegge i nostri dispositiviVi sembra un video reale? Attenti a non cascarci!La combinazione che usi come prima linea di difesaVi blocca, vi ricatta e minaccia di pubblicare i vostri dati