cyber security Crossword Puzzles
CLA Environ 2017-09-30
Across
- Most commonly used type of dock
- Straight line material flow through docks at both ends
- Limit access to certain areas
- First global supply chain security initiative
- Requires both importers and exporters to send AMRs
- A company must register as a hazmat transporter to carry this
- Focus is on developing more secure containers
- Substance posing a risk to health
Down
- Most basic form of security
- Agency responsible for developing HAZMAT rules
- Major deterrent to would-be thieves
- These docks provide most protection from theft and weather
- Volume of goods expected to move through a warehouse
- Occur more often in dock areas than other areas of warehouse
- Pays for remediation of toxic waste sites
- Process for turning old products into new products
- One guard monitors this
- Between US, Canada and Mexico
18 Clues: One guard monitors this • Most basic form of security • Limit access to certain areas • Between US, Canada and Mexico • Most commonly used type of dock • Substance posing a risk to health • Major deterrent to would-be thieves • Pays for remediation of toxic waste sites • First global supply chain security initiative • Focus is on developing more secure containers • ...
Words for computer class. 2021-10-06
Across
- is a central processing unit.
- use The right way to use things. To make it fair to everyone.
- COMPARES CAPACITY AND COSTS.
- A part of something
- Device storage.
- is a wide area network.
- Drive is a small device that can restore memory.
- SOlid state drive. They store things.
- The right way of using the internet.
- A informational site.
Down
- Copying something and stealing its creations.
- It's when you rapidly send the same message.
- A security app that sees what's going in and out of the computer.
- Doing something bad or illegal to someone else online.
- Copying someone's work without crediting them.
- is a local area network.
- Security How secure all your networks are. It makes it so it secules what goes by.
- is a device for transferring data from one device to another.
18 Clues: Device storage. • A part of something • A informational site. • is a wide area network. • is a local area network. • COMPARES CAPACITY AND COSTS. • is a central processing unit. • The right way of using the internet. • SOlid state drive. They store things. • It's when you rapidly send the same message. • Copying something and stealing its creations. • ...
Unit#4 Vocab 1 2023-12-13
Across
- Work, Progress, act
- The election between Herbert hoover and FDR
- This event kicked off the great depression and happened on oct 29 1929
- Civilian, Concentration, corp
- Makeshift towns of homeless and jobless
- Social, security, Administration
- Security, exchange, commission
- A combination of poor farmers and a natural drought
- The president that served for 4 terms
- this man was deemed the worst president in american history
- Spending more than you make in income
Down
- A way to help feed the needy set up by the social gospel group
- A time of global economic struggle
- This plan was also called Alphabet soup because of FDR's love for acronyms
- when FDR would talk to the country through the radio
- buying and selling stock quick
- Agricultural, adjustment, act
- Federal, Deposit, insurance, corporation
18 Clues: Work, Progress, act • Civilian, Concentration, corp • Agricultural, adjustment, act • Security, exchange, commission • buying and selling stock quick • Social, security, Administration • A time of global economic struggle • The president that served for 4 terms • Spending more than you make in income • Makeshift towns of homeless and jobless • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
spanish vocab thingy 2023-04-20
11.5 Vocab 2023-03-30
Across
- Allows devices to connect in a PAN
- The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel
- used with the WPA and WPA2 wireless security standards
- a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3)
- increases bandwidth by using multiple antennas for both the transmitter and receiver
- developed by Cisco to address security concerns in RADIUS
- a key component of windows active directory
- a standard for local area networks created by IEEE-SA
Down
- a network that requires no authentication to connect to and is used in public
- introducd in 2018, and update to WPA2
- an open standard protocol used to authenticate users onto a network
- A communication method used on cards with a range of 2 inches
- the most commonly used access method
- introduced in 2004, a wireless security service
- an enhancement to MIMO that allows multiple users to use the same channel
- Data encryption protocol that uses 128,192,256 bits and encrypts in 128bit chunks
- uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
18 Clues: Allows devices to connect in a PAN • the most commonly used access method • introducd in 2018, and update to WPA2 • a key component of windows active directory • introduced in 2004, a wireless security service • a standard for local area networks created by IEEE-SA • used with the WPA and WPA2 wireless security standards • ...
test 2023-09-12
Across
- Equivalent ot EU Data Protection Bill in India
- These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
- A digital form of social engineering to deceive individuals into providing sensitive information
- The process of transforming plaintext into ciphertext
- Old way of breaking phone
- Computer Malicious Program
- attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
- in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
- secure online service that allows users to connect remotely to another network
- spyware software that records every keystroke made on a computer’s keyboard
- security framework that controls access to computer resources, enforces policies, and audits usage
- algorithms to create convincing fake videos or audio recordings
- Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
- type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
- type of attack which uses a fraudulent server with a relay address
- model that forms the basis for the development of security systems
- A capability to limit network traffic between networks and/or information systems
18 Clues: Old way of breaking phone • Computer Malicious Program • Equivalent ot EU Data Protection Bill in India • The process of transforming plaintext into ciphertext • algorithms to create convincing fake videos or audio recordings • type of attack which uses a fraudulent server with a relay address • model that forms the basis for the development of security systems • ...
Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security provides ______ by including anti-theft tools to locate, lock, and wipe lost or stolen devices
- Trend Micro Mobile Security provides privacy scanning to identify apps that may be accessing ______ information without permission
- Trend Micro Mobile Security provides Web browsing protection to block ______ websites and phishing attempts
Down
- Trend Micro Mobile Security provides ______ controls to manage children's device usage and restrict access to inappropriate content
- Trend Micro Mobile Security provides safe _____ features to protect users from online threats while browsing the internet
- Trend Micro Mobile Security provides malware scanning and detection to find _____
6 Clues: Trend Micro Mobile Security provides malware scanning and detection to find _____ • Trend Micro Mobile Security provides Web browsing protection to block ______ websites and phishing attempts • Trend Micro Mobile Security provides safe _____ features to protect users from online threats while browsing the internet • ...
Security&Privacy 2018-10-31
Across
- You get an email from a bank asking for your personal information.(8)
- Two countries decide to fight war through computers(8).
- Tricking people into believing to gather valuable information(6,11)
- The system administrator informs you that a Trojan horse has infected your computer. Which program did the system administrator use to determine this?(9)
Down
- A hacker decides to steal money from the account holders of a bank.(6)
- No antivirus is smart enough to catch all my patterns.(10)
- Whatever you type is read by a hacker using this malware.(7)
- A friend of yours is protesting against a cosmetics company using online methods.(10)
8 Clues: Two countries decide to fight war through computers(8). • No antivirus is smart enough to catch all my patterns.(10) • Whatever you type is read by a hacker using this malware.(7) • Tricking people into believing to gather valuable information(6,11) • You get an email from a bank asking for your personal information.(8) • ...
ELECTRICIAN SECURITY 2013-03-13
8 Clues: damage • measured in volts • connected to earth • source of electricity • opposite of insulator • result of fire or heat • connected to electricity • result of touching a live part
Network security 2013-09-12
Across
- sensitive informationon hard drives are destroyed
- The network element that can interconnect two gsm network.
- application protocol Push which is basically and specially used to encoded message which includes a link to a WAP addreSS
- anonymity Designed to protect the user against someone
Down
- system for mobile communication which allows users to roam seamlessly between network and separate the user identify from phone equipment
- Feasibility of USIM component tested using
- Enhanced authentication protocol for 3G security
- station controller which allow all control function and physical link between MCS and BTS
8 Clues: Feasibility of USIM component tested using • sensitive informationon hard drives are destroyed • Enhanced authentication protocol for 3G security • anonymity Designed to protect the user against someone • The network element that can interconnect two gsm network. • station controller which allow all control function and physical link between MCS and BTS • ...
Network security 2013-09-12
Across
- fields othername for finite fields
- used to implement a mechanism that automates ip configuration
- it is a single point of defense between two networks.
- website which site is blocked by dos atack
- it is designed to provide security and compression services to data generated from the application layer.
- horse which virus comes through downloading file form internet.
Down
- level firewall it is third generation firewall technology that evaluates network packets for valid data.
- attack it is one of particular variant of flooding dos attack on a public internet.
8 Clues: fields othername for finite fields • website which site is blocked by dos atack • it is a single point of defense between two networks. • used to implement a mechanism that automates ip configuration • horse which virus comes through downloading file form internet. • attack it is one of particular variant of flooding dos attack on a public internet. • ...
Security Issues 2015-11-18
Across
- graffiti on a website
- finding signals or to gain entry on the advantage of others (e.g. WIFI)
- you details (credit card etc )stolen and used
- mistakes made while development systems
Down
- sending messages to a server until it "falls over"
- false website to ascertain you personal details which can lead to other criminal activities
- unauthorised access of this person either by using code or other means
- goods sold on the black market
8 Clues: graffiti on a website • goods sold on the black market • mistakes made while development systems • you details (credit card etc )stolen and used • sending messages to a server until it "falls over" • unauthorised access of this person either by using code or other means • finding signals or to gain entry on the advantage of others (e.g. WIFI) • ...
IT-Security 2016-01-29
8 Clues: chatten • Betrugsmethode • Datenverarbeitungsregisternummer • Beobachtung bei der Eingabe von Daten • schützt den Computer von Zugriff fremder Nutzer • Programme, die Tastatureingaben mitprotokolieren • Überbegriff für unerwünschte, schädliche Software • Personen die illegal in Computersysteme eindringen
nutrition security 2024-07-21
Across
- The nutrients you use in large amounts
- Lack of this can lead to anemia
- Food produced without synthetic chemicals
- Essential nutrient needed for strong bones and teeth
Down
- The state of having reliable access to a sufficient quantity of affordable, nutritious food
- Eating a balanced diet to maintain health and prevent disease
- Lack of sufficient food leading to hunger and malnutrition
- Vitamin found in citrus fruits, important for immune function
8 Clues: Lack of this can lead to anemia • The nutrients you use in large amounts • Food produced without synthetic chemicals • Essential nutrient needed for strong bones and teeth • Lack of sufficient food leading to hunger and malnutrition • Eating a balanced diet to maintain health and prevent disease • Vitamin found in citrus fruits, important for immune function • ...
Food security 2024-10-17
Across
- It is a foodborne illness caused by bacteria
- It is a biological food hazard
- It is an example of a common symptom of foodborne illness
- It is the pathogen most associated with undercooked beef and hamburger
- Where should you store raw meat in your fridge?
- It is a common food allergen
Down
- It is the primary source of Campylobacter contamination in food
- It is chemical food hazard
- It can multiply in cooked rice or pasta that's left at room temperature and cause food poisoning
- Which pathogen in raw poultry poses the greatest risk to foodborne illness?
10 Clues: It is chemical food hazard • It is a common food allergen • It is a biological food hazard • It is a foodborne illness caused by bacteria • Where should you store raw meat in your fridge? • It is an example of a common symptom of foodborne illness • It is the primary source of Campylobacter contamination in food • ...
Airport security 2022-10-20
8 Clues: official rules • official announcement • someone WHO travels with you • a machine that records people • a tool that sees inside things • baggage that no one is watching • a tool that sees metal passes throuht it • to use something to keep people from going into a space
Security Questions 2025-10-12
8 Clues: The name of my first pet • The name of my first school • My nickname in secondary school • The middle name of my oldest sibling • The first name of my favorite author • The last name of my favorite teacher • The first name of my first celebrity crush • The first name of my best friend in childhood
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
SAFETY AND SECURITY 2021-09-08
Across
- SYSTEM USED TO TRACK KEYS AND PATROLS
- A FABRIC LIKE ITEM IN THE FIRST AID KIT
- THIS IS USED FOR COMMUNICATING WITH OTHERS
- YOU USE THIS WHEN CARRYING HEAVY LOADS
- ABBREVIATED METHOD FOR USE OF A FIRE EXTINGUISHER
- HOW OFTEN DOES MARRIOTT REQUIRE A PATROL
- WHEN ONE PRACTICES HOW TO DO SOMETHING IN AN EMERGENCY
Down
- WHEN SOMETHING HAPPENS THAT IS A SAFETY AND SECURITY ISSUE
- WHAT IS CHECKED ON ARRIVAL OF AN ASSOCIATE
- PPE FOR YOUR EYES
- FAKE EMAILS YOU RECEIVE ASKING FOR INFORMATION
- THE PROCESS OF CHECKING AREAS FOR SAFETY AND SECURITY
12 Clues: PPE FOR YOUR EYES • SYSTEM USED TO TRACK KEYS AND PATROLS • YOU USE THIS WHEN CARRYING HEAVY LOADS • A FABRIC LIKE ITEM IN THE FIRST AID KIT • HOW OFTEN DOES MARRIOTT REQUIRE A PATROL • WHAT IS CHECKED ON ARRIVAL OF AN ASSOCIATE • THIS IS USED FOR COMMUNICATING WITH OTHERS • FAKE EMAILS YOU RECEIVE ASKING FOR INFORMATION • ABBREVIATED METHOD FOR USE OF A FIRE EXTINGUISHER • ...
Aug Security Crossword 2021-09-06
Across
- Hosts of this years Olympics & Paralympics
- The state of being legally responsible for something.
- Abbreviation of "involuntary celibate"
- (acronym)Operates independently of any government.
- The action or business of promoting & selling products or services.
- The holding of extreme political or religious views.
- An ex-member of the armed forces.
Down
- (4,6)Aerospace company that broke records last month.
- A formal meeting of people with a shared interest.
- A clash of interests or a prolonged armed struggle.
- City in Switzerland. Treatment of Prisoners of War 1929.
- An official inspection of an organization.
12 Clues: An ex-member of the armed forces. • Abbreviation of "involuntary celibate" • Hosts of this years Olympics & Paralympics • An official inspection of an organization. • A formal meeting of people with a shared interest. • (acronym)Operates independently of any government. • A clash of interests or a prolonged armed struggle. • ...
1.2.2 Security Aspects 2021-10-22
Across
- How would you stop the introduction of software that self-replicates and can cause data loss?
- True or False, cookies are only used for advertising
- True or False, cookies act in the same way as a virus
- Illegally gaining access to a persons files
- Editing the source code of a legitimate piece of software in order to use it without paying for it
- a piece of software that self replicates in order to fill your hard drive causing your computer to crash or perform slowly, it can also delete your files
- How would you stop software that logs or records all key presses on your computer without knowing?
- A piece of hardware or software which records keystrokes and can automatically send them to somebody who wants to steal your personal information
- How can you help prevent people hacking into files and changing or deleting them
Down
- How could you stop someone from reading illegally accessed documents?
- True or False, cookies are a form of spyware
- State what is meant by MAC
- How could you prevent data loss caused by a hard disk head crash?
- True or False, cookies track browser use
14 Clues: State what is meant by MAC • True or False, cookies track browser use • Illegally gaining access to a persons files • True or False, cookies are a form of spyware • True or False, cookies are only used for advertising • True or False, cookies act in the same way as a virus • How could you prevent data loss caused by a hard disk head crash? • ...
Security Testing Concepts 2021-05-05
Across
- An attack that use fraudulent emails that appear to be from trusted sources to try to trick victims into divulging sensitive data over email. (Hint: --a----)
- A mechanism of assigning the user account to an unknown user. (Hint: -----s-------)
- It is a malicious program triggered when a logical condition is met. (Hint: ----c----)
- Name the hacker who uses hacking to send social, religious, and political, etc messages. (Hint: ---k------)
- A program provides a means for ethical hackers to test an organization's website, mobile app, or software for security bugs. (Hint: ---b-----)
- It is a malware type in which security system is bypassed to access a system. (Hint: ---k----)
Down
- It is one of the common attacking techniques used by hackers to get critical data. (Hint: -----j------)
- It is an open source platform and most widely used SAST tool. (Hint: ----r----)
- It is a fake computer system that behaves like a real system and attracts hackers to attack it. (Hint: --n-----)
- A malicious software that allows an unauthorized user to have access to a computer and restricted areas of its software. (Hint: ---t---)
- An information security standard for organizations that handles branded credit cards from the major card schemes. (Hint: ---d--)
- A program that will serve pop up ads, can change browser's homepage and bombard your device with advertisements. (Hint: -d----)
12 Clues: It is an open source platform and most widely used SAST tool. (Hint: ----r----) • A mechanism of assigning the user account to an unknown user. (Hint: -----s-------) • It is a malicious program triggered when a logical condition is met. (Hint: ----c----) • It is a malware type in which security system is bypassed to access a system. (Hint: ---k----) • ...
Security Awareness Crossword 2021-04-20
Across
- What do hackers love to find? Weak _______
- Which one of these passwords is the strongest? P@55w0rd1, haaatePasswords!!, =Myf@v3P^sz!e, Easy2Remb3r
- A clean desk policy is important in order to protect ___________ information from being revealed
- Who is Target's Chief Information Security Officer?
- This is when you know you are speaking to the right person
- Target may _______ your internet usage
- When someone sends a link to a site you think is fine
Down
- 007 can really watch what you do on your computer with this app
- You are annoyed that someone else is on your computer too!
- Personal data sent by email must always be __________
- Beware of Greeks bearing gifts and horsing around
- Always _______ your computer screen while away from your desk
12 Clues: Target may _______ your internet usage • What do hackers love to find? Weak _______ • Beware of Greeks bearing gifts and horsing around • Who is Target's Chief Information Security Officer? • Personal data sent by email must always be __________ • When someone sends a link to a site you think is fine • You are annoyed that someone else is on your computer too! • ...
Security in Jesus 2024-02-19
Across
- Where is our inheritance kept? (1 Peter 1:4)
- Jesus came to _____ the world. (John 3:17)
- There is no condemnation when we _____ to Jesus.(Romans 8:1)
- Who does god command to guard us? (Psalm 91: 9-11)
- Believers will never ______ (John 10: 28-29)
- How are we saved? (Ephesians 2:8)
- Eternal life is a free ______. (Romans 6:23)
Down
- What does the Holy Spirit guarantee? (Ephesians 1:14)
- Believers will never be ____ for their sins. (John 5:24)
- What can separate us from God's love? (Romans 8:39)
- We are ________ God's children.(1 John 3:2)
- What is a believer's seal? (Ephesians 1:13)
12 Clues: How are we saved? (Ephesians 2:8) • Jesus came to _____ the world. (John 3:17) • We are ________ God's children.(1 John 3:2) • What is a believer's seal? (Ephesians 1:13) • Where is our inheritance kept? (1 Peter 1:4) • Believers will never ______ (John 10: 28-29) • Eternal life is a free ______. (Romans 6:23) • Who does god command to guard us? (Psalm 91: 9-11) • ...
Food Security nuggets 2024-12-17
Across
- These crops usually consist of Rice and Taro grown in feilds
- The type of farming that uses machinery and technology to perform agricultural tasks
- These crops are gaining importance in Food-security due to their significantly lesser water consumption
- A condition that develops when your body doesn't get the right amount of vitamins, minerals, and other nutrients required for healthy function.
- India is largest exporter of this crop
- Ragi, a popular crop is called a _____ millet
Down
- The biggest employment sector in India
- The second largest staple crop cultivated in India
- A situation where people lack basic food intake for a long time
- The largest cropping season in India
- India remains a net importer of these categories of crops
- This is where plants grow, made of rock and organic matter
12 Clues: The largest cropping season in India • The biggest employment sector in India • India is largest exporter of this crop • Ragi, a popular crop is called a _____ millet • The second largest staple crop cultivated in India • India remains a net importer of these categories of crops • This is where plants grow, made of rock and organic matter • ...
Felicity's Crossword 2018-01-29
Across
- Check or prove the accuracy of something
- writer duplicates another writer's language
- full electronic participation in society
- used in information security and privacy laws
- the knowledge of maximizing the user's personal safety against security risks
- relating to understanding
- Correct way of communicating on the Internet
- a particular place or position.
Down
- a verbal, written, or recorded communication
- the electronic responsibility for actions
- the use of electronic communication to bully a person
- a trail of data you create while using the Internet
- websites and applications that enable users to create and share content
- Children's online privacy and protection act
- permission for something to happen
15 Clues: relating to understanding • a particular place or position. • permission for something to happen • Check or prove the accuracy of something • full electronic participation in society • the electronic responsibility for actions • writer duplicates another writer's language • a verbal, written, or recorded communication • Children's online privacy and protection act • ...
Problem solving 2024-02-08
Across
- a programming paradigm.
- defines a division or section in an HTML document.
- Extra hours worked beyond the standard working time.
- A numeric data type.
- ibrary for building user interfaces.
- A tool used to continuously inspect code quality and security.
- procedure or formula for solving a problem.
Down
- high-level programming language still used in legacy systems.
- A data type.
- the most basic version of a product
- operating system known for its stability and security.
- A methodology that combines software development with IT operations.
- A platform as a service (PaaS) product that uses OS-level virtualization.
- the process of restructuring existing code without changing its external behavior.
- identifying and fixing errors.
15 Clues: A data type. • A numeric data type. • a programming paradigm. • identifying and fixing errors. • the most basic version of a product • ibrary for building user interfaces. • procedure or formula for solving a problem. • defines a division or section in an HTML document. • Extra hours worked beyond the standard working time. • ...
IT 2025-12-14
Across
- A set of instructions for solving a problem
- A security system that blocks unauthorized access
- The act of entering your username and password
- Converting information into a code for security
- A computer that provides data or services to others
- A secret word or phrase to access an account
- An organized collection of information
Down
- A program that can damage files or systems
- Software designed to harm a computer or network
- Programs that run on a computer
- A copy of data to prevent loss
- A device that directs data between networks
- A group of connected computers
- The physical parts of a computer
- Storing data online instead of on a local device
15 Clues: A copy of data to prevent loss • A group of connected computers • Programs that run on a computer • The physical parts of a computer • An organized collection of information • A program that can damage files or systems • A set of instructions for solving a problem • A device that directs data between networks • A secret word or phrase to access an account • ...
Responds & Report Security Risks 2023-11-13
Across
- IT or tech professionals who can fix security issues.
- Action to take when you suspect a security problem – like turning off the water in a leaky house.
- Potential threats or vulnerabilities that could harm digital systems.
- Staying watchful and alert to potential security threats.
Down
- Unauthorized access
- One of the aspects compromised by security risks, involves protecting sensitive information.
- A collective effort to create a safer digital environment by addressing potential risks.
7 Clues: Unauthorized access • IT or tech professionals who can fix security issues. • Staying watchful and alert to potential security threats. • Potential threats or vulnerabilities that could harm digital systems. • A collective effort to create a safer digital environment by addressing potential risks. • ...
BIL Processes 2024-06-12
Across
- Standard forms in the insurance industry
- An intermediary between you and the insured
- The company providing the insurance
- The person making a judgment about the amount of risk on a policy
Down
- The type of coverage to help a company recover losses from a data breach
- Proof of Insurance
- Our main Program sells _________ Liability
- A change to an in-force policy
- Pearl belongs to this part of One80
9 Clues: Proof of Insurance • A change to an in-force policy • The company providing the insurance • Pearl belongs to this part of One80 • Standard forms in the insurance industry • Our main Program sells _________ Liability • An intermediary between you and the insured • The person making a judgment about the amount of risk on a policy • ...
Anti-bullying 2023-05-05
Across
- unwanted touching, hitting, spittng, tripping, shoving, pushing, being agrresive
- name calling, teasing, racial comments, sarcasm, rumors, mean spirited comments
- similar to verbal bullying but is done online or thorugh texting
- bullying that involves a group
- a witness to bullying that does nothing or joins in
Down
- a witness to bullying that helps to stop the bullying behavior
- a repeated, negative unwanted action toward another individual
- on purpose
- intentionally leaving someone out
9 Clues: on purpose • bullying that involves a group • intentionally leaving someone out • a witness to bullying that does nothing or joins in • a witness to bullying that helps to stop the bullying behavior • a repeated, negative unwanted action toward another individual • similar to verbal bullying but is done online or thorugh texting • ...
BIT&BYTE CROSSWORD 2023-12-14
Across
- Unwanted emails sent in bulk to promote a product
- Short for "virtual private network"
- A way to protect data by scrambling it
- A backup copy of data in case of loss
- Hacking into a system without permission.
- Keeping data safe from unauthorized access, modification, and deletion
- Attack that encrypts files and demands payment
- Impersonating a trusted entity to steal information
Down
- Short for "denial-of-service" attack
- The process of identifying and fixing security vulnerabilities
- Software that protects against viruses and malware
- A sequence of characters used to gain access to a system
- Weak point in a system that can be exploited
- Malicious software disguised as a legitimate program
- Network filtering system to control traffic
- Two-factor authentication often uses this
- A device that blocks unauthorized access to a network
- Social engineering technique using deception to gain information
- Strong passwords should include these
19 Clues: Short for "virtual private network" • Short for "denial-of-service" attack • A backup copy of data in case of loss • Strong passwords should include these • A way to protect data by scrambling it • Two-factor authentication often uses this • Hacking into a system without permission. • Network filtering system to control traffic • ...
SJC Kid's Crossword 2024-06-23
Across
- When you put money in the basket
- Our bass player
- He preaches sometimes and his first name is David
- The color of the carpet in the sanctuary
- The street our church is on
- Our lead a/v tech, or the guy runs sound!
- Our Deacon of Outreach and Discipleship
- Our second security guard and a Freedom Arts Youth Leader
- Our pastor and main preacher
Down
- She sings every week and is your substitute kids class teacher
- Our Head of Security / Deacon of Defense
- Your kids class teacher!
- Our lead piano player
- The name of our neighborhood
- Our drummer and music coordinator
- Minister and Ms. Toni's mom!
- Our Minister of Administration, or the guy who puts out the snacks!
- The President of our church
- When we eat crackers and drink juice to remember Jesus' crucifixion
19 Clues: Our bass player • Our lead piano player • Your kids class teacher! • The street our church is on • The President of our church • The name of our neighborhood • Minister and Ms. Toni's mom! • Our pastor and main preacher • When you put money in the basket • Our drummer and music coordinator • Our Deacon of Outreach and Discipleship • Our Head of Security / Deacon of Defense • ...
CyberHarassment 2016-02-23
6 Clues: A crime committed via Internet. • _____ Harm: The promotion of drug abuse. • ________ Addiction: A compulsive behavior. • _____ Speech: Speech against a certain race. • Are believed to be more addicted to internet. • stalking This includes threats and identity theft.
Unit 4 Crossword 2022-03-16
Across
- meeting Conference between the highest-ranking officials of different nations
- A policy of nonparticipation in international economic and political relations
- Policy A nation's overall plan for dealing with other nations
- A large, complex organization composed of appointed officials
- A group of advisers to the president.
- The easing of hostility or strained relations, especially between countries.
- A position of not taking sides in a conflict
- agreements Agreements with other countries that do not need senate approval
- Veto or Line Item Veto Constitutional power available to more than forty of America's governors, under which they may disapprove some provisions of a bill while approving the others.
- Security Council An office created in 1947 to coordinate the president's foreign and military policy advisers. Its formal members are the president, vice president, secretary of state, and secretary of defense, and it is managed by the president's national security assistant.
Down
- Policy Plans for dealing with national problems
- Negotiation Between nations
- American policy of resisting further expansion of communism around the world
- theories massive retaliation and mutually assured destruction
- aid Money, food, or other resources given or lent by one country to another.
- a formally concluded and ratified agreement between countries.
- privilege An implied presidential power that allows the president to refuse to disclose information regarding confidential conversations or national security to Congress or the judiciary.
- Governor an elected official serving as deputy to the governor of a state of the United States
- Branch (President) Carries out the laws
- Restrictions intended to enforce international law
- Highest-ranking officials representing a government in a foreign country.
21 Clues: Negotiation Between nations • A group of advisers to the president. • Branch (President) Carries out the laws • A position of not taking sides in a conflict • Policy Plans for dealing with national problems • Restrictions intended to enforce international law • theories massive retaliation and mutually assured destruction • ...
CyberSecurity 2024-10-10
8 Clues: malware lockouts • Dual Authentication • Router Security Protocol • Social engineering by text • security of non-public data • social engineering by phone • Action for infected computer • One part of user's credentials
Death Star Security Matrix 2022-08-06
Across
- Desert Planet with 2 Suns
- The oldest Forest Path Cabin
- Luke _________
- A Jedi's Weapon
- A water specialty at camp
- A Hot Place on the Island
- The last period of the day
- When we do cabin offerings
- The oldest Lake path cabin
Down
- When the twinkies go to sleep early
- A Revolt or Uprising
- The main field at camp
- The character trait of being able to wait
- A specialty program at camp
- Darth _____
- A stormtrooper's weapon
- What today is called
- ___ Solo
18 Clues: ___ Solo • Darth _____ • Luke _________ • A Jedi's Weapon • A Revolt or Uprising • What today is called • The main field at camp • A stormtrooper's weapon • Desert Planet with 2 Suns • A water specialty at camp • A Hot Place on the Island • The last period of the day • When we do cabin offerings • The oldest Lake path cabin • A specialty program at camp • The oldest Forest Path Cabin • ...
Chapter 5: Crime & Security 2022-10-19
Across
- A virus that encrypts data on a device and demanding a ransom in order to unlock said data
- emails convincing victims to use a fake website that appears to be well known
- Manipulating people to voilate security protocols
- creating fake website to lure uninformed victems in order to steal personal data
- malware that attaches or spreads itself to infect other software
- process of converting data files into an unreadable code to prevent unauthorized access and viewership
- (CFAA)
- software that does not attach itself ,created to exploit software/system flaws
- Illegal malware that monitors and steals data without the knowledge or consent of an individual
- (CERT)developed standards for coding and software development
Down
- Illegally breaking into devices and releasing viruses
- hacking in order to display support or promote a political cause.
- A US&Isreal government collaboration project used to successfully destroy irans nuclear weapons production
- (OS),controls access to hardware/software avaible to users
- malware that appear to be harmless software
- Biological markers of an individual used for identification
- Crashing servers by overwhelming data traffic with packets and frames
- legally breaking into computer systems/software to test security/software integrity
18 Clues: (CFAA) • malware that appear to be harmless software • Manipulating people to voilate security protocols • Illegally breaking into devices and releasing viruses • (OS),controls access to hardware/software avaible to users • Biological markers of an individual used for identification • (CERT)developed standards for coding and software development • ...
data security and integrity 2025-10-07
Across
- check – method to check data has been transferred correctly even or odd
- software that seeks to damage
- method used to ensure entered data is reasonable and meets certain input criteria.
- software that detects and removes spyware programs installed
- digit additional digit appended to a number to check if entered data is error free.
- Reverse process of decryption
- the accuracy, completeness and consistency of data.
- a way of proving somebody or something is who or what they claim to be.
- legitimate-looking emails designed to trick a recipient
- method used to calculate a check digit based on modulus division by 11.
Down
- software or hardware that is between a computer and externalnetwork that
- the privacy of personal information,
- verification method used to check if data transferred has been altered
- illegal access to a computer system without the owner’s permission.
- method used to ensure data is correct by using double entry or visual checks.
- use of unique human characteristics to identify a user
- methods taken to prevent unauthorised access to data
- redirecting a user to a fake website in order to illegally obtain personal data
18 Clues: software that seeks to damage • Reverse process of decryption • the privacy of personal information, • the accuracy, completeness and consistency of data. • methods taken to prevent unauthorised access to data • use of unique human characteristics to identify a user • legitimate-looking emails designed to trick a recipient • ...
Security Issues 2015-11-18
Across
- false website to ascertain you personal details which can lead to other criminal activities
- graffiti on a website
- finding signals or to gain entry on the advantage of others (e.g. WIFI)
Down
- goods sold on the black market
- mistakes made while development systems
- sending messages to a server until it "falls over"
- you details (credit card etc )stolen and used
- unauthorised access of this person either by using code or other means
8 Clues: graffiti on a website • goods sold on the black market • mistakes made while development systems • you details (credit card etc )stolen and used • sending messages to a server until it "falls over" • unauthorised access of this person either by using code or other means • finding signals or to gain entry on the advantage of others (e.g. WIFI) • ...
IT-Security 2016-01-29
8 Clues: Betrugsmethode • Messaging chatten • Datenverarbeitungsregisternummer • Beobachtung bei der Eingabe von Daten • schützt den Computer von Zugriff fremder • Programme, die Tastatureingaben mitprotokolieren • Überbegriff für unerwünschte, schädliche Software • Personen die illegal in Computersysteme eindringen
IT-Security 2016-01-29
8 Clues: chatten • Betrugsmethode • Datenverarbeitungsregisternummer • Beobachtung bei der Eingabe von Daten • schützt den Computer von Zugriff fremder Nutzer • Programme, die Tastatureingaben mitprotokolieren • Überbegriff für unerwünschte, schädliche Software • Personen die illegal in Computersysteme eindringen
Platform security 2020-11-27
Across
- asynchronous event that can occur at any time, irrespective of what processor is doing
- , processes running in the background, started by the kernel itself.
- synchronous condition that results from a particularly undesirable situation.
- , separate low-level system software running on the host machine to perform visualization.
Down
- , the process responsible for secure logon.
- , a real-time operating system used in mission-critical applications
- , linux uses this technique to define the priority of processes
- , one method to block buffer overflow attacks
8 Clues: , the process responsible for secure logon. • , one method to block buffer overflow attacks • , linux uses this technique to define the priority of processes • , a real-time operating system used in mission-critical applications • , processes running in the background, started by the kernel itself. • ...
Security Awareness 2019-05-09
Across
- a network of private computers infected with malicious software and controlled as a group without the owners' knowledge,
- the fraudulent practice of sending emails to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.
- an attack or entry into computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
Down
- violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."
- a string of words that must be used to gain access to a computer system or service.
- a person who uses computers to gain unauthorized access to data.
- a string of characters that allows access to a computer system or service.
8 Clues: a person who uses computers to gain unauthorized access to data. • a string of characters that allows access to a computer system or service. • a string of words that must be used to gain access to a computer system or service. • convert (information or data) into a cipher or code, especially to prevent unauthorized access. • ...
Work Security 2020-10-25
Across
- to convert (information or data) into a code, especially to prevent unauthorized access
- making you feel that something illegal is happening or that something is wrong
- (of access)gaining logical or physical access without permission to a network, system, etc.
Down
- (verb+preposition)to do things that you hope will stop something unpleasant from happening
- (verb+preposition) to stop from
- (of information)data that must be guarded from unauthorized access, protected
- wrongful or criminal deception intended to result in financial or personal gain
- a person who uses computers to gain unauthorized access to data
8 Clues: (verb+preposition) to stop from • a person who uses computers to gain unauthorized access to data • (of information)data that must be guarded from unauthorized access, protected • making you feel that something illegal is happening or that something is wrong • wrongful or criminal deception intended to result in financial or personal gain • ...
Security Crossword 2021-07-26
Across
- This team will lock doors and post a 'Temporarily Closed' sign at all entrances and the drive-thru window
- How often must we review security procedures used at financial centers with all employees
- These packs are wrapped with $50 bills
- This team will protect the areas where the robber/bandit was known to have been with chairs, ropes, tables or other objects
Down
- This team will obtain the Financial Center's list of bait money and make a copy of the serial numbers of the bait money of the teller(s) who was robbed to give to the police
- How many response teams are there
- All cash drawers must be kept ____ when the teller is not at his/her station
- This team will distribute the Bandit Description Forms and pencils or pens
8 Clues: How many response teams are there • These packs are wrapped with $50 bills • This team will distribute the Bandit Description Forms and pencils or pens • All cash drawers must be kept ____ when the teller is not at his/her station • How often must we review security procedures used at financial centers with all employees • ...
Security - Easy 2023-11-28
Across
- computer's favourite snack
- What is the term for a secret combination of letters, numbers, and symbols used to access a system?
- term for a security mechanism that restricts access based on the user's identity
- Security measure tracking and recording system activities
- type of software protects a computer from malicious programs by scanning and removing them
Down
- practice of converting readable data into unreadable characters to prevent unauthorized access
- acronym VPN stands for
- practice of controlling access by permitting only approved programs.
8 Clues: acronym VPN stands for • computer's favourite snack • Security measure tracking and recording system activities • practice of controlling access by permitting only approved programs. • term for a security mechanism that restricts access based on the user's identity • type of software protects a computer from malicious programs by scanning and removing them • ...
Computer security 2023-04-11
Across
- of using multiple methods to authenticate a user's identity before granting access to a computer system.
- of analyzing and identifying potential vulnerabilities in computer systems.
- of computer systems and data from damage or destruction caused by natural disasters, accidents, or deliberate attacks.
- of rules or protocols that dictate how data is transmitted and received over a network.
- method that uses a single secret key to both encrypt and decrypt data.
- software that is designed to harm or exploit computer systems.
Down
- of keeping software up-to-date with the latest security patches and updates to protect against known vulnerabilities.
- of encoding messages or information in such a way that only authorized parties can read it.
- of computer systems from unauthorized access and theft of data (two words).
- designed to prevent unauthorized access to a computer or network.
10 Clues: software that is designed to harm or exploit computer systems. • designed to prevent unauthorized access to a computer or network. • method that uses a single secret key to both encrypt and decrypt data. • of analyzing and identifying potential vulnerabilities in computer systems. • of computer systems from unauthorized access and theft of data (two words). • ...
TTS security 2023-06-05
Across
- Tim yang terlatih dan siap memberikan bantuan pertama dalam situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall
- Ketika kerugian atau kehilangan terjadi dari tenant, pihak .......... berperan sebagai mediator dan membantu dalam proses investigasi, namun keputusan akhir tetap berada di tangan tenant itu sendiri
- kondisi kejadian yang melibatkan para pengunjung dan tenant Mall, mencakup situasi seperti tabrakan kendaraan atau perselisihan antara pengunjung dan karyawan tenant
- Tanggung jawab pihak manajemen Mall dalam menangani situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall, termasuk pengaturan pertolongan pertama dan pemindahan korban ke fasilitas medis yang sesuai disebut
- Dokumen yang terdiri dari pengakuan pelaku, pengakuan kerusakan atau kehilangan barang dari korban, serta kesaksian dari saksi yang melihat kejadian tersebut
- Tempat yang menjadi magnet bagi para pengunjung, di mana mereka dapat berbelanja, bersantai, dan menikmati berbagai aktivitas
Down
- Orang-orang yang memasuki Mall dengan berbagai tujuan, termasuk para pelanggan, karyawan tenant, karyawan vendor, dan tamu lainnya
- Kejadian yang mengganggu kelancaran dan keselamatan operasional Mall, serta berpotensi merusak aset berharga disebut
8 Clues: Kejadian yang mengganggu kelancaran dan keselamatan operasional Mall, serta berpotensi merusak aset berharga disebut • Tim yang terlatih dan siap memberikan bantuan pertama dalam situasi kecelakaan atau kejadian medis yang terjadi di dalam Mall • ...
data security 2025-01-15
Across
- The potential for loss or damage.
- Adhering to data protection regulations.
- Maintaining the accuracy and completeness of data.
Down
- Ensuring that information is accessible only to those authorized to have access.
- A weakness that can be exploited.
- An event that compromises data security.
- Data Loss Prevention, strategies to prevent data breaches.
- The technique of obscuring specific data within a database to protect sensitive information.
8 Clues: A weakness that can be exploited. • The potential for loss or damage. • An event that compromises data security. • Adhering to data protection regulations. • Maintaining the accuracy and completeness of data. • Data Loss Prevention, strategies to prevent data breaches. • Ensuring that information is accessible only to those authorized to have access. • ...
Data Security 2024-10-14
Across
- A program that filters the information coming through your computer
- The unauthorised access and use of networked
- This involves the use of websites and email messages that try to trick you into entering your personal information.
- This is the use of electronic devices to monitor electronic communications between two or more groups without the permission of any of the communicating parties.
- A special type of software used to remove viruses from a computer's hard disk
Down
- The illegal use, sharing, selling or distribution of copies of software or music.
- Criminals use computerised systems to steal people's credit card information
- A program that uses computer network and weakness to repeatedly copy itself into computer's memory
8 Clues: The unauthorised access and use of networked • A program that filters the information coming through your computer • Criminals use computerised systems to steal people's credit card information • A special type of software used to remove viruses from a computer's hard disk • The illegal use, sharing, selling or distribution of copies of software or music. • ...
Security Awareness 2024-04-16
Across
- Testing environment.
- Protect sensitive information from being leaked by users.
- "M" Computer security company.
- Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
- Most common cyberattack on internet.
Down
- Social __ when actors trick others into revealing sensitive info.
- An attack where a person allows themselves to be identified as someone else.
- As cybersecurity threats grow, sites include this increased security feature.
8 Clues: Testing environment. • "M" Computer security company. • Most common cyberattack on internet. • Protect sensitive information from being leaked by users. • Social __ when actors trick others into revealing sensitive info. • An attack where a person allows themselves to be identified as someone else. • ...
Airport security 2022-10-20
8 Clues: official rules • someone who travels with you • baggage that no one is watching • a machine that looks through things • a place where they inspect your luggage • a machine that sets off where it detects metal • a machine that records what’s happening around • to use something to key people going into a space
Security Elements 2025-09-25
Across
- A sequence of numbers or letters used to open a lock
- Access to areas where there is cannabis, security elements, confidential information, is BLANK to persons whose presence in those areas is required by their work responsibilities
- system in the areas to be accessed.
Down
- The first BLANK employee to enter the building enters his/her code to disarm the intrusion
- Employees are required to present a valid BLANK to gain access to the facility.
- Stands for Head Of Security
- A word, phrase, or string of characters intended to differentiate an authorized user or process, for the purpose of permitting access
- BLANK using the designated security phone in order to have your designated security element enabled for further access.
8 Clues: Stands for Head Of Security • system in the areas to be accessed. • A sequence of numbers or letters used to open a lock • Employees are required to present a valid BLANK to gain access to the facility. • The first BLANK employee to enter the building enters his/her code to disarm the intrusion • ...
Computer security 2025-11-18
Across
- A small moving arrow on the screen. cursor
- A small button you press on a keyboard. key
- Another word for a small button on a keyboard. key
- A screen you use to see information. monitor
- To press the mouse button. click
Down
- A bar at the bottom of the screen with icons and open programs.taskbar
- A place on your computer where you can store files. folder
- The name you use to log in to a computer or website. username
- A device you use to type letters on a computer. keyboard
9 Clues: To press the mouse button. click • A small moving arrow on the screen. cursor • A small button you press on a keyboard. key • A screen you use to see information. monitor • Another word for a small button on a keyboard. key • A device you use to type letters on a computer. keyboard • A place on your computer where you can store files. folder • ...
Social Security Principles 2013-12-05
Across
- a type of redistribution from rich to poor
- transferring money from one group to another
- feeling safe and secure is known as social "what"
- stopping someone from become poor is another key aspect of social security, what is it called
Down
- social security is also used to alter how people act thus changing their "what"
- a type of redistribution from childless families to families with children
- spreading income over your lifetime
- this refers to provision against injury or illness
- what is social security usually said to be relieving
9 Clues: spreading income over your lifetime • a type of redistribution from rich to poor • transferring money from one group to another • feeling safe and secure is known as social "what" • this refers to provision against injury or illness • what is social security usually said to be relieving • a type of redistribution from childless families to families with children • ...
UN Crossword Puzzle 2024-10-10
Across
- Last name of the current UN Secretary-General
- Asian country holding a permanent seat in the Security Council
- Principal judicial organ of the UN for resolving international disputes
- Group of five permanent members with veto power in the Security Council
Down
- Main deliberative organ of the UN where all member states participate
- Unique power allowing P5 members to block decisions in the UNSC
- UN body responsible for maintaining international peace and security
- International organization founded in 1945 to promote peace and cooperation
- Legal status of certain UNSC decisions that member states must follow
9 Clues: Last name of the current UN Secretary-General • Asian country holding a permanent seat in the Security Council • Unique power allowing P5 members to block decisions in the UNSC • UN body responsible for maintaining international peace and security • Main deliberative organ of the UN where all member states participate • ...
Airport terminology 2018-11-12
Across
- Retail outlets which is exempt from the payment of certain local or national taxes and duties
- Where would you find security dogs?
- What does F&B stand for?
- The area where you go through security and hand over your passport and departure card for inspection.
Down
- An area of the airport on airside which has more comfortable seating than the terminal.
- What bridge allows passengers to leave the gate and board the aircraft?
- Where would you find the Muslim prayer room at AKL Airport INT Terminal?
- The first 30 minutes are FREE, then if you require more you may also pay to use the services
- The action of registering one's presence, typically as a passenger at an airport
- What is the name of the worlds foreign exchange specialist?
- Where would you find an aircraft parked?
- Rectangular area on a land aerodrome prepared for the landing and takeoff of aircraft
12 Clues: What does F&B stand for? • Where would you find security dogs? • Where would you find an aircraft parked? • What is the name of the worlds foreign exchange specialist? • What bridge allows passengers to leave the gate and board the aircraft? • Where would you find the Muslim prayer room at AKL Airport INT Terminal? • ...
Security Crossword Puzzle 2018-08-03
Across
- Clearance level of our facility.
- Badge Foreign Visitors - Escort Required.
- Unclassified Information Sensitive information that includes, but not limited to, Export Control Information.
- Information Must be protected at all times.
- Aguirre Facility Security Officer.
Down
- Contact Effort to gain illegal or unauthorized access to classified and/or other sensitive technology.
- A foreign interest that has the power, direct or indirect, to affect the management or operations of a company. (FOCI)
- Control Plan Specifies how we endure proper control and exchange of technical data-applies to all interaction with all foreign persons, not just Leonardo or its subsidiaries.
- Control Plan DRS policy that outlines compliance and validation for electronic communications.
- Security Service Provides oversight and annual security reviews to DRS.
- Information Jeopardizes integrity/character of a cleared employee. The ability to safeguard classified information may be at risk.
- Training Required annually as a part of the mitigation between DRS, Leonardo, and the US Government.
12 Clues: Clearance level of our facility. • Aguirre Facility Security Officer. • Badge Foreign Visitors - Escort Required. • Information Must be protected at all times. • Security Service Provides oversight and annual security reviews to DRS. • Control Plan DRS policy that outlines compliance and validation for electronic communications. • ...
Technology Engineering 2018-03-06
Across
- copy one computer information to another
- a global computer network providing a verity of information
- machines, wiring and other physical components of a computer
- a instruction connecting one part of a program to another
- relating to he culture of computers and information technology
Down
- controlled by or connected to another computer or network
- programs and other information used by computers
- a program used to view documents
- fix a computer program piecemeal until it works
- a symbolic arrangement of data in a computer program
10 Clues: a program used to view documents • copy one computer information to another • fix a computer program piecemeal until it works • programs and other information used by computers • a symbolic arrangement of data in a computer program • controlled by or connected to another computer or network • a instruction connecting one part of a program to another • ...
Bab 3 2025-09-08
Across
- Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi
- perilaku yang memperlakukan seseorang secara beda
- warga negara saling mengetahui hak dan kewajibannya secara tepat dan
- mempromosikan kampanye anti pelanggaran hak dan pengingkaran
- merupakan tindakan semena-mena berupa menyakiti, mempersulit atau melenyapkan seseorang
Down
- salah satu upaya yang dapat dilakukan oleh negara untuk mencegah kasus pelanggaran hak adalah
- BULLYING bentuk pelanggaran hak
- hak yang didapat setiap manusia
- ketentuan mengenai hal dan kewajiban warga negara bersifat
- UUD NRI tahun 1945 berperan sebagai hukum
10 Clues: BULLYING bentuk pelanggaran hak • hak yang didapat setiap manusia • UUD NRI tahun 1945 berperan sebagai hukum • perilaku yang memperlakukan seseorang secara beda • ketentuan mengenai hal dan kewajiban warga negara bersifat • mempromosikan kampanye anti pelanggaran hak dan pengingkaran • Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi • ...
vocab 2022-02-16
Across
- bank you make money off of accounts
- physical form of currency
- people that manage credit
- you write money out to people on it
- used if you want to pay later
- manage accounts of loans and savings
- put money in a bank account
- protection of something
- guarantee from bank that you will pay the money back on time
Down
- to move money somewhere else
- bank account if you plan to spend
- lets you borrow money when you need it
- institute you can't deposity money into
- where security is
- bank account if you plan to save
- a unit of value
- let you buy without carrying cash
17 Clues: a unit of value • where security is • protection of something • physical form of currency • people that manage credit • put money in a bank account • to move money somewhere else • used if you want to pay later • bank account if you plan to save • bank account if you plan to spend • let you buy without carrying cash • bank you make money off of accounts • ...
Crossword - Chapter 3 2024-08-12
Across
- health care services at discounted prices and controls to reduce costs
- before 1965 this type of insurance was available to working people
- govt policy with primary aim to expand health insurance to the uninsured
- quarantined people with contagious diseases
- provide coverage for physicians and outpatient services under medicare
- larger group practices including strategic partnerships and corporatization of health delivery
- various forms of cross border economic activities
- first hospital insurance network
- administers both medicare and medicaid
Down
- health care information and services over the internet
- title 18 of the Social Security Act of 1965
- voluntary health insurance
- obamacare
- title 19 of the Social Security Act of 1965
- provide coverage to hospitals under medicare
- served the destitute and known as the poorhouse
- first plan to cover for physician fees
17 Clues: obamacare • voluntary health insurance • first hospital insurance network • first plan to cover for physician fees • administers both medicare and medicaid • title 18 of the Social Security Act of 1965 • quarantined people with contagious diseases • title 19 of the Social Security Act of 1965 • provide coverage to hospitals under medicare • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
Storage of Electronic Data 2022-04-14
Across
- data,
- storage,
- incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
- commit data as retrievable records.
- may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
- by the university and maintained by ITS for the purpose of electronically retaining university data.
- The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
- security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
- and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
- Office,
10 Clues: data, • Office, • storage, • commit data as retrievable records. • by the university and maintained by ITS for the purpose of electronically retaining university data. • and all data and records created, collected, stored and/or managed in connection with the operation and management of the university • ...
Travel 2023-05-09
18 Clues: padi • pagas • sadam • sadam • kohver • karistus • vahekäik • käsipagas • pardapääse • tolliametnik • reisiterminal • trahv, trahvima • välis-, ülemere- • sihtkohta jõudma • turvakontrolli läbima • deklareerima, kuulutama • võõrastemaja, noortehotell • registreerima, lennujaamas/ hotellis
FSB Crossword Puzzle 2020-06-17
Across
- Who is our Conway Market President/CEO?
- How may locations are in the Conway Market?
- When did FSB expand into Clinton and Vilonia?
- When did we launch Only in Ark.com?
- How many employees does FSB have?
- When did FSB acquire Crew's and Associates?
- What was FSB Conway's name before we merged with Searcy?
- How many locations does FSB have?
- How many sons does Reynie Rutledge have?
- Who is our Kids Club Mascot
Down
- When did the Rutledge Family purchase First Security Bank?
- what location is our newest in the state?
- Who is our Gold Club Director?
- When did we expand into Mayflower?
- How many employees does FSB have?
- billion, What is the banks asset size?
- When was the Teal Grill introduced?
- When did First Security Bank get its charter?
18 Clues: Who is our Kids Club Mascot • Who is our Gold Club Director? • How many employees does FSB have? • How many employees does FSB have? • How many locations does FSB have? • When did we expand into Mayflower? • When did we launch Only in Ark.com? • When was the Teal Grill introduced? • billion, What is the banks asset size? • Who is our Conway Market President/CEO? • ...
unit 6; 2014-04-13
Across
- a camera system used to maintain security
- a kitchen device that keeps food fresh and cold
- a card which resembles a debt to your bank
- somebody who steals things from pockets and purses
- somebody who is incredibly stupid
- a group of people who protect humans and things
- to force somebody to hand over things that aren't yours
- to have done something you shouldn't
- breaking things that aren't yours
Down
- a commited action which was illigal
- to be your own boss
- a very sharp blade you use to shave body hair
- to steel object from a shop
- somebody who investigates crimes
- a person who does or has done illigal things
- a short coat
- a card which shows your personal information
- a person who owns a shop
18 Clues: a short coat • to be your own boss • a person who owns a shop • to steel object from a shop • somebody who investigates crimes • somebody who is incredibly stupid • breaking things that aren't yours • a commited action which was illigal • to have done something you shouldn't • a camera system used to maintain security • a card which resembles a debt to your bank • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
CRIMINOLOGY 2 2022-05-20
TTS: BULLYING 2025-08-05
Across
- Bullying bisa menyebabkan anak menjadi kurang...
- Sering jadi korban bullying karena minoritas
- Memfitnah,mengatakan hal buruk tentang orang lain dapat merusak...nya
- Orang tua harus memberikan...kepada anak
- pelaku tindakan bullying disebut...
- Pelaku merasa lebih... dari korban
- Memberikan komentar negatif terhadap postingan di Instagram teman termasuk bullying...
- Memukul, menendang, atau kekerasan tubuh lainnya termasuk bullying...
- Reaksi emosional korban bullying misalnya...
- Penyelesaian masalah tanpa kekerasan
- Dampak psikologis dari bullying yang sering muncul
- Bullying bisa menyebabkan anak menjadi kurang...
- Tempat di sekolah yang sering terjadi lokasi bullying
- Tindakan bullying bisa menimbulkan...dalam jangka waktu lama
- Lawan dari egois penting dalam pencegahan bullying
- Cyber Bullying merupakan bentuk bullying yang dilakukan melalui...
- Orang yang melakukan bullying karena pernah di bully
- Sikap yang dibutuhkan untuk melawan bullying adalah...
- Pelaku bullying sering merasa punya kekuasaan
- Aksi menunjukkan dukungan kepada korban
- Sikap tidak peduli terhadap bullying
- Korban merasa tidak...oleh orang lain
- Bullying secara diam - diam dan mengucilkan
- Bentuk penghinaan dalam tulisan di medsos
- Sikap diam terhadap bullying disebut budaya...
Down
- Kata lain dari ejekan fisik terhadap bentuk tubuh
- Salah satu peran penting guru adalah sebagai
- Lawan dari kata penindas adalah
- Tindakan untuk menghentikan bullying
- Tindakan menyakiti orang lain secara sengaja dan berulang
- Siswa yang menjadi korban bullying di sekolah bisa melapor kepada...
- bullying melalui Medsos atau Internet
- Program di sekolahnuntuk mencegah bullying
- Raut muka pelaku saat mengejek
- Orang yang menyaksikan bullying tanpa bertindak
- Proses belajar mencegah bullying
- Kata lain dari kerja sama dalam mencegah bullying
- Nilai pelajaran bisa turun karena bullying yaitu menurunnya...
- Jenis bullying yang menyebarkan gosip jahat adalah...
- Teman yang mendukung dan membela saat bullying
- Kata lunci dari stop bullying:"Stop, Speak,..."
- Kata lain dari pelecehan atau hinaan
- Tempat yang sering terjadi cyber bullying
- Organisasi atau lembaga yang bisa bantu korban bullying
- Kata lain dari kekerasan terus menerus
- Lembaga tempat bullying sering terjadi
- bentuk bantuan dari psikolog untuk korban
- Korban bullying sering merasa... dari lingkungan
- Menjelekkan teman dengan memanggil nama orang tuanya termasuk bullying...
- Teman sebaya bisa berpotensi sebagai pelaku bullying di lingkungan...
- Lawan dari kekerasan adalah...
- Bentuk kampanye singkat untuk ajakan anti bullying
52 Clues: Raut muka pelaku saat mengejek • Lawan dari kekerasan adalah... • Lawan dari kata penindas adalah • Proses belajar mencegah bullying • Pelaku merasa lebih... dari korban • pelaku tindakan bullying disebut... • Tindakan untuk menghentikan bullying • Penyelesaian masalah tanpa kekerasan • Kata lain dari pelecehan atau hinaan • Sikap tidak peduli terhadap bullying • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
FICO Scores 2025-03-05
Across
- transunion, experian, equifax
- when an asset loses value over time
- lowest score on the FICO scale
- money you pay back for the use of borrowing money
- something used as security for a loan
- when an asset goes up in value over time
Down
- when you fail to repay a loan on time
- when you have to put down a security deposit
- a number between 300-850
- making fixed payments on a loan
- highest score on the FICO scale
- the amount of time you have to pay back a loan
- Fair Isaac and Company
- the amount of the loan including taxes and fees
- student loans through FAFSA
- when an item is worth less than what you owe
16 Clues: Fair Isaac and Company • a number between 300-850 • student loans through FAFSA • transunion, experian, equifax • lowest score on the FICO scale • making fixed payments on a loan • highest score on the FICO scale • when an asset loses value over time • when you fail to repay a loan on time • something used as security for a loan • when an asset goes up in value over time • ...
Types of bullying 2023-12-05
7 Clues: When you bully someone online • When you bully someone verbally • When you bully someone due to race • When you bully someone due to religion • When you bully someone by spreading lies • When you bully someone based on stereotypes • When you bully someone due to a physical difference
RansomWare activity 2025-05-23
Across
- / Plants malicious encryption software
- / New Years ransomware attack
- / Locksdevices and causing data across the network to be encrypted
- / U.S. workforce management
- / Attacked by the Darkside group
Down
- / Receive an on-screen notification from the cyber criminal
- / blocks access to a computer system until a sum of money is paid
7 Clues: / Attacked by the Darkside group • / U.S. workforce management • / New Years ransomware attack • / Plants malicious encryption software • / Receive an on-screen notification from the cyber criminal • / blocks access to a computer system until a sum of money is paid • ...
food and animals 2017-10-31
9 Clues: i love chicken • lab we are there • it is a cold time • lion are very big • we are using chrome • love to other people • we buy food at the shop • we have security gaurds • i go and wash my hands at the bathroom
unit 3 2022-04-21
18 Clues: vám • kapu • talán • késik • jóslat • utasok • rémálom • tetőterasz • konferencia • érkezési kapuk • indulási kapuk • átvesz, befogad • csomagkiadó (2 szó) • beszáll a repülőgépbe • biztonsági ellenörzés • csatlakozó járat (2 szó) • megbeszél egy nappot (3 szó) • agresszív közúti magatartás (2 szó)
EC- SP 4 Voc 6.1-6.4 2024-04-24
13 Clues: delay • infer • belief • coexist • equality • punctual • ideology • treatment • punishment • safety,security • to treat people • career opportunity • education or training
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
Crossword Puzzle 2023-02-16
Computer Security Risk 2020-10-18
Across
- A malicious program which replicates by making copies of itself and filling up RAM and secondary storage sometimes propagating across a network
- A malicious program which replicates by injecting its own code into other files
- Passing text thorough a maths algorithm to scramble text
- a malicious program which masquerades as a legitimate program but causes harmful execution when run
- A malicious program which encrypts all of the data on a computer system and demands payment in order to decrypt the data
- a characteristic of information security
- fake emails or websites that look like real emails and websites and try to steal your data.
- Software that protects your device from viruses and malware
Down
- Manipulating people through voice or text into sharing private information
- Software which is designed to cause damage to a system or systems
- A way of concealing text
- Unsolicited emails sent to many email addresses that try to get you buy something or share private information
12 Clues: A way of concealing text • a characteristic of information security • Passing text thorough a maths algorithm to scramble text • Software that protects your device from viruses and malware • Software which is designed to cause damage to a system or systems • Manipulating people through voice or text into sharing private information • ...
April Security Crossword 2021-05-28
Across
- the inkblot test psychologists use to test a subject’s perceptions & mental health.
- (5,3) immediate assistance given to any person suffering from injury it illness
- ... is another man's freedom fighter
- a short, thick stick carried as a weapon by a police officer
- Website where you can purchase tickets to our training courses or the IAASF event
- (•••••, ••••-)dots and dashes
Down
- make sure someone leaves or arrives safely
- malicious software designed to exploit any device, service or network
- Alert state used by US Armed Forces
- (3,7) needed to work within the private security industry
- make (something bad) less severe, serious, or painful
- to steal something from a place or person.
12 Clues: (•••••, ••••-)dots and dashes • Alert state used by US Armed Forces • ... is another man's freedom fighter • make sure someone leaves or arrives safely • to steal something from a place or person. • make (something bad) less severe, serious, or painful • (3,7) needed to work within the private security industry • ...
Information Security 3 2019-04-11
Across
- what forms on a website should do to prevent SQL injection
- to change in a bad way
- hackers who help companies
- not fake; genuine; real
- to be leading the progress in an industry (idiom)
- ssl that protects the whole website (not just one page)
- to cancel a project (idiom)
Down
- about; not exact
- BIOS
- a weakness a hacker can use to infect a device
- a medical device which helps people with weak hearts
- not found
12 Clues: BIOS • not found • about; not exact • to change in a bad way • not fake; genuine; real • hackers who help companies • to cancel a project (idiom) • a weakness a hacker can use to infect a device • to be leading the progress in an industry (idiom) • a medical device which helps people with weak hearts • ssl that protects the whole website (not just one page) • ...
Unit 4: Security 2022-07-06
Across
- ___________ are people who purposely try to steal your private information.
- You should stick to __________ websites.
- Phishing emails or pop-ups may try to trick you by saying you have won a ________.
- Your password should combine letters, numbers, and _________.
- Before visiting a new place online, be sure to ask your _________.
- _________ is when hackers try to trick you into giving away your private information.
Down
- An adult can help you ________ websites to decide if they are safe.
- Use a __________ password for each account.
- Many websites and apps keep your private information safe by asking you to create a ____________.
- The links in phishing emails or pop-ups may give your computer a _________.
- If a student borrows your Chromebook and damages it, who pays for the repairs?
- To keep your information safe, your password should be __________.
12 Clues: You should stick to __________ websites. • Use a __________ password for each account. • Your password should combine letters, numbers, and _________. • To keep your information safe, your password should be __________. • Before visiting a new place online, be sure to ask your _________. • An adult can help you ________ websites to decide if they are safe. • ...
Lead Star Security 2022-11-15
12 Clues: , The Time? • , Company Name • , The outcome? • , How or ____? • , The Location? • , Personal Conduct. • , Time keeping record. • , Personal Data, Benefits. • , Persons Involved • , Improper conduct towards others. • , When should workplace issues be reported? • , Security must maintain visibility and ____ on site.
Online Data Security 2025-02-13
Across
- To break into a computer or network without permission.
- Information that defines a person, like name or ID number.
- To trick someone into revealing personal information online.
- To pretend to be someone else to deceive others.
- To threaten someone with harm unless they do something or give information.
- The process of converting data into a secret code for security.
- To secretly watch or gather information about someone.
Down
- A secret word or code used to protect an account or device.
- A potential danger or risk to online security.
- To take something without permission, often referring to data or information.
- Software designed to harm or disrupt computers and networks.
- To secretly watch or gather information about someone.
- Malicious software designed to damage or disrupt computers.
13 Clues: A potential danger or risk to online security. • To pretend to be someone else to deceive others. • To secretly watch or gather information about someone. • To secretly watch or gather information about someone. • To break into a computer or network without permission. • Information that defines a person, like name or ID number. • ...
privacy and security 2025-12-09
Across
- Digital code used to prove identity
- Using body measurements for ID
- Secret string for user authentication
- Person who exploits system weaknesses
- Software designed to damage computers
- Converting data into secret code
- Malware that demands payment to unlock files
Down
- Files that track website activity
- Software recording user actions secretly
- Fraudulent emails to steal sensitive data
- Security system monitoring network traffic
- Secure tunnel for internet connection
12 Clues: Using body measurements for ID • Converting data into secret code • Files that track website activity • Digital code used to prove identity • Secret string for user authentication • Person who exploits system weaknesses • Software designed to damage computers • Secure tunnel for internet connection • Software recording user actions secretly • ...
Group Security Crossword Puzzle 2022-10-03
Across
- keep watch over by regularly walking or travelling around it
- another word for human beings
- close observation, especially of a suspected spy or criminal
- barrier or railing, or other upright structure made of any material enclosing an area of ground to control or prevent unauthorized access
- facts provided or learned about something or someone
- a thing or things belonging to someone
- long-term shifts in temperatures and weather patterns
- common type of scam that people fall prey to
- body measurements and calculations related to human characteristics
Down
- the action of protecting, or the state of being protected
- an unmanned aerial vehicle
- formal or systematic examination or research
- the action of functioning or the fact of being active or in effect
- zero tolerance
- the action or process of identifying someone or something
- a conference or meeting to discuss a particular subject
- the act of compelling observance of or compliance with a law, rule, or obligation
- a device for recording visual images in the form of photographs or films
18 Clues: zero tolerance • an unmanned aerial vehicle • another word for human beings • a thing or things belonging to someone • formal or systematic examination or research • common type of scam that people fall prey to • facts provided or learned about something or someone • long-term shifts in temperatures and weather patterns • ...
People Connection Center 2020-03-17
Across
- Where would you find FAQ about Paychecks?
- is a Team Member of HR.
- _____is a Field Operations Manager.
- _____is a common type of cyber-attack.
- For a current list of Policies, what page do you visit?
- ___is a Account Service Coordinator
- The Associate Referral Program can be found on what page?
- What page did you find this puzzle?
Down
- Does your driver license have a ____ on it?
- Interested in Pet Insurance? Where do you find the link?
- What is the last name of a new team member for February?
- ____is a Call Administrator
- What PCC Page can you find the 2020 Holiday Calendar?
- The "C" in CREW represents?
14 Clues: is a Team Member of HR. • ____is a Call Administrator • The "C" in CREW represents? • _____is a Field Operations Manager. • ___is a Account Service Coordinator • What page did you find this puzzle? • _____is a common type of cyber-attack. • Where would you find FAQ about Paychecks? • Does your driver license have a ____ on it? • ...
Cruciverba - Puntata 19 2025-12-02
Across
- La copia di sicurezza dei vostri dati
- La combinazione che usi come prima linea di difesa
- L'antivirus che protegge i nostri dispositivi
Down
- Vi sembra un video reale? Attenti a non cascarci!
- Vi blocca, vi ricatta e minaccia di pubblicare i vostri dati
- L'esca digitale creata per farvi abboccare
- Il nostro cyber gufo
7 Clues: Il nostro cyber gufo • La copia di sicurezza dei vostri dati • L'esca digitale creata per farvi abboccare • L'antivirus che protegge i nostri dispositivi • Vi sembra un video reale? Attenti a non cascarci! • La combinazione che usi come prima linea di difesa • Vi blocca, vi ricatta e minaccia di pubblicare i vostri dati
