cyber security Crossword Puzzles
The Positive Work Conditions 2025-11-17
Across
- Long-term growth direction and advancement opportunities
- Medical, allowances, perks, incentives, and non-cash rewards
- Monthly financial compensation and perceived fairness
- Leadership behavior, decisions, and culture setting
- Role clarity, workload, autonomy, challenge, and meaning
Down
- Physical and psychological workspace conditions
- Job security, safety, stability, and risk protection
- Processes, clarity, structure, workflows, and policies
- Direct supervisor relationship and support
- Equity, consistency, justice, and transparent decisions
- Skill-building, learning, and capability improvement
11 Clues: Direct supervisor relationship and support • Physical and psychological workspace conditions • Leadership behavior, decisions, and culture setting • Job security, safety, stability, and risk protection • Skill-building, learning, and capability improvement • Monthly financial compensation and perceived fairness • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
SN33003FP Chapter 2 Crossword 2024-07-03
Across
- Prevents disclosure of information to unauthorized people, also known as privacy
- Defines security objectives, behavioral rules, and system requirements to secure assets
- Provides technical direction for implementing and configuring technology to fulfill policy directives
- Relates to organization's cybersecurity policies, procedures, and guidelines set by upper management
- Focuses on protecting all states of data: at rest or in storage, in transit, or in process
- The goals to protect cyberspace, including confidentiality, integrity, and availability (CIA Triad)
- Data being sent from one device to another
Down
- Making security awareness part of employee onboarding and ongoing training
- Software, hardware, network, and cloud-based tools used to safeguard an organization's assets
- Accuracy, consistency, and trustworthiness of data throughout its lifecycle
- Ensures access to information systems and services at all times
- Data during input, modification, computation, or output stages
- Identifies expertise required for protection, including technology, policies/procedures/guidelines, and people
- Stored data retained on storage devices when not actively used
14 Clues: Data being sent from one device to another • Data during input, modification, computation, or output stages • Stored data retained on storage devices when not actively used • Ensures access to information systems and services at all times • Making security awareness part of employee onboarding and ongoing training • ...
The WSJ Daily Crossword 2024-06-02
14 Clues: Journal • Treasure • Children • The artic • Terrorism • Star wars • Asian flue • Gen Therapy • Infrestructure • Breacking News • Money managment • The black market • security policies • Underrepresentation
Profession 2024-10-09
14 Clues: Gym • Store • Stage • Garage • Vehicle • Building • Meat shop • Art studio • Restaurant • Barber shop • Business place • Tourist place • Office or Field • Malls or office
Profession 2024-10-09
14 Clues: Gym • Store • Stage • Garage • Vehicle • Building • Meat shop • Art studio • Restaurant • Barber shop • Business place • Tourist place • Office or Field • Malls or office
Aeropuerto y Viajes 2025-05-01
15 Clues: Time • Fasten • Screen • Airline • Customs • Check-in • Passport • Air Ticket • To check in • Local Flight • Security Check • Security Check • National Flight • Prohibited Items • International Flight
Duolingo Stories -124 : The Exhibition 2022-10-15
15 Clues: warm • line • after • famous • leather • outside • to go in • for hours • to let in • it's cold • to the end • exhibition • a long time • security guard • you're kidding
Hotel crossword puzzle 2024-05-01
15 Clues: Taman • Koper • Masuk • Keluar • Pelayan • Keamanan • Pemesanan • Ruang santai • Kasur tambahan • Biaya Tambahan • Kamar tipe VIP • Kamar mandi uap • Ruang pertemuan • Meja resepsionis • Paket yang ditawarkan hotel
chapter 8 2015-04-06
Across
- / The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as____
- / A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n) _________
- / If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is________
- /_______ specifies the structure of packets sent over the internet and the route to get them to the proper destination.(2words)
- / ________ is/are an example of a preventive control.
- / Restricting access of users to specific portions of the system as well as specific tasks, is an example of _________
- / The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as ______
- / The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as_________
Down
- / the primary means of protecting data stored in a cloud from unauthorized access.
- / Virtualization refers to the ability of running _____ systems simultaneously on one physical computer.
- / process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as _________filtering (2words)
- / _________authentication involves the use of two or more basic authentication methods.(2words)
- / Information security procedures protect information integrity by _________ fictitious transactions.
- / ________ is/are an example of a detective control.(2words)
- / _______ teams is an example of a corrective control? (2words)
- / The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as _________
- / awareness _______is one of preventive controls that is necessary to provide adequate security for social engineering threats?
17 Clues: / ________ is/are an example of a preventive control. • / ________ is/are an example of a detective control.(2words) • / _______ teams is an example of a corrective control? (2words) • / the primary means of protecting data stored in a cloud from unauthorized access. • ...
Organelles 2017-12-06
18 Clues: grass • city hall • factories • city wall • powerplant • garbage men • Traffic cops • FedEx trucks • cellular FedEx • Security guards • railroad tracks • city limit sign • street sweepers • cellular highway • cellular highway • solar power plant • “Recycling center” • water storage facility
Col's 80th Birthday 2022-12-16
Across
- Middle Child
- Labourer, What did I do while working for Frank Tydd (8,9)
- Where did I repair mowers
- Easy one. Wife's name
- Name of security company
- Drink, What did the factory I worked at produce? (4,5)
- Officer, What did I hold as an honorary position before holding a qualified position? (9,7)
- Another place I repaired mowers at
Down
- Where was the Preston Mine Sit-In held?
- Youngest Child
- Oldest Child
- Guard, What job had a tell tail blue shirt? (8,5)
- Five, How many days underground did I spend at the Preston Sit-In? (5,4)
- Day, Day of the year I was born (6,3)
14 Clues: Middle Child • Oldest Child • Youngest Child • Easy one. Wife's name • Name of security company • Where did I repair mowers • Another place I repaired mowers at • Day, Day of the year I was born (6,3) • Where was the Preston Mine Sit-In held? • Guard, What job had a tell tail blue shirt? (8,5) • Drink, What did the factory I worked at produce? (4,5) • ...
test 2021-08-16
Across
- One of our IPS Platforms
- Technology architecture that scale as per demand
- Find vulnerabilities in applications while they are running in production (Abbr)
- Cloud TCO Savings tool
- Elastic and Flexible Assets
- Mechanism that makes blockchain very resistant to tampering
- One of the CIA Triad
Down
- iPaaS Platform and Accenture Alliance
- One of the 5 R’s in Cloud Migration Strategy
- In Depth Concept of multiple layers of failsafes (3 Words)
- Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
- Smallest unit of a bitcoin
- Outermost security layer in Defence in Depth Approach
- One of the MAAG
14 Clues: One of the MAAG • One of the CIA Triad • Cloud TCO Savings tool • One of our IPS Platforms • Smallest unit of a bitcoin • Elastic and Flexible Assets • iPaaS Platform and Accenture Alliance • One of the 5 R’s in Cloud Migration Strategy • Technology architecture that scale as per demand • Outermost security layer in Defence in Depth Approach • ...
JOBS 2024-08-28
Across
- Sells food or different products in a small shop
- Can sell different items in a shop
- Works for the security of citizens, makes law being respected
- Likes making plants and vegetables grow
- Must precisely know what justice is about
- Makes bread or pastries
- Works outside, surrounded by trees, flowers
- Works in schools, learns to pupils
Down
- Operates on people in hospitals
- Makes sure nobody causes troubles in a bank, a supermarket
- Looks after animals, walks them and feeds them
- Takes care of people at home, or in hospitals
- Must always check he's got the right numbers
- Cuts fabric and sews to make clothes
14 Clues: Makes bread or pastries • Operates on people in hospitals • Can sell different items in a shop • Works in schools, learns to pupils • Cuts fabric and sews to make clothes • Likes making plants and vegetables grow • Must precisely know what justice is about • Works outside, surrounded by trees, flowers • Must always check he's got the right numbers • ...
Not All MFA Is Equal 2025-06-12
Across
- Abbreviation for Time-based One-Time Password
- Text-based codes sent to your phone
- Two-____Verification
- Not all MFA is _________ (title of the newsletter)
- Answers to ________ questions are easy to look up on social media or social engineer.
- A password or PIN is something you _______
- A device frequently used for MFA
Down
- Unique personal trait like your face or fingerprint
- A secret word or phrase you must know to log in
- A kind of security token
- Abbreviation for Multi-Factor Authentication
- A convenient MFA method used by TaxHawk
- A physical MFA device, like a Google Titan Key
- A hardware token is something you _________
14 Clues: Two-____Verification • A kind of security token • A device frequently used for MFA • Text-based codes sent to your phone • A convenient MFA method used by TaxHawk • A password or PIN is something you _______ • A hardware token is something you _________ • Abbreviation for Multi-Factor Authentication • Abbreviation for Time-based One-Time Password • ...
Database User Administration & Security Crossword 2025-08-26
Across
- Users connecting from outside the local server
- Database object used to enforce user restrictions and resources
- Connection between two databases to share data
- Management task: Updating details of existing users
- SQL statement used to give user permissions
- Removing access of a user permanently
- Collection of permissions grouped for assignment
Down
- Process of verifying identity of a user before access
- Predefined accounts available in DBMS
- SQL statement used to take back permissions
- Recommended practice: separating duties for better security
- Feature in SQL Server for connecting external servers
- Security measure that enforces rules for account credentials
- A connection configuration for servers to communicate
- SQL command used to give a user a role
15 Clues: Predefined accounts available in DBMS • Removing access of a user permanently • SQL command used to give a user a role • SQL statement used to take back permissions • SQL statement used to give user permissions • Users connecting from outside the local server • Connection between two databases to share data • Collection of permissions grouped for assignment • ...
Test 2025-09-30
Across
- — Secondary copy to restore data after loss or attack
- — Tool that detects and removes malicious code
- — Encrypted tunnel that protects traffic over untrusted networks
- — Install latest software versions for security/features
- — Filters network traffic by rules to block threats
- — Tricking users into revealing info via fake messages
- — Malicious software (virus, worm, trojan, ransomware)
- — Information that needs protection from loss/theft
Down
- — Scrambles data so only authorized parties can read it
- — Common attack vector for scams and payloads
- — Any endpoint (laptop/phone) connecting to a network
- — Unsolicited/bulk messages often carrying scams
- — Software fix that closes security holes
- — Secret used to verify identity; should be strong/unique
- — Person who exploits systems (ethical or malicious)
15 Clues: — Software fix that closes security holes • — Common attack vector for scams and payloads • — Tool that detects and removes malicious code • — Unsolicited/bulk messages often carrying scams • — Filters network traffic by rules to block threats • — Information that needs protection from loss/theft • — Person who exploits systems (ethical or malicious) • ...
fundmentals of thecnolocey 2023-08-28
Across
- or data which can be accessed when needed
- sure a person is who they say they are
- used to determine user privileges or access levels to the system
- to or damage sensitive information on a computer
- ransomware and the numerous other programs used by hackers to gain
- information is protected
- or weakness which undermines an organization’s security efforts
- an individual or organization has over information and how it is used
- of being private or secret
Down
- of being complete or uncorrupted
- rules
- of doing harm
- which have been programmed to carry out malicious intent
- assessment of potential threats to an organization’s security
- for "malicious software" and covers threats such as viruses, worms, Trojan
- of computers and devices managed as a unit with the same procedures
- Virus
17 Clues: rules • Virus • of doing harm • information is protected • of being private or secret • of being complete or uncorrupted • sure a person is who they say they are • or data which can be accessed when needed • to or damage sensitive information on a computer • which have been programmed to carry out malicious intent • assessment of potential threats to an organization’s security • ...
Crack the Cyber Code 2025-06-10
Across
- It is used to filter unwanted websites
- The act of watching someone's activity secretly online
- A fake software that harms devices
- The term for copying software without permission
- A harmful program that spread between computers
- The person who breaks into computer systems
- A online chatting tool
- A online chatting place
- A spying system
- A fake online identity
Down
- The set of rules for using the internet respectfully
- We call stealing someone's digital work or content
- A software protects you from your device from threats
- A secret code to protect accounts
- A common social media risk
- The act of sending rude or threatening messages online
16 Clues: A spying system • A online chatting tool • A fake online identity • A online chatting place • A common social media risk • A secret code to protect accounts • A fake software that harms devices • It is used to filter unwanted websites • The person who breaks into computer systems • A harmful program that spread between computers • ...
Language and Cyber Fun 2025-05-19
Across
- a online music platform
- translator for assembly language
- popular antivirus software
- inventor of Java Programming Language
- translate the whole program at a time
- process of writing specific instructions
- message for authentication
- translates language line by line
Down
- software helps in preventing unauthorised access
- is a language that uses for AI
- illegal intrusion into a computer system via network
- language consists 0 and 1
- a video conferencing application
- fourth-generation programming language
- first Internet framework
- misleads user as a trusted person or organization
16 Clues: a online music platform • first Internet framework • language consists 0 and 1 • popular antivirus software • message for authentication • is a language that uses for AI • translator for assembly language • a video conferencing application • translates language line by line • inventor of Java Programming Language • translate the whole program at a time • ...
tosta 2024-05-17
Scientific Management 2023-01-17
M&L_DRAFT_1 2016-02-02
Across
- Entry on the left side of an account
- The date on which a debt becomes due or the termination date on which an installment loan must be repaid in full
- Business contract in which a borrower agrees to pay interest for the use of the lenders funds
- Money paid by the borrower for the use of the lender's funds
- It is a kind of security which one offers for taking an advance or loan from someone
- Code help uniquely identifies a specific securities issue
- A financial institution that holds customers' securities for safekeeping
- The difference between prices at which a market maker can buy and sell a security
- A slang term used by mortgage-backed securities (MBS) traders and investors to refer to an MBS that is seasoned over some time period
Down
- It is an independent, unaffiliated research company that rates fixed income securities
- A person licensed to sell or lease real property, acting as an agent for others
- Federal National Mortgage Association
- When a customer refuses to pay the rest of amount due on a loan
- Arrangement of characters representing a particular security listed on an exchange
- Distribution of a portion of a company's earnings
15 Clues: Entry on the left side of an account • Federal National Mortgage Association • Distribution of a portion of a company's earnings • Code help uniquely identifies a specific securities issue • Money paid by the borrower for the use of the lender's funds • When a customer refuses to pay the rest of amount due on a loan • ...
Human Services Crossword By: Lindsay 2021-12-02
Across
- A _____ guide is under Hospitality and tourism and they hand out pamphlets and schedule group activities.
- This common four year degree is called a _______’s degree and is needed for many jobs.
- Tax examiners explain ___ information to people and companies.
- This job is under law, public safety, corrections, and security and is sometimes called an attorney.
- _______ trainers tech creatures like dogs to do tricks and help them to stop mis-behaving.
- These kind of clerks interview people for things like dog and marriage licenses.
- Coroners investigate the cause of death so the must have a high school ______ along with other schooling.
- Animal control workers enforce the ____ of animal control. Hint: this job is under Law, public safety, corrections and security.
Down
- Teacher aides work with ______ and students in the classroom.
- people under Education and Training guide and _____ young people.
- Tailors use ______ to make articles of clothing
- Crossing _______ direct people and cars at intersection and work zones.
- Law, public _______, corrections, and security.
- People under human services deal with ______ and families to meet their needs.
14 Clues: Tailors use ______ to make articles of clothing • Law, public _______, corrections, and security. • Teacher aides work with ______ and students in the classroom. • Tax examiners explain ___ information to people and companies. • people under Education and Training guide and _____ young people. • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Draeko Cybersecurity Crossword 2024-10-26
Across
- A form of malware that encrypts a user’s data and demands payment to unlock it.
- Malware that gathers information about a person or organization without their knowledge.
- Malware that gathers information about a person or organization without their knowledge.
- A network security device or software that monitors and controls incoming and outgoing traffic.
- A simulated cyberattack to evaluate the security of a system.
- An extra layer of security requiring two forms of identification for access.
Down
- The psychological manipulation of people to disclose confidential information.
- Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
- The process of converting information into a code to prevent unauthorized access.
- A type of social engineering attack where attackers trick users into revealing personal information.
- A trial-and-error method used to guess passwords or encryption keys.
- An attack where multiple systems flood a target, causing denial of service.
- A tool that encrypts internet traffic and hides a user’s IP address.
- A flaw in software that is unknown to the vendor and, therefore, unpatched.
- A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.
15 Clues: A simulated cyberattack to evaluate the security of a system. • A trial-and-error method used to guess passwords or encryption keys. • A tool that encrypts internet traffic and hides a user’s IP address. • An attack where multiple systems flood a target, causing denial of service. • A flaw in software that is unknown to the vendor and, therefore, unpatched. • ...
about computers 2022-11-22
Across
- local area network
- the brain of the computer
- allow users to collaborate
- a device use to put and get out information out of a computer
- dealing with strangers on the interact
- wide area network
- when someone uses your account to see your private information
- junk message that sent in bulk
- a data storage device
Down
- drive to keep your own information in it
- a network security that keeps what goes in and what goes out
- Security network use to protect the computer from the outside
- use copyright law permitted by a limited use
- a hardware unit use to connect and function as a part of a larger system
- short term memory storage
- kind of like copyright but it's not illegal
- thing that plugs into the usb fort of a computer
- like plagiarism but it's illegal
- storage device
19 Clues: storage device • wide area network • local area network • a data storage device • the brain of the computer • short term memory storage • allow users to collaborate • junk message that sent in bulk • like plagiarism but it's illegal • dealing with strangers on the interact • drive to keep your own information in it • kind of like copyright but it's not illegal • ...
Crossword Puzzle - Managed Edition 2024-09-27
Across
- Available for MFAP but not other Managed Accounts
- The one trading on the account's best interest
- Process of replacing a security in an asset allocation
- Soft closed product
- Realigns asset weightings
- Consists of series of checkpoints before account can be released for trading
- Where advisors create and maintain models
- Can be entered as security or sectors
- Consists of client's financial profile and investment experience and objectives
- A party role for Joint Account
- Customizable asset allocation and flexible model
- Offers access to Taxable and municipal bond portfolios
Down
- Change in Account ownership an / or strategy for CSP
- A Party Role for UTMA
- Designed to be short term account and no BUYS are permitted.
- Must be met when funding managed accounts
- Good for 60 days
- Used to copy all existing holdings and % to a new model
- Min program10K, 250K and 750K
19 Clues: Good for 60 days • Soft closed product • A Party Role for UTMA • Realigns asset weightings • Min program10K, 250K and 750K • A party role for Joint Account • Can be entered as security or sectors • Must be met when funding managed accounts • Where advisors create and maintain models • The one trading on the account's best interest • ...
ITS OLYMPICS 2025-09-18
Across
- Measures to protect computers, networks, and data
- Being responsible for one’s actions
- Assigning tasks to others effectively
- Software installed on a computer to perform tasks
- Working from a distance using technology
- Transferring data from your device to the internet or server
- A storage container for documents or data
- Understanding and sharing the feelings of others
- Ability to see and plan for the future
- Online meeting platform
- A web link that directs you to another page or file
Down
- Ensuring only authorized users can access a system
- The ability to use technology regardless of ability or disability
- Programming language used to make web pages interactive
- Security process requiring two steps to verify identity
- Ability to recover from setbacks or challenges
- Working together toward a common goal
- A program designed to harm or steal data
- Information given to improve performance
19 Clues: Online meeting platform • Being responsible for one’s actions • Assigning tasks to others effectively • Working together toward a common goal • Ability to see and plan for the future • Working from a distance using technology • A program designed to harm or steal data • Information given to improve performance • A storage container for documents or data • ...
Safety Switch Crossword 2024-05-11
Across
- Who you take safety concerns to.
- What is available if we are injured at work?
- What we do with near misses.
- What to complete after a safety incident.
- What comes first, always?
Down
- What you always need for cleaning tasks.
- What we remember with security incidents.
- The step before fixing hazards.
- What to do if you see unsafe behaviour?
- What should we do after mistakes?
- How do you report security incidents?
11 Clues: What comes first, always? • What we do with near misses. • The step before fixing hazards. • Who you take safety concerns to. • What should we do after mistakes? • How do you report security incidents? • What to do if you see unsafe behaviour? • What you always need for cleaning tasks. • What we remember with security incidents. • What to complete after a safety incident. • ...
Instagram 2018-06-04
Across
- Welcher Plattform ähnelt Instagram immer mehr?
- Was kann man machen um seine eigene Privatsphäre zu schützen?
- Bei welcher Altergruppe ist diese Plattform hoch im Gebrauch?
Down
- Ein Grund warum Instgaram Snap Chat immer mehr ähnelt.
- Was ist das Mindestalter um Instagram nutzen zu dürfen?
- Wie nennt man "Hass-Kommentare" noch?
- Was sollte man ändern wenn das Konto gehackt wurde?
- Was ist Instagram?
- Was ist das Symbol von Instgram?
9 Clues: Was ist Instagram? • Was ist das Symbol von Instgram? • Wie nennt man "Hass-Kommentare" noch? • Welcher Plattform ähnelt Instagram immer mehr? • Was sollte man ändern wenn das Konto gehackt wurde? • Ein Grund warum Instgaram Snap Chat immer mehr ähnelt. • Was ist das Mindestalter um Instagram nutzen zu dürfen? • ...
Talk To Me in Cybersecurity 2021-09-16
Across
- Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
- A formal and approved list of users who have defined access rights to an asset
- Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
- Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
- A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
- Surveillance software that can record every keystroke made on a computer’s keyboard
- The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
- The psychological manipulation of people into performing actions or divulging confidential information
- Computer program used to prevent, detect, and remove malware
Down
- The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
- Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
- Refers to a company security policy that allows for employees’ personal devices to be used in business
- Devices or software designed to find and prevent malicious activity on corporate networks
- Actions a company takes to manage the aftermath of a security breach or cyberattack
- A type of authentication method where the proof of a user’s identity is gained by different independent sources
17 Clues: Computer program used to prevent, detect, and remove malware • A formal and approved list of users who have defined access rights to an asset • Surveillance software that can record every keystroke made on a computer’s keyboard • Actions a company takes to manage the aftermath of a security breach or cyberattack • ...
physical security 2022-01-13
Across
- a form of security to prevent damage to cabling and stop any destruction of cables.
- Alarms are a deterrent that also signals authorities if any breach is detected within the system
- cameras used to monitor a specific location.
- any form of human features that are used to unlock a lock or open a system. This could be a fingerprint to scan on the lock
Down
- hired people that will monitor a location or assets to physically keep potential threats away and to stop any issues
- Card entry systems use a card as key and a scanner as a lock to remotely open some form of lock. These cards wirelessly work on the scanner to unlock the lock
- made of pins that need to line up to open. A key is used to move these pins into place
- These keep any threats out from the physical assets, by locking a box
8 Clues: cameras used to monitor a specific location. • These keep any threats out from the physical assets, by locking a box • a form of security to prevent damage to cabling and stop any destruction of cables. • made of pins that need to line up to open. A key is used to move these pins into place • ...
Computer security 2020-09-08
Across
- scam that users' private data of internet
- detect and remove virus and other programs
- store information about you
- designed to infiltrate your device
Down
- software that collects information from computer
- prevent unauthorized access
- alter the functioning of the computer
- is the unsolicited email that a person receives
8 Clues: prevent unauthorized access • store information about you • designed to infiltrate your device • alter the functioning of the computer • scam that users' private data of internet • detect and remove virus and other programs • is the unsolicited email that a person receives • software that collects information from computer
Internet Security 2013-04-19
Across
- unwanted emails
- the style of design which helps prevent strains from using a computer alot
- someone who breaks into a computer system
- computer security which blocks unorthorised access
Down
- short distance method of exchanging data, common with mobile phones
- A way of trying to obtain personal information for financial gain
- a group of computers exchanging data
- Can be downloaded and may damage programs and data
8 Clues: unwanted emails • a group of computers exchanging data • someone who breaks into a computer system • Can be downloaded and may damage programs and data • computer security which blocks unorthorised access • A way of trying to obtain personal information for financial gain • short distance method of exchanging data, common with mobile phones • ...
Security pops 2023-03-23
AI Security 2020-04-16
Across
- Artificial Assistant found in Apple devices
- a dangerous piece of software
- An AI with free thought
- AI that is made to socialize with people
Down
- Artificial Assistant found in newer Samsung devices
- The premise of CIS 1290
- AI made to sniff out malware
- The capability of a machine to imitate human behavior
8 Clues: The premise of CIS 1290 • An AI with free thought • AI made to sniff out malware • a dangerous piece of software • AI that is made to socialize with people • Artificial Assistant found in Apple devices • Artificial Assistant found in newer Samsung devices • The capability of a machine to imitate human behavior
Security council 2022-05-10
8 Clues: President of Russia • president of Ukraine • An economic sanction • To conquer a territory • A treaty between countries • Pact A treaty between ex soviet countries • someone forced to run away from their country • To move a product or resource between countries
Security council 2022-05-10
8 Clues: President of Russia • An economic sanction • president of Ukraine • To conquer a territory • A treaty between countries • A treaty between ex soviet countries • someone forced to run away from their country • To move a product or resource between countries
Security Training 2022-08-01
Across
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The system that maintains the safety and security of the branch.
- gathering the cash in their cash box in one motion in the event of a robbery.
- A method used to introduce illegally obtained funds into the financial system to conceal the true ownership and source of funds.
Down
- A type of fraud that occurs mainly at a POS terminal using a device. The fraudster will swipe the card twice. The second swipe records data from the first and second track fields on the magnetic strip. The card information is then reprinted onto a counterfeit card.
- A job's four-digit unique identifier.
- any information the disclosure of which is prohibited or limited in accordance with applicable federal or state banking privileges, regulations, or laws.
- A deception made for personal gain.
8 Clues: A deception made for personal gain. • A job's four-digit unique identifier. • The system that maintains the safety and security of the branch. • gathering the cash in their cash box in one motion in the event of a robbery. • A method used to introduce illegally obtained funds into the financial system to conceal the true ownership and source of funds. • ...
Internet security 2022-11-03
Across
- Designed to obtain personal information without the user's permission
- Company uses .... techniques to decode (or decipher) secret data
- Malware that is used to pose as different software
Down
- Encoding data so that unauthorized users can't read it is known as ...
- Protects a company intranet from outside attacks.
- Can infect your files and corrupt your hard drive
- Users have to enter a ... to gain access to a network.
- Person who uses their computer skills to enter computers and/or networks illegally
8 Clues: Protects a company intranet from outside attacks. • Can infect your files and corrupt your hard drive • Malware that is used to pose as different software • Users have to enter a ... to gain access to a network. • Company uses .... techniques to decode (or decipher) secret data • Designed to obtain personal information without the user's permission • ...
Energy security 2022-09-11
Across
- the uninterrupted availability of energy sources at an affordable price
- measures that keep prices for consumers below market levels or for producers above market levels, or reduce costs for consumers and producers
- Fuel that was formed in the earth in prehistoric times from remains of living-cell organisms
- policy that encourages the development of energy technologies to diversify energy supply sources, thus reducing reliance on conventional fuels
Down
- are virtually inexhaustible in duration but limited in the amount of energy that is available per unit of time
- An arrangement whereby the same company owns all the different aspects of making, selling, and delivering a product or service
- lack of access to modern energy services
- energy made available for future disposition.
8 Clues: lack of access to modern energy services • energy made available for future disposition. • the uninterrupted availability of energy sources at an affordable price • Fuel that was formed in the earth in prehistoric times from remains of living-cell organisms • ...
Food Security 2024-11-28
Across
- A round green or red fruit with a thin skin and crunchy flesh
- A citrus fruit, often orange or green in color
- A fruit with a hard shell and water or white flesh inside
- A small, dark purple or green fruit that grows in bunches
Down
- A tropical fruit with spiky skin and sweet yellow flesh
- A yellow fruit that monkeys love
- A fruit with a hard shell and water or white flesh inside
- A juicy red fruit with tiny seeds on its surface
- A small red fruit often used in pies
9 Clues: A yellow fruit that monkeys love • A small red fruit often used in pies • A citrus fruit, often orange or green in color • A juicy red fruit with tiny seeds on its surface • A tropical fruit with spiky skin and sweet yellow flesh • A fruit with a hard shell and water or white flesh inside • A fruit with a hard shell and water or white flesh inside • ...
INFORMATION SECURITY 2025-04-06
Across
- To modernize
- An event that affects negatively
- … is used to restore the original in case of a data loss event
- Registration of all actions with information systems
- Physical … such as disks, flash drives, HDDs are used to store and transmit data
Down
- Security … allows access to sensitive information
- Cryptographic transformation of information
- A character string which helps to verify the user’s identity
8 Clues: To modernize • An event that affects negatively • Cryptographic transformation of information • Security … allows access to sensitive information • Registration of all actions with information systems • A character string which helps to verify the user’s identity • … is used to restore the original in case of a data loss event • ...
Cybersecurity Terms 2023-10-27
15 Clues: GRC • Purple • Razeen • Toddlers • Checkmarx • Teel Tech • Picus Security • Philip Cherian • Video Forensics • Incident Response • Mobile Acquisition • #NotTraditionalPAM • Data Classification • Mobile Device Management • External Threat Landscape
5/20 - DO NOW (tener que) 2025-05-13
16 Clues: nadar • hotel • el mapa • el taxi • la playa • la playa • embarque • el viaje • pasaporte • el boleto • el volcán • aeropuerto • las maletas • el ascensor • la seguridad • la estación de autobús
English IT Crossword 2020-05-09
Across
- - wprowadzenie
- - komunikacja
- - nadgarstkowy
- - roczny
- - projektant
- - dane
- - elektroniczny
- - projekt
- - efektywnie
- - analizuj
- - nośnik
- - współpracownik
- - dodatek
- - tło
- - konsultant
- - finanse
- - laboratorium
- - zatrudnić
- - dyskusja
- - utworzyć
- - analitycy
- - firma
- - funkcja
- - wdrożenie
- - szef
- - rozdział
- - programista
- - finansowe
- - przemęczenie oczu
- - baza danych
- - zaliczka
- - środowisko
- - certyfikacja
- - architekt
- - skoncentrować się
- - zaangażowany
- - wirtualne
- - rozwój
- - szczegółowy
- - umiejętność
Down
- - wiedza
- - administrator
- - opinia
- - znacznie
- - powstanie
- - inżynieria
- - inżynier
- - instytucja
- - sprzęt komputerowy
- - cel
- - sprawa
- - intranet
- - analiza
- - informatyka
- - konkurencyjny
- - przedsiębiorstwo
- - klient
- - powszechny
- - biznes
- - instalacja
- - spadek
- - żądanie
- - komputer
- - sprzęt
- - moc
- - konsulting
- - obszar
- - ubezpieczenie
- - klawiatura
- - komunikować się
- - księgowość
- - zastosowanie
- - określenia
- - odpowiednie
- - kod
- - ukończyć
- - zintegrować
- - współrzędna
- - wydajność
- - instrukcja
80 Clues: - cel • - tło • - moc • - kod • - dane • - szef • - firma • - wiedza • - opinia • - roczny • - nośnik • - sprawa • - klient • - biznes • - spadek • - sprzęt • - obszar • - rozwój • - projekt • - analiza • - dodatek • - finanse • - żądanie • - funkcja • - znacznie • - inżynier • - analizuj • - intranet • - dyskusja • - utworzyć • - komputer • - rozdział • - zaliczka • - ukończyć • - powstanie • - zatrudnić • - analitycy • - wdrożenie • - finansowe • - wydajność • ...
PDHPE Crossword 2016-08-23
Across
- The part of the body you taste with
- A example of the meat food group
- The muscle that pumps blood around your body
- Mental or emotional strain
- A type of bullying that happens online
- The part of the body you smell with
- The organ that does the most digesting
- A example of the dairy food group
- An example of the fruit food group
- The part of the body you see with
Down
- A feeling of unease, worry or nervousness
- The organ that oxygenates your blood
- The scaffolding of your body
- A example of the vegetable food group
- It can happen to anyone
- bullying Excluding someone or spreading rumours
- The biggest organ in the human body
- A example of the carbohydrates food groups
- The part of the body you hear with
- The part of your body that pumps blood to your organs
20 Clues: It can happen to anyone • Mental or emotional strain • The scaffolding of your body • A example of the meat food group • A example of the dairy food group • The part of the body you see with • An example of the fruit food group • The part of the body you hear with • The part of the body you taste with • The part of the body you smell with • The biggest organ in the human body • ...
11/23/2021 Crossword 2021-11-23
Across
- 50 Cent grew up here: Jamaica ___
- Moana's dad (2 words)
- "Infinity War" antagonist
- "Family Feud" host (2 words)
- Not Black Friday, but ___ Monday
- Movie "___ Evil: Welcome to Raccoon City"
- His death started WWI
- Edible soup bowl
- "The Lottery" author
- "sauce" put on turkey
- Thanksgiving dessert ___ pie
- Snoop Dogg's cousin "Moesha"
- He plays Joe on "You"
- Ship the Pilgrims took
Down
- Rafferty song "___ Street" used in "GTA V"
- Netflix animated series "Big ___"
- Card game for one
- Show her some R.E.S.P.E.C.T
- Turkey leg
- Thanksgiving side dish ___ yams
- White Stripes song "Seven ___ Army"
- Rihanna country of origin
- Cornucopia meaning "horn of ___"
- "Aladdin" song "___ Like Me"
- Prayer before dinner
- Bread mixture that goes in the bird
- Video game "___ 2K"
- "Levitating" singer (2 words)
- Cavs rookie ___ Mobley
- -ology means "the ___ of"
- Thanksgiving month
- Edible soup bowl
- "Vampire Diaries" spinoff
33 Clues: Turkey leg • Edible soup bowl • Edible soup bowl • Card game for one • Thanksgiving month • Video game "___ 2K" • Prayer before dinner • "The Lottery" author • Moana's dad (2 words) • His death started WWI • "sauce" put on turkey • He plays Joe on "You" • Cavs rookie ___ Mobley • Ship the Pilgrims took • "Infinity War" antagonist • Rihanna country of origin • -ology means "the ___ of" • ...
Crossword 2022-05-14
Across
- the adjective from innovation
- Portable computer
- to change in to stronger or more advanced from
- present ideas and method
- nort in use anymore, having been replaced by something better
- a device that operates
- To develop towards an improved or more advanced state
- behavior of something or someone
- to change something in order to make in better
- a person who know a lot about technology especially computer
- computers
Down
- the physical part of a computer or related device
- The effect of something
- something you could not manage without; absolutely necessary
- The power to have an effect on the character, development
- of the present time;
- complete or dramatic or improvement
- Involving or causing
- connected to the internet
- Relating to or involving technology
- electronic current passing through it
- The right to keep personal information secret
- Involving, using or relating to computers
23 Clues: computers • Portable computer • of the present time; • Involving or causing • a device that operates • The effect of something • present ideas and method • connected to the internet • the adjective from innovation • behavior of something or someone • complete or dramatic or improvement • Relating to or involving technology • electronic current passing through it • ...
Health Crossword 2023-11-06
Across
- feeling influenced to do something
- something you make and then actively try to reach
- a mean person
- online way of communication (2 words)
- someone who learn with their hands
- A hazardous situtation, syn.
- to stop something from happening
- psychological well-being (2 words)
- a connection between two people
- someone who learns best by seeing
Down
- a profession
- to joke around with someone
- strong body, strong mind
- forcing someone to do something under a threat
- unlike any other
- a type of bullying done online
- A group of people who intend to cause harm
- any action by a person/group that causes physical or emotional harm
- An "i'm not failing, i'm learning" attitude (2 words)
- someone who is of the same age or group as you
- when one is extremely poor
- someone who learns best by listening
22 Clues: a profession • a mean person • unlike any other • strong body, strong mind • when one is extremely poor • to joke around with someone • A hazardous situtation, syn. • a type of bullying done online • a connection between two people • to stop something from happening • someone who learns best by seeing • feeling influenced to do something • someone who learn with their hands • ...
Barkmans Crossword 2024-01-04
Across
- - How computers are wirelessly connected
- Firewall - protects your computer from viruses
- Compression Tool - shrinks the size of files
- device - what shows the user info
- computing - using less energy to compute
- - etiquette of the internet
- Extortionist - stop hacking in exchange currency
- Vision Syndrome - computer affected eyesight
- - an integrated interface within devices
- device - how you enter info
- - what gives your device info
Down
- - business online
- Device Convergence - technology that needs less computers
- Web Design - the resolution matches the screen
- - unaware of a virus
- System - made of 1s and 0s
- - your position whilst computing
- - accessing a device illegally
- - how clear the screen is
- social network - users alike can engage together
- - organized data
- - stores info on you computer
- Aggregation - a compilations of information
- Defragmenter - organizer of data on a disk
- Protector - protects electronics against power surges
25 Clues: - organized data • - business online • - unaware of a virus • - how clear the screen is • System - made of 1s and 0s • - etiquette of the internet • device - how you enter info • - stores info on you computer • - what gives your device info • - accessing a device illegally • - your position whilst computing • device - what shows the user info • ...
Project 2024-01-08
Across
- - collection of computers
- - a small text stored on the computer
- Protector - minimize chance of overcharge
- - radio frequency technology
- - collection of data to allow retrieval
- Extortionist - demands payment to stop their attack
- - an electrical disturbance
- - files waiting in the buffer
- Vision Syndrome - computer related eye health condition
- - accesses a computer illegally
- Aggregation - users collect and compile the data
- - number of horizontal and vertical pixels
Down
- - delivers webpages to your computer
- - unaware the device is compromised
- - mobile operating system
- - more expensive DVD format
- System - unique numbers 0 and 1
- - a display technology that uses liquid compound
- - aircraft controlled with a controller
- - programs for assistance
- - business transaction over the internet
- - applied science for comfort and efficiency
- - request of specific data from database
- - internet etiquette
- Aggregation - called a curation website
- Firewall - protects a personal computer from viruses
- Compression Tool - tool that compresses files
27 Clues: - internet etiquette • - collection of computers • - mobile operating system • - programs for assistance • - more expensive DVD format • - an electrical disturbance • - radio frequency technology • - files waiting in the buffer • System - unique numbers 0 and 1 • - accesses a computer illegally • - unaware the device is compromised • - delivers webpages to your computer • ...
Futurama 2024-05-14
Across
- Where did Fry meet Bender?
- President of Earth at the end of the fourth season
- "Bachelor Chow, now with ____!"
- Lrr rules
- Home of amy's parents
- ___ don't work that way! GOOD NIGHT!
- Leela's boyfriend in "The Cyber House Rules"
- What is Leela
- Fry's favorite drink
- fry and bender's apartment complex
- In "Parasites Lost" what does fry eat that had the parasites?
- two meals in one week
- What's strange about Zoidberg?
- If it wasn't torpedo three, what was it?
- Brother of Fry
- Original voice of Robot Santa
- Planet at the exact center of the universe
- Leela Surname
Down
- Reward for saving the earth from global warming
- Cutest pet in the universe
- Zoidberg and Calculon Movie
- Fry was named after a ____
- Voice of fry
- Zapp's ride
- What is Bender
- First Tagline
26 Clues: Lrr rules • Zapp's ride • Voice of fry • What is Leela • First Tagline • Leela Surname • What is Bender • Brother of Fry • Fry's favorite drink • Home of amy's parents • two meals in one week • Where did Fry meet Bender? • Cutest pet in the universe • Fry was named after a ____ • Zoidberg and Calculon Movie • Original voice of Robot Santa • What's strange about Zoidberg? • ...
M Jangki Dausad X-E 21 2025-04-15
Across
- Singkatan dari Hak atas Kekayaan Intelektual?
- Proses membuat isi digital?
- Proses memastikan data benar?
- Nama lain dari isi digital?
- Ahli dalam jaringan komputer?
- Pelanggaran HAKI disebut juga?
- Ahli keamanan sistem komputer?
- Kata yang diketik di mesin pencari?
- Tempat kita mengetik kata kunci untuk mencari informasi?
- Orang yang membuat aplikasi?
- Profesi yang membuat tampilan web menarik?
- Salah satu karya seni yang dilindungi HAKI?
- Aplikasi populer untuk konten video?
Down
- Proses membuat video untuk media sosial?
- Format email dicek dengan proses ini?
- Hasil yang muncul dari pencarian?
- Profesi yang bertugas mengelola jaringan komputer?
- Mesin pencari paling populer di dunia?
- Hak yang dimiliki pencipta atas karyanya?
- Profesi yang bekerja di bidang IT?
- Validasi mencegah terjadinya?
- Validasi menjamin data?
- Validasi dilakukan sebelum data?
- Tujuan utama membuat konten?
- engine Istilah lain dari mesin pencari?
- HAKI melindungi jenis karya ini?
- Orang yang membuat konten?
27 Clues: Validasi menjamin data? • Orang yang membuat konten? • Proses membuat isi digital? • Nama lain dari isi digital? • Tujuan utama membuat konten? • Orang yang membuat aplikasi? • Validasi mencegah terjadinya? • Proses memastikan data benar? • Ahli dalam jaringan komputer? • Pelanggaran HAKI disebut juga? • Ahli keamanan sistem komputer? • Validasi dilakukan sebelum data? • ...
tech 2024-10-09
Across
- design designing online
- a arrangement of horizontal and vertical lines
- docs online website for document
- funny meme
- place to find information
- a set of instructions for a program
- online currency
- programs used by a computer
- theory guidelines designers use to create visually appealing color combination
- something with the alphabet
- something people use to program robots
- something that will take over the world
- fonts fonts online
Down
- something that connects something to your phone wirelessly
- kanani best teacher in the world
- mapping system
- bullying bullying online
- something that people disconnect
- turn your device back on
- somebody that has influence
- something that's in star wars
- most bought thing from apple
- games online games
- something you can charge things with
- somthing websites give you
- media social platform
- something that projects something
- has every answer
- something that gives you internet
- remote something that controls a tv
30 Clues: funny meme • mapping system • online currency • has every answer • games online games • fonts fonts online • media social platform • design designing online • bullying bullying online • turn your device back on • place to find information • somthing websites give you • somebody that has influence • programs used by a computer • something with the alphabet • most bought thing from apple • ...
Grow in Grace 2013-10-19
Across
- In Christian term, it is the act of maturing.
- The condition of man.
- Every person has come _______ of the glory...
- Our security comes from God's __________.
- Not knowing for sure.
- Book in the Bible that teaches that there are two types of people.
- You are saved through _________.
- According to his ________ we are saved. (Titus 3:5)
Down
- Salvation is really a new __________.
- Salvation is like this, it is always free.
- Another term for payment.
- Equitable in character or act.
- It is the assurance of Salvation.
- It is a paper, the value of which depends upon its acceptance by the person implicated.
14 Clues: The condition of man. • Not knowing for sure. • Another term for payment. • Equitable in character or act. • You are saved through _________. • It is the assurance of Salvation. • Salvation is really a new __________. • Our security comes from God's __________. • Salvation is like this, it is always free. • In Christian term, it is the act of maturing. • ...
Round 3 Finance Crossword 2024-11-14
Across
- India's Financial Capital
- An asset pledged as security for the repayment of a loan
- The date on which the instrument becomes due
- Which country has the most Billionaires
- india's biggest philanthropist (Current)
- The term for the number of employees assigned to a manager
Down
- Tradable financial instruments that represent ownership (stocks)
- Airlines that has the biggest customer base during 2008-2011 (Named after a bird)
- In USP, P stands for?
- India's largest Cars and Trucks exporter
- The one organizes a company's Funances
- Current chairperson of NITI Ayog
- Largest finance company in India
- Indian Bank with most branches in foreign country
14 Clues: In USP, P stands for? • India's Financial Capital • Current chairperson of NITI Ayog • Largest finance company in India • The one organizes a company's Funances • Which country has the most Billionaires • India's largest Cars and Trucks exporter • india's biggest philanthropist (Current) • The date on which the instrument becomes due • ...
QAF5.2.IAM301 2025-11-03
Across
- Linking identities across organizations or systems
- Single Sign-On allowing one login for multiple apps
- Result of unsynchronized clocks in SSO systems
- Restricting token use to one specific device
- Multi-Factor Authentication adding extra login security
- Granting only the access needed to perform a job
- Privileged Access Management for admin accounts
Down
- Security model that verifies every access request
- Attack type limited by short token lifespans
- Temporary credential used for authentication
- Digital credential whose misconfiguration causes trust issues
- Analogy for IAM verifying user access like a club guard
- Protocol that uses timestamps to prevent tampering
- Manages who can access which systems or resources
14 Clues: Attack type limited by short token lifespans • Temporary credential used for authentication • Restricting token use to one specific device • Result of unsynchronized clocks in SSO systems • Privileged Access Management for admin accounts • Granting only the access needed to perform a job • Security model that verifies every access request • ...
Roberson Chapter 3 2013-06-09
Across
- ___________ warning
- Court order
- Rodney _______
- Diplomatic ___________ (plural)
- recording an arrest
- Tennessee v. ____________
- __________ v. Bedinger
- _________ level stop
Down
- Federal Bureau of Investigation
- ________________ suspicion
- stop and _________
- Department of _________ Security
- ______________ detention
- Searches and __________
- __________ v. Municipal Court of
- A seizure
- Tom __________
- ________ pursuit
18 Clues: A seizure • Court order • Rodney _______ • Tom __________ • ________ pursuit • stop and _________ • ___________ warning • recording an arrest • _________ level stop • __________ v. Bedinger • Searches and __________ • ______________ detention • Tennessee v. ____________ • ________________ suspicion • Federal Bureau of Investigation • Diplomatic ___________ (plural) • ...
The Executive Cabinet 2025-03-10
Across
- focuses on programs and services and services that improve the well-being of society (_______ and Human Services)
- handles foreign policy and international relations
- deals with housing programs and the development of highly populated areas (Housing and _____ Development)
- oversees policies and programs that affect schools and FAFSA
- oversees farming and food safety
- handles policies related to fuel sources and nuclear security
- manages national parks and natural resources
Down
- promotes economic growth and technological innovation
- serves former military personnel
- enforces federal laws
- oversees infrastructure related to roads, railroads and airports
- manages the nation's finances and collects taxes
- responsible for protecting the country against foreign invasion
- focusing on domestic security
- protects workers' rights
15 Clues: enforces federal laws • protects workers' rights • focusing on domestic security • serves former military personnel • oversees farming and food safety • manages national parks and natural resources • manages the nation's finances and collects taxes • handles foreign policy and international relations • promotes economic growth and technological innovation • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
vocabulary pg 72 2024-04-17
Across
- - its something that is clean and maybe is a clue
- - in the act of killing something
- - a mark left by a foot, as in earth or sand:
- - look for
- - go after someone
- officers - is a person who arrest criminals
- - the police catch somebody
- - You see a lot of details of security
- - is an arm that police man use
Down
- - is a desing that all people have in her hands
- - a police officer or a private investigator whose job is to get information and evidence about crime
- - to seize or capture a criminal
- - the act of stealling
- - catch something that isn´t yours
- guard - a person who works in a place triying to prevent a crimen
- - find the solution
- - is a place where the criminals go
- - is a person who steal something
18 Clues: - look for • - go after someone • - find the solution • - the act of stealling • - the police catch somebody • - is an arm that police man use • - to seize or capture a criminal • - in the act of killing something • - is a person who steal something • - catch something that isn´t yours • - is a place where the criminals go • - You see a lot of details of security • ...
Spanish Vocab 2024-05-10
ASM 2020-11-22
Across
- - This is how Office ID is called in ASM (2 words without space) (9)
- - It's used when MFA is activated for the application (4)
- - A component of the office ID (8)
- - A login, used to access the system and perform automated tasks within Amadeus application (7)
- - All changes to data stored in the system are logged and can be displayed using ... (7)
- - The graphical user interface of the Logon and Security Server (3)
- - A gateway, that routes messages to Logon and Security Server (2)
- - An aggregation of the Permissions or Sub-roles (4)
Down
- - We change the user status to ... when the employee has maternity leave (6)
- - You create ... when you want to group together offices within the Organization (2 words without a space) (16)
- - A component of the office mask (7)
- - Filter, used to define the format of the offices that can be attached to ORG or OGU (2 words without space) (10)
- - Payment Card Industry Data Security Standards (6)
- - This is the process for the users to use the same credentials to log into different Amadeus applications (3)
- - To change an office location within the Organization tree I use ... (4)
15 Clues: - A component of the office ID (8) • - A component of the office mask (7) • - Payment Card Industry Data Security Standards (6) • - An aggregation of the Permissions or Sub-roles (4) • - It's used when MFA is activated for the application (4) • - A gateway, that routes messages to Logon and Security Server (2) • ...
Helloto 2025-11-19
Across
- – OSCE mediation format created to negotiate a political settlement of the Nagorno-Karabakh conflict.
- – 1994 document that formalized the ceasefire starting on 12 May 1994.
- – 2005 Council of Europe document condemning the occupation of one member state’s territory by another.
- – Principle emphasized by Azerbaijan to defend its internationally recognized borders.
- – Principle invoked by Armenia to justify claims regarding Nagorno-Karabakh’s status.
- – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict.
- – 2007–2009 basic principles including liberation of territories, interim status and a future vote on Nagorno-Karabakh.
Down
- – Agreement brokered by Iran in May 1992 that collapsed after the occupation of Shusha.
- – 1996 OSCE summit that adopted principles affirming Azerbaijan’s territorial integrity.
- – First UN Security Council resolution demanding withdrawal of occupying forces from Kalbajar.
- – UN Security Council resolution of October 1993 that reaffirmed Nagorno-Karabakh as part of Azerbaijan.
- – Azerbaijani town where a massacre of civilians took place during the conflict.
- – 1994 OSCE meeting where the Minsk Group co-chairmanship and peacekeeping role were defined.
- – Azerbaijani district whose occupation led to UN Security Council Resolution 822 in 1993.
- – Strategically important town whose occupation marked a turning point in the war.
15 Clues: – 1994 document that formalized the ceasefire starting on 12 May 1994. • – Azerbaijani town where a massacre of civilians took place during the conflict. • – Strategically important town whose occupation marked a turning point in the war. • – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict. • ...
DEFINITIONS - Working within the private security industry 2015-03-14
Across
- Hostile attitude towards someone who belongs to a certain group.
- The security industry authority.
- Immediate assistance given to an injured person.
- Approved contractor scheme.
- Those who commit a sexual crime against the vulnerable.
- The sending and receiving of signals.
- Staff members responsible for an area of fire safety.
- Any serious unplanned incident
- The use of violence, threats and intimidation in pursuit of political aims.
- Anything hat makes communication difficult.
Down
- A state of feeling safe and secure.
- Identification of hazards and risks.
- Rules that prevent people from committing a serious offence
- Lumping certain groups of people together.
- Reporting of injuries diseases and dangerous occurrences regulations.
- Anyone who may be at risk of harm.
- When someone is treated less favourably than another person.
- Rules that help govern our daily lives.
- The likelihood of harm occurring.
19 Clues: Approved contractor scheme. • Any serious unplanned incident • The security industry authority. • The likelihood of harm occurring. • Anyone who may be at risk of harm. • A state of feeling safe and secure. • Identification of hazards and risks. • The sending and receiving of signals. • Rules that help govern our daily lives. • Lumping certain groups of people together. • ...
Roosevelt and the New Deal 2023-02-13
Across
- a debt security that the government sells in order to finance its spending
- the state of being successful and thriving, especially in financial terms
- security
- to define oneself
- planting trees in areas where they had been cut down
- lucky
- a campaign to support a political, social, or religious cause
- projects that are financed by government through tax revenues for the benefit of the people
- land not good for farming
Down
- lack of trees that can be cut down and used
- a strong invitation to participate in an important project
- giving out
- the ability to anticipate future events or needs
- to increase
- things that are not necessary for survival or basic comfort
- a long and severe economic downturn
- land where trees have been cut down
- someone who tells about the future
- wearing away of the top, fertile layer of soil
19 Clues: lucky • security • giving out • to increase • to define oneself • land not good for farming • someone who tells about the future • a long and severe economic downturn • land where trees have been cut down • lack of trees that can be cut down and used • wearing away of the top, fertile layer of soil • the ability to anticipate future events or needs • ...
Zero-Security Crossword 2013-08-11
Across
- term used for a white hat hacker is an ____ hacker
- someone who uses hacking to pursue ideological ends
- Adrian Lamo "the ___ hacker"
- 1983 hacker movie
- web sites use these to identify users who revisit their site
Down
- sequence of steps needed to solve logical or mathematical problems
- this prevents computers on a network from communicating directly with external computer systems.
- software used to record keystrokes
- Creator of the first worm (Robert Tappan ____)
- software program that monitors network traffic
- virus detection program that searches for viruses
- A flaw in a system that allows hackers to break in
12 Clues: 1983 hacker movie • Adrian Lamo "the ___ hacker" • software used to record keystrokes • Creator of the first worm (Robert Tappan ____) • software program that monitors network traffic • virus detection program that searches for viruses • term used for a white hat hacker is an ____ hacker • A flaw in a system that allows hackers to break in • ...
computer security puzzle 2020-08-18
Across
- stops your device from running properly
- something your computer can get
- to get into something
- a malware program
- a type of software
- operating information used by a computer
Down
- made to detect and destroy viruses
- causes harm to a computer system or network
- to pass from one thing to another
- having caution over something
- when a device has been harmed
- files that become inoperable or unusable
12 Clues: a malware program • a type of software • to get into something • having caution over something • when a device has been harmed • something your computer can get • to pass from one thing to another • made to detect and destroy viruses • stops your device from running properly • files that become inoperable or unusable • operating information used by a computer • ...
Network Security Crossword 2022-07-21
Across
- any piece of software, malicious or not, that displays advertisements on a computer.
- malware that threatens to publish the victims personal data, block access to the computer, unless a ransom is paid.
- malicious software that aims to gather information about a person or organisation.
- a cyberattack that redirects a website’s traffic to another, fake site by installing malware on the computer.
- software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
- A person who gains unauthorised access to computer files or networks in order to further social or political ends.
Down
- The practice of protecting system, networks and programs from digital attacks
- A person who uses computers to gain unauthorised access to data.
- malware that replicates itself in order to spread to other computers.
- logging what keys people have tapped on the keyboard
- programs which users are tricked into installing under the pretence that they are legitimate and useful.
- A computer program which is hidden within another program (the ‘host’ program). the virus code is only run when the host program is executed.
12 Clues: logging what keys people have tapped on the keyboard • A person who uses computers to gain unauthorised access to data. • malware that replicates itself in order to spread to other computers. • The practice of protecting system, networks and programs from digital attacks • malicious software that aims to gather information about a person or organisation. • ...
Terrorism Case Study - 9/11 2014-05-11
Across
- The fourth plane crashed in an empty field in ______ due to heroic passengers
- Hijackers aboard Flight 77 crash the plane into the western front of the ______
- USA ______ Act was an anti-terrorism bill that strengthened the government's rights to detain foreigners suspected of terrorism
- The ________ and Transportation Security Act Law made airport security the responsibility of the federal government
Down
- Terrorist group responsible for September 11th attacks.
- The Department of _______ Security was created to coordinate national efforts against terrorism
- The use of force or threats to frighten people and the government
- Agents that move to a country, blend into a community
- The Federal Aviation Administration, _____, ordered airlines to install bars on cockpit doors
- _____ bin Laden was responsible for coordinating the attacks
- Letters containing bacteria that cause _____ were sent to members of Congress
11 Clues: Agents that move to a country, blend into a community • Terrorist group responsible for September 11th attacks. • _____ bin Laden was responsible for coordinating the attacks • The use of force or threats to frighten people and the government • The fourth plane crashed in an empty field in ______ due to heroic passengers • ...
Hasan Khan 2017-06-01
Across
- a poor diet and lack of exercise leads to this
- not doing something
- food measured in heat units
- The eating disorder that is described by vomiting or swollen ruptured esophagus
- disease: a disease that cannot be be passed down from one person to another
- when you starve yourself
- someone who witnesses bullying
- disease: the number 1 killer of Americans
- What is passed down
Down
- the date rape drug
- something that changes the way you feel or think
- illness; when your brain is sick
- blood alcohol content
- your drunk
- a resistance to a drug
- disease: a disease that can be passed down from one person to another
- Iphigenia: the mental illness where you see or hear things
- the active ingredient in tobacco
- making fun of someone or physically hurting them
- bullying: bullying someone online
- a mind altering drug and active ingredient found in marijuana
21 Clues: your drunk • the date rape drug • not doing something • What is passed down • blood alcohol content • a resistance to a drug • when you starve yourself • food measured in heat units • someone who witnesses bullying • illness; when your brain is sick • the active ingredient in tobacco • bullying: bullying someone online • disease: the number 1 killer of Americans • ...
PDHPE content 2016-08-23
Across
- what you use to chew
- 1 in 5 people get it
- the organ you breath with
- an unwanted behaviour
- thin strands found on your scalp- if you don't have it you are called bald
- what you use to hear
- the organ used to pump blood to the rest of your body
- something that makes your life harder
- rough organism found in mouth used to taste
- dogs love to chew on them
Down
- a disease caused by you eating to many foods high in sugar or fat
- sheep meat
- what you get when you do strenuous exercise like lifting weights
- bullying online using social sites
- what you use to eat
- a sweet garial which is bad for your teeth
- another word for worried
- the organism you see with
- meat that comes from a cow
- what you use to smell
20 Clues: sheep meat • what you use to eat • what you use to chew • 1 in 5 people get it • what you use to hear • an unwanted behaviour • what you use to smell • another word for worried • the organ you breath with • the organism you see with • dogs love to chew on them • meat that comes from a cow • bullying online using social sites • something that makes your life harder • ...
Thankful for this Crossword 2023-10-28
Across
- Pilgrims' ship
- Dinner ____ (type of bread)
- Turkey noise
- Festival of lights, falls on November 12th
- Last course
- A symbol of plenty
- You pull and push these at a meal
- Moving displays in NYC
- Savory stew with a crust... common Flik dinner
- Supper
- _______ sauce
- What goes on potatoes
- When clocks fall back, with Savings
- Holiday on November 11th, with Day
- What happens the week before November break
- Ingredient made from bread cubes, herbs, etc.
- How we feel on on the fourth Thursday of November
- Black _____
Down
- Who comes over on the fourth Thursday
- _____ Monday
- Corn____
- Candied ____
- All ____ Day
- Event that only happens every four years, with Day
- Green bean ____
- Weeks between the two end-of-year breaks
- Bird eaten in November
- Orange root veg
- Macy's has one
- November holiday
- Style of spuds
31 Clues: Supper • Corn____ • Last course • Black _____ • _____ Monday • Turkey noise • Candied ____ • All ____ Day • _______ sauce • Pilgrims' ship • Macy's has one • Style of spuds • Green bean ____ • Orange root veg • November holiday • A symbol of plenty • What goes on potatoes • Bird eaten in November • Moving displays in NYC • Dinner ____ (type of bread) • You pull and push these at a meal • ...
NORMA 2024-01-14
Across
- Tanggung jawab menjaga kelestarian lingkungan?
- Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
- Norma etika dalam penggunaan teknologi informasi?
- Norma dalam mengelola konflik secara damai?
- Ketaatan terhadap norma keselamatan di tempat kerja?
- Kewajiban dan hak yang dimiliki oleh warga negara disebut?
- Tanggung jawab individu terhadap kepentingan bersama disebut?
- Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
- Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
- Norma yang mengatur hubungan antarindividu dalam masyarakat?
Down
- Sikap saling menghargai dalam keberagaman budaya
- Tanggung jawab individu terhadap diri sendiri dan masyarakat?
- Hak asasi manusia yang perlu dijunjung tinggi?
- Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
- Kesetaraan hak dan peluang bagi semua warga negara disebut?
- Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
- Norma yang menjamin kebebasan berserikat disebut?
- Larangan diskriminasi berdasarkan jenis kelamin disebut?
- Norma agama yang menjadi pedoman hidup?
- Norma yang melarang korupsi dan penyalahgunaan kekuasaan
20 Clues: Norma agama yang menjadi pedoman hidup? • Norma dalam mengelola konflik secara damai? • Hak asasi manusia yang perlu dijunjung tinggi? • Tanggung jawab menjaga kelestarian lingkungan? • Sikap saling menghargai dalam keberagaman budaya • Norma etika dalam penggunaan teknologi informasi? • Norma yang menjamin kebebasan berserikat disebut? • ...
ADSI-Jaider Camilo Benavides Villamil 2022-05-05
Across
- keyword to make the content of the page in html
- javascript cross platform library
- programming language for graphic design
- object oriented programming language
- Set of basic pc programs
- They are the physicals parts of a pc
- term used to call an object by its id
- keyword to make an action when the mouse press
- term given to the cyber attack that denies access to the legitimate user
- keyword to make titles in html
Down
- term used for the science that studies online safety
- software package used by mysql
- Action to develop an application or web page
- keyword to hide a content
- keyword to show a content
- conversion of data to a graphic section
- keyword to make line breaks in html
- abbreviation for technology that is being developed
- programming language for web development
- database management system
- keyword to develop functions in html
21 Clues: Set of basic pc programs • keyword to hide a content • keyword to show a content • database management system • software package used by mysql • keyword to make titles in html • javascript cross platform library • keyword to make line breaks in html • object oriented programming language • They are the physicals parts of a pc • keyword to develop functions in html • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
Administrative Principles 2023-01-17
12 Clues: Equity • security • personnel • commanding • discipline • initiative • activities • contemporary • subordination • centralization • Responsibility • Individual Interest General Interest
Stay-at-home_IT-Security 2016-05-18
Across
- Programm, das Dritten erlaubt einen PC fernzusteuern.
- Programme, die im Hintergrund laufen und Viren aufspüren.
- Missbräuchliche Verwendung personenbezogener Daten
- Erfolgt durch Passwort, PIN oder Fingerabdruck
- Das sind kleine Textdateien, die Informationen über besuchte Webseiten beinhalten.
- Datensicherung
- Sollen mindestens 8 Buchstaben,Zahlen und Sonderzeichen enthalten
- Ausspionieren von vertraulichen Informationen durch Freundlichkeit, Hilfsbereitschaft, Autoritätshörigkeit...
- Informationsbeschaffung durch Beobachtung bei der Eingabe von Daten wie PINs oder Passwörter.
Down
- Versteckt Viren im Betriebssystem, dass sie von Antivirenprogrammen nicht entdeckt werden.
- E-Mail-Anhänge
- Zur Authentifizierung des Benutzers
- Das sind Programme, die dem Benutzer Werbung zeigen und weitere Software installieren.
- Programme, die Tastatureingaben mitprotokollieren, so gelangen Hacker an Passwörter.
- Automatisierte Computerprogramme für den Versand von Spam- oder Phishingmails
- Kartenlesegerät wird bei Geldautomaten montiert.
- Entwendung von Daten, die unachtsam weggeworfen wurden.
- Der Versuch, über gefälschte Webseiten und E-Mails an persönliche Daten zu gelangen.
18 Clues: E-Mail-Anhänge • Datensicherung • Zur Authentifizierung des Benutzers • Erfolgt durch Passwort, PIN oder Fingerabdruck • Kartenlesegerät wird bei Geldautomaten montiert. • Missbräuchliche Verwendung personenbezogener Daten • Programm, das Dritten erlaubt einen PC fernzusteuern. • Entwendung von Daten, die unachtsam weggeworfen wurden. • ...
Security Operations Block 2 2023-03-30
Across
- ALCs 6 and 7 are assigned to material in "______" form that cannot be physically inventoried but must be electronically inventoried by KMI certified components
- refers to measures and controls taken to deny unauthorized persons information derived from information systems of the Unite States Government.
- all corners and openings must be sealed using "___-_____" tamper evident tape or serialized tamper seals
- automated inventory system providing all base retail activities with supply and property accounting
- briefs personnel requiring cryptographic access at temporary duty (TDY) locations before they leave their home station (or upon arrival at TDY location if there is a time constraint)
- Send requests for disposition instructions action to the _______
- The STE is releasable to Canada, United Kingdom, Australia, and New Zealand
Down
- appoints a qualified KOAM and at least one alternate KOAM for each COMSEC account
- A cryptoperiod is the length of time each individual key setting/segment/page/table is authorized for use.
- zeroize or remove the associated ECC for all terminals during this process
- is the transfer (to another account or return to a distribution agency) or destruction of COMSEC material
- Applies to personnel who have their security clearance eligibility revoked, have their special access denied, or are removed for cause
- ALCs 1, 2, and 4 are assigned to material that must be "______" inventoried by the KOAM
- material that assists in securing telecommunications and is required in the production, operation, or maintenance of COMSEC systems and their components
- The destruction official and a "_____"ing official must sign destruction reports, subject to the following rules
- add accountable COMSEC material to an inventory, block the entry up to (but not including) the day/shift the item will be added using a color pen/marker as designated in the KOAM's SOP
- must be an officer, warrant officer, or noncommissioned officer E-6 or higher or a civilian General Schedule (GS)-7 or higher
- Individual who manages the COMSEC resources of an organization.
18 Clues: Individual who manages the COMSEC resources of an organization. • Send requests for disposition instructions action to the _______ • zeroize or remove the associated ECC for all terminals during this process • The STE is releasable to Canada, United Kingdom, Australia, and New Zealand • ...
Security Awareness Crossword Puzzle 2021-09-15
Across
- when a person tags along with another person who is authorized to gain entry into restricted areas.
- The process of taking plain text and scrambling it into an unreadable format.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- The "I" in the CIA Triad. Protection from unauthorized changes.
- The process or action of verifying the identity of a user or process.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A flaw or weakness in a computer system that could be exploited to violate the systems security.
Down
- Facebook, Twitter, Instagram, etc. (two words)
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The address of a webpage.
- The "C" in the CIA Triad. Protection of information from unauthorized access.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- The "A" in the CIA Triad. It ensures authorized users have access.
- A sequence of words or text used to control access to a computer; similar to a password.
- the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.
18 Clues: The address of a webpage. • Facebook, Twitter, Instagram, etc. (two words) • The "I" in the CIA Triad. Protection from unauthorized changes. • The "A" in the CIA Triad. It ensures authorized users have access. • The process or action of verifying the identity of a user or process. • The "C" in the CIA Triad. Protection of information from unauthorized access. • ...
data security and integrity 2025-10-07
Across
- check – method to check data has been transferred correctly even or odd
- software that seeks to damage
- method used to ensure entered data is reasonable and meets certain input criteria.
- software that detects and removes spyware programs installed
- digit additional digit appended to a number to check if entered data is error free.
- Reverse process of decryption
- the accuracy, completeness and consistency of data.
- a way of proving somebody or something is who or what they claim to be.
- legitimate-looking emails designed to trick a recipient
- method used to calculate a check digit based on modulus division by 11.
Down
- software or hardware that is between a computer and externalnetwork that
- the privacy of personal information,
- verification method used to check if data transferred has been altered
- illegal access to a computer system without the owner’s permission.
- method used to ensure data is correct by using double entry or visual checks.
- use of unique human characteristics to identify a user
- methods taken to prevent unauthorised access to data
- redirecting a user to a fake website in order to illegally obtain personal data
18 Clues: software that seeks to damage • Reverse process of decryption • the privacy of personal information, • the accuracy, completeness and consistency of data. • methods taken to prevent unauthorised access to data • use of unique human characteristics to identify a user • legitimate-looking emails designed to trick a recipient • ...
online security 2022-10-25
8 Clues: open to attack • In an accurate way • Weakened or damaged • Based on fraud or deceit • A very fast rate of change • sexually transmitted diseases • To steal, usually small amounts • According to what is claimed or believed
Ciber Security 2020-08-20
Across
- son subrepticios que trabajan activamente en contra de la persona atacada.
- evita el acceso no autorizado a una red privada.
- es un programa informático que detecta y elimina virus otros programas perjudiciales.
- tiene como objetivo obtener información de cuentas privadas, especialmente para acceder a sus cuentas bancarias.
Down
- contiene información que no es cierta.
- es el correo no solicitado que recibe una persona.
- son programas informáticos que alteran el funcionamiento del computador.
- es un software que saca información de tu computador sin tu consentimiento.
8 Clues: contiene información que no es cierta. • evita el acceso no autorizado a una red privada. • es el correo no solicitado que recibe una persona. • son programas informáticos que alteran el funcionamiento del computador. • son subrepticios que trabajan activamente en contra de la persona atacada. • ...
Security Guide 2023-07-19
Across
- a container filled with explosive, incendiary material, smoke, gas, or other destructive substance, designed to explode on impact
- a person or thing likely to cause damage or danger
- the action of evacuating a person or a place
- the practice of obtaining something, especially money, through force or threats
Down
- a person employed for wages or salary
- a person who uses a gun either regularly or on a particular occasion
- put or keep out of sight; conceal from the view or notice of other
- the civil force of a national or local government, responsible for the prevention and detection of crime and the maintenance of public order
8 Clues: a person employed for wages or salary • the action of evacuating a person or a place • a person or thing likely to cause damage or danger • put or keep out of sight; conceal from the view or notice of other • a person who uses a gun either regularly or on a particular occasion • the practice of obtaining something, especially money, through force or threats • ...
Network Security 2024-01-30
Across
- A logic bomb lies dormant until a specific piece of program code is activated.
- Usually attached to a document or spreadsheet and uses the macro functions or scripting language of the application.
- Applies to program files and gives the user the right to run the program.
- Malicious Programs which replicate themselves from system to system without the use of a host file.
Down
- A computer program that is self replicating and can affect a computer.
- User is prohibited from accessing the file in any way.
- Assigned to each user to ensure that they may only access particular files or records according to their information needs.
- Should be made so that lost data can be recovered easily.
8 Clues: User is prohibited from accessing the file in any way. • Should be made so that lost data can be recovered easily. • A computer program that is self replicating and can affect a computer. • Applies to program files and gives the user the right to run the program. • A logic bomb lies dormant until a specific piece of program code is activated. • ...
Food Security 2024-03-19
Across
- Having enough food that meets nutritional needs for good health.
- Term referring to the state or condition of obtaining the bare necessities for survival, such as food, shelter, and clothing.
- Term referring to the food, nourishment, and resources essential for maintaining life and well-being.
- The act of providing essential nutrients for growth and health through the consumption of food.
Down
- The ability to meet current needs without compromising the ability of future generations to meet their own needs.
- The feeling of fullness and satisfaction after eating, indicating that one's hunger has been sufficiently satisfied.
- The ability of individuals and communities to bounce back and adapt to challenges or disruptions.
- The quality and availability of food that meets the dietary needs of individuals and communities, ensuring they have access to sufficient nutrients.
8 Clues: Having enough food that meets nutritional needs for good health. • The act of providing essential nutrients for growth and health through the consumption of food. • The ability of individuals and communities to bounce back and adapt to challenges or disruptions. • ...
FOOD SECURITY 2024-08-14
8 Clues: A serving size of food • Purchasing more than needed • Food remaining after a meal • End of a product's shelf life • Where items are kept for future use • Excessive use or intake of resources • Giving something for free to help others • Organizing tasks and schedules ahead of time
Information Security 2024-09-05
Food Security 2024-12-18
Across
- A plant grown for food, such as wheat or maize (4 letters)
- A period when food is scarce, leading to widespread hunger (6 letters)
- A type of farming that grows crops without chemicals (7 letters)
- The opposite of surplus, often a sign of food insecurity (7 letters)
Down
- A food production system without soil (9 letters)
- Yellow tropical fruit often eaten in slices
- Staple grain consumed globally, especially in Asia (4 letters)
- This nutrient is vital for plant growth, often added as fertilizer (8 letters)
8 Clues: Yellow tropical fruit often eaten in slices • A food production system without soil (9 letters) • A plant grown for food, such as wheat or maize (4 letters) • Staple grain consumed globally, especially in Asia (4 letters) • A type of farming that grows crops without chemicals (7 letters) • The opposite of surplus, often a sign of food insecurity (7 letters) • ...
Food security 2024-11-28
Across
- we wash our hands with this to stay clean and safe
- This keeps food from getting too warm and helps it stay fresh
- you should always wash this before touching food
- Helping others who don't have enough food
Down
- This is the thing you use to kill germs on your hands and surfaces
- This can be grown at home, like fruits, vegetables
- you should always do this before eating or cooking
- Food that gives you energy and keeps you healthy
8 Clues: Helping others who don't have enough food • you should always wash this before touching food • Food that gives you energy and keeps you healthy • This can be grown at home, like fruits, vegetables • we wash our hands with this to stay clean and safe • you should always do this before eating or cooking • This keeps food from getting too warm and helps it stay fresh • ...
Nutrition security 2024-07-17
Across
- The nutrients you use in the largest amount
- Vitamin found in citrus fruits, important for immune function
- Condition caused by inadequate dietary intake, leading to weakness and poor health
- the state of having reliable access to a sufficient quantity of affordable, nutritious food
- Eating a balanced diet to maintain health and prevent disease
Down
- Lack of sufficient food leading to hunger and malnutrition
- Government program aimed at providing food assistance to low income individuals
- Essential nutrient needed for strong bones and teeth
8 Clues: The nutrients you use in the largest amount • Essential nutrient needed for strong bones and teeth • Lack of sufficient food leading to hunger and malnutrition • Vitamin found in citrus fruits, important for immune function • Eating a balanced diet to maintain health and prevent disease • ...
Nutrition security 2024-07-17
Across
- Vitamin found in citrus fruits, important for immune function
- The state of having reliable access to a sufficient quantity of affordable, nutritious food
- Eating a balnaced diet to maintain health and prevent disease
Down
- The nutrients you use in the largest amount
- Lack of sufficient food leading to hunger and malnutrition
- Lack of this can lead to anemia
- essential nutrient needed for strong bones and teeth
- food produced without synthetic chemicals
8 Clues: Lack of this can lead to anemia • food produced without synthetic chemicals • The nutrients you use in the largest amount • essential nutrient needed for strong bones and teeth • Lack of sufficient food leading to hunger and malnutrition • Vitamin found in citrus fruits, important for immune function • Eating a balnaced diet to maintain health and prevent disease • ...
Food security 2024-12-17
Across
- A vegetable that can be boiled, smashed and make chips
- Name of this food is also color name
- A vegetable which builds immunity
Down
- A green food which keeps your body hydrated
- A vegetable which makes you cry
- Food that keeps a doctor away
- A vegetable that can be enjoyed by rabbits
- Food that is a source of vitamin C
8 Clues: Food that keeps a doctor away • A vegetable which makes you cry • A vegetable which builds immunity • Food that is a source of vitamin C • Name of this food is also color name • A vegetable that can be enjoyed by rabbits • A green food which keeps your body hydrated • A vegetable that can be boiled, smashed and make chips
Learning Through Gaming 2014-09-15
Across
- HIPPA applies to all _____ organizations
- Does not require written patient permission
- Type of law
- How many years could a person face for releasing protected health information
- Must furnish the patient a privacy ______
- Steps organizations take to protect electronic information
- Health records can only be requested by the _____
Down
- You may refuse to release information that may be ______
- All employees that handle protected health information must go through _____
- After a patient dies who gets control of the patient information
- Computer Security
- HIPPA regulations are managed by the ______
- Health records cannot be requested by the _____
- Health records include the following format paper, electronic, and _____
- Health Insurance Portability and Accountability Act
15 Clues: Type of law • Computer Security • HIPPA applies to all _____ organizations • Must furnish the patient a privacy ______ • HIPPA regulations are managed by the ______ • Does not require written patient permission • Health records cannot be requested by the _____ • Health records can only be requested by the _____ • Health Insurance Portability and Accountability Act • ...
SMUN' 24 UN Trivia 2024-10-26
Across
- UN specialized agency providing food assistance
- The UN Headquarters are in this city
- Name of the UN's Paris-based cultural organization
- UN's agency for child welfare
- Last and best MUN Conference of 2024 in Bangladesh
- Official title for the UN’s top diplomat
- Organization replaced by the UN in 1945
Down
- number of permanent members in the Security Council
- agency dealing with labor rights and standards
- UN agency focusing on international health issues
- UN's organization that works for gender equality
- The founding document of UN
- UN body responsible for maintaining international peace and security
- Document that outlines fundamental human rights, adopted in 1948
- second most common language in UN after English
15 Clues: The founding document of UN • UN's agency for child welfare • Organization replaced by the UN in 1945 • The UN Headquarters are in this city • agency dealing with labor rights and standards • second most common language in UN after English • Official title for the UN’s top diplomat • Last and best MUN Conference of 2024 in Bangladesh • ...
Robotics 2017-02-09
Across
- You need to do this to make your robot carry out a command?
- A film that includes robots?
- A repetitive task carried out by robots?
- A high precision task carried out by a robot?
- A dishwasher is this type of machinery?
- The Cyber men come from this T.V series?
Down
- A sensor to help your robot to move?
- A car company that makes robots?
- Your robot needs this to navigate?
- A film that included a small boy as a robot?
- The name given to a metal when it is mixed with another?
- A metal used to make robots?
12 Clues: A film that includes robots? • A metal used to make robots? • A car company that makes robots? • Your robot needs this to navigate? • A sensor to help your robot to move? • A dishwasher is this type of machinery? • A repetitive task carried out by robots? • The Cyber men come from this T.V series? • A film that included a small boy as a robot? • ...
Hope crossword 2021-12-09
Across
- the ability to cover a distance in a short time
- a brain injury that occurs when blows to the head causes the brain to crash into the bones of the skull
- type of stretching the military use
- amount of force put in periods without tiring
- the greatest component of health
- the usage of eye, hand and foot movements
Down
- a type of stretching with movements
- a behavior that involves firm verbal statements
- bullying with technology
- the test of cardio respiratory endurance
- the first letter of SMART
- doing this before exercise prevents injury
12 Clues: bullying with technology • the first letter of SMART • the greatest component of health • a type of stretching with movements • type of stretching the military use • the test of cardio respiratory endurance • the usage of eye, hand and foot movements • doing this before exercise prevents injury • amount of force put in periods without tiring • ...
