cyber security Crossword Puzzles
Vilin hullu hullumpi crossword puzzle (mahdoton!!1) (välit viivoiksi) 2026-02-27
21 Clues: tulva • sykloni • rasismi • hallitus • syrjintä • taifuuni • tasavalta • lumivyöry • oikeuksia • demokratia • yksinäisyys • presidentti • poliitikkoja • sosiaaliturva • ilmastonmuutos • kansanedustajat • noudattaa-lakia • kunnioittaa-muita • tulivuorenpurkaus • ilmaston-lämpeneminen • keittää-taitojaan-ja-tietojaan
Health 2025-04-11
7 Clues: bullying mind bullying • A person who gets bullied • Bullying online bullying • A person who watches people get bullied • bullying When someone is leaving bruises on you • bullying when your saying stuff but it bullying • A person who makes others feel bad to make them feel good
kemdig 2026-01-20
Across
- Perilaku untuk mempermalukan seseorang secara online adalah ...-bullying.
- Penipuan untuk mendapatkan informasi sensitif.
- Berhati-hati saat membuat akun dan posting di media ....
- Segala aktivitas online akan tercatat dalam jejak ....
Down
- Perbuatan tidak jujur untuk mengakali.
- Jangan posting data ... secara online.
- Jangan bagikan kata ... dengan siapa pun.
7 Clues: Perbuatan tidak jujur untuk mengakali. • Jangan posting data ... secara online. • Jangan bagikan kata ... dengan siapa pun. • Penipuan untuk mendapatkan informasi sensitif. • Segala aktivitas online akan tercatat dalam jejak .... • Berhati-hati saat membuat akun dan posting di media .... • Perilaku untuk mempermalukan seseorang secara online adalah ...-bullying.
spelling words unit 11 2025-02-13
Brock Crossword 2025-09-09
Across
- small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- a type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions
- an electro-mechanical data storage device that stores and retrieves digital data
- a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing.
- an application for accessing websites.
- a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,
- a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
Down
- the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- a computing device designed to fit on top of a typical office desk.
- a a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- the ability to responsibly use digital technologies,and the internet to find,, use, share, and create i google
- Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- a mobile device that combines traditional mobile technology with more advanced computing abilities.
- technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
- a quotation from or reference to a book, paper, or author,
- the practice of pretending on social media to be someone different, in order to trick or attract another person
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
25 Clues: an application for accessing websites. • a quotation from or reference to a book, paper, or author, • a computing device designed to fit on top of a typical office desk. • an electro-mechanical data storage device that stores and retrieves digital data • a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage • ...
Tech Words-Mitchel Giggey 2019-11-06
Across
- /the programs and other operating information used by a computer.
- /is any malware which misleads users of its true intent.
- /In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Down
- /the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- /a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
- /comprises of malicious code that is distributed in email messages, and this code can be activated when a user opens an email attachment, clicks on a link in an email message, or interacts in a totally different way with the infected email message.
- / type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected"
7 Clues: /is any malware which misleads users of its true intent. • /the programs and other operating information used by a computer. • /the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. • ...
Instagram 2018-06-04
Across
- Auf Instagram hat jeder seinen eigenen ........
- Was kann man auf Instagram machen Auser Bilder, Videos und Storys?
- In der Story kann man ........ machen.
- Wie nennt man "Hass Kommentare"?
Down
- Was sollte man ändern wenn sein account gehackt wurde?
- Welche person hat die meisten Follower auf Instagram?
- Was ist das Symbol von Instagram?
- Ab wann darf man die App verwenden?
- Welche Social-Media Plattform hat Instagram gekauft?
- Wo kann man Bilder posten die nach 24h wieder verschwinden?
10 Clues: Wie nennt man "Hass Kommentare"? • Was ist das Symbol von Instagram? • Ab wann darf man die App verwenden? • In der Story kann man ........ machen. • Auf Instagram hat jeder seinen eigenen ........ • Welche Social-Media Plattform hat Instagram gekauft? • Welche person hat die meisten Follower auf Instagram? • Was sollte man ändern wenn sein account gehackt wurde? • ...
Digital Realities 2023-05-09
Across
- Meaning like too complex not needing special
- AR the needs expensive equipment
- Taking notes or to add comments, an image etc
- Reality immersive technology that includes physical and virtual worlds
- Using aspects of gaming to encourage in an activity
- A virtual model of a users body
Down
- Meaning like interested and fascinated
- A material that transfers information
- An interconnected system system, network, or environment
- Sickness getting nausea and discomfort from VR or AR
10 Clues: A virtual model of a users body • AR the needs expensive equipment • A material that transfers information • Meaning like interested and fascinated • Meaning like too complex not needing special • Taking notes or to add comments, an image etc • Using aspects of gaming to encourage in an activity • Sickness getting nausea and discomfort from VR or AR • ...
bullying crossword 2014-06-05
Across
- when its done face to face
- is a crime
- : use of words that upset the victim
- a person who is watching but doesnt do anything about it
- making someone feel as they have to do what you tell them to do
- groups that hep you with bullying
- Someone not telling the truth
Down
- when its done through social media
- when things are said that arnt true
- when you leave someone out of the group
- threatening someone or making them scared enough to make them do what you want
- attacking the victim and contact with the victim
- the person who is getting bullied
- the person who is being mean to the victim
- hitting or hurting someone
- when you call someone names.
16 Clues: is a crime • when its done face to face • hitting or hurting someone • when you call someone names. • Someone not telling the truth • the person who is getting bullied • groups that hep you with bullying • when its done through social media • when things are said that arnt true • : use of words that upset the victim • when you leave someone out of the group • ...
RCHR TIMES 2023-01-21
Across
- Project in which one group met a politician
- Tum Hi Ho...
- Medium-scale Club Service project
- First Sports project
- Mascot for the 20th We Are The World
- A word describing our love for RCHR
- Something that the Cyber Media had in store for us after Exploring India
- An obstacle in the way of FYJCs when preparing for the 20th WATW
Down
- First word for the Weekly Wordle
- PC: Album: 37 Track 7:
- Title of the first REPLAY
- Community Service x Task Force project
- This country won first place for Fashion Show at FIESTA
- That one moment at EI that changed everything for us
- First PR & Marketing project
- First project with the 37th General Body
16 Clues: Tum Hi Ho... • First Sports project • PC: Album: 37 Track 7: • Title of the first REPLAY • First PR & Marketing project • First word for the Weekly Wordle • Medium-scale Club Service project • A word describing our love for RCHR • Mascot for the 20th We Are The World • Community Service x Task Force project • First project with the 37th General Body • ...
Black Friday QPP Crossword 2016-11-25
Across
- Health Record system required
- 90 days of 2017 data
- One who diagnoses and treats patients
- 4____for 2017
- Certified Registered Nurse __________
- Higher level
- _________ Activities
- Leftovers for lunch
- 90 _______ days
- A sought-after category of Black Friday sale items
Down
- Medicare Access and CHIP Reauthorization Act of 2015
- Minimum amount of 2017 data
- 2017 is this kind of year
- One, six, or 15 of these measures
- Black Friday shoppers' goals
- Information given to you about your work to help you improve
- All those having a vested interest in a program
- _________ Monday holiday sales
- Most Black Friday Shoppers are in stores long before this
- Particularly good or worthy
- One who is designated to profit in a situation
- Final _________
- Organs affected by ESRD
- Resource online for free training and information
- May be applied for if a category is a hardship
- Replaces the value-based modifier
26 Clues: Higher level • 4____for 2017 • Final _________ • 90 _______ days • Leftovers for lunch • 90 days of 2017 data • _________ Activities • Organs affected by ESRD • 2017 is this kind of year • Minimum amount of 2017 data • Particularly good or worthy • Black Friday shoppers' goals • Health Record system required • _________ Monday holiday sales • One, six, or 15 of these measures • ...
Burlington English Module 7 Review 2023-11-01
Across
- When someone lies to benefit themselves financially
- A file attached to a email like a picture or document
- to show, able to see
- Something that you can not stop from happening
- To check to make sure something is correct
- To not allow, ban, reject
- to not allow, to forbid
- Someone or something that might be dangerous
- When something or someone does not look or feel right
- Many
- Something that can spread and replicate itself and cause harm
- Rules, advice that should be followed
Down
- To take something that is not yours without permission
- Not be able to wait for a long time
- to watch closely
- A person who had a crime committed against them
- Related to computers
- show, visible or seem, look like
- to take out something that is not acceptable
- Something that makes someone else feel uncomfortable, rude
20 Clues: Many • to watch closely • to show, able to see • Related to computers • to not allow, to forbid • To not allow, ban, reject • show, visible or seem, look like • Not be able to wait for a long time • Rules, advice that should be followed • To check to make sure something is correct • Someone or something that might be dangerous • to take out something that is not acceptable • ...
TTS PKK 2024-11-06
Across
- Produk yang ada dalam bentuk virtual atau digital
- Proses memahami apa yang konsumen rasakan dan butuhkan
- Barang yang tak mudah habis
- Metode untuk memecahkan masalah dalam waktu singkat
- Proses untuk mengenalkan produk ke distributor atau pengecer
- Dimensi yang memastikan prototipe sesuai dengan produk
- Proses desain untuk mendefinisikan kebutuhan konsumen
- Tahap siklus hidup dimana penjualan produk mnecapai puncak sebelum melambat
- Tindakan untuk memperluas pasar dengan masuk ke daerah baru
- Model dari suatu produk barang atau jasa yang akan dibuat
- Orang yang merancang dan membuat prototipe produk
Down
- Konsumen dengan pengetahuan tentang produk
- Dimensi yang menggambarkan prototipe melalui visual atau tulisan
- Proses pembuatan prototipe produk
- Nama atau simbol yang digunakan untuk membedakan produk
- Dimensi yang menilai perkiraan masa hidup produk
- Yang menjadi pemimpin dalam proses design sprint
- Mewujudkan
- Proses berfikir kreatif untuk menghasilkan berbagai solusi unik
- Proses hidup suatu produk dalam bisnis
20 Clues: Mewujudkan • Barang yang tak mudah habis • Proses pembuatan prototipe produk • Proses hidup suatu produk dalam bisnis • Konsumen dengan pengetahuan tentang produk • Dimensi yang menilai perkiraan masa hidup produk • Yang menjadi pemimpin dalam proses design sprint • Produk yang ada dalam bentuk virtual atau digital • Orang yang merancang dan membuat prototipe produk • ...
PERUNDUNGAN / BULLYING 2024-02-28
Across
- BANGGA MENGIRIMKAN FOTO TEMANNYA YANG SEDANG PIPIS,DAN DIJADIKAN BAHAN TERTAWAAN TEMAN, HAL INI MERUPAKAN TINDAKAN BULLYING APA
- MENGAKUI KESALAHAN
- DAPAT MENYELESAIKAN TUGAS SENDIRI DAN TIDAK BERGANTUNG PADA ORANG LAIN
- MEMUJI TEMAN YANG CANTIK APAKAH ITU BENTUK BULLYING?
- CONTOH BULLYING SOSIAL
- AKIBAT SERING DI BULLY
- SEBAGAI SESAMA SISWA SEBAIKNYA KITA MEMILIKI SIKAP SALING...
- MEMELUK TEMAN DENGAN KETAT MEMBUAT TEMAN AGAK KESAKITAN
- PENCEMARAN NAMA BAIK
- MANFAAT MEMBULLY TEMAN BAGI PEMBULLY
Down
- SALING MENDORONG DAN MEMELUK MENGGENDONG
- MENDORONG TEMAN AGAR BERANI BERBICARA ATAU TAMPIL ADALAH BENTUK
- PERILAKU TIDAK SOPAN SECARA VERBAL
- ORANG YANG SUKA MEMBULLY,BAHAGIA MELIHAT TEMANNYA KETAKUTAN DALAM PSIKOLOGI DIKELOMPOKKAN SEBAGAI ORANG YANG...
- KARENA SERING DI SEPELEKAN DAN DIHINA FISIKNYA ORANG AKAN ...
- PENYEBAR BERITA PALSU
- MENJAMBAK RAMBUT DAN MENDORONG DENGAN KASAR
- ADA BERMACAM BENTUK BULLYING SECARA FISIK ANTARA LAIN
- MENGHINA DAN MEMPERMALUKAN ORANG /ATAU MENTERTAWAKAN TERMASUK BULLYINGAPA
- BULLYING DIKELOMPOKKAN BERAPA MACAM?
20 Clues: MENGAKUI KESALAHAN • PENCEMARAN NAMA BAIK • PENYEBAR BERITA PALSU • CONTOH BULLYING SOSIAL • AKIBAT SERING DI BULLY • PERILAKU TIDAK SOPAN SECARA VERBAL • BULLYING DIKELOMPOKKAN BERAPA MACAM? • MANFAAT MEMBULLY TEMAN BAGI PEMBULLY • SALING MENDORONG DAN MEMELUK MENGGENDONG • MENJAMBAK RAMBUT DAN MENDORONG DENGAN KASAR • MEMUJI TEMAN YANG CANTIK APAKAH ITU BENTUK BULLYING? • ...
Vocab Set 6 2022-12-01
Across
- He shouldn't _________ when he only won the match on a technicality
- Allowing light to pass through
- The wall presented as a___________ to the White Walkers.
- The _____________ driver didn't have what it took to finish the race.
- The ____________ senior whined about having senioritis.
- To diminish or lessen the seriousness of an offense
Down
- confusing
- fertile
- genuine
- natural disaster
- Title of a movie Mrs. Cohen loves starring David Bowie.
- he cut his foot on the ___________ (n.)
- The belief that life is meaningless
- Their _________ meeting at the grocery store became their meet cute.
- She __________ed the grape with the prongs of her fork.
- She _________ from the norm when she shaved her head.
- he _________ed at the "sold out" button when he missed the cyber Monday Sale.
- toxic relationship
- The list of _____________needed in the rough draft was long.
- boost morale
20 Clues: fertile • genuine • confusing • boost morale • natural disaster • toxic relationship • Allowing light to pass through • The belief that life is meaningless • he cut his foot on the ___________ (n.) • To diminish or lessen the seriousness of an offense • She _________ from the norm when she shaved her head. • Title of a movie Mrs. Cohen loves starring David Bowie. • ...
Eagle 101 Crossword 2025-12-17
Across
- Something that has to do with harming yourself
- A very influential person
- What helps keep are city safe
- A tragic that can happen at schools (involves guns)
- A type of drug that has nicotine
- Refuse Explain Avoid Leave
- Something a lot of 6th graders deal with
- A thing that says it has so much flavors and contains nicotine
- A skill that we use to talk with eachother
Down
- How to control one of are emotions
- What beer medicine and those gummy's grandma eats is
- A cigarette that is powered threw battery's
- What it is to work together
- A movie we watched that is about emotions
- Something that is like bullying but on the internet
- everyone has these and they control your mood
- A type of drug
- A type of thing that is used for smoking
- used in vapes and in tobacco
- Drug Abuse Resistance Education
20 Clues: A type of drug • A very influential person • Refuse Explain Avoid Leave • What it is to work together • used in vapes and in tobacco • What helps keep are city safe • Drug Abuse Resistance Education • A type of drug that has nicotine • How to control one of are emotions • A type of thing that is used for smoking • Something a lot of 6th graders deal with • ...
Eagle 101 2026-03-03
Across
- your sense of self
- a program about DEFINE,ASSES,RESPOND,EVALUATE
- a strong feeling of happiness
- when you feel mad or frustrated
- the two things we watched indie out and dog gone trouble
- a movie about emotions
- to have a strong voice and being able to speak up
- control to control your own actions or being able to tell yourself yes or no
- to get ready for a test
- bullying to bully someone online
- people or someone you make a strong connection with
- to feel down or even cry
Down
- to get red faced or nervous
- to feel nothing or not wanting to do the thing your doing
- work working with people to get the job done
- how you physically feel in mind
- when you worry too much about the future
- johnson a guy who does motivational speeches
- to be scared or afraid
- for something to be risky
20 Clues: your sense of self • a movie about emotions • to be scared or afraid • to get ready for a test • to feel down or even cry • for something to be risky • to get red faced or nervous • a strong feeling of happiness • how you physically feel in mind • when you feel mad or frustrated • bullying to bully someone online • when you worry too much about the future • ...
ACCESS CONTROL AND SECURITY 2024-09-05
Across
- is a connectionless transport protocol.
- is a type of message authentication code that is acquired by executing a cryptographic hash function on the data that is to be authenticated and a secret shared key.
- protocol To establish the validity of identification data, it is necessary to rely on an AP.
- Layer Security is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet.
- verifies that the data has not been forged or tampered with.
Down
- analyzes what access should be provided to AR based on the AR’s identity, permission level, attempted request, and an organization’s established access policy.
- is used to send and distribute outgoing emails.
- Layer provides security to the data that is transferred between web browser and server.
- Protocol is used to establish sessions.
- layer transfers services from the network layer to the application layer and breaks down data into data frames for error checking at the network segment level.
10 Clues: is a connectionless transport protocol. • Protocol is used to establish sessions. • is used to send and distribute outgoing emails. • verifies that the data has not been forged or tampered with. • Layer provides security to the data that is transferred between web browser and server. • ...
Bullying 2012-11-13
Across
- / If you get bullied you should tell an
- / when the bully hits or kicks the victim
- / the type of bullying that happend over the internet
- / The first step to making a bully stop is to ___ them
Down
- / when the bully tells them mean stuff
- / the person getting bullied
- / the person doing the mean act
- / where can bullying happen
8 Clues: / where can bullying happen • / the person getting bullied • / the person doing the mean act • / when the bully tells them mean stuff • / If you get bullied you should tell an • / when the bully hits or kicks the victim • / the type of bullying that happend over the internet • / The first step to making a bully stop is to ___ them
FITD: 2013-05-14
Across
- a websites that provides tips to stop cyber issues
- a portable hand held electronic
- where you plug in flash drive
- short-term memory
Down
- a service that lets people's or group's website be accessed online
- where you plug in headphones
- a program for the retrieval of data from a database or network
- the brain of the computer
8 Clues: short-term memory • the brain of the computer • where you plug in headphones • where you plug in flash drive • a portable hand held electronic • a websites that provides tips to stop cyber issues • a program for the retrieval of data from a database or network • a service that lets people's or group's website be accessed online
cybersecurity 2021-02-12
Across
- make sure you password doesn't contain ________ information
- it is malware which Uses vulnerabilities to move into your machine.
- it should be 8 or more letters
- never tell your _______ passwords
Down
- what is the shortened word for malicious software
- cyber = _______
- you password needs to be hard to _____
- it is scams which are mostly found in emails or fake log in pages
8 Clues: cyber = _______ • it should be 8 or more letters • never tell your _______ passwords • you password needs to be hard to _____ • what is the shortened word for malicious software • make sure you password doesn't contain ________ information • it is scams which are mostly found in emails or fake log in pages • ...
Depot 2024-07-04
9 Clues: your fur babies • your favorite color • your primary insurance • your case managers name • Another word for apartment • this person cleans your home • What you use to color your hair • security guard that works the morning • Security guard during that works the evening
Travel 2023-04-04
13 Clues: toll • padi • pagas • rabav • kandik • kohver • aksessuaar • turvalisus • ürgne loodus • reisiterminal • registreerimine • pass pardapääse • baggage käsipagas
unidad 1.1 vamos de traje part 2 2022-01-31
20 Clues: gate • screen • bustop • flight • arrival • arrival • suitcase • pasenger • swimsuit • passport • to travel • departure • to take a bus • baggage claim • boarding pass • tourist office • to take a taxi • to stay in a hotel • to pass through customs • to pass through security
G.W. Farewell Address Chunks 1-3 Vocabulary 2025-11-13
19 Clues: Peace • Safety • Weaken • Friendly • Passions • Building • Secretly • Come from • Reduction • Brotherly • Strengthen • Make bitter • Chief Executive • Names and Titles • Help bring about • Subtle but harmful • Firmly held belief(s) • Attempt to do something • not helpful towards success
Bullying 2026-01-21
Cyber safety- Keira 2016-06-07
Across
- something that you play with
- Something that tracks you down
- went you can get a app
- something that mess with your iPod or iPhone
Down
- Someone who is mean to you on the internet
- people could be mean using this
- A person who looks casually through Internet
- get destroy by a virus
- some times you need to be the
- People can send you mean thing
- Irrelevant or unsolicited messages sent over the internet
11 Clues: get destroy by a virus • went you can get a app • something that you play with • some times you need to be the • Something that tracks you down • People can send you mean thing • people could be mean using this • Someone who is mean to you on the internet • A person who looks casually through Internet • something that mess with your iPod or iPhone • ...
Cyber Safe Home 2024-05-02
Across
- The process of establishing the truth, accuracy, or validity of something
- The protection of personal data from those who should not have access to it
- Designed to detect and destroy computer viruses
- The total volume of cells, blocks, frames, packets, calls, messages, or other units of data carried over a circuit or network
- Practical work that needs to be done, as in gathering information
- A device which detects or measures a physical property and records, indicates, or otherwise responds to it.
Down
- A computer network security system that restricts internet traffic in to, out of, or within a private network
- The application of statistical analysis to biological data
- A patch, upgrade, or other modification to code that corrects security and/or functionality problems in software
- Observe and check the progress or quality of (something) over a period of time; keep under systematic review
- Broadcasting, computer networking, or other communication using radio signals, microwaves
11 Clues: Designed to detect and destroy computer viruses • The application of statistical analysis to biological data • Practical work that needs to be done, as in gathering information • The process of establishing the truth, accuracy, or validity of something • The protection of personal data from those who should not have access to it • ...
Module 5 Unit 1 System Security 2023-04-24
Across
- Minimum rights required to perform ones duties
- Data maintained in case of system failure
- Information maintained to better secure the host or network
- Protecting information from unauthorized parties
- Security mechanisms should be as basic as possible
- Authenticity of Information
Down
- The way to ensure User's understand security policies
- The amount of effort necessary for a successful attack
- Information is accessible
- Systems should fail in a secure manner
- Separation of _________
11 Clues: Separation of _________ • Information is accessible • Authenticity of Information • Systems should fail in a secure manner • Data maintained in case of system failure • Minimum rights required to perform ones duties • Protecting information from unauthorized parties • Security mechanisms should be as basic as possible • ...
EQUATE Cybersecurity - Email edition 2023-05-18
Across
- Network security barrier against unauthorized access.
- Deceptive emails aiming to extract personal data.
- Identity verification for authorized access.
- Deceptive act of assuming someone's identity.
- Unwanted bulk emails.
- Data security through secret code conversion.
Down
- Malicious assault on computer systems or networks.
- Malicious software demanding payment for data release.
- Protective software against malware and viruses.
- Deceptive technique involving voice calls for extracting sensitive data.
- Website or email address identifier.
11 Clues: Unwanted bulk emails. • Website or email address identifier. • Identity verification for authorized access. • Deceptive act of assuming someone's identity. • Data security through secret code conversion. • Protective software against malware and viruses. • Deceptive emails aiming to extract personal data. • Malicious assault on computer systems or networks. • ...
Responds & Report Security Risks 2023-11-13
Across
- IT or tech professionals who can fix security issues.
- Action to take when you suspect a security problem – like turning off the water in a leaky house.
- Potential threats or vulnerabilities that could harm digital systems.
- Staying watchful and alert to potential security threats.
Down
- Unauthorized access
- One of the aspects compromised by security risks, involves protecting sensitive information.
- A collective effort to create a safer digital environment by addressing potential risks.
7 Clues: Unauthorized access • IT or tech professionals who can fix security issues. • Staying watchful and alert to potential security threats. • Potential threats or vulnerabilities that could harm digital systems. • A collective effort to create a safer digital environment by addressing potential risks. • ...
IFF 2025-04-10
Across
- AML _________ Testing
- National _________ program
- ____ supervision
- FINRA’s premier annual innovation event
- Membership _____ program
- National _____ and financial crimes
- Occurs where a party enters a series of sell or buy orders, then executes a trade on the opposite side and cancels all, or most, previously placed orders.
Down
- FINRA learning and development system
- System to book flights/train/hotel
- Policies, procedures, and ______
- FINRA Values: collaboration, innovation, responsibility, ______
- Together we protect investors and ensure market ________
- Involves a pattern of entering multiple orders at various price levels on the buy or sell side of the markets. The layered orders may be entered with the intention of creating a false or misleading appearance of volume in the order book.
- Cyber and ________ Unit
- Left of
- Robert ________
- System to book cubicle/office
17 Clues: Left of • Robert ________ • ____ supervision • AML _________ Testing • Cyber and ________ Unit • Membership _____ program • National _________ program • System to book cubicle/office • Policies, procedures, and ______ • System to book flights/train/hotel • National _____ and financial crimes • FINRA learning and development system • FINRA’s premier annual innovation event • ...
Security crossword 2016-05-04
Across
- SSN is classified as
- SOW is classified as ____ type of data
- one of the requirements for getting a patent
- Business Continuity Management programme for Infosys
Down
- use email spoofing to collect client data
- Technique used to ensure electronic data interchange security
- embedded within programs provided officially by companies
- Dedicated group for Information Security related activities
8 Clues: SSN is classified as • SOW is classified as ____ type of data • use email spoofing to collect client data • one of the requirements for getting a patent • Business Continuity Management programme for Infosys • embedded within programs provided officially by companies • Dedicated group for Information Security related activities • ...
Internet Security 2015-10-11
Across
- /a way of online banking that keeps your bank details secure
- /allows criminals to get access to bank accounts, or other accounts like shopping, auction or gaming accounts.
- /is a kind of software that can be installed on a computer without approval from the computer's owner.
- /isthe misuse of online services such as e-mail, cellphones and social media websites, to harass or attack a person or a group.
- /a website such as facebook that allows instant communication between people and allows people to share pictures and details
Down
- /a phrase or combination of letters or numbers that protects online accounts or other online services
- /an attempt to gain sensitive information that would allow a criminal to gain something usually money
- /a service that allows pareents to filter the content their children can access on the internet
8 Clues: /a way of online banking that keeps your bank details secure • /a service that allows pareents to filter the content their children can access on the internet • /a phrase or combination of letters or numbers that protects online accounts or other online services • ...
Computer Security 2018-11-28
Across
- Fernando _____ : "Father of the password"
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- a printed or written letter or symbol.
- not subject to threat; certain to remain or continue safe and unharmed.
Down
- keep safe from harm or injury.
- a secret word or phrase that must be used to gain admission to something.
- restricts access to the full functionality or data of (a computer, mobile phone, file, etc.), especially by requiring a user to verify their identity with a passcode or other form of authentication.
- belonging to or for the use of one particular person or group of people only.
8 Clues: keep safe from harm or injury. • a printed or written letter or symbol. • Fernando _____ : "Father of the password" • not subject to threat; certain to remain or continue safe and unharmed. • a secret word or phrase that must be used to gain admission to something. • belonging to or for the use of one particular person or group of people only. • ...
Security Controls 2022-05-30
Across
- A type of security control that acts against in-person intrusion attempts
- The hardware and software components that protect a system against cyberattacks.
- The security controls that provide oversight of the information system.
- A control that acts to eliminate or reduce the likelihood that an attack can succeed
- a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
Down
- A type of security control that acts against in-person intrusion attempts
- A control acts to eliminate or reduce the impact of an intrusion event
- A control may not prevent or deter access, but it will identify and record any attempted or successful intrusion
- Security controls focused on the things done by people.
9 Clues: Security controls focused on the things done by people. • A control acts to eliminate or reduce the impact of an intrusion event • The security controls that provide oversight of the information system. • A type of security control that acts against in-person intrusion attempts • A type of security control that acts against in-person intrusion attempts • ...
Network security 2022-10-31
Across
- there are a lot of features of anti-malware software, including scanning your computer or emails for malware, and ............
- is a way of gaining sensitive information by influencing people
- is designed to find and stop malware from damaging a network and the device on it
Down
- is when crimsles send emails or texts to people claiming to be from a well-known business
- to protect something
- is installed on someone's device without their knowledge
- to block unauthorised access
- is when data is translated into a code which only someone with the correct key can text
8 Clues: to protect something • to block unauthorised access • is installed on someone's device without their knowledge • is a way of gaining sensitive information by influencing people • is designed to find and stop malware from damaging a network and the device on it • is when data is translated into a code which only someone with the correct key can text • ...
Airport Security 2022-10-20
Across
- is to keep ppl from going on to a space
- An official annoucment that gives ppl information
- A Device that detects metal
- Area a place travellers are not allowed to enter
Down
- A Device that records some areas of an airport.
- a system that checks what's in the bag or luggage
- An official rule
- its to show where something is with something else
8 Clues: An official rule • A Device that detects metal • is to keep ppl from going on to a space • A Device that records some areas of an airport. • Area a place travellers are not allowed to enter • a system that checks what's in the bag or luggage • An official annoucment that gives ppl information • its to show where something is with something else
Perimeter Security 2023-09-13
Across
- Vehicle, rail, and ________ are the three types of traffic at the facility.
- Each employee has a ________ that allows them access to the facility.
- There are _______ two-way gates onsite.
- Boiler operators are required to perform checks on the _________ every shift.
Down
- Security solutions that utilize physical and software technology systems to protect from unauthorized access.
- You are not allowed to ___________ through the gate after another individual.
- Each visitor and contractor has to ________ upon arriving at the site.
- Fencing, Gates, and _________ make up the main parts of our security system.
8 Clues: There are _______ two-way gates onsite. • Each employee has a ________ that allows them access to the facility. • Each visitor and contractor has to ________ upon arriving at the site. • Vehicle, rail, and ________ are the three types of traffic at the facility. • Fencing, Gates, and _________ make up the main parts of our security system. • ...
Food security 2024-02-21
Across
- can be damaged in conflict decreasing food security
- submerging of dry land with a large amount of water
- can allow pests to travel into new countries
- animals that can reduce food security (crops)
Down
- can deprive local communities of food
- causes an increase in population
- having enough food to feed a population
- growing crops and raising livestock
8 Clues: causes an increase in population • growing crops and raising livestock • can deprive local communities of food • having enough food to feed a population • can allow pests to travel into new countries • animals that can reduce food security (crops) • can be damaged in conflict decreasing food security • submerging of dry land with a large amount of water
Data Security 2024-02-27
Across
- Enables users to view and use data
- Used to validate a user’s access and make sure they claim who they are
- A stricter type of authentication
Down
- What you use with a username to log in
- The total of all data exposed to a person during a single sign in
- the fraudulent practice of sending emails to reveal personal information
- a type of malicious software designed to block access to a computer system until a sum of money is paid
- A periodical review of security actions and user activity
8 Clues: A stricter type of authentication • Enables users to view and use data • What you use with a username to log in • A periodical review of security actions and user activity • The total of all data exposed to a person during a single sign in • Used to validate a user’s access and make sure they claim who they are • ...
Security pops 2023-03-23
Food Security 2024-12-17
Across
- A person who grows food or raises animals. (6 letters)
- A type of fruit that is often used to make juice, high in Vitamin C.
- A place where food is kept safe and fresh. (5 letters)
- King of all fruits.(5 letters)
Down
- A place where food is stored. (6 letters)
- A nutrient that helps build muscles and repair tissue. (7 letters)
- A type of food that comes from animals and provides protein, like milk or eggs. (3 letters)
- A nutrient that helps keep our teeth and bones strong(7 letters)
8 Clues: King of all fruits.(5 letters) • A place where food is stored. (6 letters) • A person who grows food or raises animals. (6 letters) • A place where food is kept safe and fresh. (5 letters) • A nutrient that helps keep our teeth and bones strong(7 letters) • A nutrient that helps build muscles and repair tissue. (7 letters) • ...
Security Concepts 2026-03-27
Across
- Classified information that could inflict serious damage to the US
- The process of monitoring and recording activities in a specific area
- Classified information that could inflict damage to the US
- Controlled Unclassified Information
Down
- Have the requisite background investigation completed
- Having reoccurring authorization to work with classified information.
- Operations Security
- Following someone into a space without scanning your badge
8 Clues: Operations Security • Controlled Unclassified Information • Have the requisite background investigation completed • Classified information that could inflict damage to the US • Following someone into a space without scanning your badge • Classified information that could inflict serious damage to the US • ...
Unit 9 - Science & Technology 2022-11-15
Across
- pulpit
- połączyć
- chemik
- bezprzewodowy
- środowisko
- urządzenie
- wtyczka
- zarazki,bakterie
- genetyka
- baza danych
- przyłączać,dołączać
Down
- załadować,wysłać (np. pliki na serwer)
- szczepionka
- obserwować
- oprogramowanie
- wynaleźć
- przenośny (o sprzęcie)
- opracowywać, rozwijać
- błąd
- gniazdko
- wyniki
- bezpieczeństwo
- klawiatura
- para wodna
24 Clues: błąd • pulpit • chemik • wyniki • wtyczka • wynaleźć • gniazdko • połączyć • genetyka • obserwować • środowisko • urządzenie • klawiatura • para wodna • szczepionka • baza danych • bezprzewodowy • oprogramowanie • bezpieczeństwo • zarazki,bakterie • przyłączać,dołączać • opracowywać, rozwijać • przenośny (o sprzęcie) • załadować,wysłać (np. pliki na serwer)
Vocabulary Unit 2 2019-10-31
29 Clues: Affe • Eimer • Führer • Strauß • Mensch • riesig • schwer • Kollege • nutzlos • Ausgang • Elefant • positiv • Knochen • Nilpferd • Nachteil • regieren • insgesamt • Eisenbahn • aggressiv • Sicherheit • enttäuscht • Ausbildung • elektrisch • Rad fahren • unbewaffnet • Schulbildung • Rechtsanwalt • Überschwemmung • reich, wohlhabend
QUIZ 2019-12-30
30 Clues: kale • ünlü • kapı • marş • uçuş • sisli • kemer • ahlak • güven • gurur • bütçe • değer • pençe • kazak • terlik • deprem • cansız • harabe • korumak • güvenlik • şerefonur • eskiantik • havalanmak • uçağabinmek • gökgürültülü • uçağıninmesi • vatanseverlik • davranıştavır • misafirperverlik • birlikberaberlik
MY SPELING CROSSWORD PUZZLE 2013-04-03
20 Clues: Iknow • so sad • oh yes • my wish • is less • is lock • has fame • is clear • my image • too firm • very bad • the light • pay money • so common • how it is • same equal • so special • be penalized • exmple costume • same community
abc 2013-08-05
20 Clues: clue 2 • clue 6 • clue 8 • clue 5 • clue 7 • clue 1 • clue 3 • clue 9 • clue 14 • clue 11 • clue 12 • clue 16 • clue 20 • clue 19 • clue 18 • clue 15 • clue 13 • clur 17 • clue 10 • clue 4 c
Investigations 2016-12-15
Monsters, Inc. Day 9 2023-07-17
25 Clues: 생일 • 의견 • 역사 • 우연 • 벽장 • 위험한 • 보내다 • 편안한 • 피곤한 • 목격자 • 궁금하다 • 전문가의 • 설명하다 • 확인하다 • 폭발시키다 • 정상,보통 • 보안,경비 • 비어 있는 • 항상,언제나 • 사기꾼,협잡꾼 • 얻다, 집어들다 • 우연히 마주치다 • (상품을)주문하다 • 망치다,엉망으로 만들다 • (더욱더 잘 되도록)복돋다
puzzle 2024-03-15
30 Clues: log • kiss • cast • dove • gate • evil • hero • tower • plane • brave • delay • cheek • glass • statue • clever • flight • bridge • common • strong • honest • wedding • foreign • airport • weather • greeting • security • handshake • tradition • historical • boardingpass
Cybercrimes and Cyber Laws 2020-12-10
Across
- when someone operates a computer disrupting part of the national electronic infrastructure.
- The use of IT to harm or harass other people in a deliberate, repeated, and hostile manner
- Developing a program intended to damage or disable computers and their systems
- disrupting, damaging, or destroying a website or computer network
- adopting the identity of another computer user, or creating a false identity on a computer website in order to commit fraud.
- Literary theft
- Gaining unauthorized access to data in a computer or an entire network
- Any criminal activity associated with a computer
Down
- The control or suppression of what can be accessed, published, or viewed on the Internet.
- using a computer to steal computer data stored in a digital format.
- warfare, transmitting computer viruses to people to destroy their computer system or files.
- fraudulent practice of sending emails that appear to be from reputable companies to induce individuals to reveal personal information, like passwords and credit card numbers.
- area of law which concerns computer and computer-related crimes.
- using a computer to steal computer data stored in a digital format.
- tort, The invasion, theft, falsification, misuse, or deletion of data stored in a computer to commit a tort
- Use of a variety of media, including photos, film, video, and video games depicting the engagement in acts of a sexual nature
- theft, using a computer to steal financial, employment, educational, medical, and personal data.
17 Clues: Literary theft • Any criminal activity associated with a computer • area of law which concerns computer and computer-related crimes. • disrupting, damaging, or destroying a website or computer network • using a computer to steal computer data stored in a digital format. • using a computer to steal computer data stored in a digital format. • ...
The Cyber Threat - Crossword 2025-11-18
Across
- A user’s keyboard inputs are secretly being recorded and sent to a hacker.
- A security scan shows repeated failed login attempts using different passwords until one works.
- A user downloads a file that causes all their documents to become locked, with a ransom message demanding payment.
- A worker finds a USB stick in the car park and plugs it into their computer, which later becomes infected.
- An employee installs free software that secretly shows ads and collects browsing data.
- An attacker enters extra commands into a website search box and gains access to customer data.
- Attackers infect a popular industry blog so that anyone who visits it unknowingly downloads malware.
Down
- Unknown software connects remotely to a hacker’s computer, giving them full access to the system.
- Company computers suddenly slow down and begin sending out large amounts of network traffic automatically.
- Hackers post fake DNS entries so users visiting a real website are redirected to a copycat site.
- A senior manager receives a personalised email pretending to be from the CEO, asking them to transfer money urgently.
- Users report that the company website shows pop-up messages containing strange code like <script>alert('Hacked!')</script>.
- An employee gets a text message with a link to “update payroll details.”
- A program runs too much data in memory, causing it to crash and allowing code execution by an attacker.
- A user receives an email that looks like it’s from IT support asking them to “confirm their password.”
- A staff member answers a call from “tech support” asking for their login details to fix an issue.
16 Clues: An employee gets a text message with a link to “update payroll details.” • A user’s keyboard inputs are secretly being recorded and sent to a hacker. • An employee installs free software that secretly shows ads and collects browsing data. • An attacker enters extra commands into a website search box and gains access to customer data. • ...
Unit 8 boll weevil 2024-05-07
Across
- deal public work projects
- weevil what was the reason cotton production went down
- thirty nine when did it end
- what factories did people start to work
- Electrification Administration electricity needs
- great depression why did the bank and stock market fail
Down
- twenty nine when did is start
- Security Administration social security
- lending what caused reduction in purchasing
- where did people start To move after boll weevil
- ships what were the ships ww2 used to win
- bombers what were the planes they used in ww2
- what did Georgia do after boll weevil
- material factory
14 Clues: material factory • deal public work projects • thirty nine when did it end • twenty nine when did is start • what did Georgia do after boll weevil • what factories did people start to work • Security Administration social security • ships what were the ships ww2 used to win • lending what caused reduction in purchasing • bombers what were the planes they used in ww2 • ...
Among us 2021-11-05
Unit 11 2023-02-27
Unit 11 Crossword Puzzle 2025-02-13
Science and Technology 2025-02-11
Across
- A computer-generated simulation of a three-dimensional environment
- The application of scientific knowledge for practical purposes
- The branch of technology dealing with robots
- Related to genes and heredity
- Avoiding depletion of natural resources for long-term balance
Down
- Information processed or stored by a computer (
- The use of technology to complete tasks with minimal human input
- Protection against cyber threats and attacks
- A new idea or method
9 Clues: A new idea or method • Related to genes and heredity • Protection against cyber threats and attacks • The branch of technology dealing with robots • Information processed or stored by a computer ( • Avoiding depletion of natural resources for long-term balance • The application of scientific knowledge for practical purposes • ...
Cyber Bullying Cross Word Puzzle 2025-05-02
Across
- A green logo support service
- A platform where you can send snap to your friends
- You should tell a trusted..
- A support service that has the number '1800 55 1800'
- When someone sends you mean messages online - it is..
Down
- Bullying can impact your..
- A cyber safety (cyberbullying) website under the Australian Government
- When you want to report, you should collect..
- A purple and yellow platform - where you can post photos
9 Clues: Bullying can impact your.. • You should tell a trusted.. • A green logo support service • When you want to report, you should collect.. • A platform where you can send snap to your friends • A support service that has the number '1800 55 1800' • When someone sends you mean messages online - it is.. • A purple and yellow platform - where you can post photos • ...
People and Places in the School 2022-12-02
13 Clues: office • hallway • library • student • bathroom • classroom • cafeteria • gymnasium • male-teacher • male-librarian • security-guard • female-secretary • female-principle
Laboratory 2026-01-15
13 Clues: Man • money • renew • control • glassware • equipment • dangerous • protection • homogeneous • teams worker • Emily in Paris • data treatment • compounds family
Airport 2023-11-01
Across
- Claim - The place where passengers retrieve their checked luggage after arriving at their destination.
- - The area where officials check for items that may not be brought into a country or require declaration.
- - The airplane that passengers will board for their flight.
- - The location where planes take off and land, and passengers go to board and disembark from flights.
- Check/Security Screening - The process of having your bags and personal belongings inspected to ensure safety.
- - The process of registering for a flight and obtaining a boarding pass.
- Pass - The document that allows a passenger to board a plane.
Down
- - A document that verifies a traveler's identity and citizenship.
- - The checkpoint where travelers entering a new country have their passports and visas checked.
- - A scheduled journey on an airplane.
- - The specific location where passengers wait to board their flight.
- Crew - The flight attendants who provide services on the plane.
- - The building at the airport where passengers check in, go through security, and wait for their flights.
13 Clues: - A scheduled journey on an airplane. • - The airplane that passengers will board for their flight. • Pass - The document that allows a passenger to board a plane. • Crew - The flight attendants who provide services on the plane. • - A document that verifies a traveler's identity and citizenship. • ...
Di Sekolah 2015-01-19
13 Clues: pen • lab • office • pledge • canteen • stapler • uniform • cleaner • assembly • principal • ____ makan (food stall) • pengawal _______ (security guard) • latihan _________ (physical education)
DevSecOps Tools Challenge 2023-05-17
Across
- A widely-used vulnerability assessment tool that scans networks, systems, and applications to identify potential security issues.
- An open-source automation tool that enables you to automate the provisioning, configuration, and deployment of infrastructure and applications.
- An open-source containerization platform that allows you to package applications and their dependencies into lightweight, portable containers.
Down
- A container security platform that scans container images for vulnerabilities and enforces security policies throughout the container lifecycle.
- An open-source automation server that facilitates continuous integration and delivery of software projects.
- A platform for continuous code quality inspection that identifies bugs, vulnerabilities, and code smells in your codebase.
- A secure, scalable, and secrets management tool that provides a central repository for storing and accessing sensitive information.
- A web application security scanner that helps you find security vulnerabilities during the development and testing phases.
8 Clues: An open-source automation server that facilitates continuous integration and delivery of software projects. • A platform for continuous code quality inspection that identifies bugs, vulnerabilities, and code smells in your codebase. • ...
Cisco Product Advanced Security Crossword Puzzle 2024-10-14
Across
- (10 letters) Security certifications help ensure that a product complies with important ________ standards and guidelines.
- (5 letters) This vulnerability management solution automates the process of prioritizing and addressing security risks in Cisco products
- (4 letters) A document that lists all the components and dependencies in a software product, helping to manage vulnerabilities
Down
- (7 letters) This detection engine is commonly paired with Falco to manage security policies and controls in containerized environments.
- (5 letters) The general term for security policies and frameworks used to monitor and address risks in cloud applications.
- (7 letters) This open-source engine is used for detecting anomalies and security threats in containerized environments
- (5 letters) A modern protocol used for securing network telemetry with real-time streaming, often used in telemetry dial-out
- (5 letters) AI-based method used to identify and block unauthorized access attempts or attacks
8 Clues: (5 letters) AI-based method used to identify and block unauthorized access attempts or attacks • (7 letters) This open-source engine is used for detecting anomalies and security threats in containerized environments • (5 letters) The general term for security policies and frameworks used to monitor and address risks in cloud applications. • ...
Dystopian Crossword 2021-01-14
Across
- A dystopia happens when there is an end to civilization because of a _________
- You must _________, you can’t be different
- The word “utopia” was created from 2 __________ words, eutopia & outopia
- Opposite of dystopia
- A dystopian government uses mass __________ to spy on its citizens
- Sir Thomas __________
- The word for mega-technological genre: “cyber-__________”
Down
- Spreading of rumors to control people is called
- Type of government that has total control over people’s lives
- Katniss from The Hunger Games is a __________
- Dystopian literature takes a current trend to the __________
- Kim Jong-Un is practically worshipped by citizens, making him the __________head of North Korea
12 Clues: Opposite of dystopia • Sir Thomas __________ • You must _________, you can’t be different • Katniss from The Hunger Games is a __________ • Spreading of rumors to control people is called • The word for mega-technological genre: “cyber-__________” • Dystopian literature takes a current trend to the __________ • ...
Transportation 2024-10-09
Across
- Common Winter Transportation For Icey Terrian
- A Vehicle That Touches the Ground With Only One Wheel. Variation have a Frame with a Saddle
- Tony Hawk's Favorite Way To Travel
- Typically found On The Tracks
- An aircraft without wings, consisting of a very large bag filled with gas
- Honda, KIA, or Ford for example
Down
- Chopper, Whirlybird, or Eggbeater
- Also Called a Pedal Cycle, This is a Human-Powered or Pedal-Driven, Single-Track Vehicle
- How Some People Come To School
- Dump, Cyber, or Pickup
- Need To Wait For These At The Airport
- Very Long Car For Prom and Weddings
12 Clues: Dump, Cyber, or Pickup • Typically found On The Tracks • How Some People Come To School • Honda, KIA, or Ford for example • Chopper, Whirlybird, or Eggbeater • Tony Hawk's Favorite Way To Travel • Very Long Car For Prom and Weddings • Need To Wait For These At The Airport • Common Winter Transportation For Icey Terrian • ...
Bullying 2025-05-08
Across
- an organized group of criminal activity
- type of bullying that happens over the internet
- type of bullying where you call somebody names
- what to do if somebody is bullying you- ____ somebody
- type of bullying where you hit somebody
- a reason somebody would bully
- someone who uses strength, power or words to harm or intimidate others
Down
- a popular belief about specific types of individuals
- to put up with somebody or something unpleasant
- what to do if you're a bystander - _____ up
- somebody who is present at a bullying event
- a preconceived opinion or feeling
12 Clues: a reason somebody would bully • a preconceived opinion or feeling • an organized group of criminal activity • type of bullying where you hit somebody • what to do if you're a bystander - _____ up • somebody who is present at a bullying event • type of bullying where you call somebody names • to put up with somebody or something unpleasant • ...
group 1 ohs tts 2021-09-28
Across
- gas that is needed by living is
- opening in the wall that is fitted with glass
- mechanical vibration that can interfere
- effort to maintain security
- Light Illuminance
Down
- Working environment intermediary
- maximum level of noise
- music genre that can reduce stress at work
- The most annoying smell come from?
- The place you put air circulator?
10 Clues: Light Illuminance • maximum level of noise • effort to maintain security • gas that is needed by living is • Working environment intermediary • The place you put air circulator? • The most annoying smell come from? • mechanical vibration that can interfere • music genre that can reduce stress at work • opening in the wall that is fitted with glass
Anime 2024-08-01
Across
- Bundgy gum
- The original anime deadbeat father
- inosuke breathing/sword style
- 1st anime we bonded over
- tanjuro sister
- a private security company consisting of the former Third Group of Chryse Guard Security.
Down
- when the world needed him most he disappeared
- Gohans Dad
- died & was reincarnated as a chimera Ant
- your favorite anime genre (per me)
10 Clues: Gohans Dad • Bundgy gum • tanjuro sister • 1st anime we bonded over • inosuke breathing/sword style • The original anime deadbeat father • your favorite anime genre (per me) • died & was reincarnated as a chimera Ant • when the world needed him most he disappeared • a private security company consisting of the former Third Group of Chryse Guard Security.
Buddy Ruski 2022-12-22
8 Clues: your car • side by side • home sweet home • goes with the salad • mythical collage of animals • G Yamazawa's salad of choice • psychological security system • Sleepy Holloway security system
Crime Vocabulary 2021-04-16
28 Clues: robo • juez • arma • jurado • ladrón • ladrón • prisión • testigo • experto • pistola • abogado • juzgado • pruebas • víctima • arrestar • cuchillo • criminal • detective • secuestrar • investigar • prisionero • falsificador • officer policía • huellas digitales • asesinar, asesinato • sospechoso, sospechar • guard guardia de seguridad • scientist investigador forense
Difficult words english 2020-10-08
25 Clues: kom • ziek • over • strip • agenda • anders • rooster • softbal • honkbal • leerling • afspraak • wiskunde • uitleggen • plotseling • hebben zin • doen alsof • voorstellen • heel slecht • beveiliging • aardrijkskunde • de schuld geven • de schuld geven • aan de overkant van • accident per ongeluk • and technology techniek
17실력 2023-12-19
23 Clues: 보험 • 풍경 • 여권 • 관광 • 비행 • 목적지 • 시차증 • 기념품 • 해외로 • 취소하다 • 예약하다 • 출발하다 • 안전 보안 • 짐 수하물 • 풍경(s-) • 안내원 종업원 • 지연 연기하다 • 탑승하다 승차하다 • 신청하다 지원하다 • 도착하다 도달하다 • 수표 점검 조사하다 • 요구 청구 주장하다 • 멀리가는 여행 여정
Unit 8 2024-04-02
25 Clues: věci • vlna • brána • vážit • pilot • selfie • trochu • přístav • semafor • nádraží • letiště • dálnice • ponorka • přistát • vzlétnout • nástupiště • ovlivňovat • ctižádostivost • kruhový objezd • dopravní zácpa • palubní letenka • bezpečnostní pás • bezpečnostní prohlídka • přihlásit se k odbavení • nerovný, hrbolatý, hrubý
Airport Spanish Vocab 2022-11-29
20 Clues: ticket • flight • arrival • to call • airport • passport • suitcase • to board • departure • itinerary • to travel • bathing suit • travel agency • monitar/screen • identification • to get in line • to go on vacation • to go through customs • to check ones luggage • to go through security
Travel Vocab 2022-11-28
20 Clues: gate • flight • ticket • airport • arrival • luggage • bus stop • to board • departure • passenger • train station • baggage claim • to get in line • tourist office • monitor/screen • to take a taxi • flight attendant • to check luggage • to go though costoms • to go though security
Chapter 5 2025-04-10
Across
- rauw
- bewaking, beveiliging
- genieten van
- waarschijnlijkheid
- opmerking
- erg populair
- weerspiegeling
- herkennen
- onpartijdig
- persoonlijk, subjectief
- vermoeiend
- oplichting
- gemeenschap
Down
- reageren
- met zich meebrengen
- onbetrouwbaar
- realistisch
- toegang
- plakken
- carrière
- bevatten
- belonend
- beïnvloeden
- verzoek
- afbeelding, beeld
- zoekopdracht
- belangrijkste
- geboorte
28 Clues: rauw • toegang • plakken • verzoek • reageren • carrière • bevatten • belonend • geboorte • opmerking • herkennen • vermoeiend • oplichting • realistisch • beïnvloeden • onpartijdig • gemeenschap • genieten van • erg populair • zoekopdracht • onbetrouwbaar • belangrijkste • weerspiegeling • afbeelding, beeld • waarschijnlijkheid • met zich meebrengen • bewaking, beveiliging • persoonlijk, subjectief
vocab 2022-02-16
Across
- bank you make money off of accounts
- physical form of currency
- people that manage credit
- you write money out to people on it
- used if you want to pay later
- manage accounts of loans and savings
- put money in a bank account
- protection of something
- guarantee from bank that you will pay the money back on time
Down
- to move money somewhere else
- bank account if you plan to spend
- lets you borrow money when you need it
- institute you can't deposity money into
- where security is
- bank account if you plan to save
- a unit of value
- let you buy without carrying cash
17 Clues: a unit of value • where security is • protection of something • physical form of currency • people that manage credit • put money in a bank account • to move money somewhere else • used if you want to pay later • bank account if you plan to save • bank account if you plan to spend • let you buy without carrying cash • bank you make money off of accounts • ...
nates crossword 2023-08-28
Across
- or data which can be accessed when needed
- sure a person is who they say they are
- used to determine user privileges or access levels to the system
- to or damage sensitive information on a computer
- ransomware and the numerous other programs used by hackers to gain
- information is protected
- or weakness which undermines an organization’s security efforts
- an individual or organization has over information and how it is used
- of being private or secret
Down
- of being complete or uncorrupted
- rules
- of doing harm
- which have been programmed to carry out malicious intent
- assessment of potential threats to an organization’s security
- for "malicious software" and covers threats such as viruses, worms, Trojan
- of computers and devices managed as a unit with the same procedures
- Virus
17 Clues: rules • Virus • of doing harm • information is protected • of being private or secret • of being complete or uncorrupted • sure a person is who they say they are • or data which can be accessed when needed • to or damage sensitive information on a computer • which have been programmed to carry out malicious intent • assessment of potential threats to an organization’s security • ...
Chapter 8 Security Plus 2024-03-13
Across
- Open security standards that can help automate vulnerability management
- a threat actor positions themself in the middle between
- A session sampling protocol feature on Cisco routers
- bogus requests to overwhelm the recipient
- A product that consolidates real-time security monitoring and management
- helps protect organizations from email spoofing, phishing
- closed A failure mode in which the device shuts down when failure is detected
- Gathering data for monitoring user behavior
- validates the content of the email message
- Detecting and notifying operators about meaningful events
Down
- attacker to multiply the effect of their attack
- Isolating systems that have been compromised
- ensure critical data is protected
- baseline A standard of normal activities
- A standard of normal activities
- retains historical documents
- Collecting data without the need of monitoring agents
17 Clues: retains historical documents • A standard of normal activities • ensure critical data is protected • baseline A standard of normal activities • bogus requests to overwhelm the recipient • validates the content of the email message • Gathering data for monitoring user behavior • Isolating systems that have been compromised • attacker to multiply the effect of their attack • ...
APAC BOT CROSSWORD 2026-02-16
Across
- Under SEACare, inpatient coverage per year per individual is capped at this amount
- The automated robot operating in the Singapore office cafeteria
- The travel security intelligence platform recommended before international travel
- Jakarta meeting rooms specifically mentioned for workshops
- Thailand dinner limit when travelling
- The anti-corruption policy governing gifts and hospitality
- Private transport vendor for Manila
- Which ANZ city office is located on Collins Street?
Down
- Singapore hotel cap
- Travel calendar system
- Greater China ride-share service is approved for mainland use
- Bangkok visa point of contact
- Malaysia email handles business cards
- SEA Accounting and Controlling Senior Manager
- System used in Greater China for expense submission
- Contact for corrections in ANZ timesheets
- The airport assistance contact employees must call for medical or security emergencies.
17 Clues: Singapore hotel cap • Travel calendar system • Bangkok visa point of contact • Private transport vendor for Manila • Malaysia email handles business cards • Thailand dinner limit when travelling • Contact for corrections in ANZ timesheets • SEA Accounting and Controlling Senior Manager • System used in Greater China for expense submission • ...
Security&Privacy 2018-10-31
Across
- You get an email from a bank asking for your personal information.(8)
- Two countries decide to fight war through computers(8).
- Tricking people into believing to gather valuable information(6,11)
- The system administrator informs you that a Trojan horse has infected your computer. Which program did the system administrator use to determine this?(9)
Down
- A hacker decides to steal money from the account holders of a bank.(6)
- No antivirus is smart enough to catch all my patterns.(10)
- Whatever you type is read by a hacker using this malware.(7)
- A friend of yours is protesting against a cosmetics company using online methods.(10)
8 Clues: Two countries decide to fight war through computers(8). • No antivirus is smart enough to catch all my patterns.(10) • Whatever you type is read by a hacker using this malware.(7) • Tricking people into believing to gather valuable information(6,11) • You get an email from a bank asking for your personal information.(8) • ...
ELECTRICIAN SECURITY 2013-03-13
8 Clues: damage • measured in volts • connected to earth • source of electricity • opposite of insulator • result of fire or heat • connected to electricity • result of touching a live part
Network security 2013-09-12
Across
- sensitive informationon hard drives are destroyed
- The network element that can interconnect two gsm network.
- application protocol Push which is basically and specially used to encoded message which includes a link to a WAP addreSS
- anonymity Designed to protect the user against someone
Down
- system for mobile communication which allows users to roam seamlessly between network and separate the user identify from phone equipment
- Feasibility of USIM component tested using
- Enhanced authentication protocol for 3G security
- station controller which allow all control function and physical link between MCS and BTS
8 Clues: Feasibility of USIM component tested using • sensitive informationon hard drives are destroyed • Enhanced authentication protocol for 3G security • anonymity Designed to protect the user against someone • The network element that can interconnect two gsm network. • station controller which allow all control function and physical link between MCS and BTS • ...
Network security 2013-09-12
Across
- fields othername for finite fields
- used to implement a mechanism that automates ip configuration
- it is a single point of defense between two networks.
- website which site is blocked by dos atack
- it is designed to provide security and compression services to data generated from the application layer.
- horse which virus comes through downloading file form internet.
Down
- level firewall it is third generation firewall technology that evaluates network packets for valid data.
- attack it is one of particular variant of flooding dos attack on a public internet.
8 Clues: fields othername for finite fields • website which site is blocked by dos atack • it is a single point of defense between two networks. • used to implement a mechanism that automates ip configuration • horse which virus comes through downloading file form internet. • attack it is one of particular variant of flooding dos attack on a public internet. • ...
Security Issues 2015-11-18
Across
- graffiti on a website
- finding signals or to gain entry on the advantage of others (e.g. WIFI)
- you details (credit card etc )stolen and used
- mistakes made while development systems
Down
- sending messages to a server until it "falls over"
- false website to ascertain you personal details which can lead to other criminal activities
- unauthorised access of this person either by using code or other means
- goods sold on the black market
8 Clues: graffiti on a website • goods sold on the black market • mistakes made while development systems • you details (credit card etc )stolen and used • sending messages to a server until it "falls over" • unauthorised access of this person either by using code or other means • finding signals or to gain entry on the advantage of others (e.g. WIFI) • ...
IT-Security 2016-01-29
8 Clues: chatten • Betrugsmethode • Datenverarbeitungsregisternummer • Beobachtung bei der Eingabe von Daten • schützt den Computer von Zugriff fremder Nutzer • Programme, die Tastatureingaben mitprotokolieren • Überbegriff für unerwünschte, schädliche Software • Personen die illegal in Computersysteme eindringen
nutrition security 2024-07-21
Across
- The nutrients you use in large amounts
- Lack of this can lead to anemia
- Food produced without synthetic chemicals
- Essential nutrient needed for strong bones and teeth
Down
- The state of having reliable access to a sufficient quantity of affordable, nutritious food
- Eating a balanced diet to maintain health and prevent disease
- Lack of sufficient food leading to hunger and malnutrition
- Vitamin found in citrus fruits, important for immune function
8 Clues: Lack of this can lead to anemia • The nutrients you use in large amounts • Food produced without synthetic chemicals • Essential nutrient needed for strong bones and teeth • Lack of sufficient food leading to hunger and malnutrition • Eating a balanced diet to maintain health and prevent disease • Vitamin found in citrus fruits, important for immune function • ...
Food security 2024-10-17
Across
- It is a foodborne illness caused by bacteria
- It is a biological food hazard
- It is an example of a common symptom of foodborne illness
- It is the pathogen most associated with undercooked beef and hamburger
- Where should you store raw meat in your fridge?
- It is a common food allergen
Down
- It is the primary source of Campylobacter contamination in food
- It is chemical food hazard
- It can multiply in cooked rice or pasta that's left at room temperature and cause food poisoning
- Which pathogen in raw poultry poses the greatest risk to foodborne illness?
10 Clues: It is chemical food hazard • It is a common food allergen • It is a biological food hazard • It is a foodborne illness caused by bacteria • Where should you store raw meat in your fridge? • It is an example of a common symptom of foodborne illness • It is the primary source of Campylobacter contamination in food • ...
Airport security 2022-10-20
8 Clues: official rules • official announcement • someone WHO travels with you • a machine that records people • a tool that sees inside things • baggage that no one is watching • a tool that sees metal passes throuht it • to use something to keep people from going into a space
Digital Security 2026-02-27
Across
- A secret number used to prove your identity, often for banking or phone access.
- The act of proving you are who you say you are.
- Attempts by hackers to damage or gain unauthorized access to computer systems or networks.
- People who pretend to be someone else to trick others.
Down
- Understanding that not everyone has equal access to technology and using shared resources responsibly.
- The process of proving who you are when using digital systems.
- The act of telling a system who you are, like entering your username
- Using technology and the internet in safe, responsible, and ethical ways
8 Clues: The act of proving you are who you say you are. • People who pretend to be someone else to trick others. • The process of proving who you are when using digital systems. • The act of telling a system who you are, like entering your username • Using technology and the internet in safe, responsible, and ethical ways • ...
Security Questions 2025-10-12
8 Clues: The name of my first pet • The name of my first school • My nickname in secondary school • The middle name of my oldest sibling • The first name of my favorite author • The last name of my favorite teacher • The first name of my first celebrity crush • The first name of my best friend in childhood
jobs 2015-12-10
ADVANTAGES OF E-WALLET 2025-05-06
12 Clues: - AKSES • -DIKESAN • -GANJARAN • - KEBAIKAN • - PEMBELIAN • MENGELAKKAN • - MENAWARKAN • - KESELAMATAN • -PEMBELANJAAN • - MENGURUSKAN • - DENGAN SENANG • - SELESA /MUDAH
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
SSA 2023-05-24
Across
- which way did Black Sunday move?
- Who signed the Medicare and Medicaid Act? Last name
- healthcare for low incomes
- 5 ___ dollars were earmarked for the WPA
- Social security __ were made to track workers' benefits and wages
- one in ___ older americans had health insurance in 1950
- The WPA existed for 8 ____
- up to ___ million tons of topsoil blew off the great plains on black sunday
- The Social Security Act was signed in 19__
Down
- The P in WPA stands for..
- The dust bowl was named after Black __
- What were the Oklahoma migrants called during the dust bowl?
- where did the Black Sunday soil start?
- healthcare for ages 65+
- The WPA created the Federal Project ___
- The unemployment rate in 1935 was __%
16 Clues: healthcare for ages 65+ • The P in WPA stands for.. • healthcare for low incomes • The WPA existed for 8 ____ • which way did Black Sunday move? • The unemployment rate in 1935 was __% • The dust bowl was named after Black __ • where did the Black Sunday soil start? • The WPA created the Federal Project ___ • 5 ___ dollars were earmarked for the WPA • ...
key terms 2012-12-20
Across
- a clash
- crime commited by gang members
- when poeple get violent because of beliefs or religion
- bullying done over the use of internet
- unwanted sexual hehavior
- to be mistreated verbablly physically or emotionally
Down
- any attack done by or to a partner in a dating relationship
- situation where someone has power over someone else, in intimadation of violence
- the beliefs of superiority of particular race
- fear of someone elses sexual preference
- crime that happens to a person or a group because of their "identifiable group"
11 Clues: a clash • unwanted sexual hehavior • crime commited by gang members • bullying done over the use of internet • fear of someone elses sexual preference • the beliefs of superiority of particular race • to be mistreated verbablly physically or emotionally • when poeple get violent because of beliefs or religion • any attack done by or to a partner in a dating relationship • ...
No place for hate! Bob 2015-10-12
Across
- someone who has been affected by hackers, viruses, or cyber bullies
- ability to have computer find problems and solutions
- type of software that is used to protect sensitive files
- type of virus that is used to extract data from one computer to another
- Type of internet protection
- illeagaly downloading content to your computer
- someone who steals identities using a computer
Down
- someone who abuses or bully’s someone through social media
- thief one who steals some ones credentials using a computer
- Junkmail that can sometimes contain viruses
- code used to protect data
11 Clues: code used to protect data • Type of internet protection • Junkmail that can sometimes contain viruses • illeagaly downloading content to your computer • someone who steals identities using a computer • ability to have computer find problems and solutions • type of software that is used to protect sensitive files • ...
