cyber security Crossword Puzzles
confidenality 2025-02-06
Across
- Espionage form of espionage conducted for commercial purposes rather than security;
- information
- set of rules or promises which limits access or places restrictions on certain
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
- or Sensitive Data information about an employee prior to employment such as a résumé,
Down
- etc.
- Data records of an employee’s performance on the job such as performance reports,
- insurance information
- in the Workplace keeping employee, customer and client information private
- Data information which may arise from employment-related physicals, drug tests and
- of information
13 Clues: etc. • information • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
Thanksgiving 2023-11-17
Across
- Thanksgiving always lands on this day of the week
- one of the 4 seasons (fall)
- this pie is a special treat for the holidays
- this goes over mashed potatoes
- green bean ___ is a good way to eat your veggies
- a popular alternative or companion to a turkey
- the main food served at Thanksgiving
- Black ___ provides great deals after thanksgiving
Down
- this side dish is primarily made with bread
- cyber ___ also provides great deals on electronics
- this red fruit can be served as a jelly or sauce
- the main way potatoes are served
- before you start cooking, you can watch the famous Macy's Thanksgiving Day ___
- ___ potato pie is famous in the south for having marshmallows on top
- a large meal
15 Clues: a large meal • one of the 4 seasons (fall) • this goes over mashed potatoes • the main way potatoes are served • the main food served at Thanksgiving • this side dish is primarily made with bread • this pie is a special treat for the holidays • a popular alternative or companion to a turkey • this red fruit can be served as a jelly or sauce • ...
Security 2022-08-10
5 Clues: it Sees what you don't • feels real when you're asleep • What keeps a door secured tightly • Cannot unlock anything without one • indestructible neither created but transferred from one form to another
Threats to Cyber Secruity 2017-10-09
Across
- Shoulder surfing, direct observation techniques like looking over a shoulder
- Scamming practise where malicious code is installed on to a personal computer record are modified and misdirects users to fraudulent websites
- The art of manipulating people so they give up their personal information
- Appears to be something wanted but is a standalone malicious software designed to give full control of the PC
- Spyware that logs keys used and collets data from affected computer
- Encourages users to enter confidential data by pretending to be a trust worthy source
- Usually popups, main aim to generate revenue for author
Down
- Types of malware installed on computer system that collects information without user being aware, is hidden and secretly installed
- Self-replicating program that attaches onto to existing programs and can easily spread
- The acts of using and creating an invented scenario to engage victim into giving the information
- Making the computer or network unavailable to user (DoS)
- Loss or theft of devices
- The term to describe the protection of information systems from theft unauthorised access or damage to hardware, software and information on them
- Standalone computer program that replicates itself so it can spread onto a network. Does NOT attach to a program
- Finding a weakness in an established system
15 Clues: Loss or theft of devices • Finding a weakness in an established system • Usually popups, main aim to generate revenue for author • Making the computer or network unavailable to user (DoS) • Spyware that logs keys used and collets data from affected computer • The art of manipulating people so they give up their personal information • ...
Cyber Basics & Common Threats 2025-10-07
Across
- Software designed to harm or exploit a system
- Network of infected computers controlled remotely
- Malware that locks data and demands payment
- Software that secretly collects user data
- Process of converting information into code
- Software update to fix vulnerabilities
- Malware designed to hide other malicious software
Down
- A secret string of characters used for authentication
- Self-replicating malicious program
- Malicious software disguised as legitimate
- A security barrier between trusted and untrusted networks
- Taking advantage of a vulnerability
- Hidden entry point into a system
- Software that detects and removes malicious code
- Fraudulent attempt to steal sensitive data via fake email
15 Clues: Hidden entry point into a system • Self-replicating malicious program • Taking advantage of a vulnerability • Software update to fix vulnerabilities • Software that secretly collects user data • Malicious software disguised as legitimate • Malware that locks data and demands payment • Process of converting information into code • ...
Greydi Lizbeth-Grade 6-ity or y 2021-03-15
14 Clues: lesión • popular • mayoria • forever • madurez • humedad • capacity • resources • humanidad • oportunidad • citizenship • resbaladizo • opposite of division • in the bank they have a guardian so that is having __________.
Chapter 2 - Methods of Security Attacks 2025-08-11
Across
- The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
- The act of listening in on a conversation or monitoring network traffic.
- A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
- The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
- A type of attack where the attacker is physically close to the target system.
- A form of social engineering attack over Voice over IP (VoIP).
- Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
- A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
- A type of attack that relies on persuading a person to reveal information.
- Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
- A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
- A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
- A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
- A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
- A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
- Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
- The process of an attacker gathering information about a network for a future attack.
- A specific type of spear phishing aimed at high-level executives or important individuals.
- Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
- An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.
20 Clues: A form of social engineering attack over Voice over IP (VoIP). • The act of listening in on a conversation or monitoring network traffic. • A type of attack that relies on persuading a person to reveal information. • A type of attack where the attacker is physically close to the target system. • ...
Loss Prevention 2024-10-17
Across
- The process of reducing inventory loss
- Training employees on policies and procedures
- A type of theft involving employees
- This device is often used to catch shoplifters
Down
- To inform authorities about theft
- The act of stealing goods from a store
- Loss due to theft, error, or fraud
- A strategy used to deter theft
- A suspicious behavior often seen in thieves
- Security tags used to deter theft
10 Clues: A strategy used to deter theft • To inform authorities about theft • Security tags used to deter theft • Loss due to theft, error, or fraud • A type of theft involving employees • The act of stealing goods from a store • The process of reducing inventory loss • A suspicious behavior often seen in thieves • Training employees on policies and procedures • ...
Bullying Ward 2025-05-05
Across
- Someone who does mean things to someone less powerful than them.
- This type of verbal bullying makes someone feel unsafe.
- Sending someone mean messages over and over.
- Repeatedly excluding someone to be mean.
- Hurtful words are used in this type of bullying.
Down
- Someone who watches the bullying but doesn't help.
- This type of bullying can hurt someone's body.
- Someone who is helpful toward the person being bullied.
- The person who someone tries to bully.
9 Clues: The person who someone tries to bully. • Repeatedly excluding someone to be mean. • Sending someone mean messages over and over. • This type of bullying can hurt someone's body. • Hurtful words are used in this type of bullying. • Someone who watches the bullying but doesn't help. • This type of verbal bullying makes someone feel unsafe. • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Wireless technology used to interconnect mobiles computers etc
- Refers to unwanted bulk emails that come from unknown sources
- Practice of protecting digital information
- Network topology with a central hub
Down
- It is a combination of two terms 'net' and 'etiquette'
- The process of transforming data into an unreadable code
- Type of cyber attack that tricks users
- Refers to an illegal intrusion into a computer system or network
- Device that connects multiple networks
9 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
chapter 9 2015-04-06
Across
- / If an organization asks you to disclose your social security number, but fails to establish a set of procedures and policies for protecting your privacy, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / If an organization asks you to disclose your social security number, yet fails to properly dispose of your private information once it has fulfilled its purpose, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / If an organization asks you to disclose your social security number, yet fails to permit you to opt-out before you provide the information, the organization has likely violated which of the Generally Accepted Privacy Principles? (3words)
- / If an organization asks you to disclose your social security number, but fails to tell you about its privacy policies and practices, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / One way to circumvent the counterfeiting of public keys is by using a ________(2words)
- / Information encrypted with the creator's private key that is used to authenticate the sender is digital_________
Down
- / A process that takes plaintext of any length and transforms it into a short code.
- / _________encryption and hashing are used to create digital signatures.
- / The system and processes used to issue and manage asymmetric keys and digital certificates are known as_______(3words)
- / ______encryption systems use the same key to encrypt communications and to decrypt communications?
- / If an organization asks you to disclose your social security number, but decides to use it for a different purpose than the one stated in the organization's privacy policies, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / _______certificate is a electronic document that certifies the identity of the owner of a
- / In a private key system the sender and the receiver have the same key, and in the public key system they have two ________keys.
- / If an organization asks you to disclose your date of birth and your address, but refuses to let you review or correct the information you provided, the organization has likely violated which of the Generally Accepted Privacy Principles?
14 Clues: / _________encryption and hashing are used to create digital signatures. • / A process that takes plaintext of any length and transforms it into a short code. • / One way to circumvent the counterfeiting of public keys is by using a ________(2words) • / _______certificate is a electronic document that certifies the identity of the owner of a • ...
Chapter 10 Security Plus 2024-03-21
Across
- tool that provides a visual representation of the wireless signal
- uses digital certificates for authentication
- An in-depth examination and analysis of a WLAN site
- usage in contactless payments
- An EAP method designed to simplify the deployment of 802.1x
- web page that is displayed to users when they attempt to access a public network
- accesses unauthorized information from a Bluetooth connection
- A wireless attack in which false deauthentication
Down
- securely tunnels any credential form for authentication using TLS
- sends unsolicited messages to Bluetooth-enabled devices
- The encryption protocol used for WPA2
- standards used to transmit information from tags to a proximity reader
- A framework for transporting authentication protocols
- A wireless technology that uses short-range radio frequency
- An unauthorized AP that allows an attacker to bypass many of the network security
- Intentionally flooding the radio frequency spectrum
- An AP set up by an attacker to mimic an authorized AP
17 Clues: usage in contactless payments • The encryption protocol used for WPA2 • uses digital certificates for authentication • A wireless attack in which false deauthentication • An in-depth examination and analysis of a WLAN site • Intentionally flooding the radio frequency spectrum • A framework for transporting authentication protocols • ...
Security Plus Chapter 6 2024-03-11
Across
- Circumventing the installed built-in limitations on Apple iOS devices
- facilitates communication between devices and the cloud
- coverage area is divided into hexagon-shaped cells
- OS that guarantees real-time applications a certain capability within a specified deadline
- A coding technique for accounting for errors
- make a real-time operating system more resilient to attacks
- Downloading unofficial and unapproved apps
- testing software before the source code is compiled
- refers to integrating security into the application
Down
- The ability to resist attacks
- ensuring timely and reliable access to devices
- instrumentation used for industrial process control
- involves isolating sensitive enterprise data
- Examining code after the source code
- security constraint in which a device’s small size results in low processing
- A system that controls multiple industrial control systems (ICS)
- Tools that allow a device to be managed remotely by an organization
17 Clues: The ability to resist attacks • Examining code after the source code • Downloading unofficial and unapproved apps • involves isolating sensitive enterprise data • A coding technique for accounting for errors • ensuring timely and reliable access to devices • coverage area is divided into hexagon-shaped cells • instrumentation used for industrial process control • ...
Foxtrot | Crossword 2024-09-03
8 Clues: Tests on patients • Asylum Security team • Patient Transfer zone • Area with patient cells • Special Operations team • Keycard that opens all doors • Responds in case of emergencies • More dangerous patients are placed here
Vocabulaire Voyage 2016-04-28
20 Clues: aisle • to land • to rent • platform • billboard • round trip • to take off • waiting room • baggage claim • to go through • there is room • ticket window • boarding pass • baggage check • security check • customs officer • check-in counter • to check (luggage) • to get (nous form) • to punch (a ticket)
Spotlight 8 7A I don't believe this! 2017-05-09
31 Clues: jo • koe • kuva • sivu • arvata • viesti • halaus • luvata • suukko • edessä • rehtori • puhelin • juliste • kiusaaja • ulkonäkö • onnistua • molemmat • oppitunti • salaisuus • skandaali • häpeissään • kateellinen • valehtelija • turvallisuus • ilmoitustaulu • suostumus,lupa • roska,pötypuhe • epäystävällinen • persoonallisuus • liittyä seuraan • pyytää anteeksi
Crossword Ch. 9,10,11 2012-12-18
22 Clues: tent • left • slice • carrot • to show • counter • fastened • to stretch • human body • im coming! • to bargain • early riser • to have fun • overhead bin • occasionally • store window • market stall • departure time • takeoff(plane) • tube of toothpaste • to take(shoe size) • to go through security
20pt Crossword 2013-02-13
20 Clues: sled • gears • money • fill up • a person • a liquid • win back • not hurt • a choice • draw back • go beyond • take apart • 2 door car • paved roads • keep guarded • keeping clean • motor or engine • the panel of a car • protect from loosing • one street over anther
Week 6 Spelling 2021-11-19
20 Clues: huge • fortress • agreement • calculate • harmonious • collarbone • attractive • small ring • small group • work together • split asunder • limit, confine • tooth on a wheel • brief and compact • climb by crawling • forming of an idea • that which completes • having a common center • relating to highest point • security given for a loan
Redbridge Tuition - Vocabulary - Similar Meanings 1 2021-12-09
25 Clues: calm • clear • pause • funny • oppose • former • trained • hesitant • argument • scarcity • security • willingly • well-known • unhappiness • self-centred • hopelessness • unrestrained • tire or burn • misty or smoky • impoverishment • musty or unfresh • normal or average • disagree or object • indigenous or local • cheapskate or skinflint
17실력 2023-11-17
26 Clues: 관광 • 비행 • 보험 • 여권 • 비자 • 풍경 • 기념품 • 시차증 • 목적지 • 해외로 • 탑승하다 • 전세계에 • 예약하다 • 신청하다 • 출발하다 • 안전 보안 • 수하물 짐 • 풍경(l-) • 착륙하다 땅 • 수표 점검하다 • 안내원 종업원 • 취소하다 취소 • 일정표 여행일기 • 주장 청구 요구하다 • 지연 연기 연기하다 • 멀리가는 여정 여행
On the Go 2 Unit 4 Start 2023-11-28
Across
- sisäänkirjautuminen
- lähteä(esim.lento)
- asemalaituri
- itsepalvelu
- matkustaja
- lento
- istuinpaikka
- satama
- vaunu
- kone
- matkatavarat
- lähtevät
- kolikkoautomaatti
- juna
- matkatavarat
- tulli
Down
- kuulutus
- tarkastus
- saapuvat
- tullata
- turvallisuus
- lautta
- kyltti
- junavirkailija
- matkustamohenkilökunta
- matkalippu
- maihinnousukortti
- portti
- valmis
- matkalaukku
30 Clues: kone • juna • lento • vaunu • tulli • lautta • kyltti • satama • portti • valmis • tullata • kuulutus • saapuvat • lähtevät • tarkastus • matkustaja • matkalippu • itsepalvelu • matkalaukku • asemalaituri • turvallisuus • istuinpaikka • matkatavarat • matkatavarat • junavirkailija • maihinnousukortti • kolikkoautomaatti • lähteä(esim.lento) • sisäänkirjautuminen • matkustamohenkilökunta
HHSC IT Crossword 2020-07-13
21 Clues: news • DCIO • phone • Blanco • Portal • network • IT guys • support • Reset your • social media • chief of staff • device refresh • all agency news • Risk assessment • virtual meetings • Upload your files to • update your timesheet • you can find it on our • culture and engagement • collection of programs • to access your work computer
22a 2024-06-22
Across
- Supply officer
- Elite infantry
- Expeditionary force
- Training NCOs
- Medical unit
- Heavy weapon operators
- Ground unit officers
- Ground troops
- Communications unit
Down
- Helicopter operator
- Heavy aircraft crew
- Maritime security
- Battlefield builders
- Longrange marksmen
- Cannon crew
- Armored vehicle crew
- Scouting team
- Armed police
- Jet pilot
- Elite naval unit
20 Clues: Jet pilot • Cannon crew • Armed police • Medical unit • Scouting team • Training NCOs • Ground troops • Supply officer • Elite infantry • Elite naval unit • Maritime security • Longrange marksmen • Helicopter operator • Heavy aircraft crew • Expeditionary force • Communications unit • Battlefield builders • Armored vehicle crew • Ground unit officers • Heavy weapon operators
SUMMARY 2023-06-14
Across
- popyt
- giełda papierów wartościowych
- pożyczkodawca
- akcja
- pracodawca
- wypłata pracownika fizycznego
- gospodarstwo domowe
- rynek pracy
- negocjować
- podaż
- ubezpieczenie
- wypłacać (pieniądze)
- podatek
- przedsiębiorca
Down
- pracownik
- hipoteka
- nakładać podatek
- konsument
- nabywać
- papier wartościowy
- rachunek (np. bankowy)
- dotacja
- etyka
- obligacja
- lokata
- rekrutacja
26 Clues: popyt • akcja • etyka • podaż • lokata • nabywać • dotacja • podatek • hipoteka • pracownik • konsument • obligacja • pracodawca • negocjować • rekrutacja • rynek pracy • pożyczkodawca • ubezpieczenie • przedsiębiorca • nakładać podatek • papier wartościowy • gospodarstwo domowe • wypłacać (pieniądze) • rachunek (np. bankowy) • giełda papierów wartościowych • wypłata pracownika fizycznego
Browsing safely 2025-06-18
Across
- illegal entry into a computer system
- act of harassing someone using a internet
- criminal activity used to harm someone with a internet connection
- it scans,prevent and destroy viruses
- the receiver of a message is fooled
- it can carry out cyber extortion
- prevents unauthorised access
- a program or a set of programs
Down
- fraudsters pretend to bank or financial organisation
- unethical hackers who steal personal information and do fraudulent tasks
- two step authentication involves this word and your password
- act of sending an email to mislead him to steal his information
- antivirus developed by
- an impression created when you visit a website
- a major threat for people who use internet for online shopping,cash transactions and bank services
15 Clues: antivirus developed by • prevents unauthorised access • a program or a set of programs • it can carry out cyber extortion • the receiver of a message is fooled • illegal entry into a computer system • it scans,prevent and destroy viruses • act of harassing someone using a internet • an impression created when you visit a website • ...
Chapter 2 2021-11-30
Across
- a bank account used by depositors to accumulate money for future use
- another type of stock exchange
- those who do the work
- info provided by public companies
- market place where stocks are bought and sold mostly online where there is no central building
- someone who assists you with purchasing stocks and bonds
- central bank of the US
- handles stock sales and purchases
- another name for futures
- type of company where shares can be traded openly
- need to pay for security purchases within three business days or order
- an example of a lender
- establishes and enforces regulations which protect the investing public from unfair practices in the securities markets
- type of bond with the longest maturity
Down
- issues of a stake of ownership in a company
- term generally uses to refer to putting money aside in order to make your money grow
- limited liability for shareholders
- example of low risk/low reward
- buy or sell when the stock reaches a certain price
- biggest stock exchange
- people who lend money to a business for a fixed rate of interest
- type of company where shares are not sold publicly
- a financial statement issued a corporation, government, or other organization
- for sophisticated investors who borrow money to purchase securities
- a security that pays interest over terms ranging from two to ten years
- tax-free bonds
- money for real estate equipment, and others
- document guaranteeing payment of a specific amount of money
28 Clues: tax-free bonds • those who do the work • biggest stock exchange • central bank of the US • an example of a lender • another name for futures • another type of stock exchange • example of low risk/low reward • info provided by public companies • handles stock sales and purchases • limited liability for shareholders • type of bond with the longest maturity • ...
Investment Strategies Chapter 2 2021-11-30
Across
- shares can be traded publicly
- letters assigned to bonds by rating agencies
- a type of debt security that is issued by a firm and sold to investors
- ticker symbol
- preferred dividends not paid in previous periods must be paid before common dividends can be paid
- a security issued by or on behalf of a local authority
- generally fixed like debt based on the par value
- preferred stockholders are paid before common stockholders
- stockholders buy and sell shares of stock from one another with the help of brokers
- the nominal or face value of a stock or bond
- analysis of the companies stock, its price, price movement, trading volume, etc
Down
- taking measures to make money grow
- cash payments declared and paid by corporations to stockholders
- long term bonds sold by the US government
- no specific maturity date
- selling stocks and bonds directly to public investors
- price earnings ratio
- what investing can help you beat
- putting money aside so it will be available when you need it
- money for real estate, equipment, and so on
- analysis of the company itself, its operations, its position within its industry
- The accounting value of the common equity of a corporation as shown on the balance sheet
- an equity security representing the ownership interest in a corporation
- those people that do the work
- type of stock market return
- dollar amount of annual dividend per share
26 Clues: ticker symbol • price earnings ratio • no specific maturity date • type of stock market return • shares can be traded publicly • those people that do the work • what investing can help you beat • taking measures to make money grow • long term bonds sold by the US government • dollar amount of annual dividend per share • money for real estate, equipment, and so on • ...
Investment Unit 2024-03-20
Across
- when value of stocks in the market plummet
- medium of exchange for goods and services
- the max amount of money you put into an IRA yearly
- distribute company earnings to shareholders
- system that makes it hard to track or hack info
- A company might _____ you when you put money into a 401k
- percent of 18-29 year olds who invest in crypto
- age to get extra social security benefits
- to put money into stocks and bonds
- most popular cryptocurrency on the market
- type of currency that only exists online
- factor affects company from inside source
- when you take money out of an account
- age to collect social security benefits
Down
- how big the company is in the stock market
- account where you can put in money to slowly grow
- the amount of money held in an account
- account created for unexpected events/bills
- age to invest in Cryptocurrency
- type of IRA you put money in after it's taxed
- represents ownership of a part of a company
- agreement to provide compensation if damages occur
- regular payment from your job once you retire
- Currency that is backed by the government
- a sum of money saved/made available for you
- offering private corporate shares to public
- represents a loan from the buyer to company
- payroll tax that funds Social Security and Medicare
- you can _______ your 401k funds to a new plan or an investment account
- manages the performance of many securities
30 Clues: age to invest in Cryptocurrency • to put money into stocks and bonds • when you take money out of an account • the amount of money held in an account • age to collect social security benefits • type of currency that only exists online • medium of exchange for goods and services • age to get extra social security benefits • Currency that is backed by the government • ...
Business Math Unit 4 Vocab 2025-12-15
Across
- a currency for which the government guarantees the value
- a document guaranteeing payment of a specific amount of money either on demand or within a designated time
- borrower
- lender
- a government backed security payable in a year or less
- property or assets used to secure a loan
- a security with terms of 10-20 years
- a method of payment must be accepted for public and private debts
- the ranking of a credit history on a point scale between 300 and 850
- the government institution that provides insurance for depositors in insured banks
- the process of transferring money from one individual or organization to another
Down
- the annual cost of credit
- a government backed security payable in 2 - 10 years
- a record of a borrower's payment of debt
- debt without collateral
- an agreement between two parties in which one provides goods and services understanding that payment will be made at a later date
- a loan with collateral
- the portion of a loan that is interest, or money paid to the borrower
- a table detailing how much interest and how much of the principle is being paid back every month
- a report that details credit history and financial behavior of companies and individuals
- moving a payment from the account of the payer directly to that amount of the recipient
- the mechanism used by a nation to provide and manage its money
- a general increase in prices and decline in the purchasing power of money
23 Clues: lender • borrower • a loan with collateral • debt without collateral • the annual cost of credit • a security with terms of 10-20 years • a record of a borrower's payment of debt • property or assets used to secure a loan • a government backed security payable in 2 - 10 years • a government backed security payable in a year or less • ...
Unit4 2020-12-31
Moritz Quiz 2021-02-01
Security 2014-03-04
5 Clues: being recognised via your iris • being recognised via your voice • being recognised via your fingers • being recognised via unique features • selective restrcition of access to a resource
Security 2022-05-16
Across
- An attacker goes to a local coffee shop and creates a wireless network using the shop’s name, hoping unsuspecting customers will log on. What is this type of attack called?
- In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD
Down
- You should not just check identity, you should also confirm
- when a container runs in this mode, it is granted most system capabilities available on the host
- After clicking an advertisement on an unsecure website, your computer freezes. A message appears, demanding you pay a certain amount of money to unlock your computer. What is this type of attack called?
5 Clues: You should not just check identity, you should also confirm • when a container runs in this mode, it is granted most system capabilities available on the host • In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD • ...
Security 2022-09-09
5 Clues: Example of Abstract Role • default access available to all users • Manage application security in your Oracle Applications Cloud • represent the individual duties that users with those job can perform • Controls access to user interfaces and actions needed to perform the tasks of a job
Security 2022-09-09
5 Clues: Example of Abstract Role • default access available to all users • Manage application security in your Oracle Applications Cloud • represent the individual duties that users with those job can perform • Controls access to user interfaces and actions needed to perform the tasks of a job
Tek ko (Part 4: Tek ko and Ryan mo) 2023-03-15
Across
- "Traffic ____"; due to large volume of vehicles
- color of a retriever or the arches of Mcdo symbol
- One of the off-shore provinces of Bicol
- Denoting or served in a cheese-flavoured white sauce
- ___ and the Bear; Russian animated series
- The great white shark in Finding Nemo
- A dozen
- Brand of toy blocks
- ___ me-not; bright purple flowers
- animal symbol of USA
- Ebony and ___; collab hits of McCartney and Wonder
- 'XLV - XXV' in Arabic numerals
- Chair and Director of UQ Cyber Security at the University of Queensland, Australia
- Talk at length, typically about trivial matters
- The second letter of the Hebrew alphabet
- Volleyball player position
- Powdered chocolate drink
- Rene ____; tennis great with grand slams in French and US Open and Wimbledon from 1925-1929
- .."Oh, __ __ __ more today than yesterday".. by the Spiral Starecase
- Originally called as Facebook chat
- Day-Lewis or Craig or Padilla
- one of two children or animals born at the same birth
- word attached with gin, tail, seed or bud
Down
- Grass in Kankanaey
- Continuing without pausing
- An enthusiastic devotee of a specified thing or activity (eg drugs)
- other word for logo, trademark, label or emblem
- month of Santacruzan
- Philippine jasmine
- App for free calls and messaging
- ___ Fools' Day
- Shangrila or Marina Bay Sands or The Peninsula
- a number that looks like infinity
- City and municipal seat in Baja California Sur, on the West Coast of Mexico
- Domingo de ___; First bishop of the Philippines
- Rudy ___; Filipino actor or Spanish NBA player
- Square of 5 and 1
- Spanish name meaning "destroyed by horses"
- summit or highest point
- Bacon in Spanish
- ..."__ __ __ like the sun misses the flower..."; Letter in the film A Knight's Tale
- Month named after Julius Caesar
- French name meaning harvester or guardian
- sides of a square or the Evangelists or lucky leaf clover
- Just Got ___ by Joe Boxers
- The Philippine ___; broad sheet with tag line "Truth Shall Prevail"
- a defender, protector, or keeper (eg angel)
- ___-kagi; A variant of the weapon whose shape has four iron nails like bear claws attached to a metal ring
48 Clues: A dozen • ___ Fools' Day • Bacon in Spanish • Square of 5 and 1 • Grass in Kankanaey • Philippine jasmine • Brand of toy blocks • month of Santacruzan • animal symbol of USA • summit or highest point • Powdered chocolate drink • Continuing without pausing • Volleyball player position • Just Got ___ by Joe Boxers • Day-Lewis or Craig or Padilla • 'XLV - XXV' in Arabic numerals • ...
Web Ethics and Safety 2023-08-22
Across
- a person who looks for other people in order to use, control, or harm them in some way.
- the action or practice of sending sexually explicit photographs or messages via mobile phone.
- the unauthorized use or reproduction of another's work.
- a phone with access to a cellular radio system so it can be used over a wide area, without a physical connection to a network; a mobile phone.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- (of software) designed to detect and destroy computer viruses.
- the condition of being protected from or unlikely to cause danger, risk, or injury.
- the systematic investigation into and study of materials and sources in order to establish facts and reach new conclusions.
- a dishonest scheme; a fraud.
- the unauthorized use or reproduction of another's work.
- a person who uses computers to gain unauthorized access to data.
- a person who habitually seeks to harm or intimidate those whom they perceive as vulnerable.
Down
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- (of a device) having or operating with the aid of many small components, especially microchips and transistors, that control and direct an electric current.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a device that forwards data packets to the appropriate parts of a computer network.
- existing, occurring, or carried on between two or more nations.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- the practice of taking someone else's work or ideas and passing them off as one's own.
- the state of being free from danger or threat.
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- a danger or risk.
25 Clues: a danger or risk. • a dishonest scheme; a fraud. • the state of being free from danger or threat. • the unauthorized use or reproduction of another's work. • the unauthorized use or reproduction of another's work. • (of software) designed to detect and destroy computer viruses. • existing, occurring, or carried on between two or more nations. • ...
Español 2014-10-06
Spring 2024 Firm Meeting 2024-03-12
Across
- something PWA advisors help client protect
- one approach our tax controversy team takes with the IRS
- with x, a tax credit for manufacturing or product improvement Development see x
- investigating, often in fraud or legal situations
- a service that several departments have in their names
- where most of the firm’s new business is originated
- Managed blank Technology
- something BayBridge Real Estate Capital helps clients manage, find or refinance
- clue
- a type of business that gives back to the community, we do their taxes and audits
- an area of tax that especially impacts clients with operations in multiple states
- planning how PWA creates a comprehensive approach
- part of the name of several affiliates
- what many of our MST services entail
- a charity event the firm teams have contributed $2 million to since it started 14 years ago
- an activity that often uses talents from a variety of departments
- clue
- present blank analysis
- an area that helps HNW people manage their financial lives
Down
- what every company and high net worth family needs
- a lifechanging client event we can help with from planning to tax preparation to estate planning
- a governmental agency that scares of our clients but not us
- a specialty area of PWA
- a software platform MST helps implement at companies
- a type of entity that provides tax benefits for manufacturers and distributors that expert products
- a special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- an acronym for solving repetitive tasks with robotics
- tax one of the firm’s key service areas
- diversity, equity and blank
- firm members speak in practice in more than this many languages
- estate the area of tax services BPB is probably most famous for
- the largest group in the firm and a typical entry point for multiple services
- how our HR departments help clients
- clue
- a special type of audit for public companies
- what we all aspire to do
- a core value brought to life by our participation in the DCC and Bounce Back from Cancer
- an acronym for a special type of insurance that is tax mitigation tool
- clue
- assessment what assurance and cyber teams often do
40 Clues: clue • clue • clue • clue • present blank analysis • a specialty area of PWA • Managed blank Technology • what we all aspire to do • diversity, equity and blank • how our HR departments help clients • what many of our MST services entail • part of the name of several affiliates • tax one of the firm’s key service areas • something PWA advisors help client protect • ...
CM-BCMS 2025-04-04
Across
- Harmful software that infiltrates and disrupts systems
- A sudden event causing disruption or harm to operations
- Fraudulent phone calls designed to extract sensitive details
- Analyzing potential risks to prepare for future challenges
- A critical situation requiring urgent decision-making
- Framework ensuring operations continue despite challenges.
- Potential actions that compromise digital safety
- A technique used to take advantage of system vulnerabilities
- Interconnected systems for sharing resources and information
- A state of readiness to effectively manage crises
- The process of converting information into secure code
Down
- Verifying a user’s identity to ensure security
- The capacity to adjust quickly to changing situations
- Steps taken to reduce the impact of potential risks
- Restoring critical business operations after a crisis
- The ability to adapt and recover during disruptions
- A security barrier protecting networks from external threats
17 Clues: Verifying a user’s identity to ensure security • Potential actions that compromise digital safety • A state of readiness to effectively manage crises • Steps taken to reduce the impact of potential risks • The ability to adapt and recover during disruptions • The capacity to adjust quickly to changing situations • ...
M7 Crossword Puzzle 2024-10-22
Across
- The process of converting data into a code to prevent unauthorized access.
- Rights Management (DRM) Technologies that control the use of digital content, preventing unauthorized distribution.
- on Security Investment (ROSI) A calculation that compares the value gained from security measures with the cost.
- A copy of data stored separately to prevent loss in case of a system failure.
- Rights granted to users to perform specific actions, such as reading or editing files.
- A system that monitors and controls incoming and outgoing network traffic to protect against threats.
- Actions taken to reduce risk or lessen the impact of potential threats.
Down
- A legal right that gives the creator of an original work exclusive rights to its use and distribution.
- A symbol, word, or phrase legally registered to represent a company or product.
- Account Control (UAC) A security feature in Windows that requires administrative approval before making changes.
- Breach The unauthorized access and retrieval of sensitive information.
- Visualization The graphical representation of data to make it easier to understand.
- Assessment The process of identifying and evaluating risks to minimize potential harm.
- An exclusive right granted for an invention, providing protection for a limited period.
- The process of setting up software on a device.
- Availability Ensures systems remain operational without downtime.
- Tolerance Technology that ensures a system remains operational even if part of it fails.
17 Clues: The process of setting up software on a device. • Actions taken to reduce risk or lessen the impact of potential threats. • The process of converting data into a code to prevent unauthorized access. • A copy of data stored separately to prevent loss in case of a system failure. • A symbol, word, or phrase legally registered to represent a company or product. • ...
The Kieronasaurus Krossword 2018-01-03
Across
- Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
- Data collected by you yourself.
- An information classification expressed as numbers only.
- Triad
- Defined as direct physical threat to a country, but could also be a threat to financial security.
- amount of data protection principles.
- footprint Any traceable action you or others take on the internet
- Computer hardware that cannot be moved
Down
- Attack on a business's servers not only impacts on the business or individual it holds data for
- Announcements or adverts. Small amounts of information sent easily.
- the ability to change the displayed content.
- The amount of information that can be held.
- Raw facts and figures.
- Canada's data protection legislation.
- The language that websites are written in
- A closed, private network within a building or company.
16 Clues: Triad • Raw facts and figures. • Data collected by you yourself. • Canada's data protection legislation. • amount of data protection principles. • Computer hardware that cannot be moved • The language that websites are written in • The amount of information that can be held. • the ability to change the displayed content. • ...
Globalisasi Bidang Kriminalitas (Najla Meuthya Okri F2.5) 2024-09-17
Across
- penyalahgunaan informasi untuk mendapatkan keuntungan yang tidak sah
- kejahatan yang tidak melibatkan korban
- proses kriminalitas yang pelaku mulai melaksanakan aksi kriminalitas yang telah direncanakan
- proses yang melibatkan pemalsuan uang dan dokumen secara ilegal
- Aktivitas kriminalitas yang melibatkan perdagangan manusia
- gejala terjadi nya kriminalitas perdagangan internasional merupakan bentuk dari bidang
- Sistem hukum internasional yang mengatur peradilan terhadap kejahatan transnasional
Down
- proses menjual atau mendistribusikan narkoba secara ilegal
- organisasi internasional yang berupaya memberantas kriminalitas global
- penggunaan internet untuk mengirim spam atau virus untuk tujuan jahat
- Tahap pertama dari kriminalitas
- istilah untuk penipuan yang dilakukan dengan mengelabui orang melalui medsos
- teori kriminalitas yang dikemukakan oleh Emile durkheim
- jenis kejahatan yang dilakukan di dunia Maya
- singkatan yang umum digunakan untuk globalisasi kriminalitas dalam konteks internasional
15 Clues: Tahap pertama dari kriminalitas • kejahatan yang tidak melibatkan korban • jenis kejahatan yang dilakukan di dunia Maya • teori kriminalitas yang dikemukakan oleh Emile durkheim • proses menjual atau mendistribusikan narkoba secara ilegal • Aktivitas kriminalitas yang melibatkan perdagangan manusia • proses yang melibatkan pemalsuan uang dan dokumen secara ilegal • ...
Collocations 2023-04-06
12 Clues: errors • issues • updates • systems • problems • to tickets • user requests • troubleshooting • software systems • technical support • security measures • customer complaints
Puzzle 2014-01-07
ACE 2023-06-22
Across
- 16th president of the United States.
- One of the founders of the ACE program.
- One of the principles of war. Enough said.
- Founded by Billy Mitchel in 1947.
- Used for safety in mines and computers.
- One of the principles of war. Place the enemy in a disadvantageous position through the flexible application of combat power.
- Bad for your drink and computer memory.
- The Civil war general that the base of US cyber command is named after.
- 5+5=A in this number system.
- Splinter. Alternatively, a popular red team tool developed by Bishop Fox.
- One of the principles of war. Strike the enemy at a time or place or in a manner for which he is unprepared.
- The hall the ACE interns stay in.
- The location of what is often considered the turning point of the Civil War.
- One of the principles of war. Direct every military operation toward a clearly defined, decisive, and attainable objective.
- Is not an option.
- One of the principles of war. Never permit the enemy to acquire an unexpected advantage.
- Following through with what you say you're going to do. One of the ACE core values.
- What leaders are.
Down
- Common mammal that inhabits Rome.
- Being a master of your craft. One of the ACE core values.
- The name of a hidden website on the ace battlefield.
- Doing what's right, even in the face of personal peril. One of the ACE core values.
- The nation that won the most in 2020 ACE capstone.
- Home of the colosseum.
- One of the principles of war. Seize, retain, and exploit the initiative.
- Operating system used for ACE this summer.
- Second year interns who return to help with the program.
- Superuser do. Alternatively, the name of an adorable corgi.
- & development.
- Number of miles ACE interns run every week.
- 1+1=10 in this number system.
- Programming language made by Google. Used on the ACE battlefield.
- The last step of the PBED.
- One of the principles of war. Defined as: concentrate the effects of combat power at the decisive place and time.
- Giving people what they need, when they need it. One of the ACE core values.
35 Clues: & development. • Is not an option. • What leaders are. • Home of the colosseum. • The last step of the PBED. • 5+5=A in this number system. • 1+1=10 in this number system. • Common mammal that inhabits Rome. • Founded by Billy Mitchel in 1947. • The hall the ACE interns stay in. • 16th president of the United States. • One of the founders of the ACE program. • ...
IR - Module 1 2024-12-05
Across
- US and ----- were the superpowers emerged after WWII
- The period from 1945-1991
- The IGO formed after WW 2
- This level of IR analysis states that single countries can influence IR
- The process of managing / governing people in a place.
- The treaty to punish Germany is
- The relationship between nation states is called
- The second name of the person behind systems theory.
- Promote peace and security among nations, Kill evils in the society.
- Looting one country by another country is
Down
- Treaty of ---- was signed on 1648
- ..... conference was held in 1919 Jan
- The process of making slaves and setting empire is called
- The treaty to end war on Spanish succession was ..... treaty.
- Germany, Austria-Hungary, Italy
- German ruler during WW I
- Nation security is a matter of importance and selfishness
- This level of IR analysis says that a single person can influence in IR
18 Clues: German ruler during WW I • The period from 1945-1991 • The IGO formed after WW 2 • Germany, Austria-Hungary, Italy • The treaty to punish Germany is • Treaty of ---- was signed on 1648 • ..... conference was held in 1919 Jan • Looting one country by another country is • The relationship between nation states is called • US and ----- were the superpowers emerged after WWII • ...
Diary Of A Wimpy Kid 2024-04-11
Across
- what did Greg want to do for Christmas?
- what did mom and dad always do?
- what did Greg want to swim with at the beach
- What kept Greg awake?
- What did Greg think he swallowed in the water?
- Who helped Greg escape security?
- How did the Heffley's get to Isla de corales?
- What did Manny steal from the beach?
- What happened to the banana raft?
Down
- When did the Heffley's leave their home?
- How did they find out about the resort?
- what did the Heffleys steal from the security to run away?
- when should have the Heffley's left to get to the airport
- what would Greg rather do then go on vacation?
- who is the author?
- what did the Heffley's grab the wrong of
- What kind of animal was at the resort bar?
- Who is the main character?
18 Clues: who is the author? • What kept Greg awake? • Who is the main character? • what did mom and dad always do? • Who helped Greg escape security? • What happened to the banana raft? • What did Manny steal from the beach? • How did they find out about the resort? • what did Greg want to do for Christmas? • When did the Heffley's leave their home? • ...
Confidentiality test 2025-02-06
Across
- Data records of an employee’s performance on the job such as performance reports,
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of espionage conducted for commercial purposes rather than security;
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
- in the Workplace keeping employee, customer and client information private
Down
- work history, date of birth, social security number, criminal record,
- religion, etc.
- information
- insurance information
- Espionage
- Data information which may arise from employment-related physicals, drug tests and
12 Clues: Espionage • information • religion, etc. • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • of espionage conducted for commercial purposes rather than security; • work history, date of birth, social security number, criminal record, • ...
Cyber Safety 2022-02-10
7 Clues: How to stay safe online • Never share this online • Do not talk to these people • Don't fall for these online • What is left behind after going online • Can show lots of information in the background • Ensure they are strong so you don't get hacked
Cyber Bullying 2022-03-23
7 Clues: a place to research • Being rude to someone • a source of technolgy • not being kind to someone • something every local place has • online site to send and receive • a way of contacting friends and family
Cyber Mobbing 2016-02-08
Across
- B ... sichern, damit deine Geschichte glaubhaft ist.
- S ... Die beharrliche Verfolgung einer Person.
- D ... Daten einer Person zu verändern, zu löschen oder unbrauchbar zu machen.
Down
- S ... Nutzerinnen/Nutzer die Dich belästigen.
- Die Belästigungen finden rund um die Uhr und im Internet statt.
- B ... In der Öffentlichkeit eine Person zu beschimpfen oder zu verspotten.
- N ... Jemand anderen mit Gewalt oder durch gefährliche Drohung zu einer Handlung anstiften.
7 Clues: S ... Nutzerinnen/Nutzer die Dich belästigen. • S ... Die beharrliche Verfolgung einer Person. • B ... sichern, damit deine Geschichte glaubhaft ist. • Die Belästigungen finden rund um die Uhr und im Internet statt. • B ... In der Öffentlichkeit eine Person zu beschimpfen oder zu verspotten. • ...
Cyber Crimes 2017-01-24
7 Clues: online harrasment • floods the bandwidth • Crimes using computers • counterfeiting products • disguising as trustworthy • Program that copies itself • gaining unauthorized access
Cyber Bullying 2021-06-03
7 Clues: When you don't feel safe • How you treat others nicely • People who watch a situation • When you are influenced to do something • When you ask your parent for permission • A place where you can communicate with technology • Communicate with people online and sharing photos
Cyber Test 2024-06-18
Across
- Il processo di codificare le informazioni per proteggerle dagli accessi non autorizzati
- Un metodo di verifica dell'identità che richiede due forme di identificazione
- Programma che registra segretamente le sequenze di tasti premuti su una tastiera
Down
- Tecnica di attacco che utilizza email fraudolente per rubare informazioni sensibili
- Attività illegale di ottenere accesso non autorizzato a sistemi informatici
- Software dannoso progettato per danneggiare o disabilitare computer e sistemi
- Una rete di computer infettati da malware controllati da un singolo attaccante
7 Clues: Attività illegale di ottenere accesso non autorizzato a sistemi informatici • Software dannoso progettato per danneggiare o disabilitare computer e sistemi • Un metodo di verifica dell'identità che richiede due forme di identificazione • Una rete di computer infettati da malware controllati da un singolo attaccante • ...
Cyber Puzzle 2025-01-28
Across
- A secret word or phrase used to access a system.
- A copy of important data to restore in case of loss.
- Someone who tries to break into computer systems.
Down
- A type of malicious software that spreads between computers.
- Unwanted or unsolicited emails.
- A system that protects a network from unauthorized access.
- A fraudulent attempt to steal sensitive information.
7 Clues: Unwanted or unsolicited emails. • A secret word or phrase used to access a system. • Someone who tries to break into computer systems. • A copy of important data to restore in case of loss. • A fraudulent attempt to steal sensitive information. • A system that protects a network from unauthorized access. • ...
Cyber Clues 2025-01-22
Across
- Creating a step-by-step series of commands for a computer to follow
- A character or image that can be created and programmed to move, appear, and make sounds
- Ability to use digital tools effectively
- Simplifying complex problems by removing non- essential details
Down
- A category of blocks (yellow) that starts the event
- Breaking a problem into smaller, manageable parts
- Visual Block-based programming language for young learners
7 Clues: Ability to use digital tools effectively • Breaking a problem into smaller, manageable parts • A category of blocks (yellow) that starts the event • Visual Block-based programming language for young learners • Simplifying complex problems by removing non- essential details • Creating a step-by-step series of commands for a computer to follow • ...
Immigration 2025-08-29
14 Clues: bot • søke • stans • utsatt • bestå av • folketrygd • skaffe seg • stå overfor • presidentmakt • fødselsattest • rettskjennelse • få tilgang til • arbeidstillatelse • oppholdstillatelse
September 2021 Newsletter Crossword Puzzle 2021-08-30
Across
- A password attack that attempts to guess passwords using a powerful computer.
- A malicious program that replicates itself in the infected computer’s memory and spreads.
- A type of authentication that combines two or more credentials such as what one knows (a password), what one has (PIV), and/or what the user is (biometric verification).
- A cyberattack that uses a list of usernames from a data breach and a list of the top used passwords to test a large number of accounts until the accounts are accessed.
- A chain of 3 - 4 words that are easy to remember, but long and complex enough to be secure.
- A password cannot be reused by a Forest Service employee that was used in the last <how many> passwords.
Down
- A type of password attack where the cyber attacker uses a stuffing approach with usernames and passwords obtained from a data breach to access other accounts.
- A cyber attacker uses a strong computer to try every word in a type of vocabulary/reference book to guess a password.
- A type of malware that is installed on a user’s computer without their knowledge to monitor the user’s computer and activity to collect information.
- A string of characters that protect access to your computer and software applications from unauthorized users.
10 Clues: A password attack that attempts to guess passwords using a powerful computer. • A malicious program that replicates itself in the infected computer’s memory and spreads. • A chain of 3 - 4 words that are easy to remember, but long and complex enough to be secure. • ...
gameshop 2014-05-19
16 Clues: chaos • score • manure • express • discharge • hereditary • about to be • tree hugger? • loose change • go ballistic • puzzle seller • e.g. rent-a-cops • ex. Chucky Cheese • a rubrik wheel-runner? • Florence and the _____ • a continuous transporter
TUGAS BK 2024-02-05
Across
- bullying yang melibatkan penggunaan kata-kata untuk menyakiti, merendahkan, atau mengintimidasi seseorang adalah bullying Verbal
- mencegah bullying dengan cara menerapkan Edukasi
- dalam media sosial Cyber bullying
- bullying yang menyebabkan peningkatan dan penurunan suasana hati Depresi
- lain dari bullying Perundungan
Down
- mengancam, mempermalukan, mengganggu, memberi panggilan nama, merendahkan, intimidasi, memaki, dan menyebarkan gosip buruk disebut Bullying
- pelaku bullying Bullies
- penelitian bullying Olweus
- bully berasal dari bahasa Inggris
- satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain Iri
10 Clues: penelitian bullying Olweus • pelaku bullying Bullies • bully berasal dari bahasa Inggris • dalam media sosial Cyber bullying • lain dari bullying Perundungan • bullying yang menyebabkan peningkatan dan penurunan suasana hati Depresi • ...
Bullying Crossword Ward 2025-02-03
Across
- Someone who is helpful toward the person being bullied.
- This type of bullying can hurt someone's body.
- Sending someone mean messages over and over.
- The person who someone tries to bully.
Down
- This type of verbal bullying makes someone feel unsafe.
- Someone who does mean things to someone less powerful than them.
- Hurtful words are used in this type of bullying.
- Repeatedly excluding someone to be mean.
- Someone who watches the bullying.
9 Clues: Someone who watches the bullying. • The person who someone tries to bully. • Repeatedly excluding someone to be mean. • Sending someone mean messages over and over. • This type of bullying can hurt someone's body. • Hurtful words are used in this type of bullying. • This type of verbal bullying makes someone feel unsafe. • ...
Unit 11 2023-05-10
High Five 5 kpl 3 2024-10-01
STOP BULLYING 2023-10-19
5 Clues: online bullying • Uses words to hurt someone • Using force to hurt someone • Hurt someone else's relationship • Uses their body to hurt someone else
Cyber Crossword Puzzle v3.1 2020-09-21
Across
- A collection of information that is organized so that it can easily be accessed, managed and updated
- A form of malware that can replicate and spread without the need for human or system interaction. Think of it as malware on autopilot
- gaining unauthorized logical access to sensitive data by circumventing a system's protections
- Never share your _________ with another person
- encrypted form of the message being sent
- The process of converting information or data into a code
- sequence of eight bits
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
Down
- A type of malware that can secretly record a user’s keystrokes and send them to an unauthorised third party
- approval, permission, or empowerment for someone or something to do something
- stripping one llayer's headers and passing the rest of the packet up to next higher layer
- process of confirming the correctness of the claimed identity
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
- Used to describe hacking activity carried out for a political, ethical or societal end
- Files placed on your computer to allow websites to remember details
15 Clues: sequence of eight bits • encrypted form of the message being sent • Never share your _________ with another person • The process of converting information or data into a code • process of confirming the correctness of the claimed identity • Files placed on your computer to allow websites to remember details • ...
Unit 3 Cyber World 2024-03-11
Across
- Everyone is posting ________ of themselves with the Chubby Heart in Central.
- Nelson updated his antivirus program to protech his comuter against _________.
- __________ scams look like they are from familiar websites to steal our personal information.
- Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
- To avoid being a _________ of the scam, always double-check the links and email address.
- We need to set up an anti-________ filter to block those annoying messages.
- Time wanted to get the latest version of the smartphone because it had much better _______ life.
Down
- It is a good idea to keep your personal details __________ on the Internet.
- ________________ may try to download malware to your computer.
- Jenny is completely ___________ on the video games. She played it all day!
- To deal with social media overuse, it is better for you to turn off _____________ on your phone.
- Blind people have special programmes to help them _______ online.
- She's obsessed with the new online novel and can't put it down.
- Governments usually _______ the data on their websites to protect citizens' information.
- ________ is a big problem for singers as people download their music without paying for it.
15 Clues: ________________ may try to download malware to your computer. • She's obsessed with the new online novel and can't put it down. • Blind people have special programmes to help them _______ online. • Jenny is completely ___________ on the video games. She played it all day! • It is a good idea to keep your personal details __________ on the Internet. • ...
Cyber ethics crosswords 76 2025-05-28
Across
- Name used to log into websites or apps
- Secret code to access an account
- Name used to log into a system
- Breaking into a system without permission
- Online bulling or harassment
- rules of right and wrong behavior online
- Blocks unauthorized access to a network
Down
- Software that secretly gathers your information
- theft Stealing someone's personal or confidential data
- Fake emails to steal personal data
- Keeping your personal information safe
- Harmful software that damages systems
- Scrambling data to prevent unauthorized access
- program that spreads and corrupts files
- Protects against harmful programs
- A trick to steal your data or money
16 Clues: Online bulling or harassment • Name used to log into a system • Secret code to access an account • Protects against harmful programs • Fake emails to steal personal data • A trick to steal your data or money • Harmful software that damages systems • Name used to log into websites or apps • Keeping your personal information safe • program that spreads and corrupts files • ...
Social Security Administration 2021-02-09
Across
- stuff you do at a job
- hard work, often physical
- the economic crisis of the 1930s
Down
- jobs given to artists to paint
- Programs to support the good of the people
- breakfast food
- the kind of people most likely to receive social security
- month that Social Security was signed into law
- The President during the 1930s
- The program signed into law by President Roosevelt in 1935
10 Clues: breakfast food • stuff you do at a job • hard work, often physical • jobs given to artists to paint • The President during the 1930s • the economic crisis of the 1930s • Programs to support the good of the people • month that Social Security was signed into law • the kind of people most likely to receive social security • ...
Information Risk Management Date:07/07/2015 2015-07-06
Across
- Potential cause of unwanted event
- form of identity management
- means of managing risk
- combination of likelihood of an event and its impact
- weakness of an asset that can be exploited
- measure of the effect of a security event
Down
- earthquake is a ________ threat
- checking whether the organization has required controls is _____________ audit
- secretly collect sensitive or classified information
- information security program is aligned to _____________ of organization
10 Clues: means of managing risk • form of identity management • earthquake is a ________ threat • Potential cause of unwanted event • measure of the effect of a security event • weakness of an asset that can be exploited • combination of likelihood of an event and its impact • secretly collect sensitive or classified information • ...
Basic Terminologies 2016-06-14
Across
- form of identity management
- weakness of an asset that can be exploited
- information security program is aligned to _____________ of organization
- means of managing risk
- measure of the effect of a security event
Down
- checking whether the organization has required controls is _____________ audit
- Potential cause of unwanted event
- secretly collect sensitive or classified information
- combination of likelihood of an event and its impact
- earthquake is a ________ threat
10 Clues: means of managing risk • form of identity management • earthquake is a ________ threat • Potential cause of unwanted event • measure of the effect of a security event • weakness of an asset that can be exploited • secretly collect sensitive or classified information • combination of likelihood of an event and its impact • ...
National Security Crossword 2025-10-22
Across
- SECURITY Law that helps keep Hong Kong safe.
- The rule makers who decide if the law has been broken.
- Opposite of danger.
Down
- People who follow rules.
- Something that is against the law.
- To protect or keep safe.
- A place where people live and follow laws.
- Rules that everyone must __________.
- A feeling when you are safe.
- What you should always do with laws.
10 Clues: Opposite of danger. • People who follow rules. • To protect or keep safe. • A feeling when you are safe. • Something that is against the law. • Rules that everyone must __________. • What you should always do with laws. • A place where people live and follow laws. • SECURITY Law that helps keep Hong Kong safe. • The rule makers who decide if the law has been broken.
Cold War in Europe 2021-05-05
Across
- U.S. would provide aid to any country fighting communism.
- Leader of the Soviet Union during WWII and cold war
- Churchill's description of invisible barrier
- U.S.policy to stop the spread of communism.
- Stalin uses East European countries his buffer
- East European collective security agreement
Down
- Meeting of the Big Three to discuss post-war europe
- United States economic assistance plan for Europe.
- willingness to go to the brink of war
- Nation New International Organization to keep peace
- West European collective security organization
- U.S. President at Yalta.
12 Clues: U.S. President at Yalta. • willingness to go to the brink of war • U.S.policy to stop the spread of communism. • East European collective security agreement • Churchill's description of invisible barrier • West European collective security organization • Stalin uses East European countries his buffer • United States economic assistance plan for Europe. • ...
Chapter 5 Sonia Hernandez Flores 2019-02-15
Across
- income - an income tax system that imposes tax
- - Done, Produced, or occurring every 2 weeks.
- - Provides the information of your employer needs to determine
- - An individual's Total Gross income minus specific deductions
Down
- include social security, Medicare
- - amount of money received after a period of time
- -subtraction
- Reports - An employees's annual wages and the other amount of taxes withheld
- - Used to report interest income
- - Taxes to fund the social security
- pay - of the types of deductions that may be subtracted from
- pay - amount payed after removed taxes.
12 Clues: -subtraction • - Used to report interest income • include social security, Medicare • - Taxes to fund the social security • pay - amount payed after removed taxes. • - Done, Produced, or occurring every 2 weeks. • income - an income tax system that imposes tax • - amount of money received after a period of time • ...
confidentiality test 2025-02-06
Across
- religion, etc.
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of information
- information
- Data records of an employee’s performance on the job such as performance reports,
- Data information which may arise from employment-related physicals, drug tests and
- insurance information
Down
- actions, supervisory notations
- in the Workplace keeping employee, customer and client information private
- set of rules or promises which limits access or places restrictions on certain
- Espionage form of espionage conducted for commercial purposes rather than security;
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
confidentiality test 2025-02-06
Across
- Data records of an employee’s performance on the job such as performance reports,
- religion, etc.
- in the Workplace keeping employee, customer and client information private
- or Sensitive Data
- set of rules or promises which limits access or places restrictions on certain
Down
- Data information which may arise from employment-related physicals, drug tests and
- information
- involves individuals hired to steal trade secrets, new products or
- Espionage form of espionage conducted for commercial purposes rather than security;
- of information
- actions, supervisory notations
- insurance information
- about an employee prior to employment such as a résumé,previous work history, date of birth, social security number, criminal record,
13 Clues: information • religion, etc. • of information • or Sensitive Data • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • in the Workplace keeping employee, customer and client information private • set of rules or promises which limits access or places restrictions on certain • ...
unit 3 vocab cyber 2021-09-28
Across
- an attempt by hackers to damage or destroy a computer network or system
- users cycle through different roles
- allow user to share folders
- those a user receives through another object, such as a group
- Physical token inserted into a computer’s USB port
- user can be granted additional rights to data beyond what is allowed by assigned access level
- type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
Down
- type of malware that spreads copies of itself from computer to computer
- process of validating a user
- a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs
- those a user receives by default at a lower level
- measurement and analysis of a biological feature
- denying an authorized biometric credential
- those a user is given at a specific location
- when far and frr are equal
15 Clues: when far and frr are equal • allow user to share folders • process of validating a user • users cycle through different roles • denying an authorized biometric credential • those a user is given at a specific location • measurement and analysis of a biological feature • those a user receives by default at a lower level • Physical token inserted into a computer’s USB port • ...
Cyber Unit 15 Test 2025-04-11
Across
- Overwhelming a server with traffic, in short
- ___ force attack: trial-and-error password cracking method
- Social engineering tactic involving made-up scenarios
- Self-replicating malware that spreads without needing a host file
- Software that filters out unwanted junk in your inbox
- Umbrella term for all malicious software
- Software that detects and removes hidden surveillance tools
- Digital barriers that block unauthorized access
Down
- Secretly gathers data on you without consent
- Malware disguised as legitimate software
- Network of hijacked computers under remote control
- Software that protects your system from malicious programs
- Infected computer controlled remotely, like the undead
- Malicious code that replicates by attaching to clean files
- Annoying pop-ups and promos installed with free apps
15 Clues: Malware disguised as legitimate software • Umbrella term for all malicious software • Overwhelming a server with traffic, in short • Secretly gathers data on you without consent • Digital barriers that block unauthorized access • Network of hijacked computers under remote control • Annoying pop-ups and promos installed with free apps • ...
Security Crossword 2023-03-25
Across
- What colour will appear in the security system when a veteran is searched?
- How many minutes a security member may get promotion after last promotion?
- Who is the leader of Security?
- What Non-HIA members have access to HIA base through security check?
Down
- Who do you contact if someone needs retraining or start over?
- What colour will appear in the security system when a HR+ is searched?
6 Clues: Who is the leader of Security? • Who do you contact if someone needs retraining or start over? • What Non-HIA members have access to HIA base through security check? • What colour will appear in the security system when a HR+ is searched? • What colour will appear in the security system when a veteran is searched? • ...
crosss 2024-09-04
Across
- This cloud security model involves splitting data into encrypted parts that are stored in different locations, ensuring that no single provider has access to the entire dataset.
- What feature in AWS allows setting permissions for a user based on specific circumstances such as the user's IP address or the time they are accessing the service
- feature allows the enforcement of specific security policies, like requiring multi-factor authentication, for API interactions based on user actions and origins?
- mechanism ensures secure and temporary access to resources without storing long-term credentials, particularly in cross-account situations
- What AWS service provides protection against distributed denial-of-service (DDoS) attacks and integrates with CloudFront and Route 53?
Down
- Technique that spreads data across multiple servers to enhance security and reliability
- threat intel dashboard
- Azure interface for applications auditing adherence, Logs, exceptions, and custom diagnostics to fortify security oversight
- A method used to ensure that cloud users can only access resources they are authorized for
- Cloud service that offers firewalls, DDoS protection, and other network security measures
10 Clues: threat intel dashboard • Technique that spreads data across multiple servers to enhance security and reliability • Cloud service that offers firewalls, DDoS protection, and other network security measures • A method used to ensure that cloud users can only access resources they are authorized for • ...
~Food Insecurity~ 2021-11-19
Across
- What is your teachers last name?
- Food insecurity happens often during what time of year?
- During the pandemic, food insecurity in households ---------.
- What meal do most schools provide for free or at a low cost?
Down
- How can high food security households help struggling households?
- How many categories of food security are there?
- What do you need in order to buy food?
- What type of food security is when you do not have any problems getting food?
8 Clues: What is your teachers last name? • What do you need in order to buy food? • How many categories of food security are there? • Food insecurity happens often during what time of year? • What meal do most schools provide for free or at a low cost? • During the pandemic, food insecurity in households ---------. • ...
DUST BOWL 2015-03-04
Economist CBCIS Crossword 2018-11-16
Across
- Economist "?", morning briefing from the editors. Delivered to your smartphone or inbox before breakfast.
- Our data design agency, located in Stratford, London.
- A technique used by criminals to trick you into giving them your username and password
- Economist "?", expresses The Economist's globally curious outlook in the form of short, mind-stretching documentaries.
- We use Two-"?" authentication as an extra layer of security.
- "?" News Club, run by The Economist Foundation, bringing young people together across the UK to talk about current affairs.
Down
- New regulation implemented in 2018 for general data protection.
- Business unit acquired by The Economist in 2006, Connecting the global treasury community for over 25 years
- EIU, also known as The Economist "?" Unit
- "?"security@economist.com, the address too reach to should you require security advice.
- James "?", founder of The Economist in 1843.
11 Clues: EIU, also known as The Economist "?" Unit • James "?", founder of The Economist in 1843. • Our data design agency, located in Stratford, London. • We use Two-"?" authentication as an extra layer of security. • New regulation implemented in 2018 for general data protection. • A technique used by criminals to trick you into giving them your username and password • ...
vocab 2023-01-25
Across
- where securities are created,
- a digital system that matches buyers and sellers looking to trade securities in the financial markets.
- a security—usually a bond or a preferredstock stock that can be converted into a different security—typically shares of the company's common stock.
- A class of stock that is granted certain rights that differ from common stock.
- a pooled collection of assets that invests in stocks, bonds, and other securities.
- securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
- funds that trade on exchanges, generally tracking a specific index.
- provide liquidity and depth to markets and profit from the difference in the bid-ask spread.
- A type of tradeable asset, or security, that equates to ownership in a company.
- You have a capital gain if you sell the asset for more than your adjusted basis.
- A group of 500 companies whose average daily share prices are used to calculate an index of the day's security prices.
- the annual income an investor can expect to receive while holding a particular bond.
- The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
- a group or basket of securities, derivatives, or other financial instruments that represents and measures the performance of a specific market, asset class, market sector, or investment strategy.
- when a private company becomes public by selling its shares on a stock exchange.
- a real estate metric that indicates the value of a mutual fund or an exchange-traded fund
- where those securities are traded by investors.
- a price-weighted index that tracks 30 large, publicly-owned companies trading on the New York Stock Exchange and the Nasdaq.
Down
- the rate of return on a bond investment.
- An individual can become an accredited investor if he or she has a net worth of over $1M, alone or with a spouse.
- date the moment in time when the principal of a fixed income instrument must be repaid to an investor
- The practice of spreading your investments around so that your exposure to any one type of asset is limited.
- the process companies use to raise money by selling securities to a limited number of potential investors.
- a forum where securities like bonds and stocks are purchased and traded.
- A filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws.
- used by governments or companies to raise money by borrowing from investors.
- Your lender verifies your income, assets, debt and property details in order to issue final approval for your loan.
- a sale or equity shares or debt securities by an organization to the public in order to raise funds for the company.
28 Clues: where securities are created, • the rate of return on a bond investment. • where those securities are traded by investors. • funds that trade on exchanges, generally tracking a specific index. • a forum where securities like bonds and stocks are purchased and traded. • used by governments or companies to raise money by borrowing from investors. • ...
Agility 2017 2017-04-24
Across
- The worlds first search engine for internet-connect devices
- A mechanism whereby a brwoser uses a raw data channel to communicate with a server
- F5 REST API Framework
- Software used to disrupt a computer and/or gather sensitive data
- revolutionary new purpose built security appliance "DDoS hybrid _______"
- How unique am I? can my device be distinguished from others?
- This very conference
- "______ IT" the people who provision Apps and Services without authorisation
- How Websafe makes data unintelligible for the fraudsters
- Moving multiple Point solutions on to F5 Application Services Fabric
- The key management tool on the journey to the Private cloud
- Where to store objects for future use
- F5's event driven scripting language
- What film inspired the naming of F5?
- How to get a non-routable protocol over a routed network
- A fundemental principle of security to be able to see all your application traffic
- An arbitrary number that may only be used once
- Leverage machine learning and Data analysis for a new type of DoS mitigation
- "App _________" used to dramatically simplify the deliver of services to public cloud apps
- American in exile in Russia
- "______ authentication" allows a second level of access through APM
- used to speed up deployments and streamline operations
- The key you don't want anyone to have
Down
- "_____engineering" exploits layer 8
- F5 Developer community
- The best way to secure data in transit
- The worlds most programmable cloud ready ADC
- The most destruptive botnet created to date
- The layer of the OSI model that hackers love to exploit
- hackers newest minions are what type of device
- How to protect past sessions against future compromises of keys
- A combination of multiple Clouds or Consumption models
- A free webservice offered by Qualys to check your websites SSL security
- Delivering business requirements through infrastructure automation
- Ensure point in time data integrity
- Using Code to automate tasks
- Protects LDNS servers from Cach poisoning and MITM attacks
- A secure Key exchange methodology conceptualized by Ralph Merkle
- The query response type offered by F5 DNS Express
- The key you want everyone to have
- F5's all new purpose built security appliances
- Journalist recently hit with record DDoS
- Unique hardware performance flexibility in the new iSeries appliances
- Market leading Cloud-based Application Services Platform
- An network built on top of another network
- Maximise security strength while minimising key length
- Best known form of digital currency
- Don't get stung by their App Sec top 10
- ASM's automagical system to ensure only human web access "________ Bot Defence"
- The algorithm use to disguise data or code
- The collaboration of programmers and IT administrators
- An attack designed to disrupt the availability of systems or services
52 Clues: This very conference • F5 REST API Framework • F5 Developer community • American in exile in Russia • Using Code to automate tasks • The key you want everyone to have • "_____engineering" exploits layer 8 • Ensure point in time data integrity • Best known form of digital currency • F5's event driven scripting language • What film inspired the naming of F5? • ...
society 2025-11-12
Security of the Believer 2025-06-13
Across
- Nothing can separate us from the ____ __ ___ (Romans 8:39)
- By hearing and believing, we are given _____ life (John 5:24)
- We are NOT saved through these (Ephesians 2:9)
- The best thing we can do when we have doubts is ____ to God
- The title of our book is "Your life as a _______"
- All that come to Jesus will in no way be ____ ___ (John 6:37)
- We are saved THROUGH this (Ephesians 2:8)
Down
- We are saved BY this (Ephesians 2:8)
- This is when you are not sure about something
- This is anything we do that is wrong and contrary to what God wants
- This is another gift from God through Jesus (Page 11)
- This is who paid the death penalty for our sins
- This is the gift God gives us when we believe and ask forgiveness (Page 11)
- Death is not an accident; it is an ________ (Page 13)
- This is who we studied about in Bible School this week.
- The wages of sin is ______ (Romans 6:23)
- When we confess, God is ______ and just to forgive us (1 John 1:9)
17 Clues: We are saved BY this (Ephesians 2:8) • The wages of sin is ______ (Romans 6:23) • We are saved THROUGH this (Ephesians 2:8) • This is when you are not sure about something • We are NOT saved through these (Ephesians 2:9) • This is who paid the death penalty for our sins • The title of our book is "Your life as a _______" • ...
unit 7 2022-10-06
Across
- a federal executive department of the United States government tasked with the enforcement of federal law
- one of two agencies that supply deposit insurance to depositors in American depository institutions
- domestic intelligence and security service of the United States
- the federal executive department responsible for developing and executing federal laws related to farming, forestry, rural economic development, and food.
- American scientific and regulatory agency within the United States Department of Commerce that forecasts weather
Down
- provides the military forces needed to deter war, and to protect the security of the United States
- the revenue service for the United States federal government
- an intergovernmental military alliance between 30 member states
- agency of the United States Department of Homeland Security
- the combination of communications and collaboration technologies.
10 Clues: agency of the United States Department of Homeland Security • the revenue service for the United States federal government • an intergovernmental military alliance between 30 member states • domestic intelligence and security service of the United States • the combination of communications and collaboration technologies. • ...
Childcare Software Security and Privacy: Safeguarding Children’s Data 2025-10-16
Across
- Ensuring personal and health information of children and families is protected.
- U.S. law that limits access to student records and protects education data.
- A review that checks if security and privacy measures are working properly.
- What parents must give to allow collection or sharing of their child’s information.
- Regularly saving data so it can be recovered if a breach or system failure occurs.
Down
- A security method that keeps children’s data safe by turning it into a code.
- An incident when unauthorized users access children’s private information.
- A security step where staff provide more than a password to access sensitive information.
- Law requiring childcare software to get parental consent before collecting children’s information online.
- The personal, health, and attendance information childcare software collects and stores.
10 Clues: An incident when unauthorized users access children’s private information. • U.S. law that limits access to student records and protects education data. • A review that checks if security and privacy measures are working properly. • A security method that keeps children’s data safe by turning it into a code. • ...
jada's crossword 2021-06-24
6 Clues: the use of words • the use of bullying online • A different word for feelings • an emotional bond between people • somebody that continuously hurts someone or their feelings • somebody that knows about someone being bullied but does not do anything
9/11 and the war on terror 2023-11-03
Across
- - ......... Act - A U.S. law enacted to enhance domestic security after 9/11.
- - The terrorist organization responsible for the 9/11 attacks.
- - ......... Zero - The site of the collapsed World Trade Center buildings in New York City.
- - The Immigration and Naturalization Service, part of the U.S. response to 9/11.
- - Bin Laden - The leader of Al-Qaeda and mastermind behind the 9/11 attacks.
- - The evacuation of U.S. citizens and allies from Afghanistan during the War on Terror.
- - Commission - An investigation into the 9/11 attacks and U.S. response.
- - Questioning and gathering information from terrorism suspects.
- - The Central Intelligence Agency, involved in the War on Terror.
- - ........ W. Bush - The U.S. President at the time of the 9/11 attacks.
- - ........... Bay - A U.S. detention camp for terrorism suspects in Cuba.
- - The individuals who took control of the 9/11 planes to carry out the attacks.
- - ............ Responders - The firefighters, police, and emergency personnel who rushed to the 9/11 sites.
- - ........... Crimes - Violations of international law during armed conflicts in the War on Terror.
- - Weapons of Mass Destruction, a concern in the lead-up to the Iraq War.
- - The U.S. Department of Homeland Security, established in response to 9/11.
- - Interrogation Techniques - Controversial methods used on terrorism suspects.
- - Corpus - A legal principle safeguarding against unlawful detention.
- - Efforts to prevent and respond to acts of terrorism.
- - The Afghan extremist group that harbored Al-Qaeda and was overthrown by U.S. forces.
Down
- - Bin Laden ........... - The U.S. operation that resulted in the death of Osama bin Laden.
- - The country where the U.S. initially focused its military efforts in the War on Terror.
- - The North Atlantic Treaty Organization, which invoked Article 5 for the first time after 9/11.
- - ..... List - A U.S. government watchlist to prevent potential terrorists from boarding flights.
- - Measures - Enhancements to airport and border security following 9/11.
- - Military strategies employed in response to insurgency and terrorism.
- - The arrest and detention of individuals suspected of terrorism.
- - The U.S. Department of Defense headquarters, also targeted on 9/11.
- - on Terror - The U.S.-led global campaign against terrorism, launched after 9/11.
- - Ayman al-Zawahiri, a key figure in Al-Qaeda after the death of Osama bin Laden.
- - The use of violence for political or ideological goals, as seen on 9/11.
- - .......... 11 - One of the planes that crashed into the World Trade Center.
- - ........... Trade Center - The twin towers in New York City that were destroyed on 9/11.
- - The month when the 9/11 attacks occurred.
- - Sites - Secret detention facilities used in the War on Terror.
- - .......... Security - U.S. government efforts to protect the country from terrorism.
- - ....... of Evil - A term used to describe countries perceived as a threat in the War on Terror.
- - Another country targeted in the aftermath of 9/11 due to perceived weapons of mass destruction.
38 Clues: - The month when the 9/11 attacks occurred. • - Efforts to prevent and respond to acts of terrorism. • - The terrorist organization responsible for the 9/11 attacks. • - Questioning and gathering information from terrorism suspects. • - Sites - Secret detention facilities used in the War on Terror. • ...
Ethical hacking 2025-11-02
Across
- Hidden entry point into a system bypassing security
- Software that secretly monitors user activity
- Fraudulent attempt to obtain sensitive information via email
- Process of converting data into a coded format
- Security barrier that controls incoming and outgoing network traffic
- Malicious software designed to harm or exploit devices
- Tool that records keystrokes to steal information
- Self-replicating program that infects computers
Down
- Malware disguised as legitimate software
- Malware that locks files until a payment is made
- Weakness in a system that can be exploited by hackers
- Person who gains unauthorized access to systems
- Process of gathering information about a target system
- Testing method used to find vulnerabilities in a system
- Malware that spreads across networks without user action
15 Clues: Malware disguised as legitimate software • Software that secretly monitors user activity • Process of converting data into a coded format • Person who gains unauthorized access to systems • Self-replicating program that infects computers • Malware that locks files until a payment is made • Tool that records keystrokes to steal information • ...
Security 2024-06-05
Across
- new versions of software that are released by the software vendor.
- a secret word or phrase that is used to verify the identity of a user and grant them access to a computer system or account.
Down
- a copy of your data that is stored in a safe location.
- a type of social engineering attack where attackers try to trick users into revealing personal information, such as their usernames, passwords, or credit card numbers.
- a type of software that is designed to harm a computer system.
5 Clues: a copy of your data that is stored in a safe location. • a type of software that is designed to harm a computer system. • new versions of software that are released by the software vendor. • a secret word or phrase that is used to verify the identity of a user and grant them access to a computer system or account. • ...
Ehe abstract nouns 2024-10-07
Vocab Fun 2025-02-13
Unit 4 2025-06-09
MEDICAL TERMINOLOGY ³ 2025-05-28
12 Clues: الامن • الفنيون • التغذية • الاداريين • فني الاشعة • فني المختبر • الاختصاصيون • مدير المشفى • عمال النظافة • الفريق المساعد • العلاج الطبيعي • موظف الاستقبال
