cyber security Crossword Puzzles

confidenality 2025-02-06

confidenality crossword puzzle
Across
  1. Espionage form of espionage conducted for commercial purposes rather than security;
  2. information
  3. set of rules or promises which limits access or places restrictions on certain
  4. work history, date of birth, social security number, criminal record,
  5. involves individuals hired to steal trade secrets, new products or
  6. actions, supervisory notations
  7. or Sensitive Data information about an employee prior to employment such as a résumé,
Down
  1. etc.
  2. Data records of an employee’s performance on the job such as performance reports,
  3. insurance information
  4. in the Workplace keeping employee, customer and client information private
  5. Data information which may arise from employment-related physicals, drug tests and
  6. of information

13 Clues: etc.informationof informationinsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,in the Workplace keeping employee, customer and client information private...

Thanksgiving 2023-11-17

Thanksgiving crossword puzzle
Across
  1. Thanksgiving always lands on this day of the week
  2. one of the 4 seasons (fall)
  3. this pie is a special treat for the holidays
  4. this goes over mashed potatoes
  5. green bean ___ is a good way to eat your veggies
  6. a popular alternative or companion to a turkey
  7. the main food served at Thanksgiving
  8. Black ___ provides great deals after thanksgiving
Down
  1. this side dish is primarily made with bread
  2. cyber ___ also provides great deals on electronics
  3. this red fruit can be served as a jelly or sauce
  4. the main way potatoes are served
  5. before you start cooking, you can watch the famous Macy's Thanksgiving Day ___
  6. ___ potato pie is famous in the south for having marshmallows on top
  7. a large meal

15 Clues: a large mealone of the 4 seasons (fall)this goes over mashed potatoesthe main way potatoes are servedthe main food served at Thanksgivingthis side dish is primarily made with breadthis pie is a special treat for the holidaysa popular alternative or companion to a turkeythis red fruit can be served as a jelly or sauce...

security 2013-01-17

security crossword puzzle
Across
  1. Status
  2. Security
Down
  1. Testing
  2. Ident
  3. Test testing

5 Clues: IdentStatusTestingSecurityTest testing

security 2023-11-16

security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Security 2022-08-10

Security crossword puzzle
Across
  1. feels real when you're asleep
  2. What keeps a door secured tightly
  3. indestructible neither created but transferred from one form to another
Down
  1. Cannot unlock anything without one
  2. it Sees what you don't

5 Clues: it Sees what you don'tfeels real when you're asleepWhat keeps a door secured tightlyCannot unlock anything without oneindestructible neither created but transferred from one form to another

Threats to Cyber Secruity 2017-10-09

Threats to Cyber Secruity crossword puzzle
Across
  1. Shoulder surfing, direct observation techniques like looking over a shoulder
  2. Scamming practise where malicious code is installed on to a personal computer record are modified and misdirects users to fraudulent websites
  3. The art of manipulating people so they give up their personal information
  4. Appears to be something wanted but is a standalone malicious software designed to give full control of the PC
  5. Spyware that logs keys used and collets data from affected computer
  6. Encourages users to enter confidential data by pretending to be a trust worthy source
  7. Usually popups, main aim to generate revenue for author
Down
  1. Types of malware installed on computer system that collects information without user being aware, is hidden and secretly installed
  2. Self-replicating program that attaches onto to existing programs and can easily spread
  3. The acts of using and creating an invented scenario to engage victim into giving the information
  4. Making the computer or network unavailable to user (DoS)
  5. Loss or theft of devices
  6. The term to describe the protection of information systems from theft unauthorised access or damage to hardware, software and information on them
  7. Standalone computer program that replicates itself so it can spread onto a network. Does NOT attach to a program
  8. Finding a weakness in an established system

15 Clues: Loss or theft of devicesFinding a weakness in an established systemUsually popups, main aim to generate revenue for authorMaking the computer or network unavailable to user (DoS)Spyware that logs keys used and collets data from affected computerThe art of manipulating people so they give up their personal information...

Cyber Basics & Common Threats 2025-10-07

Cyber Basics & Common Threats crossword puzzle
Across
  1. Software designed to harm or exploit a system
  2. Network of infected computers controlled remotely
  3. Malware that locks data and demands payment
  4. Software that secretly collects user data
  5. Process of converting information into code
  6. Software update to fix vulnerabilities
  7. Malware designed to hide other malicious software
Down
  1. A secret string of characters used for authentication
  2. Self-replicating malicious program
  3. Malicious software disguised as legitimate
  4. A security barrier between trusted and untrusted networks
  5. Taking advantage of a vulnerability
  6. Hidden entry point into a system
  7. Software that detects and removes malicious code
  8. Fraudulent attempt to steal sensitive data via fake email

15 Clues: Hidden entry point into a systemSelf-replicating malicious programTaking advantage of a vulnerabilitySoftware update to fix vulnerabilitiesSoftware that secretly collects user dataMalicious software disguised as legitimateMalware that locks data and demands paymentProcess of converting information into code...

Greydi Lizbeth-Grade 6-ity or y 2021-03-15

Greydi Lizbeth-Grade 6-ity or y crossword puzzle
Across
  1. mayoria
  2. citizenship
  3. madurez
  4. humanidad
  5. in the bank they have a guardian so that is having __________.
  6. lesión
  7. opposite of division
Down
  1. capacity
  2. popular
  3. forever
  4. resources
  5. oportunidad
  6. humedad
  7. resbaladizo

14 Clues: lesiónpopularmayoriaforevermadurezhumedadcapacityresourceshumanidadoportunidadcitizenshipresbaladizoopposite of divisionin the bank they have a guardian so that is having __________.

Chapter 2 - Methods of Security Attacks 2025-08-11

Chapter 2 - Methods of Security Attacks crossword puzzle
Across
  1. The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
  2. The act of listening in on a conversation or monitoring network traffic.
  3. A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
  4. The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
  5. A type of attack where the attacker is physically close to the target system.
  6. A form of social engineering attack over Voice over IP (VoIP).
  7. Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
  8. A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
  9. A type of attack that relies on persuading a person to reveal information.
  10. Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
  11. A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
  1. A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
  2. A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
  3. A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
  4. A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
  5. Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
  6. The process of an attacker gathering information about a network for a future attack.
  7. A specific type of spear phishing aimed at high-level executives or important individuals.
  8. Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
  9. An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.

20 Clues: A form of social engineering attack over Voice over IP (VoIP).The act of listening in on a conversation or monitoring network traffic.A type of attack that relies on persuading a person to reveal information.A type of attack where the attacker is physically close to the target system....

Loss Prevention 2024-10-17

Loss Prevention crossword puzzle
Across
  1. The process of reducing inventory loss
  2. Training employees on policies and procedures
  3. A type of theft involving employees
  4. This device is often used to catch shoplifters
Down
  1. To inform authorities about theft
  2. The act of stealing goods from a store
  3. Loss due to theft, error, or fraud
  4. A strategy used to deter theft
  5. A suspicious behavior often seen in thieves
  6. Security tags used to deter theft

10 Clues: A strategy used to deter theftTo inform authorities about theftSecurity tags used to deter theftLoss due to theft, error, or fraudA type of theft involving employeesThe act of stealing goods from a storeThe process of reducing inventory lossA suspicious behavior often seen in thievesTraining employees on policies and procedures...

Bullying Ward 2025-05-05

Bullying Ward crossword puzzle
Across
  1. Someone who does mean things to someone less powerful than them.
  2. This type of verbal bullying makes someone feel unsafe.
  3. Sending someone mean messages over and over.
  4. Repeatedly excluding someone to be mean.
  5. Hurtful words are used in this type of bullying.
Down
  1. Someone who watches the bullying but doesn't help.
  2. This type of bullying can hurt someone's body.
  3. Someone who is helpful toward the person being bullied.
  4. The person who someone tries to bully.

9 Clues: The person who someone tries to bully.Repeatedly excluding someone to be mean.Sending someone mean messages over and over.This type of bullying can hurt someone's body.Hurtful words are used in this type of bullying.Someone who watches the bullying but doesn't help.This type of verbal bullying makes someone feel unsafe....

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Wireless technology used to interconnect mobiles computers etc
  2. Refers to unwanted bulk emails that come from unknown sources
  3. Practice of protecting digital information
  4. Network topology with a central hub
Down
  1. It is a combination of two terms 'net' and 'etiquette'
  2. The process of transforming data into an unreadable code
  3. Type of cyber attack that tricks users
  4. Refers to an illegal intrusion into a computer system or network
  5. Device that connects multiple networks

9 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

chapter 9 2015-04-06

chapter 9 crossword puzzle
Across
  1. / If an organization asks you to disclose your social security number, but fails to establish a set of procedures and policies for protecting your privacy, the organization has likely violated which of the Generally Accepted Privacy Principles?
  2. / If an organization asks you to disclose your social security number, yet fails to properly dispose of your private information once it has fulfilled its purpose, the organization has likely violated which of the Generally Accepted Privacy Principles?
  3. / If an organization asks you to disclose your social security number, yet fails to permit you to opt-out before you provide the information, the organization has likely violated which of the Generally Accepted Privacy Principles? (3words)
  4. / If an organization asks you to disclose your social security number, but fails to tell you about its privacy policies and practices, the organization has likely violated which of the Generally Accepted Privacy Principles?
  5. / One way to circumvent the counterfeiting of public keys is by using a ________(2words)
  6. / Information encrypted with the creator's private key that is used to authenticate the sender is digital_________
Down
  1. / A process that takes plaintext of any length and transforms it into a short code.
  2. / _________encryption and hashing are used to create digital signatures.
  3. / The system and processes used to issue and manage asymmetric keys and digital certificates are known as_______(3words)
  4. / ______encryption systems use the same key to encrypt communications and to decrypt communications?
  5. / If an organization asks you to disclose your social security number, but decides to use it for a different purpose than the one stated in the organization's privacy policies, the organization has likely violated which of the Generally Accepted Privacy Principles?
  6. / _______certificate is a electronic document that certifies the identity of the owner of a
  7. / In a private key system the sender and the receiver have the same key, and in the public key system they have two ________keys.
  8. / If an organization asks you to disclose your date of birth and your address, but refuses to let you review or correct the information you provided, the organization has likely violated which of the Generally Accepted Privacy Principles?

14 Clues: / _________encryption and hashing are used to create digital signatures./ A process that takes plaintext of any length and transforms it into a short code./ One way to circumvent the counterfeiting of public keys is by using a ________(2words)/ _______certificate is a electronic document that certifies the identity of the owner of a...

Chapter 10 Security Plus 2024-03-21

Chapter 10 Security Plus crossword puzzle
Across
  1. tool that provides a visual representation of the wireless signal
  2. uses digital certificates for authentication
  3. An in-depth examination and analysis of a WLAN site
  4. usage in contactless payments
  5. An EAP method designed to simplify the deployment of 802.1x
  6. web page that is displayed to users when they attempt to access a public network
  7. accesses unauthorized information from a Bluetooth connection
  8. A wireless attack in which false deauthentication
Down
  1. securely tunnels any credential form for authentication using TLS
  2. sends unsolicited messages to Bluetooth-enabled devices
  3. The encryption protocol used for WPA2
  4. standards used to transmit information from tags to a proximity reader
  5. A framework for transporting authentication protocols
  6. A wireless technology that uses short-range radio frequency
  7. An unauthorized AP that allows an attacker to bypass many of the network security
  8. Intentionally flooding the radio frequency spectrum
  9. An AP set up by an attacker to mimic an authorized AP

17 Clues: usage in contactless paymentsThe encryption protocol used for WPA2uses digital certificates for authenticationA wireless attack in which false deauthenticationAn in-depth examination and analysis of a WLAN siteIntentionally flooding the radio frequency spectrumA framework for transporting authentication protocols...

Security Plus Chapter 6 2024-03-11

Security Plus Chapter 6 crossword puzzle
Across
  1. Circumventing the installed built-in limitations on Apple iOS devices
  2. facilitates communication between devices and the cloud
  3. coverage area is divided into hexagon-shaped cells
  4. OS that guarantees real-time applications a certain capability within a specified deadline
  5. A coding technique for accounting for errors
  6. make a real-time operating system more resilient to attacks
  7. Downloading unofficial and unapproved apps
  8. testing software before the source code is compiled
  9. refers to integrating security into the application
Down
  1. The ability to resist attacks
  2. ensuring timely and reliable access to devices
  3. instrumentation used for industrial process control
  4. involves isolating sensitive enterprise data
  5. Examining code after the source code
  6. security constraint in which a device’s small size results in low processing
  7. A system that controls multiple industrial control systems (ICS)
  8. Tools that allow a device to be managed remotely by an organization

17 Clues: The ability to resist attacksExamining code after the source codeDownloading unofficial and unapproved appsinvolves isolating sensitive enterprise dataA coding technique for accounting for errorsensuring timely and reliable access to devicescoverage area is divided into hexagon-shaped cellsinstrumentation used for industrial process control...

Foxtrot | Crossword 2024-09-03

Foxtrot | Crossword crossword puzzle
Across
  1. Asylum Security team
  2. Special Operations team
  3. More dangerous patients are placed here
  4. Keycard that opens all doors
  5. Patient Transfer zone
Down
  1. Area with patient cells
  2. Tests on patients
  3. Responds in case of emergencies

8 Clues: Tests on patientsAsylum Security teamPatient Transfer zoneArea with patient cellsSpecial Operations teamKeycard that opens all doorsResponds in case of emergenciesMore dangerous patients are placed here

Vocabulaire Voyage 2016-04-28

Vocabulaire Voyage crossword puzzle
Across
  1. platform
  2. there is room
  3. customs officer
  4. aisle
  5. waiting room
  6. to rent
  7. boarding pass
  8. baggage check
  9. to get (nous form)
Down
  1. baggage claim
  2. to go through
  3. to punch (a ticket)
  4. to take off
  5. round trip
  6. ticket window
  7. to land
  8. security check
  9. billboard
  10. to check (luggage)
  11. check-in counter

20 Clues: aisleto landto rentplatformbillboardround tripto take offwaiting roombaggage claimto go throughthere is roomticket windowboarding passbaggage checksecurity checkcustoms officercheck-in counterto check (luggage)to get (nous form)to punch (a ticket)

Spotlight 8 7A I don't believe this! 2017-05-09

Spotlight 8 7A I don't believe this! crossword puzzle
Across
  1. liittyä seuraan
  2. kiusaaja
  3. suostumus,lupa
  4. halaus
  5. luvata
  6. onnistua
  7. suukko
  8. oppitunti
  9. ilmoitustaulu
  10. puhelin
  11. salaisuus
  12. juliste
  13. häpeissään
  14. kuva
  15. edessä
Down
  1. kateellinen
  2. epäystävällinen
  3. persoonallisuus
  4. ulkonäkö
  5. arvata
  6. viesti
  7. pyytää anteeksi
  8. rehtori
  9. turvallisuus
  10. jo
  11. molemmat
  12. koe
  13. skandaali
  14. roska,pötypuhe
  15. sivu
  16. valehtelija

31 Clues: jokoekuvasivuarvataviestihalausluvatasuukkoedessärehtoripuhelinjulistekiusaajaulkonäköonnistuamolemmatoppituntisalaisuusskandaalihäpeissäänkateellinenvalehtelijaturvallisuusilmoitustaulusuostumus,luparoska,pötypuheepäystävällinenpersoonallisuusliittyä seuraanpyytää anteeksi

Crossword Ch. 9,10,11 2012-12-18

Crossword Ch. 9,10,11 crossword puzzle
Across
  1. slice
  2. to show
  3. to go through security
  4. fastened
  5. tent
  6. left
  7. market stall
  8. tube of toothpaste
Down
  1. early riser
  2. carrot
  3. to stretch
  4. counter
  5. departure time
  6. overhead bin
  7. occasionally
  8. human body
  9. to have fun
  10. store window
  11. im coming!
  12. to bargain
  13. takeoff(plane)
  14. to take(shoe size)

22 Clues: tentleftslicecarrotto showcounterfastenedto stretchhuman bodyim coming!to bargainearly riserto have funoverhead binoccasionallystore windowmarket stalldeparture timetakeoff(plane)tube of toothpasteto take(shoe size)to go through security

20pt Crossword 2013-02-13

20pt Crossword crossword puzzle
Across
  1. a person
  2. go beyond
  3. sled
  4. win back
  5. one street over anther
  6. the panel of a car
  7. a choice
  8. take apart
  9. fill up
  10. 2 door car
Down
  1. paved roads
  2. motor or engine
  3. draw back
  4. keeping clean
  5. a liquid
  6. keep guarded
  7. not hurt
  8. gears
  9. protect from loosing
  10. money

20 Clues: sledgearsmoneyfill upa persona liquidwin backnot hurta choicedraw backgo beyondtake apart2 door carpaved roadskeep guardedkeeping cleanmotor or enginethe panel of a carprotect from loosingone street over anther

Week 6 Spelling 2021-11-19

Week 6 Spelling crossword puzzle
Across
  1. agreement
  2. work together
  3. collarbone
  4. attractive
  5. calculate
  6. split asunder
  7. fortress
  8. climb by crawling
  9. having a common center
  10. that which completes
  11. huge
Down
  1. harmonious
  2. relating to highest point
  3. limit, confine
  4. security given for a loan
  5. brief and compact
  6. small group
  7. small ring
  8. forming of an idea
  9. tooth on a wheel

20 Clues: hugefortressagreementcalculateharmoniouscollarboneattractivesmall ringsmall groupwork togethersplit asunderlimit, confinetooth on a wheelbrief and compactclimb by crawlingforming of an ideathat which completeshaving a common centerrelating to highest pointsecurity given for a loan

Redbridge Tuition - Vocabulary - Similar Meanings 1 2021-12-09

Redbridge Tuition - Vocabulary - Similar Meanings 1 crossword puzzle
Across
  1. impoverishment
  2. calm
  3. trained
  4. willingly
  5. pause
  6. argument
  7. unrestrained
  8. scarcity
  9. funny
  10. former
  11. security
  12. normal or average
  13. musty or unfresh
Down
  1. misty or smoky
  2. clear
  3. disagree or object
  4. hesitant
  5. oppose
  6. self-centred
  7. unhappiness
  8. indigenous or local
  9. hopelessness
  10. well-known
  11. cheapskate or skinflint
  12. tire or burn

25 Clues: calmclearpausefunnyopposeformertrainedhesitantargumentscarcitysecuritywillinglywell-knownunhappinessself-centredhopelessnessunrestrainedtire or burnmisty or smokyimpoverishmentmusty or unfreshnormal or averagedisagree or objectindigenous or localcheapskate or skinflint

17실력 2023-11-17

17실력 crossword puzzle
Across
  1. 수하물 짐
  2. 수표 점검하다
  3. 안내원 종업원
  4. 전세계에
  5. 기념품
  6. 예약하다
  7. 비자
  8. 풍경
  9. 멀리가는 여정 여행
  10. 목적지
  11. 해외로
  12. 출발하다
Down
  1. 관광
  2. 주장 청구 요구하다
  3. 안전 보안
  4. 비행
  5. 풍경(l-)
  6. 탑승하다
  7. 보험
  8. 일정표 여행일기
  9. 취소하다 취소
  10. 지연 연기 연기하다
  11. 여권
  12. 시차증
  13. 착륙하다 땅
  14. 신청하다

26 Clues: 관광비행보험여권비자풍경기념품시차증목적지해외로탑승하다전세계에예약하다신청하다출발하다안전 보안수하물 짐풍경(l-)착륙하다 땅수표 점검하다안내원 종업원취소하다 취소일정표 여행일기주장 청구 요구하다지연 연기 연기하다멀리가는 여정 여행

On the Go 2 Unit 4 Start 2023-11-28

On the Go 2 Unit 4 Start crossword puzzle
Across
  1. sisäänkirjautuminen
  2. lähteä(esim.lento)
  3. asemalaituri
  4. itsepalvelu
  5. matkustaja
  6. lento
  7. istuinpaikka
  8. satama
  9. vaunu
  10. kone
  11. matkatavarat
  12. lähtevät
  13. kolikkoautomaatti
  14. juna
  15. matkatavarat
  16. tulli
Down
  1. kuulutus
  2. tarkastus
  3. saapuvat
  4. tullata
  5. turvallisuus
  6. lautta
  7. kyltti
  8. junavirkailija
  9. matkustamohenkilökunta
  10. matkalippu
  11. maihinnousukortti
  12. portti
  13. valmis
  14. matkalaukku

30 Clues: konejunalentovaunutullilauttakylttisatamaporttivalmistullatakuulutussaapuvatlähtevättarkastusmatkustajamatkalippuitsepalvelumatkalaukkuasemalaituriturvallisuusistuinpaikkamatkatavaratmatkatavaratjunavirkailijamaihinnousukorttikolikkoautomaattilähteä(esim.lento)sisäänkirjautuminenmatkustamohenkilökunta

HHSC IT Crossword 2020-07-13

HHSC IT Crossword crossword puzzle
Across
  1. to access your work computer
  2. social media
  3. you can find it on our
  4. culture and engagement
  5. Blanco
  6. DCIO
  7. all agency news
  8. Upload your files to
  9. support
  10. Risk assessment
  11. device refresh
  12. collection of programs
Down
  1. phone
  2. chief of staff
  3. Reset your
  4. news
  5. update your timesheet
  6. network
  7. virtual meetings
  8. IT guys
  9. Portal

21 Clues: newsDCIOphoneBlancoPortalnetworkIT guyssupportReset yoursocial mediachief of staffdevice refreshall agency newsRisk assessmentvirtual meetingsUpload your files toupdate your timesheetyou can find it on ourculture and engagementcollection of programsto access your work computer

22a 2024-06-22

22a crossword puzzle
Across
  1. Supply officer
  2. Elite infantry
  3. Expeditionary force
  4. Training NCOs
  5. Medical unit
  6. Heavy weapon operators
  7. Ground unit officers
  8. Ground troops
  9. Communications unit
Down
  1. Helicopter operator
  2. Heavy aircraft crew
  3. Maritime security
  4. Battlefield builders
  5. Longrange marksmen
  6. Cannon crew
  7. Armored vehicle crew
  8. Scouting team
  9. Armed police
  10. Jet pilot
  11. Elite naval unit

20 Clues: Jet pilotCannon crewArmed policeMedical unitScouting teamTraining NCOsGround troopsSupply officerElite infantryElite naval unitMaritime securityLongrange marksmenHelicopter operatorHeavy aircraft crewExpeditionary forceCommunications unitBattlefield buildersArmored vehicle crewGround unit officersHeavy weapon operators

SUMMARY 2023-06-14

SUMMARY crossword puzzle
Across
  1. popyt
  2. giełda papierów wartościowych
  3. pożyczkodawca
  4. akcja
  5. pracodawca
  6. wypłata pracownika fizycznego
  7. gospodarstwo domowe
  8. rynek pracy
  9. negocjować
  10. podaż
  11. ubezpieczenie
  12. wypłacać (pieniądze)
  13. podatek
  14. przedsiębiorca
Down
  1. pracownik
  2. hipoteka
  3. nakładać podatek
  4. konsument
  5. nabywać
  6. papier wartościowy
  7. rachunek (np. bankowy)
  8. dotacja
  9. etyka
  10. obligacja
  11. lokata
  12. rekrutacja

26 Clues: popytakcjaetykapodażlokatanabywaćdotacjapodatekhipotekapracownikkonsumentobligacjapracodawcanegocjowaćrekrutacjarynek pracypożyczkodawcaubezpieczenieprzedsiębiorcanakładać podatekpapier wartościowygospodarstwo domowewypłacać (pieniądze)rachunek (np. bankowy)giełda papierów wartościowychwypłata pracownika fizycznego

Browsing safely 2025-06-18

Browsing safely crossword puzzle
Across
  1. illegal entry into a computer system
  2. act of harassing someone using a internet
  3. criminal activity used to harm someone with a internet connection
  4. it scans,prevent and destroy viruses
  5. the receiver of a message is fooled
  6. it can carry out cyber extortion
  7. prevents unauthorised access
  8. a program or a set of programs
Down
  1. fraudsters pretend to bank or financial organisation
  2. unethical hackers who steal personal information and do fraudulent tasks
  3. two step authentication involves this word and your password
  4. act of sending an email to mislead him to steal his information
  5. antivirus developed by
  6. an impression created when you visit a website
  7. a major threat for people who use internet for online shopping,cash transactions and bank services

15 Clues: antivirus developed byprevents unauthorised accessa program or a set of programsit can carry out cyber extortionthe receiver of a message is fooledillegal entry into a computer systemit scans,prevent and destroy virusesact of harassing someone using a internetan impression created when you visit a website...

Chapter 2 2021-11-30

Chapter 2 crossword puzzle
Across
  1. a bank account used by depositors to accumulate money for future use
  2. another type of stock exchange
  3. those who do the work
  4. info provided by public companies
  5. market place where stocks are bought and sold mostly online where there is no central building
  6. someone who assists you with purchasing stocks and bonds
  7. central bank of the US
  8. handles stock sales and purchases
  9. another name for futures
  10. type of company where shares can be traded openly
  11. need to pay for security purchases within three business days or order
  12. an example of a lender
  13. establishes and enforces regulations which protect the investing public from unfair practices in the securities markets
  14. type of bond with the longest maturity
Down
  1. issues of a stake of ownership in a company
  2. term generally uses to refer to putting money aside in order to make your money grow
  3. limited liability for shareholders
  4. example of low risk/low reward
  5. buy or sell when the stock reaches a certain price
  6. biggest stock exchange
  7. people who lend money to a business for a fixed rate of interest
  8. type of company where shares are not sold publicly
  9. a financial statement issued a corporation, government, or other organization
  10. for sophisticated investors who borrow money to purchase securities
  11. a security that pays interest over terms ranging from two to ten years
  12. tax-free bonds
  13. money for real estate equipment, and others
  14. document guaranteeing payment of a specific amount of money

28 Clues: tax-free bondsthose who do the workbiggest stock exchangecentral bank of the USan example of a lenderanother name for futuresanother type of stock exchangeexample of low risk/low rewardinfo provided by public companieshandles stock sales and purchaseslimited liability for shareholderstype of bond with the longest maturity...

Investment Strategies Chapter 2 2021-11-30

Investment Strategies Chapter 2 crossword puzzle
Across
  1. shares can be traded publicly
  2. letters assigned to bonds by rating agencies
  3. a type of debt security that is issued by a firm and sold to investors
  4. ticker symbol
  5. preferred dividends not paid in previous periods must be paid before common dividends can be paid
  6. a security issued by or on behalf of a local authority
  7. generally fixed like debt based on the par value
  8. preferred stockholders are paid before common stockholders
  9. stockholders buy and sell shares of stock from one another with the help of brokers
  10. the nominal or face value of a stock or bond
  11. analysis of the companies stock, its price, price movement, trading volume, etc
Down
  1. taking measures to make money grow
  2. cash payments declared and paid by corporations to stockholders
  3. long term bonds sold by the US government
  4. no specific maturity date
  5. selling stocks and bonds directly to public investors
  6. price earnings ratio
  7. what investing can help you beat
  8. putting money aside so it will be available when you need it
  9. money for real estate, equipment, and so on
  10. analysis of the company itself, its operations, its position within its industry
  11. The accounting value of the common equity of a corporation as shown on the balance sheet
  12. an equity security representing the ownership interest in a corporation
  13. those people that do the work
  14. type of stock market return
  15. dollar amount of annual dividend per share

26 Clues: ticker symbolprice earnings rationo specific maturity datetype of stock market returnshares can be traded publiclythose people that do the workwhat investing can help you beattaking measures to make money growlong term bonds sold by the US governmentdollar amount of annual dividend per sharemoney for real estate, equipment, and so on...

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. when value of stocks in the market plummet
  2. medium of exchange for goods and services
  3. the max amount of money you put into an IRA yearly
  4. distribute company earnings to shareholders
  5. system that makes it hard to track or hack info
  6. A company might _____ you when you put money into a 401k
  7. percent of 18-29 year olds who invest in crypto
  8. age to get extra social security benefits
  9. to put money into stocks and bonds
  10. most popular cryptocurrency on the market
  11. type of currency that only exists online
  12. factor affects company from inside source
  13. when you take money out of an account
  14. age to collect social security benefits
Down
  1. how big the company is in the stock market
  2. account where you can put in money to slowly grow
  3. the amount of money held in an account
  4. account created for unexpected events/bills
  5. age to invest in Cryptocurrency
  6. type of IRA you put money in after it's taxed
  7. represents ownership of a part of a company
  8. agreement to provide compensation if damages occur
  9. regular payment from your job once you retire
  10. Currency that is backed by the government
  11. a sum of money saved/made available for you
  12. offering private corporate shares to public
  13. represents a loan from the buyer to company
  14. payroll tax that funds Social Security and Medicare
  15. you can _______ your 401k funds to a new plan or an investment account
  16. manages the performance of many securities

30 Clues: age to invest in Cryptocurrencyto put money into stocks and bondswhen you take money out of an accountthe amount of money held in an accountage to collect social security benefitstype of currency that only exists onlinemedium of exchange for goods and servicesage to get extra social security benefitsCurrency that is backed by the government...

Business Math Unit 4 Vocab 2025-12-15

Business Math Unit 4 Vocab crossword puzzle
Across
  1. a currency for which the government guarantees the value
  2. a document guaranteeing payment of a specific amount of money either on demand or within a designated time
  3. borrower
  4. lender
  5. a government backed security payable in a year or less
  6. property or assets used to secure a loan
  7. a security with terms of 10-20 years
  8. a method of payment must be accepted for public and private debts
  9. the ranking of a credit history on a point scale between 300 and 850
  10. the government institution that provides insurance for depositors in insured banks
  11. the process of transferring money from one individual or organization to another
Down
  1. the annual cost of credit
  2. a government backed security payable in 2 - 10 years
  3. a record of a borrower's payment of debt
  4. debt without collateral
  5. an agreement between two parties in which one provides goods and services understanding that payment will be made at a later date
  6. a loan with collateral
  7. the portion of a loan that is interest, or money paid to the borrower
  8. a table detailing how much interest and how much of the principle is being paid back every month
  9. a report that details credit history and financial behavior of companies and individuals
  10. moving a payment from the account of the payer directly to that amount of the recipient
  11. the mechanism used by a nation to provide and manage its money
  12. a general increase in prices and decline in the purchasing power of money

23 Clues: lenderborrowera loan with collateraldebt without collateralthe annual cost of credita security with terms of 10-20 yearsa record of a borrower's payment of debtproperty or assets used to secure a loana government backed security payable in 2 - 10 yearsa government backed security payable in a year or less...

Unit4 2020-12-31

Unit4 crossword puzzle
Across
  1. ezmek
  2. ileri
  3. dağınık
  4. söylentiler
  5. yorum
  6. güvenlik
Down
  1. dikkat etmek
  2. kabus
  3. sonuç
  4. yetişkin
  5. for aramak

11 Clues: kabusezmeksonuçileriyorumdağınıkyetişkingüvenlikfor aramaksöylentilerdikkat etmek

Moritz Quiz 2021-02-01

Moritz Quiz crossword puzzle
Across
  1. stressig
  2. über
  3. Sicherheit
  4. unhöflich
  5. though obwohl
Down
  1. Leute
  2. Handwerk
  3. Schlüssel
  4. Sonnenbrand
  5. Füllen
  6. Assistant Verkäufer

11 Clues: überLeuteFüllenstressigHandwerkSchlüsselunhöflichSicherheitSonnenbrandthough obwohlAssistant Verkäufer

Security 2014-03-04

Security crossword puzzle
Across
  1. being recognised via your iris
  2. being recognised via your voice
Down
  1. being recognised via your fingers
  2. selective restrcition of access to a resource
  3. being recognised via unique features

5 Clues: being recognised via your irisbeing recognised via your voicebeing recognised via your fingersbeing recognised via unique featuresselective restrcition of access to a resource

Security 2022-05-16

Security crossword puzzle
Across
  1. An attacker goes to a local coffee shop and creates a wireless network using the shop’s name, hoping unsuspecting customers will log on. What is this type of attack called?
  2. In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD
Down
  1. You should not just check identity, you should also confirm
  2. when a container runs in this mode, it is granted most system capabilities available on the host
  3. After clicking an advertisement on an unsecure website, your computer freezes. A message appears, demanding you pay a certain amount of money to unlock your computer. What is this type of attack called?

5 Clues: You should not just check identity, you should also confirmwhen a container runs in this mode, it is granted most system capabilities available on the hostIn May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD...

Security 2022-09-09

Security crossword puzzle
Across
  1. Controls access to user interfaces and actions needed to perform the tasks of a job
  2. represent the individual duties that users with those job can perform
Down
  1. default access available to all users
  2. Example of Abstract Role
  3. Manage application security in your Oracle Applications Cloud

5 Clues: Example of Abstract Roledefault access available to all usersManage application security in your Oracle Applications Cloudrepresent the individual duties that users with those job can performControls access to user interfaces and actions needed to perform the tasks of a job

Security 2022-09-09

Security crossword puzzle
Across
  1. Controls access to user interfaces and actions needed to perform the tasks of a job
  2. represent the individual duties that users with those job can perform
Down
  1. default access available to all users
  2. Example of Abstract Role
  3. Manage application security in your Oracle Applications Cloud

5 Clues: Example of Abstract Roledefault access available to all usersManage application security in your Oracle Applications Cloudrepresent the individual duties that users with those job can performControls access to user interfaces and actions needed to perform the tasks of a job

Tek ko (Part 4: Tek ko and Ryan mo) 2023-03-15

Tek ko (Part 4: Tek ko and Ryan mo) crossword puzzle
Across
  1. "Traffic ____"; due to large volume of vehicles
  2. color of a retriever or the arches of Mcdo symbol
  3. One of the off-shore provinces of Bicol
  4. Denoting or served in a cheese-flavoured white sauce
  5. ___ and the Bear; Russian animated series
  6. The great white shark in Finding Nemo
  7. A dozen
  8. Brand of toy blocks
  9. ___ me-not; bright purple flowers
  10. animal symbol of USA
  11. Ebony and ___; collab hits of McCartney and Wonder
  12. 'XLV - XXV' in Arabic numerals
  13. Chair and Director of UQ Cyber Security at the University of Queensland, Australia
  14. Talk at length, typically about trivial matters
  15. The second letter of the Hebrew alphabet
  16. Volleyball player position
  17. Powdered chocolate drink
  18. Rene ____; tennis great with grand slams in French and US Open and Wimbledon from 1925-1929
  19. .."Oh, __ __ __ more today than yesterday".. by the Spiral Starecase
  20. Originally called as Facebook chat
  21. Day-Lewis or Craig or Padilla
  22. one of two children or animals born at the same birth
  23. word attached with gin, tail, seed or bud
Down
  1. Grass in Kankanaey
  2. Continuing without pausing
  3. An enthusiastic devotee of a specified thing or activity (eg drugs)
  4. other word for logo, trademark, label or emblem
  5. month of Santacruzan
  6. Philippine jasmine
  7. App for free calls and messaging
  8. ___ Fools' Day
  9. Shangrila or Marina Bay Sands or The Peninsula
  10. a number that looks like infinity
  11. City and municipal seat in Baja California Sur, on the West Coast of Mexico
  12. Domingo de ___; First bishop of the Philippines
  13. Rudy ___; Filipino actor or Spanish NBA player
  14. Square of 5 and 1
  15. Spanish name meaning "destroyed by horses"
  16. summit or highest point
  17. Bacon in Spanish
  18. ..."__ __ __ like the sun misses the flower..."; Letter in the film A Knight's Tale
  19. Month named after Julius Caesar
  20. French name meaning harvester or guardian
  21. sides of a square or the Evangelists or lucky leaf clover
  22. Just Got ___ by Joe Boxers
  23. The Philippine ___; broad sheet with tag line "Truth Shall Prevail"
  24. a defender, protector, or keeper (eg angel)
  25. ___-kagi; A variant of the weapon whose shape has four iron nails like bear claws attached to a metal ring

48 Clues: A dozen___ Fools' DayBacon in SpanishSquare of 5 and 1Grass in KankanaeyPhilippine jasmineBrand of toy blocksmonth of Santacruzananimal symbol of USAsummit or highest pointPowdered chocolate drinkContinuing without pausingVolleyball player positionJust Got ___ by Joe BoxersDay-Lewis or Craig or Padilla'XLV - XXV' in Arabic numerals...

Web Ethics and Safety 2023-08-22

Web Ethics and Safety crossword puzzle
Across
  1. a person who looks for other people in order to use, control, or harm them in some way.
  2. the action or practice of sending sexually explicit photographs or messages via mobile phone.
  3. the unauthorized use or reproduction of another's work.
  4. a phone with access to a cellular radio system so it can be used over a wide area, without a physical connection to a network; a mobile phone.
  5. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  6. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  7. (of software) designed to detect and destroy computer viruses.
  8. the condition of being protected from or unlikely to cause danger, risk, or injury.
  9. the systematic investigation into and study of materials and sources in order to establish facts and reach new conclusions.
  10. a dishonest scheme; a fraud.
  11. the unauthorized use or reproduction of another's work.
  12. a person who uses computers to gain unauthorized access to data.
  13. a person who habitually seeks to harm or intimidate those whom they perceive as vulnerable.
Down
  1. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  2. (of a device) having or operating with the aid of many small components, especially microchips and transistors, that control and direct an electric current.
  3. the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  4. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  5. a device that forwards data packets to the appropriate parts of a computer network.
  6. existing, occurring, or carried on between two or more nations.
  7. the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  8. the practice of taking someone else's work or ideas and passing them off as one's own.
  9. the state of being free from danger or threat.
  10. the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
  11. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  12. a danger or risk.

25 Clues: a danger or risk.a dishonest scheme; a fraud.the state of being free from danger or threat.the unauthorized use or reproduction of another's work.the unauthorized use or reproduction of another's work.(of software) designed to detect and destroy computer viruses.existing, occurring, or carried on between two or more nations....

Español 2014-10-06

Español crossword puzzle
Across
  1. death
  2. snake
  3. difficult
Down
  1. sad
  2. ambiguity
  3. happy
  4. safety/security
  5. faith
  6. danger
  7. love
  8. easy

11 Clues: sadloveeasydeathhappyfaithsnakedangerambiguitydifficultsafety/security

Spring 2024 Firm Meeting 2024-03-12

Spring 2024 Firm Meeting crossword puzzle
Across
  1. something PWA advisors help client protect
  2. one approach our tax controversy team takes with the IRS
  3. with x, a tax credit for manufacturing or product improvement Development see x
  4. investigating, often in fraud or legal situations
  5. a service that several departments have in their names
  6. where most of the firm’s new business is originated
  7. Managed blank Technology
  8. something BayBridge Real Estate Capital helps clients manage, find or refinance
  9. clue
  10. a type of business that gives back to the community, we do their taxes and audits
  11. an area of tax that especially impacts clients with operations in multiple states
  12. planning how PWA creates a comprehensive approach
  13. part of the name of several affiliates
  14. what many of our MST services entail
  15. a charity event the firm teams have contributed $2 million to since it started 14 years ago
  16. an activity that often uses talents from a variety of departments
  17. clue
  18. present blank analysis
  19. an area that helps HNW people manage their financial lives
Down
  1. what every company and high net worth family needs
  2. a lifechanging client event we can help with from planning to tax preparation to estate planning
  3. a governmental agency that scares of our clients but not us
  4. a specialty area of PWA
  5. a software platform MST helps implement at companies
  6. a type of entity that provides tax benefits for manufacturers and distributors that expert products
  7. a special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
  8. an acronym for solving repetitive tasks with robotics
  9. tax one of the firm’s key service areas
  10. diversity, equity and blank
  11. firm members speak in practice in more than this many languages
  12. estate the area of tax services BPB is probably most famous for
  13. the largest group in the firm and a typical entry point for multiple services
  14. how our HR departments help clients
  15. clue
  16. a special type of audit for public companies
  17. what we all aspire to do
  18. a core value brought to life by our participation in the DCC and Bounce Back from Cancer
  19. an acronym for a special type of insurance that is tax mitigation tool
  20. clue
  21. assessment what assurance and cyber teams often do

40 Clues: cluecluecluecluepresent blank analysisa specialty area of PWAManaged blank Technologywhat we all aspire to dodiversity, equity and blankhow our HR departments help clientswhat many of our MST services entailpart of the name of several affiliatestax one of the firm’s key service areassomething PWA advisors help client protect...

CM-BCMS 2025-04-04

CM-BCMS crossword puzzle
Across
  1. Harmful software that infiltrates and disrupts systems
  2. A sudden event causing disruption or harm to operations
  3. Fraudulent phone calls designed to extract sensitive details
  4. Analyzing potential risks to prepare for future challenges
  5. A critical situation requiring urgent decision-making
  6. Framework ensuring operations continue despite challenges.
  7. Potential actions that compromise digital safety
  8. A technique used to take advantage of system vulnerabilities
  9. Interconnected systems for sharing resources and information
  10. A state of readiness to effectively manage crises
  11. The process of converting information into secure code
Down
  1. Verifying a user’s identity to ensure security
  2. The capacity to adjust quickly to changing situations
  3. Steps taken to reduce the impact of potential risks
  4. Restoring critical business operations after a crisis
  5. The ability to adapt and recover during disruptions
  6. A security barrier protecting networks from external threats

17 Clues: Verifying a user’s identity to ensure securityPotential actions that compromise digital safetyA state of readiness to effectively manage crisesSteps taken to reduce the impact of potential risksThe ability to adapt and recover during disruptionsThe capacity to adjust quickly to changing situations...

M7 Crossword Puzzle 2024-10-22

M7 Crossword Puzzle crossword puzzle
Across
  1. The process of converting data into a code to prevent unauthorized access.
  2. Rights Management (DRM) Technologies that control the use of digital content, preventing unauthorized distribution.
  3. on Security Investment (ROSI) A calculation that compares the value gained from security measures with the cost.
  4. A copy of data stored separately to prevent loss in case of a system failure.
  5. Rights granted to users to perform specific actions, such as reading or editing files.
  6. A system that monitors and controls incoming and outgoing network traffic to protect against threats.
  7. Actions taken to reduce risk or lessen the impact of potential threats.
Down
  1. A legal right that gives the creator of an original work exclusive rights to its use and distribution.
  2. A symbol, word, or phrase legally registered to represent a company or product.
  3. Account Control (UAC) A security feature in Windows that requires administrative approval before making changes.
  4. Breach The unauthorized access and retrieval of sensitive information.
  5. Visualization The graphical representation of data to make it easier to understand.
  6. Assessment The process of identifying and evaluating risks to minimize potential harm.
  7. An exclusive right granted for an invention, providing protection for a limited period.
  8. The process of setting up software on a device.
  9. Availability Ensures systems remain operational without downtime.
  10. Tolerance Technology that ensures a system remains operational even if part of it fails.

17 Clues: The process of setting up software on a device.Actions taken to reduce risk or lessen the impact of potential threats.The process of converting data into a code to prevent unauthorized access.A copy of data stored separately to prevent loss in case of a system failure.A symbol, word, or phrase legally registered to represent a company or product....

The Kieronasaurus Krossword 2018-01-03

The Kieronasaurus Krossword crossword puzzle
Across
  1. Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
  2. Data collected by you yourself.
  3. An information classification expressed as numbers only.
  4. Triad
  5. Defined as direct physical threat to a country, but could also be a threat to financial security.
  6. amount of data protection principles.
  7. footprint Any traceable action you or others take on the internet
  8. Computer hardware that cannot be moved
Down
  1. Attack on a business's servers not only impacts on the business or individual it holds data for
  2. Announcements or adverts. Small amounts of information sent easily.
  3. the ability to change the displayed content.
  4. The amount of information that can be held.
  5. Raw facts and figures.
  6. Canada's data protection legislation.
  7. The language that websites are written in
  8. A closed, private network within a building or company.

16 Clues: TriadRaw facts and figures.Data collected by you yourself.Canada's data protection legislation.amount of data protection principles.Computer hardware that cannot be movedThe language that websites are written inThe amount of information that can be held.the ability to change the displayed content....

Globalisasi Bidang Kriminalitas (Najla Meuthya Okri F2.5) 2024-09-17

Globalisasi Bidang Kriminalitas (Najla Meuthya Okri F2.5) crossword puzzle
Across
  1. penyalahgunaan informasi untuk mendapatkan keuntungan yang tidak sah
  2. kejahatan yang tidak melibatkan korban
  3. proses kriminalitas yang pelaku mulai melaksanakan aksi kriminalitas yang telah direncanakan
  4. proses yang melibatkan pemalsuan uang dan dokumen secara ilegal
  5. Aktivitas kriminalitas yang melibatkan perdagangan manusia
  6. gejala terjadi nya kriminalitas perdagangan internasional merupakan bentuk dari bidang
  7. Sistem hukum internasional yang mengatur peradilan terhadap kejahatan transnasional
Down
  1. proses menjual atau mendistribusikan narkoba secara ilegal
  2. organisasi internasional yang berupaya memberantas kriminalitas global
  3. penggunaan internet untuk mengirim spam atau virus untuk tujuan jahat
  4. Tahap pertama dari kriminalitas
  5. istilah untuk penipuan yang dilakukan dengan mengelabui orang melalui medsos
  6. teori kriminalitas yang dikemukakan oleh Emile durkheim
  7. jenis kejahatan yang dilakukan di dunia Maya
  8. singkatan yang umum digunakan untuk globalisasi kriminalitas dalam konteks internasional

15 Clues: Tahap pertama dari kriminalitaskejahatan yang tidak melibatkan korbanjenis kejahatan yang dilakukan di dunia Mayateori kriminalitas yang dikemukakan oleh Emile durkheimproses menjual atau mendistribusikan narkoba secara ilegalAktivitas kriminalitas yang melibatkan perdagangan manusiaproses yang melibatkan pemalsuan uang dan dokumen secara ilegal...

Collocations 2023-04-06

Collocations crossword puzzle
Across
  1. updates
  2. technical support
  3. security measures
  4. to tickets
  5. issues
Down
  1. user requests
  2. software systems
  3. errors
  4. systems
  5. customer complaints
  6. troubleshooting
  7. problems

12 Clues: errorsissuesupdatessystemsproblemsto ticketsuser requeststroubleshootingsoftware systemstechnical supportsecurity measurescustomer complaints

Puzzle 2014-01-07

Puzzle crossword puzzle
Across
  1. programme
  2. stuff
  3. to issues
  4. is also important
  5. more stuff
  6. yellow brick
  7. systems
Down
  1. seas
  2. is important
  3. first
  4. advice
  5. skies

12 Clues: seasfirststuffskiesadvicesystemsprogrammeto issuesmore stuffis importantyellow brickis also important

ACE 2023-06-22

ACE crossword puzzle
Across
  1. 16th president of the United States.
  2. One of the founders of the ACE program.
  3. One of the principles of war. Enough said.
  4. Founded by Billy Mitchel in 1947.
  5. Used for safety in mines and computers.
  6. One of the principles of war. Place the enemy in a disadvantageous position through the flexible application of combat power.
  7. Bad for your drink and computer memory.
  8. The Civil war general that the base of US cyber command is named after.
  9. 5+5=A in this number system.
  10. Splinter. Alternatively, a popular red team tool developed by Bishop Fox.
  11. One of the principles of war. Strike the enemy at a time or place or in a manner for which he is unprepared.
  12. The hall the ACE interns stay in.
  13. The location of what is often considered the turning point of the Civil War.
  14. One of the principles of war. Direct every military operation toward a clearly defined, decisive, and attainable objective.
  15. Is not an option.
  16. One of the principles of war. Never permit the enemy to acquire an unexpected advantage.
  17. Following through with what you say you're going to do. One of the ACE core values.
  18. What leaders are.
Down
  1. Common mammal that inhabits Rome.
  2. Being a master of your craft. One of the ACE core values.
  3. The name of a hidden website on the ace battlefield.
  4. Doing what's right, even in the face of personal peril. One of the ACE core values.
  5. The nation that won the most in 2020 ACE capstone.
  6. Home of the colosseum.
  7. One of the principles of war. Seize, retain, and exploit the initiative.
  8. Operating system used for ACE this summer.
  9. Second year interns who return to help with the program.
  10. Superuser do. Alternatively, the name of an adorable corgi.
  11. & development.
  12. Number of miles ACE interns run every week.
  13. 1+1=10 in this number system.
  14. Programming language made by Google. Used on the ACE battlefield.
  15. The last step of the PBED.
  16. One of the principles of war. Defined as: concentrate the effects of combat power at the decisive place and time.
  17. Giving people what they need, when they need it. One of the ACE core values.

35 Clues: & development.Is not an option.What leaders are.Home of the colosseum.The last step of the PBED.5+5=A in this number system.1+1=10 in this number system.Common mammal that inhabits Rome.Founded by Billy Mitchel in 1947.The hall the ACE interns stay in.16th president of the United States.One of the founders of the ACE program....

IR - Module 1 2024-12-05

IR - Module 1 crossword puzzle
Across
  1. US and ----- were the superpowers emerged after WWII
  2. The period from 1945-1991
  3. The IGO formed after WW 2
  4. This level of IR analysis states that single countries can influence IR
  5. The process of managing / governing people in a place.
  6. The treaty to punish Germany is
  7. The relationship between nation states is called
  8. The second name of the person behind systems theory.
  9. Promote peace and security among nations, Kill evils in the society.
  10. Looting one country by another country is
Down
  1. Treaty of ---- was signed on 1648
  2. ..... conference was held in 1919 Jan
  3. The process of making slaves and setting empire is called
  4. The treaty to end war on Spanish succession was ..... treaty.
  5. Germany, Austria-Hungary, Italy
  6. German ruler during WW I
  7. Nation security is a matter of importance and selfishness
  8. This level of IR analysis says that a single person can influence in IR

18 Clues: German ruler during WW IThe period from 1945-1991The IGO formed after WW 2Germany, Austria-Hungary, ItalyThe treaty to punish Germany isTreaty of ---- was signed on 1648..... conference was held in 1919 JanLooting one country by another country isThe relationship between nation states is calledUS and ----- were the superpowers emerged after WWII...

Diary Of A Wimpy Kid 2024-04-11

Diary Of A Wimpy Kid crossword puzzle
Across
  1. what did Greg want to do for Christmas?
  2. what did mom and dad always do?
  3. what did Greg want to swim with at the beach
  4. What kept Greg awake?
  5. What did Greg think he swallowed in the water?
  6. Who helped Greg escape security?
  7. How did the Heffley's get to Isla de corales?
  8. What did Manny steal from the beach?
  9. What happened to the banana raft?
Down
  1. When did the Heffley's leave their home?
  2. How did they find out about the resort?
  3. what did the Heffleys steal from the security to run away?
  4. when should have the Heffley's left to get to the airport
  5. what would Greg rather do then go on vacation?
  6. who is the author?
  7. what did the Heffley's grab the wrong of
  8. What kind of animal was at the resort bar?
  9. Who is the main character?

18 Clues: who is the author?What kept Greg awake?Who is the main character?what did mom and dad always do?Who helped Greg escape security?What happened to the banana raft?What did Manny steal from the beach?How did they find out about the resort?what did Greg want to do for Christmas?When did the Heffley's leave their home?...

Confidentiality test 2025-02-06

Confidentiality test crossword puzzle
Across
  1. Data records of an employee’s performance on the job such as performance reports,
  2. or Sensitive Data information about an employee prior to employment such as a résumé,
  3. of espionage conducted for commercial purposes rather than security;
  4. involves individuals hired to steal trade secrets, new products or
  5. actions, supervisory notations
  6. in the Workplace keeping employee, customer and client information private
Down
  1. work history, date of birth, social security number, criminal record,
  2. religion, etc.
  3. information
  4. insurance information
  5. Espionage
  6. Data information which may arise from employment-related physicals, drug tests and

12 Clues: Espionageinformationreligion, etc.insurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orof espionage conducted for commercial purposes rather than security;work history, date of birth, social security number, criminal record,...

Cyber Safety 2022-02-10

Cyber Safety crossword puzzle
Across
  1. What is left behind after going online
  2. How to stay safe online
  3. Never share this online
  4. Don't fall for these online
Down
  1. Do not talk to these people
  2. Can show lots of information in the background
  3. Ensure they are strong so you don't get hacked

7 Clues: How to stay safe onlineNever share this onlineDo not talk to these peopleDon't fall for these onlineWhat is left behind after going onlineCan show lots of information in the backgroundEnsure they are strong so you don't get hacked

Cyber Bullying 2022-03-23

Cyber Bullying crossword puzzle
Across
  1. not being kind to someone
  2. a way of contacting friends and family
  3. a place to research
  4. a source of technolgy
Down
  1. something every local place has
  2. Being rude to someone
  3. online site to send and receive

7 Clues: a place to researchBeing rude to someonea source of technolgynot being kind to someonesomething every local place hasonline site to send and receivea way of contacting friends and family

Cyber Mobbing 2016-02-08

Cyber Mobbing crossword puzzle
Across
  1. B ... sichern, damit deine Geschichte glaubhaft ist.
  2. S ... Die beharrliche Verfolgung einer Person.
  3. D ... Daten einer Person zu verändern, zu löschen oder unbrauchbar zu machen.
Down
  1. S ... Nutzerinnen/Nutzer die Dich belästigen.
  2. Die Belästigungen finden rund um die Uhr und im Internet statt.
  3. B ... In der Öffentlichkeit eine Person zu beschimpfen oder zu verspotten.
  4. N ... Jemand anderen mit Gewalt oder durch gefährliche Drohung zu einer Handlung anstiften.

7 Clues: S ... Nutzerinnen/Nutzer die Dich belästigen.S ... Die beharrliche Verfolgung einer Person.B ... sichern, damit deine Geschichte glaubhaft ist.Die Belästigungen finden rund um die Uhr und im Internet statt.B ... In der Öffentlichkeit eine Person zu beschimpfen oder zu verspotten....

Cyber Crimes 2017-01-24

Cyber Crimes crossword puzzle
Across
  1. Program that copies itself
  2. floods the bandwidth
  3. counterfeiting products
Down
  1. online harrasment
  2. Crimes using computers
  3. disguising as trustworthy
  4. gaining unauthorized access

7 Clues: online harrasmentfloods the bandwidthCrimes using computerscounterfeiting productsdisguising as trustworthyProgram that copies itselfgaining unauthorized access

Cyber Bullying 2021-06-03

Cyber Bullying crossword puzzle
Across
  1. Communicate with people online and sharing photos
  2. When you are influenced to do something
  3. When you ask your parent for permission
Down
  1. People who watch a situation
  2. When you don't feel safe
  3. A place where you can communicate with technology
  4. How you treat others nicely

7 Clues: When you don't feel safeHow you treat others nicelyPeople who watch a situationWhen you are influenced to do somethingWhen you ask your parent for permissionA place where you can communicate with technologyCommunicate with people online and sharing photos

Cyber Test 2024-06-18

Cyber Test crossword puzzle
Across
  1. Il processo di codificare le informazioni per proteggerle dagli accessi non autorizzati
  2. Un metodo di verifica dell'identità che richiede due forme di identificazione
  3. Programma che registra segretamente le sequenze di tasti premuti su una tastiera
Down
  1. Tecnica di attacco che utilizza email fraudolente per rubare informazioni sensibili
  2. Attività illegale di ottenere accesso non autorizzato a sistemi informatici
  3. Software dannoso progettato per danneggiare o disabilitare computer e sistemi
  4. Una rete di computer infettati da malware controllati da un singolo attaccante

7 Clues: Attività illegale di ottenere accesso non autorizzato a sistemi informaticiSoftware dannoso progettato per danneggiare o disabilitare computer e sistemiUn metodo di verifica dell'identità che richiede due forme di identificazioneUna rete di computer infettati da malware controllati da un singolo attaccante...

Cyber Puzzle 2025-01-28

Cyber Puzzle crossword puzzle
Across
  1. A secret word or phrase used to access a system.
  2. A copy of important data to restore in case of loss.
  3. Someone who tries to break into computer systems.
Down
  1. A type of malicious software that spreads between computers.
  2. Unwanted or unsolicited emails.
  3. A system that protects a network from unauthorized access.
  4. A fraudulent attempt to steal sensitive information.

7 Clues: Unwanted or unsolicited emails.A secret word or phrase used to access a system.Someone who tries to break into computer systems.A copy of important data to restore in case of loss.A fraudulent attempt to steal sensitive information.A system that protects a network from unauthorized access....

Cyber Clues 2025-01-22

Cyber Clues crossword puzzle
Across
  1. Creating a step-by-step series of commands for a computer to follow
  2. A character or image that can be created and programmed to move, appear, and make sounds
  3. Ability to use digital tools effectively
  4. Simplifying complex problems by removing non- essential details
Down
  1. A category of blocks (yellow) that starts the event
  2. Breaking a problem into smaller, manageable parts
  3. Visual Block-based programming language for young learners

7 Clues: Ability to use digital tools effectivelyBreaking a problem into smaller, manageable partsA category of blocks (yellow) that starts the eventVisual Block-based programming language for young learnersSimplifying complex problems by removing non- essential detailsCreating a step-by-step series of commands for a computer to follow...

Immigration 2025-08-29

Immigration crossword puzzle
Across
  1. søke
  2. presidentmakt
  3. bestå av
  4. rettskjennelse
  5. få tilgang til
  6. arbeidstillatelse
  7. skaffe seg
  8. oppholdstillatelse
Down
  1. stå overfor
  2. stans
  3. bot
  4. folketrygd
  5. utsatt
  6. fødselsattest

14 Clues: botsøkestansutsattbestå avfolketrygdskaffe segstå overforpresidentmaktfødselsattestrettskjennelsefå tilgang tilarbeidstillatelseoppholdstillatelse

September 2021 Newsletter Crossword Puzzle 2021-08-30

September 2021 Newsletter Crossword Puzzle crossword puzzle
Across
  1. A password attack that attempts to guess passwords using a powerful computer.
  2. A malicious program that replicates itself in the infected computer’s memory and spreads.
  3. A type of authentication that combines two or more credentials such as what one knows (a password), what one has (PIV), and/or what the user is (biometric verification).
  4. A cyberattack that uses a list of usernames from a data breach and a list of the top used passwords to test a large number of accounts until the accounts are accessed.
  5. A chain of 3 - 4 words that are easy to remember, but long and complex enough to be secure.
  6. A password cannot be reused by a Forest Service employee that was used in the last <how many> passwords.
Down
  1. A type of password attack where the cyber attacker uses a stuffing approach with usernames and passwords obtained from a data breach to access other accounts.
  2. A cyber attacker uses a strong computer to try every word in a type of vocabulary/reference book to guess a password.
  3. A type of malware that is installed on a user’s computer without their knowledge to monitor the user’s computer and activity to collect information.
  4. A string of characters that protect access to your computer and software applications from unauthorized users.

10 Clues: A password attack that attempts to guess passwords using a powerful computer.A malicious program that replicates itself in the infected computer’s memory and spreads.A chain of 3 - 4 words that are easy to remember, but long and complex enough to be secure....

gameshop 2014-05-19

gameshop crossword puzzle
Across
  1. puzzle seller
  2. e.g. rent-a-cops
  3. ex. Chucky Cheese
  4. tree hugger?
  5. a rubrik wheel-runner?
  6. go ballistic
  7. express
  8. discharge
  9. score
Down
  1. manure
  2. about to be
  3. chaos
  4. a continuous transporter
  5. loose change
  6. Florence and the _____
  7. hereditary

16 Clues: chaosscoremanureexpressdischargehereditaryabout to betree hugger?loose changego ballisticpuzzle sellere.g. rent-a-copsex. Chucky Cheesea rubrik wheel-runner?Florence and the _____a continuous transporter

TUGAS BK 2024-02-05

TUGAS BK crossword puzzle
Across
  1. bullying yang melibatkan penggunaan kata-kata untuk menyakiti, merendahkan, atau mengintimidasi seseorang adalah bullying Verbal
  2. mencegah bullying dengan cara menerapkan Edukasi
  3. dalam media sosial Cyber bullying
  4. bullying yang menyebabkan peningkatan dan penurunan suasana hati Depresi
  5. lain dari bullying Perundungan
Down
  1. mengancam, mempermalukan, mengganggu, memberi panggilan nama, merendahkan, intimidasi, memaki, dan menyebarkan gosip buruk disebut Bullying
  2. pelaku bullying Bullies
  3. penelitian bullying Olweus
  4. bully berasal dari bahasa Inggris
  5. satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain Iri

10 Clues: penelitian bullying Olweuspelaku bullying Bulliesbully berasal dari bahasa Inggrisdalam media sosial Cyber bullyinglain dari bullying Perundunganbullying yang menyebabkan peningkatan dan penurunan suasana hati Depresi...

Bullying Crossword Ward 2025-02-03

Bullying Crossword Ward crossword puzzle
Across
  1. Someone who is helpful toward the person being bullied.
  2. This type of bullying can hurt someone's body.
  3. Sending someone mean messages over and over.
  4. The person who someone tries to bully.
Down
  1. This type of verbal bullying makes someone feel unsafe.
  2. Someone who does mean things to someone less powerful than them.
  3. Hurtful words are used in this type of bullying.
  4. Repeatedly excluding someone to be mean.
  5. Someone who watches the bullying.

9 Clues: Someone who watches the bullying.The person who someone tries to bully.Repeatedly excluding someone to be mean.Sending someone mean messages over and over.This type of bullying can hurt someone's body.Hurtful words are used in this type of bullying.This type of verbal bullying makes someone feel unsafe....

Unit 11 2023-05-10

Unit 11 crossword puzzle
Across
  1. order
  2. ewww slay 💅
  3. landslide
  4. insane wise
  5. bodyguards
  6. truth
  7. appeal
  8. confirm to risk
Down
  1. picky
  2. real
  3. cuddle
  4. to look

12 Clues: realorderpickytruthcuddleappealto looklandslidebodyguardsewww slay 💅insane wiseconfirm to risk

High Five 5 kpl 3 2024-10-01

High Five 5 kpl 3 crossword puzzle
Across
  1. passi
  2. vetolaukku
  3. lippu
  4. matkalaukku
  5. passintarkastus
  6. lähtöselvitys
  7. reppu
Down
  1. tarkastuskortti
  2. nimilappu
  3. lompakko
  4. turvatarkastus
  5. lähtöportti

12 Clues: passilippureppulompakkonimilappuvetolaukkumatkalaukkulähtöporttilähtöselvitysturvatarkastustarkastuskorttipassintarkastus

STOP BULLYING 2023-10-19

STOP BULLYING crossword puzzle
Across
  1. Uses their body to hurt someone else
  2. Uses words to hurt someone
Down
  1. Using force to hurt someone
  2. Hurt someone else's relationship
  3. online bullying

5 Clues: online bullyingUses words to hurt someoneUsing force to hurt someoneHurt someone else's relationshipUses their body to hurt someone else

Cyber Crossword Puzzle v3.1 2020-09-21

Cyber Crossword Puzzle v3.1 crossword puzzle
Across
  1. A collection of information that is organized so that it can easily be accessed, managed and updated
  2. A form of malware that can replicate and spread without the need for human or system interaction. Think of it as malware on autopilot
  3. gaining unauthorized logical access to sensitive data by circumventing a system's protections
  4. Never share your _________ with another person
  5. encrypted form of the message being sent
  6. The process of converting information or data into a code
  7. sequence of eight bits
  8. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
Down
  1. A type of malware that can secretly record a user’s keystrokes and send them to an unauthorised third party
  2. approval, permission, or empowerment for someone or something to do something
  3. stripping one llayer's headers and passing the rest of the packet up to next higher layer
  4. process of confirming the correctness of the claimed identity
  5. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
  6. Used to describe hacking activity carried out for a political, ethical or societal end
  7. Files placed on your computer to allow websites to remember details

15 Clues: sequence of eight bitsencrypted form of the message being sentNever share your _________ with another personThe process of converting information or data into a codeprocess of confirming the correctness of the claimed identityFiles placed on your computer to allow websites to remember details...

Unit 3 Cyber World 2024-03-11

Unit 3 Cyber World crossword puzzle
Across
  1. Everyone is posting ________ of themselves with the Chubby Heart in Central.
  2. Nelson updated his antivirus program to protech his comuter against _________.
  3. __________ scams look like they are from familiar websites to steal our personal information.
  4. Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
  5. To avoid being a _________ of the scam, always double-check the links and email address.
  6. We need to set up an anti-________ filter to block those annoying messages.
  7. Time wanted to get the latest version of the smartphone because it had much better _______ life.
Down
  1. It is a good idea to keep your personal details __________ on the Internet.
  2. ________________ may try to download malware to your computer.
  3. Jenny is completely ___________ on the video games. She played it all day!
  4. To deal with social media overuse, it is better for you to turn off _____________ on your phone.
  5. Blind people have special programmes to help them _______ online.
  6. She's obsessed with the new online novel and can't put it down.
  7. Governments usually _______ the data on their websites to protect citizens' information.
  8. ________ is a big problem for singers as people download their music without paying for it.

15 Clues: ________________ may try to download malware to your computer.She's obsessed with the new online novel and can't put it down.Blind people have special programmes to help them _______ online.Jenny is completely ___________ on the video games. She played it all day!It is a good idea to keep your personal details __________ on the Internet....

Cyber ethics crosswords 76 2025-05-28

Cyber ethics crosswords 76 crossword puzzle
Across
  1. Name used to log into websites or apps
  2. Secret code to access an account
  3. Name used to log into a system
  4. Breaking into a system without permission
  5. Online bulling or harassment
  6. rules of right and wrong behavior online
  7. Blocks unauthorized access to a network
Down
  1. Software that secretly gathers your information
  2. theft Stealing someone's personal or confidential data
  3. Fake emails to steal personal data
  4. Keeping your personal information safe
  5. Harmful software that damages systems
  6. Scrambling data to prevent unauthorized access
  7. program that spreads and corrupts files
  8. Protects against harmful programs
  9. A trick to steal your data or money

16 Clues: Online bulling or harassmentName used to log into a systemSecret code to access an accountProtects against harmful programsFake emails to steal personal dataA trick to steal your data or moneyHarmful software that damages systemsName used to log into websites or appsKeeping your personal information safeprogram that spreads and corrupts files...

Social Security Administration 2021-02-09

Social Security Administration crossword puzzle
Across
  1. stuff you do at a job
  2. hard work, often physical
  3. the economic crisis of the 1930s
Down
  1. jobs given to artists to paint
  2. Programs to support the good of the people
  3. breakfast food
  4. the kind of people most likely to receive social security
  5. month that Social Security was signed into law
  6. The President during the 1930s
  7. The program signed into law by President Roosevelt in 1935

10 Clues: breakfast foodstuff you do at a jobhard work, often physicaljobs given to artists to paintThe President during the 1930sthe economic crisis of the 1930sPrograms to support the good of the peoplemonth that Social Security was signed into lawthe kind of people most likely to receive social security...

Information Risk Management Date:07/07/2015 2015-07-06

Information Risk Management                           Date:07/07/2015 crossword puzzle
Across
  1. Potential cause of unwanted event
  2. form of identity management
  3. means of managing risk
  4. combination of likelihood of an event and its impact
  5. weakness of an asset that can be exploited
  6. measure of the effect of a security event
Down
  1. earthquake is a ________ threat
  2. checking whether the organization has required controls is _____________ audit
  3. secretly collect sensitive or classified information
  4. information security program is aligned to _____________ of organization

10 Clues: means of managing riskform of identity managementearthquake is a ________ threatPotential cause of unwanted eventmeasure of the effect of a security eventweakness of an asset that can be exploitedcombination of likelihood of an event and its impactsecretly collect sensitive or classified information...

Basic Terminologies 2016-06-14

Basic Terminologies crossword puzzle
Across
  1. form of identity management
  2. weakness of an asset that can be exploited
  3. information security program is aligned to _____________ of organization
  4. means of managing risk
  5. measure of the effect of a security event
Down
  1. checking whether the organization has required controls is _____________ audit
  2. Potential cause of unwanted event
  3. secretly collect sensitive or classified information
  4. combination of likelihood of an event and its impact
  5. earthquake is a ________ threat

10 Clues: means of managing riskform of identity managementearthquake is a ________ threatPotential cause of unwanted eventmeasure of the effect of a security eventweakness of an asset that can be exploitedsecretly collect sensitive or classified informationcombination of likelihood of an event and its impact...

National Security Crossword 2025-10-22

National Security Crossword crossword puzzle
Across
  1. SECURITY Law that helps keep Hong Kong safe.
  2. The rule makers who decide if the law has been broken.
  3. Opposite of danger.
Down
  1. People who follow rules.
  2. Something that is against the law.
  3. To protect or keep safe.
  4. A place where people live and follow laws.
  5. Rules that everyone must __________.
  6. A feeling when you are safe.
  7. What you should always do with laws.

10 Clues: Opposite of danger.People who follow rules.To protect or keep safe.A feeling when you are safe.Something that is against the law.Rules that everyone must __________.What you should always do with laws.A place where people live and follow laws.SECURITY Law that helps keep Hong Kong safe.The rule makers who decide if the law has been broken.

Cold War in Europe 2021-05-05

Cold War in Europe crossword puzzle
Across
  1. U.S. would provide aid to any country fighting communism.
  2. Leader of the Soviet Union during WWII and cold war
  3. Churchill's description of invisible barrier
  4. U.S.policy to stop the spread of communism.
  5. Stalin uses East European countries his buffer
  6. East European collective security agreement
Down
  1. Meeting of the Big Three to discuss post-war europe
  2. United States economic assistance plan for Europe.
  3. willingness to go to the brink of war
  4. Nation New International Organization to keep peace
  5. West European collective security organization
  6. U.S. President at Yalta.

12 Clues: U.S. President at Yalta.willingness to go to the brink of warU.S.policy to stop the spread of communism.East European collective security agreementChurchill's description of invisible barrierWest European collective security organizationStalin uses East European countries his bufferUnited States economic assistance plan for Europe....

Chapter 5 Sonia Hernandez Flores 2019-02-15

Chapter 5 Sonia Hernandez Flores crossword puzzle
Across
  1. income - an income tax system that imposes tax
  2. - Done, Produced, or occurring every 2 weeks.
  3. - Provides the information of your employer needs to determine
  4. - An individual's Total Gross income minus specific deductions
Down
  1. include social security, Medicare
  2. - amount of money received after a period of time
  3. -subtraction
  4. Reports - An employees's annual wages and the other amount of taxes withheld
  5. - Used to report interest income
  6. - Taxes to fund the social security
  7. pay - of the types of deductions that may be subtracted from
  8. pay - amount payed after removed taxes.

12 Clues: -subtraction- Used to report interest incomeinclude social security, Medicare- Taxes to fund the social securitypay - amount payed after removed taxes.- Done, Produced, or occurring every 2 weeks.income - an income tax system that imposes tax- amount of money received after a period of time...

confidentiality test 2025-02-06

confidentiality test crossword puzzle
Across
  1. religion, etc.
  2. work history, date of birth, social security number, criminal record,
  3. involves individuals hired to steal trade secrets, new products or
  4. or Sensitive Data information about an employee prior to employment such as a résumé,
  5. of information
  6. information
  7. Data records of an employee’s performance on the job such as performance reports,
  8. Data information which may arise from employment-related physicals, drug tests and
  9. insurance information
Down
  1. actions, supervisory notations
  2. in the Workplace keeping employee, customer and client information private
  3. set of rules or promises which limits access or places restrictions on certain
  4. Espionage form of espionage conducted for commercial purposes rather than security;

13 Clues: informationreligion, etc.of informationinsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,in the Workplace keeping employee, customer and client information private...

confidentiality test 2025-02-06

confidentiality test crossword puzzle
Across
  1. Data records of an employee’s performance on the job such as performance reports,
  2. religion, etc.
  3. in the Workplace keeping employee, customer and client information private
  4. or Sensitive Data
  5. set of rules or promises which limits access or places restrictions on certain
Down
  1. Data information which may arise from employment-related physicals, drug tests and
  2. information
  3. involves individuals hired to steal trade secrets, new products or
  4. Espionage form of espionage conducted for commercial purposes rather than security;
  5. of information
  6. actions, supervisory notations
  7. insurance information
  8. about an employee prior to employment such as a résumé,previous work history, date of birth, social security number, criminal record,

13 Clues: informationreligion, etc.of informationor Sensitive Datainsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orin the Workplace keeping employee, customer and client information privateset of rules or promises which limits access or places restrictions on certain...

unit 3 vocab cyber 2021-09-28

unit 3 vocab cyber crossword puzzle
Across
  1. an attempt by hackers to damage or destroy a computer network or system
  2. users cycle through different roles
  3. allow user to share folders
  4. those a user receives through another object, such as a group
  5. Physical token inserted into a computer’s USB port
  6. user can be granted additional rights to data beyond what is allowed by assigned access level
  7. type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
Down
  1. type of malware that spreads copies of itself from computer to computer
  2. process of validating a user
  3. a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs
  4. those a user receives by default at a lower level
  5. measurement and analysis of a biological feature
  6. denying an authorized biometric credential
  7. those a user is given at a specific location
  8. when far and frr are equal

15 Clues: when far and frr are equalallow user to share foldersprocess of validating a userusers cycle through different rolesdenying an authorized biometric credentialthose a user is given at a specific locationmeasurement and analysis of a biological featurethose a user receives by default at a lower levelPhysical token inserted into a computer’s USB port...

Cyber Unit 15 Test 2025-04-11

Cyber Unit 15 Test crossword puzzle
Across
  1. Overwhelming a server with traffic, in short
  2. ___ force attack: trial-and-error password cracking method
  3. Social engineering tactic involving made-up scenarios
  4. Self-replicating malware that spreads without needing a host file
  5. Software that filters out unwanted junk in your inbox
  6. Umbrella term for all malicious software
  7. Software that detects and removes hidden surveillance tools
  8. Digital barriers that block unauthorized access
Down
  1. Secretly gathers data on you without consent
  2. Malware disguised as legitimate software
  3. Network of hijacked computers under remote control
  4. Software that protects your system from malicious programs
  5. Infected computer controlled remotely, like the undead
  6. Malicious code that replicates by attaching to clean files
  7. Annoying pop-ups and promos installed with free apps

15 Clues: Malware disguised as legitimate softwareUmbrella term for all malicious softwareOverwhelming a server with traffic, in shortSecretly gathers data on you without consentDigital barriers that block unauthorized accessNetwork of hijacked computers under remote controlAnnoying pop-ups and promos installed with free apps...

Security Crossword 2023-03-25

Security Crossword crossword puzzle
Across
  1. What colour will appear in the security system when a veteran is searched?
  2. How many minutes a security member may get promotion after last promotion?
  3. Who is the leader of Security?
  4. What Non-HIA members have access to HIA base through security check?
Down
  1. Who do you contact if someone needs retraining or start over?
  2. What colour will appear in the security system when a HR+ is searched?

6 Clues: Who is the leader of Security?Who do you contact if someone needs retraining or start over?What Non-HIA members have access to HIA base through security check?What colour will appear in the security system when a HR+ is searched?What colour will appear in the security system when a veteran is searched?...

crosss 2024-09-04

crosss crossword puzzle
Across
  1. This cloud security model involves splitting data into encrypted parts that are stored in different locations, ensuring that no single provider has access to the entire dataset.
  2. What feature in AWS allows setting permissions for a user based on specific circumstances such as the user's IP address or the time they are accessing the service
  3. feature allows the enforcement of specific security policies, like requiring multi-factor authentication, for API interactions based on user actions and origins?
  4. mechanism ensures secure and temporary access to resources without storing long-term credentials, particularly in cross-account situations
  5. What AWS service provides protection against distributed denial-of-service (DDoS) attacks and integrates with CloudFront and Route 53?
Down
  1. Technique that spreads data across multiple servers to enhance security and reliability
  2. threat intel dashboard
  3. Azure interface for applications auditing adherence, Logs, exceptions, and custom diagnostics to fortify security oversight
  4. A method used to ensure that cloud users can only access resources they are authorized for
  5. Cloud service that offers firewalls, DDoS protection, and other network security measures

10 Clues: threat intel dashboardTechnique that spreads data across multiple servers to enhance security and reliabilityCloud service that offers firewalls, DDoS protection, and other network security measuresA method used to ensure that cloud users can only access resources they are authorized for...

~Food Insecurity~ 2021-11-19

~Food Insecurity~ crossword puzzle
Across
  1. What is your teachers last name?
  2. Food insecurity happens often during what time of year?
  3. During the pandemic, food insecurity in households ---------.
  4. What meal do most schools provide for free or at a low cost?
Down
  1. How can high food security households help struggling households?
  2. How many categories of food security are there?
  3. What do you need in order to buy food?
  4. What type of food security is when you do not have any problems getting food?

8 Clues: What is your teachers last name?What do you need in order to buy food?How many categories of food security are there?Food insecurity happens often during what time of year?What meal do most schools provide for free or at a low cost?During the pandemic, food insecurity in households ---------....

DUST BOWL 2015-03-04

DUST BOWL crossword puzzle
Across
  1. bowl drought
  2. purchase
  3. Roosevelt
  4. holder
  5. soup
  6. trust
Down
  1. Steinbeck
  2. security
  3. firesidechat
  4. d Roosevelt
  5. scare

11 Clues: souptrustscareholdersecuritypurchaseSteinbeckRooseveltd Rooseveltfiresidechatbowl drought

Economist CBCIS Crossword 2018-11-16

Economist CBCIS Crossword crossword puzzle
Across
  1. Economist "?", morning briefing from the editors. Delivered to your smartphone or inbox before breakfast.
  2. Our data design agency, located in Stratford, London.
  3. A technique used by criminals to trick you into giving them your username and password
  4. Economist "?", expresses The Economist's globally curious outlook in the form of short, mind-stretching documentaries.
  5. We use Two-"?" authentication as an extra layer of security.
  6. "?" News Club, run by The Economist Foundation, bringing young people together across the UK to talk about current affairs.
Down
  1. New regulation implemented in 2018 for general data protection.
  2. Business unit acquired by The Economist in 2006, Connecting the global treasury community for over 25 years
  3. EIU, also known as The Economist "?" Unit
  4. "?"security@economist.com, the address too reach to should you require security advice.
  5. James "?", founder of The Economist in 1843.

11 Clues: EIU, also known as The Economist "?" UnitJames "?", founder of The Economist in 1843.Our data design agency, located in Stratford, London.We use Two-"?" authentication as an extra layer of security.New regulation implemented in 2018 for general data protection.A technique used by criminals to trick you into giving them your username and password...

vocab 2023-01-25

vocab crossword puzzle
Across
  1. where securities are created,
  2. a digital system that matches buyers and sellers looking to trade securities in the financial markets.
  3. a security—usually a bond or a preferredstock stock that can be converted into a different security—typically shares of the company's common stock.
  4. A class of stock that is granted certain rights that differ from common stock.
  5. a pooled collection of assets that invests in stocks, bonds, and other securities.
  6. securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
  7. funds that trade on exchanges, generally tracking a specific index.
  8. provide liquidity and depth to markets and profit from the difference in the bid-ask spread.
  9. A type of tradeable asset, or security, that equates to ownership in a company.
  10. You have a capital gain if you sell the asset for more than your adjusted basis.
  11. A group of 500 companies whose average daily share prices are used to calculate an index of the day's security prices.
  12. the annual income an investor can expect to receive while holding a particular bond.
  13. The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
  14. a group or basket of securities, derivatives, or other financial instruments that represents and measures the performance of a specific market, asset class, market sector, or investment strategy.
  15. when a private company becomes public by selling its shares on a stock exchange.
  16. a real estate metric that indicates the value of a mutual fund or an exchange-traded fund
  17. where those securities are traded by investors.
  18. a price-weighted index that tracks 30 large, publicly-owned companies trading on the New York Stock Exchange and the Nasdaq.
Down
  1. the rate of return on a bond investment.
  2. An individual can become an accredited investor if he or she has a net worth of over $1M, alone or with a spouse.
  3. date the moment in time when the principal of a fixed income instrument must be repaid to an investor
  4. The practice of spreading your investments around so that your exposure to any one type of asset is limited.
  5. the process companies use to raise money by selling securities to a limited number of potential investors.
  6. a forum where securities like bonds and stocks are purchased and traded.
  7. A filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws.
  8. used by governments or companies to raise money by borrowing from investors.
  9. Your lender verifies your income, assets, debt and property details in order to issue final approval for your loan.
  10. a sale or equity shares or debt securities by an organization to the public in order to raise funds for the company.

28 Clues: where securities are created,the rate of return on a bond investment.where those securities are traded by investors.funds that trade on exchanges, generally tracking a specific index.a forum where securities like bonds and stocks are purchased and traded.used by governments or companies to raise money by borrowing from investors....

Agility 2017 2017-04-24

Agility 2017 crossword puzzle
Across
  1. The worlds first search engine for internet-connect devices
  2. A mechanism whereby a brwoser uses a raw data channel to communicate with a server
  3. F5 REST API Framework
  4. Software used to disrupt a computer and/or gather sensitive data
  5. revolutionary new purpose built security appliance "DDoS hybrid _______"
  6. How unique am I? can my device be distinguished from others?
  7. This very conference
  8. "______ IT" the people who provision Apps and Services without authorisation
  9. How Websafe makes data unintelligible for the fraudsters
  10. Moving multiple Point solutions on to F5 Application Services Fabric
  11. The key management tool on the journey to the Private cloud
  12. Where to store objects for future use
  13. F5's event driven scripting language
  14. What film inspired the naming of F5?
  15. How to get a non-routable protocol over a routed network
  16. A fundemental principle of security to be able to see all your application traffic
  17. An arbitrary number that may only be used once
  18. Leverage machine learning and Data analysis for a new type of DoS mitigation
  19. "App _________" used to dramatically simplify the deliver of services to public cloud apps
  20. American in exile in Russia
  21. "______ authentication" allows a second level of access through APM
  22. used to speed up deployments and streamline operations
  23. The key you don't want anyone to have
Down
  1. "_____engineering" exploits layer 8
  2. F5 Developer community
  3. The best way to secure data in transit
  4. The worlds most programmable cloud ready ADC
  5. The most destruptive botnet created to date
  6. The layer of the OSI model that hackers love to exploit
  7. hackers newest minions are what type of device
  8. How to protect past sessions against future compromises of keys
  9. A combination of multiple Clouds or Consumption models
  10. A free webservice offered by Qualys to check your websites SSL security
  11. Delivering business requirements through infrastructure automation
  12. Ensure point in time data integrity
  13. Using Code to automate tasks
  14. Protects LDNS servers from Cach poisoning and MITM attacks
  15. A secure Key exchange methodology conceptualized by Ralph Merkle
  16. The query response type offered by F5 DNS Express
  17. The key you want everyone to have
  18. F5's all new purpose built security appliances
  19. Journalist recently hit with record DDoS
  20. Unique hardware performance flexibility in the new iSeries appliances
  21. Market leading Cloud-based Application Services Platform
  22. An network built on top of another network
  23. Maximise security strength while minimising key length
  24. Best known form of digital currency
  25. Don't get stung by their App Sec top 10
  26. ASM's automagical system to ensure only human web access "________ Bot Defence"
  27. The algorithm use to disguise data or code
  28. The collaboration of programmers and IT administrators
  29. An attack designed to disrupt the availability of systems or services

52 Clues: This very conferenceF5 REST API FrameworkF5 Developer communityAmerican in exile in RussiaUsing Code to automate tasksThe key you want everyone to have"_____engineering" exploits layer 8Ensure point in time data integrityBest known form of digital currencyF5's event driven scripting languageWhat film inspired the naming of F5?...

society 2025-11-12

society crossword puzzle
Across
  1. vero
  2. huumeet
  3. vähemmistö
  4. vammainen
  5. tasa-arvo
  6. rikollisuus
Down
  1. työtön
  2. rasisimi
  3. hyvän tekeväisyys
  4. sosiaaliturva
  5. maailmanlaajuinen

11 Clues: verotyötönhuumeetrasisimivammainentasa-arvovähemmistörikollisuussosiaaliturvahyvän tekeväisyysmaailmanlaajuinen

Security of the Believer 2025-06-13

Security of the Believer crossword puzzle
Across
  1. Nothing can separate us from the ____ __ ___ (Romans 8:39)
  2. By hearing and believing, we are given _____ life (John 5:24)
  3. We are NOT saved through these (Ephesians 2:9)
  4. The best thing we can do when we have doubts is ____ to God
  5. The title of our book is "Your life as a _______"
  6. All that come to Jesus will in no way be ____ ___ (John 6:37)
  7. We are saved THROUGH this (Ephesians 2:8)
Down
  1. We are saved BY this (Ephesians 2:8)
  2. This is when you are not sure about something
  3. This is anything we do that is wrong and contrary to what God wants
  4. This is another gift from God through Jesus (Page 11)
  5. This is who paid the death penalty for our sins
  6. This is the gift God gives us when we believe and ask forgiveness (Page 11)
  7. Death is not an accident; it is an ________ (Page 13)
  8. This is who we studied about in Bible School this week.
  9. The wages of sin is ______ (Romans 6:23)
  10. When we confess, God is ______ and just to forgive us (1 John 1:9)

17 Clues: We are saved BY this (Ephesians 2:8)The wages of sin is ______ (Romans 6:23)We are saved THROUGH this (Ephesians 2:8)This is when you are not sure about somethingWe are NOT saved through these (Ephesians 2:9)This is who paid the death penalty for our sinsThe title of our book is "Your life as a _______"...

unit 7 2022-10-06

unit 7 crossword puzzle
Across
  1. a federal executive department of the United States government tasked with the enforcement of federal law
  2. one of two agencies that supply deposit insurance to depositors in American depository institutions
  3. domestic intelligence and security service of the United States
  4. the federal executive department responsible for developing and executing federal laws related to farming, forestry, rural economic development, and food.
  5. American scientific and regulatory agency within the United States Department of Commerce that forecasts weather
Down
  1. provides the military forces needed to deter war, and to protect the security of the United States
  2. the revenue service for the United States federal government
  3. an intergovernmental military alliance between 30 member states
  4. agency of the United States Department of Homeland Security
  5. the combination of communications and collaboration technologies.

10 Clues: agency of the United States Department of Homeland Securitythe revenue service for the United States federal governmentan intergovernmental military alliance between 30 member statesdomestic intelligence and security service of the United Statesthe combination of communications and collaboration technologies....

Childcare Software Security and Privacy: Safeguarding Children’s Data 2025-10-16

Childcare Software Security and Privacy: Safeguarding Children’s Data crossword puzzle
Across
  1. Ensuring personal and health information of children and families is protected.
  2. U.S. law that limits access to student records and protects education data.
  3. A review that checks if security and privacy measures are working properly.
  4. What parents must give to allow collection or sharing of their child’s information.
  5. Regularly saving data so it can be recovered if a breach or system failure occurs.
Down
  1. A security method that keeps children’s data safe by turning it into a code.
  2. An incident when unauthorized users access children’s private information.
  3. A security step where staff provide more than a password to access sensitive information.
  4. Law requiring childcare software to get parental consent before collecting children’s information online.
  5. The personal, health, and attendance information childcare software collects and stores.

10 Clues: An incident when unauthorized users access children’s private information.U.S. law that limits access to student records and protects education data.A review that checks if security and privacy measures are working properly.A security method that keeps children’s data safe by turning it into a code....

jada's crossword 2021-06-24

jada's crossword crossword puzzle
Across
  1. the use of words
  2. somebody that knows about someone being bullied but does not do anything
Down
  1. an emotional bond between people
  2. somebody that continuously hurts someone or their feelings
  3. the use of bullying online
  4. A different word for feelings

6 Clues: the use of wordsthe use of bullying onlineA different word for feelingsan emotional bond between peoplesomebody that continuously hurts someone or their feelingssomebody that knows about someone being bullied but does not do anything

9/11 and the war on terror 2023-11-03

9/11 and the war on terror crossword puzzle
Across
  1. - ......... Act - A U.S. law enacted to enhance domestic security after 9/11.
  2. - The terrorist organization responsible for the 9/11 attacks.
  3. - ......... Zero - The site of the collapsed World Trade Center buildings in New York City.
  4. - The Immigration and Naturalization Service, part of the U.S. response to 9/11.
  5. - Bin Laden - The leader of Al-Qaeda and mastermind behind the 9/11 attacks.
  6. - The evacuation of U.S. citizens and allies from Afghanistan during the War on Terror.
  7. - Commission - An investigation into the 9/11 attacks and U.S. response.
  8. - Questioning and gathering information from terrorism suspects.
  9. - The Central Intelligence Agency, involved in the War on Terror.
  10. - ........ W. Bush - The U.S. President at the time of the 9/11 attacks.
  11. - ........... Bay - A U.S. detention camp for terrorism suspects in Cuba.
  12. - The individuals who took control of the 9/11 planes to carry out the attacks.
  13. - ............ Responders - The firefighters, police, and emergency personnel who rushed to the 9/11 sites.
  14. - ........... Crimes - Violations of international law during armed conflicts in the War on Terror.
  15. - Weapons of Mass Destruction, a concern in the lead-up to the Iraq War.
  16. - The U.S. Department of Homeland Security, established in response to 9/11.
  17. - Interrogation Techniques - Controversial methods used on terrorism suspects.
  18. - Corpus - A legal principle safeguarding against unlawful detention.
  19. - Efforts to prevent and respond to acts of terrorism.
  20. - The Afghan extremist group that harbored Al-Qaeda and was overthrown by U.S. forces.
Down
  1. - Bin Laden ........... - The U.S. operation that resulted in the death of Osama bin Laden.
  2. - The country where the U.S. initially focused its military efforts in the War on Terror.
  3. - The North Atlantic Treaty Organization, which invoked Article 5 for the first time after 9/11.
  4. - ..... List - A U.S. government watchlist to prevent potential terrorists from boarding flights.
  5. - Measures - Enhancements to airport and border security following 9/11.
  6. - Military strategies employed in response to insurgency and terrorism.
  7. - The arrest and detention of individuals suspected of terrorism.
  8. - The U.S. Department of Defense headquarters, also targeted on 9/11.
  9. - on Terror - The U.S.-led global campaign against terrorism, launched after 9/11.
  10. - Ayman al-Zawahiri, a key figure in Al-Qaeda after the death of Osama bin Laden.
  11. - The use of violence for political or ideological goals, as seen on 9/11.
  12. - .......... 11 - One of the planes that crashed into the World Trade Center.
  13. - ........... Trade Center - The twin towers in New York City that were destroyed on 9/11.
  14. - The month when the 9/11 attacks occurred.
  15. - Sites - Secret detention facilities used in the War on Terror.
  16. - .......... Security - U.S. government efforts to protect the country from terrorism.
  17. - ....... of Evil - A term used to describe countries perceived as a threat in the War on Terror.
  18. - Another country targeted in the aftermath of 9/11 due to perceived weapons of mass destruction.

38 Clues: - The month when the 9/11 attacks occurred.- Efforts to prevent and respond to acts of terrorism.- The terrorist organization responsible for the 9/11 attacks.- Questioning and gathering information from terrorism suspects.- Sites - Secret detention facilities used in the War on Terror....

Ethical hacking 2025-11-02

Ethical hacking crossword puzzle
Across
  1. Hidden entry point into a system bypassing security
  2. Software that secretly monitors user activity
  3. Fraudulent attempt to obtain sensitive information via email
  4. Process of converting data into a coded format
  5. Security barrier that controls incoming and outgoing network traffic
  6. Malicious software designed to harm or exploit devices
  7. Tool that records keystrokes to steal information
  8. Self-replicating program that infects computers
Down
  1. Malware disguised as legitimate software
  2. Malware that locks files until a payment is made
  3. Weakness in a system that can be exploited by hackers
  4. Person who gains unauthorized access to systems
  5. Process of gathering information about a target system
  6. Testing method used to find vulnerabilities in a system
  7. Malware that spreads across networks without user action

15 Clues: Malware disguised as legitimate softwareSoftware that secretly monitors user activityProcess of converting data into a coded formatPerson who gains unauthorized access to systemsSelf-replicating program that infects computersMalware that locks files until a payment is madeTool that records keystrokes to steal information...

Security 2024-06-05

Security crossword puzzle
Across
  1. new versions of software that are released by the software vendor.
  2. a secret word or phrase that is used to verify the identity of a user and grant them access to a computer system or account.
Down
  1. a copy of your data that is stored in a safe location.
  2. a type of social engineering attack where attackers try to trick users into revealing personal information, such as their usernames, passwords, or credit card numbers.
  3. a type of software that is designed to harm a computer system.

5 Clues: a copy of your data that is stored in a safe location.a type of software that is designed to harm a computer system.new versions of software that are released by the software vendor.a secret word or phrase that is used to verify the identity of a user and grant them access to a computer system or account....

Ehe abstract nouns 2024-10-07

Ehe abstract nouns crossword puzzle
Across
  1. happiness
  2. safety/security
  3. trust
  4. highs and lows (5,3,6)
Down
  1. reality
  2. pressure
  3. values
  4. society
  5. stability
  6. conflict
  7. freedom
  8. lack of independance

12 Clues: trustvaluesrealitysocietyfreedompressureconflicthappinessstabilitysafety/securitylack of independancehighs and lows (5,3,6)

Vocab Fun 2025-02-13

Vocab Fun crossword puzzle
Across
  1. label, organized
  2. picky
  3. foolish and sily
  4. acid
  5. a standard
Down
  1. guide, operate
  2. protection
  3. real
  4. landslide
  5. safe,sure
  6. cuddle
  7. appeal

12 Clues: realacidpickycuddleappeallandslidesafe,sureprotectiona standardguide, operatelabel, organizedfoolish and sily

Unit 4 2025-06-09

Unit 4 crossword puzzle
Across
  1. bully
  2. aunt
Down
  1. part (in)
  2. network

4 Clues: auntbullynetworkpart (in)

MEDICAL TERMINOLOGY ³ 2025-05-28

MEDICAL TERMINOLOGY ³ crossword puzzle
Across
  1. الامن
  2. الفنيون
  3. العلاج الطبيعي
  4. التغذية
  5. مدير المشفى
  6. الاداريين
  7. موظف الاستقبال
Down
  1. فني الاشعة
  2. فني المختبر
  3. الفريق المساعد
  4. عمال النظافة
  5. الاختصاصيون

12 Clues: الامنالفنيونالتغذيةالاداريينفني الاشعةفني المختبرالاختصاصيونمدير المشفىعمال النظافةالفريق المساعدالعلاج الطبيعيموظف الاستقبال