cyber security Crossword Puzzles

7th technology vocab 2 2014-10-13

7th technology vocab 2 crossword puzzle
Across
  1. (on social media sites such as twitter0 A WORD OR PHRASE PRECEDED BY A hash or pound sign (#) and used to identify messages o a specific topic.
  2. a device for storing information on a fixed location with in your computer.
  3. item to used organiseid files into groups.
  4. hypertext markup language. This is the coding language used to create sites on the world wide web.
  5. hardeware and that separates a local area network into two or more parts for security purposes.
  6. graphic interchange format… an efficient method for storing graphics. Gif’s take up a small amount of disk space and can be transmitted quickly.
  7. copy from one computer to another, typically over the internet
  8. commonly known as email. System designed to send messages and attachments elecontecly .
Down
  1. involving questions of right and wrong behavior, following accepted rules of behavior: morally right and good. “what is moral when using technology?
  2. file transfer protocol. A set of rules that allowstwo computers to talk to one another while transferring files from one to the other. This the protocol used when you transfer a file from one computer to another across
  3. the production of printed matter by means of a printer linked to a desktop computer, with special software. The system enables reports, advertising matter, company magazines, etc., to be produced cheaply with a layout and print quality similar to that of typeset books, for xerographic or other reproduction
  4. to set the margins, tabs, front or line spacing in layout of a document.
  5. cyber bullying is the use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner.
  6. make changes to a document or presentation.
  7. starting the computer when its power is turned off. To perform a cold boot if the computer is still running, shut down must me selected from the menu first. Once the machines off, turning it back on performs the cold boot.
  8. a place a database record where a category of information can be entered or located.

16 Clues: item to used organiseid files into groups.make changes to a document or presentation.copy from one computer to another, typically over the internetto set the margins, tabs, front or line spacing in layout of a document.a device for storing information on a fixed location with in your computer....

Listening Insight 2 Unit 11 IT & Internet 2013-07-09

Listening Insight 2 Unit 11 IT & Internet crossword puzzle
Across
  1. a man who fixes things
  2. very bad, awful
  3. keeping something or someone safe
  4. re-arrange the following letters: usobyivlo
  5. a general place or location
  6. instructions for making food
  7. to be unsure of something
  8. fill in the gap: "My computer has a virus because I didn't ____________ the security software"
Down
  1. fill in the gap: "I have a new hand phone, it has many great ____________ such as 4G and a camera"
  2. costs a lot of money
  3. speaking or writing about a particular thing
  4. almost the same as something else

12 Clues: very bad, awfulcosts a lot of moneya man who fixes thingsto be unsure of somethinga general place or locationinstructions for making foodkeeping something or someone safealmost the same as something elsere-arrange the following letters: usobyivlospeaking or writing about a particular thing...

US invasion of Iraq 2023-11-29

US invasion of Iraq crossword puzzle
Across
  1. United Nations Security Council resolution adopted unanimously by the United Nations Security Council on 8 November 2002
  2. The invasion began with U.S. _ dropping precision-guided bombs on a bunker complex in Baghdad
  3. Saddam's younger son
  4. Declaration by George w Bush on may 2003
  5. capital of Iraq
Down
  1. The leader prior to the US invasion of Iraq
  2. Veto power that opposed the invasion
  3. The name of our great teacher
  4. A country said to contain weapons of mass destruction
  5. place where Saddam Hussein's statue was toppled
  6. George _ Bush
  7. Saddam's elder son

12 Clues: George _ Bushcapital of IraqSaddam's elder sonSaddam's younger sonThe name of our great teacherVeto power that opposed the invasionDeclaration by George w Bush on may 2003The leader prior to the US invasion of Iraqplace where Saddam Hussein's statue was toppledA country said to contain weapons of mass destruction...

UNIT 4 "HOME AUTOMATION CONTROL SYSTEMS", Crossword 2025-10-01

UNIT 4 "HOME AUTOMATION CONTROL SYSTEMS", Crossword crossword puzzle
Across
  1. Keeping watch over an area for security.
  2. Portable computer with a touchscreen.
  3. A tool used to tighten or loosen nuts and bolts.
  4. Device that cools a room.
  5. The process of making devices work automatically.
Down
  1. Device that warms a room.
  2. Technology that simulates human intelligence.
  3. Reasonable in price; not too expensive.
  4. Security system with lenses to record video.
  5. Portable device used to melt metal for joining circuits.
  6. To activate a device, e.g., a light or machine.
  7. A handheld device to make calls and access apps.

12 Clues: Device that warms a room.Device that cools a room.Portable computer with a touchscreen.Reasonable in price; not too expensive.Keeping watch over an area for security.Security system with lenses to record video.Technology that simulates human intelligence.To activate a device, e.g., a light or machine.A tool used to tighten or loosen nuts and bolts....

MEDICAL TERMINOLOGY ³ 2025-05-28

MEDICAL TERMINOLOGY ³ crossword puzzle
Across
  1. الامن
  2. الفنيون
  3. العلاج الطبيعي
  4. التغذية
  5. مدير المشفى
  6. الاداريين
  7. موظف الاستقبال
Down
  1. فني الاشعة
  2. فني المختبر
  3. الفريق المساعد
  4. عمال النظافة
  5. الاختصاصيون

12 Clues: الامنالفنيونالتغذيةالاداريينفني الاشعةفني المختبرالاختصاصيونمدير المشفىعمال النظافةالفريق المساعدالعلاج الطبيعيموظف الاستقبال

bullying crossword 2014-06-05

bullying crossword crossword puzzle
Across
  1. the person who is being mean to the victim
  2. when things are said that arnt true
  3. attacking the victim and contact with the victim
  4. making someone feel as they have to do what you tell them to do
  5. threatening someone or making them scared enough to make them do what you want
  6. hitting or hurting someone
  7. when you call someone names.
Down
  1. the person who is getting bullied
  2. when its done through social media
  3. when you leave someone out of the group
  4. a person who is watching but doesnt do anything about it
  5. is a crime
  6. groups that hep you with bullying
  7. when its done face to face
  8. : use of words that upset the victim

15 Clues: is a crimewhen its done face to facehitting or hurting someonewhen you call someone names.the person who is getting bulliedgroups that hep you with bullyingwhen its done through social mediawhen things are said that arnt true: use of words that upset the victimwhen you leave someone out of the groupthe person who is being mean to the victim...

DTIN- Final Crossword Part 2 2024-03-21

DTIN- Final Crossword Part 2 crossword puzzle
Across
  1. Type of digital currency that uses cryptography
  2. Methodology promoting continuous iteration of development
  3. Style of education through electronic and online media
  4. Network of physical objects connected to the internet
  5. Field involving analysis of raw data to draw conclusions
  6. Platforms for social interaction and content sharing
  7. Term for currency available only in digital form
  8. Large and complex data sets that are difficult to process
  9. Delivery of computing services over the internet
Down
  1. Decentralized ledger technology behind cryptocurrencies
  2. Simulated experience that can be similar to or different from the real world
  3. Protection of internet-connected systems from cyber threats
  4. Mobile phone with advanced features and connectivity
  5. Record of one's internet usage and online activities
  6. AI subset involving algorithms that learn over time

15 Clues: Type of digital currency that uses cryptographyTerm for currency available only in digital formDelivery of computing services over the internetAI subset involving algorithms that learn over timeMobile phone with advanced features and connectivityRecord of one's internet usage and online activitiesPlatforms for social interaction and content sharing...

Health 2025-05-13

Health crossword puzzle
Across
  1. adding a regular physical activity into daily life
  2. keeping your body healthy by showering, wearing deodorant,and brushing your teeth.
  3. people who are related to you and you can rely on
  4. a key step in having good physical health
  5. people you can rely on when things are bad
  6. the state of being healthy in physical mental and social
  7. the state of being ill
Down
  1. state of complete physical, mantal, and social well-being.
  2. provides essential nutrients for maintaining and improving overall health
  3. the condition of being physically fit and healthy.
  4. how you feel and your emotions.
  5. sadness, happiness, anger
  6. eating health and getting enough sleep.
  7. people who bully online
  8. your friend and family relationships.

15 Clues: the state of being illpeople who bully onlinesadness, happiness, angerhow you feel and your emotions.your friend and family relationships.eating health and getting enough sleep.a key step in having good physical healthpeople you can rely on when things are badpeople who are related to you and you can rely on...

Application MOS 2025-05-28

Application MOS crossword puzzle
Across
  1. This MOS deals with the disposal of explosive hazards
  2. The MOS designation for Cyber Network Defender
  3. Special Forces Military Occupational Specialty designation
  4. Critical roles demanding rigorous vetting, training, and advanced skills
Down
  1. MOS responsible for Army retention and soldier career management
  2. Regulation number detailing the Army Retention Program
  3. The structured process soldiers undergo for specialized roles
  4. Term for exceeding allowable time in a specific rank, risking separation

8 Clues: The MOS designation for Cyber Network DefenderThis MOS deals with the disposal of explosive hazardsRegulation number detailing the Army Retention ProgramSpecial Forces Military Occupational Specialty designationThe structured process soldiers undergo for specialized rolesMOS responsible for Army retention and soldier career management...

Exiting Prison 2013-12-11

Exiting Prison crossword puzzle
Across
  1. Claim that a mistake was made in a court decision.
  2. Determining parole after one third of the sentence has been served. (2 words)
  3. To guarantee the honesty of someone working with money.
  4. Penitentiary for a sentence of less than two years.
  5. Being excused for a crime.
  6. Term for prison services.
  7. Custody under constant guard.
Down
  1. An early release.
  2. Release as outlined by the law.
  3. Low level security.
  4. This can make it hard to leave the country. (2 words)
  5. The highest level of security.
  6. Prison for those serving longer sentences.
  7. Clause that allows those serving long sentences to apply for parole. (2 words)
  8. Custody that allows inmates to work and have some access to the community.

15 Clues: An early release.Low level security.Term for prison services.Being excused for a crime.Custody under constant guard.The highest level of security.Release as outlined by the law.Prison for those serving longer sentences.Claim that a mistake was made in a court decision.Penitentiary for a sentence of less than two years....

Friday Game v1.1 2023-06-23

Friday Game v1.1 crossword puzzle
Across
  1. Remote server storage and computing.
  2. A powerful computer that provides resources to other computers on a network.
  3. Domain Name System - translates domain names to IP addresses.
  4. A security measure that requires two different forms of identification.
  5. Identity and access management service for Microsoft 365.
  6. A directory service used in Windows environments.
  7. Common wired networking technology.
Down
  1. Microsoft's cloud-based productivity suite.
  2. A unique numerical label assigned to each device connected to a computer network.
  3. Microsoft's email server and collaboration platform.
  4. A network security device that monitors and controls incoming and outgoing network traffic.
  5. Wireless Local Area Network.
  6. Dynamic Host Configuration Protocol - assigns IP addresses automatically
  7. Secure connection over a public network.
  8. Device that forwards data packets between computer networks

15 Clues: Wireless Local Area Network.Common wired networking technology.Remote server storage and computing.Secure connection over a public network.Microsoft's cloud-based productivity suite.A directory service used in Windows environments.Microsoft's email server and collaboration platform.Identity and access management service for Microsoft 365....

engineer 2021-10-26

engineer crossword puzzle
Across
  1. the principles of Mechanics and Materials science for analysis, design, manufacturing,
  2. of analysis methods and the development of systems to ensure products or services
  3. to find the best safe performance balance,
  4. a detailed study of engineering to the design, development and maintenance of software.
  5. assures that engineered systems provide acceptable levels of safety.
  6. helps with their service
  7. monitors everything
  8. engineer
  9. engineer
  10. Administer and resolve all technical maintenance issues.
  11. manufacturing processes by studying product requirements
Down
  1. an engineering discipline for applying scientific know-how to a component, product, plant, or process
  2. helps with network
  3. the branch of engineering that deals with the technology of electricity.
  4. does everything on computer
  5. an engineer who designs and maintains roads, bridges, dams, and similar structures.
  6. does maintenance
  7. solves solutions
  8. the position of the frontend engineer focuses on making websites friendly and functional to its user
  9. helps with uniforms

20 Clues: engineerengineerdoes maintenancesolves solutionshelps with networkmonitors everythinghelps with uniformshelps with their servicedoes everything on computerto find the best safe performance balance,Administer and resolve all technical maintenance issues.manufacturing processes by studying product requirements...

Dan sigurnijeg interneta 2022-02-11

Dan sigurnijeg interneta crossword puzzle
Across
  1. Koja je kratica short message service?
  2. Djevojke često koriste internet radi...
  3. Koja je kratica Internacionalne policijske asocijacije?
  4. O kojoj su mreži djeca ovisna?
  5. Kako se na engleskom zove nasilje na internetu?
Down
  1. Koja je kratica online igre s velikim brojem igrača?
  2. Koja je kratica programa i seek you?
  3. Koja mreža je svjetska komunikacijska mreža?
  4. Koji predmet je prva stvar koju ljudi pogledaju ujutro i zadnja prije nego odu na spavanje?
  5. Kome se trebamo obratiti ako se naiđemo u cyber bullingu?

10 Clues: O kojoj su mreži djeca ovisna?Koja je kratica programa i seek you?Koja je kratica short message service?Djevojke često koriste internet radi...Koja mreža je svjetska komunikacijska mreža?Kako se na engleskom zove nasilje na internetu?Koja je kratica online igre s velikim brojem igrača?Koja je kratica Internacionalne policijske asocijacije?...

perundungan 2022-08-24

perundungan crossword puzzle
Across
  1. gangguan kecemasan dan perasaan ketakutan yang berlebih
  2. bentuk perundungan melalui kata-kata yang menyakitkan
  3. perasaan tidak percaya diri, tidak aman, dan keraguan
  4. orang pertama yang memperkenalkan konsep bullying pada tahun 1973
  5. tekanan psikologis akibat peristiwa kelam masa lalu
Down
  1. tipe kepribadian yang menyukai waktu dan energi untuk sendiri.
  2. bentuk perundungan melalui jejaring sosial
  3. kata asal Bullying dalam bahasa Inggris
  4. penindasan oleh kaum superior dengan sengaja Sosial bentuk perundungan dengan pengucilan dan intimidasi

9 Clues: kata asal Bullying dalam bahasa Inggrisbentuk perundungan melalui jejaring sosialtekanan psikologis akibat peristiwa kelam masa lalubentuk perundungan melalui kata-kata yang menyakitkanperasaan tidak percaya diri, tidak aman, dan keraguangangguan kecemasan dan perasaan ketakutan yang berlebih...

Bullying Ward 2 2025-05-05

Bullying Ward 2 crossword puzzle
Across
  1. Someone who does mean things to someone less powerful than them.
  2. This type of verbal bullying makes someone feel unsafe.
  3. Sending someone mean messages over and over.
  4. Repeatedly excluding someone to be mean.
  5. Hurtful words are used in this type of bullying.
Down
  1. Someone who watches the bullying but doesn't help.
  2. This type of bullying can hurt someone's body.
  3. Someone who is helpful toward the person being bullied.
  4. The person who someone tries to bully.

9 Clues: The person who someone tries to bully.Repeatedly excluding someone to be mean.Sending someone mean messages over and over.This type of bullying can hurt someone's body.Hurtful words are used in this type of bullying.Someone who watches the bullying but doesn't help.This type of verbal bullying makes someone feel unsafe....

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

Bullying 2021-12-13

Bullying crossword puzzle
Across
  1. type of bullying involving words
  2. 3 things that make the issue bullying vs. conflict
  3. people not directly involved with the bullying
  4. type of bullying involving bodily harm
  5. type of bullying typically dealing with social media
Down
  1. 3 things that make the issue bullying vs. conflict
  2. type of bullying involving other people
  3. 3 things that make the issue bullying vs. conflict

8 Clues: type of bullying involving wordstype of bullying involving bodily harmtype of bullying involving other peoplepeople not directly involved with the bullying3 things that make the issue bullying vs. conflict3 things that make the issue bullying vs. conflict3 things that make the issue bullying vs. conflict...

SkillWise Staff Week 12 2025-03-25

SkillWise Staff Week 12 crossword puzzle
Across
  1. the month we're currently in
  2. The principles we work by (8,4,5)
  3. A online learning platform, available anytime for professional development(4,6,8)
Down
  1. The January planning week game/ event, Greg Davis
  2. the database SW uses
  3. program ensuring cyber safety at SW (4,2,1)

6 Clues: the database SW usesthe month we're currently inThe principles we work by (8,4,5)program ensuring cyber safety at SW (4,2,1)The January planning week game/ event, Greg DavisA online learning platform, available anytime for professional development(4,6,8)

R&D Engineering Bootcamp 2019-11-18

R&D Engineering Bootcamp crossword puzzle
Across
  1. VMware NSX as the Foundation for the ________ Cloud Network
  2. Cloud__________ Business Unit
  3. IT Priority: Transform __________ and Security
  4. Lets you run multiple operating systems and applications on a single server
  5. IT Priority: _______ the Cloud Journey
  6. Networking and ____________ Business Unit
  7. _________services augment one or more logical networks and/or connect multiple logical networks together​.
  8. product and ______ Services
  9. The'P' in our EPIC2 Values
Down
  1. Software that runs as the operating system of the ESX system
  2. good companies solve problems. Great companies create_________.
  3. How many dogs does Jenn have?
  4. A strategy where organizations leverage both on-premises and cloud enabling rapid portability of applications, and operational consistency across their entire environment
  5. IT Priority: Empowering the ______ Workspace
  6. VMware's beloved CEO
  7. Software_______data Center
  8. ________is VMware’s software-defined storage solution.
  9. ________ agility is the ability to process information with ease, speed & optimize mental flexibility

18 Clues: VMware's beloved CEOSoftware_______data CenterThe'P' in our EPIC2 Valuesproduct and ______ ServicesHow many dogs does Jenn have?Cloud__________ Business UnitIT Priority: _______ the Cloud JourneyNetworking and ____________ Business UnitIT Priority: Empowering the ______ WorkspaceIT Priority: Transform __________ and Security...

Chapter 13 2016-04-22

Chapter 13 crossword puzzle
Across
  1. the account that employer payroll taxes are recorded
  2. amounts withheld until paid
  3. information needed to prepare Form 941
  4. the column total used for Medicare Tax Payable
  5. amounts recorded in the general journal are posted individually to
  6. a national program for unemployment benefits
  7. reports the prior year's earnings and payroll taxes withheld
  8. the column total used for Social Security Tax Payable
Down
  1. the payment of payroll taxes to the government
  2. shows taxes owed to the government
  3. a state program for unemployment benefits
  4. total earnings minus total deductions
  5. employers must furnish by January 31
  6. does not have a tax base
  7. how frequently a business must deposit payroll taxes
  8. total of gross earnings
  9. the total used for Employee Income Tax Payable
  10. the total is the salary expense

18 Clues: total of gross earningsdoes not have a tax baseamounts withheld until paidthe total is the salary expenseshows taxes owed to the governmentemployers must furnish by January 31total earnings minus total deductionsinformation needed to prepare Form 941a state program for unemployment benefitsa national program for unemployment benefits...

11.5 Wireless Networking 2023-03-28

11.5 Wireless Networking crossword puzzle
Across
  1. An enhancement that allows multiple antennas to use the same radio frequency
  2. Wireless authentication method that allows for automatic connection between a device and the wireless access point
  3. Secure authentication method for wired and wireless networks
  4. Wireless communication technology that allows two devices to connect to each other over a short distance
  5. Developed by Cisco to address security concerns in RADIUS
  6. Encryption protocol used on most wireless networks today
  7. Wireless authentication method that uses a passphrase to authenticate users
  8. A communication method that allows two-way communication between two devices within a few centimeters of each other
  9. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
  10. One of the strongest encryption protocols based on the Rijndael algorithm
Down
  1. An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices
  2. Developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard
  3. Wireless network that requires no authentication
  4. IEEE designation for all wireless networking standards
  5. A method that allows the frequency of the wireless network to be fine-tuned
  6. A method that combines channels into one to increase bandwidth
  7. An open standard protocol used to authenticate users onto a network
  8. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network

18 Clues: Wireless network that requires no authenticationIEEE designation for all wireless networking standardsEncryption protocol used on most wireless networks todayDeveloped by Cisco to address security concerns in RADIUSSecure authentication method for wired and wireless networksA method that combines channels into one to increase bandwidth...

IT Security Policy - Risk Management 2014-07-29

IT Security Policy - Risk Management crossword puzzle
Across
  1. Organization's willingness to accept risk
  2. identifies applicable regulatory requirements regarding information security
  3. Used to evaluate and document process maturity for a given area
  4. risk mitigation strategy designed to reduce/eliminate threat
  5. Level of risk after security measures are applied
Down
  1. Systematic evidence based evaluation
  2. Process of managing, directing, controlling and influencing organizational decisions, actions and behaviours
  3. Provides expert leadership
  4. Risk assessment methodology
  5. Assigning risk

10 Clues: Assigning riskProvides expert leadershipRisk assessment methodologySystematic evidence based evaluationOrganization's willingness to accept riskLevel of risk after security measures are appliedrisk mitigation strategy designed to reduce/eliminate threatUsed to evaluate and document process maturity for a given area...

Developing the Security Program Crossword 2020-07-10

Developing the Security Program Crossword crossword puzzle
Across
  1. ____ Organziations have 1 part-time manager
  2. What do employers look at when hiring
  3. ____ Organizations have internal Infosec Groups
  4. Who is the top InfoSec officer?
  5. ___ Charts are used to manage projects
Down
  1. PMBoK is a project management _____
  2. _____ Organizations have only one security admin
  3. ____ Is a series of projects
  4. What program is designed to reduce security breaches by employees?
  5. What department does InfoSec struggle with?

10 Clues: ____ Is a series of projectsWho is the top InfoSec officer?PMBoK is a project management _____What do employers look at when hiring___ Charts are used to manage projects____ Organziations have 1 part-time managerWhat department does InfoSec struggle with?____ Organizations have internal Infosec Groups_____ Organizations have only one security admin...

Foreign Policy 2023-05-22

Foreign Policy crossword puzzle
Across
  1. Decreased interest of America's military involvement in Vietnam
  2. handles security issues within the United States
  3. Because of America's isolationism WWI ____.
  4. Handles security internationally
  5. Atlantic Free Trade Agreement Free trade zone between the US, Canada, and Mexico
Down
  1. Main ambassador of the United States
  2. The opposite of isolationism
  3. No involvement in global issues
  4. The US did not directly fight in this
  5. Global Organization and administrators trade agreements

10 Clues: The opposite of isolationismNo involvement in global issuesHandles security internationallyMain ambassador of the United StatesThe US did not directly fight in thisBecause of America's isolationism WWI ____.handles security issues within the United StatesGlobal Organization and administrators trade agreements...

Burbank High School 2022-05-27

Burbank High School crossword puzzle
Across
  1. Cameras
  2. Something To Connect With
  3. S
  4. to hold on
  5. What's The Time
  6. Board
  7. Do Not Touch
  8. School Full Name
Down
  1. To Walk on
  2. p
  3. Shorten
  4. in Sight Beam
  5. Mask
  6. To Open
  7. l
  8. Something To Watch
  9. S

17 Clues: pSlSMaskBoardCamerasShortenTo OpenTo Walk onto hold onDo Not Touchin Sight BeamWhat's The TimeSchool Full NameSomething To WatchSomething To Connect With

gameshop 2014-05-19

gameshop crossword puzzle
Across
  1. ex. Chucky Cheese
  2. e.g. rent-a-cops
  3. about to be
  4. a rubrik wheel-runner?
  5. tree hugger?
  6. discharge
  7. manure
  8. chaos
  9. hereditary
  10. express
Down
  1. Florence and the _____
  2. a continuous transporter
  3. puzzle seller
  4. loose change
  5. go ballistic
  6. score

16 Clues: chaosscoremanureexpressdischargehereditaryabout to beloose changego ballistictree hugger?puzzle sellere.g. rent-a-copsex. Chucky CheeseFlorence and the _____a rubrik wheel-runner?a continuous transporter

STAFF THE SPARE CONN 2016-01-19

STAFF THE SPARE CONN crossword puzzle
Across
  1. ROLO
  2. HAPPY CHAPPY
  3. PETTY...
  4. ALWAYS HUNGRY
  5. 25
  6. TATTOO GUY
Down
  1. ALWAYS LATE
  2. SECURITY
  3. GYM GUY
  4. SCOOTER
  5. CRISP QUEEN
  6. THE SAGAS

12 Clues: 25ROLOGYM GUYSCOOTERSECURITYPETTY...THE SAGASTATTOO GUYALWAYS LATECRISP QUEENHAPPY CHAPPYALWAYS HUNGRY

Crossword Puzzle 2014-05-05

Crossword Puzzle crossword puzzle
Across
  1. man's land disputed ground between the front lines or trenches of two opposing armies
  2. economy authority on economy
  3. he deliberate killing of a large group of people
  4. workers or working-class people
  5. security the cooperation of several countries in an alliance to strengthen the security of each
  6. the reduction or withdrawal of military forces and weapons
  7. camp political prisoners are persecuted
  8. a truce
  9. cocky
  10. legal official
  11. hopping travel from one island to another
Down
  1. Japanese aircraft loaded with explosives and making a deliberate suicidal crash on an enemy target
  2. peace
  3. prepare and organize
  4. a tied out battle
  5. action or process appease
  6. intense military campaign intended to bring about a swift victory
  7. he making of amends for a wrong one has done
  8. the belief or desire of a government or people that a country should maintain a strong military capability
  9. disobedience peaceful form of political politics
  10. russia
  11. slaughter on a mass scale

22 Clues: peacecockyrussiaa trucelegal officiala tied out battleprepare and organizeaction or process appeaseslaughter on a mass scaleeconomy authority on economyworkers or working-class peoplecamp political prisoners are persecutedhopping travel from one island to anotherhe making of amends for a wrong one has done...

Internet Puzzle 2016-02-17

Internet Puzzle crossword puzzle
Across
  1. a hardware device that has multiple Ethernet ports.
  2. A networking device that perform the "traffic directing" functions on the Internet.
  3. A Type of Cord that hooks direct from the modem to customers device.
  4. server that automatically provides an IP address.
  5. Internet without wires.
  6. Translates an IP address to a domain name.
  7. Network Address Translation.
  8. This controls your domain name's website and email settings.
  9. Modem config without NAT.
  10. The owner of a Domain name.
  11. A free service with NPP for email and web.
  12. Redirects a communication request from one address to a Port.
  13. Changing IP Address.
Down
  1. Internet program you use to surf the internet.
  2. The Program the customer goes to set up a Domain Name.
  3. Non changing IP Address.
  4. A tool you use to help guide your calls.
  5. Controls how the modem functions.
  6. Internet output device.
  7. what is before the .com but after the @ symbol?
  8. network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

21 Clues: Changing IP Address.Internet without wires.Internet output device.Non changing IP Address.Modem config without NAT.The owner of a Domain name.Network Address Translation.Controls how the modem functions.A tool you use to help guide your calls.Translates an IP address to a domain name.A free service with NPP for email and web....

Travel Vocabulary 2020-04-15

Travel Vocabulary crossword puzzle
Across
  1. first class in a plane or train
  2. a ticket
  3. passport
  4. going through customs before entering a country
  5. ticket,luggage,counter, check in
  6. baggage claim
  7. to hope
  8. layover
  9. flight attendent
  10. to go straight
  11. window
  12. visa
  13. suitcase
  14. being on time
  15. controller
  16. platform
  17. bunk
  18. to go through security
  19. flight
  20. security agent
  21. to miss a flight
  22. a passenger
  23. a connection of one flight to another
  24. luggage
  25. a trip or travel
  26. international airport
  27. delayed
  28. stop
  29. luggage screening
Down
  1. waiting room
  2. car wagon
  3. to turn
  4. a seat
  5. boarding pass
  6. sleeping car
  7. second class in a train
  8. gate
  9. to check luggage
  10. safety seat belt
  11. to give
  12. to land
  13. departure
  14. train station
  15. in the airport
  16. to take off
  17. coach on a place
  18. aisle
  19. a ticket
  20. ticket window
  21. carry on luggage
  22. to see
  23. an event ticket
  24. arrival
  25. to get

54 Clues: gatevisabunkstopaislea seatwindowto seeflightto getto turnto hopelayoverto giveto landarrivalluggagedelayeda ticketpassportsuitcasea ticketplatformcar wagondeparturecontrollerto take offa passengerwaiting roomsleeping carboarding passbaggage claimtrain stationbeing on timeticket windowto go straightin the airportsecurity agentan event ticket...

Ch. 2 Vocabulary--American Society & It's Values 2020-09-27

Ch. 2 Vocabulary--American Society & It's Values crossword puzzle
Across
  1. expectations of behavior, written or unwritten
  2. money made by a business
  3. institution providing law & order, security,etc
  4. defense against threats to society Nat'l ______
  5. work a person gets paid for from other person
  6. Five parts of all societies
  7. person who participates in an economy by buying
  8. physical products required for survival
  9. form of gov't leader takes power by force
  10. rules of society that all must follow
  11. institution designed to prepare kids for adulthood
Down
  1. items we desire to make things easier
  2. someone makes the same product as you
  3. any place goods or services are exchanged
  4. first institution people belong to
  5. institution which teaches right from wrong
  6. anything accepted as payment for good or service
  7. items produced and sold in society
  8. what someone is willing to pay for a product
  9. system of producing and distributing goods/services
  10. learning to follow rules of society
  11. gov't in which leader inherits position
  12. gov't in which all people share the power

23 Clues: money made by a businessFive parts of all societiesfirst institution people belong toitems produced and sold in societylearning to follow rules of societyitems we desire to make things easiersomeone makes the same product as yourules of society that all must followgov't in which leader inherits positionphysical products required for survival...

h 2022-07-10

h crossword puzzle
Across
  1. Instructional signs posted in the aircraft
  2. lock up latch or stow
  3. check emergency equipment and specific aircraft systems
  4. Customers on a paid fare
  5. 5-17 traveling alone
  6. breathing apparatus while fighting fires
  7. Security directives issued to the aircraft operators
  8. where planes park outside the terminal
  9. require all individuals to display proper identification
  10. predetermined periods of availability
  11. aircraft moves under its own power while on the ground
  12. how to use seatbelts oxygen mask and identify exits
Down
  1. created Nov 19 2001 policies to protect US transportation in airport security
  2. planned time from departure to arrival
  3. paperwork provided to flight attendants by the gate agent
  4. cards located in each seat pocket to explain emergency
  5. revised info to flight attendant manual
  6. frequent flyer program
  7. briefing designed to identify how to use specified emergency equipment
  8. when an aircraft leaves the ground
  9. all aircrafts operation below 10,000 feet
  10. stay overnight at a city other than your base
  11. temporary rule to address a temporary situation

23 Clues: 5-17 traveling alonelock up latch or stowfrequent flyer programCustomers on a paid farewhen an aircraft leaves the groundpredetermined periods of availabilityplanned time from departure to arrivalwhere planes park outside the terminalrevised info to flight attendant manualbreathing apparatus while fighting fires...

Pablo Escobar 2018-02-27

Pablo Escobar crossword puzzle
Across
  1. Aircraft manufacturer (begins with B)
  2. A large building where passengers get on flights and get off flights
  3. Thing you go through to get to Airside
  4. Area before security at an airport, open to general public
  5. Control the roll of the plane
  6. First part of a planes identification code
  7. A flight that leaves the originating country
  8. When a flight is late arriving or taking off
Down
  1. A stop at an airport between flights
  2. Where pilots sit
  3. Main body of the aircraft
  4. Person who flies the plane
  5. Cheapest flight ticket
  6. A flight that starts and finishes in one country
  7. Second part of a planes identification code
  8. An item of identification you need to travel ovrseas
  9. When two or more airlines share a aircraft
  10. You can only carry 3 Ounces or 100 ml of this
  11. What the planes take off of
  12. Area of an airport only available to travelling persons and workers

20 Clues: Where pilots sitCheapest flight ticketMain body of the aircraftPerson who flies the planeWhat the planes take off ofControl the roll of the planeA stop at an airport between flightsAircraft manufacturer (begins with B)Thing you go through to get to AirsideWhen two or more airlines share a aircraftFirst part of a planes identification code...

Tech crossword. 2024-04-03

Tech crossword. crossword puzzle
Across
  1. Set of instructions.
  2. Security loop hole.
  3. The computer programs.
  4. Small computer/tech.
  5. Information sharing.
  6. Network security.
  7. AI.
  8. Yet another markup language.
  9. Device for prosesing data.
  10. Main operating system of a computer.
  11. The inner parts of a computer.
  12. Cross-site scripting.
  13. Language for websites.
  14. Universal Serial Bus.
  15. Online protection.
  16. Development of a computer.
Down
  1. Mashines following a set a rules/code to work/move.
  2. Biological measurements .
  3. Melting plastic in a mashine to from shapes given to it by a computer.
  4. A way to communicate to the computer.
  5. A procedure or rules that should be carried out if need be.
  6. Larger storage unit.
  7. Person to computer interaction.
  8. Unit of storage for a computer.
  9. The main system software.
  10. Secure communication.
  11. Online storage.
  12. Headset for video game usage, or surgary.
  13. A place for online storage.
  14. Wireless Fidelity.

30 Clues: AI.Online storage.Network security.Wireless Fidelity.Online protection.Security loop hole.Set of instructions.Larger storage unit.Small computer/tech.Information sharing.Secure communication.Cross-site scripting.Universal Serial Bus.The computer programs.Language for websites.Biological measurements .The main system software....

My Virtual Self 2024-12-29

My Virtual Self crossword puzzle
Across
  1. a secret string used for authentication
  2. the place where something or someone is situated
  3. advancements in scientific knowledge and applications
  4. personal and not shared with the public
  5. to disturb or break continuity
  6. to depend on someone or something
  7. protection against threats or danger
  8. to concentrate on a task or subject
  9. to dominate or assume control
  10. data that provides knowledge or insight
  11. implements that assist in completing tasks
  12. an advantage in a competitive situation
  13. to breach security systems
  14. a device used for mechanical work
Down
  1. to converse with others using language
  2. skills developed through practice or training
  3. immediate without any delay
  4. to enhance or make better
  5. access always connected without interruption
  6. to lengthen or increase in duration
  7. to disrupt or obstruct a process
  8. media platforms for online social interactions
  9. relating to technology that uses binary code
  10. to require something as necessary
  11. an ID used to identify a user
  12. the act of stealing someone's property

26 Clues: to enhance or make betterto breach security systemsimmediate without any delayan ID used to identify a userto dominate or assume controlto disturb or break continuityto disrupt or obstruct a processto depend on someone or somethingto require something as necessarya device used for mechanical workto lengthen or increase in duration...

Kevin Luu's Crossword. 2025-03-07

Kevin Luu's Crossword. crossword puzzle
Across
  1. Starting amount of money invested or borrowed.
  2. A process that cycles letting you to borrow money to a certain limit, repay it, and borrow again.
  3. A loan that allows someone to buy property.
  4. Payment schedule that happens twice a month.
  5. Something that has value currently or in the future.
  6. Someone that offers/provide money.
  7. A process credit that can be use repeatedly.
  8. 80% of Americans gets into it.
  9. Someone fake who gains money through dirty methods.
Down
  1. Increase in value.
  2. Additional cost that is charged for borrowing money.
  3. Assets pledged by a borrower to a lender as security.
  4. Borrowed money that is to be paid back with interest.
  5. Someone who doesn't pay a loan or debt.
  6. Earning returns (interest).
  7. Someone who borrows a loan.
  8. The right to claim a security interest.
  9. Ownership in an asset or company.
  10. A percentage of money you earn back for making a purchase.
  11. The ability to receive a loan but also leads to debt.

20 Clues: Increase in value.Earning returns (interest).Someone who borrows a loan.80% of Americans gets into it.Ownership in an asset or company.Someone that offers/provide money.Someone who doesn't pay a loan or debt.The right to claim a security interest.A loan that allows someone to buy property.Payment schedule that happens twice a month....

study 2025-04-09

study crossword puzzle
Across
  1. the money from the Social security act was used to pay monthly____ to retired people
  2. gave jobs to over 2 million people
  3. on October 24, 1929 investors sold almost 13 ____ shares
  4. Many____ were forced to work
  5. Punished dishonest stockbrokers
  6. a reason why the dust bowl was caused (wind)
  7. a market to buy, sell, and share stocks
  8. Most people from _____ moved to California during the dust bowl
  9. People____ when they were unable to pay they're loans
  10. borrowed money from banks
  11. set a minimum wage policy and abolished child labor
Down
  1. the Social security act placed taxes on employers and ____
  2. Severe economic crisis in 1929
  3. called shanty towns
  4. Migrant workers moved here
  5. Thought the market would improve by itself
  6. this would ensure banks had enough money to give back to you
  7. A reason why the dust bowl was caused(water)
  8. An organization that helped people during the Great Depression
  9. market crashed on black _____

20 Clues: called shanty townsborrowed money from banksMigrant workers moved hereMany____ were forced to workmarket crashed on black _____Severe economic crisis in 1929Punished dishonest stockbrokersgave jobs to over 2 million peoplea market to buy, sell, and share stocksThought the market would improve by itselfa reason why the dust bowl was caused (wind)...

political acronyms 2025-06-16

political acronyms crossword puzzle
Across
  1. Governing body of the Democratic Party.
  2. Even the teacher used it for that crosswords !
  3. Domestic intelligence and security in the U.S.
  4. Body tasked with reducing US government spending and cutting jobs.
  5. Oversees international trade rules.
  6. Political leader of the executive branch in the U.S.
  7. Military alliance of North American and European countries.
  8. Public healthcare system, politically sensitive issue in the UK.
  9. The highest court in the U.S.
Down
  1. Public service broadcaster (often central to political debates on media bias and funding)in the UK.
  2. Politically charged in policy and workplace contexts.
  3. Federal agency enforcing immigration laws in the U.S.
  4. Emerging economies bloc challenging the West.
  5. Federal law enforcement and legal body in the U.S.
  6. The main conservative political party in the U.S.
  7. UN health agency (key in pandemic responses).
  8. Political and economic union of European countries.
  9. Major party advocating Scottish independence.
  10. Non-profit, often active in advocacy.
  11. Global organization for peace, security, and cooperation.

20 Clues: The highest court in the U.S.Oversees international trade rules.Non-profit, often active in advocacy.Governing body of the Democratic Party.Emerging economies bloc challenging the West.UN health agency (key in pandemic responses).Major party advocating Scottish independence.Even the teacher used it for that crosswords !...

Chapter 5 - Crime and Security 2025-11-12

Chapter 5 - Crime and Security crossword puzzle
Across
  1. requiring users to do multiple authentications checks
  2. ensuring systems are available
  3. the use of computers or networks to perform unethical activity
  4. ensuring private data remains private
  5. the process of transforming data into secret code to prevent theft
  6. process where security professionals report vulnerabilities within the system
  7. psychological feelings and characteristics for an individual
  8. the state of being protected or safe
  9. not likely to cause harm
  10. ensuring data is not changed without correct authentication
Down
  1. the process of proving something is true
  2. automated measurements to discover physical or behavioral characteristics
  3. a method to bypass regular authentication. Usually used by law enforcement
  4. the use of hacking to hurt or benefit a political cause
  5. the state of being exposed and the potential of being harmed
  6. the process of simulating cyberattacks on a system
  7. people who can help protect the digital world
  8. individuals that will be using the system created
  9. an act that is considered shameful or wrong
  10. irresponsible or destructive action performed by a criminal

20 Clues: not likely to cause harmensuring systems are availablethe state of being protected or safeensuring private data remains privatethe process of proving something is truean act that is considered shameful or wrongpeople who can help protect the digital worldindividuals that will be using the system created...

Vocabulary pg72 2024-04-17

Vocabulary pg72 crossword puzzle
Across
  1. mark left by a foot
  2. person who is convicted of a crime
  3. instrument or device used for attack or defense
  4. police officer whose job is to get evidence about crime
  5. find the answer or explanation for something
  6. place for keeping people accused of a crime
  7. act instance of robbing
Down
  1. which tends to prove or disprove something
  2. impression of the markings of the finger
  3. guard-a uniformed guard employed to maintain security
  4. inspect or look at officially so as to judge something
  5. capture a person
  6. follow rapidly in order to overtake pursue
  7. examine the particulars of something carefully
  8. officer-a policeman or policewoman
  9. unlawful killing of a person
  10. seize a person by legal authority

17 Clues: capture a personmark left by a footact instance of robbingunlawful killing of a personseize a person by legal authorityperson who is convicted of a crimeofficer-a policeman or policewomanimpression of the markings of the fingerwhich tends to prove or disprove somethingfollow rapidly in order to overtake pursue...

The Cold War 2022-04-29

The Cold War crossword puzzle
Across
  1. National Aeronautics and Space Administration.
  2. Another name for Taiwan.
  3. War dominated international relations from the late 1940's to the collapse of the Soviet Union.
  4. Buffer states.
  5. European Recovery Program.
  6. The German Democratic Republic
  7. __Bank (International Bank).
  8. North Atlantic Treaty Organization abbreviation.
  9. ___ Council was given the responsibility of maintaining international security.
Down
  1. Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
  2. ___ Policy prevented Soviet expansion without starting a war.
  3. The Federal republic of Germany.
  4. British Prime minister
  5. __ Curtain was used to refer to the division between U.S allies and Soviet allies.
  6. A military alliance for the defense of the Communist States of Eastern Europe.
  7. The founding of the United ___ in the fall 1945.

16 Clues: Buffer states.British Prime ministerAnother name for Taiwan.European Recovery Program.__Bank (International Bank).The German Democratic RepublicThe Federal republic of Germany.National Aeronautics and Space Administration.The founding of the United ___ in the fall 1945.North Atlantic Treaty Organization abbreviation....

Food Security and Biomes 2019-12-11

Food Security and Biomes crossword puzzle
Across
  1. Removing unnecessary water requires this
  2. A major food crop native to the Americas.
  3. These dry places form right next to cold water.
  4. A famous American state that experience a 7 year drought
  5. A major threat in Australia's dry summers.
  6. A dry environment characterised by shifting dunes.
  7. A lot of water is needed to raise this meat.
  8. Plants grow in this
  9. Cleaning these out is important to prevent house fires.
Down
  1. Rainwater carries a tiny amount of this ocean mineral.
  2. If tap water runs out, people often rely on water from these
  3. Food can be grown in these in dry places.
  4. This kind of power captures sunlight
  5. These are used to capture the power of wind
  6. A deep hole dug in the ground to get water
  7. A famous city that is known for its waste
  8. A major food crop that is often turned into bread.

17 Clues: Plants grow in thisThis kind of power captures sunlightRemoving unnecessary water requires thisFood can be grown in these in dry places.A major food crop native to the Americas.A famous city that is known for its wasteA deep hole dug in the ground to get waterA major threat in Australia's dry summers.These are used to capture the power of wind...

Enterprise Information Security Policy 2017-09-06

Enterprise Information Security Policy crossword puzzle
Across
  1. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
  2. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
  3. Verifying the identity of a user, machine, software component, device, or other entity.
  4. a computer service.
  5. Any type of storage device that can be removed from a computer while the system is running.
  6. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
  7. The physical elements of a computer system
  8. Protected Health Information acronym
  9. A person or persons responsible for supervising people or work.
  10. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
Down
  1. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
  2. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
  3. ____ is compromised of 60 standards
  4. _____ implements standards to protect Protected Health Information (PHI).
  5. A Credential established by a sequence of characters used as a secret key for
  6. The set of characteristics by which a Person is definitively recognizable or known.
  7. A piece of Software intended to update an electronic Information Resource.

17 Clues: a computer service.____ is compromised of 60 standardsProtected Health Information acronymThe physical elements of a computer systemA person or persons responsible for supervising people or work._____ implements standards to protect Protected Health Information (PHI).A piece of Software intended to update an electronic Information Resource....

Risks to data security 2016-05-10

Risks to data security crossword puzzle
Across
  1. Part of the virus that causes the damage. (7)
  2. Virus that hides by inserting code between the OS and Anti-virus. (7)
  3. Virus that appears to be something else. (6)
  4. Way of accessing a computer without going through normal security procedures. (4,4)
  5. virus that triggers at a certain time. (4,4)
  6. Malware that replicates in order to infect other computers. (4)
  7. Software designed to cause harm. (7)
  8. Type of virus that can rewrite itself. (11)
  9. Type of virus that stays active in the computers memory. (8)
Down
  1. Type of virus that infects both files and boot records. (11)
  2. Virus that triggers when certain conditions are met. (5,4)
  3. Type of virus that infect the boot record. (4,6)
  4. Ethical hacker. (5,3)
  5. Someone who breaks into systems to carry out illegal and destructive acts. (6)
  6. Type of virus that infects files like Word and Excel documents. (5)
  7. a set of tools to enable a hacker to gain control of a computer. (4,3)
  8. Self replicating software that runs itself in order to infect other programs. (5)

17 Clues: Ethical hacker. (5,3)Software designed to cause harm. (7)Type of virus that can rewrite itself. (11)Virus that appears to be something else. (6)virus that triggers at a certain time. (4,4)Part of the virus that causes the damage. (7)Type of virus that infect the boot record. (4,6)Virus that triggers when certain conditions are met. (5,4)...

Security Plus Chapter 1 2024-02-15

Security Plus Chapter 1 crossword puzzle
Across
  1. Network that moves a product from its creation to the end-user
  2. Safeguard employed within an enterprise to protect the CIA of information
  3. Controls that provide an alternative to normal controls
  4. Businesses that furnish solutions or services to users and organizations
  5. Threat actors who are strongly motivated by philosophical or political beliefs.
  6. no unauthorized person or malicious software has altered the data
  7. unauthorized copying of data
  8. Threat actors who are employed by their own government to carry out attacks.
Down
  1. Software in which no additional processes
  2. pose a threat from the position of a trusted entity
  3. Vulnerability for which there are no days of advanced warning
  4. mitigate or lessen the damage caused by the incident
  5. outsourcing the responsibility of a IT resources
  6. End of a product’s manufacturing lifespan
  7. Process of bypassing corporate approval for technology purchases
  8. Erroneous technology settings.
  9. Individual or entity who is responsible for attacks

17 Clues: unauthorized copying of dataErroneous technology settings.Software in which no additional processesEnd of a product’s manufacturing lifespanoutsourcing the responsibility of a IT resourcespose a threat from the position of a trusted entityIndividual or entity who is responsible for attacksmitigate or lessen the damage caused by the incident...

IT Security Cross Word 2025-03-28

IT Security Cross Word crossword puzzle
Across
  1. A network that connects multiple LANs in a city
  2. Ports used by SIP
  3. Protocol for sharing files
  4. A small network for personal use
  5. A combination of different network types
  6. Devices connected to a central point
  7. A network that covers a small area
  8. Devices connected in a loop
Down
  1. A mix of star and bus networks
  2. Devices connected to many others
  3. Port used by SNMP
  4. Port used by SMB
  5. Protocol for secure communication
  6. Devices connected through one main cable
  7. A network that covers a large area
  8. Protocol for managing networks
  9. Protocol for making internet calls

17 Clues: Port used by SMBPort used by SNMPPorts used by SIPProtocol for sharing filesDevices connected in a loopA mix of star and bus networksProtocol for managing networksDevices connected to many othersA small network for personal useProtocol for secure communicationA network that covers a large areaA network that covers a small area...

Industrial Security Crossword Puzzle 2025-09-23

Industrial Security Crossword Puzzle crossword puzzle
Across
  1. Control- It is the management of keys in a plant or business organization to prevent unauthorize individual access to the
  2. KEYING- is when a lock operates on a master key plus an individual or change key.
  3. — distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
  4. - faithful allegiance to the Philippine government and its duly constitutional authorities;
  5. record- some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
  6. - uprightness in character, soundness of moral principle, freedom from moral delinquencies.
  7. Key- for single lock
  8. KEY SYSTEM - keying system that permits a lock to be opened with a number of unique, individual keys. Often found in apartment building common areas.
  9. Master key- that can open all locks within a particular area or grouping Master key.
  10. periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
Down
  1. - A term used in England for lock picker, safecrackers, and penetrators of restricted areas or rooms.
  2. KEY - Genuine key stolen from the owner.
  3. - the ability or tendency to act or to decide with prudence, the habit of wise judgment;
  4. — the sum of traits that have been impresses by nature, education and habit upon the individual.
  5. cabinet-a well constructed cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all time
  6. lock- Can be closed and opened remotely by electronic means.
  7. KEY- is a key used to operate an inexpensive lock by moving it in keyhole until it catches locking belt and unlock mechanism.
  8. in addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
  9. report- a daily report should be made to the person responsible for key control from the personnel department indicating all people who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to insure that the key is recovered.
  10. Control- Defined as the management of keys in a plant or business organizations to prevent unauthorized individual access to the keys.

20 Clues: Key- for single lockKEY - Genuine key stolen from the owner.lock- Can be closed and opened remotely by electronic means.KEYING- is when a lock operates on a master key plus an individual or change key.Master key- that can open all locks within a particular area or grouping Master key....

Module 4.1Crossword puzzle 2023-03-16

Module 4.1Crossword puzzle crossword puzzle
Across
  1. The department that is responsible for America's housing needs.
  2. The department that looks over students.
  3. The president can only have ___ terms in office.
  4. The president's advisors.
  5. The department that overlooks policy on farming.
  6. Length of the term for a president.
  7. The department that overlooks military forces.
  8. Head of the executive branch.
Down
  1. The department that protects the health of all Americans.
  2. The first Vice President.
  3. Legislative house that is controlled by the vice president.
  4. The department that protects American people from domestic threats.
  5. The first president.
  6. how old does a president have to be?
  7. System that votes the president into office.
  8. When a president rejects a bill passed by Congress.
  9. The department that creates conditions for economic growth.
  10. The department tasked with overlooking American nuclear security.

18 Clues: The first president.The first Vice President.The president's advisors.Head of the executive branch.Length of the term for a president.how old does a president have to be?The department that looks over students.System that votes the president into office.The department that overlooks military forces.The president can only have ___ terms in office....

IR - Module 1 2024-12-05

IR - Module 1 crossword puzzle
Across
  1. US and ----- were the superpowers emerged after WWII
  2. The period from 1945-1991
  3. The IGO formed after WW 2
  4. This level of IR analysis states that single countries can influence IR
  5. The process of managing / governing people in a place.
  6. The treaty to punish Germany is
  7. The relationship between nation states is called
  8. The second name of the person behind systems theory.
  9. Promote peace and security among nations, Kill evils in the society.
  10. Looting one country by another country is
Down
  1. Treaty of ---- was signed on 1648
  2. ..... conference was held in 1919 Jan
  3. The process of making slaves and setting empire is called
  4. The treaty to end war on Spanish succession was ..... treaty.
  5. Germany, Austria-Hungary, Italy
  6. German ruler during WW I
  7. Nation security is a matter of importance and selfishness
  8. This level of IR analysis says that a single person can influence in IR

18 Clues: German ruler during WW IThe period from 1945-1991The IGO formed after WW 2Germany, Austria-Hungary, ItalyThe treaty to punish Germany isTreaty of ---- was signed on 1648..... conference was held in 1919 JanLooting one country by another country isThe relationship between nation states is calledUS and ----- were the superpowers emerged after WWII...

JMS Life 2024-03-14

JMS Life crossword puzzle
Across
  1. MRTRAMM
  2. MRNANCE
  3. YOU GET YOUR LUNCH HERE
  4. MRORTEGA
  5. MSWHITEHURST
  6. MSJEN
  7. MRKEITH
Down
  1. YOU GO HERE WHEN YOU'RE IN TROUBLE
  2. MSVILLAREAL
  3. DRPENULIAR
  4. MSOTEY
  5. MRSLUFT
  6. MSTIRONA
  7. MRCOOPER

14 Clues: MSJENMSOTEYMRTRAMMMRNANCEMRSLUFTMRKEITHMRORTEGAMSTIRONAMRCOOPERDRPENULIARMSVILLAREALMSWHITEHURSTYOU GET YOUR LUNCH HEREYOU GO HERE WHEN YOU'RE IN TROUBLE

Security 2022-02-23

Security crossword puzzle
Across
  1. Flying mammal
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Internet Puzzles 2016-02-17

Internet Puzzles crossword puzzle
Across
  1. Internet program you use to surf the internet.
  2. A networking device that perform the "traffic directing" functions on the Internet.
  3. server that automatically provides an IP address.
  4. A Type of Cord that hooks direct from the modem to customers device.
  5. A tool you use to help guide your calls.
  6. The owner of a Domain name.
  7. This controls your domain name's website and email settings.
  8. What is before the .com but after the @ symbol?
  9. A free service with NPP for email and web.
Down
  1. Controls how the modem functions.
  2. The Program the customer goes to set up a Domain Name.
  3. network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
  4. Translates an IP address to a domain name.
  5. Redirects a communication request from one address to a Port.
  6. Internet output device.
  7. Changing IP Address.
  8. Modem config without NAT.
  9. Internet without wires.
  10. a hardware device that has multiple Ethernet ports.
  11. Non changing IP Address.
  12. Network Address Translation.

21 Clues: Changing IP Address.Internet output device.Internet without wires.Non changing IP Address.Modem config without NAT.The owner of a Domain name.Network Address Translation.Controls how the modem functions.A tool you use to help guide your calls.Translates an IP address to a domain name.A free service with NPP for email and web....

ASEAN 2019-08-22

ASEAN crossword puzzle
Across
  1. singkatan dari ASEAN Security Community
  2. singkatan dari Southeast Asian Games
  3. negara-negara yang terletak pada suatu wilayah yang sama dapat terdorong untuk kerja sama.
  4. singkatan dari ASEAN Socio-Cultural Community
  5. singkatan Konferensi Tingkat Tinggi
  6. singkatan dari ASEAN Youth Leadership Development Programme
  7. singkatan dari ASEAN Ministers Responsible for Culture and Arts
  8. singkatan dari ASEAN Agreement on Disaster Management and Emergency Response
  9. singkatan dari ASEAN Youth Forum
  10. singkatan dari confidence building measures
Down
  1. singkatan dari Environmentally Sustainabe City
  2. singkatan dari South-East Asia Nuclear Weapon Free Zone
  3. singkatan dari ASEAN Commmittee on Culture and Information
  4. kegiatan atau usaha yang dilakukan oleh beberapa orang untuk mencapai tujuan bersama.
  5. singkatan dari North Atlantic Treaty Organization
  6. singkatan dari ASEAN Political Security Community
  7. singkatan dari ASEAN Convention on Counter Terrorism
  8. singkatan dari Zone of Peace, Freedom And Neutrality
  9. singkatan dari ASEAN Defence Ministers Meeting
  10. singkatan dari ASEAN Youth Leadership Forum
  11. singkatan dari ASEAN Regional Forum
  12. singkatan dari ASEAN Economic Community

22 Clues: singkatan dari ASEAN Youth Forumsingkatan Konferensi Tingkat Tinggisingkatan dari ASEAN Regional Forumsingkatan dari Southeast Asian Gamessingkatan dari ASEAN Security Communitysingkatan dari ASEAN Economic Communitysingkatan dari ASEAN Youth Leadership Forumsingkatan dari confidence building measuressingkatan dari ASEAN Socio-Cultural Community...

Infosec Crossword Puzzle Contest 2019-08-29

Infosec Crossword Puzzle Contest crossword puzzle
Across
  1. Should not be shared / kept open to anyone
  2. Bypassing system’s customary security mechanism
  3. Unplanned disruption or failure of a feature or service
  4. Malware which presents unwanted advertisements
  5. Microsoft Office is an _______ software
  6. Threat X Vulnerability
  7. A Weakness in a system
  8. Virtual _________ Network
  9. A terminal emulator / serial console that support SSH
  10. A Software products which provide real-time analysis of security alerts by network hardware and application
Down
  1. A fraudulent social engineering attempt to obtain sensitive information
  2. Malicious software that replicates while moving across information systems
  3. The refusal of something requested or desired.
  4. Successfully exploiting vulnerability is known as
  5. Technology designed to keep the bad guys out
  6. Application of investigative analysis on a computer
  7. _______ makes password / passphrase more secure
  8. ___________ is stimuli that has meaning in some context for its receiver
  9. Confidentiality,___________,Availability
  10. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication

20 Clues: Threat X VulnerabilityA Weakness in a systemVirtual _________ NetworkMicrosoft Office is an _______ softwareConfidentiality,___________,AvailabilityShould not be shared / kept open to anyoneTechnology designed to keep the bad guys outThe refusal of something requested or desired.Malware which presents unwanted advertisements...

Infosec Crossword Puzzle Contest 2019-08-29

Infosec Crossword Puzzle Contest crossword puzzle
Across
  1. Virtual _________ Network
  2. Malware which presents unwanted advertisements
  3. A Weakness in a system
  4. Application of investigative analysis on a computer
  5. Should not be shared / kept open to anyone
  6. Unplanned disruption or failure of a feature or service
  7. _______ makes password / passphrase more secure
  8. Confidentiality,___________,Availability
  9. Threat X Vulnerability
  10. ________ is created by hackers for unauthorized entry at any point of time..
Down
  1. Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
  2. A terminal emulator / serial console that support SSH
  3. Web __________ Penetration Testing
  4. A Network security device that monitors and filters incoming / outgoing network traffic
  5. ___________ is stimuli that has meaning in some context for its receiver
  6. The refusal of something requested or desired.
  7. The process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment.
  8. Successfully exploiting vulnerability is known as
  9. A fraudulent social engineering attempt to obtain sensitive information
  10. Malicious software that replicates while moving across information systems

20 Clues: A Weakness in a systemThreat X VulnerabilityVirtual _________ NetworkWeb __________ Penetration TestingConfidentiality,___________,AvailabilityShould not be shared / kept open to anyoneMalware which presents unwanted advertisementsThe refusal of something requested or desired._______ makes password / passphrase more secure...

Airlines 2019-02-12

Airlines crossword puzzle
Across
  1. - the side of an airport terminal beyond passport and customs control.
  2. - a place at the airport which checks the goods,travellers and luggage
  3. - a computer network
  4. - a security service for aviation services.
  5. - a three letter code for Los Angeles airport
  6. - The area in which people gather before departure.
  7. - a place to change money
  8. - a place where waste goes
  9. - A small building used for worship.
  10. - people who fly on the plane
Down
  1. - flying an aircraft
  2. - an office where customers go for services
  3. - the side of an airport terminal to which the general public has unrestricted access.
  4. - people who check that everything is secure in a place
  5. - The area in which you ensure your personal hygiene is up to standard.
  6. - goods that are exempt from tax.
  7. - picks up people and moves them to a different level.
  8. - volunteers who assist customers in the airport
  9. - a piece of equipment provided for a particular service.
  10. - things you take when going on an holiday

20 Clues: - flying an aircraft- a computer network- a place to change money- a place where waste goes- people who fly on the plane- goods that are exempt from tax.- A small building used for worship.- things you take when going on an holiday- an office where customers go for services- a security service for aviation services....

HE+ NS 2023-09-28

HE+ NS crossword puzzle
Across
  1. helps support youth globally
  2. group that works within state authority
  3. helps the Oriental region by helping to progress their economies
  4. protects species while helping local communities
  5. gives global loans to countries in need to help the global economy
  6. upholds dignity of others and advances their liberties
  7. organization that supports globally sustainable economic growth
  8. helps developing countries build their trade capacity
  9. group made up of independent organizations that promotes environmental sustainability
  10. humanitarian group that provides care for victims of war, violence, and emergencies
  11. wellness group
  12. group that operates independently from state authority
Down
  1. helps families who struggle with house financing
  2. safeguard of freedom and security politically and militarily
  3. world's largest human right's organization
  4. fighting inequality to end poverty and injustice
  5. globally connects governments to improve the international enviroment
  6. promotes togetherness between the continent with the most countries
  7. promotes peace and security on the Eastern Hemisphere
  8. countries that work together to solve common problems and maintain relations

20 Clues: wellness grouphelps support youth globallygroup that works within state authorityworld's largest human right's organizationhelps families who struggle with house financingprotects species while helping local communitiesfighting inequality to end poverty and injusticehelps developing countries build their trade capacity...

Tech and Cyber Crime Mysteries 2025-01-06

Tech and Cyber Crime Mysteries crossword puzzle
Across
  1. An ethical hacker who helps organizations improve security
  2. Any program designed to damage or gain unauthorized access
  3. Hyper-realistic synthetic media used for deception
  4. The practice of recovering and analyzing electronic evidence
  5. Digital tokens often demanded as ransom payments
  6. Unauthorized exposure of login credentials
  7. A code injection exploit targeting databases
  8. Security system monitoring incoming and outgoing network traffic
Down
  1. The process of scrambling data to prevent unauthorized access
  2. A program secretly recording every keystroke typed
  3. Malicious software that locks files until payment is made
  4. Someone who breaks into computer systems for illicit or ethical reasons
  5. Overwhelming a target server with excessive traffic
  6. A cyberattack requiring no user interaction to gain entry
  7. A hidden network often used for illegal transactions
  8. A deceptive attempt to steal personal details via email or messaging
  9. Harmful code hidden inside otherwise legitimate software
  10. A criminal hacker seeking personal gain or causing harm
  11. Stealing personal info to commit fraud or other crimes
  12. A network of compromised devices controlled remotely

20 Clues: Unauthorized exposure of login credentialsA code injection exploit targeting databasesDigital tokens often demanded as ransom paymentsA program secretly recording every keystroke typedHyper-realistic synthetic media used for deceptionOverwhelming a target server with excessive trafficA hidden network often used for illegal transactions...

investment crossword 2023-12-11

investment crossword crossword puzzle
Across
  1. -The rate of which the prices of a good increases.
  2. -The annual interest payment on a bond.
  3. -A financial asset such as a stock or bond.
  4. -A group of financial instruments which have similar financial characteristics.
  5. -A share of the value of a company.
  6. -A collection of financial investments such as stocks.
  7. -The second largest stock exchange.
  8. -An individual retirement account.
  9. -A collection of stocks and bonds that are traded on securities exchanges.
  10. -The process of setting money aside to increase wealth over time.
Down
  1. -A security in which the Invester loans money to a company.
  2. -Money from the profits of a company.
  3. -A market where the stocks are up or rising.
  4. -A retirement account.
  5. -A market in which prices are falling.
  6. -An index of 500 large cap companies.
  7. -An investment tool for individuals to earmark funds.
  8. -A low-fee portfolio of stocks.
  9. -New York stock exchange.
  10. -A degree of uncertainty on if the investment will make money.

20 Clues: -A retirement account.-New York stock exchange.-A low-fee portfolio of stocks.-An individual retirement account.-A share of the value of a company.-The second largest stock exchange.-Money from the profits of a company.-An index of 500 large cap companies.-A market in which prices are falling.-The annual interest payment on a bond....

technology 2024-10-09

technology crossword puzzle
Across
  1. A broad term to describe a system of storing data a different server and accessing it via a network
  2. computer that runs chromeOS
  3. where did it store on your computer
  4. An open source platform
  5. Send you virtual letter
  6. It stores data
  7. what people hate
  8. infect your computer
  9. It connect your computer to see your screen
  10. where data is stored on the internet
  11. Laughing out loud
  12. he accesses your private information
  13. Messaging platform
Down
  1. input character
  2. biggest platform search
  3. makes a computer work
  4. not having your information viewed
  5. Connects your internet to the rest of the world
  6. Please accept "c__k___"
  7. tdsb famous "no" rule
  8. security system that defend virus
  9. big daddy musk
  10. "its going to take over the world!!!"
  11. Country that makes computer
  12. final step to make your account
  13. type of coding language
  14. computer connect to this.
  15. you can see the internet around you
  16. To connect a mouse
  17. extra security to your account

30 Clues: big daddy muskIt stores datainput characterwhat people hateLaughing out loudTo connect a mouseMessaging platforminfect your computermakes a computer worktdsb famous "no" rulebiggest platform searchPlease accept "c__k___"An open source platformSend you virtual lettertype of coding languagecomputer connect to this.computer that runs chromeOS...

IT 2025-07-03

IT crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information via email
  2. Secure connection over the internet for remote access
  3. Period when a service is unavailable
  4. Assistance provided to users with technical issues
  5. Device that directs data traffic on a network
  6. Software designed to harm or exploit systems
  7. Accessing a computer or network from a different location
  8. Record of an IT support request
  9. Secret code required to access accounts
Down
  1. Software fix for a security vulnerability or bug
  2. Enter username and password to access a system
  3. Software or hardware that blocks unauthorized network access
  4. Computer that provides resources to other computers on a network
  5. To refer a problem to higher-level support
  6. Install the latest software improvements or security patches
  7. Program used to access websites
  8. Device that produces paper copies of documents
  9. Restart a computer to fix issues
  10. Copy of data kept in case of loss or failure
  11. Memory used by computers to run programs

20 Clues: Program used to access websitesRecord of an IT support requestRestart a computer to fix issuesPeriod when a service is unavailableSecret code required to access accountsMemory used by computers to run programsTo refer a problem to higher-level supportSoftware designed to harm or exploit systemsCopy of data kept in case of loss or failure...

Test 2022-10-10

Test crossword puzzle
Across
  1. Rule, Enforces business associate liability with direct penalties
  2. Rule, Sets a national set of security standards for protecting ePHI
  3. An example of a general Business Associate
  4. Entities, A health plan or health care clearinghouse or health care provider
  5. HIPAA contains this to protect PHI and ePHI
  6. The release or divulging in any other manner of information outside the entity holding the information
  7. We are responsibilities our patient's privacy
  8. A fraudulent practice of sending emails
  9. Sharing these is a violation
  10. One of our Core Values
  11. To intentionally lie or cheat to get something you are not entitled to
Down
  1. Employees are protected against this for reporting an issue in good faith
  2. The measurement of performance against "best practice" standards
  3. Is the government agency that enforces HIPAA
  4. An unauthorized use or disclosure of PHI
  5. Taking responsibility for one's actions
  6. Office of the Inspector General
  7. Conscience, A Medical Leadership principle
  8. The affirmation by signature
  9. Compliance violations can lead to financial and reputational harm

20 Clues: One of our Core ValuesSharing these is a violationThe affirmation by signatureOffice of the Inspector GeneralTaking responsibility for one's actionsA fraudulent practice of sending emailsAn unauthorized use or disclosure of PHIAn example of a general Business AssociateConscience, A Medical Leadership principle...

Foucault-Security, Territory 2025-06-17

Foucault-Security, Territory crossword puzzle
Across
  1. The 18th-century city used as an example of security technology in urban planning, focusing on managing circulation and future growth.
  2. Foucault uses the historical exclusion of people with this disease as an example of a binary, juridico-religious power division.
  3. Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy.
  4. The space of security, where uncertain elements unfold and circulation of causes and effects is managed, combining natural and artificial givens.
  5. A multiplicity of individuals existing biologically within their material surroundings, serving as both object and subject of security mechanisms.
Down
  1. The apparatus of power that calculates costs and probabilities, operating within optimal averages rather than strict prohibitions.
  2. The type of theoretical discourse that Foucault categorically advises against engaging in.
  3. A mechanism of power characterized by surveillance, correction, and the structuring of individuals within closed, artificial spaces.
  4. This historical epidemic's regulations, involving strict partitioning and home inspections, are an example of a disciplinary system.
  5. A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space.

10 Clues: The type of theoretical discourse that Foucault categorically advises against engaging in.Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy.A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space....

Állatok 2024-01-08

Állatok crossword puzzle
Across
  1. nagyfülü
  2. tejet ad
  3. gyapjas
  4. az ember legjobb barátja
  5. szereti az egeret
  6. kolbászt ad
  7. igy csinál iá
  8. az állatok királya
Down
  1. tud utánozni
  2. erdélyi security
  3. tojást ad
  4. szarva van
  5. fekete fehér
  6. pupos
  7. agancsos
  8. huzza a szekeret

16 Clues: puposgyapjasnagyfülüagancsostojást adtejet adkolbászt adtud utánozniszarva vanfekete fehérigy csinál iáerdélyi securityhuzza a szekeretszereti az egeretaz állatok királyaaz ember legjobb barátja

The Cold War 2022-04-29

The Cold War crossword puzzle
Across
  1. National Aeronautics and Space Administration.
  2. Another name for Taiwan.
  3. War dominated international relations from the late 1940's to the collapse of the Soviet Union.
  4. Buffer states.
  5. European Recovery Program.
  6. The German Democratic Republic
  7. __Bank (International Bank).
  8. North Atlantic Treaty Organization abbreviation.
  9. ___ Council was given the responsibility of maintaining international security.
Down
  1. Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
  2. ___ Policy prevented Soviet expansion without starting a war.
  3. The Federal republic of Germany.
  4. British Prime minister
  5. __ Curtain was used to refer to the division between U.S allies and Soviet allies.
  6. A military alliance for the defense of the Communist States of Eastern Europe.
  7. The founding of the United ___ in the fall 1945.

16 Clues: Buffer states.British Prime ministerAnother name for Taiwan.European Recovery Program.__Bank (International Bank).The German Democratic RepublicThe Federal republic of Germany.National Aeronautics and Space Administration.The founding of the United ___ in the fall 1945.North Atlantic Treaty Organization abbreviation....

October 2020 Newsletter Crossword Puzzle 2020-10-05

October 2020 Newsletter Crossword Puzzle crossword puzzle
Across
  1. A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password.
  2. A tool used to discover passwords.
  3. A type of password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts is called a (blank) stuffing.
  4. The practice of (blank) engineering is when social tactics are used to gain information from people or get people to do things they would not normally do.
Down
  1. Hardware that has wireless sensors which transmit data from one place to another over the internet.
  2. A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
  3. A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
  4. The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other.
  5. Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
  6. U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.

10 Clues: A tool used to discover passwords.Hardware that has wireless sensors which transmit data from one place to another over the internet.The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other....

SPHE Crossword 2021-11-03

SPHE Crossword crossword puzzle
Across
  1. what could happen if bullying escalates
  2. talking behind somebody’s back
  3. where bullying often happens the most
  4. the type of bullying when you use your words to hurt someone
  5. who you tell if you are being bullied in school
  6. what you might get if you hold in things for to long
  7. how you make people feel when you point out their flaws
  8. the type of bullying that happens online
Down
  1. To constantly annoy or hurt someone
  2. when you spread fake news about someone
  3. practices to maintaining health
  4. best place to find fake news
  5. what you are if you post on social media for your job
  6. False or untrue
  7. How you might feel if you were being bullied
  8. treat people with .....
  9. what you tell the bully when they are bullying you
  10. What you are if you are being bullied
  11. to leave someone out

19 Clues: False or untrueto leave someone outtreat people with .....best place to find fake newstalking behind somebody’s backpractices to maintaining healthTo constantly annoy or hurt someonewhere bullying often happens the mostWhat you are if you are being bulliedwhen you spread fake news about someonewhat could happen if bullying escalates...

Daily Bulldog - Phish and Whistle 2023-07-22

Daily Bulldog - Phish and Whistle crossword puzzle
Across
  1. Whistles when the water is ready
  2. Malicious software
  3. Large or small mouth, fishermen are all about this fish?
  4. What used to run on the Whistlestop Trail
  5. Porcupine's favorite place to hike?
  6. Provides high speed internet
  7. Laugh Out Loud
  8. Alliance leading the rebuilding of trestle bridge of Sandy River
  9. scam where attackers deceive people into revealing sensitive information
  10. Coach of the The Franklin County 13U All-Star team
Down
  1. Lead singer of Phish
  2. Actress who asked, "You know how to whistle, don't you Steve?"
  3. person who informs about illegal activity
  4. Jennifer Anavi Davies set the world record for this type of whistling in 2010(25 hr,30 min, 5 sec)
  5. type of crime committed with computers and networks
  6. Cheap type of whistle?
  7. Singer-songwriter who wrote "Fish and Whistle"
  8. Colorful type of cold water game fish
  9. Canned spiced meat or sometimes it clogs up your inbox

19 Clues: Laugh Out LoudMalicious softwareLead singer of PhishCheap type of whistle?Provides high speed internetWhistles when the water is readyPorcupine's favorite place to hike?Colorful type of cold water game fishperson who informs about illegal activityWhat used to run on the Whistlestop TrailSinger-songwriter who wrote "Fish and Whistle"...

November newsletter 2025-08-26

November newsletter crossword puzzle
Across
  1. - What we're preventing this November
  2. - Animal associated with this month's full moon
  3. - The red, papaver by another name
  4. - Repeated thrice, followed by a moment of silence.
  5. - A calendar misnomer, this month's name comes from the Latin word for 9.
  6. - What people do on Black Friday & Cyber Monday
  7. - The team at the center of this edition
  8. - The Royal Canadian Military Institute is on this Toronto Avenue
Down
  1. - What you show when you thank a coworker for their efforts.
  2. - Commonly grown in November
  3. - What will be shone on each team at ULMA
  4. - Our employee newsletter
  5. - This bird takes short, shuffling steps... just like you should when it's slippery
  6. - a puzzle with vertical and horizontal squares
  7. - goggles, masks and gloves, for short.
  8. - ______, sealed, delivered

16 Clues: - Our employee newsletter- ______, sealed, delivered- Commonly grown in November- The red, papaver by another name- What we're preventing this November- goggles, masks and gloves, for short.- The team at the center of this edition- What will be shone on each team at ULMA- Animal associated with this month's full moon...

Chapman University - NCSAM week 3 2023-10-12

Chapman University - NCSAM week 3 crossword puzzle
Across
  1. Software designed to detect and destroy computer viruses.
  2. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  3. A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
  4. Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Down
  1. A means of access to a computer program that bypasses security mechanisms.
  2. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. A piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior.
  4. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. A hole in software that is unknown to the vendor and that hackers can exploit.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.

10 Clues: Software designed to detect and destroy computer viruses.A means of access to a computer program that bypasses security mechanisms.A hole in software that is unknown to the vendor and that hackers can exploit.A piece of software designed to update a computer program or its supporting data, to fix or improve it....

Cyber Times Puzzle 2023-11-14

Cyber Times Puzzle crossword puzzle
Across
  1. Conceals IP address
  2. Fingerprints or facial recognition
  3. Unwanted and unsolicited emails
  4. Malicious software
Down
  1. Adds an extra layer of security in authentication
  2. Security barrier for Network access
  3. Unique phrase for account access
  4. Detects and responds to threats

8 Clues: Malicious softwareConceals IP addressDetects and responds to threatsUnwanted and unsolicited emailsUnique phrase for account accessFingerprints or facial recognitionSecurity barrier for Network accessAdds an extra layer of security in authentication

~Food Insecurity~ 2021-11-19

~Food Insecurity~ crossword puzzle
Across
  1. What is your teachers last name?
  2. Food insecurity happens often during what time of year?
  3. During the pandemic, food insecurity in households ---------.
  4. What meal do most schools provide for free or at a low cost?
Down
  1. How can high food security households help struggling households?
  2. How many categories of food security are there?
  3. What do you need in order to buy food?
  4. What type of food security is when you do not have any problems getting food?

8 Clues: What is your teachers last name?What do you need in order to buy food?How many categories of food security are there?Food insecurity happens often during what time of year?What meal do most schools provide for free or at a low cost?During the pandemic, food insecurity in households ---------....

Crossword puzzle 2022-10-12

Crossword puzzle crossword puzzle
Across
  1. right
  2. cause
  3. time
  4. pay
  5. security
  6. period
Down
  1. Day
  2. Herrman
  3. Cammarata
  4. weeks
  5. Human Rights Codes (OHRC)

11 Clues: DaypaytimerightcauseweeksperiodHerrmansecurityCammarataHuman Rights Codes (OHRC)

cyber world vocabulary 2022-11-23

cyber world vocabulary crossword puzzle
Across
  1. อุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Address
  2. ซอฟต์แวร์ที่ติดตั้งมากับอุปกรณ์โดยที่ผู้ใช้ไม่รับรู้ เป้าหมายหลักของซอฟต์แวร์นี้คือขโมยข้อมูลส่วนตัวหรือข้อมูลลับ
  3. คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไร
  4. ระบบรักษาความปลอดภัยหรือระบบยืนยันตัวเองแบบ 2 ขั้นตอน นอกจากใส่ Username/Email และรหัสที่ถูกต้องแล้ว ผู้ใช้ต้องใส่ข้อมูลเพิ่มตัว
  5. คอมพิวเตอร์ที่ติด Malware และรอรับคำสั่งจากแฮกเกอร์เพื่อนำไปใช้ในทางที่ไม่ดี เช่น DDoS วิธีป้องกันคืออัปเดตซอฟต์แวร์อย่างสม่ำเสมอและใช้ Firewall
Down
  1. การเรียกค่าไถ่ของผู้ร้ายในวงการ IT จะทำด้วยการล็อคคอมพิวเตอร์และไฟล์ของเหยื่อ เพื่อแลกกับการใช้งานคอมพิวเตอร์และไฟล์อีกครั้ง ผู้ใช้งานจะต้องจ่ายเงินค่าไถ่ตามที่ผู้ร้ายกำหนด
  2. การโจรกรรมข้อมูลส่วนตัว โดยทำการปลอมแปลงอีเมลให้เหมือนกับอุตสาหกรรมที่มีความน่าเชื่อถือ เช่น ธนาคารหรือบริษัทโทรคมนาคม ภายในอีเมลจะอธิบายให้เหยื่อกดลิ้งค์ที่ให้มาและกรอกข้อมูลส่วนตัว
  3. เทคนิคที่แฮคเกอร์ใช้ซ่อนตัวตน โดยอาจหลอกเหยื่อว่าต้นทางของการแฮคมาจากจุด B แต่ที่จริงมาจากจุด A หรือการปลอมเว็บไซต์ขึ้นมาเพื่อหลอกให้เหยื่อใส่ข้อมูลส่วนตัวลงไป
  4. ระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน)
  5. การใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุด

10 Clues: คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไรอุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Addressการใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุดระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน)...

Englisch Cyber Words 2024-04-18

Englisch Cyber Words crossword puzzle
Across
  1. blocks malicious incoming requests from your network
  2. self-replicating computer virus
  3. graphical processing unit
  4. host of services across the internet
Down
  1. input device for typing
  2. long term for app
  3. process of creating ethernet cables
  4. old storage device. Other word for diskette
  5. short term for central-processing-unit
  6. credential scamming via email

10 Clues: long term for appinput device for typinggraphical processing unitcredential scamming via emailself-replicating computer virusprocess of creating ethernet cableshost of services across the internetshort term for central-processing-unitold storage device. Other word for disketteblocks malicious incoming requests from your network

Cyber safety crossword 2023-05-22

Cyber safety crossword crossword puzzle
Across
  1. fights on messages with angry language.
  2. online bulling
  3. excluding someone from an online group.
  4. pretending to be someone else
  5. someone stealing and copying someone else's work
Down
  1. a sickness for computers
  2. Repeated and intense harassment online
  3. Talking someone into revealing their secrets
  4. Sharing someone's secrets online.
  5. Repeatedly sending mean messages

10 Clues: online bullinga sickness for computerspretending to be someone elseRepeatedly sending mean messagesSharing someone's secrets online.Repeated and intense harassment onlinefights on messages with angry language.excluding someone from an online group.Talking someone into revealing their secretssomeone stealing and copying someone else's work

Common Cyber Terms 2023-04-24

Common Cyber Terms crossword puzzle
Across
  1. Attempt by an unauthorised entity or attacker to gain illegitimate access to a system by posing as an authorised user
  2. A type of network layer firewall
  3. A weakness in software programs that can be exploited
  4. Provides additional, revised or updated code for an operating system or application
  5. Used to gain unauthorised access to a computer or a network
Down
  1. Uses asymmetric key encryption
  2. An attack requiring a carrier file to self-replicate
  3. Gives a hacker remote access to, and control over, a computer or network
  4. Verify the identity of a user
  5. Encrypted parts of the internet that are not indexed by search engines

10 Clues: Verify the identity of a userUses asymmetric key encryptionA type of network layer firewallAn attack requiring a carrier file to self-replicateA weakness in software programs that can be exploitedUsed to gain unauthorised access to a computer or a networkEncrypted parts of the internet that are not indexed by search engines...

Cyber Awareness Week 2025-09-23

Cyber Awareness Week crossword puzzle
Across
  1. When someone manipulates an email that tricks you into doing something against your better judgement
  2. An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
  3. Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
  1. A person who uses uses malicious tactics to gain unauthorised access to systems and data
  2. Harmful computer programs used by hackers to steal information, gain access or lock your device
  3. The address of a webpage (acronym)
  4. Should be long, complex and not contain any personally identifiable information (like your dogs name)
  5. Widely used technology that allows for the wireless connection between a device and a router
  6. Never click on a ___ in an email unless you are sure that it's genuine

10 Clues: The address of a webpage (acronym)Never click on a ___ in an email unless you are sure that it's genuineA person who uses uses malicious tactics to gain unauthorised access to systems and dataWidely used technology that allows for the wireless connection between a device and a router...

Cyber Crime Crossword 2025-10-10

Cyber Crime Crossword crossword puzzle
Across
  1. hackers use this to find out every key pressed
  2. The act of trying to gain personal information from victims
  3. these people perform cyber attacks
  4. Hackers use this to watch what you are doing without having to be beside you
Down
  1. Replicates itself to do the most damage
  2. Plain text can be protected by turning it into ___ text
  3. someone looking over you to find out your details
  4. your messages can be made safer if they are_____
  5. This malware needs human interaction to get started.
  6. software designed to damage a computer system

10 Clues: these people perform cyber attacksReplicates itself to do the most damagesoftware designed to damage a computer systemhackers use this to find out every key pressedyour messages can be made safer if they are_____someone looking over you to find out your detailsThis malware needs human interaction to get started....

la "cyber-société" 2025-12-22

la "cyber-société" crossword puzzle
Across
  1. to survive
  2. to mention
  3. (wider)family
  4. low
  5. in demand
  6. to embody
Down
  1. to feel sorry
  2. or even
  3. harmful
  4. tool

10 Clues: lowtoolor evenharmfulin demandto embodyto surviveto mentionto feel sorry(wider)family

Column B 2022-12-14

Column B crossword puzzle
Across
  1. Commons
  2. Forensics
Down
  1. or digital citizenship
  2. Footprint
  3. Technology

5 Clues: CommonsFootprintForensicsTechnologyor digital citizenship

Topaz #13 2018-01-15

Topaz #13 crossword puzzle
Across
  1. The B in BSR stands for
  2. Type of fluid we use to drill the 8 1/2" section
  3. What does the D stand for in SLB D&M
  4. The F in FMS stands for
  5. You can get this when plugging AC vents
  6. One of the BHA parts in the WBCU run - Well ________
  7. Who supplies the liner hanger
  8. Name for the platform used on jackups when drilling in open water
Down
  1. The O in LO stands for
  2. Where Pak Rido is from
  3. What does the D in TvD charts stand for.
  4. Person who collects cuttings for the Geologist
  5. PCINO rep that used to play in a rock band!
  6. Canrig TDS are made in
  7. Cyber cementer presented about what on Sunday
  8. PCINO Mat co

16 Clues: PCINO Mat coThe O in LO stands forWhere Pak Rido is fromCanrig TDS are made inThe B in BSR stands forThe F in FMS stands forWho supplies the liner hangerWhat does the D stand for in SLB D&MYou can get this when plugging AC ventsWhat does the D in TvD charts stand for.PCINO rep that used to play in a rock band!...

Topaz.#13 2018-01-16

Topaz.#13 crossword puzzle
Across
  1. The B in BSR stands for
  2. Cyber cementer presented about this on Sunday
  3. Who brings the cuttings to the Gelogist
  4. Canrig TDS is designed in what country
  5. PCINO Mat Co
  6. What does the D stand for in SLB D&M
  7. The F in FMS stands for
  8. PCINO rep that was in a rock band
Down
  1. What does the O in LO stand for
  2. Where is Pak Rido from
  3. You can get this from plugging AC vents
  4. One of the BHA parts in WBCU run Well _______
  5. Who supplies the liner hanger to PCINO
  6. Name for the platform used when open water drilling
  7. What type of fluid did we drill the 8 1/2" section with
  8. What does the D in TvD charts stand for

16 Clues: PCINO Mat CoWhere is Pak Rido fromThe B in BSR stands forThe F in FMS stands forWhat does the O in LO stand forPCINO rep that was in a rock bandWhat does the D stand for in SLB D&MWho supplies the liner hanger to PCINOCanrig TDS is designed in what countryYou can get this from plugging AC ventsWho brings the cuttings to the Gelogist...

COMMERCE INVESTMENT 2022-06-07

COMMERCE INVESTMENT crossword puzzle
Across
  1. Any investment that grows or has potential to grow
  2. to overcharge or swindle (a threat to financial security)
  3. setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
  4. Buy goods in large quantities from the manufacturer
  5. A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
  6. A digital currency
  7. Part ownership of a company
  8. personal group with lots of money that are willing to lose it
  9. Australian Stock exchange
  10. A list of income and likely expenditures (a step that can minimise impacts of events)
  11. money set aside during life for retirement (a step that can minimise the impact of events)
  12. A promis to repair any defects that are in a product
  13. The amount of money a consumer is prepared to pay in exchange of a good or service
  14. A loan from a financial institution where something is held as security in case the money is not repaid
  15. items of value
  16. use of money to purchase equipment for a new business or an existing business
  17. Part of a firm’s profit that is divided amongst shareholders
  18. spending more money than your disposable income allows (a threat to financial security)
  19. What remains after all business expenses are deducted from sales revenue
  20. when a person gives up control of their assets and finances, voluntary or by court order
  21. A currency used to invest in stocks, shares as well as goods and services etc.
Down
  1. a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
  2. a collection of financial investments like stocks and cash etc.
  3. A person who works for a wage or salary
  4. Money received on a regular basis from work, property, business, investment or welfare
  5. Investments that provide regulate profits
  6. Involves buying the rights of another business to distribute its products under its name
  7. A practice of funding a project by raising money from a large number of people
  8. money owing to external sources (e.g a bank)
  9. the profit you receive on your investment as a percentage of your original investment
  10. electronic funds transfer point of sale
  11. Place where shares in public companies are bought and sold
  12. Expand your portfolio with different types of shares
  13. Real estate that is bought with the aim of earning some kind of financial return
  14. The swapping or exchanging of one good or another
  15. a type of investment that is acceptable to society’s current standards
  16. Someone who purchases goods and services to satisfy need and wants
  17. Regularly putting aside some money for future use
  18. Activities taken for the purpose of production and consumption of goods and services in a region
  19. A legally binding agreement
  20. illegal business practice (a threat to financial security)

41 Clues: items of valueA digital currencyAustralian Stock exchangePart ownership of a companyA legally binding agreementA person who works for a wage or salaryelectronic funds transfer point of saleInvestments that provide regulate profitsmoney owing to external sources (e.g a bank)The swapping or exchanging of one good or another...

Investing Vocabulary 2023-02-07

Investing Vocabulary crossword puzzle
Across
  1. an offering of unregistered securities to a limited pool of investors
  2. funds that trade on exchanges, generally tracking a specific index
  3. where securities are created so they can be sold to investors for the first time
  4. a digital system that matches buyers and sellers looking to trade securities in the financial markets
  5. the sale of equity shares or other financial instruments such as bonds to the public in order to raise capital
  6. profits gained from the sale of capital assets
  7. the annual income an investor can expect to receive while holding a particular bond
  8. the amount of money a bond issuer promises to repay bondholders at maturity
  9. a filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws
  10. individual participant or member firm of an exchange that buys and sells securities for its own account
  11. special type of stock that pays a set schedule of dividends and does not come with voting rights
  12. When a private company first sells shares of stock to the public
Down
  1. the practice of spreading your investments around so that your exposure to any one type of asset is limited
  2. let you pool your money with other investors to buy stocks, bonds, and other investments
  3. the date when the final payment is due for a loan, bond, or other financial product
  4. a security that represents ownership in a company
  5. groups together the prices of 30 of the most traded stocks on the New York Stock Exchange (NYSE) and the Nasdaq
  6. a security where usually a bond or a preferred stock that can be converted into a different security, typically shares of the company's common stock
  7. individuals classified by the SEC as qualified to invest in complex or sophisticated types of securities
  8. where securities are traded after the company has sold its offering on the primary market
  9. loan from an investor to a borrower such as a company or government
  10. an expression for net asset value that represents the value per share of a mutual fund, an exchange-traded fund (ETF), or a closed-end fund
  11. investment's annual income (interest or dividends) divided by the current price of the security.
  12. your lender verifies your income, assets, debt and property details in order to issue final approval for your loan
  13. a stock market index that measures the performance of about 500 companies in the U.S
  14. securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
  15. a group of shares that are used to give an indication of a sector, exchange or economy
  16. a marketplace, where financial securities issued by companies are bought and sold

28 Clues: profits gained from the sale of capital assetsa security that represents ownership in a companyWhen a private company first sells shares of stock to the publicfunds that trade on exchanges, generally tracking a specific indexloan from an investor to a borrower such as a company or government...

The United Nations 2020-07-29

The United Nations crossword puzzle
Across
  1. Prevents countries from buying goods and selling them to other countries.
  2. This means that decisions can be blocked in the Security Council.
  3. Set up after which World War?
  4. Headquarters of the UN are here.
  5. 90% of conflicts are now within countries.
  6. UN action to help countries recover from conflict.
  7. An agreement to stop fighting.
  8. Assembly Meets regularly to discuss any matters affecting its members.
  9. Prevent the sale of weapons to some countries.
  10. Number of non-permanent members of the security council.
Down
  1. Number of permanent members.
  2. The UN tries to promote these.
  3. Current Secretary-General of the UN.
  4. Head of the UN.
  5. An attempt by the UN to keep two sides in a conflict apart.
  6. Involves the UN sending in troops to stop wars.

16 Clues: Head of the UN.Number of permanent members.Set up after which World War?The UN tries to promote these.An agreement to stop fighting.Headquarters of the UN are here.Current Secretary-General of the UN.90% of conflicts are now within countries.Prevent the sale of weapons to some countries.Involves the UN sending in troops to stop wars....

Disruptive Technology 2025-07-24

Disruptive Technology crossword puzzle
Across
  1. Finds weaknesses and risks in applications or computer systems
  2. Public cloud computing architecture
  3. Uses endpoint monitoring to detect potential cybersecurity breaches
  4. A large, virtual world centred around user interactivity
  5. The act of automating everything that a business can automate
  6. A cybersecurity measure that uses security controls to protect users and devices
  7. Uses quantum mechanics and sciences to solve complex computing problems
  8. A user's experience across one website/application
  9. Combines practices and technologies to mitigate business risks
  10. Covers victims in the event of a cybersecurity breach
  11. Abbreviation is (BI)
Down
  1. Abbreviation is (AI)
  2. A form of authentication that provides users with an extra layer of security
  3. Abbreviation is (XaaS)
  4. Encompasses technologies that focus on immersive realities
  5. Technologies that are developed with the thought of lessening environmental impacts

16 Clues: Abbreviation is (AI)Abbreviation is (BI)Abbreviation is (XaaS)Public cloud computing architectureA user's experience across one website/applicationCovers victims in the event of a cybersecurity breachA large, virtual world centred around user interactivityEncompasses technologies that focus on immersive realities...

Domas 7B 2023-12-08

Domas 7B crossword puzzle
Across
  1. Thing that you need to have when traveling (security looks that)
  2. Fast plane,using in war
  3. Same thing like a bus but on rails,driving around the city
  4. Backpack with wheels on it and its bigger
  5. Same thing as passport but a card
  6. A pack that is on your shoulders holding your stuff
  7. Bicycle with the motor on it
Down
  1. The underground train that is only in London
  2. Plane with screws
  3. A flying object on which a person travels
  4. People who travels around the world
  5. Yellow car driving people around the city
  6. People that checks your passport and you stuff in bags
  7. A buss traveling tourists
  8. Ship moving cars from one side to the other side

15 Clues: Plane with screwsFast plane,using in warA buss traveling touristsBicycle with the motor on itSame thing as passport but a cardPeople who travels around the worldA flying object on which a person travelsYellow car driving people around the cityBackpack with wheels on it and its biggerThe underground train that is only in London...

Unit 8.3 Security of Data 2025-04-12

Unit 8.3 Security of Data crossword puzzle
Across
  1. Unauthorized access to computer systems
  2. Using physical traits like fingerprints for security
  3. Redirecting users to fake websites without their knowledge
  4. Scam using SMS messages to steal information
  5. Software used to detect and remove viruses
  6. Tricking users into revealing personal info via fake emails
  7. Protocol for secure communication over the internet
Down
  1. theft Stealing personal or sensitive digital information
  2. Voice call scam pretending to be from a trusted source
  3. fraud Unauthorized use of someone’s payment card
  4. Scrambling data to make it unreadable without a key
  5. General term for malicious software like viruses or spyware
  6. Malicious software that spreads and causes harm
  7. Secret words used to authenticate users
  8. Security system that controls incoming and outgoing traffic

15 Clues: Unauthorized access to computer systemsSecret words used to authenticate usersSoftware used to detect and remove virusesScam using SMS messages to steal informationMalicious software that spreads and causes harmfraud Unauthorized use of someone’s payment cardScrambling data to make it unreadable without a key...

Crossword Puzzle 2022-10-12

Crossword Puzzle crossword puzzle
Across
  1. right
  2. cause
  3. time
  4. pay
  5. security
  6. period
Down
  1. Day
  2. Herrman
  3. Cammarata
  4. weeks
  5. Human Rights Codes (OHRC)

11 Clues: DaypaytimerightcauseweeksperiodHerrmansecurityCammarataHuman Rights Codes (OHRC)

Society 2025-05-07

Society crossword puzzle
Across
  1. security sosiaaliturva
  2. äänestäminen
  3. Vaalit
  4. Päivähoito
  5. Tasa-arvo
  6. Politiikka
Down
  1. Benefit Lapsilisä
  2. kansalaisuus
  3. Kunnallinen
  4. Yksityinen
  5. Julkinen

11 Clues: VaalitJulkinenTasa-arvoYksityinenPäivähoitoPolitiikkaKunnallinenkansalaisuusäänestäminenBenefit Lapsilisäsecurity sosiaaliturva

IIT327-2 Quiz 2 2024-01-12

IIT327-2  Quiz 2 crossword puzzle
Across
  1. Activity involving the exploration of computer or network ports to identify potential vulnerabilities
  2. The process of identifying, assessing, and prioritizing risks to an organization's assets.
  3. A set of rules or guidelines that define the acceptable use and security measures within an organization.
  4. A process of thorough examination and analysis to ensure information security compliance
  5. Decoy systems designed to attract and detect unauthorized access attempts.
  6. Secure network for internal communication and collaboration within an organization
Down
  1. The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
  2. A network security device that monitors and controls incoming and outgoing network traffic.
  3. Incorrect identification of a harmless activity or file as malicious.
  4. A firewall that acts as an intermediary between internal network clients and external servers.

10 Clues: Incorrect identification of a harmless activity or file as malicious.Decoy systems designed to attract and detect unauthorized access attempts.Secure network for internal communication and collaboration within an organizationA process of thorough examination and analysis to ensure information security compliance...

Property Law 2024-01-11

Property Law crossword puzzle
Across
  1. the owner of real property, such as a house, building, or land.
  2. an ownership of an estate in land.
  3. a person whose job is to manage the legal process of moving land or property from one owner to another
  4. The person who transfers property by sale.
Down
  1. to obtain by paying money or giving other valuable consideration.
  2. structures and land that make up a parcel of property.
  3. A type of security interest in which a lender takes possession of personal property as security for an obligation.
  4. One who makes surveys of land
  5. the transfer of an interest in land as security for a loan or other obligation.
  6. the right to use the real property of another for a specific purpose.

10 Clues: One who makes surveys of landan ownership of an estate in land.The person who transfers property by sale.structures and land that make up a parcel of property.the owner of real property, such as a house, building, or land.to obtain by paying money or giving other valuable consideration....

CSE 167 2022-11-16

CSE 167 crossword puzzle
Across
  1. copies of data that can be used to replace the original
  2. is a method of gaining unauthorized access to a network or computer system
  3. The use of multiple layers of security techniques to help rescue the chance of successful attacks
  4. in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
  1. allows you to encrypt and sign your data and communications
  2. An attack that tricks people in believing they are someone else
  3. Confidentiality,Integrity,Availability
  4. Study of techniques for secure communication in the presenter of third parties
  5. Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
  6. attack that involves trying all possible private keys

10 Clues: Confidentiality,Integrity,Availabilityattack that involves trying all possible private keyscopies of data that can be used to replace the originalallows you to encrypt and sign your data and communicationsAn attack that tricks people in believing they are someone elseis a method of gaining unauthorized access to a network or computer system...

People at School 2022-10-14

People at School crossword puzzle
Across
  1. guru
  2. w.c.
  3. petugas keamanan
  4. laboratorium komputer
  5. kepala sekolah
  6. penjaga perpustakaan
Down
  1. petugas kebersihan
  2. kantin
  3. murid
  4. ruang kelas
  5. kantor
  6. tempat parkir

12 Clues: guruw.c.muridkantinkantorruang kelastempat parkirkepala sekolahpetugas keamananpetugas kebersihanpenjaga perpustakaanlaboratorium komputer

Glossa 2019-10-08

Glossa crossword puzzle
Across
  1. yksityissektori
  2. invaliditeetti, pysyvä vamma
  3. security sosiaaliturva
  4. ennaltaehkäisevä hoito
  5. tasa-arvo
Down
  1. syrjäytyminen
  2. isyysloma
  3. turvapaikanhakija
  4. vähemmistö
  5. lähete
  6. tuki, avustus
  7. insurance sairausvakuutus

12 Clues: läheteisyyslomatasa-arvovähemmistösyrjäytyminentuki, avustusyksityissektoriturvapaikanhakijasecurity sosiaaliturvaennaltaehkäisevä hoitoinsurance sairausvakuutusinvaliditeetti, pysyvä vamma

spanish uniut 4 2021-12-14

spanish uniut 4 crossword puzzle
Across
  1. map
  2. i will go
  3. flight
  4. security
  5. airport
  6. tour, trip
Down
  1. i will visit
  2. airplane
  3. al cliente customer service
  4. itenerary
  5. customs
  6. de tren train station
  7. departure
  8. train
  9. de vacaciones to go on vacation

15 Clues: maptrainflightcustomsairportairplanesecurityi will goitenerarydeparturetour, tripi will visitde tren train stational cliente customer servicede vacaciones to go on vacation

unit lesson 4 2023-12-06

unit lesson 4 crossword puzzle
Across
  1. meedoen
  2. thing you have to pay money for
  3. fortnite win
  4. to come back
  5. aanvallen
  6. vlag
  7. officer of the law
Down
  1. beschermen
  2. something a soldier wears
  3. thing that shoots
  4. safety
  5. gevecht
  6. fight
  7. vluchteling
  8. pot

15 Clues: potvlagfightsafetymeedoengevechtaanvallenbeschermenvluchtelingfortnite winto come backthing that shootsofficer of the lawsomething a soldier wearsthing you have to pay money for

EXTREME SPORTS 2021-09-23

EXTREME SPORTS crossword puzzle
Across
  1. rapid descent on vertical walls by sliding down a rope attached to the body
  2. An element used to skydive
  3. slide and twist in a wave standing on a board
  4. It is a risk of practicing some extreme sport
  5. when a bone breaks
  6. is a stretch or tear of the ligaments
  7. consists of jumping from a certain height with a rope
  8. A security element to protect the eyes
Down
  1. security element to illuminate in caves
  2. Climb a mountain
  3. move from one point to another by jumping on buildings
  4. motorcycle circuits with jumps in any space
  5. It consists of parachuting from an airplane
  6. They take off from a mountain, driven by the wind
  7. cross the rivers in a raft with oars

15 Clues: Climb a mountainwhen a bone breaksAn element used to skydivecross the rivers in a raft with oarsis a stretch or tear of the ligamentsA security element to protect the eyessecurity element to illuminate in cavesmotorcycle circuits with jumps in any spaceIt consists of parachuting from an airplaneslide and twist in a wave standing on a board...