cyber security Crossword Puzzles
7th technology vocab 2 2014-10-13
Across
- (on social media sites such as twitter0 A WORD OR PHRASE PRECEDED BY A hash or pound sign (#) and used to identify messages o a specific topic.
- a device for storing information on a fixed location with in your computer.
- item to used organiseid files into groups.
- hypertext markup language. This is the coding language used to create sites on the world wide web.
- hardeware and that separates a local area network into two or more parts for security purposes.
- graphic interchange format… an efficient method for storing graphics. Gif’s take up a small amount of disk space and can be transmitted quickly.
- copy from one computer to another, typically over the internet
- commonly known as email. System designed to send messages and attachments elecontecly .
Down
- involving questions of right and wrong behavior, following accepted rules of behavior: morally right and good. “what is moral when using technology?
- file transfer protocol. A set of rules that allowstwo computers to talk to one another while transferring files from one to the other. This the protocol used when you transfer a file from one computer to another across
- the production of printed matter by means of a printer linked to a desktop computer, with special software. The system enables reports, advertising matter, company magazines, etc., to be produced cheaply with a layout and print quality similar to that of typeset books, for xerographic or other reproduction
- to set the margins, tabs, front or line spacing in layout of a document.
- cyber bullying is the use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner.
- make changes to a document or presentation.
- starting the computer when its power is turned off. To perform a cold boot if the computer is still running, shut down must me selected from the menu first. Once the machines off, turning it back on performs the cold boot.
- a place a database record where a category of information can be entered or located.
16 Clues: item to used organiseid files into groups. • make changes to a document or presentation. • copy from one computer to another, typically over the internet • to set the margins, tabs, front or line spacing in layout of a document. • a device for storing information on a fixed location with in your computer. • ...
Listening Insight 2 Unit 11 IT & Internet 2013-07-09
Across
- a man who fixes things
- very bad, awful
- keeping something or someone safe
- re-arrange the following letters: usobyivlo
- a general place or location
- instructions for making food
- to be unsure of something
- fill in the gap: "My computer has a virus because I didn't ____________ the security software"
Down
- fill in the gap: "I have a new hand phone, it has many great ____________ such as 4G and a camera"
- costs a lot of money
- speaking or writing about a particular thing
- almost the same as something else
12 Clues: very bad, awful • costs a lot of money • a man who fixes things • to be unsure of something • a general place or location • instructions for making food • keeping something or someone safe • almost the same as something else • re-arrange the following letters: usobyivlo • speaking or writing about a particular thing • ...
US invasion of Iraq 2023-11-29
Across
- United Nations Security Council resolution adopted unanimously by the United Nations Security Council on 8 November 2002
- The invasion began with U.S. _ dropping precision-guided bombs on a bunker complex in Baghdad
- Saddam's younger son
- Declaration by George w Bush on may 2003
- capital of Iraq
Down
- The leader prior to the US invasion of Iraq
- Veto power that opposed the invasion
- The name of our great teacher
- A country said to contain weapons of mass destruction
- place where Saddam Hussein's statue was toppled
- George _ Bush
- Saddam's elder son
12 Clues: George _ Bush • capital of Iraq • Saddam's elder son • Saddam's younger son • The name of our great teacher • Veto power that opposed the invasion • Declaration by George w Bush on may 2003 • The leader prior to the US invasion of Iraq • place where Saddam Hussein's statue was toppled • A country said to contain weapons of mass destruction • ...
UNIT 4 "HOME AUTOMATION CONTROL SYSTEMS", Crossword 2025-10-01
Across
- Keeping watch over an area for security.
- Portable computer with a touchscreen.
- A tool used to tighten or loosen nuts and bolts.
- Device that cools a room.
- The process of making devices work automatically.
Down
- Device that warms a room.
- Technology that simulates human intelligence.
- Reasonable in price; not too expensive.
- Security system with lenses to record video.
- Portable device used to melt metal for joining circuits.
- To activate a device, e.g., a light or machine.
- A handheld device to make calls and access apps.
12 Clues: Device that warms a room. • Device that cools a room. • Portable computer with a touchscreen. • Reasonable in price; not too expensive. • Keeping watch over an area for security. • Security system with lenses to record video. • Technology that simulates human intelligence. • To activate a device, e.g., a light or machine. • A tool used to tighten or loosen nuts and bolts. • ...
MEDICAL TERMINOLOGY ³ 2025-05-28
12 Clues: الامن • الفنيون • التغذية • الاداريين • فني الاشعة • فني المختبر • الاختصاصيون • مدير المشفى • عمال النظافة • الفريق المساعد • العلاج الطبيعي • موظف الاستقبال
bullying crossword 2014-06-05
Across
- the person who is being mean to the victim
- when things are said that arnt true
- attacking the victim and contact with the victim
- making someone feel as they have to do what you tell them to do
- threatening someone or making them scared enough to make them do what you want
- hitting or hurting someone
- when you call someone names.
Down
- the person who is getting bullied
- when its done through social media
- when you leave someone out of the group
- a person who is watching but doesnt do anything about it
- is a crime
- groups that hep you with bullying
- when its done face to face
- : use of words that upset the victim
15 Clues: is a crime • when its done face to face • hitting or hurting someone • when you call someone names. • the person who is getting bullied • groups that hep you with bullying • when its done through social media • when things are said that arnt true • : use of words that upset the victim • when you leave someone out of the group • the person who is being mean to the victim • ...
DTIN- Final Crossword Part 2 2024-03-21
Across
- Type of digital currency that uses cryptography
- Methodology promoting continuous iteration of development
- Style of education through electronic and online media
- Network of physical objects connected to the internet
- Field involving analysis of raw data to draw conclusions
- Platforms for social interaction and content sharing
- Term for currency available only in digital form
- Large and complex data sets that are difficult to process
- Delivery of computing services over the internet
Down
- Decentralized ledger technology behind cryptocurrencies
- Simulated experience that can be similar to or different from the real world
- Protection of internet-connected systems from cyber threats
- Mobile phone with advanced features and connectivity
- Record of one's internet usage and online activities
- AI subset involving algorithms that learn over time
15 Clues: Type of digital currency that uses cryptography • Term for currency available only in digital form • Delivery of computing services over the internet • AI subset involving algorithms that learn over time • Mobile phone with advanced features and connectivity • Record of one's internet usage and online activities • Platforms for social interaction and content sharing • ...
Health 2025-05-13
Across
- adding a regular physical activity into daily life
- keeping your body healthy by showering, wearing deodorant,and brushing your teeth.
- people who are related to you and you can rely on
- a key step in having good physical health
- people you can rely on when things are bad
- the state of being healthy in physical mental and social
- the state of being ill
Down
- state of complete physical, mantal, and social well-being.
- provides essential nutrients for maintaining and improving overall health
- the condition of being physically fit and healthy.
- how you feel and your emotions.
- sadness, happiness, anger
- eating health and getting enough sleep.
- people who bully online
- your friend and family relationships.
15 Clues: the state of being ill • people who bully online • sadness, happiness, anger • how you feel and your emotions. • your friend and family relationships. • eating health and getting enough sleep. • a key step in having good physical health • people you can rely on when things are bad • people who are related to you and you can rely on • ...
Application MOS 2025-05-28
Across
- This MOS deals with the disposal of explosive hazards
- The MOS designation for Cyber Network Defender
- Special Forces Military Occupational Specialty designation
- Critical roles demanding rigorous vetting, training, and advanced skills
Down
- MOS responsible for Army retention and soldier career management
- Regulation number detailing the Army Retention Program
- The structured process soldiers undergo for specialized roles
- Term for exceeding allowable time in a specific rank, risking separation
8 Clues: The MOS designation for Cyber Network Defender • This MOS deals with the disposal of explosive hazards • Regulation number detailing the Army Retention Program • Special Forces Military Occupational Specialty designation • The structured process soldiers undergo for specialized roles • MOS responsible for Army retention and soldier career management • ...
Exiting Prison 2013-12-11
Across
- Claim that a mistake was made in a court decision.
- Determining parole after one third of the sentence has been served. (2 words)
- To guarantee the honesty of someone working with money.
- Penitentiary for a sentence of less than two years.
- Being excused for a crime.
- Term for prison services.
- Custody under constant guard.
Down
- An early release.
- Release as outlined by the law.
- Low level security.
- This can make it hard to leave the country. (2 words)
- The highest level of security.
- Prison for those serving longer sentences.
- Clause that allows those serving long sentences to apply for parole. (2 words)
- Custody that allows inmates to work and have some access to the community.
15 Clues: An early release. • Low level security. • Term for prison services. • Being excused for a crime. • Custody under constant guard. • The highest level of security. • Release as outlined by the law. • Prison for those serving longer sentences. • Claim that a mistake was made in a court decision. • Penitentiary for a sentence of less than two years. • ...
Friday Game v1.1 2023-06-23
Across
- Remote server storage and computing.
- A powerful computer that provides resources to other computers on a network.
- Domain Name System - translates domain names to IP addresses.
- A security measure that requires two different forms of identification.
- Identity and access management service for Microsoft 365.
- A directory service used in Windows environments.
- Common wired networking technology.
Down
- Microsoft's cloud-based productivity suite.
- A unique numerical label assigned to each device connected to a computer network.
- Microsoft's email server and collaboration platform.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Wireless Local Area Network.
- Dynamic Host Configuration Protocol - assigns IP addresses automatically
- Secure connection over a public network.
- Device that forwards data packets between computer networks
15 Clues: Wireless Local Area Network. • Common wired networking technology. • Remote server storage and computing. • Secure connection over a public network. • Microsoft's cloud-based productivity suite. • A directory service used in Windows environments. • Microsoft's email server and collaboration platform. • Identity and access management service for Microsoft 365. • ...
engineer 2021-10-26
Across
- the principles of Mechanics and Materials science for analysis, design, manufacturing,
- of analysis methods and the development of systems to ensure products or services
- to find the best safe performance balance,
- a detailed study of engineering to the design, development and maintenance of software.
- assures that engineered systems provide acceptable levels of safety.
- helps with their service
- monitors everything
- engineer
- engineer
- Administer and resolve all technical maintenance issues.
- manufacturing processes by studying product requirements
Down
- an engineering discipline for applying scientific know-how to a component, product, plant, or process
- helps with network
- the branch of engineering that deals with the technology of electricity.
- does everything on computer
- an engineer who designs and maintains roads, bridges, dams, and similar structures.
- does maintenance
- solves solutions
- the position of the frontend engineer focuses on making websites friendly and functional to its user
- helps with uniforms
20 Clues: engineer • engineer • does maintenance • solves solutions • helps with network • monitors everything • helps with uniforms • helps with their service • does everything on computer • to find the best safe performance balance, • Administer and resolve all technical maintenance issues. • manufacturing processes by studying product requirements • ...
Dan sigurnijeg interneta 2022-02-11
Across
- Koja je kratica short message service?
- Djevojke često koriste internet radi...
- Koja je kratica Internacionalne policijske asocijacije?
- O kojoj su mreži djeca ovisna?
- Kako se na engleskom zove nasilje na internetu?
Down
- Koja je kratica online igre s velikim brojem igrača?
- Koja je kratica programa i seek you?
- Koja mreža je svjetska komunikacijska mreža?
- Koji predmet je prva stvar koju ljudi pogledaju ujutro i zadnja prije nego odu na spavanje?
- Kome se trebamo obratiti ako se naiđemo u cyber bullingu?
10 Clues: O kojoj su mreži djeca ovisna? • Koja je kratica programa i seek you? • Koja je kratica short message service? • Djevojke često koriste internet radi... • Koja mreža je svjetska komunikacijska mreža? • Kako se na engleskom zove nasilje na internetu? • Koja je kratica online igre s velikim brojem igrača? • Koja je kratica Internacionalne policijske asocijacije? • ...
perundungan 2022-08-24
Across
- gangguan kecemasan dan perasaan ketakutan yang berlebih
- bentuk perundungan melalui kata-kata yang menyakitkan
- perasaan tidak percaya diri, tidak aman, dan keraguan
- orang pertama yang memperkenalkan konsep bullying pada tahun 1973
- tekanan psikologis akibat peristiwa kelam masa lalu
Down
- tipe kepribadian yang menyukai waktu dan energi untuk sendiri.
- bentuk perundungan melalui jejaring sosial
- kata asal Bullying dalam bahasa Inggris
- penindasan oleh kaum superior dengan sengaja Sosial bentuk perundungan dengan pengucilan dan intimidasi
9 Clues: kata asal Bullying dalam bahasa Inggris • bentuk perundungan melalui jejaring sosial • tekanan psikologis akibat peristiwa kelam masa lalu • bentuk perundungan melalui kata-kata yang menyakitkan • perasaan tidak percaya diri, tidak aman, dan keraguan • gangguan kecemasan dan perasaan ketakutan yang berlebih • ...
Bullying Ward 2 2025-05-05
Across
- Someone who does mean things to someone less powerful than them.
- This type of verbal bullying makes someone feel unsafe.
- Sending someone mean messages over and over.
- Repeatedly excluding someone to be mean.
- Hurtful words are used in this type of bullying.
Down
- Someone who watches the bullying but doesn't help.
- This type of bullying can hurt someone's body.
- Someone who is helpful toward the person being bullied.
- The person who someone tries to bully.
9 Clues: The person who someone tries to bully. • Repeatedly excluding someone to be mean. • Sending someone mean messages over and over. • This type of bullying can hurt someone's body. • Hurtful words are used in this type of bullying. • Someone who watches the bullying but doesn't help. • This type of verbal bullying makes someone feel unsafe. • ...
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
Bullying 2021-12-13
Across
- type of bullying involving words
- 3 things that make the issue bullying vs. conflict
- people not directly involved with the bullying
- type of bullying involving bodily harm
- type of bullying typically dealing with social media
Down
- 3 things that make the issue bullying vs. conflict
- type of bullying involving other people
- 3 things that make the issue bullying vs. conflict
8 Clues: type of bullying involving words • type of bullying involving bodily harm • type of bullying involving other people • people not directly involved with the bullying • 3 things that make the issue bullying vs. conflict • 3 things that make the issue bullying vs. conflict • 3 things that make the issue bullying vs. conflict • ...
SkillWise Staff Week 12 2025-03-25
6 Clues: the database SW uses • the month we're currently in • The principles we work by (8,4,5) • program ensuring cyber safety at SW (4,2,1) • The January planning week game/ event, Greg Davis • A online learning platform, available anytime for professional development(4,6,8)
R&D Engineering Bootcamp 2019-11-18
Across
- VMware NSX as the Foundation for the ________ Cloud Network
- Cloud__________ Business Unit
- IT Priority: Transform __________ and Security
- Lets you run multiple operating systems and applications on a single server
- IT Priority: _______ the Cloud Journey
- Networking and ____________ Business Unit
- _________services augment one or more logical networks and/or connect multiple logical networks together.
- product and ______ Services
- The'P' in our EPIC2 Values
Down
- Software that runs as the operating system of the ESX system
- good companies solve problems. Great companies create_________.
- How many dogs does Jenn have?
- A strategy where organizations leverage both on-premises and cloud enabling rapid portability of applications, and operational consistency across their entire environment
- IT Priority: Empowering the ______ Workspace
- VMware's beloved CEO
- Software_______data Center
- ________is VMware’s software-defined storage solution.
- ________ agility is the ability to process information with ease, speed & optimize mental flexibility
18 Clues: VMware's beloved CEO • Software_______data Center • The'P' in our EPIC2 Values • product and ______ Services • How many dogs does Jenn have? • Cloud__________ Business Unit • IT Priority: _______ the Cloud Journey • Networking and ____________ Business Unit • IT Priority: Empowering the ______ Workspace • IT Priority: Transform __________ and Security • ...
Chapter 13 2016-04-22
Across
- the account that employer payroll taxes are recorded
- amounts withheld until paid
- information needed to prepare Form 941
- the column total used for Medicare Tax Payable
- amounts recorded in the general journal are posted individually to
- a national program for unemployment benefits
- reports the prior year's earnings and payroll taxes withheld
- the column total used for Social Security Tax Payable
Down
- the payment of payroll taxes to the government
- shows taxes owed to the government
- a state program for unemployment benefits
- total earnings minus total deductions
- employers must furnish by January 31
- does not have a tax base
- how frequently a business must deposit payroll taxes
- total of gross earnings
- the total used for Employee Income Tax Payable
- the total is the salary expense
18 Clues: total of gross earnings • does not have a tax base • amounts withheld until paid • the total is the salary expense • shows taxes owed to the government • employers must furnish by January 31 • total earnings minus total deductions • information needed to prepare Form 941 • a state program for unemployment benefits • a national program for unemployment benefits • ...
11.5 Wireless Networking 2023-03-28
Across
- An enhancement that allows multiple antennas to use the same radio frequency
- Wireless authentication method that allows for automatic connection between a device and the wireless access point
- Secure authentication method for wired and wireless networks
- Wireless communication technology that allows two devices to connect to each other over a short distance
- Developed by Cisco to address security concerns in RADIUS
- Encryption protocol used on most wireless networks today
- Wireless authentication method that uses a passphrase to authenticate users
- A communication method that allows two-way communication between two devices within a few centimeters of each other
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
- One of the strongest encryption protocols based on the Rijndael algorithm
Down
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices
- Developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard
- Wireless network that requires no authentication
- IEEE designation for all wireless networking standards
- A method that allows the frequency of the wireless network to be fine-tuned
- A method that combines channels into one to increase bandwidth
- An open standard protocol used to authenticate users onto a network
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network
18 Clues: Wireless network that requires no authentication • IEEE designation for all wireless networking standards • Encryption protocol used on most wireless networks today • Developed by Cisco to address security concerns in RADIUS • Secure authentication method for wired and wireless networks • A method that combines channels into one to increase bandwidth • ...
IT Security Policy - Risk Management 2014-07-29
Across
- Organization's willingness to accept risk
- identifies applicable regulatory requirements regarding information security
- Used to evaluate and document process maturity for a given area
- risk mitigation strategy designed to reduce/eliminate threat
- Level of risk after security measures are applied
Down
- Systematic evidence based evaluation
- Process of managing, directing, controlling and influencing organizational decisions, actions and behaviours
- Provides expert leadership
- Risk assessment methodology
- Assigning risk
10 Clues: Assigning risk • Provides expert leadership • Risk assessment methodology • Systematic evidence based evaluation • Organization's willingness to accept risk • Level of risk after security measures are applied • risk mitigation strategy designed to reduce/eliminate threat • Used to evaluate and document process maturity for a given area • ...
Developing the Security Program Crossword 2020-07-10
Across
- ____ Organziations have 1 part-time manager
- What do employers look at when hiring
- ____ Organizations have internal Infosec Groups
- Who is the top InfoSec officer?
- ___ Charts are used to manage projects
Down
- PMBoK is a project management _____
- _____ Organizations have only one security admin
- ____ Is a series of projects
- What program is designed to reduce security breaches by employees?
- What department does InfoSec struggle with?
10 Clues: ____ Is a series of projects • Who is the top InfoSec officer? • PMBoK is a project management _____ • What do employers look at when hiring • ___ Charts are used to manage projects • ____ Organziations have 1 part-time manager • What department does InfoSec struggle with? • ____ Organizations have internal Infosec Groups • _____ Organizations have only one security admin • ...
Foreign Policy 2023-05-22
Across
- Decreased interest of America's military involvement in Vietnam
- handles security issues within the United States
- Because of America's isolationism WWI ____.
- Handles security internationally
- Atlantic Free Trade Agreement Free trade zone between the US, Canada, and Mexico
Down
- Main ambassador of the United States
- The opposite of isolationism
- No involvement in global issues
- The US did not directly fight in this
- Global Organization and administrators trade agreements
10 Clues: The opposite of isolationism • No involvement in global issues • Handles security internationally • Main ambassador of the United States • The US did not directly fight in this • Because of America's isolationism WWI ____. • handles security issues within the United States • Global Organization and administrators trade agreements • ...
Burbank High School 2022-05-27
17 Clues: p • S • l • S • Mask • Board • Cameras • Shorten • To Open • To Walk on • to hold on • Do Not Touch • in Sight Beam • What's The Time • School Full Name • Something To Watch • Something To Connect With
gameshop 2014-05-19
16 Clues: chaos • score • manure • express • discharge • hereditary • about to be • loose change • go ballistic • tree hugger? • puzzle seller • e.g. rent-a-cops • ex. Chucky Cheese • Florence and the _____ • a rubrik wheel-runner? • a continuous transporter
STAFF THE SPARE CONN 2016-01-19
Crossword Puzzle 2014-05-05
Across
- man's land disputed ground between the front lines or trenches of two opposing armies
- economy authority on economy
- he deliberate killing of a large group of people
- workers or working-class people
- security the cooperation of several countries in an alliance to strengthen the security of each
- the reduction or withdrawal of military forces and weapons
- camp political prisoners are persecuted
- a truce
- cocky
- legal official
- hopping travel from one island to another
Down
- Japanese aircraft loaded with explosives and making a deliberate suicidal crash on an enemy target
- peace
- prepare and organize
- a tied out battle
- action or process appease
- intense military campaign intended to bring about a swift victory
- he making of amends for a wrong one has done
- the belief or desire of a government or people that a country should maintain a strong military capability
- disobedience peaceful form of political politics
- russia
- slaughter on a mass scale
22 Clues: peace • cocky • russia • a truce • legal official • a tied out battle • prepare and organize • action or process appease • slaughter on a mass scale • economy authority on economy • workers or working-class people • camp political prisoners are persecuted • hopping travel from one island to another • he making of amends for a wrong one has done • ...
Internet Puzzle 2016-02-17
Across
- a hardware device that has multiple Ethernet ports.
- A networking device that perform the "traffic directing" functions on the Internet.
- A Type of Cord that hooks direct from the modem to customers device.
- server that automatically provides an IP address.
- Internet without wires.
- Translates an IP address to a domain name.
- Network Address Translation.
- This controls your domain name's website and email settings.
- Modem config without NAT.
- The owner of a Domain name.
- A free service with NPP for email and web.
- Redirects a communication request from one address to a Port.
- Changing IP Address.
Down
- Internet program you use to surf the internet.
- The Program the customer goes to set up a Domain Name.
- Non changing IP Address.
- A tool you use to help guide your calls.
- Controls how the modem functions.
- Internet output device.
- what is before the .com but after the @ symbol?
- network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
21 Clues: Changing IP Address. • Internet without wires. • Internet output device. • Non changing IP Address. • Modem config without NAT. • The owner of a Domain name. • Network Address Translation. • Controls how the modem functions. • A tool you use to help guide your calls. • Translates an IP address to a domain name. • A free service with NPP for email and web. • ...
Travel Vocabulary 2020-04-15
Across
- first class in a plane or train
- a ticket
- passport
- going through customs before entering a country
- ticket,luggage,counter, check in
- baggage claim
- to hope
- layover
- flight attendent
- to go straight
- window
- visa
- suitcase
- being on time
- controller
- platform
- bunk
- to go through security
- flight
- security agent
- to miss a flight
- a passenger
- a connection of one flight to another
- luggage
- a trip or travel
- international airport
- delayed
- stop
- luggage screening
Down
- waiting room
- car wagon
- to turn
- a seat
- boarding pass
- sleeping car
- second class in a train
- gate
- to check luggage
- safety seat belt
- to give
- to land
- departure
- train station
- in the airport
- to take off
- coach on a place
- aisle
- a ticket
- ticket window
- carry on luggage
- to see
- an event ticket
- arrival
- to get
54 Clues: gate • visa • bunk • stop • aisle • a seat • window • to see • flight • to get • to turn • to hope • layover • to give • to land • arrival • luggage • delayed • a ticket • passport • suitcase • a ticket • platform • car wagon • departure • controller • to take off • a passenger • waiting room • sleeping car • boarding pass • baggage claim • train station • being on time • ticket window • to go straight • in the airport • security agent • an event ticket • ...
Ch. 2 Vocabulary--American Society & It's Values 2020-09-27
Across
- expectations of behavior, written or unwritten
- money made by a business
- institution providing law & order, security,etc
- defense against threats to society Nat'l ______
- work a person gets paid for from other person
- Five parts of all societies
- person who participates in an economy by buying
- physical products required for survival
- form of gov't leader takes power by force
- rules of society that all must follow
- institution designed to prepare kids for adulthood
Down
- items we desire to make things easier
- someone makes the same product as you
- any place goods or services are exchanged
- first institution people belong to
- institution which teaches right from wrong
- anything accepted as payment for good or service
- items produced and sold in society
- what someone is willing to pay for a product
- system of producing and distributing goods/services
- learning to follow rules of society
- gov't in which leader inherits position
- gov't in which all people share the power
23 Clues: money made by a business • Five parts of all societies • first institution people belong to • items produced and sold in society • learning to follow rules of society • items we desire to make things easier • someone makes the same product as you • rules of society that all must follow • gov't in which leader inherits position • physical products required for survival • ...
h 2022-07-10
Across
- Instructional signs posted in the aircraft
- lock up latch or stow
- check emergency equipment and specific aircraft systems
- Customers on a paid fare
- 5-17 traveling alone
- breathing apparatus while fighting fires
- Security directives issued to the aircraft operators
- where planes park outside the terminal
- require all individuals to display proper identification
- predetermined periods of availability
- aircraft moves under its own power while on the ground
- how to use seatbelts oxygen mask and identify exits
Down
- created Nov 19 2001 policies to protect US transportation in airport security
- planned time from departure to arrival
- paperwork provided to flight attendants by the gate agent
- cards located in each seat pocket to explain emergency
- revised info to flight attendant manual
- frequent flyer program
- briefing designed to identify how to use specified emergency equipment
- when an aircraft leaves the ground
- all aircrafts operation below 10,000 feet
- stay overnight at a city other than your base
- temporary rule to address a temporary situation
23 Clues: 5-17 traveling alone • lock up latch or stow • frequent flyer program • Customers on a paid fare • when an aircraft leaves the ground • predetermined periods of availability • planned time from departure to arrival • where planes park outside the terminal • revised info to flight attendant manual • breathing apparatus while fighting fires • ...
Pablo Escobar 2018-02-27
Across
- Aircraft manufacturer (begins with B)
- A large building where passengers get on flights and get off flights
- Thing you go through to get to Airside
- Area before security at an airport, open to general public
- Control the roll of the plane
- First part of a planes identification code
- A flight that leaves the originating country
- When a flight is late arriving or taking off
Down
- A stop at an airport between flights
- Where pilots sit
- Main body of the aircraft
- Person who flies the plane
- Cheapest flight ticket
- A flight that starts and finishes in one country
- Second part of a planes identification code
- An item of identification you need to travel ovrseas
- When two or more airlines share a aircraft
- You can only carry 3 Ounces or 100 ml of this
- What the planes take off of
- Area of an airport only available to travelling persons and workers
20 Clues: Where pilots sit • Cheapest flight ticket • Main body of the aircraft • Person who flies the plane • What the planes take off of • Control the roll of the plane • A stop at an airport between flights • Aircraft manufacturer (begins with B) • Thing you go through to get to Airside • When two or more airlines share a aircraft • First part of a planes identification code • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
My Virtual Self 2024-12-29
Across
- a secret string used for authentication
- the place where something or someone is situated
- advancements in scientific knowledge and applications
- personal and not shared with the public
- to disturb or break continuity
- to depend on someone or something
- protection against threats or danger
- to concentrate on a task or subject
- to dominate or assume control
- data that provides knowledge or insight
- implements that assist in completing tasks
- an advantage in a competitive situation
- to breach security systems
- a device used for mechanical work
Down
- to converse with others using language
- skills developed through practice or training
- immediate without any delay
- to enhance or make better
- access always connected without interruption
- to lengthen or increase in duration
- to disrupt or obstruct a process
- media platforms for online social interactions
- relating to technology that uses binary code
- to require something as necessary
- an ID used to identify a user
- the act of stealing someone's property
26 Clues: to enhance or make better • to breach security systems • immediate without any delay • an ID used to identify a user • to dominate or assume control • to disturb or break continuity • to disrupt or obstruct a process • to depend on someone or something • to require something as necessary • a device used for mechanical work • to lengthen or increase in duration • ...
Kevin Luu's Crossword. 2025-03-07
Across
- Starting amount of money invested or borrowed.
- A process that cycles letting you to borrow money to a certain limit, repay it, and borrow again.
- A loan that allows someone to buy property.
- Payment schedule that happens twice a month.
- Something that has value currently or in the future.
- Someone that offers/provide money.
- A process credit that can be use repeatedly.
- 80% of Americans gets into it.
- Someone fake who gains money through dirty methods.
Down
- Increase in value.
- Additional cost that is charged for borrowing money.
- Assets pledged by a borrower to a lender as security.
- Borrowed money that is to be paid back with interest.
- Someone who doesn't pay a loan or debt.
- Earning returns (interest).
- Someone who borrows a loan.
- The right to claim a security interest.
- Ownership in an asset or company.
- A percentage of money you earn back for making a purchase.
- The ability to receive a loan but also leads to debt.
20 Clues: Increase in value. • Earning returns (interest). • Someone who borrows a loan. • 80% of Americans gets into it. • Ownership in an asset or company. • Someone that offers/provide money. • Someone who doesn't pay a loan or debt. • The right to claim a security interest. • A loan that allows someone to buy property. • Payment schedule that happens twice a month. • ...
study 2025-04-09
Across
- the money from the Social security act was used to pay monthly____ to retired people
- gave jobs to over 2 million people
- on October 24, 1929 investors sold almost 13 ____ shares
- Many____ were forced to work
- Punished dishonest stockbrokers
- a reason why the dust bowl was caused (wind)
- a market to buy, sell, and share stocks
- Most people from _____ moved to California during the dust bowl
- People____ when they were unable to pay they're loans
- borrowed money from banks
- set a minimum wage policy and abolished child labor
Down
- the Social security act placed taxes on employers and ____
- Severe economic crisis in 1929
- called shanty towns
- Migrant workers moved here
- Thought the market would improve by itself
- this would ensure banks had enough money to give back to you
- A reason why the dust bowl was caused(water)
- An organization that helped people during the Great Depression
- market crashed on black _____
20 Clues: called shanty towns • borrowed money from banks • Migrant workers moved here • Many____ were forced to work • market crashed on black _____ • Severe economic crisis in 1929 • Punished dishonest stockbrokers • gave jobs to over 2 million people • a market to buy, sell, and share stocks • Thought the market would improve by itself • a reason why the dust bowl was caused (wind) • ...
political acronyms 2025-06-16
Across
- Governing body of the Democratic Party.
- Even the teacher used it for that crosswords !
- Domestic intelligence and security in the U.S.
- Body tasked with reducing US government spending and cutting jobs.
- Oversees international trade rules.
- Political leader of the executive branch in the U.S.
- Military alliance of North American and European countries.
- Public healthcare system, politically sensitive issue in the UK.
- The highest court in the U.S.
Down
- Public service broadcaster (often central to political debates on media bias and funding)in the UK.
- Politically charged in policy and workplace contexts.
- Federal agency enforcing immigration laws in the U.S.
- Emerging economies bloc challenging the West.
- Federal law enforcement and legal body in the U.S.
- The main conservative political party in the U.S.
- UN health agency (key in pandemic responses).
- Political and economic union of European countries.
- Major party advocating Scottish independence.
- Non-profit, often active in advocacy.
- Global organization for peace, security, and cooperation.
20 Clues: The highest court in the U.S. • Oversees international trade rules. • Non-profit, often active in advocacy. • Governing body of the Democratic Party. • Emerging economies bloc challenging the West. • UN health agency (key in pandemic responses). • Major party advocating Scottish independence. • Even the teacher used it for that crosswords ! • ...
Chapter 5 - Crime and Security 2025-11-12
Across
- requiring users to do multiple authentications checks
- ensuring systems are available
- the use of computers or networks to perform unethical activity
- ensuring private data remains private
- the process of transforming data into secret code to prevent theft
- process where security professionals report vulnerabilities within the system
- psychological feelings and characteristics for an individual
- the state of being protected or safe
- not likely to cause harm
- ensuring data is not changed without correct authentication
Down
- the process of proving something is true
- automated measurements to discover physical or behavioral characteristics
- a method to bypass regular authentication. Usually used by law enforcement
- the use of hacking to hurt or benefit a political cause
- the state of being exposed and the potential of being harmed
- the process of simulating cyberattacks on a system
- people who can help protect the digital world
- individuals that will be using the system created
- an act that is considered shameful or wrong
- irresponsible or destructive action performed by a criminal
20 Clues: not likely to cause harm • ensuring systems are available • the state of being protected or safe • ensuring private data remains private • the process of proving something is true • an act that is considered shameful or wrong • people who can help protect the digital world • individuals that will be using the system created • ...
Vocabulary pg72 2024-04-17
Across
- mark left by a foot
- person who is convicted of a crime
- instrument or device used for attack or defense
- police officer whose job is to get evidence about crime
- find the answer or explanation for something
- place for keeping people accused of a crime
- act instance of robbing
Down
- which tends to prove or disprove something
- impression of the markings of the finger
- guard-a uniformed guard employed to maintain security
- inspect or look at officially so as to judge something
- capture a person
- follow rapidly in order to overtake pursue
- examine the particulars of something carefully
- officer-a policeman or policewoman
- unlawful killing of a person
- seize a person by legal authority
17 Clues: capture a person • mark left by a foot • act instance of robbing • unlawful killing of a person • seize a person by legal authority • person who is convicted of a crime • officer-a policeman or policewoman • impression of the markings of the finger • which tends to prove or disprove something • follow rapidly in order to overtake pursue • ...
The Cold War 2022-04-29
Across
- National Aeronautics and Space Administration.
- Another name for Taiwan.
- War dominated international relations from the late 1940's to the collapse of the Soviet Union.
- Buffer states.
- European Recovery Program.
- The German Democratic Republic
- __Bank (International Bank).
- North Atlantic Treaty Organization abbreviation.
- ___ Council was given the responsibility of maintaining international security.
Down
- Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
- ___ Policy prevented Soviet expansion without starting a war.
- The Federal republic of Germany.
- British Prime minister
- __ Curtain was used to refer to the division between U.S allies and Soviet allies.
- A military alliance for the defense of the Communist States of Eastern Europe.
- The founding of the United ___ in the fall 1945.
16 Clues: Buffer states. • British Prime minister • Another name for Taiwan. • European Recovery Program. • __Bank (International Bank). • The German Democratic Republic • The Federal republic of Germany. • National Aeronautics and Space Administration. • The founding of the United ___ in the fall 1945. • North Atlantic Treaty Organization abbreviation. • ...
Food Security and Biomes 2019-12-11
Across
- Removing unnecessary water requires this
- A major food crop native to the Americas.
- These dry places form right next to cold water.
- A famous American state that experience a 7 year drought
- A major threat in Australia's dry summers.
- A dry environment characterised by shifting dunes.
- A lot of water is needed to raise this meat.
- Plants grow in this
- Cleaning these out is important to prevent house fires.
Down
- Rainwater carries a tiny amount of this ocean mineral.
- If tap water runs out, people often rely on water from these
- Food can be grown in these in dry places.
- This kind of power captures sunlight
- These are used to capture the power of wind
- A deep hole dug in the ground to get water
- A famous city that is known for its waste
- A major food crop that is often turned into bread.
17 Clues: Plants grow in this • This kind of power captures sunlight • Removing unnecessary water requires this • Food can be grown in these in dry places. • A major food crop native to the Americas. • A famous city that is known for its waste • A deep hole dug in the ground to get water • A major threat in Australia's dry summers. • These are used to capture the power of wind • ...
Enterprise Information Security Policy 2017-09-06
Across
- A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
- Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
- Verifying the identity of a user, machine, software component, device, or other entity.
- a computer service.
- Any type of storage device that can be removed from a computer while the system is running.
- A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
- The physical elements of a computer system
- Protected Health Information acronym
- A person or persons responsible for supervising people or work.
- Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
Down
- All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
- Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
- ____ is compromised of 60 standards
- _____ implements standards to protect Protected Health Information (PHI).
- A Credential established by a sequence of characters used as a secret key for
- The set of characteristics by which a Person is definitively recognizable or known.
- A piece of Software intended to update an electronic Information Resource.
17 Clues: a computer service. • ____ is compromised of 60 standards • Protected Health Information acronym • The physical elements of a computer system • A person or persons responsible for supervising people or work. • _____ implements standards to protect Protected Health Information (PHI). • A piece of Software intended to update an electronic Information Resource. • ...
Risks to data security 2016-05-10
Across
- Part of the virus that causes the damage. (7)
- Virus that hides by inserting code between the OS and Anti-virus. (7)
- Virus that appears to be something else. (6)
- Way of accessing a computer without going through normal security procedures. (4,4)
- virus that triggers at a certain time. (4,4)
- Malware that replicates in order to infect other computers. (4)
- Software designed to cause harm. (7)
- Type of virus that can rewrite itself. (11)
- Type of virus that stays active in the computers memory. (8)
Down
- Type of virus that infects both files and boot records. (11)
- Virus that triggers when certain conditions are met. (5,4)
- Type of virus that infect the boot record. (4,6)
- Ethical hacker. (5,3)
- Someone who breaks into systems to carry out illegal and destructive acts. (6)
- Type of virus that infects files like Word and Excel documents. (5)
- a set of tools to enable a hacker to gain control of a computer. (4,3)
- Self replicating software that runs itself in order to infect other programs. (5)
17 Clues: Ethical hacker. (5,3) • Software designed to cause harm. (7) • Type of virus that can rewrite itself. (11) • Virus that appears to be something else. (6) • virus that triggers at a certain time. (4,4) • Part of the virus that causes the damage. (7) • Type of virus that infect the boot record. (4,6) • Virus that triggers when certain conditions are met. (5,4) • ...
Security Plus Chapter 1 2024-02-15
Across
- Network that moves a product from its creation to the end-user
- Safeguard employed within an enterprise to protect the CIA of information
- Controls that provide an alternative to normal controls
- Businesses that furnish solutions or services to users and organizations
- Threat actors who are strongly motivated by philosophical or political beliefs.
- no unauthorized person or malicious software has altered the data
- unauthorized copying of data
- Threat actors who are employed by their own government to carry out attacks.
Down
- Software in which no additional processes
- pose a threat from the position of a trusted entity
- Vulnerability for which there are no days of advanced warning
- mitigate or lessen the damage caused by the incident
- outsourcing the responsibility of a IT resources
- End of a product’s manufacturing lifespan
- Process of bypassing corporate approval for technology purchases
- Erroneous technology settings.
- Individual or entity who is responsible for attacks
17 Clues: unauthorized copying of data • Erroneous technology settings. • Software in which no additional processes • End of a product’s manufacturing lifespan • outsourcing the responsibility of a IT resources • pose a threat from the position of a trusted entity • Individual or entity who is responsible for attacks • mitigate or lessen the damage caused by the incident • ...
IT Security Cross Word 2025-03-28
Across
- A network that connects multiple LANs in a city
- Ports used by SIP
- Protocol for sharing files
- A small network for personal use
- A combination of different network types
- Devices connected to a central point
- A network that covers a small area
- Devices connected in a loop
Down
- A mix of star and bus networks
- Devices connected to many others
- Port used by SNMP
- Port used by SMB
- Protocol for secure communication
- Devices connected through one main cable
- A network that covers a large area
- Protocol for managing networks
- Protocol for making internet calls
17 Clues: Port used by SMB • Port used by SNMP • Ports used by SIP • Protocol for sharing files • Devices connected in a loop • A mix of star and bus networks • Protocol for managing networks • Devices connected to many others • A small network for personal use • Protocol for secure communication • A network that covers a large area • A network that covers a small area • ...
Industrial Security Crossword Puzzle 2025-09-23
Across
- Control- It is the management of keys in a plant or business organization to prevent unauthorize individual access to the
- KEYING- is when a lock operates on a master key plus an individual or change key.
- — distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
- - faithful allegiance to the Philippine government and its duly constitutional authorities;
- record- some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
- - uprightness in character, soundness of moral principle, freedom from moral delinquencies.
- Key- for single lock
- KEY SYSTEM - keying system that permits a lock to be opened with a number of unique, individual keys. Often found in apartment building common areas.
- Master key- that can open all locks within a particular area or grouping Master key.
- periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
Down
- - A term used in England for lock picker, safecrackers, and penetrators of restricted areas or rooms.
- KEY - Genuine key stolen from the owner.
- - the ability or tendency to act or to decide with prudence, the habit of wise judgment;
- — the sum of traits that have been impresses by nature, education and habit upon the individual.
- cabinet-a well constructed cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all time
- lock- Can be closed and opened remotely by electronic means.
- KEY- is a key used to operate an inexpensive lock by moving it in keyhole until it catches locking belt and unlock mechanism.
- in addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
- report- a daily report should be made to the person responsible for key control from the personnel department indicating all people who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to insure that the key is recovered.
- Control- Defined as the management of keys in a plant or business organizations to prevent unauthorized individual access to the keys.
20 Clues: Key- for single lock • KEY - Genuine key stolen from the owner. • lock- Can be closed and opened remotely by electronic means. • KEYING- is when a lock operates on a master key plus an individual or change key. • Master key- that can open all locks within a particular area or grouping Master key. • ...
Module 4.1Crossword puzzle 2023-03-16
Across
- The department that is responsible for America's housing needs.
- The department that looks over students.
- The president can only have ___ terms in office.
- The president's advisors.
- The department that overlooks policy on farming.
- Length of the term for a president.
- The department that overlooks military forces.
- Head of the executive branch.
Down
- The department that protects the health of all Americans.
- The first Vice President.
- Legislative house that is controlled by the vice president.
- The department that protects American people from domestic threats.
- The first president.
- how old does a president have to be?
- System that votes the president into office.
- When a president rejects a bill passed by Congress.
- The department that creates conditions for economic growth.
- The department tasked with overlooking American nuclear security.
18 Clues: The first president. • The first Vice President. • The president's advisors. • Head of the executive branch. • Length of the term for a president. • how old does a president have to be? • The department that looks over students. • System that votes the president into office. • The department that overlooks military forces. • The president can only have ___ terms in office. • ...
IR - Module 1 2024-12-05
Across
- US and ----- were the superpowers emerged after WWII
- The period from 1945-1991
- The IGO formed after WW 2
- This level of IR analysis states that single countries can influence IR
- The process of managing / governing people in a place.
- The treaty to punish Germany is
- The relationship between nation states is called
- The second name of the person behind systems theory.
- Promote peace and security among nations, Kill evils in the society.
- Looting one country by another country is
Down
- Treaty of ---- was signed on 1648
- ..... conference was held in 1919 Jan
- The process of making slaves and setting empire is called
- The treaty to end war on Spanish succession was ..... treaty.
- Germany, Austria-Hungary, Italy
- German ruler during WW I
- Nation security is a matter of importance and selfishness
- This level of IR analysis says that a single person can influence in IR
18 Clues: German ruler during WW I • The period from 1945-1991 • The IGO formed after WW 2 • Germany, Austria-Hungary, Italy • The treaty to punish Germany is • Treaty of ---- was signed on 1648 • ..... conference was held in 1919 Jan • Looting one country by another country is • The relationship between nation states is called • US and ----- were the superpowers emerged after WWII • ...
JMS Life 2024-03-14
14 Clues: MSJEN • MSOTEY • MRTRAMM • MRNANCE • MRSLUFT • MRKEITH • MRORTEGA • MSTIRONA • MRCOOPER • DRPENULIAR • MSVILLAREAL • MSWHITEHURST • YOU GET YOUR LUNCH HERE • YOU GO HERE WHEN YOU'RE IN TROUBLE
Security 2022-02-23
Internet Puzzles 2016-02-17
Across
- Internet program you use to surf the internet.
- A networking device that perform the "traffic directing" functions on the Internet.
- server that automatically provides an IP address.
- A Type of Cord that hooks direct from the modem to customers device.
- A tool you use to help guide your calls.
- The owner of a Domain name.
- This controls your domain name's website and email settings.
- What is before the .com but after the @ symbol?
- A free service with NPP for email and web.
Down
- Controls how the modem functions.
- The Program the customer goes to set up a Domain Name.
- network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
- Translates an IP address to a domain name.
- Redirects a communication request from one address to a Port.
- Internet output device.
- Changing IP Address.
- Modem config without NAT.
- Internet without wires.
- a hardware device that has multiple Ethernet ports.
- Non changing IP Address.
- Network Address Translation.
21 Clues: Changing IP Address. • Internet output device. • Internet without wires. • Non changing IP Address. • Modem config without NAT. • The owner of a Domain name. • Network Address Translation. • Controls how the modem functions. • A tool you use to help guide your calls. • Translates an IP address to a domain name. • A free service with NPP for email and web. • ...
ASEAN 2019-08-22
Across
- singkatan dari ASEAN Security Community
- singkatan dari Southeast Asian Games
- negara-negara yang terletak pada suatu wilayah yang sama dapat terdorong untuk kerja sama.
- singkatan dari ASEAN Socio-Cultural Community
- singkatan Konferensi Tingkat Tinggi
- singkatan dari ASEAN Youth Leadership Development Programme
- singkatan dari ASEAN Ministers Responsible for Culture and Arts
- singkatan dari ASEAN Agreement on Disaster Management and Emergency Response
- singkatan dari ASEAN Youth Forum
- singkatan dari confidence building measures
Down
- singkatan dari Environmentally Sustainabe City
- singkatan dari South-East Asia Nuclear Weapon Free Zone
- singkatan dari ASEAN Commmittee on Culture and Information
- kegiatan atau usaha yang dilakukan oleh beberapa orang untuk mencapai tujuan bersama.
- singkatan dari North Atlantic Treaty Organization
- singkatan dari ASEAN Political Security Community
- singkatan dari ASEAN Convention on Counter Terrorism
- singkatan dari Zone of Peace, Freedom And Neutrality
- singkatan dari ASEAN Defence Ministers Meeting
- singkatan dari ASEAN Youth Leadership Forum
- singkatan dari ASEAN Regional Forum
- singkatan dari ASEAN Economic Community
22 Clues: singkatan dari ASEAN Youth Forum • singkatan Konferensi Tingkat Tinggi • singkatan dari ASEAN Regional Forum • singkatan dari Southeast Asian Games • singkatan dari ASEAN Security Community • singkatan dari ASEAN Economic Community • singkatan dari ASEAN Youth Leadership Forum • singkatan dari confidence building measures • singkatan dari ASEAN Socio-Cultural Community • ...
Infosec Crossword Puzzle Contest 2019-08-29
Across
- Should not be shared / kept open to anyone
- Bypassing system’s customary security mechanism
- Unplanned disruption or failure of a feature or service
- Malware which presents unwanted advertisements
- Microsoft Office is an _______ software
- Threat X Vulnerability
- A Weakness in a system
- Virtual _________ Network
- A terminal emulator / serial console that support SSH
- A Software products which provide real-time analysis of security alerts by network hardware and application
Down
- A fraudulent social engineering attempt to obtain sensitive information
- Malicious software that replicates while moving across information systems
- The refusal of something requested or desired.
- Successfully exploiting vulnerability is known as
- Technology designed to keep the bad guys out
- Application of investigative analysis on a computer
- _______ makes password / passphrase more secure
- ___________ is stimuli that has meaning in some context for its receiver
- Confidentiality,___________,Availability
- address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
20 Clues: Threat X Vulnerability • A Weakness in a system • Virtual _________ Network • Microsoft Office is an _______ software • Confidentiality,___________,Availability • Should not be shared / kept open to anyone • Technology designed to keep the bad guys out • The refusal of something requested or desired. • Malware which presents unwanted advertisements • ...
Infosec Crossword Puzzle Contest 2019-08-29
Across
- Virtual _________ Network
- Malware which presents unwanted advertisements
- A Weakness in a system
- Application of investigative analysis on a computer
- Should not be shared / kept open to anyone
- Unplanned disruption or failure of a feature or service
- _______ makes password / passphrase more secure
- Confidentiality,___________,Availability
- Threat X Vulnerability
- ________ is created by hackers for unauthorized entry at any point of time..
Down
- Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
- A terminal emulator / serial console that support SSH
- Web __________ Penetration Testing
- A Network security device that monitors and filters incoming / outgoing network traffic
- ___________ is stimuli that has meaning in some context for its receiver
- The refusal of something requested or desired.
- The process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment.
- Successfully exploiting vulnerability is known as
- A fraudulent social engineering attempt to obtain sensitive information
- Malicious software that replicates while moving across information systems
20 Clues: A Weakness in a system • Threat X Vulnerability • Virtual _________ Network • Web __________ Penetration Testing • Confidentiality,___________,Availability • Should not be shared / kept open to anyone • Malware which presents unwanted advertisements • The refusal of something requested or desired. • _______ makes password / passphrase more secure • ...
Airlines 2019-02-12
Across
- - the side of an airport terminal beyond passport and customs control.
- - a place at the airport which checks the goods,travellers and luggage
- - a computer network
- - a security service for aviation services.
- - a three letter code for Los Angeles airport
- - The area in which people gather before departure.
- - a place to change money
- - a place where waste goes
- - A small building used for worship.
- - people who fly on the plane
Down
- - flying an aircraft
- - an office where customers go for services
- - the side of an airport terminal to which the general public has unrestricted access.
- - people who check that everything is secure in a place
- - The area in which you ensure your personal hygiene is up to standard.
- - goods that are exempt from tax.
- - picks up people and moves them to a different level.
- - volunteers who assist customers in the airport
- - a piece of equipment provided for a particular service.
- - things you take when going on an holiday
20 Clues: - flying an aircraft • - a computer network • - a place to change money • - a place where waste goes • - people who fly on the plane • - goods that are exempt from tax. • - A small building used for worship. • - things you take when going on an holiday • - an office where customers go for services • - a security service for aviation services. • ...
HE+ NS 2023-09-28
Across
- helps support youth globally
- group that works within state authority
- helps the Oriental region by helping to progress their economies
- protects species while helping local communities
- gives global loans to countries in need to help the global economy
- upholds dignity of others and advances their liberties
- organization that supports globally sustainable economic growth
- helps developing countries build their trade capacity
- group made up of independent organizations that promotes environmental sustainability
- humanitarian group that provides care for victims of war, violence, and emergencies
- wellness group
- group that operates independently from state authority
Down
- helps families who struggle with house financing
- safeguard of freedom and security politically and militarily
- world's largest human right's organization
- fighting inequality to end poverty and injustice
- globally connects governments to improve the international enviroment
- promotes togetherness between the continent with the most countries
- promotes peace and security on the Eastern Hemisphere
- countries that work together to solve common problems and maintain relations
20 Clues: wellness group • helps support youth globally • group that works within state authority • world's largest human right's organization • helps families who struggle with house financing • protects species while helping local communities • fighting inequality to end poverty and injustice • helps developing countries build their trade capacity • ...
Tech and Cyber Crime Mysteries 2025-01-06
Across
- An ethical hacker who helps organizations improve security
- Any program designed to damage or gain unauthorized access
- Hyper-realistic synthetic media used for deception
- The practice of recovering and analyzing electronic evidence
- Digital tokens often demanded as ransom payments
- Unauthorized exposure of login credentials
- A code injection exploit targeting databases
- Security system monitoring incoming and outgoing network traffic
Down
- The process of scrambling data to prevent unauthorized access
- A program secretly recording every keystroke typed
- Malicious software that locks files until payment is made
- Someone who breaks into computer systems for illicit or ethical reasons
- Overwhelming a target server with excessive traffic
- A cyberattack requiring no user interaction to gain entry
- A hidden network often used for illegal transactions
- A deceptive attempt to steal personal details via email or messaging
- Harmful code hidden inside otherwise legitimate software
- A criminal hacker seeking personal gain or causing harm
- Stealing personal info to commit fraud or other crimes
- A network of compromised devices controlled remotely
20 Clues: Unauthorized exposure of login credentials • A code injection exploit targeting databases • Digital tokens often demanded as ransom payments • A program secretly recording every keystroke typed • Hyper-realistic synthetic media used for deception • Overwhelming a target server with excessive traffic • A hidden network often used for illegal transactions • ...
investment crossword 2023-12-11
Across
- -The rate of which the prices of a good increases.
- -The annual interest payment on a bond.
- -A financial asset such as a stock or bond.
- -A group of financial instruments which have similar financial characteristics.
- -A share of the value of a company.
- -A collection of financial investments such as stocks.
- -The second largest stock exchange.
- -An individual retirement account.
- -A collection of stocks and bonds that are traded on securities exchanges.
- -The process of setting money aside to increase wealth over time.
Down
- -A security in which the Invester loans money to a company.
- -Money from the profits of a company.
- -A market where the stocks are up or rising.
- -A retirement account.
- -A market in which prices are falling.
- -An index of 500 large cap companies.
- -An investment tool for individuals to earmark funds.
- -A low-fee portfolio of stocks.
- -New York stock exchange.
- -A degree of uncertainty on if the investment will make money.
20 Clues: -A retirement account. • -New York stock exchange. • -A low-fee portfolio of stocks. • -An individual retirement account. • -A share of the value of a company. • -The second largest stock exchange. • -Money from the profits of a company. • -An index of 500 large cap companies. • -A market in which prices are falling. • -The annual interest payment on a bond. • ...
technology 2024-10-09
Across
- A broad term to describe a system of storing data a different server and accessing it via a network
- computer that runs chromeOS
- where did it store on your computer
- An open source platform
- Send you virtual letter
- It stores data
- what people hate
- infect your computer
- It connect your computer to see your screen
- where data is stored on the internet
- Laughing out loud
- he accesses your private information
- Messaging platform
Down
- input character
- biggest platform search
- makes a computer work
- not having your information viewed
- Connects your internet to the rest of the world
- Please accept "c__k___"
- tdsb famous "no" rule
- security system that defend virus
- big daddy musk
- "its going to take over the world!!!"
- Country that makes computer
- final step to make your account
- type of coding language
- computer connect to this.
- you can see the internet around you
- To connect a mouse
- extra security to your account
30 Clues: big daddy musk • It stores data • input character • what people hate • Laughing out loud • To connect a mouse • Messaging platform • infect your computer • makes a computer work • tdsb famous "no" rule • biggest platform search • Please accept "c__k___" • An open source platform • Send you virtual letter • type of coding language • computer connect to this. • computer that runs chromeOS • ...
IT 2025-07-03
Across
- Fraudulent attempt to obtain sensitive information via email
- Secure connection over the internet for remote access
- Period when a service is unavailable
- Assistance provided to users with technical issues
- Device that directs data traffic on a network
- Software designed to harm or exploit systems
- Accessing a computer or network from a different location
- Record of an IT support request
- Secret code required to access accounts
Down
- Software fix for a security vulnerability or bug
- Enter username and password to access a system
- Software or hardware that blocks unauthorized network access
- Computer that provides resources to other computers on a network
- To refer a problem to higher-level support
- Install the latest software improvements or security patches
- Program used to access websites
- Device that produces paper copies of documents
- Restart a computer to fix issues
- Copy of data kept in case of loss or failure
- Memory used by computers to run programs
20 Clues: Program used to access websites • Record of an IT support request • Restart a computer to fix issues • Period when a service is unavailable • Secret code required to access accounts • Memory used by computers to run programs • To refer a problem to higher-level support • Software designed to harm or exploit systems • Copy of data kept in case of loss or failure • ...
Test 2022-10-10
Across
- Rule, Enforces business associate liability with direct penalties
- Rule, Sets a national set of security standards for protecting ePHI
- An example of a general Business Associate
- Entities, A health plan or health care clearinghouse or health care provider
- HIPAA contains this to protect PHI and ePHI
- The release or divulging in any other manner of information outside the entity holding the information
- We are responsibilities our patient's privacy
- A fraudulent practice of sending emails
- Sharing these is a violation
- One of our Core Values
- To intentionally lie or cheat to get something you are not entitled to
Down
- Employees are protected against this for reporting an issue in good faith
- The measurement of performance against "best practice" standards
- Is the government agency that enforces HIPAA
- An unauthorized use or disclosure of PHI
- Taking responsibility for one's actions
- Office of the Inspector General
- Conscience, A Medical Leadership principle
- The affirmation by signature
- Compliance violations can lead to financial and reputational harm
20 Clues: One of our Core Values • Sharing these is a violation • The affirmation by signature • Office of the Inspector General • Taking responsibility for one's actions • A fraudulent practice of sending emails • An unauthorized use or disclosure of PHI • An example of a general Business Associate • Conscience, A Medical Leadership principle • ...
Foucault-Security, Territory 2025-06-17
Across
- The 18th-century city used as an example of security technology in urban planning, focusing on managing circulation and future growth.
- Foucault uses the historical exclusion of people with this disease as an example of a binary, juridico-religious power division.
- Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy.
- The space of security, where uncertain elements unfold and circulation of causes and effects is managed, combining natural and artificial givens.
- A multiplicity of individuals existing biologically within their material surroundings, serving as both object and subject of security mechanisms.
Down
- The apparatus of power that calculates costs and probabilities, operating within optimal averages rather than strict prohibitions.
- The type of theoretical discourse that Foucault categorically advises against engaging in.
- A mechanism of power characterized by surveillance, correction, and the structuring of individuals within closed, artificial spaces.
- This historical epidemic's regulations, involving strict partitioning and home inspections, are an example of a disciplinary system.
- A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space.
10 Clues: The type of theoretical discourse that Foucault categorically advises against engaging in. • Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy. • A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space. • ...
Állatok 2024-01-08
16 Clues: pupos • gyapjas • nagyfülü • agancsos • tojást ad • tejet ad • kolbászt ad • tud utánozni • szarva van • fekete fehér • igy csinál iá • erdélyi security • huzza a szekeret • szereti az egeret • az állatok királya • az ember legjobb barátja
The Cold War 2022-04-29
Across
- National Aeronautics and Space Administration.
- Another name for Taiwan.
- War dominated international relations from the late 1940's to the collapse of the Soviet Union.
- Buffer states.
- European Recovery Program.
- The German Democratic Republic
- __Bank (International Bank).
- North Atlantic Treaty Organization abbreviation.
- ___ Council was given the responsibility of maintaining international security.
Down
- Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
- ___ Policy prevented Soviet expansion without starting a war.
- The Federal republic of Germany.
- British Prime minister
- __ Curtain was used to refer to the division between U.S allies and Soviet allies.
- A military alliance for the defense of the Communist States of Eastern Europe.
- The founding of the United ___ in the fall 1945.
16 Clues: Buffer states. • British Prime minister • Another name for Taiwan. • European Recovery Program. • __Bank (International Bank). • The German Democratic Republic • The Federal republic of Germany. • National Aeronautics and Space Administration. • The founding of the United ___ in the fall 1945. • North Atlantic Treaty Organization abbreviation. • ...
October 2020 Newsletter Crossword Puzzle 2020-10-05
Across
- A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password.
- A tool used to discover passwords.
- A type of password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts is called a (blank) stuffing.
- The practice of (blank) engineering is when social tactics are used to gain information from people or get people to do things they would not normally do.
Down
- Hardware that has wireless sensors which transmit data from one place to another over the internet.
- A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
- A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
- The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other.
- Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
- U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.
10 Clues: A tool used to discover passwords. • Hardware that has wireless sensors which transmit data from one place to another over the internet. • The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other. • ...
SPHE Crossword 2021-11-03
Across
- what could happen if bullying escalates
- talking behind somebody’s back
- where bullying often happens the most
- the type of bullying when you use your words to hurt someone
- who you tell if you are being bullied in school
- what you might get if you hold in things for to long
- how you make people feel when you point out their flaws
- the type of bullying that happens online
Down
- To constantly annoy or hurt someone
- when you spread fake news about someone
- practices to maintaining health
- best place to find fake news
- what you are if you post on social media for your job
- False or untrue
- How you might feel if you were being bullied
- treat people with .....
- what you tell the bully when they are bullying you
- What you are if you are being bullied
- to leave someone out
19 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • where bullying often happens the most • What you are if you are being bullied • when you spread fake news about someone • what could happen if bullying escalates • ...
Daily Bulldog - Phish and Whistle 2023-07-22
Across
- Whistles when the water is ready
- Malicious software
- Large or small mouth, fishermen are all about this fish?
- What used to run on the Whistlestop Trail
- Porcupine's favorite place to hike?
- Provides high speed internet
- Laugh Out Loud
- Alliance leading the rebuilding of trestle bridge of Sandy River
- scam where attackers deceive people into revealing sensitive information
- Coach of the The Franklin County 13U All-Star team
Down
- Lead singer of Phish
- Actress who asked, "You know how to whistle, don't you Steve?"
- person who informs about illegal activity
- Jennifer Anavi Davies set the world record for this type of whistling in 2010(25 hr,30 min, 5 sec)
- type of crime committed with computers and networks
- Cheap type of whistle?
- Singer-songwriter who wrote "Fish and Whistle"
- Colorful type of cold water game fish
- Canned spiced meat or sometimes it clogs up your inbox
19 Clues: Laugh Out Loud • Malicious software • Lead singer of Phish • Cheap type of whistle? • Provides high speed internet • Whistles when the water is ready • Porcupine's favorite place to hike? • Colorful type of cold water game fish • person who informs about illegal activity • What used to run on the Whistlestop Trail • Singer-songwriter who wrote "Fish and Whistle" • ...
November newsletter 2025-08-26
Across
- - What we're preventing this November
- - Animal associated with this month's full moon
- - The red, papaver by another name
- - Repeated thrice, followed by a moment of silence.
- - A calendar misnomer, this month's name comes from the Latin word for 9.
- - What people do on Black Friday & Cyber Monday
- - The team at the center of this edition
- - The Royal Canadian Military Institute is on this Toronto Avenue
Down
- - What you show when you thank a coworker for their efforts.
- - Commonly grown in November
- - What will be shone on each team at ULMA
- - Our employee newsletter
- - This bird takes short, shuffling steps... just like you should when it's slippery
- - a puzzle with vertical and horizontal squares
- - goggles, masks and gloves, for short.
- - ______, sealed, delivered
16 Clues: - Our employee newsletter • - ______, sealed, delivered • - Commonly grown in November • - The red, papaver by another name • - What we're preventing this November • - goggles, masks and gloves, for short. • - The team at the center of this edition • - What will be shone on each team at ULMA • - Animal associated with this month's full moon • ...
Chapman University - NCSAM week 3 2023-10-12
Across
- Software designed to detect and destroy computer viruses.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
- A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
- Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Down
- A means of access to a computer program that bypasses security mechanisms.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior.
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- A hole in software that is unknown to the vendor and that hackers can exploit.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
10 Clues: Software designed to detect and destroy computer viruses. • A means of access to a computer program that bypasses security mechanisms. • A hole in software that is unknown to the vendor and that hackers can exploit. • A piece of software designed to update a computer program or its supporting data, to fix or improve it. • ...
Cyber Times Puzzle 2023-11-14
8 Clues: Malicious software • Conceals IP address • Detects and responds to threats • Unwanted and unsolicited emails • Unique phrase for account access • Fingerprints or facial recognition • Security barrier for Network access • Adds an extra layer of security in authentication
~Food Insecurity~ 2021-11-19
Across
- What is your teachers last name?
- Food insecurity happens often during what time of year?
- During the pandemic, food insecurity in households ---------.
- What meal do most schools provide for free or at a low cost?
Down
- How can high food security households help struggling households?
- How many categories of food security are there?
- What do you need in order to buy food?
- What type of food security is when you do not have any problems getting food?
8 Clues: What is your teachers last name? • What do you need in order to buy food? • How many categories of food security are there? • Food insecurity happens often during what time of year? • What meal do most schools provide for free or at a low cost? • During the pandemic, food insecurity in households ---------. • ...
Crossword puzzle 2022-10-12
cyber world vocabulary 2022-11-23
Across
- อุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Address
- ซอฟต์แวร์ที่ติดตั้งมากับอุปกรณ์โดยที่ผู้ใช้ไม่รับรู้ เป้าหมายหลักของซอฟต์แวร์นี้คือขโมยข้อมูลส่วนตัวหรือข้อมูลลับ
- คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไร
- ระบบรักษาความปลอดภัยหรือระบบยืนยันตัวเองแบบ 2 ขั้นตอน นอกจากใส่ Username/Email และรหัสที่ถูกต้องแล้ว ผู้ใช้ต้องใส่ข้อมูลเพิ่มตัว
- คอมพิวเตอร์ที่ติด Malware และรอรับคำสั่งจากแฮกเกอร์เพื่อนำไปใช้ในทางที่ไม่ดี เช่น DDoS วิธีป้องกันคืออัปเดตซอฟต์แวร์อย่างสม่ำเสมอและใช้ Firewall
Down
- การเรียกค่าไถ่ของผู้ร้ายในวงการ IT จะทำด้วยการล็อคคอมพิวเตอร์และไฟล์ของเหยื่อ เพื่อแลกกับการใช้งานคอมพิวเตอร์และไฟล์อีกครั้ง ผู้ใช้งานจะต้องจ่ายเงินค่าไถ่ตามที่ผู้ร้ายกำหนด
- การโจรกรรมข้อมูลส่วนตัว โดยทำการปลอมแปลงอีเมลให้เหมือนกับอุตสาหกรรมที่มีความน่าเชื่อถือ เช่น ธนาคารหรือบริษัทโทรคมนาคม ภายในอีเมลจะอธิบายให้เหยื่อกดลิ้งค์ที่ให้มาและกรอกข้อมูลส่วนตัว
- เทคนิคที่แฮคเกอร์ใช้ซ่อนตัวตน โดยอาจหลอกเหยื่อว่าต้นทางของการแฮคมาจากจุด B แต่ที่จริงมาจากจุด A หรือการปลอมเว็บไซต์ขึ้นมาเพื่อหลอกให้เหยื่อใส่ข้อมูลส่วนตัวลงไป
- ระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน)
- การใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุด
10 Clues: คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไร • อุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Address • การใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุด • ระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน) • ...
Englisch Cyber Words 2024-04-18
Across
- blocks malicious incoming requests from your network
- self-replicating computer virus
- graphical processing unit
- host of services across the internet
Down
- input device for typing
- long term for app
- process of creating ethernet cables
- old storage device. Other word for diskette
- short term for central-processing-unit
- credential scamming via email
10 Clues: long term for app • input device for typing • graphical processing unit • credential scamming via email • self-replicating computer virus • process of creating ethernet cables • host of services across the internet • short term for central-processing-unit • old storage device. Other word for diskette • blocks malicious incoming requests from your network
Cyber safety crossword 2023-05-22
Across
- fights on messages with angry language.
- online bulling
- excluding someone from an online group.
- pretending to be someone else
- someone stealing and copying someone else's work
Down
- a sickness for computers
- Repeated and intense harassment online
- Talking someone into revealing their secrets
- Sharing someone's secrets online.
- Repeatedly sending mean messages
10 Clues: online bulling • a sickness for computers • pretending to be someone else • Repeatedly sending mean messages • Sharing someone's secrets online. • Repeated and intense harassment online • fights on messages with angry language. • excluding someone from an online group. • Talking someone into revealing their secrets • someone stealing and copying someone else's work
Common Cyber Terms 2023-04-24
Across
- Attempt by an unauthorised entity or attacker to gain illegitimate access to a system by posing as an authorised user
- A type of network layer firewall
- A weakness in software programs that can be exploited
- Provides additional, revised or updated code for an operating system or application
- Used to gain unauthorised access to a computer or a network
Down
- Uses asymmetric key encryption
- An attack requiring a carrier file to self-replicate
- Gives a hacker remote access to, and control over, a computer or network
- Verify the identity of a user
- Encrypted parts of the internet that are not indexed by search engines
10 Clues: Verify the identity of a user • Uses asymmetric key encryption • A type of network layer firewall • An attack requiring a carrier file to self-replicate • A weakness in software programs that can be exploited • Used to gain unauthorised access to a computer or a network • Encrypted parts of the internet that are not indexed by search engines • ...
Cyber Awareness Week 2025-09-23
Across
- When someone manipulates an email that tricks you into doing something against your better judgement
- An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
- Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
- A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- A person who uses uses malicious tactics to gain unauthorised access to systems and data
- Harmful computer programs used by hackers to steal information, gain access or lock your device
- The address of a webpage (acronym)
- Should be long, complex and not contain any personally identifiable information (like your dogs name)
- Widely used technology that allows for the wireless connection between a device and a router
- Never click on a ___ in an email unless you are sure that it's genuine
10 Clues: The address of a webpage (acronym) • Never click on a ___ in an email unless you are sure that it's genuine • A person who uses uses malicious tactics to gain unauthorised access to systems and data • Widely used technology that allows for the wireless connection between a device and a router • ...
Cyber Crime Crossword 2025-10-10
Across
- hackers use this to find out every key pressed
- The act of trying to gain personal information from victims
- these people perform cyber attacks
- Hackers use this to watch what you are doing without having to be beside you
Down
- Replicates itself to do the most damage
- Plain text can be protected by turning it into ___ text
- someone looking over you to find out your details
- your messages can be made safer if they are_____
- This malware needs human interaction to get started.
- software designed to damage a computer system
10 Clues: these people perform cyber attacks • Replicates itself to do the most damage • software designed to damage a computer system • hackers use this to find out every key pressed • your messages can be made safer if they are_____ • someone looking over you to find out your details • This malware needs human interaction to get started. • ...
la "cyber-société" 2025-12-22
Column B 2022-12-14
Topaz #13 2018-01-15
Across
- The B in BSR stands for
- Type of fluid we use to drill the 8 1/2" section
- What does the D stand for in SLB D&M
- The F in FMS stands for
- You can get this when plugging AC vents
- One of the BHA parts in the WBCU run - Well ________
- Who supplies the liner hanger
- Name for the platform used on jackups when drilling in open water
Down
- The O in LO stands for
- Where Pak Rido is from
- What does the D in TvD charts stand for.
- Person who collects cuttings for the Geologist
- PCINO rep that used to play in a rock band!
- Canrig TDS are made in
- Cyber cementer presented about what on Sunday
- PCINO Mat co
16 Clues: PCINO Mat co • The O in LO stands for • Where Pak Rido is from • Canrig TDS are made in • The B in BSR stands for • The F in FMS stands for • Who supplies the liner hanger • What does the D stand for in SLB D&M • You can get this when plugging AC vents • What does the D in TvD charts stand for. • PCINO rep that used to play in a rock band! • ...
Topaz.#13 2018-01-16
Across
- The B in BSR stands for
- Cyber cementer presented about this on Sunday
- Who brings the cuttings to the Gelogist
- Canrig TDS is designed in what country
- PCINO Mat Co
- What does the D stand for in SLB D&M
- The F in FMS stands for
- PCINO rep that was in a rock band
Down
- What does the O in LO stand for
- Where is Pak Rido from
- You can get this from plugging AC vents
- One of the BHA parts in WBCU run Well _______
- Who supplies the liner hanger to PCINO
- Name for the platform used when open water drilling
- What type of fluid did we drill the 8 1/2" section with
- What does the D in TvD charts stand for
16 Clues: PCINO Mat Co • Where is Pak Rido from • The B in BSR stands for • The F in FMS stands for • What does the O in LO stand for • PCINO rep that was in a rock band • What does the D stand for in SLB D&M • Who supplies the liner hanger to PCINO • Canrig TDS is designed in what country • You can get this from plugging AC vents • Who brings the cuttings to the Gelogist • ...
COMMERCE INVESTMENT 2022-06-07
Across
- Any investment that grows or has potential to grow
- to overcharge or swindle (a threat to financial security)
- setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
- Buy goods in large quantities from the manufacturer
- A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
- A digital currency
- Part ownership of a company
- personal group with lots of money that are willing to lose it
- Australian Stock exchange
- A list of income and likely expenditures (a step that can minimise impacts of events)
- money set aside during life for retirement (a step that can minimise the impact of events)
- A promis to repair any defects that are in a product
- The amount of money a consumer is prepared to pay in exchange of a good or service
- A loan from a financial institution where something is held as security in case the money is not repaid
- items of value
- use of money to purchase equipment for a new business or an existing business
- Part of a firm’s profit that is divided amongst shareholders
- spending more money than your disposable income allows (a threat to financial security)
- What remains after all business expenses are deducted from sales revenue
- when a person gives up control of their assets and finances, voluntary or by court order
- A currency used to invest in stocks, shares as well as goods and services etc.
Down
- a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
- a collection of financial investments like stocks and cash etc.
- A person who works for a wage or salary
- Money received on a regular basis from work, property, business, investment or welfare
- Investments that provide regulate profits
- Involves buying the rights of another business to distribute its products under its name
- A practice of funding a project by raising money from a large number of people
- money owing to external sources (e.g a bank)
- the profit you receive on your investment as a percentage of your original investment
- electronic funds transfer point of sale
- Place where shares in public companies are bought and sold
- Expand your portfolio with different types of shares
- Real estate that is bought with the aim of earning some kind of financial return
- The swapping or exchanging of one good or another
- a type of investment that is acceptable to society’s current standards
- Someone who purchases goods and services to satisfy need and wants
- Regularly putting aside some money for future use
- Activities taken for the purpose of production and consumption of goods and services in a region
- A legally binding agreement
- illegal business practice (a threat to financial security)
41 Clues: items of value • A digital currency • Australian Stock exchange • Part ownership of a company • A legally binding agreement • A person who works for a wage or salary • electronic funds transfer point of sale • Investments that provide regulate profits • money owing to external sources (e.g a bank) • The swapping or exchanging of one good or another • ...
Investing Vocabulary 2023-02-07
Across
- an offering of unregistered securities to a limited pool of investors
- funds that trade on exchanges, generally tracking a specific index
- where securities are created so they can be sold to investors for the first time
- a digital system that matches buyers and sellers looking to trade securities in the financial markets
- the sale of equity shares or other financial instruments such as bonds to the public in order to raise capital
- profits gained from the sale of capital assets
- the annual income an investor can expect to receive while holding a particular bond
- the amount of money a bond issuer promises to repay bondholders at maturity
- a filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws
- individual participant or member firm of an exchange that buys and sells securities for its own account
- special type of stock that pays a set schedule of dividends and does not come with voting rights
- When a private company first sells shares of stock to the public
Down
- the practice of spreading your investments around so that your exposure to any one type of asset is limited
- let you pool your money with other investors to buy stocks, bonds, and other investments
- the date when the final payment is due for a loan, bond, or other financial product
- a security that represents ownership in a company
- groups together the prices of 30 of the most traded stocks on the New York Stock Exchange (NYSE) and the Nasdaq
- a security where usually a bond or a preferred stock that can be converted into a different security, typically shares of the company's common stock
- individuals classified by the SEC as qualified to invest in complex or sophisticated types of securities
- where securities are traded after the company has sold its offering on the primary market
- loan from an investor to a borrower such as a company or government
- an expression for net asset value that represents the value per share of a mutual fund, an exchange-traded fund (ETF), or a closed-end fund
- investment's annual income (interest or dividends) divided by the current price of the security.
- your lender verifies your income, assets, debt and property details in order to issue final approval for your loan
- a stock market index that measures the performance of about 500 companies in the U.S
- securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
- a group of shares that are used to give an indication of a sector, exchange or economy
- a marketplace, where financial securities issued by companies are bought and sold
28 Clues: profits gained from the sale of capital assets • a security that represents ownership in a company • When a private company first sells shares of stock to the public • funds that trade on exchanges, generally tracking a specific index • loan from an investor to a borrower such as a company or government • ...
The United Nations 2020-07-29
Across
- Prevents countries from buying goods and selling them to other countries.
- This means that decisions can be blocked in the Security Council.
- Set up after which World War?
- Headquarters of the UN are here.
- 90% of conflicts are now within countries.
- UN action to help countries recover from conflict.
- An agreement to stop fighting.
- Assembly Meets regularly to discuss any matters affecting its members.
- Prevent the sale of weapons to some countries.
- Number of non-permanent members of the security council.
Down
- Number of permanent members.
- The UN tries to promote these.
- Current Secretary-General of the UN.
- Head of the UN.
- An attempt by the UN to keep two sides in a conflict apart.
- Involves the UN sending in troops to stop wars.
16 Clues: Head of the UN. • Number of permanent members. • Set up after which World War? • The UN tries to promote these. • An agreement to stop fighting. • Headquarters of the UN are here. • Current Secretary-General of the UN. • 90% of conflicts are now within countries. • Prevent the sale of weapons to some countries. • Involves the UN sending in troops to stop wars. • ...
Disruptive Technology 2025-07-24
Across
- Finds weaknesses and risks in applications or computer systems
- Public cloud computing architecture
- Uses endpoint monitoring to detect potential cybersecurity breaches
- A large, virtual world centred around user interactivity
- The act of automating everything that a business can automate
- A cybersecurity measure that uses security controls to protect users and devices
- Uses quantum mechanics and sciences to solve complex computing problems
- A user's experience across one website/application
- Combines practices and technologies to mitigate business risks
- Covers victims in the event of a cybersecurity breach
- Abbreviation is (BI)
Down
- Abbreviation is (AI)
- A form of authentication that provides users with an extra layer of security
- Abbreviation is (XaaS)
- Encompasses technologies that focus on immersive realities
- Technologies that are developed with the thought of lessening environmental impacts
16 Clues: Abbreviation is (AI) • Abbreviation is (BI) • Abbreviation is (XaaS) • Public cloud computing architecture • A user's experience across one website/application • Covers victims in the event of a cybersecurity breach • A large, virtual world centred around user interactivity • Encompasses technologies that focus on immersive realities • ...
Domas 7B 2023-12-08
Across
- Thing that you need to have when traveling (security looks that)
- Fast plane,using in war
- Same thing like a bus but on rails,driving around the city
- Backpack with wheels on it and its bigger
- Same thing as passport but a card
- A pack that is on your shoulders holding your stuff
- Bicycle with the motor on it
Down
- The underground train that is only in London
- Plane with screws
- A flying object on which a person travels
- People who travels around the world
- Yellow car driving people around the city
- People that checks your passport and you stuff in bags
- A buss traveling tourists
- Ship moving cars from one side to the other side
15 Clues: Plane with screws • Fast plane,using in war • A buss traveling tourists • Bicycle with the motor on it • Same thing as passport but a card • People who travels around the world • A flying object on which a person travels • Yellow car driving people around the city • Backpack with wheels on it and its bigger • The underground train that is only in London • ...
Unit 8.3 Security of Data 2025-04-12
Across
- Unauthorized access to computer systems
- Using physical traits like fingerprints for security
- Redirecting users to fake websites without their knowledge
- Scam using SMS messages to steal information
- Software used to detect and remove viruses
- Tricking users into revealing personal info via fake emails
- Protocol for secure communication over the internet
Down
- theft Stealing personal or sensitive digital information
- Voice call scam pretending to be from a trusted source
- fraud Unauthorized use of someone’s payment card
- Scrambling data to make it unreadable without a key
- General term for malicious software like viruses or spyware
- Malicious software that spreads and causes harm
- Secret words used to authenticate users
- Security system that controls incoming and outgoing traffic
15 Clues: Unauthorized access to computer systems • Secret words used to authenticate users • Software used to detect and remove viruses • Scam using SMS messages to steal information • Malicious software that spreads and causes harm • fraud Unauthorized use of someone’s payment card • Scrambling data to make it unreadable without a key • ...
Crossword Puzzle 2022-10-12
Society 2025-05-07
11 Clues: Vaalit • Julkinen • Tasa-arvo • Yksityinen • Päivähoito • Politiikka • Kunnallinen • kansalaisuus • äänestäminen • Benefit Lapsilisä • security sosiaaliturva
IIT327-2 Quiz 2 2024-01-12
Across
- Activity involving the exploration of computer or network ports to identify potential vulnerabilities
- The process of identifying, assessing, and prioritizing risks to an organization's assets.
- A set of rules or guidelines that define the acceptable use and security measures within an organization.
- A process of thorough examination and analysis to ensure information security compliance
- Decoy systems designed to attract and detect unauthorized access attempts.
- Secure network for internal communication and collaboration within an organization
Down
- The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Incorrect identification of a harmless activity or file as malicious.
- A firewall that acts as an intermediary between internal network clients and external servers.
10 Clues: Incorrect identification of a harmless activity or file as malicious. • Decoy systems designed to attract and detect unauthorized access attempts. • Secure network for internal communication and collaboration within an organization • A process of thorough examination and analysis to ensure information security compliance • ...
Property Law 2024-01-11
Across
- the owner of real property, such as a house, building, or land.
- an ownership of an estate in land.
- a person whose job is to manage the legal process of moving land or property from one owner to another
- The person who transfers property by sale.
Down
- to obtain by paying money or giving other valuable consideration.
- structures and land that make up a parcel of property.
- A type of security interest in which a lender takes possession of personal property as security for an obligation.
- One who makes surveys of land
- the transfer of an interest in land as security for a loan or other obligation.
- the right to use the real property of another for a specific purpose.
10 Clues: One who makes surveys of land • an ownership of an estate in land. • The person who transfers property by sale. • structures and land that make up a parcel of property. • the owner of real property, such as a house, building, or land. • to obtain by paying money or giving other valuable consideration. • ...
CSE 167 2022-11-16
Across
- copies of data that can be used to replace the original
- is a method of gaining unauthorized access to a network or computer system
- The use of multiple layers of security techniques to help rescue the chance of successful attacks
- in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
- allows you to encrypt and sign your data and communications
- An attack that tricks people in believing they are someone else
- Confidentiality,Integrity,Availability
- Study of techniques for secure communication in the presenter of third parties
- Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
- attack that involves trying all possible private keys
10 Clues: Confidentiality,Integrity,Availability • attack that involves trying all possible private keys • copies of data that can be used to replace the original • allows you to encrypt and sign your data and communications • An attack that tricks people in believing they are someone else • is a method of gaining unauthorized access to a network or computer system • ...
People at School 2022-10-14
12 Clues: guru • w.c. • murid • kantin • kantor • ruang kelas • tempat parkir • kepala sekolah • petugas keamanan • petugas kebersihan • penjaga perpustakaan • laboratorium komputer
Glossa 2019-10-08
12 Clues: lähete • isyysloma • tasa-arvo • vähemmistö • syrjäytyminen • tuki, avustus • yksityissektori • turvapaikanhakija • security sosiaaliturva • ennaltaehkäisevä hoito • insurance sairausvakuutus • invaliditeetti, pysyvä vamma
spanish uniut 4 2021-12-14
15 Clues: map • train • flight • customs • airport • airplane • security • i will go • itenerary • departure • tour, trip • i will visit • de tren train station • al cliente customer service • de vacaciones to go on vacation
unit lesson 4 2023-12-06
15 Clues: pot • vlag • fight • safety • meedoen • gevecht • aanvallen • beschermen • vluchteling • fortnite win • to come back • thing that shoots • officer of the law • something a soldier wears • thing you have to pay money for
EXTREME SPORTS 2021-09-23
Across
- rapid descent on vertical walls by sliding down a rope attached to the body
- An element used to skydive
- slide and twist in a wave standing on a board
- It is a risk of practicing some extreme sport
- when a bone breaks
- is a stretch or tear of the ligaments
- consists of jumping from a certain height with a rope
- A security element to protect the eyes
Down
- security element to illuminate in caves
- Climb a mountain
- move from one point to another by jumping on buildings
- motorcycle circuits with jumps in any space
- It consists of parachuting from an airplane
- They take off from a mountain, driven by the wind
- cross the rivers in a raft with oars
15 Clues: Climb a mountain • when a bone breaks • An element used to skydive • cross the rivers in a raft with oars • is a stretch or tear of the ligaments • A security element to protect the eyes • security element to illuminate in caves • motorcycle circuits with jumps in any space • It consists of parachuting from an airplane • slide and twist in a wave standing on a board • ...
