cyber security Crossword Puzzles

Fabien quachi 2024-03-20

Fabien quachi crossword puzzle
Across
  1. Membre du conseil d’administration
  2. distributeur
  3. stagiaire
  4. prêter
  5. Emprunt
  6. informaticien
  7. directeur financier
  8. retirer
  9. Fonds
  10. Guichetier/employer de bank
  11. prestataire
  12. Découvert
Down
  1. drh
  2. agent de sécurité
  3. demandeur d’emploi
  4. agence
  5. Mensualité
  6. graphiste
  7. top 1 raciste de la classe
  8. solde
  9. pdg
  10. intérimaire

22 Clues: drhpdgFondssoldeagenceprêterEmpruntretirerstagiairegraphisteDécouvertMensualitéprestataireintérimairedistributeurinformaticienagent de sécuritédemandeur d’emploidirecteur financiertop 1 raciste de la classeGuichetier/employer de bankMembre du conseil d’administration

Grade 8 - Unit 16 2024-04-10

Grade 8 - Unit 16 crossword puzzle
Across
  1. kellekski saada tathja
  2. pardapääse
  3. kirurg
  4. kandik
  5. turvalisus, julgeolek, turvakontroll
  6. sadam
  7. rabav, jahmatav
  8. välis-, ülemere-
  9. kohver
  10. fuajee
  11. trahv, trahvimawildlife ürgne loodus
  12. loeng
  13. registreerimine lennujaamas/hotellis
Down
  1. ilmarändur, omal käel reisija
  2. aksessuaar
  3. (reisi) sihtkoht
  4. pagas
  5. toll
  6. kohane
  7. vahekäik
  8. ilmnema, pähe torkama
  9. deklareerima
  10. reisiterminal
  11. võõrastemaja, noortehotell

24 Clues: tollpagassadamloengkirurgkandikkohanekohverfuajeevahekäikpardapääseaksessuaardeklareerimareisiterminalrabav, jahmatav(reisi) sihtkohtvälis-, ülemere-ilmnema, pähe torkamakellekski saada tathjavõõrastemaja, noortehotellilmarändur, omal käel reisijaturvalisus, julgeolek, turvakontrolltrahv, trahvimawildlife ürgne loodus...

Human Rights 2024-12-29

Human Rights crossword puzzle
Across
  1. libertad
  2. igualdad de trabajo
  3. trata de personas
  4. abuso fisico
  5. abuso sexual
  6. defender
  7. sobrevivir
  8. guardar silencio
  9. tirano
  10. hablar por
  11. igualdad de derechos
Down
  1. violencia domestica
  2. discriminar en contra
  3. supervivencia
  4. contrabandear
  5. abuso emocional
  6. victima
  7. parcial
  8. igualdad de salarios
  9. oprimir
  10. abuso de poder
  11. dominar
  12. torturar
  13. seguridad

24 Clues: tiranovictimaparcialoprimirdominarlibertaddefendertorturarseguridadsobrevivirhablar porabuso fisicoabuso sexualsupervivenciacontrabandearabuso de poderabuso emocionalguardar silenciotrata de personasviolencia domesticaigualdad de trabajoigualdad de salariosigualdad de derechosdiscriminar en contra

Zenless Zone Zero 2025-04-03

Zenless Zone Zero crossword puzzle
Across
  1. Nicole's Company
  2. Mocktails
  3. Coffee Shop
  4. Male Player
  5. Mission Zone
  6. Main City
  7. Outer Ring Overlord
  8. Female Player
  9. 01
  10. ____ Fuel
  11. Video Store
Down
  1. 170cm
  2. Proxy Name
  3. Marketable Plush
  4. Rat Thiren
  5. Outside Main City
  6. General Chop's Noodles
  7. AI Helper
  8. Baddie Cop
  9. New Eridu Public Security
  10. _____ Street
  11. Celebrity Singer

22 Clues: 01170cmMocktailsAI HelperMain City____ FuelProxy NameRat ThirenBaddie CopCoffee ShopMale PlayerVideo StoreMission Zone_____ StreetFemale PlayerMarketable PlushNicole's CompanyCelebrity SingerOutside Main CityOuter Ring OverlordGeneral Chop's NoodlesNew Eridu Public Security

Woordenlijst Basiswoorden 2025-06-16

Woordenlijst Basiswoorden crossword puzzle
Across
  1. veiligheid
  2. geweld
  3. duidelijk
  4. beschikbaar
  5. spottend
  6. wetenschap
  7. eeuw
  8. bekend
  9. beroemd
  10. merk
  11. vrouwelijk
  12. dreiging
  13. menselijk
  14. arm
  15. enorm
  16. bereik
Down
  1. verantwoordelijk
  2. kunst
  3. opmerking
  4. doel
  5. veilig
  6. duur
  7. verschrikkelijk
  8. soort
  9. rommel
  10. invloed
  11. bekwaamheid
  12. misdaad
  13. waarde
  14. plaatselijk
  15. woedend
  16. gemiddeld
  17. mening

33 Clues: armdoelduureeuwmerkkunstsoortenormgeweldveiligrommelbekendwaardemeningbereikinvloedmisdaadberoemdwoedendspottenddreigingopmerkingduidelijkmenselijkgemiddeldveiligheidwetenschapvrouwelijkbeschikbaarbekwaamheidplaatselijkverschrikkelijkverantwoordelijk

Travel Vocab 2022-11-29

Travel Vocab crossword puzzle
Across
  1. ticket
  2. bathing suit
  3. to pack a suitcase
  4. suitcase
  5. departure
  6. to take a trip
  7. identification
  8. flight
  9. gate
Down
  1. to go through security
  2. baggage claim
  3. to get in line
  4. to confirm a flight
  5. monitor; screen
  6. travel agency
  7. bus stop
  8. train station
  9. arrival

18 Clues: gateticketflightarrivalbus stopsuitcasedeparturebathing suitbaggage claimtravel agencytrain stationto get in lineto take a tripidentificationmonitor; screento pack a suitcaseto confirm a flightto go through security

A2: U1L1: ¡VAMOS DE VIAJE! (B) 2021-01-05

A2: U1L1: ¡VAMOS DE VIAJE! (B) crossword puzzle
Across
  1. to take a taxi
  2. to go through security
  3. airport
  4. tourist office
  5. gate
  6. arrival
  7. baggage claim
  8. departure
  9. to go through customs
  10. bus stop
Down
  1. flight attendant
  2. passenger
  3. flight
  4. to get in line
  5. to check one’s luggage
  6. train station
  7. to board
  8. monitor; screen

18 Clues: gateflightairportarrivalto boardbus stoppassengerdeparturetrain stationbaggage claimto take a taxito get in linetourist officemonitor; screenflight attendantto go through customsto check one’s luggageto go through security

computer 2022-10-17

computer crossword puzzle
Across
  1. подключенный к сети
  2. безопасность
  3. глобальная сеть
  4. создавать
  5. коврик для мыши
  6. флешка
Down
  1. ноутбук
  2. клавиатура
  3. обмениваться
  4. взламывать
  5. информация, сведения
  6. искать информацию
  7. электронная почта

13 Clues: флешканоутбуксоздаватьклавиатуравзламыватьобмениватьсябезопасностьглобальная сетьковрик для мышиискать информациюэлектронная почтаподключенный к сетиинформация, сведения

Governance and Strategic Planning for Security 2023-09-06

Governance and Strategic Planning for Security crossword puzzle
Across
  1. In information security, a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including InfoSec policies, security education and training programs, and technological controls.
  2. The process of achieving objectives by appropriately applying a given set of resources.
  3. The process of creating designs or schemes for future efforts or performance.
  4. A high-level executive, such as a CIO or VP-IT, who will provide political support and influence for a specific project.
  5. A formal approach to designing information security programs that follows the methodology of a traditional information systems development life cycle (SDLC), including a recursive set of phases such as investigation, analysis, logical design, physical design, implementation, and maintenance and change.
  6. In some organizations, an alternate title for the CISO; in other organizations, the title most commonly assigned to the most senior manager or executive responsible for both information and physical security.
  7. The senior technology officer responsible for aligning the strategic efforts of the organization and integrating them into action plans for the information systems or data-processing division of the organization.
Down
  1. The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise's resources are used responsibly.
  2. The process of influencing others and gaining their willing cooperation to achieve an objective by providing purpose, direction, and motivation.
  3. The individual responsible for the assessment, management, and implementation of information-protection activities in the organization. The CISO is typically considered the top information security officer in an organization.

10 Clues: The process of creating designs or schemes for future efforts or performance.The process of achieving objectives by appropriately applying a given set of resources.A high-level executive, such as a CIO or VP-IT, who will provide political support and influence for a specific project....

Unit 1, Laws & Crimes 2024-09-15

Unit 1, Laws & Crimes crossword puzzle
Across
  1. serious crime punishable by a year or more in prison
  2. department-heavy, doing-things part of government, includes President & departments
  3. crimes which are begun but not completed; attempted crimes
  4. representative body responsible for managing and maintaining the people of a country
  5. crimes that hurt or threaten to hurt others
  6. document that describes functions of government
  7. federal, state, local; power-sharing by levels and branches of government
  8. legal area controlled by a certain government
Down
  1. minor crime punishable by less than one year or lesser punishment
  2. crimes motivated by the perpetrator's hatred of the victim
  3. crimes that unlawfully remove property
  4. infliction of a penalty, retribution, or restitution
  5. official rule or regulation passed by government
  6. law-making branch of government, includes Congress
  7. illegal act
  8. changes to the Constitution
  9. crimes using a computer
  10. judging the law and people part of government, includes courts
  11. ideals of freedom and protections entitled by law

19 Clues: illegal actcrimes using a computerchanges to the Constitutioncrimes that unlawfully remove propertycrimes that hurt or threaten to hurt otherslegal area controlled by a certain governmentdocument that describes functions of governmentofficial rule or regulation passed by governmentideals of freedom and protections entitled by law...

TTS Pencegahan Kekerasan Seksual dan Pelajar Anti Bullying 2025-07-16

TTS Pencegahan Kekerasan Seksual dan Pelajar Anti Bullying crossword puzzle
Across
  1. Bentuk kekerasan yang dilakukan secara verbal, fisik, atau sosial.
  2. Sikap berani menegur teman yang melakukan bullying disebut ...
  3. Perbuatan menyebar foto pribadi orang lain tanpa izin merupakan bentuk ...
  4. Orang yang menjadi korban bullying.
  5. Sikap diam saat melihat kekerasan terjadi disebut ...
  6. Memberi semangat dan bantuan kepada teman disebut sikap ...
  7. Kekerasan seksual termasuk dalam pelanggaran terhadap ... manusia.
  8. Sikap untuk saling menghargai dan menerima perbedaan.
  9. Lawan dari kekerasan.
Down
  1. Perbuatan memaksa orang lain untuk melakukan sesuatu yang tidak diinginkan.
  2. Pelaku kekerasan seksual dapat dikenai ... pidana.
  3. Menyentuh tubuh orang lain tanpa izin termasuk tindakan ...
  4. Salah satu bentuk bullying yang dilakukan melalui internet disebut ...
  5. Salah satu ciri lingkungan sekolah yang aman dan nyaman adalah bebas dari ...
  6. Tempat untuk melapor jika terjadi kekerasan di sekolah.
  7. Memanggil teman dengan sebutan merendahkan termasuk jenis ... bullying.
  8. Salah satu media yang sering digunakan untuk cyber bullying.
  9. Kegiatan berbagi informasi untuk mencegah kekerasan disebut ...
  10. Salah satu akibat dari bullying adalah gangguan pada ...
  11. Organisasi sekolah yang bisa membantu mengkampanyekan anti bullying (singkatan).

20 Clues: Lawan dari kekerasan.Orang yang menjadi korban bullying.Pelaku kekerasan seksual dapat dikenai ... pidana.Sikap diam saat melihat kekerasan terjadi disebut ...Sikap untuk saling menghargai dan menerima perbedaan.Tempat untuk melapor jika terjadi kekerasan di sekolah.Salah satu akibat dari bullying adalah gangguan pada ......

Ready Player One Level One 2026-03-16

Ready Player One Level One crossword puzzle
Across
  1. Wade's sweet old neighbor
  2. The demi-lich in the Tomb of Horrors
  3. Chief of Operations at IOI (full name)
  4. Halliday's journal is called Anorak's __________
  5. The only girl Halliday ever loved (fullname)
  6. The planet on which the Tomb of Horrors is found
  7. Halliday's business partner (full name)
  8. Turning a movie into an interactive video game is a
  9. To clear the first gate, one must act out this movie.
  10. Part of the Jade Key clue, these must be collected
Down
  1. Halliday's hometown planet
  2. This person clues in the media that TOH might be on Ludus
  3. The nickname for the Jade Key clue is the _______
  4. Wade's cyber crush
  5. Wade lives in the ____________
  6. The game Parzival must win to obtain the Copper Key
  7. These two brothers don't want to form an alliance
  8. The nickname for the Copper Key clue is the ______
  9. IOI's headquarters are in this city

19 Clues: Wade's cyber crushWade's sweet old neighborHalliday's hometown planetWade lives in the ____________IOI's headquarters are in this cityThe demi-lich in the Tomb of HorrorsChief of Operations at IOI (full name)Halliday's business partner (full name)The only girl Halliday ever loved (fullname)Halliday's journal is called Anorak's __________...

Review 9/12/23 2023-09-12

Review 9/12/23 crossword puzzle
Across
  1. industrial waste
  2. passengers
  3. goal
  4. security
  5. to depart
  6. to be lifted
  7. comfort
Down
  1. take somebody to a place
  2. to rent
  3. income
  4. pollution
  5. to increase
  6. fall down
  7. help

14 Clues: goalhelpincometo rentcomfortsecuritypollutionfall downto departpassengersto increaseto be liftedindustrial wastetake somebody to a place

Deborah Chen 8L : Social Engineering 2023-02-02

Deborah Chen 8L : Social Engineering crossword puzzle
Across
  1. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to tick them into providing valuable data.
  2. ( also known as shoulder surfing.)
  3. baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.
  4. an attack that was designed from cyber criminals to make up fun quizzes or questions to find out more about their information.
Down
  1. a set of methods used by cyber criminals to deceive individuals into handing over info that they can use for fraudulent purposes.
  2. an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money.

6 Clues: ( also known as shoulder surfing.)baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money....

KELAS 7.4 ARYO KURNIAWAN 2023-05-10

KELAS 7.4 ARYO KURNIAWAN crossword puzzle
Across
  1. sebuah platform media sosial yang diciptakan pada tahun 2005
  2. aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat
  3. perlindungan mengekpresikan identitas diri atau kepribadian melalui pembicaraan atau kegiatan
  4. tahun 2004 diciptakan
Down
  1. tahun 1995 lahir situs
  2. sebuah pembelajaran yang dilakukan tanpa tatap muka langsung disebut
  3. pada tahun 2010 diciptakan apk sosial pertama
  4. BOLYING dampak negatif penggunaan tik
  5. aplikasi yang muncul pada tahun 2006 sebagi situs jejaring sosial yang lebih simpel
  6. salah satu apk yang digunakan untuk buat konten

10 Clues: tahun 2004 diciptakantahun 1995 lahir situsBOLYING dampak negatif penggunaan tikpada tahun 2010 diciptakan apk sosial pertamasalah satu apk yang digunakan untuk buat kontensebuah platform media sosial yang diciptakan pada tahun 2005aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat...

Our digital lives 2024-06-02

Our digital lives crossword puzzle
Across
  1. - a person who lost interest to live.
  2. - an online journal that offers regularly updated content.
  3. - a currently popular and widely discussed
  4. Feeling a strong need to do something.
  5. - The application of scientific knowledge to the practical aims of human life.
Down
  1. bullying - Use of online apps to harm someone.
  2. - A software program that is designed to perform a specific function.
  3. - The action of sending something to someone.
  4. A person who is not identified by the name.
  5. - A verbal or written remark.

10 Clues: - A verbal or written remark.- a person who lost interest to live.Feeling a strong need to do something.- a currently popular and widely discussedA person who is not identified by the name.- The action of sending something to someone.bullying - Use of online apps to harm someone.- an online journal that offers regularly updated content....

Bully Free, That's ME 2024-10-22

Bully Free, That's ME crossword puzzle
Across
  1. It takes______ to stand up to bullies.
  2. The first thing we do when we see bullying.
  3. This type of bullying hurts your body.
  4. mean and repeated behaviors.
  5. It is possible to be bullied by my friends.
  6. The third thing we do when we see bullying.
Down
  1. This type of bullying involves words and hurts your heart.
  2. The second thing we do when we see bullying.
  3. You should tell this person if you feel you are being bullied.
  4. This type of bullying occurs virtually.

10 Clues: mean and repeated behaviors.It takes______ to stand up to bullies.This type of bullying hurts your body.This type of bullying occurs virtually.The first thing we do when we see bullying.It is possible to be bullied by my friends.The third thing we do when we see bullying.The second thing we do when we see bullying....

UX Word Wizard - 1 2024-11-19

UX Word Wizard - 1 crossword puzzle
Across
  1. Temporary storage for data
  2. A small window that appears suddenly to convey information
  3. A component to scroll through images or content horizontally
  4. A clickable element that performs an action
  5. An indication that something went wrong during an interaction
Down
  1. The arrangement of elements on a page
  2. Regular updates sent via email to subscribers
  3. A cyber attack aimed at stealing sensitive user information
  4. A tool to refine or narrow down search results
  5. An area on a webpage for users to enter information

10 Clues: Temporary storage for dataThe arrangement of elements on a pageA clickable element that performs an actionRegular updates sent via email to subscribersA tool to refine or narrow down search resultsAn area on a webpage for users to enter informationA small window that appears suddenly to convey information...

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Refers to unwanted bulk emails that come from unknown sources
  2. The process of transforming data into an unreadable code
  3. Device that connects multiple networks
  4. It can be defined as the legal rules and restrictions imposed on online laws
Down
  1. Type of cyber attack that tricks users
  2. Wireless technology used to interconnect mobiles computers etc
  3. Network topology with a central hub
  4. Practice of protecting digital information
  5. It is a combination of two terms 'net' and 'etiquette'
  6. Refers to an illegal intrusion into a computer system or network

10 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

Cyber Safety 2021-05-25

Cyber Safety crossword puzzle
Across
  1. Protect your account by using a strong ______________.
  2. Someone who uses a computer to gain access to unauthorised access to other's details.
  3. A ______________ scam is used by online scammers to trick you into giving out your personal information by pretending to come from legitimate sources.
Down
  1. stop and think before you open attachments and click on ______________.
  2. Be ______________ when something is too good to be true!
  3. Do not accept friend requests from ______________.
  4. Do not give out ______________ information to strangers.

7 Clues: Do not accept friend requests from ______________.Protect your account by using a strong ______________.Be ______________ when something is too good to be true!Do not give out ______________ information to strangers.stop and think before you open attachments and click on ______________....

Cyber Bulling 2013-09-09

Cyber Bulling crossword puzzle
Across
  1. Physically or emotionally injuring someone.
  2. A target of social cruelty.
  3. The most popular social networking system with over 100 million active users making profiles that give off too much personal information
  4. Intentionally excluding someone from an online group cruelly
Down
  1. A place where people like to talk on the internet.
  2. Talking someone into revealing secrets or embarrassing information about someone and then sharing it online
  3. An agressor or someone who is causing harm.

7 Clues: A target of social cruelty.Physically or emotionally injuring someone.An agressor or someone who is causing harm.A place where people like to talk on the internet.Intentionally excluding someone from an online group cruellyTalking someone into revealing secrets or embarrassing information about someone and then sharing it online...

Cyber safety 2013-11-03

Cyber safety crossword puzzle
Across
  1. Websites that have places to chat and post things
  2. A person who sees bullying
  3. Something that can be harmful to your laptop or computer
  4. Copy others work
Down
  1. A person who uses the internet to intimidate another person
  2. A form of communication using the internet
  3. A person who is being bullied

7 Clues: Copy others workA person who sees bullyingA person who is being bulliedA form of communication using the internetWebsites that have places to chat and post thingsSomething that can be harmful to your laptop or computerA person who uses the internet to intimidate another person

Cyber Burnout 2022-04-18

Cyber Burnout crossword puzzle
Across
  1. Making sure your ___ are not suffering.
  2. Addicted to online ___ life.
  3. Too much screen time may cause eye___.
  4. The online platform.
Down
  1. Feeling ___ from the real world.
  2. Be ___, track your online usage.
  3. Something active you can do offline.

7 Clues: The online platform.Addicted to online ___ life.Feeling ___ from the real world.Be ___, track your online usage.Something active you can do offline.Too much screen time may cause eye___.Making sure your ___ are not suffering.

CYBER ETHICS 2025-05-28

CYBER ETHICS crossword puzzle
Across
  1. using someone else's work or ideas without giving credit
  2. the correct and acceptable behaviour when using the internet
  3. a crime that happens in the internet
Down
  1. behaving responsibly and being kind and respectful to online communication
  2. copying digital content without permission
  3. a code to protect your online informations
  4. someone who hacks your personal informations

7 Clues: a crime that happens in the internetcopying digital content without permissiona code to protect your online informationssomeone who hacks your personal informationsusing someone else's work or ideas without giving creditthe correct and acceptable behaviour when using the internet...

Cyber-attack 2025-12-31

Cyber-attack crossword puzzle
Across
  1. A large amount of money that someone wants to set something free.
  2. A program that copies itself to stop a system from working normally.
  3. A weakness in a system or machine that stop it working correctly.
  4. A person who gets access to a computer system illegally.
Down
  1. Short form for "National Health Service"
  2. German: infeziert
  3. A person who is affected by a bad situation.

7 Clues: German: infeziertShort form for "National Health Service"A person who is affected by a bad situation.A person who gets access to a computer system illegally.A large amount of money that someone wants to set something free.A weakness in a system or machine that stop it working correctly....

CYBER RUN 2024-10-18

CYBER RUN crossword puzzle
Across
  1. Unauthorized access to data in a system
  2. A security system controlling network traffic
  3. A technique used to trick people into giving up sensitive information
Down
  1. Software designed to disrupt or gain unauthorized access to a system
  2. The process of converting information into a code to prevent access
  3. A secret word or phrase used to gain access to a system or account
  4. A type of malware that replicates and spreads to other computers

7 Clues: Unauthorized access to data in a systemA security system controlling network trafficA type of malware that replicates and spreads to other computersA secret word or phrase used to gain access to a system or accountThe process of converting information into a code to prevent accessSoftware designed to disrupt or gain unauthorized access to a system...

CYBER BULLYING 2024-07-25

CYBER BULLYING crossword puzzle
Across
  1. someone who control a certain thing
  2. when a hateful person does mean things online
  3. someone who stand up for the victim
  4. the web we share
Down
  1. a code you make to secure your information
  2. a witness who ignores the bully
  3. being safe online

7 Clues: the web we sharebeing safe onlinea witness who ignores the bullysomeone who control a certain thingsomeone who stand up for the victima code you make to secure your informationwhen a hateful person does mean things online

cyber bully? 2024-07-25

cyber bully? crossword puzzle
Across
  1. seek to harm,or intimidate
  2. person who speaks or acts in support
  3. person who habitually seeks to harm or intimidate
Down
  1. www is a system of interconnected public webpages accessible through the Internet.
  2. the use of technology to harass, threaten, embarrass, or target another person
  3. person who is present at an event or incidentbut doesnt participate
  4. Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person

7 Clues: seek to harm,or intimidateperson who speaks or acts in supportperson who habitually seeks to harm or intimidateperson who is present at an event or incidentbut doesnt participatethe use of technology to harass, threaten, embarrass, or target another personwww is a system of interconnected public webpages accessible through the Internet....

Cyber Crimes 2025-12-02

Cyber Crimes crossword puzzle
Across
  1. Unwanted or junk messages sent in large numbers, usually for advertising or scams
  2. theft Stealing someone’s personal information (like their name, ID number, or bank details) and pretending to be them to commit crimes.
  3. Tricking someone in order to steal their money, personal information, or valuables
Down
  1. Breaking into a computer system or network without permission to view, change, or steal information.
  2. Sending fake emails, messages, or websites that look real to trick people into giving away passwords, bank details, or personal information
  3. Illegally copying or sharing music, movies, software, or other digital content without permission.
  4. attack When a harmful program (virus) infects a computer, damages files, slows the system, or steals data.

7 Clues: Unwanted or junk messages sent in large numbers, usually for advertising or scamsTricking someone in order to steal their money, personal information, or valuablesIllegally copying or sharing music, movies, software, or other digital content without permission....

Executive Branch 2022-12-07

Executive Branch crossword puzzle
Across
  1. System
  2. Appointees
  3. College
  4. Agreement
  5. Security
Down
  1. Policy
  2. System
  3. Sanctioning
  4. Corporations
  5. Service System
  6. Agencies
  7. Bureaucracy
  8. Service Workers
  9. Order

14 Clues: OrderPolicySystemSystemCollegeAgenciesSecurityAgreementAppointeesSanctioningBureaucracyCorporationsService SystemService Workers

Dallas 2023-03-23

Dallas crossword puzzle
Across
  1. Anco Insurance
  2. Skillcycle
  3. RealizedWorth
  4. Blueboard
Down
  1. Recruitbot
  2. Regenerate
  3. Enboarder
  4. Worktango
  5. Achievers
  6. StorkClub
  7. Blackbaud

11 Clues: EnboarderWorktangoAchieversStorkClubBlackbaudBlueboardRecruitbotRegenerateSkillcycleRealizedWorthAnco Insurance

test 2021-08-16

test crossword puzzle
Across
  1. Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
  2. Mechanism that makes blockchain very resistant to tampering
  3. Cloud TCO Savings tool
  4. Technology architecture that scale as per demand
  5. iPaaS Platform and Accenture Alliance
  6. Find vulnerabilities in applications while they are running in production (Abbr)
  7. Smallest unit of a bitcoin
  8. One of our IPS Platforms
Down
  1. Outermost security layer in Defence in Depth Approach
  2. One of the CIA Triad
  3. Elastic and Flexible Assets
  4. One of the 5 R’s in Cloud Migration Strategy
  5. One of the MAAG

13 Clues: One of the MAAGOne of the CIA TriadCloud TCO Savings toolOne of our IPS PlatformsSmallest unit of a bitcoinElastic and Flexible AssetsiPaaS Platform and Accenture AllianceOne of the 5 R’s in Cloud Migration StrategyTechnology architecture that scale as per demandOutermost security layer in Defence in Depth Approach...

TQ Puzzle - 1 2021-08-16

TQ Puzzle - 1 crossword puzzle
Across
  1. Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
  2. Mechanism that makes blockchain very resistant to tampering
  3. Cloud TCO Savings tool
  4. Technology architecture that scale as per demand
  5. iPaaS Platform and Accenture Alliance
  6. Find vulnerabilities in applications while they are running in production (Abbr)
  7. Smallest unit of a bitcoin
  8. One of our IPS Platforms
Down
  1. Outermost security layer in Defence in Depth Approach
  2. One of the CIA Triad
  3. Elastic and Flexible Assets
  4. One of the 5 R’s in Cloud Migration Strategy
  5. One of the MAAG

13 Clues: One of the MAAGOne of the CIA TriadCloud TCO Savings toolOne of our IPS PlatformsSmallest unit of a bitcoinElastic and Flexible AssetsiPaaS Platform and Accenture AllianceOne of the 5 R’s in Cloud Migration StrategyTechnology architecture that scale as per demandOutermost security layer in Defence in Depth Approach...

Model Diplomacy 2023-04-25

Model Diplomacy crossword puzzle
Across
  1. the lowest-level setting for debating issues in the National Security Council
  2. the highest-ranking member of the U.S. armed forces
  3. law passed to reorganize the agencies and process related to intelligence, foreign policy, and military
  4. the group comprising the vice president of the United States and the heads of all fifteen federal executive departments
  5. the intermediate-level setting, below the principals committee
  6. an official partnership between two or more parties based on cooperation in pursuit of a common goal, generally involving security or defense.
  7. a country’s attitudes and actions in the international arena
Down
  1. head of the Department of Justice and chief lawyer of the U.S. government.
  2. the president’s principal advisor for intelligence-related matters
  3. Main advisor to the president on the nations security
  4. an act of war wherein a foreign military cuts off access to a specific location, usually a port, to impede deliveries of supplies
  5. The term frequently describes organizations such as the United Nations
  6. involving two or more agencies
  7. a decision issued by the president that carries the full force and effect of law
  8. undertaken between two entities, generally countries.
  9. actions taken by a government or nonstate actor in the realm of information network systems and digital infrastructure

16 Clues: involving two or more agenciesthe highest-ranking member of the U.S. armed forcesMain advisor to the president on the nations securityundertaken between two entities, generally countries.a country’s attitudes and actions in the international arenathe intermediate-level setting, below the principals committee...

My AUs uwu 2019-07-21

My AUs uwu crossword puzzle
Across
  1. Smol little peeps uwu
  2. Child support means nothing.
  3. Let's put a pin in this one and come back later.
  4. The eldest of the Spooks but not the creepiest
  5. If you hit him 5 times he will spill soda on your laptop. Very sad.
  6. His name is pretty much a cruel joke to his condition
  7. Uni of multiple things
  8. Has a kid he didn't want in the first place but refuses to share custody with the parent who wanted the kid in the first place...?
  9. F*cked Cupid before literally anyone else. That's his only accomplishment.
  10. Pisses off so many people but Cyber still someone manages to be slightly nice to him
  11. Smol quiet bad with a birdy hate uwu
  12. A lonely bab with a heart of gold. No I'm serious his pinprick is a golden heart-
Down
  1. Named after a bush and his job
  2. Walks through walls but not over water; can't see through you but you can see through him
  3. I made her to be shipped with a bad guy so I would feel bad for killing him later-
  4. Was good, then bad, and now "good" and DEAD!
  5. Named after a soda that rhymes with a princess name
  6. Betrayed people in his AU but somehow gets trusted as a Misfit :/
  7. "Spaces" out a lot. Teased for being obsessed over a- *reads smudged writing* volcano??? :/ (*Smacks white board* LAUGH!)
  8. Not to be confused with the "representative" of a Sprite-
  9. If he didn't exist his wife would be getting shipped with Panther- because she is a cat- person- thing- not a furry-
  10. Still a better love story than Twilight. Still a better character than- what was his name- the vampire one not the dog- err- I never read Twilight help me out here
  11. Killed his brother and tried to kill other people. Claims it is due to mental illnesses but Mental isn't here- so-
  12. Legends has it she is hotter than the savannah
  13. Things go wrong for him and the worse part is he can't "voice" his opinion...

25 Clues: Smol little peeps uwuUni of multiple thingsChild support means nothing.Named after a bush and his jobSmol quiet bad with a birdy hate uwuWas good, then bad, and now "good" and DEAD!The eldest of the Spooks but not the creepiestLegends has it she is hotter than the savannahLet's put a pin in this one and come back later....

TOPIC 7: DEVELOPMENT OF COMPUTER INDUSTRY & LAW 2024-05-02

TOPIC 7: DEVELOPMENT OF COMPUTER INDUSTRY & LAW crossword puzzle
Across
  1. What are companies called that own or lease physical infrastructure for communication transmission?
  2. What company provides technology services for travel companies, including travel searches, booking, and processing?
  3. Which company offers the Adobe Creative Cloud Suite, Document Cloud, and Experience Cloud?
  4. What company specializes in personal and small business financial management in the U.S., offering products such as TurboTax, Quickbooks, and Mint?
  5. Which Japanese company is renowned for manufacturing laptops, notebooks, computer desktops, and other computer-related products and services?
  6. What industry does the Malaysian Communications and Multimedia Commission (MCMC) regulate, focusing on networked IT industry services and the operational and administrative aspects of the regulatory framework?
  7. What company generates revenue from four main sources, including cloud services and license support, cloud license and on-premise license, hardware, and services?
  8. What company is known for producing products such as iPods, iTunes, Mac laptops and desktop computers, the OS X operating system, and innovative devices like the iPhone and iPad?
  9. Personal Protection Act 2010 act focuses on protecting personal data in Malaysia?
Down
  1. What company specializes in corporate virtualization and workstation optimization, offering cloud software and enterprise platforms compatible with Windows and Mac?
  2. What term is commonly used to describe the infrastructure of information utilized across multiple disciplines, as defined by Chan et al. (2008) and Uddin et al. (2003)?
  3. What does cyber law provide to individuals using the internet?
  4. What are the fundamental electronic building blocks of information-age products?
  5. Computer Act 1997 is the Malaysian legislation that addresses crimes involving computers?
  6. In the semiconductor industry, what process is highly capital-intensive, indicating significant investment in equipment and facilities?
  7. Which entities manufacture and sell telecommunications equipment?
  8. What trend within cyber law involves the regulation and legal considerations surrounding the use of remote data storage and processing services?
  9. Signature Act 1997 act in Malaysia governs the legality of digital signatures?
  10. What term encompasses any law that is applicable to the internet and internet-related technologies?
  11. What company provides internet services, broadband networks, and enterprise business solutions?

20 Clues: What does cyber law provide to individuals using the internet?Which entities manufacture and sell telecommunications equipment?Signature Act 1997 act in Malaysia governs the legality of digital signatures?What are the fundamental electronic building blocks of information-age products?...

Public Service 2020-05-05

Public Service crossword puzzle
Across
  1. Undergrad degree
  2. Office times
  3. Flushing device
  4. Bench conference
  5. PC component
  6. Police action
  7. Library stamp
  8. Alter electrical work
  9. Communicating with
  10. Financial review
Down
  1. Board abbrv.
  2. Firefighter tool
  3. Duplicate documents
  4. Road base
  5. Final recruitment
  6. Park path
  7. Company vehicles
  8. Employee Security pass

18 Clues: Road basePark pathBoard abbrv.Office timesPC componentPolice actionLibrary stampFlushing deviceUndergrad degreeFirefighter toolBench conferenceCompany vehiclesFinancial reviewFinal recruitmentCommunicating withDuplicate documentsAlter electrical workEmployee Security pass

Aeroport 2020-05-11

Aeroport crossword puzzle
Across
  1. tray
  2. male passenger
  3. coming from
  4. carry-on luggage
  5. ticket
  6. baggage claim
Down
  1. boarding pass
  2. passport
  3. customs
  4. security apparatus
  5. going toward
  6. seat
  7. screen

13 Clues: trayseatscreenticketcustomspassportcoming fromgoing towardboarding passbaggage claimmale passengercarry-on luggagesecurity apparatus

the townmouse and the countrymouse 2017-05-05

the townmouse and the countrymouse crossword puzzle
Across
  1. - calm
  2. morning - wishing
  3. - easy
  4. - dreaming
  5. - going out
  6. - lovely
  7. - place where we live
  8. - tiny animal
  9. - going
Down
  1. - telling
  2. - everything
  3. - the person who saves you form every thing
  4. - food rice
  5. - sibings
  6. - realy
  7. - so many mouse

16 Clues: - calm- easy- realy- going- lovely- telling- sibings- dreaming- food rice- going out- everything- tiny animal- so many mousemorning - wishing- place where we live- the person who saves you form every thing

Robotics 2017-02-09

Robotics crossword puzzle
Across
  1. A car company that makes robots?
  2. A dishwasher is this type of machinery?
  3. A film that includes robots?
  4. A metal used to make robots?
  5. You need to do this to make your robot carry out a command?
Down
  1. The Cyber men come from this T.V series?
  2. A repetitive task carried out by robots?
  3. A high precision task carried out by a robot?

8 Clues: A film that includes robots?A metal used to make robots?A car company that makes robots?A dishwasher is this type of machinery?The Cyber men come from this T.V series?A repetitive task carried out by robots?A high precision task carried out by a robot?You need to do this to make your robot carry out a command?

Chapter 10.1 Vocabulary 2014-05-14

Chapter 10.1 Vocabulary crossword puzzle
Across
  1. to leave
  2. plane ticket
  3. to begin a trip
  4. arrival
  5. there
  6. to take a trip
  7. to board
  8. ID
  9. airport
Down
  1. to wait in line
  2. security checkpoint
  3. airplane
  4. customs
  5. wallet
  6. to change money
  7. to wait
  8. travel bag, purse

17 Clues: IDtherewalletarrivalcustomsto waitairportto leaveairplaneto boardplane ticketto take a tripto wait in lineto begin a tripto change moneytravel bag, pursesecurity checkpoint

File 3A Air Travel 2 2020-11-29

File 3A Air Travel 2 crossword puzzle
Across
  1. застегнуть
  2. выход на посадку
  3. стыковочный рейс
  4. синдром смены часовых поясов
  5. путь, дорога
  6. садиться в самолёт
  7. верхняя багажная полка
  8. приземляться
  9. забирать (багаж)
Down
  1. спасательный жилет
  2. по расписанию
  3. место получения багажа
  4. багаж
  5. отправление
  6. проход
  7. авиационная безопасность
  8. посадочный талон

17 Clues: багажпроходзастегнутьотправлениепуть, дорогаприземлятьсяпо расписаниювыход на посадкустыковочный рейспосадочный талонзабирать (багаж)спасательный жилетсадиться в самолётместо получения багажаверхняя багажная полкаавиационная безопасностьсиндром смены часовых поясов

ENA4 Topic 1 2023-08-13

ENA4 Topic 1 crossword puzzle
Across
  1. saavutus
  2. abstrakti, käsitteen tasolla oleva
  3. kansallinen identiteetti
  4. yleinen; yleisesti
  5. varallisuus, toimeentulo
  6. terveys
  7. turvallisuudentunne
  8. yksilöllisyys
  9. konkreettinen, "käsin kosketeltava", varsinainen
Down
  1. ympäristö
  2. keskeinen arvo
  3. tämänhetkinen, nykyinen
  4. yhteiskunta
  5. etnisyys, etninen tausta, "kansallisuus"
  6. yhteisö
  7. itseilmaisu
  8. työllisyys

17 Clues: yhteisöterveyssaavutusympäristötyöllisyysyhteiskuntaitseilmaisuyksilöllisyyskeskeinen arvoyleinen; yleisestiturvallisuudentunnetämänhetkinen, nykyinenkansallinen identiteettivarallisuus, toimeentuloabstrakti, käsitteen tasolla olevaetnisyys, etninen tausta, "kansallisuus"konkreettinen, "käsin kosketeltava", varsinainen

Buisness Technology Crossword 2021-04-20

Buisness Technology Crossword crossword puzzle
Across
  1. local network
  2. email security
  3. non-volatile
  4. address
  5. clickable link
  6. malicious software
Down
  1. interactable
  2. physical
  3. monitors network
  4. interconnected system
  5. fraudulent email
  6. pieces of data
  7. unwanted messages
  8. volatile

14 Clues: addressphysicalvolatileinteractablenon-volatilelocal networkemail securitypieces of dataclickable linkmonitors networkfraudulent emailunwanted messagesmalicious softwareinterconnected system

Spanish3H-Unit 3 2024-02-22

Spanish3H-Unit 3 crossword puzzle
Across
  1. privacy
  2. the touch screen
  3. digital fingerprint
  4. artificial intelligence
  5. censorship
  6. the strangers
  7. the risk
Down
  1. wifi
  2. virtuality reality glasses
  3. the internet
  4. the invention
  5. addict
  6. the robot
  7. security

14 Clues: wifiaddictprivacysecuritythe riskthe robotcensorshipthe internetthe inventionthe strangersthe touch screendigital fingerprintartificial intelligencevirtuality reality glasses

Recognition and 2025-04-09

Recognition and crossword puzzle
Across
  1. Concrete info.
  2. Self moving.
  3. Security.
  4. Aware of...
  5. Threats to..
  6. Set.
Down
  1. Before its all lost.
  2. LEARNING Smart Robot.
  3. Produce.
  4. Operation..
  5. Go fishing
  6. Admin
  7. Open door
  8. Confiability.

14 Clues: Set.AdminProduce.Security.Open doorGo fishingOperation..Aware of...Self moving.Threats to..Confiability.Concrete info.Before its all lost.LEARNING Smart Robot.

Test Your Cyber Vocabulary 2023-09-29

Test Your Cyber Vocabulary crossword puzzle
Across
  1. Also called malicious software
  2. Buzz@IS has prescribed how many simple steps to stay safe online? (HINT: Answer in this edition itself)
  3. A copy of the information held on a device (such as photos and documents) that is stored somewhere else.
  4. This can slow down your computer and watch everywhere you go on the internet
  5. When somebody sends an e-mail with a link to a bogus website it is called
  6. Name of the attack that does not require any action from the victim.(HINT: An article on this attack was also published in a recent HP news edition.)
  7. Harmful computer program
  8. Encryption is a commonly used tool to achieve _________________
Down
  1. Weakness in an information system
  2. Full form of "T" in OTP
  3. Will stand like a wall to keep intruders out
  4. I have a short life; your mobile buzzes with me every time you do any financial transaction online
  5. I lock the victim's computer system files and demand payment to decrypt. Who Am I?
  6. Getting into someone else’s computer or device without their permission.
  7. Phishing over voice call is called as _____

15 Clues: Full form of "T" in OTPHarmful computer programAlso called malicious softwareWeakness in an information systemPhishing over voice call is called as _____Will stand like a wall to keep intruders outEncryption is a commonly used tool to achieve _________________Getting into someone else’s computer or device without their permission....

Financial Scams & Cyber Safety 2025-10-01

Financial Scams & Cyber Safety crossword puzzle
Across
  1. A type of malware disguised as legitimate software.
  2. Theft, Stealing someone's personal information for fraud.
  3. Criminal activities carried out using computers.
  4. A dishonest scheme or fraud.
  5. Malware that locks data and demands payment to unlock it.
  6. A secret word or phrase used to gain access.
Down
  1. Faking an identity to deceive someone online.
  2. Software that detects and removes malicious programs.
  3. A security method requiring two forms of identification.
  4. Software designed to damage or gain unauthorized access.
  5. Fraudulent emails pretending to be from trusted sources.
  6. The process of converting data into a secure code.
  7. Someone who gains unauthorized access to systems.
  8. security system that monitors and controls network traffic.
  9. Software that secretly gathers user information.

15 Clues: A dishonest scheme or fraud.A secret word or phrase used to gain access.Faking an identity to deceive someone online.Criminal activities carried out using computers.Software that secretly gathers user information.Someone who gains unauthorized access to systems.The process of converting data into a secure code....

Cyber Cross Word (Phishing) 2025-09-18

Cyber Cross Word (Phishing) crossword puzzle
Across
  1. One way to tell if an email is a Phishing attempt is use of ______ or threatening language.
  2. If you suspect a Phishing attempt, you can ______ it.
  3. To report a Phishing attempt, email ______________ or use the "report spam" button.
  4. A form of Phishing that uses texting platforms.
  5. When a cybercriminal gets information from various sources to make a phishing attempt for one specific person, this is called _____________.
  6. Cybercriminals may get your information from ________ available sources.
  7. Phishing attempts can be spotted via bad grammar, awkward phrasing or other ______ written content.
Down
  1. Once have reported and blocked the sender, what should you do with the email?
  2. Phishing attempts via direct message on social media or a phone call is called _______.
  3. Occurs when criminals try to get you to open harmful links, emails or attachments.
  4. This form of contact is the usual form of Phishing.
  5. Communications trying to trick you commonly look like they are from someone _______.
  6. In some cases, a Phishing attempt can be ________ to your information.
  7. To handle Phishing attempts properly, its best to think before you _____.
  8. After reporting, you should _____ the sender.

15 Clues: After reporting, you should _____ the sender.A form of Phishing that uses texting platforms.This form of contact is the usual form of Phishing.If you suspect a Phishing attempt, you can ______ it.In some cases, a Phishing attempt can be ________ to your information.Cybercriminals may get your information from ________ available sources....

week 1 be cyber smart 2021-09-21

week 1 be cyber smart crossword puzzle
Across
  1. part of MFA
  2. you don't want to reuse this
  3. Cleanliness
Down
  1. what you want 2 across to be
  2. insititue of cyber best practices

5 Clues: part of MFACleanlinesswhat you want 2 across to beyou don't want to reuse thisinsititue of cyber best practices

Module 6 Puzzle 2021-09-29

Module 6 Puzzle crossword puzzle
Across
  1. Do this to all unneeded programs/software
  2. Hackers who hack only for legal/ethical purposes
  3. This should be done to large networks to break them up into more manageable networks.
  4. The six Ps of security are: ports, patch, _____, probe, policies, & physical
  5. The process to look for vulnerabilites on a network
  6. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
  7. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
  8. Using interpersonal skills to extract information about a computer system and its security
  9. preferred location for storing backups
  10. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
  1. one of the most prestigious certifications for networking professionals
  2. A numerical designation for a connection point on a computer
  3. Someone who attempts to compromise a system to assess its vulnerability
  4. A reference to how long a user has used a password
  5. Searching through trash looking for information that might be useful in hacking or identity theft
  6. checking a target machine to see what ports are open
  7. The minimum frequency for system probing and audits
  8. A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
  9. Perform system patches, probe for flaws, check logs, and review policies
  10. The most basic rule of computer security is to install these as soon as they are available

20 Clues: preferred location for storing backupsDo this to all unneeded programs/softwareHackers who hack only for legal/ethical purposesA reference to how long a user has used a passwordThe minimum frequency for system probing and auditsThe process to look for vulnerabilites on a networkchecking a target machine to see what ports are open...

Chapter 2 Crossword 2025-11-14

Chapter 2 Crossword crossword puzzle
Across
  1. order order where you want to buy or sell when the stock reaches a certain price
  2. Policy action taken to manage supply of money and interest rates
  3. ensures people's accounts up to $250,000
  4. financial investment issued by a corporation or the government
  5. Bill security that matures in a year or less
  6. Bank financial institution that provides services for businesses
  7. Company For profit buisness that sells insurance produces
  8. Firm institution involved in trading securities in fiancial markets
  9. bond security that pays interest over terms of 10-30 years
  10. Company Makes money by issuing loans
  11. document guaranteering payment of a specific amount of money (named on document)
  12. cards allow customers to pay for purchases and withdraw cash
  13. of value money is a common measure of the worth or price of a good or service
  14. someone who assists you with purchasing stocks and bonds
  15. System mechanism a nation uses to provide and manage money for itself
Down
  1. people who buy shares of stock in the company
  2. Note security that pays interest over 2 to 10 years
  3. Market Accounts has low risk/low return
  4. handles stock sales and purchases
  5. of value money can be saved and used at later date
  6. Banks largest category of deposit institutions
  7. Deposit money is directly deposited into a customers checking account
  8. Capitalization has intermediate risk in investment
  9. Accounts for sophisticated borrowers who borrow money to purchase securities
  10. financial institution that accepts money from customers and deposits it into their account
  11. Stocks has high risk investment
  12. Reserve central bank of the United States
  13. Union nonprofit financial institution that is privately owned and provides banking services for its members
  14. limited liability corporation
  15. Online Banking allows this

30 Clues: Online Banking allows thislimited liability corporationhandles stock sales and purchasesensures people's accounts up to $250,000Market Accounts has low risk/low returnpeople who buy shares of stock in the companyReserve central bank of the United StatesStocks has high risk investment...

Cybersecurity 2025-06-29

Cybersecurity crossword puzzle
Across
  1. Code used to take advantage of a vulnerability
  2. Isolated environment used to test software safely
  3. Hidden method to bypass normal authentication
  4. Malware that hides its presence and grants admin access
  5. Device that filters network traffic to enhance security
  6. Malicious software designed to harm or compromise systems
  7. Network of infected devices controlled remotely
  8. Deceptive technique to steal confidential information
  9. Manipulation technique to trick people into giving information
  10. Detection of unauthorized access or suspicious activity
  11. Unauthorized access to confidential data
  12. Process of verifying the identity of a user or device
  13. Attack that floods a network or server to disrupt service
  14. Deliberate attempt to damage or access a computer system
  15. Program that records every keystroke typed
  16. Impersonation technique to deceive systems or users
  17. Security method that requires two forms of identification
Down
  1. Rule-based barrier that blocks or allows network traffic
  2. Process of converting data into an unreadable format for protection
  3. Digital file used to prove the identity of a website or user
  4. Update to fix security vulnerabilities in software
  5. Malware that encrypts files and demands payment for access
  6. Software that detects and removes malicious programs
  7. Virtual private network that encrypts internet connections
  8. Weakness in a system that can be exploited by attackers
  9. Function that converts data into a fixed-size string
  10. Vulnerability unknown to developers and without a fix
  11. Decoy system used to lure and monitor attackers
  12. Malware disguised as legitimate software
  13. Software that secretly collects user information

30 Clues: Unauthorized access to confidential dataMalware disguised as legitimate softwareProgram that records every keystroke typedHidden method to bypass normal authenticationCode used to take advantage of a vulnerabilityNetwork of infected devices controlled remotelyDecoy system used to lure and monitor attackers...

CROSSWORD 2026-03-17

CROSSWORD crossword puzzle
Across
  1. Cooperation among nations to fight transnational crime.
  2. the League of Nations was founded.
  3. UN body responsible for maintaining international peace and security.
  4. International organization formed after World War I.
  5. Interpol was founded.
  6. The oldest and largest organization of police executives worldwide.
  7. City where the first ASEAN Chiefs of Police meeting was held in 1981.
  8. Organization known as the International Association of Chiefs of Police.
  9. System used by police organizations to compare policing structures.
  10. The founding document of the United Nations.
  11. Name of the former title of Interpol (International Criminal Police ____).
  12. Main deliberative body of the United Nations.
  13. International law enforcement cooperation to fight global crime.
  14. Main UN judicial body.
  15. Interpol adopted its present name.
  16. U.S. president who also coined the term United Nations.
  17. The largest international organization in the world.
  18. Document that established the United Nations.
  19. Type of intelligence used by Europol to fight crime.
Down
  1. European Union police intelligence agency.
  2. International organization that facilitates worldwide police cooperation.
  3. UN body responsible for global peace and security.
  4. Administrative branch of the United Nations.
  5. Year ASEANAPOL was established.
  6. Cooperation between countries to prevent crime globally.
  7. British leader who helped coin the term United Nations.
  8. Process by which new states join the United Nations.
  9. Original name of Interpol in 1923.
  10. Primary mission of the United Nations.
  11. UN council responsible for economic and social development.
  12. Head of the UN Secretariat.
  13. Country where the ASEANAPOL Secretariat is located.
  14. City where the International Court of Justice is located.
  15. Multinational police organization of ASEAN countries.

34 Clues: Interpol was founded.Main UN judicial body.Head of the UN Secretariat.Year ASEANAPOL was established.the League of Nations was founded.Original name of Interpol in 1923.Interpol adopted its present name.Primary mission of the United Nations.European Union police intelligence agency.Administrative branch of the United Nations....

NATO Nuggets Crossword Puzzle 2022-03-23

NATO Nuggets Crossword Puzzle crossword puzzle
Across
  1. A NATO ______ ______ is a security manager or SSR designated to officially process and log classified NATO material.
  2. US-marked information _____ overrides NATO-marked information.
  3. A political-military alliance currently comprised of 30 member countries, including the United States.
  4. ATOMAL material must be filed ________ from non-ATOMAL material.
  5. When NATO was formed in 1949, how many member countries were there?
  6. Where are NATO read-ons stored?
  7. NATO HQ is located in _______.
Down
  1. Printing NATO classified is a last _____.
  2. The NATO ______ is a permission-restricted library of shared classified NATO documents.
  3. EUCOM's NATO Sub-Registry Office/INFOSEC encourages the sharing of NATO classified information in the _____ format.
  4. How is NATO SECRET information residing inside a U.S. document marked?
  5. The principle that an attack against one or several NATO members is considered an attack against all is called the principle of ________ defense.
  6. The governing document for the implementation of NATO security requirements.
  7. How often does EUCOM's NATO Sub-Registry Manager have to report printed CTS and ATOMAL material to the Central US Registry (CUSR)?
  8. The physical security requirements for NATO CONFIDENTIAL and above are the ____ as for US material of the same level of classification.
  9. HQ USEUCOM's commander concurrently serves as NATO's _______ Allied Commander (SACEUR).

16 Clues: NATO HQ is located in _______.Where are NATO read-ons stored?Printing NATO classified is a last _____.US-marked information _____ overrides NATO-marked information.ATOMAL material must be filed ________ from non-ATOMAL material.When NATO was formed in 1949, how many member countries were there?...

Safety Week 2021 2021-09-08

Safety Week 2021 crossword puzzle
Across
  1. being aware of your surroundings
  2. A safe location in a high wind or tornado situation
  3. Who sends out safety messages on Pulse?
  4. Options in an active shooter situation
  5. what animal do you walk like on snow or ice?
  6. What is the name of the suicide project?
Down
  1. What is the name of DMU's emergency text system?
  2. Who do you contact with a COVID situation?
  3. who you call if you need a security escort
  4. Short for Floor Emergency Coordinators
  5. what you should have in your home to put out fires
  6. short for wireless emergency alerts
  7. Short for Automatic External Defibulator

13 Clues: being aware of your surroundingsshort for wireless emergency alertsShort for Floor Emergency CoordinatorsOptions in an active shooter situationWho sends out safety messages on Pulse?Short for Automatic External DefibulatorWhat is the name of the suicide project?Who do you contact with a COVID situation?who you call if you need a security escort...

PE&TS Q3 Team Meeting 2023-09-07

PE&TS Q3 Team Meeting crossword puzzle
Across
  1. IT Control Management
  2. Information for Risk Assessor Dashboard
  3. Unauthorized Software Detection & Investigation
  4. I am the guardian of Privileged Access Management
  5. System Security General Practices
  6. I completed my COMPTIA certification with flying colors!
  7. You don't want to mess with me. I got a Purple belt in Jujitsu
Down
  1. I celebrated my national day on 7th September!
  2. Security, Privacy, Availability, Confidentiality, Process Integrity
  3. IT objects ownership data extraction by individual in scope
  4. I make sure the 'Big Red Button' is ready
  5. IT objects ownership data extraction by functional organization in scope
  6. IT System Information Request

13 Clues: IT Control ManagementIT System Information RequestSystem Security General PracticesInformation for Risk Assessor DashboardI make sure the 'Big Red Button' is readyI celebrated my national day on 7th September!Unauthorized Software Detection & InvestigationI am the guardian of Privileged Access Management...

Airport Crossword 2023-01-26

Airport Crossword crossword puzzle
Across
  1. flight
  2. tourist office
  3. to land
  4. to get in line
  5. to go through security
  6. passenger
  7. gate
  8. arrival
  9. to go through customs
  10. to take a taxi
Down
  1. baggage claim
  2. airport
  3. monitor
  4. train station
  5. flight attendent
  6. to board
  7. bus stop
  8. to take off
  9. to chekc ones luggage

19 Clues: gateflightairportmonitorto landarrivalto boardbus stoppassengerto take offbaggage claimtrain stationtourist officeto get in lineto take a taxiflight attendentto chekc ones luggageto go through customsto go through security

Aviation 2024-06-08

Aviation crossword puzzle
Across
  1. ministry of something
  2. everyone has access
  3. a kind of traveller
  4. cabin
  5. a sort of security
  6. kind of operations
  7. ramp
  8. organisation
  9. a sort of system
Down
  1. a kind of traveller
  2. only travellers have access
  3. explosive
  4. traffic
  5. passenger what
  6. service
  7. stairs
  8. operator
  9. agent
  10. Aviation
  11. officer

20 Clues: rampcabinagentstairstrafficserviceofficeroperatorAviationexplosiveorganisationpassenger whata sort of systema sort of securitykind of operationsa kind of travellereveryone has accessa kind of travellerministry of somethingonly travellers have access

On the Go 2_U4:s.99 2022-02-23

On the Go 2_U4:s.99 crossword puzzle
Across
  1. meloa
  2. välittömästi
  3. löytää
  4. turvatarkastus
  5. lento
Down
  1. matkustaja
  2. matkustajalautta
  3. nopeasti
  4. kyltti
  5. lähteä
  6. ratkaista

11 Clues: meloalentolöytääkylttilähteänopeastiratkaistamatkustajavälittömästiturvatarkastusmatkustajalautta

Presidency 2022-12-18

Presidency crossword puzzle
Across
  1. System
  2. Appointees
  3. College
  4. Agreement
  5. Security
Down
  1. Policy
  2. System
  3. Sanctioning
  4. Corporations
  5. Service System
  6. Agencies
  7. Bureaucracy
  8. Service Workers
  9. Order

14 Clues: OrderPolicySystemSystemCollegeAgenciesSecurityAgreementAppointeesSanctioningBureaucracyCorporationsService SystemService Workers

american gov 2022-12-19

american gov crossword puzzle
Across
  1. System
  2. Appointees
  3. College
  4. Agreement
  5. Security
Down
  1. Policy
  2. System
  3. Sanctioning
  4. Corporations
  5. Service System
  6. Agencies
  7. Bureaucracy
  8. Service Workers
  9. Order

14 Clues: OrderPolicySystemSystemCollegeAgenciesSecurityAgreementAppointeesSanctioningBureaucracyCorporationsService SystemService Workers

iot puzzle 2016-11-04

iot puzzle crossword puzzle
Across
  1. kslaòjf faklf fkal akl
  2. dlaòkflsdòàakflòdsà
  3. kdlòajfkdl kflaò
  4. dkl jkdlsaò jklsaò
  5. fskdlaòjfk fjkalò
  6. kfldsòa fkal
  7. dklajfkdas fksaljfkdlaj akl
  8. jkfdlaò kd fjkdla djkal
  9. kjfdslajfk fkal
  10. dklaòjfkdlsaòjfkdlòa
  11. dkjòaf fkjahfjdk jksla
Down
  1. fdslaòfkdslòajn klò
  2. fjkajka fdkla fdkla
  3. kflòajkf jfklaò
  4. jfkdsòlajfkl
  5. fdklaòfjkdsla
  6. flaòjfkldaò kalòjfkdl
  7. kdlaòjf kflajf lkasò
  8. kfldsòajfka kdlajfkds
  9. fdlkòajfklasdòj kalfòjkdsal

20 Clues: jfkdsòlajfklkfldsòa fkalfdklaòfjkdslakflòajkf jfklaòkjfdslajfk fkalkdlòajfkdl kflaòfskdlaòjfk fjkalòdkl jkdlsaò jklsaòfdslaòfkdslòajn klòfjkajka fdkla fdkladlaòkflsdòàakflòdsàkdlaòjf kflajf lkasòdklaòjfkdlsaòjfkdlòaflaòjfkldaò kalòjfkdlkslaòjf faklf fkal aklkfldsòajfka kdlajfkdsdkjòaf fkjahfjdk jkslajkfdlaò kd fjkdla djkal...

MSLA/Ttec Crossword #3 2018-02-08

MSLA/Ttec Crossword #3 crossword puzzle
Across
  1. facilities
  2. Initial Training In
  3. Teletech's sister company
  4. Veteran's only one
  5. allowed edible item
  6. encryption tab
  7. DX fax
  8. days
  9. compiles records
Down
  1. documentation type
  2. two to four in the afternoon
  3. unique identification in CMS
  4. icon description
  5. love
  6. circle
  7. contacted veteran
  8. personal storage
  9. pending worksheet
  10. west florida
  11. scheduled appointment DX

20 Clues: lovedayscircleDX faxfacilitieswest floridaencryption tabicon descriptionpersonal storagecompiles recordscontacted veteranpending worksheetdocumentation typeVeteran's only oneInitial Training Inallowed edible itemscheduled appointment DXTeletech's sister companytwo to four in the afternoonunique identification in CMS

Gateway A1+ Unit 5 Vocabulary 2023-03-21

Gateway A1+ Unit 5 Vocabulary crossword puzzle
Across
  1. otsingumootor
  2. salvestama
  3. sotsiaalvõrgustik
  4. igav, tüütu
  5. ühendus, seos
  6. salasõna
  7. rakendus
  8. alla laadima
  9. kõlar
  10. eemaletõukav, kole
  11. hiir
Down
  1. ekraanisäästja
  2. printima
  3. turvalisus
  4. taust
  5. puuteplaat
  6. mitte lahke, ebasõbralik
  7. klaviatuur
  8. kopeerima
  9. monitor, kuvar
  10. arvutid
  11. edasi andma, edastama
  12. veebileht
  13. viirus
  14. suurus
  15. suusk, suusatama
  16. rahulik
  17. blogi, veebipäevik

28 Clues: hiirtaustkõlarviirussuurusarvutidrahulikprintimasalasõnarakenduskopeerimaveebilehtturvalisussalvestamapuuteplaatklaviatuurigav, tüütualla laadimaotsingumootorühendus, seosekraanisäästjamonitor, kuvarsuusk, suusatamasotsiaalvõrgustikeemaletõukav, koleblogi, veebipäevikedasi andma, edastamamitte lahke, ebasõbralik

G1 2/14 2025-02-19

G1 2/14 crossword puzzle
Across
  1. political system
  2. do better
  3. do a thing
  4. written sentence
  5. small houses
  6. keep it safe
  7. happy energy
  8. being oneself
  9. make decisions
Down
  1. area to live
  2. chance
  3. show displeasure
  4. makes light
  5. social group, city
  6. lowest level
  7. can do something
  8. sudden wonder
  9. very pure
  10. person in charge
  11. greater number

20 Clues: chancedo betterdo a thingvery puremakes lightarea to livelowest levelsmall houseskeep it safehappy energysudden wonderbeing oneselfmake decisionsgreater numberpolitical systemshow displeasurewritten sentencecan do somethingperson in chargesocial group, city

OL 5, Unit 3, Way in 2023-01-23

OL 5, Unit 3, Way in crossword puzzle
Across
  1. Verfassung
  2. Naturschutzgebiet
  3. Frieden
  4. die Niederländer
  5. gemischter Abstammung; Mischrasse
  6. Rhinozeros; Nashorn
  7. Nationalpark
  8. Landschaft
  9. Krieg
  10. Diamant
  11. Safari
  12. Sitz
  13. Löwe
Down
  1. bewachte Wohnanlage
  2. Südafrika
  3. trennen
  4. Sicherheit; Schutz; Wachdienst
  5. Gebiet; Revier
  6. demokratisch
  7. Südafrikaner; Südafrikanerin;
  8. Wahl
  9. Nation; Land; Staat
  10. Apartheid

23 Clues: WahlSitzLöweKriegSafariFriedentrennenDiamantSüdafrikaApartheidVerfassungLandschaftdemokratischNationalparkGebiet; Revierdie NiederländerNaturschutzgebietbewachte WohnanlageRhinozeros; NashornNation; Land; StaatSüdafrikaner; Südafrikanerin;Sicherheit; Schutz; Wachdienstgemischter Abstammung; Mischrasse

En el aeropuerto 2025-11-03

En el aeropuerto crossword puzzle
Across
  1. to be in order
  2. round trip
  3. security check
  4. ahead of schedule
  5. to catch a flight
  6. delayed
  7. to frisk
  8. on time
  9. to have a layover
Down
  1. to miss a flight
  2. to check
  3. customs
  4. baggage claim ticket
  5. schedule
  6. line
  7. carryon
  8. to check in
  9. ticket
  10. boarding pass
  11. luggage assistant

20 Clues: lineticketcustomscarryondelayedon timeto checkscheduleto friskround tripto check inboarding passto be in ordersecurity checkto miss a flightahead of scheduleluggage assistantto catch a flightto have a layoverbaggage claim ticket

All About Ryan 2026-01-22

All About Ryan crossword puzzle
Across
  1. Indoor____
  2. Instrument 4
  3. Instrument 3
  4. Instrument 5
  5. Pet
  6. Cyber____
  7. Kicking Sport
  8. Instrument
  9. Juicy____
  10. Instrument 2
  11. Bike____
  12. Lake____
  13. Wrist____
  14. Chamber____
Down
  1. Blanket
  2. Iowa____
  3. Superhero Costume
  4. Polar____
  5. Stuffed Animal
  6. Ford____
  7. Spaceman Toy
  8. Acting Role
  9. Outdoor____
  10. Water____
  11. Kentucky____
  12. Montreal____
  13. Travel Abroad

27 Clues: PetBlanketIowa____Ford____Bike____Lake____Polar____Cyber____Water____Juicy____Wrist____Indoor____InstrumentActing RoleOutdoor____Chamber____Instrument 4Instrument 3Instrument 5Spaceman ToyKentucky____Montreal____Instrument 2Kicking SportTravel AbroadStuffed AnimalSuperhero Costume

A Viajar--En el Avión y Aeropuerto y Otras Maneras a Viajar 2026-02-26

A Viajar--En el Avión y Aeropuerto y Otras Maneras a Viajar crossword puzzle
Across
  1. boat
  2. immigration
  3. train
  4. aisle
  5. gate
  6. security (TSA)
  7. seat
  8. tail
  9. cockpit
  10. train station
  11. wing
  12. customs
Down
  1. arrivals
  2. flight
  3. counter
  4. cruise ship
  5. baggage claim
  6. campsite
  7. terminal waiting area
  8. in the center
  9. departure
  10. window
  11. platform
  12. cabin
  13. in the middle
  14. RV or Camper

26 Clues: boatgateseattailwingtrainaislecabinflightwindowcountercockpitcustomsarrivalscampsiteplatformdeparturecruise shipimmigrationRV or Camperbaggage claimin the centertrain stationin the middlesecurity (TSA)terminal waiting area

Topaz Driller Crossword #6 2017-12-09

Topaz Driller Crossword #6 crossword puzzle
Across
  1. Hands off the _ _ _ _!?
  2. During well testing we use the _ _ _ _ _ system when we go on the deck.
  3. What device separates the solids and cuttings from the drilling mud?
  4. Hands on the Correct _ _ _ _ for the task!
  5. Australian Toolpushers first name?
  6. How many pedestal cranes are there on the Topaz?
  7. It is a workplace hazard on the VOC card?
Down
  1. Who is the 'cyber cementer'???
  2. What does SWL stand for?
  3. What do we ALWAYS wear to protect our eyes at work?
  4. Indonesian for 'Aware' is?
  5. If you think the job is unsafe what do YOU do?
  6. What MUST we do with our rubbish to help the environment?
  7. First name of the Rig Manager?

14 Clues: Hands off the _ _ _ _!?What does SWL stand for?Indonesian for 'Aware' is?Who is the 'cyber cementer'???First name of the Rig Manager?Australian Toolpushers first name?It is a workplace hazard on the VOC card?Hands on the Correct _ _ _ _ for the task!If you think the job is unsafe what do YOU do?How many pedestal cranes are there on the Topaz?...

Crossword 2015-02-18

Crossword crossword puzzle
Across
  1. people
  2. websites
Down
  1. fun
  2. safety

4 Clues: funpeoplesafetywebsites

security 2022-05-19

security crossword puzzle
Across
  1. defpassword
  2. defsmishing
  3. deffirewall
Down
  1. defphishing
  2. defvulnerability

5 Clues: defpassworddefphishingdefsmishingdeffirewalldefvulnerability

Security 2024-01-30

Security crossword puzzle
Across
  1. used to secure computer
  2. letting someone follow
Down
  1. getting ___
  2. to work on
  3. scam

5 Clues: scamto work ongetting ___letting someone followused to secure computer

JUMPING THE LIGHTS 2023-12-05

JUMPING THE LIGHTS crossword puzzle
Across
  1. bei Rot über die Ampel fahren
  2. Fahrverbot
  3. Betroffener
  4. wohnhaft
  5. ZBS
  6. zugeben
  7. Anzeigenformular
  8. Haltelinie
  9. beobachten
  10. Sicherheitsleistung
Down
  1. Ampelanlage
  2. Rotlichtverstoß
  3. abstreiten
  4. übersehen
  5. Zustellungsbevollmächtigter

15 Clues: ZBSzugebenwohnhaftübersehenFahrverbotabstreitenHalteliniebeobachtenAmpelanlageBetroffenerRotlichtverstoßAnzeigenformularSicherheitsleistungZustellungsbevollmächtigterbei Rot über die Ampel fahren

Thanksgiving 2023-11-17

Thanksgiving crossword puzzle
Across
  1. Thanksgiving always lands on this day of the week
  2. one of the 4 seasons (fall)
  3. this pie is a special treat for the holidays
  4. this goes over mashed potatoes
  5. green bean ___ is a good way to eat your veggies
  6. a popular alternative or companion to a turkey
  7. the main food served at Thanksgiving
  8. Black ___ provides great deals after thanksgiving
Down
  1. this side dish is primarily made with bread
  2. cyber ___ also provides great deals on electronics
  3. this red fruit can be served as a jelly or sauce
  4. the main way potatoes are served
  5. before you start cooking, you can watch the famous Macy's Thanksgiving Day ___
  6. ___ potato pie is famous in the south for having marshmallows on top
  7. a large meal

15 Clues: a large mealone of the 4 seasons (fall)this goes over mashed potatoesthe main way potatoes are servedthe main food served at Thanksgivingthis side dish is primarily made with breadthis pie is a special treat for the holidaysa popular alternative or companion to a turkeythis red fruit can be served as a jelly or sauce...

Airman Support 2026-02-02

Airman Support crossword puzzle
Across
  1. Supports families with PCS, deployment, and financial readiness
  2. Helps Airmen register and vote while deployed or PCS'd
  3. Investigates complaints and protects Airmen's rights
  4. Provides legal assistance, wills, and claims help
  5. Offers short-term, confidential non-medical counseling
  6. Provides legal defense separate from command
  7. Supports victims and educates to prevent sexual assault
  8. Promotes fair treatment and handles discrimination complaints
Down
  1. Diagnoses and treats psychological conditions for Airmen
  2. Helps with GI Bill, disability claims, and transition to civilian life
  3. Investigates crimes like fraud, assault, and cyber threats
  4. Provides emergency loans and financial aid to Airmen
  5. Guides Airmen on tuition assistance and degree planning
  6. Provides spiritual care, counseling, and religious services
  7. Handles prevention and response to family maltreatment

15 Clues: Provides legal defense separate from commandProvides legal assistance, wills, and claims helpInvestigates complaints and protects Airmen's rightsProvides emergency loans and financial aid to AirmenHelps Airmen register and vote while deployed or PCS'dHandles prevention and response to family maltreatment...

Executive Branch, Presidency 2022-12-06

Executive Branch, Presidency crossword puzzle
Across
  1. Corporations
  2. Bureaucracy
  3. Order
  4. Sanctioning
  5. System
  6. Appointees
  7. Service System
Down
  1. Service Workers
  2. Agreement
  3. Security
  4. Policy
  5. Agencies
  6. College
  7. System

14 Clues: OrderPolicySystemSystemCollegeSecurityAgenciesAgreementAppointeesBureaucracySanctioningCorporationsService SystemService Workers

Executive Branch 2022-12-15

Executive Branch crossword puzzle
Across
  1. System
  2. Appointees
  3. College
  4. Agreement
  5. Security
Down
  1. Policy
  2. System
  3. Sanctioning
  4. Corporations
  5. Service System
  6. Agencies
  7. Bureaucracy
  8. Service Workers
  9. Order

14 Clues: OrderPolicySystemSystemCollegeAgenciesSecurityAgreementAppointeesSanctioningBureaucracyCorporationsService SystemService Workers

TH CROSSWORD #1 2022-08-18

TH CROSSWORD #1 crossword puzzle
Across
  1. Condition of market when economy is receding and most stocks are declining in value
  2. Asset must be greater than ...... ?
  3. Where does wuquf take place?
  4. The month of Eid al-Adha
Down
  1. The framework that upholds Maqasid Shariah principle
  2. Commitment to safeguard ESG
  3. Cyber attack that attempts to steal your money or identity and personal information
  4. The first protection in Maqasid Shariah

8 Clues: The month of Eid al-AdhaCommitment to safeguard ESGWhere does wuquf take place?Asset must be greater than ...... ?The first protection in Maqasid ShariahThe framework that upholds Maqasid Shariah principleCyber attack that attempts to steal your money or identity and personal information...

E-Safety Extravagance 2020-05-07

E-Safety Extravagance crossword puzzle
Across
  1. A video game that is multiplayer.
  2. a physical/mental/verbal or cyber offences repeated.
  3. something that is secret to only you
  4. A fear of missing out. Usually online.
Down
  1. Fake emails people send.
  2. a fraud who makes a new identity to fit in
  3. news news posted on social media that is made up.
  4. a long sequence of symbols that protects info

8 Clues: Fake emails people send.A video game that is multiplayer.something that is secret to only youA fear of missing out. Usually online.a fraud who makes a new identity to fit ina long sequence of symbols that protects infonews news posted on social media that is made up.a physical/mental/verbal or cyber offences repeated.

Crossword Puzzle 2022-09-21

Crossword Puzzle crossword puzzle
Across
  1. Managed ? solutions detects and mitigates cyber-attacks and data loss.
  2. The Name of Huawei Smartboard
  3. Up to ?% PSG subsidy
  4. Eemont can help businesses ? Office Networks
Down
  1. When you move offices, data and networks need to be ? over.
  2. The Name of your one-stop solution provider
  3. Is CloudEngine S5731-S48P4X PoE+ Supported?

7 Clues: Up to ?% PSG subsidyThe Name of Huawei SmartboardThe Name of your one-stop solution providerIs CloudEngine S5731-S48P4X PoE+ Supported?Eemont can help businesses ? Office NetworksWhen you move offices, data and networks need to be ? over.Managed ? solutions detects and mitigates cyber-attacks and data loss.

Religion 2022-06-01

Religion crossword puzzle
Across
  1. type de violence morale, physique et/ou psychologique.
  2. souci, sujet qui inquiète une personne
  3. période pendant laquelle notre corps change sans qu'on le comprenne
Down
  1. personne qui est harcelée
  2. réseau social sur lequel on constate souvent du harcèlement
  3. animal auquel on compare un jeune
  4. lieu où le cyber-harcèlement se passe

7 Clues: personne qui est harceléeanimal auquel on compare un jeunelieu où le cyber-harcèlement se passesouci, sujet qui inquiète une personnetype de violence morale, physique et/ou psychologique.réseau social sur lequel on constate souvent du harcèlementpériode pendant laquelle notre corps change sans qu'on le comprenne

Cyber-Mobbing 2019-05-07

Cyber-Mobbing crossword puzzle
Across
  1. Wozu kann Cyber-Mobbing im schlimmsten Fall führen?
  2. Wo soll man sich als Opfer Hilfe holen?
  3. Derjenige der die Tat ausübt
Down
  1. Internetseite zur Entfernung von peinlichen Bildern
  2. Worauf soll man im Netz achten?
  3. ein anderes Wort für World Wide Web
  4. Was sollst du tun wenn du ein Mobbingopfer siehst?

7 Clues: Derjenige der die Tat ausübtWorauf soll man im Netz achten?ein anderes Wort für World Wide WebWo soll man sich als Opfer Hilfe holen?Was sollst du tun wenn du ein Mobbingopfer siehst?Internetseite zur Entfernung von peinlichen BildernWozu kann Cyber-Mobbing im schlimmsten Fall führen?

Tantangan Kecil 2023-08-08

Tantangan Kecil crossword puzzle
Across
  1. mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
  2. bentuk perundungan melalui media elektronik
  3. Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
  4. perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
Down
  1. sisi negatif gawaihcfcbc
  2. manfaat gawai adalah sebagai alat...
  3. salah satu dampak negatif bully

7 Clues: sisi negatif gawaihcfcbcsalah satu dampak negatif bullymanfaat gawai adalah sebagai alat...bentuk perundungan melalui media elektronikperangkat elektronik seperti hp, laptop, dan tablet disebut juga...mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying...

Tantangan Kecil 2023-08-08

Tantangan Kecil crossword puzzle
Across
  1. sisi negatif gawai
  2. mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
  3. manfaat gawai adalah sebagai alat...
Down
  1. bentuk perundungan melalui media elektronik
  2. perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
  3. Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
  4. salah satu dampak negatif bully

7 Clues: sisi negatif gawaisalah satu dampak negatif bullymanfaat gawai adalah sebagai alat...bentuk perundungan melalui media elektronikperangkat elektronik seperti hp, laptop, dan tablet disebut juga...mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying...

CGE653 PUZZLE CHAPTER 1 2025-03-24

CGE653 PUZZLE CHAPTER 1 crossword puzzle
Across
  1. A measure of human injury, environmental damage, or economic loss in terms of both the
  2. Department of Environment
  3. Social Security Organisation is a government agency that implements and administer the social security schemes under the Employees' Social Security Act.
  4. The absence of: (i) injury and harm on human and (ii) damage on property and the environment
  5. A state of physical and mental well-being – including the absence of disease or
  6. likelihood and the magnitude of the loss or injury
  7. National Institute of Occupational Safety and Health - The centre for training, consultancy, information dissemination and research in occupational safety and health in Malaysia
Down
  1. Persistent, prolonged and repeated
  2. Department of Occupational Safety and Health
  3. Immediate, short term
  4. A sequence of events that produce unintended injury, damage to property or the environment, production losses, or increased liabilities

11 Clues: Department of EnvironmentImmediate, short termPersistent, prolonged and repeatedDepartment of Occupational Safety and Healthlikelihood and the magnitude of the loss or injuryA state of physical and mental well-being – including the absence of disease orA measure of human injury, environmental damage, or economic loss in terms of both the...

Computer Systems crossword 2014-09-09

Computer Systems crossword crossword puzzle
Across
  1. evidence
  2. facebook
  3. firewall
  4. security
  5. opposite of closed
  6. computing
Down
  1. blocked
  2. secure
  3. computer
  4. database
  5. recycle

11 Clues: secureblockedrecycleevidencecomputerdatabasefacebookfirewallsecuritycomputingopposite of closed

occupation 2022-09-29

occupation crossword puzzle
Across
  1. sweeper
  2. estate agent
  3. man
  4. hostess
  5. jockey
Down
  1. player
  2. guard
  3. driver
  4. Writer
  5. up artist
  6. driver
  7. diver

12 Clues: manguarddiverplayerdriverWriterdriverjockeysweeperhostessup artistestate agent

Science Project 2020-11-17

Science Project crossword puzzle
Across
  1. Detention
  2. Professor
  3. security guards
  4. Generators?
  5. Buses
Down
  1. teachers
  2. homework
  3. principal
  4. powerplants
  5. doors
  6. sucssesful students

11 Clues: doorsBusesteachershomeworkDetentionprincipalProfessorpowerplantsGenerators?security guardssucssesful students

Chapter 2 - Methods of Security Attacks 2025-08-11

Chapter 2 - Methods of Security Attacks crossword puzzle
Across
  1. The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
  2. The act of listening in on a conversation or monitoring network traffic.
  3. A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
  4. The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
  5. A type of attack where the attacker is physically close to the target system.
  6. A form of social engineering attack over Voice over IP (VoIP).
  7. Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
  8. A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
  9. A type of attack that relies on persuading a person to reveal information.
  10. Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
  11. A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
  1. A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
  2. A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
  3. A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
  4. A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
  5. Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
  6. The process of an attacker gathering information about a network for a future attack.
  7. A specific type of spear phishing aimed at high-level executives or important individuals.
  8. Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
  9. An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.

20 Clues: A form of social engineering attack over Voice over IP (VoIP).The act of listening in on a conversation or monitoring network traffic.A type of attack that relies on persuading a person to reveal information.A type of attack where the attacker is physically close to the target system....

CRUCIBOZZA 2022-10-20

CRUCIBOZZA crossword puzzle
Across
  1. E' il tuo noleggiatore di Ebike preferito
  2. Il tuo chef di risotti preferito
  3. Dove passa il Po'?
  4. Dove hai compiuto atti osceni in luogo pubblico (con la Cri)?
  5. ...Specializzazione medica più adatta per te
  6. Dall'alto della tua preparazione in Ortopedia: qual'è l'osso più grande del carpo?
Down
  1. Altezza della Mole Antonelliana
  2. Il tuo Cyber partner
  3. ...Non è il tuo forte
  4. Per verificare il tuo 30L in Neuro: come si chiama la via della sensibilità?
  5. Dov'eri quando sei diventata uno "scoglio"?
  6. La maneggerà Riccardo nei prossimi anni
  7. Dov'eri quando ti è stato offerto un pezzo di legno per dormire?
  8. Dov'eri quando un gruppo di uomini ti hanno soccorsa?
  9. Recentemente ne hai preso uno MOLTO grosso
  10. Stefano ed Alfo ne hanno mangiate 2kg a testa un giorno

16 Clues: Dove passa il Po'?Il tuo Cyber partner...Non è il tuo forteAltezza della Mole AntonellianaIl tuo chef di risotti preferitoLa maneggerà Riccardo nei prossimi anniE' il tuo noleggiatore di Ebike preferitoRecentemente ne hai preso uno MOLTO grossoDov'eri quando sei diventata uno "scoglio"?...Specializzazione medica più adatta per te...

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Wireless technology used to interconnect mobiles computers etc
  2. Refers to unwanted bulk emails that come from unknown sources
  3. Practice of protecting digital information
  4. Network topology with a central hub
Down
  1. It is a combination of two terms 'net' and 'etiquette'
  2. The process of transforming data into an unreadable code
  3. Type of cyber attack that tricks users
  4. Refers to an illegal intrusion into a computer system or network
  5. Device that connects multiple networks

9 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

Bullying Ward 2025-05-05

Bullying Ward crossword puzzle
Across
  1. Someone who does mean things to someone less powerful than them.
  2. This type of verbal bullying makes someone feel unsafe.
  3. Sending someone mean messages over and over.
  4. Repeatedly excluding someone to be mean.
  5. Hurtful words are used in this type of bullying.
Down
  1. Someone who watches the bullying but doesn't help.
  2. This type of bullying can hurt someone's body.
  3. Someone who is helpful toward the person being bullied.
  4. The person who someone tries to bully.

9 Clues: The person who someone tries to bully.Repeatedly excluding someone to be mean.Sending someone mean messages over and over.This type of bullying can hurt someone's body.Hurtful words are used in this type of bullying.Someone who watches the bullying but doesn't help.This type of verbal bullying makes someone feel unsafe....

Ch3 Actividades y Personas en la escuela 2022-03-08

Ch3 Actividades y Personas en la escuela crossword puzzle
Across
  1. to study
  2. to dance
  3. the coach
  4. to eat lunch
  5. to walk
  6. to participate
  7. the security guard
  8. to practice
  9. the principal
Down
  1. the custodian
  2. the counselor
  3. to play an instrument
  4. the secretary
  5. to help
  6. to work
  7. the nurse
  8. to visit
  9. to take the bus
  10. to teach

19 Clues: to helpto workto walkto studyto danceto visitto teachthe coachthe nurseto practiceto eat lunchthe custodianthe counselorthe secretarythe principalto participateto take the busthe security guardto play an instrument

security 2013-01-17

security crossword puzzle
Across
  1. Status
  2. Security
Down
  1. Testing
  2. Ident
  3. Test testing

5 Clues: IdentStatusTestingSecurityTest testing

security 2023-11-16

security crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Security 2022-08-10

Security crossword puzzle
Across
  1. feels real when you're asleep
  2. What keeps a door secured tightly
  3. indestructible neither created but transferred from one form to another
Down
  1. Cannot unlock anything without one
  2. it Sees what you don't

5 Clues: it Sees what you don'tfeels real when you're asleepWhat keeps a door secured tightlyCannot unlock anything without oneindestructible neither created but transferred from one form to another

Threats to Cyber Secruity 2017-10-09

Threats to Cyber Secruity crossword puzzle
Across
  1. Shoulder surfing, direct observation techniques like looking over a shoulder
  2. Scamming practise where malicious code is installed on to a personal computer record are modified and misdirects users to fraudulent websites
  3. The art of manipulating people so they give up their personal information
  4. Appears to be something wanted but is a standalone malicious software designed to give full control of the PC
  5. Spyware that logs keys used and collets data from affected computer
  6. Encourages users to enter confidential data by pretending to be a trust worthy source
  7. Usually popups, main aim to generate revenue for author
Down
  1. Types of malware installed on computer system that collects information without user being aware, is hidden and secretly installed
  2. Self-replicating program that attaches onto to existing programs and can easily spread
  3. The acts of using and creating an invented scenario to engage victim into giving the information
  4. Making the computer or network unavailable to user (DoS)
  5. Loss or theft of devices
  6. The term to describe the protection of information systems from theft unauthorised access or damage to hardware, software and information on them
  7. Standalone computer program that replicates itself so it can spread onto a network. Does NOT attach to a program
  8. Finding a weakness in an established system

15 Clues: Loss or theft of devicesFinding a weakness in an established systemUsually popups, main aim to generate revenue for authorMaking the computer or network unavailable to user (DoS)Spyware that logs keys used and collets data from affected computerThe art of manipulating people so they give up their personal information...

Cyber Basics & Common Threats 2025-10-07

Cyber Basics & Common Threats crossword puzzle
Across
  1. Software designed to harm or exploit a system
  2. Network of infected computers controlled remotely
  3. Malware that locks data and demands payment
  4. Software that secretly collects user data
  5. Process of converting information into code
  6. Software update to fix vulnerabilities
  7. Malware designed to hide other malicious software
Down
  1. A secret string of characters used for authentication
  2. Self-replicating malicious program
  3. Malicious software disguised as legitimate
  4. A security barrier between trusted and untrusted networks
  5. Taking advantage of a vulnerability
  6. Hidden entry point into a system
  7. Software that detects and removes malicious code
  8. Fraudulent attempt to steal sensitive data via fake email

15 Clues: Hidden entry point into a systemSelf-replicating malicious programTaking advantage of a vulnerabilitySoftware update to fix vulnerabilitiesSoftware that secretly collects user dataMalicious software disguised as legitimateMalware that locks data and demands paymentProcess of converting information into code...