cyber security Crossword Puzzles
The Great Depression 2022-12-01
Across
- A giant storm that destroyed many farms
- For the unemployed
- A law made to help out with construction
- A group of veterans who want to be paid for working in the army
- Gives unemployed people jobs
- When jobs are plentiful and the economy expands
- A act made to improve nation's highways, rivers and soil while also providing jobs
Down
- A agency made to protect security and prevent fraud
- When the jobs run low and the economy shrinks
- A act made for farmers in means of agriculture
- Supervises security
- Of the economy by federal spending and job creating
- A corp. made for single men who are unemployed
- A law made to insure old/disabled people have a healthy life
- Of capitalism
15 Clues: Of capitalism • For the unemployed • Supervises security • Gives unemployed people jobs • A giant storm that destroyed many farms • A law made to help out with construction • When the jobs run low and the economy shrinks • A act made for farmers in means of agriculture • A corp. made for single men who are unemployed • When jobs are plentiful and the economy expands • ...
COMPUTER LANGUAGE 2025-06-17
Across
- type of software protects computers from malicious software
- is used in assembly languages(2 words)
- network security system that protects networks from unsutharised
- of fifth generation computer language
- of the high-level language
- first instructive computer language
- language
Down
- of fifty generation computer language(2 word)
- kind of language java is
- access to computer network security sysem
- set of instruction that tells the computer what to do
- high level language to low level language and vice versa
- storage location of computer memory that stores data
- of rules that define structure and formed a programing language
- social engineering attack that used to steal user data
15 Clues: language • kind of language java is • of the high-level language • first instructive computer language • of fifth generation computer language • is used in assembly languages(2 words) • access to computer network security sysem • of fifty generation computer language(2 word) • storage location of computer memory that stores data • ...
Domestic & International Airports 2019-02-12
Across
- what country has the most airports in the world - 14,858
- where is the worlds widest paved runway at 105m wide
- wireless internet access
- what do you carry and store your clothing in
- where you do you go for prayer
- travelling within the country you are in
- company located in check in area used to protect luggage
- ... exchange
- area before departing, accessible to the public
- international air transport association
- three letter code for new plymouth
- where is the longest runway in the world at 5500m long
Down
- where is the worlds busiest airport
- where is the largest airport in new zealand
- area where you go through security and hand over passport
- three letter code for blenheim
- travelling destination to a different country
- where does you luggage come off when entering the flight
- three letter code for auckland
- where is the worlds oldest airport
- where do you go for an injury
- abbreviation for aviation security service
22 Clues: ... exchange • wireless internet access • where do you go for an injury • three letter code for blenheim • where you do you go for prayer • three letter code for auckland • where is the worlds oldest airport • three letter code for new plymouth • where is the worlds busiest airport • international air transport association • travelling within the country you are in • ...
Infosec Crossword Puzzle Contest 2019-08-29
Across
- Malware which presents unwanted advertisements
- ___________ is stimuli that has meaning in some context for its receiver
- Virtual _________ Network
- Successfully exploiting vulnerability is known as
- Microsoft Office is an _______ software
- Threat X Vulnerability
- Technology designed to keep the bad guys out
- A terminal emulator / serial console that support SSH
Down
- A Software products which provide real-time analysis of security alerts by network hardware and application
- Bypassing system’s customary security mechanism
- Unplanned disruption or failure of a feature or service
- A Weakness in a system
- Confidentiality,___________,Availability
- The refusal of something requested or desired.
- A fraudulent social engineering attempt to obtain sensitive information
- Should not be shared / kept open to anyone
- Application of investigative analysis on a computer
- _______ makes password / passphrase more secure
- Malicious software that replicates while moving across information systems
- address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
20 Clues: A Weakness in a system • Threat X Vulnerability • Virtual _________ Network • Microsoft Office is an _______ software • Confidentiality,___________,Availability • Should not be shared / kept open to anyone • Technology designed to keep the bad guys out • Malware which presents unwanted advertisements • The refusal of something requested or desired. • ...
IR Basic Terms 2020-09-21
Across
- Promote human welfare
- International restriction on small arms
- someone fleeing their country
- Intervening to solve a dispute
- Very powerful and influential nation
- managing international relations
- A supreme ruler
- A penalty for disobeying a law
- unlawful use of violence
- A temporary suspension in fighting
- most basic level of activity
- To take things as they are
- cooperation of countries to strengthen each of their security
- Alliance for combined action
- Rules accepted between nations
- Less developed industrial base
Down
- Agreed on by three or more parties
- States may secure their survival
- Basic structures and facilities
- Weapons capable of widespread death
- Philosophy based on liberty
- seizure of power
- irregular fighting
- Mechanical objects are combined into mobile form
- a soft boggy area
- A decision to do or not do something
- Violation of the laws of war
27 Clues: A supreme ruler • seizure of power • a soft boggy area • irregular fighting • Promote human welfare • unlawful use of violence • To take things as they are • Philosophy based on liberty • most basic level of activity • Alliance for combined action • Violation of the laws of war • someone fleeing their country • Intervening to solve a dispute • A penalty for disobeying a law • ...
Ch. 10 Terminology by Taryn Watford 2014-10-22
Across
- deceptive emails or websites to lure personal information
- Electronic trespassing and vandalism
- Obtaining information illegally often to use people’s credit cards
- use of technology as tools to help law enforcement
- Malicious network made of bots
- any crime committed through the use of computer technology
- stealing passwords online through deception
- malicious software that spreads through programs
- gate that protects internal network from unatuthorized access
- malicious software, like viruses or worms
Down
- Restrictions for producing publications
- Protection through encoding
- process of saving data
- protecting computer systems form unauthorized and unwanted access
- A form of software sabotage that uses computer hosts to reproduce itself
- Designed to search for viruses, notify users and then remove viruses
- Use of internet or other electronic means to harass an individual
- Software robots that collect information on the web
- Common security tool used to restrict access
- Technology that collects information without user’s consent
20 Clues: process of saving data • Protection through encoding • Malicious network made of bots • Electronic trespassing and vandalism • Restrictions for producing publications • malicious software, like viruses or worms • stealing passwords online through deception • Common security tool used to restrict access • malicious software that spreads through programs • ...
TAAI Weeks 1-4 2018-02-27
Across
- What id the airport code for Auckland?
- This Nationality Belongs to New Zealand Planes
- What is Air New Zealand's hub city?
- What company is Airline is MH?
- What is ATC?
- What is a planes pitch called?
- What is the safe movement area between Runway and Apron?
- You have to pass security to get here
- Where is Cathay Airlines Hub?
- What is the Abbreviation for Full Cost Carrier
Down
- You check-in here
- What is company airline is SQ?
- What is KLM's 2 letter code?
- Who is in charge of search and rescue in New Zealand waters?
- What is the hub country Emirates?
- What is the Abbreviation for Low Cost Carrier?
- Who is in charge of World Wide Aviation Security?
- What is the name of the movement for moving a plane left and right?
- What company is CAA's appointed NZ ATC Company?
- Alliance Which Airline alliance has 27 Airlines signed?
- How many Countries does Virgin have hubs in?
21 Clues: What is ATC? • You check-in here • What is KLM's 2 letter code? • Where is Cathay Airlines Hub? • What is company airline is SQ? • What company is Airline is MH? • What is a planes pitch called? • What is the hub country Emirates? • What is Air New Zealand's hub city? • You have to pass security to get here • What id the airport code for Auckland? • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
el viaje 2024-05-06
Across
- to stay
- to pack
- cruise (ship)
- jungle
- to take off
- accident
- security measures
- low season
- front desk
- to miss the flight
- included
- ruins
- high season
- port
- recommendable; advisable
- to reserve
- to reduce speed
- single room
- notice; warning
- excursion; tour
- campground
- to cancel
- adventure
- safety; security
- traffic jam
- to visit; to go around
- to return
- waves
- to sail
- itinerary
- on board
- to fasten the seatbelt
- to land
Down
- to stay (to lodge)
- compass
- de aduanas customs agent
- adventurer
- round-trip ticket
- high quality
- tourism
- traveler
- boarding card
- tour guide
- to unfasten the seatbelt
- destination
- delayed
- scuba diving
- to take a vacation
- room service
- to be full
- seatbelt
- expired
- to take a trip
- to change (planes/trains)
- insurance
- valid
- hostel
- passport
- border
- arrival
- island
61 Clues: port • ruins • valid • waves • jungle • hostel • border • island • to stay • compass • to pack • tourism • delayed • expired • arrival • to sail • to land • accident • traveler • included • seatbelt • passport • on board • insurance • to cancel • adventure • to return • itinerary • adventurer • low season • front desk • tour guide • to be full • to reserve • campground • to take off • destination • high season • single room • traffic jam • high quality • scuba diving • ...
Online Banking and Mobile Phones 2025-02-06
Across
- Personal identification number
- Short Message Service
- Enables access to the wireless web
- the banking used to access financial institutions
- The most usual music file format on the web
- brick-and-____ banks are banks that don't have physical branches
- two-factor ____, the simultaneous use of at least two different devices for better security
- security ____ are microchip-based devices that has to be typed by the user
- brick-and-____ banks are tradirional banks
- ____ authentication is a method of identifying the user of a bang account
Down
- ____ banking synonyme of online banking
- In the 1990s, 2G mobiles introduced ____ transmission
- This allows people to talk without holding the handset
- Global System for Mobile
- Types of phones that offer a high-speed data transfer capability
- A synonym for Mobile
- ____ Generation phones started in the 1980s
- ____ banking is when you perform banking transactions usually on the internet
- Universal Mobile Telecommunications
- A type of smart card that contains the user's information
- Transaction authorization number
21 Clues: A synonym for Mobile • Short Message Service • Global System for Mobile • Personal identification number • Transaction authorization number • Enables access to the wireless web • Universal Mobile Telecommunications • ____ banking synonyme of online banking • brick-and-____ banks are tradirional banks • The most usual music file format on the web • ...
Investing - Sienna Nowotny 2025-03-25
Across
- age to take out minimum from IRA
- age to get social security
- comes out tax free
- social security and medicare tax
- strategy investing your money in equal amounts
- pools money from large group of investors
- meant for short term goals
- retirement, survivor, and disability benefits
- small cap stocks or foreign exchange stocks
- network of exchanges
- collection of stocks, bonds, or other assets
- unit of ownership in company
Down
- holding company owning subsidiaries
- retirement managed by employer
- willingness to accept loss when investing
- large cap stocks or stocks with strong financials
- type of mutual fund following a benchmark index
- availability of cash or how quickly an asset can be converted to cash
- investing all money you have at one time
- a loan from the buyer
- the amount you can put in IRA per year
- CEO of Berkshire Hathaway
- government medical health plan
- transferring old retirement funds to a new company’s plan
- working with company for amount of time
25 Clues: comes out tax free • network of exchanges • a loan from the buyer • CEO of Berkshire Hathaway • age to get social security • meant for short term goals • unit of ownership in company • retirement managed by employer • government medical health plan • age to take out minimum from IRA • social security and medicare tax • holding company owning subsidiaries • ...
Empowering Women: The Impact of the New Deal Puzzle 2025-01-27
Across
- Places where women worked during the New Deal era.
- Help provided to families through policies like Aid to Dependent Children.
- A symbol of women's strength during WWII.
- Organizations advocating for better working conditions.
- Roles women took on thanks to New Deal advancements.
- Employment opportunities created by the New Deal for women.
- The president behind the New Deal policies.
- Women joined this in large numbers during the New Deal.
- The job often associated with Rosie.
- Skill-building opportunities offered to women.
Down
- Benefits women gained from New Deal policies.
- A key goal of New Deal policies for all.
- Chances for women to grow and succeed under New Deal programs.
- Initiatives like the WPA and CCC.
- Payment for work that improved for women during this time.
- To give women strength and confidence to succeed.
- The fight for fairness and equal rights.
- First Lady who championed women’s rights.
- Relating to community and societal benefits.
- Protection provided through Social Security.
20 Clues: Initiatives like the WPA and CCC. • The job often associated with Rosie. • A key goal of New Deal policies for all. • The fight for fairness and equal rights. • A symbol of women's strength during WWII. • First Lady who championed women’s rights. • The president behind the New Deal policies. • Relating to community and societal benefits. • ...
Computer Languages and Browsing Safely 2025-06-03
Across
- : Popular programming language used for mobile and desktop apps.
- : Server-side scripting language mainly used in web development.
- : Stylesheet language used for designing websites.
- : Used to create interactive effects on web pages.
- : A security system that controls incoming and outgoing traffic.
- : A mix of letters, numbers, and symbols that’s hard to guess.
- : Markup language for creating web pages.
- : A scam where fake websites or emails try to steal information.
- : A browser mode that doesn’t save history or cookies.
Down
- : Software that protects your computer from malware.
- : Installing new software versions to fix bugs and security issues.
- : Extension of C with object-oriented features.
- : A block-based language for young learners.
- : Harmful software designed to damage or steal data.
- : Language used to manage and query databases.
- : A general-purpose, low-level programming language.
- : Tool that secures your internet connection and protects privacy.
- : Apple's language for iOS and macOS development.
- : The act of navigating through the internet.
- : A high-level programming language often used by beginners.
20 Clues: : Markup language for creating web pages. • : A block-based language for young learners. • : The act of navigating through the internet. • : Language used to manage and query databases. • : Extension of C with object-oriented features. • : Apple's language for iOS and macOS development. • : Stylesheet language used for designing websites. • ...
Elevate your potential 2024-09-30
Across
- Board game and West End Show (5)
- Panorama perhaps, for small weight (9)
- The answer might be dissolved in a liquid (8)
- broadcast the fitness of Jumbo perhaps (13)
- Watch for fingers with no hands (7)
- Slim down the agreement (8)
- Something to ask mystic meg (6)
- Not out - at home learnt to shuffle (8)
- Hear a West End Show, host of Dstl information (5)
- Pb (4)
Down
- Sounds like a lift in New York perhaps, without the alternative (7)
- A twister called Monty (6)
- Song by Gloria Gaynor "I will ..." finished early with proficiency (13)
- Cryptography organisation rings the bell (6)
- I fancy Bertie is concealing a kind of crime (5)
- Might be found in bad attitudes (3)
- Something new, a work of fiction maybe (5)
- Computing for waste recycling (8)
- A difference that can be shocking (9)
19 Clues: Pb (4) • A twister called Monty (6) • Slim down the agreement (8) • Something to ask mystic meg (6) • Board game and West End Show (5) • Computing for waste recycling (8) • Might be found in bad attitudes (3) • Watch for fingers with no hands (7) • A difference that can be shocking (9) • Panorama perhaps, for small weight (9) • Not out - at home learnt to shuffle (8) • ...
DINES 2020-05-23
13 Clues: twelve • notion • majestic • fastener • menagerie • place a bet • belly button • bird of prey • large spider • type of fruit • currency unit • female relative • security device
8 Cyber Security Tips for Remote Work 2022-01-12
ISG's Security Summit Crossword Puzzle 2021-10-04
Across
- This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
- The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
- _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
- An access control model that restricts system access to authorized users based on job function(s).
- This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
- This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
- A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
- Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
- Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
Down
- Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
- ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
- A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
- Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.
- Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
- A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
- Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
- Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
- ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
- _________________@lowes.com and the Report Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
- An acronym for volatile memory within a computer that holds active processes, data, and applications.
20 Clues: An access control model that restricts system access to authorized users based on job function(s). • An acronym for volatile memory within a computer that holds active processes, data, and applications. • Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________. • ...
English 2025-12-10
Across
- A weakness that can be exploited.
- Long-term storage of old files.
- The way a system or user acts.
- A request for information from a database.
- A system on which applications can run.
- Connected computers that share data.
- A direct instruction given to a computer.
- Instructions written for computers.
- A person or system chosen for attack.
- A step taken to solve a problem.
- Accidental or unlawful release of information.
- A piece of hardware used in computing.
- A place where data is kept.
- To protect from harm or attacks.
- Continuous flow of data.
- Converting information into a secure code.
- Related to investigating cyber incidents.
- The right to keep personal data protected.
- The current condition of a system.
- A formal rule or guideline.
- A mistake or problem in a system.
- Someone who monitors or watches activity.
- Information stored or processed by computers.
- The chance that something bad may happen.
- An action taken after an incident.
- Unauthorized entry into a system.
- Protection against threats or attacks.
- To follow the path of an action or data flow.
- Use of technology to perform tasks without human input.
- A written record of actions or events.
- Permission to use or enter a system.
- Learning skills or knowledge.
- A simplified digital structure used to predict or analyze.
- A set of rules for communication.
- Monitoring to make sure rules are followed.
- A break in security where data is exposed.
- A specific area or internet address space.
- A part of a larger software system.
Down
- Official rule made by authorities.
- A tool that blocks unwanted network traffic.
- A formal review of systems or processes.
- Programs used by a computer.
- Searching for threats inside a network.
- Proof of an event or action.
- Related to money or cost.
- Numerical information used for analysis.
- Following laws, rules, or standards.
- Information sent from one place to another.
- A call for data or a service.
- A prediction based on information.
- The ability to manage or direct something.
- Belief that someone or something is reliable.
- Measurements used to evaluate performance.
- To watch or track activity.
- A user identity in a system.
- Studying information to understand it.
- A computer that provides resources to others.
- A set of connected computer components.
- A risk or danger.
- Too much data or activity for a system to handle.
- Something unusual that may signal a problem.
- The path data takes to reach a destination.
- To check a system for issues or threats.
- A saved copy of data in case of loss.
- A document describing an event or findings.
- A sign that danger or problems may occur.
- An event that disrupts normal operations.
- Delay in data communication.
- A connection point in a network.
- A secret code to access a system.
- A tool used to explore or test a system.
- Rules about what is morally right or wrong.
- Records of system activities.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A place where data is kept. • To watch or track activity. • A formal rule or guideline. • Programs used by a computer. • Proof of an event or action. • A user identity in a system. • Delay in data communication. • A call for data or a service. • Learning skills or knowledge. • Records of system activities. • ...
Science Project 2020-11-18
Social Security Act 2023-11-08
Across
- 5.old or aging
- 3.when an individual completes application for social security benefits
- 2.someone who receives social security benefit
Down
- 4. someone who is at the age where they do not have a job and receive social security benefits
- 1.when you challenge application or benefit by the social security administration
- 6.an appeal normally in front of a judge which decides if they are eligible for social security benefits
6 Clues: 5.old or aging • 2.someone who receives social security benefit • 3.when an individual completes application for social security benefits • 1.when you challenge application or benefit by the social security administration • 4. someone who is at the age where they do not have a job and receive social security benefits • ...
corporate finance 2021-02-05
Across
- basis In preparation of financial statements
- An entity created by law
- A special form of ownership having a fixed periodic
- The purest and most basic form of corporate ownership
- The sale of either bonds or stocks to the general public
- An entity created by law by two or more people
- The chance that actual outcomes may differ from those expected.
- The science and art of managing money
- The firm’s chief financial manager
- The lowest price at which a security is offered for sale
Down
- Income earned through the sale of a firm’s goods or services.
- A market that establishes correct prices for the securities
- A firm’s taxes divided by its taxable income
- firm's chief accountant
- Long-term debt instrument used by business and government to
- The highest price offered to purchase a security
- The market in which the buyer and seller are not brought
- Groups such as employees
- Financial market in which preowned securities
- The rate at which additional income is taxed.
20 Clues: firm's chief accountant • An entity created by law • Groups such as employees • The firm’s chief financial manager • The science and art of managing money • A firm’s taxes divided by its taxable income • basis In preparation of financial statements • Financial market in which preowned securities • The rate at which additional income is taxed. • ...
Travel Vocabulary 2020-04-03
Across
- in the airport
- security agent
- carry-on baggage
- flight
- in the train station
- to take off (airplane)
- boarding pass
- safety belt
- platform (train)
- suitcase
- ticket window
- on time
- arrival
- counter (check-in)
- seat
- event ticket
- baggage claim
- bunk bed
- to give
- to turn
- to go through security
- aisle
- controller (train ticket)
- first class
- to miss (a flight)
- to board
- passenger
- window
- sleeping car
- trip/travel
- connection
Down
- luggage
- delayed
- to get/obtain
- to see
- ticket (number 2)
- to hope
- waiting room
- departure
- ticket
- flight attendant
- customs
- coach (plane)
- car wagon/train car
- luggage screening
- to go straight
- international airport
- to check luggage/to put on plane
- train stop
- gate
- second class
- passport
- visa
- to land
- layover
55 Clues: seat • gate • visa • aisle • flight • to see • ticket • window • luggage • delayed • to hope • customs • on time • arrival • to give • to turn • to land • layover • suitcase • bunk bed • passport • to board • departure • passenger • train stop • connection • safety belt • first class • trip/travel • waiting room • event ticket • second class • sleeping car • to get/obtain • boarding pass • ticket window • coach (plane) • baggage claim • in the airport • ...
Marvel 2020-05-18
Across
- Died saving the people of Asgard
- Hates having ears touched
- Long time foes of Kree empire(3,7)
- Scott Langs cellmate
- Helps Howard Stark create SHIELD(5,6)
- Nickname of Timothy Dugan
- Friend of Thor
- Had mind stone in forehead
- Scientific sister of Tchalla
- Bruce Banners alter ego
- Surname of SHIELD agent who helped design Capt America shield
- Where Bucky finds sanctuary
- King Laufeys son
- Assists Thor defeat Hela
- Dora Milaje Security chief
- Odins oldest child
Down
- Dr Erik Selvig joined SHIELD to study this
- Maya Hansen created this
- Pin up boy of US military(7,7)
- Co founder of X-Con security
- Queen of Asgard
- Surname of Howard Starks business partner
- One of Thanos adopted children
- Hydra Leader
- First name of agent Natasha Romanoff alias at Stark Industries
- King of Asgard
- Military rank held by Nick Fury
- Avenging archer
- Librarian of Kamar Taj
- Smallest Avenger
30 Clues: Hydra Leader • Friend of Thor • King of Asgard • Queen of Asgard • Avenging archer • Smallest Avenger • King Laufeys son • Odins oldest child • Scott Langs cellmate • Librarian of Kamar Taj • Bruce Banners alter ego • Maya Hansen created this • Assists Thor defeat Hela • Hates having ears touched • Nickname of Timothy Dugan • Had mind stone in forehead • Dora Milaje Security chief • ...
Compliance and Safety Crossword Puzzle 2024-07-17
Across
- Cannabis is currently defined as a ______________ 1 drug.
- Documentation of recurring tasks and procedures
- Visual security requirement required in every state
- Rules governing marijuana use
- The action or fact of adhering to a wish, command, or rule
- Type of cannabis license not yet operational
- Visual document demonstrating an employees ability to work at that facility or in that state
- Unannounced visit from state regulator
Down
- Organization overseeing workplace safety laws
- An identified shortcoming in meeting compliance standards
- Internal controls used to ensure financial, security, and auditing controls
- Destruction of court records related to an arrest
- Systematic review to ensure compliance
- OH NO, its a mislabeled product! What do you do?
- The cannabis version of a travel passport
- Public official that monitors compliance
- Process of obtaining official permission to operate
- Consequence for being non-compliant
- Specific steps and tools required to perform a task or job
- Official connection to an organization
- Official approval of operation
21 Clues: Rules governing marijuana use • Official approval of operation • Consequence for being non-compliant • Systematic review to ensure compliance • Official connection to an organization • Unannounced visit from state regulator • Public official that monitors compliance • The cannabis version of a travel passport • Type of cannabis license not yet operational • ...
Travel-Themed Crossword Puzzle Clues 2025-06-11
Across
- An available room in a hotel
- To leave one’s own country for travel
- A person entering a foreign country must go through this
- Paper showing details of a booked flight or hotel
- The ability to adapt to changes in plans
- sports Thrilling, high-risk recreational activities
- Something that draws tourists to a place
- Unexpected movement of an aircraft caused by air currents
- National origin or citizenship
Down
- Free of charge
- Bathroom on an airplane
- Very flavorful, high-quality food
- To move from one mode of transportation to another
- An item meant to be used once and thrown away
- check Security procedure before boarding a flight
- A person who assists guests with services at a hotel
- A break between connecting flights
- desk The desk where guests check in at a hotel
- A printed or digital guide showing a trip's schedule
- form A document stating items you are bringing through customs
- attentdant A person who serves passengers on a plane
21 Clues: Free of charge • Bathroom on an airplane • An available room in a hotel • National origin or citizenship • Very flavorful, high-quality food • A break between connecting flights • To leave one’s own country for travel • The ability to adapt to changes in plans • Something that draws tourists to a place • An item meant to be used once and thrown away • ...
Week 4 2025-09-18
Across
- who is testing the limits of nato
- politician that got assassinated
- where did the largest sunflower ever grow?
- where did the latest school happen?
- what country is planning the biggest security operation for trump to visit them
- who did Timothy ramsey shoot?
- Where is trump cracking down now?
- where did a tornado destroy 3 houses and ruin a bunch of property
Down
- A whole truck falls into what
- after the death of Charlie Kirk politicians are upgrading what?
- Charlies shooter has to pass what kind of test
- charlie kirks killer
- a deal with what country could keep TikTok active in the US
- Tensions are rising between the US and who?
- Who does Israel keep attacking
- what famous person just turned 70
- Schools aren't requiring what for kids to go to school
- who does trump threaten
- Where is the oldest photo booth still active?
- deadly strikes against what country's boats carrying narcotics
20 Clues: charlie kirks killer • who does trump threaten • A whole truck falls into what • who did Timothy ramsey shoot? • Who does Israel keep attacking • politician that got assassinated • who is testing the limits of nato • what famous person just turned 70 • Where is trump cracking down now? • where did the latest school happen? • where did the largest sunflower ever grow? • ...
RU ITEC411 2025-11-24
Across
- – Unwanted bulk email messages.
- – Security system that blocks unauthorized access to a network.
- – Legal protection for creative works.
- – Deception intended for financial or personal gain.
- - Program that attaches to files and spreads when those files are shared.
- – (__ of Service) Attack that floods a system with traffic to make it unusable.
- – Right to control personal information.
- – Process of scrambling data to protect confidentiality.
- - Fraudulent emails or websites that trick users into revealing personal information.
Down
- – Persistent unwanted monitoring or following online.
- – the kind of theft that means stealing personal information to impersonate someone.
- – Rules enforced by government to regulate behavior.
- – Self-replicating program that spreads independently across networks.
- – Harassment or intimidation carried out through digital communication.
- – Illegal copying or distribution of software, music, or movies.
- – Moral principles guiding responsible technology use.
- - Software created to damage, disrupt, or gain unauthorized control of systems.
- – Malicious program disguised as legitimate software.
- – Measures taken to protect systems and data.
- - Person who gains unauthorized access to computer systems.
20 Clues: – Unwanted bulk email messages. • – Legal protection for creative works. • – Right to control personal information. • – Measures taken to protect systems and data. • – Rules enforced by government to regulate behavior. • – Deception intended for financial or personal gain. • – Persistent unwanted monitoring or following online. • ...
Cyber vocab chapter 3 2021-09-28
Across
- systems that requires a physical token
- user receives through another object
- user receives by default
- validating a user
- standard authentication protocol for all microsoft versions
- false amount of rejected users
Down
- allows you to share folders
- given to a user at a certain location
- where false accept and reject rates meet
- all possible attack locations
- database of all the network resoruces
- eliminating vulnerabilities
- analysis of a biological feature
- identifying measurable patterns in human activity
- cycle of different roles
15 Clues: validating a user • user receives by default • cycle of different roles • allows you to share folders • eliminating vulnerabilities • all possible attack locations • false amount of rejected users • analysis of a biological feature • user receives through another object • given to a user at a certain location • database of all the network resoruces • ...
Unit 3 Cyber World 2024-03-11
Across
- It is a good idea to keep your personal details __________ on the Internet.
- __________ scams look like they are from familiar websites to steal our personal information.
- Time wanted to get the latest version of the smartphone because it had much better _______ life.
- ________________ may try to download malware to your computer.
- Nelson updated his antivirus program to protech his comuter against _________.
- Jenny is completely ___________ on the video games. She played it all day!
- Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
Down
- To avoid being a _________ of the scam, always double-check the links and email address.
- ________ is a big problem for singers as people download their music without paying for it.
- Blind people have special programmes to help them _______ online.
- To deal with social media overuse, it is better for you to turn off _____________ on your phone.
- Governments usually _______ the data on their websites to protect citizens' information.
- We need to set up an anti-________ filter to block those annoying messages.
- She's obsessed with the new online novel and can't put it down.
- Everyone is posting ________ of themselves with the Chubby Heart in Central.
15 Clues: ________________ may try to download malware to your computer. • She's obsessed with the new online novel and can't put it down. • Blind people have special programmes to help them _______ online. • Jenny is completely ___________ on the video games. She played it all day! • It is a good idea to keep your personal details __________ on the Internet. • ...
Cyber Fund OS Vocab 2025-03-06
Across
- ethical hacking that tests a system's defenses
- OS that controls machines that run specific tasks
- devices that aren't computers that connect to the internet
- exploits by attackers before others know about the vulnerability
- software that controls specific hardware devices connected to a system
- command that ends a task immediately
- the OS type that covers desktops and laptops
- mistakes in code that can create security loopholes
- Apple's mobile device OS
Down
- older sections of code that haven't been updated or reviewed
- virtual machine that runs on a different machine
- Google's mobile device OS
- external software or plugins integrated with the OS
- Microsoft's OS
- unauthorized access to confidential data
15 Clues: Microsoft's OS • Apple's mobile device OS • Google's mobile device OS • command that ends a task immediately • unauthorized access to confidential data • the OS type that covers desktops and laptops • ethical hacking that tests a system's defenses • virtual machine that runs on a different machine • OS that controls machines that run specific tasks • ...
Networking Concepts & Cyber Ethics 2025-05-22
Across
- Computer network enables two or more computers to share what
- Process of transforming data into an unreadable code
- digital footprint is also known as
- Illegal intrusion into a computer system or network
- Being aware of the ethical practices
- Similar to hub
- two or more computers are connected within a small area
Down
- It refers to unwanted bulk emails that come from unknown sources
- program that disrupts the normal functioning of a computer
- Legal act granted by law to the creater for his original work
- Nowadays most computer motherboards & laptops have an inbuild
- computer network mainly created for an individual person
- Device that connects two different types of network with each other
- Simplest way to prevent plagorism is through proper___
- Each computer in a network
15 Clues: Similar to hub • Each computer in a network • digital footprint is also known as • Being aware of the ethical practices • Illegal intrusion into a computer system or network • Process of transforming data into an unreadable code • Simplest way to prevent plagorism is through proper___ • two or more computers are connected within a small area • ...
Networking and cyber ethics 2025-06-14
Across
- clue:This network covers a wide area
- clue:Refers to the act of using or imitating the language of fraudulent act and violation
- clue:Is a legal right granted by law to the creator for his original work
- clue:When a single licenced copy of a software is loaded into many computer contrary to the licence's terms it is called
- clue:Refers to crimanal activities that involves the use of computer and network
- clue:A security system that prevents unauthorised people from accessing your system and network
Down
- clue:Is a computer network created for an individual person
- clue:Refers to an illegal intrusion into a computer system or network
- clue:Combination of two term's refers to aware of ethical practice is called
- clue:Refers to unwanted bulk emails that came from unknown source
- clue:Topology requires a single communication line or one main cable
- clue:A physical attach a Computer to a network
- clue:Topology,all the nodes is the network are connected in a circular manner
- clue:A computer network that is mainly created for individual person
- clue:The computer in a network can communicate with each other as well as work in dependently,each computer in a network is called a
15 Clues: clue:This network covers a wide area • clue:A physical attach a Computer to a network • clue:Is a computer network created for an individual person • clue:Refers to unwanted bulk emails that came from unknown source • clue:Topology requires a single communication line or one main cable • clue:A computer network that is mainly created for individual person • ...
Numbers 2024-09-23
Across
- The best way to send messages on the internet is ________ (5).
- _________ (5) is a bad software that can harm your computer.
- When someone unauthorizedly sneaks in right after you through a secured door is called as _______ (10).
- All Ocrolus employees and contractors are required to comply with the provisions of Information Security ______ (6).
- Customer data is classified as Highly ___________(12) and only allowed in approved systems.
Down
- Event when someone breaks into your computer is called as _______(8).
- You can never _____ (5) your password with anyone.
- Please forward any potential phishing emails to __________@xxxxxx.com (8).
- To report a security incident please e-mail ________@xxxxxx.com (8).
- At all times the system should be kept __________ unless it is used by the intended user(6)
10 Clues: You can never _____ (5) your password with anyone. • _________ (5) is a bad software that can harm your computer. • The best way to send messages on the internet is ________ (5). • To report a security incident please e-mail ________@xxxxxx.com (8). • Event when someone breaks into your computer is called as _______(8). • ...
Ethical Hacking 2025-02-04
Across
- A method used to prevent unauthorized access, often involves encrypting data.
- A set of principles that guide the actions of ethical hackers.
- Ethical hackers are supposed to -----like hackers who want to steal confidential data /information
- is a practice where security professionals use hacking techniques to test a system's security and identify vulnerabilities
- This hacking technique is aimed at taking down a website so that a user cannot access it or deliver their service.
- A term for a person who hacks for personal gain or malicious intent
Down
- The act of gaining unauthorized access to systems or networks.
- One of the Career in Ethical Hacking
- Ethical Hacking Tools
- The term for hackers who identify and fix security vulnerabilities to protect systems.
10 Clues: Ethical Hacking Tools • One of the Career in Ethical Hacking • The act of gaining unauthorized access to systems or networks. • A set of principles that guide the actions of ethical hackers. • A term for a person who hacks for personal gain or malicious intent • A method used to prevent unauthorized access, often involves encrypting data. • ...
Types of cyber bullying 2023-10-09
Across
- comments or posts to upset or fight with others
- leaving someone out or uninviting them to online groups and conversations
- using someone's account to post inappropriate content
- boycotting a person's social media to exclude or isolate
Down
- sharing private information like gender or sexual identity online
- making a fake account to cyber bully someone
- spreading info in public posts or DM's to ruin someone's reputation
- sharing someone's personal identity online without permission
- sending direct insults online
9 Clues: sending direct insults online • making a fake account to cyber bully someone • comments or posts to upset or fight with others • using someone's account to post inappropriate content • boycotting a person's social media to exclude or isolate • sharing someone's personal identity online without permission • ...
FNAF security breach characters 2022-10-12
17 Clues: Pizza? • Bowling • take a map • Wub Wub Wub • Come on out • Nighty night • I am the best • Hey little guy • Intruder alert • Hello new friend • You need to vent • i always come back • Next molten freddy • You are my superstar • Red light Green Light • are you having fun yet? • welcome to freddy fazbears mega pizzaplex
Department of Homeland Security 2015-08-14
Across
- Secretary of DHS
- Number of Child Agencies under DHS
- Where to apply if you want to work for DHS
- Month DHS was formed
- What kind of branch is the Eagle on the DHS seal holding in its left talon?
- Two-level terrorism threat advisory scale currently used by DHS
- An agency within DHS which regulates and facilitates international trade, collects import duties, and enforces U.S. regulations. Currently, the largest federal law enforcement agency.
- An agency within DHS whose primary purpose is to coordinate and respond to natural disasters that occur within the United States and overwhelm the local resources and authorities of where they occur
Down
- Color Coded terrorism threat advisory scale that pre-dated the NTAS
- The first Secretary of DHS
- Number of Core Missions DHS has according to the QHSR
- How many arrows is the Eagle holding in its right talon on the DHS seal?
- Number of secretaries DHS has had
- Campaign set up to combat human trafficking
- Secretary of TSA
- A branch of the US Armed Forces that operated under DHS during peace time, but can be transferred to the U.S. Department of the Navy by the President at any time, or by Congress during times of war.
- An agency within DHS which has two distinct purposes, one of them being the protection of current and former national leaders and their families.
17 Clues: Secretary of DHS • Secretary of TSA • Month DHS was formed • The first Secretary of DHS • Number of secretaries DHS has had • Number of Child Agencies under DHS • Where to apply if you want to work for DHS • Campaign set up to combat human trafficking • Number of Core Missions DHS has according to the QHSR • Two-level terrorism threat advisory scale currently used by DHS • ...
Cyber Attakcs Quiz 2024-06-28
Across
- A cyber attack where attackers disguise as a trustworthy entity to steal sensitive information.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A type of malware disguised as legitimate software, used to hack into the user's system.
- Software that automatically displays or downloads advertising material when a user is online.
- Malicious software designed to secretly monitor and collect information from a computer.
Down
- A type of surveillance software that records keystrokes to capture sensitive information like passwords.
- A Distributed Denial-of-Service attack aimed at disrupting the normal traffic of a targeted server.
- A type of malware that encrypts the victim's files, demanding payment for the decryption key.
- A type of malicious code that replicates itself and spreads from one computer to another.
- A type of malware that replicates itself to spread to other computers without any user intervention.
10 Clues: Software designed to disrupt, damage, or gain unauthorized access to a computer system. • A type of malware disguised as legitimate software, used to hack into the user's system. • Malicious software designed to secretly monitor and collect information from a computer. • ...
Cyber Warm Up 2024-02-14
10 Clues: Denied • Like TSL • Like UNIX • DoD Network • Bad software • Sneaky email • Holds you captive • Network protector • Not what it seems • Saves what you type
Cyber Awareness Month 2022-10-16
Across
- Unsolicited bulk mail
- Symbol to look for before
- Being harassed or threatened
- Trying to steal other people's sensitive
- Software Protecting your Computer
- We should always choose a strong and
Down
- Files sent through EMail
- Trying to break into a computer system
- Software programs designed to
- Device/Software protecting computer/Network
10 Clues: Unsolicited bulk mail • Files sent through EMail • Symbol to look for before • Being harassed or threatened • Software programs designed to • Software Protecting your Computer • We should always choose a strong and • Trying to break into a computer system • Trying to steal other people's sensitive • Device/Software protecting computer/Network
career 2023-09-29
Across
- A form of security for one and another's self
- Person who keeps people following the law
- A job that takes years to do
- Unexpected situation that needed for action
- person who keeps people from fire
Down
- Causes burns and makes things charred
- in a state of safety and away from harm
- A system of rules that should be followed in the government
- keeping others away from harm and danger
- Doing things are ok with the law
- helping or doing work for others
11 Clues: A job that takes years to do • Doing things are ok with the law • helping or doing work for others • person who keeps people from fire • Causes burns and makes things charred • in a state of safety and away from harm • keeping others away from harm and danger • Person who keeps people following the law • Unexpected situation that needed for action • ...
Catching Flights 2024-05-20
Across
- the number on your ticket/boarding pass for your chair
- you go here to get your ticket, sign in
- another word for your plane ticket
- the numbered section where your flight will leave
- the person who flies your plane
- the person who serves you on your plane
- a guest on the flight
Down
- your international identification
- after your flight you grab your suitcase or bags here
- you might have to pass this security before entering a country
- also known as help desk
- a flight has made it to the destination
- here you have to scan your body and bags
- here you trade currency from euros to yen, dollars, etc
- a flight leaves from the starting location
15 Clues: a guest on the flight • also known as help desk • the person who flies your plane • your international identification • another word for your plane ticket • you go here to get your ticket, sign in • a flight has made it to the destination • the person who serves you on your plane • here you have to scan your body and bags • a flight leaves from the starting location • ...
internet basics 2024-01-18
Across
- The buying and selling of goods and services over the internet.
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
- Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
- To transfer data from a remote server to a local device over the internet.
- Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
- Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- Small digital icons or characters used to express emotions or ideas in electronic communication.
- Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
- Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
- A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
- A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
- Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
- Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
- Electronic mail that allows users to send and receive messages and files over the internet.
- Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
- A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
- A global network of interconnected computers that enables the sharing of information and resources.
- Uniform Resource Locator, the address used to access a web page or resource on the internet.
- A wireless networking technology that allows devices to connect to the internet without the need for physical cables.
32 Clues: The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • A live or pre-recorded seminar, workshop, or presentation conducted over the internet. • ...
Krzyżówka zadanie 2025-12-10
Across
- Use of technology to perform tasks without human input.
- A sign that danger or problems may occur.
- Information stored or processed by computers.
- A request for information from a database.
- Accidental or unlawful release of information.
- A risk or danger.
- A specific area or internet address space.
- A user identity in a system.
- Related to money or cost.
- A tool that blocks unwanted network traffic.
- A document describing an event or findings.
- The current condition of a system.
- Related to investigating cyber incidents.
- To check a system for issues or threats.
- A computer that provides resources to others.
- Too much data or activity for a system to handle.
- Numerical information used for analysis.
- A saved copy of data in case of loss.
- Unauthorized entry into a system.
- A piece of hardware used in computing.
- A written record of actions or events.
- Someone who monitors or watches activity.
- A set of rules for communication.
- Measurements used to evaluate performance.
- A call for data or a service.
- Permission to use or enter a system.
- Proof of an event or action.
- Programs used by a computer.
- A person or system chosen for attack.
- The ability to manage or direct something.
- Long-term storage of old files.
- A prediction based on information.
- A formal review of systems or processes.
Down
- A direct instruction given to a computer.
- A formal rule or guideline.
- To watch or track activity.
- A part of a larger software system.
- Official rule made by authorities.
- Searching for threats inside a network.
- Something unusual that may signal a problem.
- Continuous flow of data.
- A system on which applications can run.
- Instructions written for computers.
- An event that disrupts normal operations.
- A weakness that can be exploited.
- Monitoring to make sure rules are followed.
- A secret code to access a system.
- To follow the path of an action or data flow.
- A mistake or problem in a system.
- Information sent from one place to another.
- A connection point in a network.
- A place where data is kept.
- Protection against threats or attacks.
- Records of system activities.
- To protect from harm or attacks.
- Delay in data communication.
- The way a system or user acts.
- The right to keep personal data protected.
- Belief that someone or something is reliable.
- A set of connected computer components.
- The path data takes to reach a destination.
- A simplified digital structure used to predict or analyze.
- An action taken after an incident.
- Connected computers that share data.
- The chance that something bad may happen.
- Converting information into a secure code.
- Following laws, rules, or standards.
- A break in security where data is exposed.
- A step taken to solve a problem.
- Rules about what is morally right or wrong.
- A tool used to explore or test a system.
- Studying information to understand it.
- Learning skills or knowledge.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • To watch or track activity. • A place where data is kept. • A user identity in a system. • Delay in data communication. • Proof of an event or action. • Programs used by a computer. • Records of system activities. • A call for data or a service. • Learning skills or knowledge. • ...
PaulinaNatalia 2025-12-10
Across
- An action taken after an incident.
- A place where data is kept.
- To protect from harm or attacks.
- A tool that blocks unwanted network traffic.
- Converting information into a secure code.
- The right to keep personal data protected.
- A computer that provides resources to others.
- A tool used to explore or test a system.
- The path data takes to reach a destination.
- Programs used by a computer.
- A part of a larger software system.
- Information sent from one place to another.
- A step taken to solve a problem.
- A direct instruction given to a computer.
- Use of technology to perform tasks without human input.
- Learning skills or knowledge.
- Following laws, rules, or standards.
- A sign that danger or problems may occur.
- The way a system or user acts.
- Protection against threats or attacks.
- Rules about what is morally right or wrong.
- Connected computers that share data.
- Delay in data communication.
- A specific area or internet address space.
- A mistake or problem in a system.
- Instructions written for computers.
- A connection point in a network.
- Permission to use or enter a system.
- A risk or danger.
- Too much data or activity for a system to handle.
- Official rule made by authorities.
- A system on which applications can run.
- Belief that someone or something is reliable.
- Information stored or processed by computers.
- A prediction based on information.
- A document describing an event or findings.
- A formal review of systems or processes.
Down
- Unauthorized entry into a system.
- Related to money or cost.
- Continuous flow of data.
- Someone who monitors or watches activity.
- The ability to manage or direct something.
- Something unusual that may signal a problem.
- A call for data or a service.
- A break in security where data is exposed.
- A request for information from a database.
- Numerical information used for analysis.
- Records of system activities.
- A set of connected computer components.
- A set of rules for communication.
- A secret code to access a system.
- Monitoring to make sure rules are followed.
- To watch or track activity.
- To check a system for issues or threats.
- A formal rule or guideline.
- Related to investigating cyber incidents.
- Long-term storage of old files.
- Searching for threats inside a network.
- Proof of an event or action.
- Measurements used to evaluate performance.
- An event that disrupts normal operations.
- A weakness that can be exploited.
- A written record of actions or events.
- The chance that something bad may happen.
- A user identity in a system.
- A simplified digital structure used to predict or analyze.
- Studying information to understand it.
- To follow the path of an action or data flow.
- The current condition of a system.
- Accidental or unlawful release of information.
- A person or system chosen for attack.
- A saved copy of data in case of loss.
- A piece of hardware used in computing.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A place where data is kept. • To watch or track activity. • A formal rule or guideline. • Programs used by a computer. • Proof of an event or action. • Delay in data communication. • A user identity in a system. • A call for data or a service. • Records of system activities. • Learning skills or knowledge. • ...
Social Security & Medicare 2022-09-13
Across
- a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
- the amount of income subject to Social Security tax
- provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
- when someone uses your personal information to open accounts, file taxes, or make purchases under your name
Down
- a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
- both Social Security tax and Medicare tax
- Federal Insurance Contributions Act
- the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
8 Clues: Federal Insurance Contributions Act • both Social Security tax and Medicare tax • the amount of income subject to Social Security tax • when someone uses your personal information to open accounts, file taxes, or make purchases under your name • ...
LEGAL PUZZLE - GENERAL 2021-06-17
Across
- The process of resolving disputes through Court is termed as ___________
- Investigation done to confirm facts/details of a matter under consideration.
- Interim remedy available to the bank in case a client's title has not been mortgaged.
- Who has the mandate to cancel Mortgage interests on a title after the client having paid off his or her loan?
- ________ amount is money borrowed and expected to be paid back with interest
- ___________ Property is that which married couples choose to call a home and that which either of the spouses contribute
- __________ Declaration: A legal document containing facts from the Mortgagor and his/her spouse on marital status
- The action of taking possession of a mortgaged property when the mortgagor fails to keep up their mortgage payments.
- _______ letter is given to a client after repaying the loan to cancel FINCA interest off their security.
- How many times can you subtract 10 from 100
- __________ is a registrable interest on a logbook.
- ___________ of Directors.
- A legal document used by the bank to register its interest on a land title.
- ________ Title is one that is valid for a specified period of time.
Down
- How does a spouse show acceptance of a loan and its terms?
- A Registered Proprietor on a Leasehold title can only borrow money when the ____________ in the Agreement provide for it.
- a situation in which a person is in a position to derive personal benefit from actions or decisions made in their official capacity.
- Delegata potestas non potest _________.
- ________ Order is used when a minor is the registered proprietor on the security.
- Can a Butabika patient take a loan with FINCA while pledging his Kibanja as security?
- _________ Secretary is the custodian of the FINCA Seal.
- A person that has a duty to repay someone's loan when s/he fails to pay.
- _________ is an interest registered on the title.
- _______ is done on securities before a loan is processed.
- Decisions to borrow by companies are made through _____________.
- What do lawyers wear to Court?
- ________ is a word used for security used to secure a loan from a bank.
- Tax that must have been paid for 2 financial years before the bank's interests can be registered on the commercial vehicle logbook.
- The process through which a company seeks to recover delinquent/non-performing loans.
29 Clues: ___________ of Directors. • What do lawyers wear to Court? • Delegata potestas non potest _________. • How many times can you subtract 10 from 100 • _________ is an interest registered on the title. • __________ is a registrable interest on a logbook. • _________ Secretary is the custodian of the FINCA Seal. • _______ is done on securities before a loan is processed. • ...
Information Assurance Crossword Puzzle 2023-12-01
Across
- Many corporate data centers and high-end desktops use purpose-built chipsets. The security reviews and patch releases for these solutions are often not as rigorous as mass-market products, making them easy targets for hackers.
- Metrics must be quantifiable, measured in concrete numbers, such as the number of successful phishing attempts or percentage reduction in system downtime.
- Metrics should be realistic and attainable within the existing resources and capabilities of the organization, ensuring that data can be collected accurately.
- Relates to the underlying technological infrastructure supporting information assurance.
- The process of designating information as having a certain level of sensitivity, such as Unclassified, Confidential, Secret, or Top Secret.
- IDSs use a combination of signature-based and anomaly-based detection.
- The frequency of metric reporting should be timely, aligning with the rate of change expected from the underlying data or the goals they represent. For example, real-time reporting for active security incidents.
Down
- IDSs can generate false positives, which are alerts that are triggered by legitimate activity. False positives can be time-consuming and costly to investigate.
- Ensures the originator of a message or transaction may not later deny action
- Why has the policy been created and how does the company benefit?
- A repeatable metric should have a clear and consistent definition, allowing different staff members to gather and report data in the same manner, ensuring uniformity in measurement.
- This policy outlines the organization's overall security goals and objectives. It also defines the specific security controls that must be implemented to protect the organization's assets.
- Proving the genuineness of facts or documents.
- Who is held accountable for the proper implementation of the policy?
- Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
- Keeping information secret or private.
- Ensuring information can be used or obtained when needed.
- A statement of who issued the policy and how that person has the authority to define and enforce the policy.
- IDSs need to be tuned to the specific environment in which they are deployed. This can be a complex and time-consuming process.
- It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity
20 Clues: Keeping information secret or private. • Proving the genuineness of facts or documents. • Ensuring information can be used or obtained when needed. • Why has the policy been created and how does the company benefit? • Who is held accountable for the proper implementation of the policy? • IDSs use a combination of signature-based and anomaly-based detection. • ...
Information Assurance 2023-12-05
Across
- Information Assurance involves measures that protect and defend both information and information systems.
- Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
- ensures that information remains in its original form; information remains true to the creators intent
- Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
- Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
- Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
- Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
- These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
- The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
- ensures the disclosure of information only to those persons with authority to see it.
- Information Assurance is concerned with safeguarding information from both malicious and accidental threats
- Some older hardware may not be able to support newer security software and solutions.
- Hardware can take years to develop, and resolving security issues often require more than a quick patch.
- Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
- It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
- Most IoT device and robotics manufacturers don’t have dedicated security experts.
- Many corporate data centers and high-end desktops use purpose-built chipsets.
- The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
- It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
- Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.
20 Clues: Many corporate data centers and high-end desktops use purpose-built chipsets. • Most IoT device and robotics manufacturers don’t have dedicated security experts. • Some older hardware may not be able to support newer security software and solutions. • ensures the disclosure of information only to those persons with authority to see it. • ...
15.1 crossword puzzle 2024-05-08
Across
- what EFT stands for; a transfer of money from one bank account to another
- to exchange one good or service for another good or service
- cards allows customers to pay for purchases directly from their checking accounts
- a type of security that pays interest over terms ranging from two to ten years
- a document guaranteeing payment of a specific amount of money
- a type of security that pays interest over terms of ten to thirty years
- the process of transferring money from one individual or organization to another
- anything of value that is accepted in return for goods and services
- a security that matures in a year or less
- a function of money in the economy in which it is a common measure of the worth or price of a good or service
- coins or banknotes that must be accepted for all debts
Down
- a system by which a government provides money in a country's economy
- the concept that the value of a dollar today is worth more than the value of a dollar in the future
- a financial investment issued by that government, a corporation, or other oganizations
- a function of money in the economy in which it can be saved and used at a later date
- paper money and coins
- a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
- short for The Federal Reserve System
- a property of money in which it is able to be divided into smaller units
- a property of money in which people are able to carry money
- a plastic card that allows the holder to make credit purchases up to an authorized amount
- another word for money
- comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
- any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
- a property of money in which it is made of a strong and lasting material
- a property of money in which it is authentic money immediately recognizable
- a property of money in which it maintains its value over time in order for it to be widely accepted
27 Clues: paper money and coins • another word for money • short for The Federal Reserve System • a security that matures in a year or less • coins or banknotes that must be accepted for all debts • to exchange one good or service for another good or service • a property of money in which people are able to carry money • ...
Privacy Act CHC 31 2024-09-12
Across
- Agencies must not keep health information for too long. They can only keep it for as long as is necessary for any lawful purpose of use.
- a word describing the collection of health information by misrepresenting the purpose of collecting the information
- blank officer is responsible for ensuring agency complies with the act and work with PCO when it investigates complaints
- a person's blank has a full or a degree of access to and control over that person's health information - examples of these are parent / guardian / executor of estate
- Health Act blank require all health information held by providers to be retained for 10 years from the last encounter with the patient unless transferred to another doctor or to the patient.
- two words describing doctors, nurses, pharmacists, health insurers, hospitals, primary health organisations, ACC and the Ministry of Health
- the code allows care practitioners to disclose health information to a blank caregiver
- examples of blank information are medical and treatment history or information about donations of organs or blood
- blank is a professional method of disposal for printed health information
- blank security is the confidentiality agreements with staff and contractors, document tracking and footprinting, staff training
Down
- the code requires agencies to reasonable security safeguards to protect the information and prevent blank access
- It stipulates that agencies must ensure that personal information is up-to-date, and complete when used
- code applies to health information about blank individual
- health agencies can disclose information if this is necessary to prevent or lessen a blank threat to public health or public safety
- a key concept wherein health agencies need to let patients know how their information is going to be used and disclosed so the patients can make decisions about whether to provide it.
- two words meaning when someone who should not have access to personal information sees it, intentionally or by accident
- blank security is the use of technology and virtual media like email, laptops and portable storage devices, passwords
- blank security is the entry controls, positioning of whiteboards and computer terminals, locked filing cabinets and storage rooms
- Health Act regulations require all health information to be retained for blank years from the last encounter unless patient is transferred.
- collection of health information or data should be for a blank purpose
20 Clues: code applies to health information about blank individual • collection of health information or data should be for a blank purpose • blank is a professional method of disposal for printed health information • the code allows care practitioners to disclose health information to a blank caregiver • ...
Chapter 2 Crosswords 2025-11-14
Across
- A financial investment issued by a corporation, government, or other organization
- ___ institution - a financial institution that accepts money from customers and deposits into the customers account
- ____ system - the mechanism a nation uses to provide and manage money for itself
- People who lend money to the business in return for a contracted rate of interest or return for their investment.
- ___ order - you buy or sell when the stock reaches a certain price
- ___ bill - a security that matures in a year or less
- Establishes and enforces regulations which protect the investors from unfair practices in the security market
- ___ order - buying or selling a certain amount of shares of the stock at the best current available price and you assume your order will be executed as soon as possible
- a nonprofit financial institution
- ____ policy - action taken to manage supply of money and interest rates
- Stockbrokers earn their salaries from _______ based sales
- people who buy shares of stock in the company
- Pooled group of securities that track performance
- An equity instrument carrying ownership interest
- ___ capital market - selling stocks and bonds directly to public investors
- Pooled investment vehicle (Long & Short). Invest in a spectrum of assets typically with a sector focus
Down
- ____ capital market - stockholders buy and sell shares of stock from another with the help of brokers
- ___ analysis - an analysis of the company's stock, its price, price movement, trading volume, etc.
- Money for real estate, equipment, and so on
- ___ fund- A kind of mutual fund that invests in highly liquid, near-term instruments
- ___ order - you order to buy or sell an order at a specific price changes to a market order when the specific price is reached
- ___ bank - a financial institution that provides services for businesses
- ___ analysis - an analysis of the company itself, its operations, its position within its industry
- a sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
- National associations security dealers automated quotes
- ___ fund - pooled group of securities that track performance of indices benchmarks
- someone who assists you with purchasing stocks and bonds
- ___ accounts - investors who use their own money to purchase securities
- money Online banking allows ____
- ___ accounts - investors who borrow money to purchase securities
- A debt instrument with a promise to pay back the money with interest
31 Clues: money Online banking allows ____ • a nonprofit financial institution • Money for real estate, equipment, and so on • people who buy shares of stock in the company • An equity instrument carrying ownership interest • Pooled group of securities that track performance • ___ bill - a security that matures in a year or less • ...
Chapter 2 Crossword 2025-11-17
Across
- someone who assists you with purchasing stocks and bonds.
- People who lend money to the business in return for a contracted rate of intrest
- Limited liability for shareholders
- Your order to buy or sell an order at a specific price changes to a market order when the specific price is reached.
- A mechanism a nation uses to provide and manage money for itself
- Is the official currency
- Shares can be traded openly
- You want to buy or selll a certain number of shares of stock aat the best current available price and you assume your order will be executed as soon as possible.
- A document guarenteeing payment of a specific amount of money
- Money is deposited directly into a customer's checking account
- Is a written order for the bank to pay a specific amount to the person or organization to which the check is written
- People who buy shares of stock in the company
- Generally fixed, like debt; based on the par value
- Vast majority of U.S. corporations are private
Down
- Is a document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
- is a financial investment issued by a corporation, government, or other organization
- Is a security that matures in a year or less
- Is a bank account that allows the account owner to make deposits
- Is anything of value that is accepted in return for goods and services
- You want to buy or sell when the stock reaches a certain price.
- Money for real estate equipment,and so on
- Help keep the federal government operating.
- Describe the relationship between risk and return
- Those people who do the work.
- Is a security that pays interest over terms of ten to thirty years
- Is a prearranged amount of credt that is available for a business to use as needed
- allow customers to pay for purchases and withdraw cash
- the final document that discloses financial information about the company.
- is a security that pays interest over terms ranging from two to ten years
- is a bank account used by depositors to accumulate money for future use
30 Clues: Is the official currency • Shares can be traded openly • Those people who do the work. • Limited liability for shareholders • Money for real estate equipment,and so on • Help keep the federal government operating. • Is a security that matures in a year or less • People who buy shares of stock in the company • Vast majority of U.S. corporations are private • ...
At the airport 2019-04-25
🌼🌞Unit🔆🌟11🫥🌝 2023-05-11
🌼🌞Unit🔆🌟11🫥🌝 2023-05-11
chapter 16 2022-01-18
Mixed: Intermediate/Advanced 82 2024-02-08
12 Clues: Fan • Pot • Drum • Iris • Award • Saucepan • Defendant • Inquisition • Ballot paper • Database [3w] • Taxi stand [__________ de taxis] • Security check [________ __ seguridad, 2w]
On line Security 2015-05-05
MI review 2023-05-19
IFS 2022-07-30
Across
- An asset but not security
- An asset as well as security
- Securities provided to the bank in exchange of loan
- All financial assets are not _
- regulates the stock exchange business
Down
- a platform thatfacilitates the exchange of financial assets
- An acknowledgement of Debt
- resources of a country.
- a promise by a borrower to pay a lender their principal and usually interest on a loan.
- minimum percentage of cash, gold, and other securities, before lending loans to customers
- a system that mobilizes and usefully allocates
- a security that represents the ownership of a fraction of the issuing corporation.
12 Clues: resources of a country. • An asset but not security • An acknowledgement of Debt • An asset as well as security • All financial assets are not _ • regulates the stock exchange business • a system that mobilizes and usefully allocates • Securities provided to the bank in exchange of loan • a platform thatfacilitates the exchange of financial assets • ...
Crossword 8 2018-11-30
Across
- A type of risk response strategy whereby the project team acts to reduce the probability of occurrence or impact of a risk.
- The process of comparing two sets of records (usually balances of two accounts) and ensuring that they match at the end of a particular accounting period.
- Interest accumulation
- Social Security Number
- Type of testing to determine how well the system is protected against unauthorized access by internal or external entities.
Down
- Adding interest to the principal balance
- An authentication process in which the user provides two means of identification.
- A process of monitoring specific project results to determine whether they comply with relevant standards.
- A unique identifier used in place of the borrower's social security number
- A business that collects payments on a loan and performs other administrative tasks associated with maintaining a loan portfolio.
- A court order directing that money or property of a third party be seized to satisfy a debt.
- Accepting less than full payment.
12 Clues: Interest accumulation • Social Security Number • Accepting less than full payment. • Adding interest to the principal balance • A unique identifier used in place of the borrower's social security number • An authentication process in which the user provides two means of identification. • ...
Security Bytes - March 2024 2024-02-28
Across
- A person who uses computers to gain unauthorised access to data.
- A network device that forwards data packets between computer networks
- Security techniques that use biological data for authentication.
- An encryption-based Internet security protocol
- A number of internet connected devices each of which is running one or more bots
Down
- a piece of software designed to update a computer program or its supporting data to fix or improve it.
- No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
- Software designed to detect and destroy computer viruses
- A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
- Highlighted policy in march security bytes newsletter
- A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
- The practice of protecting systems, networks and programs from digital attacks
12 Clues: An encryption-based Internet security protocol • Highlighted policy in march security bytes newsletter • Software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorised access to data. • Security techniques that use biological data for authentication. • ...
daves crossworde puzzle is better then yours (lottie) 2021-11-03
5 Clues: a secret code you set • opposite of danger ig • comes beofre the word safety • people who hack into computers • what electronic you are using right now
InternetPuzzle 2016-02-17
Across
- server that automatically provides an IP address.
- Modem config without NAT.
- what is before the .com but after the @ symbol?
- Network Address Translation.
- Non changing IP Address.
- A free service with NPP for email and web.
- network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
- A tool you use to help guide your calls.
- A Type of Cord that hooks direct from the modem to customers device.
- Changing IP Address.
- Internet without wires.
Down
- The Program the customer goes to set up a Domain Name.
- The owner of a Domain name.
- Controls how the modem functions.
- Redirects a communication request from one address to a Port.
- Translates an IP address to a domain name.
- Internet program you use to surf the internet.
- a hardware device that has multiple Ethernet ports.
- A networking device that perform the "traffic directing" functions on the Internet.
- Internet output device.
- This controls your domain name's website and email settings.
21 Clues: Changing IP Address. • Internet output device. • Internet without wires. • Non changing IP Address. • Modem config without NAT. • The owner of a Domain name. • Network Address Translation. • Controls how the modem functions. • A tool you use to help guide your calls. • Translates an IP address to a domain name. • A free service with NPP for email and web. • ...
Vriendjes van de dag 2013-10-27
Across
- kapitein
- landbouwwerktuig
- bemanning
- dekwash slang
- uitstulping van de boeg
- vrouw van jorg
- dop op waaier
- scheepshoorn
- plaats aan boord
- vloedgolf
- plaats in Singapore
- navigatiemiddel
- tandenbalk
- plaatsbepalingssysteem
- logboek
- Hi-Fog
- onderwater schone
- lable printer
- meetinstrument
- under water pump
- beunoverloop
- implosie
- zeehond
- windzijde
- PMS
- uitvinder van de windschaal
- hospitaal
- venster
- eva
- eigenaar
- plastificeren
- zee rover
- emmer
- verstuiver
- duizend kilo
Down
- electronische kaart
- latwerk
- spie
- luchttol
- onderwaterblok/zuigbuis
- safe working load
- spoelwater
- rood
- lock out tag out
- schuurborstel
- mannelijk vertier
- Ship security officer
- dekkraan
- verrekijker
- MLC
- keuken
- communicatie middel dat niet werkt
- Callsign
- gereedschap
- bootje
- stuurboord
- afsluiter
- slaapkamer
- hijswerktuig
- topdek
- stuk
- kluis
- kompasfout
- declaration of security
- vloeibaar lekkers
- pressureliner
- schrijfvloeistof
- meertouw
- stuur
- hijswerktuig
70 Clues: MLC • PMS • eva • spie • rood • stuk • kluis • stuur • emmer • keuken • Hi-Fog • bootje • topdek • latwerk • logboek • zeehond • venster • kapitein • luchttol • dekkraan • Callsign • implosie • eigenaar • meertouw • bemanning • vloedgolf • afsluiter • windzijde • hospitaal • zee rover • spoelwater • tandenbalk • stuurboord • slaapkamer • kompasfout • verstuiver • verrekijker • gereedschap • scheepshoorn • beunoverloop • hijswerktuig • hijswerktuig • duizend kilo • ...
corporate finance 2021-02-05
Across
- The firm’s chief financial manager
- The chance that actual outcomes may differ from those expected.
- A market that establishes correct prices for the securities
- The science and art of managing money
- An entity created by law
- A firm’s taxes divided by its taxable income
- The sale of either bonds or stocks to the general public
- firm's chief accountant
- The highest price offered to purchase a security
- Long-term debt instrument used by business and government to
- The market in which the buyer and seller are not brought
Down
- A special form of ownership having a fixed periodic
- Financial market in which preowned securities
- The rate at which additional income is taxed.
- The lowest price at which a security is offered for sale
- An entity created by law by two or more people
- Groups such as employees
- basis In preparation of financial statements
- Income earned through the sale of a firm’s goods or services.
- The purest and most basic form of corporate ownership
20 Clues: firm's chief accountant • Groups such as employees • An entity created by law • The firm’s chief financial manager • The science and art of managing money • basis In preparation of financial statements • A firm’s taxes divided by its taxable income • Financial market in which preowned securities • The rate at which additional income is taxed. • ...
RU ITEC411 - Crime and Security 2023-10-17
Across
- A concealed entry point in communication systems
- Enhanced account security using multiple steps(acronym)
- This law places restrictive measures on information.
- Covert software that gathers user data
- Retail corporation affected by a major data breach in 2007.
- Legislation protecting intellectual property.
- Proving one's identity
- A United States federal law that governs unauthorized access to computer systems and data
- Deceptive cybersecurity trap for hackers.
- Activist use of hacking for social or political causes
- This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
- False statements harming one's reputation.
- False spoken statements harming reputation.
- This process transforms information into a coded form to protect it from unauthorized access
- Using unique physical features for identification
- Malicious software that replicates and infects
- system is used in retail to process transactions, record sales, and manage inventory(acronym.
- Ethical hacking for security assessment.
- Deceptive online tactic to steal personal information
- U.S. law for wiretaps and law enforcement access
20 Clues: Proving one's identity • Covert software that gathers user data • Ethical hacking for security assessment. • Deceptive cybersecurity trap for hackers. • False statements harming one's reputation. • False spoken statements harming reputation. • Legislation protecting intellectual property. • Malicious software that replicates and infects • ...
Travel Vocabulary 2020-04-03
Across
- in the airport
- security agent
- carry-on baggage
- flight
- in the train station
- to take off (airplane)
- boarding pass
- safety belt
- platform (train)
- suitcase
- ticket window
- on time
- arrival
- counter (check-in)
- seat
- event ticket
- baggage claim
- bunk bed
- to give
- to turn
- to go through security
- aisle
- controller (train ticket)
- first class
- to miss (a flight)
- to board
- passenger
- window
- sleeping car
- trip/travel
- connection
Down
- luggage
- delayed
- to get/obtain
- to see
- ticket (number 2)
- to hope
- waiting room
- departure
- ticket
- flight attendant
- customs
- coach (plane)
- car wagon/train car
- luggage screening
- to go straight
- international airport
- to check luggage/to put on plane
- train stop
- gate
- second class
- passport
- visa
- to land
- layover
55 Clues: seat • gate • visa • aisle • flight • to see • ticket • window • luggage • delayed • to hope • customs • on time • arrival • to give • to turn • to land • layover • suitcase • bunk bed • passport • to board • departure • passenger • train stop • connection • safety belt • first class • trip/travel • waiting room • event ticket • second class • sleeping car • to get/obtain • boarding pass • ticket window • coach (plane) • baggage claim • in the airport • ...
Investment Unit 2024-03-20
Across
- nationally reconized financially sound company
- a system of recording info
- biggest financial fraud in US history
- when a large number of people withdraw their deposits
- age to start investing
- you can only put up to $7,000 per year
- president who created social security
- measures the proformance of multiple companies
- when the market is high
- mortgage backed by securities
- retirement plan managed by your employer
- tells us how big the company is in the stock market
- age to collect social security
Down
- federal deduction from each paycheck
- a virtual currency
- you can do this whith your 401k funds to your new company's 401k plan
- currencies that are created and backed by the government
- example of an investment fund
- secured in the possesion or assigned to a person
- bought and sold throughout the day
- at 67 you can collect this
- when the market is low
- money saved for a purpose
23 Clues: a virtual currency • age to start investing • when the market is low • when the market is high • money saved for a purpose • a system of recording info • at 67 you can collect this • example of an investment fund • mortgage backed by securities • age to collect social security • bought and sold throughout the day • federal deduction from each paycheck • ...
CROSSWORD 2023-08-07
Across
- Malicious software.
- Distributed, secure ledger.
- Malicious software.
- Unique biological identifiers.
- Internet-based data storage and computing.
- Computer providing services to clients.
- Computing based on quantum mechanics.
- Enhanced reality with computer-generated elements.
- Data protection using a code.
- Decentralized digital currency.
- Single-layer carbon material.
- Information and facts.
- Name of the first commercial video game ever released
- A widely used open-source operating system based on the Linux kernel.
- Simulated or computer-generated.
- Set of steps to solve a problem.
- Manipulating materials at a tiny scale.
Down
- of Things Interconnected smart devices.
- A cloud computing service offered by Amazon Web Services (AWS) for scalable storage.
- Unit of digital storage, 1 billion bytes.
- Computer security expert.
- Learning AI learning from data.
- A popular version control system used by developers to track changes in their codebase.
- Unauthorized access to systems.
- Mobile device with advanced features.
- Simulated intelligence.
- Network security barrier.
- Global network of connected devices.
- Writing code for computers.
- Application Programming Interface.
30 Clues: Malicious software. • Malicious software. • Information and facts. • Simulated intelligence. • Computer security expert. • Network security barrier. • Distributed, secure ledger. • Writing code for computers. • Data protection using a code. • Single-layer carbon material. • Unique biological identifiers. • Learning AI learning from data. • Unauthorized access to systems. • ...
Cloud Deployment Crossword Puzzle 2025-03-07
Across
- Storing data in fixed-sized chunks, ideal for databases.
- Stores data as objects with metadata.
- Software that creates and manages virtual machines.
- Organizing data into a hierarchical structure like a local file system.
- Moving a powered-off server to a new environment.
- Ability to scale resources up or down as needed.
- Calculating expenses related to cloud migration and usage.
- A software-based simulation of a physical computer.
- Adding extra layers of security to logins.
- Identifying which applications should be migrated first.
- Assigning CPU, memory, and storage dynamically.
- Ability to scale resources up or down as needed.
- Creating backup copies to prevent data loss.
Down
- Part of the workload stays on-premises while others move to the cloud.
- Moving a running virtual machine without downtime.
- Allowing users to log in once for multiple apps.
- Ensuring compliance and safety during migration.
- Identity and Access Management in cloud security.
- Evaluating current infrastructure before cloud migration.
- Assigning permissions based on user roles.
- Running applications in isolated environments.
- Lifting and shifting applications to the cloud.
- Evaluating current infrastructure before migration.
- Restricting access for high-privilege accounts.
24 Clues: Stores data as objects with metadata. • Assigning permissions based on user roles. • Adding extra layers of security to logins. • Creating backup copies to prevent data loss. • Running applications in isolated environments. • Lifting and shifting applications to the cloud. • Assigning CPU, memory, and storage dynamically. • ...
THE FAMILY 2025-05-26
Across
- : A feeling of great respect and approval.
- : The state of begin linked or joined together
- : Security is the feeling of being safe and protected.
- : a feeling or sorrow or unhappiness
- : A sense of being part of something
- : A sense of reassurance or relaxation.
- : Happiness is a state of feeling joyful and content.
- : Confidence in the reliability or honesty of someone or something Sadness
- : Confidence in a positive outcome.
- : A deep feeling of affection, care, and connection toward someone or something.
Down
- The felling of sadness when expectations are not met
- : a strong felling of displeasure or hostility.
- : Something that makes life easier or less painfull
- : A sense of dissatisfaction when things don’t go as planned
- : The act of thinking about potential problems
- : A sentimental longing for the past
- : a felling of admiration for someone or something
- : Joy is a feeling of great happiness and delight.
- : A felling of thankfulness and appreciation.
- : A felling of satisfaction and self respect
20 Clues: : Confidence in a positive outcome. • : A sentimental longing for the past • : A sense of being part of something • : a feeling or sorrow or unhappiness • : A sense of reassurance or relaxation. • : A feeling of great respect and approval. • : The act of thinking about potential problems • : The state of begin linked or joined together • ...
safety and secruity 2025-06-05
Across
- At the end of an aircraft
- reversers At rear of engine
- The body of the aircraft located between the two wings
- The main building where passengers check in
- A person with responsibility to manage the traffic on the ramp
- The area of the airport where security checks are conducted
- The process of moving an aircraft
- Straight and off to each side of the aircraft
- Where the aircraft gets serviced
- That is at the end of an aircraft
Down
- Area where aircraft is packed/loaded and unloaded
- Fitted to the wings
- A document used to board the plane
- Located on the wings closest to the fuselage
- The bridge connecting to aircraft and terminal
- The area where the public can access an airport terminal
- The path aircraft uses to move on the ground
- The area where passengers can relax and wait for there flights
- The area where the aircraft take off and land
- The area where passengers can purchase there duty free goods
20 Clues: Fitted to the wings • At the end of an aircraft • Where the aircraft gets serviced • The process of moving an aircraft • That is at the end of an aircraft • A document used to board the plane • reversers At rear of engine • The main building where passengers check in • Located on the wings closest to the fuselage • The path aircraft uses to move on the ground • ...
Responsible Use Agreement 2025-08-21
Across
- Repeated online intimidation or threats
- Activity of tracking user behavior for safety or security
- Legal protection for original content like music or writing
- Institution responsible for enforcing this agreement
- Group of connected devices and systems
- Sending files to the internet or cloud storage
- Watching videos in real time over the internet
- Laptops, phones, tablets — all are types of this
Down
- Cruel or repeated online behavior toward someone
- Sharing someone’s private info or photo without permission violates this
- A unique identifier used to log into school systems
- Permission required to share someone’s personal content or image
- The worldwide network of computers
- Formal method of online communication at school
- Online content blockers to protect students from inappropriate content
- Secret word that keeps your account safe
- Systems in place to protect data and prevent hacking
- Platforms like TikTok, Instagram, and Snapchat
- Presenting someone else’s work as your own
- Short term for Artificial Intelligence
20 Clues: The worldwide network of computers • Group of connected devices and systems • Short term for Artificial Intelligence • Repeated online intimidation or threats • Secret word that keeps your account safe • Presenting someone else’s work as your own • Platforms like TikTok, Instagram, and Snapchat • Sending files to the internet or cloud storage • ...
Thinking About the Future - Crossword 2025-09-19
Across
- Level of needs for confidence and recognition
- Level of needs for creativity and purpose
- Fixed yearly amount of pay
- Hourly rate of pay
- Force that drives choices and actions
- Person with broad, adaptable skills
- Short-term work mainly for income
- Essentials for survival and well-being
- Psychologist known for hierarchy of needs
- Expert with deep focus in one area
- Extras that bring comfort or fun
- Uncertainty with chance of failure or reward
- Level of needs including shelter and security
- Satisfaction from short- or long-term rewards
Down
- Level of needs including food, water, rest
- Level of needs involving friends and relationships
- Following what excites and fulfills you
- Long-term work path with growth and fulfillment
- Blending work, health, and personal life
- Motivation from passion or enjoyment
- Pay earned from sales or business brought in
- Choosing based on stability and income
- Stability and predictability in a career
- Motivation from rewards like money or praise
- Safe, easy, predictable zone
25 Clues: Hourly rate of pay • Fixed yearly amount of pay • Safe, easy, predictable zone • Extras that bring comfort or fun • Short-term work mainly for income • Expert with deep focus in one area • Person with broad, adaptable skills • Motivation from passion or enjoyment • Force that drives choices and actions • Choosing based on stability and income • ...
Test 2025-12-01
Across
- Short-range wireless communication
- Repetition of steps in a loop
- Data transfer limit on a network
- Distributes traffic across multiple servers
- Language famous for “write once, run anywhere”
- Converts data into unreadable form for security
- Malicious software designed to harm systems
- Set of rules for data communication
- Software that manages virtual machines
- Stores and manages network resources
- Creates virtual versions of computers or OS
- Process of finding and fixing errors
Down
- Platform for hosting code repositories
- Connects computers worldwide
- Distributed, tamper-proof ledger technology
- Step-by-step procedure for solving a problem
- Translates source code into machine code
- Ability of a system to handle growth
- Filters incoming and outgoing network traffic
- Lightweight isolated environment for applications
- Small independent deployable software component
- Secret key used for login/security
- One-way transformation of data
- The design structure of a computer system
- Time delay in data transmission
25 Clues: Connects computers worldwide • Repetition of steps in a loop • One-way transformation of data • Time delay in data transmission • Data transfer limit on a network • Short-range wireless communication • Secret key used for login/security • Set of rules for data communication • Ability of a system to handle growth • Stores and manages network resources • ...
Presidents 2015-02-13
7 Clues: ended debt • was an inventor • father of the nation • assassinated by Booth • created social security • created Homeland Security • assassinated while campaining
15.1 crossword puzzle 2024-05-08
Across
- what EFT stands for; a transfer of money from one bank account to another
- to exchange one good or service for another good or service
- cards allows customers to pay for purchases directly from their checking accounts
- a type of security that pays interest over terms ranging from two to ten years
- a document guaranteeing payment of a specific amount of money
- a type of security that pays interest over terms of ten to thirty years
- the process of transferring money from one individual or organization to another
- anything of value that is accepted in return for goods and services
- a security that matures in a year or less
- a function of money in the economy in which it is a common measure of the worth or price of a good or service
- coins or banknotes that must be accepted for all debts
Down
- a system by which a government provides money in a country's economy
- the concept that the value of a dollar today is worth more than the value of a dollar in the future
- a financial investment issued by that government, a corporation, or other oganizations
- a function of money in the economy in which it can be saved and used at a later date
- paper money and coins
- a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
- short for The Federal Reserve System
- a property of money in which it is able to be divided into smaller units
- a property of money in which people are able to carry money
- a plastic card that allows the holder to make credit purchases up to an authorized amount
- another word for money
- comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
- any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
- a property of money in which it is made of a strong and lasting material
- a property of money in which it is authentic money immediately recognizable
- a property of money in which it maintains its value over time in order for it to be widely accepted
27 Clues: paper money and coins • another word for money • short for The Federal Reserve System • a security that matures in a year or less • coins or banknotes that must be accepted for all debts • to exchange one good or service for another good or service • a property of money in which people are able to carry money • ...
CN-120 Linux Server Fundamentals Key Terms Week 1 2023-05-01
Across
- Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered
- Programming object that can resolve the truth value of a condition, sch as whether one variable is equal to another
- A non-interactive process that runs in the background to support an OS or application function such as Plug-and-play, the print spooler, and DHCP. Also known as daemon
- One of several fully functional operating systems and members of the Linux family that run the Linux kernel, GNU software, and additional components. Also known as a Linux distribution
- System component providing a command interpreter by which the user can use a kernel interface and operate the OS
- A human-readable name that identifies a network host
- The fundamental security goal of keeping information and communications private and protecting them from unauthorized access
- The fundamental security goal of insuring that computer systems operate continuously and that authorized persons can access data that they need
- Security settings that control access to objects including file system items and network resources
- The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications
Down
- The local administrative account on a Linux system, typically named root
- A low-level piece of code responsible for controlling the rest of the operating system
- An operating system virtualization deployment containing everything required to run a service, application, or microservice
- A reference to a specific location on a file system
- The property by which a user is allowed to apply and modify the permissions of a file or directory
- Software program that has been executed and is running in system memory
- A method of validating a particular entity's or individual's unique credentials
- A program that runs in the background without the need for human intervention. Also known as a service
- Identifier for a value that can change during program execution
- Series of simple or complex commands, parameters, variables, and other components stored in a text file and processed by a shell interpreter
- The theoretically indecipherable fixed-length output of the hashing process. Also known as hashed value
- Command-line text editor that extends the original vi software
22 Clues: A reference to a specific location on a file system • A human-readable name that identifies a network host • Command-line text editor that extends the original vi software • Identifier for a value that can change during program execution • Software program that has been executed and is running in system memory • ...
CyberCrossWord 2022-05-20
Across
- Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
- Assures that a system performs its intended function in an unimpaired manner
- The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
- Preserving authorized information access, or disclosure
- The conversion of plaintext data into unintelligible form
- A potential security harm to an asset
- Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
- An attempt to alter system resources or affect their operation
- Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
- Weakness in an information system
- Assures that information and programs are changed only in a specified and authorized manner
- A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
- A decoy system designed to lure a potential attacker away from critical systems
- Assures that systems work promptly and service is not denied to authorized users
- Assures that a system performs its intended function in an unimpaired manner
Down
- A plastic card that can store and process data
- Confidentiality, integrity, and availability
- Key A temporary encryption key used between two principals
- Function used to protect passwords that are stored in the local database
- A procedure whereby two communicating parties can cooperate to acquire a shared secret key
- The process of verifying an identity by or for a system
- Assures that private information is disclosed to unauthorized individuals
- Program that can replicate itself and send copies from computer to computer across network connections
- An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
- Guarding against improper information modification or destruction
- Attack An attempt to learn or make use of information from the system that does not affect system resources
- A program that takes over another computer and it's used to launch attacks
- A random value that is concatenated with a password
- The output of an encryption algorithm; the encrypted form of a message or data
- Code embedded in a program that copies itself and performs unwanted function
30 Clues: Weakness in an information system • A potential security harm to an asset • Confidentiality, integrity, and availability • A plastic card that can store and process data • A random value that is concatenated with a password • The process of verifying an identity by or for a system • Preserving authorized information access, or disclosure • ...
Chapter 6-8 Crossword 2024-03-28
Across
- the act of granting a user access to a system resource
- extra information that describes data, like location information or author information
- measurements of the unique characteristics of an individual
- a phishing attack aimed at a high-value individual like a CEO
- is the act of a user claiming an identity
- the most common form of a breach
- the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
- a physical device assigned to a user that can generate a unique code
- a threat actor who gains unauthorized access to a high-value target for an extended period of time
- emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
- the act of verifying or proving a user's claim to an identity
- a type of malware disguised as legitimate software such as a game or a utility application
- security principle that ensures information is only modified in an authorized manner
- software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
- software that provides protection against computer viruses and many other forms of malware
Down
- aspect of a computer that can be used to breach security
- a case of unauthorized computer access
- achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
- security principle that ensures information is only disclosed or made available to authorized users
- security principle that ensures information is accessible by authorized users whenever required
- the process of adding geographical identification to a device
- any software developed to compromise the confidentiality, integrity, or availability of data
- A standardized set of rules for formatting and processing data
- a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
- notification sent by an authentication server to a mobile device associated with a user
- a protected environment where suspicious files can be run
- intelligence derived from publicly available information on an individual or organization
- control which users, groups, or services can perform an action on a file
- special codes used to decode data
- an authentication method that uses only one authentication factor to verify a claimed identity
30 Clues: the most common form of a breach • special codes used to decode data • a case of unauthorized computer access • is the act of a user claiming an identity • the act of granting a user access to a system resource • aspect of a computer that can be used to breach security • a protected environment where suspicious files can be run • ...
Payment Card Industry and Security 2024-04-10
Across
- The process of securely storing cardholder data after a transaction has been authorized (11 letters)
- Items produced to imitate genuine articles, especially for fraudulent purposes (17 letters)
- A document provided by a third-party assessor confirming an organization's compliance with PCI DSS (10 letters)
- Dividing networks or systems into distinct sections to enhance security (18 letters)
- A practice of restricting access to cardholder data only to those who require it (13 letters)
- The practice of regularly updating software and systems to address vulnerabilities and improve security (7 letters)
- Type of encryption used to secure cardholder data during transmission over public networks (3 letters)
- Systems Mechanisms employed to thwart potential threats or attacks (13 letters)
- Established rules or procedures for communication and data exchange (17 letters)
- This document outlines security requirements for organizations that handle cardholder information (3 letters)
- Illicit practice of capturing payment card data from legitimate transactions (15 letters)
- Flaws or weaknesses in systems that can be exploited by attackers (15 letters)
- The process of securely destroying or rendering cardholder data unusable (16 letters)
- The unique identifier assigned to each credit or debit card transaction (3 letters)
Down
- A tool used to detect and prevent unauthorized access by monitoring and analyzing network traffic (17 letters)
- Term for a system or process that logs and monitors activities within a network or system (9 letters)
- Term for a system that authenticates the identity of users and ensures they have the appropriate permissions (13 letters)
- This type of assessment involves a qualified assessor evaluating an organization's compliance with PCI DSS (18 letters)
- The process of making cardholder data unreadable using cryptographic methods (10 letters)
- Testing This type of testing evaluates systems, networks, and applications for vulnerabilities that could be exploited by attackers (18 letters)
- A technique used to verify the identity of an individual based on their physical characteristics, such as fingerprints or iris scans (10 letters)
- Established rules or principles governing behavior or actions (16 letters)
- Term for security controls that detect and prevent unauthorized access to systems or networks (8 letters)
- The act of deliberately tricking a person or system into revealing confidential information (8 letters)
- Term for an unauthorized individual gaining access to cardholder data (10 letters)
- Wallets Electronic systems for storing and managing payment information securely (12 letters)
26 Clues: Established rules or principles governing behavior or actions (16 letters) • Flaws or weaknesses in systems that can be exploited by attackers (15 letters) • Established rules or procedures for communication and data exchange (17 letters) • Systems Mechanisms employed to thwart potential threats or attacks (13 letters) • ...
Block 8 Investments 2022-11-21
Across
- account is a bank account used by depositors to accumulate money for future use.
- bank is a financial institution that provides services for businesses.
- account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
- someone who assists you with purchasing stocks and bonds.
- bond is a security that pays interest over terms of ten to thirty years.
- accounts that need to pay for security purchases within three business days of order.
- capital market selling stocks and bonds directly to public investors.
- institution is a financial institution that does not accept deposits.
- firm is a financial institution that is involved in trading securities in financial markets.
- company is a financial institution that makes money by issuing loans; loan company.
- is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
- deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
- note is a security that pays interest over terms ranging from two to ten years.
- accounts for sophisticated investors who borrow money to purchase securities.
Down
- is a document guaranteeing payment of a specific amount of money; payer named on document.
- Transaction Documents that are confirmation statements are issued after the sale of stocks.
- are required to apply for Credit cards.
- union is a nonprofit financial institution that is privately owned and provides banking services for its members.
- the document that discloses financial information about the company and is filed with the SEC.
- cards allow customers to pay for purchases and withdraw cash.
- system is the mechanism a nation uses to provide and manage money for itself.
- capital market stockholders buy and sell shares of stock from one another with the help of brokers.
- it is against the law for investors to act on this kind of information.
- Corporations where shares can be traded openly.
- Federal Reserve System is the _____ bank of united states.
- Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
- bill is a security that matures in a year or less.
- banks are largest category of deposit institution.
- is a financial investment issued by a corporation, government, or other organization.
- companies are for-profit businesses that sell insurance products.
30 Clues: are required to apply for Credit cards. • Corporations where shares can be traded openly. • bill is a security that matures in a year or less. • banks are largest category of deposit institution. • someone who assists you with purchasing stocks and bonds. • Federal Reserve System is the _____ bank of united states. • ...
Investment strategies 2022-11-21
Across
- note is a security that pays interest over terms ranging from two to ten years.
- Corporations where shares can be traded openly.
- company is a financial institution that makes money by issuing loans; loan company.
- is a financial investment issued by a corporation, government, or other organization.
- cards allow customers to pay for purchases and withdraw cash.
- account is a bank account used by depositors to accumulate money for future use.
- accounts for sophisticated investors who borrow money to purchase securities.
- it is against the law for investors to act on this kind of information.
- bill is a security that matures in a year or less.
- is a document guaranteeing payment of a specific amount of money; payer named on document.
- bank is a financial institution that provides services for businesses.
- is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
- Transaction Documents that are confirmation statements are issued after the sale of stocks.
- union is a nonprofit financial institution that is privately owned and provides banking services for its members.
- capital market selling stocks and bonds directly to public investors.
- capital market stockholders buy and sell shares of stock from one another with the help of brokers.
Down
- Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
- system is the mechanism a nation uses to provide and manage money for itself.
- firm is a financial institution that is involved in trading securities in financial markets.
- the document that discloses financial information about the company and is filed with the SEC.
- bond is a security that pays interest over terms of ten to thirty years.
- are required to apply for Credit cards.
- deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
- companies are for-profit businesses that sell insurance products.
- someone who assists you with purchasing stocks and bonds.
- Federal Reserve System is the _____ bank of united states.
- institution is a financial institution that does not accept deposits.
- account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
- accounts that need to pay for security purchases within three business days of order.
- banks are largest category of deposit institution.
30 Clues: are required to apply for Credit cards. • Corporations where shares can be traded openly. • bill is a security that matures in a year or less. • banks are largest category of deposit institution. • someone who assists you with purchasing stocks and bonds. • Federal Reserve System is the _____ bank of united states. • ...
FICA Taxes 2024-09-12
Across
- the amount of income subject to Social Security tax
- both Social Security tax and Medicare tax
- a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
- a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
Down
- provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
- the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
- when someone uses your personal information to open accounts, file taxes, or make purchases under your name
- Federal Insurance Contributions Act
8 Clues: Federal Insurance Contributions Act • both Social Security tax and Medicare tax • the amount of income subject to Social Security tax • when someone uses your personal information to open accounts, file taxes, or make purchases under your name • ...
Global Security Culture Program 2025-09-18
Across
- Zones The main content of the second activity.
- levels Security measure distributed based on job role
- The process by which all individuals and objects are screened going into and out of the Red Zone. - CICO
Down
- Force Open An alarm that will be triggered when someone opens a door without receiving "access granted" (green light)
- Zone Security Zone that inside building, out side secured data hallCustomer Data The MOST important asset within our Red Zone data hallBreakaway connector Safety mechanism to prevent choking/strangulation hazard
- Zone Security Zone that inside fence line, outside building
- Amazon data centers use the what system to securely manage physical keys, which can control access permissions and track key usage history.
- Risk Media Bin Keys belongs to which Key Risk Matrix.
8 Clues: Zones The main content of the second activity. • Risk Media Bin Keys belongs to which Key Risk Matrix. • levels Security measure distributed based on job role • Zone Security Zone that inside fence line, outside building • The process by which all individuals and objects are screened going into and out of the Red Zone. - CICO • ...
Mr. Lewin's Computer Security Crossword 2014-10-21
Across
- A person who intentionally breaks into computer systems illegally, or just somebody who knows a lot about the details of how computers and networks work.
- Malicious (bad) software. Any software that is designed to do things that you wouldn't want it to.
- A secret phrase or word used to confirm somebody's identity.
- A procedure for verifying the identity of a user or machine before giving access to a computer system.
- A program that has had its security features removed, or a program designed to remove the security features of another program.
- A website or e-mail that pretends to be from someone you trust (like a bank, or a friend) to trick you into revealing your password or other account information.
- A program that records all the keys being pressed by a user. Can be used by hackers, but also common in businesses and schools.
- Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam.
Down
- A program used to track the user's actions or preferences. Usually the goal is to collect information that can be sold to other companies.
- A "hole" in a security system, often used to allow remote access to a system. Sometimes these are made by programmers on purpose, but they can also be the result of a virus.
- Software that controls what data is allowed to travel between your computer and the outside world.
- A program that can copy itself automatically, without requiring direct human action, usually by mass e-mailing itself out to an infected user's contacts.
- An attempt to break through a security system designed to protect a computer.
- A program that looks like useful software, but hides something bad (usually a virus) inside.
- Data that has been modified so that meaninful information looks like random, meaningless 1s and 0s.
- A behaviour of a program that the designers did not intend, especially one that causes the program to crash, or creates an opening for hackers.
- A program that can copy itself by “infecting” other programs.
- A network of computers, infected by a virus that allows them to be remotely controlled by a hacker
18 Clues: A secret phrase or word used to confirm somebody's identity. • A program that can copy itself by “infecting” other programs. • An attempt to break through a security system designed to protect a computer. • Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam. • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
- A bridge between two networks that connects using different protocols.
- A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- A firewall setting that separates LAN of an organization from the external network.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Down
- Protocol that is meant for uploading and downloading files.
- A bundle of programs that is designed to bombard users with advertisements.
- A computer program that keeps a log of your keystrokes on your keyboard.
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
16 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
travel vocab 2022-11-29
14 Clues: flight • arrival • airport • monitor • passport • suitcase • departure • to travel • bathing suit • roundtrip ticket • to pack a suitcase • to confirm a flight • to check ones luggage • to go through security
social media 2020-03-31
14 Clues: world • idols • secure • humans • year old • popular media • media platform • and conditions • unknown people • meeting people • mass communication • no public attention • global computer network • another word for talking
A Modest Proposal 2022-04-08
14 Clues: Beg, Pester • Gifts, Charity • Huge, Enormous • Sadness, Sorrow • Injustice, Wrong • Mockery, Ridicule • Garments, Apparel • Overload, Overfill • Security, Guarantee • Basics, Fundamentals • Calculation, Counting • Disgraceful, Shameful • Nutriment, Nourishment • Accountable, Chargeable
mfec 2022-03-20
Across
- data security
- measuring data
- collecting data
- database
- one of our motto
- environmental friendly
- what is this event?
- a type of crypto
- synergy partner
Down
- our strategic partner
- judgement making
- our strategic partner
- our strategic partner
- collection of investments
- necessary
- original crypto
- our strategic partner
- digital currency
- trading mechanism
- technology related to finance
20 Clues: database • necessary • data security • measuring data • original crypto • collecting data • synergy partner • judgement making • digital currency • one of our motto • a type of crypto • trading mechanism • what is this event? • our strategic partner • our strategic partner • our strategic partner • our strategic partner • environmental friendly • collection of investments • technology related to finance
Some important words for the exam 2022-01-25
Across
- saying nasty things to people on the internet is called cyber...
- teenagers use social media a lot, so their media ... is high
- you cut food with it
- a lot of churches have a clock on their ...
- a hotdog is a ... in a bread roll
- Instagram, Whatsapp, Facebook, Tik-tok are all social ...
- you can drink from it
Down
- not nice, nit friendly
- it's black and you can make a fire with it
- people singing together in a group
- a legendary creature in fantasy stories
- it makes food taste sweet
- students carry their books in it
- to make somebody angry
- calling other people 'dumbass' is bad ...
- at the start of the school-year getting up early was hard for me, but now I'm ... to it
16 Clues: you cut food with it • you can drink from it • not nice, nit friendly • to make somebody angry • it makes food taste sweet • students carry their books in it • a hotdog is a ... in a bread roll • people singing together in a group • a legendary creature in fantasy stories • calling other people 'dumbass' is bad ... • it's black and you can make a fire with it • ...
My Topologies 2022-06-24
Across
- ___________ is hidden software that monitors and collects information about you and your surfing habits.
- Within cyber security a weakness that can compromise a system is known as a _______
- What tool is used to get through a vulnerability other than the key
- In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
- A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
- the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
- involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
- ____ _________ is when two or more servers have the same information stored on it
- A ________ virus is a program that you are tricked into installing because you thought the application did something useful
- another term used to describe Eavesdropping attacks
- ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
- A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
- What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
- With a _________________ the hacker uses multiple systems to attack a single target system
- the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
- type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
- _______ is the concept of ensuring that system will continue to function after a disaster.
- Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
- What is used when an attacker compromises the network or system through social interaction with an individual
19 Clues: another term used to describe Eavesdropping attacks • What tool is used to get through a vulnerability other than the key • ____ _________ is when two or more servers have the same information stored on it • Within cyber security a weakness that can compromise a system is known as a _______ • ...
A Dog Day Afternoon 2019-03-06
18 Clues: Speed King • PA State Dog • Mexican State • The Crime Dog • Georgia's Uga • Snoopy is One • Sled Propeller • Turner's Hooch • Lassie Lineage • Pampered Pooch • Security Guard • Yellow Go Getter • Gives Directions • Ravishing Redhead • Peek-a-boo Hairdo • Beethoven Pedigree • Firehouse Favorite • Deutschland Herder
The Egypt Game-2 2021-10-07
18 Clues: trade • helper • likely • decode • awkward • annoyed • very loud • protection • bow or obey • information • visit by ghosts • with each other • fits or seizures • unbelief or sorrow • doubt or nervousness • old or ancient relic • Egyptian garment, possibly seamless • Egyptians made paper with the form of grass
