cyber security Crossword Puzzles
Fabien quachi 2024-03-20
22 Clues: drh • pdg • Fonds • solde • agence • prêter • Emprunt • retirer • stagiaire • graphiste • Découvert • Mensualité • prestataire • intérimaire • distributeur • informaticien • agent de sécurité • demandeur d’emploi • directeur financier • top 1 raciste de la classe • Guichetier/employer de bank • Membre du conseil d’administration
Grade 8 - Unit 16 2024-04-10
Across
- kellekski saada tathja
- pardapääse
- kirurg
- kandik
- turvalisus, julgeolek, turvakontroll
- sadam
- rabav, jahmatav
- välis-, ülemere-
- kohver
- fuajee
- trahv, trahvimawildlife ürgne loodus
- loeng
- registreerimine lennujaamas/hotellis
Down
- ilmarändur, omal käel reisija
- aksessuaar
- (reisi) sihtkoht
- pagas
- toll
- kohane
- vahekäik
- ilmnema, pähe torkama
- deklareerima
- reisiterminal
- võõrastemaja, noortehotell
24 Clues: toll • pagas • sadam • loeng • kirurg • kandik • kohane • kohver • fuajee • vahekäik • pardapääse • aksessuaar • deklareerima • reisiterminal • rabav, jahmatav • (reisi) sihtkoht • välis-, ülemere- • ilmnema, pähe torkama • kellekski saada tathja • võõrastemaja, noortehotell • ilmarändur, omal käel reisija • turvalisus, julgeolek, turvakontroll • trahv, trahvimawildlife ürgne loodus • ...
Human Rights 2024-12-29
Across
- libertad
- igualdad de trabajo
- trata de personas
- abuso fisico
- abuso sexual
- defender
- sobrevivir
- guardar silencio
- tirano
- hablar por
- igualdad de derechos
Down
- violencia domestica
- discriminar en contra
- supervivencia
- contrabandear
- abuso emocional
- victima
- parcial
- igualdad de salarios
- oprimir
- abuso de poder
- dominar
- torturar
- seguridad
24 Clues: tirano • victima • parcial • oprimir • dominar • libertad • defender • torturar • seguridad • sobrevivir • hablar por • abuso fisico • abuso sexual • supervivencia • contrabandear • abuso de poder • abuso emocional • guardar silencio • trata de personas • violencia domestica • igualdad de trabajo • igualdad de salarios • igualdad de derechos • discriminar en contra
Zenless Zone Zero 2025-04-03
22 Clues: 01 • 170cm • Mocktails • AI Helper • Main City • ____ Fuel • Proxy Name • Rat Thiren • Baddie Cop • Coffee Shop • Male Player • Video Store • Mission Zone • _____ Street • Female Player • Marketable Plush • Nicole's Company • Celebrity Singer • Outside Main City • Outer Ring Overlord • General Chop's Noodles • New Eridu Public Security
Woordenlijst Basiswoorden 2025-06-16
33 Clues: arm • doel • duur • eeuw • merk • kunst • soort • enorm • geweld • veilig • rommel • bekend • waarde • mening • bereik • invloed • misdaad • beroemd • woedend • spottend • dreiging • opmerking • duidelijk • menselijk • gemiddeld • veiligheid • wetenschap • vrouwelijk • beschikbaar • bekwaamheid • plaatselijk • verschrikkelijk • verantwoordelijk
Travel Vocab 2022-11-29
18 Clues: gate • ticket • flight • arrival • bus stop • suitcase • departure • bathing suit • baggage claim • travel agency • train station • to get in line • to take a trip • identification • monitor; screen • to pack a suitcase • to confirm a flight • to go through security
A2: U1L1: ¡VAMOS DE VIAJE! (B) 2021-01-05
18 Clues: gate • flight • airport • arrival • to board • bus stop • passenger • departure • train station • baggage claim • to take a taxi • to get in line • tourist office • monitor; screen • flight attendant • to go through customs • to check one’s luggage • to go through security
computer 2022-10-17
13 Clues: флешка • ноутбук • создавать • клавиатура • взламывать • обмениваться • безопасность • глобальная сеть • коврик для мыши • искать информацию • электронная почта • подключенный к сети • информация, сведения
Governance and Strategic Planning for Security 2023-09-06
Across
- In information security, a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including InfoSec policies, security education and training programs, and technological controls.
- The process of achieving objectives by appropriately applying a given set of resources.
- The process of creating designs or schemes for future efforts or performance.
- A high-level executive, such as a CIO or VP-IT, who will provide political support and influence for a specific project.
- A formal approach to designing information security programs that follows the methodology of a traditional information systems development life cycle (SDLC), including a recursive set of phases such as investigation, analysis, logical design, physical design, implementation, and maintenance and change.
- In some organizations, an alternate title for the CISO; in other organizations, the title most commonly assigned to the most senior manager or executive responsible for both information and physical security.
- The senior technology officer responsible for aligning the strategic efforts of the organization and integrating them into action plans for the information systems or data-processing division of the organization.
Down
- The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise's resources are used responsibly.
- The process of influencing others and gaining their willing cooperation to achieve an objective by providing purpose, direction, and motivation.
- The individual responsible for the assessment, management, and implementation of information-protection activities in the organization. The CISO is typically considered the top information security officer in an organization.
10 Clues: The process of creating designs or schemes for future efforts or performance. • The process of achieving objectives by appropriately applying a given set of resources. • A high-level executive, such as a CIO or VP-IT, who will provide political support and influence for a specific project. • ...
Unit 1, Laws & Crimes 2024-09-15
Across
- serious crime punishable by a year or more in prison
- department-heavy, doing-things part of government, includes President & departments
- crimes which are begun but not completed; attempted crimes
- representative body responsible for managing and maintaining the people of a country
- crimes that hurt or threaten to hurt others
- document that describes functions of government
- federal, state, local; power-sharing by levels and branches of government
- legal area controlled by a certain government
Down
- minor crime punishable by less than one year or lesser punishment
- crimes motivated by the perpetrator's hatred of the victim
- crimes that unlawfully remove property
- infliction of a penalty, retribution, or restitution
- official rule or regulation passed by government
- law-making branch of government, includes Congress
- illegal act
- changes to the Constitution
- crimes using a computer
- judging the law and people part of government, includes courts
- ideals of freedom and protections entitled by law
19 Clues: illegal act • crimes using a computer • changes to the Constitution • crimes that unlawfully remove property • crimes that hurt or threaten to hurt others • legal area controlled by a certain government • document that describes functions of government • official rule or regulation passed by government • ideals of freedom and protections entitled by law • ...
TTS Pencegahan Kekerasan Seksual dan Pelajar Anti Bullying 2025-07-16
Across
- Bentuk kekerasan yang dilakukan secara verbal, fisik, atau sosial.
- Sikap berani menegur teman yang melakukan bullying disebut ...
- Perbuatan menyebar foto pribadi orang lain tanpa izin merupakan bentuk ...
- Orang yang menjadi korban bullying.
- Sikap diam saat melihat kekerasan terjadi disebut ...
- Memberi semangat dan bantuan kepada teman disebut sikap ...
- Kekerasan seksual termasuk dalam pelanggaran terhadap ... manusia.
- Sikap untuk saling menghargai dan menerima perbedaan.
- Lawan dari kekerasan.
Down
- Perbuatan memaksa orang lain untuk melakukan sesuatu yang tidak diinginkan.
- Pelaku kekerasan seksual dapat dikenai ... pidana.
- Menyentuh tubuh orang lain tanpa izin termasuk tindakan ...
- Salah satu bentuk bullying yang dilakukan melalui internet disebut ...
- Salah satu ciri lingkungan sekolah yang aman dan nyaman adalah bebas dari ...
- Tempat untuk melapor jika terjadi kekerasan di sekolah.
- Memanggil teman dengan sebutan merendahkan termasuk jenis ... bullying.
- Salah satu media yang sering digunakan untuk cyber bullying.
- Kegiatan berbagi informasi untuk mencegah kekerasan disebut ...
- Salah satu akibat dari bullying adalah gangguan pada ...
- Organisasi sekolah yang bisa membantu mengkampanyekan anti bullying (singkatan).
20 Clues: Lawan dari kekerasan. • Orang yang menjadi korban bullying. • Pelaku kekerasan seksual dapat dikenai ... pidana. • Sikap diam saat melihat kekerasan terjadi disebut ... • Sikap untuk saling menghargai dan menerima perbedaan. • Tempat untuk melapor jika terjadi kekerasan di sekolah. • Salah satu akibat dari bullying adalah gangguan pada ... • ...
Ready Player One Level One 2026-03-16
Across
- Wade's sweet old neighbor
- The demi-lich in the Tomb of Horrors
- Chief of Operations at IOI (full name)
- Halliday's journal is called Anorak's __________
- The only girl Halliday ever loved (fullname)
- The planet on which the Tomb of Horrors is found
- Halliday's business partner (full name)
- Turning a movie into an interactive video game is a
- To clear the first gate, one must act out this movie.
- Part of the Jade Key clue, these must be collected
Down
- Halliday's hometown planet
- This person clues in the media that TOH might be on Ludus
- The nickname for the Jade Key clue is the _______
- Wade's cyber crush
- Wade lives in the ____________
- The game Parzival must win to obtain the Copper Key
- These two brothers don't want to form an alliance
- The nickname for the Copper Key clue is the ______
- IOI's headquarters are in this city
19 Clues: Wade's cyber crush • Wade's sweet old neighbor • Halliday's hometown planet • Wade lives in the ____________ • IOI's headquarters are in this city • The demi-lich in the Tomb of Horrors • Chief of Operations at IOI (full name) • Halliday's business partner (full name) • The only girl Halliday ever loved (fullname) • Halliday's journal is called Anorak's __________ • ...
Review 9/12/23 2023-09-12
14 Clues: goal • help • income • to rent • comfort • security • pollution • fall down • to depart • passengers • to increase • to be lifted • industrial waste • take somebody to a place
Deborah Chen 8L : Social Engineering 2023-02-02
Across
- an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to tick them into providing valuable data.
- ( also known as shoulder surfing.)
- baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.
- an attack that was designed from cyber criminals to make up fun quizzes or questions to find out more about their information.
Down
- a set of methods used by cyber criminals to deceive individuals into handing over info that they can use for fraudulent purposes.
- an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money.
6 Clues: ( also known as shoulder surfing.) • baiting attacks use a false promise to take advantage of a victim’s greed or curiosity. • an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money. • ...
KELAS 7.4 ARYO KURNIAWAN 2023-05-10
Across
- sebuah platform media sosial yang diciptakan pada tahun 2005
- aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat
- perlindungan mengekpresikan identitas diri atau kepribadian melalui pembicaraan atau kegiatan
- tahun 2004 diciptakan
Down
- tahun 1995 lahir situs
- sebuah pembelajaran yang dilakukan tanpa tatap muka langsung disebut
- pada tahun 2010 diciptakan apk sosial pertama
- BOLYING dampak negatif penggunaan tik
- aplikasi yang muncul pada tahun 2006 sebagi situs jejaring sosial yang lebih simpel
- salah satu apk yang digunakan untuk buat konten
10 Clues: tahun 2004 diciptakan • tahun 1995 lahir situs • BOLYING dampak negatif penggunaan tik • pada tahun 2010 diciptakan apk sosial pertama • salah satu apk yang digunakan untuk buat konten • sebuah platform media sosial yang diciptakan pada tahun 2005 • aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat • ...
Our digital lives 2024-06-02
Across
- - a person who lost interest to live.
- - an online journal that offers regularly updated content.
- - a currently popular and widely discussed
- Feeling a strong need to do something.
- - The application of scientific knowledge to the practical aims of human life.
Down
- bullying - Use of online apps to harm someone.
- - A software program that is designed to perform a specific function.
- - The action of sending something to someone.
- A person who is not identified by the name.
- - A verbal or written remark.
10 Clues: - A verbal or written remark. • - a person who lost interest to live. • Feeling a strong need to do something. • - a currently popular and widely discussed • A person who is not identified by the name. • - The action of sending something to someone. • bullying - Use of online apps to harm someone. • - an online journal that offers regularly updated content. • ...
Bully Free, That's ME 2024-10-22
Across
- It takes______ to stand up to bullies.
- The first thing we do when we see bullying.
- This type of bullying hurts your body.
- mean and repeated behaviors.
- It is possible to be bullied by my friends.
- The third thing we do when we see bullying.
Down
- This type of bullying involves words and hurts your heart.
- The second thing we do when we see bullying.
- You should tell this person if you feel you are being bullied.
- This type of bullying occurs virtually.
10 Clues: mean and repeated behaviors. • It takes______ to stand up to bullies. • This type of bullying hurts your body. • This type of bullying occurs virtually. • The first thing we do when we see bullying. • It is possible to be bullied by my friends. • The third thing we do when we see bullying. • The second thing we do when we see bullying. • ...
UX Word Wizard - 1 2024-11-19
Across
- Temporary storage for data
- A small window that appears suddenly to convey information
- A component to scroll through images or content horizontally
- A clickable element that performs an action
- An indication that something went wrong during an interaction
Down
- The arrangement of elements on a page
- Regular updates sent via email to subscribers
- A cyber attack aimed at stealing sensitive user information
- A tool to refine or narrow down search results
- An area on a webpage for users to enter information
10 Clues: Temporary storage for data • The arrangement of elements on a page • A clickable element that performs an action • Regular updates sent via email to subscribers • A tool to refine or narrow down search results • An area on a webpage for users to enter information • A small window that appears suddenly to convey information • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Refers to unwanted bulk emails that come from unknown sources
- The process of transforming data into an unreadable code
- Device that connects multiple networks
- It can be defined as the legal rules and restrictions imposed on online laws
Down
- Type of cyber attack that tricks users
- Wireless technology used to interconnect mobiles computers etc
- Network topology with a central hub
- Practice of protecting digital information
- It is a combination of two terms 'net' and 'etiquette'
- Refers to an illegal intrusion into a computer system or network
10 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
Cyber Safety 2021-05-25
Across
- Protect your account by using a strong ______________.
- Someone who uses a computer to gain access to unauthorised access to other's details.
- A ______________ scam is used by online scammers to trick you into giving out your personal information by pretending to come from legitimate sources.
Down
- stop and think before you open attachments and click on ______________.
- Be ______________ when something is too good to be true!
- Do not accept friend requests from ______________.
- Do not give out ______________ information to strangers.
7 Clues: Do not accept friend requests from ______________. • Protect your account by using a strong ______________. • Be ______________ when something is too good to be true! • Do not give out ______________ information to strangers. • stop and think before you open attachments and click on ______________. • ...
Cyber Bulling 2013-09-09
Across
- Physically or emotionally injuring someone.
- A target of social cruelty.
- The most popular social networking system with over 100 million active users making profiles that give off too much personal information
- Intentionally excluding someone from an online group cruelly
Down
- A place where people like to talk on the internet.
- Talking someone into revealing secrets or embarrassing information about someone and then sharing it online
- An agressor or someone who is causing harm.
7 Clues: A target of social cruelty. • Physically or emotionally injuring someone. • An agressor or someone who is causing harm. • A place where people like to talk on the internet. • Intentionally excluding someone from an online group cruelly • Talking someone into revealing secrets or embarrassing information about someone and then sharing it online • ...
Cyber safety 2013-11-03
7 Clues: Copy others work • A person who sees bullying • A person who is being bullied • A form of communication using the internet • Websites that have places to chat and post things • Something that can be harmful to your laptop or computer • A person who uses the internet to intimidate another person
Cyber Burnout 2022-04-18
7 Clues: The online platform. • Addicted to online ___ life. • Feeling ___ from the real world. • Be ___, track your online usage. • Something active you can do offline. • Too much screen time may cause eye___. • Making sure your ___ are not suffering.
CYBER ETHICS 2025-05-28
Across
- using someone else's work or ideas without giving credit
- the correct and acceptable behaviour when using the internet
- a crime that happens in the internet
Down
- behaving responsibly and being kind and respectful to online communication
- copying digital content without permission
- a code to protect your online informations
- someone who hacks your personal informations
7 Clues: a crime that happens in the internet • copying digital content without permission • a code to protect your online informations • someone who hacks your personal informations • using someone else's work or ideas without giving credit • the correct and acceptable behaviour when using the internet • ...
Cyber-attack 2025-12-31
Across
- A large amount of money that someone wants to set something free.
- A program that copies itself to stop a system from working normally.
- A weakness in a system or machine that stop it working correctly.
- A person who gets access to a computer system illegally.
Down
- Short form for "National Health Service"
- German: infeziert
- A person who is affected by a bad situation.
7 Clues: German: infeziert • Short form for "National Health Service" • A person who is affected by a bad situation. • A person who gets access to a computer system illegally. • A large amount of money that someone wants to set something free. • A weakness in a system or machine that stop it working correctly. • ...
CYBER RUN 2024-10-18
Across
- Unauthorized access to data in a system
- A security system controlling network traffic
- A technique used to trick people into giving up sensitive information
Down
- Software designed to disrupt or gain unauthorized access to a system
- The process of converting information into a code to prevent access
- A secret word or phrase used to gain access to a system or account
- A type of malware that replicates and spreads to other computers
7 Clues: Unauthorized access to data in a system • A security system controlling network traffic • A type of malware that replicates and spreads to other computers • A secret word or phrase used to gain access to a system or account • The process of converting information into a code to prevent access • Software designed to disrupt or gain unauthorized access to a system • ...
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
cyber bully? 2024-07-25
Across
- seek to harm,or intimidate
- person who speaks or acts in support
- person who habitually seeks to harm or intimidate
Down
- www is a system of interconnected public webpages accessible through the Internet.
- the use of technology to harass, threaten, embarrass, or target another person
- person who is present at an event or incidentbut doesnt participate
- Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person
7 Clues: seek to harm,or intimidate • person who speaks or acts in support • person who habitually seeks to harm or intimidate • person who is present at an event or incidentbut doesnt participate • the use of technology to harass, threaten, embarrass, or target another person • www is a system of interconnected public webpages accessible through the Internet. • ...
Cyber Crimes 2025-12-02
Across
- Unwanted or junk messages sent in large numbers, usually for advertising or scams
- theft Stealing someone’s personal information (like their name, ID number, or bank details) and pretending to be them to commit crimes.
- Tricking someone in order to steal their money, personal information, or valuables
Down
- Breaking into a computer system or network without permission to view, change, or steal information.
- Sending fake emails, messages, or websites that look real to trick people into giving away passwords, bank details, or personal information
- Illegally copying or sharing music, movies, software, or other digital content without permission.
- attack When a harmful program (virus) infects a computer, damages files, slows the system, or steals data.
7 Clues: Unwanted or junk messages sent in large numbers, usually for advertising or scams • Tricking someone in order to steal their money, personal information, or valuables • Illegally copying or sharing music, movies, software, or other digital content without permission. • ...
Executive Branch 2022-12-07
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
Dallas 2023-03-23
test 2021-08-16
Across
- Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
- Mechanism that makes blockchain very resistant to tampering
- Cloud TCO Savings tool
- Technology architecture that scale as per demand
- iPaaS Platform and Accenture Alliance
- Find vulnerabilities in applications while they are running in production (Abbr)
- Smallest unit of a bitcoin
- One of our IPS Platforms
Down
- Outermost security layer in Defence in Depth Approach
- One of the CIA Triad
- Elastic and Flexible Assets
- One of the 5 R’s in Cloud Migration Strategy
- One of the MAAG
13 Clues: One of the MAAG • One of the CIA Triad • Cloud TCO Savings tool • One of our IPS Platforms • Smallest unit of a bitcoin • Elastic and Flexible Assets • iPaaS Platform and Accenture Alliance • One of the 5 R’s in Cloud Migration Strategy • Technology architecture that scale as per demand • Outermost security layer in Defence in Depth Approach • ...
TQ Puzzle - 1 2021-08-16
Across
- Appraoch that Integrate security into the rapid-release cycles that are typical of modern application development and deployment
- Mechanism that makes blockchain very resistant to tampering
- Cloud TCO Savings tool
- Technology architecture that scale as per demand
- iPaaS Platform and Accenture Alliance
- Find vulnerabilities in applications while they are running in production (Abbr)
- Smallest unit of a bitcoin
- One of our IPS Platforms
Down
- Outermost security layer in Defence in Depth Approach
- One of the CIA Triad
- Elastic and Flexible Assets
- One of the 5 R’s in Cloud Migration Strategy
- One of the MAAG
13 Clues: One of the MAAG • One of the CIA Triad • Cloud TCO Savings tool • One of our IPS Platforms • Smallest unit of a bitcoin • Elastic and Flexible Assets • iPaaS Platform and Accenture Alliance • One of the 5 R’s in Cloud Migration Strategy • Technology architecture that scale as per demand • Outermost security layer in Defence in Depth Approach • ...
Model Diplomacy 2023-04-25
Across
- the lowest-level setting for debating issues in the National Security Council
- the highest-ranking member of the U.S. armed forces
- law passed to reorganize the agencies and process related to intelligence, foreign policy, and military
- the group comprising the vice president of the United States and the heads of all fifteen federal executive departments
- the intermediate-level setting, below the principals committee
- an official partnership between two or more parties based on cooperation in pursuit of a common goal, generally involving security or defense.
- a country’s attitudes and actions in the international arena
Down
- head of the Department of Justice and chief lawyer of the U.S. government.
- the president’s principal advisor for intelligence-related matters
- Main advisor to the president on the nations security
- an act of war wherein a foreign military cuts off access to a specific location, usually a port, to impede deliveries of supplies
- The term frequently describes organizations such as the United Nations
- involving two or more agencies
- a decision issued by the president that carries the full force and effect of law
- undertaken between two entities, generally countries.
- actions taken by a government or nonstate actor in the realm of information network systems and digital infrastructure
16 Clues: involving two or more agencies • the highest-ranking member of the U.S. armed forces • Main advisor to the president on the nations security • undertaken between two entities, generally countries. • a country’s attitudes and actions in the international arena • the intermediate-level setting, below the principals committee • ...
My AUs uwu 2019-07-21
Across
- Smol little peeps uwu
- Child support means nothing.
- Let's put a pin in this one and come back later.
- The eldest of the Spooks but not the creepiest
- If you hit him 5 times he will spill soda on your laptop. Very sad.
- His name is pretty much a cruel joke to his condition
- Uni of multiple things
- Has a kid he didn't want in the first place but refuses to share custody with the parent who wanted the kid in the first place...?
- F*cked Cupid before literally anyone else. That's his only accomplishment.
- Pisses off so many people but Cyber still someone manages to be slightly nice to him
- Smol quiet bad with a birdy hate uwu
- A lonely bab with a heart of gold. No I'm serious his pinprick is a golden heart-
Down
- Named after a bush and his job
- Walks through walls but not over water; can't see through you but you can see through him
- I made her to be shipped with a bad guy so I would feel bad for killing him later-
- Was good, then bad, and now "good" and DEAD!
- Named after a soda that rhymes with a princess name
- Betrayed people in his AU but somehow gets trusted as a Misfit :/
- "Spaces" out a lot. Teased for being obsessed over a- *reads smudged writing* volcano??? :/ (*Smacks white board* LAUGH!)
- Not to be confused with the "representative" of a Sprite-
- If he didn't exist his wife would be getting shipped with Panther- because she is a cat- person- thing- not a furry-
- Still a better love story than Twilight. Still a better character than- what was his name- the vampire one not the dog- err- I never read Twilight help me out here
- Killed his brother and tried to kill other people. Claims it is due to mental illnesses but Mental isn't here- so-
- Legends has it she is hotter than the savannah
- Things go wrong for him and the worse part is he can't "voice" his opinion...
25 Clues: Smol little peeps uwu • Uni of multiple things • Child support means nothing. • Named after a bush and his job • Smol quiet bad with a birdy hate uwu • Was good, then bad, and now "good" and DEAD! • The eldest of the Spooks but not the creepiest • Legends has it she is hotter than the savannah • Let's put a pin in this one and come back later. • ...
TOPIC 7: DEVELOPMENT OF COMPUTER INDUSTRY & LAW 2024-05-02
Across
- What are companies called that own or lease physical infrastructure for communication transmission?
- What company provides technology services for travel companies, including travel searches, booking, and processing?
- Which company offers the Adobe Creative Cloud Suite, Document Cloud, and Experience Cloud?
- What company specializes in personal and small business financial management in the U.S., offering products such as TurboTax, Quickbooks, and Mint?
- Which Japanese company is renowned for manufacturing laptops, notebooks, computer desktops, and other computer-related products and services?
- What industry does the Malaysian Communications and Multimedia Commission (MCMC) regulate, focusing on networked IT industry services and the operational and administrative aspects of the regulatory framework?
- What company generates revenue from four main sources, including cloud services and license support, cloud license and on-premise license, hardware, and services?
- What company is known for producing products such as iPods, iTunes, Mac laptops and desktop computers, the OS X operating system, and innovative devices like the iPhone and iPad?
- Personal Protection Act 2010 act focuses on protecting personal data in Malaysia?
Down
- What company specializes in corporate virtualization and workstation optimization, offering cloud software and enterprise platforms compatible with Windows and Mac?
- What term is commonly used to describe the infrastructure of information utilized across multiple disciplines, as defined by Chan et al. (2008) and Uddin et al. (2003)?
- What does cyber law provide to individuals using the internet?
- What are the fundamental electronic building blocks of information-age products?
- Computer Act 1997 is the Malaysian legislation that addresses crimes involving computers?
- In the semiconductor industry, what process is highly capital-intensive, indicating significant investment in equipment and facilities?
- Which entities manufacture and sell telecommunications equipment?
- What trend within cyber law involves the regulation and legal considerations surrounding the use of remote data storage and processing services?
- Signature Act 1997 act in Malaysia governs the legality of digital signatures?
- What term encompasses any law that is applicable to the internet and internet-related technologies?
- What company provides internet services, broadband networks, and enterprise business solutions?
20 Clues: What does cyber law provide to individuals using the internet? • Which entities manufacture and sell telecommunications equipment? • Signature Act 1997 act in Malaysia governs the legality of digital signatures? • What are the fundamental electronic building blocks of information-age products? • ...
Public Service 2020-05-05
18 Clues: Road base • Park path • Board abbrv. • Office times • PC component • Police action • Library stamp • Flushing device • Undergrad degree • Firefighter tool • Bench conference • Company vehicles • Financial review • Final recruitment • Communicating with • Duplicate documents • Alter electrical work • Employee Security pass
Aeroport 2020-05-11
13 Clues: tray • seat • screen • ticket • customs • passport • coming from • going toward • boarding pass • baggage claim • male passenger • carry-on luggage • security apparatus
the townmouse and the countrymouse 2017-05-05
16 Clues: - calm • - easy • - realy • - going • - lovely • - telling • - sibings • - dreaming • - food rice • - going out • - everything • - tiny animal • - so many mouse • morning - wishing • - place where we live • - the person who saves you form every thing
Robotics 2017-02-09
Across
- A car company that makes robots?
- A dishwasher is this type of machinery?
- A film that includes robots?
- A metal used to make robots?
- You need to do this to make your robot carry out a command?
Down
- The Cyber men come from this T.V series?
- A repetitive task carried out by robots?
- A high precision task carried out by a robot?
8 Clues: A film that includes robots? • A metal used to make robots? • A car company that makes robots? • A dishwasher is this type of machinery? • The Cyber men come from this T.V series? • A repetitive task carried out by robots? • A high precision task carried out by a robot? • You need to do this to make your robot carry out a command?
Chapter 10.1 Vocabulary 2014-05-14
17 Clues: ID • there • wallet • arrival • customs • to wait • airport • to leave • airplane • to board • plane ticket • to take a trip • to wait in line • to begin a trip • to change money • travel bag, purse • security checkpoint
File 3A Air Travel 2 2020-11-29
17 Clues: багаж • проход • застегнуть • отправление • путь, дорога • приземляться • по расписанию • выход на посадку • стыковочный рейс • посадочный талон • забирать (багаж) • спасательный жилет • садиться в самолёт • место получения багажа • верхняя багажная полка • авиационная безопасность • синдром смены часовых поясов
ENA4 Topic 1 2023-08-13
Across
- saavutus
- abstrakti, käsitteen tasolla oleva
- kansallinen identiteetti
- yleinen; yleisesti
- varallisuus, toimeentulo
- terveys
- turvallisuudentunne
- yksilöllisyys
- konkreettinen, "käsin kosketeltava", varsinainen
Down
- ympäristö
- keskeinen arvo
- tämänhetkinen, nykyinen
- yhteiskunta
- etnisyys, etninen tausta, "kansallisuus"
- yhteisö
- itseilmaisu
- työllisyys
17 Clues: yhteisö • terveys • saavutus • ympäristö • työllisyys • yhteiskunta • itseilmaisu • yksilöllisyys • keskeinen arvo • yleinen; yleisesti • turvallisuudentunne • tämänhetkinen, nykyinen • kansallinen identiteetti • varallisuus, toimeentulo • abstrakti, käsitteen tasolla oleva • etnisyys, etninen tausta, "kansallisuus" • konkreettinen, "käsin kosketeltava", varsinainen
Buisness Technology Crossword 2021-04-20
14 Clues: address • physical • volatile • interactable • non-volatile • local network • email security • pieces of data • clickable link • monitors network • fraudulent email • unwanted messages • malicious software • interconnected system
Spanish3H-Unit 3 2024-02-22
14 Clues: wifi • addict • privacy • security • the risk • the robot • censorship • the internet • the invention • the strangers • the touch screen • digital fingerprint • artificial intelligence • virtuality reality glasses
Recognition and 2025-04-09
14 Clues: Set. • Admin • Produce. • Security. • Open door • Go fishing • Operation.. • Aware of... • Self moving. • Threats to.. • Confiability. • Concrete info. • Before its all lost. • LEARNING Smart Robot.
Test Your Cyber Vocabulary 2023-09-29
Across
- Also called malicious software
- Buzz@IS has prescribed how many simple steps to stay safe online? (HINT: Answer in this edition itself)
- A copy of the information held on a device (such as photos and documents) that is stored somewhere else.
- This can slow down your computer and watch everywhere you go on the internet
- When somebody sends an e-mail with a link to a bogus website it is called
- Name of the attack that does not require any action from the victim.(HINT: An article on this attack was also published in a recent HP news edition.)
- Harmful computer program
- Encryption is a commonly used tool to achieve _________________
Down
- Weakness in an information system
- Full form of "T" in OTP
- Will stand like a wall to keep intruders out
- I have a short life; your mobile buzzes with me every time you do any financial transaction online
- I lock the victim's computer system files and demand payment to decrypt. Who Am I?
- Getting into someone else’s computer or device without their permission.
- Phishing over voice call is called as _____
15 Clues: Full form of "T" in OTP • Harmful computer program • Also called malicious software • Weakness in an information system • Phishing over voice call is called as _____ • Will stand like a wall to keep intruders out • Encryption is a commonly used tool to achieve _________________ • Getting into someone else’s computer or device without their permission. • ...
Financial Scams & Cyber Safety 2025-10-01
Across
- A type of malware disguised as legitimate software.
- Theft, Stealing someone's personal information for fraud.
- Criminal activities carried out using computers.
- A dishonest scheme or fraud.
- Malware that locks data and demands payment to unlock it.
- A secret word or phrase used to gain access.
Down
- Faking an identity to deceive someone online.
- Software that detects and removes malicious programs.
- A security method requiring two forms of identification.
- Software designed to damage or gain unauthorized access.
- Fraudulent emails pretending to be from trusted sources.
- The process of converting data into a secure code.
- Someone who gains unauthorized access to systems.
- security system that monitors and controls network traffic.
- Software that secretly gathers user information.
15 Clues: A dishonest scheme or fraud. • A secret word or phrase used to gain access. • Faking an identity to deceive someone online. • Criminal activities carried out using computers. • Software that secretly gathers user information. • Someone who gains unauthorized access to systems. • The process of converting data into a secure code. • ...
Cyber Cross Word (Phishing) 2025-09-18
Across
- One way to tell if an email is a Phishing attempt is use of ______ or threatening language.
- If you suspect a Phishing attempt, you can ______ it.
- To report a Phishing attempt, email ______________ or use the "report spam" button.
- A form of Phishing that uses texting platforms.
- When a cybercriminal gets information from various sources to make a phishing attempt for one specific person, this is called _____________.
- Cybercriminals may get your information from ________ available sources.
- Phishing attempts can be spotted via bad grammar, awkward phrasing or other ______ written content.
Down
- Once have reported and blocked the sender, what should you do with the email?
- Phishing attempts via direct message on social media or a phone call is called _______.
- Occurs when criminals try to get you to open harmful links, emails or attachments.
- This form of contact is the usual form of Phishing.
- Communications trying to trick you commonly look like they are from someone _______.
- In some cases, a Phishing attempt can be ________ to your information.
- To handle Phishing attempts properly, its best to think before you _____.
- After reporting, you should _____ the sender.
15 Clues: After reporting, you should _____ the sender. • A form of Phishing that uses texting platforms. • This form of contact is the usual form of Phishing. • If you suspect a Phishing attempt, you can ______ it. • In some cases, a Phishing attempt can be ________ to your information. • Cybercriminals may get your information from ________ available sources. • ...
week 1 be cyber smart 2021-09-21
Module 6 Puzzle 2021-09-29
Across
- Do this to all unneeded programs/software
- Hackers who hack only for legal/ethical purposes
- This should be done to large networks to break them up into more manageable networks.
- The six Ps of security are: ports, patch, _____, probe, policies, & physical
- The process to look for vulnerabilites on a network
- One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- Using interpersonal skills to extract information about a computer system and its security
- preferred location for storing backups
- To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
- one of the most prestigious certifications for networking professionals
- A numerical designation for a connection point on a computer
- Someone who attempts to compromise a system to assess its vulnerability
- A reference to how long a user has used a password
- Searching through trash looking for information that might be useful in hacking or identity theft
- checking a target machine to see what ports are open
- The minimum frequency for system probing and audits
- A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
- Perform system patches, probe for flaws, check logs, and review policies
- The most basic rule of computer security is to install these as soon as they are available
20 Clues: preferred location for storing backups • Do this to all unneeded programs/software • Hackers who hack only for legal/ethical purposes • A reference to how long a user has used a password • The minimum frequency for system probing and audits • The process to look for vulnerabilites on a network • checking a target machine to see what ports are open • ...
Chapter 2 Crossword 2025-11-14
Across
- order order where you want to buy or sell when the stock reaches a certain price
- Policy action taken to manage supply of money and interest rates
- ensures people's accounts up to $250,000
- financial investment issued by a corporation or the government
- Bill security that matures in a year or less
- Bank financial institution that provides services for businesses
- Company For profit buisness that sells insurance produces
- Firm institution involved in trading securities in fiancial markets
- bond security that pays interest over terms of 10-30 years
- Company Makes money by issuing loans
- document guaranteering payment of a specific amount of money (named on document)
- cards allow customers to pay for purchases and withdraw cash
- of value money is a common measure of the worth or price of a good or service
- someone who assists you with purchasing stocks and bonds
- System mechanism a nation uses to provide and manage money for itself
Down
- people who buy shares of stock in the company
- Note security that pays interest over 2 to 10 years
- Market Accounts has low risk/low return
- handles stock sales and purchases
- of value money can be saved and used at later date
- Banks largest category of deposit institutions
- Deposit money is directly deposited into a customers checking account
- Capitalization has intermediate risk in investment
- Accounts for sophisticated borrowers who borrow money to purchase securities
- financial institution that accepts money from customers and deposits it into their account
- Stocks has high risk investment
- Reserve central bank of the United States
- Union nonprofit financial institution that is privately owned and provides banking services for its members
- limited liability corporation
- Online Banking allows this
30 Clues: Online Banking allows this • limited liability corporation • handles stock sales and purchases • ensures people's accounts up to $250,000 • Market Accounts has low risk/low return • people who buy shares of stock in the company • Reserve central bank of the United States • Stocks has high risk investment • ...
Cybersecurity 2025-06-29
Across
- Code used to take advantage of a vulnerability
- Isolated environment used to test software safely
- Hidden method to bypass normal authentication
- Malware that hides its presence and grants admin access
- Device that filters network traffic to enhance security
- Malicious software designed to harm or compromise systems
- Network of infected devices controlled remotely
- Deceptive technique to steal confidential information
- Manipulation technique to trick people into giving information
- Detection of unauthorized access or suspicious activity
- Unauthorized access to confidential data
- Process of verifying the identity of a user or device
- Attack that floods a network or server to disrupt service
- Deliberate attempt to damage or access a computer system
- Program that records every keystroke typed
- Impersonation technique to deceive systems or users
- Security method that requires two forms of identification
Down
- Rule-based barrier that blocks or allows network traffic
- Process of converting data into an unreadable format for protection
- Digital file used to prove the identity of a website or user
- Update to fix security vulnerabilities in software
- Malware that encrypts files and demands payment for access
- Software that detects and removes malicious programs
- Virtual private network that encrypts internet connections
- Weakness in a system that can be exploited by attackers
- Function that converts data into a fixed-size string
- Vulnerability unknown to developers and without a fix
- Decoy system used to lure and monitor attackers
- Malware disguised as legitimate software
- Software that secretly collects user information
30 Clues: Unauthorized access to confidential data • Malware disguised as legitimate software • Program that records every keystroke typed • Hidden method to bypass normal authentication • Code used to take advantage of a vulnerability • Network of infected devices controlled remotely • Decoy system used to lure and monitor attackers • ...
CROSSWORD 2026-03-17
Across
- Cooperation among nations to fight transnational crime.
- the League of Nations was founded.
- UN body responsible for maintaining international peace and security.
- International organization formed after World War I.
- Interpol was founded.
- The oldest and largest organization of police executives worldwide.
- City where the first ASEAN Chiefs of Police meeting was held in 1981.
- Organization known as the International Association of Chiefs of Police.
- System used by police organizations to compare policing structures.
- The founding document of the United Nations.
- Name of the former title of Interpol (International Criminal Police ____).
- Main deliberative body of the United Nations.
- International law enforcement cooperation to fight global crime.
- Main UN judicial body.
- Interpol adopted its present name.
- U.S. president who also coined the term United Nations.
- The largest international organization in the world.
- Document that established the United Nations.
- Type of intelligence used by Europol to fight crime.
Down
- European Union police intelligence agency.
- International organization that facilitates worldwide police cooperation.
- UN body responsible for global peace and security.
- Administrative branch of the United Nations.
- Year ASEANAPOL was established.
- Cooperation between countries to prevent crime globally.
- British leader who helped coin the term United Nations.
- Process by which new states join the United Nations.
- Original name of Interpol in 1923.
- Primary mission of the United Nations.
- UN council responsible for economic and social development.
- Head of the UN Secretariat.
- Country where the ASEANAPOL Secretariat is located.
- City where the International Court of Justice is located.
- Multinational police organization of ASEAN countries.
34 Clues: Interpol was founded. • Main UN judicial body. • Head of the UN Secretariat. • Year ASEANAPOL was established. • the League of Nations was founded. • Original name of Interpol in 1923. • Interpol adopted its present name. • Primary mission of the United Nations. • European Union police intelligence agency. • Administrative branch of the United Nations. • ...
NATO Nuggets Crossword Puzzle 2022-03-23
Across
- A NATO ______ ______ is a security manager or SSR designated to officially process and log classified NATO material.
- US-marked information _____ overrides NATO-marked information.
- A political-military alliance currently comprised of 30 member countries, including the United States.
- ATOMAL material must be filed ________ from non-ATOMAL material.
- When NATO was formed in 1949, how many member countries were there?
- Where are NATO read-ons stored?
- NATO HQ is located in _______.
Down
- Printing NATO classified is a last _____.
- The NATO ______ is a permission-restricted library of shared classified NATO documents.
- EUCOM's NATO Sub-Registry Office/INFOSEC encourages the sharing of NATO classified information in the _____ format.
- How is NATO SECRET information residing inside a U.S. document marked?
- The principle that an attack against one or several NATO members is considered an attack against all is called the principle of ________ defense.
- The governing document for the implementation of NATO security requirements.
- How often does EUCOM's NATO Sub-Registry Manager have to report printed CTS and ATOMAL material to the Central US Registry (CUSR)?
- The physical security requirements for NATO CONFIDENTIAL and above are the ____ as for US material of the same level of classification.
- HQ USEUCOM's commander concurrently serves as NATO's _______ Allied Commander (SACEUR).
16 Clues: NATO HQ is located in _______. • Where are NATO read-ons stored? • Printing NATO classified is a last _____. • US-marked information _____ overrides NATO-marked information. • ATOMAL material must be filed ________ from non-ATOMAL material. • When NATO was formed in 1949, how many member countries were there? • ...
Safety Week 2021 2021-09-08
Across
- being aware of your surroundings
- A safe location in a high wind or tornado situation
- Who sends out safety messages on Pulse?
- Options in an active shooter situation
- what animal do you walk like on snow or ice?
- What is the name of the suicide project?
Down
- What is the name of DMU's emergency text system?
- Who do you contact with a COVID situation?
- who you call if you need a security escort
- Short for Floor Emergency Coordinators
- what you should have in your home to put out fires
- short for wireless emergency alerts
- Short for Automatic External Defibulator
13 Clues: being aware of your surroundings • short for wireless emergency alerts • Short for Floor Emergency Coordinators • Options in an active shooter situation • Who sends out safety messages on Pulse? • Short for Automatic External Defibulator • What is the name of the suicide project? • Who do you contact with a COVID situation? • who you call if you need a security escort • ...
PE&TS Q3 Team Meeting 2023-09-07
Across
- IT Control Management
- Information for Risk Assessor Dashboard
- Unauthorized Software Detection & Investigation
- I am the guardian of Privileged Access Management
- System Security General Practices
- I completed my COMPTIA certification with flying colors!
- You don't want to mess with me. I got a Purple belt in Jujitsu
Down
- I celebrated my national day on 7th September!
- Security, Privacy, Availability, Confidentiality, Process Integrity
- IT objects ownership data extraction by individual in scope
- I make sure the 'Big Red Button' is ready
- IT objects ownership data extraction by functional organization in scope
- IT System Information Request
13 Clues: IT Control Management • IT System Information Request • System Security General Practices • Information for Risk Assessor Dashboard • I make sure the 'Big Red Button' is ready • I celebrated my national day on 7th September! • Unauthorized Software Detection & Investigation • I am the guardian of Privileged Access Management • ...
Airport Crossword 2023-01-26
19 Clues: gate • flight • airport • monitor • to land • arrival • to board • bus stop • passenger • to take off • baggage claim • train station • tourist office • to get in line • to take a taxi • flight attendent • to chekc ones luggage • to go through customs • to go through security
Aviation 2024-06-08
20 Clues: ramp • cabin • agent • stairs • traffic • service • officer • operator • Aviation • explosive • organisation • passenger what • a sort of system • a sort of security • kind of operations • a kind of traveller • everyone has access • a kind of traveller • ministry of something • only travellers have access
On the Go 2_U4:s.99 2022-02-23
Presidency 2022-12-18
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
american gov 2022-12-19
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
iot puzzle 2016-11-04
Across
- kslaòjf faklf fkal akl
- dlaòkflsdòàakflòdsà
- kdlòajfkdl kflaò
- dkl jkdlsaò jklsaò
- fskdlaòjfk fjkalò
- kfldsòa fkal
- dklajfkdas fksaljfkdlaj akl
- jkfdlaò kd fjkdla djkal
- kjfdslajfk fkal
- dklaòjfkdlsaòjfkdlòa
- dkjòaf fkjahfjdk jksla
Down
- fdslaòfkdslòajn klò
- fjkajka fdkla fdkla
- kflòajkf jfklaò
- jfkdsòlajfkl
- fdklaòfjkdsla
- flaòjfkldaò kalòjfkdl
- kdlaòjf kflajf lkasò
- kfldsòajfka kdlajfkds
- fdlkòajfklasdòj kalfòjkdsal
20 Clues: jfkdsòlajfkl • kfldsòa fkal • fdklaòfjkdsla • kflòajkf jfklaò • kjfdslajfk fkal • kdlòajfkdl kflaò • fskdlaòjfk fjkalò • dkl jkdlsaò jklsaò • fdslaòfkdslòajn klò • fjkajka fdkla fdkla • dlaòkflsdòàakflòdsà • kdlaòjf kflajf lkasò • dklaòjfkdlsaòjfkdlòa • flaòjfkldaò kalòjfkdl • kslaòjf faklf fkal akl • kfldsòajfka kdlajfkds • dkjòaf fkjahfjdk jksla • jkfdlaò kd fjkdla djkal • ...
MSLA/Ttec Crossword #3 2018-02-08
Across
- facilities
- Initial Training In
- Teletech's sister company
- Veteran's only one
- allowed edible item
- encryption tab
- DX fax
- days
- compiles records
Down
- documentation type
- two to four in the afternoon
- unique identification in CMS
- icon description
- love
- circle
- contacted veteran
- personal storage
- pending worksheet
- west florida
- scheduled appointment DX
20 Clues: love • days • circle • DX fax • facilities • west florida • encryption tab • icon description • personal storage • compiles records • contacted veteran • pending worksheet • documentation type • Veteran's only one • Initial Training In • allowed edible item • scheduled appointment DX • Teletech's sister company • two to four in the afternoon • unique identification in CMS
Gateway A1+ Unit 5 Vocabulary 2023-03-21
Across
- otsingumootor
- salvestama
- sotsiaalvõrgustik
- igav, tüütu
- ühendus, seos
- salasõna
- rakendus
- alla laadima
- kõlar
- eemaletõukav, kole
- hiir
Down
- ekraanisäästja
- printima
- turvalisus
- taust
- puuteplaat
- mitte lahke, ebasõbralik
- klaviatuur
- kopeerima
- monitor, kuvar
- arvutid
- edasi andma, edastama
- veebileht
- viirus
- suurus
- suusk, suusatama
- rahulik
- blogi, veebipäevik
28 Clues: hiir • taust • kõlar • viirus • suurus • arvutid • rahulik • printima • salasõna • rakendus • kopeerima • veebileht • turvalisus • salvestama • puuteplaat • klaviatuur • igav, tüütu • alla laadima • otsingumootor • ühendus, seos • ekraanisäästja • monitor, kuvar • suusk, suusatama • sotsiaalvõrgustik • eemaletõukav, kole • blogi, veebipäevik • edasi andma, edastama • mitte lahke, ebasõbralik
G1 2/14 2025-02-19
20 Clues: chance • do better • do a thing • very pure • makes light • area to live • lowest level • small houses • keep it safe • happy energy • sudden wonder • being oneself • make decisions • greater number • political system • show displeasure • written sentence • can do something • person in charge • social group, city
OL 5, Unit 3, Way in 2023-01-23
Across
- Verfassung
- Naturschutzgebiet
- Frieden
- die Niederländer
- gemischter Abstammung; Mischrasse
- Rhinozeros; Nashorn
- Nationalpark
- Landschaft
- Krieg
- Diamant
- Safari
- Sitz
- Löwe
Down
- bewachte Wohnanlage
- Südafrika
- trennen
- Sicherheit; Schutz; Wachdienst
- Gebiet; Revier
- demokratisch
- Südafrikaner; Südafrikanerin;
- Wahl
- Nation; Land; Staat
- Apartheid
23 Clues: Wahl • Sitz • Löwe • Krieg • Safari • Frieden • trennen • Diamant • Südafrika • Apartheid • Verfassung • Landschaft • demokratisch • Nationalpark • Gebiet; Revier • die Niederländer • Naturschutzgebiet • bewachte Wohnanlage • Rhinozeros; Nashorn • Nation; Land; Staat • Südafrikaner; Südafrikanerin; • Sicherheit; Schutz; Wachdienst • gemischter Abstammung; Mischrasse
En el aeropuerto 2025-11-03
20 Clues: line • ticket • customs • carryon • delayed • on time • to check • schedule • to frisk • round trip • to check in • boarding pass • to be in order • security check • to miss a flight • ahead of schedule • luggage assistant • to catch a flight • to have a layover • baggage claim ticket
All About Ryan 2026-01-22
27 Clues: Pet • Blanket • Iowa____ • Ford____ • Bike____ • Lake____ • Polar____ • Cyber____ • Water____ • Juicy____ • Wrist____ • Indoor____ • Instrument • Acting Role • Outdoor____ • Chamber____ • Instrument 4 • Instrument 3 • Instrument 5 • Spaceman Toy • Kentucky____ • Montreal____ • Instrument 2 • Kicking Sport • Travel Abroad • Stuffed Animal • Superhero Costume
A Viajar--En el Avión y Aeropuerto y Otras Maneras a Viajar 2026-02-26
26 Clues: boat • gate • seat • tail • wing • train • aisle • cabin • flight • window • counter • cockpit • customs • arrivals • campsite • platform • departure • cruise ship • immigration • RV or Camper • baggage claim • in the center • train station • in the middle • security (TSA) • terminal waiting area
Topaz Driller Crossword #6 2017-12-09
Across
- Hands off the _ _ _ _!?
- During well testing we use the _ _ _ _ _ system when we go on the deck.
- What device separates the solids and cuttings from the drilling mud?
- Hands on the Correct _ _ _ _ for the task!
- Australian Toolpushers first name?
- How many pedestal cranes are there on the Topaz?
- It is a workplace hazard on the VOC card?
Down
- Who is the 'cyber cementer'???
- What does SWL stand for?
- What do we ALWAYS wear to protect our eyes at work?
- Indonesian for 'Aware' is?
- If you think the job is unsafe what do YOU do?
- What MUST we do with our rubbish to help the environment?
- First name of the Rig Manager?
14 Clues: Hands off the _ _ _ _!? • What does SWL stand for? • Indonesian for 'Aware' is? • Who is the 'cyber cementer'??? • First name of the Rig Manager? • Australian Toolpushers first name? • It is a workplace hazard on the VOC card? • Hands on the Correct _ _ _ _ for the task! • If you think the job is unsafe what do YOU do? • How many pedestal cranes are there on the Topaz? • ...
Crossword 2015-02-18
JUMPING THE LIGHTS 2023-12-05
15 Clues: ZBS • zugeben • wohnhaft • übersehen • Fahrverbot • abstreiten • Haltelinie • beobachten • Ampelanlage • Betroffener • Rotlichtverstoß • Anzeigenformular • Sicherheitsleistung • Zustellungsbevollmächtigter • bei Rot über die Ampel fahren
Thanksgiving 2023-11-17
Across
- Thanksgiving always lands on this day of the week
- one of the 4 seasons (fall)
- this pie is a special treat for the holidays
- this goes over mashed potatoes
- green bean ___ is a good way to eat your veggies
- a popular alternative or companion to a turkey
- the main food served at Thanksgiving
- Black ___ provides great deals after thanksgiving
Down
- this side dish is primarily made with bread
- cyber ___ also provides great deals on electronics
- this red fruit can be served as a jelly or sauce
- the main way potatoes are served
- before you start cooking, you can watch the famous Macy's Thanksgiving Day ___
- ___ potato pie is famous in the south for having marshmallows on top
- a large meal
15 Clues: a large meal • one of the 4 seasons (fall) • this goes over mashed potatoes • the main way potatoes are served • the main food served at Thanksgiving • this side dish is primarily made with bread • this pie is a special treat for the holidays • a popular alternative or companion to a turkey • this red fruit can be served as a jelly or sauce • ...
Airman Support 2026-02-02
Across
- Supports families with PCS, deployment, and financial readiness
- Helps Airmen register and vote while deployed or PCS'd
- Investigates complaints and protects Airmen's rights
- Provides legal assistance, wills, and claims help
- Offers short-term, confidential non-medical counseling
- Provides legal defense separate from command
- Supports victims and educates to prevent sexual assault
- Promotes fair treatment and handles discrimination complaints
Down
- Diagnoses and treats psychological conditions for Airmen
- Helps with GI Bill, disability claims, and transition to civilian life
- Investigates crimes like fraud, assault, and cyber threats
- Provides emergency loans and financial aid to Airmen
- Guides Airmen on tuition assistance and degree planning
- Provides spiritual care, counseling, and religious services
- Handles prevention and response to family maltreatment
15 Clues: Provides legal defense separate from command • Provides legal assistance, wills, and claims help • Investigates complaints and protects Airmen's rights • Provides emergency loans and financial aid to Airmen • Helps Airmen register and vote while deployed or PCS'd • Handles prevention and response to family maltreatment • ...
Executive Branch, Presidency 2022-12-06
14 Clues: Order • Policy • System • System • College • Security • Agencies • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers
Executive Branch 2022-12-15
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
TH CROSSWORD #1 2022-08-18
Across
- Condition of market when economy is receding and most stocks are declining in value
- Asset must be greater than ...... ?
- Where does wuquf take place?
- The month of Eid al-Adha
Down
- The framework that upholds Maqasid Shariah principle
- Commitment to safeguard ESG
- Cyber attack that attempts to steal your money or identity and personal information
- The first protection in Maqasid Shariah
8 Clues: The month of Eid al-Adha • Commitment to safeguard ESG • Where does wuquf take place? • Asset must be greater than ...... ? • The first protection in Maqasid Shariah • The framework that upholds Maqasid Shariah principle • Cyber attack that attempts to steal your money or identity and personal information • ...
E-Safety Extravagance 2020-05-07
Across
- A video game that is multiplayer.
- a physical/mental/verbal or cyber offences repeated.
- something that is secret to only you
- A fear of missing out. Usually online.
Down
- Fake emails people send.
- a fraud who makes a new identity to fit in
- news news posted on social media that is made up.
- a long sequence of symbols that protects info
8 Clues: Fake emails people send. • A video game that is multiplayer. • something that is secret to only you • A fear of missing out. Usually online. • a fraud who makes a new identity to fit in • a long sequence of symbols that protects info • news news posted on social media that is made up. • a physical/mental/verbal or cyber offences repeated.
Crossword Puzzle 2022-09-21
Across
- Managed ? solutions detects and mitigates cyber-attacks and data loss.
- The Name of Huawei Smartboard
- Up to ?% PSG subsidy
- Eemont can help businesses ? Office Networks
Down
- When you move offices, data and networks need to be ? over.
- The Name of your one-stop solution provider
- Is CloudEngine S5731-S48P4X PoE+ Supported?
7 Clues: Up to ?% PSG subsidy • The Name of Huawei Smartboard • The Name of your one-stop solution provider • Is CloudEngine S5731-S48P4X PoE+ Supported? • Eemont can help businesses ? Office Networks • When you move offices, data and networks need to be ? over. • Managed ? solutions detects and mitigates cyber-attacks and data loss.
Religion 2022-06-01
Across
- type de violence morale, physique et/ou psychologique.
- souci, sujet qui inquiète une personne
- période pendant laquelle notre corps change sans qu'on le comprenne
Down
- personne qui est harcelée
- réseau social sur lequel on constate souvent du harcèlement
- animal auquel on compare un jeune
- lieu où le cyber-harcèlement se passe
7 Clues: personne qui est harcelée • animal auquel on compare un jeune • lieu où le cyber-harcèlement se passe • souci, sujet qui inquiète une personne • type de violence morale, physique et/ou psychologique. • réseau social sur lequel on constate souvent du harcèlement • période pendant laquelle notre corps change sans qu'on le comprenne
Cyber-Mobbing 2019-05-07
7 Clues: Derjenige der die Tat ausübt • Worauf soll man im Netz achten? • ein anderes Wort für World Wide Web • Wo soll man sich als Opfer Hilfe holen? • Was sollst du tun wenn du ein Mobbingopfer siehst? • Internetseite zur Entfernung von peinlichen Bildern • Wozu kann Cyber-Mobbing im schlimmsten Fall führen?
Tantangan Kecil 2023-08-08
Across
- mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
- bentuk perundungan melalui media elektronik
- Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
- perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
Down
- sisi negatif gawaihcfcbc
- manfaat gawai adalah sebagai alat...
- salah satu dampak negatif bully
7 Clues: sisi negatif gawaihcfcbc • salah satu dampak negatif bully • manfaat gawai adalah sebagai alat... • bentuk perundungan melalui media elektronik • perangkat elektronik seperti hp, laptop, dan tablet disebut juga... • mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying • ...
Tantangan Kecil 2023-08-08
Across
- sisi negatif gawai
- mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
- manfaat gawai adalah sebagai alat...
Down
- bentuk perundungan melalui media elektronik
- perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
- Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
- salah satu dampak negatif bully
7 Clues: sisi negatif gawai • salah satu dampak negatif bully • manfaat gawai adalah sebagai alat... • bentuk perundungan melalui media elektronik • perangkat elektronik seperti hp, laptop, dan tablet disebut juga... • mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying • ...
CGE653 PUZZLE CHAPTER 1 2025-03-24
Across
- A measure of human injury, environmental damage, or economic loss in terms of both the
- Department of Environment
- Social Security Organisation is a government agency that implements and administer the social security schemes under the Employees' Social Security Act.
- The absence of: (i) injury and harm on human and (ii) damage on property and the environment
- A state of physical and mental well-being – including the absence of disease or
- likelihood and the magnitude of the loss or injury
- National Institute of Occupational Safety and Health - The centre for training, consultancy, information dissemination and research in occupational safety and health in Malaysia
Down
- Persistent, prolonged and repeated
- Department of Occupational Safety and Health
- Immediate, short term
- A sequence of events that produce unintended injury, damage to property or the environment, production losses, or increased liabilities
11 Clues: Department of Environment • Immediate, short term • Persistent, prolonged and repeated • Department of Occupational Safety and Health • likelihood and the magnitude of the loss or injury • A state of physical and mental well-being – including the absence of disease or • A measure of human injury, environmental damage, or economic loss in terms of both the • ...
Computer Systems crossword 2014-09-09
occupation 2022-09-29
Science Project 2020-11-17
Chapter 2 - Methods of Security Attacks 2025-08-11
Across
- The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
- The act of listening in on a conversation or monitoring network traffic.
- A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
- The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
- A type of attack where the attacker is physically close to the target system.
- A form of social engineering attack over Voice over IP (VoIP).
- Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
- A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
- A type of attack that relies on persuading a person to reveal information.
- Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
- A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
- A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
- A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
- A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
- A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
- Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
- The process of an attacker gathering information about a network for a future attack.
- A specific type of spear phishing aimed at high-level executives or important individuals.
- Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
- An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.
20 Clues: A form of social engineering attack over Voice over IP (VoIP). • The act of listening in on a conversation or monitoring network traffic. • A type of attack that relies on persuading a person to reveal information. • A type of attack where the attacker is physically close to the target system. • ...
CRUCIBOZZA 2022-10-20
Across
- E' il tuo noleggiatore di Ebike preferito
- Il tuo chef di risotti preferito
- Dove passa il Po'?
- Dove hai compiuto atti osceni in luogo pubblico (con la Cri)?
- ...Specializzazione medica più adatta per te
- Dall'alto della tua preparazione in Ortopedia: qual'è l'osso più grande del carpo?
Down
- Altezza della Mole Antonelliana
- Il tuo Cyber partner
- ...Non è il tuo forte
- Per verificare il tuo 30L in Neuro: come si chiama la via della sensibilità?
- Dov'eri quando sei diventata uno "scoglio"?
- La maneggerà Riccardo nei prossimi anni
- Dov'eri quando ti è stato offerto un pezzo di legno per dormire?
- Dov'eri quando un gruppo di uomini ti hanno soccorsa?
- Recentemente ne hai preso uno MOLTO grosso
- Stefano ed Alfo ne hanno mangiate 2kg a testa un giorno
16 Clues: Dove passa il Po'? • Il tuo Cyber partner • ...Non è il tuo forte • Altezza della Mole Antonelliana • Il tuo chef di risotti preferito • La maneggerà Riccardo nei prossimi anni • E' il tuo noleggiatore di Ebike preferito • Recentemente ne hai preso uno MOLTO grosso • Dov'eri quando sei diventata uno "scoglio"? • ...Specializzazione medica più adatta per te • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Wireless technology used to interconnect mobiles computers etc
- Refers to unwanted bulk emails that come from unknown sources
- Practice of protecting digital information
- Network topology with a central hub
Down
- It is a combination of two terms 'net' and 'etiquette'
- The process of transforming data into an unreadable code
- Type of cyber attack that tricks users
- Refers to an illegal intrusion into a computer system or network
- Device that connects multiple networks
9 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
Bullying Ward 2025-05-05
Across
- Someone who does mean things to someone less powerful than them.
- This type of verbal bullying makes someone feel unsafe.
- Sending someone mean messages over and over.
- Repeatedly excluding someone to be mean.
- Hurtful words are used in this type of bullying.
Down
- Someone who watches the bullying but doesn't help.
- This type of bullying can hurt someone's body.
- Someone who is helpful toward the person being bullied.
- The person who someone tries to bully.
9 Clues: The person who someone tries to bully. • Repeatedly excluding someone to be mean. • Sending someone mean messages over and over. • This type of bullying can hurt someone's body. • Hurtful words are used in this type of bullying. • Someone who watches the bullying but doesn't help. • This type of verbal bullying makes someone feel unsafe. • ...
Ch3 Actividades y Personas en la escuela 2022-03-08
19 Clues: to help • to work • to walk • to study • to dance • to visit • to teach • the coach • the nurse • to practice • to eat lunch • the custodian • the counselor • the secretary • the principal • to participate • to take the bus • the security guard • to play an instrument
security 2013-01-17
security 2023-11-16
Security 2022-08-10
5 Clues: it Sees what you don't • feels real when you're asleep • What keeps a door secured tightly • Cannot unlock anything without one • indestructible neither created but transferred from one form to another
Threats to Cyber Secruity 2017-10-09
Across
- Shoulder surfing, direct observation techniques like looking over a shoulder
- Scamming practise where malicious code is installed on to a personal computer record are modified and misdirects users to fraudulent websites
- The art of manipulating people so they give up their personal information
- Appears to be something wanted but is a standalone malicious software designed to give full control of the PC
- Spyware that logs keys used and collets data from affected computer
- Encourages users to enter confidential data by pretending to be a trust worthy source
- Usually popups, main aim to generate revenue for author
Down
- Types of malware installed on computer system that collects information without user being aware, is hidden and secretly installed
- Self-replicating program that attaches onto to existing programs and can easily spread
- The acts of using and creating an invented scenario to engage victim into giving the information
- Making the computer or network unavailable to user (DoS)
- Loss or theft of devices
- The term to describe the protection of information systems from theft unauthorised access or damage to hardware, software and information on them
- Standalone computer program that replicates itself so it can spread onto a network. Does NOT attach to a program
- Finding a weakness in an established system
15 Clues: Loss or theft of devices • Finding a weakness in an established system • Usually popups, main aim to generate revenue for author • Making the computer or network unavailable to user (DoS) • Spyware that logs keys used and collets data from affected computer • The art of manipulating people so they give up their personal information • ...
Cyber Basics & Common Threats 2025-10-07
Across
- Software designed to harm or exploit a system
- Network of infected computers controlled remotely
- Malware that locks data and demands payment
- Software that secretly collects user data
- Process of converting information into code
- Software update to fix vulnerabilities
- Malware designed to hide other malicious software
Down
- A secret string of characters used for authentication
- Self-replicating malicious program
- Malicious software disguised as legitimate
- A security barrier between trusted and untrusted networks
- Taking advantage of a vulnerability
- Hidden entry point into a system
- Software that detects and removes malicious code
- Fraudulent attempt to steal sensitive data via fake email
15 Clues: Hidden entry point into a system • Self-replicating malicious program • Taking advantage of a vulnerability • Software update to fix vulnerabilities • Software that secretly collects user data • Malicious software disguised as legitimate • Malware that locks data and demands payment • Process of converting information into code • ...
