cyber security Crossword Puzzles
Health 2025-05-13
Across
- adding a regular physical activity into daily life
- keeping your body healthy by showering, wearing deodorant,and brushing your teeth.
- people who are related to you and you can rely on
- a key step in having good physical health
- people you can rely on when things are bad
- the state of being healthy in physical mental and social
- the state of being ill
Down
- state of complete physical, mantal, and social well-being.
- provides essential nutrients for maintaining and improving overall health
- the condition of being physically fit and healthy.
- how you feel and your emotions.
- sadness, happiness, anger
- eating health and getting enough sleep.
- people who bully online
- your friend and family relationships.
15 Clues: the state of being ill • people who bully online • sadness, happiness, anger • how you feel and your emotions. • your friend and family relationships. • eating health and getting enough sleep. • a key step in having good physical health • people you can rely on when things are bad • people who are related to you and you can rely on • ...
CM-BCMS 2025-04-04
Across
- Harmful software that infiltrates and disrupts systems
- A sudden event causing disruption or harm to operations
- Fraudulent phone calls designed to extract sensitive details
- Analyzing potential risks to prepare for future challenges
- A critical situation requiring urgent decision-making
- Framework ensuring operations continue despite challenges.
- Potential actions that compromise digital safety
- A technique used to take advantage of system vulnerabilities
- Interconnected systems for sharing resources and information
- A state of readiness to effectively manage crises
- The process of converting information into secure code
Down
- Verifying a user’s identity to ensure security
- The capacity to adjust quickly to changing situations
- Steps taken to reduce the impact of potential risks
- Restoring critical business operations after a crisis
- The ability to adapt and recover during disruptions
- A security barrier protecting networks from external threats
17 Clues: Verifying a user’s identity to ensure security • Potential actions that compromise digital safety • A state of readiness to effectively manage crises • Steps taken to reduce the impact of potential risks • The ability to adapt and recover during disruptions • The capacity to adjust quickly to changing situations • ...
Crossword Puzzle on Cybersecurity 2026-01-20
Across
- Umbrella term for malicious software.
- Code or technique used to take advantage of a vulnerability.
- Fraudulent attempt to obtain sensitive information through deception.
- Malicious program that records keystrokes.
- Unknown vulnerability with no available patch.
- Security technique that executes programs in an isolated environment.
- Process of verifying a user's identity.
- One-way process used to securely store passwords.
- A weakness that can be exploited by an attacker.
- Harmful component delivered by malware.
Down
- Security device that filters network traffic based on rules.
- Technique used to protect data by converting it into unreadable form.
- Malware designed to hide itself and maintain privileged access.
- Malware that encrypts files and demands payment.
- Group of compromised systems controlled remotely.
- Defines what an authenticated user is allowed to do.
- Unauthorized attempt to access a system.
17 Clues: Umbrella term for malicious software. • Process of verifying a user's identity. • Harmful component delivered by malware. • Unauthorized attempt to access a system. • Malicious program that records keystrokes. • Unknown vulnerability with no available patch. • Malware that encrypts files and demands payment. • A weakness that can be exploited by an attacker. • ...
Español 2014-10-06
Confidentiality test 2025-02-06
Across
- Data records of an employee’s performance on the job such as performance reports,
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of espionage conducted for commercial purposes rather than security;
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
- in the Workplace keeping employee, customer and client information private
Down
- work history, date of birth, social security number, criminal record,
- religion, etc.
- information
- insurance information
- Espionage
- Data information which may arise from employment-related physicals, drug tests and
12 Clues: Espionage • information • religion, etc. • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • of espionage conducted for commercial purposes rather than security; • work history, date of birth, social security number, criminal record, • ...
IR - Module 1 2024-12-05
Across
- US and ----- were the superpowers emerged after WWII
- The period from 1945-1991
- The IGO formed after WW 2
- This level of IR analysis states that single countries can influence IR
- The process of managing / governing people in a place.
- The treaty to punish Germany is
- The relationship between nation states is called
- The second name of the person behind systems theory.
- Promote peace and security among nations, Kill evils in the society.
- Looting one country by another country is
Down
- Treaty of ---- was signed on 1648
- ..... conference was held in 1919 Jan
- The process of making slaves and setting empire is called
- The treaty to end war on Spanish succession was ..... treaty.
- Germany, Austria-Hungary, Italy
- German ruler during WW I
- Nation security is a matter of importance and selfishness
- This level of IR analysis says that a single person can influence in IR
18 Clues: German ruler during WW I • The period from 1945-1991 • The IGO formed after WW 2 • Germany, Austria-Hungary, Italy • The treaty to punish Germany is • Treaty of ---- was signed on 1648 • ..... conference was held in 1919 Jan • Looting one country by another country is • The relationship between nation states is called • US and ----- were the superpowers emerged after WWII • ...
Diary Of A Wimpy Kid 2024-04-11
Across
- what did Greg want to do for Christmas?
- what did mom and dad always do?
- what did Greg want to swim with at the beach
- What kept Greg awake?
- What did Greg think he swallowed in the water?
- Who helped Greg escape security?
- How did the Heffley's get to Isla de corales?
- What did Manny steal from the beach?
- What happened to the banana raft?
Down
- When did the Heffley's leave their home?
- How did they find out about the resort?
- what did the Heffleys steal from the security to run away?
- when should have the Heffley's left to get to the airport
- what would Greg rather do then go on vacation?
- who is the author?
- what did the Heffley's grab the wrong of
- What kind of animal was at the resort bar?
- Who is the main character?
18 Clues: who is the author? • What kept Greg awake? • Who is the main character? • what did mom and dad always do? • Who helped Greg escape security? • What happened to the banana raft? • What did Manny steal from the beach? • How did they find out about the resort? • what did Greg want to do for Christmas? • When did the Heffley's leave their home? • ...
vocab 2023-01-25
Across
- where securities are created,
- a digital system that matches buyers and sellers looking to trade securities in the financial markets.
- a security—usually a bond or a preferredstock stock that can be converted into a different security—typically shares of the company's common stock.
- A class of stock that is granted certain rights that differ from common stock.
- a pooled collection of assets that invests in stocks, bonds, and other securities.
- securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
- funds that trade on exchanges, generally tracking a specific index.
- provide liquidity and depth to markets and profit from the difference in the bid-ask spread.
- A type of tradeable asset, or security, that equates to ownership in a company.
- You have a capital gain if you sell the asset for more than your adjusted basis.
- A group of 500 companies whose average daily share prices are used to calculate an index of the day's security prices.
- the annual income an investor can expect to receive while holding a particular bond.
- The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
- a group or basket of securities, derivatives, or other financial instruments that represents and measures the performance of a specific market, asset class, market sector, or investment strategy.
- when a private company becomes public by selling its shares on a stock exchange.
- a real estate metric that indicates the value of a mutual fund or an exchange-traded fund
- where those securities are traded by investors.
- a price-weighted index that tracks 30 large, publicly-owned companies trading on the New York Stock Exchange and the Nasdaq.
Down
- the rate of return on a bond investment.
- An individual can become an accredited investor if he or she has a net worth of over $1M, alone or with a spouse.
- date the moment in time when the principal of a fixed income instrument must be repaid to an investor
- The practice of spreading your investments around so that your exposure to any one type of asset is limited.
- the process companies use to raise money by selling securities to a limited number of potential investors.
- a forum where securities like bonds and stocks are purchased and traded.
- A filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws.
- used by governments or companies to raise money by borrowing from investors.
- Your lender verifies your income, assets, debt and property details in order to issue final approval for your loan.
- a sale or equity shares or debt securities by an organization to the public in order to raise funds for the company.
28 Clues: where securities are created, • the rate of return on a bond investment. • where those securities are traded by investors. • funds that trade on exchanges, generally tracking a specific index. • a forum where securities like bonds and stocks are purchased and traded. • used by governments or companies to raise money by borrowing from investors. • ...
Agility 2017 2017-04-24
Across
- The worlds first search engine for internet-connect devices
- A mechanism whereby a brwoser uses a raw data channel to communicate with a server
- F5 REST API Framework
- Software used to disrupt a computer and/or gather sensitive data
- revolutionary new purpose built security appliance "DDoS hybrid _______"
- How unique am I? can my device be distinguished from others?
- This very conference
- "______ IT" the people who provision Apps and Services without authorisation
- How Websafe makes data unintelligible for the fraudsters
- Moving multiple Point solutions on to F5 Application Services Fabric
- The key management tool on the journey to the Private cloud
- Where to store objects for future use
- F5's event driven scripting language
- What film inspired the naming of F5?
- How to get a non-routable protocol over a routed network
- A fundemental principle of security to be able to see all your application traffic
- An arbitrary number that may only be used once
- Leverage machine learning and Data analysis for a new type of DoS mitigation
- "App _________" used to dramatically simplify the deliver of services to public cloud apps
- American in exile in Russia
- "______ authentication" allows a second level of access through APM
- used to speed up deployments and streamline operations
- The key you don't want anyone to have
Down
- "_____engineering" exploits layer 8
- F5 Developer community
- The best way to secure data in transit
- The worlds most programmable cloud ready ADC
- The most destruptive botnet created to date
- The layer of the OSI model that hackers love to exploit
- hackers newest minions are what type of device
- How to protect past sessions against future compromises of keys
- A combination of multiple Clouds or Consumption models
- A free webservice offered by Qualys to check your websites SSL security
- Delivering business requirements through infrastructure automation
- Ensure point in time data integrity
- Using Code to automate tasks
- Protects LDNS servers from Cach poisoning and MITM attacks
- A secure Key exchange methodology conceptualized by Ralph Merkle
- The query response type offered by F5 DNS Express
- The key you want everyone to have
- F5's all new purpose built security appliances
- Journalist recently hit with record DDoS
- Unique hardware performance flexibility in the new iSeries appliances
- Market leading Cloud-based Application Services Platform
- An network built on top of another network
- Maximise security strength while minimising key length
- Best known form of digital currency
- Don't get stung by their App Sec top 10
- ASM's automagical system to ensure only human web access "________ Bot Defence"
- The algorithm use to disguise data or code
- The collaboration of programmers and IT administrators
- An attack designed to disrupt the availability of systems or services
52 Clues: This very conference • F5 REST API Framework • F5 Developer community • American in exile in Russia • Using Code to automate tasks • The key you want everyone to have • "_____engineering" exploits layer 8 • Ensure point in time data integrity • Best known form of digital currency • F5's event driven scripting language • What film inspired the naming of F5? • ...
jada's crossword 2021-06-24
6 Clues: the use of words • the use of bullying online • A different word for feelings • an emotional bond between people • somebody that continuously hurts someone or their feelings • somebody that knows about someone being bullied but does not do anything
engineer 2021-10-26
Across
- the principles of Mechanics and Materials science for analysis, design, manufacturing,
- of analysis methods and the development of systems to ensure products or services
- to find the best safe performance balance,
- a detailed study of engineering to the design, development and maintenance of software.
- assures that engineered systems provide acceptable levels of safety.
- helps with their service
- monitors everything
- engineer
- engineer
- Administer and resolve all technical maintenance issues.
- manufacturing processes by studying product requirements
Down
- an engineering discipline for applying scientific know-how to a component, product, plant, or process
- helps with network
- the branch of engineering that deals with the technology of electricity.
- does everything on computer
- an engineer who designs and maintains roads, bridges, dams, and similar structures.
- does maintenance
- solves solutions
- the position of the frontend engineer focuses on making websites friendly and functional to its user
- helps with uniforms
20 Clues: engineer • engineer • does maintenance • solves solutions • helps with network • monitors everything • helps with uniforms • helps with their service • does everything on computer • to find the best safe performance balance, • Administer and resolve all technical maintenance issues. • manufacturing processes by studying product requirements • ...
Collocations 2023-04-06
12 Clues: errors • issues • updates • systems • problems • to tickets • user requests • troubleshooting • software systems • technical support • security measures • customer complaints
Puzzle 2014-01-07
Dan sigurnijeg interneta 2022-02-11
Across
- Koja je kratica short message service?
- Djevojke često koriste internet radi...
- Koja je kratica Internacionalne policijske asocijacije?
- O kojoj su mreži djeca ovisna?
- Kako se na engleskom zove nasilje na internetu?
Down
- Koja je kratica online igre s velikim brojem igrača?
- Koja je kratica programa i seek you?
- Koja mreža je svjetska komunikacijska mreža?
- Koji predmet je prva stvar koju ljudi pogledaju ujutro i zadnja prije nego odu na spavanje?
- Kome se trebamo obratiti ako se naiđemo u cyber bullingu?
10 Clues: O kojoj su mreži djeca ovisna? • Koja je kratica programa i seek you? • Koja je kratica short message service? • Djevojke često koriste internet radi... • Koja mreža je svjetska komunikacijska mreža? • Kako se na engleskom zove nasilje na internetu? • Koja je kratica online igre s velikim brojem igrača? • Koja je kratica Internacionalne policijske asocijacije? • ...
perundungan 2022-08-24
Across
- gangguan kecemasan dan perasaan ketakutan yang berlebih
- bentuk perundungan melalui kata-kata yang menyakitkan
- perasaan tidak percaya diri, tidak aman, dan keraguan
- orang pertama yang memperkenalkan konsep bullying pada tahun 1973
- tekanan psikologis akibat peristiwa kelam masa lalu
Down
- tipe kepribadian yang menyukai waktu dan energi untuk sendiri.
- bentuk perundungan melalui jejaring sosial
- kata asal Bullying dalam bahasa Inggris
- penindasan oleh kaum superior dengan sengaja Sosial bentuk perundungan dengan pengucilan dan intimidasi
9 Clues: kata asal Bullying dalam bahasa Inggris • bentuk perundungan melalui jejaring sosial • tekanan psikologis akibat peristiwa kelam masa lalu • bentuk perundungan melalui kata-kata yang menyakitkan • perasaan tidak percaya diri, tidak aman, dan keraguan • gangguan kecemasan dan perasaan ketakutan yang berlebih • ...
Bullying Ward 2 2025-05-05
Across
- Someone who does mean things to someone less powerful than them.
- This type of verbal bullying makes someone feel unsafe.
- Sending someone mean messages over and over.
- Repeatedly excluding someone to be mean.
- Hurtful words are used in this type of bullying.
Down
- Someone who watches the bullying but doesn't help.
- This type of bullying can hurt someone's body.
- Someone who is helpful toward the person being bullied.
- The person who someone tries to bully.
9 Clues: The person who someone tries to bully. • Repeatedly excluding someone to be mean. • Sending someone mean messages over and over. • This type of bullying can hurt someone's body. • Hurtful words are used in this type of bullying. • Someone who watches the bullying but doesn't help. • This type of verbal bullying makes someone feel unsafe. • ...
Economist CBCIS Crossword 2018-11-16
Across
- Economist "?", morning briefing from the editors. Delivered to your smartphone or inbox before breakfast.
- Our data design agency, located in Stratford, London.
- A technique used by criminals to trick you into giving them your username and password
- Economist "?", expresses The Economist's globally curious outlook in the form of short, mind-stretching documentaries.
- We use Two-"?" authentication as an extra layer of security.
- "?" News Club, run by The Economist Foundation, bringing young people together across the UK to talk about current affairs.
Down
- New regulation implemented in 2018 for general data protection.
- Business unit acquired by The Economist in 2006, Connecting the global treasury community for over 25 years
- EIU, also known as The Economist "?" Unit
- "?"security@economist.com, the address too reach to should you require security advice.
- James "?", founder of The Economist in 1843.
11 Clues: EIU, also known as The Economist "?" Unit • James "?", founder of The Economist in 1843. • Our data design agency, located in Stratford, London. • We use Two-"?" authentication as an extra layer of security. • New regulation implemented in 2018 for general data protection. • A technique used by criminals to trick you into giving them your username and password • ...
gameshop 2014-05-19
16 Clues: chaos • score • manure • express • discharge • hereditary • about to be • tree hugger? • loose change • go ballistic • puzzle seller • e.g. rent-a-cops • ex. Chucky Cheese • a rubrik wheel-runner? • Florence and the _____ • a continuous transporter
DUST BOWL 2015-03-04
~Food Insecurity~ 2021-11-19
Across
- What is your teachers last name?
- Food insecurity happens often during what time of year?
- During the pandemic, food insecurity in households ---------.
- What meal do most schools provide for free or at a low cost?
Down
- How can high food security households help struggling households?
- How many categories of food security are there?
- What do you need in order to buy food?
- What type of food security is when you do not have any problems getting food?
8 Clues: What is your teachers last name? • What do you need in order to buy food? • How many categories of food security are there? • Food insecurity happens often during what time of year? • What meal do most schools provide for free or at a low cost? • During the pandemic, food insecurity in households ---------. • ...
Social Security Administration 2021-02-09
Across
- stuff you do at a job
- hard work, often physical
- the economic crisis of the 1930s
Down
- jobs given to artists to paint
- Programs to support the good of the people
- breakfast food
- the kind of people most likely to receive social security
- month that Social Security was signed into law
- The President during the 1930s
- The program signed into law by President Roosevelt in 1935
10 Clues: breakfast food • stuff you do at a job • hard work, often physical • jobs given to artists to paint • The President during the 1930s • the economic crisis of the 1930s • Programs to support the good of the people • month that Social Security was signed into law • the kind of people most likely to receive social security • ...
Information Risk Management Date:07/07/2015 2015-07-06
Across
- Potential cause of unwanted event
- form of identity management
- means of managing risk
- combination of likelihood of an event and its impact
- weakness of an asset that can be exploited
- measure of the effect of a security event
Down
- earthquake is a ________ threat
- checking whether the organization has required controls is _____________ audit
- secretly collect sensitive or classified information
- information security program is aligned to _____________ of organization
10 Clues: means of managing risk • form of identity management • earthquake is a ________ threat • Potential cause of unwanted event • measure of the effect of a security event • weakness of an asset that can be exploited • combination of likelihood of an event and its impact • secretly collect sensitive or classified information • ...
Basic Terminologies 2016-06-14
Across
- form of identity management
- weakness of an asset that can be exploited
- information security program is aligned to _____________ of organization
- means of managing risk
- measure of the effect of a security event
Down
- checking whether the organization has required controls is _____________ audit
- Potential cause of unwanted event
- secretly collect sensitive or classified information
- combination of likelihood of an event and its impact
- earthquake is a ________ threat
10 Clues: means of managing risk • form of identity management • earthquake is a ________ threat • Potential cause of unwanted event • measure of the effect of a security event • weakness of an asset that can be exploited • secretly collect sensitive or classified information • combination of likelihood of an event and its impact • ...
National Security Crossword 2025-10-22
Across
- SECURITY Law that helps keep Hong Kong safe.
- The rule makers who decide if the law has been broken.
- Opposite of danger.
Down
- People who follow rules.
- Something that is against the law.
- To protect or keep safe.
- A place where people live and follow laws.
- Rules that everyone must __________.
- A feeling when you are safe.
- What you should always do with laws.
10 Clues: Opposite of danger. • People who follow rules. • To protect or keep safe. • A feeling when you are safe. • Something that is against the law. • Rules that everyone must __________. • What you should always do with laws. • A place where people live and follow laws. • SECURITY Law that helps keep Hong Kong safe. • The rule makers who decide if the law has been broken.
Cold War in Europe 2021-05-05
Across
- U.S. would provide aid to any country fighting communism.
- Leader of the Soviet Union during WWII and cold war
- Churchill's description of invisible barrier
- U.S.policy to stop the spread of communism.
- Stalin uses East European countries his buffer
- East European collective security agreement
Down
- Meeting of the Big Three to discuss post-war europe
- United States economic assistance plan for Europe.
- willingness to go to the brink of war
- Nation New International Organization to keep peace
- West European collective security organization
- U.S. President at Yalta.
12 Clues: U.S. President at Yalta. • willingness to go to the brink of war • U.S.policy to stop the spread of communism. • East European collective security agreement • Churchill's description of invisible barrier • West European collective security organization • Stalin uses East European countries his buffer • United States economic assistance plan for Europe. • ...
Chapter 5 Sonia Hernandez Flores 2019-02-15
Across
- income - an income tax system that imposes tax
- - Done, Produced, or occurring every 2 weeks.
- - Provides the information of your employer needs to determine
- - An individual's Total Gross income minus specific deductions
Down
- include social security, Medicare
- - amount of money received after a period of time
- -subtraction
- Reports - An employees's annual wages and the other amount of taxes withheld
- - Used to report interest income
- - Taxes to fund the social security
- pay - of the types of deductions that may be subtracted from
- pay - amount payed after removed taxes.
12 Clues: -subtraction • - Used to report interest income • include social security, Medicare • - Taxes to fund the social security • pay - amount payed after removed taxes. • - Done, Produced, or occurring every 2 weeks. • income - an income tax system that imposes tax • - amount of money received after a period of time • ...
confidentiality test 2025-02-06
Across
- religion, etc.
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of information
- information
- Data records of an employee’s performance on the job such as performance reports,
- Data information which may arise from employment-related physicals, drug tests and
- insurance information
Down
- actions, supervisory notations
- in the Workplace keeping employee, customer and client information private
- set of rules or promises which limits access or places restrictions on certain
- Espionage form of espionage conducted for commercial purposes rather than security;
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
confidentiality test 2025-02-06
Across
- Data records of an employee’s performance on the job such as performance reports,
- religion, etc.
- in the Workplace keeping employee, customer and client information private
- or Sensitive Data
- set of rules or promises which limits access or places restrictions on certain
Down
- Data information which may arise from employment-related physicals, drug tests and
- information
- involves individuals hired to steal trade secrets, new products or
- Espionage form of espionage conducted for commercial purposes rather than security;
- of information
- actions, supervisory notations
- insurance information
- about an employee prior to employment such as a résumé,previous work history, date of birth, social security number, criminal record,
13 Clues: information • religion, etc. • of information • or Sensitive Data • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • in the Workplace keeping employee, customer and client information private • set of rules or promises which limits access or places restrictions on certain • ...
High Five 5 kpl 3 2024-10-01
unit 7 2022-10-06
Across
- a federal executive department of the United States government tasked with the enforcement of federal law
- one of two agencies that supply deposit insurance to depositors in American depository institutions
- domestic intelligence and security service of the United States
- the federal executive department responsible for developing and executing federal laws related to farming, forestry, rural economic development, and food.
- American scientific and regulatory agency within the United States Department of Commerce that forecasts weather
Down
- provides the military forces needed to deter war, and to protect the security of the United States
- the revenue service for the United States federal government
- an intergovernmental military alliance between 30 member states
- agency of the United States Department of Homeland Security
- the combination of communications and collaboration technologies.
10 Clues: agency of the United States Department of Homeland Security • the revenue service for the United States federal government • an intergovernmental military alliance between 30 member states • domestic intelligence and security service of the United States • the combination of communications and collaboration technologies. • ...
Childcare Software Security and Privacy: Safeguarding Children’s Data 2025-10-16
Across
- Ensuring personal and health information of children and families is protected.
- U.S. law that limits access to student records and protects education data.
- A review that checks if security and privacy measures are working properly.
- What parents must give to allow collection or sharing of their child’s information.
- Regularly saving data so it can be recovered if a breach or system failure occurs.
Down
- A security method that keeps children’s data safe by turning it into a code.
- An incident when unauthorized users access children’s private information.
- A security step where staff provide more than a password to access sensitive information.
- Law requiring childcare software to get parental consent before collecting children’s information online.
- The personal, health, and attendance information childcare software collects and stores.
10 Clues: An incident when unauthorized users access children’s private information. • U.S. law that limits access to student records and protects education data. • A review that checks if security and privacy measures are working properly. • A security method that keeps children’s data safe by turning it into a code. • ...
society 2025-11-12
crosss 2024-09-04
Across
- This cloud security model involves splitting data into encrypted parts that are stored in different locations, ensuring that no single provider has access to the entire dataset.
- What feature in AWS allows setting permissions for a user based on specific circumstances such as the user's IP address or the time they are accessing the service
- feature allows the enforcement of specific security policies, like requiring multi-factor authentication, for API interactions based on user actions and origins?
- mechanism ensures secure and temporary access to resources without storing long-term credentials, particularly in cross-account situations
- What AWS service provides protection against distributed denial-of-service (DDoS) attacks and integrates with CloudFront and Route 53?
Down
- Technique that spreads data across multiple servers to enhance security and reliability
- threat intel dashboard
- Azure interface for applications auditing adherence, Logs, exceptions, and custom diagnostics to fortify security oversight
- A method used to ensure that cloud users can only access resources they are authorized for
- Cloud service that offers firewalls, DDoS protection, and other network security measures
10 Clues: threat intel dashboard • Technique that spreads data across multiple servers to enhance security and reliability • Cloud service that offers firewalls, DDoS protection, and other network security measures • A method used to ensure that cloud users can only access resources they are authorized for • ...
Ethical hacking 2025-11-02
Across
- Hidden entry point into a system bypassing security
- Software that secretly monitors user activity
- Fraudulent attempt to obtain sensitive information via email
- Process of converting data into a coded format
- Security barrier that controls incoming and outgoing network traffic
- Malicious software designed to harm or exploit devices
- Tool that records keystrokes to steal information
- Self-replicating program that infects computers
Down
- Malware disguised as legitimate software
- Malware that locks files until a payment is made
- Weakness in a system that can be exploited by hackers
- Person who gains unauthorized access to systems
- Process of gathering information about a target system
- Testing method used to find vulnerabilities in a system
- Malware that spreads across networks without user action
15 Clues: Malware disguised as legitimate software • Software that secretly monitors user activity • Process of converting data into a coded format • Person who gains unauthorized access to systems • Self-replicating program that infects computers • Malware that locks files until a payment is made • Tool that records keystrokes to steal information • ...
November newsletter 2025-08-26
Across
- - What we're preventing this November
- - Animal associated with this month's full moon
- - The red, papaver by another name
- - Repeated thrice, followed by a moment of silence.
- - A calendar misnomer, this month's name comes from the Latin word for 9.
- - What people do on Black Friday & Cyber Monday
- - The team at the center of this edition
- - The Royal Canadian Military Institute is on this Toronto Avenue
Down
- - What you show when you thank a coworker for their efforts.
- - Commonly grown in November
- - What will be shone on each team at ULMA
- - Our employee newsletter
- - This bird takes short, shuffling steps... just like you should when it's slippery
- - a puzzle with vertical and horizontal squares
- - goggles, masks and gloves, for short.
- - ______, sealed, delivered
16 Clues: - Our employee newsletter • - ______, sealed, delivered • - Commonly grown in November • - The red, papaver by another name • - What we're preventing this November • - goggles, masks and gloves, for short. • - The team at the center of this edition • - What will be shone on each team at ULMA • - Animal associated with this month's full moon • ...
Gregory 2026-03-25
15 Clues: show • wait • queue • the name • security • automatic • seat number • to board Now • the passport • boarding time • flight number • departure time • check in luggage • from of identity • to go through the counting process
October 2020 Newsletter Crossword Puzzle 2020-10-05
Across
- A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password.
- A tool used to discover passwords.
- A type of password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts is called a (blank) stuffing.
- The practice of (blank) engineering is when social tactics are used to gain information from people or get people to do things they would not normally do.
Down
- Hardware that has wireless sensors which transmit data from one place to another over the internet.
- A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
- A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
- The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other.
- Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
- U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.
10 Clues: A tool used to discover passwords. • Hardware that has wireless sensors which transmit data from one place to another over the internet. • The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other. • ...
7th technology vocab 2 2014-10-13
Across
- (on social media sites such as twitter0 A WORD OR PHRASE PRECEDED BY A hash or pound sign (#) and used to identify messages o a specific topic.
- a device for storing information on a fixed location with in your computer.
- item to used organiseid files into groups.
- hypertext markup language. This is the coding language used to create sites on the world wide web.
- hardeware and that separates a local area network into two or more parts for security purposes.
- graphic interchange format… an efficient method for storing graphics. Gif’s take up a small amount of disk space and can be transmitted quickly.
- copy from one computer to another, typically over the internet
- commonly known as email. System designed to send messages and attachments elecontecly .
Down
- involving questions of right and wrong behavior, following accepted rules of behavior: morally right and good. “what is moral when using technology?
- file transfer protocol. A set of rules that allowstwo computers to talk to one another while transferring files from one to the other. This the protocol used when you transfer a file from one computer to another across
- the production of printed matter by means of a printer linked to a desktop computer, with special software. The system enables reports, advertising matter, company magazines, etc., to be produced cheaply with a layout and print quality similar to that of typeset books, for xerographic or other reproduction
- to set the margins, tabs, front or line spacing in layout of a document.
- cyber bullying is the use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner.
- make changes to a document or presentation.
- starting the computer when its power is turned off. To perform a cold boot if the computer is still running, shut down must me selected from the menu first. Once the machines off, turning it back on performs the cold boot.
- a place a database record where a category of information can be entered or located.
16 Clues: item to used organiseid files into groups. • make changes to a document or presentation. • copy from one computer to another, typically over the internet • to set the margins, tabs, front or line spacing in layout of a document. • a device for storing information on a fixed location with in your computer. • ...
9/11 and the war on terror 2023-11-03
Across
- - ......... Act - A U.S. law enacted to enhance domestic security after 9/11.
- - The terrorist organization responsible for the 9/11 attacks.
- - ......... Zero - The site of the collapsed World Trade Center buildings in New York City.
- - The Immigration and Naturalization Service, part of the U.S. response to 9/11.
- - Bin Laden - The leader of Al-Qaeda and mastermind behind the 9/11 attacks.
- - The evacuation of U.S. citizens and allies from Afghanistan during the War on Terror.
- - Commission - An investigation into the 9/11 attacks and U.S. response.
- - Questioning and gathering information from terrorism suspects.
- - The Central Intelligence Agency, involved in the War on Terror.
- - ........ W. Bush - The U.S. President at the time of the 9/11 attacks.
- - ........... Bay - A U.S. detention camp for terrorism suspects in Cuba.
- - The individuals who took control of the 9/11 planes to carry out the attacks.
- - ............ Responders - The firefighters, police, and emergency personnel who rushed to the 9/11 sites.
- - ........... Crimes - Violations of international law during armed conflicts in the War on Terror.
- - Weapons of Mass Destruction, a concern in the lead-up to the Iraq War.
- - The U.S. Department of Homeland Security, established in response to 9/11.
- - Interrogation Techniques - Controversial methods used on terrorism suspects.
- - Corpus - A legal principle safeguarding against unlawful detention.
- - Efforts to prevent and respond to acts of terrorism.
- - The Afghan extremist group that harbored Al-Qaeda and was overthrown by U.S. forces.
Down
- - Bin Laden ........... - The U.S. operation that resulted in the death of Osama bin Laden.
- - The country where the U.S. initially focused its military efforts in the War on Terror.
- - The North Atlantic Treaty Organization, which invoked Article 5 for the first time after 9/11.
- - ..... List - A U.S. government watchlist to prevent potential terrorists from boarding flights.
- - Measures - Enhancements to airport and border security following 9/11.
- - Military strategies employed in response to insurgency and terrorism.
- - The arrest and detention of individuals suspected of terrorism.
- - The U.S. Department of Defense headquarters, also targeted on 9/11.
- - on Terror - The U.S.-led global campaign against terrorism, launched after 9/11.
- - Ayman al-Zawahiri, a key figure in Al-Qaeda after the death of Osama bin Laden.
- - The use of violence for political or ideological goals, as seen on 9/11.
- - .......... 11 - One of the planes that crashed into the World Trade Center.
- - ........... Trade Center - The twin towers in New York City that were destroyed on 9/11.
- - The month when the 9/11 attacks occurred.
- - Sites - Secret detention facilities used in the War on Terror.
- - .......... Security - U.S. government efforts to protect the country from terrorism.
- - ....... of Evil - A term used to describe countries perceived as a threat in the War on Terror.
- - Another country targeted in the aftermath of 9/11 due to perceived weapons of mass destruction.
38 Clues: - The month when the 9/11 attacks occurred. • - Efforts to prevent and respond to acts of terrorism. • - The terrorist organization responsible for the 9/11 attacks. • - Questioning and gathering information from terrorism suspects. • - Sites - Secret detention facilities used in the War on Terror. • ...
Listening Insight 2 Unit 11 IT & Internet 2013-07-09
Across
- a man who fixes things
- very bad, awful
- keeping something or someone safe
- re-arrange the following letters: usobyivlo
- a general place or location
- instructions for making food
- to be unsure of something
- fill in the gap: "My computer has a virus because I didn't ____________ the security software"
Down
- fill in the gap: "I have a new hand phone, it has many great ____________ such as 4G and a camera"
- costs a lot of money
- speaking or writing about a particular thing
- almost the same as something else
12 Clues: very bad, awful • costs a lot of money • a man who fixes things • to be unsure of something • a general place or location • instructions for making food • keeping something or someone safe • almost the same as something else • re-arrange the following letters: usobyivlo • speaking or writing about a particular thing • ...
US invasion of Iraq 2023-11-29
Across
- United Nations Security Council resolution adopted unanimously by the United Nations Security Council on 8 November 2002
- The invasion began with U.S. _ dropping precision-guided bombs on a bunker complex in Baghdad
- Saddam's younger son
- Declaration by George w Bush on may 2003
- capital of Iraq
Down
- The leader prior to the US invasion of Iraq
- Veto power that opposed the invasion
- The name of our great teacher
- A country said to contain weapons of mass destruction
- place where Saddam Hussein's statue was toppled
- George _ Bush
- Saddam's elder son
12 Clues: George _ Bush • capital of Iraq • Saddam's elder son • Saddam's younger son • The name of our great teacher • Veto power that opposed the invasion • Declaration by George w Bush on may 2003 • The leader prior to the US invasion of Iraq • place where Saddam Hussein's statue was toppled • A country said to contain weapons of mass destruction • ...
UNIT 4 "HOME AUTOMATION CONTROL SYSTEMS", Crossword 2025-10-01
Across
- Keeping watch over an area for security.
- Portable computer with a touchscreen.
- A tool used to tighten or loosen nuts and bolts.
- Device that cools a room.
- The process of making devices work automatically.
Down
- Device that warms a room.
- Technology that simulates human intelligence.
- Reasonable in price; not too expensive.
- Security system with lenses to record video.
- Portable device used to melt metal for joining circuits.
- To activate a device, e.g., a light or machine.
- A handheld device to make calls and access apps.
12 Clues: Device that warms a room. • Device that cools a room. • Portable computer with a touchscreen. • Reasonable in price; not too expensive. • Keeping watch over an area for security. • Security system with lenses to record video. • Technology that simulates human intelligence. • To activate a device, e.g., a light or machine. • A tool used to tighten or loosen nuts and bolts. • ...
Security Crossword 2023-03-25
Across
- What colour will appear in the security system when a veteran is searched?
- How many minutes a security member may get promotion after last promotion?
- Who is the leader of Security?
- What Non-HIA members have access to HIA base through security check?
Down
- Who do you contact if someone needs retraining or start over?
- What colour will appear in the security system when a HR+ is searched?
6 Clues: Who is the leader of Security? • Who do you contact if someone needs retraining or start over? • What Non-HIA members have access to HIA base through security check? • What colour will appear in the security system when a HR+ is searched? • What colour will appear in the security system when a veteran is searched? • ...
Ehe abstract nouns 2024-10-07
Vocab Fun 2025-02-13
11.5 Wireless Networking 2023-03-28
Across
- An enhancement that allows multiple antennas to use the same radio frequency
- Wireless authentication method that allows for automatic connection between a device and the wireless access point
- Secure authentication method for wired and wireless networks
- Wireless communication technology that allows two devices to connect to each other over a short distance
- Developed by Cisco to address security concerns in RADIUS
- Encryption protocol used on most wireless networks today
- Wireless authentication method that uses a passphrase to authenticate users
- A communication method that allows two-way communication between two devices within a few centimeters of each other
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
- One of the strongest encryption protocols based on the Rijndael algorithm
Down
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices
- Developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard
- Wireless network that requires no authentication
- IEEE designation for all wireless networking standards
- A method that allows the frequency of the wireless network to be fine-tuned
- A method that combines channels into one to increase bandwidth
- An open standard protocol used to authenticate users onto a network
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network
18 Clues: Wireless network that requires no authentication • IEEE designation for all wireless networking standards • Encryption protocol used on most wireless networks today • Developed by Cisco to address security concerns in RADIUS • Secure authentication method for wired and wireless networks • A method that combines channels into one to increase bandwidth • ...
MEDICAL TERMINOLOGY ³ 2025-05-28
12 Clues: الامن • الفنيون • التغذية • الاداريين • فني الاشعة • فني المختبر • الاختصاصيون • مدير المشفى • عمال النظافة • الفريق المساعد • العلاج الطبيعي • موظف الاستقبال
Food Security and Biomes 2019-12-11
Across
- Removing unnecessary water requires this
- A major food crop native to the Americas.
- These dry places form right next to cold water.
- A famous American state that experience a 7 year drought
- A major threat in Australia's dry summers.
- A dry environment characterised by shifting dunes.
- A lot of water is needed to raise this meat.
- Plants grow in this
- Cleaning these out is important to prevent house fires.
Down
- Rainwater carries a tiny amount of this ocean mineral.
- If tap water runs out, people often rely on water from these
- Food can be grown in these in dry places.
- This kind of power captures sunlight
- These are used to capture the power of wind
- A deep hole dug in the ground to get water
- A famous city that is known for its waste
- A major food crop that is often turned into bread.
17 Clues: Plants grow in this • This kind of power captures sunlight • Removing unnecessary water requires this • Food can be grown in these in dry places. • A major food crop native to the Americas. • A famous city that is known for its waste • A deep hole dug in the ground to get water • A major threat in Australia's dry summers. • These are used to capture the power of wind • ...
Enterprise Information Security Policy 2017-09-06
Across
- A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
- Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
- Verifying the identity of a user, machine, software component, device, or other entity.
- a computer service.
- Any type of storage device that can be removed from a computer while the system is running.
- A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
- The physical elements of a computer system
- Protected Health Information acronym
- A person or persons responsible for supervising people or work.
- Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
Down
- All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
- Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
- ____ is compromised of 60 standards
- _____ implements standards to protect Protected Health Information (PHI).
- A Credential established by a sequence of characters used as a secret key for
- The set of characteristics by which a Person is definitively recognizable or known.
- A piece of Software intended to update an electronic Information Resource.
17 Clues: a computer service. • ____ is compromised of 60 standards • Protected Health Information acronym • The physical elements of a computer system • A person or persons responsible for supervising people or work. • _____ implements standards to protect Protected Health Information (PHI). • A piece of Software intended to update an electronic Information Resource. • ...
Risks to data security 2016-05-10
Across
- Part of the virus that causes the damage. (7)
- Virus that hides by inserting code between the OS and Anti-virus. (7)
- Virus that appears to be something else. (6)
- Way of accessing a computer without going through normal security procedures. (4,4)
- virus that triggers at a certain time. (4,4)
- Malware that replicates in order to infect other computers. (4)
- Software designed to cause harm. (7)
- Type of virus that can rewrite itself. (11)
- Type of virus that stays active in the computers memory. (8)
Down
- Type of virus that infects both files and boot records. (11)
- Virus that triggers when certain conditions are met. (5,4)
- Type of virus that infect the boot record. (4,6)
- Ethical hacker. (5,3)
- Someone who breaks into systems to carry out illegal and destructive acts. (6)
- Type of virus that infects files like Word and Excel documents. (5)
- a set of tools to enable a hacker to gain control of a computer. (4,3)
- Self replicating software that runs itself in order to infect other programs. (5)
17 Clues: Ethical hacker. (5,3) • Software designed to cause harm. (7) • Type of virus that can rewrite itself. (11) • Virus that appears to be something else. (6) • virus that triggers at a certain time. (4,4) • Part of the virus that causes the damage. (7) • Type of virus that infect the boot record. (4,6) • Virus that triggers when certain conditions are met. (5,4) • ...
Security Plus Chapter 1 2024-02-15
Across
- Network that moves a product from its creation to the end-user
- Safeguard employed within an enterprise to protect the CIA of information
- Controls that provide an alternative to normal controls
- Businesses that furnish solutions or services to users and organizations
- Threat actors who are strongly motivated by philosophical or political beliefs.
- no unauthorized person or malicious software has altered the data
- unauthorized copying of data
- Threat actors who are employed by their own government to carry out attacks.
Down
- Software in which no additional processes
- pose a threat from the position of a trusted entity
- Vulnerability for which there are no days of advanced warning
- mitigate or lessen the damage caused by the incident
- outsourcing the responsibility of a IT resources
- End of a product’s manufacturing lifespan
- Process of bypassing corporate approval for technology purchases
- Erroneous technology settings.
- Individual or entity who is responsible for attacks
17 Clues: unauthorized copying of data • Erroneous technology settings. • Software in which no additional processes • End of a product’s manufacturing lifespan • outsourcing the responsibility of a IT resources • pose a threat from the position of a trusted entity • Individual or entity who is responsible for attacks • mitigate or lessen the damage caused by the incident • ...
IT Security Cross Word 2025-03-28
Across
- A network that connects multiple LANs in a city
- Ports used by SIP
- Protocol for sharing files
- A small network for personal use
- A combination of different network types
- Devices connected to a central point
- A network that covers a small area
- Devices connected in a loop
Down
- A mix of star and bus networks
- Devices connected to many others
- Port used by SNMP
- Port used by SMB
- Protocol for secure communication
- Devices connected through one main cable
- A network that covers a large area
- Protocol for managing networks
- Protocol for making internet calls
17 Clues: Port used by SMB • Port used by SNMP • Ports used by SIP • Protocol for sharing files • Devices connected in a loop • A mix of star and bus networks • Protocol for managing networks • Devices connected to many others • A small network for personal use • Protocol for secure communication • A network that covers a large area • A network that covers a small area • ...
Industrial Security Crossword Puzzle 2025-09-23
Across
- Control- It is the management of keys in a plant or business organization to prevent unauthorize individual access to the
- KEYING- is when a lock operates on a master key plus an individual or change key.
- — distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
- - faithful allegiance to the Philippine government and its duly constitutional authorities;
- record- some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
- - uprightness in character, soundness of moral principle, freedom from moral delinquencies.
- Key- for single lock
- KEY SYSTEM - keying system that permits a lock to be opened with a number of unique, individual keys. Often found in apartment building common areas.
- Master key- that can open all locks within a particular area or grouping Master key.
- periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
Down
- - A term used in England for lock picker, safecrackers, and penetrators of restricted areas or rooms.
- KEY - Genuine key stolen from the owner.
- - the ability or tendency to act or to decide with prudence, the habit of wise judgment;
- — the sum of traits that have been impresses by nature, education and habit upon the individual.
- cabinet-a well constructed cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all time
- lock- Can be closed and opened remotely by electronic means.
- KEY- is a key used to operate an inexpensive lock by moving it in keyhole until it catches locking belt and unlock mechanism.
- in addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
- report- a daily report should be made to the person responsible for key control from the personnel department indicating all people who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to insure that the key is recovered.
- Control- Defined as the management of keys in a plant or business organizations to prevent unauthorized individual access to the keys.
20 Clues: Key- for single lock • KEY - Genuine key stolen from the owner. • lock- Can be closed and opened remotely by electronic means. • KEYING- is when a lock operates on a master key plus an individual or change key. • Master key- that can open all locks within a particular area or grouping Master key. • ...
Crossword Puzzle 2014-05-05
Across
- man's land disputed ground between the front lines or trenches of two opposing armies
- economy authority on economy
- he deliberate killing of a large group of people
- workers or working-class people
- security the cooperation of several countries in an alliance to strengthen the security of each
- the reduction or withdrawal of military forces and weapons
- camp political prisoners are persecuted
- a truce
- cocky
- legal official
- hopping travel from one island to another
Down
- Japanese aircraft loaded with explosives and making a deliberate suicidal crash on an enemy target
- peace
- prepare and organize
- a tied out battle
- action or process appease
- intense military campaign intended to bring about a swift victory
- he making of amends for a wrong one has done
- the belief or desire of a government or people that a country should maintain a strong military capability
- disobedience peaceful form of political politics
- russia
- slaughter on a mass scale
22 Clues: peace • cocky • russia • a truce • legal official • a tied out battle • prepare and organize • action or process appease • slaughter on a mass scale • economy authority on economy • workers or working-class people • camp political prisoners are persecuted • hopping travel from one island to another • he making of amends for a wrong one has done • ...
Internet Puzzle 2016-02-17
Across
- a hardware device that has multiple Ethernet ports.
- A networking device that perform the "traffic directing" functions on the Internet.
- A Type of Cord that hooks direct from the modem to customers device.
- server that automatically provides an IP address.
- Internet without wires.
- Translates an IP address to a domain name.
- Network Address Translation.
- This controls your domain name's website and email settings.
- Modem config without NAT.
- The owner of a Domain name.
- A free service with NPP for email and web.
- Redirects a communication request from one address to a Port.
- Changing IP Address.
Down
- Internet program you use to surf the internet.
- The Program the customer goes to set up a Domain Name.
- Non changing IP Address.
- A tool you use to help guide your calls.
- Controls how the modem functions.
- Internet output device.
- what is before the .com but after the @ symbol?
- network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
21 Clues: Changing IP Address. • Internet without wires. • Internet output device. • Non changing IP Address. • Modem config without NAT. • The owner of a Domain name. • Network Address Translation. • Controls how the modem functions. • A tool you use to help guide your calls. • Translates an IP address to a domain name. • A free service with NPP for email and web. • ...
Travel Vocabulary 2020-04-15
Across
- first class in a plane or train
- a ticket
- passport
- going through customs before entering a country
- ticket,luggage,counter, check in
- baggage claim
- to hope
- layover
- flight attendent
- to go straight
- window
- visa
- suitcase
- being on time
- controller
- platform
- bunk
- to go through security
- flight
- security agent
- to miss a flight
- a passenger
- a connection of one flight to another
- luggage
- a trip or travel
- international airport
- delayed
- stop
- luggage screening
Down
- waiting room
- car wagon
- to turn
- a seat
- boarding pass
- sleeping car
- second class in a train
- gate
- to check luggage
- safety seat belt
- to give
- to land
- departure
- train station
- in the airport
- to take off
- coach on a place
- aisle
- a ticket
- ticket window
- carry on luggage
- to see
- an event ticket
- arrival
- to get
54 Clues: gate • visa • bunk • stop • aisle • a seat • window • to see • flight • to get • to turn • to hope • layover • to give • to land • arrival • luggage • delayed • a ticket • passport • suitcase • a ticket • platform • car wagon • departure • controller • to take off • a passenger • waiting room • sleeping car • boarding pass • baggage claim • train station • being on time • ticket window • to go straight • in the airport • security agent • an event ticket • ...
Ch. 2 Vocabulary--American Society & It's Values 2020-09-27
Across
- expectations of behavior, written or unwritten
- money made by a business
- institution providing law & order, security,etc
- defense against threats to society Nat'l ______
- work a person gets paid for from other person
- Five parts of all societies
- person who participates in an economy by buying
- physical products required for survival
- form of gov't leader takes power by force
- rules of society that all must follow
- institution designed to prepare kids for adulthood
Down
- items we desire to make things easier
- someone makes the same product as you
- any place goods or services are exchanged
- first institution people belong to
- institution which teaches right from wrong
- anything accepted as payment for good or service
- items produced and sold in society
- what someone is willing to pay for a product
- system of producing and distributing goods/services
- learning to follow rules of society
- gov't in which leader inherits position
- gov't in which all people share the power
23 Clues: money made by a business • Five parts of all societies • first institution people belong to • items produced and sold in society • learning to follow rules of society • items we desire to make things easier • someone makes the same product as you • rules of society that all must follow • gov't in which leader inherits position • physical products required for survival • ...
h 2022-07-10
Across
- Instructional signs posted in the aircraft
- lock up latch or stow
- check emergency equipment and specific aircraft systems
- Customers on a paid fare
- 5-17 traveling alone
- breathing apparatus while fighting fires
- Security directives issued to the aircraft operators
- where planes park outside the terminal
- require all individuals to display proper identification
- predetermined periods of availability
- aircraft moves under its own power while on the ground
- how to use seatbelts oxygen mask and identify exits
Down
- created Nov 19 2001 policies to protect US transportation in airport security
- planned time from departure to arrival
- paperwork provided to flight attendants by the gate agent
- cards located in each seat pocket to explain emergency
- revised info to flight attendant manual
- frequent flyer program
- briefing designed to identify how to use specified emergency equipment
- when an aircraft leaves the ground
- all aircrafts operation below 10,000 feet
- stay overnight at a city other than your base
- temporary rule to address a temporary situation
23 Clues: 5-17 traveling alone • lock up latch or stow • frequent flyer program • Customers on a paid fare • when an aircraft leaves the ground • predetermined periods of availability • planned time from departure to arrival • where planes park outside the terminal • revised info to flight attendant manual • breathing apparatus while fighting fires • ...
Pablo Escobar 2018-02-27
Across
- Aircraft manufacturer (begins with B)
- A large building where passengers get on flights and get off flights
- Thing you go through to get to Airside
- Area before security at an airport, open to general public
- Control the roll of the plane
- First part of a planes identification code
- A flight that leaves the originating country
- When a flight is late arriving or taking off
Down
- A stop at an airport between flights
- Where pilots sit
- Main body of the aircraft
- Person who flies the plane
- Cheapest flight ticket
- A flight that starts and finishes in one country
- Second part of a planes identification code
- An item of identification you need to travel ovrseas
- When two or more airlines share a aircraft
- You can only carry 3 Ounces or 100 ml of this
- What the planes take off of
- Area of an airport only available to travelling persons and workers
20 Clues: Where pilots sit • Cheapest flight ticket • Main body of the aircraft • Person who flies the plane • What the planes take off of • Control the roll of the plane • A stop at an airport between flights • Aircraft manufacturer (begins with B) • Thing you go through to get to Airside • When two or more airlines share a aircraft • First part of a planes identification code • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
My Virtual Self 2024-12-29
Across
- a secret string used for authentication
- the place where something or someone is situated
- advancements in scientific knowledge and applications
- personal and not shared with the public
- to disturb or break continuity
- to depend on someone or something
- protection against threats or danger
- to concentrate on a task or subject
- to dominate or assume control
- data that provides knowledge or insight
- implements that assist in completing tasks
- an advantage in a competitive situation
- to breach security systems
- a device used for mechanical work
Down
- to converse with others using language
- skills developed through practice or training
- immediate without any delay
- to enhance or make better
- access always connected without interruption
- to lengthen or increase in duration
- to disrupt or obstruct a process
- media platforms for online social interactions
- relating to technology that uses binary code
- to require something as necessary
- an ID used to identify a user
- the act of stealing someone's property
26 Clues: to enhance or make better • to breach security systems • immediate without any delay • an ID used to identify a user • to dominate or assume control • to disturb or break continuity • to disrupt or obstruct a process • to depend on someone or something • to require something as necessary • a device used for mechanical work • to lengthen or increase in duration • ...
Kevin Luu's Crossword. 2025-03-07
Across
- Starting amount of money invested or borrowed.
- A process that cycles letting you to borrow money to a certain limit, repay it, and borrow again.
- A loan that allows someone to buy property.
- Payment schedule that happens twice a month.
- Something that has value currently or in the future.
- Someone that offers/provide money.
- A process credit that can be use repeatedly.
- 80% of Americans gets into it.
- Someone fake who gains money through dirty methods.
Down
- Increase in value.
- Additional cost that is charged for borrowing money.
- Assets pledged by a borrower to a lender as security.
- Borrowed money that is to be paid back with interest.
- Someone who doesn't pay a loan or debt.
- Earning returns (interest).
- Someone who borrows a loan.
- The right to claim a security interest.
- Ownership in an asset or company.
- A percentage of money you earn back for making a purchase.
- The ability to receive a loan but also leads to debt.
20 Clues: Increase in value. • Earning returns (interest). • Someone who borrows a loan. • 80% of Americans gets into it. • Ownership in an asset or company. • Someone that offers/provide money. • Someone who doesn't pay a loan or debt. • The right to claim a security interest. • A loan that allows someone to buy property. • Payment schedule that happens twice a month. • ...
study 2025-04-09
Across
- the money from the Social security act was used to pay monthly____ to retired people
- gave jobs to over 2 million people
- on October 24, 1929 investors sold almost 13 ____ shares
- Many____ were forced to work
- Punished dishonest stockbrokers
- a reason why the dust bowl was caused (wind)
- a market to buy, sell, and share stocks
- Most people from _____ moved to California during the dust bowl
- People____ when they were unable to pay they're loans
- borrowed money from banks
- set a minimum wage policy and abolished child labor
Down
- the Social security act placed taxes on employers and ____
- Severe economic crisis in 1929
- called shanty towns
- Migrant workers moved here
- Thought the market would improve by itself
- this would ensure banks had enough money to give back to you
- A reason why the dust bowl was caused(water)
- An organization that helped people during the Great Depression
- market crashed on black _____
20 Clues: called shanty towns • borrowed money from banks • Migrant workers moved here • Many____ were forced to work • market crashed on black _____ • Severe economic crisis in 1929 • Punished dishonest stockbrokers • gave jobs to over 2 million people • a market to buy, sell, and share stocks • Thought the market would improve by itself • a reason why the dust bowl was caused (wind) • ...
political acronyms 2025-06-16
Across
- Governing body of the Democratic Party.
- Even the teacher used it for that crosswords !
- Domestic intelligence and security in the U.S.
- Body tasked with reducing US government spending and cutting jobs.
- Oversees international trade rules.
- Political leader of the executive branch in the U.S.
- Military alliance of North American and European countries.
- Public healthcare system, politically sensitive issue in the UK.
- The highest court in the U.S.
Down
- Public service broadcaster (often central to political debates on media bias and funding)in the UK.
- Politically charged in policy and workplace contexts.
- Federal agency enforcing immigration laws in the U.S.
- Emerging economies bloc challenging the West.
- Federal law enforcement and legal body in the U.S.
- The main conservative political party in the U.S.
- UN health agency (key in pandemic responses).
- Political and economic union of European countries.
- Major party advocating Scottish independence.
- Non-profit, often active in advocacy.
- Global organization for peace, security, and cooperation.
20 Clues: The highest court in the U.S. • Oversees international trade rules. • Non-profit, often active in advocacy. • Governing body of the Democratic Party. • Emerging economies bloc challenging the West. • UN health agency (key in pandemic responses). • Major party advocating Scottish independence. • Even the teacher used it for that crosswords ! • ...
Chapter 5 - Crime and Security 2025-11-12
Across
- requiring users to do multiple authentications checks
- ensuring systems are available
- the use of computers or networks to perform unethical activity
- ensuring private data remains private
- the process of transforming data into secret code to prevent theft
- process where security professionals report vulnerabilities within the system
- psychological feelings and characteristics for an individual
- the state of being protected or safe
- not likely to cause harm
- ensuring data is not changed without correct authentication
Down
- the process of proving something is true
- automated measurements to discover physical or behavioral characteristics
- a method to bypass regular authentication. Usually used by law enforcement
- the use of hacking to hurt or benefit a political cause
- the state of being exposed and the potential of being harmed
- the process of simulating cyberattacks on a system
- people who can help protect the digital world
- individuals that will be using the system created
- an act that is considered shameful or wrong
- irresponsible or destructive action performed by a criminal
20 Clues: not likely to cause harm • ensuring systems are available • the state of being protected or safe • ensuring private data remains private • the process of proving something is true • an act that is considered shameful or wrong • people who can help protect the digital world • individuals that will be using the system created • ...
SPHE Crossword 2021-11-03
Across
- what could happen if bullying escalates
- talking behind somebody’s back
- where bullying often happens the most
- the type of bullying when you use your words to hurt someone
- who you tell if you are being bullied in school
- what you might get if you hold in things for to long
- how you make people feel when you point out their flaws
- the type of bullying that happens online
Down
- To constantly annoy or hurt someone
- when you spread fake news about someone
- practices to maintaining health
- best place to find fake news
- what you are if you post on social media for your job
- False or untrue
- How you might feel if you were being bullied
- treat people with .....
- what you tell the bully when they are bullying you
- What you are if you are being bullied
- to leave someone out
19 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • where bullying often happens the most • What you are if you are being bullied • when you spread fake news about someone • what could happen if bullying escalates • ...
Daily Bulldog - Phish and Whistle 2023-07-22
Across
- Whistles when the water is ready
- Malicious software
- Large or small mouth, fishermen are all about this fish?
- What used to run on the Whistlestop Trail
- Porcupine's favorite place to hike?
- Provides high speed internet
- Laugh Out Loud
- Alliance leading the rebuilding of trestle bridge of Sandy River
- scam where attackers deceive people into revealing sensitive information
- Coach of the The Franklin County 13U All-Star team
Down
- Lead singer of Phish
- Actress who asked, "You know how to whistle, don't you Steve?"
- person who informs about illegal activity
- Jennifer Anavi Davies set the world record for this type of whistling in 2010(25 hr,30 min, 5 sec)
- type of crime committed with computers and networks
- Cheap type of whistle?
- Singer-songwriter who wrote "Fish and Whistle"
- Colorful type of cold water game fish
- Canned spiced meat or sometimes it clogs up your inbox
19 Clues: Laugh Out Loud • Malicious software • Lead singer of Phish • Cheap type of whistle? • Provides high speed internet • Whistles when the water is ready • Porcupine's favorite place to hike? • Colorful type of cold water game fish • person who informs about illegal activity • What used to run on the Whistlestop Trail • Singer-songwriter who wrote "Fish and Whistle" • ...
R&D Engineering Bootcamp 2019-11-18
Across
- VMware NSX as the Foundation for the ________ Cloud Network
- Cloud__________ Business Unit
- IT Priority: Transform __________ and Security
- Lets you run multiple operating systems and applications on a single server
- IT Priority: _______ the Cloud Journey
- Networking and ____________ Business Unit
- _________services augment one or more logical networks and/or connect multiple logical networks together.
- product and ______ Services
- The'P' in our EPIC2 Values
Down
- Software that runs as the operating system of the ESX system
- good companies solve problems. Great companies create_________.
- How many dogs does Jenn have?
- A strategy where organizations leverage both on-premises and cloud enabling rapid portability of applications, and operational consistency across their entire environment
- IT Priority: Empowering the ______ Workspace
- VMware's beloved CEO
- Software_______data Center
- ________is VMware’s software-defined storage solution.
- ________ agility is the ability to process information with ease, speed & optimize mental flexibility
18 Clues: VMware's beloved CEO • Software_______data Center • The'P' in our EPIC2 Values • product and ______ Services • How many dogs does Jenn have? • Cloud__________ Business Unit • IT Priority: _______ the Cloud Journey • Networking and ____________ Business Unit • IT Priority: Empowering the ______ Workspace • IT Priority: Transform __________ and Security • ...
Chapter 13 2016-04-22
Across
- the account that employer payroll taxes are recorded
- amounts withheld until paid
- information needed to prepare Form 941
- the column total used for Medicare Tax Payable
- amounts recorded in the general journal are posted individually to
- a national program for unemployment benefits
- reports the prior year's earnings and payroll taxes withheld
- the column total used for Social Security Tax Payable
Down
- the payment of payroll taxes to the government
- shows taxes owed to the government
- a state program for unemployment benefits
- total earnings minus total deductions
- employers must furnish by January 31
- does not have a tax base
- how frequently a business must deposit payroll taxes
- total of gross earnings
- the total used for Employee Income Tax Payable
- the total is the salary expense
18 Clues: total of gross earnings • does not have a tax base • amounts withheld until paid • the total is the salary expense • shows taxes owed to the government • employers must furnish by January 31 • total earnings minus total deductions • information needed to prepare Form 941 • a state program for unemployment benefits • a national program for unemployment benefits • ...
IT Security Policy - Risk Management 2014-07-29
Across
- Organization's willingness to accept risk
- identifies applicable regulatory requirements regarding information security
- Used to evaluate and document process maturity for a given area
- risk mitigation strategy designed to reduce/eliminate threat
- Level of risk after security measures are applied
Down
- Systematic evidence based evaluation
- Process of managing, directing, controlling and influencing organizational decisions, actions and behaviours
- Provides expert leadership
- Risk assessment methodology
- Assigning risk
10 Clues: Assigning risk • Provides expert leadership • Risk assessment methodology • Systematic evidence based evaluation • Organization's willingness to accept risk • Level of risk after security measures are applied • risk mitigation strategy designed to reduce/eliminate threat • Used to evaluate and document process maturity for a given area • ...
Developing the Security Program Crossword 2020-07-10
Across
- ____ Organziations have 1 part-time manager
- What do employers look at when hiring
- ____ Organizations have internal Infosec Groups
- Who is the top InfoSec officer?
- ___ Charts are used to manage projects
Down
- PMBoK is a project management _____
- _____ Organizations have only one security admin
- ____ Is a series of projects
- What program is designed to reduce security breaches by employees?
- What department does InfoSec struggle with?
10 Clues: ____ Is a series of projects • Who is the top InfoSec officer? • PMBoK is a project management _____ • What do employers look at when hiring • ___ Charts are used to manage projects • ____ Organziations have 1 part-time manager • What department does InfoSec struggle with? • ____ Organizations have internal Infosec Groups • _____ Organizations have only one security admin • ...
Foreign Policy 2023-05-22
Across
- Decreased interest of America's military involvement in Vietnam
- handles security issues within the United States
- Because of America's isolationism WWI ____.
- Handles security internationally
- Atlantic Free Trade Agreement Free trade zone between the US, Canada, and Mexico
Down
- Main ambassador of the United States
- The opposite of isolationism
- No involvement in global issues
- The US did not directly fight in this
- Global Organization and administrators trade agreements
10 Clues: The opposite of isolationism • No involvement in global issues • Handles security internationally • Main ambassador of the United States • The US did not directly fight in this • Because of America's isolationism WWI ____. • handles security issues within the United States • Global Organization and administrators trade agreements • ...
Cybersecurity Fundamentals Chapter 2 Part 2 2022-11-24
Across
- requires a set of checks before allowing a device to connect to a network.
- allows users to gain access to application software and databases. Cloud providers manage the infrastructure.
- programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers.
- shift the technology component from the organization to the cloud provider.
Down
- run inside a virtual environment with a pre-packaged
- includes the implementation of authentication and encryption.
- appliances that are installed within the network faculties.
- secure virtual network that uses the public network.
- provides virtualized computing resources over the Internet.
- developed a comprehensive framework to guide information security management.
10 Clues: run inside a virtual environment with a pre-packaged • secure virtual network that uses the public network. • appliances that are installed within the network faculties. • provides virtualized computing resources over the Internet. • includes the implementation of authentication and encryption. • ...
Exiting Prison 2013-12-11
Across
- Claim that a mistake was made in a court decision.
- Determining parole after one third of the sentence has been served. (2 words)
- To guarantee the honesty of someone working with money.
- Penitentiary for a sentence of less than two years.
- Being excused for a crime.
- Term for prison services.
- Custody under constant guard.
Down
- An early release.
- Release as outlined by the law.
- Low level security.
- This can make it hard to leave the country. (2 words)
- The highest level of security.
- Prison for those serving longer sentences.
- Clause that allows those serving long sentences to apply for parole. (2 words)
- Custody that allows inmates to work and have some access to the community.
15 Clues: An early release. • Low level security. • Term for prison services. • Being excused for a crime. • Custody under constant guard. • The highest level of security. • Release as outlined by the law. • Prison for those serving longer sentences. • Claim that a mistake was made in a court decision. • Penitentiary for a sentence of less than two years. • ...
Friday Game v1.1 2023-06-23
Across
- Remote server storage and computing.
- A powerful computer that provides resources to other computers on a network.
- Domain Name System - translates domain names to IP addresses.
- A security measure that requires two different forms of identification.
- Identity and access management service for Microsoft 365.
- A directory service used in Windows environments.
- Common wired networking technology.
Down
- Microsoft's cloud-based productivity suite.
- A unique numerical label assigned to each device connected to a computer network.
- Microsoft's email server and collaboration platform.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Wireless Local Area Network.
- Dynamic Host Configuration Protocol - assigns IP addresses automatically
- Secure connection over a public network.
- Device that forwards data packets between computer networks
15 Clues: Wireless Local Area Network. • Common wired networking technology. • Remote server storage and computing. • Secure connection over a public network. • Microsoft's cloud-based productivity suite. • A directory service used in Windows environments. • Microsoft's email server and collaboration platform. • Identity and access management service for Microsoft 365. • ...
Application MOS 2025-05-28
Across
- This MOS deals with the disposal of explosive hazards
- The MOS designation for Cyber Network Defender
- Special Forces Military Occupational Specialty designation
- Critical roles demanding rigorous vetting, training, and advanced skills
Down
- MOS responsible for Army retention and soldier career management
- Regulation number detailing the Army Retention Program
- The structured process soldiers undergo for specialized roles
- Term for exceeding allowable time in a specific rank, risking separation
8 Clues: The MOS designation for Cyber Network Defender • This MOS deals with the disposal of explosive hazards • Regulation number detailing the Army Retention Program • Special Forces Military Occupational Specialty designation • The structured process soldiers undergo for specialized roles • MOS responsible for Army retention and soldier career management • ...
The Cold War 2022-04-29
Across
- National Aeronautics and Space Administration.
- Another name for Taiwan.
- War dominated international relations from the late 1940's to the collapse of the Soviet Union.
- Buffer states.
- European Recovery Program.
- The German Democratic Republic
- __Bank (International Bank).
- North Atlantic Treaty Organization abbreviation.
- ___ Council was given the responsibility of maintaining international security.
Down
- Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
- ___ Policy prevented Soviet expansion without starting a war.
- The Federal republic of Germany.
- British Prime minister
- __ Curtain was used to refer to the division between U.S allies and Soviet allies.
- A military alliance for the defense of the Communist States of Eastern Europe.
- The founding of the United ___ in the fall 1945.
16 Clues: Buffer states. • British Prime minister • Another name for Taiwan. • European Recovery Program. • __Bank (International Bank). • The German Democratic Republic • The Federal republic of Germany. • National Aeronautics and Space Administration. • The founding of the United ___ in the fall 1945. • North Atlantic Treaty Organization abbreviation. • ...
Vocabulary pg72 2024-04-17
Across
- mark left by a foot
- person who is convicted of a crime
- instrument or device used for attack or defense
- police officer whose job is to get evidence about crime
- find the answer or explanation for something
- place for keeping people accused of a crime
- act instance of robbing
Down
- which tends to prove or disprove something
- impression of the markings of the finger
- guard-a uniformed guard employed to maintain security
- inspect or look at officially so as to judge something
- capture a person
- follow rapidly in order to overtake pursue
- examine the particulars of something carefully
- officer-a policeman or policewoman
- unlawful killing of a person
- seize a person by legal authority
17 Clues: capture a person • mark left by a foot • act instance of robbing • unlawful killing of a person • seize a person by legal authority • person who is convicted of a crime • officer-a policeman or policewoman • impression of the markings of the finger • which tends to prove or disprove something • follow rapidly in order to overtake pursue • ...
Topaz #13 2018-01-15
Across
- The B in BSR stands for
- Type of fluid we use to drill the 8 1/2" section
- What does the D stand for in SLB D&M
- The F in FMS stands for
- You can get this when plugging AC vents
- One of the BHA parts in the WBCU run - Well ________
- Who supplies the liner hanger
- Name for the platform used on jackups when drilling in open water
Down
- The O in LO stands for
- Where Pak Rido is from
- What does the D in TvD charts stand for.
- Person who collects cuttings for the Geologist
- PCINO rep that used to play in a rock band!
- Canrig TDS are made in
- Cyber cementer presented about what on Sunday
- PCINO Mat co
16 Clues: PCINO Mat co • The O in LO stands for • Where Pak Rido is from • Canrig TDS are made in • The B in BSR stands for • The F in FMS stands for • Who supplies the liner hanger • What does the D stand for in SLB D&M • You can get this when plugging AC vents • What does the D in TvD charts stand for. • PCINO rep that used to play in a rock band! • ...
Topaz.#13 2018-01-16
Across
- The B in BSR stands for
- Cyber cementer presented about this on Sunday
- Who brings the cuttings to the Gelogist
- Canrig TDS is designed in what country
- PCINO Mat Co
- What does the D stand for in SLB D&M
- The F in FMS stands for
- PCINO rep that was in a rock band
Down
- What does the O in LO stand for
- Where is Pak Rido from
- You can get this from plugging AC vents
- One of the BHA parts in WBCU run Well _______
- Who supplies the liner hanger to PCINO
- Name for the platform used when open water drilling
- What type of fluid did we drill the 8 1/2" section with
- What does the D in TvD charts stand for
16 Clues: PCINO Mat Co • Where is Pak Rido from • The B in BSR stands for • The F in FMS stands for • What does the O in LO stand for • PCINO rep that was in a rock band • What does the D stand for in SLB D&M • Who supplies the liner hanger to PCINO • Canrig TDS is designed in what country • You can get this from plugging AC vents • Who brings the cuttings to the Gelogist • ...
Burbank High School 2022-05-27
17 Clues: p • S • l • S • Mask • Board • Cameras • Shorten • To Open • To Walk on • to hold on • Do Not Touch • in Sight Beam • What's The Time • School Full Name • Something To Watch • Something To Connect With
gameshop 2014-05-19
16 Clues: chaos • score • manure • express • discharge • hereditary • about to be • loose change • go ballistic • tree hugger? • puzzle seller • e.g. rent-a-cops • ex. Chucky Cheese • Florence and the _____ • a rubrik wheel-runner? • a continuous transporter
Foucault-Security, Territory 2025-06-17
Across
- The 18th-century city used as an example of security technology in urban planning, focusing on managing circulation and future growth.
- Foucault uses the historical exclusion of people with this disease as an example of a binary, juridico-religious power division.
- Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy.
- The space of security, where uncertain elements unfold and circulation of causes and effects is managed, combining natural and artificial givens.
- A multiplicity of individuals existing biologically within their material surroundings, serving as both object and subject of security mechanisms.
Down
- The apparatus of power that calculates costs and probabilities, operating within optimal averages rather than strict prohibitions.
- The type of theoretical discourse that Foucault categorically advises against engaging in.
- A mechanism of power characterized by surveillance, correction, and the structuring of individuals within closed, artificial spaces.
- This historical epidemic's regulations, involving strict partitioning and home inspections, are an example of a disciplinary system.
- A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space.
10 Clues: The type of theoretical discourse that Foucault categorically advises against engaging in. • Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy. • A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space. • ...
cyber world vocabulary 2022-11-23
Across
- อุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Address
- ซอฟต์แวร์ที่ติดตั้งมากับอุปกรณ์โดยที่ผู้ใช้ไม่รับรู้ เป้าหมายหลักของซอฟต์แวร์นี้คือขโมยข้อมูลส่วนตัวหรือข้อมูลลับ
- คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไร
- ระบบรักษาความปลอดภัยหรือระบบยืนยันตัวเองแบบ 2 ขั้นตอน นอกจากใส่ Username/Email และรหัสที่ถูกต้องแล้ว ผู้ใช้ต้องใส่ข้อมูลเพิ่มตัว
- คอมพิวเตอร์ที่ติด Malware และรอรับคำสั่งจากแฮกเกอร์เพื่อนำไปใช้ในทางที่ไม่ดี เช่น DDoS วิธีป้องกันคืออัปเดตซอฟต์แวร์อย่างสม่ำเสมอและใช้ Firewall
Down
- การเรียกค่าไถ่ของผู้ร้ายในวงการ IT จะทำด้วยการล็อคคอมพิวเตอร์และไฟล์ของเหยื่อ เพื่อแลกกับการใช้งานคอมพิวเตอร์และไฟล์อีกครั้ง ผู้ใช้งานจะต้องจ่ายเงินค่าไถ่ตามที่ผู้ร้ายกำหนด
- การโจรกรรมข้อมูลส่วนตัว โดยทำการปลอมแปลงอีเมลให้เหมือนกับอุตสาหกรรมที่มีความน่าเชื่อถือ เช่น ธนาคารหรือบริษัทโทรคมนาคม ภายในอีเมลจะอธิบายให้เหยื่อกดลิ้งค์ที่ให้มาและกรอกข้อมูลส่วนตัว
- เทคนิคที่แฮคเกอร์ใช้ซ่อนตัวตน โดยอาจหลอกเหยื่อว่าต้นทางของการแฮคมาจากจุด B แต่ที่จริงมาจากจุด A หรือการปลอมเว็บไซต์ขึ้นมาเพื่อหลอกให้เหยื่อใส่ข้อมูลส่วนตัวลงไป
- ระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน)
- การใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุด
10 Clues: คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไร • อุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Address • การใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุด • ระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน) • ...
Englisch Cyber Words 2024-04-18
Across
- blocks malicious incoming requests from your network
- self-replicating computer virus
- graphical processing unit
- host of services across the internet
Down
- input device for typing
- long term for app
- process of creating ethernet cables
- old storage device. Other word for diskette
- short term for central-processing-unit
- credential scamming via email
10 Clues: long term for app • input device for typing • graphical processing unit • credential scamming via email • self-replicating computer virus • process of creating ethernet cables • host of services across the internet • short term for central-processing-unit • old storage device. Other word for diskette • blocks malicious incoming requests from your network
Cyber safety crossword 2023-05-22
Across
- fights on messages with angry language.
- online bulling
- excluding someone from an online group.
- pretending to be someone else
- someone stealing and copying someone else's work
Down
- a sickness for computers
- Repeated and intense harassment online
- Talking someone into revealing their secrets
- Sharing someone's secrets online.
- Repeatedly sending mean messages
10 Clues: online bulling • a sickness for computers • pretending to be someone else • Repeatedly sending mean messages • Sharing someone's secrets online. • Repeated and intense harassment online • fights on messages with angry language. • excluding someone from an online group. • Talking someone into revealing their secrets • someone stealing and copying someone else's work
Common Cyber Terms 2023-04-24
Across
- Attempt by an unauthorised entity or attacker to gain illegitimate access to a system by posing as an authorised user
- A type of network layer firewall
- A weakness in software programs that can be exploited
- Provides additional, revised or updated code for an operating system or application
- Used to gain unauthorised access to a computer or a network
Down
- Uses asymmetric key encryption
- An attack requiring a carrier file to self-replicate
- Gives a hacker remote access to, and control over, a computer or network
- Verify the identity of a user
- Encrypted parts of the internet that are not indexed by search engines
10 Clues: Verify the identity of a user • Uses asymmetric key encryption • A type of network layer firewall • An attack requiring a carrier file to self-replicate • A weakness in software programs that can be exploited • Used to gain unauthorised access to a computer or a network • Encrypted parts of the internet that are not indexed by search engines • ...
Cyber Awareness Week 2025-09-23
Across
- When someone manipulates an email that tricks you into doing something against your better judgement
- An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
- Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
- A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- A person who uses uses malicious tactics to gain unauthorised access to systems and data
- Harmful computer programs used by hackers to steal information, gain access or lock your device
- The address of a webpage (acronym)
- Should be long, complex and not contain any personally identifiable information (like your dogs name)
- Widely used technology that allows for the wireless connection between a device and a router
- Never click on a ___ in an email unless you are sure that it's genuine
10 Clues: The address of a webpage (acronym) • Never click on a ___ in an email unless you are sure that it's genuine • A person who uses uses malicious tactics to gain unauthorised access to systems and data • Widely used technology that allows for the wireless connection between a device and a router • ...
Cyber Crime Crossword 2025-10-10
Across
- hackers use this to find out every key pressed
- The act of trying to gain personal information from victims
- these people perform cyber attacks
- Hackers use this to watch what you are doing without having to be beside you
Down
- Replicates itself to do the most damage
- Plain text can be protected by turning it into ___ text
- someone looking over you to find out your details
- your messages can be made safer if they are_____
- This malware needs human interaction to get started.
- software designed to damage a computer system
10 Clues: these people perform cyber attacks • Replicates itself to do the most damage • software designed to damage a computer system • hackers use this to find out every key pressed • your messages can be made safer if they are_____ • someone looking over you to find out your details • This malware needs human interaction to get started. • ...
la "cyber-société" 2025-12-22
Module 4.1Crossword puzzle 2023-03-16
Across
- The department that is responsible for America's housing needs.
- The department that looks over students.
- The president can only have ___ terms in office.
- The president's advisors.
- The department that overlooks policy on farming.
- Length of the term for a president.
- The department that overlooks military forces.
- Head of the executive branch.
Down
- The department that protects the health of all Americans.
- The first Vice President.
- Legislative house that is controlled by the vice president.
- The department that protects American people from domestic threats.
- The first president.
- how old does a president have to be?
- System that votes the president into office.
- When a president rejects a bill passed by Congress.
- The department that creates conditions for economic growth.
- The department tasked with overlooking American nuclear security.
18 Clues: The first president. • The first Vice President. • The president's advisors. • Head of the executive branch. • Length of the term for a president. • how old does a president have to be? • The department that looks over students. • System that votes the president into office. • The department that overlooks military forces. • The president can only have ___ terms in office. • ...
IR - Module 1 2024-12-05
Across
- US and ----- were the superpowers emerged after WWII
- The period from 1945-1991
- The IGO formed after WW 2
- This level of IR analysis states that single countries can influence IR
- The process of managing / governing people in a place.
- The treaty to punish Germany is
- The relationship between nation states is called
- The second name of the person behind systems theory.
- Promote peace and security among nations, Kill evils in the society.
- Looting one country by another country is
Down
- Treaty of ---- was signed on 1648
- ..... conference was held in 1919 Jan
- The process of making slaves and setting empire is called
- The treaty to end war on Spanish succession was ..... treaty.
- Germany, Austria-Hungary, Italy
- German ruler during WW I
- Nation security is a matter of importance and selfishness
- This level of IR analysis says that a single person can influence in IR
18 Clues: German ruler during WW I • The period from 1945-1991 • The IGO formed after WW 2 • Germany, Austria-Hungary, Italy • The treaty to punish Germany is • Treaty of ---- was signed on 1648 • ..... conference was held in 1919 Jan • Looting one country by another country is • The relationship between nation states is called • US and ----- were the superpowers emerged after WWII • ...
Security 2022-02-23
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
Bullying 2021-12-13
Across
- type of bullying involving words
- 3 things that make the issue bullying vs. conflict
- people not directly involved with the bullying
- type of bullying involving bodily harm
- type of bullying typically dealing with social media
Down
- 3 things that make the issue bullying vs. conflict
- type of bullying involving other people
- 3 things that make the issue bullying vs. conflict
8 Clues: type of bullying involving words • type of bullying involving bodily harm • type of bullying involving other people • people not directly involved with the bullying • 3 things that make the issue bullying vs. conflict • 3 things that make the issue bullying vs. conflict • 3 things that make the issue bullying vs. conflict • ...
SkillWise Staff Week 12 2025-03-25
6 Clues: the database SW uses • the month we're currently in • The principles we work by (8,4,5) • program ensuring cyber safety at SW (4,2,1) • The January planning week game/ event, Greg Davis • A online learning platform, available anytime for professional development(4,6,8)
Internet Puzzles 2016-02-17
Across
- Internet program you use to surf the internet.
- A networking device that perform the "traffic directing" functions on the Internet.
- server that automatically provides an IP address.
- A Type of Cord that hooks direct from the modem to customers device.
- A tool you use to help guide your calls.
- The owner of a Domain name.
- This controls your domain name's website and email settings.
- What is before the .com but after the @ symbol?
- A free service with NPP for email and web.
Down
- Controls how the modem functions.
- The Program the customer goes to set up a Domain Name.
- network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
- Translates an IP address to a domain name.
- Redirects a communication request from one address to a Port.
- Internet output device.
- Changing IP Address.
- Modem config without NAT.
- Internet without wires.
- a hardware device that has multiple Ethernet ports.
- Non changing IP Address.
- Network Address Translation.
21 Clues: Changing IP Address. • Internet output device. • Internet without wires. • Non changing IP Address. • Modem config without NAT. • The owner of a Domain name. • Network Address Translation. • Controls how the modem functions. • A tool you use to help guide your calls. • Translates an IP address to a domain name. • A free service with NPP for email and web. • ...
