cyber security Crossword Puzzles
REVISION - NOVEMBER 2020 2020-12-04
Across
- elvárni vmi
- eszköz
- kísérlet
- megérdemel vmit
- vállalkozás
- kevesebb
- anyagi támogatás
- megbecsülni vmit
- eltévedni
- tejföl
- biztonság
- kezelés
- türelem
- jel
- állítani
- apró
Down
- biztonságos
- külváros
- hazamenni
- válallakozó
- integetni
- nagylelkű
- ízetlen
- tapasztalat
- nyers
- építkezés
- türelmes
- kisibalizálni / megoldani
- hiány
- siker
- bicikliút
- nyersanyag
32 Clues: jel • apró • nyers • hiány • siker • eszköz • tejföl • ízetlen • kezelés • türelem • külváros • kísérlet • kevesebb • türelmes • állítani • hazamenni • integetni • nagylelkű • építkezés • eltévedni • bicikliút • biztonság • nyersanyag • biztonságos • elvárni vmi • válallakozó • vállalkozás • tapasztalat • megérdemel vmit • anyagi támogatás • megbecsülni vmit • kisibalizálni / megoldani
EBS (Vacation Lesson) 2016-08-07
25 Clues: 소비 • 전략 • 자원 • 시설 • 정확한 • 평가하다 • 입증하다 • 제한하다 • 일치하다 • 관점, 시각 • 기능, 특징 • 계약, 계약서 • 제안, 제안서 • 보안, 보안관 • 고안, 고안물 • 공지, 공지하다 • 사전의, 이전의 • 접근, 접근하다 • 꼼꼼한, 철저한 • 몸단장하다, 신랑 • 어구, 시, 운문 • 선택권, 선택할 것 • 업적, 실적, 달성 • 간직하다, 보존하다 • 채용하다, 모집하다
Lake Prince Woods Workers 2021-08-16
Across
- Marketing
- Maintenance
- Activities Dir.
- Social Services
- Director
- Assistant Activities
- Chaplain
- Chef
- Maintenance
- Nursing Dir.
- Therapy
- Medical Cebter
- Outreach Coordinator
- Local Hospital
- Notary
Down
- President UCHAS
- Receptionist
- Security Guard
- Office Manager
- Dietery
- Rear Entrance
- Hair Salon
- Dietery Head
- At Home Care
- Home Care
- Human Resources
- Business Manager
- Receptionist
- Welcome Committee
29 Clues: Chef • Notary • Dietery • Therapy • Director • Chaplain • Marketing • Home Care • Hair Salon • Maintenance • Maintenance • Receptionist • Dietery Head • At Home Care • Nursing Dir. • Receptionist • Rear Entrance • Security Guard • Office Manager • Medical Cebter • Local Hospital • President UCHAS • Activities Dir. • Social Services • Human Resources • Business Manager • Welcome Committee • Assistant Activities • ...
Let's have fun with finding these words 2023-10-23
Across
- - Tranquil state
- - Joyful family members
- - Mind-body exercise
- - Outdoor pastime
- - Exciting journeys
- - Explore the world
- - Outdoor sport
- - Give back to society
- - Personal interests
- - Stress reduction
- - Take a break
- - Unwind and destress
Down
- - Retirement income
- - Creative handcraft
- - Green retreat
- - Independence
- - Card game for seniors
- - Financial security
- - Enjoyment of free time
- - Intellectual pursuit
20 Clues: - Independence • - Take a break • - Green retreat • - Outdoor sport • - Tranquil state • - Outdoor pastime • - Stress reduction • - Retirement income • - Exciting journeys • - Explore the world • - Creative handcraft • - Mind-body exercise • - Personal interests • - Financial security • - Unwind and destress • - Give back to society • - Intellectual pursuit • - Joyful family members • ...
Academic Words 2024-04-02
27 Clues: part • huge • idea • group • appen • proof • ended • steady • safety • include • connect • foresee • firstly • moreover • procedure • therefore • prevalent • connect to • possibility • restrictions • points/sides • deep attention • characteristic • above expected • never happened before • people who know a lot • change/have an effect on
Trentan Nau Crossword 2022-04-06
20 Clues: a rule • simple • glowed • beyond • hurled • wholly • a place • revealed • peaceful • flat surface • at that time • writing paper • part of something • in a fixed position • used in comparisons • accuracy and detail • the head of the school • possessive form of they • contraction of they are • quiet order and security
33 2025-06-07
Across
- Energetic.
- Pleasing and kind.
- Soothing presence.
- Love and warmth.
- Inner tranquility.
- Feeling safe.
- Softness.
- Easy to love.
- Assisting with health.
- Full of joy.
- Calm and mild.
- Seeking.
- Joy.
Down
- Kind and amiable.
- Belief.
- Finding.
- Helping hand.
- Friendship.
- Calm waiting.
- Saving.
- Strong affection.
- Connection.
- Intelligent.
- Dedication.
- Serenity.
25 Clues: Joy. • Belief. • Saving. • Finding. • Seeking. • Softness. • Serenity. • Energetic. • Friendship. • Connection. • Dedication. • Intelligent. • Full of joy. • Helping hand. • Calm waiting. • Feeling safe. • Easy to love. • Calm and mild. • Love and warmth. • Kind and amiable. • Strong affection. • Pleasing and kind. • Soothing presence. • Inner tranquility. • Assisting with health.
Warlord Wars 2023-09-02
Across
- What was the phrase in missing letters?
- Which warlord had the most points during the vote?
- Which warlord most recently retired?
- Which warlord was recently promoted from recruiters to warlord?
Down
- Which warlord had one member join their team later in the event?
- What is rynnth’s most used emote?
- How many warlords are there?
7 Clues: How many warlords are there? • What is rynnth’s most used emote? • Which warlord most recently retired? • What was the phrase in missing letters? • Which warlord had the most points during the vote? • Which warlord was recently promoted from recruiters to warlord? • Which warlord had one member join their team later in the event?
Flesh Co 2014-07-17
Across
- Hidden security feature
- Print Services and Distribution Association
- Magnetic Ink Character Recognition
- The production department charged with scheduling orders to our equipment
- Image embedded in the paper during papermaking process
- The department prior to platemaking where the digital file is reviewed/edited
- Type of gluing running perpendicular to the web
- Security ink that fades under heat and returns
- Image that uses thin and thick lines which can be scanned
- Four color process printing
- The print process used by Flesh Co for business forms production
- Ultra small font used as a covert security feature Product with pressure sensitive adhesive for applying to a box or product
- Type of business form requiring line holes on the left and right
- Gluing process normally used for finger tab opening
- Thin film applied to variable imaged labels for durability
- Image or mark stamped into the face of a sheet using a shiny material
- Enlarged number used for inventory and automotive tags
Down
- Term used to describe a full color label most often applied to bottles or jars
- Baseball team that may have started Flesh Co in 1913
- Type of pantograph used to deter counterfeiting
- Optical Character Recognition
- Our owner's last name
- Type of form using a liner to create a removable card or label
- Pantone matching system
- Home town of Flesh Co's printing plant since 1968
- Type of paper that does not require carbon paper
- Type of paper normally used to produce checks
- Type of gluing for continuous forms to reduce tenting
- Visible security feature
- The print process used for prime label production
- Chain of________forms are used in healthcare to track patient care
- The equipment used to combine multiple printed rolls into multiple part forms
- Business form format that normally has a top or side stub
- Product with pressure sensitive adhesive for applying to a box or product
- Number of ink towers on our label presses
- Offline department that trims, folds or books your orders
- Words normally printed in red to identify the parts of a form
- Number of generations of Flesh family members involved in our company through time
38 Clues: Our owner's last name • Hidden security feature • Pantone matching system • Visible security feature • Four color process printing • Optical Character Recognition • Magnetic Ink Character Recognition • Number of ink towers on our label presses • Print Services and Distribution Association • Type of paper normally used to produce checks • ...
CyberCrossWord 2022-05-20
Across
- Key A temporary encryption key used between two principals
- The process of verifying an identity by or for a system
- Program that can replicate itself and send copies from computer to computer across network connections
- Function used to protect passwords that are stored in the local database
- Code embedded in a program that copies itself and performs unwanted function
- A decoy system designed to lure a potential attacker away from critical systems
- Assures that information and programs are changed only in a specified and authorized manner
- Weakness in an information system
- The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
- Preserving authorized information access, or disclosure
- Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
- A plastic card that can store and process data
- A procedure whereby two communicating parties can cooperate to acquire a shared secret key
Down
- Assures that a system performs its intended function in an unimpaired manner
- Assures that systems work promptly and service is not denied to authorized users
- A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
- The output of an encryption algorithm; the encrypted form of a message or data
- An attempt to alter system resources or affect their operation
- Assures that private information is disclosed to unauthorized individuals
- Guarding against improper information modification or destruction
- A program that takes over another computer and it's used to launch attacks
- Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
- Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
- Attack An attempt to learn or make use of information from the system that does not affect system resources
- Confidentiality, integrity, and availability
- A random value that is concatenated with a password
- An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
- Assures that a system performs its intended function in an unimpaired manner
- A potential security harm to an asset
- The conversion of plaintext data into unintelligible form
30 Clues: Weakness in an information system • A potential security harm to an asset • Confidentiality, integrity, and availability • A plastic card that can store and process data • A random value that is concatenated with a password • The process of verifying an identity by or for a system • Preserving authorized information access, or disclosure • ...
Chapter 2 Crosswords 2022-11-21
Across
- The mechanism a nation uses to provide and manage money for itself
- A financial institution that accepts money from customers and deposits it into the customer's account
- A financial institution that makes money by issuing loans
- A document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified
- A financial institution that offers savings and loan services
- A bank account used by depositors to accumulate money for future use
- Anything of value that is accepted in return for goods or services
- A financial institution that does not accept deposits
- Paper money is produced by the ___
- Services offered to customers by financial institutions
- A nonprofit financial institution that is privately owned and provides banking services for its members
- Money can be saved and used at a later date
Down
- Money placed into an account
- People who buy shares of stock in the company
- Any organization that provides services related to money
- A financial investment issued by a corporation, government, or other organization
- Money is used in exchange for goods and services needed by individuals, businesses, and governments
- A document guaranteeing payment of a specific amount of money
- A bank account that allows the account owner to make deposits, write checks, and withdraw money
- The use of long-term savings to earn a financial return
- Action taken to manage the supply of money and interest rates
- A prearranged amount of credit that is available for a business to use as needed
- Interest that is earned both on the initial deposit and on the interest earned by the initial deposit
- A security that pays interest over terms ranging from two to ten years
- A regular payment made from a customer's bank account to a vendor or supplier
- For-profit businesses that sell insurance products
- A security that pays interest over terms of ten to thirty years
- A security that matures in a year or less
- A technique for estimating the number of years required to double your money at a given rate of return
- A written order for the bank to pay a specific amount to the person or organization to which the check is written
- A financial institution that provides services for businesses
31 Clues: Money placed into an account • Paper money is produced by the ___ • A security that matures in a year or less • Money can be saved and used at a later date • People who buy shares of stock in the company • For-profit businesses that sell insurance products • A financial institution that does not accept deposits • The use of long-term savings to earn a financial return • ...
Investment Strategies Chapter 2 2022-11-21
Across
- note is a security that pays interest over terms ranging from two to ten years.
- Corporations where shares can be traded openly.
- company is a financial institution that makes money by issuing loans; loan company.
- is a financial investment issued by a corporation, government, or other organization.
- cards allow customers to pay for purchases and withdraw cash.
- account is a bank account used by depositors to accumulate money for future use.
- accounts for sophisticated investors who borrow money to purchase securities.
- it is against the law for investors to act on this kind of information.
- bill is a security that matures in a year or less.
- is a document guaranteeing payment of a specific amount of money; payer named on document.
- bank is a financial institution that provides services for businesses.
- is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
- Transaction Documents that are confirmation statements are issued after the sale of stocks.
- union is a nonprofit financial institution that is privately owned and provides banking services for its members.
- capital market selling stocks and bonds directly to public investors.
- capital market stockholders buy and sell shares of stock from one another with the help of brokers.
Down
- Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
- system is the mechanism a nation uses to provide and manage money for itself.
- firm is a financial institution that is involved in trading securities in financial markets.
- the document that discloses financial information about the company and is filed with the SEC.
- bond is a security that pays interest over terms of ten to thirty years.
- are required to apply for Credit cards.
- deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
- companies are for-profit businesses that sell insurance products.
- someone who assists you with purchasing stocks and bonds.
- Federal Reserve System is the _____ bank of united states.
- institution is a financial institution that does not accept deposits.
- account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
- accounts that need to pay for security purchases within three business days of order.
- banks are largest category of deposit institution.
30 Clues: are required to apply for Credit cards. • Corporations where shares can be traded openly. • bill is a security that matures in a year or less. • banks are largest category of deposit institution. • someone who assists you with purchasing stocks and bonds. • Federal Reserve System is the _____ bank of united states. • ...
payroll 2024-01-04
Across
- a financial compensation that is above and beyond the normal payment expectations of its recipient.
- If you earned $600 or more in nonemployee compensation from a person or business who isn’t typically your employer you would need to fill one of these out.
- is used by citizens or residents of the United States to file an annual income tax return.
- a program that enables workers to receive compensation when they take extended time off work for qualifying reasons.
- like a personal savings account, but this savings account is specifically for an employee's health.
- any government system that provides monetary assistance to people with an inadequate or no income
- documents that keeps track of legality with the IRS
- a federal tax form for employers with $1,000 or less in annual social security, Medicare, and withheld federal income taxes.
- the action or fact of leaving one's job and ceasing to work
- contributes part of each paycheck into a retirement account, where you can generally invest your assets in various types of mutual funds, such as index funds or target date funds.
Down
- a quarterly report that tracks income taxes, Social Security tax, or Medicare tax withheld from employee's paychecks.
- a federal system of health insurance for people over 65 years of age and for certain younger people with disabilities.
- also known as the Transmittal of Wage and Tax Statements, is a summary of a company’s employee earnings and contributions for the preceding year that is sent to the Social Security Administration (SSA).
- what you give employees with their paycheck to outline the details of how much was earned in gross pay and what deductions were made, leaving them with a net pay amount.
- How often an employee gets paid e.g. weekly, bi-weekly,semi-monthly
- a document that you fill out to tell your employer how much federal income tax to withhold from your pay.
- File this form if you paid wages to one or more farmworkers and the wages were subject to social security and Medicare taxes or federal income tax withholding.
- when money is legally withheld from your paycheck and sent to another party. e.g. child support, loans, tuition, etc.
- extra taxes and fees you owe for income that should be reported when you file your income taxes.
- a tax return for employers who pay federal unemployment tax
20 Clues: documents that keeps track of legality with the IRS • a tax return for employers who pay federal unemployment tax • the action or fact of leaving one's job and ceasing to work • How often an employee gets paid e.g. weekly, bi-weekly,semi-monthly • is used by citizens or residents of the United States to file an annual income tax return. • ...
15.1 crossword puzzle 2024-05-08
Across
- what EFT stands for; a transfer of money from one bank account to another
- to exchange one good or service for another good or service
- cards allows customers to pay for purchases directly from their checking accounts
- a type of security that pays interest over terms ranging from two to ten years
- a document guaranteeing payment of a specific amount of money
- a type of security that pays interest over terms of ten to thirty years
- the process of transferring money from one individual or organization to another
- anything of value that is accepted in return for goods and services
- a security that matures in a year or less
- a function of money in the economy in which it is a common measure of the worth or price of a good or service
- coins or banknotes that must be accepted for all debts
Down
- a system by which a government provides money in a country's economy
- the concept that the value of a dollar today is worth more than the value of a dollar in the future
- a financial investment issued by that government, a corporation, or other oganizations
- a function of money in the economy in which it can be saved and used at a later date
- paper money and coins
- a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
- short for The Federal Reserve System
- a property of money in which it is able to be divided into smaller units
- a property of money in which people are able to carry money
- a plastic card that allows the holder to make credit purchases up to an authorized amount
- another word for money
- comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
- any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
- a property of money in which it is made of a strong and lasting material
- a property of money in which it is authentic money immediately recognizable
- a property of money in which it maintains its value over time in order for it to be widely accepted
27 Clues: paper money and coins • another word for money • short for The Federal Reserve System • a security that matures in a year or less • coins or banknotes that must be accepted for all debts • to exchange one good or service for another good or service • a property of money in which people are able to carry money • ...
15.1 crossword puzzle 2024-05-08
Across
- what EFT stands for; a transfer of money from one bank account to another
- to exchange one good or service for another good or service
- cards allows customers to pay for purchases directly from their checking accounts
- a type of security that pays interest over terms ranging from two to ten years
- a document guaranteeing payment of a specific amount of money
- a type of security that pays interest over terms of ten to thirty years
- the process of transferring money from one individual or organization to another
- anything of value that is accepted in return for goods and services
- a security that matures in a year or less
- a function of money in the economy in which it is a common measure of the worth or price of a good or service
- coins or banknotes that must be accepted for all debts
Down
- a system by which a government provides money in a country's economy
- the concept that the value of a dollar today is worth more than the value of a dollar in the future
- a financial investment issued by that government, a corporation, or other oganizations
- a function of money in the economy in which it can be saved and used at a later date
- paper money and coins
- a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
- short for The Federal Reserve System
- a property of money in which it is able to be divided into smaller units
- a property of money in which people are able to carry money
- a plastic card that allows the holder to make credit purchases up to an authorized amount
- another word for money
- comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
- any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
- a property of money in which it is made of a strong and lasting material
- a property of money in which it is authentic money immediately recognizable
- a property of money in which it maintains its value over time in order for it to be widely accepted
27 Clues: paper money and coins • another word for money • short for The Federal Reserve System • a security that matures in a year or less • coins or banknotes that must be accepted for all debts • to exchange one good or service for another good or service • a property of money in which people are able to carry money • ...
Emergency Preparedness - Code Gray 2020-05-27
Across
- Has been sighted or indicated by radar in the area. Move to a safe location now
- If this can be clearly heard at any CMH facility and an Everbridge alert has not been triggered, treat the event as a Tornado Warning, take shelter, and proceed with the Tornado Warning staff response immediately.
- Designation used historically at CMH to indicate severe weather at risk for or generating a tornado.
- Mass communication tool used by CMH for sending emergency alerts to staff
- Communicates with the operators at Adele Hall regarding overhead paging
- Continuously monitors weather alerts from the National Weather Service
- Notified by security dispatch
Down
- After this is made the hospital operator at Adele will send the alert to both code pagers and Cureatr pagers
- Responsible for the meteorological observations, weather forecasts, storm and flood warnings, etc.
- If trying to leave during a Tornado Watch or Warning should be informed and encouraged to stay in the facility
- Located in the Security Department except at Blue Valley
- Monitors the weather radios
- Weather conditions are favorable for the development of tornadoes in and close to the area
13 Clues: Monitors the weather radios • Notified by security dispatch • Located in the Security Department except at Blue Valley • Continuously monitors weather alerts from the National Weather Service • Communicates with the operators at Adele Hall regarding overhead paging • Mass communication tool used by CMH for sending emergency alerts to staff • ...
A Dog Day Afternoon 2019-03-06
18 Clues: Speed King • PA State Dog • Snoopy is One • The Crime Dog • Georgia's Uga • Mexican State • Turner's Hooch • Pampered Pooch • Lassie Lineage • Sled Propeller • Security Guard • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Beethoven Pedigree • Firehouse Favorite • Deutschland Herder
SMTFS Test Crossword 2022-01-21
16 Clues: MTF • NU-7 • ETA-10 • SCP-008 • 05 ____ • SCP-001 • ALPHA-1 • SCP-173 • SCP-049 • EPSILON-9 • EPSILON-11 • ____ Department • Anti-SCP Organization • Soviet Counterpart of UIU • United Nations Organization • Federal Bureau of Investigation UIU
Korean War 2022-09-14
Across
- The UN body who can authorise going to war is called the security...
- Type of protest in which the USSR refused to take up its seat at the UN.
- Asian country that occupied Korea from 1910 to 1945
- Democratically elected leader of South Korea
Down
- Type of vote needed in order for the UN Security Council to authorise going to war.
- Country banned from rejoining the UN Security Council after turning communist in 1949.
- Soviet appointed leader in North Korea
- The Korean Peninsula was divided along the 38th...
8 Clues: Soviet appointed leader in North Korea • Democratically elected leader of South Korea • The Korean Peninsula was divided along the 38th... • Asian country that occupied Korea from 1910 to 1945 • The UN body who can authorise going to war is called the security... • Type of protest in which the USSR refused to take up its seat at the UN. • ...
angol 2020-05-28
organization Chart For Hotel 2021-06-14
10 Clues: ภัตตาคาร • ส่วนหลังบ้าน • ผู้จัดการบาร์ • แผนกขนสัมภาระ • แผนกงานแม่บ้าน • ผู้จัดการทั่วไป • ผู้จัดการห้องพัก • แผนกรักษาความปลอดภัย • พนักงานผสมเครื่องดื่ม • แผนกบริการอาหารและเครื่องดื่ม
word study lesson 2022-03-07
I10 Suffixes 2024-01-12
Spelling Term 3 Week 5 2023-08-24
kOLO LAGOS PUZZLE 2020-11-30
KoloLagos Puzzle 2020-12-03
Puzzle #46 – “Retirement vs Disability Benefits” 2025-06-30
Across
- - Both programs require work ______ to qualify
- - Social Security Disability Insurance
- - Disability benefits do this automatically at retirement age
- - Social Security benefit for those who stop working due to age
Down
- - Benefit for people who can’t work due to health issues
- - Acronym for Full Retirement Age
- - Main factor for disability benefits
- - Must confirm your condition for disability
- - Main factor for retirement benefits
- - Disability recipients must limit this from work
10 Clues: - Acronym for Full Retirement Age • - Main factor for disability benefits • - Main factor for retirement benefits • - Social Security Disability Insurance • - Must confirm your condition for disability • - Both programs require work ______ to qualify • - Disability recipients must limit this from work • - Benefit for people who can’t work due to health issues • ...
Difficult Level 2022-08-16
Across
- Refers to the maximum volume of information transmitted over an internet connection within a given amount of time
- A network security device that controls all traffic from your network and blocks any unauthorized access through a series of security rules
- A protocol that enables voice communication online or over the Internet instead of using a phone line
- The conversion of data into code for security and privacy
- Brief intermittent delays when transferring data online
Down
- A means of connecting a computer to a WiFi network using a wired connection
- A fraudulent activity involving someone pretending to be someone else online to obtain personal data or deploy the malware into the victim's device
- Extensible Markup Language
- A protocol that allows transferring of files remotely from one server/system to another
- The process of solving complex computer science problems
- It is the amount of time data takes to pass from one network to another
- Refers to the unlicensed copying and distribution of any intellectual property with copyright
12 Clues: Extensible Markup Language • Brief intermittent delays when transferring data online • The process of solving complex computer science problems • The conversion of data into code for security and privacy • It is the amount of time data takes to pass from one network to another • A means of connecting a computer to a WiFi network using a wired connection • ...
Cybersecurity Crossword 2025-08-18
Across
- A weakness in a system that can be exploited by attackers.
- A broad term encompassing any malicious software designed to damage or disable computer systems.
- The process of verifying the identity of a user or system
- Engineering The art of manipulating people into divulging confidential information.
- A type of malware that encrypts a victim's files and demands a ransom for their release.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication
Down
- The process of converting data into a code to prevent unauthorized access.
- authentication An extra layer of security requiring users to provide two or more verification factors.
- A type of malware that secretly gathers information about a user's activities
- An attempt to damage or disrupt computer systems or networks.
- A security system that controls network traffic based on predetermined security rules.
- Detection System (IDS) A system that monitors network traffic for suspicious activity.
12 Clues: The process of verifying the identity of a user or system • A weakness in a system that can be exploited by attackers. • An attempt to damage or disrupt computer systems or networks. • The process of converting data into a code to prevent unauthorized access. • A type of malware that secretly gathers information about a user's activities • ...
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
Joe West-Bullying 2022-03-04
Across
- This acronym is useful for bullying.
- What type of bullying is this when you are saying mean things?
- When you are constantly looking for someone, even if they don't want you.
- This happens when bullying situations are REALLY bad.
- When you can understand someone else's fellings.
- The balance of power is now this when you are bullying.
- This is a constant problem.
- Bullying occurs at this building.
Down
- This occurs when mean things are posted online.
- This happens when people name call.
- When you actively harass someone.
- This bullying occurs in a harmful way.
- When you are excluded from a group.
- This person is the best choice to ask for help in a bullying situation where you are bullied.
14 Clues: This is a constant problem. • When you actively harass someone. • Bullying occurs at this building. • This happens when people name call. • When you are excluded from a group. • This acronym is useful for bullying. • This bullying occurs in a harmful way. • This occurs when mean things are posted online. • When you can understand someone else's fellings. • ...
Joe West-Bullying 2022-03-04
Across
- When you are excluded from a group.
- This happens when bullying situations are REALLY bad.
- Bullying occurs at this building.
- This is a constant problem.
- When you actively harass someone.
Down
- This bullying occurs in a harmful way.
- This acronym is useful for bullying.
- When you are constantly looking for someone, even if they don't want you.
- This happens when people name call.
- What type of bullying is this when you are saying mean things?
- This person is the best choice to ask for help in a bullying situation where you are bullied.
- This occurs when mean things are posted online.
- When you can understand someone else's fellings.
- The balance of power is now this when you are bullying.
14 Clues: This is a constant problem. • Bullying occurs at this building. • When you actively harass someone. • When you are excluded from a group. • This happens when people name call. • This acronym is useful for bullying. • This bullying occurs in a harmful way. • This occurs when mean things are posted online. • When you can understand someone else's fellings. • ...
URS Security Crossword 2014-02-18
Across
- Your Assistant FSO is E._______.
- The ____________ (DSS) supports national security and the warfighter through security oversight and education missions.
- Initial and _________ security briefings must be completed by all URS personnel.
- Your FSO is M. _____.
- All visitors must check in through reception and receive a ______.
- ________is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communication.
- Report all suspicious activity to your ______.
Down
- ________ is the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation.
- OPSEC stands for __________.
- You should always make your passwords complex. Use a combination of numbers, symbols & _________.
- __________ describes the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.
11 Clues: Your FSO is M. _____. • OPSEC stands for __________. • Your Assistant FSO is E._______. • Report all suspicious activity to your ______. • All visitors must check in through reception and receive a ______. • Initial and _________ security briefings must be completed by all URS personnel. • ...
Social Security Vocabulary 2014-03-13
Across
- / fixed amount of money paid to someone each year
- / a general increase in prices and falling value of money
- / regularly or frequently behaving in a particular way
- / relation to the running of a home or family relations
- / to be in a state of great shock or surprise
- / Receive as a consequence of ones own or others actions
Down
- / a change of circumstances or fortune
- / the act of showing no mercy or pity
- / something to an exceedingly great extent or degree
- / A persons luck or fate in life
- / a short entrance from a piece of text
11 Clues: / A persons luck or fate in life • / the act of showing no mercy or pity • / a change of circumstances or fortune • / a short entrance from a piece of text • / to be in a state of great shock or surprise • / fixed amount of money paid to someone each year • / something to an exceedingly great extent or degree • / regularly or frequently behaving in a particular way • ...
Common Security Threats 2025-05-19
Across
- Is an attack in which a site appears to do one thing but your click are actually redirected to do something else
- The changing of an email header so that the email appears to come from a different source
- A disruptive program disguised as a useful application. It relies on one to activate it before it can operate
- Malware that is able to distribute itself over a network. It is able to reproduce itself. Usually distributed via email, without a person having to run an infected program.
- Software that downloads itself onto your computer and bombards your computer with adverts that pop us whenever you are connected to the internet
Down
- A scamung practice where a user is automatically redirected to a fake website even if they type in the correct URL of the official site.
- A message or article intended to deceive or defraud others
- A program that is written to disrupt the normal functioning of a computer. Most viruses activate when you open or run an infected file
- A type of software that records your keystrokes as you type in an attempt to dicover your personal information
- Malware that makes data unavailable until you pay the hacket a ransom fee
- Any technique or software that tries to monitor and track the way you use your computer, once it has done this, your information is sent to a third party.
11 Clues: A message or article intended to deceive or defraud others • Malware that makes data unavailable until you pay the hacket a ransom fee • The changing of an email header so that the email appears to come from a different source • A disruptive program disguised as a useful application. It relies on one to activate it before it can operate • ...
Security Meeting Fun! 2025-06-05
Across
- After being robbed make sure to ____ your drawer.
- How many people need to open the branch together?
- After being robbed, you will fill out a suspect ____ form.
- Place a Emergency _____ sign on door.
- When being robbed, what do you push?
- What type of device are you checking the ATM for?
- How much is bait?
Down
- All clear signals should be changed _____.
- Who is allowed to work alone?
- What color are the robbery folders?
- What are you observing while being robbed?
11 Clues: How much is bait? • Who is allowed to work alone? • What color are the robbery folders? • When being robbed, what do you push? • Place a Emergency _____ sign on door. • All clear signals should be changed _____. • What are you observing while being robbed? • After being robbed make sure to ____ your drawer. • How many people need to open the branch together? • ...
internet privacy 2025-05-18
Across
- Private Network encrypts traffic between devices and the internetand protects sensitive data. Users can bypass geographic restrictions as internet traffic is routed.
- This is an individual who gains unauthorized access and exploits weaknesses in the information.
- Loading the data into unreadable format by applying an algorithm
- It is the identity verification before granting access. Authentication enhances the security and privacy of systems. Common methods include passwords, biometrics (fingerprints or facial recognition), and security tokens. Most widely use Multi-factor authentication (MFA) enhances security by requiring more than one form of verification.
Down
- a hidden way of bypassing normal authentication or encryption in a system. It is an illegal way to gain unauthorized access by bypassing the standard security methods. Backdoors can be installed by malware or intentionally left for debugging. It can control the system remotely and poses risks to data.
- The monitoring of incoming and outgoing traffic based on security rules that already had been determined. The system is a barrier between trusted and untrusted networks. it is based on both hardware and software, which analyzes data packets if they should be allowed or blocked. The sensitive information is secured.
- A broad category 9 of malicious software to damage computer systems.
- tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses
8 Clues: Loading the data into unreadable format by applying an algorithm • A broad category 9 of malicious software to damage computer systems. • This is an individual who gains unauthorized access and exploits weaknesses in the information. • tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses • ...
Accept Your Own and Be Yourself 2024-06-30
19 Clues: aim • Plan • The best • aid, help • religious • not enough • young people • ordinariness • companionship • give-and-take • slip, stagger • above, greater • rapper and singer • The reggae Island • impassioned feeling • capacity, dominance • to give yourself grace • sense of security in friendship • the spreading out of a group of people
Themeless 2023-06-18
Across
- MAKES LONG ROUNDS
- IDENTIFYING IMPLANT
- FLIGHTLESS AUSSIE BIRD
- FLIP ONE'S LID
- HOPPING GAME
- NIKE COMPETITOR
- MASSIVE EXCITEMENT
- MYSTICAL
- OF MODERN TIMES
- BEATEN FOR FUN
Down
- OLD SCHOOL SECURITY
- HIGHSTRUNG HORSE BREED
- AN EXPLOSIVE
- SWEDISH FLORA
- BURNING SWEETIES
- SACRED NOT SWISS CHEESE
- PREFIX MEANING ALL
- NOCTURNAL GAS-CHAMBER
- THERE
19 Clues: THERE • MYSTICAL • AN EXPLOSIVE • HOPPING GAME • SWEDISH FLORA • FLIP ONE'S LID • BEATEN FOR FUN • NIKE COMPETITOR • OF MODERN TIMES • BURNING SWEETIES • MAKES LONG ROUNDS • PREFIX MEANING ALL • MASSIVE EXCITEMENT • OLD SCHOOL SECURITY • IDENTIFYING IMPLANT • NOCTURNAL GAS-CHAMBER • HIGHSTRUNG HORSE BREED • FLIGHTLESS AUSSIE BIRD • SACRED NOT SWISS CHEESE
WINTER PUZZLE - WIN A $50 BUNNINGS VOUCHER! 2014-05-16
12 Clues: Lock • Worth • Defend • Season • Appliance • temperature • Security device • Type of shelter • fire protection • Outside storage • Climbing device • One place to another
mfec 2022-03-19
Across
- data security
- measuring data
- collecting data
- database
- one of our motto
- environmental friendly
- what is this event?
- a type of crypto
- synergy partner
Down
- our strategic partner
- judgement making
- our strategic partner
- our strategic partner
- collection of investments
- necessary
- original crypto
- our strategic partner
- digital currency
- trading mechanism
- technology related to finance
20 Clues: database • necessary • data security • measuring data • original crypto • collecting data • synergy partner • judgement making • digital currency • one of our motto • a type of crypto • trading mechanism • what is this event? • our strategic partner • our strategic partner • our strategic partner • our strategic partner • environmental friendly • collection of investments • technology related to finance
Civil War: Early Stages 2025-02-07
Across
- A confederate flagship, famous like it's sistership, CSS Alabama.
- A type of warship used between the Union and Confederacy.
- A court order forcing imprisonment.
- A vessel that overtakes a blockade, mostly to smuggle goods into a protected territory.
- Money given as a reward, such as encouragement to join a Nation's security force.
- 16th President of the U.S, lead the Union through the Civil War. He was killed At Ford's Theater on April 5th, 1865.
- The south's economy fell apart after a food shortage, forcing families to break into stores and loot them for food.
- First female physician in the U.S. Created the first training programs for nurses.
Down
- 1st and only President of the Confederacy, Imprisoned at the end of the war at Fort Monroe.
- A confederate flagship, famous like it's sistership, CSS Florida.
- A person captured during a war, often one of high power or a member of the nation's security forces.
- A type of bread made out of wheat flour.
- The Southern Territories, Pro-Slavery
- Forced enlistment/Drafting into a nation's security forces.
- A speech given by the 16th Union President.
- A battle between Confederate General Lee and Union General McClellan, The south began the battle to gain recognition from European powers.
- A POW camp in Andersonville Georgia, it's the most infamous for the lack of shade nor shelter. The prison suffered from supply chain issues, overpopulation, and disease.
- The Northern territories, anti-slavery.
- The Confederate gateway through the Mississippi River, It was the war's turning point after the Union liberated it.
19 Clues: A court order forcing imprisonment. • The Southern Territories, Pro-Slavery • The Northern territories, anti-slavery. • A type of bread made out of wheat flour. • A speech given by the 16th Union President. • A type of warship used between the Union and Confederacy. • Forced enlistment/Drafting into a nation's security forces. • ...
Synthetic Corruption 2025-10-05
Across
- medium for encrypted light-based data
- Illicit interface used to override firewalled fashion
- Central energy source powering the cyber grid(Sun god, metaphor for a solar core)
- Style upgrade triggered by high-radiation aesthetic
Down
- Brain overload triggered by rising system pressure
- Hostile thermal attack targeting organic code
- Result of fried hardware and voltage collapse
7 Clues: medium for encrypted light-based data • Hostile thermal attack targeting organic code • Result of fried hardware and voltage collapse • Brain overload triggered by rising system pressure • Style upgrade triggered by high-radiation aesthetic • Illicit interface used to override firewalled fashion • ...
HOMEWORK DE INFORMATIC 2023-05-11
Across
- Backup of data stored on a device or computer system.
- A set of physical components of a computer, such as the CPU, memory, and input/output devices.
- Ordered set of systematic operations that allows to make a calculation and solve a problem.
- Global communication network that allows the interconnection of computers and devices worldwide.
- The process of writing, testing, and maintaining the source code of a computer program.
Down
- Malicious program designed to damage or alter the operation of a computer or computer system.
- Structured set of information organized and accessible through software.
- Unix-based open source operating system known for its stability and security.
- Set of computer programs and applications that allow the operation of a computer.
- Information encoding and decoding technique in order to guarantee its security and confidentiality.
- Computer security system that controls network traffic and protects against unauthorized access.
11 Clues: Backup of data stored on a device or computer system. • Structured set of information organized and accessible through software. • Unix-based open source operating system known for its stability and security. • Set of computer programs and applications that allow the operation of a computer. • ...
Loan Admin 2025-11-04
Across
- What the bank performs to ensure the title to real estate collateral is clear of unknown liens.
- The legal arrangement used to obtain a security interest in a farmer's assets (e.g., equipment, inventory, crops)
- The analysis of a farmer's income, expenses, and overall financial health.
- The amount owed to the Bank
Down
- A legal document that promises real estate as security for the loan.
- The type of insurance necessary for property located in certain high-risk zones.
- A loan used by a producer to cover inputs like seed, fertilizer, and labor until the harvest is sold
- The annual process of verifying a borrower's current financial status, often involving updated financials and collateral checks.
- Federal Agency that may provide direct loans or guarantees to farmers
- The legal description of the property is often found in this report.
- The document filed to publicly assert a security interest in collateral other than real estate (like equipment or crops).
11 Clues: The amount owed to the Bank • A legal document that promises real estate as security for the loan. • The legal description of the property is often found in this report. • Federal Agency that may provide direct loans or guarantees to farmers • The analysis of a farmer's income, expenses, and overall financial health. • ...
EDS Training Lesson 11 - Top Navigation & Manage Security 2022-05-18
Across
- If the CSA is asking to add 1050 coding to a PRI, what do we need from them, signed by an Authorized signor for their plan?
- This type of messaging is available within the Sponsor Service Center [SSC].
- Auto-Forwarding _______ are one of these Rules the ER can set up within the Message Center.
- My Profile is where the ER can change their Multi Factor ____________.
- This coding [1047 APLS] involves access to sign off on the financial decisions.
- 1050 APLS coding is plan trans these docs.
- Form Number PG4722PA-08 is used to change Primary Administrative ________ Access.
Down
- If the ER has 1100 APLS coding they can change this rate for their participant.
- This Center is where the Employer receives all correspondences regarding their plan
- The authorized signors for their company can do this online to approve documents which require signatures.
- This person is another Administrator, but not the PRI (abbreviated)
- The Primary is the only one who can "overlook" or _______ the security on a plan.
- The Primary will click on the blue bullet in Manage security to add this new _______.
- At the place where this Navigation Bar is located?
14 Clues: 1050 APLS coding is plan trans these docs. • At the place where this Navigation Bar is located? • This person is another Administrator, but not the PRI (abbreviated) • My Profile is where the ER can change their Multi Factor ____________. • This type of messaging is available within the Sponsor Service Center [SSC]. • ...
YN BIBLIOGRAPHIES 2020-01-31
Across
- DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL
- DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM
- VOLUME 7A MILITARY PAY POLICY - ACTIVE DUTY AND RESERVE PAY
- DEPARTMENT OF THE NAVY INFORMATION REQUIREMENTS (REPORTS) MANUAL
- SOCIAL USAGE AND PROTOCOL HANDBOOK
- CERTIFICATE OF RELEASE OR DISCHARGE FROM ACTIVE DUTY
Down
- DEPARTMENT OF THE NAVY NAVY RECORDS MANAGEMENT PROGRAM RECORDS MANAGEMENT MANUAL; PART I, II, III
- NAVY DIRECTIVES MANAGEMENT PROGRAM
- NAVAL MILITARY PERSONNEL MANUAL
- DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL
- DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM
- VOLUME 9 TRAVEL POLICY
- ADVANCEMENT MANUAL FOR ENLISTED PERSONNEL OF THE U.S. NAVY AND U.S. NAVY RESERVE
- NAVY AND MARINE CORPS AWARDS MANUAL
14 Clues: VOLUME 9 TRAVEL POLICY • NAVAL MILITARY PERSONNEL MANUAL • NAVY DIRECTIVES MANAGEMENT PROGRAM • SOCIAL USAGE AND PROTOCOL HANDBOOK • NAVY AND MARINE CORPS AWARDS MANUAL • DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL • DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL • DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM • DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM • ...
Terminology cross word 2025-05-05
Across
- A unique identifier for devices on a network.
- A small network within a limited area.
- The arrangement of devices in a network.
- A computer or device requesting services from a server
- The maximum data transfer rate of a network
Down
- A security system that blocks unauthorized access
- A private, internal network within an organisation.
- A set of rules for data exchange in networks.
- A person managing network systems and security.
- A communication endpoint for network connections.
- A system of connected computers or devices.
- The process of converting data into a secure format.
- A computer providing resources or services to clients.
13 Clues: A small network within a limited area. • The arrangement of devices in a network. • A system of connected computers or devices. • The maximum data transfer rate of a network • A set of rules for data exchange in networks. • A unique identifier for devices on a network. • A person managing network systems and security. • A security system that blocks unauthorized access • ...
CCC - Security Crossword 2023-06-14
Across
- A security framework that distrusts any entity or device from accessing resources.
- What demanding product lead time is only 21 days with incentive for every box sold?
- Usually an URL that links to a fake login website that steals credentials via Email, text messages?
Down
- A framework that integrates security features such as secure web gateway, cloud firewall, DNS-layer security, and cloud access security broker (CASB),delivers protection for users regardless of their location, device, or application.
- A feature that requires users to provide two or more authentication steps to confirm their identity.
- prevention on data loss and unauthorized access of sensitive data by implementing and enforcing security policies.
- Encrypts data when it is being transmitted between devices through a secure tunnel.
7 Clues: A security framework that distrusts any entity or device from accessing resources. • Encrypts data when it is being transmitted between devices through a secure tunnel. • What demanding product lead time is only 21 days with incentive for every box sold? • Usually an URL that links to a fake login website that steals credentials via Email, text messages? • ...
ity,ty,dom 2022-03-10
Crossword Puzzle 2022-12-19
Scoutbee Crossword 2023-01-12
AI 2025-03-02
Data Confidentiality - Day 02 2014-11-03
Across
- An infected computer which is controlled by an attacker
- Prevents malware from entering a computer
- Security update intended to cover vulnerabilities
- Is an external device used for backups
- Displays a fictitious warning
Down
- Captures key strokes
- Runs on a computer without the owner's knowledge
- Sends itself to other computers over the network
- Gives access to a program or service while bypassing normal security measures
- Delivers advertising content
10 Clues: Captures key strokes • Delivers advertising content • Displays a fictitious warning • Is an external device used for backups • Prevents malware from entering a computer • Runs on a computer without the owner's knowledge • Sends itself to other computers over the network • Security update intended to cover vulnerabilities • ...
Cybersecurity Threats and Defenses 2025-09-24
Across
- Fake website designed to steal credentials
- Protects data on a wireless network
- Continuous monitoring of network traffic
- Security test that simulates a real attack
- Prevents unauthorized physical entry to a secure area
Down
- A malicious attack that floods a system with traffic
- Secures communication over the internet
- Framework of rules and policies governing security
- Keeps track of system events for auditing
- Hidden malicious code inserted into software
10 Clues: Protects data on a wireless network • Secures communication over the internet • Continuous monitoring of network traffic • Keeps track of system events for auditing • Fake website designed to steal credentials • Security test that simulates a real attack • Hidden malicious code inserted into software • Framework of rules and policies governing security • ...
compounds 2021-12-01
13 Clues: экипаж • домашний • стюардесса • регистрация • зал ожидания • место у окна • ручная кладь • багажная лента • подозрительный • место у прохода • посадочный талон • паспортный контроль • check проверка безопасности
Account General Crossword Puzzle 2014-07-24
13 Clues: AU • BT • POA • 19.9% • OPEN. • PUZZLE 5 • SECURITY CODE • CREDIT BUREAU • SELF SERVICE. • SUSPICIOUS MESSAGE • MUST READ VERBATIM. • ANNUAL PERCENTAGE RATE • REOCCURING MONTHLY ON DUEDATE.
INFORMATION TECHNOLOGY 2017-05-08
Activity 2021-02-06
Across
- combines and provides threat intelligence feeds to end users.
- detects all endpoint threats.
- allows users to run multiple instances of operating systems.
- tools hinders investigation.
- consists of identification and selection of data.
- is a process that allows one to obtain a bit-for-bit copy of data to avoid damage of original data.
Down
- testing checks the effectiveness of security defenses.
- incorporates security assurance at every stage.
- converts the information extracted to a format that can be understood by investigators.
- combines agile development, agile infrastructure, and flexible operations.
- is a Windows application to attain IP address.
- displays help.
- helps to make directory.
13 Clues: displays help. • helps to make directory. • tools hinders investigation. • detects all endpoint threats. • is a Windows application to attain IP address. • incorporates security assurance at every stage. • consists of identification and selection of data. • testing checks the effectiveness of security defenses. • ...
Activity 2020-12-28
Across
- combines and provides threat intelligence feeds to end users
- detects all endpoint threats
- allows users to run multiple instances of operating systems
- tools hinders investigation
- consists of identification and selection of data
- is a process that allows one to obtain a bit-for-bit copy of data to avoid damage of original data
Down
- testing checks the effectiveness of security defenses
- incorporates security assurance at every stage
- converts the information extracted to a format that can be understood by investigators
- combines agile development, agile infrastructure, and flexible operations
- is a Windows application to attain IP address
- displays help
- helps to make directory
13 Clues: displays help • helps to make directory • tools hinders investigation • detects all endpoint threats • is a Windows application to attain IP address • incorporates security assurance at every stage • consists of identification and selection of data • testing checks the effectiveness of security defenses • allows users to run multiple instances of operating systems • ...
Structure Crossword 2020-09-13
Across
- The only state without a state level police force
- The Department of ____________ Security protects the nation’s leaders
- Who appoints the Judges of the Supreme Court
- Short term holding facility for inmates
- Made up of 4-5 Fire stations and their companies
- This person interacts the most with prisoners
Down
- The highest level of security in prison
- Supervises the daily operations at a fire station
- The highest person in command in prison
- The main purpose of prison
- The highest court in the land
- The only court where the Judges are not appointed by the president
- The court that determines whether the law was applied correctly
13 Clues: The main purpose of prison • The highest court in the land • The highest level of security in prison • The highest person in command in prison • Short term holding facility for inmates • Who appoints the Judges of the Supreme Court • This person interacts the most with prisoners • Made up of 4-5 Fire stations and their companies • ...
Executive Protection 2013-03-09
Across
- Important person - time period 1850
- Type of method to reduce security problems; a way to look for faults in a plan
- The level of a relationship to avoid between client and protector
- Needed to be able to provide proper protection
- Outlines the security guards responsibilities and licensing
- The difference between Bodyguards and Executive Protection
Down
- Who qualifies to receive E.P.
- Needed to want to harm the client
- When E.P. observes another person who is observing the client
- What you provide for a client
- the highest level of protection
- Third step to take when preparing for the mission
- What a potentially dangerous subject exhibits when they are nervous
13 Clues: Who qualifies to receive E.P. • What you provide for a client • the highest level of protection • Needed to want to harm the client • Important person - time period 1850 • Needed to be able to provide proper protection • Third step to take when preparing for the mission • The difference between Bodyguards and Executive Protection • ...
Vocab unidad 2/2 2016-11-15
16 Clues: stop • screen • flight • station • to board • suitcase • door/gate • itinerary • to travel • bathing suit • bathing suit • boarding pass • to take a taxi • carry-on/hand luggage • to go through security • the check-in the luggage
maeves adress 2024-01-18
17 Clues: dec • mine • not mauve • like like • headlights • additional • not a suit • meets sally • after TOwomba • hahahaha AGAIN • maria + not old • NOT in canberra • NOT burley griffin • dalmations minus one • international security • not property of the king • a tree you can carry in your hand
INTERACTION 2020-05-22
24 Clues: ODD • RARE • ENEMY • EMPTY • HUNGER • SEVERE • TO FIX • STRANGE • NOT LUCKY • AGRESSIVE • OWNERSHIP • CONCTRACT • PROTECTION • NOT ENOUGH • TO CONDEMN • NOT ALLOWED • MOST OF PEOPLE • CONTINUE TO LIVE • EASY TO UNDERSTAND • NOT RECOGNIZE VALUE • REAL STATE RECEIVED • STATEMENT OF DANGER • FEELING ABOUT YOURSELF • RECOGNIZE VALUE ABOVE EXPECTATIONS
CSALÁD - NYELVVISZGA FELKÉSZÍTŐ 2021-01-22
Across
- anyagilag
- túlterhelt
- érett
- kezdeményez
- együttél
- alkalmazkodik valamihez
- vmi miatt
- házastársi problémák
- valószínűleg
- nem leányálom
- randira hív vkit
- biztonság, védelem
Down
- érték
- nevelés
- addig, amíg
- bánik, kezel, viselkedik valakivel valahogyan
- nézőpont
- keletkezik, előfordul
- hajlamos valamire/valamit megtenni
- vita, veszekedés
- egyensúlyoz, bűvészkedik
- társ
- megjelenés, külső
- kenyérkereső
- betölt (szerepet)
25 Clues: társ • érték • érett • nevelés • nézőpont • együttél • anyagilag • vmi miatt • túlterhelt • addig, amíg • kezdeményez • kenyérkereső • valószínűleg • nem leányálom • vita, veszekedés • randira hív vkit • megjelenés, külső • betölt (szerepet) • biztonság, védelem • házastársi problémák • keletkezik, előfordul • alkalmazkodik valamihez • egyensúlyoz, bűvészkedik • hajlamos valamire/valamit megtenni • ...
Music Festival 2014-05-14
20 Clues: tv • Rich • Rain • loud • Dirty • Safety • Hunger • Mandms • Guitars • Hear it • To clean • To announce • Dog smokes weed • Promote the event • To raise awareness • Z Beyoncé's husband • You have to buy them • Straight out of Compton • Dre Best doctor who raps • Cube You put it in your drink
Crucigrama de la Unidad 6 2022-05-06
35 Clues: earn • field • award • level • growth • strong • exceed • relate • wealth • reduce • income • measure • achieve • poverty • advance • housing • serious • average • possess • support • indicate • security • conclude • increase • citizens • although • statistic • challenge • reduction • happiness • well-being • environment • contemporary • unemployment • satisfaction
Vlad 2024-02-26
Across
- работный дом
- весь, целый
- уязвимый
- в зависимости от дохода
- продвижение, достижение
- против
- власти
- облегчение
- предложить
- поддержка
- безопасность
- учреждение
- безработица
- страхование
- среднестатистический
Down
- гос служба
- казначейство
- благосостояние
- правительство
- пенсия по возрасту
- задержать, предотвратить
- суровый, резкий
- занимать (место, время)
- управляемый гос-вом
- ___ responsibility
25 Clues: против • власти • уязвимый • поддержка • гос служба • облегчение • предложить • учреждение • весь, целый • безработица • страхование • казначейство • работный дом • безопасность • правительство • благосостояние • суровый, резкий • пенсия по возрасту • ___ responsibility • управляемый гос-вом • среднестатистический • в зависимости от дохода • продвижение, достижение • занимать (место, время) • задержать, предотвратить
VOCABULARY JUNE 2023 2024-04-27
31 Clues: głos • okres • wejść • umysł • jasny • prawie • krawat • rysunek • kradież • przerwa • głównie • otoczyć • wyblakły • żywopłot • jadalnia • trudność • wściekły • wliczając • rozpoznać • przystojny • skradziony • podniesiony • przyjemność • dzielić się • przedstawić • być w stanie • odpowiedzieć • koszt, opłata • ubezpieczenie • zastanawiać się • ochrona, zabezpieczenie
El Aeropuerto Vocabulario 2024-04-23
27 Clues: tail • gate • seat • plane • wings • pilot • tower • to fly • stairs • customs • to land • cockpit • luggage • airline • to show • to lose • security • suitcase • to check • to board • passenger • to pick up • to take off • boarding pass • check-in counter • flight attendant • to fasten seatbelt
Sportsbook 2024-07-22
24 Clues: AMC • Dogs • Coach • Rocco • Tebow • Crypto • Badger • LaLiga • Boss Man • Security • McGregor • Brooklyn • Boss Maam • The Closer • Miami Heat • The Opener • Tip Magnet • Next Guest! • "Here We Go!" • Bigger Boss Man • Hot Pink Jacket • 50s and Old 100s • Locked Kiosk Tickets • "I have an app issue"
3a 2024-06-21
Across
- Licensed pilot
- In charge of the deck
- Sharpshooter
- Grenade specialist
- Radar technician
- Infantry soldier
- Scout and sniper
- Steers the ship
- Guard post
Down
- Security role
- Artillery rank
- Skilled mechanic
- Keeps guard
- Directs the course
- Air force lieutenant
- Submarine technician
- Air cargo manager
- Assists the pilot
- Communications expert
- Ammunition technician
20 Clues: Guard post • Keeps guard • Sharpshooter • Security role • Artillery rank • Licensed pilot • Steers the ship • Skilled mechanic • Radar technician • Infantry soldier • Scout and sniper • Air cargo manager • Assists the pilot • Directs the course • Grenade specialist • Air force lieutenant • Submarine technician • In charge of the deck • Communications expert • Ammunition technician
1.9 El Viaje 2025-05-09
21 Clues: the bus • the park • the store • the plane • the train • the hotel • the museum • the ticket • the church • the airport • the luggage • the security • the hospital • the passport • the suitcase • the backpack • the pharmacy • the metro (Subway) • the police station • do you speak English • we are going on a trip
NATIVE AMERICAN - not rats! 2025-12-01
30 Clues: lof • röð • geta • ætlun • villa • deild • öryggi • slétta • afkóða • endast • vaxandi • blekkja • gljúfur • framlag • kynning • rannsókn • senda út • hugrekki • eyðimörk • ákaflega • neyðarkall • dulkóðaður • reikningur • ráða dulmál • eiga skilið • áreiðanlegur • dulmálsfræði • standa fyrir, tákna • vera settur saman úr • gríðarlega mikilvægt
Juan Pablo crosword 2023-03-09
Across
- Every night, our security team make a ____.
- Our ____ team is scanning all servers.
- A ___ is the person who try to get you information.
- Always you have to update your _____.
Down
- by police, all data is ____.
- Rember make a ___ today.
- you ___ should have at least one number.
- Don't open the ___ if you don't know the email.
- Don't share the internal ______.
9 Clues: Rember make a ___ today. • by police, all data is ____. • Don't share the internal ______. • Always you have to update your _____. • Our ____ team is scanning all servers. • you ___ should have at least one number. • Every night, our security team make a ____. • Don't open the ___ if you don't know the email. • A ___ is the person who try to get you information.
Sigurnost na mreži 2021-02-01
Across
- programi koji neprestano umnožavaju sami sebe zagušujući promet podataka na mreži
- mali programi koji imaju za cilj napraviti štetu
- ili cyber- bullyng neke od mogućih zlouporaba
- vrsta štetnih, zlonamjernih programa?
Down
- konj programi koji se maskiraju u poznate, bezopasne programe, a zapravo rade štetu na vašem računalu
- programi koje prate što radite na računalu i o tome obavještavaju druge
- za upotebu interneta treba ti ?
- zaraženom raučunalu
8 Clues: zaraženom raučunalu • za upotebu interneta treba ti ? • vrsta štetnih, zlonamjernih programa? • ili cyber- bullyng neke od mogućih zlouporaba • mali programi koji imaju za cilj napraviti štetu • programi koje prate što radite na računalu i o tome obavještavaju druge • programi koji neprestano umnožavaju sami sebe zagušujući promet podataka na mreži • ...
¡Vamos de viaje! 2022-07-25
19 Clues: gate • flight • airport • arrival • to board • bus stop • passenger • departure • train station • baggage claim • to take a taxi • tourist office • to get in line • monitor; screen • flight attendant • to go through customs • to check one’s luggage • to go through security • Can you please tell me where is?
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
Bullying crossword 2022-04-26
Across
- someone who tries to help those who have been victimized around them
- someone who you can tell if you are being bullied and has authority at school
- bullying through exclusion
- someone who ignores an act of violence
Down
- bullying through insults and threats
- a bullying form rooted in violence
- something that can happen from being bullied, another word for sadness
- a person who actively attempts to harm others physically or mentally
- a type of bullying commonly found online
9 Clues: bullying through exclusion • a bullying form rooted in violence • bullying through insults and threats • someone who ignores an act of violence • a type of bullying commonly found online • someone who tries to help those who have been victimized around them • a person who actively attempts to harm others physically or mentally • ...
Political Risks 2025-03-27
Across
- A company type more likely to face unpredictable government action
- Financial or trade penalties often politically motivated
- Governments offer these to attract and protect foreign investors
- Strong patriotic sentiment that can lead to business restrictions
- When control of a foreign company is gradually transferred to locals
Down
- Regulatory controls on currency that limit profit repatriation
- Financial or trade penalties often politically motivated
- Government seizure of assets with some compensation
- Groups that may disrupt stability through protests or cyber threats
- Seizure of foreign assets without compensation
10 Clues: Seizure of foreign assets without compensation • Government seizure of assets with some compensation • Financial or trade penalties often politically motivated • Financial or trade penalties often politically motivated • Regulatory controls on currency that limit profit repatriation • Governments offer these to attract and protect foreign investors • ...
cybber ethics 2025-06-09
Across
- – A harmful program that can damage your device.
- – Treating others respectfully online.
- – What you should never share online .
- – Copying someone else's work and claiming it as your own.
- – Harassment or bullying that happens via digital devices.
Down
- – A good digital citizen always gets this before using someone else's work.
- – Using technology in a morally responsible way is called cyber ____.
- – The act of accessing someone else’s data without permission.
- – Illegal copying and distribution of software or media.
9 Clues: – Treating others respectfully online. • – What you should never share online . • – A harmful program that can damage your device. • – Illegal copying and distribution of software or media. • – Copying someone else's work and claiming it as your own. • – Harassment or bullying that happens via digital devices. • ...
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- Someone who posts rude or off-topic messages in an online community
- malware,cyber-destroyer, break your technology
- Rules or manners for interacting courteously with others online
- Setting up a fake online profile
- unwanted emails
- A hostile and insulting interaction between internet users.
Down
- Sharing someone’s secrets or embarrassing information online
- An image that is captured of what is shown on a phone, tablet, or computer screen
- Online communities, also known as social networks
- A technology that allows us to access our files through the internet from anywhere in the world.
10 Clues: unwanted emails • Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Joy at Work 2024-05-06
Across
- Loyd’s of London began in 1688 in what kind of business?
- Who founded AmFam Insurance?
- First insurer to sell online
- Largest writer of cyber insurance in the US.
Down
- First property insurance company in the US.
- Who founded the first insurance company in the US?
- What insurance agency offers a policy against alien abduction?
- What AFV LP’s founding family is still leading the company?
- What insurer was founded by the retailer Sears (who its clearly outlived)?
- Which insurer was founded with the thesis that government employees were better drivers than average?
10 Clues: Who founded AmFam Insurance? • First insurer to sell online • First property insurance company in the US. • Largest writer of cyber insurance in the US. • Who founded the first insurance company in the US? • Loyd’s of London began in 1688 in what kind of business? • What AFV LP’s founding family is still leading the company? • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
Terrorism 2022-06-09
Across
- A terrorist's handling of a grievance with aggression
- Type of combat against military personnel to achieve political or ideological goals
- Ganor's target of terrorism
- Terrorist attacks on information systems
- Acronym for Lohamei Herut Yisrael, organization that used terror to force Britain out of Palestine
- Religious sacrifices freeing terrorists of guilt and entering paradise
- Biological terrorist attack used by Al-Qaeda in 2001
Down
- Strategy for quick, effective political action, including violence for terrorists
- Covert terrorist operatives that carry out terrorist missions
- Acronym to classify different terrorist attacks
10 Clues: Ganor's target of terrorism • Terrorist attacks on information systems • Acronym to classify different terrorist attacks • Biological terrorist attack used by Al-Qaeda in 2001 • A terrorist's handling of a grievance with aggression • Covert terrorist operatives that carry out terrorist missions • Religious sacrifices freeing terrorists of guilt and entering paradise • ...
SSAMAY 2017-05-02
Internship 2021-05-01
Words w.38 2025-09-18
Spelling 3 2023-08-23
15 Clues: stockings • hazard,risk • rubber band • fasten,join • thick sheet • make,produce • fuzzy sticks • notice,advice • Play Doh Clay • make a hole in • clippers,shears • direction,guidance • well-being,security • coating,sheet,cover • extraordinary,amazing
Spanish Vocab 2022-05-04
15 Clues: guard • counter • airline • to land • e-ticket • procedure • to cancel • waitng list • security area • check-in kiosk • excess luggage • metal detector • luggage carousel • flight connection • to fasten the seatbelt
