cyber security Crossword Puzzles
ASEAN 2019-08-22
Across
- singkatan dari ASEAN Security Community
- singkatan dari Southeast Asian Games
- negara-negara yang terletak pada suatu wilayah yang sama dapat terdorong untuk kerja sama.
- singkatan dari ASEAN Socio-Cultural Community
- singkatan Konferensi Tingkat Tinggi
- singkatan dari ASEAN Youth Leadership Development Programme
- singkatan dari ASEAN Ministers Responsible for Culture and Arts
- singkatan dari ASEAN Agreement on Disaster Management and Emergency Response
- singkatan dari ASEAN Youth Forum
- singkatan dari confidence building measures
Down
- singkatan dari Environmentally Sustainabe City
- singkatan dari South-East Asia Nuclear Weapon Free Zone
- singkatan dari ASEAN Commmittee on Culture and Information
- kegiatan atau usaha yang dilakukan oleh beberapa orang untuk mencapai tujuan bersama.
- singkatan dari North Atlantic Treaty Organization
- singkatan dari ASEAN Political Security Community
- singkatan dari ASEAN Convention on Counter Terrorism
- singkatan dari Zone of Peace, Freedom And Neutrality
- singkatan dari ASEAN Defence Ministers Meeting
- singkatan dari ASEAN Youth Leadership Forum
- singkatan dari ASEAN Regional Forum
- singkatan dari ASEAN Economic Community
22 Clues: singkatan dari ASEAN Youth Forum • singkatan Konferensi Tingkat Tinggi • singkatan dari ASEAN Regional Forum • singkatan dari Southeast Asian Games • singkatan dari ASEAN Security Community • singkatan dari ASEAN Economic Community • singkatan dari ASEAN Youth Leadership Forum • singkatan dari confidence building measures • singkatan dari ASEAN Socio-Cultural Community • ...
Infosec Crossword Puzzle Contest 2019-08-29
Across
- Should not be shared / kept open to anyone
- Bypassing system’s customary security mechanism
- Unplanned disruption or failure of a feature or service
- Malware which presents unwanted advertisements
- Microsoft Office is an _______ software
- Threat X Vulnerability
- A Weakness in a system
- Virtual _________ Network
- A terminal emulator / serial console that support SSH
- A Software products which provide real-time analysis of security alerts by network hardware and application
Down
- A fraudulent social engineering attempt to obtain sensitive information
- Malicious software that replicates while moving across information systems
- The refusal of something requested or desired.
- Successfully exploiting vulnerability is known as
- Technology designed to keep the bad guys out
- Application of investigative analysis on a computer
- _______ makes password / passphrase more secure
- ___________ is stimuli that has meaning in some context for its receiver
- Confidentiality,___________,Availability
- address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
20 Clues: Threat X Vulnerability • A Weakness in a system • Virtual _________ Network • Microsoft Office is an _______ software • Confidentiality,___________,Availability • Should not be shared / kept open to anyone • Technology designed to keep the bad guys out • The refusal of something requested or desired. • Malware which presents unwanted advertisements • ...
Infosec Crossword Puzzle Contest 2019-08-29
Across
- Virtual _________ Network
- Malware which presents unwanted advertisements
- A Weakness in a system
- Application of investigative analysis on a computer
- Should not be shared / kept open to anyone
- Unplanned disruption or failure of a feature or service
- _______ makes password / passphrase more secure
- Confidentiality,___________,Availability
- Threat X Vulnerability
- ________ is created by hackers for unauthorized entry at any point of time..
Down
- Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
- A terminal emulator / serial console that support SSH
- Web __________ Penetration Testing
- A Network security device that monitors and filters incoming / outgoing network traffic
- ___________ is stimuli that has meaning in some context for its receiver
- The refusal of something requested or desired.
- The process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment.
- Successfully exploiting vulnerability is known as
- A fraudulent social engineering attempt to obtain sensitive information
- Malicious software that replicates while moving across information systems
20 Clues: A Weakness in a system • Threat X Vulnerability • Virtual _________ Network • Web __________ Penetration Testing • Confidentiality,___________,Availability • Should not be shared / kept open to anyone • Malware which presents unwanted advertisements • The refusal of something requested or desired. • _______ makes password / passphrase more secure • ...
Airlines 2019-02-12
Across
- - the side of an airport terminal beyond passport and customs control.
- - a place at the airport which checks the goods,travellers and luggage
- - a computer network
- - a security service for aviation services.
- - a three letter code for Los Angeles airport
- - The area in which people gather before departure.
- - a place to change money
- - a place where waste goes
- - A small building used for worship.
- - people who fly on the plane
Down
- - flying an aircraft
- - an office where customers go for services
- - the side of an airport terminal to which the general public has unrestricted access.
- - people who check that everything is secure in a place
- - The area in which you ensure your personal hygiene is up to standard.
- - goods that are exempt from tax.
- - picks up people and moves them to a different level.
- - volunteers who assist customers in the airport
- - a piece of equipment provided for a particular service.
- - things you take when going on an holiday
20 Clues: - flying an aircraft • - a computer network • - a place to change money • - a place where waste goes • - people who fly on the plane • - goods that are exempt from tax. • - A small building used for worship. • - things you take when going on an holiday • - an office where customers go for services • - a security service for aviation services. • ...
HE+ NS 2023-09-28
Across
- helps support youth globally
- group that works within state authority
- helps the Oriental region by helping to progress their economies
- protects species while helping local communities
- gives global loans to countries in need to help the global economy
- upholds dignity of others and advances their liberties
- organization that supports globally sustainable economic growth
- helps developing countries build their trade capacity
- group made up of independent organizations that promotes environmental sustainability
- humanitarian group that provides care for victims of war, violence, and emergencies
- wellness group
- group that operates independently from state authority
Down
- helps families who struggle with house financing
- safeguard of freedom and security politically and militarily
- world's largest human right's organization
- fighting inequality to end poverty and injustice
- globally connects governments to improve the international enviroment
- promotes togetherness between the continent with the most countries
- promotes peace and security on the Eastern Hemisphere
- countries that work together to solve common problems and maintain relations
20 Clues: wellness group • helps support youth globally • group that works within state authority • world's largest human right's organization • helps families who struggle with house financing • protects species while helping local communities • fighting inequality to end poverty and injustice • helps developing countries build their trade capacity • ...
Tech and Cyber Crime Mysteries 2025-01-06
Across
- An ethical hacker who helps organizations improve security
- Any program designed to damage or gain unauthorized access
- Hyper-realistic synthetic media used for deception
- The practice of recovering and analyzing electronic evidence
- Digital tokens often demanded as ransom payments
- Unauthorized exposure of login credentials
- A code injection exploit targeting databases
- Security system monitoring incoming and outgoing network traffic
Down
- The process of scrambling data to prevent unauthorized access
- A program secretly recording every keystroke typed
- Malicious software that locks files until payment is made
- Someone who breaks into computer systems for illicit or ethical reasons
- Overwhelming a target server with excessive traffic
- A cyberattack requiring no user interaction to gain entry
- A hidden network often used for illegal transactions
- A deceptive attempt to steal personal details via email or messaging
- Harmful code hidden inside otherwise legitimate software
- A criminal hacker seeking personal gain or causing harm
- Stealing personal info to commit fraud or other crimes
- A network of compromised devices controlled remotely
20 Clues: Unauthorized exposure of login credentials • A code injection exploit targeting databases • Digital tokens often demanded as ransom payments • A program secretly recording every keystroke typed • Hyper-realistic synthetic media used for deception • Overwhelming a target server with excessive traffic • A hidden network often used for illegal transactions • ...
investment crossword 2023-12-11
Across
- -The rate of which the prices of a good increases.
- -The annual interest payment on a bond.
- -A financial asset such as a stock or bond.
- -A group of financial instruments which have similar financial characteristics.
- -A share of the value of a company.
- -A collection of financial investments such as stocks.
- -The second largest stock exchange.
- -An individual retirement account.
- -A collection of stocks and bonds that are traded on securities exchanges.
- -The process of setting money aside to increase wealth over time.
Down
- -A security in which the Invester loans money to a company.
- -Money from the profits of a company.
- -A market where the stocks are up or rising.
- -A retirement account.
- -A market in which prices are falling.
- -An index of 500 large cap companies.
- -An investment tool for individuals to earmark funds.
- -A low-fee portfolio of stocks.
- -New York stock exchange.
- -A degree of uncertainty on if the investment will make money.
20 Clues: -A retirement account. • -New York stock exchange. • -A low-fee portfolio of stocks. • -An individual retirement account. • -A share of the value of a company. • -The second largest stock exchange. • -Money from the profits of a company. • -An index of 500 large cap companies. • -A market in which prices are falling. • -The annual interest payment on a bond. • ...
technology 2024-10-09
Across
- A broad term to describe a system of storing data a different server and accessing it via a network
- computer that runs chromeOS
- where did it store on your computer
- An open source platform
- Send you virtual letter
- It stores data
- what people hate
- infect your computer
- It connect your computer to see your screen
- where data is stored on the internet
- Laughing out loud
- he accesses your private information
- Messaging platform
Down
- input character
- biggest platform search
- makes a computer work
- not having your information viewed
- Connects your internet to the rest of the world
- Please accept "c__k___"
- tdsb famous "no" rule
- security system that defend virus
- big daddy musk
- "its going to take over the world!!!"
- Country that makes computer
- final step to make your account
- type of coding language
- computer connect to this.
- you can see the internet around you
- To connect a mouse
- extra security to your account
30 Clues: big daddy musk • It stores data • input character • what people hate • Laughing out loud • To connect a mouse • Messaging platform • infect your computer • makes a computer work • tdsb famous "no" rule • biggest platform search • Please accept "c__k___" • An open source platform • Send you virtual letter • type of coding language • computer connect to this. • computer that runs chromeOS • ...
IT 2025-07-03
Across
- Fraudulent attempt to obtain sensitive information via email
- Secure connection over the internet for remote access
- Period when a service is unavailable
- Assistance provided to users with technical issues
- Device that directs data traffic on a network
- Software designed to harm or exploit systems
- Accessing a computer or network from a different location
- Record of an IT support request
- Secret code required to access accounts
Down
- Software fix for a security vulnerability or bug
- Enter username and password to access a system
- Software or hardware that blocks unauthorized network access
- Computer that provides resources to other computers on a network
- To refer a problem to higher-level support
- Install the latest software improvements or security patches
- Program used to access websites
- Device that produces paper copies of documents
- Restart a computer to fix issues
- Copy of data kept in case of loss or failure
- Memory used by computers to run programs
20 Clues: Program used to access websites • Record of an IT support request • Restart a computer to fix issues • Period when a service is unavailable • Secret code required to access accounts • Memory used by computers to run programs • To refer a problem to higher-level support • Software designed to harm or exploit systems • Copy of data kept in case of loss or failure • ...
Test 2022-10-10
Across
- Rule, Enforces business associate liability with direct penalties
- Rule, Sets a national set of security standards for protecting ePHI
- An example of a general Business Associate
- Entities, A health plan or health care clearinghouse or health care provider
- HIPAA contains this to protect PHI and ePHI
- The release or divulging in any other manner of information outside the entity holding the information
- We are responsibilities our patient's privacy
- A fraudulent practice of sending emails
- Sharing these is a violation
- One of our Core Values
- To intentionally lie or cheat to get something you are not entitled to
Down
- Employees are protected against this for reporting an issue in good faith
- The measurement of performance against "best practice" standards
- Is the government agency that enforces HIPAA
- An unauthorized use or disclosure of PHI
- Taking responsibility for one's actions
- Office of the Inspector General
- Conscience, A Medical Leadership principle
- The affirmation by signature
- Compliance violations can lead to financial and reputational harm
20 Clues: One of our Core Values • Sharing these is a violation • The affirmation by signature • Office of the Inspector General • Taking responsibility for one's actions • A fraudulent practice of sending emails • An unauthorized use or disclosure of PHI • An example of a general Business Associate • Conscience, A Medical Leadership principle • ...
NATO THEM CROSSWORD 2026-03-27
Across
- NATO'S PRIMARY PURPOSEE IS ENSURE ___ OF ITS MEMBER
- A BALTIC NATO MEMBER
- CAPITAL CITY WHERE NATO HQ IS LOCATED
- AN ATTACK ON ONE IS AN ATTACK ON ALL
- COUNTRY THAT JOINED NATO IN 2023
- YEAR NATO WAS FOUNDED
- THE MILITARY ALLIANCE FORMED IN 1946
- EAST EUROPEAN COUNTRY THAT JOINED NATO IN 1999
- THE NORTH ATLANTIC TREATY SIGNED IN THIS CITY
- A FOUNDING MEMBER THAT HAS A LEANING TOWER
- A TYPE OF NATO MILITARY PRACTICE ACTIVITY
- NATO'S LARGEST MEMBER BY LAND AREA
Down
- MEDITERRANEAN COUNTRY THAT JOINED NATO IN 1952
- THIS ARTICLE OUTLINES COLLECTIVE DEFENSE CLAUSE
- COUNTRY THAT JOINED NATO IN 2024
- NATO FORMED TO COUNTER THE INFLUENCE OF___ BLOC
- A NATO SECURITY GENERAL (LAST NAME)
- MAJOR EUROPEAN ECONOMIC POWER AND NATO MEMBER
- NOT A FULL MEMBER BUT WORKS CLOSELY WITH ALLIANCE
- FOUNDING MEMBER THAT SHARES LARGE BORDER WITH US
- ONE OF THE TWO OFFICIAL LANGUAGES OF NATO
- FIRST LETTER IN NATO PHONETIC ALPHABET
- NATO'S CIVILIAN DECISION-MAKING BODY (ACRONYM)
23 Clues: A BALTIC NATO MEMBER • YEAR NATO WAS FOUNDED • COUNTRY THAT JOINED NATO IN 2024 • COUNTRY THAT JOINED NATO IN 2023 • NATO'S LARGEST MEMBER BY LAND AREA • A NATO SECURITY GENERAL (LAST NAME) • AN ATTACK ON ONE IS AN ATTACK ON ALL • THE MILITARY ALLIANCE FORMED IN 1946 • CAPITAL CITY WHERE NATO HQ IS LOCATED • FIRST LETTER IN NATO PHONETIC ALPHABET • ...
STAFF THE SPARE CONN 2016-01-19
The Cold War 2022-04-29
Across
- National Aeronautics and Space Administration.
- Another name for Taiwan.
- War dominated international relations from the late 1940's to the collapse of the Soviet Union.
- Buffer states.
- European Recovery Program.
- The German Democratic Republic
- __Bank (International Bank).
- North Atlantic Treaty Organization abbreviation.
- ___ Council was given the responsibility of maintaining international security.
Down
- Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
- ___ Policy prevented Soviet expansion without starting a war.
- The Federal republic of Germany.
- British Prime minister
- __ Curtain was used to refer to the division between U.S allies and Soviet allies.
- A military alliance for the defense of the Communist States of Eastern Europe.
- The founding of the United ___ in the fall 1945.
16 Clues: Buffer states. • British Prime minister • Another name for Taiwan. • European Recovery Program. • __Bank (International Bank). • The German Democratic Republic • The Federal republic of Germany. • National Aeronautics and Space Administration. • The founding of the United ___ in the fall 1945. • North Atlantic Treaty Organization abbreviation. • ...
Elevate your potential 2024-09-30
Across
- Board game and West End Show (5)
- Panorama perhaps, for small weight (9)
- The answer might be dissolved in a liquid (8)
- broadcast the fitness of Jumbo perhaps (13)
- Watch for fingers with no hands (7)
- Slim down the agreement (8)
- Something to ask mystic meg (6)
- Not out - at home learnt to shuffle (8)
- Hear a West End Show, host of Dstl information (5)
- Pb (4)
Down
- Sounds like a lift in New York perhaps, without the alternative (7)
- A twister called Monty (6)
- Song by Gloria Gaynor "I will ..." finished early with proficiency (13)
- Cryptography organisation rings the bell (6)
- I fancy Bertie is concealing a kind of crime (5)
- Might be found in bad attitudes (3)
- Something new, a work of fiction maybe (5)
- Computing for waste recycling (8)
- A difference that can be shocking (9)
19 Clues: Pb (4) • A twister called Monty (6) • Slim down the agreement (8) • Something to ask mystic meg (6) • Board game and West End Show (5) • Computing for waste recycling (8) • Might be found in bad attitudes (3) • Watch for fingers with no hands (7) • A difference that can be shocking (9) • Panorama perhaps, for small weight (9) • Not out - at home learnt to shuffle (8) • ...
JMS Life 2024-03-14
14 Clues: MSJEN • MSOTEY • MRTRAMM • MRNANCE • MRSLUFT • MRKEITH • MRORTEGA • MSTIRONA • MRCOOPER • DRPENULIAR • MSVILLAREAL • MSWHITEHURST • YOU GET YOUR LUNCH HERE • YOU GO HERE WHEN YOU'RE IN TROUBLE
Állatok 2024-01-08
16 Clues: pupos • gyapjas • nagyfülü • agancsos • tojást ad • tejet ad • kolbászt ad • tud utánozni • szarva van • fekete fehér • igy csinál iá • erdélyi security • huzza a szekeret • szereti az egeret • az állatok királya • az ember legjobb barátja
Column B 2022-12-14
The United Nations 2020-07-29
Across
- Prevents countries from buying goods and selling them to other countries.
- This means that decisions can be blocked in the Security Council.
- Set up after which World War?
- Headquarters of the UN are here.
- 90% of conflicts are now within countries.
- UN action to help countries recover from conflict.
- An agreement to stop fighting.
- Assembly Meets regularly to discuss any matters affecting its members.
- Prevent the sale of weapons to some countries.
- Number of non-permanent members of the security council.
Down
- Number of permanent members.
- The UN tries to promote these.
- Current Secretary-General of the UN.
- Head of the UN.
- An attempt by the UN to keep two sides in a conflict apart.
- Involves the UN sending in troops to stop wars.
16 Clues: Head of the UN. • Number of permanent members. • Set up after which World War? • The UN tries to promote these. • An agreement to stop fighting. • Headquarters of the UN are here. • Current Secretary-General of the UN. • 90% of conflicts are now within countries. • Prevent the sale of weapons to some countries. • Involves the UN sending in troops to stop wars. • ...
Disruptive Technology 2025-07-24
Across
- Finds weaknesses and risks in applications or computer systems
- Public cloud computing architecture
- Uses endpoint monitoring to detect potential cybersecurity breaches
- A large, virtual world centred around user interactivity
- The act of automating everything that a business can automate
- A cybersecurity measure that uses security controls to protect users and devices
- Uses quantum mechanics and sciences to solve complex computing problems
- A user's experience across one website/application
- Combines practices and technologies to mitigate business risks
- Covers victims in the event of a cybersecurity breach
- Abbreviation is (BI)
Down
- Abbreviation is (AI)
- A form of authentication that provides users with an extra layer of security
- Abbreviation is (XaaS)
- Encompasses technologies that focus on immersive realities
- Technologies that are developed with the thought of lessening environmental impacts
16 Clues: Abbreviation is (AI) • Abbreviation is (BI) • Abbreviation is (XaaS) • Public cloud computing architecture • A user's experience across one website/application • Covers victims in the event of a cybersecurity breach • A large, virtual world centred around user interactivity • Encompasses technologies that focus on immersive realities • ...
English 2025-12-10
Across
- A weakness that can be exploited.
- Long-term storage of old files.
- The way a system or user acts.
- A request for information from a database.
- A system on which applications can run.
- Connected computers that share data.
- A direct instruction given to a computer.
- Instructions written for computers.
- A person or system chosen for attack.
- A step taken to solve a problem.
- Accidental or unlawful release of information.
- A piece of hardware used in computing.
- A place where data is kept.
- To protect from harm or attacks.
- Continuous flow of data.
- Converting information into a secure code.
- Related to investigating cyber incidents.
- The right to keep personal data protected.
- The current condition of a system.
- A formal rule or guideline.
- A mistake or problem in a system.
- Someone who monitors or watches activity.
- Information stored or processed by computers.
- The chance that something bad may happen.
- An action taken after an incident.
- Unauthorized entry into a system.
- Protection against threats or attacks.
- To follow the path of an action or data flow.
- Use of technology to perform tasks without human input.
- A written record of actions or events.
- Permission to use or enter a system.
- Learning skills or knowledge.
- A simplified digital structure used to predict or analyze.
- A set of rules for communication.
- Monitoring to make sure rules are followed.
- A break in security where data is exposed.
- A specific area or internet address space.
- A part of a larger software system.
Down
- Official rule made by authorities.
- A tool that blocks unwanted network traffic.
- A formal review of systems or processes.
- Programs used by a computer.
- Searching for threats inside a network.
- Proof of an event or action.
- Related to money or cost.
- Numerical information used for analysis.
- Following laws, rules, or standards.
- Information sent from one place to another.
- A call for data or a service.
- A prediction based on information.
- The ability to manage or direct something.
- Belief that someone or something is reliable.
- Measurements used to evaluate performance.
- To watch or track activity.
- A user identity in a system.
- Studying information to understand it.
- A computer that provides resources to others.
- A set of connected computer components.
- A risk or danger.
- Too much data or activity for a system to handle.
- Something unusual that may signal a problem.
- The path data takes to reach a destination.
- To check a system for issues or threats.
- A saved copy of data in case of loss.
- A document describing an event or findings.
- A sign that danger or problems may occur.
- An event that disrupts normal operations.
- Delay in data communication.
- A connection point in a network.
- A secret code to access a system.
- A tool used to explore or test a system.
- Rules about what is morally right or wrong.
- Records of system activities.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A place where data is kept. • To watch or track activity. • A formal rule or guideline. • Programs used by a computer. • Proof of an event or action. • A user identity in a system. • Delay in data communication. • A call for data or a service. • Learning skills or knowledge. • Records of system activities. • ...
Cyber vocab chapter 3 2021-09-28
Across
- systems that requires a physical token
- user receives through another object
- user receives by default
- validating a user
- standard authentication protocol for all microsoft versions
- false amount of rejected users
Down
- allows you to share folders
- given to a user at a certain location
- where false accept and reject rates meet
- all possible attack locations
- database of all the network resoruces
- eliminating vulnerabilities
- analysis of a biological feature
- identifying measurable patterns in human activity
- cycle of different roles
15 Clues: validating a user • user receives by default • cycle of different roles • allows you to share folders • eliminating vulnerabilities • all possible attack locations • false amount of rejected users • analysis of a biological feature • user receives through another object • given to a user at a certain location • database of all the network resoruces • ...
Unit 3 Cyber World 2024-03-11
Across
- It is a good idea to keep your personal details __________ on the Internet.
- __________ scams look like they are from familiar websites to steal our personal information.
- Time wanted to get the latest version of the smartphone because it had much better _______ life.
- ________________ may try to download malware to your computer.
- Nelson updated his antivirus program to protech his comuter against _________.
- Jenny is completely ___________ on the video games. She played it all day!
- Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
Down
- To avoid being a _________ of the scam, always double-check the links and email address.
- ________ is a big problem for singers as people download their music without paying for it.
- Blind people have special programmes to help them _______ online.
- To deal with social media overuse, it is better for you to turn off _____________ on your phone.
- Governments usually _______ the data on their websites to protect citizens' information.
- We need to set up an anti-________ filter to block those annoying messages.
- She's obsessed with the new online novel and can't put it down.
- Everyone is posting ________ of themselves with the Chubby Heart in Central.
15 Clues: ________________ may try to download malware to your computer. • She's obsessed with the new online novel and can't put it down. • Blind people have special programmes to help them _______ online. • Jenny is completely ___________ on the video games. She played it all day! • It is a good idea to keep your personal details __________ on the Internet. • ...
Cyber Fund OS Vocab 2025-03-06
Across
- ethical hacking that tests a system's defenses
- OS that controls machines that run specific tasks
- devices that aren't computers that connect to the internet
- exploits by attackers before others know about the vulnerability
- software that controls specific hardware devices connected to a system
- command that ends a task immediately
- the OS type that covers desktops and laptops
- mistakes in code that can create security loopholes
- Apple's mobile device OS
Down
- older sections of code that haven't been updated or reviewed
- virtual machine that runs on a different machine
- Google's mobile device OS
- external software or plugins integrated with the OS
- Microsoft's OS
- unauthorized access to confidential data
15 Clues: Microsoft's OS • Apple's mobile device OS • Google's mobile device OS • command that ends a task immediately • unauthorized access to confidential data • the OS type that covers desktops and laptops • ethical hacking that tests a system's defenses • virtual machine that runs on a different machine • OS that controls machines that run specific tasks • ...
Networking Concepts & Cyber Ethics 2025-05-22
Across
- Computer network enables two or more computers to share what
- Process of transforming data into an unreadable code
- digital footprint is also known as
- Illegal intrusion into a computer system or network
- Being aware of the ethical practices
- Similar to hub
- two or more computers are connected within a small area
Down
- It refers to unwanted bulk emails that come from unknown sources
- program that disrupts the normal functioning of a computer
- Legal act granted by law to the creater for his original work
- Nowadays most computer motherboards & laptops have an inbuild
- computer network mainly created for an individual person
- Device that connects two different types of network with each other
- Simplest way to prevent plagorism is through proper___
- Each computer in a network
15 Clues: Similar to hub • Each computer in a network • digital footprint is also known as • Being aware of the ethical practices • Illegal intrusion into a computer system or network • Process of transforming data into an unreadable code • Simplest way to prevent plagorism is through proper___ • two or more computers are connected within a small area • ...
Networking and cyber ethics 2025-06-14
Across
- clue:This network covers a wide area
- clue:Refers to the act of using or imitating the language of fraudulent act and violation
- clue:Is a legal right granted by law to the creator for his original work
- clue:When a single licenced copy of a software is loaded into many computer contrary to the licence's terms it is called
- clue:Refers to crimanal activities that involves the use of computer and network
- clue:A security system that prevents unauthorised people from accessing your system and network
Down
- clue:Is a computer network created for an individual person
- clue:Refers to an illegal intrusion into a computer system or network
- clue:Combination of two term's refers to aware of ethical practice is called
- clue:Refers to unwanted bulk emails that came from unknown source
- clue:Topology requires a single communication line or one main cable
- clue:A physical attach a Computer to a network
- clue:Topology,all the nodes is the network are connected in a circular manner
- clue:A computer network that is mainly created for individual person
- clue:The computer in a network can communicate with each other as well as work in dependently,each computer in a network is called a
15 Clues: clue:This network covers a wide area • clue:A physical attach a Computer to a network • clue:Is a computer network created for an individual person • clue:Refers to unwanted bulk emails that came from unknown source • clue:Topology requires a single communication line or one main cable • clue:A computer network that is mainly created for individual person • ...
Chapman University - NCSAM week 3 2023-10-12
Across
- Software designed to detect and destroy computer viruses.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
- A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
- Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Down
- A means of access to a computer program that bypasses security mechanisms.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior.
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- A hole in software that is unknown to the vendor and that hackers can exploit.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
10 Clues: Software designed to detect and destroy computer viruses. • A means of access to a computer program that bypasses security mechanisms. • A hole in software that is unknown to the vendor and that hackers can exploit. • A piece of software designed to update a computer program or its supporting data, to fix or improve it. • ...
COMMERCE INVESTMENT 2022-06-07
Across
- Any investment that grows or has potential to grow
- to overcharge or swindle (a threat to financial security)
- setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
- Buy goods in large quantities from the manufacturer
- A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
- A digital currency
- Part ownership of a company
- personal group with lots of money that are willing to lose it
- Australian Stock exchange
- A list of income and likely expenditures (a step that can minimise impacts of events)
- money set aside during life for retirement (a step that can minimise the impact of events)
- A promis to repair any defects that are in a product
- The amount of money a consumer is prepared to pay in exchange of a good or service
- A loan from a financial institution where something is held as security in case the money is not repaid
- items of value
- use of money to purchase equipment for a new business or an existing business
- Part of a firm’s profit that is divided amongst shareholders
- spending more money than your disposable income allows (a threat to financial security)
- What remains after all business expenses are deducted from sales revenue
- when a person gives up control of their assets and finances, voluntary or by court order
- A currency used to invest in stocks, shares as well as goods and services etc.
Down
- a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
- a collection of financial investments like stocks and cash etc.
- A person who works for a wage or salary
- Money received on a regular basis from work, property, business, investment or welfare
- Investments that provide regulate profits
- Involves buying the rights of another business to distribute its products under its name
- A practice of funding a project by raising money from a large number of people
- money owing to external sources (e.g a bank)
- the profit you receive on your investment as a percentage of your original investment
- electronic funds transfer point of sale
- Place where shares in public companies are bought and sold
- Expand your portfolio with different types of shares
- Real estate that is bought with the aim of earning some kind of financial return
- The swapping or exchanging of one good or another
- a type of investment that is acceptable to society’s current standards
- Someone who purchases goods and services to satisfy need and wants
- Regularly putting aside some money for future use
- Activities taken for the purpose of production and consumption of goods and services in a region
- A legally binding agreement
- illegal business practice (a threat to financial security)
41 Clues: items of value • A digital currency • Australian Stock exchange • Part ownership of a company • A legally binding agreement • A person who works for a wage or salary • electronic funds transfer point of sale • Investments that provide regulate profits • money owing to external sources (e.g a bank) • The swapping or exchanging of one good or another • ...
Investing Vocabulary 2023-02-07
Across
- an offering of unregistered securities to a limited pool of investors
- funds that trade on exchanges, generally tracking a specific index
- where securities are created so they can be sold to investors for the first time
- a digital system that matches buyers and sellers looking to trade securities in the financial markets
- the sale of equity shares or other financial instruments such as bonds to the public in order to raise capital
- profits gained from the sale of capital assets
- the annual income an investor can expect to receive while holding a particular bond
- the amount of money a bond issuer promises to repay bondholders at maturity
- a filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws
- individual participant or member firm of an exchange that buys and sells securities for its own account
- special type of stock that pays a set schedule of dividends and does not come with voting rights
- When a private company first sells shares of stock to the public
Down
- the practice of spreading your investments around so that your exposure to any one type of asset is limited
- let you pool your money with other investors to buy stocks, bonds, and other investments
- the date when the final payment is due for a loan, bond, or other financial product
- a security that represents ownership in a company
- groups together the prices of 30 of the most traded stocks on the New York Stock Exchange (NYSE) and the Nasdaq
- a security where usually a bond or a preferred stock that can be converted into a different security, typically shares of the company's common stock
- individuals classified by the SEC as qualified to invest in complex or sophisticated types of securities
- where securities are traded after the company has sold its offering on the primary market
- loan from an investor to a borrower such as a company or government
- an expression for net asset value that represents the value per share of a mutual fund, an exchange-traded fund (ETF), or a closed-end fund
- investment's annual income (interest or dividends) divided by the current price of the security.
- your lender verifies your income, assets, debt and property details in order to issue final approval for your loan
- a stock market index that measures the performance of about 500 companies in the U.S
- securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
- a group of shares that are used to give an indication of a sector, exchange or economy
- a marketplace, where financial securities issued by companies are bought and sold
28 Clues: profits gained from the sale of capital assets • a security that represents ownership in a company • When a private company first sells shares of stock to the public • funds that trade on exchanges, generally tracking a specific index • loan from an investor to a borrower such as a company or government • ...
~Food Insecurity~ 2021-11-19
Across
- What is your teachers last name?
- Food insecurity happens often during what time of year?
- During the pandemic, food insecurity in households ---------.
- What meal do most schools provide for free or at a low cost?
Down
- How can high food security households help struggling households?
- How many categories of food security are there?
- What do you need in order to buy food?
- What type of food security is when you do not have any problems getting food?
8 Clues: What is your teachers last name? • What do you need in order to buy food? • How many categories of food security are there? • Food insecurity happens often during what time of year? • What meal do most schools provide for free or at a low cost? • During the pandemic, food insecurity in households ---------. • ...
Cyber Times Puzzle 2023-11-14
8 Clues: Malicious software • Conceals IP address • Detects and responds to threats • Unwanted and unsolicited emails • Unique phrase for account access • Fingerprints or facial recognition • Security barrier for Network access • Adds an extra layer of security in authentication
Domas 7B 2023-12-08
Across
- Thing that you need to have when traveling (security looks that)
- Fast plane,using in war
- Same thing like a bus but on rails,driving around the city
- Backpack with wheels on it and its bigger
- Same thing as passport but a card
- A pack that is on your shoulders holding your stuff
- Bicycle with the motor on it
Down
- The underground train that is only in London
- Plane with screws
- A flying object on which a person travels
- People who travels around the world
- Yellow car driving people around the city
- People that checks your passport and you stuff in bags
- A buss traveling tourists
- Ship moving cars from one side to the other side
15 Clues: Plane with screws • Fast plane,using in war • A buss traveling tourists • Bicycle with the motor on it • Same thing as passport but a card • People who travels around the world • A flying object on which a person travels • Yellow car driving people around the city • Backpack with wheels on it and its bigger • The underground train that is only in London • ...
Unit 8.3 Security of Data 2025-04-12
Across
- Unauthorized access to computer systems
- Using physical traits like fingerprints for security
- Redirecting users to fake websites without their knowledge
- Scam using SMS messages to steal information
- Software used to detect and remove viruses
- Tricking users into revealing personal info via fake emails
- Protocol for secure communication over the internet
Down
- theft Stealing personal or sensitive digital information
- Voice call scam pretending to be from a trusted source
- fraud Unauthorized use of someone’s payment card
- Scrambling data to make it unreadable without a key
- General term for malicious software like viruses or spyware
- Malicious software that spreads and causes harm
- Secret words used to authenticate users
- Security system that controls incoming and outgoing traffic
15 Clues: Unauthorized access to computer systems • Secret words used to authenticate users • Software used to detect and remove viruses • Scam using SMS messages to steal information • Malicious software that spreads and causes harm • fraud Unauthorized use of someone’s payment card • Scrambling data to make it unreadable without a key • ...
Crossword puzzle 2022-10-12
ISG's Security Summit Crossword Puzzle 2021-10-04
Across
- This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
- The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
- _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
- An access control model that restricts system access to authorized users based on job function(s).
- This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
- This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
- A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
- Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
- Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
Down
- Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
- ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
- A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
- Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.
- Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
- A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
- Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
- Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
- ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
- _________________@lowes.com and the Report Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
- An acronym for volatile memory within a computer that holds active processes, data, and applications.
20 Clues: An access control model that restricts system access to authorized users based on job function(s). • An acronym for volatile memory within a computer that holds active processes, data, and applications. • Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________. • ...
Cyber Attakcs Quiz 2024-06-28
Across
- A cyber attack where attackers disguise as a trustworthy entity to steal sensitive information.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A type of malware disguised as legitimate software, used to hack into the user's system.
- Software that automatically displays or downloads advertising material when a user is online.
- Malicious software designed to secretly monitor and collect information from a computer.
Down
- A type of surveillance software that records keystrokes to capture sensitive information like passwords.
- A Distributed Denial-of-Service attack aimed at disrupting the normal traffic of a targeted server.
- A type of malware that encrypts the victim's files, demanding payment for the decryption key.
- A type of malicious code that replicates itself and spreads from one computer to another.
- A type of malware that replicates itself to spread to other computers without any user intervention.
10 Clues: Software designed to disrupt, damage, or gain unauthorized access to a computer system. • A type of malware disguised as legitimate software, used to hack into the user's system. • Malicious software designed to secretly monitor and collect information from a computer. • ...
Cyber Warm Up 2024-02-14
10 Clues: Denied • Like TSL • Like UNIX • DoD Network • Bad software • Sneaky email • Holds you captive • Network protector • Not what it seems • Saves what you type
Cyber Awareness Month 2022-10-16
Across
- Unsolicited bulk mail
- Symbol to look for before
- Being harassed or threatened
- Trying to steal other people's sensitive
- Software Protecting your Computer
- We should always choose a strong and
Down
- Files sent through EMail
- Trying to break into a computer system
- Software programs designed to
- Device/Software protecting computer/Network
10 Clues: Unsolicited bulk mail • Files sent through EMail • Symbol to look for before • Being harassed or threatened • Software programs designed to • Software Protecting your Computer • We should always choose a strong and • Trying to break into a computer system • Trying to steal other people's sensitive • Device/Software protecting computer/Network
internet basics 2024-01-18
Across
- The buying and selling of goods and services over the internet.
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
- Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
- To transfer data from a remote server to a local device over the internet.
- Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
- Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- Small digital icons or characters used to express emotions or ideas in electronic communication.
- Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
- Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
- A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
- A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
- Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
- Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
- Electronic mail that allows users to send and receive messages and files over the internet.
- Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
- A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
- A global network of interconnected computers that enables the sharing of information and resources.
- Uniform Resource Locator, the address used to access a web page or resource on the internet.
- A wireless networking technology that allows devices to connect to the internet without the need for physical cables.
32 Clues: The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • A live or pre-recorded seminar, workshop, or presentation conducted over the internet. • ...
Krzyżówka zadanie 2025-12-10
Across
- Use of technology to perform tasks without human input.
- A sign that danger or problems may occur.
- Information stored or processed by computers.
- A request for information from a database.
- Accidental or unlawful release of information.
- A risk or danger.
- A specific area or internet address space.
- A user identity in a system.
- Related to money or cost.
- A tool that blocks unwanted network traffic.
- A document describing an event or findings.
- The current condition of a system.
- Related to investigating cyber incidents.
- To check a system for issues or threats.
- A computer that provides resources to others.
- Too much data or activity for a system to handle.
- Numerical information used for analysis.
- A saved copy of data in case of loss.
- Unauthorized entry into a system.
- A piece of hardware used in computing.
- A written record of actions or events.
- Someone who monitors or watches activity.
- A set of rules for communication.
- Measurements used to evaluate performance.
- A call for data or a service.
- Permission to use or enter a system.
- Proof of an event or action.
- Programs used by a computer.
- A person or system chosen for attack.
- The ability to manage or direct something.
- Long-term storage of old files.
- A prediction based on information.
- A formal review of systems or processes.
Down
- A direct instruction given to a computer.
- A formal rule or guideline.
- To watch or track activity.
- A part of a larger software system.
- Official rule made by authorities.
- Searching for threats inside a network.
- Something unusual that may signal a problem.
- Continuous flow of data.
- A system on which applications can run.
- Instructions written for computers.
- An event that disrupts normal operations.
- A weakness that can be exploited.
- Monitoring to make sure rules are followed.
- A secret code to access a system.
- To follow the path of an action or data flow.
- A mistake or problem in a system.
- Information sent from one place to another.
- A connection point in a network.
- A place where data is kept.
- Protection against threats or attacks.
- Records of system activities.
- To protect from harm or attacks.
- Delay in data communication.
- The way a system or user acts.
- The right to keep personal data protected.
- Belief that someone or something is reliable.
- A set of connected computer components.
- The path data takes to reach a destination.
- A simplified digital structure used to predict or analyze.
- An action taken after an incident.
- Connected computers that share data.
- The chance that something bad may happen.
- Converting information into a secure code.
- Following laws, rules, or standards.
- A break in security where data is exposed.
- A step taken to solve a problem.
- Rules about what is morally right or wrong.
- A tool used to explore or test a system.
- Studying information to understand it.
- Learning skills or knowledge.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • To watch or track activity. • A place where data is kept. • A user identity in a system. • Delay in data communication. • Proof of an event or action. • Programs used by a computer. • Records of system activities. • A call for data or a service. • Learning skills or knowledge. • ...
PaulinaNatalia 2025-12-10
Across
- An action taken after an incident.
- A place where data is kept.
- To protect from harm or attacks.
- A tool that blocks unwanted network traffic.
- Converting information into a secure code.
- The right to keep personal data protected.
- A computer that provides resources to others.
- A tool used to explore or test a system.
- The path data takes to reach a destination.
- Programs used by a computer.
- A part of a larger software system.
- Information sent from one place to another.
- A step taken to solve a problem.
- A direct instruction given to a computer.
- Use of technology to perform tasks without human input.
- Learning skills or knowledge.
- Following laws, rules, or standards.
- A sign that danger or problems may occur.
- The way a system or user acts.
- Protection against threats or attacks.
- Rules about what is morally right or wrong.
- Connected computers that share data.
- Delay in data communication.
- A specific area or internet address space.
- A mistake or problem in a system.
- Instructions written for computers.
- A connection point in a network.
- Permission to use or enter a system.
- A risk or danger.
- Too much data or activity for a system to handle.
- Official rule made by authorities.
- A system on which applications can run.
- Belief that someone or something is reliable.
- Information stored or processed by computers.
- A prediction based on information.
- A document describing an event or findings.
- A formal review of systems or processes.
Down
- Unauthorized entry into a system.
- Related to money or cost.
- Continuous flow of data.
- Someone who monitors or watches activity.
- The ability to manage or direct something.
- Something unusual that may signal a problem.
- A call for data or a service.
- A break in security where data is exposed.
- A request for information from a database.
- Numerical information used for analysis.
- Records of system activities.
- A set of connected computer components.
- A set of rules for communication.
- A secret code to access a system.
- Monitoring to make sure rules are followed.
- To watch or track activity.
- To check a system for issues or threats.
- A formal rule or guideline.
- Related to investigating cyber incidents.
- Long-term storage of old files.
- Searching for threats inside a network.
- Proof of an event or action.
- Measurements used to evaluate performance.
- An event that disrupts normal operations.
- A weakness that can be exploited.
- A written record of actions or events.
- The chance that something bad may happen.
- A user identity in a system.
- A simplified digital structure used to predict or analyze.
- Studying information to understand it.
- To follow the path of an action or data flow.
- The current condition of a system.
- Accidental or unlawful release of information.
- A person or system chosen for attack.
- A saved copy of data in case of loss.
- A piece of hardware used in computing.
73 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A place where data is kept. • To watch or track activity. • A formal rule or guideline. • Programs used by a computer. • Proof of an event or action. • Delay in data communication. • A user identity in a system. • A call for data or a service. • Records of system activities. • Learning skills or knowledge. • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
- A bridge between two networks that connects using different protocols.
- A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- A firewall setting that separates LAN of an organization from the external network.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Down
- Protocol that is meant for uploading and downloading files.
- A bundle of programs that is designed to bombard users with advertisements.
- A computer program that keeps a log of your keystrokes on your keyboard.
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
16 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
IIT327-2 Quiz 2 2024-01-12
Across
- Activity involving the exploration of computer or network ports to identify potential vulnerabilities
- The process of identifying, assessing, and prioritizing risks to an organization's assets.
- A set of rules or guidelines that define the acceptable use and security measures within an organization.
- A process of thorough examination and analysis to ensure information security compliance
- Decoy systems designed to attract and detect unauthorized access attempts.
- Secure network for internal communication and collaboration within an organization
Down
- The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Incorrect identification of a harmless activity or file as malicious.
- A firewall that acts as an intermediary between internal network clients and external servers.
10 Clues: Incorrect identification of a harmless activity or file as malicious. • Decoy systems designed to attract and detect unauthorized access attempts. • Secure network for internal communication and collaboration within an organization • A process of thorough examination and analysis to ensure information security compliance • ...
Property Law 2024-01-11
Across
- the owner of real property, such as a house, building, or land.
- an ownership of an estate in land.
- a person whose job is to manage the legal process of moving land or property from one owner to another
- The person who transfers property by sale.
Down
- to obtain by paying money or giving other valuable consideration.
- structures and land that make up a parcel of property.
- A type of security interest in which a lender takes possession of personal property as security for an obligation.
- One who makes surveys of land
- the transfer of an interest in land as security for a loan or other obligation.
- the right to use the real property of another for a specific purpose.
10 Clues: One who makes surveys of land • an ownership of an estate in land. • The person who transfers property by sale. • structures and land that make up a parcel of property. • the owner of real property, such as a house, building, or land. • to obtain by paying money or giving other valuable consideration. • ...
CSE 167 2022-11-16
Across
- copies of data that can be used to replace the original
- is a method of gaining unauthorized access to a network or computer system
- The use of multiple layers of security techniques to help rescue the chance of successful attacks
- in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
- allows you to encrypt and sign your data and communications
- An attack that tricks people in believing they are someone else
- Confidentiality,Integrity,Availability
- Study of techniques for secure communication in the presenter of third parties
- Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
- attack that involves trying all possible private keys
10 Clues: Confidentiality,Integrity,Availability • attack that involves trying all possible private keys • copies of data that can be used to replace the original • allows you to encrypt and sign your data and communications • An attack that tricks people in believing they are someone else • is a method of gaining unauthorized access to a network or computer system • ...
Domestic & International Airports 2019-02-12
Across
- what country has the most airports in the world - 14,858
- where is the worlds widest paved runway at 105m wide
- wireless internet access
- what do you carry and store your clothing in
- where you do you go for prayer
- travelling within the country you are in
- company located in check in area used to protect luggage
- ... exchange
- area before departing, accessible to the public
- international air transport association
- three letter code for new plymouth
- where is the longest runway in the world at 5500m long
Down
- where is the worlds busiest airport
- where is the largest airport in new zealand
- area where you go through security and hand over passport
- three letter code for blenheim
- travelling destination to a different country
- where does you luggage come off when entering the flight
- three letter code for auckland
- where is the worlds oldest airport
- where do you go for an injury
- abbreviation for aviation security service
22 Clues: ... exchange • wireless internet access • where do you go for an injury • three letter code for blenheim • where you do you go for prayer • three letter code for auckland • where is the worlds oldest airport • three letter code for new plymouth • where is the worlds busiest airport • international air transport association • travelling within the country you are in • ...
Infosec Crossword Puzzle Contest 2019-08-29
Across
- Malware which presents unwanted advertisements
- ___________ is stimuli that has meaning in some context for its receiver
- Virtual _________ Network
- Successfully exploiting vulnerability is known as
- Microsoft Office is an _______ software
- Threat X Vulnerability
- Technology designed to keep the bad guys out
- A terminal emulator / serial console that support SSH
Down
- A Software products which provide real-time analysis of security alerts by network hardware and application
- Bypassing system’s customary security mechanism
- Unplanned disruption or failure of a feature or service
- A Weakness in a system
- Confidentiality,___________,Availability
- The refusal of something requested or desired.
- A fraudulent social engineering attempt to obtain sensitive information
- Should not be shared / kept open to anyone
- Application of investigative analysis on a computer
- _______ makes password / passphrase more secure
- Malicious software that replicates while moving across information systems
- address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
20 Clues: A Weakness in a system • Threat X Vulnerability • Virtual _________ Network • Microsoft Office is an _______ software • Confidentiality,___________,Availability • Should not be shared / kept open to anyone • Technology designed to keep the bad guys out • Malware which presents unwanted advertisements • The refusal of something requested or desired. • ...
IR Basic Terms 2020-09-21
Across
- Promote human welfare
- International restriction on small arms
- someone fleeing their country
- Intervening to solve a dispute
- Very powerful and influential nation
- managing international relations
- A supreme ruler
- A penalty for disobeying a law
- unlawful use of violence
- A temporary suspension in fighting
- most basic level of activity
- To take things as they are
- cooperation of countries to strengthen each of their security
- Alliance for combined action
- Rules accepted between nations
- Less developed industrial base
Down
- Agreed on by three or more parties
- States may secure their survival
- Basic structures and facilities
- Weapons capable of widespread death
- Philosophy based on liberty
- seizure of power
- irregular fighting
- Mechanical objects are combined into mobile form
- a soft boggy area
- A decision to do or not do something
- Violation of the laws of war
27 Clues: A supreme ruler • seizure of power • a soft boggy area • irregular fighting • Promote human welfare • unlawful use of violence • To take things as they are • Philosophy based on liberty • most basic level of activity • Alliance for combined action • Violation of the laws of war • someone fleeing their country • Intervening to solve a dispute • A penalty for disobeying a law • ...
Ch. 10 Terminology by Taryn Watford 2014-10-22
Across
- deceptive emails or websites to lure personal information
- Electronic trespassing and vandalism
- Obtaining information illegally often to use people’s credit cards
- use of technology as tools to help law enforcement
- Malicious network made of bots
- any crime committed through the use of computer technology
- stealing passwords online through deception
- malicious software that spreads through programs
- gate that protects internal network from unatuthorized access
- malicious software, like viruses or worms
Down
- Restrictions for producing publications
- Protection through encoding
- process of saving data
- protecting computer systems form unauthorized and unwanted access
- A form of software sabotage that uses computer hosts to reproduce itself
- Designed to search for viruses, notify users and then remove viruses
- Use of internet or other electronic means to harass an individual
- Software robots that collect information on the web
- Common security tool used to restrict access
- Technology that collects information without user’s consent
20 Clues: process of saving data • Protection through encoding • Malicious network made of bots • Electronic trespassing and vandalism • Restrictions for producing publications • malicious software, like viruses or worms • stealing passwords online through deception • Common security tool used to restrict access • malicious software that spreads through programs • ...
TAAI Weeks 1-4 2018-02-27
Across
- What id the airport code for Auckland?
- This Nationality Belongs to New Zealand Planes
- What is Air New Zealand's hub city?
- What company is Airline is MH?
- What is ATC?
- What is a planes pitch called?
- What is the safe movement area between Runway and Apron?
- You have to pass security to get here
- Where is Cathay Airlines Hub?
- What is the Abbreviation for Full Cost Carrier
Down
- You check-in here
- What is company airline is SQ?
- What is KLM's 2 letter code?
- Who is in charge of search and rescue in New Zealand waters?
- What is the hub country Emirates?
- What is the Abbreviation for Low Cost Carrier?
- Who is in charge of World Wide Aviation Security?
- What is the name of the movement for moving a plane left and right?
- What company is CAA's appointed NZ ATC Company?
- Alliance Which Airline alliance has 27 Airlines signed?
- How many Countries does Virgin have hubs in?
21 Clues: What is ATC? • You check-in here • What is KLM's 2 letter code? • Where is Cathay Airlines Hub? • What is company airline is SQ? • What company is Airline is MH? • What is a planes pitch called? • What is the hub country Emirates? • What is Air New Zealand's hub city? • You have to pass security to get here • What id the airport code for Auckland? • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
el viaje 2024-05-06
Across
- to stay
- to pack
- cruise (ship)
- jungle
- to take off
- accident
- security measures
- low season
- front desk
- to miss the flight
- included
- ruins
- high season
- port
- recommendable; advisable
- to reserve
- to reduce speed
- single room
- notice; warning
- excursion; tour
- campground
- to cancel
- adventure
- safety; security
- traffic jam
- to visit; to go around
- to return
- waves
- to sail
- itinerary
- on board
- to fasten the seatbelt
- to land
Down
- to stay (to lodge)
- compass
- de aduanas customs agent
- adventurer
- round-trip ticket
- high quality
- tourism
- traveler
- boarding card
- tour guide
- to unfasten the seatbelt
- destination
- delayed
- scuba diving
- to take a vacation
- room service
- to be full
- seatbelt
- expired
- to take a trip
- to change (planes/trains)
- insurance
- valid
- hostel
- passport
- border
- arrival
- island
61 Clues: port • ruins • valid • waves • jungle • hostel • border • island • to stay • compass • to pack • tourism • delayed • expired • arrival • to sail • to land • accident • traveler • included • seatbelt • passport • on board • insurance • to cancel • adventure • to return • itinerary • adventurer • low season • front desk • tour guide • to be full • to reserve • campground • to take off • destination • high season • single room • traffic jam • high quality • scuba diving • ...
Online Banking and Mobile Phones 2025-02-06
Across
- Personal identification number
- Short Message Service
- Enables access to the wireless web
- the banking used to access financial institutions
- The most usual music file format on the web
- brick-and-____ banks are banks that don't have physical branches
- two-factor ____, the simultaneous use of at least two different devices for better security
- security ____ are microchip-based devices that has to be typed by the user
- brick-and-____ banks are tradirional banks
- ____ authentication is a method of identifying the user of a bang account
Down
- ____ banking synonyme of online banking
- In the 1990s, 2G mobiles introduced ____ transmission
- This allows people to talk without holding the handset
- Global System for Mobile
- Types of phones that offer a high-speed data transfer capability
- A synonym for Mobile
- ____ Generation phones started in the 1980s
- ____ banking is when you perform banking transactions usually on the internet
- Universal Mobile Telecommunications
- A type of smart card that contains the user's information
- Transaction authorization number
21 Clues: A synonym for Mobile • Short Message Service • Global System for Mobile • Personal identification number • Transaction authorization number • Enables access to the wireless web • Universal Mobile Telecommunications • ____ banking synonyme of online banking • brick-and-____ banks are tradirional banks • The most usual music file format on the web • ...
Investing - Sienna Nowotny 2025-03-25
Across
- age to take out minimum from IRA
- age to get social security
- comes out tax free
- social security and medicare tax
- strategy investing your money in equal amounts
- pools money from large group of investors
- meant for short term goals
- retirement, survivor, and disability benefits
- small cap stocks or foreign exchange stocks
- network of exchanges
- collection of stocks, bonds, or other assets
- unit of ownership in company
Down
- holding company owning subsidiaries
- retirement managed by employer
- willingness to accept loss when investing
- large cap stocks or stocks with strong financials
- type of mutual fund following a benchmark index
- availability of cash or how quickly an asset can be converted to cash
- investing all money you have at one time
- a loan from the buyer
- the amount you can put in IRA per year
- CEO of Berkshire Hathaway
- government medical health plan
- transferring old retirement funds to a new company’s plan
- working with company for amount of time
25 Clues: comes out tax free • network of exchanges • a loan from the buyer • CEO of Berkshire Hathaway • age to get social security • meant for short term goals • unit of ownership in company • retirement managed by employer • government medical health plan • age to take out minimum from IRA • social security and medicare tax • holding company owning subsidiaries • ...
Empowering Women: The Impact of the New Deal Puzzle 2025-01-27
Across
- Places where women worked during the New Deal era.
- Help provided to families through policies like Aid to Dependent Children.
- A symbol of women's strength during WWII.
- Organizations advocating for better working conditions.
- Roles women took on thanks to New Deal advancements.
- Employment opportunities created by the New Deal for women.
- The president behind the New Deal policies.
- Women joined this in large numbers during the New Deal.
- The job often associated with Rosie.
- Skill-building opportunities offered to women.
Down
- Benefits women gained from New Deal policies.
- A key goal of New Deal policies for all.
- Chances for women to grow and succeed under New Deal programs.
- Initiatives like the WPA and CCC.
- Payment for work that improved for women during this time.
- To give women strength and confidence to succeed.
- The fight for fairness and equal rights.
- First Lady who championed women’s rights.
- Relating to community and societal benefits.
- Protection provided through Social Security.
20 Clues: Initiatives like the WPA and CCC. • The job often associated with Rosie. • A key goal of New Deal policies for all. • The fight for fairness and equal rights. • A symbol of women's strength during WWII. • First Lady who championed women’s rights. • The president behind the New Deal policies. • Relating to community and societal benefits. • ...
Computer Languages and Browsing Safely 2025-06-03
Across
- : Popular programming language used for mobile and desktop apps.
- : Server-side scripting language mainly used in web development.
- : Stylesheet language used for designing websites.
- : Used to create interactive effects on web pages.
- : A security system that controls incoming and outgoing traffic.
- : A mix of letters, numbers, and symbols that’s hard to guess.
- : Markup language for creating web pages.
- : A scam where fake websites or emails try to steal information.
- : A browser mode that doesn’t save history or cookies.
Down
- : Software that protects your computer from malware.
- : Installing new software versions to fix bugs and security issues.
- : Extension of C with object-oriented features.
- : A block-based language for young learners.
- : Harmful software designed to damage or steal data.
- : Language used to manage and query databases.
- : A general-purpose, low-level programming language.
- : Tool that secures your internet connection and protects privacy.
- : Apple's language for iOS and macOS development.
- : The act of navigating through the internet.
- : A high-level programming language often used by beginners.
20 Clues: : Markup language for creating web pages. • : A block-based language for young learners. • : The act of navigating through the internet. • : Language used to manage and query databases. • : Extension of C with object-oriented features. • : Apple's language for iOS and macOS development. • : Stylesheet language used for designing websites. • ...
Crossword Puzzle 2022-10-12
Society 2025-05-07
11 Clues: Vaalit • Julkinen • Tasa-arvo • Yksityinen • Päivähoito • Politiikka • Kunnallinen • kansalaisuus • äänestäminen • Benefit Lapsilisä • security sosiaaliturva
EXTREME SPORTS 2021-09-23
Across
- rapid descent on vertical walls by sliding down a rope attached to the body
- An element used to skydive
- slide and twist in a wave standing on a board
- It is a risk of practicing some extreme sport
- when a bone breaks
- is a stretch or tear of the ligaments
- consists of jumping from a certain height with a rope
- A security element to protect the eyes
Down
- security element to illuminate in caves
- Climb a mountain
- move from one point to another by jumping on buildings
- motorcycle circuits with jumps in any space
- It consists of parachuting from an airplane
- They take off from a mountain, driven by the wind
- cross the rivers in a raft with oars
15 Clues: Climb a mountain • when a bone breaks • An element used to skydive • cross the rivers in a raft with oars • is a stretch or tear of the ligaments • A security element to protect the eyes • security element to illuminate in caves • motorcycle circuits with jumps in any space • It consists of parachuting from an airplane • slide and twist in a wave standing on a board • ...
The Great Depression 2022-12-01
Across
- A giant storm that destroyed many farms
- For the unemployed
- A law made to help out with construction
- A group of veterans who want to be paid for working in the army
- Gives unemployed people jobs
- When jobs are plentiful and the economy expands
- A act made to improve nation's highways, rivers and soil while also providing jobs
Down
- A agency made to protect security and prevent fraud
- When the jobs run low and the economy shrinks
- A act made for farmers in means of agriculture
- Supervises security
- Of the economy by federal spending and job creating
- A corp. made for single men who are unemployed
- A law made to insure old/disabled people have a healthy life
- Of capitalism
15 Clues: Of capitalism • For the unemployed • Supervises security • Gives unemployed people jobs • A giant storm that destroyed many farms • A law made to help out with construction • When the jobs run low and the economy shrinks • A act made for farmers in means of agriculture • A corp. made for single men who are unemployed • When jobs are plentiful and the economy expands • ...
COMPUTER LANGUAGE 2025-06-17
Across
- type of software protects computers from malicious software
- is used in assembly languages(2 words)
- network security system that protects networks from unsutharised
- of fifth generation computer language
- of the high-level language
- first instructive computer language
- language
Down
- of fifty generation computer language(2 word)
- kind of language java is
- access to computer network security sysem
- set of instruction that tells the computer what to do
- high level language to low level language and vice versa
- storage location of computer memory that stores data
- of rules that define structure and formed a programing language
- social engineering attack that used to steal user data
15 Clues: language • kind of language java is • of the high-level language • first instructive computer language • of fifth generation computer language • is used in assembly languages(2 words) • access to computer network security sysem • of fifty generation computer language(2 word) • storage location of computer memory that stores data • ...
spanish uniut 4 2021-12-14
15 Clues: map • train • flight • customs • airport • airplane • security • i will go • itenerary • departure • tour, trip • i will visit • de tren train station • al cliente customer service • de vacaciones to go on vacation
unit lesson 4 2023-12-06
15 Clues: pot • vlag • fight • safety • meedoen • gevecht • aanvallen • beschermen • vluchteling • fortnite win • to come back • thing that shoots • officer of the law • something a soldier wears • thing you have to pay money for
People at School 2022-10-14
12 Clues: guru • w.c. • murid • kantin • kantor • ruang kelas • tempat parkir • kepala sekolah • petugas keamanan • petugas kebersihan • penjaga perpustakaan • laboratorium komputer
Glossa 2019-10-08
12 Clues: lähete • isyysloma • tasa-arvo • vähemmistö • syrjäytyminen • tuki, avustus • yksityissektori • turvapaikanhakija • security sosiaaliturva • ennaltaehkäisevä hoito • insurance sairausvakuutus • invaliditeetti, pysyvä vamma
FNAF security breach characters 2022-10-12
17 Clues: Pizza? • Bowling • take a map • Wub Wub Wub • Come on out • Nighty night • I am the best • Hey little guy • Intruder alert • Hello new friend • You need to vent • i always come back • Next molten freddy • You are my superstar • Red light Green Light • are you having fun yet? • welcome to freddy fazbears mega pizzaplex
Department of Homeland Security 2015-08-14
Across
- Secretary of DHS
- Number of Child Agencies under DHS
- Where to apply if you want to work for DHS
- Month DHS was formed
- What kind of branch is the Eagle on the DHS seal holding in its left talon?
- Two-level terrorism threat advisory scale currently used by DHS
- An agency within DHS which regulates and facilitates international trade, collects import duties, and enforces U.S. regulations. Currently, the largest federal law enforcement agency.
- An agency within DHS whose primary purpose is to coordinate and respond to natural disasters that occur within the United States and overwhelm the local resources and authorities of where they occur
Down
- Color Coded terrorism threat advisory scale that pre-dated the NTAS
- The first Secretary of DHS
- Number of Core Missions DHS has according to the QHSR
- How many arrows is the Eagle holding in its right talon on the DHS seal?
- Number of secretaries DHS has had
- Campaign set up to combat human trafficking
- Secretary of TSA
- A branch of the US Armed Forces that operated under DHS during peace time, but can be transferred to the U.S. Department of the Navy by the President at any time, or by Congress during times of war.
- An agency within DHS which has two distinct purposes, one of them being the protection of current and former national leaders and their families.
17 Clues: Secretary of DHS • Secretary of TSA • Month DHS was formed • The first Secretary of DHS • Number of secretaries DHS has had • Number of Child Agencies under DHS • Where to apply if you want to work for DHS • Campaign set up to combat human trafficking • Number of Core Missions DHS has according to the QHSR • Two-level terrorism threat advisory scale currently used by DHS • ...
Some important words for the exam 2022-01-25
Across
- saying nasty things to people on the internet is called cyber...
- teenagers use social media a lot, so their media ... is high
- you cut food with it
- a lot of churches have a clock on their ...
- a hotdog is a ... in a bread roll
- Instagram, Whatsapp, Facebook, Tik-tok are all social ...
- you can drink from it
Down
- not nice, nit friendly
- it's black and you can make a fire with it
- people singing together in a group
- a legendary creature in fantasy stories
- it makes food taste sweet
- students carry their books in it
- to make somebody angry
- calling other people 'dumbass' is bad ...
- at the start of the school-year getting up early was hard for me, but now I'm ... to it
16 Clues: you cut food with it • you can drink from it • not nice, nit friendly • to make somebody angry • it makes food taste sweet • students carry their books in it • a hotdog is a ... in a bread roll • people singing together in a group • a legendary creature in fantasy stories • calling other people 'dumbass' is bad ... • it's black and you can make a fire with it • ...
Numbers 2024-09-23
Across
- The best way to send messages on the internet is ________ (5).
- _________ (5) is a bad software that can harm your computer.
- When someone unauthorizedly sneaks in right after you through a secured door is called as _______ (10).
- All Ocrolus employees and contractors are required to comply with the provisions of Information Security ______ (6).
- Customer data is classified as Highly ___________(12) and only allowed in approved systems.
Down
- Event when someone breaks into your computer is called as _______(8).
- You can never _____ (5) your password with anyone.
- Please forward any potential phishing emails to __________@xxxxxx.com (8).
- To report a security incident please e-mail ________@xxxxxx.com (8).
- At all times the system should be kept __________ unless it is used by the intended user(6)
10 Clues: You can never _____ (5) your password with anyone. • _________ (5) is a bad software that can harm your computer. • The best way to send messages on the internet is ________ (5). • To report a security incident please e-mail ________@xxxxxx.com (8). • Event when someone breaks into your computer is called as _______(8). • ...
Ethical Hacking 2025-02-04
Across
- A method used to prevent unauthorized access, often involves encrypting data.
- A set of principles that guide the actions of ethical hackers.
- Ethical hackers are supposed to -----like hackers who want to steal confidential data /information
- is a practice where security professionals use hacking techniques to test a system's security and identify vulnerabilities
- This hacking technique is aimed at taking down a website so that a user cannot access it or deliver their service.
- A term for a person who hacks for personal gain or malicious intent
Down
- The act of gaining unauthorized access to systems or networks.
- One of the Career in Ethical Hacking
- Ethical Hacking Tools
- The term for hackers who identify and fix security vulnerabilities to protect systems.
10 Clues: Ethical Hacking Tools • One of the Career in Ethical Hacking • The act of gaining unauthorized access to systems or networks. • A set of principles that guide the actions of ethical hackers. • A term for a person who hacks for personal gain or malicious intent • A method used to prevent unauthorized access, often involves encrypting data. • ...
Catching Flights 2024-05-20
Across
- the number on your ticket/boarding pass for your chair
- you go here to get your ticket, sign in
- another word for your plane ticket
- the numbered section where your flight will leave
- the person who flies your plane
- the person who serves you on your plane
- a guest on the flight
Down
- your international identification
- after your flight you grab your suitcase or bags here
- you might have to pass this security before entering a country
- also known as help desk
- a flight has made it to the destination
- here you have to scan your body and bags
- here you trade currency from euros to yen, dollars, etc
- a flight leaves from the starting location
15 Clues: a guest on the flight • also known as help desk • the person who flies your plane • your international identification • another word for your plane ticket • you go here to get your ticket, sign in • a flight has made it to the destination • the person who serves you on your plane • here you have to scan your body and bags • a flight leaves from the starting location • ...
Science Project 2020-11-18
corporate finance 2021-02-05
Across
- basis In preparation of financial statements
- An entity created by law
- A special form of ownership having a fixed periodic
- The purest and most basic form of corporate ownership
- The sale of either bonds or stocks to the general public
- An entity created by law by two or more people
- The chance that actual outcomes may differ from those expected.
- The science and art of managing money
- The firm’s chief financial manager
- The lowest price at which a security is offered for sale
Down
- Income earned through the sale of a firm’s goods or services.
- A market that establishes correct prices for the securities
- A firm’s taxes divided by its taxable income
- firm's chief accountant
- Long-term debt instrument used by business and government to
- The highest price offered to purchase a security
- The market in which the buyer and seller are not brought
- Groups such as employees
- Financial market in which preowned securities
- The rate at which additional income is taxed.
20 Clues: firm's chief accountant • An entity created by law • Groups such as employees • The firm’s chief financial manager • The science and art of managing money • A firm’s taxes divided by its taxable income • basis In preparation of financial statements • Financial market in which preowned securities • The rate at which additional income is taxed. • ...
Travel Vocabulary 2020-04-03
Across
- in the airport
- security agent
- carry-on baggage
- flight
- in the train station
- to take off (airplane)
- boarding pass
- safety belt
- platform (train)
- suitcase
- ticket window
- on time
- arrival
- counter (check-in)
- seat
- event ticket
- baggage claim
- bunk bed
- to give
- to turn
- to go through security
- aisle
- controller (train ticket)
- first class
- to miss (a flight)
- to board
- passenger
- window
- sleeping car
- trip/travel
- connection
Down
- luggage
- delayed
- to get/obtain
- to see
- ticket (number 2)
- to hope
- waiting room
- departure
- ticket
- flight attendant
- customs
- coach (plane)
- car wagon/train car
- luggage screening
- to go straight
- international airport
- to check luggage/to put on plane
- train stop
- gate
- second class
- passport
- visa
- to land
- layover
55 Clues: seat • gate • visa • aisle • flight • to see • ticket • window • luggage • delayed • to hope • customs • on time • arrival • to give • to turn • to land • layover • suitcase • bunk bed • passport • to board • departure • passenger • train stop • connection • safety belt • first class • trip/travel • waiting room • event ticket • second class • sleeping car • to get/obtain • boarding pass • ticket window • coach (plane) • baggage claim • in the airport • ...
Marvel 2020-05-18
Across
- Died saving the people of Asgard
- Hates having ears touched
- Long time foes of Kree empire(3,7)
- Scott Langs cellmate
- Helps Howard Stark create SHIELD(5,6)
- Nickname of Timothy Dugan
- Friend of Thor
- Had mind stone in forehead
- Scientific sister of Tchalla
- Bruce Banners alter ego
- Surname of SHIELD agent who helped design Capt America shield
- Where Bucky finds sanctuary
- King Laufeys son
- Assists Thor defeat Hela
- Dora Milaje Security chief
- Odins oldest child
Down
- Dr Erik Selvig joined SHIELD to study this
- Maya Hansen created this
- Pin up boy of US military(7,7)
- Co founder of X-Con security
- Queen of Asgard
- Surname of Howard Starks business partner
- One of Thanos adopted children
- Hydra Leader
- First name of agent Natasha Romanoff alias at Stark Industries
- King of Asgard
- Military rank held by Nick Fury
- Avenging archer
- Librarian of Kamar Taj
- Smallest Avenger
30 Clues: Hydra Leader • Friend of Thor • King of Asgard • Queen of Asgard • Avenging archer • Smallest Avenger • King Laufeys son • Odins oldest child • Scott Langs cellmate • Librarian of Kamar Taj • Bruce Banners alter ego • Maya Hansen created this • Assists Thor defeat Hela • Hates having ears touched • Nickname of Timothy Dugan • Had mind stone in forehead • Dora Milaje Security chief • ...
Compliance and Safety Crossword Puzzle 2024-07-17
Across
- Cannabis is currently defined as a ______________ 1 drug.
- Documentation of recurring tasks and procedures
- Visual security requirement required in every state
- Rules governing marijuana use
- The action or fact of adhering to a wish, command, or rule
- Type of cannabis license not yet operational
- Visual document demonstrating an employees ability to work at that facility or in that state
- Unannounced visit from state regulator
Down
- Organization overseeing workplace safety laws
- An identified shortcoming in meeting compliance standards
- Internal controls used to ensure financial, security, and auditing controls
- Destruction of court records related to an arrest
- Systematic review to ensure compliance
- OH NO, its a mislabeled product! What do you do?
- The cannabis version of a travel passport
- Public official that monitors compliance
- Process of obtaining official permission to operate
- Consequence for being non-compliant
- Specific steps and tools required to perform a task or job
- Official connection to an organization
- Official approval of operation
21 Clues: Rules governing marijuana use • Official approval of operation • Consequence for being non-compliant • Systematic review to ensure compliance • Official connection to an organization • Unannounced visit from state regulator • Public official that monitors compliance • The cannabis version of a travel passport • Type of cannabis license not yet operational • ...
Travel-Themed Crossword Puzzle Clues 2025-06-11
Across
- An available room in a hotel
- To leave one’s own country for travel
- A person entering a foreign country must go through this
- Paper showing details of a booked flight or hotel
- The ability to adapt to changes in plans
- sports Thrilling, high-risk recreational activities
- Something that draws tourists to a place
- Unexpected movement of an aircraft caused by air currents
- National origin or citizenship
Down
- Free of charge
- Bathroom on an airplane
- Very flavorful, high-quality food
- To move from one mode of transportation to another
- An item meant to be used once and thrown away
- check Security procedure before boarding a flight
- A person who assists guests with services at a hotel
- A break between connecting flights
- desk The desk where guests check in at a hotel
- A printed or digital guide showing a trip's schedule
- form A document stating items you are bringing through customs
- attentdant A person who serves passengers on a plane
21 Clues: Free of charge • Bathroom on an airplane • An available room in a hotel • National origin or citizenship • Very flavorful, high-quality food • A break between connecting flights • To leave one’s own country for travel • The ability to adapt to changes in plans • Something that draws tourists to a place • An item meant to be used once and thrown away • ...
Week 4 2025-09-18
Across
- who is testing the limits of nato
- politician that got assassinated
- where did the largest sunflower ever grow?
- where did the latest school happen?
- what country is planning the biggest security operation for trump to visit them
- who did Timothy ramsey shoot?
- Where is trump cracking down now?
- where did a tornado destroy 3 houses and ruin a bunch of property
Down
- A whole truck falls into what
- after the death of Charlie Kirk politicians are upgrading what?
- Charlies shooter has to pass what kind of test
- charlie kirks killer
- a deal with what country could keep TikTok active in the US
- Tensions are rising between the US and who?
- Who does Israel keep attacking
- what famous person just turned 70
- Schools aren't requiring what for kids to go to school
- who does trump threaten
- Where is the oldest photo booth still active?
- deadly strikes against what country's boats carrying narcotics
20 Clues: charlie kirks killer • who does trump threaten • A whole truck falls into what • who did Timothy ramsey shoot? • Who does Israel keep attacking • politician that got assassinated • who is testing the limits of nato • what famous person just turned 70 • Where is trump cracking down now? • where did the latest school happen? • where did the largest sunflower ever grow? • ...
The thief's motive 2026-02-16
Across
- person who steals
- protection against crime
- loud warning sound
- person who saw the crime
- formal questioning by police
- valuable items like necklaces and rings
- place where the crime happened
- proof you were somewhere else
- person the police think committed the crime
- piece of information that helps solve a crime
- number pad used to unlock a door
- police officer who investigates crimes
- genetic material used to identify someone
- strand found as evidence
- information used to solve a crime
- security cameras that record video
Down
- mark left by a finger
- people who enforce the law
- illegal act
- mark left by a shoe
- order of events in time
- scientific study of crime evidence
- person who protects a place
- to take a suspect to the police station
- strong box for valuables
- secret numbers or letters
- to get away from danger or police
- official description of an event
- stealing money or valuables
- large planned robbery
30 Clues: illegal act • person who steals • loud warning sound • mark left by a shoe • mark left by a finger • large planned robbery • order of events in time • protection against crime • person who saw the crime • strong box for valuables • strand found as evidence • secret numbers or letters • people who enforce the law • person who protects a place • stealing money or valuables • ...
Persepolis Rising Crossword 2026-03-05
Across
- Laconian admiral who took control of the Solar System
- Earth-Mars ___
- former terrorist, now rehabilitated
- daughter of the High Consul
- base that was annihilated by the Tempest
- president of the Transport Union
- rebellious colony that believes in self-governance
- Saba's ship
- Congress of Worlds representative
- aging Martian gunship
- what was utilized to blow up the docking bay
- first ship that has a magnetic cannon
- governor of the Medina
- birth of humanity
- ship stolen by the resistance
- security supervisor, fired by Singh
- Holden's lover
Down
- Martian goal before the ring-space opened
- leader of the resistance
- command and control center of ring-space
- second security supervisor, stocky
- mentor to Drummer
- person that betrayed the resistance
- High Consul of Laconia
- colony that intrudes into ring-space
- Holden's favorite drink
- "When you fight gods, you storm heaven" (Corey 549).
- Voltaire Collective's bomber
- pilot of the Rocinante's crew
- former elite Martian marine
- second Laconia dreadnought
- violent but kind enforcer
- Transport ___
33 Clues: Saba's ship • Transport ___ • Earth-Mars ___ • Holden's lover • mentor to Drummer • birth of humanity • aging Martian gunship • High Consul of Laconia • governor of the Medina • Holden's favorite drink • leader of the resistance • violent but kind enforcer • second Laconia dreadnought • daughter of the High Consul • former elite Martian marine • Voltaire Collective's bomber • ...
RU ITEC411 2025-11-24
Across
- – Unwanted bulk email messages.
- – Security system that blocks unauthorized access to a network.
- – Legal protection for creative works.
- – Deception intended for financial or personal gain.
- - Program that attaches to files and spreads when those files are shared.
- – (__ of Service) Attack that floods a system with traffic to make it unusable.
- – Right to control personal information.
- – Process of scrambling data to protect confidentiality.
- - Fraudulent emails or websites that trick users into revealing personal information.
Down
- – Persistent unwanted monitoring or following online.
- – the kind of theft that means stealing personal information to impersonate someone.
- – Rules enforced by government to regulate behavior.
- – Self-replicating program that spreads independently across networks.
- – Harassment or intimidation carried out through digital communication.
- – Illegal copying or distribution of software, music, or movies.
- – Moral principles guiding responsible technology use.
- - Software created to damage, disrupt, or gain unauthorized control of systems.
- – Malicious program disguised as legitimate software.
- – Measures taken to protect systems and data.
- - Person who gains unauthorized access to computer systems.
20 Clues: – Unwanted bulk email messages. • – Legal protection for creative works. • – Right to control personal information. • – Measures taken to protect systems and data. • – Rules enforced by government to regulate behavior. • – Deception intended for financial or personal gain. • – Persistent unwanted monitoring or following online. • ...
LEGAL PUZZLE - GENERAL 2021-06-17
Across
- The process of resolving disputes through Court is termed as ___________
- Investigation done to confirm facts/details of a matter under consideration.
- Interim remedy available to the bank in case a client's title has not been mortgaged.
- Who has the mandate to cancel Mortgage interests on a title after the client having paid off his or her loan?
- ________ amount is money borrowed and expected to be paid back with interest
- ___________ Property is that which married couples choose to call a home and that which either of the spouses contribute
- __________ Declaration: A legal document containing facts from the Mortgagor and his/her spouse on marital status
- The action of taking possession of a mortgaged property when the mortgagor fails to keep up their mortgage payments.
- _______ letter is given to a client after repaying the loan to cancel FINCA interest off their security.
- How many times can you subtract 10 from 100
- __________ is a registrable interest on a logbook.
- ___________ of Directors.
- A legal document used by the bank to register its interest on a land title.
- ________ Title is one that is valid for a specified period of time.
Down
- How does a spouse show acceptance of a loan and its terms?
- A Registered Proprietor on a Leasehold title can only borrow money when the ____________ in the Agreement provide for it.
- a situation in which a person is in a position to derive personal benefit from actions or decisions made in their official capacity.
- Delegata potestas non potest _________.
- ________ Order is used when a minor is the registered proprietor on the security.
- Can a Butabika patient take a loan with FINCA while pledging his Kibanja as security?
- _________ Secretary is the custodian of the FINCA Seal.
- A person that has a duty to repay someone's loan when s/he fails to pay.
- _________ is an interest registered on the title.
- _______ is done on securities before a loan is processed.
- Decisions to borrow by companies are made through _____________.
- What do lawyers wear to Court?
- ________ is a word used for security used to secure a loan from a bank.
- Tax that must have been paid for 2 financial years before the bank's interests can be registered on the commercial vehicle logbook.
- The process through which a company seeks to recover delinquent/non-performing loans.
29 Clues: ___________ of Directors. • What do lawyers wear to Court? • Delegata potestas non potest _________. • How many times can you subtract 10 from 100 • _________ is an interest registered on the title. • __________ is a registrable interest on a logbook. • _________ Secretary is the custodian of the FINCA Seal. • _______ is done on securities before a loan is processed. • ...
Information Assurance Crossword Puzzle 2023-12-01
Across
- Many corporate data centers and high-end desktops use purpose-built chipsets. The security reviews and patch releases for these solutions are often not as rigorous as mass-market products, making them easy targets for hackers.
- Metrics must be quantifiable, measured in concrete numbers, such as the number of successful phishing attempts or percentage reduction in system downtime.
- Metrics should be realistic and attainable within the existing resources and capabilities of the organization, ensuring that data can be collected accurately.
- Relates to the underlying technological infrastructure supporting information assurance.
- The process of designating information as having a certain level of sensitivity, such as Unclassified, Confidential, Secret, or Top Secret.
- IDSs use a combination of signature-based and anomaly-based detection.
- The frequency of metric reporting should be timely, aligning with the rate of change expected from the underlying data or the goals they represent. For example, real-time reporting for active security incidents.
Down
- IDSs can generate false positives, which are alerts that are triggered by legitimate activity. False positives can be time-consuming and costly to investigate.
- Ensures the originator of a message or transaction may not later deny action
- Why has the policy been created and how does the company benefit?
- A repeatable metric should have a clear and consistent definition, allowing different staff members to gather and report data in the same manner, ensuring uniformity in measurement.
- This policy outlines the organization's overall security goals and objectives. It also defines the specific security controls that must be implemented to protect the organization's assets.
- Proving the genuineness of facts or documents.
- Who is held accountable for the proper implementation of the policy?
- Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
- Keeping information secret or private.
- Ensuring information can be used or obtained when needed.
- A statement of who issued the policy and how that person has the authority to define and enforce the policy.
- IDSs need to be tuned to the specific environment in which they are deployed. This can be a complex and time-consuming process.
- It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity
20 Clues: Keeping information secret or private. • Proving the genuineness of facts or documents. • Ensuring information can be used or obtained when needed. • Why has the policy been created and how does the company benefit? • Who is held accountable for the proper implementation of the policy? • IDSs use a combination of signature-based and anomaly-based detection. • ...
Information Assurance 2023-12-05
Across
- Information Assurance involves measures that protect and defend both information and information systems.
- Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
- ensures that information remains in its original form; information remains true to the creators intent
- Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
- Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
- Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
- Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
- These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
- The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
- ensures the disclosure of information only to those persons with authority to see it.
- Information Assurance is concerned with safeguarding information from both malicious and accidental threats
- Some older hardware may not be able to support newer security software and solutions.
- Hardware can take years to develop, and resolving security issues often require more than a quick patch.
- Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
- It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
- Most IoT device and robotics manufacturers don’t have dedicated security experts.
- Many corporate data centers and high-end desktops use purpose-built chipsets.
- The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
- It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
- Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.
20 Clues: Many corporate data centers and high-end desktops use purpose-built chipsets. • Most IoT device and robotics manufacturers don’t have dedicated security experts. • Some older hardware may not be able to support newer security software and solutions. • ensures the disclosure of information only to those persons with authority to see it. • ...
15.1 crossword puzzle 2024-05-08
Across
- what EFT stands for; a transfer of money from one bank account to another
- to exchange one good or service for another good or service
- cards allows customers to pay for purchases directly from their checking accounts
- a type of security that pays interest over terms ranging from two to ten years
- a document guaranteeing payment of a specific amount of money
- a type of security that pays interest over terms of ten to thirty years
- the process of transferring money from one individual or organization to another
- anything of value that is accepted in return for goods and services
- a security that matures in a year or less
- a function of money in the economy in which it is a common measure of the worth or price of a good or service
- coins or banknotes that must be accepted for all debts
Down
- a system by which a government provides money in a country's economy
- the concept that the value of a dollar today is worth more than the value of a dollar in the future
- a financial investment issued by that government, a corporation, or other oganizations
- a function of money in the economy in which it can be saved and used at a later date
- paper money and coins
- a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
- short for The Federal Reserve System
- a property of money in which it is able to be divided into smaller units
- a property of money in which people are able to carry money
- a plastic card that allows the holder to make credit purchases up to an authorized amount
- another word for money
- comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
- any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
- a property of money in which it is made of a strong and lasting material
- a property of money in which it is authentic money immediately recognizable
- a property of money in which it maintains its value over time in order for it to be widely accepted
27 Clues: paper money and coins • another word for money • short for The Federal Reserve System • a security that matures in a year or less • coins or banknotes that must be accepted for all debts • to exchange one good or service for another good or service • a property of money in which people are able to carry money • ...
Privacy Act CHC 31 2024-09-12
Across
- Agencies must not keep health information for too long. They can only keep it for as long as is necessary for any lawful purpose of use.
- a word describing the collection of health information by misrepresenting the purpose of collecting the information
- blank officer is responsible for ensuring agency complies with the act and work with PCO when it investigates complaints
- a person's blank has a full or a degree of access to and control over that person's health information - examples of these are parent / guardian / executor of estate
- Health Act blank require all health information held by providers to be retained for 10 years from the last encounter with the patient unless transferred to another doctor or to the patient.
- two words describing doctors, nurses, pharmacists, health insurers, hospitals, primary health organisations, ACC and the Ministry of Health
- the code allows care practitioners to disclose health information to a blank caregiver
- examples of blank information are medical and treatment history or information about donations of organs or blood
- blank is a professional method of disposal for printed health information
- blank security is the confidentiality agreements with staff and contractors, document tracking and footprinting, staff training
Down
- the code requires agencies to reasonable security safeguards to protect the information and prevent blank access
- It stipulates that agencies must ensure that personal information is up-to-date, and complete when used
- code applies to health information about blank individual
- health agencies can disclose information if this is necessary to prevent or lessen a blank threat to public health or public safety
- a key concept wherein health agencies need to let patients know how their information is going to be used and disclosed so the patients can make decisions about whether to provide it.
- two words meaning when someone who should not have access to personal information sees it, intentionally or by accident
- blank security is the use of technology and virtual media like email, laptops and portable storage devices, passwords
- blank security is the entry controls, positioning of whiteboards and computer terminals, locked filing cabinets and storage rooms
- Health Act regulations require all health information to be retained for blank years from the last encounter unless patient is transferred.
- collection of health information or data should be for a blank purpose
20 Clues: code applies to health information about blank individual • collection of health information or data should be for a blank purpose • blank is a professional method of disposal for printed health information • the code allows care practitioners to disclose health information to a blank caregiver • ...
Chapter 2 Crosswords 2025-11-14
Across
- A financial investment issued by a corporation, government, or other organization
- ___ institution - a financial institution that accepts money from customers and deposits into the customers account
- ____ system - the mechanism a nation uses to provide and manage money for itself
- People who lend money to the business in return for a contracted rate of interest or return for their investment.
- ___ order - you buy or sell when the stock reaches a certain price
- ___ bill - a security that matures in a year or less
- Establishes and enforces regulations which protect the investors from unfair practices in the security market
- ___ order - buying or selling a certain amount of shares of the stock at the best current available price and you assume your order will be executed as soon as possible
- a nonprofit financial institution
- ____ policy - action taken to manage supply of money and interest rates
- Stockbrokers earn their salaries from _______ based sales
- people who buy shares of stock in the company
- Pooled group of securities that track performance
- An equity instrument carrying ownership interest
- ___ capital market - selling stocks and bonds directly to public investors
- Pooled investment vehicle (Long & Short). Invest in a spectrum of assets typically with a sector focus
Down
- ____ capital market - stockholders buy and sell shares of stock from another with the help of brokers
- ___ analysis - an analysis of the company's stock, its price, price movement, trading volume, etc.
- Money for real estate, equipment, and so on
- ___ fund- A kind of mutual fund that invests in highly liquid, near-term instruments
- ___ order - you order to buy or sell an order at a specific price changes to a market order when the specific price is reached
- ___ bank - a financial institution that provides services for businesses
- ___ analysis - an analysis of the company itself, its operations, its position within its industry
- a sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
- National associations security dealers automated quotes
- ___ fund - pooled group of securities that track performance of indices benchmarks
- someone who assists you with purchasing stocks and bonds
- ___ accounts - investors who use their own money to purchase securities
- money Online banking allows ____
- ___ accounts - investors who borrow money to purchase securities
- A debt instrument with a promise to pay back the money with interest
31 Clues: money Online banking allows ____ • a nonprofit financial institution • Money for real estate, equipment, and so on • people who buy shares of stock in the company • An equity instrument carrying ownership interest • Pooled group of securities that track performance • ___ bill - a security that matures in a year or less • ...
Chapter 2 Crossword 2025-11-17
Across
- someone who assists you with purchasing stocks and bonds.
- People who lend money to the business in return for a contracted rate of intrest
- Limited liability for shareholders
- Your order to buy or sell an order at a specific price changes to a market order when the specific price is reached.
- A mechanism a nation uses to provide and manage money for itself
- Is the official currency
- Shares can be traded openly
- You want to buy or selll a certain number of shares of stock aat the best current available price and you assume your order will be executed as soon as possible.
- A document guarenteeing payment of a specific amount of money
- Money is deposited directly into a customer's checking account
- Is a written order for the bank to pay a specific amount to the person or organization to which the check is written
- People who buy shares of stock in the company
- Generally fixed, like debt; based on the par value
- Vast majority of U.S. corporations are private
Down
- Is a document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
- is a financial investment issued by a corporation, government, or other organization
- Is a security that matures in a year or less
- Is a bank account that allows the account owner to make deposits
- Is anything of value that is accepted in return for goods and services
- You want to buy or sell when the stock reaches a certain price.
- Money for real estate equipment,and so on
- Help keep the federal government operating.
- Describe the relationship between risk and return
- Those people who do the work.
- Is a security that pays interest over terms of ten to thirty years
- Is a prearranged amount of credt that is available for a business to use as needed
- allow customers to pay for purchases and withdraw cash
- the final document that discloses financial information about the company.
- is a security that pays interest over terms ranging from two to ten years
- is a bank account used by depositors to accumulate money for future use
30 Clues: Is the official currency • Shares can be traded openly • Those people who do the work. • Limited liability for shareholders • Money for real estate equipment,and so on • Help keep the federal government operating. • Is a security that matures in a year or less • People who buy shares of stock in the company • Vast majority of U.S. corporations are private • ...
career 2023-09-29
Across
- A form of security for one and another's self
- Person who keeps people following the law
- A job that takes years to do
- Unexpected situation that needed for action
- person who keeps people from fire
Down
- Causes burns and makes things charred
- in a state of safety and away from harm
- A system of rules that should be followed in the government
- keeping others away from harm and danger
- Doing things are ok with the law
- helping or doing work for others
11 Clues: A job that takes years to do • Doing things are ok with the law • helping or doing work for others • person who keeps people from fire • Causes burns and makes things charred • in a state of safety and away from harm • keeping others away from harm and danger • Person who keeps people following the law • Unexpected situation that needed for action • ...
DINES 2020-05-23
13 Clues: twelve • notion • majestic • fastener • menagerie • place a bet • belly button • bird of prey • large spider • type of fruit • currency unit • female relative • security device
Social Security & Medicare 2022-09-13
Across
- a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
- the amount of income subject to Social Security tax
- provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
- when someone uses your personal information to open accounts, file taxes, or make purchases under your name
Down
- a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
- both Social Security tax and Medicare tax
- Federal Insurance Contributions Act
- the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
8 Clues: Federal Insurance Contributions Act • both Social Security tax and Medicare tax • the amount of income subject to Social Security tax • when someone uses your personal information to open accounts, file taxes, or make purchases under your name • ...
InternetPuzzle 2016-02-17
Across
- server that automatically provides an IP address.
- Modem config without NAT.
- what is before the .com but after the @ symbol?
- Network Address Translation.
- Non changing IP Address.
- A free service with NPP for email and web.
- network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
- A tool you use to help guide your calls.
- A Type of Cord that hooks direct from the modem to customers device.
- Changing IP Address.
- Internet without wires.
Down
- The Program the customer goes to set up a Domain Name.
- The owner of a Domain name.
- Controls how the modem functions.
- Redirects a communication request from one address to a Port.
- Translates an IP address to a domain name.
- Internet program you use to surf the internet.
- a hardware device that has multiple Ethernet ports.
- A networking device that perform the "traffic directing" functions on the Internet.
- Internet output device.
- This controls your domain name's website and email settings.
21 Clues: Changing IP Address. • Internet output device. • Internet without wires. • Non changing IP Address. • Modem config without NAT. • The owner of a Domain name. • Network Address Translation. • Controls how the modem functions. • A tool you use to help guide your calls. • Translates an IP address to a domain name. • A free service with NPP for email and web. • ...
Vriendjes van de dag 2013-10-27
Across
- kapitein
- landbouwwerktuig
- bemanning
- dekwash slang
- uitstulping van de boeg
- vrouw van jorg
- dop op waaier
- scheepshoorn
- plaats aan boord
- vloedgolf
- plaats in Singapore
- navigatiemiddel
- tandenbalk
- plaatsbepalingssysteem
- logboek
- Hi-Fog
- onderwater schone
- lable printer
- meetinstrument
- under water pump
- beunoverloop
- implosie
- zeehond
- windzijde
- PMS
- uitvinder van de windschaal
- hospitaal
- venster
- eva
- eigenaar
- plastificeren
- zee rover
- emmer
- verstuiver
- duizend kilo
Down
- electronische kaart
- latwerk
- spie
- luchttol
- onderwaterblok/zuigbuis
- safe working load
- spoelwater
- rood
- lock out tag out
- schuurborstel
- mannelijk vertier
- Ship security officer
- dekkraan
- verrekijker
- MLC
- keuken
- communicatie middel dat niet werkt
- Callsign
- gereedschap
- bootje
- stuurboord
- afsluiter
- slaapkamer
- hijswerktuig
- topdek
- stuk
- kluis
- kompasfout
- declaration of security
- vloeibaar lekkers
- pressureliner
- schrijfvloeistof
- meertouw
- stuur
- hijswerktuig
70 Clues: MLC • PMS • eva • spie • rood • stuk • kluis • stuur • emmer • keuken • Hi-Fog • bootje • topdek • latwerk • logboek • zeehond • venster • kapitein • luchttol • dekkraan • Callsign • implosie • eigenaar • meertouw • bemanning • vloedgolf • afsluiter • windzijde • hospitaal • zee rover • spoelwater • tandenbalk • stuurboord • slaapkamer • kompasfout • verstuiver • verrekijker • gereedschap • scheepshoorn • beunoverloop • hijswerktuig • hijswerktuig • duizend kilo • ...
corporate finance 2021-02-05
Across
- The firm’s chief financial manager
- The chance that actual outcomes may differ from those expected.
- A market that establishes correct prices for the securities
- The science and art of managing money
- An entity created by law
- A firm’s taxes divided by its taxable income
- The sale of either bonds or stocks to the general public
- firm's chief accountant
- The highest price offered to purchase a security
- Long-term debt instrument used by business and government to
- The market in which the buyer and seller are not brought
Down
- A special form of ownership having a fixed periodic
- Financial market in which preowned securities
- The rate at which additional income is taxed.
- The lowest price at which a security is offered for sale
- An entity created by law by two or more people
- Groups such as employees
- basis In preparation of financial statements
- Income earned through the sale of a firm’s goods or services.
- The purest and most basic form of corporate ownership
20 Clues: firm's chief accountant • Groups such as employees • An entity created by law • The firm’s chief financial manager • The science and art of managing money • basis In preparation of financial statements • A firm’s taxes divided by its taxable income • Financial market in which preowned securities • The rate at which additional income is taxed. • ...
RU ITEC411 - Crime and Security 2023-10-17
Across
- A concealed entry point in communication systems
- Enhanced account security using multiple steps(acronym)
- This law places restrictive measures on information.
- Covert software that gathers user data
- Retail corporation affected by a major data breach in 2007.
- Legislation protecting intellectual property.
- Proving one's identity
- A United States federal law that governs unauthorized access to computer systems and data
- Deceptive cybersecurity trap for hackers.
- Activist use of hacking for social or political causes
- This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
- False statements harming one's reputation.
- False spoken statements harming reputation.
- This process transforms information into a coded form to protect it from unauthorized access
- Using unique physical features for identification
- Malicious software that replicates and infects
- system is used in retail to process transactions, record sales, and manage inventory(acronym.
- Ethical hacking for security assessment.
- Deceptive online tactic to steal personal information
- U.S. law for wiretaps and law enforcement access
20 Clues: Proving one's identity • Covert software that gathers user data • Ethical hacking for security assessment. • Deceptive cybersecurity trap for hackers. • False statements harming one's reputation. • False spoken statements harming reputation. • Legislation protecting intellectual property. • Malicious software that replicates and infects • ...
Travel Vocabulary 2020-04-03
Across
- in the airport
- security agent
- carry-on baggage
- flight
- in the train station
- to take off (airplane)
- boarding pass
- safety belt
- platform (train)
- suitcase
- ticket window
- on time
- arrival
- counter (check-in)
- seat
- event ticket
- baggage claim
- bunk bed
- to give
- to turn
- to go through security
- aisle
- controller (train ticket)
- first class
- to miss (a flight)
- to board
- passenger
- window
- sleeping car
- trip/travel
- connection
Down
- luggage
- delayed
- to get/obtain
- to see
- ticket (number 2)
- to hope
- waiting room
- departure
- ticket
- flight attendant
- customs
- coach (plane)
- car wagon/train car
- luggage screening
- to go straight
- international airport
- to check luggage/to put on plane
- train stop
- gate
- second class
- passport
- visa
- to land
- layover
55 Clues: seat • gate • visa • aisle • flight • to see • ticket • window • luggage • delayed • to hope • customs • on time • arrival • to give • to turn • to land • layover • suitcase • bunk bed • passport • to board • departure • passenger • train stop • connection • safety belt • first class • trip/travel • waiting room • event ticket • second class • sleeping car • to get/obtain • boarding pass • ticket window • coach (plane) • baggage claim • in the airport • ...
Investment Unit 2024-03-20
Across
- nationally reconized financially sound company
- a system of recording info
- biggest financial fraud in US history
- when a large number of people withdraw their deposits
- age to start investing
- you can only put up to $7,000 per year
- president who created social security
- measures the proformance of multiple companies
- when the market is high
- mortgage backed by securities
- retirement plan managed by your employer
- tells us how big the company is in the stock market
- age to collect social security
Down
- federal deduction from each paycheck
- a virtual currency
- you can do this whith your 401k funds to your new company's 401k plan
- currencies that are created and backed by the government
- example of an investment fund
- secured in the possesion or assigned to a person
- bought and sold throughout the day
- at 67 you can collect this
- when the market is low
- money saved for a purpose
23 Clues: a virtual currency • age to start investing • when the market is low • when the market is high • money saved for a purpose • a system of recording info • at 67 you can collect this • example of an investment fund • mortgage backed by securities • age to collect social security • bought and sold throughout the day • federal deduction from each paycheck • ...
CROSSWORD 2023-08-07
Across
- Malicious software.
- Distributed, secure ledger.
- Malicious software.
- Unique biological identifiers.
- Internet-based data storage and computing.
- Computer providing services to clients.
- Computing based on quantum mechanics.
- Enhanced reality with computer-generated elements.
- Data protection using a code.
- Decentralized digital currency.
- Single-layer carbon material.
- Information and facts.
- Name of the first commercial video game ever released
- A widely used open-source operating system based on the Linux kernel.
- Simulated or computer-generated.
- Set of steps to solve a problem.
- Manipulating materials at a tiny scale.
Down
- of Things Interconnected smart devices.
- A cloud computing service offered by Amazon Web Services (AWS) for scalable storage.
- Unit of digital storage, 1 billion bytes.
- Computer security expert.
- Learning AI learning from data.
- A popular version control system used by developers to track changes in their codebase.
- Unauthorized access to systems.
- Mobile device with advanced features.
- Simulated intelligence.
- Network security barrier.
- Global network of connected devices.
- Writing code for computers.
- Application Programming Interface.
30 Clues: Malicious software. • Malicious software. • Information and facts. • Simulated intelligence. • Computer security expert. • Network security barrier. • Distributed, secure ledger. • Writing code for computers. • Data protection using a code. • Single-layer carbon material. • Unique biological identifiers. • Learning AI learning from data. • Unauthorized access to systems. • ...
Cloud Deployment Crossword Puzzle 2025-03-07
Across
- Storing data in fixed-sized chunks, ideal for databases.
- Stores data as objects with metadata.
- Software that creates and manages virtual machines.
- Organizing data into a hierarchical structure like a local file system.
- Moving a powered-off server to a new environment.
- Ability to scale resources up or down as needed.
- Calculating expenses related to cloud migration and usage.
- A software-based simulation of a physical computer.
- Adding extra layers of security to logins.
- Identifying which applications should be migrated first.
- Assigning CPU, memory, and storage dynamically.
- Ability to scale resources up or down as needed.
- Creating backup copies to prevent data loss.
Down
- Part of the workload stays on-premises while others move to the cloud.
- Moving a running virtual machine without downtime.
- Allowing users to log in once for multiple apps.
- Ensuring compliance and safety during migration.
- Identity and Access Management in cloud security.
- Evaluating current infrastructure before cloud migration.
- Assigning permissions based on user roles.
- Running applications in isolated environments.
- Lifting and shifting applications to the cloud.
- Evaluating current infrastructure before migration.
- Restricting access for high-privilege accounts.
24 Clues: Stores data as objects with metadata. • Assigning permissions based on user roles. • Adding extra layers of security to logins. • Creating backup copies to prevent data loss. • Running applications in isolated environments. • Lifting and shifting applications to the cloud. • Assigning CPU, memory, and storage dynamically. • ...
THE FAMILY 2025-05-26
Across
- : A feeling of great respect and approval.
- : The state of begin linked or joined together
- : Security is the feeling of being safe and protected.
- : a feeling or sorrow or unhappiness
- : A sense of being part of something
- : A sense of reassurance or relaxation.
- : Happiness is a state of feeling joyful and content.
- : Confidence in the reliability or honesty of someone or something Sadness
- : Confidence in a positive outcome.
- : A deep feeling of affection, care, and connection toward someone or something.
Down
- The felling of sadness when expectations are not met
- : a strong felling of displeasure or hostility.
- : Something that makes life easier or less painfull
- : A sense of dissatisfaction when things don’t go as planned
- : The act of thinking about potential problems
- : A sentimental longing for the past
- : a felling of admiration for someone or something
- : Joy is a feeling of great happiness and delight.
- : A felling of thankfulness and appreciation.
- : A felling of satisfaction and self respect
20 Clues: : Confidence in a positive outcome. • : A sentimental longing for the past • : A sense of being part of something • : a feeling or sorrow or unhappiness • : A sense of reassurance or relaxation. • : A feeling of great respect and approval. • : The act of thinking about potential problems • : The state of begin linked or joined together • ...
safety and secruity 2025-06-05
Across
- At the end of an aircraft
- reversers At rear of engine
- The body of the aircraft located between the two wings
- The main building where passengers check in
- A person with responsibility to manage the traffic on the ramp
- The area of the airport where security checks are conducted
- The process of moving an aircraft
- Straight and off to each side of the aircraft
- Where the aircraft gets serviced
- That is at the end of an aircraft
Down
- Area where aircraft is packed/loaded and unloaded
- Fitted to the wings
- A document used to board the plane
- Located on the wings closest to the fuselage
- The bridge connecting to aircraft and terminal
- The area where the public can access an airport terminal
- The path aircraft uses to move on the ground
- The area where passengers can relax and wait for there flights
- The area where the aircraft take off and land
- The area where passengers can purchase there duty free goods
20 Clues: Fitted to the wings • At the end of an aircraft • Where the aircraft gets serviced • The process of moving an aircraft • That is at the end of an aircraft • A document used to board the plane • reversers At rear of engine • The main building where passengers check in • Located on the wings closest to the fuselage • The path aircraft uses to move on the ground • ...
