cyber security Crossword Puzzles

ASEAN 2019-08-22

ASEAN crossword puzzle
Across
  1. singkatan dari ASEAN Security Community
  2. singkatan dari Southeast Asian Games
  3. negara-negara yang terletak pada suatu wilayah yang sama dapat terdorong untuk kerja sama.
  4. singkatan dari ASEAN Socio-Cultural Community
  5. singkatan Konferensi Tingkat Tinggi
  6. singkatan dari ASEAN Youth Leadership Development Programme
  7. singkatan dari ASEAN Ministers Responsible for Culture and Arts
  8. singkatan dari ASEAN Agreement on Disaster Management and Emergency Response
  9. singkatan dari ASEAN Youth Forum
  10. singkatan dari confidence building measures
Down
  1. singkatan dari Environmentally Sustainabe City
  2. singkatan dari South-East Asia Nuclear Weapon Free Zone
  3. singkatan dari ASEAN Commmittee on Culture and Information
  4. kegiatan atau usaha yang dilakukan oleh beberapa orang untuk mencapai tujuan bersama.
  5. singkatan dari North Atlantic Treaty Organization
  6. singkatan dari ASEAN Political Security Community
  7. singkatan dari ASEAN Convention on Counter Terrorism
  8. singkatan dari Zone of Peace, Freedom And Neutrality
  9. singkatan dari ASEAN Defence Ministers Meeting
  10. singkatan dari ASEAN Youth Leadership Forum
  11. singkatan dari ASEAN Regional Forum
  12. singkatan dari ASEAN Economic Community

22 Clues: singkatan dari ASEAN Youth Forumsingkatan Konferensi Tingkat Tinggisingkatan dari ASEAN Regional Forumsingkatan dari Southeast Asian Gamessingkatan dari ASEAN Security Communitysingkatan dari ASEAN Economic Communitysingkatan dari ASEAN Youth Leadership Forumsingkatan dari confidence building measuressingkatan dari ASEAN Socio-Cultural Community...

Infosec Crossword Puzzle Contest 2019-08-29

Infosec Crossword Puzzle Contest crossword puzzle
Across
  1. Should not be shared / kept open to anyone
  2. Bypassing system’s customary security mechanism
  3. Unplanned disruption or failure of a feature or service
  4. Malware which presents unwanted advertisements
  5. Microsoft Office is an _______ software
  6. Threat X Vulnerability
  7. A Weakness in a system
  8. Virtual _________ Network
  9. A terminal emulator / serial console that support SSH
  10. A Software products which provide real-time analysis of security alerts by network hardware and application
Down
  1. A fraudulent social engineering attempt to obtain sensitive information
  2. Malicious software that replicates while moving across information systems
  3. The refusal of something requested or desired.
  4. Successfully exploiting vulnerability is known as
  5. Technology designed to keep the bad guys out
  6. Application of investigative analysis on a computer
  7. _______ makes password / passphrase more secure
  8. ___________ is stimuli that has meaning in some context for its receiver
  9. Confidentiality,___________,Availability
  10. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication

20 Clues: Threat X VulnerabilityA Weakness in a systemVirtual _________ NetworkMicrosoft Office is an _______ softwareConfidentiality,___________,AvailabilityShould not be shared / kept open to anyoneTechnology designed to keep the bad guys outThe refusal of something requested or desired.Malware which presents unwanted advertisements...

Infosec Crossword Puzzle Contest 2019-08-29

Infosec Crossword Puzzle Contest crossword puzzle
Across
  1. Virtual _________ Network
  2. Malware which presents unwanted advertisements
  3. A Weakness in a system
  4. Application of investigative analysis on a computer
  5. Should not be shared / kept open to anyone
  6. Unplanned disruption or failure of a feature or service
  7. _______ makes password / passphrase more secure
  8. Confidentiality,___________,Availability
  9. Threat X Vulnerability
  10. ________ is created by hackers for unauthorized entry at any point of time..
Down
  1. Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication
  2. A terminal emulator / serial console that support SSH
  3. Web __________ Penetration Testing
  4. A Network security device that monitors and filters incoming / outgoing network traffic
  5. ___________ is stimuli that has meaning in some context for its receiver
  6. The refusal of something requested or desired.
  7. The process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment.
  8. Successfully exploiting vulnerability is known as
  9. A fraudulent social engineering attempt to obtain sensitive information
  10. Malicious software that replicates while moving across information systems

20 Clues: A Weakness in a systemThreat X VulnerabilityVirtual _________ NetworkWeb __________ Penetration TestingConfidentiality,___________,AvailabilityShould not be shared / kept open to anyoneMalware which presents unwanted advertisementsThe refusal of something requested or desired._______ makes password / passphrase more secure...

Airlines 2019-02-12

Airlines crossword puzzle
Across
  1. - the side of an airport terminal beyond passport and customs control.
  2. - a place at the airport which checks the goods,travellers and luggage
  3. - a computer network
  4. - a security service for aviation services.
  5. - a three letter code for Los Angeles airport
  6. - The area in which people gather before departure.
  7. - a place to change money
  8. - a place where waste goes
  9. - A small building used for worship.
  10. - people who fly on the plane
Down
  1. - flying an aircraft
  2. - an office where customers go for services
  3. - the side of an airport terminal to which the general public has unrestricted access.
  4. - people who check that everything is secure in a place
  5. - The area in which you ensure your personal hygiene is up to standard.
  6. - goods that are exempt from tax.
  7. - picks up people and moves them to a different level.
  8. - volunteers who assist customers in the airport
  9. - a piece of equipment provided for a particular service.
  10. - things you take when going on an holiday

20 Clues: - flying an aircraft- a computer network- a place to change money- a place where waste goes- people who fly on the plane- goods that are exempt from tax.- A small building used for worship.- things you take when going on an holiday- an office where customers go for services- a security service for aviation services....

HE+ NS 2023-09-28

HE+ NS crossword puzzle
Across
  1. helps support youth globally
  2. group that works within state authority
  3. helps the Oriental region by helping to progress their economies
  4. protects species while helping local communities
  5. gives global loans to countries in need to help the global economy
  6. upholds dignity of others and advances their liberties
  7. organization that supports globally sustainable economic growth
  8. helps developing countries build their trade capacity
  9. group made up of independent organizations that promotes environmental sustainability
  10. humanitarian group that provides care for victims of war, violence, and emergencies
  11. wellness group
  12. group that operates independently from state authority
Down
  1. helps families who struggle with house financing
  2. safeguard of freedom and security politically and militarily
  3. world's largest human right's organization
  4. fighting inequality to end poverty and injustice
  5. globally connects governments to improve the international enviroment
  6. promotes togetherness between the continent with the most countries
  7. promotes peace and security on the Eastern Hemisphere
  8. countries that work together to solve common problems and maintain relations

20 Clues: wellness grouphelps support youth globallygroup that works within state authorityworld's largest human right's organizationhelps families who struggle with house financingprotects species while helping local communitiesfighting inequality to end poverty and injusticehelps developing countries build their trade capacity...

Tech and Cyber Crime Mysteries 2025-01-06

Tech and Cyber Crime Mysteries crossword puzzle
Across
  1. An ethical hacker who helps organizations improve security
  2. Any program designed to damage or gain unauthorized access
  3. Hyper-realistic synthetic media used for deception
  4. The practice of recovering and analyzing electronic evidence
  5. Digital tokens often demanded as ransom payments
  6. Unauthorized exposure of login credentials
  7. A code injection exploit targeting databases
  8. Security system monitoring incoming and outgoing network traffic
Down
  1. The process of scrambling data to prevent unauthorized access
  2. A program secretly recording every keystroke typed
  3. Malicious software that locks files until payment is made
  4. Someone who breaks into computer systems for illicit or ethical reasons
  5. Overwhelming a target server with excessive traffic
  6. A cyberattack requiring no user interaction to gain entry
  7. A hidden network often used for illegal transactions
  8. A deceptive attempt to steal personal details via email or messaging
  9. Harmful code hidden inside otherwise legitimate software
  10. A criminal hacker seeking personal gain or causing harm
  11. Stealing personal info to commit fraud or other crimes
  12. A network of compromised devices controlled remotely

20 Clues: Unauthorized exposure of login credentialsA code injection exploit targeting databasesDigital tokens often demanded as ransom paymentsA program secretly recording every keystroke typedHyper-realistic synthetic media used for deceptionOverwhelming a target server with excessive trafficA hidden network often used for illegal transactions...

investment crossword 2023-12-11

investment crossword crossword puzzle
Across
  1. -The rate of which the prices of a good increases.
  2. -The annual interest payment on a bond.
  3. -A financial asset such as a stock or bond.
  4. -A group of financial instruments which have similar financial characteristics.
  5. -A share of the value of a company.
  6. -A collection of financial investments such as stocks.
  7. -The second largest stock exchange.
  8. -An individual retirement account.
  9. -A collection of stocks and bonds that are traded on securities exchanges.
  10. -The process of setting money aside to increase wealth over time.
Down
  1. -A security in which the Invester loans money to a company.
  2. -Money from the profits of a company.
  3. -A market where the stocks are up or rising.
  4. -A retirement account.
  5. -A market in which prices are falling.
  6. -An index of 500 large cap companies.
  7. -An investment tool for individuals to earmark funds.
  8. -A low-fee portfolio of stocks.
  9. -New York stock exchange.
  10. -A degree of uncertainty on if the investment will make money.

20 Clues: -A retirement account.-New York stock exchange.-A low-fee portfolio of stocks.-An individual retirement account.-A share of the value of a company.-The second largest stock exchange.-Money from the profits of a company.-An index of 500 large cap companies.-A market in which prices are falling.-The annual interest payment on a bond....

technology 2024-10-09

technology crossword puzzle
Across
  1. A broad term to describe a system of storing data a different server and accessing it via a network
  2. computer that runs chromeOS
  3. where did it store on your computer
  4. An open source platform
  5. Send you virtual letter
  6. It stores data
  7. what people hate
  8. infect your computer
  9. It connect your computer to see your screen
  10. where data is stored on the internet
  11. Laughing out loud
  12. he accesses your private information
  13. Messaging platform
Down
  1. input character
  2. biggest platform search
  3. makes a computer work
  4. not having your information viewed
  5. Connects your internet to the rest of the world
  6. Please accept "c__k___"
  7. tdsb famous "no" rule
  8. security system that defend virus
  9. big daddy musk
  10. "its going to take over the world!!!"
  11. Country that makes computer
  12. final step to make your account
  13. type of coding language
  14. computer connect to this.
  15. you can see the internet around you
  16. To connect a mouse
  17. extra security to your account

30 Clues: big daddy muskIt stores datainput characterwhat people hateLaughing out loudTo connect a mouseMessaging platforminfect your computermakes a computer worktdsb famous "no" rulebiggest platform searchPlease accept "c__k___"An open source platformSend you virtual lettertype of coding languagecomputer connect to this.computer that runs chromeOS...

IT 2025-07-03

IT crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information via email
  2. Secure connection over the internet for remote access
  3. Period when a service is unavailable
  4. Assistance provided to users with technical issues
  5. Device that directs data traffic on a network
  6. Software designed to harm or exploit systems
  7. Accessing a computer or network from a different location
  8. Record of an IT support request
  9. Secret code required to access accounts
Down
  1. Software fix for a security vulnerability or bug
  2. Enter username and password to access a system
  3. Software or hardware that blocks unauthorized network access
  4. Computer that provides resources to other computers on a network
  5. To refer a problem to higher-level support
  6. Install the latest software improvements or security patches
  7. Program used to access websites
  8. Device that produces paper copies of documents
  9. Restart a computer to fix issues
  10. Copy of data kept in case of loss or failure
  11. Memory used by computers to run programs

20 Clues: Program used to access websitesRecord of an IT support requestRestart a computer to fix issuesPeriod when a service is unavailableSecret code required to access accountsMemory used by computers to run programsTo refer a problem to higher-level supportSoftware designed to harm or exploit systemsCopy of data kept in case of loss or failure...

Test 2022-10-10

Test crossword puzzle
Across
  1. Rule, Enforces business associate liability with direct penalties
  2. Rule, Sets a national set of security standards for protecting ePHI
  3. An example of a general Business Associate
  4. Entities, A health plan or health care clearinghouse or health care provider
  5. HIPAA contains this to protect PHI and ePHI
  6. The release or divulging in any other manner of information outside the entity holding the information
  7. We are responsibilities our patient's privacy
  8. A fraudulent practice of sending emails
  9. Sharing these is a violation
  10. One of our Core Values
  11. To intentionally lie or cheat to get something you are not entitled to
Down
  1. Employees are protected against this for reporting an issue in good faith
  2. The measurement of performance against "best practice" standards
  3. Is the government agency that enforces HIPAA
  4. An unauthorized use or disclosure of PHI
  5. Taking responsibility for one's actions
  6. Office of the Inspector General
  7. Conscience, A Medical Leadership principle
  8. The affirmation by signature
  9. Compliance violations can lead to financial and reputational harm

20 Clues: One of our Core ValuesSharing these is a violationThe affirmation by signatureOffice of the Inspector GeneralTaking responsibility for one's actionsA fraudulent practice of sending emailsAn unauthorized use or disclosure of PHIAn example of a general Business AssociateConscience, A Medical Leadership principle...

NATO THEM CROSSWORD 2026-03-27

NATO THEM CROSSWORD crossword puzzle
Across
  1. NATO'S PRIMARY PURPOSEE IS ENSURE ___ OF ITS MEMBER
  2. A BALTIC NATO MEMBER
  3. CAPITAL CITY WHERE NATO HQ IS LOCATED
  4. AN ATTACK ON ONE IS AN ATTACK ON ALL
  5. COUNTRY THAT JOINED NATO IN 2023
  6. YEAR NATO WAS FOUNDED
  7. THE MILITARY ALLIANCE FORMED IN 1946
  8. EAST EUROPEAN COUNTRY THAT JOINED NATO IN 1999
  9. THE NORTH ATLANTIC TREATY SIGNED IN THIS CITY
  10. A FOUNDING MEMBER THAT HAS A LEANING TOWER
  11. A TYPE OF NATO MILITARY PRACTICE ACTIVITY
  12. NATO'S LARGEST MEMBER BY LAND AREA
Down
  1. MEDITERRANEAN COUNTRY THAT JOINED NATO IN 1952
  2. THIS ARTICLE OUTLINES COLLECTIVE DEFENSE CLAUSE
  3. COUNTRY THAT JOINED NATO IN 2024
  4. NATO FORMED TO COUNTER THE INFLUENCE OF___ BLOC
  5. A NATO SECURITY GENERAL (LAST NAME)
  6. MAJOR EUROPEAN ECONOMIC POWER AND NATO MEMBER
  7. NOT A FULL MEMBER BUT WORKS CLOSELY WITH ALLIANCE
  8. FOUNDING MEMBER THAT SHARES LARGE BORDER WITH US
  9. ONE OF THE TWO OFFICIAL LANGUAGES OF NATO
  10. FIRST LETTER IN NATO PHONETIC ALPHABET
  11. NATO'S CIVILIAN DECISION-MAKING BODY (ACRONYM)

23 Clues: A BALTIC NATO MEMBERYEAR NATO WAS FOUNDEDCOUNTRY THAT JOINED NATO IN 2024COUNTRY THAT JOINED NATO IN 2023NATO'S LARGEST MEMBER BY LAND AREAA NATO SECURITY GENERAL (LAST NAME)AN ATTACK ON ONE IS AN ATTACK ON ALLTHE MILITARY ALLIANCE FORMED IN 1946CAPITAL CITY WHERE NATO HQ IS LOCATEDFIRST LETTER IN NATO PHONETIC ALPHABET...

STAFF THE SPARE CONN 2016-01-19

STAFF THE SPARE CONN crossword puzzle
Across
  1. ROLO
  2. HAPPY CHAPPY
  3. PETTY...
  4. ALWAYS HUNGRY
  5. 25
  6. TATTOO GUY
Down
  1. ALWAYS LATE
  2. SECURITY
  3. GYM GUY
  4. SCOOTER
  5. CRISP QUEEN
  6. THE SAGAS

12 Clues: 25ROLOGYM GUYSCOOTERSECURITYPETTY...THE SAGASTATTOO GUYALWAYS LATECRISP QUEENHAPPY CHAPPYALWAYS HUNGRY

The Cold War 2022-04-29

The Cold War crossword puzzle
Across
  1. National Aeronautics and Space Administration.
  2. Another name for Taiwan.
  3. War dominated international relations from the late 1940's to the collapse of the Soviet Union.
  4. Buffer states.
  5. European Recovery Program.
  6. The German Democratic Republic
  7. __Bank (International Bank).
  8. North Atlantic Treaty Organization abbreviation.
  9. ___ Council was given the responsibility of maintaining international security.
Down
  1. Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
  2. ___ Policy prevented Soviet expansion without starting a war.
  3. The Federal republic of Germany.
  4. British Prime minister
  5. __ Curtain was used to refer to the division between U.S allies and Soviet allies.
  6. A military alliance for the defense of the Communist States of Eastern Europe.
  7. The founding of the United ___ in the fall 1945.

16 Clues: Buffer states.British Prime ministerAnother name for Taiwan.European Recovery Program.__Bank (International Bank).The German Democratic RepublicThe Federal republic of Germany.National Aeronautics and Space Administration.The founding of the United ___ in the fall 1945.North Atlantic Treaty Organization abbreviation....

Elevate your potential 2024-09-30

Elevate your potential crossword puzzle
Across
  1. Board game and West End Show (5)
  2. Panorama perhaps, for small weight (9)
  3. The answer might be dissolved in a liquid (8)
  4. broadcast the fitness of Jumbo perhaps (13)
  5. Watch for fingers with no hands (7)
  6. Slim down the agreement (8)
  7. Something to ask mystic meg (6)
  8. Not out - at home learnt to shuffle (8)
  9. Hear a West End Show, host of Dstl information (5)
  10. Pb (4)
Down
  1. Sounds like a lift in New York perhaps, without the alternative (7)
  2. A twister called Monty (6)
  3. Song by Gloria Gaynor "I will ..." finished early with proficiency (13)
  4. Cryptography organisation rings the bell (6)
  5. I fancy Bertie is concealing a kind of crime (5)
  6. Might be found in bad attitudes (3)
  7. Something new, a work of fiction maybe (5)
  8. Computing for waste recycling (8)
  9. A difference that can be shocking (9)

19 Clues: Pb (4)A twister called Monty (6)Slim down the agreement (8)Something to ask mystic meg (6)Board game and West End Show (5)Computing for waste recycling (8)Might be found in bad attitudes (3)Watch for fingers with no hands (7)A difference that can be shocking (9)Panorama perhaps, for small weight (9)Not out - at home learnt to shuffle (8)...

JMS Life 2024-03-14

JMS Life crossword puzzle
Across
  1. MRTRAMM
  2. MRNANCE
  3. YOU GET YOUR LUNCH HERE
  4. MRORTEGA
  5. MSWHITEHURST
  6. MSJEN
  7. MRKEITH
Down
  1. YOU GO HERE WHEN YOU'RE IN TROUBLE
  2. MSVILLAREAL
  3. DRPENULIAR
  4. MSOTEY
  5. MRSLUFT
  6. MSTIRONA
  7. MRCOOPER

14 Clues: MSJENMSOTEYMRTRAMMMRNANCEMRSLUFTMRKEITHMRORTEGAMSTIRONAMRCOOPERDRPENULIARMSVILLAREALMSWHITEHURSTYOU GET YOUR LUNCH HEREYOU GO HERE WHEN YOU'RE IN TROUBLE

Állatok 2024-01-08

Állatok crossword puzzle
Across
  1. nagyfülü
  2. tejet ad
  3. gyapjas
  4. az ember legjobb barátja
  5. szereti az egeret
  6. kolbászt ad
  7. igy csinál iá
  8. az állatok királya
Down
  1. tud utánozni
  2. erdélyi security
  3. tojást ad
  4. szarva van
  5. fekete fehér
  6. pupos
  7. agancsos
  8. huzza a szekeret

16 Clues: puposgyapjasnagyfülüagancsostojást adtejet adkolbászt adtud utánozniszarva vanfekete fehérigy csinál iáerdélyi securityhuzza a szekeretszereti az egeretaz állatok királyaaz ember legjobb barátja

Column B 2022-12-14

Column B crossword puzzle
Across
  1. Commons
  2. Forensics
Down
  1. or digital citizenship
  2. Footprint
  3. Technology

5 Clues: CommonsFootprintForensicsTechnologyor digital citizenship

The United Nations 2020-07-29

The United Nations crossword puzzle
Across
  1. Prevents countries from buying goods and selling them to other countries.
  2. This means that decisions can be blocked in the Security Council.
  3. Set up after which World War?
  4. Headquarters of the UN are here.
  5. 90% of conflicts are now within countries.
  6. UN action to help countries recover from conflict.
  7. An agreement to stop fighting.
  8. Assembly Meets regularly to discuss any matters affecting its members.
  9. Prevent the sale of weapons to some countries.
  10. Number of non-permanent members of the security council.
Down
  1. Number of permanent members.
  2. The UN tries to promote these.
  3. Current Secretary-General of the UN.
  4. Head of the UN.
  5. An attempt by the UN to keep two sides in a conflict apart.
  6. Involves the UN sending in troops to stop wars.

16 Clues: Head of the UN.Number of permanent members.Set up after which World War?The UN tries to promote these.An agreement to stop fighting.Headquarters of the UN are here.Current Secretary-General of the UN.90% of conflicts are now within countries.Prevent the sale of weapons to some countries.Involves the UN sending in troops to stop wars....

Disruptive Technology 2025-07-24

Disruptive Technology crossword puzzle
Across
  1. Finds weaknesses and risks in applications or computer systems
  2. Public cloud computing architecture
  3. Uses endpoint monitoring to detect potential cybersecurity breaches
  4. A large, virtual world centred around user interactivity
  5. The act of automating everything that a business can automate
  6. A cybersecurity measure that uses security controls to protect users and devices
  7. Uses quantum mechanics and sciences to solve complex computing problems
  8. A user's experience across one website/application
  9. Combines practices and technologies to mitigate business risks
  10. Covers victims in the event of a cybersecurity breach
  11. Abbreviation is (BI)
Down
  1. Abbreviation is (AI)
  2. A form of authentication that provides users with an extra layer of security
  3. Abbreviation is (XaaS)
  4. Encompasses technologies that focus on immersive realities
  5. Technologies that are developed with the thought of lessening environmental impacts

16 Clues: Abbreviation is (AI)Abbreviation is (BI)Abbreviation is (XaaS)Public cloud computing architectureA user's experience across one website/applicationCovers victims in the event of a cybersecurity breachA large, virtual world centred around user interactivityEncompasses technologies that focus on immersive realities...

English 2025-12-10

English crossword puzzle
Across
  1. A weakness that can be exploited.
  2. Long-term storage of old files.
  3. The way a system or user acts.
  4. A request for information from a database.
  5. A system on which applications can run.
  6. Connected computers that share data.
  7. A direct instruction given to a computer.
  8. Instructions written for computers.
  9. A person or system chosen for attack.
  10. A step taken to solve a problem.
  11. Accidental or unlawful release of information.
  12. A piece of hardware used in computing.
  13. A place where data is kept.
  14. To protect from harm or attacks.
  15. Continuous flow of data.
  16. Converting information into a secure code.
  17. Related to investigating cyber incidents.
  18. The right to keep personal data protected.
  19. The current condition of a system.
  20. A formal rule or guideline.
  21. A mistake or problem in a system.
  22. Someone who monitors or watches activity.
  23. Information stored or processed by computers.
  24. The chance that something bad may happen.
  25. An action taken after an incident.
  26. Unauthorized entry into a system.
  27. Protection against threats or attacks.
  28. To follow the path of an action or data flow.
  29. Use of technology to perform tasks without human input.
  30. A written record of actions or events.
  31. Permission to use or enter a system.
  32. Learning skills or knowledge.
  33. A simplified digital structure used to predict or analyze.
  34. A set of rules for communication.
  35. Monitoring to make sure rules are followed.
  36. A break in security where data is exposed.
  37. A specific area or internet address space.
  38. A part of a larger software system.
Down
  1. Official rule made by authorities.
  2. A tool that blocks unwanted network traffic.
  3. A formal review of systems or processes.
  4. Programs used by a computer.
  5. Searching for threats inside a network.
  6. Proof of an event or action.
  7. Related to money or cost.
  8. Numerical information used for analysis.
  9. Following laws, rules, or standards.
  10. Information sent from one place to another.
  11. A call for data or a service.
  12. A prediction based on information.
  13. The ability to manage or direct something.
  14. Belief that someone or something is reliable.
  15. Measurements used to evaluate performance.
  16. To watch or track activity.
  17. A user identity in a system.
  18. Studying information to understand it.
  19. A computer that provides resources to others.
  20. A set of connected computer components.
  21. A risk or danger.
  22. Too much data or activity for a system to handle.
  23. Something unusual that may signal a problem.
  24. The path data takes to reach a destination.
  25. To check a system for issues or threats.
  26. A saved copy of data in case of loss.
  27. A document describing an event or findings.
  28. A sign that danger or problems may occur.
  29. An event that disrupts normal operations.
  30. Delay in data communication.
  31. A connection point in a network.
  32. A secret code to access a system.
  33. A tool used to explore or test a system.
  34. Rules about what is morally right or wrong.
  35. Records of system activities.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.A user identity in a system.Delay in data communication.A call for data or a service.Learning skills or knowledge.Records of system activities....

Cyber vocab chapter 3 2021-09-28

Cyber vocab chapter 3 crossword puzzle
Across
  1. systems that requires a physical token
  2. user receives through another object
  3. user receives by default
  4. validating a user
  5. standard authentication protocol for all microsoft versions
  6. false amount of rejected users
Down
  1. allows you to share folders
  2. given to a user at a certain location
  3. where false accept and reject rates meet
  4. all possible attack locations
  5. database of all the network resoruces
  6. eliminating vulnerabilities
  7. analysis of a biological feature
  8. identifying measurable patterns in human activity
  9. cycle of different roles

15 Clues: validating a useruser receives by defaultcycle of different rolesallows you to share folderseliminating vulnerabilitiesall possible attack locationsfalse amount of rejected usersanalysis of a biological featureuser receives through another objectgiven to a user at a certain locationdatabase of all the network resoruces...

Unit 3 Cyber World 2024-03-11

Unit 3 Cyber World crossword puzzle
Across
  1. It is a good idea to keep your personal details __________ on the Internet.
  2. __________ scams look like they are from familiar websites to steal our personal information.
  3. Time wanted to get the latest version of the smartphone because it had much better _______ life.
  4. ________________ may try to download malware to your computer.
  5. Nelson updated his antivirus program to protech his comuter against _________.
  6. Jenny is completely ___________ on the video games. She played it all day!
  7. Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
Down
  1. To avoid being a _________ of the scam, always double-check the links and email address.
  2. ________ is a big problem for singers as people download their music without paying for it.
  3. Blind people have special programmes to help them _______ online.
  4. To deal with social media overuse, it is better for you to turn off _____________ on your phone.
  5. Governments usually _______ the data on their websites to protect citizens' information.
  6. We need to set up an anti-________ filter to block those annoying messages.
  7. She's obsessed with the new online novel and can't put it down.
  8. Everyone is posting ________ of themselves with the Chubby Heart in Central.

15 Clues: ________________ may try to download malware to your computer.She's obsessed with the new online novel and can't put it down.Blind people have special programmes to help them _______ online.Jenny is completely ___________ on the video games. She played it all day!It is a good idea to keep your personal details __________ on the Internet....

Cyber Fund OS Vocab 2025-03-06

Cyber Fund OS Vocab crossword puzzle
Across
  1. ethical hacking that tests a system's defenses
  2. OS that controls machines that run specific tasks
  3. devices that aren't computers that connect to the internet
  4. exploits by attackers before others know about the vulnerability
  5. software that controls specific hardware devices connected to a system
  6. command that ends a task immediately
  7. the OS type that covers desktops and laptops
  8. mistakes in code that can create security loopholes
  9. Apple's mobile device OS
Down
  1. older sections of code that haven't been updated or reviewed
  2. virtual machine that runs on a different machine
  3. Google's mobile device OS
  4. external software or plugins integrated with the OS
  5. Microsoft's OS
  6. unauthorized access to confidential data

15 Clues: Microsoft's OSApple's mobile device OSGoogle's mobile device OScommand that ends a task immediatelyunauthorized access to confidential datathe OS type that covers desktops and laptopsethical hacking that tests a system's defensesvirtual machine that runs on a different machineOS that controls machines that run specific tasks...

Networking Concepts & Cyber Ethics 2025-05-22

Networking Concepts & Cyber Ethics crossword puzzle
Across
  1. Computer network enables two or more computers to share what
  2. Process of transforming data into an unreadable code
  3. digital footprint is also known as
  4. Illegal intrusion into a computer system or network
  5. Being aware of the ethical practices
  6. Similar to hub
  7. two or more computers are connected within a small area
Down
  1. It refers to unwanted bulk emails that come from unknown sources
  2. program that disrupts the normal functioning of a computer
  3. Legal act granted by law to the creater for his original work
  4. Nowadays most computer motherboards & laptops have an inbuild
  5. computer network mainly created for an individual person
  6. Device that connects two different types of network with each other
  7. Simplest way to prevent plagorism is through proper___
  8. Each computer in a network

15 Clues: Similar to hubEach computer in a networkdigital footprint is also known asBeing aware of the ethical practicesIllegal intrusion into a computer system or networkProcess of transforming data into an unreadable codeSimplest way to prevent plagorism is through proper___two or more computers are connected within a small area...

Networking and cyber ethics 2025-06-14

Networking and cyber ethics crossword puzzle
Across
  1. clue:This network covers a wide area
  2. clue:Refers to the act of using or imitating the language of fraudulent act and violation
  3. clue:Is a legal right granted by law to the creator for his original work
  4. clue:When a single licenced copy of a software is loaded into many computer contrary to the licence's terms it is called
  5. clue:Refers to crimanal activities that involves the use of computer and network
  6. clue:A security system that prevents unauthorised people from accessing your system and network
Down
  1. clue:Is a computer network created for an individual person
  2. clue:Refers to an illegal intrusion into a computer system or network
  3. clue:Combination of two term's refers to aware of ethical practice is called
  4. clue:Refers to unwanted bulk emails that came from unknown source
  5. clue:Topology requires a single communication line or one main cable
  6. clue:A physical attach a Computer to a network
  7. clue:Topology,all the nodes is the network are connected in a circular manner
  8. clue:A computer network that is mainly created for individual person
  9. clue:The computer in a network can communicate with each other as well as work in dependently,each computer in a network is called a

15 Clues: clue:This network covers a wide areaclue:A physical attach a Computer to a networkclue:Is a computer network created for an individual personclue:Refers to unwanted bulk emails that came from unknown sourceclue:Topology requires a single communication line or one main cableclue:A computer network that is mainly created for individual person...

Chapman University - NCSAM week 3 2023-10-12

Chapman University - NCSAM week 3 crossword puzzle
Across
  1. Software designed to detect and destroy computer viruses.
  2. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  3. A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
  4. Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Down
  1. A means of access to a computer program that bypasses security mechanisms.
  2. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. A piece of software, a chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior.
  4. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. A hole in software that is unknown to the vendor and that hackers can exploit.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.

10 Clues: Software designed to detect and destroy computer viruses.A means of access to a computer program that bypasses security mechanisms.A hole in software that is unknown to the vendor and that hackers can exploit.A piece of software designed to update a computer program or its supporting data, to fix or improve it....

COMMERCE INVESTMENT 2022-06-07

COMMERCE INVESTMENT crossword puzzle
Across
  1. Any investment that grows or has potential to grow
  2. to overcharge or swindle (a threat to financial security)
  3. setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
  4. Buy goods in large quantities from the manufacturer
  5. A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
  6. A digital currency
  7. Part ownership of a company
  8. personal group with lots of money that are willing to lose it
  9. Australian Stock exchange
  10. A list of income and likely expenditures (a step that can minimise impacts of events)
  11. money set aside during life for retirement (a step that can minimise the impact of events)
  12. A promis to repair any defects that are in a product
  13. The amount of money a consumer is prepared to pay in exchange of a good or service
  14. A loan from a financial institution where something is held as security in case the money is not repaid
  15. items of value
  16. use of money to purchase equipment for a new business or an existing business
  17. Part of a firm’s profit that is divided amongst shareholders
  18. spending more money than your disposable income allows (a threat to financial security)
  19. What remains after all business expenses are deducted from sales revenue
  20. when a person gives up control of their assets and finances, voluntary or by court order
  21. A currency used to invest in stocks, shares as well as goods and services etc.
Down
  1. a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
  2. a collection of financial investments like stocks and cash etc.
  3. A person who works for a wage or salary
  4. Money received on a regular basis from work, property, business, investment or welfare
  5. Investments that provide regulate profits
  6. Involves buying the rights of another business to distribute its products under its name
  7. A practice of funding a project by raising money from a large number of people
  8. money owing to external sources (e.g a bank)
  9. the profit you receive on your investment as a percentage of your original investment
  10. electronic funds transfer point of sale
  11. Place where shares in public companies are bought and sold
  12. Expand your portfolio with different types of shares
  13. Real estate that is bought with the aim of earning some kind of financial return
  14. The swapping or exchanging of one good or another
  15. a type of investment that is acceptable to society’s current standards
  16. Someone who purchases goods and services to satisfy need and wants
  17. Regularly putting aside some money for future use
  18. Activities taken for the purpose of production and consumption of goods and services in a region
  19. A legally binding agreement
  20. illegal business practice (a threat to financial security)

41 Clues: items of valueA digital currencyAustralian Stock exchangePart ownership of a companyA legally binding agreementA person who works for a wage or salaryelectronic funds transfer point of saleInvestments that provide regulate profitsmoney owing to external sources (e.g a bank)The swapping or exchanging of one good or another...

Investing Vocabulary 2023-02-07

Investing Vocabulary crossword puzzle
Across
  1. an offering of unregistered securities to a limited pool of investors
  2. funds that trade on exchanges, generally tracking a specific index
  3. where securities are created so they can be sold to investors for the first time
  4. a digital system that matches buyers and sellers looking to trade securities in the financial markets
  5. the sale of equity shares or other financial instruments such as bonds to the public in order to raise capital
  6. profits gained from the sale of capital assets
  7. the annual income an investor can expect to receive while holding a particular bond
  8. the amount of money a bond issuer promises to repay bondholders at maturity
  9. a filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws
  10. individual participant or member firm of an exchange that buys and sells securities for its own account
  11. special type of stock that pays a set schedule of dividends and does not come with voting rights
  12. When a private company first sells shares of stock to the public
Down
  1. the practice of spreading your investments around so that your exposure to any one type of asset is limited
  2. let you pool your money with other investors to buy stocks, bonds, and other investments
  3. the date when the final payment is due for a loan, bond, or other financial product
  4. a security that represents ownership in a company
  5. groups together the prices of 30 of the most traded stocks on the New York Stock Exchange (NYSE) and the Nasdaq
  6. a security where usually a bond or a preferred stock that can be converted into a different security, typically shares of the company's common stock
  7. individuals classified by the SEC as qualified to invest in complex or sophisticated types of securities
  8. where securities are traded after the company has sold its offering on the primary market
  9. loan from an investor to a borrower such as a company or government
  10. an expression for net asset value that represents the value per share of a mutual fund, an exchange-traded fund (ETF), or a closed-end fund
  11. investment's annual income (interest or dividends) divided by the current price of the security.
  12. your lender verifies your income, assets, debt and property details in order to issue final approval for your loan
  13. a stock market index that measures the performance of about 500 companies in the U.S
  14. securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
  15. a group of shares that are used to give an indication of a sector, exchange or economy
  16. a marketplace, where financial securities issued by companies are bought and sold

28 Clues: profits gained from the sale of capital assetsa security that represents ownership in a companyWhen a private company first sells shares of stock to the publicfunds that trade on exchanges, generally tracking a specific indexloan from an investor to a borrower such as a company or government...

~Food Insecurity~ 2021-11-19

~Food Insecurity~ crossword puzzle
Across
  1. What is your teachers last name?
  2. Food insecurity happens often during what time of year?
  3. During the pandemic, food insecurity in households ---------.
  4. What meal do most schools provide for free or at a low cost?
Down
  1. How can high food security households help struggling households?
  2. How many categories of food security are there?
  3. What do you need in order to buy food?
  4. What type of food security is when you do not have any problems getting food?

8 Clues: What is your teachers last name?What do you need in order to buy food?How many categories of food security are there?Food insecurity happens often during what time of year?What meal do most schools provide for free or at a low cost?During the pandemic, food insecurity in households ---------....

Cyber Times Puzzle 2023-11-14

Cyber Times Puzzle crossword puzzle
Across
  1. Conceals IP address
  2. Fingerprints or facial recognition
  3. Unwanted and unsolicited emails
  4. Malicious software
Down
  1. Adds an extra layer of security in authentication
  2. Security barrier for Network access
  3. Unique phrase for account access
  4. Detects and responds to threats

8 Clues: Malicious softwareConceals IP addressDetects and responds to threatsUnwanted and unsolicited emailsUnique phrase for account accessFingerprints or facial recognitionSecurity barrier for Network accessAdds an extra layer of security in authentication

Domas 7B 2023-12-08

Domas 7B crossword puzzle
Across
  1. Thing that you need to have when traveling (security looks that)
  2. Fast plane,using in war
  3. Same thing like a bus but on rails,driving around the city
  4. Backpack with wheels on it and its bigger
  5. Same thing as passport but a card
  6. A pack that is on your shoulders holding your stuff
  7. Bicycle with the motor on it
Down
  1. The underground train that is only in London
  2. Plane with screws
  3. A flying object on which a person travels
  4. People who travels around the world
  5. Yellow car driving people around the city
  6. People that checks your passport and you stuff in bags
  7. A buss traveling tourists
  8. Ship moving cars from one side to the other side

15 Clues: Plane with screwsFast plane,using in warA buss traveling touristsBicycle with the motor on itSame thing as passport but a cardPeople who travels around the worldA flying object on which a person travelsYellow car driving people around the cityBackpack with wheels on it and its biggerThe underground train that is only in London...

Unit 8.3 Security of Data 2025-04-12

Unit 8.3 Security of Data crossword puzzle
Across
  1. Unauthorized access to computer systems
  2. Using physical traits like fingerprints for security
  3. Redirecting users to fake websites without their knowledge
  4. Scam using SMS messages to steal information
  5. Software used to detect and remove viruses
  6. Tricking users into revealing personal info via fake emails
  7. Protocol for secure communication over the internet
Down
  1. theft Stealing personal or sensitive digital information
  2. Voice call scam pretending to be from a trusted source
  3. fraud Unauthorized use of someone’s payment card
  4. Scrambling data to make it unreadable without a key
  5. General term for malicious software like viruses or spyware
  6. Malicious software that spreads and causes harm
  7. Secret words used to authenticate users
  8. Security system that controls incoming and outgoing traffic

15 Clues: Unauthorized access to computer systemsSecret words used to authenticate usersSoftware used to detect and remove virusesScam using SMS messages to steal informationMalicious software that spreads and causes harmfraud Unauthorized use of someone’s payment cardScrambling data to make it unreadable without a key...

Crossword puzzle 2022-10-12

Crossword puzzle crossword puzzle
Across
  1. right
  2. cause
  3. time
  4. pay
  5. security
  6. period
Down
  1. Day
  2. Herrman
  3. Cammarata
  4. weeks
  5. Human Rights Codes (OHRC)

11 Clues: DaypaytimerightcauseweeksperiodHerrmansecurityCammarataHuman Rights Codes (OHRC)

ISG's Security Summit Crossword Puzzle 2021-10-04

ISG's Security Summit Crossword Puzzle crossword puzzle
Across
  1. This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
  2. The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
  3. _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
  4. An access control model that restricts system access to authorized users based on job function(s).
  5. This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
  6. This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
  7. A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
  8. Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
  9. Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
Down
  1. Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
  2. ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
  3. A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
  4. Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.
  5. Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
  6. A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
  7. Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
  8. Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
  9. ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
  10. _________________@lowes.com and the Report Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
  11. An acronym for volatile memory within a computer that holds active processes, data, and applications.

20 Clues: An access control model that restricts system access to authorized users based on job function(s).An acronym for volatile memory within a computer that holds active processes, data, and applications.Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________....

Cyber Attakcs Quiz 2024-06-28

Cyber Attakcs Quiz crossword puzzle
Across
  1. A cyber attack where attackers disguise as a trustworthy entity to steal sensitive information.
  2. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. A type of malware disguised as legitimate software, used to hack into the user's system.
  4. Software that automatically displays or downloads advertising material when a user is online.
  5. Malicious software designed to secretly monitor and collect information from a computer.
Down
  1. A type of surveillance software that records keystrokes to capture sensitive information like passwords.
  2. A Distributed Denial-of-Service attack aimed at disrupting the normal traffic of a targeted server.
  3. A type of malware that encrypts the victim's files, demanding payment for the decryption key.
  4. A type of malicious code that replicates itself and spreads from one computer to another.
  5. A type of malware that replicates itself to spread to other computers without any user intervention.

10 Clues: Software designed to disrupt, damage, or gain unauthorized access to a computer system.A type of malware disguised as legitimate software, used to hack into the user's system.Malicious software designed to secretly monitor and collect information from a computer....

Cyber Warm Up 2024-02-14

Cyber Warm Up crossword puzzle
Across
  1. Holds you captive
  2. Denied
  3. Network protector
  4. Sneaky email
  5. Not what it seems
Down
  1. Saves what you type
  2. Bad software
  3. Like TSL
  4. DoD Network
  5. Like UNIX

10 Clues: DeniedLike TSLLike UNIXDoD NetworkBad softwareSneaky emailHolds you captiveNetwork protectorNot what it seemsSaves what you type

Cyber Awareness Month 2022-10-16

Cyber Awareness Month crossword puzzle
Across
  1. Unsolicited bulk mail
  2. Symbol to look for before
  3. Being harassed or threatened
  4. Trying to steal other people's sensitive
  5. Software Protecting your Computer
  6. We should always choose a strong and
Down
  1. Files sent through EMail
  2. Trying to break into a computer system
  3. Software programs designed to
  4. Device/Software protecting computer/Network

10 Clues: Unsolicited bulk mailFiles sent through EMailSymbol to look for beforeBeing harassed or threatenedSoftware programs designed toSoftware Protecting your ComputerWe should always choose a strong andTrying to break into a computer systemTrying to steal other people's sensitiveDevice/Software protecting computer/Network

internet basics 2024-01-18

internet basics crossword puzzle
Across
  1. The buying and selling of goods and services over the internet.
  2. Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
  3. Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
  4. Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
  5. Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
  6. Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
  7. To transfer data from a remote server to a local device over the internet.
  8. Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
  9. Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
  10. Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
  11. Small digital icons or characters used to express emotions or ideas in electronic communication.
  12. Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
  13. Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
  14. A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
  15. A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
  1. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
  2. To transfer data from a local device to a remote server over the internet.
  3. A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
  4. A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
  5. Media: Online platforms that enable users to create and share content, communicate, and connect with others.
  6. Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
  7. Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
  8. Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
  9. The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
  10. A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
  11. Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
  12. Electronic mail that allows users to send and receive messages and files over the internet.
  13. Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
  14. A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
  15. A global network of interconnected computers that enables the sharing of information and resources.
  16. Uniform Resource Locator, the address used to access a web page or resource on the internet.
  17. A wireless networking technology that allows devices to connect to the internet without the need for physical cables.

32 Clues: The buying and selling of goods and services over the internet.To transfer data from a local device to a remote server over the internet.To transfer data from a remote server to a local device over the internet.A live or pre-recorded seminar, workshop, or presentation conducted over the internet....

Krzyżówka zadanie 2025-12-10

Krzyżówka zadanie crossword puzzle
Across
  1. Use of technology to perform tasks without human input.
  2. A sign that danger or problems may occur.
  3. Information stored or processed by computers.
  4. A request for information from a database.
  5. Accidental or unlawful release of information.
  6. A risk or danger.
  7. A specific area or internet address space.
  8. A user identity in a system.
  9. Related to money or cost.
  10. A tool that blocks unwanted network traffic.
  11. A document describing an event or findings.
  12. The current condition of a system.
  13. Related to investigating cyber incidents.
  14. To check a system for issues or threats.
  15. A computer that provides resources to others.
  16. Too much data or activity for a system to handle.
  17. Numerical information used for analysis.
  18. A saved copy of data in case of loss.
  19. Unauthorized entry into a system.
  20. A piece of hardware used in computing.
  21. A written record of actions or events.
  22. Someone who monitors or watches activity.
  23. A set of rules for communication.
  24. Measurements used to evaluate performance.
  25. A call for data or a service.
  26. Permission to use or enter a system.
  27. Proof of an event or action.
  28. Programs used by a computer.
  29. A person or system chosen for attack.
  30. The ability to manage or direct something.
  31. Long-term storage of old files.
  32. A prediction based on information.
  33. A formal review of systems or processes.
Down
  1. A direct instruction given to a computer.
  2. A formal rule or guideline.
  3. To watch or track activity.
  4. A part of a larger software system.
  5. Official rule made by authorities.
  6. Searching for threats inside a network.
  7. Something unusual that may signal a problem.
  8. Continuous flow of data.
  9. A system on which applications can run.
  10. Instructions written for computers.
  11. An event that disrupts normal operations.
  12. A weakness that can be exploited.
  13. Monitoring to make sure rules are followed.
  14. A secret code to access a system.
  15. To follow the path of an action or data flow.
  16. A mistake or problem in a system.
  17. Information sent from one place to another.
  18. A connection point in a network.
  19. A place where data is kept.
  20. Protection against threats or attacks.
  21. Records of system activities.
  22. To protect from harm or attacks.
  23. Delay in data communication.
  24. The way a system or user acts.
  25. The right to keep personal data protected.
  26. Belief that someone or something is reliable.
  27. A set of connected computer components.
  28. The path data takes to reach a destination.
  29. A simplified digital structure used to predict or analyze.
  30. An action taken after an incident.
  31. Connected computers that share data.
  32. The chance that something bad may happen.
  33. Converting information into a secure code.
  34. Following laws, rules, or standards.
  35. A break in security where data is exposed.
  36. A step taken to solve a problem.
  37. Rules about what is morally right or wrong.
  38. A tool used to explore or test a system.
  39. Studying information to understand it.
  40. Learning skills or knowledge.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.To watch or track activity.A place where data is kept.A user identity in a system.Delay in data communication.Proof of an event or action.Programs used by a computer.Records of system activities.A call for data or a service.Learning skills or knowledge....

PaulinaNatalia 2025-12-10

PaulinaNatalia crossword puzzle
Across
  1. An action taken after an incident.
  2. A place where data is kept.
  3. To protect from harm or attacks.
  4. A tool that blocks unwanted network traffic.
  5. Converting information into a secure code.
  6. The right to keep personal data protected.
  7. A computer that provides resources to others.
  8. A tool used to explore or test a system.
  9. The path data takes to reach a destination.
  10. Programs used by a computer.
  11. A part of a larger software system.
  12. Information sent from one place to another.
  13. A step taken to solve a problem.
  14. A direct instruction given to a computer.
  15. Use of technology to perform tasks without human input.
  16. Learning skills or knowledge.
  17. Following laws, rules, or standards.
  18. A sign that danger or problems may occur.
  19. The way a system or user acts.
  20. Protection against threats or attacks.
  21. Rules about what is morally right or wrong.
  22. Connected computers that share data.
  23. Delay in data communication.
  24. A specific area or internet address space.
  25. A mistake or problem in a system.
  26. Instructions written for computers.
  27. A connection point in a network.
  28. Permission to use or enter a system.
  29. A risk or danger.
  30. Too much data or activity for a system to handle.
  31. Official rule made by authorities.
  32. A system on which applications can run.
  33. Belief that someone or something is reliable.
  34. Information stored or processed by computers.
  35. A prediction based on information.
  36. A document describing an event or findings.
  37. A formal review of systems or processes.
Down
  1. Unauthorized entry into a system.
  2. Related to money or cost.
  3. Continuous flow of data.
  4. Someone who monitors or watches activity.
  5. The ability to manage or direct something.
  6. Something unusual that may signal a problem.
  7. A call for data or a service.
  8. A break in security where data is exposed.
  9. A request for information from a database.
  10. Numerical information used for analysis.
  11. Records of system activities.
  12. A set of connected computer components.
  13. A set of rules for communication.
  14. A secret code to access a system.
  15. Monitoring to make sure rules are followed.
  16. To watch or track activity.
  17. To check a system for issues or threats.
  18. A formal rule or guideline.
  19. Related to investigating cyber incidents.
  20. Long-term storage of old files.
  21. Searching for threats inside a network.
  22. Proof of an event or action.
  23. Measurements used to evaluate performance.
  24. An event that disrupts normal operations.
  25. A weakness that can be exploited.
  26. A written record of actions or events.
  27. The chance that something bad may happen.
  28. A user identity in a system.
  29. A simplified digital structure used to predict or analyze.
  30. Studying information to understand it.
  31. To follow the path of an action or data flow.
  32. The current condition of a system.
  33. Accidental or unlawful release of information.
  34. A person or system chosen for attack.
  35. A saved copy of data in case of loss.
  36. A piece of hardware used in computing.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.Delay in data communication.A user identity in a system.A call for data or a service.Records of system activities.Learning skills or knowledge....

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
  2. A bridge between two networks that connects using different protocols.
  3. A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
  4. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  5. A firewall setting that separates LAN of an organization from the external network.
  6. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  7. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  8. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
  9. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Down
  1. Protocol that is meant for uploading and downloading files.
  2. A bundle of programs that is designed to bombard users with advertisements.
  3. A computer program that keeps a log of your keystrokes on your keyboard.
  4. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
  5. A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
  6. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  7. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

16 Clues: Protocol that is meant for uploading and downloading files.A bridge between two networks that connects using different protocols.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements....

IIT327-2 Quiz 2 2024-01-12

IIT327-2  Quiz 2 crossword puzzle
Across
  1. Activity involving the exploration of computer or network ports to identify potential vulnerabilities
  2. The process of identifying, assessing, and prioritizing risks to an organization's assets.
  3. A set of rules or guidelines that define the acceptable use and security measures within an organization.
  4. A process of thorough examination and analysis to ensure information security compliance
  5. Decoy systems designed to attract and detect unauthorized access attempts.
  6. Secure network for internal communication and collaboration within an organization
Down
  1. The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
  2. A network security device that monitors and controls incoming and outgoing network traffic.
  3. Incorrect identification of a harmless activity or file as malicious.
  4. A firewall that acts as an intermediary between internal network clients and external servers.

10 Clues: Incorrect identification of a harmless activity or file as malicious.Decoy systems designed to attract and detect unauthorized access attempts.Secure network for internal communication and collaboration within an organizationA process of thorough examination and analysis to ensure information security compliance...

Property Law 2024-01-11

Property Law crossword puzzle
Across
  1. the owner of real property, such as a house, building, or land.
  2. an ownership of an estate in land.
  3. a person whose job is to manage the legal process of moving land or property from one owner to another
  4. The person who transfers property by sale.
Down
  1. to obtain by paying money or giving other valuable consideration.
  2. structures and land that make up a parcel of property.
  3. A type of security interest in which a lender takes possession of personal property as security for an obligation.
  4. One who makes surveys of land
  5. the transfer of an interest in land as security for a loan or other obligation.
  6. the right to use the real property of another for a specific purpose.

10 Clues: One who makes surveys of landan ownership of an estate in land.The person who transfers property by sale.structures and land that make up a parcel of property.the owner of real property, such as a house, building, or land.to obtain by paying money or giving other valuable consideration....

CSE 167 2022-11-16

CSE 167 crossword puzzle
Across
  1. copies of data that can be used to replace the original
  2. is a method of gaining unauthorized access to a network or computer system
  3. The use of multiple layers of security techniques to help rescue the chance of successful attacks
  4. in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
  1. allows you to encrypt and sign your data and communications
  2. An attack that tricks people in believing they are someone else
  3. Confidentiality,Integrity,Availability
  4. Study of techniques for secure communication in the presenter of third parties
  5. Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
  6. attack that involves trying all possible private keys

10 Clues: Confidentiality,Integrity,Availabilityattack that involves trying all possible private keyscopies of data that can be used to replace the originalallows you to encrypt and sign your data and communicationsAn attack that tricks people in believing they are someone elseis a method of gaining unauthorized access to a network or computer system...

Domestic & International Airports 2019-02-12

Domestic & International Airports crossword puzzle
Across
  1. what country has the most airports in the world - 14,858
  2. where is the worlds widest paved runway at 105m wide
  3. wireless internet access
  4. what do you carry and store your clothing in
  5. where you do you go for prayer
  6. travelling within the country you are in
  7. company located in check in area used to protect luggage
  8. ... exchange
  9. area before departing, accessible to the public
  10. international air transport association
  11. three letter code for new plymouth
  12. where is the longest runway in the world at 5500m long
Down
  1. where is the worlds busiest airport
  2. where is the largest airport in new zealand
  3. area where you go through security and hand over passport
  4. three letter code for blenheim
  5. travelling destination to a different country
  6. where does you luggage come off when entering the flight
  7. three letter code for auckland
  8. where is the worlds oldest airport
  9. where do you go for an injury
  10. abbreviation for aviation security service

22 Clues: ... exchangewireless internet accesswhere do you go for an injurythree letter code for blenheimwhere you do you go for prayerthree letter code for aucklandwhere is the worlds oldest airportthree letter code for new plymouthwhere is the worlds busiest airportinternational air transport associationtravelling within the country you are in...

Infosec Crossword Puzzle Contest 2019-08-29

Infosec Crossword Puzzle Contest crossword puzzle
Across
  1. Malware which presents unwanted advertisements
  2. ___________ is stimuli that has meaning in some context for its receiver
  3. Virtual _________ Network
  4. Successfully exploiting vulnerability is known as
  5. Microsoft Office is an _______ software
  6. Threat X Vulnerability
  7. Technology designed to keep the bad guys out
  8. A terminal emulator / serial console that support SSH
Down
  1. A Software products which provide real-time analysis of security alerts by network hardware and application
  2. Bypassing system’s customary security mechanism
  3. Unplanned disruption or failure of a feature or service
  4. A Weakness in a system
  5. Confidentiality,___________,Availability
  6. The refusal of something requested or desired.
  7. A fraudulent social engineering attempt to obtain sensitive information
  8. Should not be shared / kept open to anyone
  9. Application of investigative analysis on a computer
  10. _______ makes password / passphrase more secure
  11. Malicious software that replicates while moving across information systems
  12. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication

20 Clues: A Weakness in a systemThreat X VulnerabilityVirtual _________ NetworkMicrosoft Office is an _______ softwareConfidentiality,___________,AvailabilityShould not be shared / kept open to anyoneTechnology designed to keep the bad guys outMalware which presents unwanted advertisementsThe refusal of something requested or desired....

IR Basic Terms 2020-09-21

IR Basic Terms crossword puzzle
Across
  1. Promote human welfare
  2. International restriction on small arms
  3. someone fleeing their country
  4. Intervening to solve a dispute
  5. Very powerful and influential nation
  6. managing international relations
  7. A supreme ruler
  8. A penalty for disobeying a law
  9. unlawful use of violence
  10. A temporary suspension in fighting
  11. most basic level of activity
  12. To take things as they are
  13. cooperation of countries to strengthen each of their security
  14. Alliance for combined action
  15. Rules accepted between nations
  16. Less developed industrial base
Down
  1. Agreed on by three or more parties
  2. States may secure their survival
  3. Basic structures and facilities
  4. Weapons capable of widespread death
  5. Philosophy based on liberty
  6. seizure of power
  7. irregular fighting
  8. Mechanical objects are combined into mobile form
  9. a soft boggy area
  10. A decision to do or not do something
  11. Violation of the laws of war

27 Clues: A supreme rulerseizure of powera soft boggy areairregular fightingPromote human welfareunlawful use of violenceTo take things as they arePhilosophy based on libertymost basic level of activityAlliance for combined actionViolation of the laws of warsomeone fleeing their countryIntervening to solve a disputeA penalty for disobeying a law...

Ch. 10 Terminology by Taryn Watford 2014-10-22

Ch. 10 Terminology by Taryn Watford crossword puzzle
Across
  1. deceptive emails or websites to lure personal information
  2. Electronic trespassing and vandalism
  3. Obtaining information illegally often to use people’s credit cards
  4. use of technology as tools to help law enforcement
  5. Malicious network made of bots
  6. any crime committed through the use of computer technology
  7. stealing passwords online through deception
  8. malicious software that spreads through programs
  9. gate that protects internal network from unatuthorized access
  10. malicious software, like viruses or worms
Down
  1. Restrictions for producing publications
  2. Protection through encoding
  3. process of saving data
  4. protecting computer systems form unauthorized and unwanted access
  5. A form of software sabotage that uses computer hosts to reproduce itself
  6. Designed to search for viruses, notify users and then remove viruses
  7. Use of internet or other electronic means to harass an individual
  8. Software robots that collect information on the web
  9. Common security tool used to restrict access
  10. Technology that collects information without user’s consent

20 Clues: process of saving dataProtection through encodingMalicious network made of botsElectronic trespassing and vandalismRestrictions for producing publicationsmalicious software, like viruses or wormsstealing passwords online through deceptionCommon security tool used to restrict accessmalicious software that spreads through programs...

TAAI Weeks 1-4 2018-02-27

TAAI Weeks 1-4 crossword puzzle
Across
  1. What id the airport code for Auckland?
  2. This Nationality Belongs to New Zealand Planes
  3. What is Air New Zealand's hub city?
  4. What company is Airline is MH?
  5. What is ATC?
  6. What is a planes pitch called?
  7. What is the safe movement area between Runway and Apron?
  8. You have to pass security to get here
  9. Where is Cathay Airlines Hub?
  10. What is the Abbreviation for Full Cost Carrier
Down
  1. You check-in here
  2. What is company airline is SQ?
  3. What is KLM's 2 letter code?
  4. Who is in charge of search and rescue in New Zealand waters?
  5. What is the hub country Emirates?
  6. What is the Abbreviation for Low Cost Carrier?
  7. Who is in charge of World Wide Aviation Security?
  8. What is the name of the movement for moving a plane left and right?
  9. What company is CAA's appointed NZ ATC Company?
  10. Alliance Which Airline alliance has 27 Airlines signed?
  11. How many Countries does Virgin have hubs in?

21 Clues: What is ATC?You check-in hereWhat is KLM's 2 letter code?Where is Cathay Airlines Hub?What is company airline is SQ?What company is Airline is MH?What is a planes pitch called?What is the hub country Emirates?What is Air New Zealand's hub city?You have to pass security to get hereWhat id the airport code for Auckland?...

Tech crossword. 2024-04-03

Tech crossword. crossword puzzle
Across
  1. Set of instructions.
  2. Security loop hole.
  3. The computer programs.
  4. Small computer/tech.
  5. Information sharing.
  6. Network security.
  7. AI.
  8. Yet another markup language.
  9. Device for prosesing data.
  10. Main operating system of a computer.
  11. The inner parts of a computer.
  12. Cross-site scripting.
  13. Language for websites.
  14. Universal Serial Bus.
  15. Online protection.
  16. Development of a computer.
Down
  1. Mashines following a set a rules/code to work/move.
  2. Biological measurements .
  3. Melting plastic in a mashine to from shapes given to it by a computer.
  4. A way to communicate to the computer.
  5. A procedure or rules that should be carried out if need be.
  6. Larger storage unit.
  7. Person to computer interaction.
  8. Unit of storage for a computer.
  9. The main system software.
  10. Secure communication.
  11. Online storage.
  12. Headset for video game usage, or surgary.
  13. A place for online storage.
  14. Wireless Fidelity.

30 Clues: AI.Online storage.Network security.Wireless Fidelity.Online protection.Security loop hole.Set of instructions.Larger storage unit.Small computer/tech.Information sharing.Secure communication.Cross-site scripting.Universal Serial Bus.The computer programs.Language for websites.Biological measurements .The main system software....

el viaje 2024-05-06

el viaje crossword puzzle
Across
  1. to stay
  2. to pack
  3. cruise (ship)
  4. jungle
  5. to take off
  6. accident
  7. security measures
  8. low season
  9. front desk
  10. to miss the flight
  11. included
  12. ruins
  13. high season
  14. port
  15. recommendable; advisable
  16. to reserve
  17. to reduce speed
  18. single room
  19. notice; warning
  20. excursion; tour
  21. campground
  22. to cancel
  23. adventure
  24. safety; security
  25. traffic jam
  26. to visit; to go around
  27. to return
  28. waves
  29. to sail
  30. itinerary
  31. on board
  32. to fasten the seatbelt
  33. to land
Down
  1. to stay (to lodge)
  2. compass
  3. de aduanas customs agent
  4. adventurer
  5. round-trip ticket
  6. high quality
  7. tourism
  8. traveler
  9. boarding card
  10. tour guide
  11. to unfasten the seatbelt
  12. destination
  13. delayed
  14. scuba diving
  15. to take a vacation
  16. room service
  17. to be full
  18. seatbelt
  19. expired
  20. to take a trip
  21. to change (planes/trains)
  22. insurance
  23. valid
  24. hostel
  25. passport
  26. border
  27. arrival
  28. island

61 Clues: portruinsvalidwavesjunglehostelborderislandto staycompassto packtourismdelayedexpiredarrivalto sailto landaccidenttravelerincludedseatbeltpassporton boardinsuranceto canceladventureto returnitineraryadventurerlow seasonfront desktour guideto be fullto reservecampgroundto take offdestinationhigh seasonsingle roomtraffic jamhigh qualityscuba diving...

Online Banking and Mobile Phones 2025-02-06

Online Banking and Mobile Phones crossword puzzle
Across
  1. Personal identification number
  2. Short Message Service
  3. Enables access to the wireless web
  4. the banking used to access financial institutions
  5. The most usual music file format on the web
  6. brick-and-____ banks are banks that don't have physical branches
  7. two-factor ____, the simultaneous use of at least two different devices for better security
  8. security ____ are microchip-based devices that has to be typed by the user
  9. brick-and-____ banks are tradirional banks
  10. ____ authentication is a method of identifying the user of a bang account
Down
  1. ____ banking synonyme of online banking
  2. In the 1990s, 2G mobiles introduced ____ transmission
  3. This allows people to talk without holding the handset
  4. Global System for Mobile
  5. Types of phones that offer a high-speed data transfer capability
  6. A synonym for Mobile
  7. ____ Generation phones started in the 1980s
  8. ____ banking is when you perform banking transactions usually on the internet
  9. Universal Mobile Telecommunications
  10. A type of smart card that contains the user's information
  11. Transaction authorization number

21 Clues: A synonym for MobileShort Message ServiceGlobal System for MobilePersonal identification numberTransaction authorization numberEnables access to the wireless webUniversal Mobile Telecommunications____ banking synonyme of online bankingbrick-and-____ banks are tradirional banksThe most usual music file format on the web...

Investing - Sienna Nowotny 2025-03-25

Investing - Sienna Nowotny crossword puzzle
Across
  1. age to take out minimum from IRA
  2. age to get social security
  3. comes out tax free
  4. social security and medicare tax
  5. strategy investing your money in equal amounts
  6. pools money from large group of investors
  7. meant for short term goals
  8. retirement, survivor, and disability benefits
  9. small cap stocks or foreign exchange stocks
  10. network of exchanges
  11. collection of stocks, bonds, or other assets
  12. unit of ownership in company
Down
  1. holding company owning subsidiaries
  2. retirement managed by employer
  3. willingness to accept loss when investing
  4. large cap stocks or stocks with strong financials
  5. type of mutual fund following a benchmark index
  6. availability of cash or how quickly an asset can be converted to cash
  7. investing all money you have at one time
  8. a loan from the buyer
  9. the amount you can put in IRA per year
  10. CEO of Berkshire Hathaway
  11. government medical health plan
  12. transferring old retirement funds to a new company’s plan
  13. working with company for amount of time

25 Clues: comes out tax freenetwork of exchangesa loan from the buyerCEO of Berkshire Hathawayage to get social securitymeant for short term goalsunit of ownership in companyretirement managed by employergovernment medical health planage to take out minimum from IRAsocial security and medicare taxholding company owning subsidiaries...

Empowering Women: The Impact of the New Deal Puzzle 2025-01-27

Empowering Women: The Impact of the New Deal Puzzle crossword puzzle
Across
  1. Places where women worked during the New Deal era.
  2. Help provided to families through policies like Aid to Dependent Children.
  3. A symbol of women's strength during WWII.
  4. Organizations advocating for better working conditions.
  5. Roles women took on thanks to New Deal advancements.
  6. Employment opportunities created by the New Deal for women.
  7. The president behind the New Deal policies.
  8. Women joined this in large numbers during the New Deal.
  9. The job often associated with Rosie.
  10. Skill-building opportunities offered to women.
Down
  1. Benefits women gained from New Deal policies.
  2. A key goal of New Deal policies for all.
  3. Chances for women to grow and succeed under New Deal programs.
  4. Initiatives like the WPA and CCC.
  5. Payment for work that improved for women during this time.
  6. To give women strength and confidence to succeed.
  7. The fight for fairness and equal rights.
  8. First Lady who championed women’s rights.
  9. Relating to community and societal benefits.
  10. Protection provided through Social Security.

20 Clues: Initiatives like the WPA and CCC.The job often associated with Rosie.A key goal of New Deal policies for all.The fight for fairness and equal rights.A symbol of women's strength during WWII.First Lady who championed women’s rights.The president behind the New Deal policies.Relating to community and societal benefits....

Computer Languages and Browsing Safely 2025-06-03

Computer Languages and Browsing Safely crossword puzzle
Across
  1. : Popular programming language used for mobile and desktop apps.
  2. : Server-side scripting language mainly used in web development.
  3. : Stylesheet language used for designing websites.
  4. : Used to create interactive effects on web pages.
  5. : A security system that controls incoming and outgoing traffic.
  6. : A mix of letters, numbers, and symbols that’s hard to guess.
  7. : Markup language for creating web pages.
  8. : A scam where fake websites or emails try to steal information.
  9. : A browser mode that doesn’t save history or cookies.
Down
  1. : Software that protects your computer from malware.
  2. : Installing new software versions to fix bugs and security issues.
  3. : Extension of C with object-oriented features.
  4. : A block-based language for young learners.
  5. : Harmful software designed to damage or steal data.
  6. : Language used to manage and query databases.
  7. : A general-purpose, low-level programming language.
  8. : Tool that secures your internet connection and protects privacy.
  9. : Apple's language for iOS and macOS development.
  10. : The act of navigating through the internet.
  11. : A high-level programming language often used by beginners.

20 Clues: : Markup language for creating web pages.: A block-based language for young learners.: The act of navigating through the internet.: Language used to manage and query databases.: Extension of C with object-oriented features.: Apple's language for iOS and macOS development.: Stylesheet language used for designing websites....

Crossword Puzzle 2022-10-12

Crossword Puzzle crossword puzzle
Across
  1. right
  2. cause
  3. time
  4. pay
  5. security
  6. period
Down
  1. Day
  2. Herrman
  3. Cammarata
  4. weeks
  5. Human Rights Codes (OHRC)

11 Clues: DaypaytimerightcauseweeksperiodHerrmansecurityCammarataHuman Rights Codes (OHRC)

Society 2025-05-07

Society crossword puzzle
Across
  1. security sosiaaliturva
  2. äänestäminen
  3. Vaalit
  4. Päivähoito
  5. Tasa-arvo
  6. Politiikka
Down
  1. Benefit Lapsilisä
  2. kansalaisuus
  3. Kunnallinen
  4. Yksityinen
  5. Julkinen

11 Clues: VaalitJulkinenTasa-arvoYksityinenPäivähoitoPolitiikkaKunnallinenkansalaisuusäänestäminenBenefit Lapsilisäsecurity sosiaaliturva

EXTREME SPORTS 2021-09-23

EXTREME SPORTS crossword puzzle
Across
  1. rapid descent on vertical walls by sliding down a rope attached to the body
  2. An element used to skydive
  3. slide and twist in a wave standing on a board
  4. It is a risk of practicing some extreme sport
  5. when a bone breaks
  6. is a stretch or tear of the ligaments
  7. consists of jumping from a certain height with a rope
  8. A security element to protect the eyes
Down
  1. security element to illuminate in caves
  2. Climb a mountain
  3. move from one point to another by jumping on buildings
  4. motorcycle circuits with jumps in any space
  5. It consists of parachuting from an airplane
  6. They take off from a mountain, driven by the wind
  7. cross the rivers in a raft with oars

15 Clues: Climb a mountainwhen a bone breaksAn element used to skydivecross the rivers in a raft with oarsis a stretch or tear of the ligamentsA security element to protect the eyessecurity element to illuminate in cavesmotorcycle circuits with jumps in any spaceIt consists of parachuting from an airplaneslide and twist in a wave standing on a board...

The Great Depression 2022-12-01

The Great Depression crossword puzzle
Across
  1. A giant storm that destroyed many farms
  2. For the unemployed
  3. A law made to help out with construction
  4. A group of veterans who want to be paid for working in the army
  5. Gives unemployed people jobs
  6. When jobs are plentiful and the economy expands
  7. A act made to improve nation's highways, rivers and soil while also providing jobs
Down
  1. A agency made to protect security and prevent fraud
  2. When the jobs run low and the economy shrinks
  3. A act made for farmers in means of agriculture
  4. Supervises security
  5. Of the economy by federal spending and job creating
  6. A corp. made for single men who are unemployed
  7. A law made to insure old/disabled people have a healthy life
  8. Of capitalism

15 Clues: Of capitalismFor the unemployedSupervises securityGives unemployed people jobsA giant storm that destroyed many farmsA law made to help out with constructionWhen the jobs run low and the economy shrinksA act made for farmers in means of agricultureA corp. made for single men who are unemployedWhen jobs are plentiful and the economy expands...

COMPUTER LANGUAGE 2025-06-17

COMPUTER LANGUAGE crossword puzzle
Across
  1. type of software protects computers from malicious software
  2. is used in assembly languages(2 words)
  3. network security system that protects networks from unsutharised
  4. of fifth generation computer language
  5. of the high-level language
  6. first instructive computer language
  7. language
Down
  1. of fifty generation computer language(2 word)
  2. kind of language java is
  3. access to computer network security sysem
  4. set of instruction that tells the computer what to do
  5. high level language to low level language and vice versa
  6. storage location of computer memory that stores data
  7. of rules that define structure and formed a programing language
  8. social engineering attack that used to steal user data

15 Clues: languagekind of language java isof the high-level languagefirst instructive computer languageof fifth generation computer languageis used in assembly languages(2 words)access to computer network security sysemof fifty generation computer language(2 word)storage location of computer memory that stores data...

spanish uniut 4 2021-12-14

spanish uniut 4 crossword puzzle
Across
  1. map
  2. i will go
  3. flight
  4. security
  5. airport
  6. tour, trip
Down
  1. i will visit
  2. airplane
  3. al cliente customer service
  4. itenerary
  5. customs
  6. de tren train station
  7. departure
  8. train
  9. de vacaciones to go on vacation

15 Clues: maptrainflightcustomsairportairplanesecurityi will goitenerarydeparturetour, tripi will visitde tren train stational cliente customer servicede vacaciones to go on vacation

unit lesson 4 2023-12-06

unit lesson 4 crossword puzzle
Across
  1. meedoen
  2. thing you have to pay money for
  3. fortnite win
  4. to come back
  5. aanvallen
  6. vlag
  7. officer of the law
Down
  1. beschermen
  2. something a soldier wears
  3. thing that shoots
  4. safety
  5. gevecht
  6. fight
  7. vluchteling
  8. pot

15 Clues: potvlagfightsafetymeedoengevechtaanvallenbeschermenvluchtelingfortnite winto come backthing that shootsofficer of the lawsomething a soldier wearsthing you have to pay money for

People at School 2022-10-14

People at School crossword puzzle
Across
  1. guru
  2. w.c.
  3. petugas keamanan
  4. laboratorium komputer
  5. kepala sekolah
  6. penjaga perpustakaan
Down
  1. petugas kebersihan
  2. kantin
  3. murid
  4. ruang kelas
  5. kantor
  6. tempat parkir

12 Clues: guruw.c.muridkantinkantorruang kelastempat parkirkepala sekolahpetugas keamananpetugas kebersihanpenjaga perpustakaanlaboratorium komputer

Glossa 2019-10-08

Glossa crossword puzzle
Across
  1. yksityissektori
  2. invaliditeetti, pysyvä vamma
  3. security sosiaaliturva
  4. ennaltaehkäisevä hoito
  5. tasa-arvo
Down
  1. syrjäytyminen
  2. isyysloma
  3. turvapaikanhakija
  4. vähemmistö
  5. lähete
  6. tuki, avustus
  7. insurance sairausvakuutus

12 Clues: läheteisyyslomatasa-arvovähemmistösyrjäytyminentuki, avustusyksityissektoriturvapaikanhakijasecurity sosiaaliturvaennaltaehkäisevä hoitoinsurance sairausvakuutusinvaliditeetti, pysyvä vamma

FNAF security breach characters 2022-10-12

FNAF security breach characters crossword puzzle
Across
  1. You need to vent
  2. are you having fun yet?
  3. Hey little guy
  4. Nighty night
  5. I am the best
  6. welcome to freddy fazbears mega pizzaplex
  7. Next molten freddy
  8. You are my superstar
  9. Come on out
Down
  1. take a map
  2. Hello new friend
  3. Wub Wub Wub
  4. Pizza?
  5. Red light Green Light
  6. Bowling
  7. i always come back
  8. Intruder alert

17 Clues: Pizza?Bowlingtake a mapWub Wub WubCome on outNighty nightI am the bestHey little guyIntruder alertHello new friendYou need to venti always come backNext molten freddyYou are my superstarRed light Green Lightare you having fun yet?welcome to freddy fazbears mega pizzaplex

Department of Homeland Security 2015-08-14

Department of Homeland Security crossword puzzle
Across
  1. Secretary of DHS
  2. Number of Child Agencies under DHS
  3. Where to apply if you want to work for DHS
  4. Month DHS was formed
  5. What kind of branch is the Eagle on the DHS seal holding in its left talon?
  6. Two-level terrorism threat advisory scale currently used by DHS
  7. An agency within DHS which regulates and facilitates international trade, collects import duties, and enforces U.S. regulations. Currently, the largest federal law enforcement agency.
  8. An agency within DHS whose primary purpose is to coordinate and respond to natural disasters that occur within the United States and overwhelm the local resources and authorities of where they occur
Down
  1. Color Coded terrorism threat advisory scale that pre-dated the NTAS
  2. The first Secretary of DHS
  3. Number of Core Missions DHS has according to the QHSR
  4. How many arrows is the Eagle holding in its right talon on the DHS seal?
  5. Number of secretaries DHS has had
  6. Campaign set up to combat human trafficking
  7. Secretary of TSA
  8. A branch of the US Armed Forces that operated under DHS during peace time, but can be transferred to the U.S. Department of the Navy by the President at any time, or by Congress during times of war.
  9. An agency within DHS which has two distinct purposes, one of them being the protection of current and former national leaders and their families.

17 Clues: Secretary of DHSSecretary of TSAMonth DHS was formedThe first Secretary of DHSNumber of secretaries DHS has hadNumber of Child Agencies under DHSWhere to apply if you want to work for DHSCampaign set up to combat human traffickingNumber of Core Missions DHS has according to the QHSRTwo-level terrorism threat advisory scale currently used by DHS...

Some important words for the exam 2022-01-25

Some important words for the exam crossword puzzle
Across
  1. saying nasty things to people on the internet is called cyber...
  2. teenagers use social media a lot, so their media ... is high
  3. you cut food with it
  4. a lot of churches have a clock on their ...
  5. a hotdog is a ... in a bread roll
  6. Instagram, Whatsapp, Facebook, Tik-tok are all social ...
  7. you can drink from it
Down
  1. not nice, nit friendly
  2. it's black and you can make a fire with it
  3. people singing together in a group
  4. a legendary creature in fantasy stories
  5. it makes food taste sweet
  6. students carry their books in it
  7. to make somebody angry
  8. calling other people 'dumbass' is bad ...
  9. at the start of the school-year getting up early was hard for me, but now I'm ... to it

16 Clues: you cut food with ityou can drink from itnot nice, nit friendlyto make somebody angryit makes food taste sweetstudents carry their books in ita hotdog is a ... in a bread rollpeople singing together in a groupa legendary creature in fantasy storiescalling other people 'dumbass' is bad ...it's black and you can make a fire with it...

Numbers 2024-09-23

Numbers crossword puzzle
Across
  1. The best way to send messages on the internet is ________ (5).
  2. _________ (5) is a bad software that can harm your computer.
  3. When someone unauthorizedly sneaks in right after you through a secured door is called as _______ (10).
  4. All Ocrolus employees and contractors are required to comply with the provisions of Information Security ______ (6).
  5. Customer data is classified as Highly ___________(12) and only allowed in approved systems.
Down
  1. Event when someone breaks into your computer is called as _______(8).
  2. You can never _____ (5) your password with anyone.
  3. Please forward any potential phishing emails to __________@xxxxxx.com (8).
  4. To report a security incident please e-mail ________@xxxxxx.com (8).
  5. At all times the system should be kept __________ unless it is used by the intended user(6)

10 Clues: You can never _____ (5) your password with anyone._________ (5) is a bad software that can harm your computer.The best way to send messages on the internet is ________ (5).To report a security incident please e-mail ________@xxxxxx.com (8).Event when someone breaks into your computer is called as _______(8)....

Ethical Hacking 2025-02-04

Ethical Hacking crossword puzzle
Across
  1. A method used to prevent unauthorized access, often involves encrypting data.
  2. A set of principles that guide the actions of ethical hackers.
  3. Ethical hackers are supposed to -----like hackers who want to steal confidential data /information
  4. is a practice where security professionals use hacking techniques to test a system's security and identify vulnerabilities
  5. This hacking technique is aimed at taking down a website so that a user cannot access it or deliver their service.
  6. A term for a person who hacks for personal gain or malicious intent
Down
  1. The act of gaining unauthorized access to systems or networks.
  2. One of the Career in Ethical Hacking
  3. Ethical Hacking Tools
  4. The term for hackers who identify and fix security vulnerabilities to protect systems.

10 Clues: Ethical Hacking ToolsOne of the Career in Ethical HackingThe act of gaining unauthorized access to systems or networks.A set of principles that guide the actions of ethical hackers.A term for a person who hacks for personal gain or malicious intentA method used to prevent unauthorized access, often involves encrypting data....

Catching Flights 2024-05-20

Catching Flights crossword puzzle
Across
  1. the number on your ticket/boarding pass for your chair
  2. you go here to get your ticket, sign in
  3. another word for your plane ticket
  4. the numbered section where your flight will leave
  5. the person who flies your plane
  6. the person who serves you on your plane
  7. a guest on the flight
Down
  1. your international identification
  2. after your flight you grab your suitcase or bags here
  3. you might have to pass this security before entering a country
  4. also known as help desk
  5. a flight has made it to the destination
  6. here you have to scan your body and bags
  7. here you trade currency from euros to yen, dollars, etc
  8. a flight leaves from the starting location

15 Clues: a guest on the flightalso known as help deskthe person who flies your planeyour international identificationanother word for your plane ticketyou go here to get your ticket, sign ina flight has made it to the destinationthe person who serves you on your planehere you have to scan your body and bagsa flight leaves from the starting location...

Science Project 2020-11-18

Science Project crossword puzzle
Across
  1. Homework
  2. Solar Power Plants
  3. Doors
Down
  1. Detention
  2. Knowledge
  3. Principal
  4. Generators
  5. Teachers
  6. Buses
  7. Professer
  8. Security Guards

11 Clues: BusesDoorsTeachersHomeworkDetentionKnowledgePrincipalProfesserGeneratorsSecurity GuardsSolar Power Plants

corporate finance 2021-02-05

corporate finance crossword puzzle
Across
  1. basis In preparation of financial statements
  2. An entity created by law
  3. A special form of ownership having a fixed periodic
  4. The purest and most basic form of corporate ownership
  5. The sale of either bonds or stocks to the general public
  6. An entity created by law by two or more people
  7. The chance that actual outcomes may differ from those expected.
  8. The science and art of managing money
  9. The firm’s chief financial manager
  10. The lowest price at which a security is offered for sale
Down
  1. Income earned through the sale of a firm’s goods or services.
  2. A market that establishes correct prices for the securities
  3. A firm’s taxes divided by its taxable income
  4. firm's chief accountant
  5. Long-term debt instrument used by business and government to
  6. The highest price offered to purchase a security
  7. The market in which the buyer and seller are not brought
  8. Groups such as employees
  9. Financial market in which preowned securities
  10. The rate at which additional income is taxed.

20 Clues: firm's chief accountantAn entity created by lawGroups such as employeesThe firm’s chief financial managerThe science and art of managing moneyA firm’s taxes divided by its taxable incomebasis In preparation of financial statementsFinancial market in which preowned securitiesThe rate at which additional income is taxed....

Travel Vocabulary 2020-04-03

Travel Vocabulary crossword puzzle
Across
  1. in the airport
  2. security agent
  3. carry-on baggage
  4. flight
  5. in the train station
  6. to take off (airplane)
  7. boarding pass
  8. safety belt
  9. platform (train)
  10. suitcase
  11. ticket window
  12. on time
  13. arrival
  14. counter (check-in)
  15. seat
  16. event ticket
  17. baggage claim
  18. bunk bed
  19. to give
  20. to turn
  21. to go through security
  22. aisle
  23. controller (train ticket)
  24. first class
  25. to miss (a flight)
  26. to board
  27. passenger
  28. window
  29. sleeping car
  30. trip/travel
  31. connection
Down
  1. luggage
  2. delayed
  3. to get/obtain
  4. to see
  5. ticket (number 2)
  6. to hope
  7. waiting room
  8. departure
  9. ticket
  10. flight attendant
  11. customs
  12. coach (plane)
  13. car wagon/train car
  14. luggage screening
  15. to go straight
  16. international airport
  17. to check luggage/to put on plane
  18. train stop
  19. gate
  20. second class
  21. passport
  22. visa
  23. to land
  24. layover

55 Clues: seatgatevisaaisleflightto seeticketwindowluggagedelayedto hopecustomson timearrivalto giveto turnto landlayoversuitcasebunk bedpassportto boarddeparturepassengertrain stopconnectionsafety beltfirst classtrip/travelwaiting roomevent ticketsecond classsleeping carto get/obtainboarding passticket windowcoach (plane)baggage claimin the airport...

Marvel 2020-05-18

Marvel crossword puzzle
Across
  1. Died saving the people of Asgard
  2. Hates having ears touched
  3. Long time foes of Kree empire(3,7)
  4. Scott Langs cellmate
  5. Helps Howard Stark create SHIELD(5,6)
  6. Nickname of Timothy Dugan
  7. Friend of Thor
  8. Had mind stone in forehead
  9. Scientific sister of Tchalla
  10. Bruce Banners alter ego
  11. Surname of SHIELD agent who helped design Capt America shield
  12. Where Bucky finds sanctuary
  13. King Laufeys son
  14. Assists Thor defeat Hela
  15. Dora Milaje Security chief
  16. Odins oldest child
Down
  1. Dr Erik Selvig joined SHIELD to study this
  2. Maya Hansen created this
  3. Pin up boy of US military(7,7)
  4. Co founder of X-Con security
  5. Queen of Asgard
  6. Surname of Howard Starks business partner
  7. One of Thanos adopted children
  8. Hydra Leader
  9. First name of agent Natasha Romanoff alias at Stark Industries
  10. King of Asgard
  11. Military rank held by Nick Fury
  12. Avenging archer
  13. Librarian of Kamar Taj
  14. Smallest Avenger

30 Clues: Hydra LeaderFriend of ThorKing of AsgardQueen of AsgardAvenging archerSmallest AvengerKing Laufeys sonOdins oldest childScott Langs cellmateLibrarian of Kamar TajBruce Banners alter egoMaya Hansen created thisAssists Thor defeat HelaHates having ears touchedNickname of Timothy DuganHad mind stone in foreheadDora Milaje Security chief...

Compliance and Safety Crossword Puzzle 2024-07-17

Compliance and Safety Crossword Puzzle crossword puzzle
Across
  1. Cannabis is currently defined as a ______________ 1 drug.
  2. Documentation of recurring tasks and procedures
  3. Visual security requirement required in every state
  4. Rules governing marijuana use
  5. The action or fact of adhering to a wish, command, or rule
  6. Type of cannabis license not yet operational
  7. Visual document demonstrating an employees ability to work at that facility or in that state
  8. Unannounced visit from state regulator
Down
  1. Organization overseeing workplace safety laws
  2. An identified shortcoming in meeting compliance standards
  3. Internal controls used to ensure financial, security, and auditing controls
  4. Destruction of court records related to an arrest
  5. Systematic review to ensure compliance
  6. OH NO, its a mislabeled product! What do you do?
  7. The cannabis version of a travel passport
  8. Public official that monitors compliance
  9. Process of obtaining official permission to operate
  10. Consequence for being non-compliant
  11. Specific steps and tools required to perform a task or job
  12. Official connection to an organization
  13. Official approval of operation

21 Clues: Rules governing marijuana useOfficial approval of operationConsequence for being non-compliantSystematic review to ensure complianceOfficial connection to an organizationUnannounced visit from state regulatorPublic official that monitors complianceThe cannabis version of a travel passportType of cannabis license not yet operational...

Travel-Themed Crossword Puzzle Clues 2025-06-11

Travel-Themed Crossword Puzzle Clues crossword puzzle
Across
  1. An available room in a hotel
  2. To leave one’s own country for travel
  3. A person entering a foreign country must go through this
  4. Paper showing details of a booked flight or hotel
  5. The ability to adapt to changes in plans
  6. sports Thrilling, high-risk recreational activities
  7. Something that draws tourists to a place
  8. Unexpected movement of an aircraft caused by air currents
  9. National origin or citizenship
Down
  1. Free of charge
  2. Bathroom on an airplane
  3. Very flavorful, high-quality food
  4. To move from one mode of transportation to another
  5. An item meant to be used once and thrown away
  6. check Security procedure before boarding a flight
  7. A person who assists guests with services at a hotel
  8. A break between connecting flights
  9. desk The desk where guests check in at a hotel
  10. A printed or digital guide showing a trip's schedule
  11. form A document stating items you are bringing through customs
  12. attentdant A person who serves passengers on a plane

21 Clues: Free of chargeBathroom on an airplaneAn available room in a hotelNational origin or citizenshipVery flavorful, high-quality foodA break between connecting flightsTo leave one’s own country for travelThe ability to adapt to changes in plansSomething that draws tourists to a placeAn item meant to be used once and thrown away...

Week 4 2025-09-18

Week 4 crossword puzzle
Across
  1. who is testing the limits of nato
  2. politician that got assassinated
  3. where did the largest sunflower ever grow?
  4. where did the latest school happen?
  5. what country is planning the biggest security operation for trump to visit them
  6. who did Timothy ramsey shoot?
  7. Where is trump cracking down now?
  8. where did a tornado destroy 3 houses and ruin a bunch of property
Down
  1. A whole truck falls into what
  2. after the death of Charlie Kirk politicians are upgrading what?
  3. Charlies shooter has to pass what kind of test
  4. charlie kirks killer
  5. a deal with what country could keep TikTok active in the US
  6. Tensions are rising between the US and who?
  7. Who does Israel keep attacking
  8. what famous person just turned 70
  9. Schools aren't requiring what for kids to go to school
  10. who does trump threaten
  11. Where is the oldest photo booth still active?
  12. deadly strikes against what country's boats carrying narcotics

20 Clues: charlie kirks killerwho does trump threatenA whole truck falls into whatwho did Timothy ramsey shoot?Who does Israel keep attackingpolitician that got assassinatedwho is testing the limits of natowhat famous person just turned 70Where is trump cracking down now?where did the latest school happen?where did the largest sunflower ever grow?...

The thief's motive 2026-02-16

The thief's motive crossword puzzle
Across
  1. person who steals
  2. protection against crime
  3. loud warning sound
  4. person who saw the crime
  5. formal questioning by police
  6. valuable items like necklaces and rings
  7. place where the crime happened
  8. proof you were somewhere else
  9. person the police think committed the crime
  10. piece of information that helps solve a crime
  11. number pad used to unlock a door
  12. police officer who investigates crimes
  13. genetic material used to identify someone
  14. strand found as evidence
  15. information used to solve a crime
  16. security cameras that record video
Down
  1. mark left by a finger
  2. people who enforce the law
  3. illegal act
  4. mark left by a shoe
  5. order of events in time
  6. scientific study of crime evidence
  7. person who protects a place
  8. to take a suspect to the police station
  9. strong box for valuables
  10. secret numbers or letters
  11. to get away from danger or police
  12. official description of an event
  13. stealing money or valuables
  14. large planned robbery

30 Clues: illegal actperson who stealsloud warning soundmark left by a shoemark left by a fingerlarge planned robberyorder of events in timeprotection against crimeperson who saw the crimestrong box for valuablesstrand found as evidencesecret numbers or letterspeople who enforce the lawperson who protects a placestealing money or valuables...

Persepolis Rising Crossword 2026-03-05

Persepolis Rising Crossword crossword puzzle
Across
  1. Laconian admiral who took control of the Solar System
  2. Earth-Mars ___
  3. former terrorist, now rehabilitated
  4. daughter of the High Consul
  5. base that was annihilated by the Tempest
  6. president of the Transport Union
  7. rebellious colony that believes in self-governance
  8. Saba's ship
  9. Congress of Worlds representative
  10. aging Martian gunship
  11. what was utilized to blow up the docking bay
  12. first ship that has a magnetic cannon
  13. governor of the Medina
  14. birth of humanity
  15. ship stolen by the resistance
  16. security supervisor, fired by Singh
  17. Holden's lover
Down
  1. Martian goal before the ring-space opened
  2. leader of the resistance
  3. command and control center of ring-space
  4. second security supervisor, stocky
  5. mentor to Drummer
  6. person that betrayed the resistance
  7. High Consul of Laconia
  8. colony that intrudes into ring-space
  9. Holden's favorite drink
  10. "When you fight gods, you storm heaven" (Corey 549).
  11. Voltaire Collective's bomber
  12. pilot of the Rocinante's crew
  13. former elite Martian marine
  14. second Laconia dreadnought
  15. violent but kind enforcer
  16. Transport ___

33 Clues: Saba's shipTransport ___Earth-Mars ___Holden's lovermentor to Drummerbirth of humanityaging Martian gunshipHigh Consul of Laconiagovernor of the MedinaHolden's favorite drinkleader of the resistanceviolent but kind enforcersecond Laconia dreadnoughtdaughter of the High Consulformer elite Martian marineVoltaire Collective's bomber...

RU ITEC411 2025-11-24

RU ITEC411 crossword puzzle
Across
  1. – Unwanted bulk email messages.
  2. – Security system that blocks unauthorized access to a network.
  3. – Legal protection for creative works.
  4. – Deception intended for financial or personal gain.
  5. - Program that attaches to files and spreads when those files are shared.
  6. – (__ of Service) Attack that floods a system with traffic to make it unusable.
  7. – Right to control personal information.
  8. – Process of scrambling data to protect confidentiality.
  9. - Fraudulent emails or websites that trick users into revealing personal information.
Down
  1. – Persistent unwanted monitoring or following online.
  2. – the kind of theft that means stealing personal information to impersonate someone.
  3. – Rules enforced by government to regulate behavior.
  4. – Self-replicating program that spreads independently across networks.
  5. – Harassment or intimidation carried out through digital communication.
  6. – Illegal copying or distribution of software, music, or movies.
  7. – Moral principles guiding responsible technology use.
  8. - Software created to damage, disrupt, or gain unauthorized control of systems.
  9. – Malicious program disguised as legitimate software.
  10. – Measures taken to protect systems and data.
  11. - Person who gains unauthorized access to computer systems.

20 Clues: – Unwanted bulk email messages.– Legal protection for creative works.– Right to control personal information.– Measures taken to protect systems and data.– Rules enforced by government to regulate behavior.– Deception intended for financial or personal gain.– Persistent unwanted monitoring or following online....

LEGAL PUZZLE - GENERAL 2021-06-17

LEGAL PUZZLE - GENERAL crossword puzzle
Across
  1. The process of resolving disputes through Court is termed as ___________
  2. Investigation done to confirm facts/details of a matter under consideration.
  3. Interim remedy available to the bank in case a client's title has not been mortgaged.
  4. Who has the mandate to cancel Mortgage interests on a title after the client having paid off his or her loan?
  5. ________ amount is money borrowed and expected to be paid back with interest
  6. ___________ Property is that which married couples choose to call a home and that which either of the spouses contribute
  7. __________ Declaration: A legal document containing facts from the Mortgagor and his/her spouse on marital status
  8. The action of taking possession of a mortgaged property when the mortgagor fails to keep up their mortgage payments.
  9. _______ letter is given to a client after repaying the loan to cancel FINCA interest off their security.
  10. How many times can you subtract 10 from 100
  11. __________ is a registrable interest on a logbook.
  12. ___________ of Directors.
  13. A legal document used by the bank to register its interest on a land title.
  14. ________ Title is one that is valid for a specified period of time.
Down
  1. How does a spouse show acceptance of a loan and its terms?
  2. A Registered Proprietor on a Leasehold title can only borrow money when the ____________ in the Agreement provide for it.
  3. a situation in which a person is in a position to derive personal benefit from actions or decisions made in their official capacity.
  4. Delegata potestas non potest _________.
  5. ________ Order is used when a minor is the registered proprietor on the security.
  6. Can a Butabika patient take a loan with FINCA while pledging his Kibanja as security?
  7. _________ Secretary is the custodian of the FINCA Seal.
  8. A person that has a duty to repay someone's loan when s/he fails to pay.
  9. _________ is an interest registered on the title.
  10. _______ is done on securities before a loan is processed.
  11. Decisions to borrow by companies are made through _____________.
  12. What do lawyers wear to Court?
  13. ________ is a word used for security used to secure a loan from a bank.
  14. Tax that must have been paid for 2 financial years before the bank's interests can be registered on the commercial vehicle logbook.
  15. The process through which a company seeks to recover delinquent/non-performing loans.

29 Clues: ___________ of Directors.What do lawyers wear to Court?Delegata potestas non potest _________.How many times can you subtract 10 from 100_________ is an interest registered on the title.__________ is a registrable interest on a logbook._________ Secretary is the custodian of the FINCA Seal._______ is done on securities before a loan is processed....

Information Assurance Crossword Puzzle 2023-12-01

Information Assurance Crossword Puzzle crossword puzzle
Across
  1. Many corporate data centers and high-end desktops use purpose-built chipsets. The security reviews and patch releases for these solutions are often not as rigorous as mass-market products, making them easy targets for hackers.
  2. Metrics must be quantifiable, measured in concrete numbers, such as the number of successful phishing attempts or percentage reduction in system downtime.
  3. Metrics should be realistic and attainable within the existing resources and capabilities of the organization, ensuring that data can be collected accurately.
  4. Relates to the underlying technological infrastructure supporting information assurance.
  5. The process of designating information as having a certain level of sensitivity, such as Unclassified, Confidential, Secret, or Top Secret.
  6. IDSs use a combination of signature-based and anomaly-based detection.
  7. The frequency of metric reporting should be timely, aligning with the rate of change expected from the underlying data or the goals they represent. For example, real-time reporting for active security incidents.
Down
  1. IDSs can generate false positives, which are alerts that are triggered by legitimate activity. False positives can be time-consuming and costly to investigate.
  2. Ensures the originator of a message or transaction may not later deny action
  3. Why has the policy been created and how does the company benefit?
  4. A repeatable metric should have a clear and consistent definition, allowing different staff members to gather and report data in the same manner, ensuring uniformity in measurement.
  5. This policy outlines the organization's overall security goals and objectives. It also defines the specific security controls that must be implemented to protect the organization's assets.
  6. Proving the genuineness of facts or documents.
  7. Who is held accountable for the proper implementation of the policy?
  8. Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
  9. Keeping information secret or private.
  10. Ensuring information can be used or obtained when needed.
  11. A statement of who issued the policy and how that person has the authority to define and enforce the policy.
  12. IDSs need to be tuned to the specific environment in which they are deployed. This can be a complex and time-consuming process.
  13. It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity

20 Clues: Keeping information secret or private.Proving the genuineness of facts or documents.Ensuring information can be used or obtained when needed.Why has the policy been created and how does the company benefit?Who is held accountable for the proper implementation of the policy?IDSs use a combination of signature-based and anomaly-based detection....

Information Assurance 2023-12-05

Information Assurance crossword puzzle
Across
  1. Information Assurance involves measures that protect and defend both information and information systems.
  2. Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
  3. ensures that information remains in its original form; information remains true to the creators intent
  4. Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
  5. Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
  6. Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
  7. Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
  8. These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
  9. The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
  1. ensures the disclosure of information only to those persons with authority to see it.
  2. Information Assurance is concerned with safeguarding information from both malicious and accidental threats
  3. Some older hardware may not be able to support newer security software and solutions.
  4. Hardware can take years to develop, and resolving security issues often require more than a quick patch.
  5. Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
  6. It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
  7. Most IoT device and robotics manufacturers don’t have dedicated security experts.
  8. Many corporate data centers and high-end desktops use purpose-built chipsets.
  9. The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
  10. It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
  11. Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.

20 Clues: Many corporate data centers and high-end desktops use purpose-built chipsets.Most IoT device and robotics manufacturers don’t have dedicated security experts.Some older hardware may not be able to support newer security software and solutions.ensures the disclosure of information only to those persons with authority to see it....

15.1 crossword puzzle 2024-05-08

15.1 crossword puzzle crossword puzzle
Across
  1. what EFT stands for; a transfer of money from one bank account to another
  2. to exchange one good or service for another good or service
  3. cards allows customers to pay for purchases directly from their checking accounts
  4. a type of security that pays interest over terms ranging from two to ten years
  5. a document guaranteeing payment of a specific amount of money
  6. a type of security that pays interest over terms of ten to thirty years
  7. the process of transferring money from one individual or organization to another
  8. anything of value that is accepted in return for goods and services
  9. a security that matures in a year or less
  10. a function of money in the economy in which it is a common measure of the worth or price of a good or service
  11. coins or banknotes that must be accepted for all debts
Down
  1. a system by which a government provides money in a country's economy
  2. the concept that the value of a dollar today is worth more than the value of a dollar in the future
  3. a financial investment issued by that government, a corporation, or other oganizations
  4. a function of money in the economy in which it can be saved and used at a later date
  5. paper money and coins
  6. a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
  7. short for The Federal Reserve System
  8. a property of money in which it is able to be divided into smaller units
  9. a property of money in which people are able to carry money
  10. a plastic card that allows the holder to make credit purchases up to an authorized amount
  11. another word for money
  12. comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
  13. any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
  14. a property of money in which it is made of a strong and lasting material
  15. a property of money in which it is authentic money immediately recognizable
  16. a property of money in which it maintains its value over time in order for it to be widely accepted

27 Clues: paper money and coinsanother word for moneyshort for The Federal Reserve Systema security that matures in a year or lesscoins or banknotes that must be accepted for all debtsto exchange one good or service for another good or servicea property of money in which people are able to carry money...

Privacy Act CHC 31 2024-09-12

Privacy Act CHC 31 crossword puzzle
Across
  1. Agencies must not keep health information for too long. They can only keep it for as long as is necessary for any lawful purpose of use.
  2. a word describing the collection of health information by misrepresenting the purpose of collecting the information
  3. blank officer is responsible for ensuring agency complies with the act and work with PCO when it investigates complaints
  4. a person's blank has a full or a degree of access to and control over that person's health information - examples of these are parent / guardian / executor of estate
  5. Health Act blank require all health information held by providers to be retained for 10 years from the last encounter with the patient unless transferred to another doctor or to the patient.
  6. two words describing doctors, nurses, pharmacists, health insurers, hospitals, primary health organisations, ACC and the Ministry of Health
  7. the code allows care practitioners to disclose health information to a blank caregiver
  8. examples of blank information are medical and treatment history or information about donations of organs or blood
  9. blank is a professional method of disposal for printed health information
  10. blank security is the confidentiality agreements with staff and contractors, document tracking and footprinting, staff training
Down
  1. the code requires agencies to reasonable security safeguards to protect the information and prevent blank access
  2. It stipulates that agencies must ensure that personal information is up-to-date, and complete when used
  3. code applies to health information about blank individual
  4. health agencies can disclose information if this is necessary to prevent or lessen a blank threat to public health or public safety
  5. a key concept wherein health agencies need to let patients know how their information is going to be used and disclosed so the patients can make decisions about whether to provide it.
  6. two words meaning when someone who should not have access to personal information sees it, intentionally or by accident
  7. blank security is the use of technology and virtual media like email, laptops and portable storage devices, passwords
  8. blank security is the entry controls, positioning of whiteboards and computer terminals, locked filing cabinets and storage rooms
  9. Health Act regulations require all health information to be retained for blank years from the last encounter unless patient is transferred.
  10. collection of health information or data should be for a blank purpose

20 Clues: code applies to health information about blank individualcollection of health information or data should be for a blank purposeblank is a professional method of disposal for printed health informationthe code allows care practitioners to disclose health information to a blank caregiver...

Chapter 2 Crosswords 2025-11-14

Chapter 2 Crosswords crossword puzzle
Across
  1. A financial investment issued by a corporation, government, or other organization
  2. ___ institution - a financial institution that accepts money from customers and deposits into the customers account
  3. ____ system - the mechanism a nation uses to provide and manage money for itself
  4. People who lend money to the business in return for a contracted rate of interest or return for their investment.
  5. ___ order - you buy or sell when the stock reaches a certain price
  6. ___ bill - a security that matures in a year or less
  7. Establishes and enforces regulations which protect the investors from unfair practices in the security market
  8. ___ order - buying or selling a certain amount of shares of the stock at the best current available price and you assume your order will be executed as soon as possible
  9. a nonprofit financial institution
  10. ____ policy - action taken to manage supply of money and interest rates
  11. Stockbrokers earn their salaries from _______ based sales
  12. people who buy shares of stock in the company
  13. Pooled group of securities that track performance
  14. An equity instrument carrying ownership interest
  15. ___ capital market - selling stocks and bonds directly to public investors
  16. Pooled investment vehicle (Long & Short). Invest in a spectrum of assets typically with a sector focus
Down
  1. ____ capital market - stockholders buy and sell shares of stock from another with the help of brokers
  2. ___ analysis - an analysis of the company's stock, its price, price movement, trading volume, etc.
  3. Money for real estate, equipment, and so on
  4. ___ fund- A kind of mutual fund that invests in highly liquid, near-term instruments
  5. ___ order - you order to buy or sell an order at a specific price changes to a market order when the specific price is reached
  6. ___ bank - a financial institution that provides services for businesses
  7. ___ analysis - an analysis of the company itself, its operations, its position within its industry
  8. a sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
  9. National associations security dealers automated quotes
  10. ___ fund - pooled group of securities that track performance of indices benchmarks
  11. someone who assists you with purchasing stocks and bonds
  12. ___ accounts - investors who use their own money to purchase securities
  13. money Online banking allows ____
  14. ___ accounts - investors who borrow money to purchase securities
  15. A debt instrument with a promise to pay back the money with interest

31 Clues: money Online banking allows ____a nonprofit financial institutionMoney for real estate, equipment, and so onpeople who buy shares of stock in the companyAn equity instrument carrying ownership interestPooled group of securities that track performance___ bill - a security that matures in a year or less...

Chapter 2 Crossword 2025-11-17

Chapter 2 Crossword crossword puzzle
Across
  1. someone who assists you with purchasing stocks and bonds.
  2. People who lend money to the business in return for a contracted rate of intrest
  3. Limited liability for shareholders
  4. Your order to buy or sell an order at a specific price changes to a market order when the specific price is reached.
  5. A mechanism a nation uses to provide and manage money for itself
  6. Is the official currency
  7. Shares can be traded openly
  8. You want to buy or selll a certain number of shares of stock aat the best current available price and you assume your order will be executed as soon as possible.
  9. A document guarenteeing payment of a specific amount of money
  10. Money is deposited directly into a customer's checking account
  11. Is a written order for the bank to pay a specific amount to the person or organization to which the check is written
  12. People who buy shares of stock in the company
  13. Generally fixed, like debt; based on the par value
  14. Vast majority of U.S. corporations are private
Down
  1. Is a document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
  2. is a financial investment issued by a corporation, government, or other organization
  3. Is a security that matures in a year or less
  4. Is a bank account that allows the account owner to make deposits
  5. Is anything of value that is accepted in return for goods and services
  6. You want to buy or sell when the stock reaches a certain price.
  7. Money for real estate equipment,and so on
  8. Help keep the federal government operating.
  9. Describe the relationship between risk and return
  10. Those people who do the work.
  11. Is a security that pays interest over terms of ten to thirty years
  12. Is a prearranged amount of credt that is available for a business to use as needed
  13. allow customers to pay for purchases and withdraw cash
  14. the final document that discloses financial information about the company.
  15. is a security that pays interest over terms ranging from two to ten years
  16. is a bank account used by depositors to accumulate money for future use

30 Clues: Is the official currencyShares can be traded openlyThose people who do the work.Limited liability for shareholdersMoney for real estate equipment,and so onHelp keep the federal government operating.Is a security that matures in a year or lessPeople who buy shares of stock in the companyVast majority of U.S. corporations are private...

career 2023-09-29

career crossword puzzle
Across
  1. A form of security for one and another's self
  2. Person who keeps people following the law
  3. A job that takes years to do
  4. Unexpected situation that needed for action
  5. person who keeps people from fire
Down
  1. Causes burns and makes things charred
  2. in a state of safety and away from harm
  3. A system of rules that should be followed in the government
  4. keeping others away from harm and danger
  5. Doing things are ok with the law
  6. helping or doing work for others

11 Clues: A job that takes years to doDoing things are ok with the lawhelping or doing work for othersperson who keeps people from fireCauses burns and makes things charredin a state of safety and away from harmkeeping others away from harm and dangerPerson who keeps people following the lawUnexpected situation that needed for action...

DINES 2020-05-23

DINES crossword puzzle
Across
  1. menagerie
  2. type of fruit
  3. belly button
  4. large spider
  5. currency unit
Down
  1. twelve
  2. majestic
  3. place a bet
  4. fastener
  5. notion
  6. female relative
  7. bird of prey
  8. security device

13 Clues: twelvenotionmajesticfastenermenagerieplace a betbelly buttonbird of preylarge spidertype of fruitcurrency unitfemale relativesecurity device

Social Security & Medicare 2022-09-13

Social Security & Medicare crossword puzzle
Across
  1. a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
  2. the amount of income subject to Social Security tax
  3. provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
  4. when someone uses your personal information to open accounts, file taxes, or make purchases under your name
Down
  1. a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
  2. both Social Security tax and Medicare tax
  3. Federal Insurance Contributions Act
  4. the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65

8 Clues: Federal Insurance Contributions Actboth Social Security tax and Medicare taxthe amount of income subject to Social Security taxwhen someone uses your personal information to open accounts, file taxes, or make purchases under your name...

InternetPuzzle 2016-02-17

InternetPuzzle crossword puzzle
Across
  1. server that automatically provides an IP address.
  2. Modem config without NAT.
  3. what is before the .com but after the @ symbol?
  4. Network Address Translation.
  5. Non changing IP Address.
  6. A free service with NPP for email and web.
  7. network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
  8. A tool you use to help guide your calls.
  9. A Type of Cord that hooks direct from the modem to customers device.
  10. Changing IP Address.
  11. Internet without wires.
Down
  1. The Program the customer goes to set up a Domain Name.
  2. The owner of a Domain name.
  3. Controls how the modem functions.
  4. Redirects a communication request from one address to a Port.
  5. Translates an IP address to a domain name.
  6. Internet program you use to surf the internet.
  7. a hardware device that has multiple Ethernet ports.
  8. A networking device that perform the "traffic directing" functions on the Internet.
  9. Internet output device.
  10. This controls your domain name's website and email settings.

21 Clues: Changing IP Address.Internet output device.Internet without wires.Non changing IP Address.Modem config without NAT.The owner of a Domain name.Network Address Translation.Controls how the modem functions.A tool you use to help guide your calls.Translates an IP address to a domain name.A free service with NPP for email and web....

Vriendjes van de dag 2013-10-27

Vriendjes van de dag crossword puzzle
Across
  1. kapitein
  2. landbouwwerktuig
  3. bemanning
  4. dekwash slang
  5. uitstulping van de boeg
  6. vrouw van jorg
  7. dop op waaier
  8. scheepshoorn
  9. plaats aan boord
  10. vloedgolf
  11. plaats in Singapore
  12. navigatiemiddel
  13. tandenbalk
  14. plaatsbepalingssysteem
  15. logboek
  16. Hi-Fog
  17. onderwater schone
  18. lable printer
  19. meetinstrument
  20. under water pump
  21. beunoverloop
  22. implosie
  23. zeehond
  24. windzijde
  25. PMS
  26. uitvinder van de windschaal
  27. hospitaal
  28. venster
  29. eva
  30. eigenaar
  31. plastificeren
  32. zee rover
  33. emmer
  34. verstuiver
  35. duizend kilo
Down
  1. electronische kaart
  2. latwerk
  3. spie
  4. luchttol
  5. onderwaterblok/zuigbuis
  6. safe working load
  7. spoelwater
  8. rood
  9. lock out tag out
  10. schuurborstel
  11. mannelijk vertier
  12. Ship security officer
  13. dekkraan
  14. verrekijker
  15. MLC
  16. keuken
  17. communicatie middel dat niet werkt
  18. Callsign
  19. gereedschap
  20. bootje
  21. stuurboord
  22. afsluiter
  23. slaapkamer
  24. hijswerktuig
  25. topdek
  26. stuk
  27. kluis
  28. kompasfout
  29. declaration of security
  30. vloeibaar lekkers
  31. pressureliner
  32. schrijfvloeistof
  33. meertouw
  34. stuur
  35. hijswerktuig

70 Clues: MLCPMSevaspieroodstukkluisstuuremmerkeukenHi-FogbootjetopdeklatwerklogboekzeehondvensterkapiteinluchttoldekkraanCallsignimplosieeigenaarmeertouwbemanningvloedgolfafsluiterwindzijdehospitaalzee roverspoelwatertandenbalkstuurboordslaapkamerkompasfoutverstuiververrekijkergereedschapscheepshoornbeunoverloophijswerktuighijswerktuigduizend kilo...

corporate finance 2021-02-05

corporate finance crossword puzzle
Across
  1. The firm’s chief financial manager
  2. The chance that actual outcomes may differ from those expected.
  3. A market that establishes correct prices for the securities
  4. The science and art of managing money
  5. An entity created by law
  6. A firm’s taxes divided by its taxable income
  7. The sale of either bonds or stocks to the general public
  8. firm's chief accountant
  9. The highest price offered to purchase a security
  10. Long-term debt instrument used by business and government to
  11. The market in which the buyer and seller are not brought
Down
  1. A special form of ownership having a fixed periodic
  2. Financial market in which preowned securities
  3. The rate at which additional income is taxed.
  4. The lowest price at which a security is offered for sale
  5. An entity created by law by two or more people
  6. Groups such as employees
  7. basis In preparation of financial statements
  8. Income earned through the sale of a firm’s goods or services.
  9. The purest and most basic form of corporate ownership

20 Clues: firm's chief accountantGroups such as employeesAn entity created by lawThe firm’s chief financial managerThe science and art of managing moneybasis In preparation of financial statementsA firm’s taxes divided by its taxable incomeFinancial market in which preowned securitiesThe rate at which additional income is taxed....

RU ITEC411 - Crime and Security 2023-10-17

RU ITEC411 - Crime and Security crossword puzzle
Across
  1. A concealed entry point in communication systems
  2. Enhanced account security using multiple steps(acronym)
  3. This law places restrictive measures on information.
  4. Covert software that gathers user data
  5. Retail corporation affected by a major data breach in 2007.
  6. Legislation protecting intellectual property.
  7. Proving one's identity
  8. A United States federal law that governs unauthorized access to computer systems and data
  9. Deceptive cybersecurity trap for hackers.
  10. Activist use of hacking for social or political causes
  11. This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
  1. False statements harming one's reputation.
  2. False spoken statements harming reputation.
  3. This process transforms information into a coded form to protect it from unauthorized access
  4. Using unique physical features for identification
  5. Malicious software that replicates and infects
  6. system is used in retail to process transactions, record sales, and manage inventory(acronym.
  7. Ethical hacking for security assessment.
  8. Deceptive online tactic to steal personal information
  9. U.S. law for wiretaps and law enforcement access

20 Clues: Proving one's identityCovert software that gathers user dataEthical hacking for security assessment.Deceptive cybersecurity trap for hackers.False statements harming one's reputation.False spoken statements harming reputation.Legislation protecting intellectual property.Malicious software that replicates and infects...

Travel Vocabulary 2020-04-03

Travel Vocabulary crossword puzzle
Across
  1. in the airport
  2. security agent
  3. carry-on baggage
  4. flight
  5. in the train station
  6. to take off (airplane)
  7. boarding pass
  8. safety belt
  9. platform (train)
  10. suitcase
  11. ticket window
  12. on time
  13. arrival
  14. counter (check-in)
  15. seat
  16. event ticket
  17. baggage claim
  18. bunk bed
  19. to give
  20. to turn
  21. to go through security
  22. aisle
  23. controller (train ticket)
  24. first class
  25. to miss (a flight)
  26. to board
  27. passenger
  28. window
  29. sleeping car
  30. trip/travel
  31. connection
Down
  1. luggage
  2. delayed
  3. to get/obtain
  4. to see
  5. ticket (number 2)
  6. to hope
  7. waiting room
  8. departure
  9. ticket
  10. flight attendant
  11. customs
  12. coach (plane)
  13. car wagon/train car
  14. luggage screening
  15. to go straight
  16. international airport
  17. to check luggage/to put on plane
  18. train stop
  19. gate
  20. second class
  21. passport
  22. visa
  23. to land
  24. layover

55 Clues: seatgatevisaaisleflightto seeticketwindowluggagedelayedto hopecustomson timearrivalto giveto turnto landlayoversuitcasebunk bedpassportto boarddeparturepassengertrain stopconnectionsafety beltfirst classtrip/travelwaiting roomevent ticketsecond classsleeping carto get/obtainboarding passticket windowcoach (plane)baggage claimin the airport...

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. nationally reconized financially sound company
  2. a system of recording info
  3. biggest financial fraud in US history
  4. when a large number of people withdraw their deposits
  5. age to start investing
  6. you can only put up to $7,000 per year
  7. president who created social security
  8. measures the proformance of multiple companies
  9. when the market is high
  10. mortgage backed by securities
  11. retirement plan managed by your employer
  12. tells us how big the company is in the stock market
  13. age to collect social security
Down
  1. federal deduction from each paycheck
  2. a virtual currency
  3. you can do this whith your 401k funds to your new company's 401k plan
  4. currencies that are created and backed by the government
  5. example of an investment fund
  6. secured in the possesion or assigned to a person
  7. bought and sold throughout the day
  8. at 67 you can collect this
  9. when the market is low
  10. money saved for a purpose

23 Clues: a virtual currencyage to start investingwhen the market is lowwhen the market is highmoney saved for a purposea system of recording infoat 67 you can collect thisexample of an investment fundmortgage backed by securitiesage to collect social securitybought and sold throughout the dayfederal deduction from each paycheck...

CROSSWORD 2023-08-07

CROSSWORD crossword puzzle
Across
  1. Malicious software.
  2. Distributed, secure ledger.
  3. Malicious software.
  4. Unique biological identifiers.
  5. Internet-based data storage and computing.
  6. Computer providing services to clients.
  7. Computing based on quantum mechanics.
  8. Enhanced reality with computer-generated elements.
  9. Data protection using a code.
  10. Decentralized digital currency.
  11. Single-layer carbon material.
  12. Information and facts.
  13. Name of the first commercial video game ever released
  14. A widely used open-source operating system based on the Linux kernel.
  15. Simulated or computer-generated.
  16. Set of steps to solve a problem.
  17. Manipulating materials at a tiny scale.
Down
  1. of Things Interconnected smart devices.
  2. A cloud computing service offered by Amazon Web Services (AWS) for scalable storage.
  3. Unit of digital storage, 1 billion bytes.
  4. Computer security expert.
  5. Learning AI learning from data.
  6. A popular version control system used by developers to track changes in their codebase.
  7. Unauthorized access to systems.
  8. Mobile device with advanced features.
  9. Simulated intelligence.
  10. Network security barrier.
  11. Global network of connected devices.
  12. Writing code for computers.
  13. Application Programming Interface.

30 Clues: Malicious software.Malicious software.Information and facts.Simulated intelligence.Computer security expert.Network security barrier.Distributed, secure ledger.Writing code for computers.Data protection using a code.Single-layer carbon material.Unique biological identifiers.Learning AI learning from data.Unauthorized access to systems....

Cloud Deployment Crossword Puzzle 2025-03-07

Cloud Deployment Crossword Puzzle crossword puzzle
Across
  1. Storing data in fixed-sized chunks, ideal for databases.
  2. Stores data as objects with metadata.
  3. Software that creates and manages virtual machines.
  4. Organizing data into a hierarchical structure like a local file system.
  5. Moving a powered-off server to a new environment.
  6. Ability to scale resources up or down as needed.
  7. Calculating expenses related to cloud migration and usage.
  8. A software-based simulation of a physical computer.
  9. Adding extra layers of security to logins.
  10. Identifying which applications should be migrated first.
  11. Assigning CPU, memory, and storage dynamically.
  12. Ability to scale resources up or down as needed.
  13. Creating backup copies to prevent data loss.
Down
  1. Part of the workload stays on-premises while others move to the cloud.
  2. Moving a running virtual machine without downtime.
  3. Allowing users to log in once for multiple apps.
  4. Ensuring compliance and safety during migration.
  5. Identity and Access Management in cloud security.
  6. Evaluating current infrastructure before cloud migration.
  7. Assigning permissions based on user roles.
  8. Running applications in isolated environments.
  9. Lifting and shifting applications to the cloud.
  10. Evaluating current infrastructure before migration.
  11. Restricting access for high-privilege accounts.

24 Clues: Stores data as objects with metadata.Assigning permissions based on user roles.Adding extra layers of security to logins.Creating backup copies to prevent data loss.Running applications in isolated environments.Lifting and shifting applications to the cloud.Assigning CPU, memory, and storage dynamically....

THE FAMILY 2025-05-26

THE FAMILY crossword puzzle
Across
  1. : A feeling of great respect and approval.
  2. : The state of begin linked or joined together
  3. : Security is the feeling of being safe and protected.
  4. : a feeling or sorrow or unhappiness
  5. : A sense of being part of something
  6. : A sense of reassurance or relaxation.
  7. : Happiness is a state of feeling joyful and content.
  8. : Confidence in the reliability or honesty of someone or something Sadness
  9. : Confidence in a positive outcome.
  10. : A deep feeling of affection, care, and connection toward someone or something.
Down
  1. The felling of sadness when expectations are not met
  2. : a strong felling of displeasure or hostility.
  3. : Something that makes life easier or less painfull
  4. : A sense of dissatisfaction when things don’t go as planned
  5. : The act of thinking about potential problems
  6. : A sentimental longing for the past
  7. : a felling of admiration for someone or something
  8. : Joy is a feeling of great happiness and delight.
  9. : A felling of thankfulness and appreciation.
  10. : A felling of satisfaction and self respect

20 Clues: : Confidence in a positive outcome.: A sentimental longing for the past: A sense of being part of something: a feeling or sorrow or unhappiness: A sense of reassurance or relaxation.: A feeling of great respect and approval.: The act of thinking about potential problems: The state of begin linked or joined together...

safety and secruity 2025-06-05

safety and secruity crossword puzzle
Across
  1. At the end of an aircraft
  2. reversers At rear of engine
  3. The body of the aircraft located between the two wings
  4. The main building where passengers check in
  5. A person with responsibility to manage the traffic on the ramp
  6. The area of the airport where security checks are conducted
  7. The process of moving an aircraft
  8. Straight and off to each side of the aircraft
  9. Where the aircraft gets serviced
  10. That is at the end of an aircraft
Down
  1. Area where aircraft is packed/loaded and unloaded
  2. Fitted to the wings
  3. A document used to board the plane
  4. Located on the wings closest to the fuselage
  5. The bridge connecting to aircraft and terminal
  6. The area where the public can access an airport terminal
  7. The path aircraft uses to move on the ground
  8. The area where passengers can relax and wait for there flights
  9. The area where the aircraft take off and land
  10. The area where passengers can purchase there duty free goods

20 Clues: Fitted to the wingsAt the end of an aircraftWhere the aircraft gets servicedThe process of moving an aircraftThat is at the end of an aircraftA document used to board the planereversers At rear of engineThe main building where passengers check inLocated on the wings closest to the fuselageThe path aircraft uses to move on the ground...