cyber security Crossword Puzzles

RU ITEC411 – Cyber Ethics and Privacy 2026-03-10

RU ITEC411 – Cyber Ethics and Privacy crossword puzzle
Across
  1. Limited legal use of copyrighted materials
  2. Moving business operations to another country
  3. Legal protection for creators of original works
  4. Identification using unique physical characteristics
  5. Unsolicited mass electronic messages
  6. Small file stored by websites to track users
  7. Redirecting users to fake websites through DNS manipulation
  8. Tool used to hide a user’s identity online
  9. Program that secretly records keystrokes
  10. Spoken defamation
  11. Analyzing data to predict behavior
  12. Security system designed to attract hackers
  13. Written defamation
  14. Equal treatment of internet traffic
Down
  1. Analyzing large datasets to find patterns
  2. Hacking used to promote political or social causes
  3. Converting data into unreadable form for security
  4. Fraudulent messages used to steal personal information
  5. Working remotely using computer networks
  6. Law against unauthorized computer access
  7. Monitoring activity or communications
  8. The right of individuals to control how their personal information is used
  9. Overloading a system with traffic to shut it down
  10. Software designed to damage or infiltrate computers
  11. Technology that controls use of digital content

25 Clues: Spoken defamationWritten defamationAnalyzing data to predict behaviorEqual treatment of internet trafficUnsolicited mass electronic messagesMonitoring activity or communicationsWorking remotely using computer networksLaw against unauthorized computer accessProgram that secretly records keystrokesAnalyzing large datasets to find patterns...

Types of cyber bullying 2023-10-09

Types of cyber bullying crossword puzzle
Across
  1. comments or posts to upset or fight with others
  2. leaving someone out or uninviting them to online groups and conversations
  3. using someone's account to post inappropriate content
  4. boycotting a person's social media to exclude or isolate
Down
  1. sharing private information like gender or sexual identity online
  2. making a fake account to cyber bully someone
  3. spreading info in public posts or DM's to ruin someone's reputation
  4. sharing someone's personal identity online without permission
  5. sending direct insults online

9 Clues: sending direct insults onlinemaking a fake account to cyber bully someonecomments or posts to upset or fight with othersusing someone's account to post inappropriate contentboycotting a person's social media to exclude or isolatesharing someone's personal identity online without permission...

At the airport 2019-04-25

At the airport crossword puzzle
Across
  1. Sitz
  2. Abflug
  3. Ankunft
  4. Sicherheitskontrolle
  5. Gepäckausgabe
  6. abheben
Down
  1. Reisepass
  2. Bordkarte
  3. Abflugschalter
  4. Flugbegleiter
  5. Flugsteig
  6. buchen

12 Clues: SitzAbflugbuchenAnkunftabhebenReisepassBordkarteFlugsteigFlugbegleiterGepäckausgabeAbflugschalterSicherheitskontrolle

🌼🌞Unit🔆🌟11🫥🌝 2023-05-11

🌼🌞Unit🔆🌟11🫥🌝 crossword puzzle
Across
  1. to make sure
  2. silly
  3. a landslide
  4. truth
  5. protection
  6. to cuddle
Down
  1. to plan
  2. choosy
  3. achievable
  4. to order
  5. tangy
  6. an appeal

12 Clues: sillytangytruthchoosyto planto orderan appealto cuddleachievableprotectiona landslideto make sure

🌼🌞Unit🔆🌟11🫥🌝 2023-05-11

🌼🌞Unit🔆🌟11🫥🌝 crossword puzzle
Across
  1. truth
  2. silly
  3. to order
  4. to cuddle
  5. tangy
  6. a landslide
Down
  1. to make sure
  2. protection
  3. an appeal
  4. achievable
  5. choosy
  6. to plan

12 Clues: truthsillytangychoosyto planto orderan appealto cuddleprotectionachievablea landslideto make sure

Crossword 8 2018-11-30

Crossword 8 crossword puzzle
Across
  1. A type of risk response strategy whereby the project team acts to reduce the probability of occurrence or impact of a risk.
  2. The process of comparing two sets of records (usually balances of two accounts) and ensuring that they match at the end of a particular accounting period.
  3. Interest accumulation
  4. Social Security Number
  5. Type of testing to determine how well the system is protected against unauthorized access by internal or external entities.
Down
  1. Adding interest to the principal balance
  2. An authentication process in which the user provides two means of identification.
  3. A process of monitoring specific project results to determine whether they comply with relevant standards.
  4. A unique identifier used in place of the borrower's social security number
  5. A business that collects payments on a loan and performs other administrative tasks associated with maintaining a loan portfolio.
  6. A court order directing that money or property of a third party be seized to satisfy a debt.
  7. Accepting less than full payment.

12 Clues: Interest accumulationSocial Security NumberAccepting less than full payment.Adding interest to the principal balanceA unique identifier used in place of the borrower's social security numberAn authentication process in which the user provides two means of identification....

Security Bytes - March 2024 2024-02-28

Security Bytes - March 2024 crossword puzzle
Across
  1. A person who uses computers to gain unauthorised access to data.
  2. A network device that forwards data packets between computer networks
  3. Security techniques that use biological data for authentication.
  4. An encryption-based Internet security protocol
  5. A number of internet connected devices each of which is running one or more bots
Down
  1. a piece of software designed to update a computer program or its supporting data to fix or improve it.
  2. No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
  3. Software designed to detect and destroy computer viruses
  4. A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
  5. Highlighted policy in march security bytes newsletter
  6. A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
  7. The practice of protecting systems, networks and programs from digital attacks

12 Clues: An encryption-based Internet security protocolHighlighted policy in march security bytes newsletterSoftware designed to detect and destroy computer virusesA person who uses computers to gain unauthorised access to data.Security techniques that use biological data for authentication....

chapter 16 2022-01-18

chapter 16 crossword puzzle
Across
  1. feeling good
  2. safe
  3. on own
  4. clear
  5. change
  6. heavy load
  7. no waste
Down
  1. take care of
  2. fancy
  3. feeling bad
  4. affect
  5. carry out

12 Clues: safefancyclearon ownaffectchangeno wastecarry outheavy loadfeeling badtake care offeeling good

Mixed: Intermediate/Advanced 82 2024-02-08

Mixed: Intermediate/Advanced 82 crossword puzzle
Across
  1. Ballot paper
  2. Taxi stand [__________ de taxis]
  3. Award
  4. Database [3w]
  5. Defendant
  6. Pot
Down
  1. Security check [________ __ seguridad, 2w]
  2. Fan
  3. Inquisition
  4. Drum
  5. Iris
  6. Saucepan

12 Clues: FanPotDrumIrisAwardSaucepanDefendantInquisitionBallot paperDatabase [3w]Taxi stand [__________ de taxis]Security check [________ __ seguridad, 2w]

Social Security Act 2023-11-08

Social Security Act crossword puzzle
Across
  1. 5.old or aging
  2. 3.when an individual completes application for social security benefits
  3. 2.someone who receives social security benefit
Down
  1. 4. someone who is at the age where they do not have a job and receive social security benefits
  2. 1.when you challenge application or benefit by the social security administration
  3. 6.an appeal normally in front of a judge which decides if they are eligible for social security benefits

6 Clues: 5.old or aging2.someone who receives social security benefit3.when an individual completes application for social security benefits1.when you challenge application or benefit by the social security administration4. someone who is at the age where they do not have a job and receive social security benefits...

Cyber Safety Crossword 2013-11-03

Cyber Safety Crossword crossword puzzle
Across
  1. A response to a post
  2. Being mean or harassing a person online
  3. Where you can talk to others online
  4. You use this to get into private things
  5. A software downloaded onto you computer without you knowing
Down
  1. A mail message online
  2. A pretend name to protect others you don't know knowing your real name
  3. A place were cyberbullying happens a lot
  4. A website of your own
  5. An update or message

10 Clues: A response to a postAn update or messageA mail message onlineA website of your ownWhere you can talk to others onlineBeing mean or harassing a person onlineYou use this to get into private thingsA place were cyberbullying happens a lotA software downloaded onto you computer without you knowing...

Cyber Safety Challenge 2024-08-11

Cyber Safety Challenge crossword puzzle
Across
  1. This is a trick that fools you and gets your information. What is it?
  2. Getting a text message asking for your personal information is called what?
  3. This hides in your computer and can mess up your files. What is it?
  4. Receiving a phone call asking for your personal information is called what?
  5. A strong one keeps your accounts safe. What is it?
Down
  1. This type of attack locks your computer and demands money to unlock it.
  2. What should you pay close attention to when checking an email for signs of phishing?
  3. If you see something wrong with your work email or computer, who should you tell?
  4. What part of a website address should you check to see if it's legitimate?
  5. Most cyberattacks start with a mistake made by whom?

10 Clues: A strong one keeps your accounts safe. What is it?Most cyberattacks start with a mistake made by whom?This hides in your computer and can mess up your files. What is it?This is a trick that fools you and gets your information. What is it?This type of attack locks your computer and demands money to unlock it....

Cyber Quiz Practice 2025-08-20

Cyber Quiz Practice crossword puzzle
Across
  1. What is the act of pretending to be someone else online?
  2. Which component is responsible for a robot's movement?
  3. What is the full form of WLAN?
  4. What term describes an incident where sensitive data is accessed or stolen without authorisation?
Down
  1. The process of breaking an image into parts is called?
  2. What is the shortcut key to insert a track change in MS Word?
  3. What is the length of IPv6 address?
  4. Who invented electric motor in 1873?
  5. Which Indian state government has partnered with Google Cloud to launch a digital platform for agriculture using AI and Beacon technology?
  6. What small file stores information about user preferences online?

10 Clues: What is the full form of WLAN?What is the length of IPv6 address?Who invented electric motor in 1873?The process of breaking an image into parts is called?Which component is responsible for a robot's movement?What is the act of pretending to be someone else online?What is the shortcut key to insert a track change in MS Word?...

Mr. Lewin's Computer Security Crossword 2014-10-21

Mr. Lewin's Computer Security Crossword crossword puzzle
Across
  1. A person who intentionally breaks into computer systems illegally, or just somebody who knows a lot about the details of how computers and networks work.
  2. Malicious (bad) software. Any software that is designed to do things that you wouldn't want it to.
  3. A secret phrase or word used to confirm somebody's identity.
  4. A procedure for verifying the identity of a user or machine before giving access to a computer system.
  5. A program that has had its security features removed, or a program designed to remove the security features of another program.
  6. A website or e-mail that pretends to be from someone you trust (like a bank, or a friend) to trick you into revealing your password or other account information.
  7. A program that records all the keys being pressed by a user. Can be used by hackers, but also common in businesses and schools.
  8. Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam.
Down
  1. A program used to track the user's actions or preferences. Usually the goal is to collect information that can be sold to other companies.
  2. A "hole" in a security system, often used to allow remote access to a system. Sometimes these are made by programmers on purpose, but they can also be the result of a virus.
  3. Software that controls what data is allowed to travel between your computer and the outside world.
  4. A program that can copy itself automatically, without requiring direct human action, usually by mass e-mailing itself out to an infected user's contacts.
  5. An attempt to break through a security system designed to protect a computer.
  6. A program that looks like useful software, but hides something bad (usually a virus) inside.
  7. Data that has been modified so that meaninful information looks like random, meaningless 1s and 0s.
  8. A behaviour of a program that the designers did not intend, especially one that causes the program to crash, or creates an opening for hackers.
  9. A program that can copy itself by “infecting” other programs.
  10. A network of computers, infected by a virus that allows them to be remotely controlled by a hacker

18 Clues: A secret phrase or word used to confirm somebody's identity.A program that can copy itself by “infecting” other programs.An attempt to break through a security system designed to protect a computer.Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam....

My Topologies 2022-06-24

My Topologies crossword puzzle
Across
  1. ___________ is hidden software that monitors and collects information about you and your surfing habits.
  2. Within cyber security a weakness that can compromise a system is known as a _______
  3. What tool is used to get through a vulnerability other than the key
  4. In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
  5. A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
  6. the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
  7. involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
  8. ____ _________ is when two or more servers have the same information stored on it
  9. A ________ virus is a program that you are tricked into installing because you thought the application did something useful
  10. another term used to describe Eavesdropping attacks
  11. ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
  1. A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
  2. What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
  3. With a _________________ the hacker uses multiple systems to attack a single target system
  4. the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
  5. type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
  6. _______ is the concept of ensuring that system will continue to function after a disaster.
  7. Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
  8. What is used when an attacker compromises the network or system through social interaction with an individual

19 Clues: another term used to describe Eavesdropping attacksWhat tool is used to get through a vulnerability other than the key____ _________ is when two or more servers have the same information stored on itWithin cyber security a weakness that can compromise a system is known as a _______...

Jasmine Lee 2020-10-16

Jasmine Lee crossword puzzle
Across
  1. Acronym for one of their majors
  2. ___ and cyber operations (their other major)
  3. Family of ambition
Down
  1. DOZ class
  2. Number of people in your big's class

5 Clues: DOZ classFamily of ambitionAcronym for one of their majorsNumber of people in your big's class___ and cyber operations (their other major)

mfec 2022-03-20

mfec crossword puzzle
Across
  1. data security
  2. measuring data
  3. collecting data
  4. database
  5. one of our motto
  6. environmental friendly
  7. what is this event?
  8. a type of crypto
  9. synergy partner
Down
  1. our strategic partner
  2. judgement making
  3. our strategic partner
  4. our strategic partner
  5. collection of investments
  6. necessary
  7. original crypto
  8. our strategic partner
  9. digital currency
  10. trading mechanism
  11. technology related to finance

20 Clues: databasenecessarydata securitymeasuring dataoriginal cryptocollecting datasynergy partnerjudgement makingdigital currencyone of our mottoa type of cryptotrading mechanismwhat is this event?our strategic partnerour strategic partnerour strategic partnerour strategic partnerenvironmental friendlycollection of investmentstechnology related to finance

15.1 crossword puzzle 2024-05-08

15.1 crossword puzzle crossword puzzle
Across
  1. what EFT stands for; a transfer of money from one bank account to another
  2. to exchange one good or service for another good or service
  3. cards allows customers to pay for purchases directly from their checking accounts
  4. a type of security that pays interest over terms ranging from two to ten years
  5. a document guaranteeing payment of a specific amount of money
  6. a type of security that pays interest over terms of ten to thirty years
  7. the process of transferring money from one individual or organization to another
  8. anything of value that is accepted in return for goods and services
  9. a security that matures in a year or less
  10. a function of money in the economy in which it is a common measure of the worth or price of a good or service
  11. coins or banknotes that must be accepted for all debts
Down
  1. a system by which a government provides money in a country's economy
  2. the concept that the value of a dollar today is worth more than the value of a dollar in the future
  3. a financial investment issued by that government, a corporation, or other oganizations
  4. a function of money in the economy in which it can be saved and used at a later date
  5. paper money and coins
  6. a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
  7. short for The Federal Reserve System
  8. a property of money in which it is able to be divided into smaller units
  9. a property of money in which people are able to carry money
  10. a plastic card that allows the holder to make credit purchases up to an authorized amount
  11. another word for money
  12. comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
  13. any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
  14. a property of money in which it is made of a strong and lasting material
  15. a property of money in which it is authentic money immediately recognizable
  16. a property of money in which it maintains its value over time in order for it to be widely accepted

27 Clues: paper money and coinsanother word for moneyshort for The Federal Reserve Systema security that matures in a year or lesscoins or banknotes that must be accepted for all debtsto exchange one good or service for another good or servicea property of money in which people are able to carry money...

CN-120 Linux Server Fundamentals Key Terms Week 1 2023-05-01

CN-120 Linux Server Fundamentals Key Terms Week 1 crossword puzzle
Across
  1. Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered
  2. Programming object that can resolve the truth value of a condition, sch as whether one variable is equal to another
  3. A non-interactive process that runs in the background to support an OS or application function such as Plug-and-play, the print spooler, and DHCP. Also known as daemon
  4. One of several fully functional operating systems and members of the Linux family that run the Linux kernel, GNU software, and additional components. Also known as a Linux distribution
  5. System component providing a command interpreter by which the user can use a kernel interface and operate the OS
  6. A human-readable name that identifies a network host
  7. The fundamental security goal of keeping information and communications private and protecting them from unauthorized access
  8. The fundamental security goal of insuring that computer systems operate continuously and that authorized persons can access data that they need
  9. Security settings that control access to objects including file system items and network resources
  10. The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications
Down
  1. The local administrative account on a Linux system, typically named root
  2. A low-level piece of code responsible for controlling the rest of the operating system
  3. An operating system virtualization deployment containing everything required to run a service, application, or microservice
  4. A reference to a specific location on a file system
  5. The property by which a user is allowed to apply and modify the permissions of a file or directory
  6. Software program that has been executed and is running in system memory
  7. A method of validating a particular entity's or individual's unique credentials
  8. A program that runs in the background without the need for human intervention. Also known as a service
  9. Identifier for a value that can change during program execution
  10. Series of simple or complex commands, parameters, variables, and other components stored in a text file and processed by a shell interpreter
  11. The theoretically indecipherable fixed-length output of the hashing process. Also known as hashed value
  12. Command-line text editor that extends the original vi software

22 Clues: A reference to a specific location on a file systemA human-readable name that identifies a network hostCommand-line text editor that extends the original vi softwareIdentifier for a value that can change during program executionSoftware program that has been executed and is running in system memory...

CyberCrossWord 2022-05-20

CyberCrossWord crossword puzzle
Across
  1. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  2. Assures that a system performs its intended function in an unimpaired manner
  3. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  4. Preserving authorized information access, or disclosure
  5. The conversion of plaintext data into unintelligible form
  6. A potential security harm to an asset
  7. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  8. An attempt to alter system resources or affect their operation
  9. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  10. Weakness in an information system
  11. Assures that information and programs are changed only in a specified and authorized manner
  12. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  13. A decoy system designed to lure a potential attacker away from critical systems
  14. Assures that systems work promptly and service is not denied to authorized users
  15. Assures that a system performs its intended function in an unimpaired manner
Down
  1. A plastic card that can store and process data
  2. Confidentiality, integrity, and availability
  3. Key A temporary encryption key used between two principals
  4. Function used to protect passwords that are stored in the local database
  5. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
  6. The process of verifying an identity by or for a system
  7. Assures that private information is disclosed to unauthorized individuals
  8. Program that can replicate itself and send copies from computer to computer across network connections
  9. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  10. Guarding against improper information modification or destruction
  11. Attack An attempt to learn or make use of information from the system that does not affect system resources
  12. A program that takes over another computer and it's used to launch attacks
  13. A random value that is concatenated with a password
  14. The output of an encryption algorithm; the encrypted form of a message or data
  15. Code embedded in a program that copies itself and performs unwanted function

30 Clues: Weakness in an information systemA potential security harm to an assetConfidentiality, integrity, and availabilityA plastic card that can store and process dataA random value that is concatenated with a passwordThe process of verifying an identity by or for a systemPreserving authorized information access, or disclosure...

Chapter 6-8 Crossword 2024-03-28

Chapter 6-8 Crossword crossword puzzle
Across
  1. the act of granting a user access to a system resource
  2. extra information that describes data, like location information or author information
  3. measurements of the unique characteristics of an individual
  4. a phishing attack aimed at a high-value individual like a CEO
  5. is the act of a user claiming an identity
  6. the most common form of a breach
  7. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  8. a physical device assigned to a user that can generate a unique code
  9. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  10. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  11. the act of verifying or proving a user's claim to an identity
  12. a type of malware disguised as legitimate software such as a game or a utility application
  13. security principle that ensures information is only modified in an authorized manner
  14. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  15. software that provides protection against computer viruses and many other forms of malware
Down
  1. aspect of a computer that can be used to breach security
  2. a case of unauthorized computer access
  3. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  4. security principle that ensures information is only disclosed or made available to authorized users
  5. security principle that ensures information is accessible by authorized users whenever required
  6. the process of adding geographical identification to a device
  7. any software developed to compromise the confidentiality, integrity, or availability of data
  8. A standardized set of rules for formatting and processing data
  9. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  10. notification sent by an authentication server to a mobile device associated with a user
  11. a protected environment where suspicious files can be run
  12. intelligence derived from publicly available information on an individual or organization
  13. control which users, groups, or services can perform an action on a file
  14. special codes used to decode data
  15. an authentication method that uses only one authentication factor to verify a claimed identity

30 Clues: the most common form of a breachspecial codes used to decode dataa case of unauthorized computer accessis the act of a user claiming an identitythe act of granting a user access to a system resourceaspect of a computer that can be used to breach securitya protected environment where suspicious files can be run...

Payment Card Industry and Security 2024-04-10

Payment Card Industry and Security crossword puzzle
Across
  1. The process of securely storing cardholder data after a transaction has been authorized (11 letters)
  2. Items produced to imitate genuine articles, especially for fraudulent purposes (17 letters)
  3. A document provided by a third-party assessor confirming an organization's compliance with PCI DSS (10 letters)
  4. Dividing networks or systems into distinct sections to enhance security (18 letters)
  5. A practice of restricting access to cardholder data only to those who require it (13 letters)
  6. The practice of regularly updating software and systems to address vulnerabilities and improve security (7 letters)
  7. Type of encryption used to secure cardholder data during transmission over public networks (3 letters)
  8. Systems Mechanisms employed to thwart potential threats or attacks (13 letters)
  9. Established rules or procedures for communication and data exchange (17 letters)
  10. This document outlines security requirements for organizations that handle cardholder information (3 letters)
  11. Illicit practice of capturing payment card data from legitimate transactions (15 letters)
  12. Flaws or weaknesses in systems that can be exploited by attackers (15 letters)
  13. The process of securely destroying or rendering cardholder data unusable (16 letters)
  14. The unique identifier assigned to each credit or debit card transaction (3 letters)
Down
  1. A tool used to detect and prevent unauthorized access by monitoring and analyzing network traffic (17 letters)
  2. Term for a system or process that logs and monitors activities within a network or system (9 letters)
  3. Term for a system that authenticates the identity of users and ensures they have the appropriate permissions (13 letters)
  4. This type of assessment involves a qualified assessor evaluating an organization's compliance with PCI DSS (18 letters)
  5. The process of making cardholder data unreadable using cryptographic methods (10 letters)
  6. Testing This type of testing evaluates systems, networks, and applications for vulnerabilities that could be exploited by attackers (18 letters)
  7. A technique used to verify the identity of an individual based on their physical characteristics, such as fingerprints or iris scans (10 letters)
  8. Established rules or principles governing behavior or actions (16 letters)
  9. Term for security controls that detect and prevent unauthorized access to systems or networks (8 letters)
  10. The act of deliberately tricking a person or system into revealing confidential information (8 letters)
  11. Term for an unauthorized individual gaining access to cardholder data (10 letters)
  12. Wallets Electronic systems for storing and managing payment information securely (12 letters)

26 Clues: Established rules or principles governing behavior or actions (16 letters)Flaws or weaknesses in systems that can be exploited by attackers (15 letters)Established rules or procedures for communication and data exchange (17 letters)Systems Mechanisms employed to thwart potential threats or attacks (13 letters)...

Block 8 Investments 2022-11-21

Block 8 Investments crossword puzzle
Across
  1. account is a bank account used by depositors to accumulate money for future use.
  2. bank is a financial institution that provides services for businesses.
  3. account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
  4. someone who assists you with purchasing stocks and bonds.
  5. bond is a security that pays interest over terms of ten to thirty years.
  6. accounts that need to pay for security purchases within three business days of order.
  7. capital market selling stocks and bonds directly to public investors.
  8. institution is a financial institution that does not accept deposits.
  9. firm is a financial institution that is involved in trading securities in financial markets.
  10. company is a financial institution that makes money by issuing loans; loan company.
  11. is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
  12. deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
  13. note is a security that pays interest over terms ranging from two to ten years.
  14. accounts for sophisticated investors who borrow money to purchase securities.
Down
  1. is a document guaranteeing payment of a specific amount of money; payer named on document.
  2. Transaction Documents that are confirmation statements are issued after the sale of stocks.
  3. are required to apply for Credit cards.
  4. union is a nonprofit financial institution that is privately owned and provides banking services for its members.
  5. the document that discloses financial information about the company and is filed with the SEC.
  6. cards allow customers to pay for purchases and withdraw cash.
  7. system is the mechanism a nation uses to provide and manage money for itself.
  8. capital market stockholders buy and sell shares of stock from one another with the help of brokers.
  9. it is against the law for investors to act on this kind of information.
  10. Corporations where shares can be traded openly.
  11. Federal Reserve System is the _____ bank of united states.
  12. Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
  13. bill is a security that matures in a year or less.
  14. banks are largest category of deposit institution.
  15. is a financial investment issued by a corporation, government, or other organization.
  16. companies are for-profit businesses that sell insurance products.

30 Clues: are required to apply for Credit cards.Corporations where shares can be traded openly.bill is a security that matures in a year or less.banks are largest category of deposit institution.someone who assists you with purchasing stocks and bonds.Federal Reserve System is the _____ bank of united states....

Investment strategies 2022-11-21

Investment strategies crossword puzzle
Across
  1. note is a security that pays interest over terms ranging from two to ten years.
  2. Corporations where shares can be traded openly.
  3. company is a financial institution that makes money by issuing loans; loan company.
  4. is a financial investment issued by a corporation, government, or other organization.
  5. cards allow customers to pay for purchases and withdraw cash.
  6. account is a bank account used by depositors to accumulate money for future use.
  7. accounts for sophisticated investors who borrow money to purchase securities.
  8. it is against the law for investors to act on this kind of information.
  9. bill is a security that matures in a year or less.
  10. is a document guaranteeing payment of a specific amount of money; payer named on document.
  11. bank is a financial institution that provides services for businesses.
  12. is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
  13. Transaction Documents that are confirmation statements are issued after the sale of stocks.
  14. union is a nonprofit financial institution that is privately owned and provides banking services for its members.
  15. capital market selling stocks and bonds directly to public investors.
  16. capital market stockholders buy and sell shares of stock from one another with the help of brokers.
Down
  1. Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
  2. system is the mechanism a nation uses to provide and manage money for itself.
  3. firm is a financial institution that is involved in trading securities in financial markets.
  4. the document that discloses financial information about the company and is filed with the SEC.
  5. bond is a security that pays interest over terms of ten to thirty years.
  6. are required to apply for Credit cards.
  7. deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
  8. companies are for-profit businesses that sell insurance products.
  9. someone who assists you with purchasing stocks and bonds.
  10. Federal Reserve System is the _____ bank of united states.
  11. institution is a financial institution that does not accept deposits.
  12. account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
  13. accounts that need to pay for security purchases within three business days of order.
  14. banks are largest category of deposit institution.

30 Clues: are required to apply for Credit cards.Corporations where shares can be traded openly.bill is a security that matures in a year or less.banks are largest category of deposit institution.someone who assists you with purchasing stocks and bonds.Federal Reserve System is the _____ bank of united states....

A Dog Day Afternoon 2019-03-06

A Dog Day Afternoon crossword puzzle
Across
  1. Ravishing Redhead
  2. Mexican State
  3. Turner's Hooch
  4. The Crime Dog
  5. Firehouse Favorite
  6. Deutschland Herder
  7. Security Guard
  8. Speed King
  9. Peek-a-boo Hairdo
Down
  1. Beethoven Pedigree
  2. Sled Propeller
  3. Yellow Go Getter
  4. Lassie Lineage
  5. PA State Dog
  6. Georgia's Uga
  7. Pampered Pooch
  8. Snoopy is One
  9. Gives Directions

18 Clues: Speed KingPA State DogMexican StateThe Crime DogGeorgia's UgaSnoopy is OneSled PropellerTurner's HoochLassie LineagePampered PoochSecurity GuardYellow Go GetterGives DirectionsRavishing RedheadPeek-a-boo HairdoBeethoven PedigreeFirehouse FavoriteDeutschland Herder

The Egypt Game-2 2021-10-07

The Egypt Game-2 crossword puzzle
Across
  1. with each other
  2. doubt or nervousness
  3. protection
  4. unbelief or sorrow
  5. old or ancient relic
  6. bow or obey
  7. fits or seizures
  8. decode
  9. very loud
Down
  1. trade
  2. visit by ghosts
  3. awkward
  4. Egyptians made paper with the form of grass
  5. helper
  6. annoyed
  7. Egyptian garment, possibly seamless
  8. information
  9. likely

18 Clues: tradehelperlikelydecodeawkwardannoyedvery loudprotectionbow or obeyinformationvisit by ghostswith each otherfits or seizuresunbelief or sorrowdoubt or nervousnessold or ancient relicEgyptian garment, possibly seamlessEgyptians made paper with the form of grass

CIMUN XV 2014-01-20

CIMUN XV crossword puzzle
Across
  1. One of the six main organs of the UN, and is charged with the maintenance of international peace and security.
  2. CIMUN has 20 of these.
  3. Committee that promotes international economic and social cooperation.
  4. The vested power or constitutional right of one country to refuse approval of measures proposed by another country in the Security Council.
  5. One of the six main organs of the UN, and the only one in which all members have equal representation. One of its powers is to oversee the budget of the UN.
  6. You must use this to participate, not your hand.
  7. A means of solving a problem or dealing with a difficult situation.
Down
  1. A title given to the principal administrator of some organizations, most notably the United Nations.
  2. Month when the UN was created.
  3. This organization was replaced by the UN after its failure.
  4. A person who represents a country in a Model UN simulation.
  5. A fundamental aspect to being a good delegate (starts with L).
  6. An official legislative or other assembly whose duty includes maintaining order and security, and is also the Master of Ceremony of CIMUN.
  7. CIMUN has 4 of these and are the most important part of this event.

14 Clues: CIMUN has 20 of these.Month when the UN was created.You must use this to participate, not your hand.This organization was replaced by the UN after its failure.A person who represents a country in a Model UN simulation.A fundamental aspect to being a good delegate (starts with L).CIMUN has 4 of these and are the most important part of this event....

IFS 2022-07-30

IFS crossword puzzle
Across
  1. An asset but not security
  2. An asset as well as security
  3. Securities provided to the bank in exchange of loan
  4. All financial assets are not _
  5. regulates the stock exchange business
Down
  1. a platform thatfacilitates the exchange of financial assets
  2. An acknowledgement of Debt
  3. resources of a country.
  4. a promise by a borrower to pay a lender their principal and usually interest on a loan.
  5. minimum percentage of cash, gold, and other securities, before lending loans to customers
  6. a system that mobilizes and usefully allocates
  7. a security that represents the ownership of a fraction of the issuing corporation.

12 Clues: resources of a country.An asset but not securityAn acknowledgement of DebtAn asset as well as securityAll financial assets are not _regulates the stock exchange businessa system that mobilizes and usefully allocatesSecurities provided to the bank in exchange of loana platform thatfacilitates the exchange of financial assets...

On line Security 2015-05-05

On line Security crossword puzzle
Across
  1. card/ shopping
  2. google
  3. guard
  4. secret
Down
  1. online
  2. theft/ robber
  3. chatting/ facebook
  4. yum
  5. firefighter
  6. ware/ spy
  7. games

11 Clues: yumguardgamesonlinegooglesecretware/ spyfirefightertheft/ robbercard/ shoppingchatting/ facebook

MI review 2023-05-19

MI review crossword puzzle
Across
  1. Bargaining Agreement
  2. compensation
  3. Procedures
  4. Policy Tort
  5. Pay Rule
Down
  1. Security
  2. contract
  3. Plan
  4. Covenant
  5. compensation
  6. pay
  7. Discharge
  8. at Will

13 Clues: payPlanat WillSecuritycontractCovenantPay RuleDischargeProceduresPolicy TortcompensationcompensationBargaining Agreement

Workplace Violence Prevention 2026-03-11

Workplace Violence Prevention crossword puzzle
Across
  1. statements of intent to harm that must be reported immediately
  2. humiliating jokes or slurs that are unacceptable
  3. following Banner's policies and the code of conduct
  4. stopping incidents before they occur
  5. treating others with dignity and courtesy
  6. department that investigates workplace violence
  7. speaking up about incidents or concerns to HR or security
Down
  1. physical or verbal abuse that is not tolerated at Banner
  2. creating an encouraging and helpful work environment
  3. unwelcome conduct that creates an intimidating or hostile work enviornment
  4. using fear or threats to make someone feel unsafe
  5. an event that requires immediate attention
  6. keeping employees safe from harm
  7. feeling free from danger or harm in the workplace

14 Clues: keeping employees safe from harmstopping incidents before they occurtreating others with dignity and courtesyan event that requires immediate attentiondepartment that investigates workplace violencehumiliating jokes or slurs that are unacceptableusing fear or threats to make someone feel unsafefeeling free from danger or harm in the workplace...

Bullying 2021-06-03

Bullying crossword puzzle
Across
  1. someone who does not ignore if someone is getting bullied
  2. how you should feel online
  3. its a type of bullying online
  4. trail of data you create while using the Internet
  5. a place where you can get cyber bullied
Down
  1. physical or mental suffering by someone
  2. frighten because of someone, especially in order to make them do what one wants.
  3. when someone is pressuring you to do something

8 Clues: how you should feel onlineits a type of bullying onlinephysical or mental suffering by someonea place where you can get cyber bulliedwhen someone is pressuring you to do somethingtrail of data you create while using the Internetsomeone who does not ignore if someone is getting bullied...

E-Safety 2017-10-04

E-Safety crossword puzzle
Across
  1. This should never be given out online
  2. Something which should be changed regularly and kept safe
  3. The internet should be used...
  4. Bullying When Social Media is abused it can lead to
Down
  1. We should avoid talking to these people online
  2. A type of programme that can cause damage to your files
  3. We use this to find out information
  4. Someone who pretends be someone else online

8 Clues: The internet should be used...We use this to find out informationThis should never be given out onlineSomeone who pretends be someone else onlineWe should avoid talking to these people onlineBullying When Social Media is abused it can lead toA type of programme that can cause damage to your files...

Presidents 2015-02-13

Presidents crossword puzzle
Across
  1. created social security
  2. assassinated by Booth
  3. was an inventor
Down
  1. ended debt
  2. father of the nation
  3. assassinated while campaining
  4. created Homeland Security

7 Clues: ended debtwas an inventorfather of the nationassassinated by Boothcreated social securitycreated Homeland Securityassassinated while campaining

travel vocab 2022-11-29

travel vocab crossword puzzle
Across
  1. arrival
  2. bathing suit
  3. suitcase
  4. airport
  5. monitor
  6. to confirm a flight
Down
  1. to check ones luggage
  2. departure
  3. to pack a suitcase
  4. to travel
  5. passport
  6. flight
  7. roundtrip ticket
  8. to go through security

14 Clues: flightarrivalairportmonitorpassportsuitcasedepartureto travelbathing suitroundtrip ticketto pack a suitcaseto confirm a flightto check ones luggageto go through security

social media 2020-03-31

social media crossword puzzle
Across
  1. media platform
  2. unknown people
  3. meeting people
  4. popular media
  5. idols
  6. year old
  7. mass communication
Down
  1. secure
  2. and conditions
  3. another word for talking
  4. humans
  5. no public attention
  6. global computer network
  7. world

14 Clues: worldidolssecurehumansyear oldpopular mediamedia platformand conditionsunknown peoplemeeting peoplemass communicationno public attentionglobal computer networkanother word for talking

A Modest Proposal 2022-04-08

A Modest Proposal crossword puzzle
Across
  1. Security, Guarantee
  2. Disgraceful, Shameful
  3. Garments, Apparel
  4. Injustice, Wrong
  5. Nutriment, Nourishment
  6. Huge, Enormous
  7. Overload, Overfill
  8. Beg, Pester
Down
  1. Accountable, Chargeable
  2. Calculation, Counting
  3. Mockery, Ridicule
  4. Sadness, Sorrow
  5. Gifts, Charity
  6. Basics, Fundamentals

14 Clues: Beg, PesterGifts, CharityHuge, EnormousSadness, SorrowInjustice, WrongMockery, RidiculeGarments, ApparelOverload, OverfillSecurity, GuaranteeBasics, FundamentalsCalculation, CountingDisgraceful, ShamefulNutriment, NourishmentAccountable, Chargeable

Cyber Space Safety 2013-11-03

Cyber Space Safety crossword puzzle
Across
  1. Abuse of technology and the internet
  2. Software that is harmful to your computer by, spreading cookies and making copies of itself
  3. A series of secret letter or numbers that unlock a computer etc.
  4. Internet software on Apple appliances
Down
  1. Mail that is sent using technology and the internet
  2. Using information from the internet and not referencing it in your bibliography
  3. A weblog that is on the internet, often a diary or journal
  4. A harmful software program that erases your computer and gives it problems
  5. An advertisement that often appears on top of another window
  6. Wireless internet on technology

10 Clues: Wireless internet on technologyAbuse of technology and the internetInternet software on Apple appliancesMail that is sent using technology and the internetA weblog that is on the internet, often a diary or journalAn advertisement that often appears on top of another windowA series of secret letter or numbers that unlock a computer etc....

Cyber Bullying feelings 2022-05-10

Cyber Bullying feelings crossword puzzle
Across
  1. When you have no one to talk to
  2. When you feel like something will harm you
  3. Another word for mad
  4. Being scared of something
  5. The feeling like there is no hope
  6. The feeling like you need a break
Down
  1. You feel this way when someone laughs at you
  2. The feeling that you have done something wrong
  3. The opposite of Happy
  4. Feeling very low

10 Clues: Feeling very lowAnother word for madThe opposite of HappyBeing scared of somethingWhen you have no one to talk toThe feeling like there is no hopeThe feeling like you need a breakWhen you feel like something will harm youYou feel this way when someone laughs at youThe feeling that you have done something wrong

Cyber/Digital Literacy 2024-11-06

Cyber/Digital Literacy crossword puzzle
Across
  1. Type of crime that uses computers or networks harm.
  2. It is use protect your personal information
  3. It has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness
  4. Type of malware that can make copies of itself and spread automatically across computers in a network.
  5. typing targeted keywords about a subject into a search engine.
Down
  1. Bullying that takes place online using your smartphone, tablet and computer
  2. Who's actively participate in cyberspace and the online community offered through the internet
  3. An example of computer virus
  4. Refers to the trail of data you leave when using the internet.
  5. Assessing the credibility, reliability, and relevance of the information found online.

10 Clues: An example of computer virusIt is use protect your personal informationType of crime that uses computers or networks harm.Refers to the trail of data you leave when using the internet.typing targeted keywords about a subject into a search engine.Bullying that takes place online using your smartphone, tablet and computer...

Cyber Awareness Week 2025-09-23

Cyber Awareness Week crossword puzzle
Across
  1. When someone manipulates an email that tricks you into doing something against your better judgement
  2. An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
  3. Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
  1. A person who uses uses malicious tactics to gain unauthorised access to systems and data
  2. Harmful computer programs used by hackers to steal information, gain access or lock your device
  3. The address of a webpage (acronym)
  4. Should be long, complex and not contain any personally identifiable information (like your dogs name)
  5. Widely used technology that allows for the wireless connection between a device and a router
  6. Never click on a ___ in an email unless you are sure that it's genuine

10 Clues: The address of a webpage (acronym)Never click on a ___ in an email unless you are sure that it's genuineA person who uses uses malicious tactics to gain unauthorised access to systems and dataWidely used technology that allows for the wireless connection between a device and a router...

FICA Taxes 2024-09-12

FICA Taxes crossword puzzle
Across
  1. the amount of income subject to Social Security tax
  2. both Social Security tax and Medicare tax
  3. a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
  4. a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
Down
  1. provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
  2. the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
  3. when someone uses your personal information to open accounts, file taxes, or make purchases under your name
  4. Federal Insurance Contributions Act

8 Clues: Federal Insurance Contributions Actboth Social Security tax and Medicare taxthe amount of income subject to Social Security taxwhen someone uses your personal information to open accounts, file taxes, or make purchases under your name...

Global Security Culture Program 2025-09-18

Global Security Culture Program crossword puzzle
Across
  1. Zones The main content of the second activity.
  2. levels Security measure distributed based on job role
  3. The process by which all individuals and objects are screened going into and out of the Red Zone. - CICO
Down
  1. Force Open An alarm that will be triggered when someone opens a door without receiving "access granted" (green light)
  2. Zone Security Zone that inside building, out side secured data hallCustomer Data The MOST important asset within our Red Zone data hallBreakaway connector Safety mechanism to prevent choking/strangulation hazard
  3. Zone Security Zone that inside fence line, outside building
  4. Amazon data centers use the what system to securely manage physical keys, which can control access permissions and track key usage history.
  5. Risk Media Bin Keys belongs to which Key Risk Matrix.

8 Clues: Zones The main content of the second activity.Risk Media Bin Keys belongs to which Key Risk Matrix.levels Security measure distributed based on job roleZone Security Zone that inside fence line, outside buildingThe process by which all individuals and objects are screened going into and out of the Red Zone. - CICO...

PT IO.net Crosswords 2024-10-22

PT IO.net Crosswords crossword puzzle
Across
  1. Allows renting computing power for __ tasks.
  2. Individuals or ___ can use the platform to rent resources.
  3. IO Worker offers globally scalable and ___ resources.
  4. Key security feature for monitoring access and performance.
Down
  1. A key task focus for IO Worker (___ Learning).
  2. IO Worker enables individuals to generate ___.
  3. Users can monitor resource ___.
  4. Type of hardware resource rented (___ or CPU).
  5. Maintains full control over rented ___.
  6. A key trait of ___ platforms like IO Worker.

10 Clues: Users can monitor resource ___.Maintains full control over rented ___.Allows renting computing power for __ tasks.A key trait of ___ platforms like IO Worker.A key task focus for IO Worker (___ Learning).IO Worker enables individuals to generate ___.Type of hardware resource rented (___ or CPU).IO Worker offers globally scalable and ___ resources....

CS II Extra Credit Crossword 2025-02-03

CS II Extra Credit Crossword crossword puzzle
Across
  1. An acronym used for the order of operations.
  2. These confirm the identity and authenticity of websites.
  3. These accounts are responsible for security updates.
  4. Backs up everything on your computer.
Down
  1. The data type for whole numbers.
  2. A list that cannot be changed.
  3. The data type for decimal numbers.
  4. These address and fix security vulnerabilities.
  5. A set of agreed upon rules and permissions.
  6. A program that replicates and spreads malicious code.

10 Clues: A list that cannot be changed.The data type for whole numbers.The data type for decimal numbers.Backs up everything on your computer.A set of agreed upon rules and permissions.An acronym used for the order of operations.These address and fix security vulnerabilities.These accounts are responsible for security updates....

Olive Kitteridge 2026-03-23

Olive Kitteridge crossword puzzle
Across
  1. the security in Suzanne Roussous relationship with her boyfriend.
  2. One of Olives internal conflicts
  3. Symbolizes a closed off and guarded lifestyle
  4. A word to describe Olive
Down
  1. Title of the chapter, representing a desire for control
  2. Central character, blunt and emotionally distant
  3. Represents the next generation, emotionally distant from Olive.
  4. Olive’s husband, gentle and kind, seeking reassurance
  5. Major theme, explored through Olive’s emotional distance
  6. Where the chapter is set

10 Clues: A word to describe OliveWhere the chapter is setOne of Olives internal conflictsSymbolizes a closed off and guarded lifestyleCentral character, blunt and emotionally distantOlive’s husband, gentle and kind, seeking reassuranceTitle of the chapter, representing a desire for controlMajor theme, explored through Olive’s emotional distance...

daves crossworde puzzle is better then yours (lottie) 2021-11-03

daves crossworde puzzle is better then yours (lottie) crossword puzzle
Across
  1. what electronic you are using right now
  2. comes beofre the word safety
  3. opposite of danger ig
Down
  1. people who hack into computers
  2. a secret code you set

5 Clues: a secret code you setopposite of danger igcomes beofre the word safetypeople who hack into computerswhat electronic you are using right now

word study lesson 2022-03-07

word study lesson crossword puzzle
Across
  1. 3
  2. 1
  3. 4
  4. 2
  5. 5
Down
  1. 9
  2. 10
  3. 8
  4. 6
  5. 7

10 Clues: 93814627510

random 2022-03-10

random crossword puzzle
Across
  1. 7
  2. 1
  3. 8
  4. 3
  5. 6
Down
  1. 5
  2. 10
  3. 9
  4. 2
  5. 4

10 Clues: 75921843610

a million dollars in a mattress 2014-07-21

a million dollars in a mattress crossword puzzle
Across
  1. קנה
  2. מזרן
  3. גילה
  4. ביטחון
  5. בנדיבות
  6. מערכת
Down
  1. שומרים
  2. פרופורציה
  3. החלטה
  4. חסכונות

10 Clues: קנהמזרןגילההחלטהמערכתשומריםביטחוןבנדיבותחסכונותפרופורציה

NASS 2015-07-01

NASS crossword puzzle
Across
  1. A
  2. B
  3. H
  4. C
  5. E
Down
  1. F
  2. J
  3. D
  4. I
  5. G

10 Clues: FJDABHIGCE

Unidad 1 ¡Vamos de viaje! Español 2 2022-09-22

Unidad 1 ¡Vamos de viaje! Español 2 crossword puzzle
Across
  1. arrival
  2. security
  3. flight
  4. ticket
  5. vacations
Down
  1. takeoff
  2. roundtrip
  3. airport
  4. passport
  5. identification

10 Clues: flighttickettakeoffairportarrivalpassportsecurityroundtripvacationsidentification

Weird words 2020-09-29

Weird words crossword puzzle
Across
  1. Manageable
  2. Immediately
  3. Vehicle
  4. Texture
  5. Deserve
  6. Minor
Down
  1. Purposeful
  2. Vision
  3. Security
  4. Vain

10 Clues: VainMinorVisionVehicleTextureDeserveSecurityPurposefulManageableImmediately

Spanish Airport 2022-10-06

Spanish Airport crossword puzzle
Across
  1. stewardess
  2. pilot
  3. escalator
Down
  1. security
  2. luggage
  3. runway
  4. airport
  5. airplane
  6. giftstore
  7. terminal

10 Clues: pilotrunwayluggageairportsecurityairplaneterminalgiftstoreescalatorstewardess

Food defense 2023-05-30

Food defense crossword puzzle
Across
  1. ACCESS
  2. SURVEILLANCE
  3. INTACT
  4. LOCKED
  5. COOLER
  6. ALERT
Down
  1. ROOM
  2. PLANT
  3. INTENTIONAL
  4. REVIEW

10 Clues: ROOMPLANTALERTACCESSREVIEWINTACTLOCKEDCOOLERINTENTIONALSURVEILLANCE

Food defense 2023-05-30

Food defense crossword puzzle
Across
  1. ACCESS
  2. ALERT
  3. SURVEILLANCE
  4. LOCKED
  5. INTACT
  6. COOLER
Down
  1. PLANT
  2. INTENTIONAL
  3. REVIEW
  4. ROOM

10 Clues: ROOMPLANTALERTACCESSREVIEWLOCKEDINTACTCOOLERINTENTIONALSURVEILLANCE

Review Vocab_7/3/2023 2023-07-03

Review Vocab_7/3/2023 crossword puzzle
Across
  1. dirty
  2. future
  3. experiences
  4. education
  5. environment
Down
  1. security
  2. mine
  3. problems
  4. trash
  5. refugee

10 Clues: minedirtytrashfuturerefugeesecurityproblemseducationexperiencesenvironment

g 2024-05-16

g crossword puzzle
Across
  1. consider
  2. General
  3. confirmed
  4. Control
  5. required
Down
  1. agility
  2. leg
  3. administrator
  4. security
  5. prepared

10 Clues: legagilityGeneralControlconsidersecuritypreparedrequiredconfirmedadministrator

My home is my castle 2023-10-09

My home is my castle crossword puzzle
Across
  1. system
  2. tugitoool
  3. kauss
  4. expensive
Down
  1. veekeetja
  2. impractical
  3. uncomfortable
  4. modern
  5. new
  6. cramped

10 Clues: newkausssystemmoderncrampedveekeetjatugitooolexpensiveimpracticaluncomfortable

jdchiu 2024-04-21

jdchiu crossword puzzle
Across
  1. sbdjwehbrf
  2. cnsjhfiwufh
  3. scjewhbfhj
  4. bcsdjfberhf
  5. cjbrdsuhfbrw
  6. cndsbcijwvbh
  7. dnwehf
Down
  1. cbnrugfiwuev
  2. jdsbciruhvbisud
  3. bfchefbvuwjh

10 Clues: dnwehfsbdjwehbrfscjewhbfhjcnsjhfiwufhbcsdjfberhfcbnrugfiwuevcjbrdsuhfbrwbfchefbvuwjhcndsbcijwvbhjdsbciruhvbisud

South Africa _ Unit 3 _ Way in - Crossword 2026-02-12

South Africa _ Unit 3 _ Way in - Crossword crossword puzzle
Across
  1. trennen
  2. Landschaft
  3. Verfassung
Down
  1. Menge
  2. Frieden
  3. Wahl
  4. Sitz
  5. Sicherheit
  6. Löwe
  7. Nashorn

10 Clues: WahlSitzLöweMengeFriedentrennenNashornLandschaftSicherheitVerfassung

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

SAFER INTERNET 2022-04-04

SAFER INTERNET crossword puzzle
Across
  1. du sollst ... für cybermobbing speichern
  2. du kannst Leute online ..., um schlimmeres zu verhindern
  3. eine Person mit der du im fall von cybermobbing reden sollst
Down
  1. ein anderes Wort für cybermobbing
  2. cybermobbing kann zu ... führen
  3. angebe von persönlichen Informationen im internet

6 Clues: cybermobbing kann zu ... führenein anderes Wort für cybermobbingdu sollst ... für cybermobbing speichernangebe von persönlichen Informationen im internetdu kannst Leute online ..., um schlimmeres zu verhinderneine Person mit der du im fall von cybermobbing reden sollst

¡Vamos de viaje! 2022-07-25

¡Vamos de viaje! crossword puzzle
Across
  1. departure
  2. to take a taxi
  3. to check one’s luggage
  4. gate
  5. passenger
  6. flight attendant
  7. Can you please tell me where is?
  8. baggage claim
  9. monitor; screen
  10. to get in line
  11. to board
Down
  1. to go through customs
  2. tourist office
  3. to go through security
  4. flight
  5. bus stop
  6. arrival
  7. airport
  8. train station

19 Clues: gateflightarrivalairportbus stopto boarddeparturepassengertrain stationbaggage claimtourist officeto take a taxito get in linemonitor; screenflight attendantto go through customsto go through securityto check one’s luggageCan you please tell me where is?

A Modest Proposal 2022-04-08

A Modest Proposal crossword puzzle
Across
  1. Nutriment, Nourishment
  2. Huge, Enormous
  3. Sadness, Sorrow
  4. Accountable, Chargeable
  5. Disgraceful, Shameful
  6. Basics, Fundamentals
  7. Overload, Overfill
  8. Injustice, Wrong
Down
  1. Security, Guarantee
  2. Mockery, Ridicule
  3. Calculation, Counting
  4. Garments, Apparel
  5. Beg, Pester
  6. Gifts, Charity

14 Clues: Beg, PesterHuge, EnormousGifts, CharitySadness, SorrowInjustice, WrongMockery, RidiculeGarments, ApparelOverload, OverfillSecurity, GuaranteeBasics, FundamentalsCalculation, CountingDisgraceful, ShamefulNutriment, NourishmentAccountable, Chargeable

Al-Asma Al-Husna 2014-12-28

Al-Asma Al-Husna crossword puzzle
Across
  1. The light
  2. The king
  3. The creator
  4. All loving
  5. The judge
  6. Most merciful
  7. All seeing
Down
  1. The just
  2. Peace, Security
  3. The forgiver
  4. All knowing
  5. The generous
  6. All hearing
  7. The rewarding

14 Clues: The justThe kingThe lightThe judgeAll lovingAll seeingThe creatorAll knowingAll hearingThe forgiverThe generousMost mercifulThe rewardingPeace, Security

Vigilance Awareness Week Crossword challenge - 2023 2023-10-30

Vigilance Awareness Week Crossword challenge - 2023 crossword puzzle
Across
  1. - पारदर्शिता (Paardarshita)
  2. – निवारण (nivaaran)
  3. – सुरक्षा (suraksha)
  4. - नैतिक (Naitik)
  5. – मेहनती (mehanatee)
  6. – प्रवर्तन (Pravartan)
  7. - कांड (Kaand)
  8. - जाँच (Jaanch)
Down
  1. - न्याय (Nyay)
  2. - भ्रष्टाचार (bhrashtachar)
  3. – शिकायत (Shikaayat)
  4. - जवाबदेही (Javabdehi)
  5. - ईमानदारी (Imaandaari)
  6. - नैतिकता (Naitikta)

14 Clues: - न्याय (Nyay)- कांड (Kaand)- जाँच (Jaanch)- नैतिक (Naitik)– निवारण (nivaaran)– शिकायत (Shikaayat)– सुरक्षा (suraksha)– मेहनती (mehanatee)- नैतिकता (Naitikta)- जवाबदेही (Javabdehi)– प्रवर्तन (Pravartan)- ईमानदारी (Imaandaari)- पारदर्शिता (Paardarshita)- भ्रष्टाचार (bhrashtachar)

Izadora elmore 2014-12-10

Izadora elmore crossword puzzle
Across
  1. bully someone that bullies online.
  2. restricted computer network.
  3. RESOURCE LOCATOR (URL) – Full website address.
  4. that damages files on computer that receives it.
  5. renew or revitalize; To reload a webpage on the internet
  6. a system of connected computers that allows the sharing of files
Down
  1. OPERATORS–Using keywords such as AND,OR,NOT in web searches
  2. a list of citations that appear at the end of a paper
  3. network etiquette; Online manners
  4. NETWORKSonline communities where people meet, socialize
  5. a person who secretly gains access to computer files.blog-originally known as Web Log.
  6. TABS the name for a way to display information on websites.

12 Clues: restricted computer network.network etiquette; Online mannersbully someone that bullies online.RESOURCE LOCATOR (URL) – Full website address.that damages files on computer that receives it.a list of citations that appear at the end of a paperNETWORKSonline communities where people meet, socialize...

Cybertrafficking Crossword Puzzle 2024-04-23

Cybertrafficking Crossword Puzzle crossword puzzle
Across
  1. I am a person who has been trafficked by another person. Who am I?
  2. Children can be vulnerable to ___ grooming.
  3. Aspect of trafficking that does not need to be present in order for a situation to be considered child trafficking.
  4. The emoji cherries means ___.
  5. The emoji for Dug Use.
  6. Gender most likely to be trafficking for labour exploitation.
Down
  1. ___ settings helps to protect sensitive information from strangers.
  2. ___ are criminal activities carried out using digital technologies.
  3. Human trafficking is a form of_______ slavery.
  4. Element of human trafficking.
  5. _____ scams are messages that try to trick you into providing sensitive information.
  6. Gender most likely to be trafficked for sexual exploitation.

12 Clues: The emoji for Dug Use.Element of human trafficking.The emoji cherries means ___.Children can be vulnerable to ___ grooming.Human trafficking is a form of_______ slavery.Gender most likely to be trafficked for sexual exploitation.Gender most likely to be trafficking for labour exploitation....

PPKN KELOMPOK 5 2025-02-22

PPKN KELOMPOK 5 crossword puzzle
Across
  1. Masuknya budaya budaya asing dapat merusak... dan moral anak bangsa.
  2. Contoh sikap yang baik di lingkungan sekolah adalah?
  3. Negara Kesatuan Republik Indonesia di singkat menjadi?
  4. Sebutan lain dari kata serangan (Siber) adalah?
  5. Masuknya paham paham ekstrim yang dapat membahayakan ideologi?
  6. Paham kebangsaan yang berupa semangat dan kesadaran cinta terhadap tanah air. Merupakan pengertian dari?
Down
  1. Pernyataan bersama, merupakan pengertian dari kata?
  2. Sikap menahan diri, bersabar, dan berlapang dada terhadap berbagai macam perbedaan. Merupakan pengertian dari?
  3. Salah satu contoh mencintai tanah air di lingkungan sekolah adalah kegiatan?
  4. Sebutan lain dari tantangan dari luar?
  5. Toleransi juga mengandung makna?
  6. Sebutan lain dari tantangan dari dalam?

12 Clues: Toleransi juga mengandung makna?Sebutan lain dari tantangan dari luar?Sebutan lain dari tantangan dari dalam?Sebutan lain dari kata serangan (Siber) adalah?Pernyataan bersama, merupakan pengertian dari kata?Contoh sikap yang baik di lingkungan sekolah adalah?Negara Kesatuan Republik Indonesia di singkat menjadi?...

MFEC 2022 2022-03-14

MFEC 2022 crossword puzzle
Across
  1. judgement making
  2. necessary
  3. digital currency
  4. our strategic partner
  5. collection of investments
  6. our strategic partner
  7. database
  8. environmental friendly
  9. technology related to finance
  10. collecting data
Down
  1. data security
  2. one of our motto
  3. synergy partner
  4. what is this event?
  5. measuring data
  6. a type of crypto
  7. trading mechanism
  8. our strategic partner
  9. original crypto
  10. our strategic partner

20 Clues: databasenecessarydata securitymeasuring datasynergy partneroriginal cryptocollecting datajudgement makingone of our mottodigital currencya type of cryptotrading mechanismwhat is this event?our strategic partnerour strategic partnerour strategic partnerour strategic partnerenvironmental friendlycollection of investmentstechnology related to finance

Escuela Trabajos 2025-09-23

Escuela Trabajos crossword puzzle
Across
  1. – Director / Directora
  2. – Secretario / Secretaria
  3. – Cocinero / Cocinera
  4. – Consejero / Consejera
  5. – Estudiante
  6. – Bibliotecario / Bibliotecaria
  7. – Ayudante de maestro
  8. de autobús
  9. – Maestro / Maestra
Down
  1. Guard – Guardia de seguridad
  2. – Psicólogo / Psicóloga
  3. Driver – Conductor de autobús/
  4. – Enfermero / Enfermera
  5. – Custodio
  6. Worker – Trabajador social / Trabajadora social
  7. Principal - Subdirector/ Subdirectora
  8. – Entrenador / Entrenadora

17 Clues: – Custodiode autobús– Estudiante– Maestro / Maestra– Cocinero / Cocinera– Ayudante de maestro– Director / Directora– Psicólogo / Psicóloga– Enfermero / Enfermera– Consejero / Consejera– Secretario / Secretaria– Entrenador / EntrenadoraGuard – Guardia de seguridadDriver – Conductor de autobús/– Bibliotecario / Bibliotecaria...

Chapter 11 Credit and Debt 2013-03-19

Chapter 11 Credit and Debt crossword puzzle
Across
  1. a primary party that agrees to pay off a debt just as the debtor would have
  2. a type of loan that is backed up by property that the creditor can take if the loan is not repaid
  3. this type of loan does not require any collateral and has higher interest
  4. a piece of property that is used as security interest
  5. when you receive something now, but pay later
  6. what lenders want in case the borrower does not pay
Down
  1. paying with this saves money when buying a car and puts you in a better position to negotiate for a lower price
  2. a fee you must pay to the party lending you money
  3. a second party that agrees to pay of a debt only if debtor defaults
  4. this is done to a security interest so that it is against the claims of other creditors
  5. sells goods on lends money to the debtor
  6. in order to get this, lenders will look at your credit history, income, and assets to decide whether or not you’re a good credit risk
  7. failure to make payments for a loan on time
  8. person who buys the goods from the creditor

14 Clues: sells goods on lends money to the debtorfailure to make payments for a loan on timeperson who buys the goods from the creditorwhen you receive something now, but pay latera fee you must pay to the party lending you moneywhat lenders want in case the borrower does not paya piece of property that is used as security interest...

Working conditions 2021-01-17

Working conditions crossword puzzle
Across
  1. very precious
  2. manager
  3. labour
  4. you may find gold there
  5. make things better
  6. country in Southern Africa
  7. harsh
  8. staff member
Down
  1. security
  2. sell abroad
  3. cloth made by hand or machine
  4. gig
  5. receive money for the work you do
  6. salary
  7. protects workers' rights
  8. money
  9. covered in dust
  10. plant

18 Clues: gigmoneyharshplantlaboursalarymanagersecuritysell abroadstaff membervery preciouscovered in dustmake things betteryou may find gold thereprotects workers' rightscountry in Southern Africacloth made by hand or machinereceive money for the work you do

Financial Math Crossword 2021-09-17

Financial Math Crossword crossword puzzle
Across
  1. an employee benefit plan that gives workers ownership interest in the company
  2. a number in the format 000-00-0000, unique for each individual, used to track Social Security benefits and for other identification purposes
  3. a type of business insurance coverage that helps pay for medical expenses and rehabilitation
  4. any government system that provides monetary assistance to people with an inadequate or no income
  5. 2 times the normal pay
  6. the form that benefits are in
  7. most employers offer this
  8. FICA
  9. a base period or reference period is a point in time used as a reference point for comparison with other periods
  10. a sum of money paid to a patentee for the use of a patent or to an author or composer for each copy of a book sold or for each public performance of a work
  11. paid twice a month
  12. when you work at a job covered by social security you must pay
  13. paychecks are automatically deposited electronically into bank account
  14. may include maternity, paternity, and adoption leave
  15. covers all members of the immediate family for health care bills
  16. compensation that an employee recieves from an employer after retirement
Down
  1. covers only the employee
  2. the tax levied on both employers and employees to fund the Social Security program.
  3. overtime rate; 1.5 times
  4. salespeople, authors, musicians
  5. paid a set amount for each hour they work
  6. government program that offers benefits to eligible employees who have been become unemployed
  7. paid every two weeks
  8. a limit on the amount of your earnings that is taxed by Social Security
  9. any type of employment in which a worker is paid a fixed piece rate for each unit produced or action performed, regardless of time
  10. the process of determining retirement income goals
  11. total pay
  12. lowest hourly rate that can be paid to an employee
  13. 3 times the normal pay
  14. extra hours
  15. days when an employee is paid for taking time off
  16. greater than the hourly rate for the regular hours
  17. employees work only a specific number of hours per week
  18. workers paid according to the amount of items produced
  19. is a federal employment tax that funds a portion of the Medicare insurance program

35 Clues: FICAtotal payextra hourspaid twice a monthpaid every two weeks2 times the normal pay3 times the normal paycovers only the employeeovertime rate; 1.5 timesmost employers offer thisthe form that benefits are insalespeople, authors, musicianspaid a set amount for each hour they workdays when an employee is paid for taking time off...

Chapter 12 Vocab 2017-04-20

Chapter 12 Vocab crossword puzzle
Across
  1. technology that uses physical characteristics to authenticate
  2. the most popular asymmetric encryption
  3. a feature that follows instructions from a special file when new media is inserted
  4. a LAN that uses radio waves to transmit data between wireless data
  5. a feature that can be used to encrypt data
  6. a attack that uses multiple computers to create a large amount of requests to a network server
  7. a type of malware that records every keystroke made by a user
  8. the set of rules that governs the delivery of data over a network
  9. the most popular hashing algorithm
  10. a feature that allows new media to connect to the computer easily
  11. a type of hardware that allows connections to peripherals without effort
  12. a cheat or loophole
  13. a limited type of text that is at the most basic form
  14. a old function that takes a message and makes it 128 bits long
  15. a protocol for receiving email by downloading it from a computer
  16. a company that provides internet security and has a red color
  17. a subnetwork that provides services to an untrusted network
Down
  1. a malware that breaches the security of a computer that appears harmless
  2. a feature that allows you to encrypt an entire hard drive
  3. a company that deals with online security
  4. a person that breaks into code and firewalls with malicious intent
  5. data that is transmitted or stored without an encryption
  6. a Windows module that is also used for administration of system settings
  7. a type of computer made from Lenovo
  8. a request that is the initial communication to establish a TCP connection
  9. a company that provides internet security and has a green color
  10. a protocol that enables devices to add themselves into a network without user interaction
  11. a malware that replicates itself so it can spread to other computers
  12. a computer company that made the ThinkPad
  13. a service that translates URLs to IP addresses that can be exploited to make directions imposter servers
  14. a MMC file with tools used to create automatic tasks
  15. the use of radio waves to real and capture data on a tag on hardware
  16. a type of attack that intercepts data transfer through a network

33 Clues: a cheat or loopholethe most popular hashing algorithma type of computer made from Lenovothe most popular asymmetric encryptiona company that deals with online securitya computer company that made the ThinkPada feature that can be used to encrypt dataa MMC file with tools used to create automatic tasks...

Chapter 6-8 2024-03-31

Chapter 6-8 crossword puzzle
Across
  1. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  2. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  3. a phishing attack aimed at a high-value individual like a CEO
  4. notification sent by an authentication server to a mobile device associated with a user
  5. control which users, groups, or services can perform an action on a file
  6. software that provides protection against computer viruses and many other forms of malware
  7. measurements of the unique characteristics of an individual
  8. extra information that describes data, like location information or author information
  9. the process of adding geographical identification to a device
  10. a type of malware disguised as legitimate software such as a game or a utility application
  11. is the act of a user claiming an identity
  12. an authentication method that uses only one authentication factor to verify a claimed identity
  13. intelligence derived from publicly available information on an individual or organization
  14. a case of unauthorized computer access
Down
  1. a protected environment where suspicious files can be run
  2. A standardized set of rules for formatting and processing data
  3. security principle that ensures information is only disclosed or made available to authorized users
  4. the act of verifying or proving a user's claim to an identity
  5. aspect of a computer that can be used to breach security
  6. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  7. special codes used to decode data
  8. the act of granting a user access to a system resource
  9. security principle that ensures information is accessible by authorized users whenever required
  10. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  11. security principle that ensures information is only modified in an authorized manner
  12. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  13. a physical device assigned to a user that can generate a unique code
  14. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  15. any software developed to compromise the confidentiality, integrity, or availability of data
  16. the most common form of a breach

30 Clues: the most common form of a breachspecial codes used to decode dataa case of unauthorized computer accessis the act of a user claiming an identitythe act of granting a user access to a system resourceaspect of a computer that can be used to breach securitya protected environment where suspicious files can be run...

Government Abbreviations 2025-12-12

Government Abbreviations crossword puzzle
Across
  1. provides the military forces of the U.S.
  2. aids local agencies that provide homes for low-income families
  3. publishes official government publications to congress, federal agencies, etc.
  4. investigates and enforces justice upon individuals guilty of the most serious crimes
  5. preserves government records; manages the Presidential Library
  6. a group of senior military leaders in the Department of Defense
  7. oversees security exchanges and deals, etc; prevents fraud
  8. collects, evaluates, and disseminates valuable information to safeguard national security
  9. works to understand and predict changes in climate, weather, and ocean coasts
  10. brings liquidity to the housing market (Fannie Mae)
  11. provides mortgage insurance on homes and hospital loans
  12. prevents and controls diseases
  13. safeguards the ‘Allies’ freedom and security by political and military means
  14. plans and coordinates federal transportation projects
  15. provides liquidity, stability, and affordability in the housing market (Freddie Mac)
  16. protects people, wildlife, and fish in the Arctic
  17. supervises the conduct of financial firms; ensures compliance with required standards
  18. provides mail services
  19. enforces law and investigates criminal activity
  20. works to improve the security of the U.S.
  21. regulates civil aviation and space transportation
  22. provides benefits for Veterans and/or their families
  23. enhances the health and well-being of Americans by providing services and advances in the sciences underlying medicine, public health, etc.
  24. oversees national health, education, and welfare programs
Down
  1. maintains stability and confidence in the nations financial system
  2. represents public school teachers and other staff in educational settings
  3. enforces federal laws; establishes justice
  4. governs all commercial transactions in the U.S.
  5. examines how taxpayer dollars are spent
  6. esponsible for U.S. space exploration, aeronautics research, etc.
  7. provides support to entrepreneurs and small businesses
  8. expands funding for mortgages that are insured/ guaranteed by other federal agencies
  9. regulates interstate and international communication
  10. secures communications between law enforcement authorities and their counterparts
  11. conducts and supports medical research
  12. protects Americans from diseases and investigates how to prevent them
  13. manages the Tennessee river for navigation and flood control
  14. protects public health by assuring the safety of human and veterinary drugs, etc.
  15. enforces the National Labor Relations Act
  16. coordinates federal response to disasters
  17. provides information relating to U.S. food, agriculture, etc.
  18. delivers packages
  19. enforces federal tax laws
  20. provides a broad portfolio of transportation, e-commerce, and business services

44 Clues: delivers packagesprovides mail servicesenforces federal tax lawsprevents and controls diseasesconducts and supports medical researchexamines how taxpayer dollars are spentprovides the military forces of the U.S.enforces the National Labor Relations Actcoordinates federal response to disastersworks to improve the security of the U.S....

A Modest Proposal 2022-04-08

A Modest Proposal crossword puzzle
Across
  1. Nutriment, Nourishment
  2. Huge, Enormous
  3. Sadness, Sorrow
  4. Accountable, Chargeable
  5. Disgraceful, Shameful
  6. Basics, Fundamentals
  7. Overload, Overfill
  8. Injustice, Wrong
Down
  1. Security, Guarantee
  2. Mockery, Ridicule
  3. Calculation, Counting
  4. Garments, Apparel
  5. Beg, Pester
  6. Gifts, Charity

14 Clues: Beg, PesterHuge, EnormousGifts, CharitySadness, SorrowInjustice, WrongMockery, RidiculeGarments, ApparelOverload, OverfillSecurity, GuaranteeBasics, FundamentalsCalculation, CountingDisgraceful, ShamefulNutriment, NourishmentAccountable, Chargeable

Friday Barnes Book 1 Chapter 3 2026-03-06

Friday Barnes Book 1 Chapter 3 crossword puzzle
Across
  1. Where does the CEO want to be instead of work?
  2. What is the best school in the country?
  3. Most detective stories are about?
  4. When was the bank robbed?
  5. When was the diamond last seen? PM
  6. How many times did the security guard sneeze in 7 minutes?
  7. Where might Mr Friedricks have hidden the diamond?
Down
  1. How many thousands did Friday get paid for solving the crime?
  2. Who is Bernie? Friday’s
  3. Who opened the security deposit box?
  4. What was stolen from the bank?

11 Clues: Who is Bernie? Friday’sWhen was the bank robbed?What was stolen from the bank?Most detective stories are about?When was the diamond last seen? PMWho opened the security deposit box?What is the best school in the country?Where does the CEO want to be instead of work?Where might Mr Friedricks have hidden the diamond?...

Fly away crossword ! 2019-10-22

Fly away crossword ! crossword puzzle
Across
  1. fatigué
  2. officer agent des douanes
  3. aéroport
  4. enfants
  5. drapeau
  6. aigle
Down
  1. hostess hôtesse de l'air
  2. passeport
  3. épuisé
  4. valise
  5. lag décalage horaire
  6. officer agent des douanes
  7. bagage
  8. attendant hôtesse de l'air

14 Clues: aigleépuisévalisebagagefatiguéenfantsdrapeauaéroportpasseportlag décalage horairehostess hôtesse de l'airofficer agent des douanesofficer agent des douanesattendant hôtesse de l'air

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. Tool currently used for onboarding
  2. Company wide EHS system of record
  3. Tool replacing Oracle HR
  4. Portal to view security emergency contact and other security info
  5. Source data for deriving dollar thresholds
Down
  1. Measure based on the deviations of individual scores from the mean
  2. Final numerical metric of Compliance Analytics
  3. One of the focus areas of EHS
  4. CDA application is hosted here
  5. Deep learning architecture used in CDA application

10 Clues: Tool replacing Oracle HROne of the focus areas of EHSCDA application is hosted hereCompany wide EHS system of recordTool currently used for onboardingSource data for deriving dollar thresholdsFinal numerical metric of Compliance AnalyticsDeep learning architecture used in CDA application...

Crossword Puzzle 2024-10-16

Crossword Puzzle crossword puzzle
Across
  1. A secure way to connect to the internet
  2. A harmful software designed to damage systems
  3. the act of keeping software up to date
  4. manipulated video or audio that appears real
  5. Deepfake videos often use this type of technology
Down
  1. A type of software that prevents malware
  2. Nike Chief Information Security Officer
  3. A digital criminal
  4. A term for unsolicited emails
  5. A strong, unique code used for account security

10 Clues: A digital criminalA term for unsolicited emailsthe act of keeping software up to dateA secure way to connect to the internetNike Chief Information Security OfficerA type of software that prevents malwaremanipulated video or audio that appears realA harmful software designed to damage systemsA strong, unique code used for account security...

C5ISR Crossword 2019-07-02

C5ISR Crossword crossword puzzle
Across
  1. AFC Commanding General
  2. Research agreement between Army and private industry/academia
  3. The fifth "C" in C5ISR
Down
  1. SECARMY top priority
  2. New command of the C5ISR Center

5 Clues: SECARMY top priorityAFC Commanding GeneralThe fifth "C" in C5ISRNew command of the C5ISR CenterResearch agreement between Army and private industry/academia

Golis 1c 2024-02-27

Golis 1c crossword puzzle
Across
  1. ogólny termin określający złośliwe oprogramowanie
  2. wysyłanie innym osobom przez internet lub telefon swoich intymnych zdjęć lub filmów
  3. obejmuje wszystkie rodzaje złośliwego oprogramowania
  4. zasady zachowania, które odpowiadają na pytanie: jak zachowywać się w internecie
  5. nieautoryzowane działanie polegające na naruszaniu zabezpieczeń systemów informatycznych
  6. przemoc z użyciem urządzeń elektronicznych
  7. skrót od fear of missing out
  8. kontekście cyber odnosi się do zdalnych technik i narzędzi w celu uzyskania nieautoryzowanego dostępu do systemów komputerowych
Down
  1. zamierzona i konsekwentna formuła przekazu informacji
  2. jeden z najpopularniejszych typów ataków opartych o wiadomości e-mail lub SMS
  3. zaawansowana technika manipulacji z użyciem multimedii
  4. jedna z metod połowu ryb polega na ciągnięciu wędką przynęty na lince lub żyłce za łodzią
  5. niechciane wiadomości

13 Clues: niechciane wiadomościskrót od fear of missing outprzemoc z użyciem urządzeń elektronicznychogólny termin określający złośliwe oprogramowanieobejmuje wszystkie rodzaje złośliwego oprogramowaniazamierzona i konsekwentna formuła przekazu informacjizaawansowana technika manipulacji z użyciem multimedii...

Suffix -ity 2017-05-26

Suffix -ity crossword puzzle
Across
  1. hospitality
  2. possibility
  3. suitability
  4. activity
  5. severity
Down
  1. divinity
  2. probability
  3. opportunity
  4. futility
  5. security

10 Clues: divinityfutilitysecurityactivityseverityprobabilityopportunityhospitalitypossibilitysuitability

Test-5: People 2021-11-09

Test-5: People crossword puzzle
Across
  1. คนขับรถ
  2. ผู้โดยสาร
  3. ตำรวจ
  4. เลขานุการ
  5. รปภ.
Down
  1. แขก
  2. ประธาน
  3. คนญี่ปุ่น
  4. ผู้จัดการ
  5. เจ้านาย

10 Clues: แขกรปภ.ตำรวจประธานคนขับรถเจ้านายคนญี่ปุ่นผู้จัดการผู้โดยสารเลขานุการ

oral anglais 2024-12-18

oral anglais crossword puzzle
Across
  1. ground
  2. weel
  3. fingers
  4. hand
Down
  1. job
  2. waste
  3. sun
  4. chain
  5. cow
  6. dznger

10 Clues: jobsuncowweelhandwastechaingrounddzngerfingers

site 2025-07-12

site crossword puzzle
Across
  1. a
  2. i
  3. e
  4. g
  5. d
Down
  1. h
  2. b
  3. f
  4. j
  5. c

10 Clues: habfijegcd

Crossword Puzzle 2022-12-21

Crossword Puzzle crossword puzzle
Across
  1. rescheduling
  2. exchequer
  3. nonpayment
  4. inventory
  5. opportunitycost
  6. security
Down
  1. civilscore
  2. legatee
  3. creditagency
  4. guarantor

10 Clues: legateesecurityexchequerinventoryguarantorcivilscorenonpaymentreschedulingcreditagencyopportunitycost

Don't Be a Bully 2023-06-01

Don't Be a Bully crossword puzzle
Across
  1. ____ someone from a group is a form of bullying.
  2. A bully is identified not how they look, but rather by their ___
  3. If you see bullying, do not be a _____.
  4. Bullying can be done by an individual or
  5. If you are bullied, tell an ___.
  6. What does the 'H' stand for in 'HERO'?
  7. The'O' in 'HERO' stands for___ communication.
  8. Bullies can call you ____.
  9. Bullies can get you in ___.
Down
  1. Helping others makes you a __ person.
  2. Bullying online is called ___ Bullying.
  3. Bullying can be physical or ___
  4. What acronym reminds us how to act if you are bullied help.
  5. What does the 'E' stand for in 'HERO'?
  6. What does the 'R' stand for in 'HERO'?
  7. the 'E' in 'SAFE' stands for 'End it ____'.
  8. This acronym is great to remember if you see bullying occuring
  9. the'S' in 'SAFE' stands for 'Stand ______

18 Clues: Bullies can call you ____.Bullies can get you in ___.Bullying can be physical or ___If you are bullied, tell an ___.Helping others makes you a __ person.What does the 'E' stand for in 'HERO'?What does the 'R' stand for in 'HERO'?What does the 'H' stand for in 'HERO'?Bullying online is called ___ Bullying.If you see bullying, do not be a _____....

ISMS and QMS Crossword Puzzle 2023-04-01

ISMS and QMS Crossword Puzzle crossword puzzle
Across
  1. Consulting activity designed to add value, review the process and improve the operations
  2. Cause a factor that cause an issue or nonconformance and should be permanently eliminated through process improvements
  3. Action of developing one's skill or knowledge that relates to specific competencies
  4. Practice a method or procedure or technique that has generally accepted as superior to other known alternatives
  5. breach a security incident in which malicious insiders or external attackers gain unauthorized access to confidential data or sensitive information
  6. Ensure that information and resource are available to those who need them
  7. unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security
  8. Action to eliminate the detected issue or nonconformity
  9. Mentor POC from PA team who facilitates the function and delivery team for getting betterment in their deliverables
  10. Making information accessible only to those authorized to use it
Down
  1. Ensure that information are in format that are true and corrects to its original purpose
  2. Plan attempts to decrease the chances of a risk occurring, or decrease the impact of the risk if it occurs.
  3. A weakness that might be exploited
  4. Plan that explains the steps to take after the identified risk occurs, in order to reduce its impact.
  5. Judgement of the quality about something;
  6. unauthorized person gains physical access to an off-limits
  7. Possibility that a threat exploits a vulnerability, leading to an adverse impact
  8. Action Action to eliminate the cause of nonconformity and prevent the recurrence
  9. Learnt The documented information that reflects both negative and positive experiences from the project

19 Clues: A weakness that might be exploitedJudgement of the quality about something;Action to eliminate the detected issue or nonconformityunauthorized person gains physical access to an off-limitsMaking information accessible only to those authorized to use itEnsure that information and resource are available to those who need them...

PLACES AT ASCHOOL 2025-03-18

PLACES AT ASCHOOL crossword puzzle
Across
  1. Field Lapangan Olahraga
  2. Ruang Kelas
  3. Kamar Mandi
  4. Yard Halaman Sekolah
  5. Room Ruang Komputer
  6. Kantin
  7. Room Ruang Guru
  8. Taman Bermain
  9. Gedung Olahraga
Down
  1. Laboratorium
  2. Room Mushola
  3. Hall Aula Sekolah
  4. Room Ruang Kesehatan
  5. Perpustakaan
  6. Area Area Loker
  7. Office Ruang Kepala Sekolah
  8. Room Ruang Musik
  9. Area TempatParkir
  10. Post Pos Keamanan
  11. Room Ruang Seni

20 Clues: KantinRuang KelasKamar MandiLaboratoriumPerpustakaanTaman BermainGedung OlahragaRoom MusholaRoom Ruang GuruArea Area LokerPost Pos KeamananArea TempatParkirHall Aula SekolahRoom Ruang KomputerRoom Ruang MusikRoom Ruang Seni...

¡Vamos de viaje! 2022-07-25

¡Vamos de viaje! crossword puzzle
Across
  1. to go through customs
  2. to go through security
  3. passenger
  4. arrival
  5. flight
  6. bus stop
  7. to get in line
  8. to take a taxi
  9. train station
  10. monitor; screen
  11. to check one’s luggage
Down
  1. departure
  2. flight attendant
  3. Can you please tell me where is?
  4. gate
  5. airport
  6. tourist office
  7. baggage claim
  8. to board

19 Clues: gateflightairportarrivalto boardbus stopdeparturepassengerbaggage claimtrain stationtourist officeto get in lineto take a taximonitor; screenflight attendantto go through customsto go through securityto check one’s luggageCan you please tell me where is?

SAPM - Test 2 2012-10-04

SAPM - Test 2 crossword puzzle
Across
  1. The efficient frontier of risky assets is matched with the utility indifference curves so as to derive ______utility.
  2. In the APT model formulated by Roll & Ross λ0 is the expected return with______ systematic risk i.e. Risk Free Rate of Return
  3. In order to find the efficient frontier we need to use _______of securities with one another and their covariance for determining the portfolio risk.
  4. ______recognizes that factors that are relevant for a particular security in determining the expected returns can be different for different securities.
  5. _____is a standardized measure of risk because it relates covariance of any asset with the market portfolio to the variance of the market portfolio.
  6. Thus Expected (Required) Rate of Return for a risky asset is determined by the ______plus a risk premium for the individual asset.
  7. The covariance of any asset with the market portfolio (Covi,M) is the relevant _____ measure.
  8. If the alpha of a stock is zero, the stock is properly valued in line with its _______risk.
  9. Any security with an estimated rate of return that plots ____the SML would be considered underpriced.
  10. Any security with an estimated rate of return that plots____the SML would be considered overpriced.
  11. The CAL can be plotted on the risk return graph with ______curve to find the portfolio individual investor would choose.
  12. If the beta for an asset is above 1.0, the asset has higher risk than the market, which means that it is more _____than the overall market portfolio.
Down
  1. The return attributable to the firm’s specific factors is referred to as _____and is denoted by (e) in the Arbitrage Pricing Theory (APT) Model.
  2. If the alpha of a stock is positive, the stock is_______.
  3. When we say capital markets are in______, it means that all investments are properly priced as per their risk levels.
  4. The risk measure for an individual risky asset is its _______with the market portfolio.
  5. Risk Premium is determined by the beta of the asset and the prevailing ____risk premium.
  6. Market efficiency means absence of _____opportunities in the market.
  7. The CAPM links the return of the security to a _____factor i.e. market portfolio.
  8. Rational investor wants to be compensated for any reduction in the purchasing power of money due to____.

20 Clues: If the alpha of a stock is positive, the stock is_______.Market efficiency means absence of _____opportunities in the market.The CAPM links the return of the security to a _____factor i.e. market portfolio.The risk measure for an individual risky asset is its _______with the market portfolio....

Year 9 cybersecurity 1 2024-11-05

Year 9 cybersecurity 1 crossword puzzle
Across
  1. A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
  2. A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
  3. A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
  4. A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
  5. A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
  6. Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
  7. Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
  8. A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
  9. The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
  10. The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
  1. A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
  2. A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
  3. A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
  4. A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
  5. A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
  6. Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
  7. A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
  8. A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
  9. Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
  10. A fake public Wi-Fi network set up to steal personal information from users who connect to it.

20 Clues: A fake public Wi-Fi network set up to steal personal information from users who connect to it.Unauthorized access to computer systems or networks, often with the intent to steal or modify data.The information and data left behind from a user’s online activities, which can be tracked or accessed by others....