cyber security Crossword Puzzles
Bullying Crossword Puzzle 2015-11-15
Across
- What does the "H" stand for in "HERO"?
- Bullying can be done by an individual or ___.
- Bullying online is called ___ bullying
- The "S" in "SAFE" stands for "Stand ____".
- What does the "E" stand for in "HERO"?
- ____ someone from a group is a form of bullying.
- Bullying can be physical or ___.
- A bully is identified not how they look, but rather by their ___.
- What acronym reminds us how to act if you are bullied?
Down
- The "A" in "SAFE" stands for "Ask for ____".
- Bullies can get you in ___.
- If you see bullying, do not be a _____.
- What does the "R" stand for in "HERO"?
- Bullies can call you ____.
- This acronym is great to remember if you see bullying occuring.
- The "E" in "SAFE" stands for "End it ____".
- Being a bully makes you a smaller person. Helping others makes you a __ person.
- The "O" in "HERO" stands for___ communication.
- If you are bullied, tell an ___.
19 Clues: Bullies can call you ____. • Bullies can get you in ___. • Bullying can be physical or ___. • If you are bullied, tell an ___. • What does the "H" stand for in "HERO"? • Bullying online is called ___ bullying • What does the "R" stand for in "HERO"? • What does the "E" stand for in "HERO"? • If you see bullying, do not be a _____. • The "S" in "SAFE" stands for "Stand ____". • ...
NORMA 2024-01-14
Across
- Larangan diskriminasi berdasarkan jenis kelamin disebut?
- Norma dalam mengelola konflik secara damai?
- Kewajiban dan hak yang dimiliki oleh warga negara disebut?
- Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
- Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
- Norma yang menjamin kebebasan berserikat disebut?
- Sikap saling menghargai dalam keberagaman budaya?16.Integritas Norma yang melarang korupsi dan penyalahgunaan kekuasaan?17. Keselamatan Ketaatan terhadap norma keselamatan di tempat kerja?
- Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
- Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
- Tanggung jawab menjaga kelestarian lingkungan?
Down
- Tanggung jawab individu terhadap diri sendiri dan masyarakat?
- Norma yang mengatur hubungan antarindividu dalam masyarakat?
- Norma etika dalam penggunaan teknologi informasi?
- Kesetaraan hak dan peluang bagi semua warga negara disebut?
- Hak asasi manusia yang perlu dijunjung tinggi?
- Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
- Tanggung jawab individu terhadap kepentingan bersama disebut?
- Norma agama yang menjadi pedoman hidup?
18 Clues: Norma agama yang menjadi pedoman hidup? • Norma dalam mengelola konflik secara damai? • Hak asasi manusia yang perlu dijunjung tinggi? • Tanggung jawab menjaga kelestarian lingkungan? • Norma etika dalam penggunaan teknologi informasi? • Norma yang menjamin kebebasan berserikat disebut? • Larangan diskriminasi berdasarkan jenis kelamin disebut? • ...
Trade/Globalization 2024-10-30
Across
- A limited quantity of a particular product which under official controls can be produced, exported, or imported.
- An organization intended to coordinate and unify the petroleum policies of its member countries and ensure stabilization of oil markets
- A regulation or policy that restricts international trade.
- Safeguards the freedom and security of its members.
- The ability of an individual or group to carry out a particular economic activity more efficiently than another country.
- Federal laws that prohibit the unlicensed export of certain commodities or information for reasons of national security.
- Operates a global system of trade rules.
Down
- The Ability of and individual or group to carry out a particular economic activity more efficiently than another individual or group.
- A practice that when applied allows a country to partake in unfair currency practices to get a trade advantage.
- Goods or services leaving a country.
- A sum of money granted by the government or a public body to assist an industry or business.
- Goods or services entering a country.
- Established a free trade zone in North America
- The withdraw of customary trade and financial relations for foreign and security purposes.
- A tax or duty to be paid on a particular class of imports or exports.
- When a country or company exports a product at a price that is lower in the foreign importing market than the exporters domestic market.
16 Clues: Goods or services leaving a country. • Goods or services entering a country. • Operates a global system of trade rules. • Established a free trade zone in North America • Safeguards the freedom and security of its members. • A regulation or policy that restricts international trade. • A tax or duty to be paid on a particular class of imports or exports. • ...
can you beat it 2018-10-11
Across
- when a child is forced to work its called child____
- you can put this over your bed to keep the bugs off
- U.S national bird
- where you go to check out books
- what mold did Dr. Fleming find on a petri dish
- when someone is forced out of there home there are what
- were you go to get a education
Down
- when someone is illegally transported from country to country
- not on ______ what is the definition of accident
- when someone is trying to lose weight they can go on a
- what is the definition of cyber
- when a child is forced to work it is called what
12 Clues: U.S national bird • were you go to get a education • what is the definition of cyber • where you go to check out books • what mold did Dr. Fleming find on a petri dish • not on ______ what is the definition of accident • when a child is forced to work it is called what • when a child is forced to work its called child____ • ...
Bullying 2014-11-21
Across
- When someone talks about someone else country or religion in a vey bad way.
- Scare a person.
- Bullying This is when someone use words to hurt your feelings
- Bullying This when you say a word like gay.
- Bullying This when a person actually hit, punch or push a person.
- Torment for fun.
- When someone does something bad over and over again to have power over you.
Down
- Calling Is when you call someone bad names.
- bullying When you use a person sexual for bad purpose's
- Oppress by fear or violence
- Bullying Something that makes you unhappy.
- Bullying This bullying takes place on the internet.
12 Clues: Scare a person. • Torment for fun. • Oppress by fear or violence • Bullying Something that makes you unhappy. • Calling Is when you call someone bad names. • Bullying This when you say a word like gay. • Bullying This bullying takes place on the internet. • bullying When you use a person sexual for bad purpose's • ...
Anti-Bullying Week Crossword Puzzle 2021-11-17
Across
- What you wear on the first day of Anti-Bullying Week
- Where the majority of bullying takes place.
- How bullies behave.
- When someone uses phones, computers or other technology to bully people.
- Who you can hang out with after you have been bullied.
- What you should tell bullies to do if you catch them in the act.
Down
- Who to tell if you are or have been bullied.
- When people use their bodies or objects to harm someone.
- What kids can develop if they are bullied.
- When someone uses words to hurt someone.
- The month of Anti-Bullying Week.
- A reason why someone is bullied.
12 Clues: How bullies behave. • The month of Anti-Bullying Week. • A reason why someone is bullied. • When someone uses words to hurt someone. • What kids can develop if they are bullied. • Where the majority of bullying takes place. • Who to tell if you are or have been bullied. • What you wear on the first day of Anti-Bullying Week • ...
Business and Information-set4 2023-11-21
Across
- Language commonly used for data analysis and machine learning
- Exclusive legal rights to a creation or invention
- Language used for web development and design
- The process of researching, designing, and launching new products or services
- An algorithmic problem-solving approach mimicking the process of natural selection
- A methodical examination of financial accounts
Down
- Total monetary value of all finished goods and services within a country in a year
- Process of concealing information in digital communication
- Cryptographic technique for verifying data integrity
- Money owed to a company by its clients
- Cyber attack exploiting vulnerabilities in a database
- System of managing and analyzing large sets of data
12 Clues: Money owed to a company by its clients • Language used for web development and design • A methodical examination of financial accounts • Exclusive legal rights to a creation or invention • System of managing and analyzing large sets of data • Cryptographic technique for verifying data integrity • Cyber attack exploiting vulnerabilities in a database • ...
Wąsik 1E 2023-02-28
Across
- zbiór zasad bezpiecznego poruszania się w sieci
- lęk przed wypadnięciem z obiegu
- przemocy w internecie Cyberprzemoc
- rodzaj cyber ataku
- dynamiczne regularnie aktualizowane strony internetowe które dostarczają istotnych informacji na dany temat
- to działania mające na celu złamanie zabezpieczeń systemu lub oprogramowania w celu ich wykorzystania
- zamierzona i konsekwentna formuła przekazu informacji i fabrykowanie takiego przekazu poprzez tworzenie różnego rodzaju fałszywych dokumentów
Down
- osoba która w internecie porusza kontrowersyjny temat po to aby wywołać kłótnię
- fałszywa bądź zmanipulowana informacja
- technika obróbki obrazu polegająca na łączeniu obrazów twarzy ludzkich przy użyciu technik sztucznej inteligencji
- przekaz seksualnie sugestywny obraz lub treści
- rodzaj rozmowy za pośrednictwem internetu
12 Clues: rodzaj cyber ataku • lęk przed wypadnięciem z obiegu • przemocy w internecie Cyberprzemoc • fałszywa bądź zmanipulowana informacja • rodzaj rozmowy za pośrednictwem internetu • przekaz seksualnie sugestywny obraz lub treści • zbiór zasad bezpiecznego poruszania się w sieci • osoba która w internecie porusza kontrowersyjny temat po to aby wywołać kłótnię • ...
PPKN KELOMPOK 5 2025-02-22
Across
- Negara Kesatuan Republik Indonesia di singkat menjadi?
- Pernyataan bersama, merupakan pengertian dari kata?
- Toleransi juga mengandung makna?
- Masuknya paham paham ekstrim yang dapat membahayakan ideologi?
- Sebutan lain dari tantangan dari luar?
- Paham kebangsaan yang berupa semangat dan kesadaran cinta terhadap tanah air. Merupakan pengertian dari?
Down
- Sebutan lain dari kata serangan (Siber) adalah?
- Sikap menahan diri, bersabar, dan berlapang dada terhadap berbagai macam perbedaan. Merupakan pengertian dari?
- Contoh sikap yang baik di lingkungan sekolah adalah?
- Sebutan lain dari tantangan dari dalam?
- Salah satu contoh mencintai tanah air di lingkungan sekolah adalah kegiatan?
- Masuknya budaya budaya asing dapat merusak... dan moral anak bangsa.
12 Clues: Toleransi juga mengandung makna? • Sebutan lain dari tantangan dari luar? • Sebutan lain dari tantangan dari dalam? • Sebutan lain dari kata serangan (Siber) adalah? • Pernyataan bersama, merupakan pengertian dari kata? • Contoh sikap yang baik di lingkungan sekolah adalah? • Negara Kesatuan Republik Indonesia di singkat menjadi? • ...
Unit 1 Terms 2024-12-16
Across
- To further the development of a relationship
- Period of time between childhood and adulthood
- Dating Dating only one person on a regular basis
- Undergoing continuous change
Down
- Feeling of love and emotional attachment to another person
- Dating Going out in a group rather than just as a couple
- Dating Casual dating that involves no commitment to continue the relationship
- To use in an improper way; improper treatment
- stalker A person who uses the Internet as a means to stalk or harass someone
- Someone who obsessively follows, observes, or contacts another person without their consent
- Violence Abuse in a family or household
11 Clues: Undergoing continuous change • Violence Abuse in a family or household • To further the development of a relationship • To use in an improper way; improper treatment • Period of time between childhood and adulthood • Dating Dating only one person on a regular basis • Dating Going out in a group rather than just as a couple • ...
INFORMATION TECHNOLOGY 2017-05-08
Crossword Test 2021-09-13
spanish 2022-10-07
Quiz 1: Computational Science 2025-02-03
Safety Week#4_10 2014-10-27
10 Clues: / กล่อง • / สกปรก • / ปนเปื้อน • / การประชุม • / สติ๊กเกอร์ • / คอมพิวเตอร์ • / รถจักรยานยนต์ • / ซุปเปอร์ไวเซอร์ • / การรักษาความปลอดภัย • / คุ้มกัน หรือ อุปกรณ์ป้องกัน
La Crisis del Hambre en África 2019-10-17
week 6 2025-10-03
SOP 4.0 2014-08-29
Across
- Maximum length of a PDX access ticket for security in years.
- Maximum length of a GovCloud ticket for security in years.
- The Temporary Employee badge color.
- The Vendor badge color.
- Critical Site Event acronym
Down
- Acronym for who can provide escort in PDT.
- The Amazon FTE badge color.
- Large Scale Event acronym.
- The visitor badge color.
9 Clues: The Vendor badge color. • The visitor badge color. • Large Scale Event acronym. • The Amazon FTE badge color. • Critical Site Event acronym • The Temporary Employee badge color. • Acronym for who can provide escort in PDT. • Maximum length of a GovCloud ticket for security in years. • Maximum length of a PDX access ticket for security in years.
June Security Quiz 2017-05-18
Across
- / never let a _____ behind the secured area unless we have called for their service.
- / managers are responsible for visiting their external safe haven _____
- / do not leave the ______ area, evwn at police request
- / managers are responsible to test the _____ ______ monthly.
- / the glass is bullet _____
Down
- / any business that has three false alarms in a one-year period has their ______ service suspended for a period of one year.
- / media person
- / cell phones are not to be used for _______
- / regardless of circumstance, only authorized ______ may speak to the media on Cash Money's behalf.
- / all returned keys must be _____ ____ by the manager.
- / managers are responsible to ensure that all cell phones are accounted for during store ______
11 Clues: / media person • / the glass is bullet _____ • / cell phones are not to be used for _______ • / all returned keys must be _____ ____ by the manager. • / do not leave the ______ area, evwn at police request • / managers are responsible to test the _____ ______ monthly. • / managers are responsible for visiting their external safe haven _____ • ...
Safety and Security 2021-07-20
12 Clues: Health risks • Jack sparrow • Favourite module • Online safety drill • The Tasmanian devil • Jail on a cruise ship • Rare but catastrophic • Cruise Recent covid case • Dr. Liu's favourite fruit • "Rose, promise me you'll survive" • Sound of the emergency alarm on cruise • Sound of the emergency alarm on cruise
Safety and Security 2024-01-17
Across
- The knowledge or perception of a situation or fact
- measures taken to guard against espionage or sabotage, crime, or cyberattack
- the provision or exchanging of information, reports or news
- The condition of being protected from danger, risk, or injury
- a spoken or written account of something that one has observed, heard, done, or investigated
- the reporting system used by Bradken
Down
- administered under ITAR and EAR
- systems and procedures to control who enters Bradken property/facilities
- intentional or unintentional non-compliance with policy, procedure or law
- the action or fact of observing controls or procedures
- teaching, or developing in oneself or others, any skills and knowledge or fitness that relate to specific useful competencies
11 Clues: administered under ITAR and EAR • the reporting system used by Bradken • The knowledge or perception of a situation or fact • the action or fact of observing controls or procedures • the provision or exchanging of information, reports or news • The condition of being protected from danger, risk, or injury • ...
Swimlane crossword 2024-10-03
Across
- Type of management Rancher Prime simplifies
- Network level where NeuVector can identify and block threats
- Assistant Intelligent support feature offered by Rancher Prime (EA)
- NeuVector secures containers throughout this
- Rancher Prime's trusted distribution platform
Down
- Security principle NeuVector is built on
- Feature simplified by NeuVector's built-in audits and reporting
- Certification available on-demand with Rancher Prime
- Rancher Prime component with up to 5 years of support
- Workflow NeuVector seamlessly incorporates security into
10 Clues: Security principle NeuVector is built on • Type of management Rancher Prime simplifies • NeuVector secures containers throughout this • Rancher Prime's trusted distribution platform • Certification available on-demand with Rancher Prime • Rancher Prime component with up to 5 years of support • Workflow NeuVector seamlessly incorporates security into • ...
SURVEILLANCE 2025-02-19
Across
- link between the computer and user
- global web
- provides internet access,often provide a modem and router to the customer
- unauthorized surveillance
- security camera system
- security barrier in a network
Down
- network connected server that stores website file that can be accssible by users of the internet
- information about data
- allows computer to connect with wired or wireless network
- breach access of stored data without the permission of those holding it
10 Clues: global web • information about data • security camera system • unauthorized surveillance • security barrier in a network • link between the computer and user • allows computer to connect with wired or wireless network • breach access of stored data without the permission of those holding it • provides internet access,often provide a modem and router to the customer • ...
Puzzle #17 – “MySSA Account” 2025-06-29
Across
- - You can apply for this benefit through MySSA
- - Your account is designed to be this
- - You can update this payment method online
- - You can apply for this benefit using your account
- - Online account to manage Social Security benefits
- - You need this to access your account
Down
- - Protects your online Social Security account
- - The process of creating your MySSA account
- - You can estimate these through your account
- - You can view this document online through MySSA
10 Clues: - Your account is designed to be this • - You need this to access your account • - You can update this payment method online • - The process of creating your MySSA account • - You can estimate these through your account • - Protects your online Social Security account • - You can apply for this benefit through MySSA • - You can view this document online through MySSA • ...
Workplace Words Worth Solving 2025-07-31
Across
- Main street running through Sanctuary Cove
- Logged with a contractor to get a job done
- Acronym for the committee who oversee building approvals
- Recorded at a meeting
- Team responsible for safety and surveillance
Down
- Everything goes dark (except the complaints)
- What Security do at night and on rotation
- That magical number needed before a meeting can legally become a meeting
- Approved annually, reviewed often, debated always
- Rules that govern community behaviour
10 Clues: Recorded at a meeting • Rules that govern community behaviour • What Security do at night and on rotation • Main street running through Sanctuary Cove • Logged with a contractor to get a job done • Everything goes dark (except the complaints) • Team responsible for safety and surveillance • Approved annually, reviewed often, debated always • ...
NETWORK MANAGEMENT 2022-10-20
Across
- Responsible for maintaining the essential such as OS, application, security tools, devices in network (related to software and hardware)
- _______is the standard adopted by the International Organization for Standardization (ISO)
- _________runs between the managing entity and managed devices
- Detecting the problem symptoms-->Isolating the problem-->Fixing the problem automatically or manually-->Fixing the problem automatically (if possible) or manually. This steps refer to ________
Down
- Involves in the configuration of security hardware and software (firewall, antivirus, OS update) and perform security audit
- ______is one of the example of SNMP agents
- _____was installed to displays/analyzes data from management agents
- Responsible for designing and maintaining the computer network solving any problem related to network connection
- This person have overall control of the server
- Concern with daily operations in providing network services
10 Clues: ______is one of the example of SNMP agents • This person have overall control of the server • Concern with daily operations in providing network services • _________runs between the managing entity and managed devices • _____was installed to displays/analyzes data from management agents • ...
Nathan's eSafety 2021-04-29
Across
- luring someone in with scams
- something that secures your data
- your internet
- spamming is someone saying something over and over
- if you go back to that website again, the website knows you've already been there before.
- someone trying to steal personal information
- something that affects your computer and steals info and more
Down
- is a app that know where you are
- something that is saying your info is private
- mining is a process used by companies to turn raw data into useful information.
- Something that controls if you lag or don't and allows you on the internet
- a video game or something else that u can access
- cyber attack like hacking and ddosing
13 Clues: your internet • luring someone in with scams • is a app that know where you are • something that secures your data • cyber attack like hacking and ddosing • someone trying to steal personal information • something that is saying your info is private • a video game or something else that u can access • spamming is someone saying something over and over • ...
November Newspaper 2023-11-21
Across
- Name of the monday after Black Friday: "_____ Monday"
- Color of light that has the most energy
- Smoking is a physical and ______ addiction
- Name of the ship the Pilgrims used to travel to America
- Traditional sauce served on Thanksgiving
- Epidemic of the past 30 years
Down
- Idiom meaning the most important person "the big ____"
- City in Virginia where the national cemetery is located
- Name of ID that shows permission to work "Employment _____"
- State where the Gateway Arch is located
- Idiom for somebody who has crazy ideas "off one's ____"
- Where did Columbus think he was when he arrived to America? "the ____"
- Name for the little car that takes people to the top of the Gateway Arch
13 Clues: Epidemic of the past 30 years • Color of light that has the most energy • State where the Gateway Arch is located • Traditional sauce served on Thanksgiving • Smoking is a physical and ______ addiction • Name of the monday after Black Friday: "_____ Monday" • Idiom meaning the most important person "the big ____" • ...
Industrial Revolution 2024-11-06
Across
- A skillful worker who makes goods by hand.
- The process of large-scale production using machines.
- Materials Raw materials that are processed into products.
- Raw materials used in making flour, often ground from wheat.
- A type of system integrating computing with physical processes.
Down
- The process of creating products through machinery in mass quantities.
- The product of factories or manufacturing plants.
- Large vehicles designed to transport people and goods.
- Line A continuous process in which products are assembled step-by-step.
- Machines used in manufacturing processes.
- A system of transport for goods across regions.
- A place where industrial processes occur, especially in bulk.
- A metal alloy used widely in construction and manufacturing.
13 Clues: Machines used in manufacturing processes. • A skillful worker who makes goods by hand. • A system of transport for goods across regions. • The product of factories or manufacturing plants. • The process of large-scale production using machines. • Large vehicles designed to transport people and goods. • Materials Raw materials that are processed into products. • ...
CROSSWORD 2023-02-23
504 2023-03-24
Financial Management 2015-04-16
Across
- - An ____________________ used to save money for retirement
- - A transaction that reduces the risk of an investment.
- - the value of ownership interest in the business, calculated by deducting liabilities from assets. See also owner's equity.
- - is when a private company offers shares in the company to the public for the first time.
- - It is a financially wise choice to borrow ______, for things like owning a home (tax-deduction advantage), paying for higher education (tuition), and to help you in times of illness.
- - an agent in the buying and selling of stocks and bonds
- - document issued to possible buyers of a stocks and bonds outlining the financial condition of the company issuing those securities
- - Is money you take out of your banking, brokerage firm, or other accounts.
- - Is the amount that employers subtract from their employees' gross pay for a variety of taxes and benefits, including Social Security and Medicare taxes, federal and state income taxes, health insurance premiums, retirement savings, education savings, or flexible spending plan contributions, union dues, or prepaid transportation.
- - Buying and selling securities.
- - A percentage that investors pay in order to enter a mutual fund
- - Gains equal losses.
- - the amount of money borrowed
- - Piece of paper that proves ownership of stocks, bonds and other investments. Traditionally, a security was a physical document, such as stock or bond certificate, that represented your investment in that stock or bond.
- - An agreement in which one party sells a security to another party and agrees to repurchase it on a specified date for a specified price. See: repurchase agreement.
- - Is a unit of ownership in a corporation or mutual fund, or an interest in a general or limited partnership. Though the word is sometimes used interchangeably with the word stock, you actually own shares of stock.
Down
- - Is a legal document proving ownership of a piece of property.
- - the money an investor receives above and beyond the sum of money initially invested
- - A ______ asset is one that is currently being used as security or collateral for a loan.
- - Is a withdrawal from a bank account that exceeds the funds you have available.
- - Is the length of time between when a fixed-income security, such as a bond or note, is offered for sale and its maturity date.
- - Person or entity that owns share in a corporation. If you own stock in a corporation, you are a shareholder of that corporation.
- - A measure of risk based on the standard deviation of the asset return. Volatility is a variable that appears in option pricing formulas. This formula denotes the volatility of the underlying asset return from now to the expiration of the option. Some have created volatility indices. Example: scale is 1-9; higher rating indirectly higher risk.
- - is the money you collect for providing a product or service.
- - Broadly defined, a recession is a downturn in a nation's economic activity. The consequences typically include increased unemployment, decreased consumer and business spending, and declining stock prices.
- - the chance an entrepreneur takes of losing time and money on a business that may not prove profitable
- - ownership of a corporation which is represented by shares which represent a piece of the corporations’ assets and earnings.
- - Is a legal document you use to transfer assets you have accumulated during your lifetime to the people and institutions you want to have them after your death.
- - a payment required for not fulfilling a contract
- - You should probabaly have enough of this before getting married or buying a nice sports car
- - A package containing two or more different kinds of risk management instruments that are usually interactive.
31 Clues: - Gains equal losses. • - the amount of money borrowed • - Buying and selling securities. • - a payment required for not fulfilling a contract • - A transaction that reduces the risk of an investment. • - an agent in the buying and selling of stocks and bonds • - An ____________________ used to save money for retirement • ...
Airport Vocab 2013-06-12
Brothers and Sisters 2025-04-17
Personal Finance Chapter 11 Activity 2022-09-22
Across
- Growth stocks, growth-oriented mutual funds, and rental property
- A corporate bond secured by various assets of the issuing firm.
- A legal document that details all of the conditions relating to a bond issue.
- A financially independent firm that acts as the bondholders' representative.
- For a corporate bond, the date on which the corporation is to repay the borrowed money.
- A bond that is backed only by the reputation of the issuing corporation.
- Speculative stocks, options, commodities, and other high-risk investments
- A bond backed by the full faith, credit, and unlimited taxing power of the government that issued it.
- U.S. securities, selected corporate and municipal bonds, income stocks, and conservative mutual funds
Down
- The written pledge of government or a municipality to repay a specified sum of money, along with the rest
- A corporation's written pledge to repay a specified amount of money with interest.
- A feature that allows the corporation to call in, or buy, outstanding bonds from current bondholders before the maturity date.
- A bond that is repaid from the income generated by the project it is designed to finance.
- A ____ is a debt security, similar to an IOU
- A bond that can be exchanged, at the owner's option, for a specified number of shares of the corporation's common stock.
- A corporate bond that pays higher interest but also has a higher risk of default.
- A debt security issued by a state or local government.
- The dollar amount the bondholder will receive at the bond's maturity.
- Cash, CDs, money market mutual funds, and U.S. government bonds
- a security that represents the ownership of a fraction of the issuing corporation.
20 Clues: A ____ is a debt security, similar to an IOU • A debt security issued by a state or local government. • A corporate bond secured by various assets of the issuing firm. • Cash, CDs, money market mutual funds, and U.S. government bonds • Growth stocks, growth-oriented mutual funds, and rental property • ...
Privacy Day Crossword 2022-12-07
Across
- Acronym for the international standard development organization publishing norms related to privacy, security and information management.
- If you suspect a privacy or security breach, you must report it immediately to___@bmc.com.
- My date of birth is an example of___data.
- Process by which a readable message is converted to an unreadable form, to prevent unauthorized parties from reading it.
- The GDPR sets a maximum___of €20 million or 4% of annual global turnover.
- Acronym for the European general data protection law entered into force in 2018.
- Lawyer and activist who became famous suing Facebook in Europe for privacy violations.
- _ is responsible for data security & privacy.
- Acronym for California’s privacy law approved in November 2020.
- Sending fraudulent messages to steal confidential information such as login credentials is also called___.
Down
- Medical records, political opinions, biometrics are examples of___personal information.
- Acronym for BMC’s Lead Data Protection Authority in Europe.
- Small text files that may be placed on your computer by websites that you visit.
- ___from individuals is necessary for email marketing campaigns.
- The right to be___is when you can ask an organisation that holds data about you to delete that data.
- Acronym for the ‘gold standard’ transfer mechanism, which BMC has since 2015.
- Data___is any entity that processes personal data on behalf of and as instructed by the data controller.
- What the P stands for in LGPD, the statutory law on data protection and privacy in Brazil.
- Privacy by___means that the privacy protection rules are taken into account already when IT systems and procedures are designed.
- Right to be let alone, or freedom from interference or intrusion.
20 Clues: My date of birth is an example of___data. • _ is responsible for data security & privacy. • Acronym for BMC’s Lead Data Protection Authority in Europe. • ___from individuals is necessary for email marketing campaigns. • Acronym for California’s privacy law approved in November 2020. • Right to be let alone, or freedom from interference or intrusion. • ...
Chapter 2 2022-11-22
Across
- Stock Exchanges
- Largest category of deposit institution.
- A financial institution that provides services for businesses.
- A document guaranteeing payment of a specific amount of money.
- Money for real estate, equipment, and so on.
- A document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
- Those people who do the work.
- A financial institution that makes money by using loans.
- People who lend money to the business in return for a contracted rate of interest or return for their investment.
- Someone who assists you with purchasing stocks and bonds.
- Over-the-counter (OTC)
- Federal Deposit Insurance Corporation
- Largest category of deposit institution.
Down
- A bank account is used by depositors to accumulate money for future use.
- People who buy shares of stock in the company.
- Any organization that provides services related to money.
- Publicly traded corporations are required to have their annual reports prepared by an outside accounting firm.
- Stock Exchanges
- People who buy shares of stock in the company.
- For-profit businesses that sell insurance products.
- A security that pays interest over terms of ten to thirty years.
- Shares can be traded openly.
- A security that matures in a year or less.
- A written order for the bank to pay a specific amount to the person or organization to which the check is written.
- A type of EFT transaction, money is deposited directly into a customer's checking account.
- Allows customers to pay for purchases and withdraw cash.
- An action to manage supply of money and interest.
- A security that pays interest over terms ranging from two to ten years.
- A bank account that allows the account owner to make deposits, write checks, and withdrawl money.
- A prearranged amount of credit that is available for a business to use as needed.
30 Clues: Stock Exchanges • Stock Exchanges • Over-the-counter (OTC) • Shares can be traded openly. • Those people who do the work. • Federal Deposit Insurance Corporation • Largest category of deposit institution. • Largest category of deposit institution. • A security that matures in a year or less. • Money for real estate, equipment, and so on. • ...
ITS2210 Module 6 Crossword 2019-04-02
Across
- Using interpersonal skills to extract information about a computer system and its security
- Perform system patches, probe for flaws, check logs, and review policies
- the most basic rule of computer security is to install these
- The minimum frequency for system probing and audits
- A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- One who hacks into systems to accomplish some goal that they feel is ethically valid
- The most prestigious certification for networking professionals
- The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
- this should be done to large networks to break them up into more manageable networks
- A reference to how long a user has used a password
Down
- Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
- preferred location for storing backups
- Hackers who hack only for legal/ethical purposes
- To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
- The process to scan a network looking for vulnerabilities
- One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- A numerical designation for a connection point on a computer
- Someone who attempts to compromise a system to assess its vulnerability
- this should be done to all unneeded programs/software on a server
- the six Ps of security are: ports, patch, _____, probe, policies, physical
20 Clues: preferred location for storing backups • Hackers who hack only for legal/ethical purposes • A reference to how long a user has used a password • The minimum frequency for system probing and audits • The process to scan a network looking for vulnerabilities • the most basic rule of computer security is to install these • ...
PC Pro Chapter 7 2020-02-03
Across
- A profile designed for use on unknown networks.
- A smart speaker that controls your smart appliances and performs other actions through voice commands
- A profile designed to be used in a SOHO.
- A network devices that connects Wi-Fil devices to forma Wi-Fi network
- The internet of things.
- An optional component of the 802.11 specifications.
- A method for remapping one IP address space into another by modifying network address information in packets' IP headers while they are in transit.
- A small office/home office network.
- Communication technology that enables communication between two devices in close proximity.
- A wireless network access protocol that uses WEP.
- Communication technology that uses radio waves in the 2.4 ghz range
- Communication technology that uses invisible light waves.
- A network security standard for wireless home networks
- A wireless security that adheres to 801.11i specifications
- An IoT standard based protocol.
Down
- An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network.
- An enhancement to MIMO that allows a set of devices with individual antennas, rather than just one device with an antenna, to communicate with each other.
- IoT standard based protocol. Simpler and less expensive than Zigbee.
- The network name
- A wireless security based on 802.11i specifications
- An enhancement that allows multiple antennas to use the same radio frequency
- An authentication standard that uses username/passwords, certificates, or devices such as smart cards to authenticate clients.
- A temporary peer-to-peer mode network
- An token-based authentication standard that requires a MAC address to use.
- A profile designed for networks in which you know and trust every device
- Combining channels into one to increase bandwidth
26 Clues: The network name • The internet of things. • An IoT standard based protocol. • A small office/home office network. • A temporary peer-to-peer mode network • A profile designed to be used in a SOHO. • A profile designed for use on unknown networks. • Combining channels into one to increase bandwidth • A wireless network access protocol that uses WEP. • ...
Unit 7 2023-02-24
Across
- the process of making connections and building relationships
- Income includes your wages, dividends, capital gains, business income, retirement distributions as well as other income
- Letter tter sent with, and explaining the contents of, another document
- Market the supply of and demand for labor, in which employees provide the supply and employers provide the demand
- Insurance A contract that requires your health insurer to pay some or all of your
- Wage the minimum amount of money someone can make
- mention or refer to
- a meeting usually face to face especially for the purpose
- a sum of money paid to an employee upon completion of a task, usually selling a certain
- money or value that an individual or business entity receives in exchange for providing a good
- U.S. federal payroll tax
- the average wage for a worker in a specified position or occupation,
- of Recommendation a letter written on behalf of an applicant by someone who can vouch for that person's educational
Down
- the practicing of an activity, especially a sport, by professional rather than amateur players.
- a professional learning experience that offers meaningful, practical work related to a student's field of study or career interest.
- business, calling, métier, occupation, pursuit, and work
- document summarizing a person's professional and academic background, relevant skills, and accomplishments
- Plan individual retirement accounts
- the amount of money you make
- Income type of tax that governments impose on income generated by businesses and individuals within
- 65 or older
- Skills people skills
- Security Social Security” is the term used for the Old-Age, Survivors, and Disability Insurance (OASDI) program in the United States, which is run by the Social Security Administration (SSA), a federal
23 Clues: 65 or older • mention or refer to • Skills people skills • U.S. federal payroll tax • the amount of money you make • Plan individual retirement accounts • Wage the minimum amount of money someone can make • business, calling, métier, occupation, pursuit, and work • a meeting usually face to face especially for the purpose • ...
AWS CP CW 1 2023-06-29
Across
- an intelligent threat detection system that uncovers unauthorized behavior
- offers on-demand access to aws security and compliance reports
- a dns service that routes users to applications
- this pillar focuses on environmental impact, especially energy consumption and efficiency
- allows you to assess, audit, and evaluate the configurations of your resources
- helps you control access to mobile and web applications
- causes a traffic jam on a website or application in an attempt to cause it to crash
- helps you discover and protect sensitive data
- allows you to generate and store encryption keys
- upgrades an existing instances
- this pillar focuses on designing systems that work consistently and recover quickly
- this pillar focuses on putting mechanisms in place that help protect your systems and data
- giving a user the min access required to get a job done
Down
- helps protect your web application against common web attacks
- used to describe design principles and best practices for running workloads in the cloud
- provides recommendations that help you follow AWS best practices
- models the shared security of the cloud
- this pillar focuses on creating applications that effectively support production workloads
- this pillar focuses on delivering optimum and resilient solutions at least to the cost to the user
- adds or replaces instances
- automatically distributes your incoming application traffic across multiple ec2 instances
- this pillar focuses on the effective use of computing resources to meet system and business requirements while removing bottlenecks
- adds or replaces ec2 instances across AZs, based on need and changing demand
- a managed ddos protection service
- allows you to manage and retrieve secrets
- works with ec2 instances to uncover and report vulnerabilities
26 Clues: adds or replaces instances • upgrades an existing instances • a managed ddos protection service • models the shared security of the cloud • allows you to manage and retrieve secrets • helps you discover and protect sensitive data • a dns service that routes users to applications • allows you to generate and store encryption keys • ...
RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30
Across
- Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
- Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
- Conducting meetings between people in different locations using video and audio connections.
- Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
- The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
- The science or practice of encoding information to prevent unauthorized access, especially in information security.
- Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
- Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
- The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
- Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
- Employing data and algorithms to create models that predict future outcomes or behaviors.
- The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
- Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
- The commitment to complying with established standards, specifications, or regulations.
- Catering to a specific segment or group with unique preferences or needs.
- The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
- Alternative problem-solving methods employed when conventional approaches fail.
- The capability of being customized or adapted to suit individual preferences or needs.
- Losing interest or focus during discussions, indicating a lack of engagement or understanding.
- A systematic approach or set of procedures for solving a problem or accomplishing a task.
20 Clues: Catering to a specific segment or group with unique preferences or needs. • Alternative problem-solving methods employed when conventional approaches fail. • The capability of being customized or adapted to suit individual preferences or needs. • The commitment to complying with established standards, specifications, or regulations. • ...
Investment Unit 2024-03-20
Across
- The top 500 hundred stocks
- it represents a loan from a buyer to the issuer of the bond
- Someone who invest in the market long term
- What is Crypto backed by
- the age you can claim social security benefits
- take cash from a large group of investors and invest in stocks and bonds
- you get the money when you cant work anymore
- Long term goals with a time horizon of 10-16 years
- Companies will often match you contribution up to a certain percentage
- Market is rising 20% from resents
- the age that you can start investing
- Currencies backed by government but not physical commodity
- Someone who buys stocks low and sells high
- Social security and medicare together is called
- What category of investing does crypto fall under
Down
- Issued by the Government and no interest is paid
- A security that represents the ownership of a fraction of a corporation
- short term goal have more liquid
- the increase of value of an asset
- something that does not directly involve the company like pandemic
- the distribution of some of a company's earnings to a class of shareholder
- You can put 7000 dollars pre-taxed per year
- Money you contribute goes in after tax
- Market is down 20% from recent highs
- How old you have to be to withdraw from an IRA
- many unionized workforce's have this
- Sum of money saved and available for a particular purpose
- tells us how big the company is in the stock market
- Investing all the money you have available at the given time into the market
- Letters and symbols of a companys stock
30 Clues: What is Crypto backed by • The top 500 hundred stocks • short term goal have more liquid • the increase of value of an asset • Market is rising 20% from resents • Market is down 20% from recent highs • many unionized workforce's have this • the age that you can start investing • Money you contribute goes in after tax • Letters and symbols of a companys stock • ...
Ch 3 Crossword 2024-11-14
Across
- Taxes paid by the employee and employer that are used to finance the federal Social Security and Medicare programs; also known as Social Security and Medicare taxes.
- Money added to an employee’s base pay.
- wage- Amount paid for working time in a week that is beyond the standard 40-hour workweek.
- balance- Amount of time an individual spends at work compared to the amount of time spent in a personal life.
- Subtraction from gross pay.
- Earnings from sources other than work.
- Income paid as a percentage of sales made by a salesperson.
- Form of noncash compensation received in addition to a wage or salary; also known as fringe benefit.
- Fixed payment for work expressed as an annual figure.
- Payment for work that is usually calculated on an hourly, daily, or piecework basis.
- Amount on which taxes are calculated.
- Gross pay (plus bonuses) minus payroll deductions; also known as take-home pay.
- Money paid for service beyond what is required; also known as gratuity.
Down
- Wages or salaries and benefits paid to employees.
- Employee’s Withholding Certificate that helps an employer determine how much income tax to withhold from an employee’s paychecks as payroll deductions.
- All the income an individual receives in a year including both earned and unearned income.
- Wage based on a rate per unit of work completed.
- Total income before payroll deductions.
- Government expects individuals and businesses to voluntarily report all income that is subject to the income tax.
- Wage and Tax Statement that shows your earnings and the amounts of income, Social Security, and Medicare taxes withheld from your earned income during the year.
- Income received from employment, including self-employment.
- return- Report containing information used to calculate taxes owed by the taxpayer.
22 Clues: Subtraction from gross pay. • Amount on which taxes are calculated. • Money added to an employee’s base pay. • Earnings from sources other than work. • Total income before payroll deductions. • Wage based on a rate per unit of work completed. • Wages or salaries and benefits paid to employees. • Fixed payment for work expressed as an annual figure. • ...
Cloud Deployment Essentials Crossword 2025-03-07
Across
- A system for managing users and their access permissions in the cloud.
- The practice of distributing workloads across multiple servers to prevent overload.
- Storing multiple copies of data to prevent failure-related losses.
- A method of storing data as independent units rather than in files or blocks.
- The process of reducing downtime when moving systems to the cloud.
- A service that logs and records user activities to track security issues.
- The process of modifying applications to fully utilize cloud-native features.
- A way to store and organize files using directories like on a traditional system.
- A method of storing backup data in remote servers to prevent data loss.
- The duplication of data across locations to improve reliability.
- A tool that allows multiple operating systems to run on a single physical machine.
- The act of determining which applications should be moved to the cloud first.
- Moving a virtual machine from one host to another without turning it off.
Down
- A security process requiring more than one form of verification for access.
- A security approach that involves planning data protection before migration.
- A lightweight, self-contained computing environment for applications.
- A storage method that divides data into blocks for faster access.
- The practice of predicting cloud service costs before migration.
- A method that controls system access based on a user's job or role.
- The process of evaluating IT infrastructure before moving to the cloud.
- A process that allows multiple users to share computing resources efficiently.
- Moving existing IT infrastructure to the cloud without major modifications.
- A system that allows a single login to provide access to multiple applications.
23 Clues: The practice of predicting cloud service costs before migration. • The duplication of data across locations to improve reliability. • A storage method that divides data into blocks for faster access. • Storing multiple copies of data to prevent failure-related losses. • The process of reducing downtime when moving systems to the cloud. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Matching known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
ESCAPE ROOM 2023 2023-08-23
13 Clues: We Are • Thomas • Location • Priority • Principal • The Chief • Red, Danger • Out of here • Fifth, 1st Day • The big F Word • Camp, Training • Core,Curriculumn • Harmonious Relationship
Entering the Unknown 2024-03-13
Across
- This trophy is one of the collected items.
- This monster snapped the main protagonist's roommate's neck
- The name of the side protagonist and Helia's friend group
- The person who is caught on Experimentation's fire exit
- The main protagonist and first OC of TheOrangePick's
- A side protagonist and former persona of TheOrangePick
- The antagonist that escapes capture from a clan cell
- The name of the group Reginald Copperbottom is in
- This Minecraft collectable is one of the collected items
Down
- This largest item is one of the collected items
- This blind monster killed the main protagonist
- This moldy item is one of the collected items
- The main antagonist
- The main protagonist's roommate (in a historical way)
- This mannequin monster killed Cyber
- The game the series was based on
- This glue item is one of the collected items
- This scrappy monster killed Red Ender
18 Clues: The main antagonist • The game the series was based on • This mannequin monster killed Cyber • This scrappy monster killed Red Ender • This trophy is one of the collected items. • This glue item is one of the collected items • This moldy item is one of the collected items • This blind monster killed the main protagonist • This largest item is one of the collected items • ...
Important concepts 2017-11-17
Across
- studies interactions between countries
- Type of conflict in which religion could be involved
- Income
- Ability to influence others based on specific characteristics
- Is the increasing interaction of people through the growth of the international flow
- State actions taken to ensure its security that threatened the security of other states
Down
- Income advised to infaltion
- Right of a nation to become an independent state
- People who share democratic and cultural similarities
- % of economy growth
10 Clues: Income • % of economy growth • Income advised to infaltion • studies interactions between countries • Right of a nation to become an independent state • Type of conflict in which religion could be involved • People who share democratic and cultural similarities • Ability to influence others based on specific characteristics • ...
National Security and Modern Conflict Threat Evaluation 2024-02-08
Across
- Example of strategic battle game used in class.
- A nation's location and terrain provide _______ defense.
- Military ______ is the primary means for national security.
- ________ policy is the greatest determining factor in national strategy.
- Weakness
Down
- Create an uncomplicated plan (acronym).
- Risks taken while efficiently utilizing resources.
- The ability of a nation to satisfy peacetime and wartime security is _____ capability.
- A reliable supply of ____ is important to national strategy.
- What is an adversary attempting to do?
10 Clues: Weakness • What is an adversary attempting to do? • Create an uncomplicated plan (acronym). • Example of strategic battle game used in class. • Risks taken while efficiently utilizing resources. • A nation's location and terrain provide _______ defense. • Military ______ is the primary means for national security. • ...
United Nations 2022-05-03
Across
- created before UN to talk through problems (3 words)
- decides if new countries can join (2 words)
- _______ council most powerful organ of the UN
- the first meeting was held in 194_
Down
- 19_ member states
- UN general Assembly adopts this
- headquarters of the United Nations
- one of the official languages of the UN
- last name of the current secretary general
- The five permanent members of the security council have this power
- the United Nations has this many "organs"
11 Clues: 19_ member states • UN general Assembly adopts this • headquarters of the United Nations • the first meeting was held in 194_ • one of the official languages of the UN • the United Nations has this many "organs" • last name of the current secretary general • decides if new countries can join (2 words) • _______ council most powerful organ of the UN • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Encryption technique used to protect data
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- A sequence of words or text used to control access to a computer; similar to a password.
- System(software or hardware) used to manage network security and monitor traffic
- Malicious program that can replicate itself
- An attack using computer program to guess the correct user credentials
- This testing simulates a full stack attack, probing every possible weakness
Down
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Protocol used for encryption which protects data in transit
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- The act of tricking someone into giving up sensitive information
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
Study Guide 2022-09-02
Across
- A form that tells how much money your employer will withhold
- Expenses you can claim to decrease your gross income
- yearly pay
- Benefits given to the retirees
- Taxable Income
- A form your employer gives you that shows how much money you made
- subtracted from your gross income when you calculate your taxes
- Pay after taxes and deductions
- Pay before taxes and deductions
Down
- Compensation in addition to your salary or wage
- the form you use to file your taxes
- hourly, daily, monthly pay
- adjusted gross income
- Medicare and Social Security tax
- A person supported by another person.
- amount of money the IRS sets each year that can be subtracted from your gross income
- Items that reduce the actual amount of taxes you need to pay
- Tax to pay for the health of retirees
18 Clues: yearly pay • Taxable Income • adjusted gross income • hourly, daily, monthly pay • Benefits given to the retirees • Pay after taxes and deductions • Pay before taxes and deductions • Medicare and Social Security tax • the form you use to file your taxes • A person supported by another person. • Tax to pay for the health of retirees • Compensation in addition to your salary or wage • ...
SvD Review 2014-11-07
Across
- These customers must manually run Radia
- The team for remote escalations that have a warm transfer
- Default Certificate
- The type of account that is created upon login and prevents a user from logging in to their account
- The location of Urgent Items
- The location of Outages
- The location of HPSM ESS portal
- Used to modify and view accounts
Down
- On-site Support
- When escalating to this group we create an Interaction and then close it
- Background connection to files
- The acronym for the website that allows ISSMs to manage exceptions
- This stores user account information, authenticates usees and enforces security policy for a windows domain
- the tool we use to connect to the foreground of the user's computer
- The name of the group we contact if we have witnessed a security violation
- Software Team
- Check this everyday before you auto in
17 Clues: Software Team • On-site Support • Default Certificate • The location of Outages • The location of Urgent Items • Background connection to files • The location of HPSM ESS portal • Used to modify and view accounts • Check this everyday before you auto in • These customers must manually run Radia • The team for remote escalations that have a warm transfer • ...
Investment 2024-03-20
Across
- Security representing ownership of a fraction of a operation.
- Measuring price performance of a basket of securities.
- Owning 100 percent your the money the company matched in your 401k plan.
- Paid when you hit so many years of service.
- Increase value of an asset
- Age most women start investing in the stock market.
- Age for withdrawal of money in your IRA account.
- Percentage of paycheck contributed to your 401k plan each month.
- Usually paid back at a stated interest rate.
- Recorded information that makes it difficult to cheat the system.
Down
- Investing into the market all the money you have.
- Appropriate age to invest in Crypto.
- Getting money when you can't work anymore.
- Contribution to your IRA combined each year.
- Currencies created and backed by government.
- Age to gain full social security benefit.
- Sum of money saved for a purpose
17 Clues: Increase value of an asset • Sum of money saved for a purpose • Appropriate age to invest in Crypto. • Age to gain full social security benefit. • Getting money when you can't work anymore. • Paid when you hit so many years of service. • Contribution to your IRA combined each year. • Currencies created and backed by government. • ...
Risk Interest Group 2025-12-05
Across
- Access Control List defining allowed/denied permissions.
- Single software instance serves multiple customers with isolation.
- Public Key Infrastructure that manages certificates and trust.
- Algorithm that performs encryption and decryption.
- Cryptographic proof of data integrity and signer authenticity.
- Learning Algorithms that learn patterns from data to make predictions/decisions.
- AI Models that create new content (text, images, code) from learned patterns.
- Language Processing AI field enabling computers to understand and generate human language.
- Cloud model delivering virtualized compute, storage, and networking.
Down
- Automated coordination/management of services, containers, and workloads.
- Model memorizes noise in training data, hurting generalization.
- Authority Trusted entity that issues and validates digital certificates.
- Learning Machine learning using deep neural networks with many layers.
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Security Information and Event Management for log aggregation and analytics.
- Transforming plaintext into ciphertext using cryptographic keys.
17 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Cryptographic proof of data integrity and signer authenticity. • Model memorizes noise in training data, hurting generalization. • ...
Unit 1 Key Terms 2024-12-17
Across
- dating- dating only one person on a regular basis
- undergoing continuous change
- further the development of a relationship
- period of time between childhood and adulthood
- who obsessively follows,observes, or contacts another person without their consent
Down
- feeling of love and emotional attachment to another person
- stalker- a person who uses the internet as a means to stalker harass someone
- dating- casual dating that involves no commitment to continue the relationship
- dating- going out in a group rather than just as a couple
- violence- abuse in a family or household
- to use in an improper way , improper treatment
11 Clues: undergoing continuous change • violence- abuse in a family or household • further the development of a relationship • period of time between childhood and adulthood • to use in an improper way , improper treatment • dating- dating only one person on a regular basis • dating- going out in a group rather than just as a couple • ...
No crackers Gromit, we’ve forgotten the Christmas crackers 2024-11-20
Across
- Who is the creator of Wallace and Gromit?
- Who is the original voice of Wallace?
- What does Wendolene's shop sell in A Close Shave?
- Where is the villain taken at the end of The Wrong Trousers?
- What is the moon made of?
Down
- What toy is used in the famous chase scene in The Wrong Trousers?
- What is the name of the cyber dog in A Close Shave?
- What are the Wrong Trousers originally intended for?
- What kind of bird is Feathers McGraw?
- Wallace's go to cheese
- What colour is the rocket in a Grand Day Out?
11 Clues: Wallace's go to cheese • What is the moon made of? • What kind of bird is Feathers McGraw? • Who is the original voice of Wallace? • Who is the creator of Wallace and Gromit? • What colour is the rocket in a Grand Day Out? • What does Wendolene's shop sell in A Close Shave? • What is the name of the cyber dog in A Close Shave? • ...
Avenger Cast Movies 2025-07-10
Across
- remake of a book about a man and his sidekick who solve mysteries RDJ
- the lost city of z
- famous sweater mystery movie
- to infinity and beyond
- scifi movieabout clones with ewan mcgregor
- movie about a hacker who helps track down a cyber criminal starring hemsworth
Down
- the devil all the time
- a dualmovie war battle WW2
- two marvel actors renner and olsen investigate to find out about a murder on a reservation
- science fiction movie starring scarlet about a womanwho gets a drug in her stream
- men in black internationsl
- played a lawyer in the poor things
12 Clues: the lost city of z • the devil all the time • to infinity and beyond • a dualmovie war battle WW2 • men in black internationsl • famous sweater mystery movie • played a lawyer in the poor things • scifi movieabout clones with ewan mcgregor • remake of a book about a man and his sidekick who solve mysteries RDJ • ...
Revision 2025-09-16
Across
- Noticing what is happening in the present
- Spreading rumors about someone is an example of which type of bullying?
- When two or more people do not agree on the same thing
- Being thankful and appreciative
- Which type of bullying takes place online?
Down
- Appreciating yourself and doing things you like
- Purposely troubling someone else through actions or words
- Kindness/Patience/Honesty and Forgiveness are examples of
- Stepping into other's shoes to understand how they are feeling
- Doing things to take care of yourself
- I tell my teacher if I haven't done the homework. How is my behaviour?
11 Clues: Being thankful and appreciative • Doing things to take care of yourself • Noticing what is happening in the present • Which type of bullying takes place online? • Appreciating yourself and doing things you like • When two or more people do not agree on the same thing • Purposely troubling someone else through actions or words • ...
Cybercrime Investigation 2021-07-25
Across
- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, etc.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
- The act of one individual harassing or intimidating another individual via the Internet.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
- The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- refers to a set of instructions executed by the computer to achieve intended results.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- the interactional space or environment created by linking computers together into a communication net5work.
- refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- refers to the modification or change, in form or substance, of an existing computer data or program.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- SYSTEM The overarching program that runs all the functions on a computer or other electronic device.
- A politically- or ideologically-motivated cyber attack or hack.
- The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
- An information packet sent from a website to a web browser that records a user’s activity on that website.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- An online journal. Contraction of the term “web log.”
- The access to the whole or any part of a computer system without right.
- A camera connected to a computer, generally used to then stream videos to the Internet.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- A software robot that performs automated tasks.
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, etc.
- A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- refers to a computer or a computer network, the electronic medium in which online communication takes place.
- A group of computers that is linked to share data and other information.
- stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same
Down
- A company that offers access to the Internet.
- A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- Amassed data that is used to describe large amounts of other Internet data.
- An individual who manages and oversees a network.
- The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
- the act of copying digital material posted online into the storage medium on one’s computer.
- A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
- refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.
- an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
- refers to the transmission of information through ICT media, including voice, video and other forms of data.
- The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
- refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
- The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
- terrorist activity that targets computer networks and information systems for attack.
- A way to access an electronic system by bypassing some or all security mechanisms.
- ENGINE A website that finds information across the Internet based on a set of search criteria.
- Unsolicited advertising or other information sent out via email or other messaging service.
51 Clues: A company that offers access to the Internet. • A software robot that performs automated tasks. • An individual who manages and oversees a network. • An online journal. Contraction of the term “web log.” • A politically- or ideologically-motivated cyber attack or hack. • The access to the whole or any part of a computer system without right. • ...
Banking can be SCARY 2023-10-30
Across
- The RG run when there is an unauthorized transaction on a members debit/credit card
- a digital asset that exist outside the control of governments and central authorities
- If the payee, dollar amount, or date was changed after a check was written it is considered “__________”
- Abbreviation for a “Questionable Activity Report”
- “___________ theft” occurs when someone steals your personal information or credentials to commit fraud
- The fraudulent practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information
- “Money __________” is concealing of the origins of illegally obtained money
- The RG used to submit a report of elder abuse
- Short for the “Bank Secrecy Act”
Down
- A security feature on new bills and some checks consisting of tiny repetitive text that makes it nearly impossible to reproduce or counterfeit
- Abbreviation for the report filed for daily cash transactions exceeding $10,000
- A security feature on ID’s, new bills, and some checks that is invisible to the naked eye but can seen under “___________ light”
- If a bill lacks certain security features it may be “____________”
- A device by fraudsters on point of sale device to steam debit/credit card information
- “Office of Foreign Assets Control“ is also called “_______”
- wrongful or criminal deception intended to result in financial or personal gain
- A fraudulent or deceptive act or operation such as buying gift cards or sending money to someone you do not know
17 Clues: Short for the “Bank Secrecy Act” • The RG used to submit a report of elder abuse • Abbreviation for a “Questionable Activity Report” • “Office of Foreign Assets Control“ is also called “_______” • If a bill lacks certain security features it may be “____________” • “Money __________” is concealing of the origins of illegally obtained money • ...
Civics Unit 20 Vocabulary 2021-04-13
15 Clues: fake • trickery • wheel cover • paper money • put in place • a sudden event • providing help • official record • someone walking • import illegally • gun, rifle, etc. • a husband or wife • import/export tax • careful examination • safety against crime
Die Einwanderung 2023-11-28
12 Clues: war • flight • poverty • economy • refugee • to flee • security • persecution • origin country • a better life (3,8,5) • chances in the future • political reasons (10,6)
Information Security Quiz #15 2015-05-27
Across
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
- This can slow down your computer AND watch everywhere you go on the internet.
- Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
- Tapping confidential information from trash
- You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
- Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
- Use this tool to dispose of documents that contain personal or financial information.
Down
- The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
- The front line of defence in information security!
- Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
- Destruction of computer equipment or records
- Records of IS activities
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
- A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
16 Clues: Records of IS activities • Tapping confidential information from trash • Destruction of computer equipment or records • The front line of defence in information security! • This can slow down your computer AND watch everywhere you go on the internet. • Use this tool to dispose of documents that contain personal or financial information. • ...
Security-07-29-2024 2024-07-29
Across
- Cryptographic algorithm
- Open source web server software
- Synthetic media that has been digitally manipulated
- Attack method that uses trial and error to crack passwords
- Tool that records what a person types on a device
- The 'B' in BSOD
- Attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- The process of verifying the identity or other attributes of an entity
Down
- Class of malware designed to automate cybercrime
- Software that caused global IT outage
- Vulnerability Management software vendor
- Malware designed to deny a user or organization access to files
- Microsoft Web Browser
- Device for stealing credit card information
- Ai Chip Maker
- An unexpected and relatively small defect, fault, flaw
16 Clues: Ai Chip Maker • The 'B' in BSOD • Microsoft Web Browser • Cryptographic algorithm • Open source web server software • Software that caused global IT outage • Vulnerability Management software vendor • Device for stealing credit card information • Class of malware designed to automate cybercrime • Tool that records what a person types on a device • ...
Security of the Believer 2025-06-13
Across
- Nothing can separate us from the ____ __ ___ (Romans 8:39)
- Death is not an accident; it is an ________ (Page 13)
- The wages of sin is ______ (Romans 6:23)
- This is who paid the death penalty for our sins
- We are saved BY this (Ephesians 2:8)
- This is when you are not sure about something
- We are saved THROUGH this (Ephesians 2:8)
Down
- All that come to Jesus will in no way be ____ ___ (John 6:37)
- The title of our book is "Your life as a _______"
- This is who we studied about in Bible School this week.
- This is the gift God gives us when we believe and ask forgiveness (Page 11)
- We are NOT saved through these (Ephesians 2:9)
- By hearing and believing, we are given _____ life (John 5:24)
- This is anything we do that is wrong and contrary to what God wants
- This is another gift from God through Jesus (Page 11)
- When we confess, God is ______ and just to forgive us (1 John 1:9)
16 Clues: We are saved BY this (Ephesians 2:8) • The wages of sin is ______ (Romans 6:23) • We are saved THROUGH this (Ephesians 2:8) • This is when you are not sure about something • We are NOT saved through these (Ephesians 2:9) • This is who paid the death penalty for our sins • The title of our book is "Your life as a _______" • ...
p22 2024-07-11
5 Clues: Online storage for data • Small file stored by websites • A program to surf the internet • Turn coded text into readable text • Related to computers or the internet
Bullying 2024-08-20
Across
- Kata untuk tindakan mendiamkan seseorang atau menghindari komunikasi.
- Tindakan yang melibatkan perundungan secara berkelompok.
- Mempermalukan seseorang di depan orang lain
- Bentuk bullying yang melibatkan penganiayaan fisik secara langsung. (Contoh: pukulan)
- Proses di mana seseorang merasa tertekan dan tidak memiliki kontrol.
- Suatu perilaku yang dilakukan oleh sekelompok orang untuk mengintimidasi
- Kata yang menggambarkan tindakan intimidasi atau ancaman secara berulang-ulang.
Down
- Proses untuk menghentikan bullying dengan melaporkan kepada pihak berwenang.
- Tindakan menyebar informasi palsu tentang seseorang.
- Perasaan tidak berdaya dan tertekan akibat tindakan bullying
- Kata yang digunakan untuk menyebut tindakan menyakiti secara verbal atau emosional
- Kata untuk seseorang yang melakukan bullying.
- Kata untuk mengidentifikasi individu yang menjadi sasaran bullying
- Jenis bullying yang terjadi melalui media sosial atau teknologi digital
14 Clues: Mempermalukan seseorang di depan orang lain • Kata untuk seseorang yang melakukan bullying. • Tindakan menyebar informasi palsu tentang seseorang. • Tindakan yang melibatkan perundungan secara berkelompok. • Perasaan tidak berdaya dan tertekan akibat tindakan bullying • Kata untuk mengidentifikasi individu yang menjadi sasaran bullying • ...
EXTREME SPORTS 2021-09-23
Across
- An object used for Ski.
- Used in dark places.
- Sport in charge of exploring caves.
- Used to protect the knees from scrapes.
- Helps keep hands clean.
- They favor the execution of turns and curves and are very useful to propel yourself in places where the slope is little or even non-existent
- A security element to protect the head.
Down
- Consists of jumping from a plane.
- A security element to protect the eyes.
- An Object used for rafting.
- It is used in places where descent is otherwise difficult.
- It must be used obligatorily to avoid serious accidents.
- An object used to practice parachuting.
- It is necessary to learn to use equipment and techniques to breathe underwater.
- It is a support element to climb.
15 Clues: Used in dark places. • An object used for Ski. • Helps keep hands clean. • An Object used for rafting. • Consists of jumping from a plane. • It is a support element to climb. • Sport in charge of exploring caves. • A security element to protect the eyes. • Used to protect the knees from scrapes. • An object used to practice parachuting. • A security element to protect the head. • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Cybersecurity 2025-10-20
Across
- Software that secretly collects information about you
- A scam using fake emails to steal personal information
- Installing the latest software fixes and security patches
- A system that blocks unauthorized access to a network
- Manipulating people into revealing confidential information
- An added layer of security requiring a code or device confirmation
- The process of verifying a user’s identity
- A tool used to securely store and create strong passwords
- The process of converting data into code to prevent access
Down
- When unauthorized access to data occurs
- A copy of important data stored separately for safety
- A secret word or phrase used to access an account
- A tool that hides your IP address and encrypts your internet traffic
- Software that detects and removes malicious programs
- Software designed to damage or disrupt systems
15 Clues: When unauthorized access to data occurs • The process of verifying a user’s identity • Software designed to damage or disrupt systems • A secret word or phrase used to access an account • Software that detects and removes malicious programs • A copy of important data stored separately for safety • Software that secretly collects information about you • ...
Cybermobbing 2020-04-17
Across
- Elektronisches Gerät mit Tasten
- Lernende Menschen die normalerweise in einem Klassenzimmer feststecken
Down
- Werder Kind noch erwachsene Menschen
- Ein Mann oder eine Frau die entweder stielt, jemanden ermordet oder was anderes
- ein Kind das gemobbt wird
- Meist übers Internet gesteuerte Demütigung einer Person
6 Clues: ein Kind das gemobbt wird • Elektronisches Gerät mit Tasten • Werder Kind noch erwachsene Menschen • Meist übers Internet gesteuerte Demütigung einer Person • Lernende Menschen die normalerweise in einem Klassenzimmer feststecken • Ein Mann oder eine Frau die entweder stielt, jemanden ermordet oder was anderes
Cyber Words 2017-04-25
6 Clues: a book on a device • mail sent from electronics • bullying through technology • very popular and looks like a number sign • can be for learning but most commonly as games • commercials that pop up on the side of your screen
CDWA Acronym 2022-09-01
Across
- Service Delivery that assists with the Client's activities of daily living.
- Fob that adds an extra layer of security to computers.
- Legal employer for Washington's Individual Providers.
- Total number of hours the IP can work in a week.
- Protects individuals' personal medical data.
- Federal payroll contribution directed that funds Social Security and Medicare programs.
Down
- Caregiver
- DSHS granted this company as WA state's Consumer Directed Employer.
- A group of agencies that supports WA state's social & health needs.
- Client
- Law protects the health status of any individual.
- The person who generates authorizations for Clients.
12 Clues: Client • Caregiver • Protects individuals' personal medical data. • Total number of hours the IP can work in a week. • Law protects the health status of any individual. • The person who generates authorizations for Clients. • Legal employer for Washington's Individual Providers. • Fob that adds an extra layer of security to computers. • ...
Week 7 2020-09-27
Across
- theory of groups through social relationships
- early social disorganization studies assumed that social ties and social control shaped this type of crime
- a victimization theory of crime
- as neighborhood structure influences crime, there is mounting evidence that crime and violence shape neighborhood conditions
- theorist of Routine Activity Theory
- the fundamental human ecological character of illegal acts as events which occur at a specific location in ------- and ------
- one of the most important findings changing spatial distribution of delinquency in a city is the product of “larger economic
- Value, Inertia, Visibility, Access
- which embodies quality as well as other desirable characteristics such as good security should be the default option
- Characteristics of quality security
- rates were taken in consideration between 1991-1993 & 1996-1998
- illegal acts in which someone definitely and intentionally take or damages the person or property of another
Down
- anyone with an inclination to commit a crime
- criminologists that came to view the concept of social disorganization during the 1950’s and 1960’s
- some examples of this are poverty, residential instability, ethnic heterogeneity.
- Prevents the convergence in time and space of offender and target
- _____ is higher in communities of poverty, racially segregated communities and single parent households
- those that have a close relationship with their neighbors have lower _____ rates in their community
- majority of homicides in _____ between ‘96 and ‘98 occurred in only 32% of neighborhood clusters
- theorist of Routine Activity Theory
- where individuals have a higher risk of being a victim if they are close to the geographic location of offenders
- a perspective where residents of high-crime neighborhoods are portrayed as sharing conventional values
- which suggests that increases in the quantity and quality of security led to dramatic declines in crime
- _____ and crime rates have a relationship with one another
24 Clues: a victimization theory of crime • Value, Inertia, Visibility, Access • theorist of Routine Activity Theory • theorist of Routine Activity Theory • Characteristics of quality security • anyone with an inclination to commit a crime • theory of groups through social relationships • _____ and crime rates have a relationship with one another • ...
Crossword 1 2015-06-01
Across
- Ensures the existence of multiple pathways of communication
- A form of networking where each computer is a peer
- Refers to the newness of an exploit which may be known in the hacker community for days or weeks
- Filtering concept where the network denies all activities except for those specified here
- When in use, the client workstation converts to thin client status
- A utility or device that captures network communications for investigation and analysis
- A weakness or flaw in a host, node, or any other infrastructure that a hacker can exploit
- Any potential harm to a resource or node on a network
- The act of transmitting a protocol across an intermediary network by encapsulating it in another protocol
- Acts as a middle man between client and server. Can hide the identity of the client, filter content, perform NAT, and cache content.
- The confidence that other users will act in accordance with the organization’s security rules.
Down
- Virtual Private Network
- Network security service that allows a user to authenticate to an entire domain through a single client log on process
- Communication link that enables access to network resources using a WAN link to connect to a distant network
- Small home, home office network
- The process of purging a storage device by writing zeroes to all addressable locations on the device
- Written document prescribing security goals, mission, objectives, standards, procedures, and implementations for a given organization
- A computer system that hosts resources accessed by users from clients
- Network device responsible for directing traffic towards its stated destination
- The likelihood or potential for a threat to take advantage of a vulnerability
20 Clues: Virtual Private Network • Small home, home office network • A form of networking where each computer is a peer • Any potential harm to a resource or node on a network • Ensures the existence of multiple pathways of communication • When in use, the client workstation converts to thin client status • ...
Crossword 3 2015-06-01
Across
- Post Office Protocol
- An attack that seeks to obtain information from a victim by presenting false credentials or by luring the victim to an attack site
- NetBIOS Extended User Interface
- A collection of multiple honeypots in a network for the purpose of luring and trapping hackers
- Simple Mail Transfer Protocol
- The process of making copies of data onto other storage media
- Malware that records all keyboard input and transmits a log file to a hacker
- Security Technical Implementation Guides
- A protocol and a service used to remotely control or administer a host through a plaintext command line interface
Down
- A leetspeak word derived from a common typo. Used to mean hacking and taking over control of a computer or network
- Malware that needs a host object to infect
- Using a new service, device, configuration, software, etc. to a limited number of test hosts before deploying over the entire network
- Bring Your Own Device
- A closely monitored system that usually contains a large number of files that appears to be valuable or sensitive and serves as a trap for hackers
- A network mapping tool that performs network scanning, port scanning, OS identification, and other types of probing
- Basic security training that focuses on common or basic security elements that all employees must know and abide by
- Malware that acts like an electronic land mine
- An advancement of keystroke logging to monitor and record many other user activities.
- A form of Malware that hackers can upload and deploy on a target system, replacing multiple, components of the host’s operating system with altered code
- Trusted Platform Module
20 Clues: Post Office Protocol • Bring Your Own Device • Trusted Platform Module • Simple Mail Transfer Protocol • NetBIOS Extended User Interface • Security Technical Implementation Guides • Malware that needs a host object to infect • Malware that acts like an electronic land mine • The process of making copies of data onto other storage media • ...
Compliance Champions League 2023 - Crossword 2023-11-30
Across
- If any Confidential or Internal information is lost or disclosed to unauthorized parties. Incidents must be reported via the ______________ tool.
- We can find the latest SAP logo and word/ppt templates at www.______.com.
- _______ notes must be entered to put the case to status Resolved.
- You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:
- Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portal using the quicklink /go/ _______________ :
- What should be the status of a product security incident if you get a CVSS score of 0.0.:
- Subscribe using the _ to receive email notifications on external updates for cases.
- What determines the priority of a security note?
- Attachments are made visible externally by setting the _ flag.
- _____________ Maintenance Strategy is used by customers to request a quotation online in SMP.
- What should be the final status of a Security Incident:
- Name the Process which contains set of rules and processes for reducing the risks of using third-party software for internal business purposes at SAP.
Down
- Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance.
- _______ field ensures that the action plan step documented will be visible to the customer.
- Which Board area does AIS belong to?
- _______ tool targets at providing missing functionality and enhancements to Agent Workspace.
- The _____ feature enables SAP to secure the usage of any application specific function:
- Software with rating ___________ at SAP should not be installed.
- What is the condensed copy of a case with all personal data being anonymized called.
- Patch Day notes are released on 2nd _________ of every Month:
20 Clues: Which Board area does AIS belong to? • What determines the priority of a security note? • What should be the final status of a Security Incident: • Patch Day notes are released on 2nd _________ of every Month: • Attachments are made visible externally by setting the _ flag. • Software with rating ___________ at SAP should not be installed. • ...
Semester 2 Vocabulary 2024-05-10
Across
- Referring to investments where taxes on earnings are postponed until a later date.
- of Deposit (CD): A savings certificate entitling the bearer to receive interest.
- Interest: Interest calculated only on the initial principal amount invested or loaned.
- The act of leaving one's job and ceasing to work, usually occurring at an older age.
- The initial amount of money invested or loaned, on which interest is calculated.
- Occurring twice a year.
- Occurring four times a year, or every three months.
- Security: A federal program that provides retirement, disability, and survivor benefits.
- (Individual Retirement Account): A tax-advantaged retirement account for individuals.
- Occurring every day or relating to each day.
- Security Credits: Credits earned through paying Social Security taxes that count toward eligibility for Social Security benefits.
- Retirement Age: The age at which a person becomes eligible to receive full Social Security retirement benefits.
Down
- Exempt: Not subject to taxation.
- Investment: An investment made with money that has not been subjected to taxation.
- Partially retired, still working part-time or intermittently.
- Rate: The percentage of the principal amount charged or paid for the use of money.
- A federal health insurance program for people aged 65 and older and certain younger individuals with disabilities.
- (Federal Insurance Contributions Act): The law that requires employers to withhold Social Security and Medicare taxes from employees' wages and pay a matching amount.
- Occurring once every year.
- Investment: An investment made with money that has already been taxed.
- (Annual Percentage Yield): The effective annual rate of return taking into account the effect of compounding interest.
- Interest: Interest calculated on the initial principal and also on the accumulated interest of previous periods.
- The amount of money in an account.
- The date on which a financial instrument, such as a bond or CD, becomes due for payment.
24 Clues: Occurring twice a year. • Occurring once every year. • Exempt: Not subject to taxation. • The amount of money in an account. • Occurring every day or relating to each day. • Occurring four times a year, or every three months. • Partially retired, still working part-time or intermittently. • Investment: An investment made with money that has already been taxed. • ...
Semester 2 Vocabulary 2024-05-10
Across
- The initial sum of money invested or loaned, excluding interest or earnings.
- Relating to or occurring once a year.
- A federal program providing income and benefits to retirees, disabled individuals, and survivors.
- Calculated or occurring every day.
- Occurring twice a year.
- Investments made with income that has already been taxed.
- Interest calculated only on the initial principal amount.
- Units of measure used to determine eligibility for Social Security benefits.
- The act of leaving one's job or ceasing to work, typically due to age.
- Investments or income that are not subject to taxation.
- Working part-time or having reduced work responsibilities after retirement.
- Refers to investments or accounts where taxes on earnings are deferred until a later date, often retirement.
Down
- Interest calculated on both the initial principal and the accumulated interest from previous periods.
- A savings certificate with a fixed maturity date and a fixed interest rate.
- A tax-advantaged investment account designed for retirement savings.
- The age at which a person can receive full Social Security retirement benefits.
- A federal health insurance program primarily for people aged 65 and older.
- Occurring four times a year, typically every three months.
- The amount of money in an account.
- Contributions made to retirement accounts using income that has not been taxed.
- The percentage of principal charged or paid over a specified time period.
- The date when a financial instrument, like a CD or bond, becomes due and payable.
- The effective annual rate of return, accounting for compounding interest.
- The law that mandates the collection of Social Security and Medicare payroll taxes.
24 Clues: Occurring twice a year. • Calculated or occurring every day. • The amount of money in an account. • Relating to or occurring once a year. • Investments or income that are not subject to taxation. • Investments made with income that has already been taxed. • Interest calculated only on the initial principal amount. • ...
Industrial Security Concept Crossword Puzzle 2025-10-25
Across
- – a chance of being injured or harmed
- – it deters man from committing acts of fear being caught, charged in court or get dismissed
- – Removing the risk totally from the business
- – a person who does detective work for hire, reward or commission
- – inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury
- – being watchful in spotting violator, a person, a vehicle or an accident
- – it is a state or quality of being free from fear or danger, assurance, certainty.
- – it includes all the security measures designed to prevent unsuitable individuals from gaining access to classified matters, and it prevents appointment, or retention as employees of such individuals
- – it is an act of baseness, vileness, or depravity in the private and social duties which a man owes to his fellowmen or to society in general
- – The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard
Down
- – moving the financial impact of the potential loss over to an insurance company
- - it uses barriers being placed between the potential intruder and the object/matter to be protected
- - is the potential that a chosen action or activity will lead to a loss
- – sound and good judgement to arrive at wise and timely decision
- – spreading the risk through decentralization to limit the impact of the potential loss
- – ability to deal with others successfully without offending
- – it involves the installation of physical barriers, security lighting, use of vaults, locks and others.
- – minimizing the probability of the potential loss
- – includes any person who offers or renders personal service to watch or secure
- – an indication of impending danger or harm
20 Clues: – a chance of being injured or harmed • – an indication of impending danger or harm • – Removing the risk totally from the business • – minimizing the probability of the potential loss • – ability to deal with others successfully without offending • – sound and good judgement to arrive at wise and timely decision • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
ICT Cyber security Work 2021-10-06
3 Clues: An error in code • If you get sent a fraudulent email its called? • door-Are bits of code embedded in programs by the programmer to quickly gain access later
ICT Cyber security Work 2021-10-06
3 Clues: An error in code • If you get sent a fraudulent email its called? • Are bits of code embedded in programs by the programmer to quickly gain access later
Being a Cyber Citizen 2021-04-24
Across
- To decrease in extent, volume, or scope
- Electronic content or media platforms
- One who is present but not part of a situation
- Annoy persistently; create an unpleasant situation
- Exclusive legal right to reproduce works
- To use for a business; for profit
- Increase in extent, volume, or scope
- Electronic bullying; often done anonymously
Down
- Result of actions
- Unknown authorship or origin
- Principles and morals that guide behavior
- Copyright allowed if author gets credit
- Usage of copywritten material without permission
- Standards on which judgment or decision is made
14 Clues: Result of actions • Unknown authorship or origin • To use for a business; for profit • Increase in extent, volume, or scope • Electronic content or media platforms • To decrease in extent, volume, or scope • Copyright allowed if author gets credit • Exclusive legal right to reproduce works • Principles and morals that guide behavior • ...
Cyber Among Us - 1 2025-08-25
Across
- Unsolicited junk mail or advertising
- Malware that is difficult to get rid of
- Most common malicious attachment, not just for AP
- Strategy for longer passwords using sentences
- Malware that can self-replicate across a network
- Added to an internet browser to use your favorite software
- Malware that tracks your keystrokes
- A program that can run on its own
- Scan this to go to a website
Down
- Malware that uses your fear to get you to click
- Email that is malicious in nature
- The 'main' brand of software we use
- Forward malicious emails to this group email
- A bad link may do this
14 Clues: A bad link may do this • Scan this to go to a website • Email that is malicious in nature • A program that can run on its own • The 'main' brand of software we use • Malware that tracks your keystrokes • Unsolicited junk mail or advertising • Malware that is difficult to get rid of • Forward malicious emails to this group email • Strategy for longer passwords using sentences • ...
Organizing Homeland Security 2017-04-26
Across
- A federal law designed to prevent political interference with the decisions and actions of governmental organizations.
- Information law enforcement agencies, military units, or other security forces can use to prevent an attack or operation.
- favoring the process over accomplishments
- A multiagency operation in West Virginia that evaluates information gathered from a variety of governmental sources
- The criminal and social actions of individuals and groups before a terrorist attack
- Any outcome or output of analyzed information that can be used by law enforcement agencies, military units, or security forces to take an immediate action
Down
- A federal law designed to prevent political interference in the management of federal governmental organizations and to increase the efficiency of management
- Preparations from any agency to deal with natural, accidental, or man-made disasters
- The process of examining a community to determine the areas that might be subject to attack
- As used in this text, the ability to stay focused on the primary mission of an organization
- adding too many secondary tasks to a unit. Too many jobs divert a unit from its primary mission
11 Clues: favoring the process over accomplishments • The criminal and social actions of individuals and groups before a terrorist attack • Preparations from any agency to deal with natural, accidental, or man-made disasters • The process of examining a community to determine the areas that might be subject to attack • ...
Security Awareness News 2024-03-12
Across
- This layer of the internet is intentionally hidden. It's where a variety of questionable or illegal activities sometimes occur.
- Represents the largest percentage of the internet. It hosts information that is hidden from the public, like online banking.
- When stolen usernames and passwords allow attackers to completely take over online accounts.
- Malware that can lock up systems or data until the victim agrees to pay a specified ransom.
- A combination of words that are easy for you to remember but hard for others to guess.
Down
- These attackers use manipulation to mislead people into doing something that they shouldn't.
- Refers to malicious code or software that can steal data and spy on people.
- Happens when a scammer uses stolen personal information to open fraudulent accounts, file insurance claims, and apply for credit applications in the victim's name.
- One of the leading causes or breaches.
- These passwords make a cybercriminal's job easier.
- Where people spend most of their time when using the internet.
11 Clues: One of the leading causes or breaches. • These passwords make a cybercriminal's job easier. • Where people spend most of their time when using the internet. • Refers to malicious code or software that can steal data and spy on people. • A combination of words that are easy for you to remember but hard for others to guess. • ...
Environmental Services 2017-08-18
Across
- What company takes care of pest control?
- What tupe of rags do we use to clean? (blue and yellow)
- Used to collect trash from multiple areas.
- Evening discharge cleaners are called?
- What company takes care of RED trash and sharps for the hospital?
- Who is the head of safety and security?
- What is the brand of electronic paper towels we use?
- What is the Color of ES Scrubs?
- What program is used to look up chemicals?
Down
- This is used to swipe you into the building or certain areas.
- What is the name of the security company?
- Who is the manager of ES?
- What brand of bleach do we use to clean with?
- What is the name of the fragrance spray we use?
- Weeks How far out should you schedule PTO?
- What floor is ICU on?
- These are used to keep your hands clean.
17 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • Evening discharge cleaners are called? • Who is the head of safety and security? • What company takes care of pest control? • These are used to keep your hands clean. • What is the name of the security company? • Used to collect trash from multiple areas. • ...
