cyber security Crossword Puzzles
infosec terms 2024-07-23
Across
- the method of authentication that requires 2 methods of verification
- which policy requires you to secure your workstation
- the B1 team responsible for overall network security
- an email that attempts to solicit information
Down
- the process of verifying a users identity
- a computer infection
- the process of email security requiring verification before access
- which button in outlook that allows you to report an email as phishing
- unwanted email
- an unauthorized person attempting to access the network
10 Clues: unwanted email • a computer infection • the process of verifying a users identity • an email that attempts to solicit information • which policy requires you to secure your workstation • the B1 team responsible for overall network security • an unauthorized person attempting to access the network • the process of email security requiring verification before access • ...
Chapter 9. Conner & Aaron 2025-05-29
Across
- Form to report income and taxes owed.
- Tax on property passed on after someone dies.
- People with more income should pay more taxes.
- on goods and services bought.
Down
- Profit from selling assets like stocks.
- Tax that takes more from low incomes.
- Payroll tax for Social Security and Medicare.
- Tax taken from wages for Social Security and Medicare.
- Tax on value added at each stage of production.
- Tax on specific goods like gas or alcohol.
10 Clues: on goods and services bought. • Tax that takes more from low incomes. • Form to report income and taxes owed. • Profit from selling assets like stocks. • Tax on specific goods like gas or alcohol. • Payroll tax for Social Security and Medicare. • Tax on property passed on after someone dies. • People with more income should pay more taxes. • ...
Puzzle #49 – “SSI vs SSDI (Deep Dive)” 2025-06-30
Across
- - Supplemental Security Income for people with low income and resources
- - These are counted for SSDI but limited for SSI
- - SSI is this type of program
- - SSI recipients often receive this state program
Down
- - Required to qualify for SSDI
- - SSI has strict limits on these
- - Social Security Disability Insurance for workers with enough credits
- - SSDI recipients qualify for this after 24 months
- - You must do this through SSA for either program
- - Taxes that fund SSDI, not SSI
10 Clues: - SSI is this type of program • - Required to qualify for SSDI • - Taxes that fund SSDI, not SSI • - SSI has strict limits on these • - These are counted for SSDI but limited for SSI • - You must do this through SSA for either program • - SSI recipients often receive this state program • - SSDI recipients qualify for this after 24 months • ...
Explanation and Development of the Teachings of Rerum Novarum 2022-11-14
Across
- valuable work in adapting the economic and social order everywhere to the norm of justice and humanity is shown by the __ __ __.
- ________ ____________ is rooted in the right of private property.
- Pope John XXII wants there to be a correlation between the ___ in the growth of the economy and an ____ in social development.
Down
- encyclical letter that explores the role of the church in efforts to achieve social progress and social justice.
- private property is a valid right according to the private property is a valid right according to _______.
- known as mother and teacher of nations.
- private ownership should _________.
- more modern ___ has lead to an increase in demand in education of workers.
- financial security and status is now rooted in programs like __________ and social security instead of ownership of private property.
- public property is necessary for state to exercise security greater power for the ____________ ______.
10 Clues: private ownership should _________. • known as mother and teacher of nations. • ________ ____________ is rooted in the right of private property. • more modern ___ has lead to an increase in demand in education of workers. • public property is necessary for state to exercise security greater power for the ____________ ______. • ...
AI in Cyberspace: Beyond the Hype 2025-03-07
Across
- A term often paired with "learning" in AI advancements.
- The practice of protecting computer systems from threats.
- A type of network modeled after the human brain.
- AI systems designed to operate without human intervention.
Down
- Related to intelligence that mimics human decision-making.
- The use of AI to protect cyberspace from cyber threats.
- A step-by-step procedure used in AI for decision-making.
- The process AI systems undergo to improve performance.
8 Clues: A type of network modeled after the human brain. • The process AI systems undergo to improve performance. • The use of AI to protect cyberspace from cyber threats. • A term often paired with "learning" in AI advancements. • A step-by-step procedure used in AI for decision-making. • The practice of protecting computer systems from threats. • ...
5-3a Rev 2023-04-21
Across
- Will forgo testing when directed by the 616 OC to implement an emergency remediation tasking.
- 616 OC will task _____ with Priority and Emergency vulnerability remediation actions.
- Organization that verifies compliance percentages via vulnerability scans provided by the organization responsible for the applicable assets.
- Are responsible for populating the AFIN 3% test group.
- Which RMF step is associated with formally authorizing the systems for operations.
- One of two types of VRO deployments.
- A process that is automated by the use of an application called eMASS.
- Which RMF step involves identifying org’s essential activities, mission, and security levels?
- Three overall IA areas or Contributing Factors (with Culture and Conduct).
- Is responsible for adding the ARAD and MECM Current Branch agents as permanent elements of all SDC/SSC baselines.
- PMOs may utilize _______ groups to isolate systems from AFIN-wide patches and updates.
Down
- responsible for remediating the remaining 5% of systems that are considered non-compliant.
- Implements a goal of 95% compliance of vulnerability remediation actions using enterprise remediation tools.
- A flaw or weakness in system security procedures, design, implementation, or internal controls that could be utilized by an adversary to breach the AFIN.
- Which RMF step is associated with verifying sec controls are implemented/operating correctly and producing desired outcome.
- The goal of the vulnerability remediation/mitigation process is to mitigate the risks associated with vulnerabilities through the implementation of ____.
- A DISA-led formal inspection designed to increase accountability and the security posture of DoD Information Networks according to DoD standards.
- Which RMF step is associated with maintaining ongoing S/A.
- One of two types of VRO deployments.
- Will alert the NOS when non-cliented systems rises to 10% or higher.
20 Clues: One of two types of VRO deployments. • One of two types of VRO deployments. • Are responsible for populating the AFIN 3% test group. • Which RMF step is associated with maintaining ongoing S/A. • Will alert the NOS when non-cliented systems rises to 10% or higher. • A process that is automated by the use of an application called eMASS. • ...
Module 1.1 2016-09-12
17 Clues: атлет • предок • крадій • вітчим • коріння • охорона • втікати • падчерка • покидати • збити куш • бути схожим • сторона сім'ї • історія сім'ї • розширенна сім'я • колишній чоловік • бути засудженим до в'язниці • бути родичем до (бути пов'язаним з)
Cellular Shenanigans 2025-10-15
17 Clues: a+b=c • antenna • no energy • watergate • stabilizer • water entry • energy needed • glucose entry • NA+ K and ions • no help needed • amount per area • almost always water • entry with security • any water substance • handicapped entrypoint • difference between areas • equal substance between area
NCSC LIII 2025-03-23
Across
- Metro line color that takes you to DuPont
- DC river flowing into the Potomac
- ______, Realistic, and Security-Focused
- Iconic DC hotel hosting NCSC LIII
Down
- Institution operating DC's 17 free museums and zoo
- Cherry _______ Trees
- National Collegiate ________ Conference
- Last name of the USG of Councils (check ncsc.modelun.org)
8 Clues: Cherry _______ Trees • DC river flowing into the Potomac • Iconic DC hotel hosting NCSC LIII • National Collegiate ________ Conference • ______, Realistic, and Security-Focused • Metro line color that takes you to DuPont • Institution operating DC's 17 free museums and zoo • Last name of the USG of Councils (check ncsc.modelun.org)
Stop Bullying 2021-11-19
Across
- a person who sees bullying and does the right thing
- a person who sees bullying and does nothing or helps the bully
- the kind of bullying involving words
- the kind of bullying when a person is left out
Down
- the kind of bullying when someone's body is hurt
- words that hurt feelings, but may not be bullying
- unkind behavior that may not be bullying
- when two people or groups are mean to each other
- the kind of bullying that happens on line
9 Clues: the kind of bullying involving words • unkind behavior that may not be bullying • the kind of bullying that happens on line • the kind of bullying when a person is left out • the kind of bullying when someone's body is hurt • when two people or groups are mean to each other • words that hurt feelings, but may not be bullying • ...
Bullying 2013-11-07
Across
- to make verbal or physical attacks on someone
- bullying that is spoken
- bullying it is a type of bullying that happens over the internet
- bullying it is a type of bullying that hurts someones feelings
Down
- someone who is harming or harassing another person
- bullying it is a type of bullying that harms another person.
- is a person who is being tormented or harassed by a bully or group of bullies
- to cause suffering to someone else
- a person who is a viewer of someone else's bullying.
9 Clues: bullying that is spoken • to cause suffering to someone else • to make verbal or physical attacks on someone • someone who is harming or harassing another person • a person who is a viewer of someone else's bullying. • bullying it is a type of bullying that harms another person. • bullying it is a type of bullying that hurts someones feelings • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : The practice of protecting devices and data from cyber threats
- : Bullying someone online through messages or social media
- : A system that blocks unauthorized access to or from a private network
- : Fake messages that try to steal passwords or bank info
Down
- : People who use the internet or computers to commit crimes
- : A harmful program that can damage files and software
- : Breaking into someone’s computer or account without permission
- : Criminal activities done using computers or the internet
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Unit 11 2023-05-10
12 Clues: Wise • Peril • Catalog • Operate • Petition • Endanger • Settle down • Impractical • Discriminating • large mass of snow • Sharp in manner or tone • Tell from right to wrong
Global Issues 2024-11-12
Loan Crossword 2024-11-01
12 Clues: Non-payment • Loan charge • Initial sum • No collateral • Loan provider • Loan recipient • Security assets • Unchanging cost • Financial score • Financial ratio • Gradual Payment • Collateral Backed
Alencar 20221103 2022-11-03
Across
- common
- improve
- exclude
- responsible for
- specially (adv)
- include
- 3 weeks ago
- power (n, fs)
- government (n, fs)
Down
- sprout, to mushroom
- non-disclosure obligation
- security
- project leader (n,ms)
- one "must"
- exaggerate
- NGO
- exaggerated (part, adj)
- sense (n, ms)
- disappear (part)
- replace
- money laundry
- to exploit
- to finish, to end something
23 Clues: NGO • common • improve • exclude • replace • include • security • one "must" • exaggerate • to exploit • 3 weeks ago • sense (n, ms) • money laundry • power (n, fs) • responsible for • specially (adv) • disappear (part) • government (n, fs) • sprout, to mushroom • project leader (n,ms) • exaggerated (part, adj) • non-disclosure obligation • to finish, to end something
Ristikko lukujen 3 ja 3.3. sanoista 2020-03-03
Across
- näky
- äärimmäinen
- saapuminen
- lähtevät lennot
- mahdollisuus,tilaisuus
- tiede
- käsimatkatavarat
- todella paljon
- varata
- laskeutuminen
- liftata
- luotettava
- suvaitsevaisuus
- turvatarkastus
- myöhässä
- tulli
Down
- verottaa
- kuljetus
- vaikutus
- viisumi
- majoitus
- matkalipun hinta
- varaus
- matkavakuutus
- kokoontuminen
- ottaa,aurinkoa
- ainutlaatuinen
- sinnikkyys, sitkeys
- etukäteen
- nousu
30 Clues: näky • tiede • nousu • tulli • varaus • varata • viisumi • liftata • verottaa • kuljetus • vaikutus • majoitus • myöhässä • etukäteen • saapuminen • luotettava • äärimmäinen • matkavakuutus • kokoontuminen • laskeutuminen • ottaa,aurinkoa • ainutlaatuinen • todella paljon • turvatarkastus • lähtevät lennot • suvaitsevaisuus • matkalipun hinta • käsimatkatavarat • sinnikkyys, sitkeys • mahdollisuus,tilaisuus
Lesson 3 spelling word activity (easy mode) 2020-04-28
20 Clues: Yummy • Pay back • LOOK OUT • not guilty • Appreciated • overwhelmed • crazy person • a safe place • Not convinced • down shut down • safe and secure • going to happen • about to happen • writing creation • already happened • scary, horrifying • imaginative story • another word for beat • cant take it very bad • tired and not mentally up to it
Dog Breeds 2023-03-25
Across
- Sled Propeller
- The Crime Dog
- Snoopy is One
- He’s a Fighter
- Peek-a-boo Hairdo
- A Footlong Hot Dog
- Firehouse Favorite
- Little Rascal Petey
- Deutschland Herder
Down
- Ears are longer then legs
- PA State Dog
- Georgia's Uga
- Lassie Lineage
- Yellow Go Getter
- Pampered Pooch
- Speed King
- Security Guard
- Ravishing Redhead
- Has an ugly Mug
- Gives Directions
20 Clues: Speed King • PA State Dog • Georgia's Uga • The Crime Dog • Snoopy is One • Sled Propeller • Lassie Lineage • Pampered Pooch • Security Guard • He’s a Fighter • Has an ugly Mug • Yellow Go Getter • Gives Directions • Ravishing Redhead • Peek-a-boo Hairdo • A Footlong Hot Dog • Firehouse Favorite • Deutschland Herder • Little Rascal Petey • Ears are longer then legs
Tobacco Tax Section 2017-06-09
Across
- cross-street
- administrative
- not tax, but
- put it in your blank and smoke it
- code to live by
- cross-border shopping
- exempt tobacco
- government project methodology
- EFR due date
- Gentax maker
Down
- V3
- common understanding
- you do this,too?
- inspectors
- special retailer
- overarching service value
- stamp colour
- market supported
- newest member
- AKA authorization
20 Clues: V3 • inspectors • cross-street • not tax, but • stamp colour • EFR due date • Gentax maker • newest member • administrative • exempt tobacco • code to live by • you do this,too? • special retailer • market supported • AKA authorization • common understanding • cross-border shopping • overarching service value • government project methodology • put it in your blank and smoke it
2nd Dec 2023- Puzzle number 336 2023-11-19
Across
- bird or toy
- roman cat
- earth apple
- wet burglar
- vowelless tomb
- number I had for dinner
- total
- rouge underwater distraction
- measures moments
- more than slow
Down
- christmas circle
- continuous wool cutting
- spicy green pepper
- archaic Saturday
- polar solvent used to hydrate
- makes milk sweet
- smith, jack, bill, head
- absence of particles
- hydrated currants
- metallic security device
20 Clues: total • roman cat • bird or toy • earth apple • wet burglar • vowelless tomb • more than slow • christmas circle • archaic Saturday • makes milk sweet • measures moments • hydrated currants • spicy green pepper • absence of particles • continuous wool cutting • smith, jack, bill, head • number I had for dinner • metallic security device • rouge underwater distraction • polar solvent used to hydrate
¿Cómo afecta la tecnología la calidad de vida? 2024-01-30
Across
- Social isolation
- Privacy
- To improve
- Inequalities
- productivity
- Employment
- Sedentary lifestyle
- Emotional well-being
- Medical devices
- Electronic devices
- Available
- Entertainment
- Efficiency
- Data
- Recreational
- -Task completion
Down
- Mental health
- Quality of life
- Concerns, worries
- Medical advances
- Social media
- Connections
- Security
- Digital divide
- Balanced
- Anxiety
- The workplace
- learning
- Tools
29 Clues: Data • Tools • Privacy • Anxiety • Security • Balanced • learning • Available • To improve • Employment • Efficiency • Connections • Social media • Inequalities • productivity • Recreational • Mental health • The workplace • Entertainment • Digital divide • Quality of life • Medical devices • Social isolation • Medical advances • -Task completion • Concerns, worries • Electronic devices • Sedentary lifestyle • Emotional well-being
TT Episode 4 2024-01-30
20 Clues: get • show • nice • fire • open • proud • awful • destroy • disease • absolutely • nature part • feel nervous • silly, stupid • drink a little • security cameras • a person who did a crime • a person looks after a school • body part you can breath through • contest who shows the best person • to debate, give reeasons to support an idea
Accept Your Own and Be Yourself 2024-06-30
Across
- capacity, dominance
- ordinariness
- The reggae Island
- depict, show
- sense of security in friendship
- not enough
- religious
- Plan
- The best
- to give yourself grace
- aid, help
Down
- give-and-take
- rapper and singer
- aim
- impassioned feeling
- slip, stagger
- formed
- young people
- above, greater
- companionship
- the spreading out of a group of people
21 Clues: aim • Plan • formed • The best • religious • aid, help • not enough • ordinariness • depict, show • young people • give-and-take • slip, stagger • companionship • above, greater • rapper and singer • The reggae Island • capacity, dominance • impassioned feeling • to give yourself grace • sense of security in friendship • the spreading out of a group of people
PLACES AT SCHOOL 2025-03-18
Across
- Lab Laboratorium IPA
- Room Ruang seni
- Post Pos keamanan
- Ruang kelas
- Field Lapangan olahraga
- Office Ruang kepala sekolah
- Taman
- Gedung olahraga
- Room Ruang musik
- Perpustakaan
- Hall Aula sekolah
- Room Mushola
- Auditorium
Down
- Kantin
- Room Ruang guru
- Kantin
- Taman bermain
- Kamar mandi
- Lab Laboratorium komputer
- Tempat parkir
- Room Ruang staf
- Laboratorium
- Room Ruang bimbingan konseling
23 Clues: Taman • Kantin • Kantin • Auditorium • Kamar mandi • Ruang kelas • Laboratorium • Perpustakaan • Room Mushola • Taman bermain • Tempat parkir • Room Ruang guru • Room Ruang seni • Room Ruang staf • Gedung olahraga • Room Ruang musik • Post Pos keamanan • Hall Aula sekolah • Lab Laboratorium IPA • Field Lapangan olahraga • Lab Laboratorium komputer • Office Ruang kepala sekolah • Room Ruang bimbingan konseling
Home Sweet Home 2025-12-04
Across
- Shelter Garage
- Skating Location Hoot Owl Pond
- Liquid Storage Oil Tank
- 1.4 Acres
- burning Fireplace
- Hall Foyer
- complication Mold
- Gates Security
- scat chamber Septic Tank
- mound Sugar Hill
- System Sprinklers
Down
- Chambers Bedrooms
- well parameters Uranium
- lake club Smoke Rise
- snake Slytherin
- Element Baseboard
- results Unsatisfactory
- enclosure Screened Porch
- Individuals Family
- Getaway Office
- disapperance zone Laundry
21 Clues: 1.4 Acres • Hall Foyer • Shelter Garage • Gates Security • snake Slytherin • Getaway Office • mound Sugar Hill • Chambers Bedrooms • Element Baseboard • burning Fireplace • complication Mold • System Sprinklers • Individuals Family • lake club Smoke Rise • results Unsatisfactory • well parameters Uranium • Liquid Storage Oil Tank • enclosure Screened Porch • scat chamber Septic Tank • ...
Animals 2025-06-24
26 Clues: king • funny • a pet • haram • racing • fastest • jumping • colorful • security • fly high • poisonous • bad voice • big animal • human like • snake enemy • danger sting • smallest one • bird on land • mindful bird • talking bird • water's queen • water and land • black and white • reptile on wall • danger in water • largest water animal
Online trust 2021-09-07
Across
- the real deal, not fake
- a person who you can trust
- Your private information that only you know
- password,key and lock, pin number
- people who share space online or in real life.
- protecting personal information
Down
- the permenant way you present yourself online
- saying who originaly created somthing
- knowing how to find information online that isn't fake
- information like your social security number that can put you at risk if the wrong people know it.
- a dihonest way to get strangers money or personal information
11 Clues: the real deal, not fake • a person who you can trust • protecting personal information • password,key and lock, pin number • saying who originaly created somthing • Your private information that only you know • the permenant way you present yourself online • people who share space online or in real life. • knowing how to find information online that isn't fake • ...
CPI New Hire 2020-10-20
Across
- Enables homeowners to answer the door and speak to visitors via two-way audio. (2 Words)
- Core Value - We will always deliver high-grade, superior products, services and communication with team members and internal and external customers. (2 Words)
- Our touchscreen all-in-one security system manufactured by2Gig.
- Provides security coverage for large windows in the home. (2 Words)
- Methods and procedures recommended by law enforcement and alarm industry professionals to reduce false alarms.
- Loud noise to alert occupants, intruders, and other nearby people that the alarm has been activated.
- The standard form of interior protection.
- Level of Protection - Window Decals and Yard Signs give an automatic warning that a potentially armed system is in the home.
- Core Value - We are truthful, sincere and forthright.
- Core Value - We agree to help others develop personally and professionally. (2 Words)
- Level of Protection - Video cameras in the home can help identify the intruder and give the police visual evidence to catch the intruder. (2 Words)
- Can tie in with other devices like the Fire Communicator and shut off the HVAC system in the event of fire to stop the spread of smoke throughout the home.
- This unit powers the app as well real-time communication during an alarm without the need for a telephone.
- Core Value - We will enjoy our work and will find ways to make everyone’s workday pleasant. (2 Words)
- The year CPI Security was founded.
Down
- Can be used throughout the home to activate a police, medical, or auxiliary alarm. (2 Words)
- Core Value - We are generous corporately and individually with our resources, time and money.
- Controls all of the components of the alarm system and communicates signals to a signal receiver such as one a central monitoring station.
- Our traditional hard-wired security system manufactured by Interlogix. This system is no longer actively installed.
- Core Value - We are free from bias, dishonesty and injustice.
- Core Value - We cooperate and coordinate efforts acting together in the interest of a common cause.
- Built in delay after the siren is activated before a signal is transmitted from the control panel. (2 Words)
- Electronic transmission of information from a control panel to a Central Monitoring Station.
- The location of our regional office in Tennessee.
- A professional emergency response center where emergency alarm signals are processed. (2 Words)
- Detects smoke and offers integrated fixed temperature monitoring and rate-of-rise heat sensor (2 Words)
- Level of Protection - door and window contacts, as well as glass breaks
- Core Value - We will hold ourselves to high ethical standards and will hold others accountable with respect to the rightness and wrongness of certain actions.
- The location of our corporate headquarters.
- User interface for alarm systems, used for end user operation, installation and repair.
- The location of our regional office in Georgia.
- Our hybrid security system manufactured by DSC. This system is designed for high-end and larger installations.
32 Clues: The year CPI Security was founded. • The standard form of interior protection. • The location of our corporate headquarters. • The location of our regional office in Georgia. • The location of our regional office in Tennessee. • Core Value - We are truthful, sincere and forthright. • Core Value - We are free from bias, dishonesty and injustice. • ...
FPEC Crossword July 2024 - I&C Abbreviations! 2023-06-14
7 Clues: Resettlement Agencies • Follow-to-Join Refugees • PRM Refugee Coordinator • Reception and Placement • Fraud Prevention and Integrity • Department of Homeland Security • Fraud Detection and National Security Directorate
Cyber safety- Alyssa Di-campli 2016-05-24
Across
- connected to a computer
- when an adult tries to start a relationship with young children by pretending to be a child
- stores information you need
- a electronic device used to keep a record of something
- make the screen smaller and save it for later
- an anonymous person who makes you upset or angry by what they say
- a secret word that gains admission to a place
- a program used to monitor what you do
- small file that gets stored on your computer
- a fraud scheme
- rooms network that lets you communicate with others
Down
- searching for information
- lets you see things you searched up before
- a thing that pops up on your screen
- computer network providing information
- message from one electronic to another
- software something that helps prevent getting viruses
- not connected to Internet
- a person who uses computers to gain important data
- explore Internet by going from link to line
- trying to find a particular thing
- can mess up your computer
- how you get in to your computer
- to publish something on to a electronic
- instructions for a app that make it work
25 Clues: a fraud scheme • connected to a computer • searching for information • not connected to Internet • can mess up your computer • stores information you need • how you get in to your computer • trying to find a particular thing • a thing that pops up on your screen • a program used to monitor what you do • computer network providing information • ...
Cyber Ethics Puzzle by Arush 2025-05-20
Across
- Footprint: The trail of data you leave behind online
- The right to keep your personal information secure
- Unwanted or junk messages, often email
- A malicious program that spreads from device to device
- Converting data into a secret code
- Moral principles governing behavior
- Permission to use or access something
- Legal protection for original creative works
- Breach: Unauthorized access to private or confidential data
- A barrier that protects a network from threats
- A mutual understanding or contract between parties
Down
- Theft: Using someone else’s personal data without permission
- Software designed to harm or damage a device
- A secret word or phrase used to access accounts
- Trick to steal personal data through fake websites or emails
- Unauthorized access to computer systems or networks
- Media: Websites and apps for sharing and interacting online
- A person who posts offensive or annoying messages online
- A dishonest scheme to trick someone for personal gain
- Online harassment or bullying using digital platforms
20 Clues: Converting data into a secret code • Moral principles governing behavior • Permission to use or access something • Unwanted or junk messages, often email • Software designed to harm or damage a device • Legal protection for original creative works • A barrier that protects a network from threats • A secret word or phrase used to access accounts • ...
AMONG US 2021-03-05
Across
- Hallway To Reactor and Laboratory
- Room, To Decontamination
- Fix Lights
- Contact Other ships
- Water Plants
- Organize Specimen
- Scan
Down
- Spawnpoint
- Chart Course
- Check Door Log
- Shoot Asteroids
- Fix Impurities
- Grab Watering Can
- Fix Meltdown
- Check Vitals
- Engine, Refuel
- Use weather Balloons To scan Weather
- Clear Air Valve
- Check Cams
- Engine, Convert Power
- Grab a drink
21 Clues: Scan • Spawnpoint • Fix Lights • Check Cams • Chart Course • Fix Meltdown • Check Vitals • Water Plants • Grab a drink • Check Door Log • Fix Impurities • Engine, Refuel • Shoot Asteroids • Clear Air Valve • Grab Watering Can • Organize Specimen • Contact Other ships • Engine, Convert Power • Room, To Decontamination • Hallway To Reactor and Laboratory • Use weather Balloons To scan Weather
Voyager 2021-04-12
26 Clues: bus • form • rain • keys • line • movie • price • pilot • plane • ticket • to eat • driver • flight • airport • customs • city map • passport • security • suitcase • to travel • to download • train station • customes agent • flight attendant • big white church in Montmartre • church with lots of stained glass that was on fire
Dilimizdeki Yabancı Kelimeler-1 2021-11-07
33 Clues: cv • maç • skor • exit • jüri • link • demo • star • full • aidat • final • online • selfie • spiker • center • puzzle • aktüel • finish • ekstra • e-mail • ice tea • asistan • spontane • objektif • security • orijinal • nick name • okeylemek • full time • part-time • alternatif • oryantasyon • start vermek
VIAJAR: VOCABULARIO 2021-11-18
20 Clues: I.D • bus • stop • Train • plane • a trip • flight • ticket • station • tourism • security • passport • roundtrip • Door or gate • TSA or Customs • taking a vacation • claiming (your baggage) • the place where planes take off from • the schedule you make when you plan a trip • the bags you use to carry your clothes and items
Jobs 2022-04-21
Across
- study at school
- set the road
- singing song on stage
- put out the fire
- correcting electricity
- dancing on stage
- heal sick people
- making bread
- flies plane
- guarding the library
- lead a school
- helping doctor
Down
- seller selling vegetables
- guard the country
- catch fish
- guard place
- design music
- shaving hair
- teaching students
- selling flowers
- heals teeth
21 Clues: catch fish • guard place • flies plane • heals teeth • set the road • design music • shaving hair • making bread • lead a school • helping doctor • study at school • selling flowers • put out the fire • dancing on stage • heal sick people • guard the country • teaching students • guarding the library • singing song on stage • correcting electricity • seller selling vegetables
values 2015-07-28
32 Clues: win • heal • fair • like • area • true • trust • group • Truth • enjoy • friend • accept • honest • create • pretty • esteem • command • popular • judgment • relatives • abundance • capability • allegiance • appreciation • surveillance • self-choices • understanding • reconciliation • skills,qualities • good-sportsmanship • accomplish-on-your-own • serving-another-person
Fixed Income Basics 2024-10-07
Across
- Inquiry
- Insurance
- Loan recipient
- Fix a trade
- Annualized percent of interest
- Not in inventory
- Compounding Interest
- Get Security
- Worst Yield
- Percentage of Face Value
Down
- Repay principal
- EDJ credit the client
- Inventory
- Par Discount
- Back at maturity
- Financial trouble
- All things equal
- Date Accrued interest starts
- CD day count
- Before maturity
- Get Account
21 Clues: Inquiry • Inventory • Insurance • Fix a trade • Get Account • Worst Yield • CD day count • Get Security • Par Discount • Loan recipient • Repay principal • Before maturity • Back at maturity • All things equal • Not in inventory • Financial trouble • Compounding Interest • EDJ credit the client • Percentage of Face Value • Date Accrued interest starts • Annualized percent of interest
Contexto 2: Las redes sociales 2025-10-08
29 Clues: link • tool • joke • ally • tweet • gossip • profile • comment • keyword • to post • network • message • to track • bullying • to block • the post • follower • to guard • security • to upload • protected • extremely • vigilance • to collect • restricted • to download • internet user • controversial • to highlight (as in to feature)
17 Security 2022-08-22
Across
- Digital ........ – an electronic document used to prove the identity of a website or individual.
- When opening a TLS session, it requires considerable computer time (due mainly to complex cryptographic processes taking place). The use of session ........ can avoid the need to utilise as much computer time for each connection.
- This type of encryption uses a secret key; the same key is used to encrypt and decrypt the encoded message.
Down
- It is the need to identify who sent the data and verify that the source is legitimate.
- This type of cryptography utilises the physics of photons (light energy according to the formula E = hf)
- Another name for a hacker
- a fixed-size numeric representation of the contents of a message produced from a hashing algorithm.
7 Clues: Another name for a hacker • It is the need to identify who sent the data and verify that the source is legitimate. • Digital ........ – an electronic document used to prove the identity of a website or individual. • a fixed-size numeric representation of the contents of a message produced from a hashing algorithm. • ...
Network Security 2021-04-18
Across
- A document most organisations have to minimise security risks.
- Way of checking to see how secure a network is by employing legitimate hackers.
- A way of turning data into an unreadable form, requiring a key before it can be read.
- A method used to restrict access based upon the person using the computer system.
Down
- Describes the process of investigating a hack to find the culprit.
- A simple way of restricting access to a network or files.
- Type of software used to guard against malware attacks.
7 Clues: Type of software used to guard against malware attacks. • A simple way of restricting access to a network or files. • A document most organisations have to minimise security risks. • Describes the process of investigating a hack to find the culprit. • Way of checking to see how secure a network is by employing legitimate hackers. • ...
network security 2022-09-27
7 Clues: networks resistance • removes malware from system • encrypted files, secret code • permission to access facilities • prevents unauthorized connections • protection of personal data, physical • collections characters, authentication
Ciber security 2020-08-20
Across
- es un software que copia información del ordenador y después transmite esa información sin que el dueño del dispositivo se entere.
- es un programa diseñado para detectar y eliminar a los virus y a otros programas que perjudican el sistema.
- es el correo electrónico no solicitado que recibe una persona. Dichos mensajes suelen ser publicidades de todo tipo.
Down
- son archivos que algunos sitios web guardan en tu dispositivo con información tuya como por ejemplo nombre del usuario, pero no te espían.
- es un sistema para que usuarios de Internet no autorizados accedan a redes privadas.
- es una estafa que tiene como objetivo obtener datos privados de los usuarios, a través de Internet. Normalmente es para acceder a tu cuanta bancaria.
- son unos programas que lo que hacen es alterar el funcionamiento del ordenador. Por lo general infectan otros archivos para destruirlos.
7 Clues: es un sistema para que usuarios de Internet no autorizados accedan a redes privadas. • es un programa diseñado para detectar y eliminar a los virus y a otros programas que perjudican el sistema. • es el correo electrónico no solicitado que recibe una persona. Dichos mensajes suelen ser publicidades de todo tipo. • ...
Food security 2024-10-01
Across
- Change – A key challenge impacting global food security through extreme weather conditions.
- – The main sector that contributes to food production.
- Aid – Emergency relief programs that provide food to those in need.
- – A condition caused by an imbalanced diet, either lacking nutrients or excessive intake.
Down
- – Farming in a way that meets current needs without compromising future generations.
- – Ensuring adequate intake of essential vitamins and minerals.
- Chain – The system involved in getting food from farm to table.
- Waste – Edible food discarded or not consumed, which could help feed people.
8 Clues: – The main sector that contributes to food production. • – Ensuring adequate intake of essential vitamins and minerals. • Chain – The system involved in getting food from farm to table. • Aid – Emergency relief programs that provide food to those in need. • Waste – Edible food discarded or not consumed, which could help feed people. • ...
Network Security 2023-06-05
Across
- A method used to encode data during storage or transmission (10)
- It refers to the right of individuals to determine what information is stored about them and how that information will be used.
- The unauthorised accessing of a computer system.
Down
- A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
- A small piece of software that uses computer networks and security holes to replicate itself. (5)
- A type of software used to protect computer systems from viruses.
- Another name for electronic junk mail.
7 Clues: Another name for electronic junk mail. • The unauthorised accessing of a computer system. • A method used to encode data during storage or transmission (10) • A type of software used to protect computer systems from viruses. • A small piece of software that uses computer networks and security holes to replicate itself. (5) • ...
Physical Security 2023-04-24
Across
- Never leave important documents behind an unlocked ____.
- Takes pictures and videos to ensure compliance and safety.
- Physical and electronic ________ should be stored in a locked cabinet or room
Down
- What do you scan to get into the building?
- _____ protectors help keep prying eyes from seeing what is on your computer display.
- Always ____ your computer when you leave it unattended.
- This type of sensor detects physical movement.
7 Clues: What do you scan to get into the building? • This type of sensor detects physical movement. • Always ____ your computer when you leave it unattended. • Never leave important documents behind an unlocked ____. • Takes pictures and videos to ensure compliance and safety. • Physical and electronic ________ should be stored in a locked cabinet or room • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- A computer program that keeps a log of your keystrokes on your keyboard.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
- A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- Protocol that is meant for uploading and downloading files.
- A bundle of programs that is designed to bombard users with advertisements.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Down
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- The process by which two information systems establish a communication channel.
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- A bridge between two networks that connects using different protocols.
- Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- A firewall setting that separates LAN of an organization from the external network.
18 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
Ethics & Compliance 2019-05-28
Across
- Attention, concern
- Care and security
- Beliefs, Integrity
- Battles, struggles
- Observance
- Nimbleness
- Honesty, honour
- Safeguard, shield
Down
- Who we are and how we strive to be everyday
- Wellbeing
- and hospitality Presents and generosity
- Behaviour
- Bravery
- Teamwork, cooperation
- Up Confidential reporting tool
- Provision, supply
16 Clues: Bravery • Wellbeing • Behaviour • Observance • Nimbleness • Honesty, honour • Care and security • Provision, supply • Safeguard, shield • Attention, concern • Beliefs, Integrity • Battles, struggles • Teamwork, cooperation • Up Confidential reporting tool • and hospitality Presents and generosity • Who we are and how we strive to be everyday
Bullying 2013-11-07
Across
- to make verbal or physical attacks on someone
- bullying that is spoken
- bullying it is a type of bullying that happens over the internet
- bullying it is a type of bullying that hurts someones feelings
Down
- someone who is harming or harassing another person
- bullying it is a type of bullying that harms another person.
- is a person who is being tormented or harassed by a bully or group of bullies
- to cause suffering to someone else
- a person who is a viewer of someone else's bullying.
9 Clues: bullying that is spoken • to cause suffering to someone else • to make verbal or physical attacks on someone • someone who is harming or harassing another person • a person who is a viewer of someone else's bullying. • bullying it is a type of bullying that harms another person. • bullying it is a type of bullying that hurts someones feelings • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : Criminal activities done using computers or the internet
- : Bullying someone online through messages or social media
- : People who use the internet or computers to commit crimes
- : Fake messages that try to steal passwords or bank info
Down
- : Breaking into someone’s computer or account without permission
- : A harmful program that can damage files and software
- : The practice of protecting devices and data from cyber threats
- : A system that blocks unauthorized access to or from a private network
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
xmas 2023-12-15
BAC 2025-09-09
12 Clues: ticket • mid-year • Security • Rule of 60 • recognition • OFS transfer • starts October • HR directed LOA • closed timesheet • your ___ account • end of employment • Virtual Assistant
Social Security Act: Retirement Benefits 2017-01-22
Across
- When do you get a social security number?
- What is the abbreviation of this New Deal?
- Up to how many years can the disposal of a financial resource prevent a person from receiving SSI benefits?
- What are your retirement benefits based of off?
- Who is eligible to apply? (except undocumented)
Down
- What month did it become a law?
- Depression Enacted during the ____________.
- Who created the social security act?
- Who is the vice president of the time?
- The program was funded by taxes on ___________.
- York Where is Roosevelt from?
11 Clues: York Where is Roosevelt from? • What month did it become a law? • Who created the social security act? • Who is the vice president of the time? • When do you get a social security number? • What is the abbreviation of this New Deal? • Depression Enacted during the ____________. • What are your retirement benefits based of off? • ...
Service Desk Puzzle 2021-01-21
Across
- Application used for e-prescribing
- System used for online learning/compliance videos
- Used by Pharmacy for workflow management and drug/dose documentation
- Image management system for OB/GYN ultrasound
- Software used by Food Services for patient diet orders
Down
- System used by Physical Security for badging, door access control, and intrusion alerts
- Cisco System that allows phone calls and work to be routed to individuals
- System used to manage schedules, call recordings, and QA processes
- Abbreviation for the Stanley Healthcare infant protection system
- Security camera monitoring software
- Medication dispensing system
11 Clues: Medication dispensing system • Application used for e-prescribing • Security camera monitoring software • Image management system for OB/GYN ultrasound • System used for online learning/compliance videos • Software used by Food Services for patient diet orders • Abbreviation for the Stanley Healthcare infant protection system • ...
Gated communities by LUDOVIC, ELIE and VADIM 2023-10-10
Across
- a rock face next to the sea
- an intermediate social class
- a people who go in the Gated community without autorisation
- do the same things everyday
Down
- a place where you can play golf
- a person who lives close to your house
- a person who assure the security in the gated commuity
- place with poor persons who lives under tin shacks
- something which divide two places, things, sides
- the verb which defined the fact to cut the grass
- it is a place for do sport
11 Clues: it is a place for do sport • a rock face next to the sea • do the same things everyday • an intermediate social class • a place where you can play golf • a person who lives close to your house • something which divide two places, things, sides • the verb which defined the fact to cut the grass • place with poor persons who lives under tin shacks • ...
Vocabulary words 2020-04-12
Across
- - angering people on videos games by cheating or being destructive
- interaction - Talking to texting people to develop friendship
- bullying - using digital devices to upset someone
- video games - a video game played through the internet
Down
- -All the ways that large groups of people share information
- A duty you have to do
- - A group of people who share the same interest
7 Clues: A duty you have to do • - A group of people who share the same interest • bullying - using digital devices to upset someone • video games - a video game played through the internet • -All the ways that large groups of people share information • interaction - Talking to texting people to develop friendship • ...
Employment Acronynms 2024-03-21
15 Clues: Q • HQ • Control QC • To Date YTD • Resources HR • Relations PR • Technology IT • Be Determined TBD • Education Unit CEU • Revenue Service IRS • Security Number SSN • Your Information FYI • Executive Officer CEO • Operating Procedure SOP • Employment Opportunity EEO
JAXIE #4 3-6-25 2025-03-06
15 Clues: a fruit • a place • a savior • old music • two parts • an animal • a vegetable • a big ledge • an instrument • by yourselves • a repeated sound • a security guard • place to put books • clothing around neck • a mountain that explodes
TEACHERS OIS 03/05/2024 2024-05-03
13 Clues: Moroko • sciencia • dratutse • Mukhidino • bombaclap • modelister • left alone • magical spanio • little commander • buddy GET LOST!!! • admin in the server • can work in security • guy with a lot of guys
Internet Safety 2023-10-02
5 Clues: Virtual _______ network • it's the name of game literally • 80% of what don't feel safe internet • somebody who steals your personal information • There is an internet underscore every 39 seconds!!!
Safer Internet Day 2023-02-06
5 Clues: (who will help you ) • ( What you should never tell anyone ) • ( People might take your private file ) • ( Never talk to any Strangers ) on Omegle • bullying (What is the word for Online bullying)
Cybersecurity 2025-08-22
Across
- collecting a user's private information.
- A collection of organized data.
- uses information illegally to harm and gain personal info
- Protecting computer systems.
- A weakness in a system that can be made use of by a threat actor.
- Someone who uses advanced computer skills to gain access to computer systems.
- uses information with permission for good reasons such as improving security.
Down
- a collection of connected computers that can share resources
- Any data that can identify a person directly or by collecting other data.
- The process to manage, maintain and secure computer.
- A security event where sensitive info is being stolen.
- discover vulnerabilities in systems without the person's permission.
- information processed by a computer.
13 Clues: Protecting computer systems. • A collection of organized data. • information processed by a computer. • collecting a user's private information. • The process to manage, maintain and secure computer. • A security event where sensitive info is being stolen. • uses information illegally to harm and gain personal info • ...
CMSC 125: Operating Systems LE04 pt 1 2017-05-17
Across
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- Bypasses CPU to transfer data directly between I/O device and memory.
- Storage structure consisting of information about a file.
- The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
- Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
Down
- Provides an object oriented way of implementing file systems.
- Is a storage made available over a network rather than over a local connection.
- Results from disk head making contact with the disk surface.
- Same key used to encrypt and decrypt.
- Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- A destructive program that masquerades as a benign application.
- Pretending to be an authorized user to escalate privileges.
- The study of codes, or the art of writing and solving them.
- Program that initates a security incident under certain circumstances.
- Intercepting an already established session to bypass authentication.
- The art of hiding messages by converting them into hidden texts.
19 Clues: Same key used to encrypt and decrypt. • Storage structure consisting of information about a file. • Pretending to be an authorized user to escalate privileges. • The study of codes, or the art of writing and solving them. • Results from disk head making contact with the disk surface. • Provides an object oriented way of implementing file systems. • ...
THE GETAWAY 2018-06-13
Across
- TRAVEL GEAR
- MAKE MILLIONS
- DISABLED
- WHAT THE PLANE IS LISTED AS
- WORK STATION
- NOT FULLY DRY
- WHERE TO CATCH YOUR FLIGHT
- HEAD OF
- COST EFFECTIVE
- TV SHOW DEATH IN ______
- WHEN YOU STAY OVER FRIENDS HOUSE
Down
- TRANSPORT
- STREAM OF MANY VEHICLES
- BAD DREAM
- SECRETARY
- WHAT TO WEAR
- NOT ON TIME
- RELATIVES
- OPPOSITE OF DOWNGRADED
- SUMMER GETAWAY
20 Clues: HEAD OF • DISABLED • TRANSPORT • BAD DREAM • SECRETARY • RELATIVES • TRAVEL GEAR • NOT ON TIME • WHAT TO WEAR • WORK STATION • MAKE MILLIONS • NOT FULLY DRY • COST EFFECTIVE • SUMMER GETAWAY • OPPOSITE OF DOWNGRADED • STREAM OF MANY VEHICLES • TV SHOW DEATH IN ______ • WHERE TO CATCH YOUR FLIGHT • WHAT THE PLANE IS LISTED AS • WHEN YOU STAY OVER FRIENDS HOUSE
Aeropuerto Vocabulario 2013-05-01
26 Clues: ID • bag • door • agent • plane • wallet • ticket • arrival • to wait • counter • costoms • to leave • passport • passenger • departure • suitcases • restrooms • to sit down • boarding pass • baggage claim • to take a trip • to begin a trip • to meet up with • to change money • to check luggage • security control
Gryffindor 2022-08-07
Across
- House founder
- friend to the twins
- Huge family
- strict animagus
- famous singer
- How many HOH
- Annoying knight
- tricksters
- main communication to family
- Security to commonroom
Down
- Primary house color
- brother of Colin
- grandpa of Harry
- house ghost
- scared but brave person
- element the house aligns
- animal
- Secondary house color
- wizard chess painting
- first female HOH
20 Clues: animal • tricksters • house ghost • Huge family • How many HOH • House founder • famous singer • strict animagus • Annoying knight • brother of Colin • grandpa of Harry • first female HOH • Primary house color • friend to the twins • Secondary house color • wizard chess painting • Security to commonroom • scared but brave person • element the house aligns • main communication to family
Dog Breeds 2024-07-16
Across
- He’s a Fighter
- Ears are longer then legs
- Georgia's Uga
- Firehouse Favorite
- Gives Directions
- Lassie Lineage
- Little Rascal Petey
- PA State Dog
- Sled Propeller
- Ravishing Redhead
Down
- Peek-a-boo Hairdo
- Deutschland Herder
- Yellow Go Getter
- Snoopy is One
- The Crime Dog
- Security Guard
- Has an ugly Mug
- Speed King
- A Footlong Hot Dog
- Pampered Pooch
20 Clues: Speed King • PA State Dog • Snoopy is One • Georgia's Uga • The Crime Dog • He’s a Fighter • Security Guard • Lassie Lineage • Pampered Pooch • Sled Propeller • Has an ugly Mug • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • Firehouse Favorite • A Footlong Hot Dog • Little Rascal Petey • Ears are longer then legs
10.1 vocabulary 2023-03-14
23 Clues: ATM • gate • plane • flight • customs • arrival • to lose • counter • suitcase • to pick up • to wait for • don't worry • waiting room • boarding pass • pass by/go by • baggage claim • to take a trip • to change money • to leave behind • to stand in line • to pack your bags • around the corner • security checkpoint
Supreme: 17강 2024-10-31
28 Clues: 기관 • 저주 • 평등 • 들다 • 실업 • 인기 • 지역 • 보안 • 전문가 • 공식적인 • 다가오는 • 제출하다 • 유래하다 • 사라지다 • 참가하다 • 확인하다 • 선언하다 • 참석하다 • 작업하다 • 재검토하다 • 현지의, 지역의 • 굴욕감을 느끼는 • 기준에 부합하는 • 물리치다, 이기다 • 고약한 냄새가 나다 • 관습, 연습/훈련하다 • ~으로부터 고통을 겪다 • 궤도, (궤도를) 돌다
Propelling Smart Growth 2021-04-08
Digital Literacy - zara 2024-06-17
Across
- A group of computers all being controlled by a remote hacker to perform illegal activity. Get it by hackers exploiting security holes especially if you don’t do windows updates and antivirus software.
- Usually in an email. Tries to trick you into telling your passwords or credit card info. Can link you to fake sites that look like real sites and ask you to log in, but steals your info. Comes by email or phone. Just don’t trust people.
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it. Almost anyone can be targeted.
- If you think any of these are suspicious, delete them and do not open them
- It is forever
- Make sure these are strong and different for every site
- Keeps track of every key you type and sends it to the hacker. You’re vulnerable to it any time you use a public computer. Also same way as getting other malware, it could be installed on your own computer.
- Displays ads on your computer. May slow down your computer, use internet bandwidth, make you exceed data caps. Usually get it by clicking on ads online. May come bundled with other software.
Down
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files.
- Be careful when installing this when you have this downloaded. Pre-scan it. If it is a hacked version, remember that if they could hack the security of that software, they can probably also add code to hack the security of your computer.
- Make sure your computer has the latest one of these
- When someone gets your personal info (like username/pwd/bank info etc) and then does things pretending to be you. (ex. access your files/friends/bank, steal your stuff, do illegal activities as you).
- Blocks you from accessing your files until you pay a ransom. Get it by hackers exploiting weaknesses in your security, especially if you don’t have windows updates and antivirus software.
- Is the use of technology to harass, threaten, embarrass, or target another person
- Reads everyone’s data that is passing through a network. Usually on public WiFi. Can steal your passwords. You’re mostly vulnerable when using public wifi.
- Like the Trojan Horse. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer. Get it from downloading things you think are good.
- Spreads through networks and emails infecting as many computers as possible. Can carry a virus, trojan or other malware. Get it through email.
- Spies on you, stealing information like passwords and credit card numbers. It sometimes comes bundled with other software or freeware. Or get it from opening links and email attachments from questionable sources. Can also infect computers without the latest updates.
18 Clues: It is forever • Make sure your computer has the latest one of these • Make sure these are strong and different for every site • If you think any of these are suspicious, delete them and do not open them • Is the use of technology to harass, threaten, embarrass, or target another person • ...
The Financial Vault Quiz 2018-02-26
Across
- An omnibus account is normally overseen by a ____ manager
- When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
- It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
- The _____ the volatility, the riskier the security.
- A minimum of ___ persons are required to create an omnibus account
- The sale of a security that is not owned by the seller or that the seller has borrowed
- It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
- Short selling is motivated by the belief that a security's price will ____
- The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
- Portfolios that lie below the efficient frontier are
- Account Is an account between two futures merchants (brokers)
- Employee’s Provident Fund is maintained and overseen by the ___
- One measure of the relative volatility of a particular stock to the market is its
13 Clues: The _____ the volatility, the riskier the security. • Portfolios that lie below the efficient frontier are • An omnibus account is normally overseen by a ____ manager • Account Is an account between two futures merchants (brokers) • Employee’s Provident Fund is maintained and overseen by the ___ • A minimum of ___ persons are required to create an omnibus account • ...
Bullying 2020-06-07
Across
- This bullying makes people lonely and sad and depressed.
- its bad otherwise the person you hurt will become
- you.
Down
- This bullying is very bad because it makes people sad,scared.
- This bullying makes people sad and depressed
- can not only mentally hurt someone but get people physically hurt.
- they bully you with a screen.
7 Clues: you. • they bully you with a screen. • This bullying makes people sad and depressed • its bad otherwise the person you hurt will become • This bullying makes people lonely and sad and depressed. • This bullying is very bad because it makes people sad,scared. • can not only mentally hurt someone but get people physically hurt.
Airport 2025-02-20
Across
- Essential skill for handling crises effectively
- What teams must solve quickly in high-pressure situations
- Essential document for international travel
- Ensures safety by screening passengers and luggage
- Process of checking baggage for security threats
Down
- Home to the world's tallest indoor waterfall at Changi
- The region where planes take off, fly, and land
- Making sure rules and safety measures are followed
- The study of crime and how to prevent it
- Enforce airport laws and maintain public order
10 Clues: The study of crime and how to prevent it • Essential document for international travel • Enforce airport laws and maintain public order • Essential skill for handling crises effectively • The region where planes take off, fly, and land • Process of checking baggage for security threats • Making sure rules and safety measures are followed • ...
SAPM 2025-08-07
Across
- The systematic risk of a security relative to the market
- Collection of assets held by an investor
- The risk that can be eliminated through diversification
- The measure of variability or dispersion of returns
Down
- Risk affecting all securities in the market
- The market where previously issued securities are traded
- A fixed income security
- Profit from investment
- Financial asset representing part ownership in a company
- Approach to estimate the required return using risk-free rate and beta
10 Clues: Profit from investment • A fixed income security • Collection of assets held by an investor • Risk affecting all securities in the market • The measure of variability or dispersion of returns • The risk that can be eliminated through diversification • The market where previously issued securities are traded • The systematic risk of a security relative to the market • ...
Financial Math Extra credit 2021-09-17
Across
- taxes- Social security and medicare taxes are paid for by FCIA taxes
- Taxable income- a percentage of each worker's salary is taken out of each paycheck,up to a maximun amount per year
- They are paid by production rather then the length of time it takes them to do the job
- Security- insurance program available through U.S. government that provides retired, disabled, or who needs survivors benifits. Covers 90 percent of all american jobs
- Nations largest health insurance program for people 65 years or older and some disabled people under 65
Down
- rate- Pieceworkers are paid a certian amount of money called a.
- earns more money as more sales are made
- security number- a unique 9 digit number that belongs only to you
- A fee-based advisor charges a flat rate for managing a client's money.
- contribution insurance act- FCIA
10 Clues: contribution insurance act- FCIA • earns more money as more sales are made • rate- Pieceworkers are paid a certian amount of money called a. • security number- a unique 9 digit number that belongs only to you • taxes- Social security and medicare taxes are paid for by FCIA taxes • A fee-based advisor charges a flat rate for managing a client's money. • ...
the best goated awesome cross word 2023-01-25
Across
- occurs when there are insufficient authorization checks for sensitive request handlers.
- The act of contaminating with dust particles solar_activity The sun is a magnetic variable star that fluctuates on times scales ranging from a fraction of a second to billions of years. Solar flares, coronal mass ejections, high-speed solar wind, and solar energetic particles are all forms of solar activity.
- Any malware that misleads users of its true intent.
- A message warning the recipients of a non-existent computer virus threat.
- 2 words, is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, an electrical short or dielectric breakdown.
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
- when an organization unknowingly exposes sensitive data or when a security incident leads to the accidental or unlawful destruction
- a type of access control vulnerability in digital security.
- A security misconfiguration arises when essential security settings are either not implemented or implemented with errors.
- Advance fee fraud, also called upfront fee fraud, is any scam that, in exchange for a fee, Promises to send you money, products, or services; Offers you the opportunity to participate in a special deal phishing The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a type of security vulnerability that can be found in some web applications.
- The sun is a magnetic variable star that fluctuates on times scales ranging from a fraction of a second to billions of years. Solar flares, coronal mass ejections, high-speed solar wind, and solar energetic particles are all forms of solar activity. advanced-fee_fraud Advance fee fraud, also called upfront fee fraud, is any scam that, in exchange for a fee, Promises to send you money, products, or services; Offers you the opportunity to participate in a special deal
- Software with malicious behavior that’s goal is to gather information about a person and send it to another entity in a way that harms the user.
- A type of malware that is programmed to repeatedly mutate its appearance or signature files through new decryption routines.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
15 Clues: Any malware that misleads users of its true intent. • a type of access control vulnerability in digital security. • A message warning the recipients of a non-existent computer virus threat. • a type of security vulnerability that can be found in some web applications. • occurs when there are insufficient authorization checks for sensitive request handlers. • ...
ICS133: Computer Security Crossword Puzzle 2017-04-23
Across
- A Public-Key Cryptography that encrypt data readable only by the recipient and verify that particular sender encrypted a particular message.
- It is a running program.
- A type of error that fails to detect a match between a credential and the database.
- An Industry Security Standards from a family of international standards for security system quality improvement.
- A ____________ attack uses a list of likely passwords as the password space.
- A stronger secret key building blocks that use wrapping technique to protect keys carried in network messages.
- A level of motivation that applies effort, but avoids social stigma.
- A stronger secret key building blocks where the center distributes wrapped keys and authorized users to share a secret with it.
- A US Government standards for financial and accounting standards for public companies. (Acronym)
- It is the amount of lead time required to set up the attack.
- A transport layer security that was developed by netscape in 1994 and is a part of commercial client or server Web package. It is the first really successful public-key application.
- An Industry Security Standards that uses the banking industry to protect electronic funds transfers.
- The most secure type of token that stores a secret that generates a different credential for each login.
- An attack on DNS where the resolver receives a bogus response to a DNS request.
- A US Government security standards for certain types of personal health data. (Acronym)
- The most common type of token that stores an unchanging credential.
- A tailored policy where it share some blocked files.
- It is a group of instructions.
- A type of error that incorrectly detects a match with a credential and the database.
- The __________ procedure in the operating system (OS) switches running processes.
- "Data in motion", A basic state that is being moved from one place to another.
- A Public-Key Cryptography that constructs a shared secret from information shared in public.
- A tailored policy where it block some files from sharing.
- A US Government standards for protecting personal financial information. (Acronym)
- A modern malware where a botnet and spam package that used to produce 7 million messages a day.
Down
- A malicious software is called a _______.
- It is the number and types of people required for the attack.
- It summarizes the attack in the Attack Case Study.
- A modern malware that attacks control logic in industrial plants.
- A stronger secret key building blocks that generate a new key using a one-way hash.
- It is the first major Internet worm in 1988 that disabled about 10% of Internet computers.
- A tailored policy where it gives full rights for some users.
- A global policy that let users share their files
- "Data at rest", A basic state that stores data or information in a computer and is not being processed.
- A policy alternative that modify rights for specific sets of files.
- _______ ____________ are stored in a control section and executed by the CPU.
- It is the brief description of threat agent in the Attack Case Study.
- A level of motivation that will exploit minor vulnerabilities.
- A policy alternative that applied to all users by default.
- A modern malware that creates botnet focused on financial fraud.
- A global policy that keep users separate
- It uses a PRNG to transform the current key into a new one and separate endpoints that can apply the same PRNG to yield the same key.
- A US Government security standards for federal computer systems. (Acronym)
- A basic state that is being used by an active process and is usually stored in RAM.
- A ____ _______ prevents a sender from sending data transfer than the recipient can handle it.
- A modern malware that – spreads through email and creates a botnet that spreads spam and more malware.
- acceptance rate The likelihood of incorrectly authenticating someone as an authorized user.
- An Industry Security Standards that is used by “Payment Card Industry” to protect credit card transactions.
- A modern malware that spreads through the Internet via Windows vulnerabilities and created a botnet used for spam and malware distribution.
- _______ contain text interpreted by a programming language interpreter.
50 Clues: It is a running program. • It is a group of instructions. • A global policy that keep users separate • A malicious software is called a _______. • A global policy that let users share their files • It summarizes the attack in the Attack Case Study. • A tailored policy where it share some blocked files. • A tailored policy where it block some files from sharing. • ...
Puzzle #8 – “COLA (Cost-of-Living Adjustment)” 2025-06-29
Across
- - Agency that announces the COLA each year
- - This grows when COLA is applied
- - Month when COLA changes typically take effect
- - What COLA causes to your Social Security payments
Down
- - A statistical measure used to determine COLA
- - What COLA is meant to adjust for
- - COLA is calculated as this type of number
- - COLA helps benefits match this rise in prices
- - COLA is based on this type of price index
- - Annual Social Security increase to keep up with inflation
10 Clues: - This grows when COLA is applied • - What COLA is meant to adjust for • - Agency that announces the COLA each year • - COLA is calculated as this type of number • - COLA is based on this type of price index • - A statistical measure used to determine COLA • - COLA helps benefits match this rise in prices • - Month when COLA changes typically take effect • ...
Expert 2024-12-27
Across
- A software fix that addresses a security vulnerability.
- Malware that encrypts your files and demands payment.
- An authentication method requiring two or more factors.
- A secure, isolated environment for testing code.
- A device that connects to a network.
- A security protocol that eliminates passwords.
Down
- A method where malicious code is inserted into a query.
- The person or group responsible for an attack.
- Measures taken to prevent or respond to threats.
- Unauthorized access into a system.
10 Clues: Unauthorized access into a system. • A device that connects to a network. • The person or group responsible for an attack. • A security protocol that eliminates passwords. • Measures taken to prevent or respond to threats. • A secure, isolated environment for testing code. • Malware that encrypts your files and demands payment. • ...
Week 7 PASS AF208 Crossword 2024-03-28
Across
- value is used to determine the dollar value per share.
- is a price a trader is willing to accept to sell a security.
- shares that are hybrid securities that have features of both debt and equity
- is the price a trader is willing to pay for a security.
- value of a security is the PV of expected future cash flows discounted at the investor’s required rate of return.
- is the worth of an asset to an individual.
Down
- are tradable instruments that represent an ownership interest or the right to receive payment on a debt.
- is the stated rate of interest paid on the bond.
- is the amount of money needed to acquire an asset.
- normally pays a regular income stream (the coupon) and has a face value that is repaid to the holder at maturity.
10 Clues: is the worth of an asset to an individual. • is the stated rate of interest paid on the bond. • is the amount of money needed to acquire an asset. • value is used to determine the dollar value per share. • is the price a trader is willing to pay for a security. • is a price a trader is willing to accept to sell a security. • ...
UW Social 2025-09-10
Across
- we're adversaries but we can work on this together
- amount between "ouch" and "thank goodness for coverage"
- proof you wave around to prove you're covered
- the "I survived insurance school" badge
- most likely to Irish goodbye
- the "winter is coming" magnitude loss
- online oopsie insurance
- coverage that only works if it's on the guest list
Down
- extra protection not only in the rain
- when an UW says "thanks but no thanks"
- you may check out at any time you like (with CL) but you may never leave (me)
- no crystal ball but we try to predict with Excel
- pays the bills when your shop is closed but rent is still due
- loves wood houses more than concrete blocks
- your friendly neighbourhood task distributor
- promise to make you whole again but not richer
16 Clues: online oopsie insurance • most likely to Irish goodbye • extra protection not only in the rain • the "winter is coming" magnitude loss • when an UW says "thanks but no thanks" • the "I survived insurance school" badge • loves wood houses more than concrete blocks • your friendly neighbourhood task distributor • proof you wave around to prove you're covered • ...
Safety 2024-12-10
14 Clues: H2O • atlas • tissues • sheltered • warm wrap • cotton wrap • sulfurous light • sharp edged tool • computer security • power outage light • Olympic flame lighter • neither X-ray nor Gamma • hot chocolate container • construction tool a with claws
Five night's at freddy's 2023-12-14
14 Clues: pizza • Gutiar • creater • arghhhh! • Balloons! • music box • brown bear • yellow bear • Burned bunny • Yellow rabbit • i am in fnaf 4 • williams friend • Whats on chicas hand? • i am one of the security breach villains
phoenix 2 2022-10-31
14 Clues: seminar • scan in • newspaper • free period • solomen terzi • chested hours • security guard • test week month • google classroom • overpriced grapes • coffee and bagels • when you cut class • rabbi besser's specialty • outdoor ceiling outside of Crawfords
Cyber Law (Component 1 Crossword) 2021-09-07
Across
- Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
- The process where companies, industries, countries increase the use of digital or computer technology.
- The approach of these set of people is the the cyber space is a distinct space and it cannot be regulated.(no space in the answer)
Down
- _______ is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- The act of sending unsolicited email which are especially commercial messages.
- _____ was the first type of media to be digitized and has been around for more than 5000 years.
- ________V_______is the case in which the Supreme Court of America unanimously held that the provisions of Communications decency act (CDA), 1996 as unconstitutional as it restricted free speech with respect to the First Amendment.(Answer is a short for and it contains V (versus))
- ________ is a proven technology that lets anyone place phone calls over an internet connection. Eg: Skype and Facebook.
- Lawrence Lessig claims that the Internet behaviour can be regulated by four constraints namely the law, architecture, social norms and __________.
- ___________ ____ theory put forward by Lawrence Lessig in regards with constraints as a means of regulation.(no space in the answer)
10 Clues: The act of sending unsolicited email which are especially commercial messages. • _____ was the first type of media to be digitized and has been around for more than 5000 years. • _______ is one such constraint in cyber space which allows us to regulate the principle of anonymity. • ...
Ipo rossword puzzle 2021-09-13
Across
- A derivative is a complex type of financial security that is set between two or more parties.
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a service charge assessed by a broker or investment advisor.
- a security that represents the ownership of a fraction of a corporation.
- Electronic Data Gathering, Analysis, and Retrieval system
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
Down
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- Mark Zuckerberg
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
- a sales pitch or promotion made by the underwriting firm, usually on the road
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- Capital stock is the amount of common and preferred shares that a company is authorized to issue
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
Anti-Bullying 2013-11-07
Across
- Someone who you should talk to when getting bullied
- Someone that continuously is mean to someone else
- A type of bullying when the victim is punched by the bully
- someone who see bullying but does nothing about it
- Is the target of a bully
Down
- the conscience of being bullied
- A type of bullying when the bully is saying mean things to the victim
- The type of bullying that is over the internet
- someone who can help the bullying stop
9 Clues: Is the target of a bully • the conscience of being bullied • someone who can help the bullying stop • The type of bullying that is over the internet • Someone that continuously is mean to someone else • someone who see bullying but does nothing about it • Someone who you should talk to when getting bullied • A type of bullying when the victim is punched by the bully • ...
Network 2015-05-11
Across
- is a computer circuit board or card that is installed in a computer so that it can be connected to a network
- What passes on all the data to all the computers?
- what can you use to protect yourself from cyber crime?
- What is topology cheap to install and doesn't require terminators?
Down
- What does LAN stand for?
- What is another word for Network interface card?
- What does WAN stand for?
- What topology is cheap to install and require terminators?
- what topology that requires the most cables?
9 Clues: What does LAN stand for? • What does WAN stand for? • what topology that requires the most cables? • What is another word for Network interface card? • What passes on all the data to all the computers? • what can you use to protect yourself from cyber crime? • What topology is cheap to install and require terminators? • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Digital Footprint 2019-11-06
Across
- Someone who has the power to report and stop bad behavior, but does not.
- to create an unpleasant or hostile situation
- The process of adding geographical identification to various media.
Down
- Of the culture of computers, information technology, and VR.
- People who intervene and stop inappropriate behavior
- Mass e-mail messages you are forced to read (ads)
- Rule/ One way to tell if a post is appropriate to post.
- To prevent someone from accessing your profile
- Footprint/ Everything on the internet that is about you.
9 Clues: to create an unpleasant or hostile situation • To prevent someone from accessing your profile • Mass e-mail messages you are forced to read (ads) • People who intervene and stop inappropriate behavior • Rule/ One way to tell if a post is appropriate to post. • Footprint/ Everything on the internet that is about you. • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
cyber 2024-08-29
Panda Search 2018-04-12
15 Clues: taken • title • trade • author • to find • famous zoo • standing out • stolen panda • find an answer • law enforcement • owner of the zoo • zoo owner's rival • security guard at zoo • daughter of the zoo's owner • Main character, crime solver
