cyber security Crossword Puzzles
Privacy Day Crossword 2022-12-07
Across
- Acronym for the international standard development organization publishing norms related to privacy, security and information management.
- If you suspect a privacy or security breach, you must report it immediately to___@bmc.com.
- My date of birth is an example of___data.
- Process by which a readable message is converted to an unreadable form, to prevent unauthorized parties from reading it.
- The GDPR sets a maximum___of €20 million or 4% of annual global turnover.
- Acronym for the European general data protection law entered into force in 2018.
- Lawyer and activist who became famous suing Facebook in Europe for privacy violations.
- _ is responsible for data security & privacy.
- Acronym for California’s privacy law approved in November 2020.
- Sending fraudulent messages to steal confidential information such as login credentials is also called___.
Down
- Medical records, political opinions, biometrics are examples of___personal information.
- Acronym for BMC’s Lead Data Protection Authority in Europe.
- Small text files that may be placed on your computer by websites that you visit.
- ___from individuals is necessary for email marketing campaigns.
- The right to be___is when you can ask an organisation that holds data about you to delete that data.
- Acronym for the ‘gold standard’ transfer mechanism, which BMC has since 2015.
- Data___is any entity that processes personal data on behalf of and as instructed by the data controller.
- What the P stands for in LGPD, the statutory law on data protection and privacy in Brazil.
- Privacy by___means that the privacy protection rules are taken into account already when IT systems and procedures are designed.
- Right to be let alone, or freedom from interference or intrusion.
20 Clues: My date of birth is an example of___data. • _ is responsible for data security & privacy. • Acronym for BMC’s Lead Data Protection Authority in Europe. • ___from individuals is necessary for email marketing campaigns. • Acronym for California’s privacy law approved in November 2020. • Right to be let alone, or freedom from interference or intrusion. • ...
Chapter 2 2022-11-22
Across
- Stock Exchanges
- Largest category of deposit institution.
- A financial institution that provides services for businesses.
- A document guaranteeing payment of a specific amount of money.
- Money for real estate, equipment, and so on.
- A document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
- Those people who do the work.
- A financial institution that makes money by using loans.
- People who lend money to the business in return for a contracted rate of interest or return for their investment.
- Someone who assists you with purchasing stocks and bonds.
- Over-the-counter (OTC)
- Federal Deposit Insurance Corporation
- Largest category of deposit institution.
Down
- A bank account is used by depositors to accumulate money for future use.
- People who buy shares of stock in the company.
- Any organization that provides services related to money.
- Publicly traded corporations are required to have their annual reports prepared by an outside accounting firm.
- Stock Exchanges
- People who buy shares of stock in the company.
- For-profit businesses that sell insurance products.
- A security that pays interest over terms of ten to thirty years.
- Shares can be traded openly.
- A security that matures in a year or less.
- A written order for the bank to pay a specific amount to the person or organization to which the check is written.
- A type of EFT transaction, money is deposited directly into a customer's checking account.
- Allows customers to pay for purchases and withdraw cash.
- An action to manage supply of money and interest.
- A security that pays interest over terms ranging from two to ten years.
- A bank account that allows the account owner to make deposits, write checks, and withdrawl money.
- A prearranged amount of credit that is available for a business to use as needed.
30 Clues: Stock Exchanges • Stock Exchanges • Over-the-counter (OTC) • Shares can be traded openly. • Those people who do the work. • Federal Deposit Insurance Corporation • Largest category of deposit institution. • Largest category of deposit institution. • A security that matures in a year or less. • Money for real estate, equipment, and so on. • ...
ITS2210 Module 6 Crossword 2019-04-02
Across
- Using interpersonal skills to extract information about a computer system and its security
- Perform system patches, probe for flaws, check logs, and review policies
- the most basic rule of computer security is to install these
- The minimum frequency for system probing and audits
- A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- One who hacks into systems to accomplish some goal that they feel is ethically valid
- The most prestigious certification for networking professionals
- The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
- this should be done to large networks to break them up into more manageable networks
- A reference to how long a user has used a password
Down
- Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
- preferred location for storing backups
- Hackers who hack only for legal/ethical purposes
- To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
- The process to scan a network looking for vulnerabilities
- One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- A numerical designation for a connection point on a computer
- Someone who attempts to compromise a system to assess its vulnerability
- this should be done to all unneeded programs/software on a server
- the six Ps of security are: ports, patch, _____, probe, policies, physical
20 Clues: preferred location for storing backups • Hackers who hack only for legal/ethical purposes • A reference to how long a user has used a password • The minimum frequency for system probing and audits • The process to scan a network looking for vulnerabilities • the most basic rule of computer security is to install these • ...
PC Pro Chapter 7 2020-02-03
Across
- A profile designed for use on unknown networks.
- A smart speaker that controls your smart appliances and performs other actions through voice commands
- A profile designed to be used in a SOHO.
- A network devices that connects Wi-Fil devices to forma Wi-Fi network
- The internet of things.
- An optional component of the 802.11 specifications.
- A method for remapping one IP address space into another by modifying network address information in packets' IP headers while they are in transit.
- A small office/home office network.
- Communication technology that enables communication between two devices in close proximity.
- A wireless network access protocol that uses WEP.
- Communication technology that uses radio waves in the 2.4 ghz range
- Communication technology that uses invisible light waves.
- A network security standard for wireless home networks
- A wireless security that adheres to 801.11i specifications
- An IoT standard based protocol.
Down
- An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network.
- An enhancement to MIMO that allows a set of devices with individual antennas, rather than just one device with an antenna, to communicate with each other.
- IoT standard based protocol. Simpler and less expensive than Zigbee.
- The network name
- A wireless security based on 802.11i specifications
- An enhancement that allows multiple antennas to use the same radio frequency
- An authentication standard that uses username/passwords, certificates, or devices such as smart cards to authenticate clients.
- A temporary peer-to-peer mode network
- An token-based authentication standard that requires a MAC address to use.
- A profile designed for networks in which you know and trust every device
- Combining channels into one to increase bandwidth
26 Clues: The network name • The internet of things. • An IoT standard based protocol. • A small office/home office network. • A temporary peer-to-peer mode network • A profile designed to be used in a SOHO. • A profile designed for use on unknown networks. • Combining channels into one to increase bandwidth • A wireless network access protocol that uses WEP. • ...
Unit 7 2023-02-24
Across
- the process of making connections and building relationships
- Income includes your wages, dividends, capital gains, business income, retirement distributions as well as other income
- Letter tter sent with, and explaining the contents of, another document
- Market the supply of and demand for labor, in which employees provide the supply and employers provide the demand
- Insurance A contract that requires your health insurer to pay some or all of your
- Wage the minimum amount of money someone can make
- mention or refer to
- a meeting usually face to face especially for the purpose
- a sum of money paid to an employee upon completion of a task, usually selling a certain
- money or value that an individual or business entity receives in exchange for providing a good
- U.S. federal payroll tax
- the average wage for a worker in a specified position or occupation,
- of Recommendation a letter written on behalf of an applicant by someone who can vouch for that person's educational
Down
- the practicing of an activity, especially a sport, by professional rather than amateur players.
- a professional learning experience that offers meaningful, practical work related to a student's field of study or career interest.
- business, calling, métier, occupation, pursuit, and work
- document summarizing a person's professional and academic background, relevant skills, and accomplishments
- Plan individual retirement accounts
- the amount of money you make
- Income type of tax that governments impose on income generated by businesses and individuals within
- 65 or older
- Skills people skills
- Security Social Security” is the term used for the Old-Age, Survivors, and Disability Insurance (OASDI) program in the United States, which is run by the Social Security Administration (SSA), a federal
23 Clues: 65 or older • mention or refer to • Skills people skills • U.S. federal payroll tax • the amount of money you make • Plan individual retirement accounts • Wage the minimum amount of money someone can make • business, calling, métier, occupation, pursuit, and work • a meeting usually face to face especially for the purpose • ...
AWS CP CW 1 2023-06-29
Across
- an intelligent threat detection system that uncovers unauthorized behavior
- offers on-demand access to aws security and compliance reports
- a dns service that routes users to applications
- this pillar focuses on environmental impact, especially energy consumption and efficiency
- allows you to assess, audit, and evaluate the configurations of your resources
- helps you control access to mobile and web applications
- causes a traffic jam on a website or application in an attempt to cause it to crash
- helps you discover and protect sensitive data
- allows you to generate and store encryption keys
- upgrades an existing instances
- this pillar focuses on designing systems that work consistently and recover quickly
- this pillar focuses on putting mechanisms in place that help protect your systems and data
- giving a user the min access required to get a job done
Down
- helps protect your web application against common web attacks
- used to describe design principles and best practices for running workloads in the cloud
- provides recommendations that help you follow AWS best practices
- models the shared security of the cloud
- this pillar focuses on creating applications that effectively support production workloads
- this pillar focuses on delivering optimum and resilient solutions at least to the cost to the user
- adds or replaces instances
- automatically distributes your incoming application traffic across multiple ec2 instances
- this pillar focuses on the effective use of computing resources to meet system and business requirements while removing bottlenecks
- adds or replaces ec2 instances across AZs, based on need and changing demand
- a managed ddos protection service
- allows you to manage and retrieve secrets
- works with ec2 instances to uncover and report vulnerabilities
26 Clues: adds or replaces instances • upgrades an existing instances • a managed ddos protection service • models the shared security of the cloud • allows you to manage and retrieve secrets • helps you discover and protect sensitive data • a dns service that routes users to applications • allows you to generate and store encryption keys • ...
RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30
Across
- Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
- Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
- Conducting meetings between people in different locations using video and audio connections.
- Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
- The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
- The science or practice of encoding information to prevent unauthorized access, especially in information security.
- Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
- Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
- The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
- Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
- Employing data and algorithms to create models that predict future outcomes or behaviors.
- The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
- Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
- The commitment to complying with established standards, specifications, or regulations.
- Catering to a specific segment or group with unique preferences or needs.
- The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
- Alternative problem-solving methods employed when conventional approaches fail.
- The capability of being customized or adapted to suit individual preferences or needs.
- Losing interest or focus during discussions, indicating a lack of engagement or understanding.
- A systematic approach or set of procedures for solving a problem or accomplishing a task.
20 Clues: Catering to a specific segment or group with unique preferences or needs. • Alternative problem-solving methods employed when conventional approaches fail. • The capability of being customized or adapted to suit individual preferences or needs. • The commitment to complying with established standards, specifications, or regulations. • ...
Investment Unit 2024-03-20
Across
- The top 500 hundred stocks
- it represents a loan from a buyer to the issuer of the bond
- Someone who invest in the market long term
- What is Crypto backed by
- the age you can claim social security benefits
- take cash from a large group of investors and invest in stocks and bonds
- you get the money when you cant work anymore
- Long term goals with a time horizon of 10-16 years
- Companies will often match you contribution up to a certain percentage
- Market is rising 20% from resents
- the age that you can start investing
- Currencies backed by government but not physical commodity
- Someone who buys stocks low and sells high
- Social security and medicare together is called
- What category of investing does crypto fall under
Down
- Issued by the Government and no interest is paid
- A security that represents the ownership of a fraction of a corporation
- short term goal have more liquid
- the increase of value of an asset
- something that does not directly involve the company like pandemic
- the distribution of some of a company's earnings to a class of shareholder
- You can put 7000 dollars pre-taxed per year
- Money you contribute goes in after tax
- Market is down 20% from recent highs
- How old you have to be to withdraw from an IRA
- many unionized workforce's have this
- Sum of money saved and available for a particular purpose
- tells us how big the company is in the stock market
- Investing all the money you have available at the given time into the market
- Letters and symbols of a companys stock
30 Clues: What is Crypto backed by • The top 500 hundred stocks • short term goal have more liquid • the increase of value of an asset • Market is rising 20% from resents • Market is down 20% from recent highs • many unionized workforce's have this • the age that you can start investing • Money you contribute goes in after tax • Letters and symbols of a companys stock • ...
Ch 3 Crossword 2024-11-14
Across
- Taxes paid by the employee and employer that are used to finance the federal Social Security and Medicare programs; also known as Social Security and Medicare taxes.
- Money added to an employee’s base pay.
- wage- Amount paid for working time in a week that is beyond the standard 40-hour workweek.
- balance- Amount of time an individual spends at work compared to the amount of time spent in a personal life.
- Subtraction from gross pay.
- Earnings from sources other than work.
- Income paid as a percentage of sales made by a salesperson.
- Form of noncash compensation received in addition to a wage or salary; also known as fringe benefit.
- Fixed payment for work expressed as an annual figure.
- Payment for work that is usually calculated on an hourly, daily, or piecework basis.
- Amount on which taxes are calculated.
- Gross pay (plus bonuses) minus payroll deductions; also known as take-home pay.
- Money paid for service beyond what is required; also known as gratuity.
Down
- Wages or salaries and benefits paid to employees.
- Employee’s Withholding Certificate that helps an employer determine how much income tax to withhold from an employee’s paychecks as payroll deductions.
- All the income an individual receives in a year including both earned and unearned income.
- Wage based on a rate per unit of work completed.
- Total income before payroll deductions.
- Government expects individuals and businesses to voluntarily report all income that is subject to the income tax.
- Wage and Tax Statement that shows your earnings and the amounts of income, Social Security, and Medicare taxes withheld from your earned income during the year.
- Income received from employment, including self-employment.
- return- Report containing information used to calculate taxes owed by the taxpayer.
22 Clues: Subtraction from gross pay. • Amount on which taxes are calculated. • Money added to an employee’s base pay. • Earnings from sources other than work. • Total income before payroll deductions. • Wage based on a rate per unit of work completed. • Wages or salaries and benefits paid to employees. • Fixed payment for work expressed as an annual figure. • ...
Cloud Deployment Essentials Crossword 2025-03-07
Across
- A system for managing users and their access permissions in the cloud.
- The practice of distributing workloads across multiple servers to prevent overload.
- Storing multiple copies of data to prevent failure-related losses.
- A method of storing data as independent units rather than in files or blocks.
- The process of reducing downtime when moving systems to the cloud.
- A service that logs and records user activities to track security issues.
- The process of modifying applications to fully utilize cloud-native features.
- A way to store and organize files using directories like on a traditional system.
- A method of storing backup data in remote servers to prevent data loss.
- The duplication of data across locations to improve reliability.
- A tool that allows multiple operating systems to run on a single physical machine.
- The act of determining which applications should be moved to the cloud first.
- Moving a virtual machine from one host to another without turning it off.
Down
- A security process requiring more than one form of verification for access.
- A security approach that involves planning data protection before migration.
- A lightweight, self-contained computing environment for applications.
- A storage method that divides data into blocks for faster access.
- The practice of predicting cloud service costs before migration.
- A method that controls system access based on a user's job or role.
- The process of evaluating IT infrastructure before moving to the cloud.
- A process that allows multiple users to share computing resources efficiently.
- Moving existing IT infrastructure to the cloud without major modifications.
- A system that allows a single login to provide access to multiple applications.
23 Clues: The practice of predicting cloud service costs before migration. • The duplication of data across locations to improve reliability. • A storage method that divides data into blocks for faster access. • Storing multiple copies of data to prevent failure-related losses. • The process of reducing downtime when moving systems to the cloud. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Matching known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
AI & IT key words 2026-01-21
Across
- Software that acts as a bridge between an operating system or database and applications
- a secret method of bypassing normal authentication or encryption in a computer system
- the delay before a transfer of data begins following an instruction.
- A secure "tunnel" used to encrypt a user's connection to a network.
- A program that looks legitimate but contains a hidden malicious function.
- A highly targeted phishing attack aimed at senior executives or "big fish" (CEOs, CFOs) to steal large sums of money or highly sensitive data
- The act of following laws, regulations, and ethical guidelines (like GDPR)
- Malware that locks your files and demands money for the key.
- An incident where data is stolen, accessed, or exposed by an unauthorized person.
Down
- A set of tools used by hackers to gain deep, hidden control over a computer.
- A collection of compromised computers controlled remotely to perform massive attacks.
- Software that secretly monitors a user's activity and collects personal info.
- A security measure where a computer or network is physically isolated from the unsecured internet or other local networks.
- A simulated cyberattack performed to evaluate the security of a system.
- An isolated environment where suspicious code can be executed safely without risk to the system.
- The action of reducing the severity, seriousness, or paintfulness of a security risk.
- A set of rules that defines how data is transmitted between devices.
- The maximum rate of data transfer across a given path
- A deceptive technique using fake emails to steal sensitive data or login credentials.
- Technical term for body measurements and calculations related to human characteristics used for identification
20 Clues: The maximum rate of data transfer across a given path • Malware that locks your files and demands money for the key. • A secure "tunnel" used to encrypt a user's connection to a network. • the delay before a transfer of data begins following an instruction. • A set of rules that defines how data is transmitted between devices. • ...
TCI Lesson 33 Crossword 2026-02-06
Across
- The last name of the leader of the United Mine Workers (sect 4)
- The Michigan city where the Sit Down Strike occurred (sect 4 Look at the pictures)
- The "P" in WPA (sect 3)
- Huey Long wanted to share wealth, claiming "Every man a ____" (sect 2)
- The last name of the first woman in the Cabinet (section 4)
- The "S" in SEC. (sect 1)
- The River Valley that was one of the poorest regions in the country. (sect 1)
- Under the Fair Labor Standards Act, 44 hours was the __________ you could work per week (sect 3)
- They did not like the growth of size and power of government (sect 5)
- Health insurance for older Americans or Food Stamps are known as _________ programs (sect 5)
Down
- Two words, this is where Marian Anderson gave an important concert (sect 4)
- Two words, the branch of government that struck down parts of the New Deal (sect 3)
- The last name of the Supreme Court Chief Justice who upheld Social Security and the Wagner Act (sect 3)
- Fire Side chats were broadcast over this medium (sect 1)
- Before the New Deal these were the main help of people in need (sect 5)
- The "P" in Upton Sinclair's EPIC program. (sect 2)
- The last name of the Dr. who called for Social Security payments (sect 2)
- The number of digits in a Social Security number (sect 5 pictures)
- Farmers were at risk of losing their farms if they could not repay these. (sect 1)
- People in the middle of the left or right wings (sect 2)
20 Clues: The "P" in WPA (sect 3) • The "S" in SEC. (sect 1) • The "P" in Upton Sinclair's EPIC program. (sect 2) • Fire Side chats were broadcast over this medium (sect 1) • People in the middle of the left or right wings (sect 2) • The last name of the first woman in the Cabinet (section 4) • The last name of the leader of the United Mine Workers (sect 4) • ...
Our Policies 2026-03-04
Across
- What type of software must devices accessing organizational resources have up-to-date?
- What structured process is used for developing and maintaining software?
- What must remote work and BYOD users use as an additional security measure?
- What must automated monitoring systems trigger within fifteen minutes of performance threshold violations?
- What must system owners conduct prior to deployment and on a quarterly basis to prevent fairness issues?
- What type of board reviews all new AI systems and significant changes?
- What must all AI systems clearly disclose to users regarding their nature?
- What approach should be used as the primary strategy to validate and sanitize all inputs?
- What acronym describes users who must comply with additional security measures when using their own devices?
- Who should you contact before hitting the send button if you are in doubt?
- What type of data category includes racial or ethnic origin, genetic data, and biometric data?
Down
- What e-mail address prefix should you use to report a breach immediately?
- What should you respect and not use if it is not yours?
- Who provides overall oversight for ensuring that secure development practices align with organizational objectives?
- What must users not send, in relation to unsolicited emails?
- What type of media involves blogs, wikis, and forms where you are personally responsible for published content?
- What is a huge factor when reviewing content before publishing to avoid discomfort?
- How many hours do we have to report a personal data breach to supervisory authorities?
- What process is used during the design phase to identify, prioritize, and mitigate potential security threats?
- What type of address, along with IP, is listed as a personal data identifier?
20 Clues: What should you respect and not use if it is not yours? • What must users not send, in relation to unsolicited emails? • What type of board reviews all new AI systems and significant changes? • What structured process is used for developing and maintaining software? • What e-mail address prefix should you use to report a breach immediately? • ...
NETWORK MANAGEMENT 2022-10-20
Across
- Responsible for maintaining the essential such as OS, application, security tools, devices in network (related to software and hardware)
- _______is the standard adopted by the International Organization for Standardization (ISO)
- _________runs between the managing entity and managed devices
- Detecting the problem symptoms-->Isolating the problem-->Fixing the problem automatically or manually-->Fixing the problem automatically (if possible) or manually. This steps refer to ________
Down
- Involves in the configuration of security hardware and software (firewall, antivirus, OS update) and perform security audit
- ______is one of the example of SNMP agents
- _____was installed to displays/analyzes data from management agents
- Responsible for designing and maintaining the computer network solving any problem related to network connection
- This person have overall control of the server
- Concern with daily operations in providing network services
10 Clues: ______is one of the example of SNMP agents • This person have overall control of the server • Concern with daily operations in providing network services • _________runs between the managing entity and managed devices • _____was installed to displays/analyzes data from management agents • ...
Cyber safety-by Bridget Graham 2016-05-24
Across
- when you post something on the internet so everyone can see it
- information stored on your computer or device
- never tell anyone about it because you don't know what's going to happen
- a search engine
- little pictures to express your feeling
- a location on the internet
- allows people to share things online
- something that is important not to tell people on the internet or they can track you down
- when an unknown number or email address appears on your emails
Down
- ups when browsing a new window appears that you don't want
- a web address
- when someone is being mean to you on line
- when someone pretends to be your friend on games but their really not
- a little chip that is is in your computer that you can turn off and on
- to decline or not accept a request on a game
- private information that you don't share with with other people
- when you close a screen to save it for later
- your personal address on your computer
- to copy a file from one computer system to another via the Internet
- a saved link to a website
- to upload information to the web
21 Clues: a web address • a search engine • a saved link to a website • a location on the internet • to upload information to the web • allows people to share things online • your personal address on your computer • little pictures to express your feeling • when someone is being mean to you on line • to decline or not accept a request on a game • ...
CSAM 2022 - Be Cyber Smart 2022-10-02
Across
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
- The process of taking plain text and scrambling it into an unreadable format.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
- Hardware or software designed to prevent unauthorized access to or from private network.
- The I in the C-I-A Triad; protection from unauthorized changes.
- Verifying identity
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The address of a webpage. Check the validity of it before clicking on it.
- Threatening behavior facilitated through electronic means such as texting.
- A fraudalent email purportedly from a reputabld companty attempting to get personal information.
Down
- A sequence of words or text used to control access to a computer; similar to a password.
- A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- THe A in the C-I-A Triad. It ensures authorized users have access.
- Facebook, Twitter, Instagram, etc. (two words)
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
- Unauthorize access to a network, information systems, or application.
20 Clues: Verifying identity • Facebook, Twitter, Instagram, etc. (two words) • The I in the C-I-A Triad; protection from unauthorized changes. • THe A in the C-I-A Triad. It ensures authorized users have access. • Unauthorize access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Networking concept and Cyber Ethics 2025-05-19
Across
- The unwanted bulk emails that come from unknown sources are called.
- A computer ion a network.
- Equivalent form of Hacking.
- simplest way to prevent plagiarism.
- Program that disrupts the normal functioning of a computer.
- It is wireless technology.
- Protecting the data and resources from any unauthorized access.
- Refers to criminal activities that involve the use of computer, network and internet.
- Group of computers or other peripheral devices.
- Refers to an illegal intrusion in a computer system or a network.
- It is a legal right granted by law to the creator for his original work.
- Is used to connect a computer to the available internet connection over the existing telephone line.
Down
- Certain sets of rule determine how data should be transferred over networks and so on.
- Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
- Ranges less than 10 meters.
- It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
- Refers to computer network restricted to a organization.
- Group of star figured workstations connected to a linear backbone cable.
- It is a network device that is used to connect all computers to a network.
- Metropolitan Area Network.
20 Clues: A computer ion a network. • It is wireless technology. • Metropolitan Area Network. • Ranges less than 10 meters. • Equivalent form of Hacking. • simplest way to prevent plagiarism. • Group of computers or other peripheral devices. • Refers to computer network restricted to a organization. • Program that disrupts the normal functioning of a computer. • ...
ICS/OT Cyber Cryptic Crossword 2026-02-08
Across
- Crude plant fiery nurse germinates.
- Evil Scholar's voice from leaders of fraudulent insidious new scripture.
- Stage 2 pivot pastry ordered, Ken Burns?
- RIP! Victor over Romeo.
- Model loses 50. Method?
- Industrial routine scrambled in DoD grid call.
- Basic control hidden in truth.
- Polling leaders mask operational drift between unstable systems.
- Initially, some cyber alerts disrupt automation control system.
- Safety-critical broadcasts enter, Scottish lake.
- Industrial middleware confused cop and initially district attorney.
- Knightly honorific with no time or energy in vote rotating.
- Energy exchanged hour after spilling tea.
- Rare minerals opt for Caribbean spirits.
- B-grade gold multiplies as pirate cuts rap hacktivist.
Down
- Throttles as wolf inverts, trapped in rival vendor.
- Mother confused teams with pair sensing heat.
- Mickey overheard whole OPC-UA component.
- Display mirrors myself, Mike, and hotel.
- Holding sliced assassin who phoned home.
- Package installer adds final code including strangely armed hallucination.
- Noisy attempt joins sibling malware.
- Factory efficiency: TV award announced down south.
- Lap pool's reflection.
- Assess the first couple of guests connection with the last outage.
- Automation formed from Dragos CEO and operational technology.
- Roman wares looted digital extortion.
- A legal assistant deletes files and directories -- PANIC!
- Race runner's first after elite law school reversed.
- Individual broke IDS before largest Greek island.
30 Clues: Lap pool's reflection. • RIP! Victor over Romeo. • Model loses 50. Method? • Basic control hidden in truth. • Crude plant fiery nurse germinates. • Noisy attempt joins sibling malware. • Roman wares looted digital extortion. • Mickey overheard whole OPC-UA component. • Display mirrors myself, Mike, and hotel. • Holding sliced assassin who phoned home. • ...
ESCAPE ROOM 2023 2023-08-23
13 Clues: We Are • Thomas • Location • Priority • Principal • The Chief • Red, Danger • Out of here • Fifth, 1st Day • The big F Word • Camp, Training • Core,Curriculumn • Harmonious Relationship
Bullying Crossword Puzzle 2015-11-15
Across
- What acronym reminds us how to act if you are bullied?
- What does the "R" stand for in "HERO"?
- Bullies can call you ____.
- What does the "E" stand for in "HERO"?
- The "E" in "SAFE" stands for "End it ____".
- A bully is identified not how they look, but rather by their ___.
- What does the "H" stand for in "HERO"?
Down
- Bullying online is called ___ bullying
- If you see bullying, do not be a _____.
- The "O" in "HERO" stands for___ communication.
- Bullying can be done by an individual or ___.
- Bullying can be physical or ___.
- Being a bully makes you a smaller person. Helping others makes you a __ person.
- ____ someone from a group is a form of bullying.
- The "S" in "SAFE" stands for "Stand ____".
- This acronym is great to remember if you see bullying occuring.
- Bullies can get you in ___.
- If you are bullied, tell an ___.
18 Clues: Bullies can call you ____. • Bullies can get you in ___. • Bullying can be physical or ___. • If you are bullied, tell an ___. • Bullying online is called ___ bullying • What does the "R" stand for in "HERO"? • What does the "E" stand for in "HERO"? • What does the "H" stand for in "HERO"? • If you see bullying, do not be a _____. • The "S" in "SAFE" stands for "Stand ____". • ...
NORMA 2024-01-14
Across
- Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
- Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
- Hak asasi manusia yang perlu dijunjung tinggi?
- Norma yang menjamin kebebasan berserikat disebut?
- Sikap saling menghargai dalam keberagaman budaya?16.Integritas Norma yang melarang korupsi dan penyalahgunaan kekuasaan?17. Keselamatan Ketaatan terhadap norma keselamatan di tempat kerja?
- Kesetaraan hak dan peluang bagi semua warga negara disebut?
- Norma dalam mengelola konflik secara damai?
- Larangan diskriminasi berdasarkan jenis kelamin disebut?
- Tanggung jawab individu terhadap kepentingan bersama disebut?
- Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
- Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
Down
- Tanggung jawab individu terhadap diri sendiri dan masyarakat?
- Norma agama yang menjadi pedoman hidup?
- Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
- Kewajiban dan hak yang dimiliki oleh warga negara disebut?
- Norma yang mengatur hubungan antarindividu dalam masyarakat?
- Norma etika dalam penggunaan teknologi informasi?
- Tanggung jawab menjaga kelestarian lingkungan?
18 Clues: Norma agama yang menjadi pedoman hidup? • Norma dalam mengelola konflik secara damai? • Hak asasi manusia yang perlu dijunjung tinggi? • Tanggung jawab menjaga kelestarian lingkungan? • Norma yang menjamin kebebasan berserikat disebut? • Norma etika dalam penggunaan teknologi informasi? • Larangan diskriminasi berdasarkan jenis kelamin disebut? • ...
EXTREME SPORTS 2021-09-23
Across
- An object used for Ski.
- Used in dark places.
- Sport in charge of exploring caves.
- Used to protect the knees from scrapes.
- Helps keep hands clean.
- They favor the execution of turns and curves and are very useful to propel yourself in places where the slope is little or even non-existent
- A security element to protect the head.
Down
- Consists of jumping from a plane.
- A security element to protect the eyes.
- An Object used for rafting.
- It is used in places where descent is otherwise difficult.
- It must be used obligatorily to avoid serious accidents.
- An object used to practice parachuting.
- It is necessary to learn to use equipment and techniques to breathe underwater.
- It is a support element to climb.
15 Clues: Used in dark places. • An object used for Ski. • Helps keep hands clean. • An Object used for rafting. • Consists of jumping from a plane. • It is a support element to climb. • Sport in charge of exploring caves. • A security element to protect the eyes. • Used to protect the knees from scrapes. • An object used to practice parachuting. • A security element to protect the head. • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Cybersecurity 2025-10-20
Across
- Software that secretly collects information about you
- A scam using fake emails to steal personal information
- Installing the latest software fixes and security patches
- A system that blocks unauthorized access to a network
- Manipulating people into revealing confidential information
- An added layer of security requiring a code or device confirmation
- The process of verifying a user’s identity
- A tool used to securely store and create strong passwords
- The process of converting data into code to prevent access
Down
- When unauthorized access to data occurs
- A copy of important data stored separately for safety
- A secret word or phrase used to access an account
- A tool that hides your IP address and encrypts your internet traffic
- Software that detects and removes malicious programs
- Software designed to damage or disrupt systems
15 Clues: When unauthorized access to data occurs • The process of verifying a user’s identity • Software designed to damage or disrupt systems • A secret word or phrase used to access an account • Software that detects and removes malicious programs • A copy of important data stored separately for safety • Software that secretly collects information about you • ...
Civics Unit 20 Vocabulary 2021-04-13
15 Clues: fake • trickery • wheel cover • paper money • put in place • a sudden event • providing help • official record • someone walking • import illegally • gun, rifle, etc. • a husband or wife • import/export tax • careful examination • safety against crime
Study Guide 2022-09-02
Across
- A form that tells how much money your employer will withhold
- Expenses you can claim to decrease your gross income
- yearly pay
- Benefits given to the retirees
- Taxable Income
- A form your employer gives you that shows how much money you made
- subtracted from your gross income when you calculate your taxes
- Pay after taxes and deductions
- Pay before taxes and deductions
Down
- Compensation in addition to your salary or wage
- the form you use to file your taxes
- hourly, daily, monthly pay
- adjusted gross income
- Medicare and Social Security tax
- A person supported by another person.
- amount of money the IRS sets each year that can be subtracted from your gross income
- Items that reduce the actual amount of taxes you need to pay
- Tax to pay for the health of retirees
18 Clues: yearly pay • Taxable Income • adjusted gross income • hourly, daily, monthly pay • Benefits given to the retirees • Pay after taxes and deductions • Pay before taxes and deductions • Medicare and Social Security tax • the form you use to file your taxes • A person supported by another person. • Tax to pay for the health of retirees • Compensation in addition to your salary or wage • ...
SvD Review 2014-11-07
Across
- These customers must manually run Radia
- The team for remote escalations that have a warm transfer
- Default Certificate
- The type of account that is created upon login and prevents a user from logging in to their account
- The location of Urgent Items
- The location of Outages
- The location of HPSM ESS portal
- Used to modify and view accounts
Down
- On-site Support
- When escalating to this group we create an Interaction and then close it
- Background connection to files
- The acronym for the website that allows ISSMs to manage exceptions
- This stores user account information, authenticates usees and enforces security policy for a windows domain
- the tool we use to connect to the foreground of the user's computer
- The name of the group we contact if we have witnessed a security violation
- Software Team
- Check this everyday before you auto in
17 Clues: Software Team • On-site Support • Default Certificate • The location of Outages • The location of Urgent Items • Background connection to files • The location of HPSM ESS portal • Used to modify and view accounts • Check this everyday before you auto in • These customers must manually run Radia • The team for remote escalations that have a warm transfer • ...
Investment 2024-03-20
Across
- Security representing ownership of a fraction of a operation.
- Measuring price performance of a basket of securities.
- Owning 100 percent your the money the company matched in your 401k plan.
- Paid when you hit so many years of service.
- Increase value of an asset
- Age most women start investing in the stock market.
- Age for withdrawal of money in your IRA account.
- Percentage of paycheck contributed to your 401k plan each month.
- Usually paid back at a stated interest rate.
- Recorded information that makes it difficult to cheat the system.
Down
- Investing into the market all the money you have.
- Appropriate age to invest in Crypto.
- Getting money when you can't work anymore.
- Contribution to your IRA combined each year.
- Currencies created and backed by government.
- Age to gain full social security benefit.
- Sum of money saved for a purpose
17 Clues: Increase value of an asset • Sum of money saved for a purpose • Appropriate age to invest in Crypto. • Age to gain full social security benefit. • Getting money when you can't work anymore. • Paid when you hit so many years of service. • Contribution to your IRA combined each year. • Currencies created and backed by government. • ...
Risk Interest Group 2025-12-05
Across
- Access Control List defining allowed/denied permissions.
- Single software instance serves multiple customers with isolation.
- Public Key Infrastructure that manages certificates and trust.
- Algorithm that performs encryption and decryption.
- Cryptographic proof of data integrity and signer authenticity.
- Learning Algorithms that learn patterns from data to make predictions/decisions.
- AI Models that create new content (text, images, code) from learned patterns.
- Language Processing AI field enabling computers to understand and generate human language.
- Cloud model delivering virtualized compute, storage, and networking.
Down
- Automated coordination/management of services, containers, and workloads.
- Model memorizes noise in training data, hurting generalization.
- Authority Trusted entity that issues and validates digital certificates.
- Learning Machine learning using deep neural networks with many layers.
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Security Information and Event Management for log aggregation and analytics.
- Transforming plaintext into ciphertext using cryptographic keys.
17 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Cryptographic proof of data integrity and signer authenticity. • Model memorizes noise in training data, hurting generalization. • ...
Organizing Homeland Security 2017-04-26
Across
- A federal law designed to prevent political interference with the decisions and actions of governmental organizations.
- Information law enforcement agencies, military units, or other security forces can use to prevent an attack or operation.
- favoring the process over accomplishments
- A multiagency operation in West Virginia that evaluates information gathered from a variety of governmental sources
- The criminal and social actions of individuals and groups before a terrorist attack
- Any outcome or output of analyzed information that can be used by law enforcement agencies, military units, or security forces to take an immediate action
Down
- A federal law designed to prevent political interference in the management of federal governmental organizations and to increase the efficiency of management
- Preparations from any agency to deal with natural, accidental, or man-made disasters
- The process of examining a community to determine the areas that might be subject to attack
- As used in this text, the ability to stay focused on the primary mission of an organization
- adding too many secondary tasks to a unit. Too many jobs divert a unit from its primary mission
11 Clues: favoring the process over accomplishments • The criminal and social actions of individuals and groups before a terrorist attack • Preparations from any agency to deal with natural, accidental, or man-made disasters • The process of examining a community to determine the areas that might be subject to attack • ...
Security Awareness News 2024-03-12
Across
- This layer of the internet is intentionally hidden. It's where a variety of questionable or illegal activities sometimes occur.
- Represents the largest percentage of the internet. It hosts information that is hidden from the public, like online banking.
- When stolen usernames and passwords allow attackers to completely take over online accounts.
- Malware that can lock up systems or data until the victim agrees to pay a specified ransom.
- A combination of words that are easy for you to remember but hard for others to guess.
Down
- These attackers use manipulation to mislead people into doing something that they shouldn't.
- Refers to malicious code or software that can steal data and spy on people.
- Happens when a scammer uses stolen personal information to open fraudulent accounts, file insurance claims, and apply for credit applications in the victim's name.
- One of the leading causes or breaches.
- These passwords make a cybercriminal's job easier.
- Where people spend most of their time when using the internet.
11 Clues: One of the leading causes or breaches. • These passwords make a cybercriminal's job easier. • Where people spend most of their time when using the internet. • Refers to malicious code or software that can steal data and spy on people. • A combination of words that are easy for you to remember but hard for others to guess. • ...
Cyberbullying Crossword 2021-05-06
Across
- types of schools where rules and sanctions are stricter
- motivates victims more to seek help when they realize such people have also been in their shoes.
- a form of communication that can have more psychologically lasting effects on the victim.
- monitored very strictly in schools
Down
- same problem in a new guise
- an app used to curate
- attempt to steal, intercept usernames, passwords and financial credentials
- Last name of star that quit online chat over the abuse he receives
- country of elevated online abuse in mirror article
- an interventive strategy to cyber bullying
10 Clues: an app used to curate • same problem in a new guise • monitored very strictly in schools • an interventive strategy to cyber bullying • country of elevated online abuse in mirror article • types of schools where rules and sanctions are stricter • Last name of star that quit online chat over the abuse he receives • ...
Internet, Networking and Computers. 2021-08-04
Across
- What is the highest directory in a file system?
- a popular method of cyber attack involving repeated requests
- the part of a computer that blocks unauthorized access to communications
- What measurement of space is 1024 megabytes?
Down
- The software that operates and controls devices on a computer
- a wired connection to the internet via a router/modem
- The network cabling system that uses copper
- What protocol is used to send files over the internet?
- What is the name of a smaller sized desktop?
- Temporary storage using memory for a faster experience
10 Clues: The network cabling system that uses copper • What is the name of a smaller sized desktop? • What measurement of space is 1024 megabytes? • What is the highest directory in a file system? • a wired connection to the internet via a router/modem • What protocol is used to send files over the internet? • Temporary storage using memory for a faster experience • ...
A Stronger Me 2012-07-15
Across
- Hitting someone repeatedly is what kind of abuse?
- You life is what?
- The mourning of someone is called what?
- To be discluded from the world is to be what?
- The given name to a type of technological bullying?
Down
- A group of people either family or friends or helpline
- To be uncomfortable in a situation is what type of sign?
- To be in control is having all the what?
- Attacking someone either physically, emotionally or verbally is called what?
- Someone who abuses someone to have power of them
10 Clues: You life is what? • The mourning of someone is called what? • To be in control is having all the what? • To be discluded from the world is to be what? • Someone who abuses someone to have power of them • Hitting someone repeatedly is what kind of abuse? • The given name to a type of technological bullying? • A group of people either family or friends or helpline • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
- Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
- Bei was werden gefälschte Webseiten umgeleitet ?
- Mithilfe von elektronischen Medien wird ... durchgeführt
- Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
Down
- Was versteckt sich in einem scheinbar nützlichen Programm ?
- und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
- Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
- Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
- Was ist der Überbegriff für unerwünschte, schädliche Software?
10 Clues: Bei was werden gefälschte Webseiten umgeleitet ? • Mithilfe von elektronischen Medien wird ... durchgeführt • Was versteckt sich in einem scheinbar nützlichen Programm ? • und Junke E-Mails Wie werden unerwünschte Werbemails genannt? • Sie sind in ein Dokument/Datei eingebettet und nennen sich ... • Was ist der Überbegriff für unerwünschte, schädliche Software? • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Suicide Awareness and Prevention 2023-09-21
Across
- Early diagnosis & treatment of mental disorders can lead to a _____ life
- Talking about suicide can help spread ________ of mental health
- Targets of _____ are at a greater risk of self-harm & suicidal behaviors
- Mean age of onset of adolescent depression
- Suicide _______ is a critical goal of the NJROTC program
Down
- Condition associated with cyber and other bullying
- CDC says 20% of youth experience social __________
- A potential warning sign of impending suicide is giving away _________
- A potential warning sign of impending suicide is long-term ____________
- Mental health is often overlooked and called the "silent ________"
10 Clues: Mean age of onset of adolescent depression • Condition associated with cyber and other bullying • CDC says 20% of youth experience social __________ • Suicide _______ is a critical goal of the NJROTC program • Talking about suicide can help spread ________ of mental health • Mental health is often overlooked and called the "silent ________" • ...
Suicide Awareness and Prevention 2023-09-21
Across
- CDC says 20% of youth experience social __________
- A warning sign of impending suicide is long-term ____________
- Suicide _______ is a critical goal of the NJROTC program
- Condition associated with cyber and other bullying
- Talking about suicide can help spread ________ of mental health
- Mean age of onset of adolescent depression
Down
- Early diagnosis & treatment of mental disorders can lead to a _____ life
- Targets of _____ are at a greater risk of self-harm
- A warning sign of impending suicide is giving away _________
- Mental health is often overlooked and called the "silent ________"
10 Clues: Mean age of onset of adolescent depression • CDC says 20% of youth experience social __________ • Condition associated with cyber and other bullying • Targets of _____ are at a greater risk of self-harm • Suicide _______ is a critical goal of the NJROTC program • A warning sign of impending suicide is giving away _________ • ...
UX Word Wizard - 5 2024-11-19
Across
- A test to differentiate humans from bots
- A component to scroll through images or content horizontally
- A list of options that appears when you click a button
- A symbol or image representing a company or a brand
- A list of options or links for navigation
Down
- The practice of making websites usable for people with disabilities
- A cyber attack focused on stealing sensitive information
- An area on a webpage for users to enter information
- A feature that enlarges or reduces the view of content
- An indication that content is loading
10 Clues: An indication that content is loading • A test to differentiate humans from bots • A list of options or links for navigation • An area on a webpage for users to enter information • A symbol or image representing a company or a brand • A feature that enlarges or reduces the view of content • A list of options that appears when you click a button • ...
wije 2025-02-24
Across
- Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
- Untuk menampilkan bagian grafik yang ingin ditampilkan
- Fitur untuk menyederhanakan dan menganalisa data
- Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
- Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
- Aturan pelindungan privasi
- Salah satu web/aplikasi chatbot populer
- Proses pemberian izin atau kewenangan untuk mengakses data tertentu
- Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
- Media sosial untuk berkomunikasi
10 Clues: Aturan pelindungan privasi • Media sosial untuk berkomunikasi • Salah satu web/aplikasi chatbot populer • Fitur untuk menyederhanakan dan menganalisa data • Untuk menampilkan bagian grafik yang ingin ditampilkan • Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor • Proses pemberian izin atau kewenangan untuk mengakses data tertentu • ...
Bullying 2025-05-02
Across
- This modern form of bullying hides behind screens
- One who intimidates or harms others to gain power
- One who witnesses bullying but doesn’t intervene
- This form of bullying leaves bruises, not just feelings hurt
Down
- Pattern of power abuse, often masked as “just teasing”
- Like all bullying — it happens again and again
- Relentless and unwanted behavior that targets a person
- This kind of abuse cuts with words, not weapons
- This silent form of bullying manipulates the mind, not the body
- One who suffers from bullying or abuse
10 Clues: One who suffers from bullying or abuse • Like all bullying — it happens again and again • This kind of abuse cuts with words, not weapons • One who witnesses bullying but doesn’t intervene • This modern form of bullying hides behind screens • One who intimidates or harms others to gain power • Pattern of power abuse, often masked as “just teasing” • ...
Find the words 2025-05-05
Across
- worldwide network for multiple users
- The process of writing code to create software or applications
- Technology that creates simulated environments that can be interacted with through special devices
Down
- group of applications for socializing and other uses
- Practices and tools to protect data and systems from cyber threats
- A mobile device that combines phone and computer functions
- An electronic device used to process data
- A device that creates three-dimensional objects from digital models
- An automated machine designed to perform tasks independently
- Technology that allows wireless communication between devices
10 Clues: worldwide network for multiple users • An electronic device used to process data • group of applications for socializing and other uses • A mobile device that combines phone and computer functions • An automated machine designed to perform tasks independently • Technology that allows wireless communication between devices • ...
Bullying 2019-09-07
Across
- stubborn and complete intolerance of any belief or opinion that differs from one's own
- abusing, insulting, or otherwise harming someone on a regular basis
- hitting, pushing, kicking, or damaging other's property
- to dislike intensely or passionately
- name-calling, teasing, insults, homophobic or racist remarks
- prejudice or discrimination against someone of a different race
Down
- commonly held ideas about specific groups of people, often negative
- Harassment unwelcome sexual advances, verbal or physical
- an unfavorable opinion formed beforehand without knowledge, thought, or reason
- lying, spreading rumors, excluding others on purpose
- Hurtful comments, posts, images, videos online or messages
11 Clues: to dislike intensely or passionately • lying, spreading rumors, excluding others on purpose • hitting, pushing, kicking, or damaging other's property • Harassment unwelcome sexual advances, verbal or physical • Hurtful comments, posts, images, videos online or messages • name-calling, teasing, insults, homophobic or racist remarks • ...
Bullying 2019-09-07
Across
- to dislike intensely or passionately
- hitting, pushing, kicking, or damaging other's property
- commonly held ideas about specific groups of people, often negative
- unwelcome sexual advances, verbal or physical
- Hurtful comments, posts, images, videos online or messages
- lying, spreading rumors, excluding others on purpose
Down
- abusing, insulting, or otherwise harming someone on a regular basis
- an unfavorable opinion formed beforehand without knowledge, thought, or reason
- stubborn and complete intolerance of any belief or opinion that differs from one's own
- name-calling, teasing, insults, homophobic or racist remarks
- prejudice or discrimination against someone of a different race
11 Clues: to dislike intensely or passionately • unwelcome sexual advances, verbal or physical • lying, spreading rumors, excluding others on purpose • hitting, pushing, kicking, or damaging other's property • Hurtful comments, posts, images, videos online or messages • name-calling, teasing, insults, homophobic or racist remarks • ...
Week 7 2020-09-27
Across
- theory of groups through social relationships
- early social disorganization studies assumed that social ties and social control shaped this type of crime
- a victimization theory of crime
- as neighborhood structure influences crime, there is mounting evidence that crime and violence shape neighborhood conditions
- theorist of Routine Activity Theory
- the fundamental human ecological character of illegal acts as events which occur at a specific location in ------- and ------
- one of the most important findings changing spatial distribution of delinquency in a city is the product of “larger economic
- Value, Inertia, Visibility, Access
- which embodies quality as well as other desirable characteristics such as good security should be the default option
- Characteristics of quality security
- rates were taken in consideration between 1991-1993 & 1996-1998
- illegal acts in which someone definitely and intentionally take or damages the person or property of another
Down
- anyone with an inclination to commit a crime
- criminologists that came to view the concept of social disorganization during the 1950’s and 1960’s
- some examples of this are poverty, residential instability, ethnic heterogeneity.
- Prevents the convergence in time and space of offender and target
- _____ is higher in communities of poverty, racially segregated communities and single parent households
- those that have a close relationship with their neighbors have lower _____ rates in their community
- majority of homicides in _____ between ‘96 and ‘98 occurred in only 32% of neighborhood clusters
- theorist of Routine Activity Theory
- where individuals have a higher risk of being a victim if they are close to the geographic location of offenders
- a perspective where residents of high-crime neighborhoods are portrayed as sharing conventional values
- which suggests that increases in the quantity and quality of security led to dramatic declines in crime
- _____ and crime rates have a relationship with one another
24 Clues: a victimization theory of crime • Value, Inertia, Visibility, Access • theorist of Routine Activity Theory • theorist of Routine Activity Theory • Characteristics of quality security • anyone with an inclination to commit a crime • theory of groups through social relationships • _____ and crime rates have a relationship with one another • ...
Crossword 1 2015-06-01
Across
- Ensures the existence of multiple pathways of communication
- A form of networking where each computer is a peer
- Refers to the newness of an exploit which may be known in the hacker community for days or weeks
- Filtering concept where the network denies all activities except for those specified here
- When in use, the client workstation converts to thin client status
- A utility or device that captures network communications for investigation and analysis
- A weakness or flaw in a host, node, or any other infrastructure that a hacker can exploit
- Any potential harm to a resource or node on a network
- The act of transmitting a protocol across an intermediary network by encapsulating it in another protocol
- Acts as a middle man between client and server. Can hide the identity of the client, filter content, perform NAT, and cache content.
- The confidence that other users will act in accordance with the organization’s security rules.
Down
- Virtual Private Network
- Network security service that allows a user to authenticate to an entire domain through a single client log on process
- Communication link that enables access to network resources using a WAN link to connect to a distant network
- Small home, home office network
- The process of purging a storage device by writing zeroes to all addressable locations on the device
- Written document prescribing security goals, mission, objectives, standards, procedures, and implementations for a given organization
- A computer system that hosts resources accessed by users from clients
- Network device responsible for directing traffic towards its stated destination
- The likelihood or potential for a threat to take advantage of a vulnerability
20 Clues: Virtual Private Network • Small home, home office network • A form of networking where each computer is a peer • Any potential harm to a resource or node on a network • Ensures the existence of multiple pathways of communication • When in use, the client workstation converts to thin client status • ...
Crossword 3 2015-06-01
Across
- Post Office Protocol
- An attack that seeks to obtain information from a victim by presenting false credentials or by luring the victim to an attack site
- NetBIOS Extended User Interface
- A collection of multiple honeypots in a network for the purpose of luring and trapping hackers
- Simple Mail Transfer Protocol
- The process of making copies of data onto other storage media
- Malware that records all keyboard input and transmits a log file to a hacker
- Security Technical Implementation Guides
- A protocol and a service used to remotely control or administer a host through a plaintext command line interface
Down
- A leetspeak word derived from a common typo. Used to mean hacking and taking over control of a computer or network
- Malware that needs a host object to infect
- Using a new service, device, configuration, software, etc. to a limited number of test hosts before deploying over the entire network
- Bring Your Own Device
- A closely monitored system that usually contains a large number of files that appears to be valuable or sensitive and serves as a trap for hackers
- A network mapping tool that performs network scanning, port scanning, OS identification, and other types of probing
- Basic security training that focuses on common or basic security elements that all employees must know and abide by
- Malware that acts like an electronic land mine
- An advancement of keystroke logging to monitor and record many other user activities.
- A form of Malware that hackers can upload and deploy on a target system, replacing multiple, components of the host’s operating system with altered code
- Trusted Platform Module
20 Clues: Post Office Protocol • Bring Your Own Device • Trusted Platform Module • Simple Mail Transfer Protocol • NetBIOS Extended User Interface • Security Technical Implementation Guides • Malware that needs a host object to infect • Malware that acts like an electronic land mine • The process of making copies of data onto other storage media • ...
Compliance Champions League 2023 - Crossword 2023-11-30
Across
- If any Confidential or Internal information is lost or disclosed to unauthorized parties. Incidents must be reported via the ______________ tool.
- We can find the latest SAP logo and word/ppt templates at www.______.com.
- _______ notes must be entered to put the case to status Resolved.
- You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:
- Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portal using the quicklink /go/ _______________ :
- What should be the status of a product security incident if you get a CVSS score of 0.0.:
- Subscribe using the _ to receive email notifications on external updates for cases.
- What determines the priority of a security note?
- Attachments are made visible externally by setting the _ flag.
- _____________ Maintenance Strategy is used by customers to request a quotation online in SMP.
- What should be the final status of a Security Incident:
- Name the Process which contains set of rules and processes for reducing the risks of using third-party software for internal business purposes at SAP.
Down
- Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance.
- _______ field ensures that the action plan step documented will be visible to the customer.
- Which Board area does AIS belong to?
- _______ tool targets at providing missing functionality and enhancements to Agent Workspace.
- The _____ feature enables SAP to secure the usage of any application specific function:
- Software with rating ___________ at SAP should not be installed.
- What is the condensed copy of a case with all personal data being anonymized called.
- Patch Day notes are released on 2nd _________ of every Month:
20 Clues: Which Board area does AIS belong to? • What determines the priority of a security note? • What should be the final status of a Security Incident: • Patch Day notes are released on 2nd _________ of every Month: • Attachments are made visible externally by setting the _ flag. • Software with rating ___________ at SAP should not be installed. • ...
Semester 2 Vocabulary 2024-05-10
Across
- Referring to investments where taxes on earnings are postponed until a later date.
- of Deposit (CD): A savings certificate entitling the bearer to receive interest.
- Interest: Interest calculated only on the initial principal amount invested or loaned.
- The act of leaving one's job and ceasing to work, usually occurring at an older age.
- The initial amount of money invested or loaned, on which interest is calculated.
- Occurring twice a year.
- Occurring four times a year, or every three months.
- Security: A federal program that provides retirement, disability, and survivor benefits.
- (Individual Retirement Account): A tax-advantaged retirement account for individuals.
- Occurring every day or relating to each day.
- Security Credits: Credits earned through paying Social Security taxes that count toward eligibility for Social Security benefits.
- Retirement Age: The age at which a person becomes eligible to receive full Social Security retirement benefits.
Down
- Exempt: Not subject to taxation.
- Investment: An investment made with money that has not been subjected to taxation.
- Partially retired, still working part-time or intermittently.
- Rate: The percentage of the principal amount charged or paid for the use of money.
- A federal health insurance program for people aged 65 and older and certain younger individuals with disabilities.
- (Federal Insurance Contributions Act): The law that requires employers to withhold Social Security and Medicare taxes from employees' wages and pay a matching amount.
- Occurring once every year.
- Investment: An investment made with money that has already been taxed.
- (Annual Percentage Yield): The effective annual rate of return taking into account the effect of compounding interest.
- Interest: Interest calculated on the initial principal and also on the accumulated interest of previous periods.
- The amount of money in an account.
- The date on which a financial instrument, such as a bond or CD, becomes due for payment.
24 Clues: Occurring twice a year. • Occurring once every year. • Exempt: Not subject to taxation. • The amount of money in an account. • Occurring every day or relating to each day. • Occurring four times a year, or every three months. • Partially retired, still working part-time or intermittently. • Investment: An investment made with money that has already been taxed. • ...
Semester 2 Vocabulary 2024-05-10
Across
- The initial sum of money invested or loaned, excluding interest or earnings.
- Relating to or occurring once a year.
- A federal program providing income and benefits to retirees, disabled individuals, and survivors.
- Calculated or occurring every day.
- Occurring twice a year.
- Investments made with income that has already been taxed.
- Interest calculated only on the initial principal amount.
- Units of measure used to determine eligibility for Social Security benefits.
- The act of leaving one's job or ceasing to work, typically due to age.
- Investments or income that are not subject to taxation.
- Working part-time or having reduced work responsibilities after retirement.
- Refers to investments or accounts where taxes on earnings are deferred until a later date, often retirement.
Down
- Interest calculated on both the initial principal and the accumulated interest from previous periods.
- A savings certificate with a fixed maturity date and a fixed interest rate.
- A tax-advantaged investment account designed for retirement savings.
- The age at which a person can receive full Social Security retirement benefits.
- A federal health insurance program primarily for people aged 65 and older.
- Occurring four times a year, typically every three months.
- The amount of money in an account.
- Contributions made to retirement accounts using income that has not been taxed.
- The percentage of principal charged or paid over a specified time period.
- The date when a financial instrument, like a CD or bond, becomes due and payable.
- The effective annual rate of return, accounting for compounding interest.
- The law that mandates the collection of Social Security and Medicare payroll taxes.
24 Clues: Occurring twice a year. • Calculated or occurring every day. • The amount of money in an account. • Relating to or occurring once a year. • Investments or income that are not subject to taxation. • Investments made with income that has already been taxed. • Interest calculated only on the initial principal amount. • ...
Industrial Security Concept Crossword Puzzle 2025-10-25
Across
- – a chance of being injured or harmed
- – it deters man from committing acts of fear being caught, charged in court or get dismissed
- – Removing the risk totally from the business
- – a person who does detective work for hire, reward or commission
- – inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury
- – being watchful in spotting violator, a person, a vehicle or an accident
- – it is a state or quality of being free from fear or danger, assurance, certainty.
- – it includes all the security measures designed to prevent unsuitable individuals from gaining access to classified matters, and it prevents appointment, or retention as employees of such individuals
- – it is an act of baseness, vileness, or depravity in the private and social duties which a man owes to his fellowmen or to society in general
- – The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard
Down
- – moving the financial impact of the potential loss over to an insurance company
- - it uses barriers being placed between the potential intruder and the object/matter to be protected
- - is the potential that a chosen action or activity will lead to a loss
- – sound and good judgement to arrive at wise and timely decision
- – spreading the risk through decentralization to limit the impact of the potential loss
- – ability to deal with others successfully without offending
- – it involves the installation of physical barriers, security lighting, use of vaults, locks and others.
- – minimizing the probability of the potential loss
- – includes any person who offers or renders personal service to watch or secure
- – an indication of impending danger or harm
20 Clues: – a chance of being injured or harmed • – an indication of impending danger or harm • – Removing the risk totally from the business • – minimizing the probability of the potential loss • – ability to deal with others successfully without offending • – sound and good judgement to arrive at wise and timely decision • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Airport Vocab 2013-06-12
Brothers and Sisters 2025-04-17
SHAGGy 2025-01-08
Across
- A transaction in which a security (or a line of securities) is sold to buy another security, considered to have a higher potential gain
- A natural or legal person who holds shares in a company
- Carrying out a lot of short-term financial transactions in the expectation of making quick capital gains
Down
- The earnings a company equally shared among the shareholders in proportion to the number of shares they hold
- An intermediary in charge of placing buy and sell orders on the market
- Selling a security you don't own to buy it back later
- A stock that goes up and down quickly
- It’s the world’s biggest stock exchange, based in Manhattan
- A very sharp rise of a market
- The ability to buy or sell assets quickly in large quantities
10 Clues: A very sharp rise of a market • A stock that goes up and down quickly • Selling a security you don't own to buy it back later • A natural or legal person who holds shares in a company • It’s the world’s biggest stock exchange, based in Manhattan • The ability to buy or sell assets quickly in large quantities • ...
CDWA Acronym 2022-09-01
Across
- Service Delivery that assists with the Client's activities of daily living.
- Fob that adds an extra layer of security to computers.
- Legal employer for Washington's Individual Providers.
- Total number of hours the IP can work in a week.
- Protects individuals' personal medical data.
- Federal payroll contribution directed that funds Social Security and Medicare programs.
Down
- Caregiver
- DSHS granted this company as WA state's Consumer Directed Employer.
- A group of agencies that supports WA state's social & health needs.
- Client
- Law protects the health status of any individual.
- The person who generates authorizations for Clients.
12 Clues: Client • Caregiver • Protects individuals' personal medical data. • Total number of hours the IP can work in a week. • Law protects the health status of any individual. • The person who generates authorizations for Clients. • Legal employer for Washington's Individual Providers. • Fob that adds an extra layer of security to computers. • ...
EFDO Crossword 2026-02-03
Across
- Delivers specialised cleaning and environmental services across airport facilities.
- Provides ground transport and shuttle services
- Joint venture between SATS & AirAsia Berhad
- Provides ground handling and inflight catering services, specifically for LCCs
- Maintains law, order, and aviation security
- Offers premium terminal services providing private check‑in and immigration, etc
Down
- Provides aviation security services, such as screening and access control
- Operates food and retail concepts
- From Dubai and provides ground, passenger and cargo handling services
- Secures Singapore‘s borders
- Operates duty‑free retail stores focused on cosmetics and perfume
- Operates medical clinics delivering healthcare and emergency medical support
12 Clues: Secures Singapore‘s borders • Operates food and retail concepts • Joint venture between SATS & AirAsia Berhad • Maintains law, order, and aviation security • Provides ground transport and shuttle services • Operates duty‑free retail stores focused on cosmetics and perfume • From Dubai and provides ground, passenger and cargo handling services • ...
Environmental Services 2017-08-18
Across
- What company takes care of pest control?
- What tupe of rags do we use to clean? (blue and yellow)
- Used to collect trash from multiple areas.
- Evening discharge cleaners are called?
- What company takes care of RED trash and sharps for the hospital?
- Who is the head of safety and security?
- What is the brand of electronic paper towels we use?
- What is the Color of ES Scrubs?
- What program is used to look up chemicals?
Down
- This is used to swipe you into the building or certain areas.
- What is the name of the security company?
- Who is the manager of ES?
- What brand of bleach do we use to clean with?
- What is the name of the fragrance spray we use?
- Weeks How far out should you schedule PTO?
- What floor is ICU on?
- These are used to keep your hands clean.
17 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • Evening discharge cleaners are called? • Who is the head of safety and security? • What company takes care of pest control? • These are used to keep your hands clean. • What is the name of the security company? • Used to collect trash from multiple areas. • ...
Crossword 1 - Technical terms 2024-11-04
Across
- Network monitoring tool used to analyze and troubleshoot network traffic.
- Network monitoring tool for tracking performance and availability.
- Authentication system used to manage network access.
- The layout or structure of a network.
- Virtual Private Network; provides secure remote access to a network.
- Command used to test network connectivity and latency.
- Process of encoding data to protect it during transmission.
- Delay in data transmission over a network.
- Unit of data transmitted over a network.
Down
- Device that connects multiple devices within a single network.
- Security device that controls incoming and outgoing traffic.
- Device that allows wireless devices to connect to a network without cables.
- Measurement of data transmission capacity in a network.
- Part of an IP address configuration that helps segment networks.
- Unique identifier assigned to each device on a network.
- Device that directs data traffic between networks.
- Virtual Local Area Network; divides network traffic for security and performance.
17 Clues: The layout or structure of a network. • Unit of data transmitted over a network. • Delay in data transmission over a network. • Device that directs data traffic between networks. • Authentication system used to manage network access. • Command used to test network connectivity and latency. • Measurement of data transmission capacity in a network. • ...
Important concepts 2017-11-17
Across
- studies interactions between countries
- Type of conflict in which religion could be involved
- Income
- Ability to influence others based on specific characteristics
- Is the increasing interaction of people through the growth of the international flow
- State actions taken to ensure its security that threatened the security of other states
Down
- Income advised to infaltion
- Right of a nation to become an independent state
- People who share democratic and cultural similarities
- % of economy growth
10 Clues: Income • % of economy growth • Income advised to infaltion • studies interactions between countries • Right of a nation to become an independent state • Type of conflict in which religion could be involved • People who share democratic and cultural similarities • Ability to influence others based on specific characteristics • ...
National Security and Modern Conflict Threat Evaluation 2024-02-08
Across
- Example of strategic battle game used in class.
- A nation's location and terrain provide _______ defense.
- Military ______ is the primary means for national security.
- ________ policy is the greatest determining factor in national strategy.
- Weakness
Down
- Create an uncomplicated plan (acronym).
- Risks taken while efficiently utilizing resources.
- The ability of a nation to satisfy peacetime and wartime security is _____ capability.
- A reliable supply of ____ is important to national strategy.
- What is an adversary attempting to do?
10 Clues: Weakness • What is an adversary attempting to do? • Create an uncomplicated plan (acronym). • Example of strategic battle game used in class. • Risks taken while efficiently utilizing resources. • A nation's location and terrain provide _______ defense. • Military ______ is the primary means for national security. • ...
United Nations 2022-05-03
Across
- created before UN to talk through problems (3 words)
- decides if new countries can join (2 words)
- _______ council most powerful organ of the UN
- the first meeting was held in 194_
Down
- 19_ member states
- UN general Assembly adopts this
- headquarters of the United Nations
- one of the official languages of the UN
- last name of the current secretary general
- The five permanent members of the security council have this power
- the United Nations has this many "organs"
11 Clues: 19_ member states • UN general Assembly adopts this • headquarters of the United Nations • the first meeting was held in 194_ • one of the official languages of the UN • the United Nations has this many "organs" • last name of the current secretary general • decides if new countries can join (2 words) • _______ council most powerful organ of the UN • ...
Die Einwanderung 2023-11-28
12 Clues: war • flight • poverty • economy • refugee • to flee • security • persecution • origin country • a better life (3,8,5) • chances in the future • political reasons (10,6)
Smart Home Crossword Puzzle 2025-03-22
Across
- – A key benefit of smart home technology, reducing waste.
- – Control smart home features from anywhere using an app.
- – Used to describe eco-friendly smart homes.
- – Smart cameras, locks, and alarms improve home safety.
- – The goal of smart technology: eco-friendly solutions.
- assistants - Alexa, Siri, and Google Assistant.
- – Products with LEED, Energy Star, or WELL certification.
- – Motion, temperature, and leak sensors make homes smarter.
- – Smart thermostats adjust heating & cooling for efficiency.
Down
- – Smart systems track energy, water, and security data.
- – Smart devices communicate via Wi-Fi, Bluetooth, or Zigbee.
- – Smart bulbs use LEDs and can be controlled remotely.
- – Solar-powered devices or panels reduce reliance on the grid.
- – A central controller for multiple smart devices (like Amazon Echo or Google Nest).
- – Smart fridges, ovens, washers, and dishwashers save energy.
- – Smart tech helps reduce power consumption.
- – Controlling devices automatically to improve convenience.
- – Many smart devices connect without hardwiring.
- HOME – The overall concept of an automated, connected home.
19 Clues: – Used to describe eco-friendly smart homes. • – Smart tech helps reduce power consumption. • assistants - Alexa, Siri, and Google Assistant. • – Many smart devices connect without hardwiring. • – Smart bulbs use LEDs and can be controlled remotely. • – Smart systems track energy, water, and security data. • – Smart cameras, locks, and alarms improve home safety. • ...
CROSSWORD 2023-02-23
504 2023-03-24
DD Resources HIPAA Crossword 2015-12-03
Across
- HIPAA is not just a good idea. It is the ___.
- Necessary The minimum PHI needed to accomplish an intended purpose.
- What must be completed and signed before any PHI can be released?
- The Health Insurance Portability and Accountability Act of 1996.
- Any health information received or maintained by DD Resources is ________.
- What Does The second "A" in HIPAA stand for?
- What does the "P" in HIPAA stand for?
- What does the "I" in HIPAA stand for?
- Who is responsible for keeping Consumer information confidential?
- What does the "H" in HIPAA stand for?
Down
- Consumers have the right to make ___________ about the privacy and security of their PHI/EPHI without fear of retaliation.
- How does confidential documentation need to be disposed of?
- What does the first "A" in HIPAA stand for?
- This person is DD Resources’ Security Official.
- Coversheet All faxes sent with PHI must have a ___ ______.
- The third largest mammal on Earth.
- of Privacy Practices What document is given to Consumers that outlines the use and disclosure of their PHI?
- The impermissible use or disclosure of PHI/EPHI released verbally, in writing or transmitted electronically is a ____________________.
- out Files must be ______ ___, whenever removed from their designated location.
- Computer ___ should never be shared or posted.
- The __________ Rule establishes and protects the Confidentiality, Integrity and Availability of EPHI.
- The _____________ Rule protects an individual’s rights, limits the uses and disclosures of PHI and sets administrative rules.
- Communications Protected Health Information (PHI) can include paper records, _____________ __________________, and information that is transmitted and maintained in any electronic format.
- Any PHI that maintained or transmitted electronically is __________.
24 Clues: The third largest mammal on Earth. • What does the "P" in HIPAA stand for? • What does the "I" in HIPAA stand for? • What does the "H" in HIPAA stand for? • What does the first "A" in HIPAA stand for? • What Does The second "A" in HIPAA stand for? • HIPAA is not just a good idea. It is the ___. • Computer ___ should never be shared or posted. • ...
Investing in Stocks 2012-12-16
Across
- independent agency of the federal government that insures accounts up to $250,000 per depositor at almost all US depository institutions.
- a nontransferable bond issued by the U.S. government.
- The total accumulatated value of the assets a person possesses.
- A list of financial assets held by an individual,bank,or other financial institution.
- property or other possessions acquired for future financial return or benefit.
- A long term interest-bearing security issued by the U.S. government. Interest is paid semiannually.
- the cost of passing up the next best alternative when making a decision.
- a form of time deposit at a bank or other savings institution.
- Considered the safest securities available to the U.S. investor.
Down
- a variety of investments in a investment portfolio,the goal is to reduce the risk in a portfolio.
- calculated on initial principal and the accumulated interest of prior periods.
- The capital raised by a corporation by issuing shares of ownership.
- Protects investors' cash and securities when a brokerage firm goes out of business,up to $500,000.
- Funds from many investors pooled together to establish a diversified portfolio of investments.
- Government debt security issued with maturities of two to ten years and traded in the capital markets. A fixed interest.
- A percentage amount of the return on an investment or loan.
- A savings account that pays variable interest rates based on current conditions in the market for short term securities.
- A long term interest bearing security issued by county,city,or state governments,having a maturity of at least ten years.
- a rule used to calculate the doubling of money.
- a certificate of debt issued by a government or corporation that offers payment of the original principal plus interest by a specified future date.
20 Clues: a rule used to calculate the doubling of money. • a nontransferable bond issued by the U.S. government. • A percentage amount of the return on an investment or loan. • a form of time deposit at a bank or other savings institution. • The total accumulatated value of the assets a person possesses. • Considered the safest securities available to the U.S. investor. • ...
Lesson 1 A Vocabulary Crossword 2023-10-03
Across
- An individual who installs, modifies and repairs personal computer (PC) hardware components.
- An individual who is responsible for the maintenance and security of an organization's database resources and data.
- The management and processing of information using computers and computer networks.
- An individual who manages the security measures used to protect electronic data.
- An individual who manages a Web development team.
- An individual who is responsible for the organization and appearance of a Web site.
- An individual who develops primarily server-side Web applications.
- An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.
Down
- An individual who diagnoses and resolves users' technical hardware and software problems.
- An individual who analyzes Web site statistics to determine the site's effectiveness.
- An individual who troubleshoots and repairs mobile device hardware components.
- An individual who manages and maintains a network infrastructure.
- An individual who manages and maintains network servers.
- An individual who determines the visibility of Web sites across multiple clients and search engines.
- Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations over the Internet.
- An individual who creates the overview plan of a Web site's development.
- The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing.
- An individual who examines an organization's security requirements and determines the necessary infrastructure.
- A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections.
- An individual who develops Web sites and/or applications for mobile devices.
20 Clues: An individual who manages a Web development team. • An individual who manages and maintains network servers. • An individual who manages and maintains a network infrastructure. • An individual who develops primarily server-side Web applications. • An individual who creates the overview plan of a Web site's development. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Security documentation that details system resource usage by users and processes for auditing.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Attacks that overwhelm a target system or network with a flood of traffic
- Policy-based accept or deny of network traffic.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Injecting malicious scripts into webpages viewed by other users
- Matching known patterns of threats against security event data to find potential matches.
- Code examination performed without running the malicious program.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Process of transforming information into a scrambled format to secure it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- The correlation that matches the known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Food Security and Beyond 2017-09-13
Across
- A crop commonly grown in the Asia region
- The type of air pressure system that is associated with clouds and rain
- A natural disaster currently affecting parts of the USA
- When all people at all times have physical and economic access to sufficient, safe, nutritious food to maintain healthy and active lives
- Part of the United Nations, an organisation working towards food security
- Farming methods that preserve resources
- Exchange of food and money between countries
- The type of air pressure system that is associated with fine weather
- The lines on a weather map that show us air pressure systems
Down
- A process involving increasing temperatures and more extreme weather events that threatens food production
- When people do not have access to a sufficient quality of nutritious food
- The process that converts raw materials into food products
- A situation where a person's basic needs are not being met
- A shortage of food for the population
- Plants that are grown on a large scale and sold
- All of the people who live in a particular place
16 Clues: A shortage of food for the population • Farming methods that preserve resources • A crop commonly grown in the Asia region • Exchange of food and money between countries • Plants that are grown on a large scale and sold • All of the people who live in a particular place • A natural disaster currently affecting parts of the USA • ...
Screaming Halt 2023-05-04
Across
- name of black trans person killed in San Francisco
- "I _____ a lot of people on this board"
- Brown was killed because he was trying to _______.
- Protestors called on Walgreen's to get rid of ______.
- "But I have to pretend that you have some form of _____ left."
- speaker who screamed at the board
- "So I don't have any ______ prepared for you today"
- Nothing in the store was worth Brown's ______.
Down
- "This is what the trans _______ in this country has brought me to."
- McGeever called the board _______ before walking away.
- Walgreen's and other retail stores have seen a spike in ______ in recent years
- name of store Brown took things from
- "We demand an end to armed ________"
- Last name of security guard responsible for man's death
- nonverbal expression of "______"
- "The suspect believed he was in ______ danger"
16 Clues: nonverbal expression of "______" • speaker who screamed at the board • name of store Brown took things from • "We demand an end to armed ________" • "I _____ a lot of people on this board" • "The suspect believed he was in ______ danger" • Nothing in the store was worth Brown's ______. • name of black trans person killed in San Francisco • ...
Cyber Safety 2023-11-01
6 Clues: To secure your account • What You search up with • When Someone is being Bullied Online • How can we access the world wide web • A app that generates a web page for us • when someone is helping you in a bullied situation
COMPUTER PUZZLE 2025-06-16
Across
- hacking - hacking done for good cause
- to point - two nodes are directly connected with each other
- card - attached to computer to connect network
- - using the language or thoughts of another person as one's original work
- topology - each node is connected to every other node in the network
- - Illegal intrusion into a computer system or network
Down
- - prevents unauthorised use people from accessing your system and network
- - transforming data into a unreadable code
- practices - accessing the internet in an illegal manner
- crime- criminal activities that involve the use of computer
- - each computer in a network
- m topology - all the nodes are in circular manner
- - two or more computers located at distance places
- -bulk emails that come from unknown sources
14 Clues: - each computer in a network • hacking - hacking done for good cause • - transforming data into a unreadable code • -bulk emails that come from unknown sources • card - attached to computer to connect network • m topology - all the nodes are in circular manner • - two or more computers located at distance places • - Illegal intrusion into a computer system or network • ...
COMPUTER PUZZLE 2025-06-16
Across
- hacking - hacking done for good cause
- to point - two nodes are directly connected with each other
- card - attached to computer to connect network
- - using the language or thoughts of another person as one's original work
- topology - each node is connected to every other node in the network
- - Illegal intrusion into a computer system or network
Down
- - prevents unauthorised use people from accessing your system and network
- - transforming data into a unreadable code
- practices - accessing the internet in an illegal manner
- crime- criminal activities that involve the use of computer
- - each computer in a network
- m topology - all the nodes are in circular manner
- - two or more computers located at distance places
- -bulk emails that come from unknown sources
14 Clues: - each computer in a network • hacking - hacking done for good cause • - transforming data into a unreadable code • -bulk emails that come from unknown sources • card - attached to computer to connect network • m topology - all the nodes are in circular manner • - two or more computers located at distance places • - Illegal intrusion into a computer system or network • ...
Cyber Law CIA I 2021-09-01
Across
- An environment in which communication occurs through a computer network.
- A collection of web pages and other created content having a common domain.
- A network is usually private or restricted, specially created for an enterprise or an organization.
- A situation where a person gets verbally or physically threaten on the internet,
- A way to protect data for the concerned user to access it.
- the other person a mental imbalance.
- the right/powers to make rules and authority to interpret and apply them.
Down
- The conversion of text, pictures, or sound in the digital form.
- People who are frequent users of the internet.
- A structured set of files just like a stack held in a computer, which is accessible in various ways.
- A security system present in the computer which supervises the operation and network traffic as per precoded rules.
- The process of exploiting the computer system or any private network.
- It is a stated obligation and everyone has to abide by it.
- A right especially to protect the rights and expression of the original work done by the creator.
14 Clues: the other person a mental imbalance. • People who are frequent users of the internet. • It is a stated obligation and everyone has to abide by it. • A way to protect data for the concerned user to access it. • The conversion of text, pictures, or sound in the digital form. • The process of exploiting the computer system or any private network. • ...
Basic of Cyber Sercurity 2019-07-10
Across
- items or people of value online
- making sure every individual working with an information system has specific responsibilities for information assurance
- preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
- the virtual, online world
- provides a way for denial to be impossible
- a weakness or gap in our effort to protect ourselves
- assures online information is trustworthy and accurate
Down
- infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
- guarantee of reliable access to information
- three-pronged system of cybersecurity
- the practice of protecting digital and non-digital information
- a set of rules limiting access to certain information, much like privacy
- the state of being protected against criminal or unauthorized online activity
- guarantee that the message, transaction, or other exchange of information has shown its proof of identity
14 Clues: the virtual, online world • items or people of value online • three-pronged system of cybersecurity • provides a way for denial to be impossible • guarantee of reliable access to information • a weakness or gap in our effort to protect ourselves • assures online information is trustworthy and accurate • the practice of protecting digital and non-digital information • ...
Cyber Snowball Admission Test 2023-11-20
Across
- The best movie in the world
- The best sport in the world
- The country that should have won
- The best yellow character ever
- A city we were once in
- An animal that we once were
- Hotel motel holiday inn
Down
- This is for you Rhea
- The anonymous gift Hunayn received
- Lactose intolerant people hate this...
- The app everyone should have on their phones
- This is what Rida suffered with (Starts with an A)
- Second half of the best joke
- First half of the best joke
14 Clues: This is for you Rhea • A city we were once in • Hotel motel holiday inn • The best movie in the world • The best sport in the world • First half of the best joke • An animal that we once were • Second half of the best joke • The best yellow character ever • The country that should have won • The anonymous gift Hunayn received • Lactose intolerant people hate this... • ...
Mr Müller`s last week`s vocabulary 2020-05-04
Across
- to Chat, meet,for a Long time
- someone who is not nice to you over the Internet
- time between a child and a adult
- when you like a Person and the Person like`s you too
- when i look in your eyes and you look in my eyes
- when we talk but i don`t think the same About a theme like you do
Down
- to don`t like yourself
- i look silent at you and nod
- write something on paper and send it by post
- electrial device
10 Clues: electrial device • to don`t like yourself • i look silent at you and nod • to Chat, meet,for a Long time • time between a child and a adult • write something on paper and send it by post • someone who is not nice to you over the Internet • when i look in your eyes and you look in my eyes • when you like a Person and the Person like`s you too • ...
Digital Footprint Crossword Puzzle 2020-09-30
Across
- Talking and socializing with other people
- A composition of letters, numbers, and/or symbols to get onto an electronic or website
- Inventions that solve problems or make life easier
- A big network that connects people all over the world on their electronics
Down
- Things that are online
- Someone who bullies people online
- A person or program that tries to trick people into giving away their money or information
- The victim of cyber bullying
- The searches, websites, and social media that you leave behind
- A program or error that causes an electronic to malfunction
10 Clues: Things that are online • The victim of cyber bullying • Someone who bullies people online • Talking and socializing with other people • Inventions that solve problems or make life easier • A program or error that causes an electronic to malfunction • The searches, websites, and social media that you leave behind • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Cybertrafficking Crossword Puzzle 2024-04-23
Across
- Human trafficking is a form of_______ slavery.
- The emoji cherries means ___.
- Gender most likely to be trafficked for sexual exploitation.
- Element of human trafficking.
- I am a person who has been trafficked by another person. Who am I?
Down
- Aspect of trafficking that does not need to be present in order for a situation to be considered child trafficking.
- Children can be vulnerable to ___ grooming.
- Gender most likely to be trafficking for labour exploitation.
- ___ settings helps to protect sensitive information from strangers.
- _____ scams are messages that try to trick you into providing sensitive information.
10 Clues: The emoji cherries means ___. • Element of human trafficking. • Children can be vulnerable to ___ grooming. • Human trafficking is a form of_______ slavery. • Gender most likely to be trafficked for sexual exploitation. • Gender most likely to be trafficking for labour exploitation. • ___ settings helps to protect sensitive information from strangers. • ...
unit 1 2024-12-16
Across
- use in an improper way,improper treatment,
- of time between childhood and adulthood.
- Dating-going out in a group rather than just as a couple
- Dating-casual dating that involves no commitment to help the relationship.
- Dating-dating only one person on a regular basis.
- of love and emotional attachment to another person.
Down
- who obsessively follows,observes,or contacts another person without their consent.
- continuous change.
- stalker-a person who uses the internet as a means to stalk or harass someone.
- Violence-abuse in a family or household.
- further the development of a relationship.
11 Clues: continuous change. • of time between childhood and adulthood. • Violence-abuse in a family or household. • use in an improper way,improper treatment, • further the development of a relationship. • Dating-dating only one person on a regular basis. • of love and emotional attachment to another person. • Dating-going out in a group rather than just as a couple • ...
Nicrossword 2 2024-12-23
Across
- State Wide Area Network to connect state administration offices.
- Software with source code that anyone can inspect, modify, and enhance.
- National Knowledge Network for connecting educational and research institutions.
- Protection against cyber threats and securing digital infrastructure.
- Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
- A unique identification project by the Government of India.
- Unified Mobile Application for New-age Governance.
- An ICT solution for the management of hospital services.
- A paperless office solution by NIC for government departments.
- A nationwide communication network by NIC.
10 Clues: A nationwide communication network by NIC. • Unified Mobile Application for New-age Governance. • An ICT solution for the management of hospital services. • A unique identification project by the Government of India. • A paperless office solution by NIC for government departments. • State Wide Area Network to connect state administration offices. • ...
Infomatika 9-2 Bab 1 2025-01-06
Across
- Kejahatan cyber dengan mengecoh orang lain agar memberikan data pribadi.
- Perdagangan yang menggunakan jasa jaringan telekomunikasi.
- Diskusi dan kelas online merupakan TIK dalam bidang?
- Tindakan melawan hukum seseorang menggunakan sarana komputer.
- Dapat digunakan untuk melakukan jual-beli jarak jauh adalah peran TIK dalam bidang?
Down
- Ilmu yang mempelajari tentang komputer untuk mengatur dan menganalisis data.
- Kegiatan dalam internet untuk mencari informasi dengan mesin pencari.
- Layanan perbankan dari bank yang dilakukan menggunakan SMS merupakan TIK dalam bidang?
- Kumpulan komputer di seluruh dunia yang saling terhubung membentuk suatu jaringan disebut?
- Kejahatan dengan menggunakan kartu kredit.
10 Clues: Kejahatan dengan menggunakan kartu kredit. • Diskusi dan kelas online merupakan TIK dalam bidang? • Perdagangan yang menggunakan jasa jaringan telekomunikasi. • Tindakan melawan hukum seseorang menggunakan sarana komputer. • Kegiatan dalam internet untuk mencari informasi dengan mesin pencari. • ...
Financial Procedures 2016-01-05
Across
- Preferred way by business of refunding Solar Credits
- Interest from Security Deposit applied every this many months
- Can we transfer solar credits
- Previously called backdating
- Used to complete a Transfer of Credit
- Raised to notify user to manually refund Security Deposit
- Account status where the Financial Adjustment can only be cancelled
Down
- Which SA is the Solar Credit held on
- Where to find all business processes
- The min amount of premises or NMIs acct can have for Consolidated Accounts
- The maximum amount of SAs a Child account can have
- The document which contains Authority Levels
12 Clues: Previously called backdating • Can we transfer solar credits • Which SA is the Solar Credit held on • Where to find all business processes • Used to complete a Transfer of Credit • The document which contains Authority Levels • The maximum amount of SAs a Child account can have • Preferred way by business of refunding Solar Credits • ...
