cyber security Crossword Puzzles
Thanksgiving 2024-11-26
Across
- A type of pie, Macintosh for example
- Turkey + Duck + Chicken
- A type of pie, a gourd for example
- This is the name of a producer/seller of Turkey, name similar to Indiana University
- A type of pie or mash - the starchy vegetable kind
Down
- On Monday, go to the internet to get some of these deals
- "I won't be doing any cooking, but I will be doing a lot of ______ this Thanksgiving"
- Small __________ Saturday
- Macy's throws one of these every year
- What half the staff get on Thanksgiving
- Like 4th of July or President's Day, Thanksgiving is one of these
- This Meteorologist often hosts the sidelines of the Thanksgiving Day parade on NBC
12 Clues: Turkey + Duck + Chicken • Small __________ Saturday • A type of pie, a gourd for example • A type of pie, Macintosh for example • Macy's throws one of these every year • What half the staff get on Thanksgiving • A type of pie or mash - the starchy vegetable kind • On Monday, go to the internet to get some of these deals • ...
The Kieronasaurus Krossword 2018-01-03
Across
- An information classification expressed as numbers only.
- bully
- the ability to change the displayed content.
- Defined as direct physical threat to a country, but could also be a threat to financial security.
- The process of data
- The amount of information that can be held.
- amount of data protection principles.
- Examples: digital certificate, encryption, firewall
- Announcements or adverts. Small amounts of information sent easily.
- Attack on a business's servers not only impacts on the business or individual it holds data for
- Data collected by you yourself.
- Used to help blind people read.
- Computer hardware that cannot be moved
- source of information within a DFD
- yes or no
Down
- Triad
- Eliminate "unecessary" bits of information
- Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
- Raw facts and figures.
- Lets you recreate the original file exactly. Breaking a file into a smaller form for transmission.
- A closed, private network within a building or company.
- The language that websites are written in
- Canada's data protection legislation.
- footprint Any traceable action you or others take on the internet
24 Clues: Triad • bully • yes or no • The process of data • Raw facts and figures. • Data collected by you yourself. • Used to help blind people read. • source of information within a DFD • amount of data protection principles. • Canada's data protection legislation. • Computer hardware that cannot be moved • The language that websites are written in • ...
Spanish3 crossword puzzle 2023-10-04
Across
- population
- foreigner, alien
- immigration
- ignorance, lack of awareness
- to reach, achieve
- (in)security; (lack of) security
- working day; day's journey
- worldwide
- Displaced
- to link, to connect
- visa (travel document)
- to brake, stop
- federation
- development, growth, progress
- to immigrate (enter a country)
- to attain/to be able to
- phenomenon
- world population
- I believe that...
- continent, mainland
- restart
- countries of the world
- to exchange, to trade
- Immigrants within one's own country
- reason
Down
- citizenship/the citizens
- African Studies Group
- we will have (future tense of tener)
- analyze, examine
- immigrants - la persona que sale de su lugar de origen para llegar a un destino diferente
- knowledge, understanding
- legal
- country, nation
- try, attempt
- will exist
- to travel, journey
- to work, have a job
- movement, motion
- inside, in
- ignition, on
- to tackle, to board
- terrorist (male)
- Approach, point of view, focus
- to track down
- la administración,management
- flow
- famoso,famous
- from the south
- to emigrate (leave a country)
49 Clues: flow • legal • reason • restart • worldwide • Displaced • population • will exist • federation • phenomenon • inside, in • immigration • try, attempt • ignition, on • to track down • famoso,famous • to brake, stop • from the south • country, nation • foreigner, alien • analyze, examine • movement, motion • world population • terrorist (male) • to reach, achieve • I believe that... • to travel, journey • to link, to connect • ...
RU ITEC 411 - Chapter 5 2023-11-29
Across
- organization responsible for the development of secure coding standards
- computer virus circa 2000 causing billions in damages
- 17 down is a type of this
- hackers may use resumes from job postings to commit this crime
- technology for encrypted payment method using a cell phone
- device that records and steals credit card numbers from readers
- 2000's act that broadened the scope of 6 down
- a vulnerability in a system designed intentionally to attrack criminals
- open source encryption software
Down
- hacking a mobile phone to circumvent certificate requirements
- technology that makes technologies such as the iPhone impossible to crack
- hacking for a cause
- name of the malware used to attack 11 Down
- the first major U.S. computer crime law, passed in the 1980's
- a hidden means of accessing a computer
- the "target" of a major 2013 data breach
- a way for security professionals to test systems for vulnerabilities
- law protecting the unauthorized distribution of eBooks, etc.
- 1994 act requiring backdoors in cell phones
- security measure using "something you are"
20 Clues: hacking for a cause • 17 down is a type of this • open source encryption software • a hidden means of accessing a computer • the "target" of a major 2013 data breach • name of the malware used to attack 11 Down • security measure using "something you are" • 1994 act requiring backdoors in cell phones • 2000's act that broadened the scope of 6 down • ...
Income Tax Vocabulary 2023-11-26
Across
- When you overpay the government, you receive a refund
- Expenses the government has
- gross income Total income
- withholding Money an employer holds from your paycheck
- status Married/single/head of household
- Income from stocks and bonds
- Income the government receives from taxpayers, etc.
- Dependents you are claiming
- Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
- Set $ amount not taxed for each dependent
- Money you earn from employment
- income Money earned before deductions
- Husband/Wife
Down
- care expenses Money you pay for someone else to care for a child or elder dependent
- tax Taxes on income
- deduction $ amount non itemizers may subtract from income based upon filing status
- security Your personal identification number
- income Income received from interest, dividends, social security & pentions
- Money received from saving account
- A person who relies on someone for living expenses
- Your banks identification number
- of household Single person who has dependents
- No withholding
- pay Money you earn to take home
24 Clues: Husband/Wife • No withholding • tax Taxes on income • gross income Total income • Expenses the government has • Dependents you are claiming • Income from stocks and bonds • Money you earn from employment • pay Money you earn to take home • Your banks identification number • Money received from saving account • income Money earned before deductions • ...
Security and Privacy in Clinical Research 2023-11-22
Across
- Adherence to laws, regulations, and guidelines in healthcare
- HIPAA-compliant method to remove identifiable information (two words, remove space)
- Assurance of the accuracy and consistency of data over its lifecycle
- Legislation that protects personal health information in the U.S.
- Right to control the disclosure of personal health information
- Secure connection method for remote access to a network
- Access control based on permissions and roles
- Security system that controls incoming and outgoing network traffic
- Keeping patient information private and secure
- Desire to keep one's identity unknown
- Verification of identity using passwords, tokens, or keys
Down
- Removing or altering personal information from data sets to protect privacy
- Measures to protect data from unauthorized access
- Ensuring reliable access to healthcare services and data systems
- Scrambling data to prevent unauthorized interception
- Incident involving unauthorized release or exposure of private data
- Fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity
- Removing identifiers from data to preserve privacy
- Agreement by patients to participate in research and share data
- Tool funded by NIH for data analysis and patient cohort identification
20 Clues: Desire to keep one's identity unknown • Access control based on permissions and roles • Keeping patient information private and secure • Measures to protect data from unauthorized access • Removing identifiers from data to preserve privacy • Scrambling data to prevent unauthorized interception • Secure connection method for remote access to a network • ...
Asleep On A Plane 2023-06-29
Across
- it's pressurized
- where declarations are made
- the brothers who got us here
- an alaskan island NOT served by many airlines
- everyone's waiting for the light to go off
- he'll bring you snacks
- where the plane goes from ground to sky
- despite the inflatable slide, no one wants to go to this pool party
- popular western airline
- famous German airline
- fluffy clouds
- what the plane's doing at 30,000 feet
- dispensed by a dangling mask
- where your carry-on is stored
- what you gotta pay to check
- stop in-between
- fills the tank
Down
- classic inflight drink
- additional security layer for some international travel
- domain of TSA
- at the helm
- seat position upon landing
- seatback furniture
- sign of baby's distress
- puke vessel
- classic inflight snack
- precedes arrival
- bumpy ride
- chocolate, liquor, electronics found here
- where the VIPs hang
- where one waits for one's plane
- badly behaved
- the state of most flights these days
- what condors and vultures do
34 Clues: bumpy ride • at the helm • puke vessel • domain of TSA • fluffy clouds • badly behaved • fills the tank • stop in-between • it's pressurized • precedes arrival • seatback furniture • where the VIPs hang • famous German airline • classic inflight drink • he'll bring you snacks • classic inflight snack • sign of baby's distress • popular western airline • seat position upon landing • ...
Per 1 Chapter 11 - Ali, Mohammad 2023-02-23
Across
- The Disk is operating with no issues.
- Allows you to control parts of the computer.
- Bit depth
- Delete Browsing History
- A regular disk is being converted to a dynamic disk.
- A volume is operating properly.
- Already open file with no security
- The SSH host receives credentials.
- Icons flying everywhere.
- has the same start button as Windows 7
- The disk is unavailable or corrupted
- Set of rules and procedures
- Identified with Dollar Signs in the name
- A command that is used to query a DNS Server.
- Private network connects to other remote networks through their own network.
Down
- Vertical or Horizontal
- Used to open or delete a file using higher permissions.
- Tile Startup
- Nothing is left on
- Virtual app folder
- Power is saved by saving power through turning off ?
- Garbage OS
- A command that tests basic connectivity between devices.
- Choose a power plan.
- A display can be specified.
- Windows before Windows 7
- Opens remote desktop utility.
- Numbers of times the screen is redrawn.
- A disk is turn off or disconnected.
- Very weak security
30 Clues: Bit depth • Garbage OS • Tile Startup • Nothing is left on • Virtual app folder • Very weak security • Choose a power plan. • Vertical or Horizontal • Delete Browsing History • Icons flying everywhere. • Windows before Windows 7 • A display can be specified. • Set of rules and procedures • Opens remote desktop utility. • A volume is operating properly. • Already open file with no security • ...
unit 6 2023-05-19
Across
- monitors product safety nationwide
- the government controls all of the means of production
- ______ resources; humans with skills used to produce goods and services
- social _____; Medicare for people 65 or older
- investigates violations of federals law
- choices for production are made by people based on there life
- regulates the trading of stocks and bonds
- choices are made in markets through buyers and sellers
- protect from poorly made food
- health insurce for low income Americans
- all choices are made by the government
- to prevent false advertising
Down
- ______ cost; 2 choices and you have to give one
- works to control the spread of diseases
- protect workers from hazardous conditions
- developing countries
- ensures safety in flying
- _____ resources; any asset used in the productions of goods and services
- government controls some part of the economy to promote equality in reasources
- government gets involved to protect there people
- protect the environment
- regulates communications over the air
- looks into trafficking drugs
- health added to the social security program
24 Clues: developing countries • protect the environment • ensures safety in flying • looks into trafficking drugs • to prevent false advertising • protect from poorly made food • monitors product safety nationwide • regulates communications over the air • all choices are made by the government • works to control the spread of diseases • investigates violations of federals law • ...
Marigolds Crossword 2023-08-21
Across
- of, relating to, or in the nature of an illusion; lacking reality
- a state of abstracted musing; daydreaming
- a bittersweet longing for things, persons, or situations of the past; the condition of being homesick; homesickness.
- difficult or impossible to explain or account for.
- very cautious; wary; not giving or expending freely
- punishment administered in return for a wrong committed.
- to evade or escape from, as by daring, cleverness, or skill
- to provoke and urge on
- a filthy and wretched condition or quality.
Down
- a state of reduced sensibility or consciousness
- represented or appearing as such
- to interrupt or cut off
- lacking physical form or shape; lacking organization; formless
- lacking physical strength or vigor; weak.
- a show of bravery or defiance, often in order to make a false impression or mislead someone.
- indifference to pleasure or pain; impassiveness.
- having no useful result; ineffectual
- a security hole or an instance of taking advantage of a security hole
- arousing deep emotion, especially pity or sorrow; touching
- a difference between one thing and another, between one writing and another; a variance.
20 Clues: to provoke and urge on • to interrupt or cut off • represented or appearing as such • having no useful result; ineffectual • a state of abstracted musing; daydreaming • lacking physical strength or vigor; weak. • a filthy and wretched condition or quality. • a state of reduced sensibility or consciousness • indifference to pleasure or pain; impassiveness. • ...
Investing-Ray 2025-03-24
Across
- You dont pay social security tax when you have this
- conceived in 1935 to address the permanent problem of economic security for the elderly
- Put up $7000 pre tax
- What you can dip into after retirement
- Government medical healthy plan
- $176,100
- What you live off of on a monthly basis
- The thing your doing right now
- Retirement age
- When you move your savings from one company to another
- What you look forward to when your too old to work
Down
- An account where you invest your money
- Put up $7000 post tax
- Old age, survivors, disability, investments
- U.S. Federal payroll tax
- Employer sponsored retirement savings plan
- Someone you hire to talk to about your money
- A collection of stocks, bonds or other assets that trades on stock exchange
- Retirement bonus age
- Someone you work for
- A place where people can invest their money
- Who created retirement?
- Secured in the possession of, or assigned to a person
- A sum of money saved or made available for a particular purpose
- The abbreviation for Required Minimum Distribution
25 Clues: $176,100 • Retirement age • Put up $7000 pre tax • Retirement bonus age • Someone you work for • Put up $7000 post tax • Who created retirement? • U.S. Federal payroll tax • The thing your doing right now • Government medical healthy plan • An account where you invest your money • What you can dip into after retirement • What you live off of on a monthly basis • ...
HSE Crossword 2025-05-07
Across
- Cipher component modifiable for crypto agility
- Self-test comparing output to expected results
- Legacy protocol surpassed by HSE performance
- Security feature to zeroize keys upon intrusion
- Quantum-resistant encryption initiative
- Protocol for secure management via CM7
- Key used for deriving encryption keys
- Diagnostic tool for encrypted Ethernet links
- Encryption algorithm used in CN Series
- Vendor of CN Series encryptors
- Time delay minimized by cut-through architecture
- Competitor protocol with hop-by-hop limitations
- Compact encryptor ideal for remote sites
Down
- Traffic handling policy besides encrypt or discard
- Mode for point-to-point encryption over Ethernet
- Capability to support new algorithms
- Software used to manage Senetas encryptors
- Transport Independent Mode acronym
- Kit for developing custom ciphers
- Self-test for manual verification of output
- Certification for cryptographic module security
- Command to zeroize keys and CSPs
- Mode for point-to-multipoint Ethernet encryption
- Encryption solution for secure data in motion
- Erasing all sensitive keys and data
- Management interface for configuring HSE devices
- High-performance encryptor for 100Gbps
- Mid-range encryptor for 10Gbps networks
28 Clues: Vendor of CN Series encryptors • Command to zeroize keys and CSPs • Kit for developing custom ciphers • Transport Independent Mode acronym • Erasing all sensitive keys and data • Capability to support new algorithms • Key used for deriving encryption keys • Protocol for secure management via CM7 • Encryption algorithm used in CN Series • ...
Week 4 2025-09-18
Across
- what kind of light source did they use above the Vatican for pope leo's birthday
- what natural disaster destroys 3 houses in utah
- how old did pope Leo turn
- what professional sport is having playoffs
- what popular figure in today's world says fight back in London's protest
- what are we patrolling the seas around Venezuela for
- where does trump want troops to stop crime
- charlie kirks shooter
- what is trump threatening with russia
- what foreign country is drilling military with Belarus
- what did a delta flight hit and have to turn around for
- How much money trump is requesting for increased security
Down
- what state did a teenager shoot up his school in
- last name of the fugitive that turned himself in for the shooting of charlie kirk
- what is charlie kirks roommate-lover
- how much did the world record sunflower grow a day
- what foreign country has rising tensions training their public for war
- what country is planning their biggest security operation
- how tall is the new world record sunflower
- what happened between a train and a semi
20 Clues: charlie kirks shooter • how old did pope Leo turn • what is charlie kirks roommate-lover • what is trump threatening with russia • what happened between a train and a semi • what professional sport is having playoffs • how tall is the new world record sunflower • where does trump want troops to stop crime • what natural disaster destroys 3 houses in utah • ...
Escalation Line Black Inventors Puzzle 2022-02-16
14 Clues: Hot Comb • Potato Chip • Traffic Light • Peanut Products • Folding Cabinet • Street Letter Box • Induction Telegraph • Home Security System • Improved Boiler System • Improved Ironing Board • Automatic Transmisison • Automatic Elevator Doors • Evaporative Air COnditioner • Automatic Lubricating Device
lesson 30 2015-05-15
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Deciphers the information in an SSL Certificate.
- Encrypts the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- A malicious program that records keystrokes.
- Hackers using spyware to control your browser
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- A program that hackers use to capture IDs and passwords on a network.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Security feature used for larger networks that controls computers from one point.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
The Ark 2022-05-31
12 Clues: deadly • not wet • low cost • assurance • to enroll • three feet • communication • group of trees • different kinds • move around or avoid • bend over upon itself • imaginative narration
Chapter 18 2016-05-01
Across
- to Needy Families new name of the organization that brings forth public assistance to needy families; former possessor of the name "Aid to Families With Dependent Children."
- benefit given by the government directly to individuals; may be either cash transfers (i.e. Social Security payments) or in-kind transfers (i.e. food stamps).
- and Work Opportunity Reconciliation Act official name of the welfare reform law of 1996.
- The Immigration Control and Reform Act
- tax by which the burden falls relatively upon low-income groups than upon wealthy taxpayers; opposite of progressive tax.
- "negative income tax" that provides income to very poor individuals in lieu of charging them federal income taxes.
- tax by which the government takes a greater share of the income of the rich than of the poor.
- government benefit to which certain qualified individuals are entitled by law, regardless of need.
- tax by which the government takes the same share of income from everyone, rich and poor alike.
Down
- increasing concentration of poverty among women, especially unmarried women and then children.
- value of assets owned.
- policy that provides benefits to individuals, either through entitlements or means testing.
- of 1935 creator of both the Social Security Program and a national assistance program for poor children, usually called AFDC.
- "bank account" into which Social Security contributions are "deposited" and used to pay out eligible recipients.
- method used to count the number of poor people; considers what a family must spend for an "austere" standard of living.
- government program available only to individuals below a poverty line.
- the act of relocating to a foreign country
- "shares" of the national income earned by various groups.
- amount of funds collected between any two points in time.
19 Clues: value of assets owned. • The Immigration Control and Reform Act • the act of relocating to a foreign country • "shares" of the national income earned by various groups. • amount of funds collected between any two points in time. • government program available only to individuals below a poverty line. • ...
Allie Blair Virus Crossword 2021-03-15
Across
- a type of virus that duplicates itself in order to spread to other computers
- messages sent from one computer to the other using the internet
- A software program designed to infiltrate or damage a computer system without the user's informed consent
- backup protects viruses and hackers from being able to permanently delete your files and data
- Computer code that lies dormant until it is triggered by a specific logical event.
- A type of malware that deludes the users to its true purpose allowing it to invade the computer
- to discover or investigate a problem on a computer
- Software code that gives access to a program or a service that will get through normal security protections
- A technique intruders use to make their network or internet transmission appear legitimate
Down
- written to help a computer operate and make it run smoothly.
- a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attacks
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
- a type of social engineering attack often used to steal user data
- a piece of code that is capable of copying itself and has a harmful effect
- A logical computer network of zombies under the control of an attacker
- software designed to detect and destroy computer viruses
- A publicly released software security update intended to repair a vulnerability
- An infected computer that is under the control of a remote attacker
- an attack that wants to make the program it's attacking unavailable to its users
19 Clues: to discover or investigate a problem on a computer • software designed to detect and destroy computer viruses • written to help a computer operate and make it run smoothly. • messages sent from one computer to the other using the internet • a type of social engineering attack often used to steal user data • ...
MODULE 11 QUIZ 2024-12-19
Across
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- Paid to probe networks and report vulnerabilities
- is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- is a server role that makes it possible for administrators to take control of Microsoft product updates
- a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- what the user has (smart card or key)
- Do not report problems, but instead disseminate the information to other
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
- Creates a barrier between two entities
Down
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- features that enable administrators to control who has access to the network authentication
- The most widely used method for encrypting data is IP Security
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- What users can do after they are logged on to the network
- An industry-standard client/server protocol that offers centralized control
- what the user knows (username/password)
- A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached
20 Clues: what the user has (smart card or key) • Creates a barrier between two entities • what the user knows (username/password) • Paid to probe networks and report vulnerabilities • What users can do after they are logged on to the network • The most widely used method for encrypting data is IP Security • ...
Identity Theft Crossword 2025-11-17
Across
- Note placed on your credit report that tells lenders to take extra steps to verify your identity.
- Unsecured network you should avoid using for banking or shopping online.
- Feature that shows where you are in real time, which you should usually turn off for safety.
- Official document you file with law enforcement to record the identity theft.
- Opening new credit cards or using existing cards without the real owner’s permission.
- Tool that securely stores and creates strong, unique passwords for all your accounts.
- Mixing real and fake information, like a real SSN with a fake name, to build a new fake identity.
- When someone uses your personal information without permission to commit fraud or other crimes.
- When someone uses your personal information without permission to commit fraud or other crimes.
- To regularly check your accounts and credit for suspicious charges or new accounts.
- Lock on your credit file that stops new accounts from being opened in your name.
Down
- When someone uses your health insurance information to get medical care, prescriptions, or surgeries.
- Machine that cuts paper into tiny pieces so thieves can’t read your documents.
- Controls on social media that limit who can see your posts and personal details.
- Extra security step that uses a code or app in addition to your password to log in.
- When someone uses your Social Security number to file a fake tax return or claim your refund.
- Taking out mortgages, car loans, or personal loans using another person’s identity.
- Financial institution you must contact right away if your card or account is used without permission.
- Using a locked mailbox and collecting mail quickly so it isn’t stolen.
- Government agency you contact if someone uses your Social Security number for tax fraud.
20 Clues: Using a locked mailbox and collecting mail quickly so it isn’t stolen. • Unsecured network you should avoid using for banking or shopping online. • Official document you file with law enforcement to record the identity theft. • Machine that cuts paper into tiny pieces so thieves can’t read your documents. • ...
Federal Agencies 2025-05-05
11 Clues: 7.65 • Finances • Bank Buddy • Stock Fraud • Banking Success • Social Security • Treasury monument • Excessive Spending • Optimal Retirement • Unemployment benefit • Stock Disclosure Statement
Executive Branch 2023 2023-10-17
Across
- declaration of forgiveness and freedom from punishment
- an official representative of a country's government
- agreement among a group of nations to prohibit them from trading with a target nation
- more presidents have been this profession than any other profession
- this article of the Constitution discusses the Executive Branch
- The Presidential ___ Act deals with the line of succession after the Vice President
- This amendment deals with presidential succession
- Executive ___ is a rule of command that has the force of law
- Current President (last name)
Down
- The Department of ___ Security was created in 2002
- the President's plan for dealing with other countries is referred to as his ___ policy
- a group of presidential advisors
- a pardon toward a group of people
- an order to delay a person's punishment
- The United States ___ Service is an example of a government corporation
- the primary goal of American foreign policy
- Current Vice President (last name)
- formal agreements between the governments of two or more countries
18 Clues: Current President (last name) • a group of presidential advisors • a pardon toward a group of people • Current Vice President (last name) • an order to delay a person's punishment • the primary goal of American foreign policy • This amendment deals with presidential succession • The Department of ___ Security was created in 2002 • ...
ICT Cross Word 2019-07-08
Across
- hat hacker a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
- A series, or log, of discussion items on a page of the World Wide Web
- Items such as images or videos to be include din the final product
- rights The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system
- Automatic Number Plate Recognition
- use this to create spreadsheets
Down
- preference or point of view that is personal, rather than scientific.
- Measurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
- A partiMeasurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
- A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
- computer software that displays advertisements
11 Clues: use this to create spreadsheets • Automatic Number Plate Recognition • computer software that displays advertisements • Items such as images or videos to be include din the final product • preference or point of view that is personal, rather than scientific. • A series, or log, of discussion items on a page of the World Wide Web • ...
Law Enforcement On Site 2019-08-28
Across
- If a suspicious item is found during this type of threat, allow law enforcement to assume and maintain command.
- Acronym for the role whose duties include coordinating with law enforcement agencies.
- This person discusses with law enforcement on site: DC ________________.
- Law enforcement asks about specific crimes or cases that Microsoft may be party to. You pass the information to Global Security ________________.
- When documenting law enforcement officials, include their phone number and this other number.
Down
- This type of access request is required for law enforcement to enter the facility beyond the lobby.
- If law enforcement requests video footage, do not ______________ that security has such footage unless directed by management.
- Do not __________ law enforcement officials unless directed to do so by management.
- The first action taken by security when a crime is discovered after the fact.
- This policy does not apply to law enforcement officials acting in an official capacity.
- Where law enforcement representatives should wait while the appropriate people are contacted.
11 Clues: This person discusses with law enforcement on site: DC ________________. • The first action taken by security when a crime is discovered after the fact. • Do not __________ law enforcement officials unless directed to do so by management. • Acronym for the role whose duties include coordinating with law enforcement agencies. • ...
Ipo rossword puzzle 2021-09-13
Across
- a security that represents the ownership of a fraction of a corporation.
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- a service charge assessed by a broker or investment advisor.
- Mark Zuckerberg
- , Capital stock is the amount of common and preferred shares that a company is authorized to issue
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
- Electronic Data Gathering, Analysis, and Retrieval system
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
Down
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- a sales pitch or promotion made by the underwriting firm, usually on the road
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- , A derivative is a complex type of financial security that is set between two or more parties.
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
IC3 Module 3 Lesson 30 2015-05-22
Across
- Encrypts the information in an SSL Certificate.
- Security feature used for larger networks that controls computers from one point.
- A malicious program that records keystrokes.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Deciphers the information in an SSL Certificate.
- Hackers using spyware to control your browser.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
Down
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- A program that hackers use to capture IDs and passwords on a network.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
IC3 Lesson 30 2015-05-15
Across
- Security feature used for larger networks that controls computers from one point
- A malicious program that records keystrokes
- Hackers using spyware to control your browser
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Encrypts the information in an SSL Certificate
- Invading Someone else's computer, usually for personal gain or the satisfaction of defeating a security system
Down
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
lesson 30 vocab words 2015-05-18
Across
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- hackers using spyware to control your browser
- Deciphers the information in an SSL Certificate
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
Down
- A malicious program that records keystrokes
- Encrypts the information in an SSL Certificate
- Security feature used for larger networks that controls computers from one point
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
Quality Crossword 2023-07-17
Across
- If the customer fails to answer the first security question correctly, ask the second question and gather one recent _______ detail
- When speaking with a customer you MUST acknowledge your _______ and NEED to help with a full and complete sentence.
- Account ____ Authorization Forms must be completed at an Umpqua location.
- ____ complaints and compliments must be submitted ONLY if a caller requests that their feedback be filed or documented.
- Reading the full and complete _____ will ensure you do not miss important steps.
Down
- When customer is fully verified and there are no OOW or security questions on file, it is recommended that you collect answers to ___ security questions and add them to the core system.
- This must be done for Qa's within 7 days of receipt.
- ____ Courtesy and Professionalism takes us to the next level in Customer Service.
- Customers requesting to close CD, HSA, IRA, trust, estate or custodial accounts may either visit an Umpqua Bank location or speak with the ______ store.
- It’s very important to acknowledge customer’s ____, when they call us
- Recently updated procedures can be found in _______
- _____ is required to be verified once in a 6-month period.
12 Clues: This must be done for Qa's within 7 days of receipt. • Recently updated procedures can be found in _______ • _____ is required to be verified once in a 6-month period. • It’s very important to acknowledge customer’s ____, when they call us • Account ____ Authorization Forms must be completed at an Umpqua location. • ...
IPO Process 2023-01-03
Across
- the first issuance of stock from a private company for public sale.
- Price price at which a new security will be distributed to the public prior to the new issue trading on the secondary market; commonly referred to as offering price
- date on which an executed trade of securities must be paid for
- the amount of stock in an initial public offering (IPO) that is sold to a customer
- when an investor sells their shares to the public on the secondary market after an initial public offering (IPO).
Down
- characteristic of a security which rises or falls sharply in price within a short time period
- ____Herring a preliminary prospectus filed with the SEC
- date the day a newly registered security can be offered for sale
- brokerage firm that raises money for companies using public equity and debt markets
- process by which a privately held company first offers shares of stock to the public; this is done via an initial public offering (IPO)
- privately held company offers its shares to the public—an initial public offering (IPO)
- a federal government agency that regulates and supervises the securities industry
12 Clues: ____Herring a preliminary prospectus filed with the SEC • date on which an executed trade of securities must be paid for • date the day a newly registered security can be offered for sale • the first issuance of stock from a private company for public sale. • a federal government agency that regulates and supervises the securities industry • ...
The Ark 2022-05-31
12 Clues: - deadly • - not wet • - low cost • - assurance • - to enroll • - three feet • - communication • - group of trees • - different kinds • - move around or avoid • - bend over upon itself • - imaginative narration
The Ark 2022-05-31
12 Clues: deadly • not wet • low cost • assurance • to enroll • three feet • communication • group of trees • different kinds • move around or avoid • bend over upon itself • imaginative narration
Animal Farm Crossword Puzzle 2025-04-08
12 Clues: seven • Comrade • selfish • farm name • alcoholic • two legs bad • Lebron james • strongest animal • windmill destroyer • Napoleons security • animals favourite tune • some are more equal than others
IT Aisle Stories 2020-08-06
Across
- The Information Security Office host Security ________ meetings to battle cybercrime
- Hear ye, Hear ye, virtually
- From RBS IT Cloud services to RBS IT____ Services Group
- Powered by ServiceNow
- Secure Code Warrior being sponsored by this Team (abbreviation)
- I need training
- PDL hosted a day of educational programming for this, also known as Freedom Day.
- The act of getting employees involved and interacting with one another.
- Tool that allows customers to check out groceries (while bagging) as they shop the aisles
Down
- Technology driven program to drive change and represent those of different gender identities; _____ in Tech+
- The team that creates the IT Aisle is known as the IT Communications & ______ Team.
- Microsoft program that was launched this year to create a better platform for communication.
- Breaking Down Silos at RBS
- Click & Collect
- The act of sending fraudulent texts with the intent to steal personal or financial data.
- Eric Braun is lead Team kickoff month
- Our New Journey
- Thank You
18 Clues: Thank You • Click & Collect • I need training • Our New Journey • Powered by ServiceNow • Breaking Down Silos at RBS • Hear ye, Hear ye, virtually • Eric Braun is lead Team kickoff month • From RBS IT Cloud services to RBS IT____ Services Group • Secure Code Warrior being sponsored by this Team (abbreviation) • ...
AI and Privacy Crossword 2025-01-13
Across
- What robots do in school (2 words)
- Not a starter; held in reserve in case the start is lost
- Rhymes with preach, often accompanied by prayer
- Inclination to prejudice or fabric cut on the diagonal
- Golf Delta Papa Romeo to Nato members
- One way to secure data in transit; not a burial ritual
- Describes private company information that, notably, might not be privacy-related
- Might apply to a blanket, a guard, or a phishing alert
Down
- Better than defiance
- Complex equations computers use
- Classic strategy board game
- Quality of clean windows and good business
- Party that is empowered by data subject to process her or his data
- Entity that processes data at the direction of an authorized party, or a computer's CPU
- Like munitions, often stored in a base
- Change one letter to create a nation of cars (without manual transmissions)
- Synonym of creative; describes a specific attribute of some AI systems
- Heat producers when burned or security measures that track data access
18 Clues: Better than defiance • Classic strategy board game • Complex equations computers use • What robots do in school (2 words) • Golf Delta Papa Romeo to Nato members • Like munitions, often stored in a base • Quality of clean windows and good business • Rhymes with preach, often accompanied by prayer • Inclination to prejudice or fabric cut on the diagonal • ...
Airport Vocabulary 2025-07-03
Across
- When a flight is not going to take place.
- A stop between connecting flights
- Where officials verify your travel documents
- Stamp placed in your passport showing when you entered a country
- Permission to enter/stay in a country
- A journey made by air
- Device that checks for metal items during security screening
- A place to register before boarding and leave large luggage
- The process of entering a country legally
- Place where your luggage is inspected for prohibited items
Down
- Small bag allowed in the cabin area
- Where your bags and body are scanned
- When the airline has sold more tickets than seats
- When your bags don’t arrive or go missing
- Place where you board the plane, usually in the airports there are many
- Place where you collect your luggage
- When your flight leaves later than expected
- Document needed to enter the airplane
18 Clues: A journey made by air • A stop between connecting flights • Small bag allowed in the cabin area • Where your bags and body are scanned • Place where you collect your luggage • Permission to enter/stay in a country • Document needed to enter the airplane • When a flight is not going to take place. • When your bags don’t arrive or go missing • ...
2018 Security Fair Puzzle 2018-05-17
Across
- _____ travel increases the risk of Foreign Intelligence Targeting.
- All non-Lockheed Martin visitors must be entered into _____ by host prior to visit.
- Always inform your security office if you plan to move _____ equipment.
- Bankruptcy is one form of reportable _____ information.
- Only employees on the access list to a closed area can wear _____ lab coats.
- Security is everybody’s _____.
- All unauthorized (not on access list) _____ must sign the closed area log.
Down
- Always use our Blue Light Policy while escorting _____ personnel in closed areas.
- _____ is the emergency notification system LM uses to alert employees and contractors.
- The _____ Suitcase provides everything international travelers need to prepare for their trip.
- _____ e-mails should be sent to the CIRT and your local FSO.
- Transferring, downloading and/or storing LM data on personally owned IT assets is _____.
- _____ should be complex combinations of numbers, symbols, and upper and lowercase letters.
- If released outside of the facility, _____ papers must be marked as finished documents.
- Many public Wi-Fi hotspots—like libraries, coffee shops, and airports—aren’t _____.
15 Clues: Security is everybody’s _____. • Bankruptcy is one form of reportable _____ information. • _____ e-mails should be sent to the CIRT and your local FSO. • _____ travel increases the risk of Foreign Intelligence Targeting. • Always inform your security office if you plan to move _____ equipment. • ...
Home Fundraising - Data Security 2013-09-23
Across
- You should keep your computers _____ during breaks
- You should not allow _______ access to your computer or workplace
- All computers for Data Entry Executive MUST have this installed
- Donor's data is stored here
- All outdated documents should be _________
- We should never share database ______ with others
- When you come across a security breach, you should immediately inform people in the __ department
- Breach in Data Security could lead to _______ of contract
- Frequency at which passwords should be changed on the database
- You should never send ______ emails from your official email address
Down
- You should never include ______ details in emails
- ______ documents should be locked inside cabins at the end of the day
- We should only keep the data we need due to?
- Always verify the _________ of the email before sending it
- These should never be written down anywhere
15 Clues: Donor's data is stored here • All outdated documents should be _________ • These should never be written down anywhere • We should only keep the data we need due to? • You should never include ______ details in emails • We should never share database ______ with others • You should keep your computers _____ during breaks • ...
At the security check! 2021-01-18
Computer Threats and Security 2019-04-26
Across
- / a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
- / the process of encoding a message so that it can be read only by the sender and the intended recipient
- / zombie network-is a group of infected computers that are under the control of one or more individuals.
- / the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
- / a destructive self replicating program containing code capable of gaining access to computers or networks.
- Espionage / an occasion when one company steals secrets from another company with which it is competing.
- / a software utility designed to protect your computer or network against computer viruses.
- / a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
- guard / a person whose job is to guard a place
Down
- theft / act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
- / the identification of a person by the measurement of their biological features.
- monitors / a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
- camera / a video camera that is used to observe a location.
- / malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
- Horse/ a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
15 Clues: guard / a person whose job is to guard a place • camera / a video camera that is used to observe a location. • / the identification of a person by the measurement of their biological features. • / a software utility designed to protect your computer or network against computer viruses. • ...
Computer Threats and Security 2019-04-26
Across
- malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
- a software utility designed to protect your computer or network against computer viruses.
- a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
- an occasion when one company steals secrets from another company with which it is competing.
- a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
- the identification of a person by the measurement of their biological features.
Down
- act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
- the process of encoding a message so that it can be read only by the sender and the intended recipient
- a video camera that is used to observe a location.
- a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
- a person whose job is to guard a place
- a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
- a destructive self replicating program containing code capable of gaining access to computers or networks.
- the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
- zombie network-is a group of infected computers that are under the control of one or more individuals.
15 Clues: a person whose job is to guard a place • a video camera that is used to observe a location. • the identification of a person by the measurement of their biological features. • a software utility designed to protect your computer or network against computer viruses. • an occasion when one company steals secrets from another company with which it is competing. • ...
Technology, security and transparency 2023-03-08
Across
- which tech buzzword is closely related to Artificial intelligence (AI)?
- Asymmetric key encryption.?
- The transformer that develops the high voltage in a home television is commonly called a...?
- Which company has unveiled a breakthrough in semiconductor design and process with the development of the world's first chip announced with 2 nanometer nanosheet technology?
- The electromagnetic coils on the neck of the picture tube or tubes which pull the electron beam from side to side and up and down are called a...?
- A network site that appears to have a valuable information but is isolated and monitored is what kind of security measure?
- what information do you need to setup a wireless access point?
- First computer virus is known as....
Down
- TMP' extension refers usually to what kind of file?
- What technology is used to make telephone calls over the internet possible?
- Gives little to no information about the system to the penetrate tester?
- Strongest single encryption?
- Which one is the first search engine in internet?
- What technology is used to record cryptocurrency transactions?
- The DOGE-1 Mission to the Moon will be launched by which company in 2022?
15 Clues: Asymmetric key encryption.? • Strongest single encryption? • First computer virus is known as.... • Which one is the first search engine in internet? • TMP' extension refers usually to what kind of file? • What technology is used to record cryptocurrency transactions? • what information do you need to setup a wireless access point? • ...
Create Crossword puzzle 2024-12-09
Spanish Crossword 2024-11-07
browsing safety 2025-06-06
6 Clues: man who do cyber crime • a malware which do distruction of data • an illegal entry a computer or internet • a criminal activity to harm anyone online • a software that prevet unauthorised acces to your computer • a program designed to prevent and removal of viruses from a coputer
Homework 2022-09-22
14 Clues: tiny • share • hated • menacing • burning hot • determination • a strong dislike • a second thought • a beautiful sound • a place of security • attracting attention • likely going to happen • pleasurable expectation • pretend to have feelings or beliefs
Military Acronyms 2025-10-09
14 Clues: CMD • CIV • AI, _____ Item • XO, _____ Officer • PT, _____ Training • Army National Guard • CAC, _____ Access Card • OPSEC, Operations _____ • ACU, Army _____ Uniform • DOD, Department of _____ • MOS, Military _____ Specialty • OCP, _____ Camouflage Pattern • UCP, _____ Camouflage Pattern • FMSU, _____ Management Support Unit
Information Security 2020-09-24
Across
- The best response to password Recovery Questions is,
- Disclosing personal member information may be
- The type of email to get you to click on a fraudulent link
- Who is responsible for data security
Down
- How might someone evil try to get information from you
- If I click on a link I believe was malicious I should
- What is the default data classification,
7 Clues: Who is responsible for data security • What is the default data classification, • Disclosing personal member information may be • The best response to password Recovery Questions is, • If I click on a link I believe was malicious I should • How might someone evil try to get information from you • The type of email to get you to click on a fraudulent link
Food Security 2021-10-28
Across
- overnutrition and overnutrition can both result in _____.
- ________ is the measure of the availability of food and individuals' ability to access it.
- 23.5 million people live in a _______.
- living in a food desert means you have limited access to ______, fresh, and affordable food.
Down
- In food deserts, _______ and convenience stores are often the only available places to get food.
- _______ is a root cause of hunger and malnutrition
- Some factors that can cause _______ or global hunger include poverty, job instability, unstable markets, climate change, and war.
7 Clues: 23.5 million people live in a _______. • _______ is a root cause of hunger and malnutrition • overnutrition and overnutrition can both result in _____. • ________ is the measure of the availability of food and individuals' ability to access it. • living in a food desert means you have limited access to ______, fresh, and affordable food. • ...
Password Security 2016-02-01
Across
- a process of changing characters in a password to strengthen it
- to put in front of a password to make it more unique
Down
- include these values to strengthen passwords
- xxxxxxxxxx words make weak pass words
- include these special characters to strengthen passwords
- xxxxx force attacks use dictionaries of passwords to hack a system
- human sniffing passwords will xxxxx a password once the first few characters are known
7 Clues: xxxxxxxxxx words make weak pass words • include these values to strengthen passwords • to put in front of a password to make it more unique • include these special characters to strengthen passwords • a process of changing characters in a password to strengthen it • xxxxx force attacks use dictionaries of passwords to hack a system • ...
Networks security 2021-02-09
7 Clues: LAN • Is bigger than LAN • A biometric of facial features • What is a Malware but is hidden • when an attack occurs to networks • A person who infiltrates systems or servers • A system protection against malware and hackers
collective security 2021-10-12
Across
- what measures, not coercive,in the mechanism of ensuring universal security are brought to the fore
- the main reason in exceptional cases when peace has already been violated
- what laid the foundations of a kind of behaviour of states, the core of which were the principles of sovereignty and non-interference
- takes the first role in collective security
Down
- the first serious attempt to institutionalize collective security in the modern era
- bodies should make every effort to find a peaceful solution to local disputes through these agreements
- the type of security which require the protection of the world community or a group of States from the possibility of harming them by means of armed violence, provided by their joint efforts
7 Clues: takes the first role in collective security • the main reason in exceptional cases when peace has already been violated • the first serious attempt to institutionalize collective security in the modern era • what measures, not coercive,in the mechanism of ensuring universal security are brought to the fore • ...
MIS Security 2023-11-14
Across
- ______horse, software that appears to be benign but does something other than expected.
- protocols used for secure information transfer over the Internet
- Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
- Write your initial here for identifier
- enforce a security policy on data exchanged between its network and the Internet
Down
- CryptoLocker is an example of
- _______ engineering, tricking employees into revealing their passwords by pretending to be a legitimate memberof a company is called
7 Clues: CryptoLocker is an example of • Write your initial here for identifier • protocols used for secure information transfer over the Internet • enforce a security policy on data exchanged between its network and the Internet • ______horse, software that appears to be benign but does something other than expected. • ...
Security Words 2023-10-24
Across
- Watch over in order to protect or control.
- A person, object, or place selected as the aim of an attack.
- A supply or quantity of bullets and shells.
- Used as a protection against blows or missiles.
Down
- Measures taken to prevent
- A measure taken to protect someone or something or to prevent something undesirable
- A thing designed or used for inflicting bodily harm or physical damage.
7 Clues: Measures taken to prevent • Watch over in order to protect or control. • A supply or quantity of bullets and shells. • Used as a protection against blows or missiles. • A person, object, or place selected as the aim of an attack. • A thing designed or used for inflicting bodily harm or physical damage. • ...
Food Security 2024-10-17
7 Clues: source of iron • source of energy • Nutritional drink • Required for digestion • Source of food production • drink harmful for human body • must to have one fruit daily
the silver eyes crossword 2022-02-08
15 Clues: setting • horse toy • blue bunny • life metal • book author • security guard • foxy right arm • robot designer • antagonist suit • main band member • first seen robot • closed restaurant • first-ever stage robot • main character/protagonist • main 1/5 at missing children's incident
Espanol 2024-04-24
15 Clues: boots • shirt • socks • to ski • to pack • to ride • to relax • to sunbathe • to have fun • to go hiking • to check luggage • to take a day trip • to make a reservation • to bargain, negotiate price • to go through (security, customs)
Security at UNRWA 2021-09-04
6 Clues: when your valuables are stolen • central hub for security information • the acronym for field security teams • harmful event that negatively impacts you, UNRWA • the type of awareness you have to avoid incidents • what DSRM sends to give security advice to personnel
Keywords 2012-03-20
Across
- bullying when someone is getting bullied on the internet
- person or a thing that is trustworthy
- when you can see and modify the structure of a table.
- vrtual learning environment
- something appropiate to the matter at hand
- A row and column view of a table.
- carefully and thoroughly at something
- Utilities that allow you to bring in or send data
Down
- Electronic Mail
- a record holds all the information or data that has been entered into the database
- a set of questions with a choice of an answer
- A direction or order.
- to take part of a whole
- a computer file attached to an e-mail
- a software that provides a way to view pages on the World Wide Web.
- Symbols or signals that are input, stored and processed by a computer.
- structured set of data held in a computer
- a program for data, files or documents e.g. the Internet
- universal resource locator
- A set of data arranged in rows and columns.
20 Clues: Electronic Mail • A direction or order. • to take part of a whole • universal resource locator • vrtual learning environment • A row and column view of a table. • person or a thing that is trustworthy • a computer file attached to an e-mail • carefully and thoroughly at something • structured set of data held in a computer • something appropiate to the matter at hand • ...
Ready Player One Section 1 2015-04-19
Across
- How many years after 2015 does this book take place?
- A Very realistic video game that the book revolves around
- State in which the book takes place
- Last name of the lady who lived three units below Wade
- Hideout Where Wade plays OASIS
- What people live in in the real world
- Wade's aunt
- What the finder of Halliday's Egg would get a lot of
- Level in which Wade's avatar is on
- How the trailers in the trailer park were arranged
Down
- One of the very first video games that is made reference to in the book
- Creator of OASIS, a multi-billionaire
- A small, robed wizard. Halliday's avatar in OASIS
- Wade's Mom
- Egg hunters
- A total "lamer" that Wade said didn't know anything
- Well known gunter that Wade has a cyber-crush on
- Rich rated combatants in OASIS
- Wade's avatar name in OASIS
- Known as the worlds largest Internet service provider that wanted to take over OASIS
20 Clues: Wade's Mom • Egg hunters • Wade's aunt • Wade's avatar name in OASIS • Hideout Where Wade plays OASIS • Rich rated combatants in OASIS • Level in which Wade's avatar is on • State in which the book takes place • Creator of OASIS, a multi-billionaire • What people live in in the real world • Well known gunter that Wade has a cyber-crush on • ...
Vy´s second crossword 2020-05-11
Across
- to see someone in real life
- to write on paper and send it to your friends
- if someone is hurt or is missing
- if you are really bad
- if someone is bullying you on the internet
- if you are a drama queen
- a very beautiful place that you will never forget
- if you are like a mom
- 13-18 years old
- to do a phone number away if you hate them
Down
- to write a message to someone
- to send a teacher a message if you don´t have their phone number
- to answer on a text message
- the opposite of not understanding
- to look after your siblings or if someone is important to you
- the opposite of receive
- if you meet someone new you want to be friends with them then you have to ask them something
- the opposite of write
- If you want everyone to look at you all the time
- to have a job
20 Clues: to have a job • 13-18 years old • if you are really bad • the opposite of write • if you are like a mom • the opposite of receive • if you are a drama queen • to see someone in real life • to answer on a text message • to write a message to someone • if someone is hurt or is missing • the opposite of not understanding • if someone is bullying you on the internet • ...
Literasi digital 2024-08-14
Across
- HAKI terbagi menjadi berapa bagian
- literasi digital digunakan untuk mencari
- mata pelajaran yang mempelajari literasi Digital yaitu
- singkatan empat pilar literasi Digital
- penemu konsep literasi Digital
- keamanan sangat penting untuk menjaga
- lisensi yang bersifat paling restriktif adalah
- kejahatan didunia digital disebut cyber
- manfaat literasi digital untuk menambah
- aplikasi umum untuk mencari informasi digital adalah
- aplikasi pengolah kata adalah
- lisensi yang memperbolehkan pengguna untuk tidak hanya menggunakan perangkat lunak disebut lisensi
- informasi palsu atau berita palsu disebut
- perangkat lunak yang disediakan secara gratis disebut lisensi
Down
- negara yang memiliki tingkat literasi Digital yang tinggi
- bahasa Indonesia dari linking
- lisensi yang hak ciptanya yang dilepaskan disebut
- informasi yang tidak sengaja salah atau tidak akurat disebut
- informasi yang sengaja dibuat untuk menyesatkan disebut
- perangkat lunak yang digunakan untuk mengakses informasi disebut
- aplikasi pembuat bahan presentasi disebut
- hak yang diberikan negara kepada seseorang atas karya ciptanya disebut
- individu dengan kemampuan pemrograman tinggi disebut
23 Clues: bahasa Indonesia dari linking • aplikasi pengolah kata adalah • penemu konsep literasi Digital • HAKI terbagi menjadi berapa bagian • keamanan sangat penting untuk menjaga • singkatan empat pilar literasi Digital • kejahatan didunia digital disebut cyber • manfaat literasi digital untuk menambah • literasi digital digunakan untuk mencari • ...
ISTILAH DALAM TIK 2024-10-31
Across
- Sistem pengiriman pesan elektronik melalui internet
- menambahkan program atau aplikasi ke sistem
- Komponen fisik komputer yang dapat dilihat dan disentuh
- Jaringan global yang menghubungkan jutaan komputer di seluruh dunia
- Perangkat lunak yang mengelola perangkat keras dan menjalankan program aplikasi
- Data yang telah diolah sehingga memiliki makna
- Urutan langkah-langkah logis untuk menyelesaikan suatu masalah
- Sistem untuk melindungi Jaringan dan data komputer
- salah satu Perangkat menampilkan halaman web
- Bilangan Basis 16
- Dunia Maya
- Kata Sandi
- Hardware untuk media penyimpanan
Down
- Memulai ulang sistem
- Platform online yang memungkinkan pengguna untuk berinteraksi dan berbagi informasi
- Kumpulan halaman web yang saling berhubungan
- Aplikasi Perkantoran untuk mengolah data dalam tabel
- Informasi yang tersedia melalui media atau produk elektronik
- Bilangan basis 10
- Format file standar dari Aplikasi PowerPoint
- Aplikasi pengolah gambar
- Papan ketik
- Salah satu sistem operasi
- Tempat untuk menyimpan dan mengelompokkan dokumen atau data pada perangkat komputer
- Program yang digunakan untuk menampilkan halaman web
- Hardware inputan suara
- Salah satu Sistem Operasi Mobile
27 Clues: Dunia Maya • Kata Sandi • Papan ketik • Bilangan basis 10 • Bilangan Basis 16 • Memulai ulang sistem • Hardware inputan suara • Aplikasi pengolah gambar • Salah satu sistem operasi • Salah satu Sistem Operasi Mobile • Hardware untuk media penyimpanan • menambahkan program atau aplikasi ke sistem • Kumpulan halaman web yang saling berhubungan • ...
Sip & Solve 2025-09-13
Across
- What does the “S” stand for in BYOS?
- What is the bride’s middle name?
- What’s the bride’s work nickname?
- Which town do the couple live in?
- Where are the couple going on their honeymoon?
- The happy couple
- Where did the groom pop the question?
- What’s the groom’s favourite sport?
- Total number of flower girls, bridesmaids and groomsmen?
- Who’s the better cook: bride or groom?
- What sporting activity did the groom ‘strike’ at on their first date?
Down
- How many years have the couple been together?
- What’s the groom’s favourite food?
- What nickname did the groom have at university?
- In which city did the bride and groom meet?
- What song did the bride walk down the aisle to?
- Who’s the tidier: bride or groom?
- Who’s the better driver: bride or groom?
- How many metres did Eoin’s Guinness World Record breaking team row?
- Where did the groom celebrate his stag do?
- Where did the bride celebrate her hen do?
- What’s the bride’s favourite food?
22 Clues: The happy couple • What is the bride’s middle name? • Who’s the tidier: bride or groom? • What’s the bride’s work nickname? • Which town do the couple live in? • What’s the groom’s favourite food? • What’s the bride’s favourite food? • What’s the groom’s favourite sport? • What does the “S” stand for in BYOS? • Where did the groom pop the question? • ...
IEEE Day 2025-10-08
Across
- India’s first nuclear test codename
- The digital payment system launched by NPCI in 2016
- Online government service platform — “____ Seva”
- First Indian to go to space
- Founder of Infosys
- City known as India’s “Silicon Valley”
- Indian city famous for IT parks and Cyber Towers
- “Digital India” initiative was launched in this year
- Technology used for secure digital ledgers
- India’s first AI-based robot citizen
- Indian tech giant known for TCS
- Currency symbol officially adopted in 2010
- Indian satellite navigation system similar to GPS
Down
- India’s first mission to Mars
- Social media platform owned by Meta
- Father of India’s Green Revolution
- India’s fastest train as of 2025
- File format for web pages
- India’s first indigenously built supercomputer
- Indian space agency abbreviation
- Portable computer smaller than a laptop
- Father of the Indian Constitution
- The act of illegally accessing computer systems
- The world’s largest biometric ID system
- Term for connecting everyday objects to the internet
25 Clues: Founder of Infosys • File format for web pages • First Indian to go to space • India’s first mission to Mars • Indian tech giant known for TCS • India’s fastest train as of 2025 • Indian space agency abbreviation • Father of the Indian Constitution • Father of India’s Green Revolution • India’s first nuclear test codename • Social media platform owned by Meta • ...
CTF-CW10 2025-11-14
Across
- “It’s really you, right?” check
- The steering wheel for corporate safety
- Data clean-up routine that regularly erases outdated information
- The compliance ninja
- Where your evidence gets its day in court
- United Kingdom’s tailored take on the EU’s major privacy regulation
- Villains’ instruction manual, with footnotes
- The doorman who wants your password and your ID
- Don’t panic: log your “oops” here at Tekion!
- SWAT team for computer emergencies
Down
- Flick your wand at Tekion and this grants you access!
- Not collecting more info than a service truly needs from you
- Talking in code so eavesdroppers get gibberish
- The secret doorman at Tekion—never letting bad web traffic get past the velvet rope!
- Telling others to mind their own digital business
- The guard dog for your computer
- Doing surgery on your risks
- The virtue your files aspire to
- International certification for privacy management processes
- The fire escape map for cyber incidents
20 Clues: The compliance ninja • Doing surgery on your risks • “It’s really you, right?” check • The guard dog for your computer • The virtue your files aspire to • SWAT team for computer emergencies • The steering wheel for corporate safety • The fire escape map for cyber incidents • Where your evidence gets its day in court • Villains’ instruction manual, with footnotes • ...
BULLYING 2017-09-23
Across
- Spoken, not written.
- Worried and frightened
- A person who is standing near but not taking part in what is happening.
- To laugh at or make fun of someone in an unkind way.
- A person who has been attacked or hurt by someone.
- An act that is meant to trick or deceive people.
- Someone who frightens, hurts, or threatens smaller or weaker people.
Down
- Suicide caused by cyber bullying.
- To make someone afraid.
- A person at which an attack is aimed.
- A trick that is done to someone usually as a joke.
- A person who hates and opposes another person.
- To do or say something that is offensive to someone (that shows lack of respect).
- To annoy or bother someone in a constant or repeated way.
14 Clues: Spoken, not written. • Worried and frightened • To make someone afraid. • Suicide caused by cyber bullying. • A person at which an attack is aimed. • A person who hates and opposes another person. • An act that is meant to trick or deceive people. • A trick that is done to someone usually as a joke. • A person who has been attacked or hurt by someone. • ...
TTS INFORMATIKA 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
IC3 Lesson 30 2015-05-18
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- Deciphers the information in an SSL Certificate.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- Security feature used for larger networks that controls computers from one point.
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Encrypts the information in an SSL Certificate.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- A malicious program that records keystrokes.
- A program that hackers use to capture IDs and passwords on a network.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
Ipo rossword puzzle 2021-09-13
Across
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- a service charge assessed by a broker or investment advisor.
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
Down
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
- a sales pitch or promotion made by the underwriting firm, usually on the road
- Electronic Data Gathering, Analysis, and Retrieval system
- Capital stock is the amount of common and preferred shares that a company is authorized to issue
- Mark Zuckerberg
- a security that represents the ownership of a fraction of a corporation.
- A derivative is a complex type of financial security that is set between two or more parties.
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
Crack the code 2024-04-30
Across
- A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
- A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
- A program designed to prevent, detect, and remove malware (10 letters)
- The process of verifying the identity of a user or device (10 letters)
- A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
Down
- The exploitation of security vulnerabilities in a computer system or network (9 letters)
- Protects a computer system from unauthorized access (9 letters)
- Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
- The practice of disguising malicious files to make them appear harmless (7 letters)
- A set of rules or guidelines designed to enhance computer security (9 letters)
- A type of attack where an attacker intercepts communication between two parties (6 letters)
- The unauthorized copying of data from a computer system (6 letters)
12 Clues: Protects a computer system from unauthorized access (9 letters) • The unauthorized copying of data from a computer system (6 letters) • A program designed to prevent, detect, and remove malware (10 letters) • The process of verifying the identity of a user or device (10 letters) • A set of rules or guidelines designed to enhance computer security (9 letters) • ...
Chapter 18 Quiz 2012-11-26
Across
- certain government benefits entilted to certain individuals by law
- a tax in which the government takes more income from the wealthy
- the "bank account" into Social Security contributions are deposited and used to pay recipients
- a negative income tax that provide income to very poor individuals
- paymets given by government to those such a social security and retirement plans
- welfare reform law of 1996
- increasing concentration of property among women
- a tax that falls more heavily on low income groups
- shares of the national income of many groups
- policies that provide benefits to individual through testing or entitlements
Down
- name of public assistance for families in need
- a method used to count the number of impoverished
- programs available only to those with very specific needs
- a tax in which the governments takes income equally from all taxpayers
- amount of funds collected between to points in time
- value of assets owned
16 Clues: value of assets owned • welfare reform law of 1996 • shares of the national income of many groups • name of public assistance for families in need • increasing concentration of property among women • a method used to count the number of impoverished • a tax that falls more heavily on low income groups • amount of funds collected between to points in time • ...
The Role of Internet in our Life. 2024-11-10
Across
- The practice of using remote servers to store and manage data.
- A software application for accessing information on the Internet.
- A service that provides privacy and security online.
- A decentralized ledger technology used for secure transactions.
- An organized collection of data that can be accessed electronically.
- A search engine used to find information online.
- What do we use to connect to the Internet?
Down
- Programs that run on a computer or device.
- The act of browsing the web.
- Devices that can be easily carried and used on the go.
- MEDIA Websites that allow users to create and share content.
- A security system that monitors and controls incoming and outgoing network traffic.
- A digital audio file available for streaming or download.
- A small electronic device with a specific function.
- The physical components of a computer system.
- An online discussion platform where people can exchange ideas.
16 Clues: The act of browsing the web. • Programs that run on a computer or device. • What do we use to connect to the Internet? • The physical components of a computer system. • A search engine used to find information online. • A small electronic device with a specific function. • A service that provides privacy and security online. • ...
Networking concept 2025-05-18
Across
- A computer that requests services from a server.
- A security device that protects a network from unauthorized access.
- (Local Area Network): A network within a small geographic area.
- & Privacy:
- A group of interconnected devices that can communicate with each other.
- (Virtual Private Network): A secure connection that encrypts data and can be used to access a network remotely.
- A computer that provides services to other computers on the network.
Down
- A common wired network connection.
- A device that connects different networks together.
- A type of connection that uses radio waves to transmit data.
- (Wide Area Network): A network that spans a large geographic area.
- A device that forwards data between devices on a network.
- of Connections:
- A set of rules that govern communication on a network.
- Address: A unique numerical address assigned to each device on a network.
- Any device connected to a network.
16 Clues: & Privacy: • of Connections: • A common wired network connection. • Any device connected to a network. • A computer that requests services from a server. • A device that connects different networks together. • A set of rules that govern communication on a network. • A device that forwards data between devices on a network. • ...
UNIT 1 2023-05-03
Great Depression 2025-05-19
new deal 2024-04-15
Across
- glass-_______ banking act
- book from 1939
- social ________ act
- civilian ___________ corps
- Tennessee Valley Authority
- movie from 1939
- ________ _____ administration
Down
- 32nd president
- ______ act
- ________ __________ recovery act
- the same price for crops in 1910
- roosevelt's plan for recovery
- federal _______ insurance corporation
- new deal _________
- _______ roosevelt
15 Clues: ______ act • 32nd president • book from 1939 • movie from 1939 • _______ roosevelt • new deal _________ • social ________ act • glass-_______ banking act • civilian ___________ corps • Tennessee Valley Authority • roosevelt's plan for recovery • ________ _____ administration • ________ __________ recovery act • the same price for crops in 1910 • federal _______ insurance corporation
ServiceNow Knowledge 2024-11-07
Across
- Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
- personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
- automates and enhances IT operations through strategic use of machine learning and data science
- effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
- Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
- Procure ServiceNow in the Azure or AWS Marketplace
- Best Enterprise Architect in the business; Utilities Expert
- Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
Down
- provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
- generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
- Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
- Build apps at scale with a low-code development environment and prebuilt templates
- ServiceNow Solutions Consultant
- Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
- links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
- high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads
16 Clues: ServiceNow Solutions Consultant • Procure ServiceNow in the Azure or AWS Marketplace • Best Enterprise Architect in the business; Utilities Expert • Build apps at scale with a low-code development environment and prebuilt templates • Strengthen cloud security, protect sensitive data, and ensure regulatory compliance • ...
#BeCyberAware 2023-09-29
Across
- The day that software vendors release regular security updates.
- Authentication based on unique physical or behavioral traits.
- Malware that encrypts data and demands a ransom for decryption.
- Unauthorized interception of communication.
- Software designed to detect and remove viruses and other malware.
- Malware that provides unauthorized access while concealing its presence.
- Software or hardware that records keystrokes without authorization.
Down
- A software update that fixes security vulnerabilities.
- Illegally using a computer's resources to mine cryptocurrency.
- A network of infected computers controlled by a single entity.
- A decoy system designed to attract and trap attackers.
- An attack that involves trying every possible combination to crack a password
- The malicious part of software responsible for harmful actions.
- Capturing and analyzing network traffic without authorization.
- The process of converting data into a code to prevent unauthorized access.
15 Clues: Unauthorized interception of communication. • A software update that fixes security vulnerabilities. • A decoy system designed to attract and trap attackers. • Authentication based on unique physical or behavioral traits. • Illegally using a computer's resources to mine cryptocurrency. • A network of infected computers controlled by a single entity. • ...
Perfection 2023-04-13
Across
- An asset, pledged by a borrower that a lender accepts as a security against a loan
- Collateral like oil and gas immediately as its drilled from the ground
- A _ is Perfected when it attaches if the applicable requirements are satisfied before the _ attaches
- ARTICLE 9-314
- Where you file security interests related to land
- Piece of paper that is filed in a public office in a searchable database
- ARTICLE 9-310
- ARTICLE 9-309
Down
- ARTICLE 9-313
- Location or building where Financing Statement is NORMALLY filed
- Trees slated to be cut down
- Article 9 concept, which is designed to give the world notice of the secured parties interest in the Debtors Collateral
- A person or institution that owes a sum of money
- Uniform Commercial Code (3 letters)
- i.e gas station pumps
15 Clues: ARTICLE 9-313 • ARTICLE 9-314 • ARTICLE 9-310 • ARTICLE 9-309 • i.e gas station pumps • Trees slated to be cut down • Uniform Commercial Code (3 letters) • A person or institution that owes a sum of money • Where you file security interests related to land • Location or building where Financing Statement is NORMALLY filed • ...
AP Comp Sci Test 2023-05-02
Across
- security network system that monitors incoming and outgoing network traffic based on security rules
- there are 8 bits in one ____
- variable in a function definition, placeholder for values
- networking device that forwards data packets between computer networks
- common method for referencing elements in a list or string using numbers
- standard markup language for documents designed to be displayed in a web browser
- an ordered collection of elements in a program
- legal right given to an originator
- smallest unit of data
- 0s and 1s
Down
- group of functions that may be used in creating new programs
- a finite set of instructions that accomplish a task
- program that records keystrokes by a user
- rules and regulations we all agree to use
- a facility that allows computing devices to connect to the internet and send data via radio waves
15 Clues: 0s and 1s • smallest unit of data • there are 8 bits in one ____ • legal right given to an originator • program that records keystrokes by a user • rules and regulations we all agree to use • an ordered collection of elements in a program • a finite set of instructions that accomplish a task • variable in a function definition, placeholder for values • ...
BrainRiddle 2025-02-09
Across
- A scam where attackers trick people into giving sensitive information.
- A test to prove you are not a robot.
- A software patch that fixes bugs and security issues.
- Small data files stored by websites on a user's computer.
- Software designed to harm a computer system.
- A type of malware that spreads by attaching itself to programs.
- A security system that filters network traffic.
Down
- A software used to access the internet.
- A wireless network used for internet access.
- A copy of data used for recovery in case of loss.
- A person who gains unauthorized access to systems.
- A secret word or phrase used for authentication.
- Unwanted or junk emails.
- A system that stores data on remote servers instead of local devices.
- A unique identifier used to log into an account.
15 Clues: Unwanted or junk emails. • A test to prove you are not a robot. • A software used to access the internet. • A wireless network used for internet access. • Software designed to harm a computer system. • A security system that filters network traffic. • A secret word or phrase used for authentication. • A unique identifier used to log into an account. • ...
history crossword 2021-04-06
Across
- government spending
- appointed by the United States President
- Roosevelt’s policies for ending the Depression
- organize opposition to the New Deal and “teach the necessity of respect for the rights of person and property
- provide government insurance for bank deposits up to a certain amount
- Security Act provides some security for the elderly and for unemployed workers.
- Congress passed 15 major acts to meet the economic crisis
- which consists of five
- combined Roosevelt’s love of nature and commitment to conservation with the need to help the unemployed
Down
- money has a value directly linked to gold
- assigned many women to lower-level jobs in the federal bureaucracy
- closing the remaining banks before bank runs could put them out of business
- resolving a dispute that is private
- Works Progress Administration
- regulate the stock market
- Workers at other plants followed suit or carried out traditional strikes
- evening radio addresses given by Franklin D. Roosevelt,
- government would pay farmers not to raise certain livestock,
18 Clues: government spending • which consists of five • regulate the stock market • Works Progress Administration • resolving a dispute that is private • appointed by the United States President • money has a value directly linked to gold • Roosevelt’s policies for ending the Depression • evening radio addresses given by Franklin D. Roosevelt, • ...
Direct Group - Macmillan Crossword 25/09/20 2020-09-18
Across
- Formally demand an amount owing in law
- The organisation responsible for regulating the private security industry in the UK
- Amount of money owing
- Abbreviation for cameras worn by field agents and security guards
- Head office is based here
- Fine for parking on private land
- Find or discover by investigation or search
- Commonly known initials of the legislation governing personal data
- An individual, company, or institution sued or accused in a court of law
- A person or company making a claim in law
Down
- Process of taking legal action
- Decision of the courts
- A person employed to protect a building against intruders or damage
- A person in need of special care, support, or protection because of age, disability, or risk of abuse or neglect
- Execution of a judgments terms
- Certificated individual to enforce writ's
- Judgment of the high court
- A person or company) declared in law as unable to pay their debts
18 Clues: Amount of money owing • Decision of the courts • Head office is based here • Judgment of the high court • Process of taking legal action • Execution of a judgments terms • Fine for parking on private land • Formally demand an amount owing in law • Certificated individual to enforce writ's • A person or company making a claim in law • Find or discover by investigation or search • ...
Flourish 2014-03-24
Across
- freedom from danger and anxiety
- experiencing the thoughts, feelings and attitudes of another
- state of satisfaction
- state of mutual harmony
- state of rest or balance of opposing forces
- bringing together incomplete parts into a whole
- state of pleasure and contentment
- the condition of being oneself not another
Down
- general condition of body and mind with reference to sound and vigour
- health care facility for terminally ill
- pertaining to the mind
- state of attentiveness and being aware
- state of equilibrium and satisfaction at both a physical and mental level
- to assist unconditionally
- place of domestic security
- feeling of deep sympathy
- pertaining to or involving sentiment
- practice of extended or continued thought or reflection
- the state of being an individual
- care given to comfort not to cure
- pertaining to the body
- the state of recognising ones’ self
- of life/ general wellbeing of an individual defined in terms of health and happiness over wealth
- an integrated system designed to facilitate information exchange and support
24 Clues: state of satisfaction • pertaining to the mind • pertaining to the body • state of mutual harmony • feeling of deep sympathy • to assist unconditionally • place of domestic security • freedom from danger and anxiety • the state of being an individual • care given to comfort not to cure • state of pleasure and contentment • the state of recognising ones’ self • ...
Personal Dictionary 2022-01-13
Across
- Deceiving someone into making themselves vulnerable online
- Software that allows the user to search specific information online
- Storage accessible through various devices
- Software that acts as a foundation to the device
- Personal files saved to keep browsing information on websites
- electronic device that manipulates information
- secondary device connected to computers, typically used to control it (i.e mouse or keyboard)
- The understanding of using online tools
Down
- Tactic where someone takes on the identity of someone for personal gain
- A laptop ran off of google
- A certain date or time associated with digital records or files
- The address to a webpage
- Computer that can fit on or under a typical desk
- A screen that displays information generated by a computer
- A port to connect hardware
- The physical components to a computer
- Virtual instructions, data, or programs used to complete tasks
- A built-in security system that filters online traffic
- A portable computer with a keyboard and a screen
- Additional security process to ensure privacy
- temporary memory used for active programs
21 Clues: The address to a webpage • A laptop ran off of google • A port to connect hardware • The physical components to a computer • The understanding of using online tools • temporary memory used for active programs • Storage accessible through various devices • Additional security process to ensure privacy • electronic device that manipulates information • ...
Marigolds Crossword 2023-08-21
Across
- lacking physical form or shape; lacking organization; formless
- a state of reduced sensibility or consciousness
- to provoke and urge on
- a filthy and wretched condition or quality.
- difficult or impossible to explain or account for.
- to evade or escape from, as by daring, cleverness, or skill
- indifference to pleasure or pain; impassiveness.
- a bittersweet longing for things, persons, or situations of the past; the condition of being homesick; homesickness.
- very cautious; wary; not giving or expending freely
- a security hole or an instance of taking advantage of a security hole
- represented or appearing as such
Down
- lacking physical strength or vigor; weak.
- a state of abstracted musing; daydreaming
- to interrupt or cut off
- punishment administered in return for a wrong committed.
- having no useful result; ineffectual
- of, relating to, or in the nature of an illusion; lacking reality
- a difference between one thing and another, between one writing and another; a variance.
- arousing deep emotion, especially pity or sorrow; touching
- a show of bravery or defiance, often in order to make a false impression or mislead someone.
20 Clues: to provoke and urge on • to interrupt or cut off • represented or appearing as such • having no useful result; ineffectual • lacking physical strength or vigor; weak. • a state of abstracted musing; daydreaming • a filthy and wretched condition or quality. • a state of reduced sensibility or consciousness • indifference to pleasure or pain; impassiveness. • ...
Unit 2 Vocab 2023-10-09
Across
- legal
- Approach, point of view, focus
- federation
- we will have (future tense of tener)
- to immigrate(enter a country)
- worldwide
- to travel, journey
- from the south
- flow
- foreigner, alien
- to track down
- analyze, examine
- reason
- will exist
- to attain/to be able to
- I believe that
- movement, motion
- population
- to work, have a job
- Immigrants within one's own country
- ignition, on
- working day; day's journey
- inside, in
- immigration
- to link, to connect
Down
- African Studies Group
- to brake, stop
- citizenship/the citizens
- restart
- country, nation
- knowledge, understanding
- to exchange, to trade
- terrorist
- famous
- to reach, achieve
- Displaced
- world population
- ignorance, lack of awareness
- to tackle, to board
- management, administration
- countries of the world
- development, growth, progress
- (in)security; (lack of) security
- to try, attempt
- continent, mainland
- phenomenon
- to emigrate(leave a country)
- immigrants
- visa(travel document)
49 Clues: flow • legal • famous • reason • restart • terrorist • Displaced • worldwide • federation • will exist • phenomenon • population • immigrants • inside, in • immigration • ignition, on • to track down • to brake, stop • from the south • I believe that • country, nation • to try, attempt • world population • foreigner, alien • analyze, examine • movement, motion • to reach, achieve • to travel, journey • to tackle, to board • ...
investing-Abby 2025-03-25
Across
- age you have to be to invest in crypto
- A security that represents the ownership of a fraction of a corporation
- initial public offering
- takes cash from investors and invests in stocks
- markets rising
- Ceo of berkshire hathaway
- exchange traded funds
- sum of money available for a particular purchase
- a pension is managed by
- measures the price performance of a basket of securities
- the distribution of some of a company's earnings to shareholders
- markets failing
- currencies that are created and backed by the government
- fund for unexpected expenses
Down
- they represent a loan from a buyer
- the biggest financial fraud in U.S history
- best for aggressive risk tolerance investors
- dca provides some safety at the cost of?
- pulls money from a large group of investors
- makes it impossible to change, hack, or cheat the system
- age to receive full social security benefits
- warren buffetts #1 rule
- availability of cash or which a asset can be converted into cash
- the total value of a company's stock
- individual retirement account
25 Clues: markets rising • markets failing • exchange traded funds • initial public offering • a pension is managed by • warren buffetts #1 rule • Ceo of berkshire hathaway • fund for unexpected expenses • individual retirement account • they represent a loan from a buyer • the total value of a company's stock • age you have to be to invest in crypto • dca provides some safety at the cost of? • ...
investing- addy 2025-03-25
Across
- age you receive full social security benefits
- ceo of berkshire hathaway
- sum of money made available for a particular purpose
- small cap stocks, penny stocks
- a crypto currency
- age you can invest in crypto
- a company offers its shares to the public for the first time
- large cap stocks, blue chip companies
- a place where people buy and sell pieces of companies
- investing in equal amounts at regular intervals
- ownership of a fraction of a share
- investing all money at a given time
- is a collection of stocks, bonds, and other assets
- rule number one
Down
- the total value of a company’s stock
- a type of investment fund
- someone who holds stocks for the long term
- social security and medicare taxes
- payments made by companies to shareholders
- is a digital record of transactions and duplicated across a network
- a crypto currency
- buying and selling mutual funds
- rule number two
- have a fixed interest rate
- created and backed ny governments, not tied to any physical commodity
25 Clues: rule number two • rule number one • a crypto currency • a crypto currency • a type of investment fund • ceo of berkshire hathaway • have a fixed interest rate • age you can invest in crypto • small cap stocks, penny stocks • buying and selling mutual funds • social security and medicare taxes • ownership of a fraction of a share • investing all money at a given time • ...
ServiceNow Knowledge 2024-11-07
Across
- Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
- effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
- Best Enterprise Architect in the business; Utilities Expert
- links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
- Build apps at scale with a low-code development environment and prebuilt templates
- personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
Down
- provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
- Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
- Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
- Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
- generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
- ServiceNow Solutions Consultant
- Procure ServiceNow in the Azure or AWS Marketplace
- high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads
- Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
- automates and enhances IT operations through strategic use of machine learning and data science
16 Clues: ServiceNow Solutions Consultant • Procure ServiceNow in the Azure or AWS Marketplace • Best Enterprise Architect in the business; Utilities Expert • Build apps at scale with a low-code development environment and prebuilt templates • Strengthen cloud security, protect sensitive data, and ensure regulatory compliance • ...
NDS Crossword Puzzle 2024-01-03
Across
- Number (spelled out) of members on the Strategic Posture Commission
- Trusted advisor and partner
- Limiting of the production and spread of nuclear weapons
- Effort to prolong the life of weapons
- Tri-Lateral security partnership exploring acquisition of nuclear subs for Australia
- Space between new systems being fielded and the old systems aging out
- Sentinel will relieve these from duty
- Program to support and obtain supply chain surety from “critical suppliers”
- DoD sees this country as the “Pacing Challenge” to U.S. National Security
- Program responsible for refurbishing and modernizing the stockpile
- Weapon travels more than 5xs the speed of sound
Down
- Seeks to integrate all tools of national power across domains, geography, and threat space
- Document introduced “Integrated Deterrence” as a term:
- Agency with core mission to ensure safe, secure, and reliable nuclear stockpile
- Mid-west “plant” undergoing expansion
- _______ Chain (experiencing disruptions)
16 Clues: Trusted advisor and partner • Effort to prolong the life of weapons • Mid-west “plant” undergoing expansion • Sentinel will relieve these from duty • _______ Chain (experiencing disruptions) • Weapon travels more than 5xs the speed of sound • Document introduced “Integrated Deterrence” as a term: • Limiting of the production and spread of nuclear weapons • ...
Improving Security 2021-04-22
Bank Security 2021-11-04
Across
- Placed on door after robbery.
- This is most important for everyone during a robbery.
- What you should be when customers enter branch.
- Given to robber for tracking purposes.
Down
- We complete this form based upon what you actually saw or observed.
- Activate this if it can be accomplished without endangering others.
- Everyone needs to maintain this emotion for safety reasons.
7 Clues: Placed on door after robbery. • Given to robber for tracking purposes. • What you should be when customers enter branch. • This is most important for everyone during a robbery. • Everyone needs to maintain this emotion for safety reasons. • We complete this form based upon what you actually saw or observed. • ...
Airport Security 2021-11-06
7 Clues: f_______, • a__________ • Discovery of e__________, • Not stated clearly or exactly • Illegally damage/destroy computer data • Incite fear of explosives causing damage/danger • "Break through" a security restricted area (SRA)
Network Security 2022-04-27
Across
- uses duplication of critical components/devices, increasing the reliability of the system.
- protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
Down
- any program or code designed to do something on a system or network that you don’t want to have happen.
- a program that has two jobs: to replicate and to activate.
- Can sustain network operations for only a limited time in the event of an outage.
- Provides incremental trunk speeds by combining multiple Fast Ethernet links.
- Redundant ___ eliminates a single point of power failure.
7 Clues: Redundant ___ eliminates a single point of power failure. • a program that has two jobs: to replicate and to activate. • Provides incremental trunk speeds by combining multiple Fast Ethernet links. • Can sustain network operations for only a limited time in the event of an outage. • ...
Network security 2023-12-11
7 Clues: A piece of data • A wireless security protocol • An address used for LAN card • A network management approach • Used for intrusion prevention • A type of software used in network monitoring • utilized for collecting and managing log messages from network devices.
Password Security 2024-05-29
Across
- An attacker wants to ______ your password.
- Combining something you are, something you know, or something you have is an example of _________ authentication.
- Like a password, but is usually a saying or phrase.
- Shorter weaker passwords that are easy to guess can be easy for an attacker to ________.
Down
- your password if you suspect it is compromised.
- Avoid using the same password across _____ accounts, or else you risk all accounts being compromised.
- A strong password is hard to _______.
7 Clues: A strong password is hard to _______. • An attacker wants to ______ your password. • your password if you suspect it is compromised. • Like a password, but is usually a saying or phrase. • Shorter weaker passwords that are easy to guess can be easy for an attacker to ________. • ...
Social Security 2024-04-23
Across
- you recieve this from Social Security
- having a physical or mental condition that limits movements, senses, or activities.
- a severe global economic downturn that affected many countries across the world.
- a situation where a person actively searches for employment but is unable to find work.
Down
- a series of programs, public work projects, financial reforms, and regulations enacted by President Franklin D. Roosevelt
- a long history dating back to 13th-century Europe and became established in the U.S. during the 18th century.
- the action or fact of leaving one's job and ceasing to work.
7 Clues: you recieve this from Social Security • the action or fact of leaving one's job and ceasing to work. • a severe global economic downturn that affected many countries across the world. • having a physical or mental condition that limits movements, senses, or activities. • a situation where a person actively searches for employment but is unable to find work. • ...
