cyber security Crossword Puzzles

Thanksgiving 2024-11-26

Thanksgiving crossword puzzle
Across
  1. A type of pie, Macintosh for example
  2. Turkey + Duck + Chicken
  3. A type of pie, a gourd for example
  4. This is the name of a producer/seller of Turkey, name similar to Indiana University
  5. A type of pie or mash - the starchy vegetable kind
Down
  1. On Monday, go to the internet to get some of these deals
  2. "I won't be doing any cooking, but I will be doing a lot of ______ this Thanksgiving"
  3. Small __________ Saturday
  4. Macy's throws one of these every year
  5. What half the staff get on Thanksgiving
  6. Like 4th of July or President's Day, Thanksgiving is one of these
  7. This Meteorologist often hosts the sidelines of the Thanksgiving Day parade on NBC

12 Clues: Turkey + Duck + ChickenSmall __________ SaturdayA type of pie, a gourd for exampleA type of pie, Macintosh for exampleMacy's throws one of these every yearWhat half the staff get on ThanksgivingA type of pie or mash - the starchy vegetable kindOn Monday, go to the internet to get some of these deals...

The Kieronasaurus Krossword 2018-01-03

The Kieronasaurus Krossword crossword puzzle
Across
  1. An information classification expressed as numbers only.
  2. bully
  3. the ability to change the displayed content.
  4. Defined as direct physical threat to a country, but could also be a threat to financial security.
  5. The process of data
  6. The amount of information that can be held.
  7. amount of data protection principles.
  8. Examples: digital certificate, encryption, firewall
  9. Announcements or adverts. Small amounts of information sent easily.
  10. Attack on a business's servers not only impacts on the business or individual it holds data for
  11. Data collected by you yourself.
  12. Used to help blind people read.
  13. Computer hardware that cannot be moved
  14. source of information within a DFD
  15. yes or no
Down
  1. Triad
  2. Eliminate "unecessary" bits of information
  3. Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
  4. Raw facts and figures.
  5. Lets you recreate the original file exactly. Breaking a file into a smaller form for transmission.
  6. A closed, private network within a building or company.
  7. The language that websites are written in
  8. Canada's data protection legislation.
  9. footprint Any traceable action you or others take on the internet

24 Clues: Triadbullyyes or noThe process of dataRaw facts and figures.Data collected by you yourself.Used to help blind people read.source of information within a DFDamount of data protection principles.Canada's data protection legislation.Computer hardware that cannot be movedThe language that websites are written in...

Spanish3 crossword puzzle 2023-10-04

Spanish3 crossword puzzle crossword puzzle
Across
  1. population
  2. foreigner, alien
  3. immigration
  4. ignorance, lack of awareness
  5. to reach, achieve
  6. (in)security; (lack of) security
  7. working day; day's journey
  8. worldwide
  9. Displaced
  10. to link, to connect
  11. visa (travel document)
  12. to brake, stop
  13. federation
  14. development, growth, progress
  15. to immigrate (enter a country)
  16. to attain/to be able to
  17. phenomenon
  18. world population
  19. I believe that...
  20. continent, mainland
  21. restart
  22. countries of the world
  23. to exchange, to trade
  24. Immigrants within one's own country
  25. reason
Down
  1. citizenship/the citizens
  2. African Studies Group
  3. we will have (future tense of tener)
  4. analyze, examine
  5. immigrants - la persona que sale de su lugar de origen para llegar a un destino diferente
  6. knowledge, understanding
  7. legal
  8. country, nation
  9. try, attempt
  10. will exist
  11. to travel, journey
  12. to work, have a job
  13. movement, motion
  14. inside, in
  15. ignition, on
  16. to tackle, to board
  17. terrorist (male)
  18. Approach, point of view, focus
  19. to track down
  20. la administración,management
  21. flow
  22. famoso,famous
  23. from the south
  24. to emigrate (leave a country)

49 Clues: flowlegalreasonrestartworldwideDisplacedpopulationwill existfederationphenomenoninside, inimmigrationtry, attemptignition, onto track downfamoso,famousto brake, stopfrom the southcountry, nationforeigner, alienanalyze, examinemovement, motionworld populationterrorist (male)to reach, achieveI believe that...to travel, journeyto link, to connect...

RU ITEC 411 - Chapter 5 2023-11-29

RU ITEC 411 - Chapter 5 crossword puzzle
Across
  1. organization responsible for the development of secure coding standards
  2. computer virus circa 2000 causing billions in damages
  3. 17 down is a type of this
  4. hackers may use resumes from job postings to commit this crime
  5. technology for encrypted payment method using a cell phone
  6. device that records and steals credit card numbers from readers
  7. 2000's act that broadened the scope of 6 down
  8. a vulnerability in a system designed intentionally to attrack criminals
  9. open source encryption software
Down
  1. hacking a mobile phone to circumvent certificate requirements
  2. technology that makes technologies such as the iPhone impossible to crack
  3. hacking for a cause
  4. name of the malware used to attack 11 Down
  5. the first major U.S. computer crime law, passed in the 1980's
  6. a hidden means of accessing a computer
  7. the "target" of a major 2013 data breach
  8. a way for security professionals to test systems for vulnerabilities
  9. law protecting the unauthorized distribution of eBooks, etc.
  10. 1994 act requiring backdoors in cell phones
  11. security measure using "something you are"

20 Clues: hacking for a cause17 down is a type of thisopen source encryption softwarea hidden means of accessing a computerthe "target" of a major 2013 data breachname of the malware used to attack 11 Downsecurity measure using "something you are"1994 act requiring backdoors in cell phones2000's act that broadened the scope of 6 down...

Income Tax Vocabulary 2023-11-26

Income Tax Vocabulary crossword puzzle
Across
  1. When you overpay the government, you receive a refund
  2. Expenses the government has
  3. gross income Total income
  4. withholding Money an employer holds from your paycheck
  5. status Married/single/head of household
  6. Income from stocks and bonds
  7. Income the government receives from taxpayers, etc.
  8. Dependents you are claiming
  9. Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
  10. Set $ amount not taxed for each dependent
  11. Money you earn from employment
  12. income Money earned before deductions
  13. Husband/Wife
Down
  1. care expenses Money you pay for someone else to care for a child or elder dependent
  2. tax Taxes on income
  3. deduction $ amount non itemizers may subtract from income based upon filing status
  4. security Your personal identification number
  5. income Income received from interest, dividends, social security & pentions
  6. Money received from saving account
  7. A person who relies on someone for living expenses
  8. Your banks identification number
  9. of household Single person who has dependents
  10. No withholding
  11. pay Money you earn to take home

24 Clues: Husband/WifeNo withholdingtax Taxes on incomegross income Total incomeExpenses the government hasDependents you are claimingIncome from stocks and bondsMoney you earn from employmentpay Money you earn to take homeYour banks identification numberMoney received from saving accountincome Money earned before deductions...

Security and Privacy in Clinical Research 2023-11-22

Security and Privacy in Clinical Research crossword puzzle
Across
  1. Adherence to laws, regulations, and guidelines in healthcare
  2. HIPAA-compliant method to remove identifiable information (two words, remove space)
  3. Assurance of the accuracy and consistency of data over its lifecycle
  4. Legislation that protects personal health information in the U.S.
  5. Right to control the disclosure of personal health information
  6. Secure connection method for remote access to a network
  7. Access control based on permissions and roles
  8. Security system that controls incoming and outgoing network traffic
  9. Keeping patient information private and secure
  10. Desire to keep one's identity unknown
  11. Verification of identity using passwords, tokens, or keys
Down
  1. Removing or altering personal information from data sets to protect privacy
  2. Measures to protect data from unauthorized access
  3. Ensuring reliable access to healthcare services and data systems
  4. Scrambling data to prevent unauthorized interception
  5. Incident involving unauthorized release or exposure of private data
  6. Fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity
  7. Removing identifiers from data to preserve privacy
  8. Agreement by patients to participate in research and share data
  9. Tool funded by NIH for data analysis and patient cohort identification

20 Clues: Desire to keep one's identity unknownAccess control based on permissions and rolesKeeping patient information private and secureMeasures to protect data from unauthorized accessRemoving identifiers from data to preserve privacyScrambling data to prevent unauthorized interceptionSecure connection method for remote access to a network...

Asleep On A Plane 2023-06-29

Asleep On A Plane crossword puzzle
Across
  1. it's pressurized
  2. where declarations are made
  3. the brothers who got us here
  4. an alaskan island NOT served by many airlines
  5. everyone's waiting for the light to go off
  6. he'll bring you snacks
  7. where the plane goes from ground to sky
  8. despite the inflatable slide, no one wants to go to this pool party
  9. popular western airline
  10. famous German airline
  11. fluffy clouds
  12. what the plane's doing at 30,000 feet
  13. dispensed by a dangling mask
  14. where your carry-on is stored
  15. what you gotta pay to check
  16. stop in-between
  17. fills the tank
Down
  1. classic inflight drink
  2. additional security layer for some international travel
  3. domain of TSA
  4. at the helm
  5. seat position upon landing
  6. seatback furniture
  7. sign of baby's distress
  8. puke vessel
  9. classic inflight snack
  10. precedes arrival
  11. bumpy ride
  12. chocolate, liquor, electronics found here
  13. where the VIPs hang
  14. where one waits for one's plane
  15. badly behaved
  16. the state of most flights these days
  17. what condors and vultures do

34 Clues: bumpy rideat the helmpuke vesseldomain of TSAfluffy cloudsbadly behavedfills the tankstop in-betweenit's pressurizedprecedes arrivalseatback furniturewhere the VIPs hangfamous German airlineclassic inflight drinkhe'll bring you snacksclassic inflight snacksign of baby's distresspopular western airlineseat position upon landing...

Per 1 Chapter 11 - Ali, Mohammad 2023-02-23

Per 1 Chapter 11 - Ali, Mohammad crossword puzzle
Across
  1. The Disk is operating with no issues.
  2. Allows you to control parts of the computer.
  3. Bit depth
  4. Delete Browsing History
  5. A regular disk is being converted to a dynamic disk.
  6. A volume is operating properly.
  7. Already open file with no security
  8. The SSH host receives credentials.
  9. Icons flying everywhere.
  10. has the same start button as Windows 7
  11. The disk is unavailable or corrupted
  12. Set of rules and procedures
  13. Identified with Dollar Signs in the name
  14. A command that is used to query a DNS Server.
  15. Private network connects to other remote networks through their own network.
Down
  1. Vertical or Horizontal
  2. Used to open or delete a file using higher permissions.
  3. Tile Startup
  4. Nothing is left on
  5. Virtual app folder
  6. Power is saved by saving power through turning off ?
  7. Garbage OS
  8. A command that tests basic connectivity between devices.
  9. Choose a power plan.
  10. A display can be specified.
  11. Windows before Windows 7
  12. Opens remote desktop utility.
  13. Numbers of times the screen is redrawn.
  14. A disk is turn off or disconnected.
  15. Very weak security

30 Clues: Bit depthGarbage OSTile StartupNothing is left onVirtual app folderVery weak securityChoose a power plan.Vertical or HorizontalDelete Browsing HistoryIcons flying everywhere.Windows before Windows 7A display can be specified.Set of rules and proceduresOpens remote desktop utility.A volume is operating properly.Already open file with no security...

unit 6 2023-05-19

unit 6 crossword puzzle
Across
  1. monitors product safety nationwide
  2. the government controls all of the means of production
  3. ______ resources; humans with skills used to produce goods and services
  4. social _____; Medicare for people 65 or older
  5. investigates violations of federals law
  6. choices for production are made by people based on there life
  7. regulates the trading of stocks and bonds
  8. choices are made in markets through buyers and sellers
  9. protect from poorly made food
  10. health insurce for low income Americans
  11. all choices are made by the government
  12. to prevent false advertising
Down
  1. ______ cost; 2 choices and you have to give one
  2. works to control the spread of diseases
  3. protect workers from hazardous conditions
  4. developing countries
  5. ensures safety in flying
  6. _____ resources; any asset used in the productions of goods and services
  7. government controls some part of the economy to promote equality in reasources
  8. government gets involved to protect there people
  9. protect the environment
  10. regulates communications over the air
  11. looks into trafficking drugs
  12. health added to the social security program

24 Clues: developing countriesprotect the environmentensures safety in flyinglooks into trafficking drugsto prevent false advertisingprotect from poorly made foodmonitors product safety nationwideregulates communications over the airall choices are made by the governmentworks to control the spread of diseasesinvestigates violations of federals law...

Marigolds Crossword 2023-08-21

Marigolds Crossword crossword puzzle
Across
  1. of, relating to, or in the nature of an illusion; lacking reality
  2. a state of abstracted musing; daydreaming
  3. a bittersweet longing for things, persons, or situations of the past; the condition of being homesick; homesickness.
  4. difficult or impossible to explain or account for.
  5. very cautious; wary; not giving or expending freely
  6. punishment administered in return for a wrong committed.
  7. to evade or escape from, as by daring, cleverness, or skill
  8. to provoke and urge on
  9. a filthy and wretched condition or quality.
Down
  1. a state of reduced sensibility or consciousness
  2. represented or appearing as such
  3. to interrupt or cut off
  4. lacking physical form or shape; lacking organization; formless
  5. lacking physical strength or vigor; weak.
  6. a show of bravery or defiance, often in order to make a false impression or mislead someone.
  7. indifference to pleasure or pain; impassiveness.
  8. having no useful result; ineffectual
  9. a security hole or an instance of taking advantage of a security hole
  10. arousing deep emotion, especially pity or sorrow; touching
  11. a difference between one thing and another, between one writing and another; a variance.

20 Clues: to provoke and urge onto interrupt or cut offrepresented or appearing as suchhaving no useful result; ineffectuala state of abstracted musing; daydreaminglacking physical strength or vigor; weak.a filthy and wretched condition or quality.a state of reduced sensibility or consciousnessindifference to pleasure or pain; impassiveness....

Investing-Ray 2025-03-24

Investing-Ray crossword puzzle
Across
  1. You dont pay social security tax when you have this
  2. conceived in 1935 to address the permanent problem of economic security for the elderly
  3. Put up $7000 pre tax
  4. What you can dip into after retirement
  5. Government medical healthy plan
  6. $176,100
  7. What you live off of on a monthly basis
  8. The thing your doing right now
  9. Retirement age
  10. When you move your savings from one company to another
  11. What you look forward to when your too old to work
Down
  1. An account where you invest your money
  2. Put up $7000 post tax
  3. Old age, survivors, disability, investments
  4. U.S. Federal payroll tax
  5. Employer sponsored retirement savings plan
  6. Someone you hire to talk to about your money
  7. A collection of stocks, bonds or other assets that trades on stock exchange
  8. Retirement bonus age
  9. Someone you work for
  10. A place where people can invest their money
  11. Who created retirement?
  12. Secured in the possession of, or assigned to a person
  13. A sum of money saved or made available for a particular purpose
  14. The abbreviation for Required Minimum Distribution

25 Clues: $176,100Retirement agePut up $7000 pre taxRetirement bonus ageSomeone you work forPut up $7000 post taxWho created retirement?U.S. Federal payroll taxThe thing your doing right nowGovernment medical healthy planAn account where you invest your moneyWhat you can dip into after retirementWhat you live off of on a monthly basis...

HSE Crossword 2025-05-07

HSE Crossword crossword puzzle
Across
  1. Cipher component modifiable for crypto agility
  2. Self-test comparing output to expected results
  3. Legacy protocol surpassed by HSE performance
  4. Security feature to zeroize keys upon intrusion
  5. Quantum-resistant encryption initiative
  6. Protocol for secure management via CM7
  7. Key used for deriving encryption keys
  8. Diagnostic tool for encrypted Ethernet links
  9. Encryption algorithm used in CN Series
  10. Vendor of CN Series encryptors
  11. Time delay minimized by cut-through architecture
  12. Competitor protocol with hop-by-hop limitations
  13. Compact encryptor ideal for remote sites
Down
  1. Traffic handling policy besides encrypt or discard
  2. Mode for point-to-point encryption over Ethernet
  3. Capability to support new algorithms
  4. Software used to manage Senetas encryptors
  5. Transport Independent Mode acronym
  6. Kit for developing custom ciphers
  7. Self-test for manual verification of output
  8. Certification for cryptographic module security
  9. Command to zeroize keys and CSPs
  10. Mode for point-to-multipoint Ethernet encryption
  11. Encryption solution for secure data in motion
  12. Erasing all sensitive keys and data
  13. Management interface for configuring HSE devices
  14. High-performance encryptor for 100Gbps
  15. Mid-range encryptor for 10Gbps networks

28 Clues: Vendor of CN Series encryptorsCommand to zeroize keys and CSPsKit for developing custom ciphersTransport Independent Mode acronymErasing all sensitive keys and dataCapability to support new algorithmsKey used for deriving encryption keysProtocol for secure management via CM7Encryption algorithm used in CN Series...

Week 4 2025-09-18

Week 4 crossword puzzle
Across
  1. what kind of light source did they use above the Vatican for pope leo's birthday
  2. what natural disaster destroys 3 houses in utah
  3. how old did pope Leo turn
  4. what professional sport is having playoffs
  5. what popular figure in today's world says fight back in London's protest
  6. what are we patrolling the seas around Venezuela for
  7. where does trump want troops to stop crime
  8. charlie kirks shooter
  9. what is trump threatening with russia
  10. what foreign country is drilling military with Belarus
  11. what did a delta flight hit and have to turn around for
  12. How much money trump is requesting for increased security
Down
  1. what state did a teenager shoot up his school in
  2. last name of the fugitive that turned himself in for the shooting of charlie kirk
  3. what is charlie kirks roommate-lover
  4. how much did the world record sunflower grow a day
  5. what foreign country has rising tensions training their public for war
  6. what country is planning their biggest security operation
  7. how tall is the new world record sunflower
  8. what happened between a train and a semi

20 Clues: charlie kirks shooterhow old did pope Leo turnwhat is charlie kirks roommate-loverwhat is trump threatening with russiawhat happened between a train and a semiwhat professional sport is having playoffshow tall is the new world record sunflowerwhere does trump want troops to stop crimewhat natural disaster destroys 3 houses in utah...

Escalation Line Black Inventors Puzzle 2022-02-16

Escalation Line Black Inventors Puzzle crossword puzzle
Across
  1. Evaporative Air COnditioner
  2. Traffic Light
  3. Home Security System
  4. Folding Cabinet
  5. Street Letter Box
  6. Automatic Lubricating Device
Down
  1. Improved Boiler System
  2. Peanut Products
  3. Improved Ironing Board
  4. Automatic Elevator Doors
  5. Induction Telegraph
  6. Automatic Transmisison
  7. Potato Chip
  8. Hot Comb

14 Clues: Hot CombPotato ChipTraffic LightPeanut ProductsFolding CabinetStreet Letter BoxInduction TelegraphHome Security SystemImproved Boiler SystemImproved Ironing BoardAutomatic TransmisisonAutomatic Elevator DoorsEvaporative Air COnditionerAutomatic Lubricating Device

lesson 30 2015-05-15

lesson 30 crossword puzzle
Across
  1. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  2. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  3. Deciphers the information in an SSL Certificate.
  4. Encrypts the information in an SSL Certificate.
  5. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  6. A malicious program that records keystrokes.
  7. Hackers using spyware to control your browser
Down
  1. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  2. A program that hackers use to capture IDs and passwords on a network.
  3. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  4. Security feature used for larger networks that controls computers from one point.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browserEncrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.Security feature used for larger networks that controls computers from one point....

The Ark 2022-05-31

The Ark crossword puzzle
Across
  1. different kinds
  2. to enroll
  3. not wet
  4. move around or avoid
  5. three feet
  6. group of trees
Down
  1. deadly
  2. bend over upon itself
  3. assurance
  4. imaginative narration
  5. communication
  6. low cost

12 Clues: deadlynot wetlow costassuranceto enrollthree feetcommunicationgroup of treesdifferent kindsmove around or avoidbend over upon itselfimaginative narration

Chapter 18 2016-05-01

Chapter 18 crossword puzzle
Across
  1. to Needy Families new name of the organization that brings forth public assistance to needy families; former possessor of the name "Aid to Families With Dependent Children."
  2. benefit given by the government directly to individuals; may be either cash transfers (i.e. Social Security payments) or in-kind transfers (i.e. food stamps).
  3. and Work Opportunity Reconciliation Act official name of the welfare reform law of 1996.
  4. The Immigration Control and Reform Act
  5. tax by which the burden falls relatively upon low-income groups than upon wealthy taxpayers; opposite of progressive tax.
  6. "negative income tax" that provides income to very poor individuals in lieu of charging them federal income taxes.
  7. tax by which the government takes a greater share of the income of the rich than of the poor.
  8. government benefit to which certain qualified individuals are entitled by law, regardless of need.
  9. tax by which the government takes the same share of income from everyone, rich and poor alike.
Down
  1. increasing concentration of poverty among women, especially unmarried women and then children.
  2. value of assets owned.
  3. policy that provides benefits to individuals, either through entitlements or means testing.
  4. of 1935 creator of both the Social Security Program and a national assistance program for poor children, usually called AFDC.
  5. "bank account" into which Social Security contributions are "deposited" and used to pay out eligible recipients.
  6. method used to count the number of poor people; considers what a family must spend for an "austere" standard of living.
  7. government program available only to individuals below a poverty line.
  8. the act of relocating to a foreign country
  9. "shares" of the national income earned by various groups.
  10. amount of funds collected between any two points in time.

19 Clues: value of assets owned.The Immigration Control and Reform Actthe act of relocating to a foreign country"shares" of the national income earned by various groups.amount of funds collected between any two points in time.government program available only to individuals below a poverty line....

Allie Blair Virus Crossword 2021-03-15

Allie Blair Virus Crossword crossword puzzle
Across
  1. a type of virus that duplicates itself in order to spread to other computers
  2. messages sent from one computer to the other using the internet
  3. A software program designed to infiltrate or damage a computer system without the user's informed consent
  4. backup protects viruses and hackers from being able to permanently delete your files and data
  5. Computer code that lies dormant until it is triggered by a specific logical event.
  6. A type of malware that deludes the users to its true purpose allowing it to invade the computer
  7. to discover or investigate a problem on a computer
  8. Software code that gives access to a program or a service that will get through normal security protections
  9. A technique intruders use to make their network or internet transmission appear legitimate
Down
  1. written to help a computer operate and make it run smoothly.
  2. a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attacks
  3. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
  4. a type of social engineering attack often used to steal user data
  5. a piece of code that is capable of copying itself and has a harmful effect
  6. A logical computer network of zombies under the control of an attacker
  7. software designed to detect and destroy computer viruses
  8. A publicly released software security update intended to repair a vulnerability
  9. An infected computer that is under the control of a remote attacker
  10. an attack that wants to make the program it's attacking unavailable to its users

19 Clues: to discover or investigate a problem on a computersoftware designed to detect and destroy computer viruseswritten to help a computer operate and make it run smoothly.messages sent from one computer to the other using the interneta type of social engineering attack often used to steal user data...

MODULE 11 QUIZ 2024-12-19

MODULE 11 QUIZ crossword puzzle
Across
  1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  2. Paid to probe networks and report vulnerabilities
  3. is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
  4. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. is a server role that makes it possible for administrators to take control of Microsoft product updates
  6. a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  7. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  8. what the user has (smart card or key)
  9. Do not report problems, but instead disseminate the information to other
  10. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
  11. Creates a barrier between two entities
Down
  1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  2. a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  3. features that enable administrators to control who has access to the network authentication
  4. The most widely used method for encrypting data is IP Security
  5. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  6. What users can do after they are logged on to the network
  7. An industry-standard client/server protocol that offers centralized control
  8. what the user knows (username/password)
  9. A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached

20 Clues: what the user has (smart card or key)Creates a barrier between two entitieswhat the user knows (username/password)Paid to probe networks and report vulnerabilitiesWhat users can do after they are logged on to the networkThe most widely used method for encrypting data is IP Security...

Identity Theft Crossword 2025-11-17

Identity Theft Crossword crossword puzzle
Across
  1. Note placed on your credit report that tells lenders to take extra steps to verify your identity.
  2. Unsecured network you should avoid using for banking or shopping online.
  3. Feature that shows where you are in real time, which you should usually turn off for safety.
  4. Official document you file with law enforcement to record the identity theft.
  5. Opening new credit cards or using existing cards without the real owner’s permission.
  6. Tool that securely stores and creates strong, unique passwords for all your accounts.
  7. Mixing real and fake information, like a real SSN with a fake name, to build a new fake identity.
  8. When someone uses your personal information without permission to commit fraud or other crimes.
  9. When someone uses your personal information without permission to commit fraud or other crimes.
  10. To regularly check your accounts and credit for suspicious charges or new accounts.
  11. Lock on your credit file that stops new accounts from being opened in your name.
Down
  1. When someone uses your health insurance information to get medical care, prescriptions, or surgeries.
  2. Machine that cuts paper into tiny pieces so thieves can’t read your documents.
  3. Controls on social media that limit who can see your posts and personal details.
  4. Extra security step that uses a code or app in addition to your password to log in.
  5. When someone uses your Social Security number to file a fake tax return or claim your refund.
  6. Taking out mortgages, car loans, or personal loans using another person’s identity.
  7. Financial institution you must contact right away if your card or account is used without permission.
  8. Using a locked mailbox and collecting mail quickly so it isn’t stolen.
  9. Government agency you contact if someone uses your Social Security number for tax fraud.

20 Clues: Using a locked mailbox and collecting mail quickly so it isn’t stolen.Unsecured network you should avoid using for banking or shopping online.Official document you file with law enforcement to record the identity theft.Machine that cuts paper into tiny pieces so thieves can’t read your documents....

Federal Agencies 2025-05-05

Federal Agencies crossword puzzle
Across
  1. Bank Buddy
  2. 7.65
  3. Finances
  4. Unemployment benefit
  5. Optimal Retirement
  6. Social Security
Down
  1. Stock Disclosure Statement
  2. Banking Success
  3. Excessive Spending
  4. Treasury monument
  5. Stock Fraud

11 Clues: 7.65FinancesBank BuddyStock FraudBanking SuccessSocial SecurityTreasury monumentExcessive SpendingOptimal RetirementUnemployment benefitStock Disclosure Statement

Executive Branch 2023 2023-10-17

Executive Branch 2023 crossword puzzle
Across
  1. declaration of forgiveness and freedom from punishment
  2. an official representative of a country's government
  3. agreement among a group of nations to prohibit them from trading with a target nation
  4. more presidents have been this profession than any other profession
  5. this article of the Constitution discusses the Executive Branch
  6. The Presidential ___ Act deals with the line of succession after the Vice President
  7. This amendment deals with presidential succession
  8. Executive ___ is a rule of command that has the force of law
  9. Current President (last name)
Down
  1. The Department of ___ Security was created in 2002
  2. the President's plan for dealing with other countries is referred to as his ___ policy
  3. a group of presidential advisors
  4. a pardon toward a group of people
  5. an order to delay a person's punishment
  6. The United States ___ Service is an example of a government corporation
  7. the primary goal of American foreign policy
  8. Current Vice President (last name)
  9. formal agreements between the governments of two or more countries

18 Clues: Current President (last name)a group of presidential advisorsa pardon toward a group of peopleCurrent Vice President (last name)an order to delay a person's punishmentthe primary goal of American foreign policyThis amendment deals with presidential successionThe Department of ___ Security was created in 2002...

ICT Cross Word 2019-07-08

ICT Cross Word crossword puzzle
Across
  1. hat hacker a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
  2. A series, or log, of discussion items on a page of the World Wide Web
  3. Items such as images or videos to be include din the final product
  4. rights The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system
  5. Automatic Number Plate Recognition
  6. use this to create spreadsheets
Down
  1. preference or point of view that is personal, rather than scientific.
  2. Measurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
  3. A partiMeasurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
  4. A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
  5. computer software that displays advertisements

11 Clues: use this to create spreadsheetsAutomatic Number Plate Recognitioncomputer software that displays advertisementsItems such as images or videos to be include din the final productpreference or point of view that is personal, rather than scientific.A series, or log, of discussion items on a page of the World Wide Web...

Law Enforcement On Site 2019-08-28

Law Enforcement On Site crossword puzzle
Across
  1. If a suspicious item is found during this type of threat, allow law enforcement to assume and maintain command.
  2. Acronym for the role whose duties include coordinating with law enforcement agencies.
  3. This person discusses with law enforcement on site: DC ________________.
  4. Law enforcement asks about specific crimes or cases that Microsoft may be party to. You pass the information to Global Security ________________.
  5. When documenting law enforcement officials, include their phone number and this other number.
Down
  1. This type of access request is required for law enforcement to enter the facility beyond the lobby.
  2. If law enforcement requests video footage, do not ______________ that security has such footage unless directed by management.
  3. Do not __________ law enforcement officials unless directed to do so by management.
  4. The first action taken by security when a crime is discovered after the fact.
  5. This policy does not apply to law enforcement officials acting in an official capacity.
  6. Where law enforcement representatives should wait while the appropriate people are contacted.

11 Clues: This person discusses with law enforcement on site: DC ________________.The first action taken by security when a crime is discovered after the fact.Do not __________ law enforcement officials unless directed to do so by management.Acronym for the role whose duties include coordinating with law enforcement agencies....

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. a security that represents the ownership of a fraction of a corporation.
  2. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  3. a service charge assessed by a broker or investment advisor.
  4. Mark Zuckerberg
  5. , Capital stock is the amount of common and preferred shares that a company is authorized to issue
  6. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
  7. Electronic Data Gathering, Analysis, and Retrieval system
  8. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
Down
  1. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  2. a sales pitch or promotion made by the underwriting firm, usually on the road
  3. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  4. , A derivative is a complex type of financial security that is set between two or more parties.

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

IC3 Module 3 Lesson 30 2015-05-22

IC3 Module 3 Lesson 30 crossword puzzle
Across
  1. Encrypts the information in an SSL Certificate.
  2. Security feature used for larger networks that controls computers from one point.
  3. A malicious program that records keystrokes.
  4. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  5. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  6. Deciphers the information in an SSL Certificate.
  7. Hackers using spyware to control your browser.
  8. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
Down
  1. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  2. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  4. A program that hackers use to capture IDs and passwords on a network.
  5. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.Security feature used for larger networks that controls computers from one point....

IC3 Lesson 30 2015-05-15

IC3 Lesson 30 crossword puzzle
Across
  1. Security feature used for larger networks that controls computers from one point
  2. A malicious program that records keystrokes
  3. Hackers using spyware to control your browser
  4. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  6. Encrypts the information in an SSL Certificate
  7. Invading Someone else's computer, usually for personal gain or the satisfaction of defeating a security system
Down
  1. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  2. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
  3. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
  4. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
  5. Deciphers the information in an SSL Certificate
  6. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokesHackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

lesson 30 vocab words 2015-05-18

lesson 30 vocab words crossword puzzle
Across
  1. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
  2. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  4. hackers using spyware to control your browser
  5. Deciphers the information in an SSL Certificate
  6. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
  7. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
Down
  1. A malicious program that records keystrokes
  2. Encrypts the information in an SSL Certificate
  3. Security feature used for larger networks that controls computers from one point
  4. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
  6. A program that hackers use to capture IDs and passwords on a network

13 Clues: A malicious program that records keystrokeshackers using spyware to control your browserEncrypts the information in an SSL CertificateDeciphers the information in an SSL CertificateA program that hackers use to capture IDs and passwords on a networkSecurity feature used for larger networks that controls computers from one point...

Quality Crossword 2023-07-17

Quality Crossword crossword puzzle
Across
  1. If the customer fails to answer the first security question correctly, ask the second question and gather one recent _______ detail
  2. When speaking with a customer you MUST acknowledge your _______ and NEED to help with a full and complete sentence.
  3. Account ____ Authorization Forms must be completed at an Umpqua location.
  4. ____ complaints and compliments must be submitted ONLY if a caller requests that their feedback be filed or documented.
  5. Reading the full and complete _____ will ensure you do not miss important steps.
Down
  1. When customer is fully verified and there are no OOW or security questions on file, it is recommended that you collect answers to ___ security questions and add them to the core system.
  2. This must be done for Qa's within 7 days of receipt.
  3. ____ Courtesy and Professionalism takes us to the next level in Customer Service.
  4. Customers requesting to close CD, HSA, IRA, trust, estate or custodial accounts may either visit an Umpqua Bank location or speak with the ______ store.
  5. It’s very important to acknowledge customer’s ____, when they call us
  6. Recently updated procedures can be found in _______
  7. _____ is required to be verified once in a 6-month period.

12 Clues: This must be done for Qa's within 7 days of receipt.Recently updated procedures can be found in ____________ is required to be verified once in a 6-month period.It’s very important to acknowledge customer’s ____, when they call usAccount ____ Authorization Forms must be completed at an Umpqua location....

IPO Process 2023-01-03

IPO Process crossword puzzle
Across
  1. the first issuance of stock from a private company for public sale.
  2. Price price at which a new security will be distributed to the public prior to the new issue trading on the secondary market; commonly referred to as offering price
  3. date on which an executed trade of securities must be paid for
  4. the amount of stock in an initial public offering (IPO) that is sold to a customer
  5. when an investor sells their shares to the public on the secondary market after an initial public offering (IPO).
Down
  1. characteristic of a security which rises or falls sharply in price within a short time period
  2. ____Herring a preliminary prospectus filed with the SEC
  3. date the day a newly registered security can be offered for sale
  4. brokerage firm that raises money for companies using public equity and debt markets
  5. process by which a privately held company first offers shares of stock to the public; this is done via an initial public offering (IPO)
  6. privately held company offers its shares to the public—an initial public offering (IPO)
  7. a federal government agency that regulates and supervises the securities industry

12 Clues: ____Herring a preliminary prospectus filed with the SECdate on which an executed trade of securities must be paid fordate the day a newly registered security can be offered for salethe first issuance of stock from a private company for public sale.a federal government agency that regulates and supervises the securities industry...

The Ark 2022-05-31

The Ark crossword puzzle
Across
  1. - different kinds
  2. - to enroll
  3. - not wet
  4. - move around or avoid
  5. - three feet
  6. - group of trees
Down
  1. - deadly
  2. - bend over upon itself
  3. - assurance
  4. - imaginative narration
  5. - communication
  6. - low cost

12 Clues: - deadly- not wet- low cost- assurance- to enroll- three feet- communication- group of trees- different kinds- move around or avoid- bend over upon itself- imaginative narration

The Ark 2022-05-31

The Ark crossword puzzle
Across
  1. different kinds
  2. to enroll
  3. not wet
  4. move around or avoid
  5. three feet
  6. group of trees
Down
  1. deadly
  2. bend over upon itself
  3. assurance
  4. imaginative narration
  5. communication
  6. low cost

12 Clues: deadlynot wetlow costassuranceto enrollthree feetcommunicationgroup of treesdifferent kindsmove around or avoidbend over upon itselfimaginative narration

Animal Farm Crossword Puzzle 2025-04-08

Animal Farm Crossword Puzzle crossword puzzle
Across
  1. windmill destroyer
  2. seven
  3. farm name
  4. alcoholic
  5. Napoleons security
Down
  1. Comrade
  2. animals favourite tune
  3. strongest animal
  4. two legs bad
  5. some are more equal than others
  6. selfish
  7. Lebron james

12 Clues: sevenComradeselfishfarm namealcoholictwo legs badLebron jamesstrongest animalwindmill destroyerNapoleons securityanimals favourite tunesome are more equal than others

IT Aisle Stories 2020-08-06

IT Aisle Stories crossword puzzle
Across
  1. The Information Security Office host Security ________ meetings to battle cybercrime
  2. Hear ye, Hear ye, virtually
  3. From RBS IT Cloud services to RBS IT____ Services Group
  4. Powered by ServiceNow
  5. Secure Code Warrior being sponsored by this Team (abbreviation)
  6. I need training
  7. PDL hosted a day of educational programming for this, also known as Freedom Day.
  8. The act of getting employees involved and interacting with one another.
  9. Tool that allows customers to check out groceries (while bagging) as they shop the aisles
Down
  1. Technology driven program to drive change and represent those of different gender identities; _____ in Tech+
  2. The team that creates the IT Aisle is known as the IT Communications & ______ Team.
  3. Microsoft program that was launched this year to create a better platform for communication.
  4. Breaking Down Silos at RBS
  5. Click & Collect
  6. The act of sending fraudulent texts with the intent to steal personal or financial data.
  7. Eric Braun is lead Team kickoff month
  8. Our New Journey
  9. Thank You

18 Clues: Thank YouClick & CollectI need trainingOur New JourneyPowered by ServiceNowBreaking Down Silos at RBSHear ye, Hear ye, virtuallyEric Braun is lead Team kickoff monthFrom RBS IT Cloud services to RBS IT____ Services GroupSecure Code Warrior being sponsored by this Team (abbreviation)...

AI and Privacy Crossword 2025-01-13

AI and Privacy Crossword crossword puzzle
Across
  1. What robots do in school (2 words)
  2. Not a starter; held in reserve in case the start is lost
  3. Rhymes with preach, often accompanied by prayer
  4. Inclination to prejudice or fabric cut on the diagonal
  5. Golf Delta Papa Romeo to Nato members
  6. One way to secure data in transit; not a burial ritual
  7. Describes private company information that, notably, might not be privacy-related
  8. Might apply to a blanket, a guard, or a phishing alert
Down
  1. Better than defiance
  2. Complex equations computers use
  3. Classic strategy board game
  4. Quality of clean windows and good business
  5. Party that is empowered by data subject to process her or his data
  6. Entity that processes data at the direction of an authorized party, or a computer's CPU
  7. Like munitions, often stored in a base
  8. Change one letter to create a nation of cars (without manual transmissions)
  9. Synonym of creative; describes a specific attribute of some AI systems
  10. Heat producers when burned or security measures that track data access

18 Clues: Better than defianceClassic strategy board gameComplex equations computers useWhat robots do in school (2 words)Golf Delta Papa Romeo to Nato membersLike munitions, often stored in a baseQuality of clean windows and good businessRhymes with preach, often accompanied by prayerInclination to prejudice or fabric cut on the diagonal...

Airport Vocabulary 2025-07-03

Airport Vocabulary crossword puzzle
Across
  1. When a flight is not going to take place.
  2. A stop between connecting flights
  3. Where officials verify your travel documents
  4. Stamp placed in your passport showing when you entered a country
  5. Permission to enter/stay in a country
  6. A journey made by air
  7. Device that checks for metal items during security screening
  8. A place to register before boarding and leave large luggage
  9. The process of entering a country legally
  10. Place where your luggage is inspected for prohibited items
Down
  1. Small bag allowed in the cabin area
  2. Where your bags and body are scanned
  3. When the airline has sold more tickets than seats
  4. When your bags don’t arrive or go missing
  5. Place where you board the plane, usually in the airports there are many
  6. Place where you collect your luggage
  7. When your flight leaves later than expected
  8. Document needed to enter the airplane

18 Clues: A journey made by airA stop between connecting flightsSmall bag allowed in the cabin areaWhere your bags and body are scannedPlace where you collect your luggagePermission to enter/stay in a countryDocument needed to enter the airplaneWhen a flight is not going to take place.When your bags don’t arrive or go missing...

2018 Security Fair Puzzle 2018-05-17

2018 Security Fair Puzzle crossword puzzle
Across
  1. _____ travel increases the risk of Foreign Intelligence Targeting.
  2. All non-Lockheed Martin visitors must be entered into _____ by host prior to visit.
  3. Always inform your security office if you plan to move _____ equipment.
  4. Bankruptcy is one form of reportable _____ information.
  5. Only employees on the access list to a closed area can wear _____ lab coats.
  6. Security is everybody’s _____.
  7. All unauthorized (not on access list) _____ must sign the closed area log.
Down
  1. Always use our Blue Light Policy while escorting _____ personnel in closed areas.
  2. _____ is the emergency notification system LM uses to alert employees and contractors.
  3. The _____ Suitcase provides everything international travelers need to prepare for their trip.
  4. _____ e-mails should be sent to the CIRT and your local FSO.
  5. Transferring, downloading and/or storing LM data on personally owned IT assets is _____.
  6. _____ should be complex combinations of numbers, symbols, and upper and lowercase letters.
  7. If released outside of the facility, _____ papers must be marked as finished documents.
  8. Many public Wi-Fi hotspots—like libraries, coffee shops, and airports—aren’t _____.

15 Clues: Security is everybody’s _____.Bankruptcy is one form of reportable _____ information._____ e-mails should be sent to the CIRT and your local FSO._____ travel increases the risk of Foreign Intelligence Targeting.Always inform your security office if you plan to move _____ equipment....

Home Fundraising - Data Security 2013-09-23

Home Fundraising - Data Security crossword puzzle
Across
  1. You should keep your computers _____ during breaks
  2. You should not allow _______ access to your computer or workplace
  3. All computers for Data Entry Executive MUST have this installed
  4. Donor's data is stored here
  5. All outdated documents should be _________
  6. We should never share database ______ with others
  7. When you come across a security breach, you should immediately inform people in the __ department
  8. Breach in Data Security could lead to _______ of contract
  9. Frequency at which passwords should be changed on the database
  10. You should never send ______ emails from your official email address
Down
  1. You should never include ______ details in emails
  2. ______ documents should be locked inside cabins at the end of the day
  3. We should only keep the data we need due to?
  4. Always verify the _________ of the email before sending it
  5. These should never be written down anywhere

15 Clues: Donor's data is stored hereAll outdated documents should be _________These should never be written down anywhereWe should only keep the data we need due to?You should never include ______ details in emailsWe should never share database ______ with othersYou should keep your computers _____ during breaks...

At the security check! 2021-01-18

At the security check! crossword puzzle
Across
  1. sucka
  2. karl,"typ"
  3. platta,blad,ark
  4. stirra
  5. reta(s)
  6. besviken
  7. armbåge
Down
  1. koloss,åbäke
  2. generad
  3. frestelse
  4. lättad
  5. styra
  6. uttråkad
  7. förvirrad

15 Clues: suckastyralättadstirrageneradreta(s)armbågeuttråkadbesvikenfrestelseförvirradkarl,"typ"koloss,åbäkeplatta,blad,ark

Computer Threats and Security 2019-04-26

Computer Threats and Security crossword puzzle
Across
  1. / a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
  2. / the process of encoding a message so that it can be read only by the sender and the intended recipient
  3. / zombie network-is a group of infected computers that are under the control of one or more individuals.
  4. / the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
  5. / a destructive self replicating program containing code capable of gaining access to computers or networks.
  6. Espionage / an occasion when one company steals secrets from another company with which it is competing.
  7. / a software utility designed to protect your computer or network against computer viruses.
  8. / a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
  9. guard / a person whose job is to guard a place
Down
  1. theft / act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
  2. / the identification of a person by the measurement of their biological features.
  3. monitors / a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
  4. camera / a video camera that is used to observe a location.
  5. / malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
  6. Horse/ a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.

15 Clues: guard / a person whose job is to guard a placecamera / a video camera that is used to observe a location./ the identification of a person by the measurement of their biological features./ a software utility designed to protect your computer or network against computer viruses....

Computer Threats and Security 2019-04-26

Computer Threats and Security crossword puzzle
Across
  1. malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
  2. a software utility designed to protect your computer or network against computer viruses.
  3. a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
  4. an occasion when one company steals secrets from another company with which it is competing.
  5. a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
  6. the identification of a person by the measurement of their biological features.
Down
  1. act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
  2. the process of encoding a message so that it can be read only by the sender and the intended recipient
  3. a video camera that is used to observe a location.
  4. a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
  5. a person whose job is to guard a place
  6. a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
  7. a destructive self replicating program containing code capable of gaining access to computers or networks.
  8. the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
  9. zombie network-is a group of infected computers that are under the control of one or more individuals.

15 Clues: a person whose job is to guard a placea video camera that is used to observe a location.the identification of a person by the measurement of their biological features.a software utility designed to protect your computer or network against computer viruses.an occasion when one company steals secrets from another company with which it is competing....

Technology, security and transparency 2023-03-08

Technology, security and transparency crossword puzzle
Across
  1. which tech buzzword is closely related to Artificial intelligence (AI)?
  2. Asymmetric key encryption.?
  3. The transformer that develops the high voltage in a home television is commonly called a...?
  4. Which company has unveiled a breakthrough in semiconductor design and process with the development of the world's first chip announced with 2 nanometer nanosheet technology?
  5. The electromagnetic coils on the neck of the picture tube or tubes which pull the electron beam from side to side and up and down are called a...?
  6. A network site that appears to have a valuable information but is isolated and monitored is what kind of security measure?
  7. what information do you need to setup a wireless access point?
  8. First computer virus is known as....
Down
  1. TMP' extension refers usually to what kind of file?
  2. What technology is used to make telephone calls over the internet possible?
  3. Gives little to no information about the system to the penetrate tester?
  4. Strongest single encryption?
  5. Which one is the first search engine in internet?
  6. What technology is used to record cryptocurrency transactions?
  7. The DOGE-1 Mission to the Moon will be launched by which company in 2022?

15 Clues: Asymmetric key encryption.?Strongest single encryption?First computer virus is known as....Which one is the first search engine in internet?TMP' extension refers usually to what kind of file?What technology is used to record cryptocurrency transactions?what information do you need to setup a wireless access point?...

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sending
  2. data
  3. protocol levels
  4. common clock
  5. interface, transmitter
Down
  1. decodes
  2. creation
  3. mediums
  4. security
  5. server, user's identity

10 Clues: datadecodessendingmediumscreationsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identity

Create Crossword puzzle 2024-12-09

Create Crossword puzzle crossword puzzle
Across
  1. drift
  2. Conditions
  3. Exchange
  4. Liberalisation
Down
  1. land use
  2. security
  3. larceny
  4. National Product (GNP)
  5. tenure
  6. equality

10 Clues: drifttenurelarcenyland usesecurityequalityExchangeConditionsLiberalisationNational Product (GNP)

Spanish Crossword 2024-11-07

Spanish Crossword crossword puzzle
Across
  1. to leave
  2. to make/ pack
  3. go through customs
  4. vacation
  5. Exit
Down
  1. ruins
  2. security
  3. trip
  4. Airplane
  5. City

10 Clues: tripCityExitruinsto leavesecurityAirplanevacationto make/ packgo through customs

browsing safety 2025-06-06

browsing safety crossword puzzle
Across
  1. a criminal activity to harm anyone online
  2. an illegal entry a computer or internet
  3. a program designed to prevent and removal of viruses from a coputer
Down
  1. man who do cyber crime
  2. a malware which do distruction of data
  3. a software that prevet unauthorised acces to your computer

6 Clues: man who do cyber crimea malware which do distruction of dataan illegal entry a computer or interneta criminal activity to harm anyone onlinea software that prevet unauthorised acces to your computera program designed to prevent and removal of viruses from a coputer

Homework 2022-09-22

Homework crossword puzzle
Across
  1. pretend to have feelings or beliefs
  2. pleasurable expectation
  3. a strong dislike
  4. a beautiful sound
  5. likely going to happen
  6. a place of security
  7. determination
Down
  1. share
  2. hated
  3. menacing
  4. tiny
  5. attracting attention
  6. burning hot
  7. a second thought

14 Clues: tinysharehatedmenacingburning hotdeterminationa strong dislikea second thoughta beautiful sounda place of securityattracting attentionlikely going to happenpleasurable expectationpretend to have feelings or beliefs

Military Acronyms 2025-10-09

Military Acronyms crossword puzzle
Across
  1. PT, _____ Training
  2. DOD, Department of _____
  3. OCP, _____ Camouflage Pattern
  4. AI, _____ Item
  5. CIV
  6. ACU, Army _____ Uniform
Down
  1. CMD
  2. MOS, Military _____ Specialty
  3. XO, _____ Officer
  4. OPSEC, Operations _____
  5. FMSU, _____ Management Support Unit
  6. UCP, _____ Camouflage Pattern
  7. Army National Guard
  8. CAC, _____ Access Card

14 Clues: CMDCIVAI, _____ ItemXO, _____ OfficerPT, _____ TrainingArmy National GuardCAC, _____ Access CardOPSEC, Operations _____ACU, Army _____ UniformDOD, Department of _____MOS, Military _____ SpecialtyOCP, _____ Camouflage PatternUCP, _____ Camouflage PatternFMSU, _____ Management Support Unit

Information Security 2020-09-24

Information Security crossword puzzle
Across
  1. The best response to password Recovery Questions is,
  2. Disclosing personal member information may be
  3. The type of email to get you to click on a fraudulent link
  4. Who is responsible for data security
Down
  1. How might someone evil try to get information from you
  2. If I click on a link I believe was malicious I should
  3. What is the default data classification,

7 Clues: Who is responsible for data securityWhat is the default data classification,Disclosing personal member information may beThe best response to password Recovery Questions is,If I click on a link I believe was malicious I shouldHow might someone evil try to get information from youThe type of email to get you to click on a fraudulent link

Food Security 2021-10-28

Food Security crossword puzzle
Across
  1. overnutrition and overnutrition can both result in _____.
  2. ________ is the measure of the availability of food and individuals' ability to access it.
  3. 23.5 million people live in a _______.
  4. living in a food desert means you have limited access to ______, fresh, and affordable food.
Down
  1. In food deserts, _______ and convenience stores are often the only available places to get food.
  2. _______ is a root cause of hunger and malnutrition
  3. Some factors that can cause _______ or global hunger include poverty, job instability, unstable markets, climate change, and war.

7 Clues: 23.5 million people live in a _______._______ is a root cause of hunger and malnutritionovernutrition and overnutrition can both result in _____.________ is the measure of the availability of food and individuals' ability to access it.living in a food desert means you have limited access to ______, fresh, and affordable food....

Password Security 2016-02-01

Password Security crossword puzzle
Across
  1. a process of changing characters in a password to strengthen it
  2. to put in front of a password to make it more unique
Down
  1. include these values to strengthen passwords
  2. xxxxxxxxxx words make weak pass words
  3. include these special characters to strengthen passwords
  4. xxxxx force attacks use dictionaries of passwords to hack a system
  5. human sniffing passwords will xxxxx a password once the first few characters are known

7 Clues: xxxxxxxxxx words make weak pass wordsinclude these values to strengthen passwordsto put in front of a password to make it more uniqueinclude these special characters to strengthen passwordsa process of changing characters in a password to strengthen itxxxxx force attacks use dictionaries of passwords to hack a system...

Networks security 2021-02-09

Networks security crossword puzzle
Across
  1. Is bigger than LAN
  2. What is a Malware but is hidden
  3. LAN
  4. A biometric of facial features
Down
  1. A person who infiltrates systems or servers
  2. when an attack occurs to networks
  3. A system protection against malware and hackers

7 Clues: LANIs bigger than LANA biometric of facial featuresWhat is a Malware but is hiddenwhen an attack occurs to networksA person who infiltrates systems or serversA system protection against malware and hackers

collective security 2021-10-12

collective security crossword puzzle
Across
  1. what measures, not coercive,in the mechanism of ensuring universal security are brought to the fore
  2. the main reason in exceptional cases when peace has already been violated
  3. what laid the foundations of a kind of behaviour of states, the core of which were the principles of sovereignty and non-interference
  4. takes the first role in collective security
Down
  1. the first serious attempt to institutionalize collective security in the modern era
  2. bodies should make every effort to find a peaceful solution to local disputes through these agreements
  3. the type of security which require the protection of the world community or a group of States from the possibility of harming them by means of armed violence, provided by their joint efforts

7 Clues: takes the first role in collective securitythe main reason in exceptional cases when peace has already been violatedthe first serious attempt to institutionalize collective security in the modern erawhat measures, not coercive,in the mechanism of ensuring universal security are brought to the fore...

MIS Security 2023-11-14

MIS Security crossword puzzle
Across
  1. ______horse, software that appears to be benign but does something other than expected.
  2. protocols used for secure information transfer over the Internet
  3. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
  4. Write your initial here for identifier
  5. enforce a security policy on data exchanged between its network and the Internet
Down
  1. CryptoLocker is an example of
  2. _______ engineering, tricking employees into revealing their passwords by pretending to be a legitimate memberof a company is called

7 Clues: CryptoLocker is an example ofWrite your initial here for identifierprotocols used for secure information transfer over the Internetenforce a security policy on data exchanged between its network and the Internet______horse, software that appears to be benign but does something other than expected....

Security Words 2023-10-24

Security Words crossword puzzle
Across
  1. Watch over in order to protect or control.
  2. A person, object, or place selected as the aim of an attack.
  3. A supply or quantity of bullets and shells.
  4. Used as a protection against blows or missiles.
Down
  1. Measures taken to prevent
  2. A measure taken to protect someone or something or to prevent something undesirable
  3. A thing designed or used for inflicting bodily harm or physical damage.

7 Clues: Measures taken to preventWatch over in order to protect or control.A supply or quantity of bullets and shells.Used as a protection against blows or missiles.A person, object, or place selected as the aim of an attack.A thing designed or used for inflicting bodily harm or physical damage....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Source of food production
  2. Required for digestion
  3. source of energy
  4. Nutritional drink
Down
  1. drink harmful for human body
  2. source of iron
  3. must to have one fruit daily

7 Clues: source of ironsource of energyNutritional drinkRequired for digestionSource of food productiondrink harmful for human bodymust to have one fruit daily

the silver eyes crossword 2022-02-08

the silver eyes crossword crossword puzzle
Across
  1. main character/protagonist
  2. closed restaurant
  3. horse toy
  4. life metal
  5. foxy right arm
  6. antagonist suit
  7. first seen robot
Down
  1. setting
  2. first-ever stage robot
  3. main 1/5 at missing children's incident
  4. main band member
  5. book author
  6. security guard
  7. blue bunny
  8. robot designer

15 Clues: settinghorse toyblue bunnylife metalbook authorsecurity guardfoxy right armrobot designerantagonist suitmain band memberfirst seen robotclosed restaurantfirst-ever stage robotmain character/protagonistmain 1/5 at missing children's incident

Espanol 2024-04-24

Espanol crossword puzzle
Across
  1. to sunbathe
  2. shirt
  3. to ski
  4. socks
  5. to take a day trip
  6. to ride
  7. to check luggage
  8. to go hiking
  9. to bargain, negotiate price
  10. to go through (security, customs)
Down
  1. to pack
  2. boots
  3. to have fun
  4. to make a reservation
  5. to relax

15 Clues: bootsshirtsocksto skito packto rideto relaxto sunbatheto have funto go hikingto check luggageto take a day tripto make a reservationto bargain, negotiate priceto go through (security, customs)

Security at UNRWA 2021-09-04

Security at UNRWA crossword puzzle
Across
  1. when your valuables are stolen
  2. the acronym for field security teams
  3. harmful event that negatively impacts you, UNRWA
  4. what DSRM sends to give security advice to personnel
Down
  1. central hub for security information
  2. the type of awareness you have to avoid incidents

6 Clues: when your valuables are stolencentral hub for security informationthe acronym for field security teamsharmful event that negatively impacts you, UNRWAthe type of awareness you have to avoid incidentswhat DSRM sends to give security advice to personnel

Keywords 2012-03-20

Keywords crossword puzzle
Across
  1. bullying when someone is getting bullied on the internet
  2. person or a thing that is trustworthy
  3. when you can see and modify the structure of a table.
  4. vrtual learning environment
  5. something appropiate to the matter at hand
  6. A row and column view of a table.
  7. carefully and thoroughly at something
  8. Utilities that allow you to bring in or send data
Down
  1. Electronic Mail
  2. a record holds all the information or data that has been entered into the database
  3. a set of questions with a choice of an answer
  4. A direction or order.
  5. to take part of a whole
  6. a computer file attached to an e-mail
  7. a software that provides a way to view pages on the World Wide Web.
  8. Symbols or signals that are input, stored and processed by a computer.
  9. structured set of data held in a computer
  10. a program for data, files or documents e.g. the Internet
  11. universal resource locator
  12. A set of data arranged in rows and columns.

20 Clues: Electronic MailA direction or order.to take part of a wholeuniversal resource locatorvrtual learning environmentA row and column view of a table.person or a thing that is trustworthya computer file attached to an e-mailcarefully and thoroughly at somethingstructured set of data held in a computersomething appropiate to the matter at hand...

Ready Player One Section 1 2015-04-19

Ready Player One Section 1 crossword puzzle
Across
  1. How many years after 2015 does this book take place?
  2. A Very realistic video game that the book revolves around
  3. State in which the book takes place
  4. Last name of the lady who lived three units below Wade
  5. Hideout Where Wade plays OASIS
  6. What people live in in the real world
  7. Wade's aunt
  8. What the finder of Halliday's Egg would get a lot of
  9. Level in which Wade's avatar is on
  10. How the trailers in the trailer park were arranged
Down
  1. One of the very first video games that is made reference to in the book
  2. Creator of OASIS, a multi-billionaire
  3. A small, robed wizard. Halliday's avatar in OASIS
  4. Wade's Mom
  5. Egg hunters
  6. A total "lamer" that Wade said didn't know anything
  7. Well known gunter that Wade has a cyber-crush on
  8. Rich rated combatants in OASIS
  9. Wade's avatar name in OASIS
  10. Known as the worlds largest Internet service provider that wanted to take over OASIS

20 Clues: Wade's MomEgg huntersWade's auntWade's avatar name in OASISHideout Where Wade plays OASISRich rated combatants in OASISLevel in which Wade's avatar is onState in which the book takes placeCreator of OASIS, a multi-billionaireWhat people live in in the real worldWell known gunter that Wade has a cyber-crush on...

Vy´s second crossword 2020-05-11

Vy´s second crossword crossword puzzle
Across
  1. to see someone in real life
  2. to write on paper and send it to your friends
  3. if someone is hurt or is missing
  4. if you are really bad
  5. if someone is bullying you on the internet
  6. if you are a drama queen
  7. a very beautiful place that you will never forget
  8. if you are like a mom
  9. 13-18 years old
  10. to do a phone number away if you hate them
Down
  1. to write a message to someone
  2. to send a teacher a message if you don´t have their phone number
  3. to answer on a text message
  4. the opposite of not understanding
  5. to look after your siblings or if someone is important to you
  6. the opposite of receive
  7. if you meet someone new you want to be friends with them then you have to ask them something
  8. the opposite of write
  9. If you want everyone to look at you all the time
  10. to have a job

20 Clues: to have a job13-18 years oldif you are really badthe opposite of writeif you are like a momthe opposite of receiveif you are a drama queento see someone in real lifeto answer on a text messageto write a message to someoneif someone is hurt or is missingthe opposite of not understandingif someone is bullying you on the internet...

Literasi digital 2024-08-14

Literasi digital crossword puzzle
Across
  1. HAKI terbagi menjadi berapa bagian
  2. literasi digital digunakan untuk mencari
  3. mata pelajaran yang mempelajari literasi Digital yaitu
  4. singkatan empat pilar literasi Digital
  5. penemu konsep literasi Digital
  6. keamanan sangat penting untuk menjaga
  7. lisensi yang bersifat paling restriktif adalah
  8. kejahatan didunia digital disebut cyber
  9. manfaat literasi digital untuk menambah
  10. aplikasi umum untuk mencari informasi digital adalah
  11. aplikasi pengolah kata adalah
  12. lisensi yang memperbolehkan pengguna untuk tidak hanya menggunakan perangkat lunak disebut lisensi
  13. informasi palsu atau berita palsu disebut
  14. perangkat lunak yang disediakan secara gratis disebut lisensi
Down
  1. negara yang memiliki tingkat literasi Digital yang tinggi
  2. bahasa Indonesia dari linking
  3. lisensi yang hak ciptanya yang dilepaskan disebut
  4. informasi yang tidak sengaja salah atau tidak akurat disebut
  5. informasi yang sengaja dibuat untuk menyesatkan disebut
  6. perangkat lunak yang digunakan untuk mengakses informasi disebut
  7. aplikasi pembuat bahan presentasi disebut
  8. hak yang diberikan negara kepada seseorang atas karya ciptanya disebut
  9. individu dengan kemampuan pemrograman tinggi disebut

23 Clues: bahasa Indonesia dari linkingaplikasi pengolah kata adalahpenemu konsep literasi DigitalHAKI terbagi menjadi berapa bagiankeamanan sangat penting untuk menjagasingkatan empat pilar literasi Digitalkejahatan didunia digital disebut cybermanfaat literasi digital untuk menambahliterasi digital digunakan untuk mencari...

ISTILAH DALAM TIK 2024-10-31

ISTILAH DALAM TIK crossword puzzle
Across
  1. Sistem pengiriman pesan elektronik melalui internet
  2. menambahkan program atau aplikasi ke sistem
  3. Komponen fisik komputer yang dapat dilihat dan disentuh
  4. Jaringan global yang menghubungkan jutaan komputer di seluruh dunia
  5. Perangkat lunak yang mengelola perangkat keras dan menjalankan program aplikasi
  6. Data yang telah diolah sehingga memiliki makna
  7. Urutan langkah-langkah logis untuk menyelesaikan suatu masalah
  8. Sistem untuk melindungi Jaringan dan data komputer
  9. salah satu Perangkat menampilkan halaman web
  10. Bilangan Basis 16
  11. Dunia Maya
  12. Kata Sandi
  13. Hardware untuk media penyimpanan
Down
  1. Memulai ulang sistem
  2. Platform online yang memungkinkan pengguna untuk berinteraksi dan berbagi informasi
  3. Kumpulan halaman web yang saling berhubungan
  4. Aplikasi Perkantoran untuk mengolah data dalam tabel
  5. Informasi yang tersedia melalui media atau produk elektronik
  6. Bilangan basis 10
  7. Format file standar dari Aplikasi PowerPoint
  8. Aplikasi pengolah gambar
  9. Papan ketik
  10. Salah satu sistem operasi
  11. Tempat untuk menyimpan dan mengelompokkan dokumen atau data pada perangkat komputer
  12. Program yang digunakan untuk menampilkan halaman web
  13. Hardware inputan suara
  14. Salah satu Sistem Operasi Mobile

27 Clues: Dunia MayaKata SandiPapan ketikBilangan basis 10Bilangan Basis 16Memulai ulang sistemHardware inputan suaraAplikasi pengolah gambarSalah satu sistem operasiSalah satu Sistem Operasi MobileHardware untuk media penyimpananmenambahkan program atau aplikasi ke sistemKumpulan halaman web yang saling berhubungan...

Sip & Solve 2025-09-13

Sip & Solve crossword puzzle
Across
  1. What does the “S” stand for in BYOS?
  2. What is the bride’s middle name?
  3. What’s the bride’s work nickname?
  4. Which town do the couple live in?
  5. Where are the couple going on their honeymoon?
  6. The happy couple
  7. Where did the groom pop the question?
  8. What’s the groom’s favourite sport?
  9. Total number of flower girls, bridesmaids and groomsmen?
  10. Who’s the better cook: bride or groom?
  11. What sporting activity did the groom ‘strike’ at on their first date?
Down
  1. How many years have the couple been together?
  2. What’s the groom’s favourite food?
  3. What nickname did the groom have at university?
  4. In which city did the bride and groom meet?
  5. What song did the bride walk down the aisle to?
  6. Who’s the tidier: bride or groom?
  7. Who’s the better driver: bride or groom?
  8. How many metres did Eoin’s Guinness World Record breaking team row?
  9. Where did the groom celebrate his stag do?
  10. Where did the bride celebrate her hen do?
  11. What’s the bride’s favourite food?

22 Clues: The happy coupleWhat is the bride’s middle name?Who’s the tidier: bride or groom?What’s the bride’s work nickname?Which town do the couple live in?What’s the groom’s favourite food?What’s the bride’s favourite food?What’s the groom’s favourite sport?What does the “S” stand for in BYOS?Where did the groom pop the question?...

IEEE Day 2025-10-08

IEEE Day crossword puzzle
Across
  1. India’s first nuclear test codename
  2. The digital payment system launched by NPCI in 2016
  3. Online government service platform — “____ Seva”
  4. First Indian to go to space
  5. Founder of Infosys
  6. City known as India’s “Silicon Valley”
  7. Indian city famous for IT parks and Cyber Towers
  8. “Digital India” initiative was launched in this year
  9. Technology used for secure digital ledgers
  10. India’s first AI-based robot citizen
  11. Indian tech giant known for TCS
  12. Currency symbol officially adopted in 2010
  13. Indian satellite navigation system similar to GPS
Down
  1. India’s first mission to Mars
  2. Social media platform owned by Meta
  3. Father of India’s Green Revolution
  4. India’s fastest train as of 2025
  5. File format for web pages
  6. India’s first indigenously built supercomputer
  7. Indian space agency abbreviation
  8. Portable computer smaller than a laptop
  9. Father of the Indian Constitution
  10. The act of illegally accessing computer systems
  11. The world’s largest biometric ID system
  12. Term for connecting everyday objects to the internet

25 Clues: Founder of InfosysFile format for web pagesFirst Indian to go to spaceIndia’s first mission to MarsIndian tech giant known for TCSIndia’s fastest train as of 2025Indian space agency abbreviationFather of the Indian ConstitutionFather of India’s Green RevolutionIndia’s first nuclear test codenameSocial media platform owned by Meta...

CTF-CW10 2025-11-14

CTF-CW10 crossword puzzle
Across
  1. “It’s really you, right?” check
  2. The steering wheel for corporate safety
  3. Data clean-up routine that regularly erases outdated information
  4. The compliance ninja
  5. Where your evidence gets its day in court
  6. United Kingdom’s tailored take on the EU’s major privacy regulation
  7. Villains’ instruction manual, with footnotes
  8. The doorman who wants your password and your ID
  9. Don’t panic: log your “oops” here at Tekion!
  10. SWAT team for computer emergencies
Down
  1. Flick your wand at Tekion and this grants you access!
  2. Not collecting more info than a service truly needs from you
  3. Talking in code so eavesdroppers get gibberish
  4. The secret doorman at Tekion—never letting bad web traffic get past the velvet rope!
  5. Telling others to mind their own digital business
  6. The guard dog for your computer
  7. Doing surgery on your risks
  8. The virtue your files aspire to
  9. International certification for privacy management processes
  10. The fire escape map for cyber incidents

20 Clues: The compliance ninjaDoing surgery on your risks“It’s really you, right?” checkThe guard dog for your computerThe virtue your files aspire toSWAT team for computer emergenciesThe steering wheel for corporate safetyThe fire escape map for cyber incidentsWhere your evidence gets its day in courtVillains’ instruction manual, with footnotes...

BULLYING 2017-09-23

BULLYING crossword puzzle
Across
  1. Spoken, not written.
  2. Worried and frightened
  3. A person who is standing near but not taking part in what is happening.
  4. To laugh at or make fun of someone in an unkind way.
  5. A person who has been attacked or hurt by someone.
  6. An act that is meant to trick or deceive people.
  7. Someone who frightens, hurts, or threatens smaller or weaker people.
Down
  1. Suicide caused by cyber bullying.
  2. To make someone afraid.
  3. A person at which an attack is aimed.
  4. A trick that is done to someone usually as a joke.
  5. A person who hates and opposes another person.
  6. To do or say something that is offensive to someone (that shows lack of respect).
  7. To annoy or bother someone in a constant or repeated way.

14 Clues: Spoken, not written.Worried and frightenedTo make someone afraid.Suicide caused by cyber bullying.A person at which an attack is aimed.A person who hates and opposes another person.An act that is meant to trick or deceive people.A trick that is done to someone usually as a joke.A person who has been attacked or hurt by someone....

TTS INFORMATIKA 2024-11-22

TTS INFORMATIKA crossword puzzle
Across
  1. Salah satu bentuk pelanggaran UU ITE.
  2. Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
  3. Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
  4. Proses pembuatan konten digital seperti video, gambar, atau musik.
  5. Bagian dari sistem komputer yang berfungsi untuk memproses data.
  6. Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
  7. Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
  1. Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
  2. Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
  3. Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
  4. Protokol yang digunakan untuk menghubungkan perangkat ke internet.
  5. Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
  6. Istilah lain untuk keamanan jaringan.
  7. Jenis konten digital yang paling banyak diakses melalui internet.

14 Clues: Salah satu bentuk pelanggaran UU ITE.Istilah lain untuk keamanan jaringan.Cara mengelola kata sandi agar tetap aman dan sulit ditebak.Bagian dari sistem komputer yang berfungsi untuk memproses data.Perangkat lunak yang digunakan untuk mengelola jaringan komputer.Jenis konten digital yang paling banyak diakses melalui internet....

IC3 Lesson 30 2015-05-18

IC3 Lesson 30 crossword puzzle
Across
  1. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  2. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  3. Deciphers the information in an SSL Certificate.
  4. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  5. Hackers using spyware to control your browser.
  6. Security feature used for larger networks that controls computers from one point.
Down
  1. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  2. Encrypts the information in an SSL Certificate.
  3. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  4. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  5. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
  6. A malicious program that records keystrokes.
  7. A program that hackers use to capture IDs and passwords on a network.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.Security feature used for larger networks that controls computers from one point....

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  2. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  3. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  4. a service charge assessed by a broker or investment advisor.
  5. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
Down
  1. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
  2. a sales pitch or promotion made by the underwriting firm, usually on the road
  3. Electronic Data Gathering, Analysis, and Retrieval system
  4. Capital stock is the amount of common and preferred shares that a company is authorized to issue
  5. Mark Zuckerberg
  6. a security that represents the ownership of a fraction of a corporation.
  7. A derivative is a complex type of financial security that is set between two or more parties.

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

Crack the code 2024-04-30

Crack the code crossword puzzle
Across
  1. A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
  2. A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
  3. A program designed to prevent, detect, and remove malware (10 letters)
  4. The process of verifying the identity of a user or device (10 letters)
  5. A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
Down
  1. The exploitation of security vulnerabilities in a computer system or network (9 letters)
  2. Protects a computer system from unauthorized access (9 letters)
  3. Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
  4. The practice of disguising malicious files to make them appear harmless (7 letters)
  5. A set of rules or guidelines designed to enhance computer security (9 letters)
  6. A type of attack where an attacker intercepts communication between two parties (6 letters)
  7. The unauthorized copying of data from a computer system (6 letters)

12 Clues: Protects a computer system from unauthorized access (9 letters)The unauthorized copying of data from a computer system (6 letters)A program designed to prevent, detect, and remove malware (10 letters)The process of verifying the identity of a user or device (10 letters)A set of rules or guidelines designed to enhance computer security (9 letters)...

Chapter 18 Quiz 2012-11-26

Chapter 18 Quiz crossword puzzle
Across
  1. certain government benefits entilted to certain individuals by law
  2. a tax in which the government takes more income from the wealthy
  3. the "bank account" into Social Security contributions are deposited and used to pay recipients
  4. a negative income tax that provide income to very poor individuals
  5. paymets given by government to those such a social security and retirement plans
  6. welfare reform law of 1996
  7. increasing concentration of property among women
  8. a tax that falls more heavily on low income groups
  9. shares of the national income of many groups
  10. policies that provide benefits to individual through testing or entitlements
Down
  1. name of public assistance for families in need
  2. a method used to count the number of impoverished
  3. programs available only to those with very specific needs
  4. a tax in which the governments takes income equally from all taxpayers
  5. amount of funds collected between to points in time
  6. value of assets owned

16 Clues: value of assets ownedwelfare reform law of 1996shares of the national income of many groupsname of public assistance for families in needincreasing concentration of property among womena method used to count the number of impoverisheda tax that falls more heavily on low income groupsamount of funds collected between to points in time...

The Role of Internet in our Life. 2024-11-10

The Role of Internet in our Life. crossword puzzle
Across
  1. The practice of using remote servers to store and manage data.
  2. A software application for accessing information on the Internet.
  3. A service that provides privacy and security online.
  4. A decentralized ledger technology used for secure transactions.
  5. An organized collection of data that can be accessed electronically.
  6. A search engine used to find information online.
  7. What do we use to connect to the Internet?
Down
  1. Programs that run on a computer or device.
  2. The act of browsing the web.
  3. Devices that can be easily carried and used on the go.
  4. MEDIA Websites that allow users to create and share content.
  5. A security system that monitors and controls incoming and outgoing network traffic.
  6. A digital audio file available for streaming or download.
  7. A small electronic device with a specific function.
  8. The physical components of a computer system.
  9. An online discussion platform where people can exchange ideas.

16 Clues: The act of browsing the web.Programs that run on a computer or device.What do we use to connect to the Internet?The physical components of a computer system.A search engine used to find information online.A small electronic device with a specific function.A service that provides privacy and security online....

Networking concept 2025-05-18

Networking concept crossword puzzle
Across
  1. A computer that requests services from a server.
  2. A security device that protects a network from unauthorized access.
  3. (Local Area Network): A network within a small geographic area.
  4. & Privacy:
  5. A group of interconnected devices that can communicate with each other.
  6. (Virtual Private Network): A secure connection that encrypts data and can be used to access a network remotely.
  7. A computer that provides services to other computers on the network.
Down
  1. A common wired network connection.
  2. A device that connects different networks together.
  3. A type of connection that uses radio waves to transmit data.
  4. (Wide Area Network): A network that spans a large geographic area.
  5. A device that forwards data between devices on a network.
  6. of Connections:
  7. A set of rules that govern communication on a network.
  8. Address: A unique numerical address assigned to each device on a network.
  9. Any device connected to a network.

16 Clues: & Privacy:of Connections:A common wired network connection.Any device connected to a network.A computer that requests services from a server.A device that connects different networks together.A set of rules that govern communication on a network.A device that forwards data between devices on a network....

UNIT 1 2023-05-03

UNIT 1 crossword puzzle
Across
  1. g
  2. d
  3. er
  4. ü
Down
  1. o
  2. ea
  3. e
  4. a
  5. v

9 Clues: ogeadvüeaer

Great Depression 2025-05-19

Great Depression crossword puzzle
Across
  1. RUNS
  2. DEPRESSION
  3. PLAINS
  4. SECURITY
  5. BOWL
Down
  1. RENAISSANCE
  2. ARMY
  3. DEAL
  4. DIGGERS

9 Clues: RUNSARMYDEALBOWLPLAINSDIGGERSSECURITYDEPRESSIONRENAISSANCE

new deal 2024-04-15

new deal crossword puzzle
Across
  1. glass-_______ banking act
  2. book from 1939
  3. social ________ act
  4. civilian ___________ corps
  5. Tennessee Valley Authority
  6. movie from 1939
  7. ________ _____ administration
Down
  1. 32nd president
  2. ______ act
  3. ________ __________ recovery act
  4. the same price for crops in 1910
  5. roosevelt's plan for recovery
  6. federal _______ insurance corporation
  7. new deal _________
  8. _______ roosevelt

15 Clues: ______ act32nd presidentbook from 1939movie from 1939_______ rooseveltnew deal _________social ________ actglass-_______ banking actcivilian ___________ corpsTennessee Valley Authorityroosevelt's plan for recovery________ _____ administration________ __________ recovery actthe same price for crops in 1910federal _______ insurance corporation

ServiceNow Knowledge 2024-11-07

ServiceNow Knowledge crossword puzzle
Across
  1. Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
  2. personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
  3. automates and enhances IT operations through strategic use of machine learning and data science
  4. effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
  5. Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
  6. Procure ServiceNow in the Azure or AWS Marketplace
  7. Best Enterprise Architect in the business; Utilities Expert
  8. Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
Down
  1. provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
  2. generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
  3. Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
  4. Build apps at scale with a low-code development environment and prebuilt templates
  5. ServiceNow Solutions Consultant
  6. Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
  7. links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
  8. high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads

16 Clues: ServiceNow Solutions ConsultantProcure ServiceNow in the Azure or AWS MarketplaceBest Enterprise Architect in the business; Utilities ExpertBuild apps at scale with a low-code development environment and prebuilt templatesStrengthen cloud security, protect sensitive data, and ensure regulatory compliance...

#BeCyberAware 2023-09-29

#BeCyberAware crossword puzzle
Across
  1. The day that software vendors release regular security updates.
  2. Authentication based on unique physical or behavioral traits.
  3. Malware that encrypts data and demands a ransom for decryption.
  4. Unauthorized interception of communication.
  5. Software designed to detect and remove viruses and other malware.
  6. Malware that provides unauthorized access while concealing its presence.
  7. Software or hardware that records keystrokes without authorization.
Down
  1. A software update that fixes security vulnerabilities.
  2. Illegally using a computer's resources to mine cryptocurrency.
  3. A network of infected computers controlled by a single entity.
  4. A decoy system designed to attract and trap attackers.
  5. An attack that involves trying every possible combination to crack a password
  6. The malicious part of software responsible for harmful actions.
  7. Capturing and analyzing network traffic without authorization.
  8. The process of converting data into a code to prevent unauthorized access.

15 Clues: Unauthorized interception of communication.A software update that fixes security vulnerabilities.A decoy system designed to attract and trap attackers.Authentication based on unique physical or behavioral traits.Illegally using a computer's resources to mine cryptocurrency.A network of infected computers controlled by a single entity....

Perfection 2023-04-13

Perfection crossword puzzle
Across
  1. An asset, pledged by a borrower that a lender accepts as a security against a loan
  2. Collateral like oil and gas immediately as its drilled from the ground
  3. A _ is Perfected when it attaches if the applicable requirements are satisfied before the _ attaches
  4. ARTICLE 9-314
  5. Where you file security interests related to land
  6. Piece of paper that is filed in a public office in a searchable database
  7. ARTICLE 9-310
  8. ARTICLE 9-309
Down
  1. ARTICLE 9-313
  2. Location or building where Financing Statement is NORMALLY filed
  3. Trees slated to be cut down
  4. Article 9 concept, which is designed to give the world notice of the secured parties interest in the Debtors Collateral
  5. A person or institution that owes a sum of money
  6. Uniform Commercial Code (3 letters)
  7. i.e gas station pumps

15 Clues: ARTICLE 9-313ARTICLE 9-314ARTICLE 9-310ARTICLE 9-309i.e gas station pumpsTrees slated to be cut downUniform Commercial Code (3 letters)A person or institution that owes a sum of moneyWhere you file security interests related to landLocation or building where Financing Statement is NORMALLY filed...

AP Comp Sci Test 2023-05-02

AP Comp Sci Test crossword puzzle
Across
  1. security network system that monitors incoming and outgoing network traffic based on security rules
  2. there are 8 bits in one ____
  3. variable in a function definition, placeholder for values
  4. networking device that forwards data packets between computer networks
  5. common method for referencing elements in a list or string using numbers
  6. standard markup language for documents designed to be displayed in a web browser
  7. an ordered collection of elements in a program
  8. legal right given to an originator
  9. smallest unit of data
  10. 0s and 1s
Down
  1. group of functions that may be used in creating new programs
  2. a finite set of instructions that accomplish a task
  3. program that records keystrokes by a user
  4. rules and regulations we all agree to use
  5. a facility that allows computing devices to connect to the internet and send data via radio waves

15 Clues: 0s and 1ssmallest unit of datathere are 8 bits in one ____legal right given to an originatorprogram that records keystrokes by a userrules and regulations we all agree to usean ordered collection of elements in a programa finite set of instructions that accomplish a taskvariable in a function definition, placeholder for values...

BrainRiddle 2025-02-09

BrainRiddle crossword puzzle
Across
  1. A scam where attackers trick people into giving sensitive information.
  2. A test to prove you are not a robot.
  3. A software patch that fixes bugs and security issues.
  4. Small data files stored by websites on a user's computer.
  5. Software designed to harm a computer system.
  6. A type of malware that spreads by attaching itself to programs.
  7. A security system that filters network traffic.
Down
  1. A software used to access the internet.
  2. A wireless network used for internet access.
  3. A copy of data used for recovery in case of loss.
  4. A person who gains unauthorized access to systems.
  5. A secret word or phrase used for authentication.
  6. Unwanted or junk emails.
  7. A system that stores data on remote servers instead of local devices.
  8. A unique identifier used to log into an account.

15 Clues: Unwanted or junk emails.A test to prove you are not a robot.A software used to access the internet.A wireless network used for internet access.Software designed to harm a computer system.A security system that filters network traffic.A secret word or phrase used for authentication.A unique identifier used to log into an account....

history crossword 2021-04-06

history crossword crossword puzzle
Across
  1. government spending
  2. appointed by the United States President
  3. Roosevelt’s policies for ending the Depression
  4. organize opposition to the New Deal and “teach the necessity of respect for the rights of person and property
  5. provide government insurance for bank deposits up to a certain amount
  6. Security Act provides some security for the elderly and for unemployed workers.
  7. Congress passed 15 major acts to meet the economic crisis
  8. which consists of five
  9. combined Roosevelt’s love of nature and commitment to conservation with the need to help the unemployed
Down
  1. money has a value directly linked to gold
  2. assigned many women to lower-level jobs in the federal bureaucracy
  3. closing the remaining banks before bank runs could put them out of business
  4. resolving a dispute that is private
  5. Works Progress Administration
  6. regulate the stock market
  7. Workers at other plants followed suit or carried out traditional strikes
  8. evening radio addresses given by Franklin D. Roosevelt,
  9. government would pay farmers not to raise certain livestock,

18 Clues: government spendingwhich consists of fiveregulate the stock marketWorks Progress Administrationresolving a dispute that is privateappointed by the United States Presidentmoney has a value directly linked to goldRoosevelt’s policies for ending the Depressionevening radio addresses given by Franklin D. Roosevelt,...

Direct Group - Macmillan Crossword 25/09/20 2020-09-18

Direct Group - Macmillan Crossword 25/09/20 crossword puzzle
Across
  1. Formally demand an amount owing in law
  2. The organisation responsible for regulating the private security industry in the UK
  3. Amount of money owing
  4. Abbreviation for cameras worn by field agents and security guards
  5. Head office is based here
  6. Fine for parking on private land
  7. Find or discover by investigation or search
  8. Commonly known initials of the legislation governing personal data
  9. An individual, company, or institution sued or accused in a court of law
  10. A person or company making a claim in law
Down
  1. Process of taking legal action
  2. Decision of the courts
  3. A person employed to protect a building against intruders or damage
  4. A person in need of special care, support, or protection because of age, disability, or risk of abuse or neglect
  5. Execution of a judgments terms
  6. Certificated individual to enforce writ's
  7. Judgment of the high court
  8. A person or company) declared in law as unable to pay their debts

18 Clues: Amount of money owingDecision of the courtsHead office is based hereJudgment of the high courtProcess of taking legal actionExecution of a judgments termsFine for parking on private landFormally demand an amount owing in lawCertificated individual to enforce writ'sA person or company making a claim in lawFind or discover by investigation or search...

Flourish 2014-03-24

Flourish crossword puzzle
Across
  1. freedom from danger and anxiety
  2. experiencing the thoughts, feelings and attitudes of another
  3. state of satisfaction
  4. state of mutual harmony
  5. state of rest or balance of opposing forces
  6. bringing together incomplete parts into a whole
  7. state of pleasure and contentment
  8. the condition of being oneself not another
Down
  1. general condition of body and mind with reference to sound and vigour
  2. health care facility for terminally ill
  3. pertaining to the mind
  4. state of attentiveness and being aware
  5. state of equilibrium and satisfaction at both a physical and mental level
  6. to assist unconditionally
  7. place of domestic security
  8. feeling of deep sympathy
  9. pertaining to or involving sentiment
  10. practice of extended or continued thought or reflection
  11. the state of being an individual
  12. care given to comfort not to cure
  13. pertaining to the body
  14. the state of recognising ones’ self
  15. of life/ general wellbeing of an individual defined in terms of health and happiness over wealth
  16. an integrated system designed to facilitate information exchange and support

24 Clues: state of satisfactionpertaining to the mindpertaining to the bodystate of mutual harmonyfeeling of deep sympathyto assist unconditionallyplace of domestic securityfreedom from danger and anxietythe state of being an individualcare given to comfort not to curestate of pleasure and contentmentthe state of recognising ones’ self...

Personal Dictionary 2022-01-13

Personal Dictionary crossword puzzle
Across
  1. Deceiving someone into making themselves vulnerable online
  2. Software that allows the user to search specific information online
  3. Storage accessible through various devices
  4. Software that acts as a foundation to the device
  5. Personal files saved to keep browsing information on websites
  6. electronic device that manipulates information
  7. secondary device connected to computers, typically used to control it (i.e mouse or keyboard)
  8. The understanding of using online tools
Down
  1. Tactic where someone takes on the identity of someone for personal gain
  2. A laptop ran off of google
  3. A certain date or time associated with digital records or files
  4. The address to a webpage
  5. Computer that can fit on or under a typical desk
  6. A screen that displays information generated by a computer
  7. A port to connect hardware
  8. The physical components to a computer
  9. Virtual instructions, data, or programs used to complete tasks
  10. A built-in security system that filters online traffic
  11. A portable computer with a keyboard and a screen
  12. Additional security process to ensure privacy
  13. temporary memory used for active programs

21 Clues: The address to a webpageA laptop ran off of googleA port to connect hardwareThe physical components to a computerThe understanding of using online toolstemporary memory used for active programsStorage accessible through various devicesAdditional security process to ensure privacyelectronic device that manipulates information...

Marigolds Crossword 2023-08-21

Marigolds Crossword crossword puzzle
Across
  1. lacking physical form or shape; lacking organization; formless
  2. a state of reduced sensibility or consciousness
  3. to provoke and urge on
  4. a filthy and wretched condition or quality.
  5. difficult or impossible to explain or account for.
  6. to evade or escape from, as by daring, cleverness, or skill
  7. indifference to pleasure or pain; impassiveness.
  8. a bittersweet longing for things, persons, or situations of the past; the condition of being homesick; homesickness.
  9. very cautious; wary; not giving or expending freely
  10. a security hole or an instance of taking advantage of a security hole
  11. represented or appearing as such
Down
  1. lacking physical strength or vigor; weak.
  2. a state of abstracted musing; daydreaming
  3. to interrupt or cut off
  4. punishment administered in return for a wrong committed.
  5. having no useful result; ineffectual
  6. of, relating to, or in the nature of an illusion; lacking reality
  7. a difference between one thing and another, between one writing and another; a variance.
  8. arousing deep emotion, especially pity or sorrow; touching
  9. a show of bravery or defiance, often in order to make a false impression or mislead someone.

20 Clues: to provoke and urge onto interrupt or cut offrepresented or appearing as suchhaving no useful result; ineffectuallacking physical strength or vigor; weak.a state of abstracted musing; daydreaminga filthy and wretched condition or quality.a state of reduced sensibility or consciousnessindifference to pleasure or pain; impassiveness....

Unit 2 Vocab 2023-10-09

Unit 2 Vocab crossword puzzle
Across
  1. legal
  2. Approach, point of view, focus
  3. federation
  4. we will have (future tense of tener)
  5. to immigrate(enter a country)
  6. worldwide
  7. to travel, journey
  8. from the south
  9. flow
  10. foreigner, alien
  11. to track down
  12. analyze, examine
  13. reason
  14. will exist
  15. to attain/to be able to
  16. I believe that
  17. movement, motion
  18. population
  19. to work, have a job
  20. Immigrants within one's own country
  21. ignition, on
  22. working day; day's journey
  23. inside, in
  24. immigration
  25. to link, to connect
Down
  1. African Studies Group
  2. to brake, stop
  3. citizenship/the citizens
  4. restart
  5. country, nation
  6. knowledge, understanding
  7. to exchange, to trade
  8. terrorist
  9. famous
  10. to reach, achieve
  11. Displaced
  12. world population
  13. ignorance, lack of awareness
  14. to tackle, to board
  15. management, administration
  16. countries of the world
  17. development, growth, progress
  18. (in)security; (lack of) security
  19. to try, attempt
  20. continent, mainland
  21. phenomenon
  22. to emigrate(leave a country)
  23. immigrants
  24. visa(travel document)

49 Clues: flowlegalfamousreasonrestartterroristDisplacedworldwidefederationwill existphenomenonpopulationimmigrantsinside, inimmigrationignition, onto track downto brake, stopfrom the southI believe thatcountry, nationto try, attemptworld populationforeigner, alienanalyze, examinemovement, motionto reach, achieveto travel, journeyto tackle, to board...

investing-Abby 2025-03-25

investing-Abby crossword puzzle
Across
  1. age you have to be to invest in crypto
  2. A security that represents the ownership of a fraction of a corporation
  3. initial public offering
  4. takes cash from investors and invests in stocks
  5. markets rising
  6. Ceo of berkshire hathaway
  7. exchange traded funds
  8. sum of money available for a particular purchase
  9. a pension is managed by
  10. measures the price performance of a basket of securities
  11. the distribution of some of a company's earnings to shareholders
  12. markets failing
  13. currencies that are created and backed by the government
  14. fund for unexpected expenses
Down
  1. they represent a loan from a buyer
  2. the biggest financial fraud in U.S history
  3. best for aggressive risk tolerance investors
  4. dca provides some safety at the cost of?
  5. pulls money from a large group of investors
  6. makes it impossible to change, hack, or cheat the system
  7. age to receive full social security benefits
  8. warren buffetts #1 rule
  9. availability of cash or which a asset can be converted into cash
  10. the total value of a company's stock
  11. individual retirement account

25 Clues: markets risingmarkets failingexchange traded fundsinitial public offeringa pension is managed bywarren buffetts #1 ruleCeo of berkshire hathawayfund for unexpected expensesindividual retirement accountthey represent a loan from a buyerthe total value of a company's stockage you have to be to invest in cryptodca provides some safety at the cost of?...

investing- addy 2025-03-25

investing- addy crossword puzzle
Across
  1. age you receive full social security benefits
  2. ceo of berkshire hathaway
  3. sum of money made available for a particular purpose
  4. small cap stocks, penny stocks
  5. a crypto currency
  6. age you can invest in crypto
  7. a company offers its shares to the public for the first time
  8. large cap stocks, blue chip companies
  9. a place where people buy and sell pieces of companies
  10. investing in equal amounts at regular intervals
  11. ownership of a fraction of a share
  12. investing all money at a given time
  13. is a collection of stocks, bonds, and other assets
  14. rule number one
Down
  1. the total value of a company’s stock
  2. a type of investment fund
  3. someone who holds stocks for the long term
  4. social security and medicare taxes
  5. payments made by companies to shareholders
  6. is a digital record of transactions and duplicated across a network
  7. a crypto currency
  8. buying and selling mutual funds
  9. rule number two
  10. have a fixed interest rate
  11. created and backed ny governments, not tied to any physical commodity

25 Clues: rule number tworule number onea crypto currencya crypto currencya type of investment fundceo of berkshire hathawayhave a fixed interest rateage you can invest in cryptosmall cap stocks, penny stocksbuying and selling mutual fundssocial security and medicare taxesownership of a fraction of a shareinvesting all money at a given time...

ServiceNow Knowledge 2024-11-07

ServiceNow Knowledge crossword puzzle
Across
  1. Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
  2. effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
  3. Best Enterprise Architect in the business; Utilities Expert
  4. links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
  5. Build apps at scale with a low-code development environment and prebuilt templates
  6. personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
Down
  1. provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
  2. Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
  3. Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
  4. Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
  5. generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
  6. ServiceNow Solutions Consultant
  7. Procure ServiceNow in the Azure or AWS Marketplace
  8. high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads
  9. Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
  10. automates and enhances IT operations through strategic use of machine learning and data science

16 Clues: ServiceNow Solutions ConsultantProcure ServiceNow in the Azure or AWS MarketplaceBest Enterprise Architect in the business; Utilities ExpertBuild apps at scale with a low-code development environment and prebuilt templatesStrengthen cloud security, protect sensitive data, and ensure regulatory compliance...

NDS Crossword Puzzle 2024-01-03

NDS Crossword Puzzle crossword puzzle
Across
  1. Number (spelled out) of members on the Strategic Posture Commission
  2. Trusted advisor and partner
  3. Limiting of the production and spread of nuclear weapons
  4. Effort to prolong the life of weapons
  5. Tri-Lateral security partnership exploring acquisition of nuclear subs for Australia
  6. Space between new systems being fielded and the old systems aging out
  7. Sentinel will relieve these from duty
  8. Program to support and obtain supply chain surety from “critical suppliers”
  9. DoD sees this country as the “Pacing Challenge” to U.S. National Security
  10. Program responsible for refurbishing and modernizing the stockpile
  11. Weapon travels more than 5xs the speed of sound
Down
  1. Seeks to integrate all tools of national power across domains, geography, and threat space
  2. Document introduced “Integrated Deterrence” as a term:
  3. Agency with core mission to ensure safe, secure, and reliable nuclear stockpile
  4. Mid-west “plant” undergoing expansion
  5. _______ Chain (experiencing disruptions)

16 Clues: Trusted advisor and partnerEffort to prolong the life of weaponsMid-west “plant” undergoing expansionSentinel will relieve these from duty_______ Chain (experiencing disruptions)Weapon travels more than 5xs the speed of soundDocument introduced “Integrated Deterrence” as a term:Limiting of the production and spread of nuclear weapons...

Improving Security 2021-04-22

Improving Security crossword puzzle
Across
  1. X
  2. D
  3. Q
  4. S
Down
  1. A
  2. W
  3. D
  4. C
  5. Q
  6. D

10 Clues: AXWDDCQQDS

Bank Security 2021-11-04

Bank Security crossword puzzle
Across
  1. Placed on door after robbery.
  2. This is most important for everyone during a robbery.
  3. What you should be when customers enter branch.
  4. Given to robber for tracking purposes.
Down
  1. We complete this form based upon what you actually saw or observed.
  2. Activate this if it can be accomplished without endangering others.
  3. Everyone needs to maintain this emotion for safety reasons.

7 Clues: Placed on door after robbery.Given to robber for tracking purposes.What you should be when customers enter branch.This is most important for everyone during a robbery.Everyone needs to maintain this emotion for safety reasons.We complete this form based upon what you actually saw or observed....

Airport Security 2021-11-06

Airport Security crossword puzzle
Across
  1. a__________
  2. Discovery of e__________,
  3. Illegally damage/destroy computer data
Down
  1. Incite fear of explosives causing damage/danger
  2. f_______,
  3. Not stated clearly or exactly
  4. "Break through" a security restricted area (SRA)

7 Clues: f_______,a__________Discovery of e__________,Not stated clearly or exactlyIllegally damage/destroy computer dataIncite fear of explosives causing damage/danger"Break through" a security restricted area (SRA)

Network Security 2022-04-27

Network Security crossword puzzle
Across
  1. uses duplication of critical components/devices, increasing the reliability of the system.
  2. protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
Down
  1. any program or code designed to do something on a system or network that you don’t want to have happen.
  2. a program that has two jobs: to replicate and to activate.
  3. Can sustain network operations for only a limited time in the event of an outage.
  4. Provides incremental trunk speeds by combining multiple Fast Ethernet links.
  5. Redundant ___ eliminates a single point of power failure.

7 Clues: Redundant ___ eliminates a single point of power failure.a program that has two jobs: to replicate and to activate.Provides incremental trunk speeds by combining multiple Fast Ethernet links.Can sustain network operations for only a limited time in the event of an outage....

Network security 2023-12-11

Network security crossword puzzle
Across
  1. A wireless security protocol
  2. An address used for LAN card
  3. A type of software used in network monitoring
  4. Used for intrusion prevention
Down
  1. A piece of data
  2. A network management approach
  3. utilized for collecting and managing log messages from network devices.

7 Clues: A piece of dataA wireless security protocolAn address used for LAN cardA network management approachUsed for intrusion preventionA type of software used in network monitoringutilized for collecting and managing log messages from network devices.

Password Security 2024-05-29

Password Security crossword puzzle
Across
  1. An attacker wants to ______ your password.
  2. Combining something you are, something you know, or something you have is an example of _________ authentication.
  3. Like a password, but is usually a saying or phrase.
  4. Shorter weaker passwords that are easy to guess can be easy for an attacker to ________.
Down
  1. your password if you suspect it is compromised.
  2. Avoid using the same password across _____ accounts, or else you risk all accounts being compromised.
  3. A strong password is hard to _______.

7 Clues: A strong password is hard to _______.An attacker wants to ______ your password.your password if you suspect it is compromised.Like a password, but is usually a saying or phrase.Shorter weaker passwords that are easy to guess can be easy for an attacker to ________....

Social Security 2024-04-23

Social Security crossword puzzle
Across
  1. you recieve this from Social Security
  2. having a physical or mental condition that limits movements, senses, or activities.
  3. a severe global economic downturn that affected many countries across the world.
  4. a situation where a person actively searches for employment but is unable to find work.
Down
  1. a series of programs, public work projects, financial reforms, and regulations enacted by President Franklin D. Roosevelt
  2. a long history dating back to 13th-century Europe and became established in the U.S. during the 18th century.
  3. the action or fact of leaving one's job and ceasing to work.

7 Clues: you recieve this from Social Securitythe action or fact of leaving one's job and ceasing to work.a severe global economic downturn that affected many countries across the world.having a physical or mental condition that limits movements, senses, or activities.a situation where a person actively searches for employment but is unable to find work....