cyber security Crossword Puzzles
Five night's at freddy's 2023-12-14
14 Clues: pizza • Gutiar • creater • arghhhh! • Balloons! • music box • brown bear • yellow bear • Burned bunny • Yellow rabbit • i am in fnaf 4 • williams friend • Whats on chicas hand? • i am one of the security breach villains
phoenix 2 2022-10-31
14 Clues: seminar • scan in • newspaper • free period • solomen terzi • chested hours • security guard • test week month • google classroom • overpriced grapes • coffee and bagels • when you cut class • rabbi besser's specialty • outdoor ceiling outside of Crawfords
Crossword - Voltedge 2019-09-05
Across
- TCT Application access provisioning is done by?
- Which Predix service is used to store documents in CDA product?
- Security model used by most of the ERP applications
- Re-tag in TCT can be done by?
- Source data ($) for deriving $ Thresholds?
Down
- Regression technique used in Improper Payments model
- Tool currently used for onboarding
- System that makes automated calls from security
- Deep learning architecture used in CDA application
- Greek letter that denotes mean of a statistical distribution
10 Clues: Re-tag in TCT can be done by? • Tool currently used for onboarding • Source data ($) for deriving $ Thresholds? • System that makes automated calls from security • TCT Application access provisioning is done by? • Deep learning architecture used in CDA application • Security model used by most of the ERP applications • ...
Cybersecurity 2025-07-29
Across
- Network of private computers infected with malicious software
- Technique of making data unreadable to unauthorized users
- Fraudulent attempt to obtain sensitive information
- Barrier between a trusted network and untrusted networks
- Software designed to damage, disrupt, or gain unauthorized access
- Secret string used to authenticate access
Down
- Attacker tricks someone into breaking security procedures
- Attempts to guess a password by trying many combinations
- Method of verifying identity using fingerprints, retina, etc.
- Security flaw allowing attackers to access restricted data
10 Clues: Secret string used to authenticate access • Fraudulent attempt to obtain sensitive information • Attempts to guess a password by trying many combinations • Barrier between a trusted network and untrusted networks • Attacker tricks someone into breaking security procedures • Technique of making data unreadable to unauthorized users • ...
CMSC 125: Operating Systems LE04 pt 1 2017-05-17
Across
- Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
- Pretending to be an authorized user to escalate privileges.
- Bypasses CPU to transfer data directly between I/O device and memory.
- The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- Same key used to encrypt and decrypt.
- A destructive program that masquerades as a benign application.
- Results from disk head making contact with the disk surface.
- the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
Down
- Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- Provides an object oriented way of implementing file systems.
- Storage structure consisting of information about a file.
- Program that initates a security incident under certain circumstances.
- The art of hiding messages by converting them into hidden texts.
- A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- The study of codes, or the art of writing and solving them.
- Intercepting an already established session to bypass authentication.
- Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- Is a storage made available over a network rather than over a local connection.
19 Clues: Same key used to encrypt and decrypt. • Storage structure consisting of information about a file. • Pretending to be an authorized user to escalate privileges. • The study of codes, or the art of writing and solving them. • Results from disk head making contact with the disk surface. • Provides an object oriented way of implementing file systems. • ...
Code 2016-02-08
Across
- bully Bullies that are online
- A place where power or information leaves a system
- The use of parallel in computers
- to identify or remove errors from the computer
- A block to a puzzle for games or programs
- A folder that items
- A logic gate is an elementary building block on a digital circuit
- Get mail from the computer, phone, tablet, and computers
- When you add something onto your computer
Down
- A conditional clause or conjunction
- A virus on the computer
- When something repeats it self
- A part of a puzzle for coding
- citizenship Behaviors online
- A site that you visit or when you install a game on a software
- A programming language is formal constructed language that is programmed in the computer
- A system
- When you are working on a website and it needs to be ___
- block A block that repeats how many times in coding
- When something bad gets into your computer
20 Clues: A system • A folder that items • A virus on the computer • citizenship Behaviors online • bully Bullies that are online • A part of a puzzle for coding • When something repeats it self • The use of parallel in computers • A conditional clause or conjunction • A block to a puzzle for games or programs • When you add something onto your computer • ...
People and Property Crimes 2016-02-01
Across
- Lying while under oath
- Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
- Trying to keep people from committing crimes is_______
- Another word for theft
- Setting things on fire on purpose
- Lisa shot Ron. Ron is the victim of_______
- A process to better criminals
- Essentially blackmail
- Criminal being forced to either serve the community or pay people they have harmed
- A crime committed with the use of technology
Down
- Someone breaks in and steals stuff committed a
- When somebody dies by the actions of another. Has varying degrees.
- The lady who stole money from the booster club
- Secluding a criminal to a small space (form of imprisonment.
- Threatening someone with an attack
- Tricking someone to in order to gain something
- Destruction of property
- Seeking revenge on a criminal often very cruel
- Physically assaulting someone
- I have a gun and want your money
20 Clues: Essentially blackmail • Lying while under oath • Another word for theft • Destruction of property • A process to better criminals • Physically assaulting someone • I have a gun and want your money • Setting things on fire on purpose • Threatening someone with an attack • Lisa shot Ron. Ron is the victim of_______ • A crime committed with the use of technology • ...
Halloween 2017-11-04
Across
- / The Famous and 'Shocking' Experiment
- / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
- / Where the Count lives
- / versus Predator
- Edward Hyde / The good side of Dr Jekyll and Mr Hyde
- Intelligence / Many believe this will take over the world
- / He's been stuck in the matrix
- Ray / Nikola Tesla's famous...
- / Nocturnal creatures
- / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
Down
- / a common Sci-fi name for the Reanimated
- / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
- / The Large Hadron Collider is situated in...
- / Asimov of science fiction
- / to do with Rebirth in Norse mythology
- / When an aptitude test goes awry, Beatrice discovers she has a special quality.
- / The Last...
- / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
- / Famous Prison Experiment
- / The man who could eat anything
20 Clues: / The Last... • / versus Predator • / Nocturnal creatures • / Where the Count lives • / Famous Prison Experiment • / Asimov of science fiction • / He's been stuck in the matrix • Ray / Nikola Tesla's famous... • / The man who could eat anything • / The Famous and 'Shocking' Experiment • / to do with Rebirth in Norse mythology • ...
Ready Player One (First 6 Chapters) 2015-04-20
Across
- Wade's aunt
- The username Wade uses
- The clues that Halliday left behind for the easter egg are in this
- Your customizable character in OASIS
- The right for your personal information to remain unknown when using The OASIS
- The group of people who work for IOI that search for Halliday's easter egg
- A large internet service provider, largely used to search for Halliday's easter egg
- Where Wade goes to escape his Aunt and others
- The form of mobile homes that Wade and his Aunt live in
- The main character
- People who search for Halliday's easter egg
Down
- What is used to run OASIS
- The virtual reality program
- Halliday and Morrows game company
- Wade's aunt pawned this to get more money
- Wade's cyber crush
- Halliday left this behind and anyone who finds it gains control of The OASIS
- Wade's best friend
- What is used to see into the virtual reality
- Wade's home planet in OASIS
20 Clues: Wade's aunt • Wade's cyber crush • Wade's best friend • The main character • The username Wade uses • What is used to run OASIS • The virtual reality program • Wade's home planet in OASIS • Halliday and Morrows game company • Your customizable character in OASIS • Wade's aunt pawned this to get more money • People who search for Halliday's easter egg • ...
Villanova 2021-02-20
Across
- The nickname for the dining hall on south
- The building with the famous Arch on Main Campus
- The mansion at the edge of West Campus
- Science Center
- Mascot
- The year Villanova was founded
- Men's basketball coach
- Veritas, Unitas, __________
- The loop that the Oreo lives in
Down
- School of Business building
- The new name of the Pavilion
- A new pedestrian bridge now allows easier passage from this part of campus to Main
- Home of the Villanova Room, a small theater, an art Gallery, and a cyber lounge
- Official trivia every Thursday night
- The name of the new senior housing dorms along Lancaster Ave
- The first year that the Wildcats won March Madness
- Home of the Campus Ministry and student dorms
- Scored the game winning 2016 March Madness Championship Game buzzer beater
- This building on West Campus has dorms, a dining hall, a gymnasium, and class rooms inside of it
- The on campus "police"
- The current president of the University
21 Clues: Mascot • Science Center • Men's basketball coach • The on campus "police" • School of Business building • Veritas, Unitas, __________ • The new name of the Pavilion • The year Villanova was founded • The loop that the Oreo lives in • Official trivia every Thursday night • The mansion at the edge of West Campus • The current president of the University • ...
Working with children and adolescents 2024-08-20
Across
- type of bullying done through the internet
- type of play counselling which is structured
- level of 2 in moral development
- Zone of ______ development
- type of abuse that could include ridiculing
- Freud's psychosexual stage
- child not wanting to open up or be in counselling
- type of trauma from hearing about others trauma
Down
- balanced parenting style
- guidance on cases from someone with more experience/training
- the ethical principle of keeping information safe
- factor that minimises someones risk
- integrative model for play therapy
- ability to overcome/bounce back
- Bronfenbrenner's systemic theory
- what do we teach children about
- liked by many but also disliked by many
- metaphor to explain anger
- ending of counselling
- ____ vs guilt
- causing physical harm to oneself
- respecting everyones right to make their own decisions
- type of sibling relationship
- when a case is out of scope
- skills we teach children to handle their feelings and problems
- factor that puts someone at risk
26 Clues: ____ vs guilt • ending of counselling • balanced parenting style • metaphor to explain anger • Zone of ______ development • Freud's psychosexual stage • when a case is out of scope • type of sibling relationship • ability to overcome/bounce back • what do we teach children about • level of 2 in moral development • Bronfenbrenner's systemic theory • causing physical harm to oneself • ...
Internet vocabulary 2025-02-27
Across
- pretending to be companies to get someone's persona information
- editing a photo online to get desired results
- software used to block use of computer soft ware for a sum of monry
- place to communicate online
- being protected against online cyber attacks
- proper way to communicate on the internet
- using the internet to exploit people usually minors
- data left behind on the internet
- Speaking in All Caps to convey shouting
Down
- someone post or comment to purposely invoke anger
- a frequently updated webpage for business purposes
- recording and posting videos of assault
- a packet of data used to track their user anytime they use a site
- criminal activities committed using electrics
- using the internet to illegally copy software and give it to others
- bullying that occurs over the internet
- website setting allowing to control who see the information of the user
- someone who exploits others
- using someone else's identity for financial gain
- using electronics to harass someone
20 Clues: someone who exploits others • place to communicate online • data left behind on the internet • using electronics to harass someone • bullying that occurs over the internet • recording and posting videos of assault • Speaking in All Caps to convey shouting • proper way to communicate on the internet • being protected against online cyber attacks • ...
22 2024-11-04
Across
- Athletic brand associated with Black culture
- Modern prefix for internet terms
- Type of instrument used in blues
- West African drum
- Boxing icon's original last name
- Black Panther Party co-founder Bobby
- Legendary jazz singer Lena
- Hip-hop artist Goldblum, remixer
- Strong Black role model
- Instrument played by Miles Davis
- Jazz style popular in the 1930s
- Vibrant African print fabric
- Civil rights icon Parks' first name
- Filled with deep feeling
- Jazz singer Holiday's first name
Down
- Selfless acts for others
- "Thriller" singer Michael
- Supremes singer Diana Ross’s daughter
- Rhythmic feel in music
- New Orleans music style
- Day Martin Luther King Jr. envisioned
- Clear mental image or goal
- Will Smith's son
- African storyteller
- City with Drake and The Weeknd
- Dance popularized by Chubby Checker
- Jazz great Fitzgerald's nickname
- Fashionable necklace, symbol of elegance
- Opposite of strong female role
- A principle of Kwanzaa
30 Clues: Will Smith's son • West African drum • African storyteller • Rhythmic feel in music • A principle of Kwanzaa • New Orleans music style • Strong Black role model • Selfless acts for others • Filled with deep feeling • "Thriller" singer Michael • Clear mental image or goal • Legendary jazz singer Lena • Vibrant African print fabric • City with Drake and The Weeknd • ...
Magazines 2026-02-01
Across
- THG Publishing
- New Delhi Brinda Datta
- Book Review Literary Trust
- Council of Scientific & Industrial Research (CSIR) - National Institute of Science Communication and Policy Research (NIScPR).
- National Geographic Partner
- Centre for Science and Environment
- DE European Design Magazine 2017
- Times Network
- Asia Times
- British Film Institute (BFI)
- Chitralekha Group
- LRB Ltd.
- IIT Madras
- EFY Enterprises Pvt Ltd
- Sambhav Media
- Cyber Media (India) Ltd
- Harvard Business School
- Sameeksha Trust
- Competition Success Review
Down
- EFY Enterprises
- Association of Indian Universities (AIU).
- FORBES INDIA
- The Economist Group
- BW Businessworld Media Pvt. Ltd.
- Reed Business Information Ltd.
- Total Library Solutions (India) Pvt. Ltd.
- Ministry of Information & Broadcasting
- Condé Nast Publications
- Careers360
- MTG Learning Media
- Trusted Media Brands
- The New York Review of Books, Inc
- the Bhavana Trust
- The Hindu Group
- Indian Science News Association
- Malayala Manorama Co. Ltd.
36 Clues: LRB Ltd. • Careers360 • Asia Times • IIT Madras • FORBES INDIA • Times Network • Sambhav Media • THG Publishing • EFY Enterprises • The Hindu Group • Sameeksha Trust • Chitralekha Group • the Bhavana Trust • MTG Learning Media • The Economist Group • Trusted Media Brands • New Delhi Brinda Datta • Condé Nast Publications • EFY Enterprises Pvt Ltd • Cyber Media (India) Ltd • Harvard Business School • ...
Classroom Hunt 2025-10-31
Across
- Ways to stop _________ bullying.
- Respect by raising your hand to speak and no interrupting others.
- Speed up your workflow with these essential ________ shortcuts.
- If you don't believe in _________ no one will do it for you.
- Made with 100% _______ cheese.
- Keep your ________area neat.
- Water mineral enhanced for taste.
- Any bad attitudes or negative thinking.
- The computer lab prepared and ready to work.
- Everyone is ________ here.
- _________ only when necessary.
- Save the _________ or message and share with an adult.
- Be patient....I'm thinking.
- Do not use a computer to harm, bully or ______ others.
Down
- 10 Rules for ___________ computer use.
- Your uniqueness is your __________.
- ______ 06 unlocked.
- Click to select this object.
- _________ in place.
- Be prepared and ready to ______.
- Do not _________ with another person's computer work or activity.
- _________belongs.
- Don't change _________.
- The moment you give up is the _________ you let someone else win.
- Because they think they can they ___________.
- Do not _________ someone else's work as your own.
26 Clues: _________belongs. • ______ 06 unlocked. • _________ in place. • Don't change _________. • Everyone is ________ here. • Be patient....I'm thinking. • Click to select this object. • Keep your ________area neat. • Made with 100% _______ cheese. • _________ only when necessary. • Ways to stop _________ bullying. • Be prepared and ready to ______. • Water mineral enhanced for taste. • ...
CTF-CW-11 2025-11-14
Across
- Document on every website about rules for handling details
- When the cloud gets graded for playing by the compliance rulebook.
- At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
- The elevator hack from novice to boss
- Tech world’s fire brigade—second shout
- Safety scissors for your network
- Tekion’s legendary vault no hacker can touch.
- Buzzing threat hunter hangout
- Pop-up or email outlining changes in how data gets used
Down
- Any data, direct or indirect, that reveals a person’s identity
- Processes to ensure robots don’t go rogue
- When a hacker sneaks past your digital guard
- The organization behind the ATT&CK plots
- DNA test for who’s calling the shots
- When your browser “remembers” you, for a while
- At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
- Slamming the panic room door on hackers
- Every journey’s pit stops
- Red ink on the corporate report card
- Info swap: turn gold into poker chips
20 Clues: Every journey’s pit stops • Buzzing threat hunter hangout • Safety scissors for your network • DNA test for who’s calling the shots • Red ink on the corporate report card • The elevator hack from novice to boss • Info swap: turn gold into poker chips • Tech world’s fire brigade—second shout • Slamming the panic room door on hackers • The organization behind the ATT&CK plots • ...
Nates Crossword 2023-08-22
5 Clues: - uneversial serial bus • - a secret word or phrase • drive- a high capacity storage device • bulling- bulling someone through a computer • person who uses computers to gain access to data
KUKODI NYUMBA 2022-09-26
crack the code 2024-04-30
Across
- The process of verifying the identity of a user or device (10 letters)
- - A type of attack where an attacker intercepts communication between two parties (6 letters)
- - The practice of disguising malicious files to make them appear harmless (7 letters)
- -A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
- - A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
Down
- - Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
- - A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
- -A set of rules or guidelines designed to enhance computer security (9 letters)
- -A program designed to prevent, detect, and remove malware (10 letters)
- - The exploitation of security vulnerabilities in a computer system or network (9 letters)
- - Protects a computer system from unauthorized access (9 letters)
- - The unauthorized copying of data from a computer system (6 letters)
12 Clues: - Protects a computer system from unauthorized access (9 letters) • - The unauthorized copying of data from a computer system (6 letters) • The process of verifying the identity of a user or device (10 letters) • -A program designed to prevent, detect, and remove malware (10 letters) • ...
Ipo rossword puzzle 2021-09-13
Across
- , Capital stock is the amount of common and preferred shares that a company is authorized to issue
- a service charge assessed by a broker or investment advisor.
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- Mark Zuckerberg
Down
- Electronic Data Gathering, Analysis, and Retrieval system
- a sales pitch or promotion made by the underwriting firm, usually on the road
- a security that represents the ownership of a fraction of a corporation.
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- , A derivative is a complex type of financial security that is set between two or more parties.
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
Ipo rossword puzzle 2021-09-13
Across
- Capital stock is the amount of common and preferred shares that a company is authorized to issue
- a service charge assessed by a broker or investment advisor.
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- Mark Zuckerberg
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
- a sales pitch or promotion made by the underwriting firm, usually on the road
- A derivative is a complex type of financial security that is set between two or more parties.
Down
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a security that represents the ownership of a fraction of a corporation.
- Electronic Data Gathering, Analysis, and Retrieval system
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
RU ITEC411 Crime and Security 2021-12-01
Across
- A verbal form of defamation
- One of the three principles of the CIA triad
- One of the three principles of the CIA triad
- A group of computers infected with malware controlled by a host
- One of the three principles of the CIA triad
- Software that can replicate itself and does not need to be activated
- Hacking for political motivation
- A way of protecting data through scrambling text
- A written form of defamation
Down
- directing people to fake websites to collect personal data
- Software that can replicate itself but needs to be activated
- Physical characteristics used to secure data
- The act of protecting computer systems
- Malicious code that looks to be harmless
- Gaining access to a computer or system without permission
- Act of sending emails in order to gain someone's personal information
- A type a malware that records activities on a computer
- Recording devices that are installed in card readers
- A method used to get around normal security measures
- A type of malware that locks a computer until money is paid
20 Clues: A verbal form of defamation • A written form of defamation • Hacking for political motivation • The act of protecting computer systems • Malicious code that looks to be harmless • Physical characteristics used to secure data • One of the three principles of the CIA triad • One of the three principles of the CIA triad • One of the three principles of the CIA triad • ...
A+ 2025-02-11
Across
- A type of software designed to steal personal data.
- A Microsoft cloud storage service.
- A protocol used for remote desktop access.
- A method used to prevent unauthorized access by requiring two credentials.
- Background processes.
- A Windows recovery option for rolling back changes.
- A type of social engineering where an attacker impersonates someone trusted.
- A feature that allows users to run older programs on new Windows versions.
Down
- A Windows security tool that helps prevent malware infections.
- A virtualization platform for running multiple OS.
- A type of virus that hides within legitimate software.
- A type of cyberattack that floods a system with traffic.
- A type of attack that intercepts and alters communication.
- A method of verifying system integrity using cryptography.
- A Windows feature that encrypts individual files and folders.
- A security policy that enforces password changes.
- A type of malware that locks users out of their system.
- A command used to trace network routes.
18 Clues: Background processes. • A Microsoft cloud storage service. • A command used to trace network routes. • A protocol used for remote desktop access. • A security policy that enforces password changes. • A virtualization platform for running multiple OS. • A type of software designed to steal personal data. • A Windows recovery option for rolling back changes. • ...
Internet 2024-12-04
Across
- a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations
- Everything having to do with the Internet
- To transfer files or data stored on the internet
- Electronic mail
Down
- a device that directs data traffic between your local network and the Internet.
- The computer software or app you use to access the internet
- a wireless networking technology
- A number that is used to identify networks within the routing system
8 Clues: Electronic mail • a wireless networking technology • Everything having to do with the Internet • To transfer files or data stored on the internet • The computer software or app you use to access the internet • A number that is used to identify networks within the routing system • a device that directs data traffic between your local network and the Internet. • ...
NATIONAL SECURITY 2023-03-05
Across
- refers to the set of standards or conditions that must be met for a country to be considered economically secure.
- refers to the measures taken by a country to protect its economy and ensure its stability.
- refers to the interdependent network of living and non-living elements in a particular environment.
- refers to the systematic observation and analysis of the social and economic factors that affect a country's security.INTERNATIONAL refers to the measures taken by countries to ensure their economic stability and protect themselves from external economic threats.
- INDICATOR THRESHOLD refers to the minimum level of a security indicator that must be met to ensure the security of a country or its citizens.
Down
- refers to the ability of a country to maintain its economic stability and protect its citizens from economic risks.
- THREAT refers to any potential danger or risk to the security of a country or its citizens.
- refers to the protection of a nation's citizens, borders, and infrastructure from internal and external threats.
- INDICATOR refers to a measurable factor that is used to assess the level of security in a particular area.
9 Clues: refers to the measures taken by a country to protect its economy and ensure its stability. • THREAT refers to any potential danger or risk to the security of a country or its citizens. • refers to the interdependent network of living and non-living elements in a particular environment. • ...
Digital security 2023-04-01
Across
- A live, online seminar or presentation conducted over the internet
- A written or printed communication that is sent or received electronically via a phone or computer.
- A social networking website that allows users to connect with friends and family and share information.
Down
- A software application that allows users to make voice and video calls and chat over the internet.
- A digital audio file made available on the internet for downloading or streaming.
- An online conversation between two or more people in real-time.
- A message distributed by electronic means from one computer user to one or more recipients via a network.
7 Clues: An online conversation between two or more people in real-time. • A live, online seminar or presentation conducted over the internet • A digital audio file made available on the internet for downloading or streaming. • A software application that allows users to make voice and video calls and chat over the internet. • ...
tss security 2021-10-27
7 Clues: spy club • finds people • laeding officer • print, ink pad and file • wears ppe and carrys boxes • makes decisions, buys stuff • looks for clues and finds awnsers
Information Security 2023-10-23
Across
- A program that appears legitimate but actually contains malicious code
- The process of identifying and fixing security vulnerabilities.
- A malicious software that encrypts data and demands a ransom
- A technique for verifying the identity of users or devices
Down
- The act of browsing the internet without revealing your identity.
- Unauthorized access to computer systems or data
- A unique combination of characters used to access a system
7 Clues: Unauthorized access to computer systems or data • A unique combination of characters used to access a system • A technique for verifying the identity of users or devices • A malicious software that encrypts data and demands a ransom • The process of identifying and fixing security vulnerabilities. • ...
Food Security 2024-11-28
7 Clues: Opposite of hungry. • Growing plants to eat • A place where food is sold. • Sharing food helps stop this. • We need this to live and grow • Food that helps us grow strong • Something we drink to stay healthy
Computer security 2022-09-07
Social Security 2026-02-17
7 Clues: Retirement at age 62 • Retirement at age 67 • Retirement up to age 70 • Created the Social Security program • The official name for Social Security • Basic benefit amount at full retirement age • Supplements, but does NOT replace personal financial and insurance programs
Logistics Crossword 2021-11-18
Across
- -Most used app on the internet
- -Temporary group made to do a specific task
- -The logistics cycle is driven by the ________
- -Where products are temporarily stored while being given out to transportation units or elsewhere
- -Mines, farms, etc that provide base materials from a natural source
- -First major global security initiative
- -Where products are stored for long periods of time
- -Expected volume of goods expected to go through particular workplace
Down
- -Dangerous substance that holds risk to workers or the environment
- -Most secure dock
- -Most common dock
- somewhat permanent group of people who come together to get jobs done
- -Massive amount of money designated to help companies get rid of waste
- -the process and paers of the process of getting a product from a raw material provider to a customer
- -Global connection of computers and other technology
- -Security agreement between USA, Canada, and Mexico
16 Clues: -Most secure dock • -Most common dock • -Most used app on the internet • -First major global security initiative • -Temporary group made to do a specific task • -The logistics cycle is driven by the ________ • -Security agreement between USA, Canada, and Mexico • -Where products are stored for long periods of time • -Global connection of computers and other technology • ...
Cybersecurity Awareness Month - Week 3 2022-10-05
Across
- Cirrus' tool for endpoint security
- A memorized secret consisting of a sequence of random words that is longer than a typical password
- Cirrus' email security platform
- A password attack that uses trial-and-error by attempting every possible combination
- Malware that disables access to data until a fee is paid
- A type of virus that automatically spreads itself
Down
- software designed to detect and destroy viruses
- A network of devices infected and controlled by the same virus
- A physical device that connects to a network
- A social engineering attack delivered by SMS text message
- A phishing attack aimed at senior executives
- The process of encoding data using complex algorithms for confidentiality
- An attack that prompts an MFA approval request over and over
- Malware that is disguised as legitimate software
- A social engineering technique where an attacker creates a fake scenario
- A type of trojan spyware that records your keystrokes
16 Clues: Cirrus' email security platform • Cirrus' tool for endpoint security • A physical device that connects to a network • A phishing attack aimed at senior executives • software designed to detect and destroy viruses • Malware that is disguised as legitimate software • A type of virus that automatically spreads itself • A type of trojan spyware that records your keystrokes • ...
Recap - Day 1 2023-11-28
Across
- WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
- A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOUDO IN THIS CASE?“
- THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING -
- SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
- A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
- A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
- MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
- THIS IS A TYPE OF TRAVEL DOCUMENT
- A...LIKES TO LEARN FROM DEMONSTRATIONS
Down
- A TYPE OF LIGHT TO EXAMINE ADOCUMENT SECURITY FEATURE USING MIDAS
- BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
- A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
- WHAT DOES THE D IN MIDAS STAND FOR?
- AN...HAS ACCESS TO THE WHOLE SYSTEM
- IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
- WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?
16 Clues: THIS IS A TYPE OF TRAVEL DOCUMENT • WHAT DOES THE D IN MIDAS STAND FOR? • AN...HAS ACCESS TO THE WHOLE SYSTEM • A...LIKES TO LEARN FROM DEMONSTRATIONS • MACHINE READABLE TRAVEL DOCUMENTS HAVE A... • WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH • SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS • IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS • ...
Mortgage Terminology 2020-08-01
Across
- lenders will check this report to assess your character
- required for loans above 80% lending
- government tax payable when a property is purchased
- when a property has a clear title with no mortgage
- the most common interest rate choice
- to move a loan from one lender to another
- written agreement outlining the terms of a purchase
- value of an asset minus the debt owing
- additional loan repayments that can be drawn on
- the percentage value of debt against asset
- an independent assessment of a property
- increase in property value over time
Down
- asset offered by the borrower to the lender
- a third party who provides additional security
- any outstanding financial debt
- the process of building a house
- approval from a bank that is not yet confirmed
- lowest loan repayments without paying the principle
- to lock in your repayments for a set time
- loss tax benefit for investment property
- will be lodged if you don't pay a bill for 90+ days
- completion of the sale or purchase of a property
22 Clues: any outstanding financial debt • the process of building a house • required for loans above 80% lending • the most common interest rate choice • increase in property value over time • value of an asset minus the debt owing • an independent assessment of a property • loss tax benefit for investment property • to lock in your repayments for a set time • ...
Cold War by Jaimi Taylor 2014-02-17
Across
- European economic recovery made by the USA
- The theroy that if one country falls then the rest will soon follow
- Line that separates North Korea from South Korea
- countries controlled by USSR
- working class women and men
- Cuban communist leader
- Chinese nationalist who took over China
- the man who wanted to contain communism so he made the Marshall Plan
- investigates disloyaity on the eve of war
- Vietnam city
Down
- Divided North Vietnam from South Vietnam
- Two people accused of passing atomic secrets to the soviets during the war
- freed people from resisting communism
- moved supplys to West Berlin
- An organization made for peace, security, and economic developement
- Republican Senator who accused Government Officials of communism
- High ranking state department leader investigated for spying
- when the central government rules by terrorizing citizens
- Security council doccument that suggested trippling defence budget
- conflict between USA and USSR
- 10 nations pleged mutual assistance in the event of a attck
- the act of preventing spread of communism
- Leader of Indochina communist party
23 Clues: Vietnam city • Cuban communist leader • working class women and men • moved supplys to West Berlin • countries controlled by USSR • conflict between USA and USSR • Leader of Indochina communist party • freed people from resisting communism • Chinese nationalist who took over China • Divided North Vietnam from South Vietnam • the act of preventing spread of communism • ...
Income Tax Vocabulary 2015-07-03
Across
- When you overpay the government, you receive a refund
- Expenses the government has
- gross income Total income
- withholding Money an employer holds from your paycheck
- status Married/single/head of household
- Income from stocks and bonds
- Income the government receives from taxpayers, etc.
- Dependents you are claiming
- Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
- Set $ amount not taxed for each dependent
- Money you earn from employment
- income Money earned before deductions
- Husband/Wife
Down
- care expenses Money you pay for someone else to care for a child or elder dependent
- tax Taxes on income
- deduction $ amount non itemizers may subtract from income based upon filing status
- security Your personal identification number
- income Income received from interest, dividends, social security & pentions
- Money received from saving account
- A person who relies on someone for living expenses
- Your banks identification number
- of household Single person who has dependents
- No withholding
- pay Money you earn to take home
24 Clues: Husband/Wife • No withholding • tax Taxes on income • gross income Total income • Expenses the government has • Dependents you are claiming • Income from stocks and bonds • Money you earn from employment • pay Money you earn to take home • Your banks identification number • Money received from saving account • income Money earned before deductions • ...
Crossword Puzzle unit 6 2023-02-23
Across
- Term used in the oil industry to indicate the searching for the product
- Political person with great knowledge ando experience in state affairs
- last name of the one who took Office as presidente on October 6 of 1911
- A groupof people who opposed reelection
- Who wrote the novel Balun Canan?
- Plan thatvwas develope bye Emiliano Zapata
- Form of gorvernment in which power was obtained through authoritarian or violent methods
- Where did Porfirio Díaz exile ando died?
- The security institute that was founded in 1943
- Oficial rate or tax which determines the feeds yo be paid
- The mexican miracle start during the presidency of-
- Social security Ford state workers
Down
- Who kill madero in 1913
- What was the crisis in the countryside
- Group that was formed bye Carranza
- Workers that temporarily migrates
- Economy that si applied un times of armed conflicto or violent convulsions
- What does the articule 27 about
- What battle began in colonial times when haciendas where form
- Independient of any religioso organización or denomination
20 Clues: Who kill madero in 1913 • What does the articule 27 about • Who wrote the novel Balun Canan? • Workers that temporarily migrates • Group that was formed bye Carranza • Social security Ford state workers • What was the crisis in the countryside • A groupof people who opposed reelection • Where did Porfirio Díaz exile ando died? • Plan thatvwas develope bye Emiliano Zapata • ...
CROSSWORD PUZZLE U6 2023-02-27
Across
- Drastically reduced in numbers
- Made a constitutional reform
- Group led by Emiliano Zapata
- Was part of a social sector called “the anti-re-electionists”
- The increasing pace of the Mexican economy came to be known as
- Was considered the father of education in Mexico
- Paid on a regular basis
- The essential nature or the main part of something
- A group led by Francisco Villa
- An act or strategy intended to resolve a problem or improve a situation
Down
- Group led by Venustiano Carranza
- Economy that is applied in times of armed conflict or violent convulsions
- A group of people who opposed reelection
- To create a system that depends on a central power
- Piece of land that is worked by a community and whose earnings are distributed among all
- Mexican political period from 1928-1934
- Committed fraud in the elections of 1910
- Institute of Social Security and Services for State Workers
- The Secretary of Public Education
- The Mexican Social Security Institute
20 Clues: Paid on a regular basis • Made a constitutional reform • Group led by Emiliano Zapata • Drastically reduced in numbers • A group led by Francisco Villa • Group led by Venustiano Carranza • The Secretary of Public Education • The Mexican Social Security Institute • Mexican political period from 1928-1934 • A group of people who opposed reelection • ...
Environmental Services 2017-08-18
Across
- These are used to keep your hands clean.
- What is the name of the disinfectant we use to clean?
- Who is the head of safety and security?
- What is used to clean the toilets?
- What company takes care of RED trash and sharps for the hospital?
- Who is the manager of ES?
- Evening discharge cleaners are called?
- What brand of bleach do we use to clean with?
- This is used to clean the carpet.
- What floor is ICU on?
Down
- What is the name of the security company?
- Used to collect trash from multiple areas.
- What is the name of the fragrance spray we use?
- What tupe of rags do we use to clean? (blue and yellow)
- Weeks How far out should you schedule PTO?
- What is the brand of electronic paper towels we use?
- This is used to swipe you into the building or certain areas.
- What is the Color of ES Scrubs?
- What program is used to look up chemicals?
- What company takes care of pest control?
20 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • This is used to clean the carpet. • What is used to clean the toilets? • Evening discharge cleaners are called? • Who is the head of safety and security? • These are used to keep your hands clean. • What company takes care of pest control? • What is the name of the security company? • ...
Great Depression Crossword Puzzle 2024-10-15
Across
- Projects that are used for public uses
- Closing of banks during the Great Depression to avoid bank runs
- A homeless, penniless wanderer
- Program that presented the struggles of middle-class people
- Eleanor Roosevelt's mother
- General who would ignore Herbert Hoover
- Method of boycotting work by sitting down at work and refusing to leave
- A very controversial president at the time
- To attempt to resolve conflict between hostile people or groups
- Act that Americans were unsure of because it excluded African Americans
Down
- The incident that resulted in 10 deaths and 90 injuries
- A person who risks money in hopes of a financial profit
- First Roman Catholic to win a major party presidential nomination
- Spending borrowed money rather than raising taxes to boost money
- First African American to win an Academy Award
- Something that provides security against misfortune
- A long period of rising stock prices
- The acronym for Federal Deposit Insurance Corporation
- Role of government to work out conflicts among competing interest groups
- This didn't end the depression, but gave Americans a stronger sense of security
20 Clues: Eleanor Roosevelt's mother • A homeless, penniless wanderer • A long period of rising stock prices • Projects that are used for public uses • General who would ignore Herbert Hoover • A very controversial president at the time • First African American to win an Academy Award • Something that provides security against misfortune • ...
Chapter 11 2025-04-09
Across
- In ____ 1935, Congress passed the Social Security Act
- President ____ believed that the economy would improve soon
- The Security Act placed a tax on workers and _____
- In ____ 1929, Investors started selling their stocks
- During the Depression, a disaster hit the ________
- The United States slid into an economic crisis called the ____
- On October 24, 1929, investors sold almost ____ shares
- By ____, 75 percent of Americans lived in poverty
Down
- Small banks suffered losses when farmers ____
- Migrant workers moved here
- Many ____ moved to California and became migrant workers
- Stock market crashed on black _____
- Hoover believed that the government could not fix the ______
- Some people who lost their homes lived in shelters made of old ____
- By the late 1920s,____ prices were very high
- In ____ Congress created the Works Progress Administration (WPA)
- Many investors did not have the money to buy stocks so they bought on ___ instead
- ____ borrowed their money from banks
- Many ___ were forced to look for work
- In ____ Roosevelt created a new set of programs, often called the Second New Deal.
20 Clues: Migrant workers moved here • Stock market crashed on black _____ • ____ borrowed their money from banks • Many ___ were forced to look for work • Small banks suffered losses when farmers ____ • By the late 1920s,____ prices were very high • By ____, 75 percent of Americans lived in poverty • The Security Act placed a tax on workers and _____ • ...
Christian Hulet crossword 2025-03-25
Across
- this celebrity lost 30 million with FTX
- a digital system of transactions that is distributed across a network
- Warren Buffet is the ceo of this company
- how old to invest in crypto
- the age for RMD in IRA account you need to draw from
- contribute a max of 23,500 (spell how it sounds)
- for low risk people and is automotion
- what risk tolerance is for aggressive people
- Warren Buffet’s rule #1
Down
- is backed by the government
- combined with medicare and social security
- made in 1935 by FDR
- buy low ___
- move to another plan
- one problem if you put all your money into one company and it goes
- what also sometimes contributes to your pension
- traditional IRA contributions are made
- age of retirement
- roth IRA contributions are made
- social security is funded by this
- part of the fica tax
- what is backing crypto
- is managed by, in pension plans
- the biggest financial fraud in the U.S.
- offered to people with jobs in trades, manufacturing, and educators
25 Clues: buy low ___ • age of retirement • made in 1935 by FDR • move to another plan • part of the fica tax • what is backing crypto • Warren Buffet’s rule #1 • is backed by the government • how old to invest in crypto • roth IRA contributions are made • is managed by, in pension plans • social security is funded by this • for low risk people and is automotion • ...
Cybersecurity Awareness Puzzle 2025-10-14
Across
- An event or occurrence, often unexpected or problematic.
- Hidden programs providing remote access.
- Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
- More than one kind of proof.
- Special access or rights given to certain users.
- Self-replicating malware spreading across systems.
- Encrypts data and demands payment for decryption.
- You should do this to all of your software.
- Voice (phone-based) phishing.
- SMS/text-based phishing.
- Security Awareness Training is provided ___.
Down
- Proof of who someone is.
- Permission to access a system, file, or resource.
- A modification or update to a system, process, or configuration.
- Protection against threats or attacks on computer and data.
- Using someone else's access without permission to enter a building.
- Records everything you type on a keyboard.
- A system that blocks unauthorized access to a network or computer.
- Cheating someone out of Money or personal Information
- Deceptive emails that trick users into clicking malicious links or sharing credentials.
- Secret words or codes used to unlock accounts.
- Copying data to keep it safe in case something is lost or damaged.
22 Clues: Proof of who someone is. • SMS/text-based phishing. • More than one kind of proof. • Voice (phone-based) phishing. • Hidden programs providing remote access. • Records everything you type on a keyboard. • You should do this to all of your software. • Security Awareness Training is provided ___. • Secret words or codes used to unlock accounts. • ...
Cybersecurity Crossword 2025-09-25
Across
- Requiring more than one form of verification. ____________ authentication
- A network security system that monitors and controls traffic.
- The process of verifying identity before granting access.
- The process of converting data into a secure code.
- A secret string of characters used for authentication.
- The practice of protecting systems, networks, and programs from attacks.
Down
- Technology simulating human intelligence, used in modern cybersecurity.
- Malicious software disguised as legitimate software.
- Malware that locks files and demands payment.
- A scam using fake emails or messages to trick people into revealing information.
- A clickable reference to another webpage or document.
- Phishing conducted through SMS text messages
- Software designed to harm or exploit systems.
- A type of malware that replicates itself by infecting other programs.
- Software that detects and removes malicious programs.
- A well-known security awareness training platform.
- A secure tunnel for internet traffic, stands for Virtual Private Network.
- An attempt to damage, steal, or disrupt digital systems.
- Manipulating people into revealing confidential information. ________ engineering
- A hidden method of bypassing normal authentication.
20 Clues: Phishing conducted through SMS text messages • Malware that locks files and demands payment. • Software designed to harm or exploit systems. • The process of converting data into a secure code. • A well-known security awareness training platform. • A hidden method of bypassing normal authentication. • Malicious software disguised as legitimate software. • ...
Investing - Caison 2026-03-19
Across
- A loan you give to the government or a company
- Market where prices are trending down
- You contribute and sometimes your employer contributes too
- Funded by being paid while working
- Market where prices are trending up
- High Risk and trying to win fast
- The availability of cash
- Virtual Currency
- Employer sponsored retirement savings plan
- Currency created by the government
- Contributions are made pre tax
- Measures the price performance of a basket of assets
- Price to earnings
Down
- Savings, Emergency or College fund
- Age to receive full social security benefits
- The total value of a company’s stock
- Contributions made post tax
- Social Security and Medicare taxes combined
- Managed by a fund manager
- Investing all the money you have at that time
- Password that makes it impossible to hack
- A collection of stocks or bonds that trades on a stock exchange
- Index representing the top 500 market cap companies
- 100 of the largest non-financial companies
- Strategy where you invest your money in equal amounts
25 Clues: Virtual Currency • Price to earnings • The availability of cash • Managed by a fund manager • Contributions made post tax • Contributions are made pre tax • High Risk and trying to win fast • Savings, Emergency or College fund • Funded by being paid while working • Currency created by the government • Market where prices are trending up • The total value of a company’s stock • ...
fanf 2022-02-09
FCC 2025-03-24
The Financial Vault Quiz - based on emails send on Financial Terms 2018-02-26
Across
- It refers to the amount of uncertainty or risk about the size of changes in a security's value.
- When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
- Short selling is motivated by the belief that a security's price will ____
- The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
- Portfolios that lie below the efficient frontier are
- A minimum of ___ persons are required to create an omnibus account
- The _____ the volatility, the riskier the security.
Down
- It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
- One measure of the relative volatility of a particular stock to the market is its
- The sale of a security that is not owned by the seller or that the seller has borrowed
- Employee’s Provident Fund is maintained and overseen by the ___
- An omnibus account is normally overseen by a ____ manager
- Account Is an account between two futures merchants (brokers)
13 Clues: The _____ the volatility, the riskier the security. • Portfolios that lie below the efficient frontier are • An omnibus account is normally overseen by a ____ manager • Account Is an account between two futures merchants (brokers) • Employee’s Provident Fund is maintained and overseen by the ___ • A minimum of ___ persons are required to create an omnibus account • ...
The Making of a Provisional 2015-02-17
Across
- - capital of Northern Ireland
- - Irish Republican Army
- - men who parades through streets of Belfast
- - what the security force did to the shoes of the son
Down
- - to live separately
- - what the security force did to Frankie and Patricia's family
- - column in the paper when someone has died
- - Frankie Ryan's accent
8 Clues: - to live separately • - Irish Republican Army • - Frankie Ryan's accent • - capital of Northern Ireland • - column in the paper when someone has died • - men who parades through streets of Belfast • - what the security force did to the shoes of the son • - what the security force did to Frankie and Patricia's family
Bonds 2024-02-08
Across
- exersising before the maturity date
- Pooling assets to make a financial security
- Security bound by morgages or other assets
- matures in less than 1 year
- State bonds
Down
- Risk is higher,so yeild is greater from a company
- federal governments ability to back money
- group of loans with similar charecteristics
8 Clues: State bonds • matures in less than 1 year • exersising before the maturity date • federal governments ability to back money • Security bound by morgages or other assets • Pooling assets to make a financial security • group of loans with similar charecteristics • Risk is higher,so yeild is greater from a company
American Express Travelers Cheque 2021-11-22
Across
- _____ Express uses the Cheques
- Can you have counterfeit Cheques
- What is one security feature
- How do you verify
Down
- What do you have to do for the signatures
- How many security features do they have
- Where can you find the phone number to call
- What code do you need on the Cheque
- Is the process where you validate both the presenter and the cheque
9 Clues: How do you verify • What is one security feature • _____ Express uses the Cheques • Can you have counterfeit Cheques • What code do you need on the Cheque • How many security features do they have • What do you have to do for the signatures • Where can you find the phone number to call • Is the process where you validate both the presenter and the cheque
Food insecurity 2023-12-06
Across
- what is low food security?
- what causes food insecurity?
- What is another solution for food insecurity?
- can extra help with grades for food insecure kids help?
- food what is high food security?
Down
- what food insecurity solution has tapp middle school tried?
- how many people are helped by food drives every year?
- Why dont people like to do food drives often?
- How can food insecurity affect kids learning?
- If more people helped could food insecurity be reduced?
10 Clues: what is low food security? • what causes food insecurity? • food what is high food security? • Why dont people like to do food drives often? • How can food insecurity affect kids learning? • What is another solution for food insecurity? • how many people are helped by food drives every year? • If more people helped could food insecurity be reduced? • ...
Guest Services 2025-07-10
Across
- Who do you call when people are acting inappropriately
- This person gets notified when we are almost out of stickers
- ______ license gets placed in the scanner
- People on this list need Security approval prior to entering
Down
- ________ Service is our priority.
- Program for people needing food
- _____Briggs
- Government issued book that lets a person travel to other countries.
- May be used when person has no government ID
9 Clues: _____Briggs • Program for people needing food • ________ Service is our priority. • ______ license gets placed in the scanner • May be used when person has no government ID • Who do you call when people are acting inappropriately • This person gets notified when we are almost out of stickers • People on this list need Security approval prior to entering • ...
UNIT 1 2023-05-03
UNIT 1 2023-05-03
Information Security 2020-09-24
Across
- The best response to password Recovery Questions is,
- Disclosing personal member information may be
- The type of email to get you to click on a fraudulent link
- Who is responsible for data security
Down
- How might someone evil try to get information from you
- If I click on a link I believe was malicious I should
- What is the default data classification,
7 Clues: Who is responsible for data security • What is the default data classification, • Disclosing personal member information may be • The best response to password Recovery Questions is, • If I click on a link I believe was malicious I should • How might someone evil try to get information from you • The type of email to get you to click on a fraudulent link
Food Security 2021-10-28
Across
- overnutrition and overnutrition can both result in _____.
- ________ is the measure of the availability of food and individuals' ability to access it.
- 23.5 million people live in a _______.
- living in a food desert means you have limited access to ______, fresh, and affordable food.
Down
- In food deserts, _______ and convenience stores are often the only available places to get food.
- _______ is a root cause of hunger and malnutrition
- Some factors that can cause _______ or global hunger include poverty, job instability, unstable markets, climate change, and war.
7 Clues: 23.5 million people live in a _______. • _______ is a root cause of hunger and malnutrition • overnutrition and overnutrition can both result in _____. • ________ is the measure of the availability of food and individuals' ability to access it. • living in a food desert means you have limited access to ______, fresh, and affordable food. • ...
Password Security 2016-02-01
Across
- a process of changing characters in a password to strengthen it
- to put in front of a password to make it more unique
Down
- include these values to strengthen passwords
- xxxxxxxxxx words make weak pass words
- include these special characters to strengthen passwords
- xxxxx force attacks use dictionaries of passwords to hack a system
- human sniffing passwords will xxxxx a password once the first few characters are known
7 Clues: xxxxxxxxxx words make weak pass words • include these values to strengthen passwords • to put in front of a password to make it more unique • include these special characters to strengthen passwords • a process of changing characters in a password to strengthen it • xxxxx force attacks use dictionaries of passwords to hack a system • ...
Networks security 2021-02-09
7 Clues: LAN • Is bigger than LAN • A biometric of facial features • What is a Malware but is hidden • when an attack occurs to networks • A person who infiltrates systems or servers • A system protection against malware and hackers
collective security 2021-10-12
Across
- what measures, not coercive,in the mechanism of ensuring universal security are brought to the fore
- the main reason in exceptional cases when peace has already been violated
- what laid the foundations of a kind of behaviour of states, the core of which were the principles of sovereignty and non-interference
- takes the first role in collective security
Down
- the first serious attempt to institutionalize collective security in the modern era
- bodies should make every effort to find a peaceful solution to local disputes through these agreements
- the type of security which require the protection of the world community or a group of States from the possibility of harming them by means of armed violence, provided by their joint efforts
7 Clues: takes the first role in collective security • the main reason in exceptional cases when peace has already been violated • the first serious attempt to institutionalize collective security in the modern era • what measures, not coercive,in the mechanism of ensuring universal security are brought to the fore • ...
MIS Security 2023-11-14
Across
- ______horse, software that appears to be benign but does something other than expected.
- protocols used for secure information transfer over the Internet
- Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
- Write your initial here for identifier
- enforce a security policy on data exchanged between its network and the Internet
Down
- CryptoLocker is an example of
- _______ engineering, tricking employees into revealing their passwords by pretending to be a legitimate memberof a company is called
7 Clues: CryptoLocker is an example of • Write your initial here for identifier • protocols used for secure information transfer over the Internet • enforce a security policy on data exchanged between its network and the Internet • ______horse, software that appears to be benign but does something other than expected. • ...
Security Words 2023-10-24
Across
- Watch over in order to protect or control.
- A person, object, or place selected as the aim of an attack.
- A supply or quantity of bullets and shells.
- Used as a protection against blows or missiles.
Down
- Measures taken to prevent
- A measure taken to protect someone or something or to prevent something undesirable
- A thing designed or used for inflicting bodily harm or physical damage.
7 Clues: Measures taken to prevent • Watch over in order to protect or control. • A supply or quantity of bullets and shells. • Used as a protection against blows or missiles. • A person, object, or place selected as the aim of an attack. • A thing designed or used for inflicting bodily harm or physical damage. • ...
Food Security 2024-10-17
7 Clues: source of iron • source of energy • Nutritional drink • Required for digestion • Source of food production • drink harmful for human body • must to have one fruit daily
MONDAY 7th OCTOBER 2019-10-04
12 Clues: GÉRER • AVOCAT • SECURITY • CORRIGER • COMPTABLE • S'INSCIRE • NOT MARRIED • NOT LONG AGO • NOUVEAUX ARRIVÉS • ORDINATEUR PORTABLE • MONEY YOU MUST PAY BACK • WOMAN WHOSE HUSBAND IS DEAD
Keywords 2012-03-20
Across
- bullying when someone is getting bullied on the internet
- person or a thing that is trustworthy
- when you can see and modify the structure of a table.
- vrtual learning environment
- something appropiate to the matter at hand
- A row and column view of a table.
- carefully and thoroughly at something
- Utilities that allow you to bring in or send data
Down
- Electronic Mail
- a record holds all the information or data that has been entered into the database
- a set of questions with a choice of an answer
- A direction or order.
- to take part of a whole
- a computer file attached to an e-mail
- a software that provides a way to view pages on the World Wide Web.
- Symbols or signals that are input, stored and processed by a computer.
- structured set of data held in a computer
- a program for data, files or documents e.g. the Internet
- universal resource locator
- A set of data arranged in rows and columns.
20 Clues: Electronic Mail • A direction or order. • to take part of a whole • universal resource locator • vrtual learning environment • A row and column view of a table. • person or a thing that is trustworthy • a computer file attached to an e-mail • carefully and thoroughly at something • structured set of data held in a computer • something appropiate to the matter at hand • ...
Ready Player One Section 1 2015-04-19
Across
- How many years after 2015 does this book take place?
- A Very realistic video game that the book revolves around
- State in which the book takes place
- Last name of the lady who lived three units below Wade
- Hideout Where Wade plays OASIS
- What people live in in the real world
- Wade's aunt
- What the finder of Halliday's Egg would get a lot of
- Level in which Wade's avatar is on
- How the trailers in the trailer park were arranged
Down
- One of the very first video games that is made reference to in the book
- Creator of OASIS, a multi-billionaire
- A small, robed wizard. Halliday's avatar in OASIS
- Wade's Mom
- Egg hunters
- A total "lamer" that Wade said didn't know anything
- Well known gunter that Wade has a cyber-crush on
- Rich rated combatants in OASIS
- Wade's avatar name in OASIS
- Known as the worlds largest Internet service provider that wanted to take over OASIS
20 Clues: Wade's Mom • Egg hunters • Wade's aunt • Wade's avatar name in OASIS • Hideout Where Wade plays OASIS • Rich rated combatants in OASIS • Level in which Wade's avatar is on • State in which the book takes place • Creator of OASIS, a multi-billionaire • What people live in in the real world • Well known gunter that Wade has a cyber-crush on • ...
Vy´s second crossword 2020-05-11
Across
- to see someone in real life
- to write on paper and send it to your friends
- if someone is hurt or is missing
- if you are really bad
- if someone is bullying you on the internet
- if you are a drama queen
- a very beautiful place that you will never forget
- if you are like a mom
- 13-18 years old
- to do a phone number away if you hate them
Down
- to write a message to someone
- to send a teacher a message if you don´t have their phone number
- to answer on a text message
- the opposite of not understanding
- to look after your siblings or if someone is important to you
- the opposite of receive
- if you meet someone new you want to be friends with them then you have to ask them something
- the opposite of write
- If you want everyone to look at you all the time
- to have a job
20 Clues: to have a job • 13-18 years old • if you are really bad • the opposite of write • if you are like a mom • the opposite of receive • if you are a drama queen • to see someone in real life • to answer on a text message • to write a message to someone • if someone is hurt or is missing • the opposite of not understanding • if someone is bullying you on the internet • ...
Literasi digital 2024-08-14
Across
- HAKI terbagi menjadi berapa bagian
- literasi digital digunakan untuk mencari
- mata pelajaran yang mempelajari literasi Digital yaitu
- singkatan empat pilar literasi Digital
- penemu konsep literasi Digital
- keamanan sangat penting untuk menjaga
- lisensi yang bersifat paling restriktif adalah
- kejahatan didunia digital disebut cyber
- manfaat literasi digital untuk menambah
- aplikasi umum untuk mencari informasi digital adalah
- aplikasi pengolah kata adalah
- lisensi yang memperbolehkan pengguna untuk tidak hanya menggunakan perangkat lunak disebut lisensi
- informasi palsu atau berita palsu disebut
- perangkat lunak yang disediakan secara gratis disebut lisensi
Down
- negara yang memiliki tingkat literasi Digital yang tinggi
- bahasa Indonesia dari linking
- lisensi yang hak ciptanya yang dilepaskan disebut
- informasi yang tidak sengaja salah atau tidak akurat disebut
- informasi yang sengaja dibuat untuk menyesatkan disebut
- perangkat lunak yang digunakan untuk mengakses informasi disebut
- aplikasi pembuat bahan presentasi disebut
- hak yang diberikan negara kepada seseorang atas karya ciptanya disebut
- individu dengan kemampuan pemrograman tinggi disebut
23 Clues: bahasa Indonesia dari linking • aplikasi pengolah kata adalah • penemu konsep literasi Digital • HAKI terbagi menjadi berapa bagian • keamanan sangat penting untuk menjaga • singkatan empat pilar literasi Digital • kejahatan didunia digital disebut cyber • manfaat literasi digital untuk menambah • literasi digital digunakan untuk mencari • ...
ISTILAH DALAM TIK 2024-10-31
Across
- Sistem pengiriman pesan elektronik melalui internet
- menambahkan program atau aplikasi ke sistem
- Komponen fisik komputer yang dapat dilihat dan disentuh
- Jaringan global yang menghubungkan jutaan komputer di seluruh dunia
- Perangkat lunak yang mengelola perangkat keras dan menjalankan program aplikasi
- Data yang telah diolah sehingga memiliki makna
- Urutan langkah-langkah logis untuk menyelesaikan suatu masalah
- Sistem untuk melindungi Jaringan dan data komputer
- salah satu Perangkat menampilkan halaman web
- Bilangan Basis 16
- Dunia Maya
- Kata Sandi
- Hardware untuk media penyimpanan
Down
- Memulai ulang sistem
- Platform online yang memungkinkan pengguna untuk berinteraksi dan berbagi informasi
- Kumpulan halaman web yang saling berhubungan
- Aplikasi Perkantoran untuk mengolah data dalam tabel
- Informasi yang tersedia melalui media atau produk elektronik
- Bilangan basis 10
- Format file standar dari Aplikasi PowerPoint
- Aplikasi pengolah gambar
- Papan ketik
- Salah satu sistem operasi
- Tempat untuk menyimpan dan mengelompokkan dokumen atau data pada perangkat komputer
- Program yang digunakan untuk menampilkan halaman web
- Hardware inputan suara
- Salah satu Sistem Operasi Mobile
27 Clues: Dunia Maya • Kata Sandi • Papan ketik • Bilangan basis 10 • Bilangan Basis 16 • Memulai ulang sistem • Hardware inputan suara • Aplikasi pengolah gambar • Salah satu sistem operasi • Salah satu Sistem Operasi Mobile • Hardware untuk media penyimpanan • menambahkan program atau aplikasi ke sistem • Kumpulan halaman web yang saling berhubungan • ...
Sip & Solve 2025-09-13
Across
- What does the “S” stand for in BYOS?
- What is the bride’s middle name?
- What’s the bride’s work nickname?
- Which town do the couple live in?
- Where are the couple going on their honeymoon?
- The happy couple
- Where did the groom pop the question?
- What’s the groom’s favourite sport?
- Total number of flower girls, bridesmaids and groomsmen?
- Who’s the better cook: bride or groom?
- What sporting activity did the groom ‘strike’ at on their first date?
Down
- How many years have the couple been together?
- What’s the groom’s favourite food?
- What nickname did the groom have at university?
- In which city did the bride and groom meet?
- What song did the bride walk down the aisle to?
- Who’s the tidier: bride or groom?
- Who’s the better driver: bride or groom?
- How many metres did Eoin’s Guinness World Record breaking team row?
- Where did the groom celebrate his stag do?
- Where did the bride celebrate her hen do?
- What’s the bride’s favourite food?
22 Clues: The happy couple • What is the bride’s middle name? • Who’s the tidier: bride or groom? • What’s the bride’s work nickname? • Which town do the couple live in? • What’s the groom’s favourite food? • What’s the bride’s favourite food? • What’s the groom’s favourite sport? • What does the “S” stand for in BYOS? • Where did the groom pop the question? • ...
IEEE Day 2025-10-08
Across
- India’s first nuclear test codename
- The digital payment system launched by NPCI in 2016
- Online government service platform — “____ Seva”
- First Indian to go to space
- Founder of Infosys
- City known as India’s “Silicon Valley”
- Indian city famous for IT parks and Cyber Towers
- “Digital India” initiative was launched in this year
- Technology used for secure digital ledgers
- India’s first AI-based robot citizen
- Indian tech giant known for TCS
- Currency symbol officially adopted in 2010
- Indian satellite navigation system similar to GPS
Down
- India’s first mission to Mars
- Social media platform owned by Meta
- Father of India’s Green Revolution
- India’s fastest train as of 2025
- File format for web pages
- India’s first indigenously built supercomputer
- Indian space agency abbreviation
- Portable computer smaller than a laptop
- Father of the Indian Constitution
- The act of illegally accessing computer systems
- The world’s largest biometric ID system
- Term for connecting everyday objects to the internet
25 Clues: Founder of Infosys • File format for web pages • First Indian to go to space • India’s first mission to Mars • Indian tech giant known for TCS • India’s fastest train as of 2025 • Indian space agency abbreviation • Father of the Indian Constitution • Father of India’s Green Revolution • India’s first nuclear test codename • Social media platform owned by Meta • ...
CTF-CW10 2025-11-14
Across
- “It’s really you, right?” check
- The steering wheel for corporate safety
- Data clean-up routine that regularly erases outdated information
- The compliance ninja
- Where your evidence gets its day in court
- United Kingdom’s tailored take on the EU’s major privacy regulation
- Villains’ instruction manual, with footnotes
- The doorman who wants your password and your ID
- Don’t panic: log your “oops” here at Tekion!
- SWAT team for computer emergencies
Down
- Flick your wand at Tekion and this grants you access!
- Not collecting more info than a service truly needs from you
- Talking in code so eavesdroppers get gibberish
- The secret doorman at Tekion—never letting bad web traffic get past the velvet rope!
- Telling others to mind their own digital business
- The guard dog for your computer
- Doing surgery on your risks
- The virtue your files aspire to
- International certification for privacy management processes
- The fire escape map for cyber incidents
20 Clues: The compliance ninja • Doing surgery on your risks • “It’s really you, right?” check • The guard dog for your computer • The virtue your files aspire to • SWAT team for computer emergencies • The steering wheel for corporate safety • The fire escape map for cyber incidents • Where your evidence gets its day in court • Villains’ instruction manual, with footnotes • ...
Chapter 18 2016-05-01
Across
- to Needy Families new name of the organization that brings forth public assistance to needy families; former possessor of the name "Aid to Families With Dependent Children."
- benefit given by the government directly to individuals; may be either cash transfers (i.e. Social Security payments) or in-kind transfers (i.e. food stamps).
- and Work Opportunity Reconciliation Act official name of the welfare reform law of 1996.
- The Immigration Control and Reform Act
- tax by which the burden falls relatively upon low-income groups than upon wealthy taxpayers; opposite of progressive tax.
- "negative income tax" that provides income to very poor individuals in lieu of charging them federal income taxes.
- tax by which the government takes a greater share of the income of the rich than of the poor.
- government benefit to which certain qualified individuals are entitled by law, regardless of need.
- tax by which the government takes the same share of income from everyone, rich and poor alike.
Down
- increasing concentration of poverty among women, especially unmarried women and then children.
- value of assets owned.
- policy that provides benefits to individuals, either through entitlements or means testing.
- of 1935 creator of both the Social Security Program and a national assistance program for poor children, usually called AFDC.
- "bank account" into which Social Security contributions are "deposited" and used to pay out eligible recipients.
- method used to count the number of poor people; considers what a family must spend for an "austere" standard of living.
- government program available only to individuals below a poverty line.
- the act of relocating to a foreign country
- "shares" of the national income earned by various groups.
- amount of funds collected between any two points in time.
19 Clues: value of assets owned. • The Immigration Control and Reform Act • the act of relocating to a foreign country • "shares" of the national income earned by various groups. • amount of funds collected between any two points in time. • government program available only to individuals below a poverty line. • ...
Allie Blair Virus Crossword 2021-03-15
Across
- a type of virus that duplicates itself in order to spread to other computers
- messages sent from one computer to the other using the internet
- A software program designed to infiltrate or damage a computer system without the user's informed consent
- backup protects viruses and hackers from being able to permanently delete your files and data
- Computer code that lies dormant until it is triggered by a specific logical event.
- A type of malware that deludes the users to its true purpose allowing it to invade the computer
- to discover or investigate a problem on a computer
- Software code that gives access to a program or a service that will get through normal security protections
- A technique intruders use to make their network or internet transmission appear legitimate
Down
- written to help a computer operate and make it run smoothly.
- a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attacks
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
- a type of social engineering attack often used to steal user data
- a piece of code that is capable of copying itself and has a harmful effect
- A logical computer network of zombies under the control of an attacker
- software designed to detect and destroy computer viruses
- A publicly released software security update intended to repair a vulnerability
- An infected computer that is under the control of a remote attacker
- an attack that wants to make the program it's attacking unavailable to its users
19 Clues: to discover or investigate a problem on a computer • software designed to detect and destroy computer viruses • written to help a computer operate and make it run smoothly. • messages sent from one computer to the other using the internet • a type of social engineering attack often used to steal user data • ...
MODULE 11 QUIZ 2024-12-19
Across
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- Paid to probe networks and report vulnerabilities
- is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- is a server role that makes it possible for administrators to take control of Microsoft product updates
- a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- what the user has (smart card or key)
- Do not report problems, but instead disseminate the information to other
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
- Creates a barrier between two entities
Down
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- features that enable administrators to control who has access to the network authentication
- The most widely used method for encrypting data is IP Security
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- What users can do after they are logged on to the network
- An industry-standard client/server protocol that offers centralized control
- what the user knows (username/password)
- A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached
20 Clues: what the user has (smart card or key) • Creates a barrier between two entities • what the user knows (username/password) • Paid to probe networks and report vulnerabilities • What users can do after they are logged on to the network • The most widely used method for encrypting data is IP Security • ...
Identity Theft Crossword 2025-11-17
Across
- Note placed on your credit report that tells lenders to take extra steps to verify your identity.
- Unsecured network you should avoid using for banking or shopping online.
- Feature that shows where you are in real time, which you should usually turn off for safety.
- Official document you file with law enforcement to record the identity theft.
- Opening new credit cards or using existing cards without the real owner’s permission.
- Tool that securely stores and creates strong, unique passwords for all your accounts.
- Mixing real and fake information, like a real SSN with a fake name, to build a new fake identity.
- When someone uses your personal information without permission to commit fraud or other crimes.
- When someone uses your personal information without permission to commit fraud or other crimes.
- To regularly check your accounts and credit for suspicious charges or new accounts.
- Lock on your credit file that stops new accounts from being opened in your name.
Down
- When someone uses your health insurance information to get medical care, prescriptions, or surgeries.
- Machine that cuts paper into tiny pieces so thieves can’t read your documents.
- Controls on social media that limit who can see your posts and personal details.
- Extra security step that uses a code or app in addition to your password to log in.
- When someone uses your Social Security number to file a fake tax return or claim your refund.
- Taking out mortgages, car loans, or personal loans using another person’s identity.
- Financial institution you must contact right away if your card or account is used without permission.
- Using a locked mailbox and collecting mail quickly so it isn’t stolen.
- Government agency you contact if someone uses your Social Security number for tax fraud.
20 Clues: Using a locked mailbox and collecting mail quickly so it isn’t stolen. • Unsecured network you should avoid using for banking or shopping online. • Official document you file with law enforcement to record the identity theft. • Machine that cuts paper into tiny pieces so thieves can’t read your documents. • ...
Issue #007 2022-09-16
11 Clues: envious • traitor • sharp blades • deadly drink • secrets, hiding • tuilg (anagram) • royalty, leader • criminal, wrong • athed (anagram) • safe, protection • incorrect, untrue
CLOUD DEPLOYMENT 2025-03-07
11 Clues: Storage • Strategy • Analysis • Technology • Management • Engagement • and Security • and Management Tools • and Disaster Recovery • of Current Infrastructure • Redundancy and Replication
Transformers 2018 2018-07-25
Across
- You shall lock away or take home portable devices and cabinet_____ a the end of each working day.
- During brief_____ (eg lunchtimes), rooms may be securely locked, where appropriate.
- Personal computers and terminals must be switched off and/ or protected against___________ access
- Flip charts, ports, and wall displays containing______ or sensitive information should be removed, and black/white boards wiped clean at the end of work sessions.
- Drawers must be locked when you are away from your_______ and at the end of the workday.
- Laptop and personal bags must be safely stored under your_____.
- Compliance is______.
Down
- After close of business, random _____ are to be conducted of photocopiers, faxes, cabinets and desk spaces to ensure that sensitive material and attractive items have been secured appropriately
- _____ Security Emergency Number is 5777(if you observe a suspicious package)
- It is an individual's ________ to ensure the security of personal items.
- All infringements will be considered as non-compliant behavior and recorded via_____.
- Classified and _______ material, including any items which have not yet been assessed, and proprietary third party documents, must be securely locked away in appropriate containeers.
- Personalized items that are workplace_______ (eg picture frames, certificated, paper weights), must be kept to a minimum.
- _______ Security Emergency Number is 4444 (if you observe a suspicious package)
14 Clues: Compliance is______. • Laptop and personal bags must be safely stored under your_____. • It is an individual's ________ to ensure the security of personal items. • _____ Security Emergency Number is 5777(if you observe a suspicious package) • _______ Security Emergency Number is 4444 (if you observe a suspicious package) • ...
browsing safety 2025-06-06
6 Clues: man who do cyber crime • a malware which do distruction of data • an illegal entry a computer or internet • a criminal activity to harm anyone online • a software that prevet unauthorised acces to your computer • a program designed to prevent and removal of viruses from a coputer
The Financial Vault Quiz 2018-02-26
Across
- An omnibus account is normally overseen by a ____ manager
- When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
- It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
- The _____ the volatility, the riskier the security.
- A minimum of ___ persons are required to create an omnibus account
- The sale of a security that is not owned by the seller or that the seller has borrowed
- It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
- Short selling is motivated by the belief that a security's price will ____
- The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
- Portfolios that lie below the efficient frontier are
- Account Is an account between two futures merchants (brokers)
- Employee’s Provident Fund is maintained and overseen by the ___
- One measure of the relative volatility of a particular stock to the market is its
13 Clues: The _____ the volatility, the riskier the security. • Portfolios that lie below the efficient frontier are • An omnibus account is normally overseen by a ____ manager • Account Is an account between two futures merchants (brokers) • Employee’s Provident Fund is maintained and overseen by the ___ • A minimum of ___ persons are required to create an omnibus account • ...
Rolando Grade 6th -ity 2021-03-16
14 Clues: money • skill • famous • a chance • most part • all people • that is wet • to be mature • all together • pain and hurt • that is forever • people that protect • careful you can fall • the country where you born
IT Security Week 7 2021-08-16
Across
- the process of deploying an application to the target environment
- is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
- a corporate directive that specifies how employees should leave their working space when they leave the office.
- the information is too valuable to permit any risk of its capture. Viewing is severely restricted\
- the policies of persistent data and records management for meeting legal and business data archival requirements.
- there are no restrictions on viewing the document.
Down
- the software vendor may suspend all licenses if the customer is found to be non-compliant
- unlicensed software exposes an organization to large fines and
- looking for treasure in someone else's trash
- is a type of Man-in-the-Middle Attack specifically involving a browser infected with some type of proxy malware.
- an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
- memory allocated to application
- the process where fibers are separated and treated to produce pulp.
- the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly reduces security risks, eliminating security vulnerabilities and reducing costs.
- to indicate a set of instructions that lends itself to a definite or standardized procedure without loss of effectiveness
15 Clues: memory allocated to application • looking for treasure in someone else's trash • there are no restrictions on viewing the document. • unlicensed software exposes an organization to large fines and • the process of deploying an application to the target environment • the process where fibers are separated and treated to produce pulp. • ...
agriculture crossword 2024-10-23
Pekarjaan-Chareef 2025-05-16
Airport 2024-04-05
The Ark 2022-05-31
12 Clues: deadly • not wet • low cost • assurance • to enroll • three feet • communication • group of trees • different kinds • move around or avoid • bend over upon itself • imaginative narration
Digital Citizenship Vocabulary 2021-02-25
Across
- belonging to one person
- 2 words. rules and behaviors while using technology
- 2 words. meaning people you did not know looking at your post online
Down
- 2 words. before the internet these were newspapers, magazines, billboards, radio, and broadcast TV and direct mail.
- the act of posting insults online
- 2 words. meaning anything broadcasting through a screen or online
- like cyber-stalking online
- to form a set value
- 2 words. someone pretends to be you online and commits fraud
- scamming companies sending fake emails to get your private information
- a string of characters used to verify the identity of a user during the authentication process.
- another word meaning to fool someone
12 Clues: to form a set value • belonging to one person • like cyber-stalking online • the act of posting insults online • another word meaning to fool someone • 2 words. rules and behaviors while using technology • 2 words. someone pretends to be you online and commits fraud • 2 words. meaning anything broadcasting through a screen or online • ...
Thanksgiving 2024-11-26
Across
- A type of pie, Macintosh for example
- Turkey + Duck + Chicken
- A type of pie, a gourd for example
- This is the name of a producer/seller of Turkey, name similar to Indiana University
- A type of pie or mash - the starchy vegetable kind
Down
- On Monday, go to the internet to get some of these deals
- "I won't be doing any cooking, but I will be doing a lot of ______ this Thanksgiving"
- Small __________ Saturday
- Macy's throws one of these every year
- What half the staff get on Thanksgiving
- Like 4th of July or President's Day, Thanksgiving is one of these
- This Meteorologist often hosts the sidelines of the Thanksgiving Day parade on NBC
12 Clues: Turkey + Duck + Chicken • Small __________ Saturday • A type of pie, a gourd for example • A type of pie, Macintosh for example • Macy's throws one of these every year • What half the staff get on Thanksgiving • A type of pie or mash - the starchy vegetable kind • On Monday, go to the internet to get some of these deals • ...
8th Unit 5 Vocabulary 2026-01-14
Across
- goods or money from the government or charitable organizations given to underprivileged people
- smaller group of government responsible for cities and towns
- government that looks over the country as a whole
- in a foreign country
- money collected by the US government in order to maintain public programs and services
Down
- government that oversees individual states
- an attempt to gain illegal access to a computer
- people who are elected or appointed, are responsible for making and applying public policy
- found guilty of a crime
- building or office where people work to represent their government in a foreign country
- makes sure that people follow rules
- government takes a closer look at financial accounts
12 Clues: in a foreign country • found guilty of a crime • makes sure that people follow rules • government that oversees individual states • an attempt to gain illegal access to a computer • government that looks over the country as a whole • government takes a closer look at financial accounts • smaller group of government responsible for cities and towns • ...
lesson 30 2015-05-15
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Deciphers the information in an SSL Certificate.
- Encrypts the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- A malicious program that records keystrokes.
- Hackers using spyware to control your browser
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- A program that hackers use to capture IDs and passwords on a network.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Security feature used for larger networks that controls computers from one point.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
For People Crossword 2023-10-03
Across
- SCIFs are built according to the ICD 705 ________ Specifications
- The word for the study, investigation and mitigation of compromising emanations
- We have offices in Vista, San Diego, and ______ Heights
- You need to report any _______ travel to the FSO
- The heritage breed of pigs that Land & Feast raises
- The type of agriculture that Land & Feast practices
- If you get a ______ email, you should send it to the security team!
- Lab 7 manufactures waveguides and _________ SCIFs
Down
- The fancy breed of chicken Land & Feast sells
- Land & Feast’s farm has orchards with lemon and _______ trees
- The acronym for a required role for SCIF construction who oversees a construction site
- Our first core value
- FSO Stands for ______ Security Officer
- One thing Adamo's alarm services install is a _________ Detection System
- Adamo does RF shielding and ________ protection testing
- The manual the FSO team uses is called the ______
16 Clues: Our first core value • FSO Stands for ______ Security Officer • The fancy breed of chicken Land & Feast sells • You need to report any _______ travel to the FSO • The manual the FSO team uses is called the ______ • Lab 7 manufactures waveguides and _________ SCIFs • The heritage breed of pigs that Land & Feast raises • ...
2025 Compliance & Ethics 2025-10-31
Across
- A document that provides guidance for how Mindpath or its employees should act
- Federal law that protects the privacy and security of patients' health information
- A recommendation of a patient to another healthcare provider
- The possibility of something bad happening
- Moral principles and values governing healthcare practices
- Maintaining the confidentiality of patient information
- Protecting patient data from unauthorized access or breaches
- An official inspection to ensure compliance
- The federal agency responsible for investigating healthcare fraud and abuse
Down
- A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
- Items or services given to healthcare providers as incentives
- Adherence to legal and ethical standards in healthcare
- Intentional and improper practices that harm patients or defraud the healthcare system
- Informing authorities or superiors about unethical or illegal actions
- An illegal payment or reward for patient referrals
- The unnecessary or excessive use of healthcare resources
16 Clues: The possibility of something bad happening • An official inspection to ensure compliance • An illegal payment or reward for patient referrals • Adherence to legal and ethical standards in healthcare • Maintaining the confidentiality of patient information • The unnecessary or excessive use of healthcare resources • ...
ICT Cross Word 2019-07-08
Across
- hat hacker a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
- A series, or log, of discussion items on a page of the World Wide Web
- Items such as images or videos to be include din the final product
- rights The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system
- Automatic Number Plate Recognition
- use this to create spreadsheets
Down
- preference or point of view that is personal, rather than scientific.
- Measurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
- A partiMeasurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
- A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
- computer software that displays advertisements
11 Clues: use this to create spreadsheets • Automatic Number Plate Recognition • computer software that displays advertisements • Items such as images or videos to be include din the final product • preference or point of view that is personal, rather than scientific. • A series, or log, of discussion items on a page of the World Wide Web • ...
Law Enforcement On Site 2019-08-28
Across
- If a suspicious item is found during this type of threat, allow law enforcement to assume and maintain command.
- Acronym for the role whose duties include coordinating with law enforcement agencies.
- This person discusses with law enforcement on site: DC ________________.
- Law enforcement asks about specific crimes or cases that Microsoft may be party to. You pass the information to Global Security ________________.
- When documenting law enforcement officials, include their phone number and this other number.
Down
- This type of access request is required for law enforcement to enter the facility beyond the lobby.
- If law enforcement requests video footage, do not ______________ that security has such footage unless directed by management.
- Do not __________ law enforcement officials unless directed to do so by management.
- The first action taken by security when a crime is discovered after the fact.
- This policy does not apply to law enforcement officials acting in an official capacity.
- Where law enforcement representatives should wait while the appropriate people are contacted.
11 Clues: This person discusses with law enforcement on site: DC ________________. • The first action taken by security when a crime is discovered after the fact. • Do not __________ law enforcement officials unless directed to do so by management. • Acronym for the role whose duties include coordinating with law enforcement agencies. • ...
The Kieronasaurus Krossword 2018-01-03
Across
- An information classification expressed as numbers only.
- bully
- the ability to change the displayed content.
- Defined as direct physical threat to a country, but could also be a threat to financial security.
- The process of data
- The amount of information that can be held.
- amount of data protection principles.
- Examples: digital certificate, encryption, firewall
- Announcements or adverts. Small amounts of information sent easily.
- Attack on a business's servers not only impacts on the business or individual it holds data for
- Data collected by you yourself.
- Used to help blind people read.
- Computer hardware that cannot be moved
- source of information within a DFD
- yes or no
Down
- Triad
- Eliminate "unecessary" bits of information
- Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
- Raw facts and figures.
- Lets you recreate the original file exactly. Breaking a file into a smaller form for transmission.
- A closed, private network within a building or company.
- The language that websites are written in
- Canada's data protection legislation.
- footprint Any traceable action you or others take on the internet
24 Clues: Triad • bully • yes or no • The process of data • Raw facts and figures. • Data collected by you yourself. • Used to help blind people read. • source of information within a DFD • amount of data protection principles. • Canada's data protection legislation. • Computer hardware that cannot be moved • The language that websites are written in • ...
Spanish3 crossword puzzle 2023-10-04
Across
- population
- foreigner, alien
- immigration
- ignorance, lack of awareness
- to reach, achieve
- (in)security; (lack of) security
- working day; day's journey
- worldwide
- Displaced
- to link, to connect
- visa (travel document)
- to brake, stop
- federation
- development, growth, progress
- to immigrate (enter a country)
- to attain/to be able to
- phenomenon
- world population
- I believe that...
- continent, mainland
- restart
- countries of the world
- to exchange, to trade
- Immigrants within one's own country
- reason
Down
- citizenship/the citizens
- African Studies Group
- we will have (future tense of tener)
- analyze, examine
- immigrants - la persona que sale de su lugar de origen para llegar a un destino diferente
- knowledge, understanding
- legal
- country, nation
- try, attempt
- will exist
- to travel, journey
- to work, have a job
- movement, motion
- inside, in
- ignition, on
- to tackle, to board
- terrorist (male)
- Approach, point of view, focus
- to track down
- la administración,management
- flow
- famoso,famous
- from the south
- to emigrate (leave a country)
49 Clues: flow • legal • reason • restart • worldwide • Displaced • population • will exist • federation • phenomenon • inside, in • immigration • try, attempt • ignition, on • to track down • famoso,famous • to brake, stop • from the south • country, nation • foreigner, alien • analyze, examine • movement, motion • world population • terrorist (male) • to reach, achieve • I believe that... • to travel, journey • to link, to connect • ...
RU ITEC 411 - Chapter 5 2023-11-29
Across
- organization responsible for the development of secure coding standards
- computer virus circa 2000 causing billions in damages
- 17 down is a type of this
- hackers may use resumes from job postings to commit this crime
- technology for encrypted payment method using a cell phone
- device that records and steals credit card numbers from readers
- 2000's act that broadened the scope of 6 down
- a vulnerability in a system designed intentionally to attrack criminals
- open source encryption software
Down
- hacking a mobile phone to circumvent certificate requirements
- technology that makes technologies such as the iPhone impossible to crack
- hacking for a cause
- name of the malware used to attack 11 Down
- the first major U.S. computer crime law, passed in the 1980's
- a hidden means of accessing a computer
- the "target" of a major 2013 data breach
- a way for security professionals to test systems for vulnerabilities
- law protecting the unauthorized distribution of eBooks, etc.
- 1994 act requiring backdoors in cell phones
- security measure using "something you are"
20 Clues: hacking for a cause • 17 down is a type of this • open source encryption software • a hidden means of accessing a computer • the "target" of a major 2013 data breach • name of the malware used to attack 11 Down • security measure using "something you are" • 1994 act requiring backdoors in cell phones • 2000's act that broadened the scope of 6 down • ...
