cyber security Crossword Puzzles

Five night's at freddy's 2023-12-14

Five night's at freddy's crossword puzzle
Across
  1. yellow bear
  2. i am one of the security breach villains
  3. arghhhh!
  4. Yellow rabbit
  5. music box
  6. Gutiar
  7. williams friend
Down
  1. Balloons!
  2. Whats on chicas hand?
  3. brown bear
  4. Burned bunny
  5. pizza
  6. creater
  7. i am in fnaf 4

14 Clues: pizzaGutiarcreaterarghhhh!Balloons!music boxbrown bearyellow bearBurned bunnyYellow rabbiti am in fnaf 4williams friendWhats on chicas hand?i am one of the security breach villains

phoenix 2 2022-10-31

phoenix 2 crossword puzzle
Across
  1. outdoor ceiling outside of Crawfords
  2. security guard
  3. free period
  4. when you cut class
  5. chested hours
Down
  1. solomen terzi
  2. overpriced grapes
  3. test week month
  4. seminar
  5. newspaper
  6. google classroom
  7. coffee and bagels
  8. scan in
  9. rabbi besser's specialty

14 Clues: seminarscan innewspaperfree periodsolomen terzichested hourssecurity guardtest week monthgoogle classroomoverpriced grapescoffee and bagelswhen you cut classrabbi besser's specialtyoutdoor ceiling outside of Crawfords

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. TCT Application access provisioning is done by?
  2. Which Predix service is used to store documents in CDA product?
  3. Security model used by most of the ERP applications
  4. Re-tag in TCT can be done by?
  5. Source data ($) for deriving $ Thresholds?
Down
  1. Regression technique used in Improper Payments model
  2. Tool currently used for onboarding
  3. System that makes automated calls from security
  4. Deep learning architecture used in CDA application
  5. Greek letter that denotes mean of a statistical distribution

10 Clues: Re-tag in TCT can be done by?Tool currently used for onboardingSource data ($) for deriving $ Thresholds?System that makes automated calls from securityTCT Application access provisioning is done by?Deep learning architecture used in CDA applicationSecurity model used by most of the ERP applications...

Cybersecurity 2025-07-29

Cybersecurity crossword puzzle
Across
  1. Network of private computers infected with malicious software
  2. Technique of making data unreadable to unauthorized users
  3. Fraudulent attempt to obtain sensitive information
  4. Barrier between a trusted network and untrusted networks
  5. Software designed to damage, disrupt, or gain unauthorized access
  6. Secret string used to authenticate access
Down
  1. Attacker tricks someone into breaking security procedures
  2. Attempts to guess a password by trying many combinations
  3. Method of verifying identity using fingerprints, retina, etc.
  4. Security flaw allowing attackers to access restricted data

10 Clues: Secret string used to authenticate accessFraudulent attempt to obtain sensitive informationAttempts to guess a password by trying many combinationsBarrier between a trusted network and untrusted networksAttacker tricks someone into breaking security proceduresTechnique of making data unreadable to unauthorized users...

CMSC 125: Operating Systems LE04 pt 1 2017-05-17

CMSC 125: Operating Systems LE04 pt 1 crossword puzzle
Across
  1. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
  2. Pretending to be an authorized user to escalate privileges.
  3. Bypasses CPU to transfer data directly between I/O device and memory.
  4. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  5. Same key used to encrypt and decrypt.
  6. A destructive program that masquerades as a benign application.
  7. Results from disk head making contact with the disk surface.
  8. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
Down
  1. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  2. Provides an object oriented way of implementing file systems.
  3. Storage structure consisting of information about a file.
  4. Program that initates a security incident under certain circumstances.
  5. The art of hiding messages by converting them into hidden texts.
  6. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  7. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  8. The study of codes, or the art of writing and solving them.
  9. Intercepting an already established session to bypass authentication.
  10. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  11. Is a storage made available over a network rather than over a local connection.

19 Clues: Same key used to encrypt and decrypt.Storage structure consisting of information about a file.Pretending to be an authorized user to escalate privileges.The study of codes, or the art of writing and solving them.Results from disk head making contact with the disk surface.Provides an object oriented way of implementing file systems....

Code 2016-02-08

Code crossword puzzle
Across
  1. bully Bullies that are online
  2. A place where power or information leaves a system
  3. The use of parallel in computers
  4. to identify or remove errors from the computer
  5. A block to a puzzle for games or programs
  6. A folder that items
  7. A logic gate is an elementary building block on a digital circuit
  8. Get mail from the computer, phone, tablet, and computers
  9. When you add something onto your computer
Down
  1. A conditional clause or conjunction
  2. A virus on the computer
  3. When something repeats it self
  4. A part of a puzzle for coding
  5. citizenship Behaviors online
  6. A site that you visit or when you install a game on a software
  7. A programming language is formal constructed language that is programmed in the computer
  8. A system
  9. When you are working on a website and it needs to be ___
  10. block A block that repeats how many times in coding
  11. When something bad gets into your computer

20 Clues: A systemA folder that itemsA virus on the computercitizenship Behaviors onlinebully Bullies that are onlineA part of a puzzle for codingWhen something repeats it selfThe use of parallel in computersA conditional clause or conjunctionA block to a puzzle for games or programsWhen you add something onto your computer...

People and Property Crimes 2016-02-01

People and Property Crimes crossword puzzle
Across
  1. Lying while under oath
  2. Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
  3. Trying to keep people from committing crimes is_______
  4. Another word for theft
  5. Setting things on fire on purpose
  6. Lisa shot Ron. Ron is the victim of_______
  7. A process to better criminals
  8. Essentially blackmail
  9. Criminal being forced to either serve the community or pay people they have harmed
  10. A crime committed with the use of technology
Down
  1. Someone breaks in and steals stuff committed a
  2. When somebody dies by the actions of another. Has varying degrees.
  3. The lady who stole money from the booster club
  4. Secluding a criminal to a small space (form of imprisonment.
  5. Threatening someone with an attack
  6. Tricking someone to in order to gain something
  7. Destruction of property
  8. Seeking revenge on a criminal often very cruel
  9. Physically assaulting someone
  10. I have a gun and want your money

20 Clues: Essentially blackmailLying while under oathAnother word for theftDestruction of propertyA process to better criminalsPhysically assaulting someoneI have a gun and want your moneySetting things on fire on purposeThreatening someone with an attackLisa shot Ron. Ron is the victim of_______A crime committed with the use of technology...

Halloween 2017-11-04

Halloween crossword puzzle
Across
  1. / The Famous and 'Shocking' Experiment
  2. / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
  3. / Where the Count lives
  4. / versus Predator
  5. Edward Hyde / The good side of Dr Jekyll and Mr Hyde
  6. Intelligence / Many believe this will take over the world
  7. / He's been stuck in the matrix
  8. Ray / Nikola Tesla's famous...
  9. / Nocturnal creatures
  10. / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
Down
  1. / a common Sci-fi name for the Reanimated
  2. / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
  3. / The Large Hadron Collider is situated in...
  4. / Asimov of science fiction
  5. / to do with Rebirth in Norse mythology
  6. / When an aptitude test goes awry, Beatrice discovers she has a special quality.
  7. / The Last...
  8. / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
  9. / Famous Prison Experiment
  10. / The man who could eat anything

20 Clues: / The Last.../ versus Predator/ Nocturnal creatures/ Where the Count lives/ Famous Prison Experiment/ Asimov of science fiction/ He's been stuck in the matrixRay / Nikola Tesla's famous.../ The man who could eat anything/ The Famous and 'Shocking' Experiment/ to do with Rebirth in Norse mythology...

Ready Player One (First 6 Chapters) 2015-04-20

Ready Player One (First 6 Chapters) crossword puzzle
Across
  1. Wade's aunt
  2. The username Wade uses
  3. The clues that Halliday left behind for the easter egg are in this
  4. Your customizable character in OASIS
  5. The right for your personal information to remain unknown when using The OASIS
  6. The group of people who work for IOI that search for Halliday's easter egg
  7. A large internet service provider, largely used to search for Halliday's easter egg
  8. Where Wade goes to escape his Aunt and others
  9. The form of mobile homes that Wade and his Aunt live in
  10. The main character
  11. People who search for Halliday's easter egg
Down
  1. What is used to run OASIS
  2. The virtual reality program
  3. Halliday and Morrows game company
  4. Wade's aunt pawned this to get more money
  5. Wade's cyber crush
  6. Halliday left this behind and anyone who finds it gains control of The OASIS
  7. Wade's best friend
  8. What is used to see into the virtual reality
  9. Wade's home planet in OASIS

20 Clues: Wade's auntWade's cyber crushWade's best friendThe main characterThe username Wade usesWhat is used to run OASISThe virtual reality programWade's home planet in OASISHalliday and Morrows game companyYour customizable character in OASISWade's aunt pawned this to get more moneyPeople who search for Halliday's easter egg...

Villanova 2021-02-20

Villanova crossword puzzle
Across
  1. The nickname for the dining hall on south
  2. The building with the famous Arch on Main Campus
  3. The mansion at the edge of West Campus
  4. Science Center
  5. Mascot
  6. The year Villanova was founded
  7. Men's basketball coach
  8. Veritas, Unitas, __________
  9. The loop that the Oreo lives in
Down
  1. School of Business building
  2. The new name of the Pavilion
  3. A new pedestrian bridge now allows easier passage from this part of campus to Main
  4. Home of the Villanova Room, a small theater, an art Gallery, and a cyber lounge
  5. Official trivia every Thursday night
  6. The name of the new senior housing dorms along Lancaster Ave
  7. The first year that the Wildcats won March Madness
  8. Home of the Campus Ministry and student dorms
  9. Scored the game winning 2016 March Madness Championship Game buzzer beater
  10. This building on West Campus has dorms, a dining hall, a gymnasium, and class rooms inside of it
  11. The on campus "police"
  12. The current president of the University

21 Clues: MascotScience CenterMen's basketball coachThe on campus "police"School of Business buildingVeritas, Unitas, __________The new name of the PavilionThe year Villanova was foundedThe loop that the Oreo lives inOfficial trivia every Thursday nightThe mansion at the edge of West CampusThe current president of the University...

Working with children and adolescents 2024-08-20

Working with children and adolescents crossword puzzle
Across
  1. type of bullying done through the internet
  2. type of play counselling which is structured
  3. level of 2 in moral development
  4. Zone of ______ development
  5. type of abuse that could include ridiculing
  6. Freud's psychosexual stage
  7. child not wanting to open up or be in counselling
  8. type of trauma from hearing about others trauma
Down
  1. balanced parenting style
  2. guidance on cases from someone with more experience/training
  3. the ethical principle of keeping information safe
  4. factor that minimises someones risk
  5. integrative model for play therapy
  6. ability to overcome/bounce back
  7. Bronfenbrenner's systemic theory
  8. what do we teach children about
  9. liked by many but also disliked by many
  10. metaphor to explain anger
  11. ending of counselling
  12. ____ vs guilt
  13. causing physical harm to oneself
  14. respecting everyones right to make their own decisions
  15. type of sibling relationship
  16. when a case is out of scope
  17. skills we teach children to handle their feelings and problems
  18. factor that puts someone at risk

26 Clues: ____ vs guiltending of counsellingbalanced parenting stylemetaphor to explain angerZone of ______ developmentFreud's psychosexual stagewhen a case is out of scopetype of sibling relationshipability to overcome/bounce backwhat do we teach children aboutlevel of 2 in moral developmentBronfenbrenner's systemic theorycausing physical harm to oneself...

Internet vocabulary 2025-02-27

Internet vocabulary crossword puzzle
Across
  1. pretending to be companies to get someone's persona information
  2. editing a photo online to get desired results
  3. software used to block use of computer soft ware for a sum of monry
  4. place to communicate online
  5. being protected against online cyber attacks
  6. proper way to communicate on the internet
  7. using the internet to exploit people usually minors
  8. data left behind on the internet
  9. Speaking in All Caps to convey shouting
Down
  1. someone post or comment to purposely invoke anger
  2. a frequently updated webpage for business purposes
  3. recording and posting videos of assault
  4. a packet of data used to track their user anytime they use a site
  5. criminal activities committed using electrics
  6. using the internet to illegally copy software and give it to others
  7. bullying that occurs over the internet
  8. website setting allowing to control who see the information of the user
  9. someone who exploits others
  10. using someone else's identity for financial gain
  11. using electronics to harass someone

20 Clues: someone who exploits othersplace to communicate onlinedata left behind on the internetusing electronics to harass someonebullying that occurs over the internetrecording and posting videos of assaultSpeaking in All Caps to convey shoutingproper way to communicate on the internetbeing protected against online cyber attacks...

22 2024-11-04

22 crossword puzzle
Across
  1. Athletic brand associated with Black culture
  2. Modern prefix for internet terms
  3. Type of instrument used in blues
  4. West African drum
  5. Boxing icon's original last name
  6. Black Panther Party co-founder Bobby
  7. Legendary jazz singer Lena
  8. Hip-hop artist Goldblum, remixer
  9. Strong Black role model
  10. Instrument played by Miles Davis
  11. Jazz style popular in the 1930s
  12. Vibrant African print fabric
  13. Civil rights icon Parks' first name
  14. Filled with deep feeling
  15. Jazz singer Holiday's first name
Down
  1. Selfless acts for others
  2. "Thriller" singer Michael
  3. Supremes singer Diana Ross’s daughter
  4. Rhythmic feel in music
  5. New Orleans music style
  6. Day Martin Luther King Jr. envisioned
  7. Clear mental image or goal
  8. Will Smith's son
  9. African storyteller
  10. City with Drake and The Weeknd
  11. Dance popularized by Chubby Checker
  12. Jazz great Fitzgerald's nickname
  13. Fashionable necklace, symbol of elegance
  14. Opposite of strong female role
  15. A principle of Kwanzaa

30 Clues: Will Smith's sonWest African drumAfrican storytellerRhythmic feel in musicA principle of KwanzaaNew Orleans music styleStrong Black role modelSelfless acts for othersFilled with deep feeling"Thriller" singer MichaelClear mental image or goalLegendary jazz singer LenaVibrant African print fabricCity with Drake and The Weeknd...

Magazines 2026-02-01

Magazines crossword puzzle
Across
  1. THG Publishing
  2. New Delhi Brinda Datta
  3. Book Review Literary Trust
  4. Council of Scientific & Industrial Research (CSIR) - National Institute of Science Communication and Policy Research (NIScPR).
  5. National Geographic Partner
  6. Centre for Science and Environment
  7. DE European Design Magazine 2017
  8. Times Network
  9. Asia Times
  10. British Film Institute (BFI)
  11. Chitralekha Group
  12. LRB Ltd.
  13. IIT Madras
  14. EFY Enterprises Pvt Ltd
  15. Sambhav Media
  16. Cyber Media (India) Ltd
  17. Harvard Business School
  18. Sameeksha Trust
  19. Competition Success Review
Down
  1. EFY Enterprises
  2. Association of Indian Universities (AIU).
  3. FORBES INDIA
  4. The Economist Group
  5. BW Businessworld Media Pvt. Ltd.
  6. Reed Business Information Ltd.
  7. Total Library Solutions (India) Pvt. Ltd.
  8. Ministry of Information & Broadcasting
  9. Condé Nast Publications
  10. Careers360
  11. MTG Learning Media
  12. Trusted Media Brands
  13. The New York Review of Books, Inc
  14. the Bhavana Trust
  15. The Hindu Group
  16. Indian Science News Association
  17. Malayala Manorama Co. Ltd.

36 Clues: LRB Ltd.Careers360Asia TimesIIT MadrasFORBES INDIATimes NetworkSambhav MediaTHG PublishingEFY EnterprisesThe Hindu GroupSameeksha TrustChitralekha Groupthe Bhavana TrustMTG Learning MediaThe Economist GroupTrusted Media BrandsNew Delhi Brinda DattaCondé Nast PublicationsEFY Enterprises Pvt LtdCyber Media (India) LtdHarvard Business School...

Classroom Hunt 2025-10-31

Classroom Hunt crossword puzzle
Across
  1. Ways to stop _________ bullying.
  2. Respect by raising your hand to speak and no interrupting others.
  3. Speed up your workflow with these essential ________ shortcuts.
  4. If you don't believe in _________ no one will do it for you.
  5. Made with 100% _______ cheese.
  6. Keep your ________area neat.
  7. Water mineral enhanced for taste.
  8. Any bad attitudes or negative thinking.
  9. The computer lab prepared and ready to work.
  10. Everyone is ________ here.
  11. _________ only when necessary.
  12. Save the _________ or message and share with an adult.
  13. Be patient....I'm thinking.
  14. Do not use a computer to harm, bully or ______ others.
Down
  1. 10 Rules for ___________ computer use.
  2. Your uniqueness is your __________.
  3. ______ 06 unlocked.
  4. Click to select this object.
  5. _________ in place.
  6. Be prepared and ready to ______.
  7. Do not _________ with another person's computer work or activity.
  8. _________belongs.
  9. Don't change _________.
  10. The moment you give up is the _________ you let someone else win.
  11. Because they think they can they ___________.
  12. Do not _________ someone else's work as your own.

26 Clues: _________belongs.______ 06 unlocked._________ in place.Don't change _________.Everyone is ________ here.Be patient....I'm thinking.Click to select this object.Keep your ________area neat.Made with 100% _______ cheese._________ only when necessary.Ways to stop _________ bullying.Be prepared and ready to ______.Water mineral enhanced for taste....

CTF-CW-11 2025-11-14

CTF-CW-11 crossword puzzle
Across
  1. Document on every website about rules for handling details
  2. When the cloud gets graded for playing by the compliance rulebook.
  3. At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
  4. The elevator hack from novice to boss
  5. Tech world’s fire brigade—second shout
  6. Safety scissors for your network
  7. Tekion’s legendary vault no hacker can touch.
  8. Buzzing threat hunter hangout
  9. Pop-up or email outlining changes in how data gets used
Down
  1. Any data, direct or indirect, that reveals a person’s identity
  2. Processes to ensure robots don’t go rogue
  3. When a hacker sneaks past your digital guard
  4. The organization behind the ATT&CK plots
  5. DNA test for who’s calling the shots
  6. When your browser “remembers” you, for a while
  7. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
  8. Slamming the panic room door on hackers
  9. Every journey’s pit stops
  10. Red ink on the corporate report card
  11. Info swap: turn gold into poker chips

20 Clues: Every journey’s pit stopsBuzzing threat hunter hangoutSafety scissors for your networkDNA test for who’s calling the shotsRed ink on the corporate report cardThe elevator hack from novice to bossInfo swap: turn gold into poker chipsTech world’s fire brigade—second shoutSlamming the panic room door on hackersThe organization behind the ATT&CK plots...

Nates Crossword 2023-08-22

Nates Crossword crossword puzzle
Across
  1. bulling- bulling someone through a computer
  2. - a secret word or phrase
Down
  1. person who uses computers to gain access to data
  2. drive- a high capacity storage device
  3. - uneversial serial bus

5 Clues: - uneversial serial bus- a secret word or phrasedrive- a high capacity storage devicebulling- bulling someone through a computerperson who uses computers to gain access to data

KUKODI NYUMBA 2022-09-26

KUKODI NYUMBA crossword puzzle
Across
  1. STOREY
  2. SECURITY
  3. NEIGHBORHOOD
  4. CONTRACT
  5. TO RENT A HOUSE
Down
  1. FURNATURE
  2. TO MOVEIN
  3. TO RELOCATE
  4. REGION
  5. TENANT

10 Clues: STOREYREGIONTENANTSECURITYCONTRACTFURNATURETO MOVEINTO RELOCATENEIGHBORHOODTO RENT A HOUSE

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sending
  2. data
  3. protocol levels
  4. common clock
  5. interface, transmitter
Down
  1. decodes
  2. creation
  3. mediums
  4. security
  5. server, user's identity

10 Clues: datadecodessendingmediumscreationsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identity

crack the code 2024-04-30

crack the code crossword puzzle
Across
  1. The process of verifying the identity of a user or device (10 letters)
  2. - A type of attack where an attacker intercepts communication between two parties (6 letters)
  3. - The practice of disguising malicious files to make them appear harmless (7 letters)
  4. -A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
  5. - A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
Down
  1. - Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
  2. - A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
  3. -A set of rules or guidelines designed to enhance computer security (9 letters)
  4. -A program designed to prevent, detect, and remove malware (10 letters)
  5. - The exploitation of security vulnerabilities in a computer system or network (9 letters)
  6. - Protects a computer system from unauthorized access (9 letters)
  7. - The unauthorized copying of data from a computer system (6 letters)

12 Clues: - Protects a computer system from unauthorized access (9 letters)- The unauthorized copying of data from a computer system (6 letters)The process of verifying the identity of a user or device (10 letters)-A program designed to prevent, detect, and remove malware (10 letters)...

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. , Capital stock is the amount of common and preferred shares that a company is authorized to issue
  2. a service charge assessed by a broker or investment advisor.
  3. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  4. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  5. Mark Zuckerberg
Down
  1. Electronic Data Gathering, Analysis, and Retrieval system
  2. a sales pitch or promotion made by the underwriting firm, usually on the road
  3. a security that represents the ownership of a fraction of a corporation.
  4. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
  5. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  6. , A derivative is a complex type of financial security that is set between two or more parties.
  7. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. Capital stock is the amount of common and preferred shares that a company is authorized to issue
  2. a service charge assessed by a broker or investment advisor.
  3. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  4. Mark Zuckerberg
  5. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
  6. a sales pitch or promotion made by the underwriting firm, usually on the road
  7. A derivative is a complex type of financial security that is set between two or more parties.
Down
  1. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  2. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
  3. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  4. a security that represents the ownership of a fraction of a corporation.
  5. Electronic Data Gathering, Analysis, and Retrieval system

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

RU ITEC411 Crime and Security 2021-12-01

RU ITEC411 Crime and Security crossword puzzle
Across
  1. A verbal form of defamation
  2. One of the three principles of the CIA triad
  3. One of the three principles of the CIA triad
  4. A group of computers infected with malware controlled by a host
  5. One of the three principles of the CIA triad
  6. Software that can replicate itself and does not need to be activated
  7. Hacking for political motivation
  8. A way of protecting data through scrambling text
  9. A written form of defamation
Down
  1. directing people to fake websites to collect personal data
  2. Software that can replicate itself but needs to be activated
  3. Physical characteristics used to secure data
  4. The act of protecting computer systems
  5. Malicious code that looks to be harmless
  6. Gaining access to a computer or system without permission
  7. Act of sending emails in order to gain someone's personal information
  8. A type a malware that records activities on a computer
  9. Recording devices that are installed in card readers
  10. A method used to get around normal security measures
  11. A type of malware that locks a computer until money is paid

20 Clues: A verbal form of defamationA written form of defamationHacking for political motivationThe act of protecting computer systemsMalicious code that looks to be harmlessPhysical characteristics used to secure dataOne of the three principles of the CIA triadOne of the three principles of the CIA triadOne of the three principles of the CIA triad...

A+ 2025-02-11

A+ crossword puzzle
Across
  1. A type of software designed to steal personal data.
  2. A Microsoft cloud storage service.
  3. A protocol used for remote desktop access.
  4. A method used to prevent unauthorized access by requiring two credentials.
  5. Background processes.
  6. A Windows recovery option for rolling back changes.
  7. A type of social engineering where an attacker impersonates someone trusted.
  8. A feature that allows users to run older programs on new Windows versions.
Down
  1. A Windows security tool that helps prevent malware infections.
  2. A virtualization platform for running multiple OS.
  3. A type of virus that hides within legitimate software.
  4. A type of cyberattack that floods a system with traffic.
  5. A type of attack that intercepts and alters communication.
  6. A method of verifying system integrity using cryptography.
  7. A Windows feature that encrypts individual files and folders.
  8. A security policy that enforces password changes.
  9. A type of malware that locks users out of their system.
  10. A command used to trace network routes.

18 Clues: Background processes.A Microsoft cloud storage service.A command used to trace network routes.A protocol used for remote desktop access.A security policy that enforces password changes.A virtualization platform for running multiple OS.A type of software designed to steal personal data.A Windows recovery option for rolling back changes....

Internet 2024-12-04

Internet crossword puzzle
Across
  1. a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations
  2. Everything having to do with the Internet
  3. To transfer files or data stored on the internet
  4. Electronic mail
Down
  1. a device that directs data traffic between your local network and the Internet.
  2. The computer software or app you use to access the internet
  3. a wireless networking technology
  4. A number that is used to identify networks within the routing system

8 Clues: Electronic maila wireless networking technologyEverything having to do with the InternetTo transfer files or data stored on the internetThe computer software or app you use to access the internetA number that is used to identify networks within the routing systema device that directs data traffic between your local network and the Internet....

NATIONAL SECURITY 2023-03-05

NATIONAL SECURITY crossword puzzle
Across
  1. refers to the set of standards or conditions that must be met for a country to be considered economically secure.
  2. refers to the measures taken by a country to protect its economy and ensure its stability.
  3. refers to the interdependent network of living and non-living elements in a particular environment.
  4. refers to the systematic observation and analysis of the social and economic factors that affect a country's security.INTERNATIONAL refers to the measures taken by countries to ensure their economic stability and protect themselves from external economic threats.
  5. INDICATOR THRESHOLD refers to the minimum level of a security indicator that must be met to ensure the security of a country or its citizens.
Down
  1. refers to the ability of a country to maintain its economic stability and protect its citizens from economic risks.
  2. THREAT refers to any potential danger or risk to the security of a country or its citizens.
  3. refers to the protection of a nation's citizens, borders, and infrastructure from internal and external threats.
  4. INDICATOR refers to a measurable factor that is used to assess the level of security in a particular area.

9 Clues: refers to the measures taken by a country to protect its economy and ensure its stability.THREAT refers to any potential danger or risk to the security of a country or its citizens.refers to the interdependent network of living and non-living elements in a particular environment....

Digital security 2023-04-01

Digital security crossword puzzle
Across
  1. A live, online seminar or presentation conducted over the internet
  2. A written or printed communication that is sent or received electronically via a phone or computer.
  3. A social networking website that allows users to connect with friends and family and share information.
Down
  1. A software application that allows users to make voice and video calls and chat over the internet.
  2. A digital audio file made available on the internet for downloading or streaming.
  3. An online conversation between two or more people in real-time.
  4. A message distributed by electronic means from one computer user to one or more recipients via a network.

7 Clues: An online conversation between two or more people in real-time.A live, online seminar or presentation conducted over the internetA digital audio file made available on the internet for downloading or streaming.A software application that allows users to make voice and video calls and chat over the internet....

tss security 2021-10-27

tss security crossword puzzle
Across
  1. finds people
  2. laeding officer
  3. spy club
  4. makes decisions, buys stuff
Down
  1. print, ink pad and file
  2. wears ppe and carrys boxes
  3. looks for clues and finds awnsers

7 Clues: spy clubfinds peoplelaeding officerprint, ink pad and filewears ppe and carrys boxesmakes decisions, buys stufflooks for clues and finds awnsers

Information Security 2023-10-23

Information Security crossword puzzle
Across
  1. A program that appears legitimate but actually contains malicious code
  2. The process of identifying and fixing security vulnerabilities.
  3. A malicious software that encrypts data and demands a ransom
  4. A technique for verifying the identity of users or devices
Down
  1. The act of browsing the internet without revealing your identity.
  2. Unauthorized access to computer systems or data
  3. A unique combination of characters used to access a system

7 Clues: Unauthorized access to computer systems or dataA unique combination of characters used to access a systemA technique for verifying the identity of users or devicesA malicious software that encrypts data and demands a ransomThe process of identifying and fixing security vulnerabilities....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. Opposite of hungry.
  2. A place where food is sold.
  3. Growing plants to eat
Down
  1. Sharing food helps stop this.
  2. Something we drink to stay healthy
  3. Food that helps us grow strong
  4. We need this to live and grow

7 Clues: Opposite of hungry.Growing plants to eatA place where food is sold.Sharing food helps stop this.We need this to live and growFood that helps us grow strongSomething we drink to stay healthy

Computer security 2022-09-07

Computer security crossword puzzle
Across
  1. Code breaker
  2. Can be stolen
  3. Keep this safe
Down
  1. Stores your money
  2. Vulnerability
  3. Not a cold
  4. Angry pet

7 Clues: Angry petNot a coldCode breakerVulnerabilityCan be stolenKeep this safeStores your money

Social Security 2026-02-17

Social Security crossword puzzle
Across
  1. The official name for Social Security
  2. Retirement at age 62
  3. Created the Social Security program
  4. Basic benefit amount at full retirement age
Down
  1. Supplements, but does NOT replace personal financial and insurance programs
  2. Retirement up to age 70
  3. Retirement at age 67

7 Clues: Retirement at age 62Retirement at age 67Retirement up to age 70Created the Social Security programThe official name for Social SecurityBasic benefit amount at full retirement ageSupplements, but does NOT replace personal financial and insurance programs

Logistics Crossword 2021-11-18

Logistics Crossword crossword puzzle
Across
  1. -Most used app on the internet
  2. -Temporary group made to do a specific task
  3. -The logistics cycle is driven by the ________
  4. -Where products are temporarily stored while being given out to transportation units or elsewhere
  5. -Mines, farms, etc that provide base materials from a natural source
  6. -First major global security initiative
  7. -Where products are stored for long periods of time
  8. -Expected volume of goods expected to go through particular workplace
Down
  1. -Dangerous substance that holds risk to workers or the environment
  2. -Most secure dock
  3. -Most common dock
  4. somewhat permanent group of people who come together to get jobs done
  5. -Massive amount of money designated to help companies get rid of waste
  6. -the process and paers of the process of getting a product from a raw material provider to a customer
  7. -Global connection of computers and other technology
  8. -Security agreement between USA, Canada, and Mexico

16 Clues: -Most secure dock-Most common dock-Most used app on the internet-First major global security initiative-Temporary group made to do a specific task-The logistics cycle is driven by the ________-Security agreement between USA, Canada, and Mexico-Where products are stored for long periods of time-Global connection of computers and other technology...

Cybersecurity Awareness Month - Week 3 2022-10-05

Cybersecurity Awareness Month - Week 3 crossword puzzle
Across
  1. Cirrus' tool for endpoint security
  2. A memorized secret consisting of a sequence of random words that is longer than a typical password
  3. Cirrus' email security platform
  4. A password attack that uses trial-and-error by attempting every possible combination
  5. Malware that disables access to data until a fee is paid
  6. A type of virus that automatically spreads itself
Down
  1. software designed to detect and destroy viruses
  2. A network of devices infected and controlled by the same virus
  3. A physical device that connects to a network
  4. A social engineering attack delivered by SMS text message
  5. A phishing attack aimed at senior executives
  6. The process of encoding data using complex algorithms for confidentiality
  7. An attack that prompts an MFA approval request over and over
  8. Malware that is disguised as legitimate software
  9. A social engineering technique where an attacker creates a fake scenario
  10. A type of trojan spyware that records your keystrokes

16 Clues: Cirrus' email security platformCirrus' tool for endpoint securityA physical device that connects to a networkA phishing attack aimed at senior executivessoftware designed to detect and destroy virusesMalware that is disguised as legitimate softwareA type of virus that automatically spreads itselfA type of trojan spyware that records your keystrokes...

Recap - Day 1 2023-11-28

Recap - Day 1 crossword puzzle
Across
  1. WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
  2. A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOUDO IN THIS CASE?“
  3. THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING -
  4. SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
  5. A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
  6. A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
  7. MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
  8. THIS IS A TYPE OF TRAVEL DOCUMENT
  9. A...LIKES TO LEARN FROM DEMONSTRATIONS
Down
  1. A TYPE OF LIGHT TO EXAMINE ADOCUMENT SECURITY FEATURE USING MIDAS
  2. BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
  3. A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
  4. WHAT DOES THE D IN MIDAS STAND FOR?
  5. AN...HAS ACCESS TO THE WHOLE SYSTEM
  6. IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
  7. WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?

16 Clues: THIS IS A TYPE OF TRAVEL DOCUMENTWHAT DOES THE D IN MIDAS STAND FOR?AN...HAS ACCESS TO THE WHOLE SYSTEMA...LIKES TO LEARN FROM DEMONSTRATIONSMACHINE READABLE TRAVEL DOCUMENTS HAVE A...WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPHSETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURSIN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS...

Mortgage Terminology 2020-08-01

Mortgage Terminology crossword puzzle
Across
  1. lenders will check this report to assess your character
  2. required for loans above 80% lending
  3. government tax payable when a property is purchased
  4. when a property has a clear title with no mortgage
  5. the most common interest rate choice
  6. to move a loan from one lender to another
  7. written agreement outlining the terms of a purchase
  8. value of an asset minus the debt owing
  9. additional loan repayments that can be drawn on
  10. the percentage value of debt against asset
  11. an independent assessment of a property
  12. increase in property value over time
Down
  1. asset offered by the borrower to the lender
  2. a third party who provides additional security
  3. any outstanding financial debt
  4. the process of building a house
  5. approval from a bank that is not yet confirmed
  6. lowest loan repayments without paying the principle
  7. to lock in your repayments for a set time
  8. loss tax benefit for investment property
  9. will be lodged if you don't pay a bill for 90+ days
  10. completion of the sale or purchase of a property

22 Clues: any outstanding financial debtthe process of building a houserequired for loans above 80% lendingthe most common interest rate choiceincrease in property value over timevalue of an asset minus the debt owingan independent assessment of a propertyloss tax benefit for investment propertyto lock in your repayments for a set time...

Cold War by Jaimi Taylor 2014-02-17

Cold War by Jaimi Taylor crossword puzzle
Across
  1. European economic recovery made by the USA
  2. The theroy that if one country falls then the rest will soon follow
  3. Line that separates North Korea from South Korea
  4. countries controlled by USSR
  5. working class women and men
  6. Cuban communist leader
  7. Chinese nationalist who took over China
  8. the man who wanted to contain communism so he made the Marshall Plan
  9. investigates disloyaity on the eve of war
  10. Vietnam city
Down
  1. Divided North Vietnam from South Vietnam
  2. Two people accused of passing atomic secrets to the soviets during the war
  3. freed people from resisting communism
  4. moved supplys to West Berlin
  5. An organization made for peace, security, and economic developement
  6. Republican Senator who accused Government Officials of communism
  7. High ranking state department leader investigated for spying
  8. when the central government rules by terrorizing citizens
  9. Security council doccument that suggested trippling defence budget
  10. conflict between USA and USSR
  11. 10 nations pleged mutual assistance in the event of a attck
  12. the act of preventing spread of communism
  13. Leader of Indochina communist party

23 Clues: Vietnam cityCuban communist leaderworking class women and menmoved supplys to West Berlincountries controlled by USSRconflict between USA and USSRLeader of Indochina communist partyfreed people from resisting communismChinese nationalist who took over ChinaDivided North Vietnam from South Vietnamthe act of preventing spread of communism...

Income Tax Vocabulary 2015-07-03

Income Tax Vocabulary crossword puzzle
Across
  1. When you overpay the government, you receive a refund
  2. Expenses the government has
  3. gross income Total income
  4. withholding Money an employer holds from your paycheck
  5. status Married/single/head of household
  6. Income from stocks and bonds
  7. Income the government receives from taxpayers, etc.
  8. Dependents you are claiming
  9. Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
  10. Set $ amount not taxed for each dependent
  11. Money you earn from employment
  12. income Money earned before deductions
  13. Husband/Wife
Down
  1. care expenses Money you pay for someone else to care for a child or elder dependent
  2. tax Taxes on income
  3. deduction $ amount non itemizers may subtract from income based upon filing status
  4. security Your personal identification number
  5. income Income received from interest, dividends, social security & pentions
  6. Money received from saving account
  7. A person who relies on someone for living expenses
  8. Your banks identification number
  9. of household Single person who has dependents
  10. No withholding
  11. pay Money you earn to take home

24 Clues: Husband/WifeNo withholdingtax Taxes on incomegross income Total incomeExpenses the government hasDependents you are claimingIncome from stocks and bondsMoney you earn from employmentpay Money you earn to take homeYour banks identification numberMoney received from saving accountincome Money earned before deductions...

Crossword Puzzle unit 6 2023-02-23

Crossword Puzzle unit 6 crossword puzzle
Across
  1. Term used in the oil industry to indicate the searching for the product
  2. Political person with great knowledge ando experience in state affairs
  3. last name of the one who took Office as presidente on October 6 of 1911
  4. A groupof people who opposed reelection
  5. Who wrote the novel Balun Canan?
  6. Plan thatvwas develope bye Emiliano Zapata
  7. Form of gorvernment in which power was obtained through authoritarian or violent methods
  8. Where did Porfirio Díaz exile ando died?
  9. The security institute that was founded in 1943
  10. Oficial rate or tax which determines the feeds yo be paid
  11. The mexican miracle start during the presidency of-
  12. Social security Ford state workers
Down
  1. Who kill madero in 1913
  2. What was the crisis in the countryside
  3. Group that was formed bye Carranza
  4. Workers that temporarily migrates
  5. Economy that si applied un times of armed conflicto or violent convulsions
  6. What does the articule 27 about
  7. What battle began in colonial times when haciendas where form
  8. Independient of any religioso organización or denomination

20 Clues: Who kill madero in 1913What does the articule 27 aboutWho wrote the novel Balun Canan?Workers that temporarily migratesGroup that was formed bye CarranzaSocial security Ford state workersWhat was the crisis in the countrysideA groupof people who opposed reelectionWhere did Porfirio Díaz exile ando died?Plan thatvwas develope bye Emiliano Zapata...

CROSSWORD PUZZLE U6 2023-02-27

CROSSWORD PUZZLE U6 crossword puzzle
Across
  1. Drastically reduced in numbers
  2. Made a constitutional reform
  3. Group led by Emiliano Zapata
  4. Was part of a social sector called “the anti-re-electionists”
  5. The increasing pace of the Mexican economy came to be known as
  6. Was considered the father of education in Mexico
  7. Paid on a regular basis
  8. The essential nature or the main part of something
  9. A group led by Francisco Villa
  10. An act or strategy intended to resolve a problem or improve a situation
Down
  1. Group led by Venustiano Carranza
  2. Economy that is applied in times of armed conflict or violent convulsions
  3. A group of people who opposed reelection
  4. To create a system that depends on a central power
  5. Piece of land that is worked by a community and whose earnings are distributed among all
  6. Mexican political period from 1928-1934
  7. Committed fraud in the elections of 1910
  8. Institute of Social Security and Services for State Workers
  9. The Secretary of Public Education
  10. The Mexican Social Security Institute

20 Clues: Paid on a regular basisMade a constitutional reformGroup led by Emiliano ZapataDrastically reduced in numbersA group led by Francisco VillaGroup led by Venustiano CarranzaThe Secretary of Public EducationThe Mexican Social Security InstituteMexican political period from 1928-1934A group of people who opposed reelection...

Environmental Services 2017-08-18

Environmental Services crossword puzzle
Across
  1. These are used to keep your hands clean.
  2. What is the name of the disinfectant we use to clean?
  3. Who is the head of safety and security?
  4. What is used to clean the toilets?
  5. What company takes care of RED trash and sharps for the hospital?
  6. Who is the manager of ES?
  7. Evening discharge cleaners are called?
  8. What brand of bleach do we use to clean with?
  9. This is used to clean the carpet.
  10. What floor is ICU on?
Down
  1. What is the name of the security company?
  2. Used to collect trash from multiple areas.
  3. What is the name of the fragrance spray we use?
  4. What tupe of rags do we use to clean? (blue and yellow)
  5. Weeks How far out should you schedule PTO?
  6. What is the brand of electronic paper towels we use?
  7. This is used to swipe you into the building or certain areas.
  8. What is the Color of ES Scrubs?
  9. What program is used to look up chemicals?
  10. What company takes care of pest control?

20 Clues: What floor is ICU on?Who is the manager of ES?What is the Color of ES Scrubs?This is used to clean the carpet.What is used to clean the toilets?Evening discharge cleaners are called?Who is the head of safety and security?These are used to keep your hands clean.What company takes care of pest control?What is the name of the security company?...

Great Depression Crossword Puzzle 2024-10-15

Great Depression Crossword Puzzle crossword puzzle
Across
  1. Projects that are used for public uses
  2. Closing of banks during the Great Depression to avoid bank runs
  3. A homeless, penniless wanderer
  4. Program that presented the struggles of middle-class people
  5. Eleanor Roosevelt's mother
  6. General who would ignore Herbert Hoover
  7. Method of boycotting work by sitting down at work and refusing to leave
  8. A very controversial president at the time
  9. To attempt to resolve conflict between hostile people or groups
  10. Act that Americans were unsure of because it excluded African Americans
Down
  1. The incident that resulted in 10 deaths and 90 injuries
  2. A person who risks money in hopes of a financial profit
  3. First Roman Catholic to win a major party presidential nomination
  4. Spending borrowed money rather than raising taxes to boost money
  5. First African American to win an Academy Award
  6. Something that provides security against misfortune
  7. A long period of rising stock prices
  8. The acronym for Federal Deposit Insurance Corporation
  9. Role of government to work out conflicts among competing interest groups
  10. This didn't end the depression, but gave Americans a stronger sense of security

20 Clues: Eleanor Roosevelt's motherA homeless, penniless wandererA long period of rising stock pricesProjects that are used for public usesGeneral who would ignore Herbert HooverA very controversial president at the timeFirst African American to win an Academy AwardSomething that provides security against misfortune...

Chapter 11 2025-04-09

Chapter 11 crossword puzzle
Across
  1. In ____ 1935, Congress passed the Social Security Act
  2. President ____ believed that the economy would improve soon
  3. The Security Act placed a tax on workers and _____
  4. In ____ 1929, Investors started selling their stocks
  5. During the Depression, a disaster hit the ________
  6. The United States slid into an economic crisis called the ____
  7. On October 24, 1929, investors sold almost ____ shares
  8. By ____, 75 percent of Americans lived in poverty
Down
  1. Small banks suffered losses when farmers ____
  2. Migrant workers moved here
  3. Many ____ moved to California and became migrant workers
  4. Stock market crashed on black _____
  5. Hoover believed that the government could not fix the ______
  6. Some people who lost their homes lived in shelters made of old ____
  7. By the late 1920s,____ prices were very high
  8. In ____ Congress created the Works Progress Administration (WPA)
  9. Many investors did not have the money to buy stocks so they bought on ___ instead
  10. ____ borrowed their money from banks
  11. Many ___ were forced to look for work
  12. In ____ Roosevelt created a new set of programs, often called the Second New Deal.

20 Clues: Migrant workers moved hereStock market crashed on black _________ borrowed their money from banksMany ___ were forced to look for workSmall banks suffered losses when farmers ____By the late 1920s,____ prices were very highBy ____, 75 percent of Americans lived in povertyThe Security Act placed a tax on workers and _____...

Christian Hulet crossword 2025-03-25

Christian Hulet crossword crossword puzzle
Across
  1. this celebrity lost 30 million with FTX
  2. a digital system of transactions that is distributed across a network
  3. Warren Buffet is the ceo of this company
  4. how old to invest in crypto
  5. the age for RMD in IRA account you need to draw from
  6. contribute a max of 23,500 (spell how it sounds)
  7. for low risk people and is automotion
  8. what risk tolerance is for aggressive people
  9. Warren Buffet’s rule #1
Down
  1. is backed by the government
  2. combined with medicare and social security
  3. made in 1935 by FDR
  4. buy low ___
  5. move to another plan
  6. one problem if you put all your money into one company and it goes
  7. what also sometimes contributes to your pension
  8. traditional IRA contributions are made
  9. age of retirement
  10. roth IRA contributions are made
  11. social security is funded by this
  12. part of the fica tax
  13. what is backing crypto
  14. is managed by, in pension plans
  15. the biggest financial fraud in the U.S.
  16. offered to people with jobs in trades, manufacturing, and educators

25 Clues: buy low ___age of retirementmade in 1935 by FDRmove to another planpart of the fica taxwhat is backing cryptoWarren Buffet’s rule #1is backed by the governmenthow old to invest in cryptoroth IRA contributions are madeis managed by, in pension planssocial security is funded by thisfor low risk people and is automotion...

Cybersecurity Awareness Puzzle 2025-10-14

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. An event or occurrence, often unexpected or problematic.
  2. Hidden programs providing remote access.
  3. Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
  4. More than one kind of proof.
  5. Special access or rights given to certain users.
  6. Self-replicating malware spreading across systems.
  7. Encrypts data and demands payment for decryption.
  8. You should do this to all of your software.
  9. Voice (phone-based) phishing.
  10. SMS/text-based phishing.
  11. Security Awareness Training is provided ___.
Down
  1. Proof of who someone is.
  2. Permission to access a system, file, or resource.
  3. A modification or update to a system, process, or configuration.
  4. Protection against threats or attacks on computer and data.
  5. Using someone else's access without permission to enter a building.
  6. Records everything you type on a keyboard.
  7. A system that blocks unauthorized access to a network or computer.
  8. Cheating someone out of Money or personal Information
  9. Deceptive emails that trick users into clicking malicious links or sharing credentials.
  10. Secret words or codes used to unlock accounts.
  11. Copying data to keep it safe in case something is lost or damaged.

22 Clues: Proof of who someone is.SMS/text-based phishing.More than one kind of proof.Voice (phone-based) phishing.Hidden programs providing remote access.Records everything you type on a keyboard.You should do this to all of your software.Security Awareness Training is provided ___.Secret words or codes used to unlock accounts....

Cybersecurity Crossword 2025-09-25

Cybersecurity Crossword crossword puzzle
Across
  1. Requiring more than one form of verification. ____________ authentication
  2. A network security system that monitors and controls traffic.
  3. The process of verifying identity before granting access.
  4. The process of converting data into a secure code.
  5. A secret string of characters used for authentication.
  6. The practice of protecting systems, networks, and programs from attacks.
Down
  1. Technology simulating human intelligence, used in modern cybersecurity.
  2. Malicious software disguised as legitimate software.
  3. Malware that locks files and demands payment.
  4. A scam using fake emails or messages to trick people into revealing information.
  5. A clickable reference to another webpage or document.
  6. Phishing conducted through SMS text messages
  7. Software designed to harm or exploit systems.
  8. A type of malware that replicates itself by infecting other programs.
  9. Software that detects and removes malicious programs.
  10. A well-known security awareness training platform.
  11. A secure tunnel for internet traffic, stands for Virtual Private Network.
  12. An attempt to damage, steal, or disrupt digital systems.
  13. Manipulating people into revealing confidential information. ________ engineering
  14. A hidden method of bypassing normal authentication.

20 Clues: Phishing conducted through SMS text messagesMalware that locks files and demands payment.Software designed to harm or exploit systems.The process of converting data into a secure code.A well-known security awareness training platform.A hidden method of bypassing normal authentication.Malicious software disguised as legitimate software....

Investing - Caison 2026-03-19

Investing - Caison crossword puzzle
Across
  1. A loan you give to the government or a company
  2. Market where prices are trending down
  3. You contribute and sometimes your employer contributes too
  4. Funded by being paid while working
  5. Market where prices are trending up
  6. High Risk and trying to win fast
  7. The availability of cash
  8. Virtual Currency
  9. Employer sponsored retirement savings plan
  10. Currency created by the government
  11. Contributions are made pre tax
  12. Measures the price performance of a basket of assets
  13. Price to earnings
Down
  1. Savings, Emergency or College fund
  2. Age to receive full social security benefits
  3. The total value of a company’s stock
  4. Contributions made post tax
  5. Social Security and Medicare taxes combined
  6. Managed by a fund manager
  7. Investing all the money you have at that time
  8. Password that makes it impossible to hack
  9. A collection of stocks or bonds that trades on a stock exchange
  10. Index representing the top 500 market cap companies
  11. 100 of the largest non-financial companies
  12. Strategy where you invest your money in equal amounts

25 Clues: Virtual CurrencyPrice to earningsThe availability of cashManaged by a fund managerContributions made post taxContributions are made pre taxHigh Risk and trying to win fastSavings, Emergency or College fundFunded by being paid while workingCurrency created by the governmentMarket where prices are trending upThe total value of a company’s stock...

fanf 2022-02-09

fanf crossword puzzle
Across
  1. big idiot
  2. bunny
  3. stupid bear
  4. kuu pää
  5. perfect
Down
  1. stupid kid
  2. pirate
  3. guardian of security
  4. fat chiken
  5. aurinko pää
  6. crying wolf

11 Clues: bunnypiratekuu pääperfectbig idiotstupid kidfat chikenaurinko päästupid bearcrying wolfguardian of security

FCC 2025-03-24

FCC crossword puzzle
Across
  1. _CC
  2. New form of audio media
  3. Like texting
  4. F_C
  5. Who?
  6. National _ Act
  7. Where?
Down
  1. When? (Spelled out)
  2. Ring, ring
  3. What?
  4. FC_

11 Clues: _CCFC_F_CWho?What?Where?Ring, ringLike textingNational _ ActWhen? (Spelled out)New form of audio media

The Financial Vault Quiz - based on emails send on Financial Terms 2018-02-26

The Financial Vault Quiz - based on emails send on Financial Terms crossword puzzle
Across
  1. It refers to the amount of uncertainty or risk about the size of changes in a security's value.
  2. When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
  3. Short selling is motivated by the belief that a security's price will ____
  4. The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
  5. Portfolios that lie below the efficient frontier are
  6. A minimum of ___ persons are required to create an omnibus account
  7. The _____ the volatility, the riskier the security.
Down
  1. It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
  2. One measure of the relative volatility of a particular stock to the market is its
  3. The sale of a security that is not owned by the seller or that the seller has borrowed
  4. Employee’s Provident Fund is maintained and overseen by the ___
  5. An omnibus account is normally overseen by a ____ manager
  6. Account Is an account between two futures merchants (brokers)

13 Clues: The _____ the volatility, the riskier the security.Portfolios that lie below the efficient frontier areAn omnibus account is normally overseen by a ____ managerAccount Is an account between two futures merchants (brokers)Employee’s Provident Fund is maintained and overseen by the ___A minimum of ___ persons are required to create an omnibus account...

The Making of a Provisional 2015-02-17

The Making of a Provisional crossword puzzle
Across
  1. - capital of Northern Ireland
  2. - Irish Republican Army
  3. - men who parades through streets of Belfast
  4. - what the security force did to the shoes of the son
Down
  1. - to live separately
  2. - what the security force did to Frankie and Patricia's family
  3. - column in the paper when someone has died
  4. - Frankie Ryan's accent

8 Clues: - to live separately- Irish Republican Army- Frankie Ryan's accent- capital of Northern Ireland- column in the paper when someone has died- men who parades through streets of Belfast- what the security force did to the shoes of the son- what the security force did to Frankie and Patricia's family

Bonds 2024-02-08

Bonds crossword puzzle
Across
  1. exersising before the maturity date
  2. Pooling assets to make a financial security
  3. Security bound by morgages or other assets
  4. matures in less than 1 year
  5. State bonds
Down
  1. Risk is higher,so yeild is greater from a company
  2. federal governments ability to back money
  3. group of loans with similar charecteristics

8 Clues: State bondsmatures in less than 1 yearexersising before the maturity datefederal governments ability to back moneySecurity bound by morgages or other assetsPooling assets to make a financial securitygroup of loans with similar charecteristicsRisk is higher,so yeild is greater from a company

American Express Travelers Cheque 2021-11-22

American Express Travelers Cheque crossword puzzle
Across
  1. _____ Express uses the Cheques
  2. Can you have counterfeit Cheques
  3. What is one security feature
  4. How do you verify
Down
  1. What do you have to do for the signatures
  2. How many security features do they have
  3. Where can you find the phone number to call
  4. What code do you need on the Cheque
  5. Is the process where you validate both the presenter and the cheque

9 Clues: How do you verifyWhat is one security feature_____ Express uses the ChequesCan you have counterfeit ChequesWhat code do you need on the ChequeHow many security features do they haveWhat do you have to do for the signaturesWhere can you find the phone number to callIs the process where you validate both the presenter and the cheque

Food insecurity 2023-12-06

Food insecurity crossword puzzle
Across
  1. what is low food security?
  2. what causes food insecurity?
  3. What is another solution for food insecurity?
  4. can extra help with grades for food insecure kids help?
  5. food what is high food security?
Down
  1. what food insecurity solution has tapp middle school tried?
  2. how many people are helped by food drives every year?
  3. Why dont people like to do food drives often?
  4. How can food insecurity affect kids learning?
  5. If more people helped could food insecurity be reduced?

10 Clues: what is low food security?what causes food insecurity?food what is high food security?Why dont people like to do food drives often?How can food insecurity affect kids learning?What is another solution for food insecurity?how many people are helped by food drives every year?If more people helped could food insecurity be reduced?...

Guest Services 2025-07-10

Guest Services crossword puzzle
Across
  1. Who do you call when people are acting inappropriately
  2. This person gets notified when we are almost out of stickers
  3. ______ license gets placed in the scanner
  4. People on this list need Security approval prior to entering
Down
  1. ________ Service is our priority.
  2. Program for people needing food
  3. _____Briggs
  4. Government issued book that lets a person travel to other countries.
  5. May be used when person has no government ID

9 Clues: _____BriggsProgram for people needing food________ Service is our priority.______ license gets placed in the scannerMay be used when person has no government IDWho do you call when people are acting inappropriatelyThis person gets notified when we are almost out of stickersPeople on this list need Security approval prior to entering...

UNIT 1 2023-05-03

UNIT 1 crossword puzzle
Across
  1. g
  2. d
  3. er
  4. ü
Down
  1. o
  2. ea
  3. e
  4. a
  5. v

9 Clues: ogeadvüeaer

UNIT 1 2023-05-03

UNIT 1 crossword puzzle
Across
  1. g
  2. d
  3. er
  4. ü
Down
  1. o
  2. ea
  3. e
  4. a
  5. v

9 Clues: ogeadvüeaer

Information Security 2020-09-24

Information Security crossword puzzle
Across
  1. The best response to password Recovery Questions is,
  2. Disclosing personal member information may be
  3. The type of email to get you to click on a fraudulent link
  4. Who is responsible for data security
Down
  1. How might someone evil try to get information from you
  2. If I click on a link I believe was malicious I should
  3. What is the default data classification,

7 Clues: Who is responsible for data securityWhat is the default data classification,Disclosing personal member information may beThe best response to password Recovery Questions is,If I click on a link I believe was malicious I shouldHow might someone evil try to get information from youThe type of email to get you to click on a fraudulent link

Food Security 2021-10-28

Food Security crossword puzzle
Across
  1. overnutrition and overnutrition can both result in _____.
  2. ________ is the measure of the availability of food and individuals' ability to access it.
  3. 23.5 million people live in a _______.
  4. living in a food desert means you have limited access to ______, fresh, and affordable food.
Down
  1. In food deserts, _______ and convenience stores are often the only available places to get food.
  2. _______ is a root cause of hunger and malnutrition
  3. Some factors that can cause _______ or global hunger include poverty, job instability, unstable markets, climate change, and war.

7 Clues: 23.5 million people live in a _______._______ is a root cause of hunger and malnutritionovernutrition and overnutrition can both result in _____.________ is the measure of the availability of food and individuals' ability to access it.living in a food desert means you have limited access to ______, fresh, and affordable food....

Password Security 2016-02-01

Password Security crossword puzzle
Across
  1. a process of changing characters in a password to strengthen it
  2. to put in front of a password to make it more unique
Down
  1. include these values to strengthen passwords
  2. xxxxxxxxxx words make weak pass words
  3. include these special characters to strengthen passwords
  4. xxxxx force attacks use dictionaries of passwords to hack a system
  5. human sniffing passwords will xxxxx a password once the first few characters are known

7 Clues: xxxxxxxxxx words make weak pass wordsinclude these values to strengthen passwordsto put in front of a password to make it more uniqueinclude these special characters to strengthen passwordsa process of changing characters in a password to strengthen itxxxxx force attacks use dictionaries of passwords to hack a system...

Networks security 2021-02-09

Networks security crossword puzzle
Across
  1. Is bigger than LAN
  2. What is a Malware but is hidden
  3. LAN
  4. A biometric of facial features
Down
  1. A person who infiltrates systems or servers
  2. when an attack occurs to networks
  3. A system protection against malware and hackers

7 Clues: LANIs bigger than LANA biometric of facial featuresWhat is a Malware but is hiddenwhen an attack occurs to networksA person who infiltrates systems or serversA system protection against malware and hackers

collective security 2021-10-12

collective security crossword puzzle
Across
  1. what measures, not coercive,in the mechanism of ensuring universal security are brought to the fore
  2. the main reason in exceptional cases when peace has already been violated
  3. what laid the foundations of a kind of behaviour of states, the core of which were the principles of sovereignty and non-interference
  4. takes the first role in collective security
Down
  1. the first serious attempt to institutionalize collective security in the modern era
  2. bodies should make every effort to find a peaceful solution to local disputes through these agreements
  3. the type of security which require the protection of the world community or a group of States from the possibility of harming them by means of armed violence, provided by their joint efforts

7 Clues: takes the first role in collective securitythe main reason in exceptional cases when peace has already been violatedthe first serious attempt to institutionalize collective security in the modern erawhat measures, not coercive,in the mechanism of ensuring universal security are brought to the fore...

MIS Security 2023-11-14

MIS Security crossword puzzle
Across
  1. ______horse, software that appears to be benign but does something other than expected.
  2. protocols used for secure information transfer over the Internet
  3. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
  4. Write your initial here for identifier
  5. enforce a security policy on data exchanged between its network and the Internet
Down
  1. CryptoLocker is an example of
  2. _______ engineering, tricking employees into revealing their passwords by pretending to be a legitimate memberof a company is called

7 Clues: CryptoLocker is an example ofWrite your initial here for identifierprotocols used for secure information transfer over the Internetenforce a security policy on data exchanged between its network and the Internet______horse, software that appears to be benign but does something other than expected....

Security Words 2023-10-24

Security Words crossword puzzle
Across
  1. Watch over in order to protect or control.
  2. A person, object, or place selected as the aim of an attack.
  3. A supply or quantity of bullets and shells.
  4. Used as a protection against blows or missiles.
Down
  1. Measures taken to prevent
  2. A measure taken to protect someone or something or to prevent something undesirable
  3. A thing designed or used for inflicting bodily harm or physical damage.

7 Clues: Measures taken to preventWatch over in order to protect or control.A supply or quantity of bullets and shells.Used as a protection against blows or missiles.A person, object, or place selected as the aim of an attack.A thing designed or used for inflicting bodily harm or physical damage....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Source of food production
  2. Required for digestion
  3. source of energy
  4. Nutritional drink
Down
  1. drink harmful for human body
  2. source of iron
  3. must to have one fruit daily

7 Clues: source of ironsource of energyNutritional drinkRequired for digestionSource of food productiondrink harmful for human bodymust to have one fruit daily

MONDAY 7th OCTOBER 2019-10-04

MONDAY 7th OCTOBER crossword puzzle
Across
  1. SECURITY
  2. NOUVEAUX ARRIVÉS
  3. S'INSCIRE
  4. ORDINATEUR PORTABLE
  5. NOT MARRIED
  6. NOT LONG AGO
  7. MONEY YOU MUST PAY BACK
Down
  1. WOMAN WHOSE HUSBAND IS DEAD
  2. AVOCAT
  3. COMPTABLE
  4. GÉRER
  5. CORRIGER

12 Clues: GÉRERAVOCATSECURITYCORRIGERCOMPTABLES'INSCIRENOT MARRIEDNOT LONG AGONOUVEAUX ARRIVÉSORDINATEUR PORTABLEMONEY YOU MUST PAY BACKWOMAN WHOSE HUSBAND IS DEAD

Keywords 2012-03-20

Keywords crossword puzzle
Across
  1. bullying when someone is getting bullied on the internet
  2. person or a thing that is trustworthy
  3. when you can see and modify the structure of a table.
  4. vrtual learning environment
  5. something appropiate to the matter at hand
  6. A row and column view of a table.
  7. carefully and thoroughly at something
  8. Utilities that allow you to bring in or send data
Down
  1. Electronic Mail
  2. a record holds all the information or data that has been entered into the database
  3. a set of questions with a choice of an answer
  4. A direction or order.
  5. to take part of a whole
  6. a computer file attached to an e-mail
  7. a software that provides a way to view pages on the World Wide Web.
  8. Symbols or signals that are input, stored and processed by a computer.
  9. structured set of data held in a computer
  10. a program for data, files or documents e.g. the Internet
  11. universal resource locator
  12. A set of data arranged in rows and columns.

20 Clues: Electronic MailA direction or order.to take part of a wholeuniversal resource locatorvrtual learning environmentA row and column view of a table.person or a thing that is trustworthya computer file attached to an e-mailcarefully and thoroughly at somethingstructured set of data held in a computersomething appropiate to the matter at hand...

Ready Player One Section 1 2015-04-19

Ready Player One Section 1 crossword puzzle
Across
  1. How many years after 2015 does this book take place?
  2. A Very realistic video game that the book revolves around
  3. State in which the book takes place
  4. Last name of the lady who lived three units below Wade
  5. Hideout Where Wade plays OASIS
  6. What people live in in the real world
  7. Wade's aunt
  8. What the finder of Halliday's Egg would get a lot of
  9. Level in which Wade's avatar is on
  10. How the trailers in the trailer park were arranged
Down
  1. One of the very first video games that is made reference to in the book
  2. Creator of OASIS, a multi-billionaire
  3. A small, robed wizard. Halliday's avatar in OASIS
  4. Wade's Mom
  5. Egg hunters
  6. A total "lamer" that Wade said didn't know anything
  7. Well known gunter that Wade has a cyber-crush on
  8. Rich rated combatants in OASIS
  9. Wade's avatar name in OASIS
  10. Known as the worlds largest Internet service provider that wanted to take over OASIS

20 Clues: Wade's MomEgg huntersWade's auntWade's avatar name in OASISHideout Where Wade plays OASISRich rated combatants in OASISLevel in which Wade's avatar is onState in which the book takes placeCreator of OASIS, a multi-billionaireWhat people live in in the real worldWell known gunter that Wade has a cyber-crush on...

Vy´s second crossword 2020-05-11

Vy´s second crossword crossword puzzle
Across
  1. to see someone in real life
  2. to write on paper and send it to your friends
  3. if someone is hurt or is missing
  4. if you are really bad
  5. if someone is bullying you on the internet
  6. if you are a drama queen
  7. a very beautiful place that you will never forget
  8. if you are like a mom
  9. 13-18 years old
  10. to do a phone number away if you hate them
Down
  1. to write a message to someone
  2. to send a teacher a message if you don´t have their phone number
  3. to answer on a text message
  4. the opposite of not understanding
  5. to look after your siblings or if someone is important to you
  6. the opposite of receive
  7. if you meet someone new you want to be friends with them then you have to ask them something
  8. the opposite of write
  9. If you want everyone to look at you all the time
  10. to have a job

20 Clues: to have a job13-18 years oldif you are really badthe opposite of writeif you are like a momthe opposite of receiveif you are a drama queento see someone in real lifeto answer on a text messageto write a message to someoneif someone is hurt or is missingthe opposite of not understandingif someone is bullying you on the internet...

Literasi digital 2024-08-14

Literasi digital crossword puzzle
Across
  1. HAKI terbagi menjadi berapa bagian
  2. literasi digital digunakan untuk mencari
  3. mata pelajaran yang mempelajari literasi Digital yaitu
  4. singkatan empat pilar literasi Digital
  5. penemu konsep literasi Digital
  6. keamanan sangat penting untuk menjaga
  7. lisensi yang bersifat paling restriktif adalah
  8. kejahatan didunia digital disebut cyber
  9. manfaat literasi digital untuk menambah
  10. aplikasi umum untuk mencari informasi digital adalah
  11. aplikasi pengolah kata adalah
  12. lisensi yang memperbolehkan pengguna untuk tidak hanya menggunakan perangkat lunak disebut lisensi
  13. informasi palsu atau berita palsu disebut
  14. perangkat lunak yang disediakan secara gratis disebut lisensi
Down
  1. negara yang memiliki tingkat literasi Digital yang tinggi
  2. bahasa Indonesia dari linking
  3. lisensi yang hak ciptanya yang dilepaskan disebut
  4. informasi yang tidak sengaja salah atau tidak akurat disebut
  5. informasi yang sengaja dibuat untuk menyesatkan disebut
  6. perangkat lunak yang digunakan untuk mengakses informasi disebut
  7. aplikasi pembuat bahan presentasi disebut
  8. hak yang diberikan negara kepada seseorang atas karya ciptanya disebut
  9. individu dengan kemampuan pemrograman tinggi disebut

23 Clues: bahasa Indonesia dari linkingaplikasi pengolah kata adalahpenemu konsep literasi DigitalHAKI terbagi menjadi berapa bagiankeamanan sangat penting untuk menjagasingkatan empat pilar literasi Digitalkejahatan didunia digital disebut cybermanfaat literasi digital untuk menambahliterasi digital digunakan untuk mencari...

ISTILAH DALAM TIK 2024-10-31

ISTILAH DALAM TIK crossword puzzle
Across
  1. Sistem pengiriman pesan elektronik melalui internet
  2. menambahkan program atau aplikasi ke sistem
  3. Komponen fisik komputer yang dapat dilihat dan disentuh
  4. Jaringan global yang menghubungkan jutaan komputer di seluruh dunia
  5. Perangkat lunak yang mengelola perangkat keras dan menjalankan program aplikasi
  6. Data yang telah diolah sehingga memiliki makna
  7. Urutan langkah-langkah logis untuk menyelesaikan suatu masalah
  8. Sistem untuk melindungi Jaringan dan data komputer
  9. salah satu Perangkat menampilkan halaman web
  10. Bilangan Basis 16
  11. Dunia Maya
  12. Kata Sandi
  13. Hardware untuk media penyimpanan
Down
  1. Memulai ulang sistem
  2. Platform online yang memungkinkan pengguna untuk berinteraksi dan berbagi informasi
  3. Kumpulan halaman web yang saling berhubungan
  4. Aplikasi Perkantoran untuk mengolah data dalam tabel
  5. Informasi yang tersedia melalui media atau produk elektronik
  6. Bilangan basis 10
  7. Format file standar dari Aplikasi PowerPoint
  8. Aplikasi pengolah gambar
  9. Papan ketik
  10. Salah satu sistem operasi
  11. Tempat untuk menyimpan dan mengelompokkan dokumen atau data pada perangkat komputer
  12. Program yang digunakan untuk menampilkan halaman web
  13. Hardware inputan suara
  14. Salah satu Sistem Operasi Mobile

27 Clues: Dunia MayaKata SandiPapan ketikBilangan basis 10Bilangan Basis 16Memulai ulang sistemHardware inputan suaraAplikasi pengolah gambarSalah satu sistem operasiSalah satu Sistem Operasi MobileHardware untuk media penyimpananmenambahkan program atau aplikasi ke sistemKumpulan halaman web yang saling berhubungan...

Sip & Solve 2025-09-13

Sip & Solve crossword puzzle
Across
  1. What does the “S” stand for in BYOS?
  2. What is the bride’s middle name?
  3. What’s the bride’s work nickname?
  4. Which town do the couple live in?
  5. Where are the couple going on their honeymoon?
  6. The happy couple
  7. Where did the groom pop the question?
  8. What’s the groom’s favourite sport?
  9. Total number of flower girls, bridesmaids and groomsmen?
  10. Who’s the better cook: bride or groom?
  11. What sporting activity did the groom ‘strike’ at on their first date?
Down
  1. How many years have the couple been together?
  2. What’s the groom’s favourite food?
  3. What nickname did the groom have at university?
  4. In which city did the bride and groom meet?
  5. What song did the bride walk down the aisle to?
  6. Who’s the tidier: bride or groom?
  7. Who’s the better driver: bride or groom?
  8. How many metres did Eoin’s Guinness World Record breaking team row?
  9. Where did the groom celebrate his stag do?
  10. Where did the bride celebrate her hen do?
  11. What’s the bride’s favourite food?

22 Clues: The happy coupleWhat is the bride’s middle name?Who’s the tidier: bride or groom?What’s the bride’s work nickname?Which town do the couple live in?What’s the groom’s favourite food?What’s the bride’s favourite food?What’s the groom’s favourite sport?What does the “S” stand for in BYOS?Where did the groom pop the question?...

IEEE Day 2025-10-08

IEEE Day crossword puzzle
Across
  1. India’s first nuclear test codename
  2. The digital payment system launched by NPCI in 2016
  3. Online government service platform — “____ Seva”
  4. First Indian to go to space
  5. Founder of Infosys
  6. City known as India’s “Silicon Valley”
  7. Indian city famous for IT parks and Cyber Towers
  8. “Digital India” initiative was launched in this year
  9. Technology used for secure digital ledgers
  10. India’s first AI-based robot citizen
  11. Indian tech giant known for TCS
  12. Currency symbol officially adopted in 2010
  13. Indian satellite navigation system similar to GPS
Down
  1. India’s first mission to Mars
  2. Social media platform owned by Meta
  3. Father of India’s Green Revolution
  4. India’s fastest train as of 2025
  5. File format for web pages
  6. India’s first indigenously built supercomputer
  7. Indian space agency abbreviation
  8. Portable computer smaller than a laptop
  9. Father of the Indian Constitution
  10. The act of illegally accessing computer systems
  11. The world’s largest biometric ID system
  12. Term for connecting everyday objects to the internet

25 Clues: Founder of InfosysFile format for web pagesFirst Indian to go to spaceIndia’s first mission to MarsIndian tech giant known for TCSIndia’s fastest train as of 2025Indian space agency abbreviationFather of the Indian ConstitutionFather of India’s Green RevolutionIndia’s first nuclear test codenameSocial media platform owned by Meta...

CTF-CW10 2025-11-14

CTF-CW10 crossword puzzle
Across
  1. “It’s really you, right?” check
  2. The steering wheel for corporate safety
  3. Data clean-up routine that regularly erases outdated information
  4. The compliance ninja
  5. Where your evidence gets its day in court
  6. United Kingdom’s tailored take on the EU’s major privacy regulation
  7. Villains’ instruction manual, with footnotes
  8. The doorman who wants your password and your ID
  9. Don’t panic: log your “oops” here at Tekion!
  10. SWAT team for computer emergencies
Down
  1. Flick your wand at Tekion and this grants you access!
  2. Not collecting more info than a service truly needs from you
  3. Talking in code so eavesdroppers get gibberish
  4. The secret doorman at Tekion—never letting bad web traffic get past the velvet rope!
  5. Telling others to mind their own digital business
  6. The guard dog for your computer
  7. Doing surgery on your risks
  8. The virtue your files aspire to
  9. International certification for privacy management processes
  10. The fire escape map for cyber incidents

20 Clues: The compliance ninjaDoing surgery on your risks“It’s really you, right?” checkThe guard dog for your computerThe virtue your files aspire toSWAT team for computer emergenciesThe steering wheel for corporate safetyThe fire escape map for cyber incidentsWhere your evidence gets its day in courtVillains’ instruction manual, with footnotes...

Chapter 18 2016-05-01

Chapter 18 crossword puzzle
Across
  1. to Needy Families new name of the organization that brings forth public assistance to needy families; former possessor of the name "Aid to Families With Dependent Children."
  2. benefit given by the government directly to individuals; may be either cash transfers (i.e. Social Security payments) or in-kind transfers (i.e. food stamps).
  3. and Work Opportunity Reconciliation Act official name of the welfare reform law of 1996.
  4. The Immigration Control and Reform Act
  5. tax by which the burden falls relatively upon low-income groups than upon wealthy taxpayers; opposite of progressive tax.
  6. "negative income tax" that provides income to very poor individuals in lieu of charging them federal income taxes.
  7. tax by which the government takes a greater share of the income of the rich than of the poor.
  8. government benefit to which certain qualified individuals are entitled by law, regardless of need.
  9. tax by which the government takes the same share of income from everyone, rich and poor alike.
Down
  1. increasing concentration of poverty among women, especially unmarried women and then children.
  2. value of assets owned.
  3. policy that provides benefits to individuals, either through entitlements or means testing.
  4. of 1935 creator of both the Social Security Program and a national assistance program for poor children, usually called AFDC.
  5. "bank account" into which Social Security contributions are "deposited" and used to pay out eligible recipients.
  6. method used to count the number of poor people; considers what a family must spend for an "austere" standard of living.
  7. government program available only to individuals below a poverty line.
  8. the act of relocating to a foreign country
  9. "shares" of the national income earned by various groups.
  10. amount of funds collected between any two points in time.

19 Clues: value of assets owned.The Immigration Control and Reform Actthe act of relocating to a foreign country"shares" of the national income earned by various groups.amount of funds collected between any two points in time.government program available only to individuals below a poverty line....

Allie Blair Virus Crossword 2021-03-15

Allie Blair Virus Crossword crossword puzzle
Across
  1. a type of virus that duplicates itself in order to spread to other computers
  2. messages sent from one computer to the other using the internet
  3. A software program designed to infiltrate or damage a computer system without the user's informed consent
  4. backup protects viruses and hackers from being able to permanently delete your files and data
  5. Computer code that lies dormant until it is triggered by a specific logical event.
  6. A type of malware that deludes the users to its true purpose allowing it to invade the computer
  7. to discover or investigate a problem on a computer
  8. Software code that gives access to a program or a service that will get through normal security protections
  9. A technique intruders use to make their network or internet transmission appear legitimate
Down
  1. written to help a computer operate and make it run smoothly.
  2. a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attacks
  3. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
  4. a type of social engineering attack often used to steal user data
  5. a piece of code that is capable of copying itself and has a harmful effect
  6. A logical computer network of zombies under the control of an attacker
  7. software designed to detect and destroy computer viruses
  8. A publicly released software security update intended to repair a vulnerability
  9. An infected computer that is under the control of a remote attacker
  10. an attack that wants to make the program it's attacking unavailable to its users

19 Clues: to discover or investigate a problem on a computersoftware designed to detect and destroy computer viruseswritten to help a computer operate and make it run smoothly.messages sent from one computer to the other using the interneta type of social engineering attack often used to steal user data...

MODULE 11 QUIZ 2024-12-19

MODULE 11 QUIZ crossword puzzle
Across
  1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  2. Paid to probe networks and report vulnerabilities
  3. is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
  4. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. is a server role that makes it possible for administrators to take control of Microsoft product updates
  6. a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  7. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  8. what the user has (smart card or key)
  9. Do not report problems, but instead disseminate the information to other
  10. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
  11. Creates a barrier between two entities
Down
  1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  2. a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  3. features that enable administrators to control who has access to the network authentication
  4. The most widely used method for encrypting data is IP Security
  5. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  6. What users can do after they are logged on to the network
  7. An industry-standard client/server protocol that offers centralized control
  8. what the user knows (username/password)
  9. A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached

20 Clues: what the user has (smart card or key)Creates a barrier between two entitieswhat the user knows (username/password)Paid to probe networks and report vulnerabilitiesWhat users can do after they are logged on to the networkThe most widely used method for encrypting data is IP Security...

Identity Theft Crossword 2025-11-17

Identity Theft Crossword crossword puzzle
Across
  1. Note placed on your credit report that tells lenders to take extra steps to verify your identity.
  2. Unsecured network you should avoid using for banking or shopping online.
  3. Feature that shows where you are in real time, which you should usually turn off for safety.
  4. Official document you file with law enforcement to record the identity theft.
  5. Opening new credit cards or using existing cards without the real owner’s permission.
  6. Tool that securely stores and creates strong, unique passwords for all your accounts.
  7. Mixing real and fake information, like a real SSN with a fake name, to build a new fake identity.
  8. When someone uses your personal information without permission to commit fraud or other crimes.
  9. When someone uses your personal information without permission to commit fraud or other crimes.
  10. To regularly check your accounts and credit for suspicious charges or new accounts.
  11. Lock on your credit file that stops new accounts from being opened in your name.
Down
  1. When someone uses your health insurance information to get medical care, prescriptions, or surgeries.
  2. Machine that cuts paper into tiny pieces so thieves can’t read your documents.
  3. Controls on social media that limit who can see your posts and personal details.
  4. Extra security step that uses a code or app in addition to your password to log in.
  5. When someone uses your Social Security number to file a fake tax return or claim your refund.
  6. Taking out mortgages, car loans, or personal loans using another person’s identity.
  7. Financial institution you must contact right away if your card or account is used without permission.
  8. Using a locked mailbox and collecting mail quickly so it isn’t stolen.
  9. Government agency you contact if someone uses your Social Security number for tax fraud.

20 Clues: Using a locked mailbox and collecting mail quickly so it isn’t stolen.Unsecured network you should avoid using for banking or shopping online.Official document you file with law enforcement to record the identity theft.Machine that cuts paper into tiny pieces so thieves can’t read your documents....

Issue #007 2022-09-16

Issue #007 crossword puzzle
Across
  1. deadly drink
  2. safe, protection
  3. envious
  4. criminal, wrong
  5. traitor
Down
  1. secrets, hiding
  2. tuilg (anagram)
  3. sharp blades
  4. royalty, leader
  5. athed (anagram)
  6. incorrect, untrue

11 Clues: envioustraitorsharp bladesdeadly drinksecrets, hidingtuilg (anagram)royalty, leadercriminal, wrongathed (anagram)safe, protectionincorrect, untrue

CLOUD DEPLOYMENT 2025-03-07

CLOUD DEPLOYMENT crossword puzzle
Across
  1. Technology
  2. Redundancy and Replication
  3. Analysis
  4. and Management Tools
  5. and Security
  6. Engagement
Down
  1. Storage
  2. of Current Infrastructure
  3. Strategy
  4. Management
  5. and Disaster Recovery

11 Clues: StorageStrategyAnalysisTechnologyManagementEngagementand Securityand Management Toolsand Disaster Recoveryof Current InfrastructureRedundancy and Replication

Transformers 2018 2018-07-25

Transformers 2018 crossword puzzle
Across
  1. You shall lock away or take home portable devices and cabinet_____ a the end of each working day.
  2. During brief_____ (eg lunchtimes), rooms may be securely locked, where appropriate.
  3. Personal computers and terminals must be switched off and/ or protected against___________ access
  4. Flip charts, ports, and wall displays containing______ or sensitive information should be removed, and black/white boards wiped clean at the end of work sessions.
  5. Drawers must be locked when you are away from your_______ and at the end of the workday.
  6. Laptop and personal bags must be safely stored under your_____.
  7. Compliance is______.
Down
  1. After close of business, random _____ are to be conducted of photocopiers, faxes, cabinets and desk spaces to ensure that sensitive material and attractive items have been secured appropriately
  2. _____ Security Emergency Number is 5777(if you observe a suspicious package)
  3. It is an individual's ________ to ensure the security of personal items.
  4. All infringements will be considered as non-compliant behavior and recorded via_____.
  5. Classified and _______ material, including any items which have not yet been assessed, and proprietary third party documents, must be securely locked away in appropriate containeers.
  6. Personalized items that are workplace_______ (eg picture frames, certificated, paper weights), must be kept to a minimum.
  7. _______ Security Emergency Number is 4444 (if you observe a suspicious package)

14 Clues: Compliance is______.Laptop and personal bags must be safely stored under your_____.It is an individual's ________ to ensure the security of personal items._____ Security Emergency Number is 5777(if you observe a suspicious package)_______ Security Emergency Number is 4444 (if you observe a suspicious package)...

browsing safety 2025-06-06

browsing safety crossword puzzle
Across
  1. a criminal activity to harm anyone online
  2. an illegal entry a computer or internet
  3. a program designed to prevent and removal of viruses from a coputer
Down
  1. man who do cyber crime
  2. a malware which do distruction of data
  3. a software that prevet unauthorised acces to your computer

6 Clues: man who do cyber crimea malware which do distruction of dataan illegal entry a computer or interneta criminal activity to harm anyone onlinea software that prevet unauthorised acces to your computera program designed to prevent and removal of viruses from a coputer

The Financial Vault Quiz 2018-02-26

The Financial Vault Quiz crossword puzzle
Across
  1. An omnibus account is normally overseen by a ____ manager
  2. When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
  3. It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
  4. The _____ the volatility, the riskier the security.
  5. A minimum of ___ persons are required to create an omnibus account
  6. The sale of a security that is not owned by the seller or that the seller has borrowed
  7. It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
  1. Short selling is motivated by the belief that a security's price will ____
  2. The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
  3. Portfolios that lie below the efficient frontier are
  4. Account Is an account between two futures merchants (brokers)
  5. Employee’s Provident Fund is maintained and overseen by the ___
  6. One measure of the relative volatility of a particular stock to the market is its

13 Clues: The _____ the volatility, the riskier the security.Portfolios that lie below the efficient frontier areAn omnibus account is normally overseen by a ____ managerAccount Is an account between two futures merchants (brokers)Employee’s Provident Fund is maintained and overseen by the ___A minimum of ___ persons are required to create an omnibus account...

Rolando Grade 6th -ity 2021-03-16

Rolando Grade 6th -ity crossword puzzle
Across
  1. to be mature
  2. money
  3. the country where you born
  4. skill
  5. famous
  6. careful you can fall
  7. pain and hurt
Down
  1. that is wet
  2. a chance
  3. all people
  4. people that protect
  5. all together
  6. most part
  7. that is forever

14 Clues: moneyskillfamousa chancemost partall peoplethat is wetto be matureall togetherpain and hurtthat is foreverpeople that protectcareful you can fallthe country where you born

IT Security Week 7 2021-08-16

IT Security Week 7 crossword puzzle
Across
  1. the process of deploying an application to the target environment
  2. is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  3. a corporate directive that specifies how employees should leave their working space when they leave the office.
  4. the information is too valuable to permit any risk of its capture. Viewing is severely restricted\
  5. the policies of persistent data and records management for meeting legal and business data archival requirements.
  6. there are no restrictions on viewing the document.
Down
  1. the software vendor may suspend all licenses if the customer is found to be non-compliant
  2. unlicensed software exposes an organization to large fines and
  3. looking for treasure in someone else's trash
  4. is a type of Man-in-the-Middle Attack specifically involving a browser infected with some type of proxy malware.
  5. an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
  6. memory allocated to application
  7. the process where fibers are separated and treated to produce pulp.
  8. the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly reduces security risks, eliminating security vulnerabilities and reducing costs.
  9. to indicate a set of instructions that lends itself to a definite or standardized procedure without loss of effectiveness

15 Clues: memory allocated to applicationlooking for treasure in someone else's trashthere are no restrictions on viewing the document.unlicensed software exposes an organization to large fines andthe process of deploying an application to the target environmentthe process where fibers are separated and treated to produce pulp....

agriculture crossword 2024-10-23

agriculture crossword crossword puzzle
Across
  1. drift
  2. Conditions
  3. Exchange
  4. Liberalisation
Down
  1. land use
  2. security
  3. larceny
  4. National Product (GNP)
  5. tenure
  6. equality

10 Clues: drifttenurelarcenyland usesecurityequalityExchangeConditionsLiberalisationNational Product (GNP)

Pekarjaan-Chareef 2025-05-16

Pekarjaan-Chareef crossword puzzle
Across
  1. driver
  2. gardener
  3. Farmer
  4. lawyer
  5. security-guard
Down
  1. firefighter
  2. chef
  3. plumber
  4. waiter
  5. police

10 Clues: chefdriverwaiterFarmerlawyerpoliceplumbergardenerfirefightersecurity-guard

Airport 2024-04-05

Airport crossword puzzle
Across
  1. Cesta
  2. Odlet
  3. Palubní-lístek
  4. Časové-pásmo
Down
  1. Let
  2. Brána
  3. Zavazadla
  4. Přílet
  5. Bezpečnostní-kontrola
  6. Pas

10 Clues: LetPasBránaCestaOdletPříletZavazadlaČasové-pásmoPalubní-lístekBezpečnostní-kontrola

The Ark 2022-05-31

The Ark crossword puzzle
Across
  1. different kinds
  2. to enroll
  3. not wet
  4. move around or avoid
  5. three feet
  6. group of trees
Down
  1. deadly
  2. bend over upon itself
  3. assurance
  4. imaginative narration
  5. communication
  6. low cost

12 Clues: deadlynot wetlow costassuranceto enrollthree feetcommunicationgroup of treesdifferent kindsmove around or avoidbend over upon itselfimaginative narration

Digital Citizenship Vocabulary 2021-02-25

Digital Citizenship Vocabulary crossword puzzle
Across
  1. belonging to one person
  2. 2 words. rules and behaviors while using technology
  3. 2 words. meaning people you did not know looking at your post online
Down
  1. 2 words. before the internet these were newspapers, magazines, billboards, radio, and broadcast TV and direct mail.
  2. the act of posting insults online
  3. 2 words. meaning anything broadcasting through a screen or online
  4. like cyber-stalking online
  5. to form a set value
  6. 2 words. someone pretends to be you online and commits fraud
  7. scamming companies sending fake emails to get your private information
  8. a string of characters used to verify the identity of a user during the authentication process.
  9. another word meaning to fool someone

12 Clues: to form a set valuebelonging to one personlike cyber-stalking onlinethe act of posting insults onlineanother word meaning to fool someone2 words. rules and behaviors while using technology2 words. someone pretends to be you online and commits fraud2 words. meaning anything broadcasting through a screen or online...

Thanksgiving 2024-11-26

Thanksgiving crossword puzzle
Across
  1. A type of pie, Macintosh for example
  2. Turkey + Duck + Chicken
  3. A type of pie, a gourd for example
  4. This is the name of a producer/seller of Turkey, name similar to Indiana University
  5. A type of pie or mash - the starchy vegetable kind
Down
  1. On Monday, go to the internet to get some of these deals
  2. "I won't be doing any cooking, but I will be doing a lot of ______ this Thanksgiving"
  3. Small __________ Saturday
  4. Macy's throws one of these every year
  5. What half the staff get on Thanksgiving
  6. Like 4th of July or President's Day, Thanksgiving is one of these
  7. This Meteorologist often hosts the sidelines of the Thanksgiving Day parade on NBC

12 Clues: Turkey + Duck + ChickenSmall __________ SaturdayA type of pie, a gourd for exampleA type of pie, Macintosh for exampleMacy's throws one of these every yearWhat half the staff get on ThanksgivingA type of pie or mash - the starchy vegetable kindOn Monday, go to the internet to get some of these deals...

8th Unit 5 Vocabulary 2026-01-14

8th Unit 5 Vocabulary crossword puzzle
Across
  1. goods or money from the government or charitable organizations given to underprivileged people
  2. smaller group of government responsible for cities and towns
  3. government that looks over the country as a whole
  4. in a foreign country
  5. money collected by the US government in order to maintain public programs and services
Down
  1. government that oversees individual states
  2. an attempt to gain illegal access to a computer
  3. people who are elected or appointed, are responsible for making and applying public policy
  4. found guilty of a crime
  5. building or office where people work to represent their government in a foreign country
  6. makes sure that people follow rules
  7. government takes a closer look at financial accounts

12 Clues: in a foreign countryfound guilty of a crimemakes sure that people follow rulesgovernment that oversees individual statesan attempt to gain illegal access to a computergovernment that looks over the country as a wholegovernment takes a closer look at financial accountssmaller group of government responsible for cities and towns...

lesson 30 2015-05-15

lesson 30 crossword puzzle
Across
  1. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  2. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  3. Deciphers the information in an SSL Certificate.
  4. Encrypts the information in an SSL Certificate.
  5. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  6. A malicious program that records keystrokes.
  7. Hackers using spyware to control your browser
Down
  1. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  2. A program that hackers use to capture IDs and passwords on a network.
  3. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  4. Security feature used for larger networks that controls computers from one point.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browserEncrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.Security feature used for larger networks that controls computers from one point....

For People Crossword 2023-10-03

For People Crossword crossword puzzle
Across
  1. SCIFs are built according to the ICD 705 ________ Specifications
  2. The word for the study, investigation and mitigation of compromising emanations
  3. We have offices in Vista, San Diego, and ______ Heights
  4. You need to report any _______ travel to the FSO
  5. The heritage breed of pigs that Land & Feast raises
  6. The type of agriculture that Land & Feast practices
  7. If you get a ______ email, you should send it to the security team!
  8. Lab 7 manufactures waveguides and _________ SCIFs
Down
  1. The fancy breed of chicken Land & Feast sells
  2. Land & Feast’s farm has orchards with lemon and _______ trees
  3. The acronym for a required role for SCIF construction who oversees a construction site
  4. Our first core value
  5. FSO Stands for ______ Security Officer
  6. One thing Adamo's alarm services install is a _________ Detection System
  7. Adamo does RF shielding and ________ protection testing
  8. The manual the FSO team uses is called the ______

16 Clues: Our first core valueFSO Stands for ______ Security OfficerThe fancy breed of chicken Land & Feast sellsYou need to report any _______ travel to the FSOThe manual the FSO team uses is called the ______Lab 7 manufactures waveguides and _________ SCIFsThe heritage breed of pigs that Land & Feast raises...

2025 Compliance & Ethics 2025-10-31

2025 Compliance & Ethics crossword puzzle
Across
  1. A document that provides guidance for how Mindpath or its employees should act
  2. Federal law that protects the privacy and security of patients' health information
  3. A recommendation of a patient to another healthcare provider
  4. The possibility of something bad happening
  5. Moral principles and values governing healthcare practices
  6. Maintaining the confidentiality of patient information
  7. Protecting patient data from unauthorized access or breaches
  8. An official inspection to ensure compliance
  9. The federal agency responsible for investigating healthcare fraud and abuse
Down
  1. A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
  2. Items or services given to healthcare providers as incentives
  3. Adherence to legal and ethical standards in healthcare
  4. Intentional and improper practices that harm patients or defraud the healthcare system
  5. Informing authorities or superiors about unethical or illegal actions
  6. An illegal payment or reward for patient referrals
  7. The unnecessary or excessive use of healthcare resources

16 Clues: The possibility of something bad happeningAn official inspection to ensure complianceAn illegal payment or reward for patient referralsAdherence to legal and ethical standards in healthcareMaintaining the confidentiality of patient informationThe unnecessary or excessive use of healthcare resources...

ICT Cross Word 2019-07-08

ICT Cross Word crossword puzzle
Across
  1. hat hacker a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
  2. A series, or log, of discussion items on a page of the World Wide Web
  3. Items such as images or videos to be include din the final product
  4. rights The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system
  5. Automatic Number Plate Recognition
  6. use this to create spreadsheets
Down
  1. preference or point of view that is personal, rather than scientific.
  2. Measurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
  3. A partiMeasurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
  4. A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
  5. computer software that displays advertisements

11 Clues: use this to create spreadsheetsAutomatic Number Plate Recognitioncomputer software that displays advertisementsItems such as images or videos to be include din the final productpreference or point of view that is personal, rather than scientific.A series, or log, of discussion items on a page of the World Wide Web...

Law Enforcement On Site 2019-08-28

Law Enforcement On Site crossword puzzle
Across
  1. If a suspicious item is found during this type of threat, allow law enforcement to assume and maintain command.
  2. Acronym for the role whose duties include coordinating with law enforcement agencies.
  3. This person discusses with law enforcement on site: DC ________________.
  4. Law enforcement asks about specific crimes or cases that Microsoft may be party to. You pass the information to Global Security ________________.
  5. When documenting law enforcement officials, include their phone number and this other number.
Down
  1. This type of access request is required for law enforcement to enter the facility beyond the lobby.
  2. If law enforcement requests video footage, do not ______________ that security has such footage unless directed by management.
  3. Do not __________ law enforcement officials unless directed to do so by management.
  4. The first action taken by security when a crime is discovered after the fact.
  5. This policy does not apply to law enforcement officials acting in an official capacity.
  6. Where law enforcement representatives should wait while the appropriate people are contacted.

11 Clues: This person discusses with law enforcement on site: DC ________________.The first action taken by security when a crime is discovered after the fact.Do not __________ law enforcement officials unless directed to do so by management.Acronym for the role whose duties include coordinating with law enforcement agencies....

The Kieronasaurus Krossword 2018-01-03

The Kieronasaurus Krossword crossword puzzle
Across
  1. An information classification expressed as numbers only.
  2. bully
  3. the ability to change the displayed content.
  4. Defined as direct physical threat to a country, but could also be a threat to financial security.
  5. The process of data
  6. The amount of information that can be held.
  7. amount of data protection principles.
  8. Examples: digital certificate, encryption, firewall
  9. Announcements or adverts. Small amounts of information sent easily.
  10. Attack on a business's servers not only impacts on the business or individual it holds data for
  11. Data collected by you yourself.
  12. Used to help blind people read.
  13. Computer hardware that cannot be moved
  14. source of information within a DFD
  15. yes or no
Down
  1. Triad
  2. Eliminate "unecessary" bits of information
  3. Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
  4. Raw facts and figures.
  5. Lets you recreate the original file exactly. Breaking a file into a smaller form for transmission.
  6. A closed, private network within a building or company.
  7. The language that websites are written in
  8. Canada's data protection legislation.
  9. footprint Any traceable action you or others take on the internet

24 Clues: Triadbullyyes or noThe process of dataRaw facts and figures.Data collected by you yourself.Used to help blind people read.source of information within a DFDamount of data protection principles.Canada's data protection legislation.Computer hardware that cannot be movedThe language that websites are written in...

Spanish3 crossword puzzle 2023-10-04

Spanish3 crossword puzzle crossword puzzle
Across
  1. population
  2. foreigner, alien
  3. immigration
  4. ignorance, lack of awareness
  5. to reach, achieve
  6. (in)security; (lack of) security
  7. working day; day's journey
  8. worldwide
  9. Displaced
  10. to link, to connect
  11. visa (travel document)
  12. to brake, stop
  13. federation
  14. development, growth, progress
  15. to immigrate (enter a country)
  16. to attain/to be able to
  17. phenomenon
  18. world population
  19. I believe that...
  20. continent, mainland
  21. restart
  22. countries of the world
  23. to exchange, to trade
  24. Immigrants within one's own country
  25. reason
Down
  1. citizenship/the citizens
  2. African Studies Group
  3. we will have (future tense of tener)
  4. analyze, examine
  5. immigrants - la persona que sale de su lugar de origen para llegar a un destino diferente
  6. knowledge, understanding
  7. legal
  8. country, nation
  9. try, attempt
  10. will exist
  11. to travel, journey
  12. to work, have a job
  13. movement, motion
  14. inside, in
  15. ignition, on
  16. to tackle, to board
  17. terrorist (male)
  18. Approach, point of view, focus
  19. to track down
  20. la administración,management
  21. flow
  22. famoso,famous
  23. from the south
  24. to emigrate (leave a country)

49 Clues: flowlegalreasonrestartworldwideDisplacedpopulationwill existfederationphenomenoninside, inimmigrationtry, attemptignition, onto track downfamoso,famousto brake, stopfrom the southcountry, nationforeigner, alienanalyze, examinemovement, motionworld populationterrorist (male)to reach, achieveI believe that...to travel, journeyto link, to connect...

RU ITEC 411 - Chapter 5 2023-11-29

RU ITEC 411 - Chapter 5 crossword puzzle
Across
  1. organization responsible for the development of secure coding standards
  2. computer virus circa 2000 causing billions in damages
  3. 17 down is a type of this
  4. hackers may use resumes from job postings to commit this crime
  5. technology for encrypted payment method using a cell phone
  6. device that records and steals credit card numbers from readers
  7. 2000's act that broadened the scope of 6 down
  8. a vulnerability in a system designed intentionally to attrack criminals
  9. open source encryption software
Down
  1. hacking a mobile phone to circumvent certificate requirements
  2. technology that makes technologies such as the iPhone impossible to crack
  3. hacking for a cause
  4. name of the malware used to attack 11 Down
  5. the first major U.S. computer crime law, passed in the 1980's
  6. a hidden means of accessing a computer
  7. the "target" of a major 2013 data breach
  8. a way for security professionals to test systems for vulnerabilities
  9. law protecting the unauthorized distribution of eBooks, etc.
  10. 1994 act requiring backdoors in cell phones
  11. security measure using "something you are"

20 Clues: hacking for a cause17 down is a type of thisopen source encryption softwarea hidden means of accessing a computerthe "target" of a major 2013 data breachname of the malware used to attack 11 Downsecurity measure using "something you are"1994 act requiring backdoors in cell phones2000's act that broadened the scope of 6 down...