cyber security Crossword Puzzles
Attack and Risk Vectors 2023-08-17
Across
- like pretending to be a legitimate website
- harmful software
- or holding a PC or operation station hostage
- a cybercriminal's path to breach a computer system or network
- tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
- send fake emails
- the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
7 Clues: send fake emails • harmful software • like pretending to be a legitimate website • or holding a PC or operation station hostage • a cybercriminal's path to breach a computer system or network • tricking people into revealing sensitive information, often through deceptive emails or fake websites? • ...
2024 Compliance & Ethics 2023-11-06
Across
- Items or services given to healthcare providers as incentives
- Intentional and improper practices that harm patients or defraud the healthcare system
- Moral principles and values governing healthcare practices
- Informing authorities or superiors about unethical or illegal actions
- An illegal payment or reward for patient referrals
- Adherence to legal and ethical standards in healthcare
Down
- The federal agency responsible for investigating healthcare fraud and abuse
- Protecting patient data from unauthorized access or breaches
- A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
- The unnecessary or excessive use of healthcare resources
- A recommendation of a patient to another healthcare provider
- Federal law that protects the privacy and security of patients' health information
- Maintaining the confidentiality of patient information
- Deceptive and illegal activity in healthcare billing or services
14 Clues: An illegal payment or reward for patient referrals • Maintaining the confidentiality of patient information • Adherence to legal and ethical standards in healthcare • The unnecessary or excessive use of healthcare resources • Moral principles and values governing healthcare practices • Protecting patient data from unauthorized access or breaches • ...
Cyber Grid Crossword Puzzle 2025-03-03
Across
- A system of networks that allows the transfer of data packets
- A popular cloud computing service provided by Microsoft
- A global tech company known for its search engine
- The process of improving a computer's performance by upgrading hardware
- A personal assistant software developed by Apple
- A type of online attack where the attacker floods a system with traffic
- A technology used for displaying virtual objects in real-world environments
- The central processing unit of a computer
Down
- A method for securing a network by monitoring and controlling incoming traffic
- A technology used for wireless communication between devices over short distances
- The protocol used for secure communication over the internet
- A digital currency system that operates independently of a central bank
- A way to store data in the cloud
13 Clues: A way to store data in the cloud • The central processing unit of a computer • A personal assistant software developed by Apple • A global tech company known for its search engine • A popular cloud computing service provided by Microsoft • The protocol used for secure communication over the internet • A system of networks that allows the transfer of data packets • ...
How well do you know MUN. 2017-11-26
Across
- The head of the MUN.
- A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
- These are used if you believe there was a mistake made in the rules of procedure.
- What is the oldest Polish MUN?
- A change to a draft resolution that is on the floor.
Down
- A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
- At the very beginning, it was called ...
- An organization of independent states formed in 1945 to promote international peace and security.
- Refers to the UN Security Council's five permanent members.
- A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
10 Clues: The head of the MUN. • What is the oldest Polish MUN? • At the very beginning, it was called ... • A change to a draft resolution that is on the floor. • Refers to the UN Security Council's five permanent members. • These are used if you believe there was a mistake made in the rules of procedure. • ...
Pengantar Keamanan Informasi 2023-04-13
Across
- melindungi informasi dari perubahan sehingga informasi menjadi akurat dan dapat dipercaya
- tulis security
- membatasi serta melindungi akses informasi hanya untuk yang berhak saja
- memastikan ketersediaan informasi dan kesesuaian format tertentu berdasarkan permintaan pengguna
Down
- melindungi dari social engineering
- jenis keamanan berfokus terhadap keamanan gedung
- fokusnya lebih ke kegiatan atau aktivitas keamanan dalam organisasi
- penggunaan metode enkripsi dalam pengiriman pesan didalam organisasi
- memastikan keamanan perangkat jaringan baik perangkat keras ataupun perangkat lunak
9 Clues: tulis security • melindungi dari social engineering • jenis keamanan berfokus terhadap keamanan gedung • fokusnya lebih ke kegiatan atau aktivitas keamanan dalam organisasi • penggunaan metode enkripsi dalam pengiriman pesan didalam organisasi • membatasi serta melindungi akses informasi hanya untuk yang berhak saja • ...
DFR 5-2-2 À l'aéroport et À la gare 2024-03-07
Across
- Lockers
- The exit
- Ticket puncher
- The waiting room
- The train platform
- A customs officer
- Steward (male)
- The ticket window
- The ticket counter
- The security station
Down
- A train car
- The pilot
- The message board (with times for arrival and departures)
- The baggage claim
- A train
- Stewardess (female)
- Arrivals and departures
- The door / exit
18 Clues: Lockers • A train • The exit • The pilot • A train car • Ticket puncher • Steward (male) • The door / exit • The waiting room • The baggage claim • A customs officer • The ticket window • The train platform • The ticket counter • Stewardess (female) • The security station • Arrivals and departures • The message board (with times for arrival and departures)
Spelling Week 24 Blue Group 2021-04-20
16 Clues: Bad • Well • Safe • A home • It's fun • Can do it • Dehydrated • Easy going • Don't forget • The first one • You eat at the __ • The whole country • You can count on me • Logical or makes sense • Not the back but the __ • A person from America is called an ____
UNIT 4 Crossword! 2012-11-04
16 Clues: mail • view • library • a ticket • security • assistant • connection • a nice hotel • their luggage • some shopping • at the check in • an in flight movie • a gate is at the ______ • I need to change my _______ • I have a _______ for two nights • your flight leaves from _____ 6.
Compliance Crossword Challenge 2014-04-15
Across
- UNAUTHORIZED AQUISITION
- GIVEN TO EVERY PATIENT
- SYMBIUS SYMBOL
- FOUND ON P DRIVE
- RESPONSIBLE FOR COMPLIANCE
- SECURITY OFFICER
- DEGREE OF SOUTH
- PUBLISHED & CERTIFIED
- DETECT & PREVENT VIOLATIONS
Down
- THE POWER
- PROTECTED LOG IN
- MONTHLY UPDATES FOUND
- IN LOCKED DRAWERS
- HIP__A
- PROHIBITS SOMETHING IN EXCHANGE
- RESPECT & WORK ETHICS
16 Clues: HIP__A • THE POWER • SYMBIUS SYMBOL • DEGREE OF SOUTH • PROTECTED LOG IN • FOUND ON P DRIVE • SECURITY OFFICER • IN LOCKED DRAWERS • MONTHLY UPDATES FOUND • PUBLISHED & CERTIFIED • RESPECT & WORK ETHICS • GIVEN TO EVERY PATIENT • UNAUTHORIZED AQUISITION • RESPONSIBLE FOR COMPLIANCE • DETECT & PREVENT VIOLATIONS • PROHIBITS SOMETHING IN EXCHANGE
Topic 1. Technology for Everyone 2023-08-22
16 Clues: [명] 보안 • [명] 기사 • [명] 사생활 • [동] 수송하다 • [동] 협박하다 • [동] 사라지다 • [동] 침해하다 • [명] 장점, 이점 • [명] 희생자, 피해자 • out [동] 알아내다 • into [동] 침입하다 • [분사구] ~을 고려하면 • [형] 돕는, 도움이 되는 • [형] 이롭지 않은, 불리한 • object [명] 일상 용품 • relief [명] 재난 구조(구호)
Cyber Safety Quiz 2025-07-14
Across
- A person who breaks into computer systems
- A harmful program that can damage your computer
- Using a fake name or identity online
- Unwanted or junk emails
- A secret code to access accounts
- information Personal details like name, age, address
Down
- Right and wrong behavior online
- A team that handles internet crime in India
- A fake message trying to steal your personal info
9 Clues: Unwanted or junk emails • Right and wrong behavior online • A secret code to access accounts • Using a fake name or identity online • A person who breaks into computer systems • A team that handles internet crime in India • A harmful program that can damage your computer • A fake message trying to steal your personal info • ...
Oliwia's crossword 2020-11-20
Across
- raising someone to a higher position
- acceptable standard
- employ
- gain profits
- stable, land a job without changes
- a place where people work
- progress
- support, assist
- be tired of working
- coach
- a person who's helping someone
Down
- safety and protection
- experience
- course
- lore, science
- take part in sth
- boost
- keen to run a business universal
- deal with sth
- position in work
20 Clues: boost • coach • course • employ • progress • experience • gain profits • lore, science • deal with sth • support, assist • take part in sth • position in work • acceptable standard • be tired of working • safety and protection • a place where people work • a person who's helping someone • keen to run a business universal • stable, land a job without changes • raising someone to a higher position
Unit 4 On the move (vocab) 2020-04-28
Across
- Landung
- verschütten, auslaufen
- Gepäck
- vorschlagen
- Wahrheit
- Verkehr
- geschlossen
- Zoll
- enthalten
- Sicherheit, Schutz, Wachdienst
- Reisepass
- Flugzeug
- Ankunft
- ausländisch, fremd
- stören, belästigen
- Herberge
Down
- obwohl
- Einwanderung
- Schlaf
- seekrank
- Währung
- Start
- im, ins Ausland
- Fähre
- Visum
- Schalter
- Passagier
- Koffer
- Kontrolle
- Reisender
- Flug
- Verspätung
- Kraut
- murmeln
- Küste
35 Clues: Zoll • Flug • Start • Fähre • Visum • Kraut • Küste • obwohl • Schlaf • Gepäck • Koffer • Landung • Währung • Verkehr • murmeln • Ankunft • seekrank • Wahrheit • Schalter • Flugzeug • Herberge • Passagier • enthalten • Kontrolle • Reisender • Reisepass • Verspätung • vorschlagen • geschlossen • Einwanderung • im, ins Ausland • ausländisch, fremd • stören, belästigen • verschütten, auslaufen • Sicherheit, Schutz, Wachdienst
Unit 7 Crossword 2020-06-04
Across
- üben
- Geheimnis
- veröffentlichen
- Held
- verdienen
- Vertrag
- auftreten, vorführen
- Regie führen
- Selbstvertrauen
- Wohnung
- groß, bedeutend
- vorgeben, so tun als ob
- Beispiel
- Boden, Basis, Unterseite
- Anmerkung, Kommentar
Down
- Geschäft
- Ziel
- erscheinen
- fahren
- Sicherheit
- Erfolg
- Zitat
- Erfolg, Leistung, Errungenschaft
- ablehnen
- versuchen
- folgen
- jmd. zu etwas bringen, inspirieren
- Gründer
- ehrgeizig
- Wache, Wachmann
- Punkt
31 Clues: üben • Ziel • Held • Zitat • Punkt • fahren • Erfolg • folgen • Vertrag • Wohnung • Gründer • Geschäft • ablehnen • Beispiel • Geheimnis • verdienen • versuchen • ehrgeizig • erscheinen • Sicherheit • Regie führen • veröffentlichen • Selbstvertrauen • Wache, Wachmann • groß, bedeutend • auftreten, vorführen • Anmerkung, Kommentar • vorgeben, so tun als ob • Boden, Basis, Unterseite • Erfolg, Leistung, Errungenschaft • ...
En Avion Chapter 1 2021-11-09
30 Clues: Seat • Name • Aisle • Plane • Agent • Delay • A trip • Runway • Ticket • Number • Counter • Landing • To land • To show • Airport • On time • Airline • To wait • To board • Security • Suitcase • Fastened • Passenger • Sometimes • Seat Belt • To Take off • Plane window • trunk of car • To wait in line • to put, to place
TVHS 2021-12-09
Across
- Keeps us safe
- Art teacher
- Makes sure you're behaving
- Big distraction
- Where you eat lunch
- Senior goal
- Sound between classes
- Found in coffee
- Social Studies teacher
- Found in the parking lot
Down
- Mandate item
- Math teacher
- School attendee
- Ms. Robinson's dogs
- Often mechanical
- Teacher with loudest laugh
- School mascot
- Favorite lunch for many
- School transportation
- What we pledge to
20 Clues: Art teacher • Senior goal • Mandate item • Math teacher • Keeps us safe • School mascot • School attendee • Big distraction • Found in coffee • Often mechanical • What we pledge to • Ms. Robinson's dogs • Where you eat lunch • Sound between classes • School transportation • Social Studies teacher • Favorite lunch for many • Found in the parking lot • Teacher with loudest laugh • ...
Bakes ELA 2022-04-07
20 Clues: attend • hurled • beyond • a place • they are • revealed • to a place • at the time • writing paper • gleamed glowed • simple or common • a place or thing • part of something • a ruler of conduct • wholly or entirely • still and peacefull • in a fixed position • the head of a school • Quiet order and security • a flat object tool an airplane
Values 2015-07-28
31 Clues: fair • rich • calm • love • money • build • mates • smart • happy • people • family • Famous • Others • suburb • manners • protect • truthful • knowledge • celebrate • have trust • good sport • Development • electricity • be faithful • to be honest • not being sick • Accomplishment • show good sport • equal opportunity • like looking at it • doing it by your self
Dog Breeds 2023-03-25
Across
- Peek-a-boo Hairdo
- Ears are longer then legs
- Has an ugly Mug
- Snoopy is One
- Security Guard
- He’s a Fighter
- A Footlong Hot Dog
- Firehouse Favorite
- Gives Directions
- PA State Dog
- Sled Propeller
- Pampered Pooch
Down
- The Crime Dog
- Bull Little Rascal Petey
- Deutschland Herder
- Ravishing Redhead
- Speed King
- Yellow Go Getter
- Lassie Lineage
- Georgia's Uga
20 Clues: Speed King • PA State Dog • The Crime Dog • Snoopy is One • Georgia's Uga • Security Guard • He’s a Fighter • Lassie Lineage • Sled Propeller • Pampered Pooch • Has an ugly Mug • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • A Footlong Hot Dog • Firehouse Favorite • Bull Little Rascal Petey • Ears are longer then legs
AMONG US 2021-03-05
Across
- Grab a drink
- Fix Impurities
- Top Align Output
- Check People's Locations
- Shoot Asteroids
- Fix Lights
- Clear Air Valve
- Scan
- To Decontamination
- Fix Meltdown
- Chart Course
Down
- Grab Watering Can
- Use weather Balloons To scan Weather
- Hallway To Reactor and Laboratory
- Water Plants
- Check Cams
- Organize Specimen
- Contact Other ships
- Fix Lights and Upload Data
- Bottom Align Output
- Spawnpoint
21 Clues: Scan • Check Cams • Fix Lights • Spawnpoint • Grab a drink • Water Plants • Fix Meltdown • Chart Course • Fix Impurities • Shoot Asteroids • Clear Air Valve • Top Align Output • Grab Watering Can • Organize Specimen • To Decontamination • Contact Other ships • Bottom Align Output • Check People's Locations • Fix Lights and Upload Data • Hallway To Reactor and Laboratory • ...
En el Aeropuerto: ¡A Buscar Palabras! 2024-11-30
32 Clues: crew • gate • shop • seat • aisle • delay • flight • ticket • office • window • landing • airport • takeoff • luggage • arrival • check-in • suitcase • airplane • bathroom • passport • transfer • departure • to-travel • cafeteria • connection • restaurant • information • boarding-pass • boarding-area • early-morning • police-station • security-check
18 2025-03-01
Across
- Road congestion
- Luck or riches
- Cooking space
- Personal diary
- Land surface
- Weather patterns
- Workplace leader
- Purchase proof
- Wind movement
- Information security
- Art creator
- Travel bags
Down
- Digital program
- Bill settlement
- Small vehicle
- Questioning process
- Musical event
- Financial system
- Sport center
- Story writer
- Book storage
- Delivered parcel
- Plane arrival
- Flight hub
- Reserved funds
25 Clues: Flight hub • Art creator • Travel bags • Sport center • Story writer • Land surface • Book storage • Small vehicle • Musical event • Cooking space • Wind movement • Plane arrival • Luck or riches • Personal diary • Purchase proof • Reserved funds • Digital program • Bill settlement • Road congestion • Financial system • Weather patterns • Workplace leader • Delivered parcel • Questioning process • Information security
44 2025-03-02
Across
- Important article title
- Learning individual
- Cultural event
- Spectators in attendance
- Strength to act
- Plan of action
- Redeemable coupon
- Past events
- Holding place
- Helps organize
- Lower price
Down
- Powers batteries
- Protection from harm
- Risky project
- Buys items
- Helping the needy
- Writing pad
- Trends in style
- Career coach
- Staying in shape
- International ID
- Good deal
- Holds items
- Main news title
- Something sold
25 Clues: Good deal • Buys items • Writing pad • Holds items • Past events • Lower price • Career coach • Risky project • Holding place • Cultural event • Plan of action • Something sold • Helps organize • Trends in style • Strength to act • Main news title • Powers batteries • Staying in shape • International ID • Helping the needy • Redeemable coupon • Learning individual • Protection from harm • Important article title • ...
Unit 8: Future Innovations 2025-10-19
Across
- virus malware, bug
- show, illustrate
- power, energize
- electronic junk, discarded devices
- guess, assume
- input, type
- insert, embed
- up with stay informed, catch up
Down
- customize, tailor
- technology online meeting tool, virtual communication system
- modify, alter
- expand, widen
- inspire, encourage
- collaborate, work together
- blame, judge
- privacy information security, data protection
- highlight, stress
- intimidate, endanger
- chip, processor
- up against face, encounter
20 Clues: input, type • blame, judge • modify, alter • expand, widen • guess, assume • insert, embed • power, energize • chip, processor • show, illustrate • customize, tailor • highlight, stress • inspire, encourage • virus malware, bug • intimidate, endanger • collaborate, work together • up against face, encounter • up with stay informed, catch up • electronic junk, discarded devices • ...
Cashless society 2024-09-03
Across
- internet
- payment
- with cashless
- goods for sale
- its own advantages and weakness
- digital
- digital
- rates are lower
- transactions
- make life easier
Down
- big sums
- money cost more
- are conducted without the usage of cash
- used for electronic transactions
- the usage of cash
- makes people high value
- can easily withdraw
- cash safely
- divices or codes for security
- to do
20 Clues: to do • payment • digital • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • the usage of cash • can easily withdraw • makes people high value • divices or codes for security • its own advantages and weakness • used for electronic transactions • are conducted without the usage of cash
GROWING UP 2024-11-21
19 Clues: Tube power • All you need • Former middle • Proud heritage • First sailboat • Endearing name • Big and little • Important group • Town where born • To get your way • Preferred snack • Learned to cheat • Food of the gods • Sweet used twice • Passed the torch • Security and love • Cold chicken items • Love at first suck • Farmers market love
GROWING UP 2024-11-21
19 Clues: Tube power • All you need • Former middle • Big and little • First sailboat • Endearing name • Proud heritage • Important group • Town where born • Preferred snack • To get your way • Food of the gods • Passed the torch • Sweet used twice • Learned to cheat • Security and love • Cold chicken items • Love at first suck • Farmers market love
Hello 7% - Stage 1 2018-10-21
Across
- To display
- First during application
- Pending completion
- All under one roof
- Take up a loss
- Empowered for business
- Spread out
- Allocated to a client
- Not good in nature
Down
- Offset
- Stored safely
- Important to account receivables
- Contractual lending
- Provide money
- Due regularly
- Advanced facility
- Facing possibility of loss
17 Clues: Offset • To display • Spread out • Stored safely • Provide money • Due regularly • Take up a loss • Advanced facility • Pending completion • All under one roof • Not good in nature • Contractual lending • Allocated to a client • Empowered for business • First during application • Facing possibility of loss • Important to account receivables
The Lightning Thief 2023-12-11
17 Clues: A fury • A satyr • A ¨pen¨ • Is chriron • God of war • Supreme God • Son of hermes • Main character • Mother of percy • God of the Ocean • daughter of Ares • Turned into a tree • Daughter of Athena • Disguised as aunty em • God of the Underworld • Married to Sally Jackson • Underworld Security Gaurd
AMS 2024-12-11
17 Clues: vollyball • husky who • the reporter • a big doggie • the tall one • wanna payday • the big apple • foster failing • granting wishes • Best of the Best • show me the money • hurricane rangler • human encyclopedia • on the north border • all things Learning • do you need security • new kid on the block
Literasi Digital 2024-08-19
Across
- Orang yang memiliki pengaruh besar di media sosial
- Teknologi untuk menghubungkan perangkat tanpa kabel.
- Simbol "#" yang digunakan untuk menandai kata kunci di media sosial.
- Istilah yang berkaitan dengan dunia maya.
- Perangkat yang mengarahkan lalu lintas data di jaringan.
- Berita bohong yang sering disebarkan di internet.
- Gambar kecil yang digunakan untuk mengekspresikan emosi secara digital.
- Data yang disimpan oleh browser untuk melacak aktivitas pengguna.
- Langkah-langkah sistematis dalam pemrosesan data.
- Dunia maya atau internet, tempat terjadinya interaksi digital.
- File audio digital yang bisa diunduh atau didengarkan secara online.
- Proses masuk ke dalam sistem atau aplikasi
- Gambar yang diambil dari layar perangkat
- Nama unik yang digunakan untuk mengidentifikasi situs web.
- Tautan yang menghubungkan ke halaman web lain.
- Mengirim pesan singkat melalui perangkat digital
- Transaksi jual beli secara online.
- Kunci rahasia yang digunakan untuk melindungi akun
- Media sosial untuk berkomunikasi dan berbagi konten.
- Salinan data yang digunakan untuk pemulihan jika data asli hilang
- Tempat penyimpanan data online yang dapat diakses dari mana saja
- Singkatan dari jaringan sosial yang sering digunakan untuk berbagi foto dan video pendek.
- Proses mengamankan data dengan mengubahnya menjadi kode.
- Proses mengirim file ke internet.
- Sistem keamanan yang melindungi jaringan komputer dari akses tidak sah.
Down
- Platform online untuk diskusi dan berbagi informasi.
- Program otomatis yang dapat berbicara dengan pengguna.
- Perlindungan terhadap akses yang tidak sah.
- Aplikasi yang memfasilitasi pembelajaran online.
- Alat yang sering digunakan untuk melakukan percakapan video jarak jauh
- Teknologi yang melibatkan penggunaan komputer dan internet.
- Perangkat elektronik kecil seperti smartphone.
- Sistem pengiriman pesan teks singkat melalui ponsel
- Kata lain untuk peretas yang sering melakukan kejahatan siber
- Perlindungan atas data pribadi seseorang.
- Aplikasi untuk mengakses halaman web.
- Aplikasi yang digunakan untuk mengakses informasi di internet
- Jaringan nirkabel untuk mengakses internet
- Perangkat input untuk mengetik pada komputer.
- Perangkat lunak berbahaya yang dapat merusak komputer.
- Penyimpanan data di internet.
- Penggunaan lebih dari satu bentuk media komunikasi, seperti teks, audio, dan video.
- Gambar atau ikon yang mewakili seseorang di dunia digital.
- Singkatan dari Internet Protocol, alamat unik untuk setiap perangkat yang terhubung ke internet.
- Alamat unik dari sebuah halaman web.
- Urutan kronologis dari postingan di media sosial.
- Sarana untuk menyampaikan informasi.
- Orang yang sengaja memicu perdebatan atau menebar kebencian di internet.
- Informasi yang disajikan di internet, seperti teks, gambar, dan video.
- Orang yang sengaja memicu perdebatan atau menebar kebencian di internet.
50 Clues: Penyimpanan data di internet. • Proses mengirim file ke internet. • Transaksi jual beli secara online. • Alamat unik dari sebuah halaman web. • Sarana untuk menyampaikan informasi. • Aplikasi untuk mengakses halaman web. • Gambar yang diambil dari layar perangkat • Istilah yang berkaitan dengan dunia maya. • Perlindungan atas data pribadi seseorang. • ...
Sicher im Netz 2022-06-09
Across
- Gespeicherte Medien auf einem Computer
- Das Bloßstellen oder Beleidigen bzw Belästigen anderer Personen im Internet
- Anderes Wort für Computer
Down
- Das Ausgeben als ein anderer um Daten etc. zu stehlen
- Personen die in gesicherte Systeme eindringe
- Ein Fehler in Systemen der am ersten Tag nach einem Update ausgenutzt wird
6 Clues: Anderes Wort für Computer • Gespeicherte Medien auf einem Computer • Personen die in gesicherte Systeme eindringe • Das Ausgeben als ein anderer um Daten etc. zu stehlen • Ein Fehler in Systemen der am ersten Tag nach einem Update ausgenutzt wird • Das Bloßstellen oder Beleidigen bzw Belästigen anderer Personen im Internet
9th M4 L2 Crossword 2024-02-25
13 Clues: easy • to give • security • look for • amusement • dangerous • advantages • opposite of "more" • to send and receive • to make something weak • to make something short • someone who consumes something • someone who steals other's personal details
Aviation Crossword #1 2020-09-07
16 Clues: 370 • Shamrock • Engine force • Positive rate • Major air show • African carrier • Shoes off please • New York airport • Extendible walkway • Major A350 operator • Large cargo airline • Miracle on the Hudson • No passport necessary • Genuine typo or PR stunt? • Russian aircraft manufacturer • Large general aviation manufacturer
Stakeholders 2023-03-13
Across
- Can influence by allowing credit terms or offering discounts
- Can exert different styles of management which will impact morale
- Employees can exert negative influence by doing this
- Interested in organisations generating profit to increase taxation payment
- Interested in high quality products for a fair price
- A way in which managers may influence organisations
- What a business risks losing if customers shop elsewhere
Down
- The way in which the government can exert influence
- Interested in the financial security of the organisation
- Interested in an organisation respecting the environment they are working in
- Shareholders influence by doing this at an Annual General Meeting
- Interested in fair wages and job security
- Pressure groups are likely to exert influence in this way
13 Clues: Interested in fair wages and job security • The way in which the government can exert influence • A way in which managers may influence organisations • Employees can exert negative influence by doing this • Interested in high quality products for a fair price • Interested in the financial security of the organisation • ...
Caleb - Bullying 2022-05-17
Across
- Sally calls Jessie mean names. What type of bullying is this.
- What is the C in the ABCD's of bullying.
- The person who just stands and watches the bullying.
- Sally invites everyone except for Jessie to her birthday party. What type of bullying is this.
- The person who stands up for the victim of bullying.
- Jake calls Jessie rude names over the game. What type of bullying is this.
- Sally hits Jessie. What type of bullying is this.
- What is the A in the ABCD's of bullying.
Down
- What is the B in the ABCD's of bullying.
- The victim of the bullying.
- What is the D in the ABCD's of bullying.
- The person who does the bullying.
- Bullying can start at _____ age.
- Bullying may raise the risk of ________.
14 Clues: The victim of the bullying. • Bullying can start at _____ age. • The person who does the bullying. • What is the B in the ABCD's of bullying. • What is the C in the ABCD's of bullying. • What is the D in the ABCD's of bullying. • Bullying may raise the risk of ________. • What is the A in the ABCD's of bullying. • Sally hits Jessie. What type of bullying is this. • ...
Economics Vocabulary 2013-04-20
Across
- The probability that an actual return on an investment will be lower than the expected return.
- Economic freedom from the occurrence or risk of injury, danger, or loss. Promise of returns in case of economic damages or losses.
- Payments made by a corporation to its shareholder members.
- The degree to which an asset or security can be bought or sold in the market without affecting the asset's price.
- Company A company that owns enough voting stock in another firm to control management and operations by influencing or electing its board of directors
- A rise in value or price, especially over time.
- An increase in stock price
- Purchasable shares of a company
- To commit (money or capital) in order to gain a financial return
Down
- A stock or other security such as a mutual fund
- An individual or institution (including a corporation) that legally owns a share of stock in a public or private corporation.
- A Decrease in stock price
- A group or organization of owners
- Debt security, under which the issuer owes the holders a debt and, depending on the terms of the bond, is obliged to pay them interest, and/or to repay the principal at a later date
- Is anything that can be offered to a market that might satisfy a want or need
- Generally expressed in units of some form of currency.
- The return received on a business undertaking after all operating expenses have been met.
- Provides deposit insurance guaranteeing the safety of a depositor's accounts in member banks up to $250,000 for each deposit ownership category in each insured bank
18 Clues: A Decrease in stock price • An increase in stock price • Purchasable shares of a company • A group or organization of owners • A stock or other security such as a mutual fund • A rise in value or price, especially over time. • Generally expressed in units of some form of currency. • Payments made by a corporation to its shareholder members. • ...
DavionMcquinn-Bulling crossword 2020-11-30
Across
- the type of bullying that is done online
- antentionally excluding someone from an online group
- repeatedly sending abusive, insulting, or unwanted messages
- the person stands and watches someone getting bullied?
- antentionally excluding someone from an online group
- the person that is getting made fun of?
Down
- repeated, intense harassment and denigration that includes threats or creates significant fear
- what is the d of ABC and d's of bulling
- the person who stands up to the bully?
- what is the a of the ABC and D' of bulling?
- Disclosing someone else’s secrets or embarrassing information online without their consent
- what is the c of the abc and d's of bulling
- the person that is being mean to someone?
13 Clues: the person who stands up to the bully? • what is the d of ABC and d's of bulling • the person that is getting made fun of? • the type of bullying that is done online • the person that is being mean to someone? • what is the a of the ABC and D' of bulling? • what is the c of the abc and d's of bulling • antentionally excluding someone from an online group • ...
SHOPPING 2025-10-30
Across
- – To pay at the "caja", whether in a mall or market.
- – The offers during special events like Hot Sale or Cyber Days.
- – The good deals (gangas) found by haggling at a market.
- – To see the stalls in a feria artesanal without buying.
- – High-end fashion from a boutique in Larcomar.
- – The inevitable line to pay at a busy supermarket like Tottus.
- – Family-run "bodega" or "feria" stall, contrasting with the mega-plaza.
- – "Descuentos" advertised during the "Liquidación" sales.
Down
- – Familiar retail names like Ripley or Saga Falabella found in every mall.
- – To have enough money to buy something.
- – Shoppers hunting for the best prices in a market.
- – Description for Gamarra market clothing or Polvos Azules electronics.
12 Clues: – To have enough money to buy something. • – High-end fashion from a boutique in Larcomar. • – Shoppers hunting for the best prices in a market. • – To pay at the "caja", whether in a mall or market. • – The good deals (gangas) found by haggling at a market. • – To see the stalls in a feria artesanal without buying. • ...
CIS 2013-03-04
13 Clues: Radio • SatCom • Antenna • Back up • CIS Exercise • SatCom Light • Always on top • Mobile Generator • Comcen secure item • New concept, replacing CMX • Mobile Telephone Switchboard • Looking for a cable of RJ-45? • Information security regulations
Career Pathways 2025-01-09
13 Clues: services • Sciences • technology • and Tourism • and training • and construction • food & natural resources • distribution & logistics • and Public Administration • management and Administration • a/v technology and communications • public safety, corrections & security • technology, engineering, and mathematics
Data Communication Networks 2023-11-06
13 Clues: OSI • LAN • TCP/IP • IEEE802.11 • IEEE 802.22 • IEEE 802.16 • Set of Rules • Mbps to Gbps • Wireless LAN Technology • Energy Efficient Metrics • Perfomance,Relaiability,Security • Elelctroncis Industries Association • Test, Evaluate and standardize new technologies
Economics Vocabulary 2013-04-20
Across
- The probability that an actual return on an investment will be lower than the expected return.
- Economic freedom from the occurrence or risk of injury, danger, or loss. Promise of returns in case of economic damages or losses.
- Payments made by a corporation to its shareholder members.
- The degree to which an asset or security can be bought or sold in the market without affecting the asset's price.
- Company A company that owns enough voting stock in another firm to control management and operations by influencing or electing its board of directors
- A rise in value or price, especially over time.
- An increase in stock price
- Purchasable shares of a company
- To commit (money or capital) in order to gain a financial return
Down
- A stock or other security such as a mutual fund
- An individual or institution (including a corporation) that legally owns a share of stock in a public or private corporation.
- A Decrease in stock price
- A group or organization of owners
- Debt security, under which the issuer owes the holders a debt and, depending on the terms of the bond, is obliged to pay them interest, and/or to repay the principal at a later date
- Is anything that can be offered to a market that might satisfy a want or need
- Generally expressed in units of some form of currency.
- The return received on a business undertaking after all operating expenses have been met.
- Provides deposit insurance guaranteeing the safety of a depositor's accounts in member banks up to $250,000 for each deposit ownership category in each insured bank
18 Clues: A Decrease in stock price • An increase in stock price • Purchasable shares of a company • A group or organization of owners • A stock or other security such as a mutual fund • A rise in value or price, especially over time. • Generally expressed in units of some form of currency. • Payments made by a corporation to its shareholder members. • ...
Antivirus 2022-12-09
CRIS-E 2017-01-19
Across
- EGATEWAY APPLICATION SCREEN
- EGATEWAY RUNNING RECORD SCREEN
- SSN LOOK-UP SCREEN
- ENUMERATION SCREEN
- CASH SCREEN
- FOOD STAMP SCREEN
- UNEARNED INCOME SCREEN
- SANCTION SCREEN
- HOME SCREEN
- UTILITY SCREEN
- ENUMERATION SCREEN
- NOTICE SCREEN
Down
- AUTH REP SCREEN
- ERROR CODE SCREEN
- SEARCH SCREEN
- SHELTER SCREEN
- EMPLOYMENT SCREEN
- HELP SCREEN
- SOCIAL SECURITY/MEDICARE SCREEN
- EARNED INCOME SCREEN
- WEP ASSIGNMENT SCREEN
- RUNNING RECORD SCREEN
22 Clues: CASH SCREEN • HELP SCREEN • HOME SCREEN • SEARCH SCREEN • NOTICE SCREEN • SHELTER SCREEN • UTILITY SCREEN • AUTH REP SCREEN • SANCTION SCREEN • ERROR CODE SCREEN • EMPLOYMENT SCREEN • FOOD STAMP SCREEN • SSN LOOK-UP SCREEN • ENUMERATION SCREEN • ENUMERATION SCREEN • EARNED INCOME SCREEN • WEP ASSIGNMENT SCREEN • RUNNING RECORD SCREEN • UNEARNED INCOME SCREEN • EGATEWAY APPLICATION SCREEN • ...
Fun Words 2014-02-09
Across
- unintelligible talk
- stated clearly
- bend down
- ruins
- without security
- open
- alone
- calamity
- main
- dive
- writer
- light vessel
- entice
- sully
Down
- add strength to
- lessen
- fear of something wrong
- accordingly
- encourage
- leaning
- trembling
- lithe
- not quenched
- Greek god of love
- restraint of liberty
- fastener
- indentation on the coast
- energy lassitude
- woman's headband
29 Clues: open • main • dive • ruins • alone • lithe • sully • lessen • writer • entice • leaning • calamity • fastener • encourage • bend down • trembling • accordingly • not quenched • light vessel • stated clearly • add strength to • without security • energy lassitude • woman's headband • Greek god of love • unintelligible talk • restraint of liberty • fear of something wrong • indentation on the coast
Fun Words 2014-02-09
Across
- unintelligible talk
- stated clearly
- bend down
- ruins
- without security
- open
- alone
- calamity
- main
- dive
- writer
- light vessel
- entice
- sully
Down
- add strength to
- lessen
- fear of something wrong
- accordingly
- encourage
- leaning
- trembling
- lithe
- not quenched
- Greek god of love
- restraint of liberty
- fastener
- indentation on the coast
- energy lassitude
- woman's headband
29 Clues: open • main • dive • ruins • alone • lithe • sully • lessen • writer • entice • leaning • calamity • fastener • encourage • bend down • trembling • accordingly • not quenched • light vessel • stated clearly • add strength to • without security • energy lassitude • woman's headband • Greek god of love • unintelligible talk • restraint of liberty • fear of something wrong • indentation on the coast
PCJCC Staff Word Search 2021-08-11
Across
- OA/CTS Director
- Education & Training Director
- MBC/Pharm Tech Counselor
- Electrical/Plumbing/Carpentry Counselor
- Health & Wellness Director
- MyPACE Counselor
- Finance & Administration Director
- CSIO
- Cafeteria Manager
- Center Director
- Records Manager
- Safety & Security manager
Down
- Disability Coordinator
- SGA Advisor
- CNA Counselor
- Social Development Director
- CTT Manager
- Facility Maintenance Counselor
- CMA Counselor
- CMHC
- TEAP Specialist
- Academic Manager
- Counseling Manager
23 Clues: CMHC • CSIO • SGA Advisor • CTT Manager • CNA Counselor • CMA Counselor • OA/CTS Director • TEAP Specialist • Center Director • Records Manager • MyPACE Counselor • Academic Manager • Cafeteria Manager • Counseling Manager • Disability Coordinator • MBC/Pharm Tech Counselor • Safety & Security manager • Health & Wellness Director • Social Development Director • Education & Training Director • ...
Spanish 3A- Vocabulario Review 2021-11-11
Across
- ARRIVAL
- CUSTOMS
- FLIGHT ATTENDANT
- PLAN FOR TRAVELING
- SECURITY
- GATE
- IDENTIFICATION
- TO BOARD
- BOARDING PASS
- PLACE TO BUY TICKETS
Down
- TO LOOK AT FOR FLIGHT UPDATES
- TAKE A CAB
- TICKET
- FLIGHT
- VACATION
- PASSPORT
- PERSON WHO HELP YOU WITH FLIGHTS
- LUGGAGE
- PACK A SUITCASE
- TO TRAVEL
- BATHING SUIT
- STAND IN LINE
- CONFIRM FLIGHT
- SUITACASE
- AIRPORT
25 Clues: GATE • TICKET • FLIGHT • ARRIVAL • CUSTOMS • LUGGAGE • AIRPORT • VACATION • PASSPORT • SECURITY • TO BOARD • TO TRAVEL • SUITACASE • TAKE A CAB • BATHING SUIT • STAND IN LINE • BOARDING PASS • CONFIRM FLIGHT • IDENTIFICATION • PACK A SUITCASE • FLIGHT ATTENDANT • PLAN FOR TRAVELING • PLACE TO BUY TICKETS • TO LOOK AT FOR FLIGHT UPDATES • PERSON WHO HELP YOU WITH FLIGHTS
Travel around the world 2021-05-10
Across
- Country in North America
- a place with the highest population
- 71% of the earth
- meet new people
- Capital of Canada
- directions
- country security
- island in Caribbean sea
Down
- continent
- travel buddy
- luggage
- Capital of Ontario
- west coast
- worlds largest country
- planet
- identification
- a long trip by car
- Capital of Australia
- body of water
- air transportation
- look around
21 Clues: planet • luggage • continent • west coast • directions • look around • travel buddy • body of water • identification • meet new people • 71% of the earth • country security • Capital of Canada • Capital of Ontario • a long trip by car • air transportation • Capital of Australia • worlds largest country • island in Caribbean sea • Country in North America • a place with the highest population
Unit 1 Lesson 1 Crossword (3/4) 2023-09-15
Across
- gate
- flight attendant
- travel agent
- suitcase
- luggage
- customs
- to board
- to confirm
- passenger
- to pack a suitcase
- flight
- airport
- monitor/screen
- roudtrip ticket
Down
- to check ones luggage
- to go on vacation
- departure
- boarding pass
- swimsuit
- itinerary
- to travel
- go through security
- to call someone
- flight
- to get in line
- travel agency
- arrival
- ticket
28 Clues: gate • flight • flight • ticket • luggage • customs • arrival • airport • swimsuit • suitcase • to board • departure • itinerary • to travel • passenger • to confirm • travel agent • boarding pass • travel agency • to get in line • monitor/screen • to call someone • roudtrip ticket • flight attendant • to go on vacation • to pack a suitcase • go through security • to check ones luggage
Avancemos 2 1.1 Vocab 2023-10-02
25 Clues: gate • screen • flight • ticket • arrival • luggage • airport • passport • to board • to travel • passenger • departure • itinerary • boarding pass • travel agency • baggage claim • to get in line • to take a taxi • to call someone • to check luggage • flight attendant • to go on vacation • to pack a suitcase • to go through customs • to go through security
Helvetians Vocab 2023-03-08
Across
- old antique shop
- useless worthless
- virtue food water shelter
- plot a conspiracy
- hostage criminal leverage
- safety security
- end ______ line
- attack slide for
- wickedness Of the west
- more than greater
Down
- ancestors DNA
- crime free money
- undertake underestimate
- bridge Golden Gate
- pardon judge
- learn dance class
- have in mind think
- stay remain
- set aside put down
- ambassador president of the USA
20 Clues: stay remain • pardon judge • ancestors DNA • safety security • end ______ line • crime free money • old antique shop • attack slide for • useless worthless • learn dance class • plot a conspiracy • more than greater • bridge Golden Gate • have in mind think • set aside put down • wickedness Of the west • undertake underestimate • virtue food water shelter • hostage criminal leverage • ...
Basic concepts of logistics 2023-03-01
Across
- minőség
- termelés
- elosztás
- multicég
- leányvállalatok
- vevő
- árucsere
- csomagolás
- munka költség
- igény
- kereskedelem
- beszerző
- készlet
- dolgok áramlása
- felszerelés
Down
- mennyiség
- fogyasztói pont
- beszerzés
- nagykereskedés
- étel
- szállítás
- biztosítás
- források
- raktározás
- külföldi valuta
- biztonság
- eredőpont
- kiskereskedés
- pénzügy
- elszállásol
- tulajdonjog
- kivitel (áru)
- kielégít, teljesít
- behozatal (áru)
- megfelelő
- anyag
36 Clues: étel • vevő • igény • anyag • minőség • pénzügy • készlet • termelés • elosztás • multicég • források • árucsere • beszerző • mennyiség • beszerzés • szállítás • biztonság • eredőpont • megfelelő • biztosítás • raktározás • csomagolás • elszállásol • tulajdonjog • felszerelés • kereskedelem • kiskereskedés • munka költség • kivitel (áru) • nagykereskedés • fogyasztói pont • leányvállalatok • külföldi valuta • behozatal (áru) • dolgok áramlása • ...
CIS178 Jake Stevenson 2023-01-25
Across
- virtual private network
- posing as authorized user
- type of malware
- protects you from virus
- protecting online data
- explicitly allowed
- security system
- malicious software
- explicitly not allowed
- not human
- gaining unauthorized access
Down
- network of networks
- type of scam
- protects you from malware
- harassment on the internet
- unsolicited advertisements
- two-factor authentication
- another word for information
- securing data
- human verification test
20 Clues: not human • type of scam • securing data • type of malware • security system • explicitly allowed • malicious software • network of networks • protecting online data • explicitly not allowed • virtual private network • protects you from virus • human verification test • posing as authorized user • protects you from malware • two-factor authentication • harassment on the internet • ...
Unit 4 start: matkustussanasto TB s.68-69 2025-01-28
Across
- terminaali
- ravintolavaunu
- raide
- passin tarkastus
- lippuautomaatti
- satama
- tulli
- matkatavarat
- lentokone
- junanvaunu
- portti
- juna
- lähtevät lennot
- matkalaukku
- kuulutus
Down
- turvatarkastus
- matkatavaroiden jättö
- myyntiautomaatti
- itsepalvelu check-in
- lentoemäntä
- koneeseennousukortti
- saapuvat lennot
- istumapaikka
- kyltti
- lautta
- matkustaja
- juna-asema
- lippu
- konduktööri
29 Clues: juna • raide • tulli • lippu • kyltti • lautta • satama • portti • kuulutus • lentokone • terminaali • matkustaja • juna-asema • junanvaunu • lentoemäntä • matkalaukku • konduktööri • istumapaikka • matkatavarat • turvatarkastus • ravintolavaunu • saapuvat lennot • lippuautomaatti • lähtevät lennot • myyntiautomaatti • passin tarkastus • itsepalvelu check-in • koneeseennousukortti • matkatavaroiden jättö
Heists Gone Wrong 2025-01-24
Across
- Sack for stolen goods.
- Disguise worn by robbers.
- Getaway vehicle.
- Escape route underground.
- Law enforcement pursuit.
- Captive during the heist.
- Bank's secure storage.
- Security device.
- Failed getaway attempt.
- Traced call.
- Stolen treasure.
- Map for a robbery.
Down
- Alert system activated.
- Botched operation.
- Beam catching thieves.
- Unmarked bills.
- Scheme for a heist.
- Fake trail.
- Guard for trouble.
- Accomplice in crime.
20 Clues: Fake trail. • Traced call. • Unmarked bills. • Getaway vehicle. • Security device. • Stolen treasure. • Botched operation. • Guard for trouble. • Map for a robbery. • Scheme for a heist. • Accomplice in crime. • Sack for stolen goods. • Beam catching thieves. • Bank's secure storage. • Alert system activated. • Failed getaway attempt. • Law enforcement pursuit. • Disguise worn by robbers. • ...
36 2025-03-02
Across
- Helping the needy
- Past events
- Important article title
- Holding place
- Career coach
- Staying in shape
- Trends in style
- Writing pad
- Buys items
- Powers batteries
- Plan of action
- Helps organize
Down
- Spectators in attendance
- Something sold
- Main news title
- Redeemable coupon
- Holds items
- Risky project
- International ID
- Strength to act
- Cultural event
- Protection from harm
- Good deal
- Lower price
- Learning individual
25 Clues: Good deal • Buys items • Holds items • Past events • Writing pad • Lower price • Career coach • Risky project • Holding place • Something sold • Cultural event • Plan of action • Helps organize • Main news title • Strength to act • Trends in style • International ID • Staying in shape • Powers batteries • Helping the needy • Redeemable coupon • Learning individual • Protection from harm • Important article title • ...
Vocab 4-Aldred, Noah, Yong, Trivia 2024-11-05
Across
- Selfish
- eat fast
- Mundane
- Bad taste, smell, or feeling
- Impatient and annoyed
- Go to a safe place
- Procedures
- a sense of security provided for people
- going undercover
- Stupid or easily fooled
- showing pity
- Birth of the Gods
Down
- Smart or not easily fooled
- Shipwreck or ship sinking
- Ritual
- Swollen
- Inadequate, limited
- Crime, offense, violation
- living in the old days
- Disguise
20 Clues: Ritual • Selfish • Mundane • Swollen • eat fast • Disguise • Procedures • showing pity • going undercover • Birth of the Gods • Go to a safe place • Inadequate, limited • Impatient and annoyed • living in the old days • Stupid or easily fooled • Shipwreck or ship sinking • Crime, offense, violation • Smart or not easily fooled • Bad taste, smell, or feeling • a sense of security provided for people
Olympic ceremony _ TWJ _ issue 225 2024-11-26
24 Clues: Cờ • An ninh • Bắt giữ • Bắt buộc • Đặc điểm • Quốc gia • Đại diện • Trì hoãn • Sáng tạo • Gián đoạn • Nghi phạm • Diễu hành • Gián đoạn • Cố ý (adv) • Huy chương • Giải thưởng • Tuyến đường • Sân vận động • Màn biểu diễn • Tháp, tòa nhà • Vận động viên • Cơ sở vật chất • team Đội tị nạn • Có thể nhìn thấy
TEST 2025-10-20
27 Clues: Racks • Power • Power • STID? • Camera • Storage • Display • No Idea • Cabling • Vendor 17 • Vendor 16 • Vendor 21 • Vendor 18 • Vendor 19 • Vendor 15 • Vendor 14 • Vendor 20 • No idea 2 • Av Cabling • Camear & PA • VMS Solution • I don’t Know • Security camera • CVVMS & Video wall • AV Switching Company • AV cables & Connectors • AV Nertwork Swtich Manufacturer
DEAR 2024-05-16 2024-05-16
Across
- ___________ had to be done on paper due to the attacks.
- What is still affected two months after the attack?
- Which cyber attack increased between 2022-2023?
Down
- Hackers managed to steal scans of student __________
- Staff saw __________ moving remotely across their screens.
- How many schools are in the Embrace Trust?
6 Clues: How many schools are in the Embrace Trust? • Which cyber attack increased between 2022-2023? • What is still affected two months after the attack? • Hackers managed to steal scans of student __________ • ___________ had to be done on paper due to the attacks. • Staff saw __________ moving remotely across their screens.
Prep for Cybermonth with us! 2025-05-16
Across
- the month that we celebrate Cybersecurity Awareness
- attacks that hackers use to exploit human error
- the name of the team who promotes cyberawareness
Down
- using artificial intelligence to put faces of someone onto another body
- something that keeps your accounts safe
- those who are ill actors in the cyber space
6 Clues: something that keeps your accounts safe • those who are ill actors in the cyber space • attacks that hackers use to exploit human error • the name of the team who promotes cyberawareness • the month that we celebrate Cybersecurity Awareness • using artificial intelligence to put faces of someone onto another body
Financial Security Crossword 2021-04-29
Across
- a set code only the creator can understand
- they type of identification you should use
- a location from a picture
- be care when doing this
- something you shouldn't tell everyone that listens
Down
- what should be done to old accounts
- a data center meant only for you
- never save this to the cloud
- how you should never send any personal information
- ways that scammers try to gain personal information
10 Clues: be care when doing this • a location from a picture • never save this to the cloud • a data center meant only for you • what should be done to old accounts • a set code only the creator can understand • they type of identification you should use • how you should never send any personal information • something you shouldn't tell everyone that listens • ...
Online shopping security 2021-06-14
Across
- Usually contains borrowed funds(6,4)
- Secure & ------- online shopping site
- Personal information that has been impersonated
- Can be used when connecting to public WIFI(1,1,1)
- Authentication best practice(3,6)
- Fake sales of fake items
- Taken without permission
Down
- Infectious and malicious link
- Email account and password
- Generates, stores complex passwords
10 Clues: Fake sales of fake items • Taken without permission • Email account and password • Infectious and malicious link • Authentication best practice(3,6) • Generates, stores complex passwords • Usually contains borrowed funds(6,4) • Secure & ------- online shopping site • Personal information that has been impersonated • Can be used when connecting to public WIFI(1,1,1)
fnaf security breach 2022-03-29
Across
- please take a map!
- has green hair and pronouns
- a bear who tries to help gregory
- a human who has a simillar name to the rabbit tries to find gregory
- someone who tries to keep the lights on in the daycare
- strong and fast
Down
- really annoying bots
- a dirty pervert at night
- a female white rabbit
- trash eating addicted
10 Clues: strong and fast • please take a map! • really annoying bots • a female white rabbit • trash eating addicted • a dirty pervert at night • has green hair and pronouns • a bear who tries to help gregory • someone who tries to keep the lights on in the daycare • a human who has a simillar name to the rabbit tries to find gregory
Information Security Crossword 2017-01-16
Across
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- A type of malware that is often disguised as legitimate software.
- A probability of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal weakness.
- The need to ensure that information is disclosed only to those who are authorized to view it.
- A network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Down
- A possible danger that might exploit a flaw or weakness to breach security and therefore cause possible harm.
- A flaw or weakness that can be used to attack a system or organization.
- A secret series of characters used to authenticate a person’s identity.
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A person who uses computers to gain unauthorized access to computer systems and networks.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • A person who uses computers to gain unauthorized access to computer systems and networks. • ...
Social Security Crossword 2017-03-31
Across
- Income that is not taxed
- A number given to you so that the government can track your earnings throughout your life
- Cost of Living Allowance, Annual increase to offset inflation
- Form completed when you begin to work for a company so that they take out the correct deductions
- Federal Insurance Contribution Act, the primary method of financing the Social Security program paid through payroll deductions
Down
- Money paid by the government to people who are retired, disabled or to the dependents of those that have died.
- Given at the end of the year stating the amount of money earned and taxes paid for that year
- Health insurance for people who are retired or disabled
- Investment fund managed on behalf of someone
- Known as the Employment Eligibility Verification Form to make sure that someone is eligible for employment
10 Clues: Income that is not taxed • Investment fund managed on behalf of someone • Health insurance for people who are retired or disabled • Cost of Living Allowance, Annual increase to offset inflation • A number given to you so that the government can track your earnings throughout your life • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A software that is designed to detect and destroy compute viruses.
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- A piece of digital information generated by a web server and saved in your computer after visiting a website
Down
- A network using which things can communicate with each other using internet as means of communication between them.
- An attempt by hackers to damage or destroy a computer network or system.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
security awareness CW1 2023-03-29
Across
- Sourav created a password for his online banking account using only lowercase letters. However, his account was compromised, and someone had transferred all his money to another account. Later, Sourav found out that the attacker had used a brute force attack to crack his weak password. What could Sourav have done to make her password stronger and more secure?
- "Aradhna received a call from someone claiming to be from the IRS, informing her that she owed back taxes and needed to make an immediate payment. The person instructed Jessica to transfer the money to a specific account to avoid legal action. Aradhna complied and transferred the funds as instructed. However, later Aradhna discovered that the call was a ______, and she had lost her money.
- The CFO of a large organization received an urgent email from the CEO, asking her to transfer a large sum of money to an external account as soon as possible. The email contained the CEO's email signature and appeared to be legitimate. The email also emphasized the urgency of the transfer and warned the CFO not to disclose the request to anyone else in the organization. Without verifying the authenticity of the email, the CFO proceeded to transfer the funds to the external account. What type of attack did the CFO fall victim to?
- Pankaj created a password for his online banking account, which was easy to remember, but also easy to guess. One day, Pankaj discovered that someone had gained access to his account and made unauthorized transactions. Later, Pankaj found out that the attacker had used a _____ attack to crack his weak password. What type of attack is this likely to be?
Down
- Navdeep received an email from someone claiming to be a representative from his company's IT department. The email stated that there was a critical security update that Navdeep needed to install immediately, and it contained a link to a website. Navdeep clicked on the link and followed the instructions, but after the update installed, all of his files became encrypted and he was asked to pay a ransom to regain access. What type of attack is this likely to be?
- Vikram received an email from his boss asking her to purchase some gift cards for a client as a thank-you gesture. The email instructed Vikram to purchase the gift cards immediately and email the card details to the client. Vikram quickly purchased the gift cards and sent the details to the email address provided in the email. However, he later discovered that the email had not actually been sent by his boss, but rather by an impostor who had impersonated her boss's email address. What type of attack did Vikram fall victim to?
- "Yash received an email from a popular online retailer, offering her a discount on her next purchase. The email looked legitimate, and Yash was excited to save some money. The email instructed Yash to click on a link and enter her credit card information to claim the discount. However, when Yash clicked on the link and entered her information, he later discovered that the email was a _____ attempt, and his credit card information had been stolen. What type of attack is this likely to be?
- "Sid downloaded a free software program from a website, which promised to speed up his computer. However, after installing the software, John noticed that his computer was running slower and displaying strange pop-up messages. Later, Sid discovered that the software contained ______, which had infected his computer. What had infected Sid's computer?
- Rakesh received a text message from his bank stating that there had been some suspicious activity on his account and asking him to call the customer service number provided. When Rakesh called the number, he was asked to provide his account number and some personal information for verification. However, before he could provide this information, he was asked to enter a code that had been sent to his phone via text message. What security feature was the bank using to protect Rakesh's account?
- Ritish was browsing the internet on his personal computer when he noticed that he was seeing a lot of ads for the same product she had recently searched for on another website. He wondered how the ads knew what he had been searching for, and did some research. He found out that the website he had visited had used cookies to track his browsing history and then sold that information to advertising companies. Over here Ritish's ____ was compramised.
10 Clues: ...
SECURITY VERIFICATION CROSSWORD 2024-09-18
Across
- is the type of verification that shows verified when the call comes in
- When a person who is not the NI calls in and the policy is Individual. We must ask what their ___________ is to the insured
- is the type of verification that is used when someone comes through as verified, but they identify as a different individual when they talk to you
- When an Additional insured calls in and they are listed on the policy, an acceptable piece of information is if they verify their_________
- A business principle calls in and is verified and we know that they are an employee of the company. Then we ask them their ___________ position
- When a driver for a Corp/LLC calls, they are not allowed to add or do this for coverages
Down
- When the owner of a policy calls in to request loss runs, we consider this an ________ request
- LAST NAME We must ALWAYS verify the __________ & __________
- A maximum of __________ authorized users can be added to the policy
- The call comes in verified and is on a Corp/LLC Policy, the next thing we do is ask the caller is they are an __________ employee of the business
10 Clues: LAST NAME We must ALWAYS verify the __________ & __________ • A maximum of __________ authorized users can be added to the policy • is the type of verification that shows verified when the call comes in • When a driver for a Corp/LLC calls, they are not allowed to add or do this for coverages • ...
Information Security Essentials 2025-04-28
Across
- Tài sản quý giá cần được bảo vệ
- Chương trình phát hiện và loại bỏ phần mềm độc hại
- Quy tắc tổ chức về bảo mật thông tin
Down
- Bảo vệ thông tin khỏi truy cập trái phép
- Mật khẩu khó đoán
- Thông tin luôn có thể truy cập khi cần
- Ứng dụng lưu trữ mật khẩu an toàn
- Đảm bảo thông tin không bị thay đổi trái phép
- Lừa đảo để đánh cắp dữ liệu qua email/SMS/điện thoại
- Hành động khi phát hiện hoạt động đáng ngờ
10 Clues: Mật khẩu khó đoán • Tài sản quý giá cần được bảo vệ • Ứng dụng lưu trữ mật khẩu an toàn • Quy tắc tổ chức về bảo mật thông tin • Thông tin luôn có thể truy cập khi cần • Bảo vệ thông tin khỏi truy cập trái phép • Hành động khi phát hiện hoạt động đáng ngờ • Đảm bảo thông tin không bị thay đổi trái phép • Chương trình phát hiện và loại bỏ phần mềm độc hại • ...
WORKPLACE SAFETY/SECURITY 2025-01-13
Across
- Secure portable ____ when unattended.
- Keep your desk ____ of valuable items at the end of the day.
- Do not ____ open doors that should remain secured.
- Do not leave purses or ____ in plain view.
- Trust your ____ when feeling threatened.
Down
- Theft is often a crime of _____.
- Acknowledge unauthorized individuals and offer ____.
- Report anything ____ or unusual.
- Be __ and aware of your surroundings.
- ___ 911 in case of imminent danger.
10 Clues: Theft is often a crime of _____. • Report anything ____ or unusual. • ___ 911 in case of imminent danger. • Secure portable ____ when unattended. • Be __ and aware of your surroundings. • Trust your ____ when feeling threatened. • Do not leave purses or ____ in plain view. • Do not ____ open doors that should remain secured. • ...
Industrial Security Concepts 2025-09-23
Across
- bigger that safe but smaller than a file room
- Faith in oneself and his abilities.
- An indication of impending danger or harm.
- a metallic container used for the safekeeping of document or small items in an office or installation.
- ability to deal with others successfully without offending
- Sound and good judgment to arrive a wise and timely decision.
Down
- Inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury.
- Being watchful in spotting violator, a person, a vehicle or an incident.
- A chance of being injured or harmed.
- Probability of an event to happen that will lead to loss
10 Clues: Faith in oneself and his abilities. • A chance of being injured or harmed. • An indication of impending danger or harm. • bigger that safe but smaller than a file room • Probability of an event to happen that will lead to loss • ability to deal with others successfully without offending • Sound and good judgment to arrive a wise and timely decision. • ...
Health and security 2025-12-08
Across
- physical harm to a person
- emergency help given before going to hospital
- protective equipment like gloves or goggles
- hard protection worn on the head
Down
- small accident when you lose your balance
- chance that something bad may happen
- emergency with flames and smoke
- accident from working at height
- potential source of harm at work
- safe way out of a building
10 Clues: physical harm to a person • safe way out of a building • emergency with flames and smoke • accident from working at height • hard protection worn on the head • potential source of harm at work • chance that something bad may happen • small accident when you lose your balance • protective equipment like gloves or goggles • emergency help given before going to hospital
Information Security Challenge 2025-12-02
Across
- A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
- A formal review of systems and processes to ensure security and compliance.
- The possibility of loss, damage, or any negative outcome resulting from a threat exploiting a vulnerability.
- A sneaky way to steal information by watching someone type their password.
- Manipulating people into giving up confidential information.
Down
- Protecting data and systems hosted on remote servers.
- A type of malicious software that can replicate and spread.
- Procedure for documenting and notifying security breaches.
- An individual who uses technical skills to gain unauthorized access to systems or data
- Software designed to detect and remove malicious programs.
10 Clues: Protecting data and systems hosted on remote servers. • Procedure for documenting and notifying security breaches. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • ...
CSA Terms 2022-01-13
Across
- A cybersecurity control framework for cloud computing, used as a tool for the systematic assessment of a cloud implementation
- A credential and training program that fills the gap in the market for technical education for cloud IT auditing
- A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
- A cloud service model that provides resource pools of virtualized infrastructure, such as compute, network, or storage pools
- A program designed to help customers assess and select a CSP through a three-step program of self-assessment, third-party audit, and continuous monitoring
Down
- A certificate that is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
- A tool that offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
- Union's agency dedicated to achieving a high common level of cybersecurity across Europe
- An on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies
- A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
10 Clues: Union's agency dedicated to achieving a high common level of cybersecurity across Europe • A credential and training program that fills the gap in the market for technical education for cloud IT auditing • A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet • ...
Unit 8 2022-01-01
Across
- a connecting other networks and computers from companies, universities, etc.
- immediately
- a program that lets you look at or read documents on the Internet
- to make sth easier to do or understand
Down
- something connected with the Internet
- to invent a new word or phrase that other people then begin to use
- happening or existing in all parts of a particular country
7 Clues: immediately • something connected with the Internet • to make sth easier to do or understand • happening or existing in all parts of a particular country • a program that lets you look at or read documents on the Internet • to invent a new word or phrase that other people then begin to use • ...
Turvallisuusala, 3. osp Englannin koe 2020-12-11
12 Clues: välineet • alue, kohde • with/hoitaa • valvontakamera • belt/varustevyö • gear/sadevaatteet • flare/hätäraketti • spray/kaasusumutin • baton/vinyylipatukka • clothing/suojavaatetus • baton/teleskooppipamppu • vehicle/turva-ajoneuvo, vartiointiajoneuvo
Plant Cell 2025-02-14
12 Clues: Network • security • power house • gives shape • Transporter • Stores water • waste disposal • boss of the cell • Produce proteins • provides protection • give support and protection • converts the sun energy into food
Sophia Monzon's Crossword Puzzle 2024-11-08
ENVISION CROSSWORD 2024-02-25
Across
- The unit of measurement for the speed of a computer's processor.
- A data structure that follows the Last In, First Out (LIFO) principle.
- The process of converting source code into machine code.
- The protocol used for transferring files over the Internet.
- A programming language named after a snake.
- The language used to style web documents.
- A binary digit (1 letter).
- A fundamental data structure that organizes elements in pairs.
Down
- A widely used algorithm for sorting elements in an array.
- The abbreviation for the markup language that structures content on the web.
- A type of cyber attack where malicious software is sent via email.
- A popular version control system used in software development.
- A popular web development framework by Facebook.
- A programming paradigm emphasizing the use of mathematical functions.
- The brain of a computer.
15 Clues: The brain of a computer. • A binary digit (1 letter). • The language used to style web documents. • A programming language named after a snake. • A popular web development framework by Facebook. • The process of converting source code into machine code. • A widely used algorithm for sorting elements in an array. • ...
TTS SOSIOLOGI 2025-11-05
Across
- Teori konflik yang timbul karena perbedaan kepentingan antara kelas Penguasa dan kelas Perkasa dikemukakan oleh
- Teori yang beranggapan kekerasan dan konflik dipicu karena adanya benturan antara identitas kelompok
- Kekerasan yang dilakukan individu atau kelompok menggunakan sistem hukum ekonomi atau tata kebiasaan merupakan bentuk kekerasan
- Bahasa Latin kekerasan
- Kesenjangan kebudayaan disebut juga
- Permasalahan sosial bersifat
- Konflik bersifat
- Upaya pengendalian permasalahan sosial tanpa kekerasan
- Masalah sosial yang berkaitan dengan kemampuan individu untuk mencukupi kebutuhan termasuk dalam faktor
- Proses sosial antara kedua belah pihak yang berkonflik saling menyesuaikan diri hingga mencapai kestabilan termasuk upaya penanganan metode
- Cyber bullying termasuk bentuk kekerasan
Down
- Hilangnya unsur budaya tradisional disebut
- Kejadian ketidak sesuaian antara harapan dengan kenyataan yang terjadi di kehidupan masyarakat disebut
- Contoh dari kekerasan terbuka
- Secara etimologi konflik sosial berasal dari bahasa latin yaitu "Con" dan "Fligere". "Con" artinya
15 Clues: Konflik bersifat • Bahasa Latin kekerasan • Permasalahan sosial bersifat • Contoh dari kekerasan terbuka • Kesenjangan kebudayaan disebut juga • Cyber bullying termasuk bentuk kekerasan • Hilangnya unsur budaya tradisional disebut • Upaya pengendalian permasalahan sosial tanpa kekerasan • ...
FNAF 2023-08-15
11 Clues: old fox • new fox • protector • lights on. • lights off. • new guitarist • old guitarist • where you race • security guard • please take this map • pizza!!!!!!!!!!!!!!!!!!!!!!!
MiniGame 2023-05-25
Champion Crossword Puzzle 2016-09-22
14 Clues: rgu • rgu • NPS • rgu • security • training • 2 products • the process • all 4 products • our best product • paid triple ways • summary of great • voice of the customer • one question about you
Crossword Puzzle 2020-08-19
15 Clues: tweak • person • about me • is caring • stay safe • can i get a? • problem solving • digital pigeons • needs a solution • who doesn't love? • accept or decline? • faster than a call • better safe than sorry • lots of them on your phone • doesn't need to be physical
Jobs - Paulina 2021-03-30
15 Clues: sprząta • ratuje ludzi • naprawia rury • naprawia kable • jeździ na wojny • siedzi w sadzie • pomaga doktorowi • pracuje w szpitalu • guard pilnuje czegoś • opiekuje się dziećmi • pracuje w kwiaciarni • ratuje ludzi z pożaru • pracuje w restauracji • critic krytykuje jedzienie • rozmawia z ludzmi lub z dziećmi
Word Within the Word List 32 2013-10-21
15 Clues: sociable • make soft • go against • unorthodox • second self • thought-to-be • heated dispute • speech to oneself • affirm or declare • talking in circles • pledge as security • a flowing together • male head of family • cold-blooded composure • force of a million tons of dynamite
FILL Your Answers 2023-04-21
Across
- winner of women's IPL 2023
- acquired by cisco in 2012,cloud-managed sdn platform
- cisco's intent to acquire the cloud security company
- cisco pinnacle award 2023-one among two winning teams under velocity impact
- MFA,SSO,Zero trust security solution
- oscar 2023, best original song
Down
- cisco's cloud based secure internet gateway platform that provides protection from internet based threats
- men's hockey worldcup champion 2023
- meet cisco's four times lower energy demands& 2.6 times higher bandwidth.Its a win-win on power consumption and performance
- machu picchu-one among the seven wonder's is situated at?
- cisco's stock name
11 Clues: cisco's stock name • winner of women's IPL 2023 • oscar 2023, best original song • men's hockey worldcup champion 2023 • MFA,SSO,Zero trust security solution • acquired by cisco in 2012,cloud-managed sdn platform • cisco's intent to acquire the cloud security company • machu picchu-one among the seven wonder's is situated at? • ...
The privacy Act 1993 2017-09-04
Across
- If the information is _________ it needs to be corrected.
- Principle 2, information must be what from the individual?
- Principle 5 is to do with the what and security?
- Principle 5 is to do with storage and what?
Down
- How many principles?
- The principle in which you should not use information gathered for one purpose for another.
- The act is relevant to what type of information?
- What is this Act of 1993?
- The purpose of the act is to focus on the what?
- This principle is about telling a person when you're collecting their information.
- Information should not be _________ to another party.
11 Clues: How many principles? • What is this Act of 1993? • Principle 5 is to do with storage and what? • The purpose of the act is to focus on the what? • The act is relevant to what type of information? • Principle 5 is to do with the what and security? • Information should not be _________ to another party. • If the information is _________ it needs to be corrected. • ...
April Security Training 2020-04-20
Across
- This must be completed by branch employees when individuals or entities conduct or benefit from incoming or outgoing cash transaction(s) that exceed $10,000 on the same posting day.
- Occurs when personal property (e.g., money, car, residence) is taken or hidden from an elder or an at-risk person.
- What Security Alert would most likely be present?
- This required by the Bank Secrecy Act (BSA) to document customer and transaction information for the cash purchase of negotiable instruments (cashier's checks or gift cards) between $3,000 and $10,000.
- Requires each financial institution to create and implement an anti-money laundering (AML) program, including a Customer Identification Program
Down
- Reports suspicious activity that might signify money laundering, terrorist financing, tax evasion or other federal crimes.
- This person is responsible for creating a list of witnesses
- Who is responsible for isolating areas the robber may have touched?
- After robbery who is responsible for establishing interview areas for law enforcement?
- After robbery who is responsible for turning on ESP beacon?
10 Clues: What Security Alert would most likely be present? • This person is responsible for creating a list of witnesses • After robbery who is responsible for turning on ESP beacon? • Who is responsible for isolating areas the robber may have touched? • After robbery who is responsible for establishing interview areas for law enforcement? • ...
Chapter 1 Security + 2017-01-21
Across
- protocol that authenticates using clear text password
- does not let threats get past the firewall uninspected
- use content filtering to enforce network acceptable policy
- alerts when network traffic deviates from a normal baseline
- use health checking
- works at transport and network layers
Down
- tells network adapter to process all packets
- stateful to firewalls
- is effective against spam
- best policy when administering firewalls
10 Clues: use health checking • stateful to firewalls • is effective against spam • works at transport and network layers • best policy when administering firewalls • tells network adapter to process all packets • protocol that authenticates using clear text password • does not let threats get past the firewall uninspected • ...
MTA Security Fundamentals 2019-05-05
Across
- A security tactic in which a server or device only has installed on it what it needs to perform its prescribed role.
- The act of passing control of a resource (such as an organizational unit) from one entity to another.
- The form of authentication that uses devices such as retina scanners
- A network security system and/or hardware device which controls any incoming and outgoing network traffic based on a set of rules provided by an administrator.
- The act of verifying identification to an application or a system.
- A system that traps attackers when they attempt to attack a network.
Down
- A mechanism by which a log tracks who has logged on to a system and what has been accessed on the system.
- The part of the CIA triangle that ensures data is accessible by those who need it
- The part of the CIA triangle that involves ensuring data is accurate
- The adding of cipher text to data to scramble the data to make it unreadable without a decryption key.
10 Clues: The act of verifying identification to an application or a system. • The part of the CIA triangle that involves ensuring data is accurate • The form of authentication that uses devices such as retina scanners • A system that traps attackers when they attempt to attack a network. • ...
Information Security Crossword 2017-01-13
Across
- Personal information related to personal data stored on computer systems
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A type of malware that is often disguised as legitimate software.
- Anything that has the potential to cause serious harm to a computer system.
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- You may not divulge this information while you are working for an employer or after you leave.
- A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
Down
- A secret series of characters used to authenticate a person’s identity.
- A flaw or weakness that can be used to attack a system or organization.
- A person who uses computers to gain unauthorized access to computer systems and networks.
10 Clues: A type of malware that is often disguised as legitimate software. • A secret series of characters used to authenticate a person’s identity. • A flaw or weakness that can be used to attack a system or organization. • Personal information related to personal data stored on computer systems • ...
Inernational Security 3 2021-09-27
Across
- The system by which a state or community is governed.
- They occur when the human, physical, economic or environmental damage from an event, or series of events.
- An identification with one's own nation and support for its interests, especially to the exclusion or detriment of the interests of other nations. Synonym to "patriotism".
- It is a feeling of uncertainty and social unworthiness. It often creates anxiety about friendships, relationship goals, and your confidence to handle social situations.
- It is violation of law that involve more than one country in their planning, execution, or impact.
Down
- A person who has been forced to leave their country in order to escape war, persecution, or natural disaster.
- Synonym to "bomber,arsonist, gunman,assassin, desperado".
- They are the basic rights and freedoms that belong to every person in the world, from birth until death.
- A person who comes to live permanently in a foreign country.
- It refers to the gradual social process into extremism and is often applied to explain changes in ideas or behavior.
10 Clues: The system by which a state or community is governed. • A person who comes to live permanently in a foreign country. • Synonym to "bomber,arsonist, gunman,assassin, desperado". • It is violation of law that involve more than one country in their planning, execution, or impact. • ...
Food Security Crossword 2024-10-17
Across
- The safest way to thaw frozen meat or poultry.
- The test used to check if eggs are still fresh.
- The main cause of foodborne illness
- The color a spoiled canned food may turn.
- The reason proper handwashing is important for food safety.
- A sign that a canned food may be unsafe to eat.
Down
- The certification that ensures food handlers have food safety knowledge.
- The term for the coating that can form on the inside of a rusty can
- The most effective way to prevent the spread of foodborne illness.
- The term for a digestive system response to a food component.
10 Clues: The main cause of foodborne illness • The color a spoiled canned food may turn. • The safest way to thaw frozen meat or poultry. • The test used to check if eggs are still fresh. • A sign that a canned food may be unsafe to eat. • The reason proper handwashing is important for food safety. • The term for a digestive system response to a food component. • ...
Airport Security Vocabulary 2024-10-18
Across
- A machine that detects metal objects
- A ticket to get on an airplane
Down
- A machine that moves things through the scanner
- A machine that scans a person's body for hidden objects
- They must be under 100ml for carry on luggage
- Bags that carry items for travel
- A person working for security at the airport
- An alternative technique to identify hidden objects
- A document that gives permission for travel
- A bag that can go in the main cabin of a plane
10 Clues: A ticket to get on an airplane • Bags that carry items for travel • A machine that detects metal objects • A document that gives permission for travel • A person working for security at the airport • They must be under 100ml for carry on luggage • A bag that can go in the main cabin of a plane • A machine that moves things through the scanner • ...
Food Security Puzzle 2024-11-28
10 Clues: wealthiest nut • Celebrity Food • dice to cry over • vegetable grows eggs • dog with lots of ears • the father of all sodas • most delicious kind of money • friendly Fruit likes meeting people • the most deceitful and dishonest fruit • vegetable can you find all sorts of animals
Computer Network security 2022-10-10
Across
- An asymmetric-key (or public-key) cipher uses
- A digital signature needs a
- a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information
- A hash function guarantees integrity of a message. It guarantees that message has not be
Down
- Heart of Data Encryption Standard (DES), is the
- Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
- a device or software application that monitors internal network
- A device allowing some packets to pass and blocking others.
- trusted third party that assigns a symmetric key to two parties
- Electronic Code Book is
10 Clues: Electronic Code Book is • A digital signature needs a • An asymmetric-key (or public-key) cipher uses • Heart of Data Encryption Standard (DES), is the • A device allowing some packets to pass and blocking others. • a device or software application that monitors internal network • trusted third party that assigns a symmetric key to two parties • ...
