cyber security Crossword Puzzles
Branch Physical Security 2022-08-23
Across
- The Post Robbery __________________ should be distributed.
- During a robbery, try to remain ________.
- Activate the alarm ______________________, providing this action will not endanger yourself or others.
- Who is our Retail Operations primary contact?
- Post the ____________ ______________ notice at the main entrance of the branch to notify customers that the branch is closed.
Down
- ________________ with the robber(s)' instructions.
- Give each witness (associates and/or customers) a Suspect ______________________________ Form to help them recollect what they saw.
- Once the robber has left the building, announce "________ ______ ________", this will alert the team that a robbery has taken place.
- Who is our Physical Security Manager?
- Make note of the ______________ used in escape.
10 Clues: Who is our Physical Security Manager? • During a robbery, try to remain ________. • Who is our Retail Operations primary contact? • Make note of the ______________ used in escape. • ________________ with the robber(s)' instructions. • The Post Robbery __________________ should be distributed. • ...
Remote Work Security 2025-05-26
Across
- Spyware and ransomware are types of this
- You should never install unknown ____
- Software that blocks suspicious files
Down
- Often required after a password reset
- Layer of identity check beyond password
- Company-provided device
- This alert type may warn of phishing
- Avoid public ___ when working remotely
- Used to access company network securely
- Short for “Internet Protocol”
10 Clues: Company-provided device • Short for “Internet Protocol” • This alert type may warn of phishing • Often required after a password reset • You should never install unknown ____ • Software that blocks suspicious files • Avoid public ___ when working remotely • Layer of identity check beyond password • Used to access company network securely • ...
CTF-CW-11 2025-11-14
Across
- Tech world’s fire brigade—second shout
- When the cloud gets graded for playing by the compliance rulebook.
- VIOLATION Red ink on the corporate report card
- Every journey’s pit stops
- ESCALATION The elevator hack from novice to boss
- IQ At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
- POLICY Document on every website about rules for handling details
- MODEL DNA test for who’s calling the shots
- DATA Any data, direct or indirect, that reveals a person’s identity
- When a hacker sneaks past your digital guard
Down
- At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
- When your browser “remembers” you, for a while
- Tekion’s legendary vault no hacker can touch.
- SEGMENTATION Safety scissors for your network
- Buzzing threat hunter hangout
- GOVERNANCE Processes to ensure robots don’t go rogue
- Slamming the panic room door on hackers
- NOTICE Pop-up or email outlining changes in how data gets used
- The organization behind the ATT&CK plots
- Info swap: turn gold into poker chips
20 Clues: Every journey’s pit stops • Buzzing threat hunter hangout • Info swap: turn gold into poker chips • Tech world’s fire brigade—second shout • Slamming the panic room door on hackers • The organization behind the ATT&CK plots • MODEL DNA test for who’s calling the shots • When a hacker sneaks past your digital guard • Tekion’s legendary vault no hacker can touch. • ...
Escape from Dystopia 2019-01-08
Across
- The word "utopia" was created from 2 __________ words, eutopia & outopia
- Propaganda serves to create an emotional response as opposed to a _________ response
- Sir Thomas __________
- Biased information used to promote a political point of view
- Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of dystopian ________
- Type of government that has total control over people's lives
- Dystopias often occur after an _________ event like a plague of nuclear warfare
Down
- Dystopian literature takes a current trend to the _________
- A dystopia typically exists as an _________ of a perfect world
- Opposite of dystopia
- Opposite of individuality
- A dystopian government often uses mass _________ to spy on its citizens
- Utopia was originally named for a fictional ___________
- Term for mega-technological genre: "cyber-__________"
14 Clues: Opposite of dystopia • Sir Thomas __________ • Opposite of individuality • Term for mega-technological genre: "cyber-__________" • Utopia was originally named for a fictional ___________ • Dystopian literature takes a current trend to the _________ • Biased information used to promote a political point of view • ...
Inside Reading Unit 6 2022-01-31
Across
- The police (tape) the crime scene
- They went to a (consult) for advice on cyber crime
- The police (summed up) that the criminal will never be found
- They knew the (location) of the next crime
- Can you (find) anything missing?
- What is your (reason) for learning English?
Down
- After being arrested, a (group) of judges decided he was guilty
- The crime scene evidence took longer than usual because of (tech) issues
- He (establish) that the money was stolen by someone he knew
- Police need (exact) information to solve crimes
- On the (opposite), criminals are very smart
- There are many (events) where criminals are caught within 24 hours
- The (authority) arrested him and sent him to prison for 5 years
- We need to use (reasoning) when solving problems
14 Clues: Can you (find) anything missing? • The police (tape) the crime scene • They knew the (location) of the next crime • On the (opposite), criminals are very smart • What is your (reason) for learning English? • Police need (exact) information to solve crimes • We need to use (reasoning) when solving problems • They went to a (consult) for advice on cyber crime • ...
Bullying and Self-Advocacy 2024-10-06
Across
- Self-Advocacy is when we speak up about our...
- A type of bullying where someone makes fun of someone by name-calling
- It's okay to say...
- A type of bullying where someone spread rumors online
- Who to tell when you or another person is being bullied
- A type of bullying where someone touches or trips someone
- When someone is mean once, can be hurtful or friendly
Down
- When our classmates or friends try to influence us
- Sticking up for yourself
- When someone repeatedly tries to hurt someone's feelings
- A type of bullying where someone leaves others out or spread rumors about them
11 Clues: It's okay to say... • Sticking up for yourself • Self-Advocacy is when we speak up about our... • When our classmates or friends try to influence us • A type of bullying where someone spread rumors online • When someone is mean once, can be hurtful or friendly • Who to tell when you or another person is being bullied • ...
Vocabulary: UNIT 5 2021-07-04
Across
- We can use it to listen to the news o to listen to music.
- Cyber world that contains a lot of information.
- We can do this by airplane, train or car.
- Means of transport. It can fly.
Down
- To communicate with other people.
- Similar to a letter but we send this via internet.
- Long ago people wrote this to communicate with friends.
- We can listen to them on the radio or turn on the T.V to hear this.
8 Clues: Means of transport. It can fly. • To communicate with other people. • We can do this by airplane, train or car. • Cyber world that contains a lot of information. • Similar to a letter but we send this via internet. • Long ago people wrote this to communicate with friends. • We can use it to listen to the news o to listen to music. • ...
prior knowledge 2021-10-04
Across
- the practice of analysing large databases in order to generate new information.
- what YouTuber say at the end of videos
- when you hurt some one on the internet like social media
- what you use to get things in games
- the action or process of earning revenue from an asset, business, etc.
Down
- to get more in an app
- being able to get the location of something
- what you do to scam messages and annoying people
8 Clues: to get more in an app • what you use to get things in games • what YouTuber say at the end of videos • being able to get the location of something • what you do to scam messages and annoying people • when you hurt some one on the internet like social media • the action or process of earning revenue from an asset, business, etc. • ...
American Express Travelers Cheque 2021-11-22
8 Clues: How do you verify • What is one security feature • _____ Express uses the Cheques • Can you have counterfeit Cheques • What code do you need on the Cheque • How many security features do they have • What do you have to do for the signatures • Is the process where you validate both the presenter and the cheque
TUGAS TEKA TEKA PPKN 2023-11-03
Across
- Meningkatkan devisa negara merupakan pengaruh positif kemajuan iptek dibidang
- Perahu pinisi yang tahun 1986 melakukan pelayaran ke kota
- Gaya hidup yang selalu berorientasi kepada budaya barat yaitu
- Perilaku yang tidak boleh dikembangkan dalam menghadapi era globalisasi
- Sifat konsumtif merupakan dampak negatif iptek di bidang
- Kemajuan luar biasa dibidang komunikasi dan transportasi menjadi dunia bagaikan sebuah desa biasa disebut
- Pada tanggal 23 Agustus 1967,perkembangan iptek di Indonesia semakin maju dengan didirikannya
- Degradasi moral merupakan pengaruh.... kemajuan iptek
Down
- Sikap yang menganggap kenikmatan pribadi adalah nilai tertinggi
- Yang mengacu pada aktivitas kejahatan dengan komputer atau jaringan yaitu Cyber
- Pancasila sebagai falsafah hidup bangsa menjadi alat yang ampuh untuk
- Sikap yang menganggap kenikmatan pribadi adalah nilai tertinggi
- Salah satu pengaruh negatif kemajuan iptek yaitu mementingkan diri sendiri
- Yang dijadikan sebagai pegangan hidup bangsa adalah
- Komputer yang menggunakan transistor disebut
- Alat yang dikembangkan Johannes tahun 1440 yaitu mesin
16 Clues: Komputer yang menggunakan transistor disebut • Yang dijadikan sebagai pegangan hidup bangsa adalah • Degradasi moral merupakan pengaruh.... kemajuan iptek • Alat yang dikembangkan Johannes tahun 1440 yaitu mesin • Sifat konsumtif merupakan dampak negatif iptek di bidang • Perahu pinisi yang tahun 1986 melakukan pelayaran ke kota • ...
November ulmanac 2025-10-23
Across
- - A type of puzzle with vertical and horizontal squares
- - The bridge at the heart of our project spotlight.
- - The red papaver by another name (hint: it's a flower)
- - The first name of the person who sang "Signed, Sealed, Delivered"
- - Commonly grown in November.
- - A calendar misnomer, this month's name is derived from the Latin word for nine.
- - What we spent a week doing in October.
- - "the combined action of a group, especially when effective and efficient."
Down
- - What a lot of people do on Black Friday and Cyber Monday.
- - what we're preventing this November
- - masks, gloves and goggles, for short.
- - Animal associated with this months full moon
- - This bird takes short, shuffling steps... just like you should when it's slippery.
- - The name of our employee newsletter.
- - Repeated three times followed by a moment of silence
15 Clues: - Commonly grown in November. • - what we're preventing this November • - The name of our employee newsletter. • - masks, gloves and goggles, for short. • - What we spent a week doing in October. • - Animal associated with this months full moon • - The bridge at the heart of our project spotlight. • - Repeated three times followed by a moment of silence • ...
TTS SOSIOLOGI 2025-11-05
Across
- Teori konflik yang timbul karena perbedaan kepentingan antara kelas Penguasa dan kelas Perkasa dikemukakan oleh
- Teori yang beranggapan kekerasan dan konflik dipicu karena adanya benturan antara identitas kelompok
- Kekerasan yang dilakukan individu atau kelompok menggunakan sistem hukum ekonomi atau tata kebiasaan merupakan bentuk kekerasan
- Bahasa Latin kekerasan
- Kesenjangan kebudayaan disebut juga
- Permasalahan sosial bersifat
- Konflik bersifat
- Upaya pengendalian permasalahan sosial tanpa kekerasan
- Masalah sosial yang berkaitan dengan kemampuan individu untuk mencukupi kebutuhan termasuk dalam faktor
- Proses sosial antara kedua belah pihak yang berkonflik saling menyesuaikan diri hingga mencapai kestabilan termasuk upaya penanganan metode
- Cyber bullying termasuk bentuk kekerasan
Down
- Hilangnya unsur budaya tradisional disebut
- Kejadian ketidak sesuaian antara harapan dengan kenyataan yang terjadi di kehidupan masyarakat disebut
- Contoh dari kekerasan terbuka
- Secara etimologi konflik sosial berasal dari bahasa latin yaitu "Con" dan "Fligere". "Con" artinya
15 Clues: Konflik bersifat • Bahasa Latin kekerasan • Permasalahan sosial bersifat • Contoh dari kekerasan terbuka • Kesenjangan kebudayaan disebut juga • Cyber bullying termasuk bentuk kekerasan • Hilangnya unsur budaya tradisional disebut • Upaya pengendalian permasalahan sosial tanpa kekerasan • ...
BRAVO Crossword: Bullying 2015-11-10
5 Clues: A type of bullying • A type of bullying that you hear • A type of bullying that hurts you • The main subject of this crossword • A relative term to the words: "All the time"
Be Kind Online 2023-07-14
6 Clues: , enthusiastic ,confident • , a way of showing respect. • , involves use of electronics. • wellness , the positive well-being of Internet users. • , due regard for the feelings, wishes, or rights of others. • , to treat others with high regard and be a socially responsible citizen.
CROSSWORD PUZZLE 2023-12-01
6 Clues: A scammer’s goal • A scam that involves sellers • Scam that acts like a banker • Scam that acts like an employer • A person who steals information and money • A type of cyber-attack that uses fraudulent emails or websites to trick users into revealing their personal or financial information
PenFed 2022-01-27
15 Clues: leader • a thief • chatroom • who you are • PenFed scam • reader board • long FI call • address request • face chris uses • break/lunchtime • computer program • not enough security • add additional fraud • where to find phone numbers • what an upset ch call turns into
Word Within a Word List 32 2012-10-01
15 Clues: sociable • make soft • go against • unorthodox • thought-to-be • heated dispute • ego second self • affirm or declare • speech to oneself • a flowing together • talking in circles • pledge as security • male head of family • cold-blooded composure • force of a million tons of dynamite
Word Within a Word List 32 2012-10-01
15 Clues: sociable • make soft • go against • unorthodox • second self • thought-to-be • heated dispute • speech to oneself • affirm or declare • a flowing together • pledge as security • talking in circles • male head of family • cold-blooded composure • force of a million tons of dynamite
Organelle Recap 2023-11-21
Across
- Packaging/Transport
- Protection (like security guard)
- Liquid (like water in fish bowl)
- Role in cell division
- Power
- Controls cell
- Structure (plant only)
- Make proteins
Down
- Photosynthesis (plant only)
- Transport materials, make proteins
- Protect nucleus
- Makes ribosomes
- Transport materials, make fats
- Storage
- Digestion
15 Clues: Power • Storage • Digestion • Controls cell • Make proteins • Protect nucleus • Makes ribosomes • Packaging/Transport • Role in cell division • Structure (plant only) • Photosynthesis (plant only) • Transport materials, make fats • Protection (like security guard) • Liquid (like water in fish bowl) • Transport materials, make proteins
El viaje 2022-12-12
15 Clues: Trip • Hotel • Flight • Airport • Suitcase • Security • Passport • Passenger • To Travel • To withdraw money • S/he takes the bus • S/he/it takes a trip • S/he takes the plane • S/he/it takes the taxi • S/he/it takes the train
New Deal Crossword 2024-04-09
Across
- amount of people employed by the CCC
- worked to improve the nation's public land from 1933 to 1942
- the maximum amount of time in prison after submitting a false Social Security Statement
- month when the Federal Emergency Relief Administration dissolved
- head of the TERA, FERA, and WPA
- the amount of time a man would work in the CCC
Down
- the year the Social Security Act was passed
- the president who instilled the New Deal Programs
- amount of funds given by the Federal Emergency Relief Administration after inflation adjustment
- acronym for the Federal Emergency Relief Administration
- enacted in august of 1935
11 Clues: enacted in august of 1935 • head of the TERA, FERA, and WPA • amount of people employed by the CCC • the year the Social Security Act was passed • the amount of time a man would work in the CCC • the president who instilled the New Deal Programs • acronym for the Federal Emergency Relief Administration • worked to improve the nation's public land from 1933 to 1942 • ...
The Functions Performed Within Communication Systems 2021-07-07
10 Clues: data • mediums • decodes • sending • security • common clock • protocol levels • interface, transmitter • server, user's identity • sender to receiver, creation
FinTech Portal 2023-05-24
6 Clues: Budget Overruns • Security Breach • Regulatory Compliance • Integration Challenges • Payment Processing Failures • Adoption Customer Resistance to Change
Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11
Across
- A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- _____-force attack is a technique used to guess a password by trying many possible combinations
- Gain access to someone else’s computer or device without permission
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- A location on the internet where you can save your data (rather than on your computer or device)
Down
- A program or device used to detect and prevent unauthorized access to a network
- A sequence of characters (or words) used to stop criminals from accessing your accounts
- A method of protecting data by converting it into unreadable code that only authorized parties can read
- Malicious software that could harm your computer or gadget
- What is a form of malware that monitors and records a user's activities without their knowledge?
- A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- A security incident where sensitive information is leaked to the public is a data ______
- ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor
18 Clues: Malicious software that could harm your computer or gadget • Gain access to someone else’s computer or device without permission • A program or device used to detect and prevent unauthorized access to a network • The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge) • ...
Cybersecurity Awareness Month Crossword Puzzle 2025-09-19
Across
- A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
- The best way to keep Cornerstone secure is to become a ________ ___________.
- All customer and bank information that is no longer required must be ____________.
- an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
- A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
- Malicious software designed to harm, exploit or otherwise compromise a computer system.
- the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
- Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
- Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
- A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
- Create strong ___________ or passphrases and never share them with anyone else.
Down
- A type of malware that encrypts a victim's files and demands payment for the decryption key.
- the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
- Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
- Someone who tries to access data that they aren't authorized to view.
- All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
- ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
- The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.
18 Clues: Someone who tries to access data that they aren't authorized to view. • The best way to keep Cornerstone secure is to become a ________ ___________. • Create strong ___________ or passphrases and never share them with anyone else. • All customer and bank information that is no longer required must be ____________. • ...
CH 11, LO 1 and 2 2021-04-14
Across
- debts that are owed to creditors
- when a business has received cash vefore providing goods or performing work
- must be paid with cash or goods/services within one year
- a written promise by a business to pay a debt wwithin one year or less
- the income tax deducted from gross pay
- medical benefits
Down
- old age, survivors, and disability insurance
- do not need to be paid within one year
- helps summarize the earnings, withholdings, and net pay for each employee
- also known as the Social Security Act, created the Social Security tax
- total amount of salary, wages, commissions, and bonuses earned by an employee during a pay period
- also called employee compensation
- the amount an employee gets to keep
13 Clues: medical benefits • debts that are owed to creditors • also called employee compensation • the amount an employee gets to keep • do not need to be paid within one year • the income tax deducted from gross pay • old age, survivors, and disability insurance • must be paid with cash or goods/services within one year • ...
The United Nations 2025-12-02
Across
- Education, Science and Culture organization;
- The city where the UN Headquarters is located;
- The UN's main policymaking and representative organ;
- The 15-member body responsible for maintaining international peace and security;
- Principal judicial organ of the UN, based in The Hague (abbrev.);
- UN agency for children;
- The authority on matters of global health;
Down
- The current Secretary-General of the UN;
- The five permanent members of the Security Council hold this power;
- The first UN peacekeeping mission (1948) was established in this country;
- The UN organ responsible for coordinating the economic, social, and related work of 15 specialized agencies;
- The official language used by the UN, along with Arabic, Chinese, English, Russian, and Spanish;
- Programme that works to eliminate poverty.
13 Clues: UN agency for children; • The current Secretary-General of the UN; • Programme that works to eliminate poverty. • The authority on matters of global health; • Education, Science and Culture organization; • The city where the UN Headquarters is located; • The UN's main policymaking and representative organ; • ...
Bullying 2024-09-02
Across
- pelaku bullying
- bullying dengan mengolok olok, mengejek, mengancam, menuduh dan memfitnah
- dampak bully yang menyebabkan pengingkatan & penurunan suasana hati
- dampak bagi org yang mengalami kurang empati, kecenderungan melakukan kekerasan dan masalah perilaku
- tempat bullying memukuli adik kelas
- perasaan ketegangan dan tekanan emosional
- menanggung sesuatu yang tdk menyenangkan
- kata lain dari bullying
- sikap membedakan orang lain
Down
- bullying dalam media sosial
- bentuk tindakan agresif yang dilakukan dgn sengaja dan berulang kalidgn tujuan untuk melukai / mengakibatkan ketidaknyamanan pd org lain
- meminta uang atau barang scr paksa disertai ancaman
- korban memiliki kekurangan dalam aspek fisik maupun psikologis sehingga merasa dikucilkan
- stres, kecemasan, depresi
- perundungan yg dilakukan dgn menggunakan tubuh/objek utk menyakiti org lain
- dampak bullying yang menyebabkan munculnya keinginan untuk membalas / melihat org lain mengalami kesakitan, cedera atau tekanan
- dampak dimana korban mengalami isolasi sosial, perasaan kesepian, dan penurunan kualitas hidup scr keseluruhan
- tunjukkan prestasi, tumbuhkan rasa percaya diri, jadikan penyemangat utk sukses
- salah satu faktor bullying karena tidak memiliki sesuatu yg dimiliki org lain
19 Clues: pelaku bullying • kata lain dari bullying • stres, kecemasan, depresi • bullying dalam media sosial • sikap membedakan orang lain • tempat bullying memukuli adik kelas • menanggung sesuatu yang tdk menyenangkan • perasaan ketegangan dan tekanan emosional • meminta uang atau barang scr paksa disertai ancaman • ...
bullying 2024-09-02
Across
- pelaku bullying
- bullying dengan mengolok olok, mengejek, mengancam, menuduh dan memfitnah
- dampak bully yang menyebabkan pengingkatan & penurunan suasana hati
- dampak bagi org yang mengalami kurang empati, kecenderungan melakukan kekerasan dan masalah perilaku
- tempat bullying memukuli adik kelas
- perasaan ketegangan dan tekanan emosional
- menanggung sesuatu yang tdk menyenangkan
- kata lain dari bullying
- sikap membedakan orang lain
Down
- bullying dalam media sosial
- bentuk tindakan agresif yang dilakukan dgn sengaja dan berulang kalidgn tujuan untuk melukai / mengakibatkan ketidaknyamanan pd org lain
- meminta uang atau barang scr paksa disertai ancaman
- korban memiliki kekurangan dalam aspek fisik maupun psikologis sehingga merasa dikucilkan
- stres, kecemasan, depresi
- perundungan yg dilakukan dgn menggunakan tubuh/objek utk menyakiti org lain
- dampak bullying yang menyebabkan munculnya keinginan untuk membalas / melihat org lain mengalami kesakitan, cedera atau tekanan
- dampak dimana korban mengalami isolasi sosial, perasaan kesepian, dan penurunan kualitas hidup scr keseluruhan
- tunjukkan prestasi, tumbuhkan rasa percaya diri, jadikan penyemangat utk sukses
- salah satu faktor bullying karena tidak memiliki sesuatu yg dimiliki org lain
19 Clues: pelaku bullying • kata lain dari bullying • stres, kecemasan, depresi • bullying dalam media sosial • sikap membedakan orang lain • tempat bullying memukuli adik kelas • menanggung sesuatu yang tdk menyenangkan • perasaan ketegangan dan tekanan emosional • meminta uang atau barang scr paksa disertai ancaman • ...
Definitions for computer 2021-10-06
Across
- to gain information from someone else in a bad way
- parts of a computer or substance
- to pertain something
- small and portable soli device that can be inserted onto a USB
- the key to the computer system which stands for Central Processing Unit
- storage information
- a reason or limited use of copyrighting
- the way to communicate with other networks
- this is used to store memory and has lots of small chips
- when you take or steal information from someone else and copy it to make it look like yours
Down
- a website that allows to delete, gain, revise a content using a web browser
- a local network area
- a security use to protect the use of your network and data
- the right to make copies of music, artistic work and words
- stands for wide network area which is a computer network that connects smaller networks
- a storage device
- a security device that can help protect the computer
- used to connect cables to a computer
- this is often seen in messages and posts
19 Clues: a storage device • storage information • a local network area • to pertain something • parts of a computer or substance • used to connect cables to a computer • a reason or limited use of copyrighting • this is often seen in messages and posts • the way to communicate with other networks • to gain information from someone else in a bad way • ...
key terms geography 2025-09-15
Across
- The influence of geography on international politics and power relations.
- The study of population structure and change.
- A location with meaning attached to it.
- ratio The ratio of dependent people to working-age people.
- resource management Using resources without depleting them for future generations.
- A city with a population over 10 million.
- Renovation of poor urban areas attracting wealthier residents.
- heat island effect Cities are warmer than surrounding rural areas due to human activity.
- commons Areas outside national jurisdiction shared by all (oceans, atmosphere, Antarctica, space).
- Increasing interconnectedness of people, places and economies worldwide.
- / outsider How included or excluded someone feels in a place.
- Growth in the proportion of people living in towns and cities.
Down
- Mutual reliance between countries or regions for goods, services, labour or capital.
- Unequal distribution of wealth, opportunities or resources between groups or places.
- governance International cooperation to manage global issues through laws, norms and institutions.
- Movement from urban areas to rural areas.
- security Reliable access to sufficient, nutritious food.
- of place The emotional attachment people have to a place.
- (non-governmental organisation) Independent organisation addressing social, environmental or humanitarian issues.
- security Reliable access to essential resources.
20 Clues: A location with meaning attached to it. • Movement from urban areas to rural areas. • A city with a population over 10 million. • The study of population structure and change. • security Reliable access to essential resources. • security Reliable access to sufficient, nutritious food. • of place The emotional attachment people have to a place. • ...
Office 2022-03-10
14 Clues: sit upon • has keys • get money • job security • transfer labs • birthday in mar • needed workspace • online meeting tool • people you work with • used for viewing data • bossy person (2words) • david's favorite city • melody's saying (4words) • making people happy (2words)
digital ciizenship 2021-01-29
12 Clues: passwords • real world • being safe • being tricked • evaluate media • group of people • online community • being safe online • protecting yourself • reliable information • opposite of plagiarism • to keep someone away digitally
Ch. 1-3 Narnia 2023-11-13
12 Clues: scarf • crazy • trick • curious • packages • "tell me" • male deer • from now on • layer of gold • radio without cords • light meal, Eng. custom • to put to sleep, sense of security
PHRASAL VERBS 2020-05-18
12 Clues: wait • reparar • request • sentarse • levantarse • despertarse • become happy • ponerse de pie • devolverle algo a alguién • copy as a security measure • have a friendly relationship • break or separate into pieces
CAB 2021-03-04
Across
- Punching,kicking spitiig
- intentionally excluding someone from an online group
- spreading rumors
- the person that just sits and watches someone getting picked on
- someone who sticks up for someone that is getting bullied
- repeatedly sending abusive, insulting, or unwanted messages
- Online arguments using electronic messages with aggressive or abusive language
- Disclosing someone else’s secrets or embarrassing information online without their consent
Down
- pretending to be someone else and sending or posting material
- writing mean messages on social media
- repeated, intense harassment and denigration that includes threats or creates significant fear
- Spreading gossip, lies or rumours about someone to damage their reputation or friendships
- talking someone into revealing secrets or embarrassing information, then publishing it online
- name calling threning
- messing around with your friend and both of you are having fun
15 Clues: spreading rumors • name calling threning • Punching,kicking spitiig • writing mean messages on social media • intentionally excluding someone from an online group • someone who sticks up for someone that is getting bullied • repeatedly sending abusive, insulting, or unwanted messages • pretending to be someone else and sending or posting material • ...
tech crossword 2023-06-07
Across
- a type of computer memory where data is stored
- it is a mobile operating system
- a malicous software that may cause disruption to your computer and leak private information online
- it is any sequence of one or more symbols
- small blocks of data created by a server
- a system that protects the Internet from cyber attacks
- a program that once is executed, would cause major damage to the computer
Down
- a digital representation of text and data
- a collection of data duplicating original values
- a mapping for some domain to bits
- one of the largest technology companies
- an image that is used for representing data
- a hardware used for transmitting digital video and audio from one device to another
- a moving digital image
- a method of transmitting and receiving messages using electronic devices
15 Clues: a moving digital image • it is a mobile operating system • a mapping for some domain to bits • one of the largest technology companies • small blocks of data created by a server • a digital representation of text and data • it is any sequence of one or more symbols • an image that is used for representing data • a type of computer memory where data is stored • ...
Vocabulary revision. unit 6, Light up 2023-04-21
Across
- both countries were about to start a _____ because of their disagreements.
- prejudice or discrimination because of a person's age.
- after the heavy rains, there was a lot of _______in the city.
- the belief that humans may be divided into separate and exclusive biological entities called “races”
- team or group
- starting point
- There was too much _____ in the country because of the bad economy
Down
- People had nothing to eat. A ______ was declared.
- (verb)consists of
- The education system is excellent and the country has almost no _______ among its citizens.
- Cyber _______ is one of the modern-day problems affecting teenagers.
- the practice of ending a personal relationship with someone by suddenly and without explanation withdrawing from all communication.
- (verb) to stay away from someone or something
- the way it develops
- (verb) to get better
15 Clues: team or group • starting point • (verb)consists of • the way it develops • (verb) to get better • (verb) to stay away from someone or something • People had nothing to eat. A ______ was declared. • prejudice or discrimination because of a person's age. • after the heavy rains, there was a lot of _______in the city. • ...
Vocabulary pag 72 2024-04-17
Across
- or evidence used to prove or disprove a fact.
- observe or carefully analyze something to obtain information.
- in charge of investigating crimes and collecting evidence.
- of illegally taking another person's property without his or her consent.
- of seeking information and collecting evidence to solve a criminal case.
- a solution or answer to a problem or situation.
- used to inflict damage or cause injury.
- to the act of illegally taking another person's property without their consent.
- of killing someone intentionally and illegally.
- actively follow or search for someone, especially a criminal.
Down
- and distinctive prints on your fingertips.
- to identify people and as evidence in criminal cases.
- where people convicted of crimes are imprisoned.
- officers-Members of law enforcement agencies charged with maintaining peace and security.
- Guard-Professional in charge of protecting property and people.
- person who commits crimes or breaks the law.
- capture or detain someone, especially a criminal.
17 Clues: used to inflict damage or cause injury. • and distinctive prints on your fingertips. • person who commits crimes or breaks the law. • or evidence used to prove or disprove a fact. • a solution or answer to a problem or situation. • of killing someone intentionally and illegally. • where people convicted of crimes are imprisoned. • ...
Technology 2025-12-20
13 Clues: Manage • Addicted • Security • Television • Head braker • Oposite of start • Useable on doors • Opposite of slow • Film,take pictures • A girls best friend • The name of the puzzle • Structure & Organization • Computers,phones and technology
Online Safety 2019-09-09
Across
- An illegal scam used by criminals to with hopes to obtain your personal information is called
- __ means to be safe on the internet and act ethical.
- legal trouble suspension and __ for cyber bullying
- The act of using another person’s words or ideas without giving credit to that person.
- Education Criticizing Comedy and News reporting is legal examples of __.
Down
- many teens send time on __.
- Turn off your location and __ settings.
- illegal downloading and sharing music.
- Bullying that takes place using an electronic device to harass, threaten, embarrass or target someone
- never share personal __ with strangers.
10 Clues: many teens send time on __. • illegal downloading and sharing music. • Turn off your location and __ settings. • never share personal __ with strangers. • legal trouble suspension and __ for cyber bullying • __ means to be safe on the internet and act ethical. • Education Criticizing Comedy and News reporting is legal examples of __. • ...
Think before you click-crosswords 2023-05-17
Across
- A cyber attack caused by clicking on a like button of a post or an ad
- American term for journalism
- Presenting information in an exciting way
- False online identity that promotes personal opinions
Down
- False information used to mislead for example an enemy
- Anonymous person who sends provocative and off-topic messages
- Set of rules that ranks how likely users interact with social media
- A malicious link that’s under a clickable surface
- For example image processing to produce videos of celebrities saying or doing something they haven’t done
- Popular newspaper with pictures and very short and small
10 Clues: American term for journalism • Presenting information in an exciting way • A malicious link that’s under a clickable surface • False online identity that promotes personal opinions • False information used to mislead for example an enemy • Popular newspaper with pictures and very short and small • Anonymous person who sends provocative and off-topic messages • ...
SERENTAK BERGERAK STOP PERUNDUNGAN 2023-11-10
Across
- penggunaan kekuasaan atau kekuatan untuk menyakiti seseorang atau kelompok, sehingga korban merasa tertekan trauma dan tidak berdaya
- salah satu dimensi Profil Pelajar Pancasila
- salah satu tempat yang digunakan untuk membuat kebijakan anti bullying
- Komisi Perlindungan Anak Indonesia
Down
- membangun komunikasi anak dan orang tua adalah salah satu cara mencegah bullying di lingkungan ...
- bullying yang dilakukan secara lisan akan berdampak seius pada ... korban
- Perundungan melalui media elektronik
- jenis perundungan dengan memukul, mendorong, menggigit, menjambak, menendang
- salah satu akibat yang timbul karena perundungan
- jenis bullying dengan penggunaan kata-kata untuk menyakiti misalnya memanggil nama dengan julukan yang tidak baik
10 Clues: Komisi Perlindungan Anak Indonesia • Perundungan melalui media elektronik • salah satu dimensi Profil Pelajar Pancasila • salah satu akibat yang timbul karena perundungan • salah satu tempat yang digunakan untuk membuat kebijakan anti bullying • bullying yang dilakukan secara lisan akan berdampak seius pada ... korban • ...
tts bk 2024-04-30
Across
- adalah bullying yang dilakukan pelakunya melalui sarana elektronik
- adalah pelopor penelitian bullying
- Meminta uang atau barang secara paksa disertai dengan ancaman
- adalah salah satu sebab munculnya bulliying karena tradisi turun temurun dari senior
- contohnya adalah menendang , memukul , menampar
- adalah bentuk penindasan yang dilakukan seseorang atau sekelompok orang yang lebih kuat terhadap orang lain dengan tujuan untuk menyakiti
Down
- dalam pandangan Islam, bullying merupakan perbuatan
- ini dapat berupa julukan nama celaan,fitnah,ketikan kejam, penghinaan,dll
- adalah dampak bullying yang menyebabkan peningkatan dan penurunan suasana hati
- Salah satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain
10 Clues: adalah pelopor penelitian bullying • contohnya adalah menendang , memukul , menampar • dalam pandangan Islam, bullying merupakan perbuatan • Meminta uang atau barang secara paksa disertai dengan ancaman • adalah bullying yang dilakukan pelakunya melalui sarana elektronik • ini dapat berupa julukan nama celaan,fitnah,ketikan kejam, penghinaan,dll • ...
Kel.3 Kelas X-A (AI & LoT) 2024-08-07
Across
- AI tidak hanya meningkatkan pemahaman terhadap kondisi saat ini tetapi juga memberikan kemampuan
- pengumpulan dan pertukaran data yang luas oleh perangkat LOT meningkatkan risiko serangan
- rumah pintar konker yang menggambarkan hubungan erat antara LOT dan AI
- time algoritma AI dapat menganalisis data ini secara
- pemegang peran utama dalam mengelola data mentah yang dikumpulkan oleh sensor-sensor
- tidak hanya tentang pengumpulan data tetapi juga tentang memberikan konteks dan makna pada data tersebut
Down
- Spanyol salah satu implementasi kota pintar yang signifikan terletak di
- antara perangkat lot yang beragam
- untuk mengatasi serangan perlu diterapkan tindakan keamanan yang
- AI dan IOT digabungkan terbentuk
10 Clues: AI dan IOT digabungkan terbentuk • antara perangkat lot yang beragam • time algoritma AI dapat menganalisis data ini secara • untuk mengatasi serangan perlu diterapkan tindakan keamanan yang • rumah pintar konker yang menggambarkan hubungan erat antara LOT dan AI • Spanyol salah satu implementasi kota pintar yang signifikan terletak di • ...
teach 2025-09-07
Across
- Prefix for anything involving virtual or digital threats.
- Online test to tell humans from bots — often asks you to “spot the traffic light” .
- Microsoft’s OS that introduced the Start menu.
- – A DSA structure with LIFO order — also what “overflows” on a famous Q&A site (5).
- – The annoying lag between click and response (7).
- – The coder’s social network for sharing repos (6).
Down
- Microsoft’s old web browser — or the Windows file manager.
- The digital ledger tech behind Bitcoin and more.
- – Coffee-inspired programming language once said to “run everywhere” (4).
- – Open-source OS mascot is a penguin named Tux (5).
10 Clues: Microsoft’s OS that introduced the Start menu. • The digital ledger tech behind Bitcoin and more. • – The annoying lag between click and response (7). • – Open-source OS mascot is a penguin named Tux (5). • – The coder’s social network for sharing repos (6). • Prefix for anything involving virtual or digital threats. • ...
Dampak Sosial Informasi dan Jaringan Komputer dan Internet 2025-11-24
Across
- Pelecehan terhadap seseorang menggunakan teknologi digital
- Memungkinkan komunikasi jarak jauh yang cepat dan mudah, serta memperluas jaringan sosial.
- perundungan di dunia maya
- Penyebaran Informasi palsu yang menyesatkan masyarakat
- Penyebaran informasi bohong untuk menyesatkan publik
- seseorang akan merasa “bahagia” hanya dengan berbekal smartphone ataupun komputer.
Down
- kejahatan dengan menggunakan teknologi komputer untuk kemudian melakukan transaksi dengan menggunakan kartu kredit orang lain
- Mempermudah akses terhadap sumber belajar melalui platform daring
- Hak seseorang untuk mengontrol informasi pribadi
- kejahatan yang dilakukan dengan membuat gangguan, perusakan ataupun penghancuran terhadap suatu data, program komputer, sistem jaringan komputer yang terhubung langsung dengan internet.
10 Clues: perundungan di dunia maya • Hak seseorang untuk mengontrol informasi pribadi • Penyebaran informasi bohong untuk menyesatkan publik • Penyebaran Informasi palsu yang menyesatkan masyarakat • Pelecehan terhadap seseorang menggunakan teknologi digital • Mempermudah akses terhadap sumber belajar melalui platform daring • ...
Emerging careers 2025-05-13
Across
- Environmental, Social, Governance framework CAs use to assess sustainability reporting
- Technology transforming audits and transactions, requiring CAs to verify decentralized ledgers
- Ensuring adherence to laws and regulations like GST or SEBI guidelines
- Corporate combinations where CAs perform financial due diligence
- When companies can't pay debts, CAs in this field handle restructuring proceedings
Down
- Using big data insights to drive strategic financial decisions
- Assessment and management of financial, operational or cyber threats
- CAs provide funding, compliance, and scaling advice to these new ventures
- Digital assets requiring specialized tax and regulatory expertise from modern CAs
- Accounting specialty investigating financial fraud and disputes
10 Clues: Using big data insights to drive strategic financial decisions • Accounting specialty investigating financial fraud and disputes • Corporate combinations where CAs perform financial due diligence • Assessment and management of financial, operational or cyber threats • Ensuring adherence to laws and regulations like GST or SEBI guidelines • ...
10.2 & 3: The Second New Deal & The New Deal Coalition (pp. 320-327) 2024-01-17
Across
- California physician and critic of FDR who wanted the government to help the elderly more.
- Economic upturn, after a depression
- Catholic priest and radio host who didn't think FDR was going far enough in his reforms.
- Process in which a neutral party hears arguments from two opposing sides and makes a decision that both must accept
- Something that provides security against misfortune.
- This was abolished under the Fair Labor Standards Act.
- Spending borrowed money rather than raising taxes.
- Attempt to resolve conflict between hostile people or groups.
Down
- Role of government to work out conflicts among competing interest groups.
- FDR's wife
- To provide money for a project.
- Type of strike that is a method of boycotting work by sitting down at work and refusing to leave.
- Act passed by Congress to provide financial security to older Americans.
- Appointing extra judges who will rule in favor of your policies.
- Law passed that guaranteed workers the right to unionize.
- Former governor of Louisiana and critic of FDR.
- Works Progress Administration
- Because of that.
- Something that promotes well-being or is a useful aid
19 Clues: FDR's wife • Because of that. • Works Progress Administration • To provide money for a project. • Economic upturn, after a depression • Former governor of Louisiana and critic of FDR. • Spending borrowed money rather than raising taxes. • Something that provides security against misfortune. • Something that promotes well-being or is a useful aid • ...
Chapter 11 test study guide 2025-04-09
Across
- The rising stock prices convinced many people to ___________ in stocks.
- federal __________ insurance corporation
- ____________ borrowed their money from banks.
- Many people supported the New Deal, but the ____________ world did not.
- The WPA also gave jobs to ________ artists and writers.
- Many investors did not have the money to buy stocks, so they bought on _________.
- In 1930 Congress passed the _________ Tariff.
- Most people during the dustbowl left __________ to head for California.
- By the late 1920s, ____________ prices were very high.
- In 1935 Roosevelt created a new set of programs, often called the ______________.
Down
- homeless shelters during the depression
- In August 1935, Congress passed the __________ act.
- The United States slid into an economic crisis called the __________.
- In April, Congress created the _____________ administration
- The _________ improved a little by the mid-1930s, but the Great Depression continued.
- The social security act placed a _____ on workers and employers.
- an organized system for buying and selling shares, or blocks of investments, in corporations
- The Hawley-Smoot was a tax on ___________.
- The money from the social security act was used to pay monthly ________ to retired people.
19 Clues: homeless shelters during the depression • federal __________ insurance corporation • The Hawley-Smoot was a tax on ___________. • ____________ borrowed their money from banks. • In 1930 Congress passed the _________ Tariff. • In August 1935, Congress passed the __________ act. • By the late 1920s, ____________ prices were very high. • ...
KNOW YOUR CODES 2018-12-12
11 Clues: FIRE • PLAN D • CODE 11 • CODE 99 • EVACUATION • BOMB THREAT • CHEMICAL SPILL • SECURITY EMERGENCY • OUT OF CONTROL PERSON • INFANT/CHILD ABDUCTION • PATIENT LOCATION ALERT
The Functions Performed Within Communication Systems 2021-07-07
11 Clues: data • origin • decodes • mediums • security • common clock • protocol levels • interface, transmitter • server, user's identity • sent by the sender to receiver • bringing something to existence
PenFed Fun 2022-09-05
14 Clues: leader • a thief • transfer • who we are • reader board • add more fraud • member services • famous fraudster • computer program • Paris' Dog's name • not enough security • who you gonna call? • block of calls from 8-11am • must be _______ out of state
Unit 6: Tidy your room!! 2020-10-26
Across
- Security implement used to cover your mouth and nose.
- car A vehicle used by the police.
- Security implement used to protect your head.
- A person who extinguishes fires.
Down
- A vehicle which transport injured people.
- Metal rings used for souring prisoners.
- A vehicle used by firefighters.
- A person who helps doctors and cares for sick people.
8 Clues: A vehicle used by firefighters. • A person who extinguishes fires. • car A vehicle used by the police. • Metal rings used for souring prisoners. • A vehicle which transport injured people. • Security implement used to protect your head. • Security implement used to cover your mouth and nose. • A person who helps doctors and cares for sick people.
NZST Airport Operations 2020-03-30
Across
- Stage 3: Check the _____ to check the baggage allowance
- Printing the labels and attaching to bags is known as
- Complete the job title: Customer Service _______
- The first stage of check in is the ______
- These are not included in your hand luggage allowance
Down
- Skis, surf boards and golf clubs are ______ baggage
- In stage two the CSA will ask for ID such as a ________
- When pax are through security, they are now ______
- Stage 7 Tell pax which _____ to go to
- Where is New Zealand's busiest Airport?
- In Stage 5 the CSA asks security and ___goods questions
11 Clues: Stage 7 Tell pax which _____ to go to • Where is New Zealand's busiest Airport? • The first stage of check in is the ______ • Complete the job title: Customer Service _______ • When pax are through security, they are now ______ • Skis, surf boards and golf clubs are ______ baggage • Printing the labels and attaching to bags is known as • ...
Confientiality 2025-02-06
Across
- insurance information
- Data information which may arise from employment-related physicals, drug tests and
- work history, date of birth, social security number, criminal record,
- information
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of information
- involves individuals hired to steal trade secrets, new products or
Down
- Data records of an employee’s performance on the job such as performance reports,
- religion, etc.
- actions, supervisory notations Corporate Espionage form of espionage conducted for commercial purposes rather than security;
- of rules or promises which limits access or places restrictions on certain
11 Clues: information • religion, etc. • of information • insurance information • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • of rules or promises which limits access or places restrictions on certain • Data records of an employee’s performance on the job such as performance reports, • ...
JOBS 2013-05-02
15 Clues: / cuts hair • / serves food • / flies planes • /sells products • / goes to school • / teaches English • / helps the doctor • / plays intruments • / helps sick people • / works in the house • player / plays soccer • / doesn't work anymore • / informs about the news • / participates in movies • officer /controls security
List 32 Vocabulary Words 2021-10-20
15 Clues: sociable • make soft • go against • unorthodox • thought-to-be • heated dispute • ego second self • affirm or declare • speech to oneself • a flowing together • talking in circles • pledge as security • male head of family • cold-blooded composure • force of a million pounds of dynamite
Sure! Here's the list of terms in one line, separated by a single space: righteous idolatry hospitality genealogy communal identity byproduct monuments spiritual legacy economic stability infertile preserve legacy adjacent disconnect progression 2025-05-21
Across
- next to, adjoining
- separation, disconnection
- advancement, development
- memorials, statues
- idol worship, paganism
- ancestry, lineage
- legacy moral inheritance, ethical heritage
- inheritance, heritage
- virtuous, moral
Down
- secondary result, side effect
- stability financial security, fiscal balance
- identity group belonging, shared culture
- generosity, cordiality
- maintain, protect
- barren, sterile
15 Clues: barren, sterile • virtuous, moral • maintain, protect • ancestry, lineage • next to, adjoining • memorials, statues • inheritance, heritage • generosity, cordiality • idol worship, paganism • advancement, development • separation, disconnection • secondary result, side effect • identity group belonging, shared culture • legacy moral inheritance, ethical heritage • ...
Chapter 14 2016-04-18
Across
- tax, a tax on the value of a property
- income tax, a tax on a persons earnings
- tax, a tax on the dollar value of a good or service being sold
- of a tax, a final burden of a tax
- spending, spending on certain programs that is mandated or required by existing law
- tax on imported goods
- budget, budget in which revenue is equal to spending
Down
- budget, budget for day-to-day expenses
- security, old-age survivors and disability insurance
- a required payment to a local, state, or national government
- tax, a tax on money or property that one living person gives to another
- spending, spending category about which government planners can make choices
- budget, budget for major capital or investment expenditures
- taxes that fund social security and medicare
- income tax, a tax on the value of a company's profits
- base, income property, good, or service that is subject to a tax
- income received by a government from taxes and non-taxed resources
17 Clues: tax on imported goods • of a tax, a final burden of a tax • tax, a tax on the value of a property • budget, budget for day-to-day expenses • income tax, a tax on a persons earnings • taxes that fund social security and medicare • security, old-age survivors and disability insurance • budget, budget in which revenue is equal to spending • ...
Patients Matter Crossword Puzzle 2019-01-31
Across
- What does the P stand for in PHI as defined by HIPAA?
- Last Name of our Information Security Director
- Sending e-mails to gain relevant information
- Log to track and manage risks (Two words)
- unplanned interruption to an IT Service or a reduction in the Quality of an IT Service
- Internal control reports on the services provided by a service organization (Two words)
- What is the open Slack Channel to contact ITGRC? (No characters)
Down
- We have an obligation to destroy data
- Last Name of our Director of Enterprise Risk Management
- I can travel anywhere in the world with my laptop?
- Last Name of our Security Officer
- What does the C stand for in ITGRC?
- Who should I contact if I suspect fraud, misuse, or accidental disclosure?
- Last Name of our Privacy Officer
- Which ITGRC area do I contact for an acceptable use request?
- Office of Consumer Rights
- Last Name of our Investigations Lead
17 Clues: Office of Consumer Rights • Last Name of our Privacy Officer • Last Name of our Security Officer • What does the C stand for in ITGRC? • Last Name of our Investigations Lead • We have an obligation to destroy data • Log to track and manage risks (Two words) • Sending e-mails to gain relevant information • Last Name of our Information Security Director • ...
Government and National budget 2025-01-18
Across
- Refers to the people who own and control factors of production.
- increase in the level of production of a country.
- Government expenditure to keep country safe.
- The government that deals with safety and security of the whole country.
- A payment made to a business by the government to assist it.
- The government that deals with education of a specific province.
- The compulsory payment made to government by an individual or business on the income or profit that they earn.
- The minster who presents the national budget.
Down
- A list of expected income and intended expenditure.
- The government that deals issues within a town or municipal area.
- Tax charged on luxury/non-essential items.
- A situation in which something is unfair/unequal.
- Taxes paid directly to the government.
- The sums of money paid by the government for a particular purpose, for example pensioners.
- Tax charged when goods are bought and sold.
- Tax charged by companies.
- Tax charged on salaries and wages by households.
17 Clues: Tax charged by companies. • Taxes paid directly to the government. • Tax charged on luxury/non-essential items. • Tax charged when goods are bought and sold. • Government expenditure to keep country safe. • The minster who presents the national budget. • Tax charged on salaries and wages by households. • increase in the level of production of a country. • ...
Cyber Bulying 2018-04-26
6 Clues: Αυτός που ασκεί τον εκφοβισμό • Αντιμετωπίζει την επιθετικότητα • Αυτός που δέχεται τον εκφοβισμό • Μπορεί να δεχτεί εκεί τον εκφοβισμό • Που επιδρά ο διαδικτυακός εκφοβισμός ; • Όταν δέχεσαι διαδικτυακό εκφοβισμό καλείς σε αυτούς.
cyber wellness 2022-06-23
Across
- Hostile or violent behaviour.
- Refusing to go out.
- The condition of being addicted to a particular activity.
Down
- Feeling a fairly strong and persistent pain.
- Regularly having problems sleeping.
- A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.
6 Clues: Refusing to go out. • Hostile or violent behaviour. • Regularly having problems sleeping. • Feeling a fairly strong and persistent pain. • The condition of being addicted to a particular activity. • A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.
cyber seguridad 2020-12-01
Across
- this prevents viruses from entering the computer
- is the eassiest way to hack somebody are key numbers to enter intagram for example
- this way hackers can get confidential
Down
- is when you recieve an email fake thats ..... .....
- It is something to protect yourself from hackers and not to steal data
- when somebady spy you because you dowland something eligal or some trap that the hacker put you
6 Clues: this way hackers can get confidential • this prevents viruses from entering the computer • is when you recieve an email fake thats ..... ..... • It is something to protect yourself from hackers and not to steal data • is the eassiest way to hack somebody are key numbers to enter intagram for example • ...
cyber seguridad 2020-12-01
Across
- this prevents viruses from entering the computer
- is the eassiest way to hack somebody are key numbers to enter intagram for example
- this way hackers can get confidential
Down
- is when you recieve an email fake thats ..... .....
- It is something to protect yourself from hackers and not to steal data
- when somebady spy you because you dowland something eligal or some trap that the hacker put you
6 Clues: this way hackers can get confidential • this prevents viruses from entering the computer • is when you recieve an email fake thats ..... ..... • It is something to protect yourself from hackers and not to steal data • is the eassiest way to hack somebody are key numbers to enter intagram for example • ...
Cyber Safety 2024-06-04
Across
- Unwanted or unsolicited email messages.
- Unauthorized intrusion into a computer system or network.
- Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
- Digital method of exchanging messages over the internet.
- Measures taken to protect a system against unauthorized access or attacks.
- A secret word or phrase used to gain access to a system.
6 Clues: Unwanted or unsolicited email messages. • Digital method of exchanging messages over the internet. • A secret word or phrase used to gain access to a system. • Unauthorized intrusion into a computer system or network. • Measures taken to protect a system against unauthorized access or attacks. • ...
Cyber Safety 2023-05-18
6 Clues: Getting a fake email • Pretending to be someone else • Online fights through messaging • An abbreviation Laughing out loud • Something that ruins your computer • Stealing someone's work without giving credit
Cyber World 2023-07-12
6 Clues: an input device • An output device • Read Access Memory • The brain of the computer. • change the case of the letter when pressed • The ________ is a mean of sending information to the computer
Network concept and Cyber ethics 2025-05-31
Across
- A network within a small area, like a home or school
- A set of rules for data communication between devices
- A security system that controls incoming and outgoing network traffic
- Global network connecting millions of computers
- Unauthorized access to computer systems
- Bullying or harassment using digital technology
- Illegal copying or downloading of software or media
- Secret string of characters used for authentication
Down
- A network that covers a large geographic area
- A computer that provides data to other computers
- A computer that receives data from a server
- The right to keep personal information secure online
- Fraudulent attempt to obtain sensitive information via fake messages
- Device that converts digital data into signals for transmission
- copying someone’s work or ideas without permission or credit
- Permission given to collect or use data
- Device that forwards data packets between networks
- Malicious software designed to damage or disrupt systems
18 Clues: Permission given to collect or use data • Unauthorized access to computer systems • A computer that receives data from a server • A network that covers a large geographic area • Global network connecting millions of computers • Bullying or harassment using digital technology • A computer that provides data to other computers • ...
Informatika 2023-03-01
Across
- singkatan dari computational thinking
- perangkat keras (hardware) pada komputer yang berfungsi sebagai alat untuk input data yang berupa huruf, angka dan simbol
- ... bullying adalah perundungan dengan menggunakan teknologi digital
- memudahkan pemerintah dalam melakukan sosialisasi kebijakan merupakan salah satu dampak ... informatika
- STEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika)
- bentuk kejahatan online yang dilakukan dengan cara menggunakan kartu kredit orang lain
Down
- salah satu aplikasi media chat
- kemampuan memecah data, proses atau masalah (kompleks)menjadai bagian-bagian yang lebih kecil atau menjadi tugas-tugas yang mudah dikelola
- alat mencetak kertas
- salah satu program aplikasi pengolah angka
10 Clues: alat mencetak kertas • salah satu aplikasi media chat • singkatan dari computational thinking • salah satu program aplikasi pengolah angka • ... bullying adalah perundungan dengan menggunakan teknologi digital • STEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika) • ...
ICT WORDZ 2024-02-23
Across
- Is the gap between those who have access to technology and those who don't
- Also known as home working
- Allows you to make informed decisions
- Moral rules that describe what we believe is right or wrong within a civilized
- Is the legal right of ownership for the creator piece of work
Down
- A establishment of the purchaser's right to use the software
- A type of cyber crime
- Going against moral rules of right and wrong in the society
- Users are licensees. They can't copy, modify or share the product
- Grants a user the right to run an application on a specific machine
10 Clues: A type of cyber crime • Also known as home working • Allows you to make informed decisions • Going against moral rules of right and wrong in the society • A establishment of the purchaser's right to use the software • Is the legal right of ownership for the creator piece of work • Users are licensees. They can't copy, modify or share the product • ...
C2BK Presentation Crossword Puzzle 2024-05-28
Across
- help bullies to understand the harm of bullying
- Have you ever hurt anyone by purpose? Did you keep yourself safe when you reached out to others?
- the person who helps the victim, who you can become
- the person who bullies
- the person who is being bullied
- the person who helps the bully
Down
- the person who does not interact with bullying
- the name for bullying that happens online
- something that you can ask for from your teachers and friends that will make you and the situation better
- false information that you shouldn’t spread
10 Clues: the person who bullies • the person who helps the bully • the person who is being bullied • the name for bullying that happens online • false information that you shouldn’t spread • the person who does not interact with bullying • help bullies to understand the harm of bullying • the person who helps the victim, who you can become • ...
Let's Solve 2025-02-19
Across
- ,An online identity created by user to share information such as thoughts photos videos etc.
- ,A relationship between friend.
- ,To gain access you must make sure you are computer or device is connected to the INTERNET
- ,__________________ is to chat share and exchange thought, Idea or information.
Down
- ,A mix of letter numbers and symbols to keep pure account Secure.
- ,Never share _____________ information.
- ,Ability and knowledge to safely access digital
- bullying ,A form of online bullying.
- ,Doing this prevent access to information and resecure.
- ,A Traile of information and data as a result of you active.
10 Clues: ,A relationship between friend. • bullying ,A form of online bullying. • ,Never share _____________ information. • ,Ability and knowledge to safely access digital • ,Doing this prevent access to information and resecure. • ,A Traile of information and data as a result of you active. • ,A mix of letter numbers and symbols to keep pure account Secure. • ...
B1_Unit10 dictation 2025-05-05
Across
- To transfer files from the Internet onto your computer.
- To add new software to your computer.
- To turn a computer off and then turn on again.
- To make specific changes and prepare a device or software for use.
- When a program or computer stops working suddenly.
- To make a copy of important files in case something goes wrong.
Down
- This program helps protect your computer from cyber attacks.
- To remove an unnecessary app from your computer.
- To sign up for something (for ex. a Youtube Channel) to get updates or information regularly.
- To install the latest version of a program.
10 Clues: To add new software to your computer. • To install the latest version of a program. • To turn a computer off and then turn on again. • To remove an unnecessary app from your computer. • When a program or computer stops working suddenly. • To transfer files from the Internet onto your computer. • This program helps protect your computer from cyber attacks. • ...
engineering crosswords 2024-12-03
Across
- A step-by-step procedure for solving a problem.
- Relating to computers, networks, or information technology.
- The process of creating and writing computer software.
- A set of connected parts working together as a whole.
- The act of introducing something new or improving existing technology.
Down
- The application of scientific knowledge for practical purposes. Cloud: Remote servers used to store and process data via the internet.
- The capacity to do work or power machines.
- The use of technology to perform tasks without human intervention.
- A machine capable of carrying out a complex series of actions.
- written instructions for a computer to execute
10 Clues: The capacity to do work or power machines. • written instructions for a computer to execute • A step-by-step procedure for solving a problem. • A set of connected parts working together as a whole. • The process of creating and writing computer software. • Relating to computers, networks, or information technology. • ...
Crossword On Internet and Technology 2025-10-03
Across
- Protection of digital systems from theft or damage
- The introduction of new ideas or methods
- A digital world where people interact with each other, digital objects and environments in real time
- An important and sudden discovery or progress
- The right to keep personal information secure
Down
- Old-fashioned; no longer useful
- A person who is connected to the internet or who is using electronic devices
- Happening in many places or among many people
- A person who is knowledgeable and skilled in the use of technology
- Cyber attacks that trick people into giving away personal data
10 Clues: Old-fashioned; no longer useful • The introduction of new ideas or methods • Happening in many places or among many people • An important and sudden discovery or progress • The right to keep personal information secure • Protection of digital systems from theft or damage • Cyber attacks that trick people into giving away personal data • ...
Shirley Homes Chapter 5 2021-04-08
Across
- Shirley had a good _____ , so she took great photos
- Jeff was very nervous and started to ____
- Anna and her boyfriend kissed each other. They were very happy and ______
- When the investigator saw Anna in the pub, she decided to create a new _____
- Shirley wanted to watch Anna, so she wore a bright student ____
Down
- They suspected Anna, but couldn't ____ it
- When Jeff knew who the cyber thief was, he got really ____
- Anna was a clever young woman, not _____
- Anna had her lunch in the pub. There were a lot of people there, so it was _____
9 Clues: Anna was a clever young woman, not _____ • They suspected Anna, but couldn't ____ it • Jeff was very nervous and started to ____ • Shirley had a good _____ , so she took great photos • When Jeff knew who the cyber thief was, he got really ____ • Shirley wanted to watch Anna, so she wore a bright student ____ • ...
Robbery and Security 2021-11-19
Across
- - It's always important to stick to cash drawer ___
- - The most important thing is the safety of ___
- - Know the location of your ___ kit, and what's inside
- - Know the location of, and how to use ____ alarms
Down
- - Get the robber out of the bank as ___ as possible
- - Get as good of a ___ of the robber as possible
- - Always be ___ of your surroundings
- - ___ with the robbers demands
- - Always assume the robber is ___, even if no weapon is displayed
- - ___ try to interfere or apprehend the robber
10 Clues: - ___ with the robbers demands • - Always be ___ of your surroundings • - ___ try to interfere or apprehend the robber • - The most important thing is the safety of ___ • - Get as good of a ___ of the robber as possible • - Know the location of, and how to use ____ alarms • - Get the robber out of the bank as ___ as possible • ...
Information Security Puzzle 2015-07-08
Across
- / Such emails should be immediately deleted and not circulated further.
- / This policy requires employees to keep workstations free of confidential information when unattended
- / Mare sure that your computed screen is always ____ when unattended.
- / All security incidents should be ____ to ensure the authorities are notified, and appropriate actions taken to minimize impact.
- / An internationally acclaimed certification for information security standards.
- / ensures safeguarding the accuracy and completeness of information.
Down
- / This should contain a combination of alphabets, numbers and special characters .
- / Social ____ uses influence, persuasion or manipulation to deceive people and obtain sensitive information.
- / Is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- / This type of information is available on GKE websites, and free for everyone to access.
10 Clues: / ensures safeguarding the accuracy and completeness of information. • / Mare sure that your computed screen is always ____ when unattended. • / Such emails should be immediately deleted and not circulated further. • / An internationally acclaimed certification for information security standards. • ...
Social Security Taxes 2023-03-10
Across
- pay any payment made to individuals because of their personal injury or sickness that does not constitute wages
- the excess of the amount of employment taxes required to be deposited over the amount deposited on or before the last date prescribed for the deposit
- the block of time, consisting of four quarters beginning July 1 of the second preceding year and ending June 30 of the prior year, used to determine if an employer is a monthly or a semiweekly depositor
- any service performed by employees for their employer, regardless of the citizenship or residence of either
- the expenses that an employer pays for an employee’s education, such as tuition, fees, and payments for books, supplies, and equipment
Down
- the maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA
- rule that determines if an employer has satisfied the deposit obligation by having no shortfall that exceeds $100 or 2 percent of the amount of employment taxes required to be deposited
- an entity defined by law as an individual, a trust or estate, a partnership, or a corporation
- also known as a Federal Tax Identification Number, and is used to identify a business entity
- any person or organization who employs one or more individuals for the performance of services, unless such services or employment are specifically excepted by law
10 Clues: also known as a Federal Tax Identification Number, and is used to identify a business entity • an entity defined by law as an individual, a trust or estate, a partnership, or a corporation • the maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA • ...
Email Security Crossword 2021-10-15
Across
- Another way to check email authenticity is to look for our company ________.
- Always ______ emails that ask for confidential information, asks you to take action, or contains links and attachments.
- According to the FBI, ________ was the most common type of cybercrime in 2020.
- If an email is not asking you for action or information, send it to _____.
Down
- One way to check email authenticity is to check for the sender in your inbox or in _______.
- _________ emails are any emails attempting to sell you a service or to get you into a meeting.
- Successful phishing campaigns can lead to __________ attacks.
- If an email asks for ____________ information, report it to Data Security.
- If an email is from a sender you do not want to hear from again, mark it as ____.
- One way to determine if an email is suspicious is to check for _____ or attachments.
10 Clues: Successful phishing campaigns can lead to __________ attacks. • If an email asks for ____________ information, report it to Data Security. • If an email is not asking you for action or information, send it to _____. • Another way to check email authenticity is to look for our company ________. • ...
Branch Physical Security 2022-08-23
Across
- Who is our Retail Operations primary contact?
- During a robbery, try to remain ________.
- Make note of the ______________ used in escape.
- ________________ with the robber(s)' instructions.
- Activate the alarm ______________________, providing this action will not endanger yourself or others.
- Post the ____________ ______________ notice at the main entrance of the branch to notify customers that the branch is closed.
Down
- The Post Robbery __________________ should be distributed.
- Give each witness (associates and/or customers) a Suspect ______________________________ Form to help them recollect what they saw.
- Who is our Physical Security Manager?
- Once the robber has left the building, announce "________ ______ ________", this will alert the team that a robbery has taken place.
10 Clues: Who is our Physical Security Manager? • During a robbery, try to remain ________. • Who is our Retail Operations primary contact? • Make note of the ______________ used in escape. • ________________ with the robber(s)' instructions. • The Post Robbery __________________ should be distributed. • ...
Information Security Crossword 2017-01-13
Across
- A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
- A person who uses computers to gain unauthorized access to computer systems and networks.
- A type of malware that is often disguised as legitimate software.
- You may not divulge this information while you are working for an employer or after you leave.
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
Down
- Anything that has the potential to cause serious harm to a computer system.
- A flaw or weakness that can be used to attack a system or organization.
- Personal information related to personal data stored on computer systems
- A secret series of characters used to authenticate a person’s identity.
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • Personal information related to personal data stored on computer systems • ...
National Security Policymaking 2016-12-13
Across
- A policy, beginning in the earl;y 1970s, that sought a relaxation of tensions between the US and the Soviet Union, coupled with firm guarantees of mutual security
- A mutual reliance in which actions in a county reverberate and affect the economic well-being of people in other countries
- The foreign policy of the US followed throughout most of its history whereby it tried to stay out of other nations' conflicts, particularly European wars
- The use of violence to frighten a country's population or government
- First reduction in nuclear war
Down
- Defense budget cuts during times of peace
- An agency created after WWII to coordinate American Intelligence activities abroad and to collect, analyze, and evaluate intelligence
- The ratio of what a country pays for imports to what it earns from exports
- Policy that involves choice taking about relations with the rest of the world
- Being occupied by non-muslim peoples created a magnet for
10 Clues: First reduction in nuclear war • Defense budget cuts during times of peace • Being occupied by non-muslim peoples created a magnet for • The use of violence to frighten a country's population or government • The ratio of what a country pays for imports to what it earns from exports • Policy that involves choice taking about relations with the rest of the world • ...
Ethics & Computer Security 2019-04-18
Across
- the process of gaining root access to the iOS operating system that runs on Apple devices, including the iPad, iPhone and iPod Touch.
- the use of electronic messaging systems to send out unrequested or unwanted messages in bulk.
- reporting an immoral or illegal activity.
- redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website.
- any software that brings harm to a computer system.
Down
- a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
- the process of using an algorithm to transform information to make it unreadable for unauthorized users.
- Worm a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.
- of Ethics the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
- a technology that tracks and records consecutive key strokes on a keyboard.
10 Clues: reporting an immoral or illegal activity. • any software that brings harm to a computer system. • a technology that tracks and records consecutive key strokes on a keyboard. • the use of electronic messaging systems to send out unrequested or unwanted messages in bulk. • ...
Computer System Security 2024-03-25
Across
- Science of studying ciphers
- A Secret entry point into a program
- Hiding a message inside an image
- A collection of parameters required to establish a secure session
- A graphical network packet analyser
Down
- Allows server & client to authenticate each other
- Creates a secure tunnel over a public network
- A functions take inputs of variable lengths to return outputs of a fixed length
- A signature which is attached to a electronic document
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: Science of studying ciphers • Hiding a message inside an image • A Secret entry point into a program • A graphical network packet analyser • Creates a secure tunnel over a public network • Allows server & client to authenticate each other • A signature which is attached to a electronic document • A collection of parameters required to establish a secure session • ...
Security and commerce 2023-10-27
Across
- The electronic equivalent of a wallet
- A program, that spread by attaching themselves to executable files
- Special gift in the email, which is a fraud
- Programs, which are disguise as an innocent-looking file
- Bank fraud
- The illegal copying and distribution of copyrighted things
- Shopping basket
Down
- Online harassment or abuse in chatrooms
- The most common type of e-commerce
- Virtual shopping trolley
10 Clues: Bank fraud • Shopping basket • Virtual shopping trolley • The most common type of e-commerce • The electronic equivalent of a wallet • Online harassment or abuse in chatrooms • Special gift in the email, which is a fraud • Programs, which are disguise as an innocent-looking file • The illegal copying and distribution of copyrighted things • ...
Password Security Crossword 2024-09-25
Across
- Use this type of phrase to create a strong password (e.g., “MyD0g$pot!”)
- Your MSID password needs to be at least this many characters long
- A method to verify your identity using something you know, something you have and/or something you are
Down
- Person you can share your password with.
- Never use ________ information in your passwords
- This type of attack tricks you into revealing your password through fake emails or websites
- UHG approved password manager
- Always log out of your accounts when using a ______ computer
- Your ____ email address should only be used for work purposes
- Avoid using the same ________ across multiple accounts
10 Clues: UHG approved password manager • Person you can share your password with. • Never use ________ information in your passwords • Avoid using the same ________ across multiple accounts • Always log out of your accounts when using a ______ computer • Your ____ email address should only be used for work purposes • ...
Food Security Crossword 2024-10-17
Across
- Lack of consistent access to enough food
- The component in food essential for growth
- Crop failure due to extreme weather
- Nutrient deficiency resulting from lack of food
- Storing crops for future use
Down
- Agricultural practice to boost crop yields
- Promoting sustainable agriculture
- Diversifying crops to reduce risk
- Global organization addressing hunger
- Condition of having limited food supply
10 Clues: Storing crops for future use • Promoting sustainable agriculture • Diversifying crops to reduce risk • Crop failure due to extreme weather • Global organization addressing hunger • Condition of having limited food supply • Lack of consistent access to enough food • Agricultural practice to boost crop yields • The component in food essential for growth • ...
April (Security) Fools! 2025-04-18
Across
- Malicious software that locks data and demands payment for its release.
- A type of malware disguised as legitimate software.
- The process of converting information into a secure format.
- A barrier that controls the flow of network traffic.
- A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity
Down
- Software that secretly monitors and collects information about a user's activities.
- Software designed to disrupt, damage, or gain unauthorized access.
- The process of verifying the identity of a user or device.
- A network of infected devices controlled by a malicious actor.
- Software that detects and removes malicious programs.
10 Clues: A type of malware disguised as legitimate software. • A barrier that controls the flow of network traffic. • Software that detects and removes malicious programs. • The process of verifying the identity of a user or device. • The process of converting information into a secure format. • A network of infected devices controlled by a malicious actor. • ...
CYBER-CRIME / INTERNET ADDICTION 2016-08-17
Across
- This is the system a computer need to start working or “thinking”
- A file, document or picture you add to an email.
- This helps you to look for any kind of information online.
- This is an annoying email that many people get in their emails inbox.
- The action of using emails to take someone’s financial information.
- This is the place where you can leave online notes for friends.
- A program you need to stop receiving annoying emails.
Down
- A computer system that helps you to protect against phishing.
- A computer user who illegally have access to computer systems
- A message you send to your friend and he/she can read it a few second later.
- A dangerous computer program. When it is in your computer you cannot open any file.
- A series of unimportant letters and numbers to log in a webpage and that people don’t know.
- This is where emails are sent to.
13 Clues: This is where emails are sent to. • A file, document or picture you add to an email. • A program you need to stop receiving annoying emails. • This helps you to look for any kind of information online. • A computer system that helps you to protect against phishing. • A computer user who illegally have access to computer systems • ...
Cyber Law CIA I 2021-09-01
Across
- A network is usually private or restricted, specially created for an enterprise or an organization.
- A collection of web pages and other created content having a common domain.
- A situation where a person gets verbally or physically threaten on the internet,causing the other person a mental imbalance.
- People who are frequent users of the internet.
- A right especially to protect the rights and expression of the original work done by the creator.
- A security system present in the computer which supervises the operation and network traffic as per precoded rules.
- The process of exploiting the computer system or any private network.
- A way to protect data for the concerned user to access it.
Down
- A structured set of files just like a stack held in a computer, which is accessible in various ways.
- The conversion of text, pictures, or sound in the digital form.
- An environment in which communication occurs through a computer network.
- the right/powers to make rules and authority to interpret and apply them.
- It is a stated obligation and everyone has to abide by it.
13 Clues: People who are frequent users of the internet. • It is a stated obligation and everyone has to abide by it. • A way to protect data for the concerned user to access it. • The conversion of text, pictures, or sound in the digital form. • The process of exploiting the computer system or any private network. • ...
Spring Into Cyber Acrostic 2025-02-19
Across
- Irish holiday celebrated on March 17th.
- A tool or method used by hackers to take advantage of security flaws.
- A type of malware that locks files and demands payment.
- A type of cyberattack that overwhelms a network with traffic (abbr.)
- Animal often associated with March's unpredictable weather, with 'In like a lamb'
- The secure way to remotely connect to a corporate network.
Down
- The NCAA basketball tournament nickname (two words).
- Data-Link's year of incorporation, with Nineteen _________.
- Phase of the moon associated with strange happenings (two words)
- The process of verifying a user's identity online.
- A method used by hackers to secretly monitor network traffic.
- A festive procession often held on holidays.
- Season that begins in March
13 Clues: Season that begins in March • Irish holiday celebrated on March 17th. • A festive procession often held on holidays. • The process of verifying a user's identity online. • The NCAA basketball tournament nickname (two words). • A type of malware that locks files and demands payment. • The secure way to remotely connect to a corporate network. • ...
Cyber Safety Module 2020-06-05
Across
- A small window, usually displaying an ad
- An online room where people can login to talk to each other
- An online personal log or journal
- A type of malicious code or software that looks legitimate but can take control of your computer
- A malicious software program infecting a user's computer and performing malicious actions
- Getting information from a computer from somewhere on the internet and transferring it to your computer
Down
- A combination of numbers, letter and special characters that is known only to you and gives you access to a computer, website or network
- A social media platform
- Using the internet to harass, demean, bullying and insult someone
9 Clues: A social media platform • An online personal log or journal • A small window, usually displaying an ad • An online room where people can login to talk to each other • Using the internet to harass, demean, bullying and insult someone • A malicious software program infecting a user's computer and performing malicious actions • ...
CWSI Cyber CrossWord 2025-03-25
Across
- Foundation of both cybersecurity and team collaboration
- Common attack vector for phishing and scams
- What you should never do with suspicious links or attachments
- A vulnerability in software waiting to be exploited
- Guidelines that govern secure workplace behavior
Down
- A physical or digital object used for multi-factor authentication
- What hackers see unaware employees as
- A potential danger that exploits system vulnerabilities
- The chance that a threat will exploit a vulnerability
9 Clues: What hackers see unaware employees as • Common attack vector for phishing and scams • Guidelines that govern secure workplace behavior • A vulnerability in software waiting to be exploited • The chance that a threat will exploit a vulnerability • Foundation of both cybersecurity and team collaboration • A potential danger that exploits system vulnerabilities • ...
LDM Team Member Trivia Puzzle 2022-01-06
Across
- Just like the meaning of her name - a bird, who freely flies in the sky.
- Name is shared with a well known 19th century US writer.
- An important vitamin is the first letter of this persons name.
- Matured through an army stint, served during his late teens.
- Once spent an entire week in Oklahoma as a working cowboy.
- For a period of time this person slept with a M16 rifle under the pillow.
- A smiling person easy to work with.
- Enjoys learning new things about almost any topic.
- Family owns a vineyard.
Down
- Lifelong Bruins fan.
- Started at Cisco in 1999
- Spent time watching white tigers with chess grandmaster Garry Kasparov.
- Holds Master's degree in finance & accounting
- Backpacked ~400 miles in the last 2 years.
- Worked as a coffee roaster while studying computer networking in school.
- A wanna-be professional football player but not quite cutting it.
- Wanted to be cricketer before becoming curious about cyber threats.
- Son of a former catholic priest
- Unadorned royalty.
19 Clues: Unadorned royalty. • Lifelong Bruins fan. • Family owns a vineyard. • Started at Cisco in 1999 • Son of a former catholic priest • A smiling person easy to work with. • Backpacked ~400 miles in the last 2 years. • Holds Master's degree in finance & accounting • Enjoys learning new things about almost any topic. • Name is shared with a well known 19th century US writer. • ...
perkembangan transaksi ekonomi di era digital 2025-10-16
Across
- MARKETING Strategi pemasaran yang menargetkan pengguna media sosial.
- Transaksi yang memanfaatkan Quick Response Code (Kode Respon Cepat).
- Matauang kripto yang paling populer.
- Singkatan untuk Pembayaran Non Tunai.
- Konsumen yang melakukan pembelian secara daring (online).
- Platform yang memfasilitasi pertemuan antara penjual dan pembeli secara online.
- Proses jual beli barang atau jasa menggunakan jaringan internet.
- BANKING Penggunaan teknologi mobile untuk layanan keuangan.
- LENDING Suatu kegiatan pinjam meminjam dana yang dilakukan secara online.
- Layanan perbankan yang dapat diakses melalui ponsel pintar.
Down
- Istilah yang merujuk pada segala sesuatu yang berhubungan dengan dunia maya atau internet.
- CHANNEL Layanan yang menyediakan fasilitas transfer uang antar rekening tanpa melalui bank konvensional.
- Metode otentikasi menggunakan sidik jari atau wajah.
- Teknologi dasar yang mendukung mata uang kripto seperti Bitcoin.
- Istilah untuk dompet digital.
- Pembayaran yang dilakukan secara online tanpa menggunakan uang tunai fisik.
- Pelaku usaha yang memanfaatkan media digital untuk memasarkan produknya.
- Singkatan dari Financial Technology.
- CRIME Kejahatan di dunia maya yang bertujuan mencuri data atau informasi penting.
- Bentuk keamanan data yang mengubah informasi menjadi kode rahasia.
20 Clues: Istilah untuk dompet digital. • Matauang kripto yang paling populer. • Singkatan dari Financial Technology. • Singkatan untuk Pembayaran Non Tunai. • Metode otentikasi menggunakan sidik jari atau wajah. • Konsumen yang melakukan pembelian secara daring (online). • BANKING Penggunaan teknologi mobile untuk layanan keuangan. • ...
