cyber security Crossword Puzzles

SAW 2022 2022-01-14

SAW 2022 crossword puzzle
Across
  1. Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
  2. The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information
  3. Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
  4. A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
  5. Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
  6. an attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
  7. Converting information from one form to another to hide its content and prevent unauthorized access.
  8. Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
  9. An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
  1. This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
  2. A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
  3. indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
  4. Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
  5. Applies to information or assets that, if compromised, could cause serious injury to the national interest.
  6. Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
  7. Training that provides an overview of the directives and best practices related to security. Contains 10 modules.
  8. Malicious software designed to infiltrate and damage computers without the user’s consent.

17 Clues: Malicious software designed to infiltrate and damage computers without the user’s consent.An inadequacy related to security that could increase susceptibility to compromise or injury.Converting information from one form to another to hide its content and prevent unauthorized access....

HOLES 2025-02-21

HOLES crossword puzzle
Across
  1. felt better
  2. the sun burned the skin
  3. given to
  4. say who someone is
Down
  1. turned around
  2. security guard
  3. did nothing wrong
  4. stop
  5. scared
  6. very happy
  7. hair was taken off
  8. with no reason

12 Clues: stopscaredgiven tovery happyfelt betterturned aroundsecurity guardwith no reasondid nothing wronghair was taken offsay who someone isthe sun burned the skin

9th M3 L4 Crossword Puzzle 2024-01-28

9th M3 L4 Crossword Puzzle crossword puzzle
Across
  1. rare
  2. s.o. who breaks the law
  3. class of animals/plants
  4. Noun: stop existing
  5. security
Down
  1. Adjective "Environment"
  2. Adjective of "Globe"
  3. killing animals
  4. to impose
  5. valuable
  6. preserve
  7. the natural place where animals live

12 Clues: rarevaluablepreservesecurityto imposekilling animalsNoun: stop existingAdjective of "Globe"Adjective "Environment"s.o. who breaks the lawclass of animals/plantsthe natural place where animals live

CYBER INTIMIDATION 2013-09-30

CYBER INTIMIDATION crossword puzzle
Across
  1. - quand vous obtenez tu devrais _ _ _ _ _ _ leur
  2. - quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
  3. - peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms
  4. - beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu
Down
  1. - dire un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation
  2. - il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.

6 Clues: - quand vous obtenez tu devrais _ _ _ _ _ _ leur- peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms- beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu- quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.- dire un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation...

s22 2024-08-04

s22 crossword puzzle
Across
  1. The ability to prepare for, respond to, and recover from cyber incidents
  2. An ethical hacker who uses their skills for good
Down
  1. A hacker who falls between ethical and malicious hacking
  2. A hacker with malicious intent
  3. The process of identifying and analyzing potential risks
  4. Redirecting a website's traffic to a fraudulent site

6 Clues: A hacker with malicious intentAn ethical hacker who uses their skills for goodRedirecting a website's traffic to a fraudulent siteA hacker who falls between ethical and malicious hackingThe process of identifying and analyzing potential risksThe ability to prepare for, respond to, and recover from cyber incidents

156 2023-07-27

156 crossword puzzle
Across
  1. Measures taken to protect against unauthorized access, theft, or damage.
  2. Watching videos or listening to music online without downloading.
  3. Harmful software that can infect and damage computer files and programs.
  4. Storing data and files online to access them from any device with an internet connection.
  5. Software that securely stores and manages passwords for various accounts.
  6. Security system that controls and filters network traffic to protect against threats.
  7. Creating a copy of data to restore in case of loss or damage.
Down
  1. Biometric authentication using facial recognition.
  2. Unwanted and unsolicited emails, often sent in bulk.
  3. Biometric authentication using fingerprint recognition.
  4. Regular payment for access to a service or content.
  5. Installing the latest version of software to get new features and fixes.
  6. Software intended to harm or exploit devices, data, or networks.
  7. Improving a device or software to a better or newer version.
  8. Protection of personal information from being accessed or shared without consent.

15 Clues: Biometric authentication using facial recognition.Regular payment for access to a service or content.Unwanted and unsolicited emails, often sent in bulk.Biometric authentication using fingerprint recognition.Improving a device or software to a better or newer version.Creating a copy of data to restore in case of loss or damage....

PRINT 2025-01-23

PRINT crossword puzzle
Across
  1. – The physical components of a computer system.
  2. – Information processed or stored by a computer.
  3. – The maximum data transfer rate of a network or internet connection.
  4. – A wireless technology for connecting devices to the internet.
  5. – A type of malware that can replicate and spread to other computers.
  6. – The address of a web page on the World Wide Web.
  7. – A set of rules for transmitting data across a network.
  8. – Software designed to damage or disrupt a computer system.
Down
  1. – The process of converting data into a coded form for security.
  2. – A group of interconnected computers and devices sharing resources.
  3. – Programs and operating systems used by a computer.
  4. – A high-speed storage layer for frequently accessed data.
  5. – A security system that monitors and controls incoming and outgoing network traffic.
  6. – A set of instructions for solving a problem or performing a task.
  7. – The global network that connects millions of private, public, and academic systems.

15 Clues: – The physical components of a computer system.– Information processed or stored by a computer.– The address of a web page on the World Wide Web.– Programs and operating systems used by a computer.– A set of rules for transmitting data across a network.– A high-speed storage layer for frequently accessed data....

Cybersecurity & Web Exploitation Crossword 2022-11-16

Cybersecurity & Web Exploitation Crossword crossword puzzle
Across
  1. CSRF attacks use the ___ of other users without their knowledge.
  2. "Access control" is ensuring users cannot act outside of intended ___.
  3. You access web applications with this.
  4. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
  5. When a malicious actor hijacks clicks meant for a visible top-level site.
  6. For security reasons, by default, web apps should not ___ data from the browser.
  7. The OSI model has ___ layers.
Down
  1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
  2. In cybersecurity, blue teams do this.
  3. Acronym for the organization set up to improve software security in 2001.
  4. SQL injection attacks can give ___ to data users typically can't retrieve.
  5. What does the "I" in OSI stand for?
  6. In cybersecurity, red teams do this.
  7. ___ hat hackers hack unethically, for personal gain.
  8. ___ sanitization is the modification of user data so that it can't run scripts.

15 Clues: The OSI model has ___ layers.What does the "I" in OSI stand for?In cybersecurity, red teams do this.In cybersecurity, blue teams do this.You access web applications with this.___ hat hackers hack unethically, for personal gain.CSRF attacks use the ___ of other users without their knowledge....

Compiling Crosswords 2018-02-05

Compiling Crosswords crossword puzzle
Across
  1. In this department you have to manage customer relationships
  2. It offers financial security in case of damage
  3. One of the most important machine in the office
  4. The main task of this department is to produce goods
  5. A small container that you keep your documents in
  6. If you use a computer you need it as a display
Down
  1. This Departement ships the goods to the customer
  2. Systematic search for new insights
  3. One of the tasks of this Departement is to negotiate with suppliers
  4. The amount by which the value of a device is reduced over time
  5. Raising funds while offering your property as a security deposit
  6. This machine is used to communicate

12 Clues: Systematic search for new insightsThis machine is used to communicateIt offers financial security in case of damageIf you use a computer you need it as a displayOne of the most important machine in the officeThis Departement ships the goods to the customerA small container that you keep your documents in...

Puzzle title 2024-09-11

Puzzle title crossword puzzle
Across
  1. a popular digital payment tool on smartphones
  2. code a secret code used for digital transaction security
  3. secret code used for digital transaction security
  4. same do cash and digital money have the same function?
  5. whether cash and digital money have the same function
  6. if there is no signal whether the digital transaction process will run
  7. an institution that supervises and regulates non-cash transactions in a country.
  8. surveillance cameras inside and outside, how banks protect their branches from physical robbery according to this text
Down
  1. What is the negative impact of cash in the field of crime
  2. the transaction use a QR code?
  3. What are the advantages of digital money
  4. Benefits of digital money in making transactions

12 Clues: the transaction use a QR code?What are the advantages of digital moneya popular digital payment tool on smartphonesBenefits of digital money in making transactionssecret code used for digital transaction securitywhether cash and digital money have the same functionsame do cash and digital money have the same function?...

Computer Threats 2025-10-21

Computer Threats crossword puzzle
Across
  1. Core topic Weakness that threats can exploit
  2. Core topic Possible danger that may damage data
  3. Main focus of your lesson Protecting data and systems from harm
  4. From CIA Triad (Lesson 3 link) Ensuring information is kept private
Down
  1. From CIA Triad (Lesson 3 link) Keeping data accurate and unchanged
  2. Example of a computer threat Harmful software that damages systems
  3. Security defense Blocks unauthorized network access
  4. Example of user protection Secret code that secures access
  5. From CIA Triad (Lesson 3 link) Ensuring data is always accessible
  6. Example of an attack Fake message designed to steal data
  7. Common threat actor A person who breaks into systems
  8. Target of most threats Information stored or processed in computers

12 Clues: Core topic Weakness that threats can exploitCore topic Possible danger that may damage dataSecurity defense Blocks unauthorized network accessCommon threat actor A person who breaks into systemsExample of an attack Fake message designed to steal dataExample of user protection Secret code that secures access...

Cyber ethics 10 2025-05-23

Cyber ethics 10 crossword puzzle
Across
  1. "do not harm" rule in cyber ethics.
  2. bullying is also called ____.
  3. others’ opinions in online discussions.
Down
  1. before sharing someone’s photo is showing ____.
  2. messages to trick people into giving info.

5 Clues: bullying is also called ____."do not harm" rule in cyber ethics.others’ opinions in online discussions.messages to trick people into giving info.before sharing someone’s photo is showing ____.

Cyber ethics 10 2025-05-23

Cyber ethics 10 crossword puzzle
Across
  1. "do not harm" rule in cyber ethics.
  2. bullying is also called ____.
  3. others’ opinions in online discussions.
Down
  1. before sharing someone’s photo is showing ____.
  2. messages to trick people into giving info.

5 Clues: bullying is also called ____."do not harm" rule in cyber ethics.others’ opinions in online discussions.messages to trick people into giving info.before sharing someone’s photo is showing ____.

NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28

NETWORKING CONCEPT AND CYBER ETHICS crossword puzzle
Across
  1. _________ topology is connected in circular path .
  2. ______ refers to unwanted bulk email .
  3. A digital footprint is also known as .
  4. Each computer in a network is called a .
  5. ________ spam filtering / blocking software .
  6. A _____ is a network device that is used to connect all the computers in a network with each other .
  7. Hacking , which is done for a good ~cause , such as national security , is known as .
  8. A computer ___________ can be as a group of computers .
Down
  1. ___________ refers to criminal activities .
  2. _____________ refers to an illegal intrusion into a computer system or network .
  3. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  4. A network maintained without using wires is called a ___________ network .
  5. What is the short form of Local Area Network ?
  6. A ________ is a device that connects two different types of networks with each other .
  7. To _________ plagiarism , one can rephrase the material .
  8. A __________ similar to a hub .
  9. _____ is a network created for an individual person .
  10. What is the short form of Information and communication technology ?

18 Clues: A __________ similar to a hub .______ refers to unwanted bulk email .A digital footprint is also known as .Each computer in a network is called a .___________ refers to criminal activities .________ spam filtering / blocking software .What is the short form of Local Area Network ?_________ topology is connected in circular path ....

Finacial Literacy Terms 1-34 2015-01-30

Finacial Literacy Terms 1-34 crossword puzzle
Across
  1. / Letters that identify a stock traded on a stock exchange.
  2. / A sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
  3. / The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
  4. / Reducing non-systematic risk by investing in a variety of assets.
  5. / A printed document that advertises or describes a school, commercial enterprise, forthcoming book, etc., in order to attract or inform clients, members, buyers, or investors.
  6. / A company stock that tends to increase in capital value rather than yield high income.
  7. / The monetary value of earnings per outstanding share of common stock for a company.
  8. / The current market price of a company share divided by the earnings per share of the company.
  9. / The amount for which something can be sold on a given market.
  10. / A place or system in which stocks, bonds, or other securities are bought and sold.
  11. / The rate of return earned in the course of one whole year, taking compounding into account, expressed as a percentage.
  12. / A stock that entitles the holder to a fixed dividend, whose payment takes priority over that of common-stock dividends.
  13. / A tradable financial asset of any kind.
  14. / a regulated professional individual, usually associated with a brokerage firm or broker-dealer, who buys and sells stocks and other securities for both retail and institutional clients, through a stock exchange or over the counter, in return for a fee or commission.
  15. / A type of security that signifies ownership in a corporation and represents a claim on part of the corporation's assets and earnings.
  16. / An order instructing a broker to buy or sell an asset immediately at the best prevailing price.
  17. / When stack prices are steadily decreasing over time.
  18. / A security traded in some context other than on a formal exchange.
Down
  1. / Income stock.
  2. / Shares entitling their holder to dividends that vary in amount and may even be missed, depending on the fortunes of the company.
  3. / A percentage which serves to measure the effectiveness of a synthetic procedure, is calculated by dividing the amount of the desired product obtained by the theoretical yield (the unit of measure for both must be the same).
  4. / An equity investment option offered directly from the underlying company.
  5. / A shareholder.
  6. / Is when a person buys outright a stock or a bond, primarily to obtain the dividend or interest paid on it, but also with the intention of selling should there be a material advance in the price of the security.
  7. / A comprehensive report on a company's activities throughout the preceding year.
  8. / Is the most common profitability ratio.
  9. / Income stocks.
  10. / The periodic and systematic purchase of a security regardless of the security price.
  11. / A measurement of the value of a section of the stock market.
  12. / When the stock prices are steadily increasing over time.
  13. / A corporate action in which a company divides its existing shares into multiple shares.
  14. / The value of a coin, stamp or paper money, as printed on the coin, stamp or bill itself by the minting authority.
  15. / The profit or loss you have on your investments
  16. / The chance of injury, damage, or economic loss.

34 Clues: / Income stock./ A shareholder./ Income stocks./ Is the most common profitability ratio./ A tradable financial asset of any kind./ The chance of injury, damage, or economic loss./ The profit or loss you have on your investments/ When stack prices are steadily decreasing over time./ When the stock prices are steadily increasing over time....

System software 2024-02-25

System software crossword puzzle
Across
  1. (2words)A feature that allows users to revert their computer's state to a previous point in time, restoring system settings and files to a known good state.
  2. (2words)Divides memory into non-contiguous segments, each representing a logical grouping of data.
  3. (2words)Involves allocating resources and facilitating the sharing and exchange of data among processes running on a computer.
  4. (2words)Tasks such as defining file naming conventions, performing file operations, maintaining directory structures, and managing access control.
  5. (2words)Manages a computer's main memory, including optimization, organization, and protection to ensure efficient and secure memory usage.
  6. Signals generated by hardware or software to request attention from the CPU, used for asynchronous events like hardware errors or user inputs.
  7. (2words)A memory management technique that extends a computer's physical memory by using disk space as an overflow area, improving system performance.
  8. (2words)Organization of files and folders on a storage device, maintained by file management systems.
  9. (2words)Determines allocation and deallocation of computer memory for running applications, including swapping data to and from the HDD or SSD.
  10. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, enhancing network security.
  11. (2words)Software that communicates with input and output devices, translating data and managing hardware resources.
  12. (2words)Process of restoring lost, deleted, corrupted, or inaccessible data from storage devices, ensuring data availability and integrity.
  13. (2words)Control and coordination of printing operations, including loading printer drivers, managing print queues, and handling error messages.
  14. (2words)Mechanisms implemented by the operating system to detect, report, and recover from errors or exceptional conditions, maintaining system stability.
  15. (2words)Splits memory into contiguous partitions and allocates partitions to applications, varying in size.
  16. Activity (2words)Simultaneous use of a computer system by multiple users, facilitated by user accounts, passwords, and access rights management.
  17. (2words)Ensures that competing applications cannot use the same memory locations simultaneously, preventing data loss, security issues, or system crashes.
  18. (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.
  19. (2words)Allocates all memory to a single application, used by systems like MS-DOS and embedded systems.
Down
  1. The process of loading and initializing the operating system kernel when a computer is powered on or restarted.
  2. (2words)Involves managing physical and virtual devices connected to the computer system, including installation, configuration, and maintenance.
  3. Ensuring consistency and coordination among processes or threads accessing shared resources, preventing conflicts and data corruption.
  4. A temporary storage area used in hardware management to manage input/output operations.
  5. A program running on a computer, managed by process management to allocate resources and synchronize data exchange.
  6. (2words)Involves managing input and output peripheral devices, including communication, translation, and prioritization.
  7. Permissions granted to users or processes, controlling access to system resources and ensuring data privacy.
  8. (2words)Determines how memory is allocated to applications, including single allocation, partitioned allocation, paged memory, and segmented memory.
  9. Software designed to detect, prevent, and remove malicious software, ensuring the security of the operating system.
  10. (2words)Software that manages computer hardware and provides services for computer programs.
  11. (2words)Ensures the integrity, confidentiality, and availability of data through measures like updates, antivirus software, firewalls, user privileges, and data recovery.
  12. A data structure used in process management to schedule resources and resolve software conflicts.
  13. (2words)Verifying the identity of users accessing the system, typically through methods like passwords, biometrics, or cryptographic keys.

32 Clues: (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.A temporary storage area used in hardware management to manage input/output operations.(2words)Software that manages computer hardware and provides services for computer programs....

Series 63 - Final Crossword 2024-05-06

Series 63 - Final Crossword crossword puzzle
Across
  1. the person who is going to pass tomorrow
  2. when a representative engages in private securities transactions without the knowledge or consent of his employer
  3. what you should remind yourself that you are tomorrow morning
  4. The official or agency in charge of following/enforcing the securities laws of a state
  5. must have: buy/sell, name of security, account number, order type, solicited or unsolicited
  6. refers to every contract to exchange securities, usually for cash
  7. must be filed when $10,000 or more is deposited
  8. transactions done solely to give the appearance of trading activity
  9. folks who are not dead, minors, or people who have been declared mentally incompetent.
  10. deposit of cash, securities or insurance to ensure protection of their consumers in the event of malpractice, theft or fraud
  11. legal document that must be given to every investor who purchases registered securities in a primary offering
  12. Although exempt securities and securities sold in exempt transactions are exempt from the registration and advertising filing requirements of the Uniform Securities Act, no security or person is exempt from the ________ rules.
  13. If an agent represents a broker/dealer, they must always ________, no matter what they sell.
  14. what you should feel about yourself for making it this far
  15. Any material designed for use by newspapers, magazines, radio, television, telephone recording or any other public medium to solicit business.
  16. act of reaching out to entice a client to buy or sell something
  17. placing an order for own account ahead of placing customers order
  18. any person who issues or proposes to issue any security
Down
  1. without intention to deceive, or "in good faith"
  2. the Series 63 test administrator, not FINRA
  3. laws passed by states to govern securities industry
  4. Includes every solicitation to sell a security for value
  5. deliberate concealment, misrepresentation or omission of material information or the truth to deceive or manipulate another party for unlawful or unfair gain
  6. person who, for compensation, engages in advising others to the value of securities and/or if they are to be invested in
  7. any person engaged in the business of effecting transactions in securities for the account of others or for his own account
  8. An individual who represents a broker/dealer or an issuer when selling or trying to sell securities to the investing public
  9. accepting customer funds or securities into a persons possession for safekeeping
  10. tomorrow you will be fully _________
  11. Any person who has non-public knowledge (material information) about a corporation
  12. when a brokerage firm combines its securities with customer's securities
  13. meaning not required to register
  14. submitted when there seems to be something wrong in the account, like theft, laundering or embezzlement
  15. exemption granted when the firm is not required to register in state when they do not have an office in the state and no more than. 5 clients in 12 months because they do not have a physical presence in the state and is only doing minimal business
  16. when you defeat NASAA you have become a ______
  17. buying a security in one market and simultaneously selling it on another market to profit from price difference between the two markets is not illegal

35 Clues: meaning not required to registertomorrow you will be fully _________the person who is going to pass tomorrowthe Series 63 test administrator, not FINRAwhen you defeat NASAA you have become a ______must be filed when $10,000 or more is depositedwithout intention to deceive, or "in good faith"laws passed by states to govern securities industry...

agruculture 2024-10-28

agruculture crossword puzzle
Across
  1. security
  2. National Product (GNP)
  3. Conditions
  4. larceny
  5. Liberalisation
  6. Exchange
Down
  1. drift
  2. land use
  3. tenure
  4. the following terms and use them in a sentence.
  5. equality

11 Clues: drifttenurelarcenysecurityland useequalityExchangeConditionsLiberalisationNational Product (GNP)the following terms and use them in a sentence.

Jobs Are Here 2015-04-27

Jobs Are Here crossword puzzle
Across
  1. Game
  2. Security
  3. Fire
  4. School
  5. Good Sound
Down
  1. Find Precious Stones
  2. Engine
  3. Healty
  4. Justice

9 Clues: GameFireEngineHealtySchoolJusticeSecurityGood SoundFind Precious Stones

Westbury Library 2022-05-17

Westbury Library crossword puzzle
Across
  1. security
  2. westbury
  3. cottage
  4. donated money
Down
  1. copier
  2. return books
  3. street fair
  4. suffragettes
  5. zone

9 Clues: zonecopiercottagesecuritywestburystreet fairreturn bookssuffragettesdonated money

Via 2021-09-21

Via crossword puzzle
Across
  1. for via
  2. activity
  3. valuables left
  4. vigilant
  5. for help
Down
  1. lot
  2. steel security
  3. safe
  4. doors

9 Clues: lotsafedoorsfor viaactivityvigilantfor helpsteel securityvaluables left

The United States and the World Project 2024-06-14

The United States and the World Project crossword puzzle
Across
  1. Law
  2. review
  3. rights
  4. Social
  5. of Homeland Security
Down
  1. and Trade (GATT)
  2. media
  3. Nations
  4. Woods

9 Clues: LawmediaWoodsreviewrightsSocialNationsand Trade (GATT)of Homeland Security

Cyber Bullying 2021-07-16

Cyber Bullying crossword puzzle
Across
  1. Most common effect of cyber bulling, that involves having a low self esteem.
  2. Deliberately provoking a response through the use of insults on online forums and social media sites.
  3. Intentionally excluding someone from social activities.
Down
  1. It is sending or posting fake and cruel information about you online to damage their reputation and friendship.
  2. Is good for sending electronic letters and pictures but it can also be used to send nasty and threatening messages.
  3. Is the act of publicly humiliating a child through the online posting of private information.

6 Clues: Intentionally excluding someone from social activities.Most common effect of cyber bulling, that involves having a low self esteem.Is the act of publicly humiliating a child through the online posting of private information.Deliberately provoking a response through the use of insults on online forums and social media sites....

Cyber-Safety 2021-09-16

Cyber-Safety crossword puzzle
Across
  1. A Program used in malicious ways
  2. You don't receive what you were promised
  3. software that is designed to damage and destroy computers and computer systems
  4. when someone finds the pin for your credit card using automated programs
Down
  1. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
  2. a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code

6 Clues: A Program used in malicious waysYou don't receive what you were promisedwhen someone finds the pin for your credit card using automated programssoftware that is designed to damage and destroy computers and computer systemsa title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code...

cyber saftey 2019-09-30

cyber saftey crossword puzzle
Across
  1. an attempt to trick someone to get important information or money
  2. information that comes to us through the internet, often through electronics
  3. feeling:when something uncomfortable happens on digital media
Down
  1. a type of crime in which your private information is stolen and used
  2. to engage in activities that don't involve devices, apps, or the internet
  3. information:information about you that can be used to identify you

6 Clues: feeling:when something uncomfortable happens on digital mediaan attempt to trick someone to get important information or moneyinformation:information about you that can be used to identify youa type of crime in which your private information is stolen and usedinformation that comes to us through the internet, often through electronics...

Cyber safety 2016-02-10

Cyber safety crossword puzzle
Across
  1. an website that allows everyone to edit and add information on a topic
  2. people uses it to watch videos
  3. creator, you can make books on the device
Down
  1. you can use Twitter to send messages online and privately
  2. it's the most used in Australia, everyone uses it to search things
  3. is used to communicate with teachers and students in a safe way

6 Clues: people uses it to watch videoscreator, you can make books on the deviceyou can use Twitter to send messages online and privatelyis used to communicate with teachers and students in a safe wayit's the most used in Australia, everyone uses it to search thingsan website that allows everyone to edit and add information on a topic

cyber cross 2022-07-21

cyber cross crossword puzzle
Across
  1. illegal access of data via (VoIP)
  2. money for hacked data
  3. maliciously crafted software code.
Down
  1. sending hacking emails to users
  2. hacking attempt at specific individual
  3. hacking attempt at senior individual

6 Clues: money for hacked datasending hacking emails to usersillegal access of data via (VoIP)maliciously crafted software code.hacking attempt at senior individualhacking attempt at specific individual

Cyber Safety 2024-07-06

Cyber Safety crossword puzzle
Across
  1. A secret word or phrase used to access accounts.
  2. A name used to identify oneself on a computer system.
  3. Ensuring protection from harm or danger.
Down
  1. A small program designed to cause damage to your computer by gaining access to it.
  2. Global network connecting computers worldwide.
  3. Electronic mail used for sending messages online.

6 Clues: Ensuring protection from harm or danger.Global network connecting computers worldwide.A secret word or phrase used to access accounts.Electronic mail used for sending messages online.A name used to identify oneself on a computer system.A small program designed to cause damage to your computer by gaining access to it.

Cyber Safety 2024-07-25

Cyber Safety crossword puzzle
Across
  1. people whos not upstanding but watching it happened
  2. a player who is good at a online game to a low level game
  3. an id for the internet
  4. leaking your private information to the internet
Down
  1. people who stands up to bulling
  2. people who bullies peope online

6 Clues: an id for the internetpeople who stands up to bullingpeople who bullies peope onlineleaking your private information to the internetpeople whos not upstanding but watching it happeneda player who is good at a online game to a low level game

cyber bullying 2024-07-25

cyber bullying crossword puzzle
Across
  1. someone who watches bullying and doesnt do anything about it
  2. watches it happen and does nothing
  3. an information system on the internet
Down
  1. behaviour from a person that could be rude or intimidating
  2. something that helps you search on the web
  3. the person who is being mean
  4. a global computer network providing a variety of information

7 Clues: the person who is being meanwatches it happen and does nothingan information system on the internetsomething that helps you search on the webbehaviour from a person that could be rude or intimidatingsomeone who watches bullying and doesnt do anything about ita global computer network providing a variety of information

Cyber somthing 2023-01-11

Cyber somthing crossword puzzle
Across
  1. capable or floating
  2. a rapid and often excessive spread or increase
  3. existing in or spreading through every part or something
Down
  1. on purpose
  2. harmful and gradual
  3. alongside

6 Clues: alongsideon purposeharmful and gradualcapable or floatinga rapid and often excessive spread or increaseexisting in or spreading through every part or something

Cyber secruity 2024-10-04

Cyber secruity crossword puzzle
Across
  1. You can receive and send these
  2. Covid 19
  3. Form of violence
Down
  1. the technological version of catching a fish
  2. Something every store has
  3. type of evil

6 Clues: Covid 19type of evilForm of violenceSomething every store hasYou can receive and send thesethe technological version of catching a fish

Cyber secruity 2024-10-04

Cyber secruity crossword puzzle
Across
  1. You can receive and send these
  2. Covid 19
  3. Form of violence
Down
  1. the technological version of catching a fish
  2. Something every store has
  3. type of evil

6 Clues: Covid 19type of evilForm of violenceSomething every store hasYou can receive and send thesethe technological version of catching a fish

Cyber-Safety 2021-09-16

Cyber-Safety crossword puzzle
Across
  1. A Program used in malicious ways
  2. You don't receive what you were promised
  3. software that is designed to damage and destroy computers and computer systems
  4. when someone finds the pin for your credit card using automated programs
Down
  1. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
  2. a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code

6 Clues: A Program used in malicious waysYou don't receive what you were promisedwhen someone finds the pin for your credit card using automated programssoftware that is designed to damage and destroy computers and computer systemsa title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code...

cyber safety 2021-08-10

cyber safety crossword puzzle
Across
  1. a stranger asking too many personnel question
  2. i am careful with what i ____ because i know that it is on there forever
  3. making mean comments towards another person
Down
  1. search engine
  2. i have many different _____ just in case someone figures one out
  3. i have my _____ settings turned on so strangers cant talk to me

6 Clues: search enginemaking mean comments towards another persona stranger asking too many personnel questioni have my _____ settings turned on so strangers cant talk to mei have many different _____ just in case someone figures one outi am careful with what i ____ because i know that it is on there forever

Cyber Safety 2021-03-03

Cyber Safety crossword puzzle
Across
  1. Likes to chase mice
  2. Has a trunk
  3. Flying mammal
  4. Man's best friend
Down
  1. how to bulling the data
  2. Large marsupial

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase micehow to bulling the data

CYBER SAFETY 2021-10-20

CYBER SAFETY crossword puzzle
Across
  1. - Level of protection one has while being online/on the internet
  2. - harassments done online by the hackers of your account or by oneself
  3. - Something that keeps your accounts, files and posts safe
Down
  1. - Something that keeps your computer and files safe from viruses that destroy everything in your computer
  2. - practice of downloading and distributing copyrighted content digitally without permission of the creater
  3. - Mails that push you into trouble of being hacked once opened carelessly

6 Clues: - Something that keeps your accounts, files and posts safe- Level of protection one has while being online/on the internet- harassments done online by the hackers of your account or by oneself- Mails that push you into trouble of being hacked once opened carelessly...

Cyber Safety 2023-05-05

Cyber Safety crossword puzzle
Across
  1. the place where all your personal information is stored.
  2. ___________ technologies.
  3. how you should keep your personal information.
  4. pretending to be someone else.
Down
  1. an adult contacting a child with sexual intentions.
  2. to not be safe.

6 Clues: to not be safe.___________ technologies.pretending to be someone else.how you should keep your personal information.an adult contacting a child with sexual intentions.the place where all your personal information is stored.

Cyber safety 2023-05-22

Cyber safety crossword puzzle
Across
  1. When someone is being bullied online.
  2. Someone that takes your money
  3. Something you use to login to Apps
Down
  1. posting rumors online ruining someone's reputation
  2. When there is a bug in your computer.
  3. when your Safe online.

6 Clues: when your Safe online.Someone that takes your moneySomething you use to login to AppsWhen there is a bug in your computer.When someone is being bullied online.posting rumors online ruining someone's reputation

CYBER INTIMIDATION 2013-10-08

CYBER INTIMIDATION crossword puzzle
Across
  1. Ne fais pas tu _ _ _ _ _ _ _ _ _ à quelqu’un. Ne partagez pas votre mot de passe.
  2. Lorsque beaucoup de personnes _ _ _ _ _ _ _ Ils font de la peine aux personnes.
  3. Lorsque vous avez des gens qui vous menaces. _ _ _ _ _ _ leurs de votre page d’accueil Facebook.
Down
  1. Les gens maquent du _ _ _ _ _ _ _ lorsqu’ils vous appellent des noms.
  2. Lorsque _ _ _ _ _ _ _ _ _ _ tu as un problème de cyber intimidation, tu dois le dire à un professeur.
  3. Il est _ _ _ _ _ _ _ _ _ à soumettre votre information personnel sure l’internet.

6 Clues: Les gens maquent du _ _ _ _ _ _ _ lorsqu’ils vous appellent des noms.Lorsque beaucoup de personnes _ _ _ _ _ _ _ Ils font de la peine aux personnes.Il est _ _ _ _ _ _ _ _ _ à soumettre votre information personnel sure l’internet.Ne fais pas tu _ _ _ _ _ _ _ _ _ à quelqu’un. Ne partagez pas votre mot de passe....

Cyber attacks 2022-03-31

Cyber attacks crossword puzzle
Across
  1. an attempt by hackers to damage or destroy a computer network or system
  2. fraudulent message designed to trick a person
Down
  1. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  2. the state of being free from danger or threat
  3. An advanced persistent threat
  4. short for Internet Protocol.

6 Clues: short for Internet Protocol.An advanced persistent threatthe state of being free from danger or threatfraudulent message designed to trick a personan attempt by hackers to damage or destroy a computer network or systemsoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system

Cyber Bullying 2023-10-19

Cyber Bullying crossword puzzle
Across
  1. What is a mean person’s name on social media?
  2. Where do you report cyber bullying?
  3. What should you be on social media, mean or kind?
  4. What to do before you post a comment?
Down
  1. Before posting a photo or video of someone else, what should you get?
  2. Is bullying online legal or illegal in Australia?

6 Clues: Where do you report cyber bullying?What to do before you post a comment?What is a mean person’s name on social media?What should you be on social media, mean or kind?Is bullying online legal or illegal in Australia?Before posting a photo or video of someone else, what should you get?

Cyber Ethics 2024-03-12

Cyber Ethics crossword puzzle
Across
  1. the right related to new inventions.
  2. An act of sending a fake mail to the user misleading him to share his personal details
  3. An illegal intrusion into a system or network
Down
  1. It protects your brand name, logos,etc.
  2. Unwanted bulk mails
  3. An act of harming, harassing a person using the Internet

6 Clues: Unwanted bulk mailsthe right related to new inventions.It protects your brand name, logos,etc.An illegal intrusion into a system or networkAn act of harming, harassing a person using the InternetAn act of sending a fake mail to the user misleading him to share his personal details

Cyber Criminals 2024-11-12

Cyber Criminals crossword puzzle
Across
  1. Hackers who find code online and tries it out
  2. Hackers who work for a Country
  3. Hackers who work internally looking for vulnerabilities
Down
  1. Hackers with political or ideological motivations
  2. Hackers already have privileged access
  3. Hackers who find a vulnerability and then sells it back to the owneer

6 Clues: Hackers who work for a CountryHackers already have privileged accessHackers who find code online and tries it outHackers with political or ideological motivationsHackers who work internally looking for vulnerabilitiesHackers who find a vulnerability and then sells it back to the owneer

Cyber Wellness 2025-01-28

Cyber Wellness crossword puzzle
Across
  1. The cause of the main lead's collapse in the video 'You saved the world' was _______.
  2. The main lead in the video 'Why' chose not to _______ about the strangers' comments online.
  3. In the video 'Bullied', one is advised to reach out to someone who has been _______.
Down
  1. Sara Lee in the video 'Bullied' commented on the main lead's account if she was trying to be a/an _______.
  2. The main lead in the video 'You saved the world' was _______ to gaming.
  3. The main lead in the video 'Why' should _______ the account

6 Clues: The main lead in the video 'Why' should _______ the accountThe main lead in the video 'You saved the world' was _______ to gaming.In the video 'Bullied', one is advised to reach out to someone who has been _______.The cause of the main lead's collapse in the video 'You saved the world' was _______....

cyber ethics 2025-06-07

cyber ethics crossword puzzle
Across
  1. which is a wireless technology used to interconnect of mobile.
  2. full form of lan
Down
  1. which topology is most common network setup that consists of star figured workstation
  2. it is a physically attach a computer so that it can participate in network communicatio
  3. what is device that connnects two different types of network with each other.
  4. in which topology all the network are connected in circular manner

6 Clues: full form of lanwhich is a wireless technology used to interconnect of mobile.in which topology all the network are connected in circular mannerwhat is device that connnects two different types of network with each other.which topology is most common network setup that consists of star figured workstation...

CYBER ETHICS 2025-06-02

CYBER ETHICS crossword puzzle
Across
  1. ufucucuvivigiv
  2. gxgxyxycufufjcucyuufufyff
  3. txycyfyfuguvigig
  4. yucucudtewRfivojovgx
Down
  1. itsyyd8gififuggig
  2. cucdts3adihohixh ohidtxjbifhvkvifycjc

6 Clues: ufucucuvivigivtxycyfyfuguvigigitsyyd8gififuggigyucucudtewRfivojovgxgxgxyxycufufjcucyuufufyffcucdts3adihohixh ohidtxjbifhvkvifycjc

Cyber Cleuths 2025-10-17

Cyber Cleuths crossword puzzle
Across
  1. – Code that makes computers sick.
  2. – Your digital bodyguard.
  3. – Turning messages into secret code.
Down
  1. – Online scam disguised as kindness.
  2. – The invisibility cloak of the internet.
  3. – Your weakest point, admit it.

6 Clues: – Your digital bodyguard.– Your weakest point, admit it.– Code that makes computers sick.– Online scam disguised as kindness.– Turning messages into secret code.– The invisibility cloak of the internet.

Azure Data DoL, Feb 13, 2025 2025-02-13

Azure Data DoL, Feb 13, 2025 crossword puzzle
Across
  1. The management of data availability, usability, integrity, and security within an organization
  2. A security framework that assumes no user or device is trustworthy by default, regardless of its location inside or outside the network
  3. A network security system that monitors and controls incoming and outgoing network traffic
  4. Microsoft's single, unified, logical data lake for your whole organization
Down
  1. A Microsoft solution that can help an organization govern, protect, and manage data, wherever it lives
  2. A Microsoft tool used for business analytics, transforming data into interactive insights and visualization
  3. A framework that allows for the distributed processing of large datasets across clusters of computers
  4. A storage repository that holds a vast amount of raw data in its native format
  5. A standard programming language used for managing and manipulating relational databases

9 Clues: Microsoft's single, unified, logical data lake for your whole organizationA storage repository that holds a vast amount of raw data in its native formatA standard programming language used for managing and manipulating relational databasesA network security system that monitors and controls incoming and outgoing network traffic...

COMMERCE INVESTMENT 2022-06-07

COMMERCE INVESTMENT crossword puzzle
Across
  1. The company that is providing the insurance
  2. items of value
  3. A loan from a financial institution where something is held as security in case the money is not repaid
  4. A list of income and likely expenditures (a step that can minimise impacts of events)
  5. setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
  6. A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
  7. Part ownership of a company
  8. Where the exchange of goods and services between buyers and seller occur
  9. Someone who purchases goods and services to satisfy need and wants
  10. A practice of funding a project by raising money from a large number of people
  11. The price that must be paid to use someone else’s money
  12. Expand your portfolio with different types of shares
  13. money set aside during life for retirement (a step that can minimise the impact of events)
  14. A person who works for a wage or salary
  15. Money received on a regular basis from work, property, business, investment or welfare
  16. Any investment that grows or has potential to grow
  17. Investments that provide regulate profits
  18. to overcharge or swindle (a threat to financial security)
Down
  1. A promis to repair any defects that are in a product
  2. a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
  3. Regularly putting aside some money for future use
  4. electronic funds transfer point of sale
  5. The swapping or exchanging of one good or another
  6. Real estate that is bought with the aim of earning some kind of financial return
  7. A digital currency
  8. personal group with lots of money that are willing to lose it
  9. The buying and selling of goods and services via the internet
  10. Part of a firm’s profit that is divided amongst shareholders
  11. Buy goods in large quantities from the manufacturer
  12. items that can be used to reduce your accessible income
  13. Involves buying the rights of another business to distribute its products under its name
  14. A legally binding agreement
  15. What remains after all business expenses are deducted from sales revenue
  16. The amount of money a consumer is prepared to pay in exchange of a good or service
  17. Place where shares in public companies are bought and sold
  18. money owing to external sources (e.g a bank)
  19. the profit you receive on your investment as a percentage of your original investment
  20. Activities taken for the purpose of production and consumption of goods and services in a region
  21. when a person gives up control of their assets and finances, voluntary or by court order
  22. illegal business practice (a threat to financial security)
  23. A currency used to invest in stocks, shares as well as goods and services etc.
  24. spending more money than your disposable income allows (a threat to financial security)
  25. Buying something without giving much thought if you really need it
  26. Australian Stock exchange
  27. use of money to purchase equipment for a new business or an existing business
  28. a type of investment that is acceptable to society’s current standards
  29. a collection of financial investments like stocks and cash etc.

47 Clues: items of valueA digital currencyAustralian Stock exchangeA legally binding agreementPart ownership of a companyelectronic funds transfer point of saleA person who works for a wage or salaryInvestments that provide regulate profitsThe company that is providing the insurancemoney owing to external sources (e.g a bank)...

Final Review 2022-04-29

Final Review crossword puzzle
Across
  1. Encompasses the recovery, investigation, examination, and analysis of material found in digital devices during incidents.
  2. Security team that manages an organization's network defense.
  3. Type of RFID tag can send a signal over a long distance.
  4. Provides the network virtualization solution called XenServer.
  5. type of interference is caused by motors, heavy machinery, and fluorescent lights.
  6. The most volatile memory in the gathering of potential evidence.
  7. An security system that identifies any attacks. In addition, takes immediate action to stop or prevent the attack.
  8. Backup strategy backs up all files from a computer's file system.
  9. Cloud computing solutions delivers software applications to a client.
  10. Used as a secure tunnel to connect two networks.
  11. This layer of SDN communicates with the Control layer through what is called the northbound interface.
  12. Password attack employs a list of pre-defined passwords that it tries against a login prompt.
  13. Message authentication code that allows a user to verify that a file or message is legitimate.
  14. Type of wireless access point is generally used in a residential setting.
  15. sends unsolicited business cards and messages to a Bluetooth device.
  16. Process of adding random characters at the beginning or end of a password to generate a completely different hash.
  17. An exploit in which malware allows the virtual OS to interact directly with the hypervisor.
  18. Protocol for logging.
  19. An attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information.
  20. A PKI is an implementation for managing which type of encryption.
  21. Dumpster diving is this type of reconnaissance.
  22. One of the most popular packet capturing tools.
  23. Rights management category is applied to music, videos, and software that is sold to consumers.
Down
  1. Connects multiple servers together so that if one server fails, the others immediately take over its tasks.
  2. Entering random data to the inputs of an application.
  3. Violation of a security policy.
  4. SIEM component that is responsible for gathering all event logs from configured devices.
  5. A Cloud technology that allows cloud services to be shared by several.
  6. DLP method works by replacing sensitive data with realistic fictional data.
  7. A Cloud technology that provides cloud services to just about anyone.
  8. These types of logs are generated when a computer randomly restarts.
  9. (SOAR) system automation components that shows processes and procedures that are to be used by a human.
  10. Tool that can be used to view and modify DNS server information in Linux.
  11. A vulnerability scan method in which administrator logos into a system for scanning.
  12. Used to verify that a downloaded file has not been altered.
  13. Protocol used by IPsec to create a security association between communicating partners.
  14. Cryptography mechanism that hides secret communications within various forms of data.
  15. A Wireless device used to manage multiple access points in your organization.
  16. MOST secure EAP implementation.
  17. used on a wireless network to identify the network name.
  18. passive reconnaissance tool is used to gather information from a variety of public sources.
  19. Computer software, firmware, or hardware that creates and runs virtual machines.
  20. Acronym for a solution that pushes security policies directly to mobile devices over a network.
  21. An SDN layer also known as the Infrastructure layer.
  22. Password attack with a large table of hashes.
  23. Harddrive configuration used for data redundancy.

46 Clues: Protocol for logging.Violation of a security policy.MOST secure EAP implementation.Password attack with a large table of hashes.Dumpster diving is this type of reconnaissance.One of the most popular packet capturing tools.Used as a secure tunnel to connect two networks.Harddrive configuration used for data redundancy....

Cryptober Puzzle #2 2021-09-30

Cryptober Puzzle #2 crossword puzzle
Across
  1. The set of ways in which an adversary can enter a system and potentially cause damage
  2. The act of exploiting a security vulnerability on the same day it becomes publicly known
  3. The process of granting or denying specific requests for or attempts to obtain and use information and related information processing services
  4. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents.
  5. a security control report developed by the American Institute of Certified Public Accountants
  6. The process of verifying the identity or other attributes of an entity (user, process, or device)
  7. An attack that prevents or impairs the authorized use of information system resources or services
Down
  1. allows access based on the job title
  2. Short for malicious software
  3. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data
  4. An unauthorized act of bypassing the security mechanisms of a network or information system
  5. The unauthorized transfer of information from an information system
  6. a browser setting that lets you browse privately by deleting history, site data, cookies, and data.
  7. a service you can use to create and manage passwords. You only need a single master password to log in to the manager itself.

14 Clues: Short for malicious softwareallows access based on the job titleThe unauthorized transfer of information from an information systemThe set of ways in which an adversary can enter a system and potentially cause damageThe act of exploiting a security vulnerability on the same day it becomes publicly known...

Responsible Technology 2021-12-13

Responsible Technology crossword puzzle
Across
  1. The Tech We Want is this, ethical, and inclusive
  2. The difficult decision that The Tech Workers Handbook is designed to support
  3. The rails and roads of the digital economy
  4. A set of rules that are inadequate in the age of surveillance capitalism
  5. Data about data
  6. Not today’s data governance
  7. One community fighting back against disinformation
  8. Last Week Tonight Oct. 10
  9. The end-to-end world
Down
  1. A concept that balances data’s societal good, market innovation, and digital rights
  2. A key attribute of MOSIP that ensures it can adapt to future needs and risks
  3. Policies tried to undermine this fundamental right but advocates pushed back
  4. More than the new oil
  5. A new, digital form of colonization on the African continent
  6. The global tech movement that Harvard will lead into the future
  7. One of the most significant challenges in our connected world
  8. Five years of championing better digital identity
  9. The target of unsafe social media ads

18 Clues: Data about dataThe end-to-end worldMore than the new oilLast Week Tonight Oct. 10Not today’s data governanceThe target of unsafe social media adsThe rails and roads of the digital economyThe Tech We Want is this, ethical, and inclusiveFive years of championing better digital identityOne community fighting back against disinformation...

Christmas Crossword Competition 2023-10-25

Christmas Crossword Competition crossword puzzle
Across
  1. Around 25 million to be enjoyed in the UK
  2. In the UK, children have an average of 16
  3. Festive tune that was the first song played in space
  4. Artist who sang ‘Merry Xmas Everybody'
  5. A traditional name Father Christmas and, suspiciously, our compliance manager
  6. Steven Mint
  7. Finance present exchange
  8. In our last newsletter, Lauren Lee was named a ___
  9. British Christmas TV film released the same year Whitechurch Securities Ltd was established
Down
  1. 27% of families watch it
  2. 26.6 billion estimated to be lost
  3. 24 days in the calendar
  4. 6 million are sold in the UK to wrap those presents
  5. Why doesn’t santa have a retirement plan? Because he’s too focussed on the ___
  6. You can avoid it in ethical investments but santa still might fill your stocking with it if you’ve been naughty
  7. Monday that follows Black Friday
  8. Why do santa’s little helpers all have income protection insurance? Because they’re elf__
  9. Name of the Grinch’s dog

18 Clues: Steven Mint24 days in the calendar27% of families watch itFinance present exchangeName of the Grinch’s dogMonday that follows Black Friday26.6 billion estimated to be lostArtist who sang ‘Merry Xmas Everybody'Around 25 million to be enjoyed in the UKIn the UK, children have an average of 16In our last newsletter, Lauren Lee was named a ___...

Customer Service Week - Crossword 2025-10-04

Customer Service Week - Crossword crossword puzzle
Across
  1. Finish this CSC Guiding Principle: Very few things are actually ___________
  2. This CSC brand's main focus is home design
  3. The "S" in SLA
  4. Which CSC brand has a city in its name?
  5. Total number of brands in CSC's family of brandss
  6. Which CSC family brand has an animal in its logo?
  7. Which CSC Brand was featured in a South Park episode?
  8. who is the Vice President of CSC's Call Centers? (first & last name)
Down
  1. The "E" of EBITDA
  2. Which CSC value is this: "We're driven to support each other at all times. We act with empathy, honesty, and integrity."
  3. CSC Generation's CTO and AI Guru (last name)
  4. the "L" of BNPL
  5. The most recent brand to join CSC's family of brands
  6. time period of intense online shopping that begins Black Friday and ends Cyber Monday
  7. CSC brands are all part of which industry?
  8. CSC Generation's Founder & CEO (last name)
  9. The name of our LMS platform
  10. Measure of a customer's contentment (acronym)

18 Clues: The "S" in SLAthe "L" of BNPLThe "E" of EBITDAThe name of our LMS platformWhich CSC brand has a city in its name?This CSC brand's main focus is home designCSC brands are all part of which industry?CSC Generation's Founder & CEO (last name)CSC Generation's CTO and AI Guru (last name)Measure of a customer's contentment (acronym)...

At a concert 2018-10-18

At a concert crossword puzzle
Across
  1. głośno
  2. ochroniarz
  3. scena
  4. zespół
  5. wejście
Down
  1. głośnik
  2. olbrzymi ekran
  3. ekscytujący
  4. miejsce siedzące

9 Clues: scenagłośnozespółgłośnikwejścieochroniarzekscytującyolbrzymi ekranmiejsce siedzące

Online safty by Namo 2013-09-08

Online safty  by Namo crossword puzzle
Across
  1. is a website can chat with friend.
Down
  1. chat room you don’t known who really chatting with you.
  2. you can chat with you friend and call your friends.
  3. you can post your picture can chat with you friend and can play game
  4. _ bullying tessing somebody in internet
  5. you can see your friend face.

6 Clues: you can see your friend face.is a website can chat with friend._ bullying tessing somebody in internetyou can chat with you friend and call your friends.chat room you don’t known who really chatting with you.you can post your picture can chat with you friend and can play game

crack it 2023-09-18

crack it crossword puzzle
Across
  1. A programming technique for finding solutions to complex problems.
  2. Digital or virtual currency that uses cryptography for security and operates independently of a central authority.
  3. computing paradigm involving probability and randomness.
  4. A method in cryptography to ensure data integrity.
  5. field of study involving massive datasets and patterns.
  6. A network security protocol to protect data in transit.
Down
  1. A decentralized digital ledger.
  2. A branch of AI simulating human-like conversation
  3. A network of interconnected smart devices.

9 Clues: A decentralized digital ledger.A network of interconnected smart devices.A branch of AI simulating human-like conversationA method in cryptography to ensure data integrity.field of study involving massive datasets and patterns.A network security protocol to protect data in transit.computing paradigm involving probability and randomness....

Five Nights at Freddy's Trivia 2023-12-14

Five Nights at Freddy's Trivia crossword puzzle
Across
  1. What name are you given in sister location?
  2. What animatronic was torn apart by kids?
  3. what color is the guy who un-alived kids?
  4. Animatronic Scott Cawthon is most afraid of?
  5. What animatronic is pirate themed?
Down
  1. what does chika eat in security breach?
  2. Who said "was that the bite of 87 ?!?!"
  3. Who do you play as in security breach?

8 Clues: What animatronic is pirate themed?Who do you play as in security breach?what does chika eat in security breach?Who said "was that the bite of 87 ?!?!"What animatronic was torn apart by kids?what color is the guy who un-alived kids?What name are you given in sister location?Animatronic Scott Cawthon is most afraid of?

tech thing 2015-09-15

tech thing crossword puzzle
Across
  1. object that changes screens and stuff
  2. an agreement to using the web responsibly
  3. community: its is a group of people that like something so they made it world wide for ppl to join
  4. something you are leader or supposed to talk care of
  5. : the way to act online
  6. Community : it like a group of ppl in a online game
  7. Environments a fake place that is fake or is real but not in person
Down
  1. when someone is bullying you
  2. when someone is breaking into your personal or work account
  3. a group of ppl
  4. someone that says/something over and over
  5. putting something public
  6. Theft :someone that steals your identity to do something bad
  7. Citizen following rules to web site agreements
  8. connect something to something
  9. Networking place where u can talk to other ppl
  10. use: you are allowed to use a piece of work as without paying if you use it for the news or something

17 Clues: a group of ppl: the way to act onlineputting something publicwhen someone is bullying youconnect something to somethingobject that changes screens and stuffsomeone that says/something over and overan agreement to using the web responsiblyCitizen following rules to web site agreementsNetworking place where u can talk to other ppl...

20 Definitions Technology Terms 2015-09-15

20 Definitions Technology Terms crossword puzzle
Across
  1. To put a document in a different place
  2. - A document that is released to the public/ other person(s)
  3. Citizen A responsible internet user that interacts with other people
  4. A rule that allows you to use someone’s idea if you give them credit for it
  5. Is meant to be used but not directly said
  6. Bullying a person online
  7. Media A place on the internet that allows a person to create and share their idea with other people
  8. Acceptable User Policy ….. An agreement that you sign that ensures you will take care of a computer
  9. - Being polite on the network
Down
  1. Being accountable for what you do
  2. Networking - A group of people that analyze info online
  3. To break into something that you aren’t suppose to
  4. Community A group of people that use the internet to interact
  5. Theft Someone who steals/ takes personal information from someone else
  6. An electronic tool with a screen
  7. A community around the world that communicates with each other
  8. A group of people who share some interests

17 Clues: Bullying a person online- Being polite on the networkAn electronic tool with a screenBeing accountable for what you doTo put a document in a different placeIs meant to be used but not directly saidA group of people who share some interestsTo break into something that you aren’t suppose toNetworking - A group of people that analyze info online...

Understand & Taking A Stand Against Bullying 2024-05-30

Understand & Taking A Stand Against Bullying crossword puzzle
Across
  1. Position or rank in relation to others.
  2. An act of physical harm or injury to another person.
  3. Behavior directed at another person that is unwanted and unwelcome.
  4. Belief in one's own abilities.
  5. To communicate through words or gestures the intent to harm another person.
  6. Set apart from others; alone.
  7. Having to do with or involving computers or other online technology.
  8. To refuse to admit; to force out.
  9. Using threats to frighten someone; often used to compel another person to do something, or to deter the person from doing something.
  10. People of the same age, or close in age, who are similar in many ways.
  11. To keep from happening or existing.
Down
  1. Boldly hostile; quarrelsome.
  2. Related to words and speech.
  3. The result or outcome of an action or event.
  4. Done on purpose; planned or deliberate.
  5. Confident and self-assured.

16 Clues: Confident and self-assured.Boldly hostile; quarrelsome.Related to words and speech.Set apart from others; alone.Belief in one's own abilities.To refuse to admit; to force out.To keep from happening or existing.Position or rank in relation to others.Done on purpose; planned or deliberate.The result or outcome of an action or event....

Disruptive technology 2025-07-24

Disruptive technology crossword puzzle
Across
  1. Using fast quantum bits rather then binary
  2. Multiple layers of authentication to prevent loss of personal data and information
  3. Technology that mixes with the virtual and real world
  4. Tech that automatically defends against other digital threats
  5. A model where tools and other forms of education is delivered online
  6. technology that convert data into decision making insights
  7. monitors and reacts to threats on user's device
  8. A flexible idea to secure digital assets
Down
  1. multi digital experiences that can be accessed across multiple platforms
  2. Machine learning and advanced automation
  3. A digital world where users interact with during real time
  4. A way to determine possible weaknesses
  5. Technology Innovations aimed to improve environmental sustainability
  6. A form of technology that is able to imitate human knowledge
  7. cloud services spread across multiple locations but centrally managed
  8. A form of insurance in case of cyber attacks

16 Clues: A way to determine possible weaknessesMachine learning and advanced automationA flexible idea to secure digital assetsUsing fast quantum bits rather then binaryA form of insurance in case of cyber attacksmonitors and reacts to threats on user's deviceTechnology that mixes with the virtual and real world...

Aerospace book 1, 3, 5 and 7 Vocabulary 2023-08-03

Aerospace book 1, 3, 5 and 7 Vocabulary crossword puzzle
Across
  1. – relating to the forces of air in motion
  2. in the Northern Hemisphere
  3. - an enormous collection of stars arranged in a particular shape
  4. – the science of flight within the atmosphere
  5. – the art, science, and technology of flight within the atmosphere
  6. - first layer of the atmosphere where most of the Earth’s weather occurs
  7. - boundary between the troposphere and the stratosphere
  8. space - the space between the Earth and the Moon
  9. edge – the front part of a wing or airfoil
  10. – the curved part of an airfoil from its leading to trailing edge
  11. security - the collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants.
  12. full rotation 24 hours
  13. easterlies - global winds that flow from the poles and move to the west
  14. - a region of the atmosphere where electrons are gained or lost
  15. winds - the world-wide system of winds that transfers heat between tropical and polar regions
  16. (fall) equinox - the time when the Sun's direct rays strike the equator resulting in day and
  17. - a crime that involves a computer and a network.
  18. – a line drawn through an airfoil from its leading to trailing edge
  19. - a layer of the atmosphere extending from 50 to about 300 miles
  20. - a channel that links computers, servers, network devices, peripherals, or other devices together to allow the sharing of data.
  21. theoretically the absolute coldest temperature
  22. zero - the point at which all molecules no longer move or have the least amount of
  23. - small gravity levels or low gravity; floating condition
  24. temperature
  25. – a combination of aeronautics and space
  26. - a person who conducts illegal activity using computers or other digital technology.
  27. orbit of its outermost planet
  28. - all encompassing term that includes everything; planets, galaxies, animals, plants, and humans
  29. US, generally from the west to the east
  30. ethics - is a set of moral, legal, and social principles that applies to computers relating to the user’s behavior
  31. - a desktop computer or workstation that is capable of obtaining resources from a server. Cyber - describes characteristics of the culture of computers, information technology, and virtual reality.
  32. - region beyond the Earth’s atmosphere where there is very little molecular activity
  33. rate - the rate of decrease with an increase in height for pressure and temperature
  34. – the natural force pulling everything to Earth
  35. Allen belts - radiation belts around the Earth filled with charged particles
  36. - a computer program or a device that provides sharable resources.
Down
  1. - the environment that allows digital technology of many forms to communicate with one another via the Internet.
  2. balloons, helicopters, hangliders, and parasails
  3. - unit of measurement based on absolute zero and commonly used by scientists to
  4. - the method by which the Sun heats the Earth
  5. - a layer of the atmosphere extending from about 30 to 50 miles
  6. - a layer of the atmosphere extending from the tropopause to about 30 miles
  7. westerlies - global winds that move toward the poles and appear to curve to the east
  8. – height above sea level or ground level expressed in units
  9. - space that is empty or void of molecules
  10. stream - a strong wind that develops at 30,000-35,000 feet and moves as a winding road across
  11. – a person who operates an aircraft in flight
  12. space - space located within a solar system; measured from the center of the Sun to
  13. – the downward movement of air behind a wing in flight
  14. - the movement of the Earth revolving around the Sun; full revolution about 365 days
  15. switching - a process of arranging data into small units that can be transmitted over a digital network.
  16. – a place on either land or water where aircraft can land and take off for flight
  17. – the upward force that opposes gravity and supports the weight of an aircraft
  18. – pertaining to air
  19. Force - winds associated with the Earth’s rotation that deflect a freely-moving object to the
  20. - how the Earth turns (rotates) on its axis at an angle of 23.5° while it revolves around the
  21. - a connection point that relays information along a distributed network.
  22. - a global area of calm winds
  23. wind – the flow of air which moves opposite the flight path of an airplane
  24. – forces in motion
  25. – an aircraft that is kept aloft by the aerodynamic forces upon its wings and is thrust for￾ward by a means of propulsioairfoil – a component, such as a wing, that is specifically designed to produce lift, thrust, or direc￾tional stability
  26. – the force which moves an aircraft forward in flight
  27. the use of technology to attack a nation via network communications and computer devices.
  28. - a worldwide collection of different networks connecting millions of devices which allows communication between other devices on the network.
  29. – any machine that is capable of flying through the air; included are ultralights, airplanes,
  30. space - the region in space from one solar system to another
  31. – a mixture of gases that contains approximately 78% nitrogen, 21% oxygen, and 1% other gases
  32. - a region of the atmosphere where ozone is created
  33. of equal length, usually on September 22nd or 23rd
  34. – a force which slows the forward movement of an aircraft in flight

70 Clues: temperature– forces in motion– pertaining to airfull rotation 24 hoursin the Northern Hemisphere- a global area of calm windsorbit of its outermost planetUS, generally from the west to the east– a combination of aeronautics and space– relating to the forces of air in motion- space that is empty or void of molecules...

FDR's New Deal Programs 2023-04-14

FDR's New Deal Programs crossword puzzle
Across
  1. Rural Electrification
  2. Works Progress
  3. Federal Deposit Insurance
  4. National
Down
  1. Works Administration
  2. Federal Emergency
  3. Tennessee Valley
  4. Civilian Conservation
  5. Agricultural
  6. Social Security

10 Clues: NationalAgriculturalWorks ProgressSocial SecurityTennessee ValleyFederal EmergencyWorks AdministrationRural ElectrificationCivilian ConservationFederal Deposit Insurance

Review PDP SPIRIT: Respect 2021-07-12

Review PDP SPIRIT: Respect crossword puzzle
Across
  1. What is very difficult to receive without giving it first
Down
  1. Area that people know about us, but we don't.
  2. Antidote of bullying and social exclusion.
  3. ... Windows; a tool for self discovery
  4. ...bullying; happens online

5 Clues: ...bullying; happens online... Windows; a tool for self discoveryAntidote of bullying and social exclusion.Area that people know about us, but we don't.What is very difficult to receive without giving it first

Bullying 2020-06-07

Bullying crossword puzzle
Across
  1. when someone is being mean when does it escalate to bullying
  2. when you make someone give you something threw violence
  3. what should you do when people are punching and hurting you
  4. what do you do after someone has bullied you
Down
  1. what is a type of bullying where someone insults you
  2. what is it called when someone hurts you with their body
  3. what is it called when nobody is your friend
  4. what is a type of bullying on the internet

8 Clues: what is a type of bullying on the internetwhat is it called when nobody is your friendwhat do you do after someone has bullied youwhat is a type of bullying where someone insults youwhen you make someone give you something threw violencewhat is it called when someone hurts you with their body...

Chiara Silvestre crossword puzzle 2021-05-23

Chiara Silvestre crossword puzzle crossword puzzle
Across
  1. one of organization objectives
  2. month of the conference in San Francisco
  3. number of the first states that joined the UN
Down
  1. UN was established after
  2. one of main office closest to Italy
  3. one of the aims that maintains intergovernmental organization that start with S
  4. headquartered on international territory
  5. intergovernmental organization that aims to maintain international peace and security

8 Clues: UN was established afterone of organization objectivesone of main office closest to Italyheadquartered on international territorymonth of the conference in San Francisconumber of the first states that joined the UNone of the aims that maintains intergovernmental organization that start with S...

Mod 5 1-b Application Security 2023-08-24

Mod 5 1-b Application Security crossword puzzle
Across
  1. Ensures that a user is who they say they are.
  2. Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users.
  3. Provides a time-stamped record of which aspects of the application were accessed and by whom.
Down
  1. Safeguarding sensitive data while in transit or at rest.
  2. Combines elements of both static and dynamic testing.
  3. Check their code as they are writing it
  4. Analyzes running code while simulating outside, or “black box” attacks.
  5. Designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.
  6. Application ___________ the process of developing, testing, and adding security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.

9 Clues: Check their code as they are writing itEnsures that a user is who they say they are.Combines elements of both static and dynamic testing.Safeguarding sensitive data while in transit or at rest.Analyzes running code while simulating outside, or “black box” attacks....

Digital media literacy 2023-09-06

Digital media literacy crossword puzzle
Across
  1. password
  2. using online
  3. technical process
  4. needed for woodwork practical
  5. used in practical choices
  6. how to use devices
Down
  1. online being mean
  2. collect information
  3. playing games
  4. Leonardo da Vinci
  5. Mechanism
  6. online platform

12 Clues: passwordMechanismusing onlineplaying gamesonline platformonline being meanLeonardo da Vincitechnical processhow to use devicescollect informationused in practical choicesneeded for woodwork practical

Vocab Unit 11 2024-02-12

Vocab Unit 11 crossword puzzle
Across
  1. organize
  2. picky
  3. nuts
  4. sour
  5. rules
Down
  1. guide
  2. away from danger
  3. looking life-like
  4. downfall of snow or rocks on a mountain
  5. to make sure you're safe
  6. snuggle; get comfy
  7. cry out

12 Clues: nutssourguidepickyrulescry outorganizeaway from dangerlooking life-likesnuggle; get comfyto make sure you're safedownfall of snow or rocks on a mountain

CLUB DE SOLEIL 2025-08-24

CLUB DE SOLEIL crossword puzzle
Across
  1. MAKE A SPLASH
  2. VIP GUEST
  3. PATROLS PROPERTY
  4. WHO CLEANS
  5. OUTSIDE COOKER
  6. CHECK IN
Down
  1. WHERE DO YOU TAKE YOUR LUNCH
  2. BOOKS TOURS
  3. WHO REPAIRS
  4. WHAT DO YOU SLEEP ON
  5. TRANSPORT
  6. REFLECTION

12 Clues: CHECK INVIP GUESTTRANSPORTWHO CLEANSREFLECTIONBOOKS TOURSWHO REPAIRSMAKE A SPLASHOUTSIDE COOKERPATROLS PROPERTYWHAT DO YOU SLEEP ONWHERE DO YOU TAKE YOUR LUNCH

Great Depression 2024-02-08

Great Depression crossword puzzle
Across
  1. FDR targeted these first, and shut down the unstable ones.
  2. What New Deal programs hired people to build public projects, murals and roads
  3. FDR used ____ to talk to people.
  4. How many programs were within the New Deal?
  5. Social Security provides what?
  6. The needy relied on the government and ___ for food.
Down
  1. Roosevelt addressed citizens by using this.
  2. A holdover from FDR, it was made to give relief to the elderly, it was called ______ Security.
  3. Bad farming practices contributed the ____ bowl.
  4. This program paid farmers to work/produce less.
  5. FDR believed that the workers employed by the New Deal should have jobs that gave them money and what?
  6. In his first days in ____ FDR pushed congress and they passed 15 bills (a record).
  7. Unlike most Americans FDR was _____.
  8. The R’s of the New Deal are to reform, recover and what?
  9. It was because of this that FDR was paralyzed
  10. FDR was the governor of this state.

16 Clues: Social Security provides what?FDR used ____ to talk to people.FDR was the governor of this state.Unlike most Americans FDR was _____.Roosevelt addressed citizens by using this.How many programs were within the New Deal?It was because of this that FDR was paralyzedThis program paid farmers to work/produce less....

Crossword 2024-10-09

Crossword crossword puzzle
Across
  1. A list of approved entities allowed access to a system.
  2. A vulnerability that is exploited before the vendor knows about it
  3. Processes for responding to and managing security incidents.
  4. Information used to verify a user’s identity, like a password.
  5. A network of compromised computers controlled by a hacker.
  6. Disguising communication from an unknown source as being from a known one.
  7. A code injection technique used to attack databases.
  8. Measures to protect physical assets and locations from unauthorized access.
  9. The state of being unidentifiable within a network or system.
  10. A symmetric-key algorithm for data encryption
Down
  1. A legal requirement to inform affected individuals after a data breach.
  2. A fixed-size string generated from data to ensure integrity.
  3. Dividing a computer network into smaller parts for security.
  4. An entity that issues digital certificates for secure communications.
  5. Software intended to harm or exploit any programmable device.

15 Clues: A symmetric-key algorithm for data encryptionA code injection technique used to attack databases.A list of approved entities allowed access to a system.A network of compromised computers controlled by a hacker.A fixed-size string generated from data to ensure integrity.Dividing a computer network into smaller parts for security....

account owners 2020-11-04

account owners crossword puzzle
Across
  1. a collection of items of the same type stored in a hidden or inaccessible place.
  2. the admin sets options that helps the accounts stay safe
  3. is when you are checking that it is that person
  4. accounts that people of the owner of the accounts have restricted
  5. a computer program with a graphical user interface for displaying and navigating between web pages.
  6. made by the admin of the accounts
Down
  1. you can protect your computer by downloading them
  2. has security in it
  3. are made by app developers
  4. you can do this so that you don't lose your stuff when you reset your computer
  5. the person who runs the accounts
  6. is places some one is allowed to go

12 Clues: has security in itare made by app developersthe person who runs the accountsmade by the admin of the accountsis places some one is allowed to gois when you are checking that it is that personyou can protect your computer by downloading themthe admin sets options that helps the accounts stay safe...

Summit 2013-04-16

Summit crossword puzzle
Across
  1. Summit provides (a)_____ for people with disabilities
  2. Summit's Youth Advocacy Club is also known as (y)___
  3. Someone shows (i)_____ if they make their own decisions
  4. Office of Public Assistance or (O)__
  5. Social Security Disability Insurance is also (S)___
  6. The Supreme Court decision in (o)____ v. United States determined that people have a right to live in the community
Down
  1. This civil rights law was passed in 1990 (a)__
  2. Instead of saying able-bodied, use the term (n)____
  3. MT Program: Medicaid for (W)_______ with Disabilities
  4. The advocacy group (p)______ at Summit is sponsored by the Kiwanis Club
  5. Supplemental Security Income is also (S)__
  6. The (A)__ Act would allow people to save money yet still receive Medicaid

12 Clues: Office of Public Assistance or (O)__Supplemental Security Income is also (S)__This civil rights law was passed in 1990 (a)__Instead of saying able-bodied, use the term (n)____Social Security Disability Insurance is also (S)___Summit's Youth Advocacy Club is also known as (y)___MT Program: Medicaid for (W)_______ with Disabilities...

Compiling Crosswords 2018-02-05

Compiling Crosswords crossword puzzle
Across
  1. If you use a computer you need it as a display
  2. Systematic search for new insights
  3. This Departement ships the goods to the customer
  4. The amount by which the value of a device is reduced over time
  5. It offers financial security in case of damage
  6. In this department you have to manage customer relationships
Down
  1. A small container that you keep your documents in
  2. One of the most important machine in the office
  3. The main task of this department is to produce goods
  4. Raising funds while offering your property as a security deposit
  5. This machine is used to communicate
  6. One of the tasks of this Departement is to negotiate with suppliers

12 Clues: Systematic search for new insightsThis machine is used to communicateIf you use a computer you need it as a displayIt offers financial security in case of damageOne of the most important machine in the officeThis Departement ships the goods to the customerA small container that you keep your documents in...

VisioNize 2022-03-18

VisioNize crossword puzzle
Across
  1. VisioNize _____ enabled devices require a hardware hub to connect to VisioNize
  2. This module is important for GxP lab for documentation purposes
  3. the pillars of VisioNize subscriptions are Essential and sample ___________
  4. The _________ module allows for you to check all device parameter and monitor them
  5. Lab suite Essential allows for ________ notifications ONLY
Down
  1. VisioNize is a ________ based platform
  2. Device data ________ function is available for both Essential and Sample Security plans
  3. This module allows you to plan maintenance for your devices
  4. VisioNize ___ enabled devices are equipped with the VisioNize touch interface
  5. One VisioNize Box can connect up to _________ devices
  6. Any device __________ updates can be done remotely for connected Eppendorf devices
  7. VisioNize ______ connect 3rd party devices to VisioNize

12 Clues: VisioNize is a ________ based platformOne VisioNize Box can connect up to _________ devicesVisioNize ______ connect 3rd party devices to VisioNizeLab suite Essential allows for ________ notifications ONLYThis module allows you to plan maintenance for your devicesThis module is important for GxP lab for documentation purposes...

Travel terms 2024-10-04

Travel terms crossword puzzle
Across
  1. "The act of leaving for a journey, or the start of a flight."
  2. "Area where passengers collect their luggage after a flight."
  3. "Screening of passengers and their belongings before boarding."
  4. "The act of reaching a destination."
  5. "Elevator, especially at airports, to move between floors."
Down
  1. "The area where passengers board or leave an aircraft."
  2. "Main building at an airport where passengers arrive and depart."
  3. "Official document required for international travel."
  4. "Security checkpoint for passengers entering a country, ensuring compliance with national laws."
  5. "The process of registering for a flight before departure."
  6. "Place at the airport where you leave your checked luggage."
  7. "Wheeled cart used to carry luggage in airports."

12 Clues: "The act of reaching a destination.""Wheeled cart used to carry luggage in airports.""Official document required for international travel.""The area where passengers board or leave an aircraft.""The process of registering for a flight before departure.""Elevator, especially at airports, to move between floors."...

CHEMSTAR GROUP 2020-09-15

CHEMSTAR GROUP crossword puzzle
Across
  1. Behind the Security post
  2. product delivery
  3. Senior factory engineer
  4. Wider coverage
  5. HOD Finished goods store
  6. Paint samples in batches
  7. Fasanmi Ebenezer
  8. A Unit in Account
  9. oil based
  10. CPIN plastics
Down
  1. Best for outdoor painting
  2. Overall head of Admin
  3. Action
  4. Chemstar Group Subsidiary
  5. Acronym for raw materials
  6. Morning Devotion
  7. Strategy and Business Development
  8. Facility Unit Equipment

18 Clues: Actionoil basedCPIN plasticsWider coverageproduct deliveryMorning DevotionFasanmi EbenezerA Unit in AccountOverall head of AdminSenior factory engineerFacility Unit EquipmentBehind the Security postHOD Finished goods storePaint samples in batchesBest for outdoor paintingChemstar Group SubsidiaryAcronym for raw materials...

Missing Links 2021-01-26

Missing Links crossword puzzle
Across
  1. Action-Dispute-Revolution
  2. Again-At-Over
  3. Dawn-Girl-Greek
  4. Down-Arm-Par
  5. Holiday-Indian-Sun
  6. High-Pay-Sun
  7. Contact-Letter-Reaction
  8. Bank-Case-Compare
Down
  1. Wage-Room-Clean
  2. Hop-Egg-Whiskey
  3. Side-Stream-Up
  4. Blossom-Tomato-Picker
  5. Some-Day-Number
  6. Case-Hand-Lip
  7. High-Security-Factor
  8. Fire-Narrow-Route
  9. Eye-Intent-Lesser
  10. Student-Maid-Wet

18 Clues: Down-Arm-ParHigh-Pay-SunAgain-At-OverCase-Hand-LipSide-Stream-UpWage-Room-CleanHop-Egg-WhiskeyDawn-Girl-GreekSome-Day-NumberStudent-Maid-WetFire-Narrow-RouteEye-Intent-LesserBank-Case-CompareHoliday-Indian-SunHigh-Security-FactorBlossom-Tomato-PickerContact-Letter-ReactionAction-Dispute-Revolution

The Cyber Shield Crossword - Breach Guardians 2025-11-19

The Cyber Shield Crossword - Breach Guardians crossword puzzle
Across
  1. Secure connection tunnel
  2. Monitoring software
  3. Identity verification
  4. Multi-factor authentication
  5. Network of compromised devices
  6. Network traffic filter
  7. Unpatched vulnerability
Down
  1. Security testing method
  2. To encode data
  3. Hidden system modification tool
  4. Extortion malware
  5. Isolated test environment
  6. Science of encryption
  7. Keyboard activity recorder
  8. To trick someone into giving credentials
  9. Overload attack
  10. Hidden way into a system
  11. Malicious software

18 Clues: To encode dataOverload attackExtortion malwareMalicious softwareMonitoring softwareIdentity verificationScience of encryptionNetwork traffic filterSecurity testing methodUnpatched vulnerabilitySecure connection tunnelHidden way into a systemIsolated test environmentKeyboard activity recorderMulti-factor authenticationNetwork of compromised devices...

RISKPUBLIKA #10 2023-09-04

RISKPUBLIKA #10 crossword puzzle
Across
  1. KRI adalah Key Risk ...
  2. Materi training Risk Mindset & Culture telah tersedia di ...
  3. (eng) ... Risk adalah potensi risiko utama yang menjadi perhatian perusahaan
  4. (eng) TAF Risk Mindset adalah .... Mind
Down
  1. (eng) Serangan cyber yang dilakukan melalui email dengan berpura-pura agar TAFriends melakukan sesuatu (open file) atau mengunjungi link yang mengandung konten berbahaya
  2. E-KYC adalah Electronic ... Your Customer
  3. (eng) Data yang berkualitas diawali dengan kebenaran saat melakukan ... entry
  4. (eng) Besar akibat yang mungkin timbul dari suatu risiko

8 Clues: KRI adalah Key Risk ...(eng) TAF Risk Mindset adalah .... MindE-KYC adalah Electronic ... Your Customer(eng) Besar akibat yang mungkin timbul dari suatu risikoMateri training Risk Mindset & Culture telah tersedia di ...(eng) ... Risk adalah potensi risiko utama yang menjadi perhatian perusahaan...

Cybersecurity 2025-01-21

Cybersecurity crossword puzzle
Across
  1. Software designed to protect systems from malware and cyber threats
  2. The act of stealing personal information for fraudulent use
  3. Unauthorized access to a computer system or network.
  4. A method hackers use to deceive users into sharing sensitive information
Down
  1. The process of converting data into a secure format
  2. A weakness in software that can be exploited by attackers.
  3. The process of identifying and fixing software bugs or vulnerabilities
  4. A type of malicious software that demands payment to restore access

8 Clues: The process of converting data into a secure formatUnauthorized access to a computer system or network.A weakness in software that can be exploited by attackers.The act of stealing personal information for fraudulent useSoftware designed to protect systems from malware and cyber threats...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. meerdere compagnieën
  2. Thuishaven school voor onderofficieren
  3. Hoofddeksel van de chutist
  4. legervervoermiddel
  5. legeroefening
  6. Eskadron in het Belgisch Leger
  7. Vertrekplaats voor vliegtuigsprong
  8. De beste vriend van een para
  9. Militair voertuig
Down
  1. Auschwitz en Birkenau
  2. onbemande vliegtuig(afk)
  3. Opleidingskamp van de para-commando
  4. Belgium Luxemburg International Security Assistance Force
  5. M56
  6. Parachute
  7. voormalig Belgische Koning
  8. graad in het leger
  9. Militaire helikopter
  10. Operatie Kolwezi 78

19 Clues: M56ParachutelegeroefeningMilitair voertuiglegervervoermiddelgraad in het legerOperatie Kolwezi 78meerdere compagnieënMilitaire helikopterAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. Hoofddeksel van de chutist
  2. Operatie Kolwezi 78
  3. Eskadron in het Belgisch Leger
  4. De beste vriend van een para
  5. Vertrekplaats voor vliegtuigsprong
  6. Militair voertuig
  7. Belgium Luxemburg International Security Assistance Force
  8. Opleidingskamp van de para-commando
  9. meerdere compagnieën
Down
  1. Auschwitz en Birkenau
  2. graad in het leger
  3. legeroefening
  4. legervervoermiddel
  5. Parachute
  6. onbemande vliegtuig(afk)
  7. Thuishaven school voor onderofficieren
  8. voormalig Belgische Koning
  9. M56
  10. Militaire helikopter

19 Clues: M56ParachutelegeroefeningMilitair voertuiggraad in het legerlegervervoermiddelOperatie Kolwezi 78Militaire helikoptermeerdere compagnieënAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. Hoofddeksel van de chutist
  2. Operatie Kolwezi 78
  3. Eskadron in het Belgisch Leger
  4. De beste vriend van een para
  5. Vertrekplaats voor vliegtuigsprong
  6. Militair voertuig
  7. Belgium Luxemburg International Security Assistance Force
  8. Opleidingskamp van de para-commando
  9. meerdere compagnieën
Down
  1. Auschwitz en Birkenau
  2. graad in het leger
  3. legeroefening
  4. legervervoermiddel
  5. Parachute
  6. onbemande vliegtuig(afk)
  7. Thuishaven school voor onderofficieren
  8. voormalig Belgische Koning
  9. M56
  10. Militaire helikopter

19 Clues: M56ParachutelegeroefeningMilitair voertuiggraad in het legerlegervervoermiddelOperatie Kolwezi 78Militaire helikoptermeerdere compagnieënAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

Identity Theft 2016-12-10

Identity Theft crossword puzzle
Across
  1. These should always be difficult so that identity thieves cannot guess them easily.
  2. a number in the format 000-00-0000, unique for each and every person, that is used to track Social Security benefits and for other identification purposes.
  3. the condition of being protected from identity thefts and other people who could cause you to lose financial security
  4. When someone steals this, they have the access to fraudently apply for credit, file taxes, or get medical services.
  5. the fraudulent acquisition and use of a person's private identifying information, usually for their own financial gain.
  6. Do this to your receipts and old credit cards.
  7. This occurs when someone steals your Social Security Number to obtain medical treatment or other medical services.
Down
  1. shielding your identity
  2. When criminals watch from a nearby location as you punch in your cell # to a hotel or rental car company.
  3. charges/bills that you may have noticed.. that you, yourself did NOT pay for.
  4. When you install this and virus-detection software on your home computer, you are protecting yourself from criminals who may be trying to access your private information via computer.
  5. If you suspect that your identity has been stolen, you should contact authorities immediately.

12 Clues: shielding your identityDo this to your receipts and old credit cards.charges/bills that you may have noticed.. that you, yourself did NOT pay for.These should always be difficult so that identity thieves cannot guess them easily.If you suspect that your identity has been stolen, you should contact authorities immediately....

EAS Crossword 2020-11-08

EAS Crossword crossword puzzle
Across
  1. SOF Cashiers and TMs must ensure they _____ active security tags when customers purchase security tagged items.
  2. A type of EAS stop where a PSG conducts an EAS stop and finds that store product has NOT been paid for.
Down
  1. Theft deterrence system where the security gate is triggered by an active security tag.
  2. App that is used to view EAS alarm triggers on EAS iPods.
  3. A performance measure used to evaluate the efficiency of an investment (i.e., our EAS system).
  4. VENDOR

6 Clues: VENDORApp that is used to view EAS alarm triggers on EAS iPods.Theft deterrence system where the security gate is triggered by an active security tag.A performance measure used to evaluate the efficiency of an investment (i.e., our EAS system).A type of EAS stop where a PSG conducts an EAS stop and finds that store product has NOT been paid for....

Human Rights Day 2021-12-06

Human Rights Day crossword puzzle
Across
  1. the act of assenting
  2. differences & unlikeness
  3. date of declaration
  4. equivalence
  5. free from bias & injustice
Down
  1. how many articles?
  2. Safety
  3. possessions
  4. speech of self respect or appreciation
  5. something that is included
  6. correct
  7. liberty

12 Clues: Safetycorrectlibertypossessionsequivalencehow many articles?date of declarationthe act of assentingdifferences & unlikenesssomething that is includedfree from bias & injusticespeech of self respect or appreciation

Avery's Crossword 2024-04-18

Avery's Crossword crossword puzzle
Across
  1. Sendak's 1963 classic
  2. Newborn vision
  3. Green Eggs and Ham author
  4. Stroller, abroad
  5. Baby, in Italian
Down
  1. Hospital keepsake
  2. APA exercise recommendation
  3. Mini crib
  4. Security blanket
  5. Lullaby composer
  6. Needs changing
  7. Pacifier, nickname

12 Clues: Mini cribNeeds changingNewborn visionSecurity blanketLullaby composerStroller, abroadBaby, in ItalianHospital keepsakePacifier, nicknameSendak's 1963 classicGreen Eggs and Ham authorAPA exercise recommendation

Second ISMS Crossword Puzzle 2015-11-17

Second ISMS Crossword Puzzle crossword puzzle
Across
  1. _______allows for clear and easy understanding of who will be granted access to given information
  2. a means of escaping a building in the event of fire.
  3. The art of tricking or manipulating people into providing information that they normally would not provide
  4. Which is independent malicious program that need not any host program?
  5. Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.
  6. Data that is of no use to company is termed as______?
  7. Procedure that's used to check a business's performance.
  8. ________is a document that contains a list of the tasks that has to be completed as part of an audit.
  9. This is known as goldmine of information
Down
  1. This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
  2. A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
  3. What common attack can be used by the attacker against a system for password cracking?
  4. A(n) ____________________ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.
  5. This technology is used to measure and analyse human body characteristics for authentication purposes.
  6. Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident.

15 Clues: This is known as goldmine of informationa means of escaping a building in the event of fire.Data that is of no use to company is termed as______?Procedure that's used to check a business's performance.Which is independent malicious program that need not any host program?...

The Bad Guys Chapters 1-4 2022-02-25

The Bad Guys Chapters 1-4 crossword puzzle
Across
  1. protection
  2. to save
  3. very hard to get in or out
  4. what you think is going to happen
  5. to break into a computer
  6. crazy, silly
  7. cannot be done
  8. Spanish for "crazy"
  9. to rush in
  10. to get into
Down
  1. bad guys
  2. to break in when someone's talking
  3. basic
  4. unsafe
  5. rubbing unpleasantly
  6. Spanish for "guy"
  7. suggestion
  8. to give up something

18 Clues: basicunsafeto savebad guysprotectionsuggestionto rush into get intocrazy, sillycannot be doneSpanish for "guy"Spanish for "crazy"rubbing unpleasantlyto give up somethingto break into a computervery hard to get in or outwhat you think is going to happento break in when someone's talking

cyber intimidation 2013-09-30

cyber intimidation crossword puzzle
Across
  1. un _ _ _ _ _ _ _ _ _ _ si tu as problèmesde cyber intimidation
  2. beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonte mal tu
Down
  1. tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
  2. il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
  3. peuple _ _ _ _ _ _ _ _ _tu qaund ils dire ton noms
  4. quand vous obtenez tu devrait _ _ _ _ _ _ leur

6 Clues: quand vous obtenez tu devrait _ _ _ _ _ _ leurpeuple _ _ _ _ _ _ _ _ _tu qaund ils dire ton nomstu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.un _ _ _ _ _ _ _ _ _ _ si tu as problèmesde cyber intimidationbeaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonte mal tu...

CYBER INTIMIDATION 2013-09-30

CYBER INTIMIDATION crossword puzzle
Across
  1. quand vous obtenez tu devrais _ _ _ _ _ _ leur
  2. peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms
  3. un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation
Down
  1. il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
  2. -quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
  3. beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu

6 Clues: quand vous obtenez tu devrais _ _ _ _ _ _ leurpeuple _ _ _ _ _ _ _ _ tu quand ils dire ton nomsun _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidationbeaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu-quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs....

Bonus Game 2024-10-22

Bonus Game crossword puzzle
Across
  1. it is a consent or authorization to do something.
  2. serves as a pass when entering something.
  3. Acronym: One ____ Passwords.
  4. a state of being free from public attention.
Down
  1. it is a person's name and other facts about who they are.
  2. mfa serves as a ______ to decrease the possibility of a successful cyber attack.

6 Clues: Acronym: One ____ Passwords.serves as a pass when entering something.a state of being free from public attention.it is a consent or authorization to do something.it is a person's name and other facts about who they are.mfa serves as a ______ to decrease the possibility of a successful cyber attack.

Cyber Threat Intelligence Crossword Puzzle 2025-02-18

Cyber Threat Intelligence Crossword Puzzle crossword puzzle
Across
  1. The first phase of the cyber kill chain
  2. A cybercrime technique used to trick users into revealing sensitive data
  3. An online network that provides anonymity to cybercriminals
Down
  1. Gathering intelligence from freely available sources
  2. Cybercriminals who demand payment to restore encrypted files
  3. A threat intelligence framework that maps adversary behaviors

6 Clues: The first phase of the cyber kill chainGathering intelligence from freely available sourcesAn online network that provides anonymity to cybercriminalsCybercriminals who demand payment to restore encrypted filesA threat intelligence framework that maps adversary behaviorsA cybercrime technique used to trick users into revealing sensitive data

Complete the following crossword 2025-07-03

Complete the following crossword crossword puzzle
Across
  1. A method that cyber criminals use to trick you by sending fraudulent SMS or text messages
  2. Set up these to be notified of account activity
Down
  1. You can view these online
  2. Set it and forget it
  3. A transaction that can be completed online
  4. You can now assign these to your accounts

6 Clues: Set it and forget itYou can view these onlineYou can now assign these to your accountsA transaction that can be completed onlineSet up these to be notified of account activityA method that cyber criminals use to trick you by sending fraudulent SMS or text messages

Unit 4 crossword puzzle 2022-03-02

Unit 4 crossword puzzle crossword puzzle
Across
  1. A standalone storage device or appliance that acts as a file server
  2. a quick fix for a specific software problem
  3. A folder whose contents are available over the network
  4. sets of rules in iptables
  5. used to locate open ports
  6. used for outgoing connections
  7. A collection of patches, hotfixes, and system enhancements that have been tested by the manufacturer for wide deployment.
  8. The process of increasing the security of devices and software.
Down
  1. process created by the National Security Agency (NSA) to assist in making a network manageable, defensible, and secure.
  2. used to check network connections
  3. controls the behavior for incoming connections
  4. packets leaving the system
  5. firewall command line utility for Linux operation systems
  6. A special network composed of high-speed storage that is shared by multiple servers.
  7. a fix the is more thoroughly tested than a hotfix and designed for a wider deployment

15 Clues: sets of rules in iptablesused to locate open portspackets leaving the systemused for outgoing connectionsused to check network connectionsa quick fix for a specific software problemcontrols the behavior for incoming connectionsA folder whose contents are available over the networkfirewall command line utility for Linux operation systems...

COMM 205 C01 2024-08-27

COMM 205 C01 crossword puzzle
Across
  1. Information ____ Officer is responsible for the technical aspects of ensuring the security of information.
  2. Users who are first to adopt new technology and take risk.
  3. Every information system contains hardware, software, people, data and ____.
  4. People who write computer programs to support business functions.
  5. A set of parts or components working together towards a common goal.
  6. Database ____ is the person who plans, develops, monitors and maintains databases.
Down
  1. Computer ____ designs the computing devices that we use every day.
  2. Users who are last to adopt technology and are adverse to change.
  3. ____ Manager is responsible for keeping projects on time and budget.
  4. Processed data that possess context, relevance, and purpose.
  5. A set of instructions that tells the computer what to do.
  6. Computer ____ is the person responsible for monitoring and controlling computer systems.
  7. The physical devices that make up a computer.
  8. A collection of facts, that is intangible.
  9. ____ is the head of the IS department.

15 Clues: ____ is the head of the IS department.A collection of facts, that is intangible.The physical devices that make up a computer.A set of instructions that tells the computer what to do.Users who are first to adopt new technology and take risk.Processed data that possess context, relevance, and purpose....