cyber security Crossword Puzzles
En el Aeropuerto: ¡A Buscar Palabras! 2024-11-30
32 Clues: crew • gate • shop • seat • delay • aisle • office • window • flight • ticket • takeoff • landing • arrival • airport • luggage • passport • transfer • check-in • suitcase • bathroom • airplane • departure • cafeteria • to-travel • restaurant • connection • information • boarding-area • early-morning • boarding-pass • security-check • police-station
Words Commenly Confused- Cischke 2022-04-06
Across
- possessive form of they
- quiet order and security
- contraction of they are
- wholly or entirely
- revealed
- a flat surface, an airplane
- still and peaceful
- a place
- in a fixed position
- detail
- a part of something
Down
- at that time
- the head of the school
- a flat area of land
- gleamed, glowed
- writing paper
- hurled
- a rule of conduct
- beyond
- comparisons
20 Clues: hurled • beyond • detail • a place • revealed • comparisons • at that time • writing paper • gleamed, glowed • a rule of conduct • wholly or entirely • still and peaceful • a flat area of land • in a fixed position • a part of something • the head of the school • possessive form of they • quiet order and security • contraction of they are • a flat surface, an airplane
Toy Story 2025-11-25
20 Clues: bald • cowgirl • a clowm • lightyear • a penguin • smells bad • is married • stores money • security room • has a big head • spoon and fork • a blue dinosaur • has three animals • big and pink bear • right in the center • can stretch his body • are from outer space • looks like Darth Vader • has a snake in his boot • green with little hands
Unit 8: Future Innovations 2025-10-19
Across
- modify, alter
- technology online meeting tool, virtual communication system
- show, illustrate
- guess, assume
- customize, tailor
- chip, processor
- electronic junk, discarded devices
- privacy information security, data protection
- highlight, stress
Down
- expand, widen
- intimidate, endanger
- input, type
- blame, judge
- power, energize
- virus malware, bug
- collaborate, work together
- inspire, encourage
- insert, embed
- up against face, encounter
- up with stay informed, catch up
20 Clues: input, type • blame, judge • expand, widen • modify, alter • guess, assume • insert, embed • power, energize • chip, processor • show, illustrate • customize, tailor • highlight, stress • virus malware, bug • inspire, encourage • intimidate, endanger • collaborate, work together • up against face, encounter • up with stay informed, catch up • electronic junk, discarded devices • ...
economic key terms 2021-04-26
Software Security Crossword 2024-07-03
7 Clues: Software security company • Sound associated with hawks • GitHub's cat-octopus mascot • Storage for code and project files • Protection against unauthorized access • Set of rules for software communication • Platform for hosting and collaborating on code
Movies 2023-03-17
6 Clues: IT's a type of scary film • IT's a tuyp of funny film • It take place in a cyber world • IT's a story about a ship chrash • ITs a film type about a two people having romantic • Jones he is an Explorer who has a cool hat and a whoper
Cyber Crossword Puzzle 2024 2024-12-03
Across
- Malicious software
- Cyber attack delivered via email, text, or voice message
- Unauthorised access to data and IT systems
Down
- A string of characters used to authenticate and access an account
- Computer program that detects and protects against malicious software
- An unauthorised user who attempts or gains access to a system
6 Clues: Malicious software • Unauthorised access to data and IT systems • Cyber attack delivered via email, text, or voice message • An unauthorised user who attempts or gains access to a system • A string of characters used to authenticate and access an account • Computer program that detects and protects against malicious software
Anti-bully Puzzle 2021-11-17
Across
- "Hopeful"- by Bars and Melody is a inspiring _____________ song.
- When someone is kicking, punching or breaking your belongings the is ________ bullying.
- If you see bullying and don't interact you are a _________.
- If you are bullied don't try to ______ who you are.
- 6 Most bullying happens during ______.
Down
- Tell a _____ if you are getting bullied.
- If you are bullied and you need someone to ____ to you can ____ to your family or friends for support.
- Cyber bullying happens on the ________.
- If you are a bystander you can also be ________ by bullying.
- You can prevent bullying by being a _________.
- About 160,000 kids have skipped school because of ________.
- Usually ____ ages 12-18 are bullied most often
12 Clues: Cyber bullying happens on the ________. • Tell a _____ if you are getting bullied. • 6 Most bullying happens during ______. • You can prevent bullying by being a _________. • Usually ____ ages 12-18 are bullied most often • If you are bullied don't try to ______ who you are. • About 160,000 kids have skipped school because of ________. • ...
SOSIOLOGI 2024-09-26
Across
- Kejahatan yang dilakukan oleh orang-orang yang memiliki kekuasaan dan jabatan
- faktor penyebab kemiskinan dan ketidaksetaraan ekonomi
- Sikap kemurantropi dan empati yang sangat mendalam mampu mengatasi kemiskinan masyarakat
- perilaku yang melanggar norma sosial dan hukum
- kesenjangan ekonomi yang sangat mencolok antara kelompok kaya dan miskin
Down
- ketidakmampuan untuk memenuhi kebutuhan dasar seperti pakaian, makanan, dan tempat tinggal
- komputer dan jaringan internet
- remaja perilaku menyimpang remaja yang dilakukan secara bersama-sama oleh kelompok tertentu, seperti tawaran antar siswa.
- kejahatan yang dilakukan dengan memanfaatkan
- Perbedaan perlakuan berdasarkan ras, agama, atau jenis kelamin
- dengan kejahatan
- teori yang membahas mengapa pelanggaran norma terjadi lebih jelas di beberapa masyarakat atau zaman tertentu dimaksud teori
12 Clues: dengan kejahatan • komputer dan jaringan internet • kejahatan yang dilakukan dengan memanfaatkan • perilaku yang melanggar norma sosial dan hukum • faktor penyebab kemiskinan dan ketidaksetaraan ekonomi • Perbedaan perlakuan berdasarkan ras, agama, atau jenis kelamin • kesenjangan ekonomi yang sangat mencolok antara kelompok kaya dan miskin • ...
TTS BK KELAS 7 2022-09-19
Across
- perlakuan Berupa pukulan, tendangan, tamparan, meludahi, melempari, atau segala bentuk kekerasan yang dapat melukai fisik secara langsung.
- perlakuan Berupa pengabaian, pengucilan, cibiran, dan segala bentuk tindakan untuk mengasingkan seseorang dan komunitasnya
- Segala bentuk tindakan yang dapat menyakiti orang lain dengan sarana media elektronik
- akibat bullying fisik
- perlakuan Berupa celaan, fitnah, atau penggunaan kata-kata yang tidak baik yang menyakiti perasaan orang lain.
- satu bentuk dari perilaku agresi dengan kekuatan dominan pada perilaku yang dilakukan secara berulang-ulang dengan tujuan mengganggu anak lain atau korban yang lebih lemah darinya.
Down
- singkatan bimbingan dan konseling
- bidang BK permasalahan lingkungan
- bidang BK permasalahan diri sendiri
- perasaan yang muncul akibat bullying
- tidak percaya diri
- bidang BK permasalahan pelajaran
- bidang BK permasalahan studi lanjut
13 Clues: tidak percaya diri • akibat bullying fisik • bidang BK permasalahan pelajaran • singkatan bimbingan dan konseling • bidang BK permasalahan lingkungan • bidang BK permasalahan diri sendiri • bidang BK permasalahan studi lanjut • perasaan yang muncul akibat bullying • Segala bentuk tindakan yang dapat menyakiti orang lain dengan sarana media elektronik • ...
SMART CITIES 2022-02-15
Across
- The transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- T in ciTies
- SMART is the ___ use of resources in an efficient & effective way
- a person who is among the first to explore or settle a new country or area
- E in citiEs
- C in Cities
- facts and statistics collected together for reference or analysis
Down
- 2nd I in citIes
- S in citieS
- A global network which facilitates communication and sharing of information online
- the protection of computer systems and networks from cyber threats
- 1st I in cIties
- Reuse discarded objects or material in such a way as to create a product of higher quality or value than the original
13 Clues: S in citieS • T in ciTies • E in citiEs • C in Cities • 2nd I in citIes • 1st I in cIties • SMART is the ___ use of resources in an efficient & effective way • facts and statistics collected together for reference or analysis • the protection of computer systems and networks from cyber threats • a person who is among the first to explore or settle a new country or area • ...
The Future Is Black 2025-05-10
Across
- Southern hip hop duo incorporating futuristic black imagery
- The first Black astronaut (last name)
- Jazz musician; creator of musical Afrofuturism
- Beyoncé's album featuring song "Alien Superstar"Octavia, Author of Kindred and pioneer of Afro-futurism (first name)
- Author of Kindred and pioneer of Afro-futurism (first name)
- Androgynous, robotic, and Afro-cyber glam singer (first name)
- Funk innovator with Parliament-Funkadelic (first name)
Down
- Black Panther’s home nation
- His iconic work intersected identity, culture, and futurism
- Vocalist of "Lady Marmalade" girl group "Labelle" (last name)
- "A Seat At The Table" visual and musical artist with explorations of Black identity and space
- Polymath and astronomer from Baltimore; Mapped the boundaries of D.C. (last name)
- Lt. Nyoto Uhura; Actress of Star Trek fame (first name)
13 Clues: Black Panther’s home nation • The first Black astronaut (last name) • Jazz musician; creator of musical Afrofuturism • Funk innovator with Parliament-Funkadelic (first name) • Lt. Nyoto Uhura; Actress of Star Trek fame (first name) • Southern hip hop duo incorporating futuristic black imagery • His iconic work intersected identity, culture, and futurism • ...
2024 Compliance and Ethics 2024-11-01
Across
- Federal law that protects the privacy and security of patients' health information
- Items or services given to healthcare providers as incentives
- Moral principles and values governing healthcare practices
- Protecting patient data from unauthorized access or breaches
- Intentional and improper practices that harm patients or defraud the healthcare system
- An illegal payment or reward for patient referrals
- Informing authorities or superiors about unethical or illegal actions
Down
- Maintaining the confidentiality of patient information
- A recommendation of a patient to another healthcare provider
- A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
- The unnecessary or excessive use of healthcare resources
- The federal agency responsible for investigating healthcare fraud and abuse
- Deceptive and illegal activity in healthcare billing or services
- Adherence to legal and ethical standards in healthcare
14 Clues: An illegal payment or reward for patient referrals • Maintaining the confidentiality of patient information • Adherence to legal and ethical standards in healthcare • The unnecessary or excessive use of healthcare resources • Moral principles and values governing healthcare practices • A recommendation of a patient to another healthcare provider • ...
Networking & Cyber Ethics Crossword 2025-06-14
Across
- Local Area Network
- Harmful software
- Wireless internet connection
- Personal information protection
- People who break into computers
- Place where web pages are found
- A good and ethical user
Down
- Crime done online
- Group of connected computers
- Software that stops viruses
- Never share this online
- Sending rude messages online
- Short name for website address
13 Clues: Harmful software • Crime done online • Local Area Network • Never share this online • A good and ethical user • Software that stops viruses • Group of connected computers • Sending rude messages online • Wireless internet connection • Short name for website address • Personal information protection • People who break into computers • Place where web pages are found
doni's puzzle 2023-09-08
18 Clues: over • show • renew • guard • in to • scheme • file data • or protect • information • in security • need to have • distribution • to build apps • selling company • transaction fraud • information provider • no permission granted • web pages under a single domian
Last 2022-10-20
15 Clues: cub • camera • abroad • lodging • Baggage • to tell • two meals • not allowed • to discorve/visit • clouds in the sky • to expect something • No clouds in the sky • off from going into a space • to look at something carefully • camera - A machine that records pepople
Spring 2023 2023-04-06
14 Clues: Lake Event • Owns a C-2 • Scholarship • New Director • Family Brand • Recruiting Mgr • 1983 Motorcoach • Meet Mary Berger • National Champions • Cheshire Branch Mgr • 20 Years of Service • 35 Years of Service • Shop Foremen S.Windsor • Safety Security Coordinator
Han Bunt's Crossword 2018-06-19
14 Clues: SYD • ZQN • PER • Passenger • An airline • Public area • Get on plane • Regional airport • aviation security • Aircraft is based • M phonetic alpabet • Work role at airport • The wall of an aircraft • Heavier a/c requires longer
Black History Month Puzzle By EL - Black Inventors 2022-02-16
14 Clues: Hot Comb • Laserphaco • Feed Device • Traffic Light • Peanut products • Street Letter Box • Induction Telegraph • Home security system • Automatic Transmission • Automatic Elevator Doors • Improved the ironing board • Evaporative Air Conditioner • Automatic Lubricating Device • Automatic Railroad Car Coupler
Black History Month Puzzle By EL - Black Inventors 2022-02-16
14 Clues: Hot Comb • Laserphaco • Traffic Light • Feeding Device • Peanut products • Street Letter Box • Induction Telegraph • Home security system • Automatic Transmission • Automatic Elevator Doors • Improved the ironing board • Evaporative Air Conditioner • Automatic Lubricating Device • Automatic Railroad Car Coupler
Fuller Leadership Crossword 2022-02-14
Across
- Nutrition Services Supervisor
- Quality of Life Supervisor
- 2nd Floor Manager
- Director of Nursing
- Assistant Administrator
- 3rd Floor Manager
- Office Supervisor
- Security Supervisor
- Nutrition Services Supervisor
- Administrator
Down
- 4th Floor Manager
- Assistant Administrator
- 5th Floor Manager
- Environmental Services Supervisor
- Infection Prevention
- Therapy Supervisor
16 Clues: Administrator • 4th Floor Manager • 5th Floor Manager • 2nd Floor Manager • 3rd Floor Manager • Office Supervisor • Therapy Supervisor • Director of Nursing • Security Supervisor • Infection Prevention • Assistant Administrator • Assistant Administrator • Quality of Life Supervisor • Nutrition Services Supervisor • Nutrition Services Supervisor • Environmental Services Supervisor
cross 1 T 2025-06-18
14 Clues: Flight call • Waiting area • Show at gate • Safety check • Helps onboard • Holds clothes • Entry to plane • Flies the plane • Bag pickup area • Checks documents • Bag check counter • Where plane lands • Flight info screen • Big airport building
Starfleet Crossword #3 2020-09-07
16 Clues: 370 • Shamrock • Engine force • Positive rate • Major air show • African carrier • Shoes off please • New York airport • Extendible walkway • Major A350 operator • Large cargo airline • Miracle on the Hudson • No passport necessary • Genuine typo or PR stunt? • Russian aircraft manufacturer • Large general aviation manufacturer
Tech Crossword 2025-01-28
Across
- Finger tapping input device
- Computer's heart
- Universal connector
- Code creator
- Digital window
- Invisible connector
- Energy saver
- Problem-solving recipe
- Paper output machine
- Point and click navigator
Down
- Internet traffic director
- Digital security guard
- Web page viewer
- Computer's short-term memory
- Portable computer
- Drive Data keeper
16 Clues: Code creator • Energy saver • Digital window • Web page viewer • Computer's heart • Portable computer • Universal connector • Invisible connector • Drive Data keeper • Paper output machine • Digital security guard • Problem-solving recipe • Internet traffic director • Point and click navigator • Finger tapping input device • Computer's short-term memory
Ayo's puzzle 2021-02-25
12 Clues: Posing • Scheme • Argument • Old media • New media • Big brother • Google Chrome • Digitally ill • Fair use Poilicy • Aimed advertizing • Google,Safari,Bing, Explorer • Theft of online social security #
Cashless society 2024-09-03
Across
- used for electronic transactions
- rates are lower
- makes people high value
- big sums
- the usage of cash
- goods for sale
- digital
- can easily withdraw
- make life easier
- transactions
- with cashless
Down
- internet
- are conducted without the usage of cash
- digital
- money cost more
- cash safely
- divices or codes for security
- to do
- payment
- its own advantages and weakness
20 Clues: to do • digital • digital • payment • internet • big sums • cash safely • transactions • with cashless • goods for sale • rates are lower • money cost more • make life easier • the usage of cash • can easily withdraw • makes people high value • divices or codes for security • its own advantages and weakness • used for electronic transactions • are conducted without the usage of cash
Cashless society 2024-09-03
Across
- internet
- payment
- with cashless
- goods for sale
- its own advantages and weakness
- digital
- digital
- rates are lower
- transactions
- make life easier
Down
- big sums
- money cost more
- are conducted without the usage of cash
- used for electronic transactions
- the usage of cash
- makes people high value
- can easily withdraw
- cash safely
- divices or codes for security
- to do
20 Clues: to do • payment • digital • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • the usage of cash • can easily withdraw • makes people high value • divices or codes for security • its own advantages and weakness • used for electronic transactions • are conducted without the usage of cash
cashless society 2024-09-03
Across
- with cashless
- used for electronic transaction
- big sums
- to do
- goods for sale
- digital
- money cost more
- makes people high value
- internet
- payment
- devices or codes for security
Down
- are conducted without the usage of cash
- digital
- rates are lower
- can easy withdraw
- the usage of cash
- make life easier
- transactions
- cash safely
- its own advantages and weakness
20 Clues: to do • digital • digital • payment • big sums • internet • cash safely • transactions • with cashless • goods for sale • rates are lower • money cost more • make life easier • can easy withdraw • the usage of cash • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
cashless society 2024-09-03
Across
- the usage of cash
- used for electronic transaction
- goods for sale
- digital
- make life easier
- transactions
- money cost more
- internet
- big sums
- rates are lower
- to do
Down
- are conducted without the usage of cash
- its own advantages and weakness
- cash safely
- devices or codes for security
- payment
- with cashless
- makes people high value
- can easy withdraw
- digital
20 Clues: to do • payment • digital • digital • internet • big sums • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • the usage of cash • can easy withdraw • makes people high value • devices or codes for security • its own advantages and weakness • used for electronic transaction • are conducted without the usage of cash
Software Security Crossword 2024-07-03
7 Clues: Software security company • GitHub's cat-octopus mascot • Sound associated with hawks • Storage for code and project files • Protection against unauthorized access • Programs and applications for computers • Platform for hosting and collaborating on code
"Innovating Finance: The Evolution and Challenges of Digital Payments in India" 2024-06-14
7 Clues: one-time-password • two step verification • regular security audits • unreadable to unauthorised parties • its ceo was seen on shark tank india • strong mechanism to identify malfunction • through government initiatives and campaigns
CyberSecurity Awareness 2025-07-23
7 Clues: Multi-____ Authentication • being hidden from public view • conversion of information to code • "Enter your username and ______." • Security Assurance for the Federal Reserve • security protocols; organized into 'families' • fake correspondence sent by a 'Nigerian Prince'
हिंदी वर्ग पहेल - 2 2023-09-20
11 Clues: - निगम (Nigam) • - विकास (Vikas) • - शासन (Shasan) • - सहयोग (Sahyog) • - योजना (Yojana) • - स्थिति (Sthiti) • - न्यायिक (Nyayik) • - सुरक्षा (Suraksha) • - समर्थन (Samarthan) • - समीक्षा (Sameeksha) • - परियोजना (Pariyojana)
Black History Month Puzzle By EL - Black Inventors 2022-02-16
14 Clues: Hot Comb • Laserphaco • Traffic Light • Feeding Device • Peanut products • Street Letter Box • Induction Telegraph • Home security system • Automatic Transmission • Automatic Elevator Doors • Improved the ironing board • Evaporative Air Conditioner • Automatic Lubricating Device • Automatic Railroad Car Coupler
13 2025-07-24
14 Clues: Felonious act • Coroner’s role • Easement grant • Default on duty • Deceased person • Escheat to state • Convicted person • Class action type • Trial without jury • Derived legal right • FOIA request result • Collateral security • Adjournment of court • Evidence handling log
Network Concepts Puzzle 2020-05-12
6 Clues: One of the Goals of Computer Security • one of the types of computer security • The forth layer of OSI Reference Model • The third layer of OSI Reference Model • How many Layers are in OSI Reference Model • OSI Security Architecture can be classified in to
Chapter 7: Economics of Aging 2024-02-13
Across
- Income levels which are defined by the government as poor.
- An area of concern with Social Security that considers if the benefits provided are fairly distributed across persons and groups.
- Refers to the positive impacts a nation might experience during or after the transition from a young society to an aging society
- This is a hypothesis of saving and spending that argues that we defer some of our potential consumption into things like IRAs.
- Refers to citizens who lack the means to support themselves through no fault of their own. This includes poor older adults and others without adequate financial resources if they had worked hard, tried to support themselves and save, not drunk or gambled away their money.
- Things one owns with value that could be sold for significant sums of money (e.g., property, cars, houses, etc.)
- The percentage of the population living below a minimum level of income as defined as necessary for survival.
- These are public, private, or combined systems for supporting people who are older, poor, and/or ill. The idea is to provide income to persons in their later lives, after they are no longer involved in the labor force, typically by using public monies or funds generated through employment.
- This focused investing some portion of contributions in the stock market. Moving toward this, Social Security would reduce both the social insurance and redistributive aspects of the program.
- The federal government passed legislation called the Employee Retirement Income Security Act of 1974.
- The consequences of differences in life chances over time.
- This was a 1930s’ social movement that advocated a $200 monthly pension to older people that must be spent by the recipients within 30 days in order to stimulate the economy. For families, the start of a public retirement program reduced their financial burden at a historically critical time -- the depths of the Great Depression -- because older adults at that time often relied on their kin for financial support.
Down
- A concept that refers to sharing the risks of something (e.g., loss of income) across a group of people, whether informal (among friends) or formal (through an employer or a government). For example, the U.S. Social Security system is based on this concept.
- Refers to all of the economic activity driven by the needs and preferences of the growing older population and views the aging population as a major driver of economic growth/ Measurement typically defines it as spending of those 50 (and sometimes 55) and older on goods and services, as well as the additional economic activity such spending generates.
- Criteria for determining who receives benefits based on a threshold of resources that when individuals fall below that level, they are eligible to receive benefits.
- The image used by the Social Security Administration in describing income maintenance that is used to conceptualize three sources of income (i.e., (1) retirement benefits from Social Secturity, (2) income from employer-based pensions, and (3) funds from personal savings or other assets).
- Noncash benefits that contribute to economic well-being by reducing expenditures (e.g., Medicare as a publicly funded health benefit; subsidized housing; Supplemental Nutrition Assistance Program (SNAP) / “food stamps”)
- Refers to how individuals who have early opportunities for success (i.e., better life chances) more often build on that success to perpetuate their advantages through adulthood and into later life; in contrast, those with disadvantages also carry those disadvantages forward through sequential life stages, often resulting in less economic security in later life. Exposure to more structural barriers likely results in increased vulnerability later in life.
- An area of concern with Social Security that considers if the benefits provided are sufficient or able to meet the needs of recipients (i.e., Are social security benefits high enough?).
- In this kind of pension system, the employer controls a worker’s pension. The employer contributes to and manages a common fund under rules defined by the ERISA. Under such systems, workers know exactly what their pension amount will be as they approach retirement and whether the amount will grow with inflation or remain fixed.
- The process of returning a higher percentage of prior income (although not necessarily a higher dollar amount) to poorer individuals than to high-earning retirees, who are also likely to have other income sources.
- A designated federal fund held in government securities, was created to hold funds not needed for current retirees.
- This kind of pension system is commonly known as 401k plans. This is a kind of pension system where the worker, the employer, or both contribute to a fund that is held by an independent financial entity; the money in this fund belongs to the worker immediately, although rules limit whether and when it may be used before retirement age. Th e amount contributed influences a retiree’s eventual benefit amount, as does the way the funds are invested. Benefits at retirement are not preset but instead depend on the trends in the stock and bond markets where the employee invests, especially when close to retirement.
- Refers to systems that base eligibility (or the criteria for access or to be a beneficiary) for benefits on age or years of employment.
24 Clues: Income levels which are defined by the government as poor. • The consequences of differences in life chances over time. • The federal government passed legislation called the Employee Retirement Income Security Act of 1974. • The percentage of the population living below a minimum level of income as defined as necessary for survival. • ...
Cyber Grid Crossword Puzzle 2025-03-03
Across
- A system of networks that allows the transfer of data packets
- A popular cloud computing service provided by Microsoft
- A global tech company known for its search engine
- The process of improving a computer's performance by upgrading hardware
- A personal assistant software developed by Apple
- A type of online attack where the attacker floods a system with traffic
- A technology used for displaying virtual objects in real-world environments
- The central processing unit of a computer
Down
- A method for securing a network by monitoring and controlling incoming traffic
- A technology used for wireless communication between devices over short distances
- The protocol used for secure communication over the internet
- A digital currency system that operates independently of a central bank
- A way to store data in the cloud
13 Clues: A way to store data in the cloud • The central processing unit of a computer • A personal assistant software developed by Apple • A global tech company known for its search engine • A popular cloud computing service provided by Microsoft • The protocol used for secure communication over the internet • A system of networks that allows the transfer of data packets • ...
airport 2024-09-02
PHRASAL VERBS 2020-05-18
12 Clues: wait • reparar • request • sentarse • levantarse • despertarse • become happy • ponerse de pie • devolverle algo a alguién • copy as a security measure • have a friendly relationship • break or separate into pieces
Violence in Schools 2023-03-03
Across
- hate violence that has become illegal
- picking on and teasing someone, resulting in mental and physical harm.
- using threats and physical harm to scare someone into submission.
- when a person is treated in an unfair way based on prejudice
- person committing violent acts
- bullying aimed at a person based on personal characteristics.
Down
- convincing someone to do something, like bullying.
- non-consensual sexual remarks or advances
- negative view on a person based on a stereotype
- a series of small and constant acts of discrimination
- the use of threats and insults to humiliate/harm someone online
- convincing someone to do something risky or harmful, to accept them into a group.
- a lack of acceptance of another person
- exaggerated belief about an entire group of people
- damaging and destroying property that is not yours
- when you harm another person
16 Clues: when you harm another person • person committing violent acts • hate violence that has become illegal • a lack of acceptance of another person • non-consensual sexual remarks or advances • negative view on a person based on a stereotype • convincing someone to do something, like bullying. • exaggerated belief about an entire group of people • ...
Section C: Crossword puzzle 2025-09-03
Across
- An adult at school who helps with health problems
- Harmful treatment that can be physical or emotional
- You should never touch someone else’s ______ without gloves
- What you should always do if you see bullying or violence
- Harassment, threats, or unsafe messages can happen ______ .
- This can start from candles or stoves if not careful
- Online safety involves being smart on the ______
- Use these to protect your hands from blood.
Down
- When two people argue or fight, it’s called a ______.
- You click it in the car to stay safe (8 letters)
- Clouds you see when something burns (5 letters)
- Signal you can blow to get attention in an emergency
- A person you can talk to about problems or stress
- The opposite of danger
- Repeated unkind behavior toward someone
- You wear this on your head for biking or skating safety
16 Clues: The opposite of danger • Repeated unkind behavior toward someone • Use these to protect your hands from blood. • Clouds you see when something burns (5 letters) • You click it in the car to stay safe (8 letters) • Online safety involves being smart on the ______ • An adult at school who helps with health problems • A person you can talk to about problems or stress • ...
CROSSMANIA 2025-02-13
12 Clues: beg • sour • risk • pilot • arrange • insanity • landslide • protection • sencsiblity • cuddle snuggle • very careful about choosing or using • a basic rule or law on which others are based
Organizing Homeland Security 2017-04-26
Across
- The process of examining a community to determine the areas that might be subject to attack
- A multiagency operation in West Virginia that evaluates information gathered from a variety of governmental sources
- As used in this text, the ability to stay focused on the primary mission of an organization
Down
- A federal law designed to prevent political interference with the decisions and actions of governmental organizations.
- Information law enforcement agencies, military units, or other security forces can use to prevent an attack or operation.
- Preparations from any agency to deal with natural, accidental, or man-made disasters
- The criminal and social actions of individuals and groups before a terrorist attack
- Any outcome or output of analyzed information that can be used by law enforcement agencies, military units, or security forces to take an immediate action
- adding too many secondary tasks to a unit. Too many jobs divert a unit from its primary mission
- favoring the process over accomplishments
10 Clues: favoring the process over accomplishments • The criminal and social actions of individuals and groups before a terrorist attack • Preparations from any agency to deal with natural, accidental, or man-made disasters • The process of examining a community to determine the areas that might be subject to attack • ...
Security Awareness Month 2022-09-28
10 Clues: _____ Threats • _____ Management • _____ USCIS Mission • Critical Information • Be aware of your _____ • _____ help minimize risk • Unattended _____ packages • Complete OPSEC _____ exercises • Careful posting to _____ media • Can't control adversaries _____
Law & Security Crossword 2021-06-14
Across
- formal or systematic examination or research
- the result of an action
- the aggregate of people living together in a community
- a building in which people are legally held as a punishment for a crime they have committed or while awaiting trial
- the action of going to live in a foreign country
Down
- an abnormal dependence on something that is psychologically or physically habit-forming
- the state of being confined in prison
- the armed forces of a country
- systemic means of obtaining a confession
- a civil force responsible for the prevention and detection of crime and the maintenance of public order
10 Clues: the result of an action • the armed forces of a country • the state of being confined in prison • systemic means of obtaining a confession • formal or systematic examination or research • the action of going to live in a foreign country • the aggregate of people living together in a community • ...
Computer Network security 2022-10-10
Across
- Heart of Data Encryption Standard (DES), is the
- keys An asymmetric-key (or public-key) cipher uses
- A device allowing some packets to pass and blocking others.
- a device or software application that monitors internal network
- trusted third party that assigns a symmetric key to two parties
- a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information
Down
- Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
- Electronic Code Book is
- A hash function guarantees integrity of a message. It guarantees that message has not be
- A digital signature needs a
10 Clues: Electronic Code Book is • A digital signature needs a • Heart of Data Encryption Standard (DES), is the • keys An asymmetric-key (or public-key) cipher uses • A device allowing some packets to pass and blocking others. • a device or software application that monitors internal network • trusted third party that assigns a symmetric key to two parties • ...
Computer Network security 2022-10-10
Across
- Heart of Data Encryption Standard (DES), is the
- a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information
- trusted third party that assigns a symmetric key to two parties
- A device allowing some packets to pass and blocking others.
- An asymmetric-key (or public-key) cipher uses
- A hash function guarantees integrity of a message. It guarantees that message has not be
Down
- Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
- Electronic Code Book is
- A digital signature needs a
- a device or software application that monitors internal network
10 Clues: Electronic Code Book is • A digital signature needs a • An asymmetric-key (or public-key) cipher uses • Heart of Data Encryption Standard (DES), is the • A device allowing some packets to pass and blocking others. • trusted third party that assigns a symmetric key to two parties • a device or software application that monitors internal network • ...
MTA Security Fundamentals 2019-05-05
Across
- An attack which redirects a websites traffic to an illegitimate website.
- A form of malware that collects personal information
- A hardware or software-based device used by attackers to record keystrokes.
- A social engineering tactic in which users are asked to supply personal information through a response to an email or through navigating to a website that looks legitimate but is not legitimate.
- A possibility of data or systems being compromised.
- A computer which becomes part of a Botnet and helps carry out a DDoS.
- A logging system used to audit non-Microsoft products.
Down
- The default Windows network authentication protocol.
- The act of keeping data and systems secure from unauthorized access.
- A network full of computers which have been taken over for the purpose of carrying out a DDoS.
10 Clues: A possibility of data or systems being compromised. • The default Windows network authentication protocol. • A form of malware that collects personal information • A logging system used to audit non-Microsoft products. • The act of keeping data and systems secure from unauthorized access. • A computer which becomes part of a Botnet and helps carry out a DDoS. • ...
Security System Sensors 2023-08-28
Across
- an electromagnetic switch used to control the flow of electricity in a circuit
- the act of covering something to stop heat, sound, or electricity from escaping or entering
- to switch on a piece of electrical equipment by accident
- (CIRCUIT) without interruption, providing a continuous path through which a current can flow
- a tube that allows gas or liquid to flow around something rather than through it
- an occasion when a machine or part of your body stops working properly
Down
- to make something such as a bomb or electrical system start to operate SYN set off
- useful, near and easy to reach
- (BEAM)electromagnetic radiation (EMR) with wavelenghs linger thatn those of visible light
- to touch or make changes to something that you should not
10 Clues: useful, near and easy to reach • to switch on a piece of electrical equipment by accident • to touch or make changes to something that you should not • an occasion when a machine or part of your body stops working properly • an electromagnetic switch used to control the flow of electricity in a circuit • ...
Food Safety & Security 2024-10-17
Across
- A root vegetable commonly used in soups
- Italian cheese often used on pizza
- A sweet treat made from milk and sugar, often flavored
- A sweet pastry filled with fruit
- MEIN An Asian noodle dish, often stir-fried
- A common spice made from dried flowers
- A breakfast dish made of beaten eggs
Down
- A fruit that comes in varieties like navel and blood
- Clue: A cold soup often made with tomatoes
- Dark chocolate dessert with a creamy texture
10 Clues: A sweet pastry filled with fruit • Italian cheese often used on pizza • A breakfast dish made of beaten eggs • A common spice made from dried flowers • A root vegetable commonly used in soups • Clue: A cold soup often made with tomatoes • MEIN An Asian noodle dish, often stir-fried • Dark chocolate dessert with a creamy texture • ...
Physical Security Quiz 2025-09-15
Across
- What shop is Sweetwater's Emergency place?
- Last digit of Alarm Distress Code?
- During a Robbery you should remain?
- Building Distress Text Word?
Down
- What clinic is LC's Emergency meet behind?
- Loudon BR.,fire extinguisher located ___ hall?
- All communications rooms should be?
- Do you respond to a distress text?
- How many exists does all three branches have?
- Loudon branch offsite Emergency spot State?
10 Clues: Building Distress Text Word? • Do you respond to a distress text? • Last digit of Alarm Distress Code? • All communications rooms should be? • During a Robbery you should remain? • What clinic is LC's Emergency meet behind? • What shop is Sweetwater's Emergency place? • Loudon branch offsite Emergency spot State? • How many exists does all three branches have? • ...
Information Security Challenge 2025-12-02
Across
- Giving users only the access they need—nothing more.
- The policy for Keeping workspaces free of exposed confidential information.
- Training staff to recognize and respond to security threats.
- Screening individuals before granting access to sensitive systems.
- Removing system access when an employee leaves or changes roles.
Down
- Rules for creating and managing secure login credentials.
- Guidelines for proper use of company systems and data.
- Grants permissions based on job responsibilities.
- Ensuring sensitive information is not disclosed to unauthorized people.
- Protecting personal information from misuse or exposure.
10 Clues: Grants permissions based on job responsibilities. • Giving users only the access they need—nothing more. • Guidelines for proper use of company systems and data. • Protecting personal information from misuse or exposure. • Rules for creating and managing secure login credentials. • Training staff to recognize and respond to security threats. • ...
Information Security Challenge 2025-09-05
Across
- Grants access based on job responsibilities.
- Training staff to recognize and respond to security threats.
- Ensuring sensitive information is not disclosed to unauthorized people.
- Removing system access when an employee leaves or changes roles.
- The policy for Keeping workspaces free of exposed confidential information.
Down
- Employer’s process to verify a candidate’s history.
- Protecting personal information from misuse or exposure.
- Guidelines/Policy for proper use of company systems and data.
- Policy for creating and managing secure login credentials.
- Policy for how long data is stored before deletion
10 Clues: Grants access based on job responsibilities. • Policy for how long data is stored before deletion • Employer’s process to verify a candidate’s history. • Protecting personal information from misuse or exposure. • Policy for creating and managing secure login credentials. • Training staff to recognize and respond to security threats. • ...
Cyber Safety Quiz 2025-07-14
Across
- A person who breaks into computer systems
- A harmful program that can damage your computer
- Using a fake name or identity online
- Unwanted or junk emails
- A secret code to access accounts
- information Personal details like name, age, address
Down
- Right and wrong behavior online
- A team that handles internet crime in India
- A fake message trying to steal your personal info
9 Clues: Unwanted or junk emails • Right and wrong behavior online • A secret code to access accounts • Using a fake name or identity online • A person who breaks into computer systems • A team that handles internet crime in India • A harmful program that can damage your computer • A fake message trying to steal your personal info • ...
Attack and Risk Vectors 2023-08-17
Across
- like pretending to be a legitimate website
- harmful software
- or holding a PC or operation station hostage
- a cybercriminal's path to breach a computer system or network
- tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
- send fake emails
- the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
7 Clues: send fake emails • harmful software • like pretending to be a legitimate website • or holding a PC or operation station hostage • a cybercriminal's path to breach a computer system or network • tricking people into revealing sensitive information, often through deceptive emails or fake websites? • ...
DavionMcquinn-Bulling crossword 2020-11-30
Across
- the type of bullying that is done online
- antentionally excluding someone from an online group
- repeatedly sending abusive, insulting, or unwanted messages
- the person stands and watches someone getting bullied?
- antentionally excluding someone from an online group
- the person that is getting made fun of?
Down
- repeated, intense harassment and denigration that includes threats or creates significant fear
- what is the d of ABC and d's of bulling
- the person who stands up to the bully?
- what is the a of the ABC and D' of bulling?
- Disclosing someone else’s secrets or embarrassing information online without their consent
- what is the c of the abc and d's of bulling
- the person that is being mean to someone?
13 Clues: the person who stands up to the bully? • what is the d of ABC and d's of bulling • the person that is getting made fun of? • the type of bullying that is done online • the person that is being mean to someone? • what is the a of the ABC and D' of bulling? • what is the c of the abc and d's of bulling • antentionally excluding someone from an online group • ...
SHOPPING 2025-10-30
Across
- – To pay at the "caja", whether in a mall or market.
- – The offers during special events like Hot Sale or Cyber Days.
- – The good deals (gangas) found by haggling at a market.
- – To see the stalls in a feria artesanal without buying.
- – High-end fashion from a boutique in Larcomar.
- – The inevitable line to pay at a busy supermarket like Tottus.
- – Family-run "bodega" or "feria" stall, contrasting with the mega-plaza.
- – "Descuentos" advertised during the "Liquidación" sales.
Down
- – Familiar retail names like Ripley or Saga Falabella found in every mall.
- – To have enough money to buy something.
- – Shoppers hunting for the best prices in a market.
- – Description for Gamarra market clothing or Polvos Azules electronics.
12 Clues: – To have enough money to buy something. • – High-end fashion from a boutique in Larcomar. • – Shoppers hunting for the best prices in a market. • – To pay at the "caja", whether in a mall or market. • – The good deals (gangas) found by haggling at a market. • – To see the stalls in a feria artesanal without buying. • ...
Cloud Computing _ BCS601_Crosswords 2025-07-02
Across
- / Highest security level suitable for sensitive data
- / Popular service model offering software over the internet
- A key feature of cloud computing, "Pay only for what you ___
- Maximum level of risk or security
- Cloud model combining public and private infrastructure
Down
- Service model providing virtual machines, storage, and networks.
- / Term for computing resources provided over the internet
- / The ability to automatically adjust computing resources
- Cloud deployment model combining public and private clouds
- A level of resource utilization with minimal computing requirements
10 Clues: Maximum level of risk or security • / Highest security level suitable for sensitive data • Cloud model combining public and private infrastructure • / Term for computing resources provided over the internet • / The ability to automatically adjust computing resources • Cloud deployment model combining public and private clouds • ...
Quest for the Best 2013-03-08
Across
- deluge of H2O
- level of exposure to peril
- casualty
- area suseptible to be inundated with water
- security
- unforeseen occurance
- bring back/make new
- refreshing aquatic
- distructive funnel
- searing inferno
- Notoriously Fabulous Irreplaceable Protection
Down
- adequate insurance
- multiline insurance company
- comfortable abode
- positive funding incentive
- cataclysmic misfortune
- defend from harm
- sheild of coverage
- safegaurding advocate
19 Clues: casualty • security • deluge of H2O • searing inferno • defend from harm • comfortable abode • adequate insurance • sheild of coverage • refreshing aquatic • distructive funnel • bring back/make new • unforeseen occurance • safegaurding advocate • cataclysmic misfortune • positive funding incentive • level of exposure to peril • multiline insurance company • ...
Cashless society 2024-09-03
Across
- internet
- payment
- with cashless
- goods for sale
- its own advantages and weakness
- digital
- digital
- rates are lower
- transactions
- make life easier
Down
- big sums
- money cost more
- are conducted without the usage of cash
- used for electronic transactions
- the usage of cash
- makes people high value
- can easily withdraw
- cash safely
- divices or codes for security
- to do
20 Clues: to do • payment • digital • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • the usage of cash • can easily withdraw • makes people high value • divices or codes for security • its own advantages and weakness • used for electronic transactions • are conducted without the usage of cash
February Safety Meeting 2026-02-25
Across
- Plant Location Twisted Ankle
- Eye Protection
- Golden Rule Working at
- Golden Rule Working with
- Breach of a
- Hearing Protection
- Flame Resistant
- Head Protection
- Golden Rule Working in
- Potential Source of Harm
- Foot Protection
Down
- Hand Protection
- Plant Location Pinched Finger
- Golden Rule Traffic
- 6 Designated
- Golden Rule Working on
- Our Plant Location
- Golden Rule Working with
- Together We Learn Module
- Work
20 Clues: Work • Breach of a • 6 Designated • Eye Protection • Hand Protection • Flame Resistant • Head Protection • Foot Protection • Our Plant Location • Hearing Protection • Golden Rule Traffic • Golden Rule Working at • Golden Rule Working on • Golden Rule Working in • Golden Rule Working with • Golden Rule Working with • Together We Learn Module • Potential Source of Harm • Plant Location Twisted Ankle • ...
Cold War Vocab Terms 2025-02-12
Across
- Act of secretly undermining something in an attempt to destroy it.
- The demilitarized zone between North and South Korea.
- Truman's extension of the New Deal that increased minimum wage, expanded Social Security, and constructed low-income housing.
- A United Nations agency created to assist developing nations by loans guaranteed by member governments.
- Law passed in 1944 to help returning veterans buy homes and pay for higher educations.
- US security policy during the Cold War in which military action was used to stop the spread of communism.
- An alliance between the Soviet Union and other Eastern European nations.
- A specialized agency of the UN that is concerned with international public health.
- The idea that if a nation falls under communist control, nearby nations will also fall under communist control.
- President Truman's policy of providing economic and military aid to any country threatened by communism
Down
- An alliance made to defend one another if they were attacked by any other countries
- An international organization formed after WWII to promote international peace, security, and cooperation.
- A plan for aiding western European nations in economic recovery after World War II to stabilize and rebuild their countries and prevent the spread of communism.
- Nations favorable to the Soviet Union in Eastern Europe during the Cold War
- An official statement that a person is loyal to the U.S. government and does not seek its overthrow.
- Division of Germany after WWII into four regions
- Cold War competition between the U.S. and Soviet Union to build up their respective armed forces and weapons.
17 Clues: Division of Germany after WWII into four regions • The demilitarized zone between North and South Korea. • Act of secretly undermining something in an attempt to destroy it. • An alliance between the Soviet Union and other Eastern European nations. • Nations favorable to the Soviet Union in Eastern Europe during the Cold War • ...
Cindy Lou 2024-05-28
The Bad Guys Chapters 1-4 2022-02-03
17 Clues: easy • silly • unsafe • to save • rubbing • bad guys • pleasing • suggestion • to rush in • protection • to get into • cannot be done • to give up something • to break into a computer • very hard to get in or out • to break into a conversation • something you are sure will happen
slums 2022-12-06
17 Clues: sickness • poor area • small shack • what you eat • public health • up to no good • little people • plan of action • extremely poor • extreme hunger • law enforcement • dangerous people • feeling of trust • main area in a state • lack of proper nutrition • dirty or unpleasant state • maintains peace and security
Airport Vocabulary 2025-05-05
Across
- bin das Gepäckfach
- control die Passkontrolle
- number die Flugnummer
- check die Sicherheitskontrolle
- der/die Pilot(in)
- claim die Gepäckausgabe
- das Terminal
- pass die Bordkarte
- die Verspätung
- die Start- und Landebahn
Down
- der Zoll
- attendant der/die Flugbegleiter(in)
- seat der Fensterplatz
- der Sicherheitsgurt
- der Flugausfall
- der Abflug
- der Flugsteig
- die Ankunft
18 Clues: der Zoll • der Abflug • die Ankunft • das Terminal • der Flugsteig • die Verspätung • der Flugausfall • der/die Pilot(in) • bin das Gepäckfach • pass die Bordkarte • der Sicherheitsgurt • seat der Fensterplatz • number die Flugnummer • claim die Gepäckausgabe • die Start- und Landebahn • control die Passkontrolle • check die Sicherheitskontrolle • attendant der/die Flugbegleiter(in)
Financial Security Crossword 2021-04-29
Across
- a set code only the creator can understand
- they type of identification you should use
- a location from a picture
- be care when doing this
- something you shouldn't tell everyone that listens
Down
- what should be done to old accounts
- a data center meant only for you
- never save this to the cloud
- how you should never send any personal information
- ways that scammers try to gain personal information
10 Clues: be care when doing this • a location from a picture • never save this to the cloud • a data center meant only for you • what should be done to old accounts • a set code only the creator can understand • they type of identification you should use • how you should never send any personal information • something you shouldn't tell everyone that listens • ...
Online shopping security 2021-06-14
Across
- Usually contains borrowed funds(6,4)
- Secure & ------- online shopping site
- Personal information that has been impersonated
- Can be used when connecting to public WIFI(1,1,1)
- Authentication best practice(3,6)
- Fake sales of fake items
- Taken without permission
Down
- Infectious and malicious link
- Email account and password
- Generates, stores complex passwords
10 Clues: Fake sales of fake items • Taken without permission • Email account and password • Infectious and malicious link • Authentication best practice(3,6) • Generates, stores complex passwords • Usually contains borrowed funds(6,4) • Secure & ------- online shopping site • Personal information that has been impersonated • Can be used when connecting to public WIFI(1,1,1)
fnaf security breach 2022-03-29
Across
- please take a map!
- has green hair and pronouns
- a bear who tries to help gregory
- a human who has a simillar name to the rabbit tries to find gregory
- someone who tries to keep the lights on in the daycare
- strong and fast
Down
- really annoying bots
- a dirty pervert at night
- a female white rabbit
- trash eating addicted
10 Clues: strong and fast • please take a map! • really annoying bots • a female white rabbit • trash eating addicted • a dirty pervert at night • has green hair and pronouns • a bear who tries to help gregory • someone who tries to keep the lights on in the daycare • a human who has a simillar name to the rabbit tries to find gregory
Information Security Crossword 2017-01-16
Across
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- A type of malware that is often disguised as legitimate software.
- A probability of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal weakness.
- The need to ensure that information is disclosed only to those who are authorized to view it.
- A network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Down
- A possible danger that might exploit a flaw or weakness to breach security and therefore cause possible harm.
- A flaw or weakness that can be used to attack a system or organization.
- A secret series of characters used to authenticate a person’s identity.
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A person who uses computers to gain unauthorized access to computer systems and networks.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • A person who uses computers to gain unauthorized access to computer systems and networks. • ...
Social Security Crossword 2017-03-31
Across
- Income that is not taxed
- A number given to you so that the government can track your earnings throughout your life
- Cost of Living Allowance, Annual increase to offset inflation
- Form completed when you begin to work for a company so that they take out the correct deductions
- Federal Insurance Contribution Act, the primary method of financing the Social Security program paid through payroll deductions
Down
- Money paid by the government to people who are retired, disabled or to the dependents of those that have died.
- Given at the end of the year stating the amount of money earned and taxes paid for that year
- Health insurance for people who are retired or disabled
- Investment fund managed on behalf of someone
- Known as the Employment Eligibility Verification Form to make sure that someone is eligible for employment
10 Clues: Income that is not taxed • Investment fund managed on behalf of someone • Health insurance for people who are retired or disabled • Cost of Living Allowance, Annual increase to offset inflation • A number given to you so that the government can track your earnings throughout your life • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A software that is designed to detect and destroy compute viruses.
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- A piece of digital information generated by a web server and saved in your computer after visiting a website
Down
- A network using which things can communicate with each other using internet as means of communication between them.
- An attempt by hackers to damage or destroy a computer network or system.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
security awareness CW1 2023-03-29
Across
- Sourav created a password for his online banking account using only lowercase letters. However, his account was compromised, and someone had transferred all his money to another account. Later, Sourav found out that the attacker had used a brute force attack to crack his weak password. What could Sourav have done to make her password stronger and more secure?
- "Aradhna received a call from someone claiming to be from the IRS, informing her that she owed back taxes and needed to make an immediate payment. The person instructed Jessica to transfer the money to a specific account to avoid legal action. Aradhna complied and transferred the funds as instructed. However, later Aradhna discovered that the call was a ______, and she had lost her money.
- The CFO of a large organization received an urgent email from the CEO, asking her to transfer a large sum of money to an external account as soon as possible. The email contained the CEO's email signature and appeared to be legitimate. The email also emphasized the urgency of the transfer and warned the CFO not to disclose the request to anyone else in the organization. Without verifying the authenticity of the email, the CFO proceeded to transfer the funds to the external account. What type of attack did the CFO fall victim to?
- Pankaj created a password for his online banking account, which was easy to remember, but also easy to guess. One day, Pankaj discovered that someone had gained access to his account and made unauthorized transactions. Later, Pankaj found out that the attacker had used a _____ attack to crack his weak password. What type of attack is this likely to be?
Down
- Navdeep received an email from someone claiming to be a representative from his company's IT department. The email stated that there was a critical security update that Navdeep needed to install immediately, and it contained a link to a website. Navdeep clicked on the link and followed the instructions, but after the update installed, all of his files became encrypted and he was asked to pay a ransom to regain access. What type of attack is this likely to be?
- Vikram received an email from his boss asking her to purchase some gift cards for a client as a thank-you gesture. The email instructed Vikram to purchase the gift cards immediately and email the card details to the client. Vikram quickly purchased the gift cards and sent the details to the email address provided in the email. However, he later discovered that the email had not actually been sent by his boss, but rather by an impostor who had impersonated her boss's email address. What type of attack did Vikram fall victim to?
- "Yash received an email from a popular online retailer, offering her a discount on her next purchase. The email looked legitimate, and Yash was excited to save some money. The email instructed Yash to click on a link and enter her credit card information to claim the discount. However, when Yash clicked on the link and entered her information, he later discovered that the email was a _____ attempt, and his credit card information had been stolen. What type of attack is this likely to be?
- "Sid downloaded a free software program from a website, which promised to speed up his computer. However, after installing the software, John noticed that his computer was running slower and displaying strange pop-up messages. Later, Sid discovered that the software contained ______, which had infected his computer. What had infected Sid's computer?
- Rakesh received a text message from his bank stating that there had been some suspicious activity on his account and asking him to call the customer service number provided. When Rakesh called the number, he was asked to provide his account number and some personal information for verification. However, before he could provide this information, he was asked to enter a code that had been sent to his phone via text message. What security feature was the bank using to protect Rakesh's account?
- Ritish was browsing the internet on his personal computer when he noticed that he was seeing a lot of ads for the same product she had recently searched for on another website. He wondered how the ads knew what he had been searching for, and did some research. He found out that the website he had visited had used cookies to track his browsing history and then sold that information to advertising companies. Over here Ritish's ____ was compramised.
10 Clues: ...
SECURITY VERIFICATION CROSSWORD 2024-09-18
Across
- is the type of verification that shows verified when the call comes in
- When a person who is not the NI calls in and the policy is Individual. We must ask what their ___________ is to the insured
- is the type of verification that is used when someone comes through as verified, but they identify as a different individual when they talk to you
- When an Additional insured calls in and they are listed on the policy, an acceptable piece of information is if they verify their_________
- A business principle calls in and is verified and we know that they are an employee of the company. Then we ask them their ___________ position
- When a driver for a Corp/LLC calls, they are not allowed to add or do this for coverages
Down
- When the owner of a policy calls in to request loss runs, we consider this an ________ request
- LAST NAME We must ALWAYS verify the __________ & __________
- A maximum of __________ authorized users can be added to the policy
- The call comes in verified and is on a Corp/LLC Policy, the next thing we do is ask the caller is they are an __________ employee of the business
10 Clues: LAST NAME We must ALWAYS verify the __________ & __________ • A maximum of __________ authorized users can be added to the policy • is the type of verification that shows verified when the call comes in • When a driver for a Corp/LLC calls, they are not allowed to add or do this for coverages • ...
Information Security Essentials 2025-04-28
Across
- Tài sản quý giá cần được bảo vệ
- Chương trình phát hiện và loại bỏ phần mềm độc hại
- Quy tắc tổ chức về bảo mật thông tin
Down
- Bảo vệ thông tin khỏi truy cập trái phép
- Mật khẩu khó đoán
- Thông tin luôn có thể truy cập khi cần
- Ứng dụng lưu trữ mật khẩu an toàn
- Đảm bảo thông tin không bị thay đổi trái phép
- Lừa đảo để đánh cắp dữ liệu qua email/SMS/điện thoại
- Hành động khi phát hiện hoạt động đáng ngờ
10 Clues: Mật khẩu khó đoán • Tài sản quý giá cần được bảo vệ • Ứng dụng lưu trữ mật khẩu an toàn • Quy tắc tổ chức về bảo mật thông tin • Thông tin luôn có thể truy cập khi cần • Bảo vệ thông tin khỏi truy cập trái phép • Hành động khi phát hiện hoạt động đáng ngờ • Đảm bảo thông tin không bị thay đổi trái phép • Chương trình phát hiện và loại bỏ phần mềm độc hại • ...
WORKPLACE SAFETY/SECURITY 2025-01-13
Across
- Secure portable ____ when unattended.
- Keep your desk ____ of valuable items at the end of the day.
- Do not ____ open doors that should remain secured.
- Do not leave purses or ____ in plain view.
- Trust your ____ when feeling threatened.
Down
- Theft is often a crime of _____.
- Acknowledge unauthorized individuals and offer ____.
- Report anything ____ or unusual.
- Be __ and aware of your surroundings.
- ___ 911 in case of imminent danger.
10 Clues: Theft is often a crime of _____. • Report anything ____ or unusual. • ___ 911 in case of imminent danger. • Secure portable ____ when unattended. • Be __ and aware of your surroundings. • Trust your ____ when feeling threatened. • Do not leave purses or ____ in plain view. • Do not ____ open doors that should remain secured. • ...
Industrial Security Concepts 2025-09-23
Across
- bigger that safe but smaller than a file room
- Faith in oneself and his abilities.
- An indication of impending danger or harm.
- a metallic container used for the safekeeping of document or small items in an office or installation.
- ability to deal with others successfully without offending
- Sound and good judgment to arrive a wise and timely decision.
Down
- Inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury.
- Being watchful in spotting violator, a person, a vehicle or an incident.
- A chance of being injured or harmed.
- Probability of an event to happen that will lead to loss
10 Clues: Faith in oneself and his abilities. • A chance of being injured or harmed. • An indication of impending danger or harm. • bigger that safe but smaller than a file room • Probability of an event to happen that will lead to loss • ability to deal with others successfully without offending • Sound and good judgment to arrive a wise and timely decision. • ...
Health and security 2025-12-08
Across
- physical harm to a person
- emergency help given before going to hospital
- protective equipment like gloves or goggles
- hard protection worn on the head
Down
- small accident when you lose your balance
- chance that something bad may happen
- emergency with flames and smoke
- accident from working at height
- potential source of harm at work
- safe way out of a building
10 Clues: physical harm to a person • safe way out of a building • emergency with flames and smoke • accident from working at height • hard protection worn on the head • potential source of harm at work • chance that something bad may happen • small accident when you lose your balance • protective equipment like gloves or goggles • emergency help given before going to hospital
Information Security Challenge 2025-12-02
Across
- A type of cyberattack where multiple systems flood a target with traffic, causing service disruption.
- A formal review of systems and processes to ensure security and compliance.
- The possibility of loss, damage, or any negative outcome resulting from a threat exploiting a vulnerability.
- A sneaky way to steal information by watching someone type their password.
- Manipulating people into giving up confidential information.
Down
- Protecting data and systems hosted on remote servers.
- A type of malicious software that can replicate and spread.
- Procedure for documenting and notifying security breaches.
- An individual who uses technical skills to gain unauthorized access to systems or data
- Software designed to detect and remove malicious programs.
10 Clues: Protecting data and systems hosted on remote servers. • Procedure for documenting and notifying security breaches. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • ...
Cell Organelle 2022-09-13
2024 Compliance & Ethics 2023-11-06
Across
- Items or services given to healthcare providers as incentives
- Intentional and improper practices that harm patients or defraud the healthcare system
- Moral principles and values governing healthcare practices
- Informing authorities or superiors about unethical or illegal actions
- An illegal payment or reward for patient referrals
- Adherence to legal and ethical standards in healthcare
Down
- The federal agency responsible for investigating healthcare fraud and abuse
- Protecting patient data from unauthorized access or breaches
- A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
- The unnecessary or excessive use of healthcare resources
- A recommendation of a patient to another healthcare provider
- Federal law that protects the privacy and security of patients' health information
- Maintaining the confidentiality of patient information
- Deceptive and illegal activity in healthcare billing or services
14 Clues: An illegal payment or reward for patient referrals • Maintaining the confidentiality of patient information • Adherence to legal and ethical standards in healthcare • The unnecessary or excessive use of healthcare resources • Moral principles and values governing healthcare practices • Protecting patient data from unauthorized access or breaches • ...
How well do you know MUN. 2017-11-26
Across
- These are used if you believe there was a mistake made in the rules of procedure.
- A change to a draft resolution that is on the floor.
- At the very beginning, it was called ...
- A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
- What is the oldest Polish MUN?
Down
- A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
- A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
- The head of the MUN.
- An organization of independent states formed in 1945 to promote international peace and security.
- Refers to the UN Security Council's five permanent members.
10 Clues: The head of the MUN. • What is the oldest Polish MUN? • At the very beginning, it was called ... • A change to a draft resolution that is on the floor. • Refers to the UN Security Council's five permanent members. • These are used if you believe there was a mistake made in the rules of procedure. • ...
The Presidential Cabinet 2022-02-10
Across
- An advisory body made up of the heads of the 15 executive departments.
- A branch of the Department of Homeland Security responsible for providing protection to the president.
- This department assists with and enforces international trade agreements.
- This department works to advance the national, economic, and energy security of the United States.
- _______-in-Chief An officer in supreme command of a country's armed forces.
Down
- This department's job is to provide the military forces needed to deter war and to protect the country's security.
- This department develops and executes policy on farming, agriculture, and food.
- Appointed by the President with the advice and consent of the Senate, is the President's chief foreign affairs adviser.
- This person is ready at a moment's notice to assume the presidency if the president is unable to perform his/her duties.
- This department oversees federal programs for ensuring a strong American workforce.
10 Clues: An advisory body made up of the heads of the 15 executive departments. • This department assists with and enforces international trade agreements. • _______-in-Chief An officer in supreme command of a country's armed forces. • This department develops and executes policy on farming, agriculture, and food. • ...
STEM Careers Part 1 2025-05-01
Across
- Diagnoses, treats, and prevents diseases and injuries in animals, providing medical care and advice to animal owners.
- An advanced practice registered nurse specializing in the administration of anesthesia and the management of patients before, during, and after surgical procedures and other medical interventions.
- Studies the relationships between living organisms and their environment, focusing on how changes to the environment impact populations, species, and ecosystems.
- Protects an organization's data and information systems by managing security software, educating personnel on cybersecurity best practices, and responding to security incidents.
- Designs, develops, and improves mechanical devices, systems, and processes.
Down
- Investigates and analyzes digital evidence related to cybercrimes and security incidents.
- Responsible for writing, testing, and maintaining computer code to create software applications.
- Ensures that products and materials meet specified quality standards at various stages of production.
- Provides comprehensive patient care, including diagnosis, treatment, and management of various health conditions.
- Analyzes, experiments with, and creates chemical compounds, often working in laboratory settings.
10 Clues: Designs, develops, and improves mechanical devices, systems, and processes. • Investigates and analyzes digital evidence related to cybercrimes and security incidents. • Responsible for writing, testing, and maintaining computer code to create software applications. • ...
The privacy Act 1993 2017-09-04
Across
- This principle is about telling a person when you're collecting their information.
- The purpose of the act is to focus on the what?
- Information should not be _________ to another party.
- Principle 5 is to do with the what and security?
- How many principles?
Down
- Principle 5 is to do with storage and what?
- The act is relevant to what type of information?
- If the information is _________ it needs to be corrected.
- Principle 2, information must be what from the individual?
- What is this Act of 1993?
- The principle in which you should not use information gathered for one purpose for another.
11 Clues: How many principles? • What is this Act of 1993? • Principle 5 is to do with storage and what? • The purpose of the act is to focus on the what? • The act is relevant to what type of information? • Principle 5 is to do with the what and security? • Information should not be _________ to another party. • If the information is _________ it needs to be corrected. • ...
Employment 2022-02-10
Across
- workers are employed by others
- sector does not provide social security benefits
- unemployment situation is also known as hidden unemployment
- is a situation when a person actively searches for a job and is unable to find work
- unemployment is the substitution of manpower with technology
- scheme implemented by Khadi and Village Industries Commission
- workers are self employed
Down
- unemployment does not ensure job security
- sector is also called organized sector
- is an activity which enables a person to earn
- unemployment is a situation when educated people do not get jobs according to their educational standard
11 Clues: workers are self employed • workers are employed by others • sector is also called organized sector • unemployment does not ensure job security • is an activity which enables a person to earn • sector does not provide social security benefits • unemployment situation is also known as hidden unemployment • unemployment is the substitution of manpower with technology • ...
Word Within a Word list 32 2015-01-21
15 Clues: sociable • make soft • go against • unorthodox • second self • thought to be • heated dispute • flowing together • speech to oneself • affirm or declare • pledge as security • talking in circles • cold-blooded composure • male head of the family • force of a million tons of dynamite
PHILIPPINE LABOR LAWS AND CODE 2024-10-03
14 Clues: Laws • Leave • Leave • Hours • Leave • Leave • Rights • Wage Law • Contracts • of Employment • Days and Holidays • non-working days. • Safety and Health. • Security and Benefits.
Black Inventors 2023-07-05
11 Clues: Elevator • The real • Caller ID • Hair care • Light bulb • Potato Chip • Super Soaker • Traffic light • Peanut butter • Ironing board • Home security camera
spelling week 4 2025-02-17
11 Clues: many • answer • no war • is low • distant • security • stops evil • something gross • stop deadly animals • you eat for breakfast • something Australia tolerates
The Executive Branch of Russian Federation 2024-05-18
8 Clues: Main function of FSS • The past name of FSS • The most famous KGB agent • Head of the Government of Russia • Head of the Federal security service • Head of the Ministry of Foreign Affairs • The nearest metro station to Ministry of Foreign Affairs • Who ruled the country, when the building of MFA was built
DFR 5-2-2 À l'aéroport et À la gare 2024-03-07
Across
- Lockers
- The exit
- Ticket puncher
- The waiting room
- The train platform
- A customs officer
- Steward (male)
- The ticket window
- The ticket counter
- The security station
Down
- A train car
- The pilot
- The message board (with times for arrival and departures)
- The baggage claim
- A train
- Stewardess (female)
- Arrivals and departures
- The door / exit
18 Clues: Lockers • A train • The exit • The pilot • A train car • Ticket puncher • Steward (male) • The door / exit • The waiting room • The baggage claim • A customs officer • The ticket window • The train platform • The ticket counter • Stewardess (female) • The security station • Arrivals and departures • The message board (with times for arrival and departures)
We are not afraid ... If we can all be together 2022-08-24
15 Clues: huge • rough • burst • stopped • improving • improving • come across • tackle–deal • caught firmly • a sea journey • a nautical mile • travelling by sea • making sharp noise • back part of the ship • the horizontal pieces of iron or wood for security.
Spanish Travel Vocabulary 2022-11-16
Across
- To call someone (by phone)
- Gate
- Airport
- Departures
- Ticket
- Passenger
- To pack a suitcase
- To travel
- Travel Agency
- To board
- To go through security
Down
- To go through customs
- Monitor; Screen
- Baggage Claim
- To get in line
- Identification
- Flight
- Luggage
- Suitcase
- To take a taxi
- Passport
- To take a trip
- Train Station
- Itinerary
- Arrivals
25 Clues: Gate • Flight • Ticket • Luggage • Airport • Suitcase • Passport • Arrivals • To board • Passenger • Itinerary • To travel • Departures • Baggage Claim • Train Station • Travel Agency • To get in line • Identification • To take a taxi • To take a trip • Monitor; Screen • To pack a suitcase • To go through customs • To go through security • To call someone (by phone)
Book Titles 2020-07-02
Across
- ? of the Ring
- Vicky ?
- ? Eyre
- Artemis Fowl and the ? incident
- The diary of a ? kid
- Run, Zan, ?
- Harry Potter and the goblet of ?
- Charlie and the ? glass elevator
- The ? in our stars
- The ? broccoli boy
- Attack of the giant ? chickens
- Anne of ? Gables
- ? Blanc
Down
- ? house
- Maximum ?
- Treasure ?
- Private ?
- Catching ?
- Skulduggery ?
- Time travelling with a ?
- The ?, the witch, and the wardrobe
- Maze ?
22 Clues: ? Eyre • Maze ? • ? house • Vicky ? • ? Blanc • Maximum ? • Private ? • Treasure ? • Catching ? • Run, Zan, ? • ? of the Ring • Skulduggery ? • Anne of ? Gables • The ? in our stars • The ? broccoli boy • The diary of a ? kid • Time travelling with a ? • Attack of the giant ? chickens • Artemis Fowl and the ? incident • Harry Potter and the goblet of ? • Charlie and the ? glass elevator • ...
HEADLIGHT 5, unit 1, page 212 + 213 text part 2 2019-09-04
Across
- unbefestigte Straße
- umkehren
- Landschaft
- Sicherheit
- irre, wahnsinnig
- Notizen machen
- voraus, vorausliegend
- Eindruck
- Raum, Fläche
- Distanz, Entfernung
- behutsam, leicht
- Summen
- (kurzer) Blick
Down
- Reiseveranstalter
- Hütte
- abholen
- in Gang kommen
- sich wohl / entspannt fühlen
- winzig
- fürchten
- etwas wicht nehmen
- Reaktion, Antwort
- Sicherheitsgurt
- Gerät, Apparat
- Wild
25 Clues: Wild • Hütte • winzig • Summen • abholen • umkehren • fürchten • Eindruck • Landschaft • Sicherheit • Raum, Fläche • in Gang kommen • Notizen machen • Gerät, Apparat • (kurzer) Blick • Sicherheitsgurt • irre, wahnsinnig • behutsam, leicht • Reiseveranstalter • Reaktion, Antwort • etwas wicht nehmen • unbefestigte Straße • Distanz, Entfernung • voraus, vorausliegend • sich wohl / entspannt fühlen
VOCABULARY REVIEW - 6C 2021-08-04
Across
- COMPOTAMIENTO
- SEGURIDAD
- COMPORTAMIENTO
- ESTEREOTIPOS
- CARACTERISTICAS DE LA PERSONALIDAD
- EXPECTATIVAS
- MOTIVACION
- CORAJE
- AUTOIMAGEN
- HABILIDADES
- SALUDABLE
- COMPETENCIA
- ADOLESCENCIA
- DOMINANTE
- RELACIONES
- PSICOLOGIA
- AUTORESPETO
Down
- AUTOCONFIANZA
- PREDECIBLE
- PACIENTE
- ESPECTADORES
- PERTENENCIA
- INCONMOVIBLE
- ANOREXIA
- PODEROSO
- PERSONAJES
- CONTRAPARTE
- CLASE MEDIA
- DESORDENES ALIMENTARIOS
- DESPREOCUPADO
- SENTIMIENTO
- AVENTURERO
- AUTOESTIMA
33 Clues: CORAJE • PACIENTE • ANOREXIA • PODEROSO • SEGURIDAD • SALUDABLE • DOMINANTE • PREDECIBLE • MOTIVACION • AUTOIMAGEN • PERSONAJES • AVENTURERO • AUTOESTIMA • RELACIONES • PSICOLOGIA • PERTENENCIA • HABILIDADES • CONTRAPARTE • CLASE MEDIA • SENTIMIENTO • COMPETENCIA • AUTORESPETO • ESPECTADORES • INCONMOVIBLE • ESTEREOTIPOS • EXPECTATIVAS • ADOLESCENCIA • AUTOCONFIANZA • COMPOTAMIENTO • DESPREOCUPADO • COMPORTAMIENTO • DESORDENES ALIMENTARIOS • ...
Die verrückte Currywurst 2023-01-19
23 Clues: wide • useful • longer • nervous • company • airport • muscular • the same • surprised • to hurry up • electrician • to practice • to save money • business woman • security check • buisness people • not yet dressed • to show someone • exchange student • to get ready for • to wave at someone • to notice something • geben - to let someone know
