cyber security Crossword Puzzles
SAW 2022 2022-01-14
Across
- Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
- The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information
- Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
- A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
- Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
- an attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
- Converting information from one form to another to hide its content and prevent unauthorized access.
- Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
- An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
- This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
- A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
- indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
- Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
- Applies to information or assets that, if compromised, could cause serious injury to the national interest.
- Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
- Training that provides an overview of the directives and best practices related to security. Contains 10 modules.
- Malicious software designed to infiltrate and damage computers without the user’s consent.
17 Clues: Malicious software designed to infiltrate and damage computers without the user’s consent. • An inadequacy related to security that could increase susceptibility to compromise or injury. • Converting information from one form to another to hide its content and prevent unauthorized access. • ...
HOLES 2025-02-21
12 Clues: stop • scared • given to • very happy • felt better • turned around • security guard • with no reason • did nothing wrong • hair was taken off • say who someone is • the sun burned the skin
9th M3 L4 Crossword Puzzle 2024-01-28
12 Clues: rare • valuable • preserve • security • to impose • killing animals • Noun: stop existing • Adjective of "Globe" • Adjective "Environment" • s.o. who breaks the law • class of animals/plants • the natural place where animals live
CYBER INTIMIDATION 2013-09-30
Across
- - quand vous obtenez tu devrais _ _ _ _ _ _ leur
- - quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
- - peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms
- - beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu
Down
- - dire un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation
- - il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
6 Clues: - quand vous obtenez tu devrais _ _ _ _ _ _ leur • - peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms • - beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu • - quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs. • - dire un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation • ...
s22 2024-08-04
Across
- The ability to prepare for, respond to, and recover from cyber incidents
- An ethical hacker who uses their skills for good
Down
- A hacker who falls between ethical and malicious hacking
- A hacker with malicious intent
- The process of identifying and analyzing potential risks
- Redirecting a website's traffic to a fraudulent site
6 Clues: A hacker with malicious intent • An ethical hacker who uses their skills for good • Redirecting a website's traffic to a fraudulent site • A hacker who falls between ethical and malicious hacking • The process of identifying and analyzing potential risks • The ability to prepare for, respond to, and recover from cyber incidents
156 2023-07-27
Across
- Measures taken to protect against unauthorized access, theft, or damage.
- Watching videos or listening to music online without downloading.
- Harmful software that can infect and damage computer files and programs.
- Storing data and files online to access them from any device with an internet connection.
- Software that securely stores and manages passwords for various accounts.
- Security system that controls and filters network traffic to protect against threats.
- Creating a copy of data to restore in case of loss or damage.
Down
- Biometric authentication using facial recognition.
- Unwanted and unsolicited emails, often sent in bulk.
- Biometric authentication using fingerprint recognition.
- Regular payment for access to a service or content.
- Installing the latest version of software to get new features and fixes.
- Software intended to harm or exploit devices, data, or networks.
- Improving a device or software to a better or newer version.
- Protection of personal information from being accessed or shared without consent.
15 Clues: Biometric authentication using facial recognition. • Regular payment for access to a service or content. • Unwanted and unsolicited emails, often sent in bulk. • Biometric authentication using fingerprint recognition. • Improving a device or software to a better or newer version. • Creating a copy of data to restore in case of loss or damage. • ...
PRINT 2025-01-23
Across
- – The physical components of a computer system.
- – Information processed or stored by a computer.
- – The maximum data transfer rate of a network or internet connection.
- – A wireless technology for connecting devices to the internet.
- – A type of malware that can replicate and spread to other computers.
- – The address of a web page on the World Wide Web.
- – A set of rules for transmitting data across a network.
- – Software designed to damage or disrupt a computer system.
Down
- – The process of converting data into a coded form for security.
- – A group of interconnected computers and devices sharing resources.
- – Programs and operating systems used by a computer.
- – A high-speed storage layer for frequently accessed data.
- – A security system that monitors and controls incoming and outgoing network traffic.
- – A set of instructions for solving a problem or performing a task.
- – The global network that connects millions of private, public, and academic systems.
15 Clues: – The physical components of a computer system. • – Information processed or stored by a computer. • – The address of a web page on the World Wide Web. • – Programs and operating systems used by a computer. • – A set of rules for transmitting data across a network. • – A high-speed storage layer for frequently accessed data. • ...
Cybersecurity & Web Exploitation Crossword 2022-11-16
Across
- CSRF attacks use the ___ of other users without their knowledge.
- "Access control" is ensuring users cannot act outside of intended ___.
- You access web applications with this.
- As the ___ of web apps increase, the possibility of vulnerabilities also increase.
- When a malicious actor hijacks clicks meant for a visible top-level site.
- For security reasons, by default, web apps should not ___ data from the browser.
- The OSI model has ___ layers.
Down
- Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
- In cybersecurity, blue teams do this.
- Acronym for the organization set up to improve software security in 2001.
- SQL injection attacks can give ___ to data users typically can't retrieve.
- What does the "I" in OSI stand for?
- In cybersecurity, red teams do this.
- ___ hat hackers hack unethically, for personal gain.
- ___ sanitization is the modification of user data so that it can't run scripts.
15 Clues: The OSI model has ___ layers. • What does the "I" in OSI stand for? • In cybersecurity, red teams do this. • In cybersecurity, blue teams do this. • You access web applications with this. • ___ hat hackers hack unethically, for personal gain. • CSRF attacks use the ___ of other users without their knowledge. • ...
Compiling Crosswords 2018-02-05
Across
- In this department you have to manage customer relationships
- It offers financial security in case of damage
- One of the most important machine in the office
- The main task of this department is to produce goods
- A small container that you keep your documents in
- If you use a computer you need it as a display
Down
- This Departement ships the goods to the customer
- Systematic search for new insights
- One of the tasks of this Departement is to negotiate with suppliers
- The amount by which the value of a device is reduced over time
- Raising funds while offering your property as a security deposit
- This machine is used to communicate
12 Clues: Systematic search for new insights • This machine is used to communicate • It offers financial security in case of damage • If you use a computer you need it as a display • One of the most important machine in the office • This Departement ships the goods to the customer • A small container that you keep your documents in • ...
Puzzle title 2024-09-11
Across
- a popular digital payment tool on smartphones
- code a secret code used for digital transaction security
- secret code used for digital transaction security
- same do cash and digital money have the same function?
- whether cash and digital money have the same function
- if there is no signal whether the digital transaction process will run
- an institution that supervises and regulates non-cash transactions in a country.
- surveillance cameras inside and outside, how banks protect their branches from physical robbery according to this text
Down
- What is the negative impact of cash in the field of crime
- the transaction use a QR code?
- What are the advantages of digital money
- Benefits of digital money in making transactions
12 Clues: the transaction use a QR code? • What are the advantages of digital money • a popular digital payment tool on smartphones • Benefits of digital money in making transactions • secret code used for digital transaction security • whether cash and digital money have the same function • same do cash and digital money have the same function? • ...
Computer Threats 2025-10-21
Across
- Core topic Weakness that threats can exploit
- Core topic Possible danger that may damage data
- Main focus of your lesson Protecting data and systems from harm
- From CIA Triad (Lesson 3 link) Ensuring information is kept private
Down
- From CIA Triad (Lesson 3 link) Keeping data accurate and unchanged
- Example of a computer threat Harmful software that damages systems
- Security defense Blocks unauthorized network access
- Example of user protection Secret code that secures access
- From CIA Triad (Lesson 3 link) Ensuring data is always accessible
- Example of an attack Fake message designed to steal data
- Common threat actor A person who breaks into systems
- Target of most threats Information stored or processed in computers
12 Clues: Core topic Weakness that threats can exploit • Core topic Possible danger that may damage data • Security defense Blocks unauthorized network access • Common threat actor A person who breaks into systems • Example of an attack Fake message designed to steal data • Example of user protection Secret code that secures access • ...
Cyber ethics 10 2025-05-23
5 Clues: bullying is also called ____. • "do not harm" rule in cyber ethics. • others’ opinions in online discussions. • messages to trick people into giving info. • before sharing someone’s photo is showing ____.
Cyber ethics 10 2025-05-23
5 Clues: bullying is also called ____. • "do not harm" rule in cyber ethics. • others’ opinions in online discussions. • messages to trick people into giving info. • before sharing someone’s photo is showing ____.
NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28
Across
- _________ topology is connected in circular path .
- ______ refers to unwanted bulk email .
- A digital footprint is also known as .
- Each computer in a network is called a .
- ________ spam filtering / blocking software .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- A computer ___________ can be as a group of computers .
Down
- ___________ refers to criminal activities .
- _____________ refers to an illegal intrusion into a computer system or network .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A network maintained without using wires is called a ___________ network .
- What is the short form of Local Area Network ?
- A ________ is a device that connects two different types of networks with each other .
- To _________ plagiarism , one can rephrase the material .
- A __________ similar to a hub .
- _____ is a network created for an individual person .
- What is the short form of Information and communication technology ?
18 Clues: A __________ similar to a hub . • ______ refers to unwanted bulk email . • A digital footprint is also known as . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
Finacial Literacy Terms 1-34 2015-01-30
Across
- / Letters that identify a stock traded on a stock exchange.
- / A sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
- / The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
- / Reducing non-systematic risk by investing in a variety of assets.
- / A printed document that advertises or describes a school, commercial enterprise, forthcoming book, etc., in order to attract or inform clients, members, buyers, or investors.
- / A company stock that tends to increase in capital value rather than yield high income.
- / The monetary value of earnings per outstanding share of common stock for a company.
- / The current market price of a company share divided by the earnings per share of the company.
- / The amount for which something can be sold on a given market.
- / A place or system in which stocks, bonds, or other securities are bought and sold.
- / The rate of return earned in the course of one whole year, taking compounding into account, expressed as a percentage.
- / A stock that entitles the holder to a fixed dividend, whose payment takes priority over that of common-stock dividends.
- / A tradable financial asset of any kind.
- / a regulated professional individual, usually associated with a brokerage firm or broker-dealer, who buys and sells stocks and other securities for both retail and institutional clients, through a stock exchange or over the counter, in return for a fee or commission.
- / A type of security that signifies ownership in a corporation and represents a claim on part of the corporation's assets and earnings.
- / An order instructing a broker to buy or sell an asset immediately at the best prevailing price.
- / When stack prices are steadily decreasing over time.
- / A security traded in some context other than on a formal exchange.
Down
- / Income stock.
- / Shares entitling their holder to dividends that vary in amount and may even be missed, depending on the fortunes of the company.
- / A percentage which serves to measure the effectiveness of a synthetic procedure, is calculated by dividing the amount of the desired product obtained by the theoretical yield (the unit of measure for both must be the same).
- / An equity investment option offered directly from the underlying company.
- / A shareholder.
- / Is when a person buys outright a stock or a bond, primarily to obtain the dividend or interest paid on it, but also with the intention of selling should there be a material advance in the price of the security.
- / A comprehensive report on a company's activities throughout the preceding year.
- / Is the most common profitability ratio.
- / Income stocks.
- / The periodic and systematic purchase of a security regardless of the security price.
- / A measurement of the value of a section of the stock market.
- / When the stock prices are steadily increasing over time.
- / A corporate action in which a company divides its existing shares into multiple shares.
- / The value of a coin, stamp or paper money, as printed on the coin, stamp or bill itself by the minting authority.
- / The profit or loss you have on your investments
- / The chance of injury, damage, or economic loss.
34 Clues: / Income stock. • / A shareholder. • / Income stocks. • / Is the most common profitability ratio. • / A tradable financial asset of any kind. • / The chance of injury, damage, or economic loss. • / The profit or loss you have on your investments • / When stack prices are steadily decreasing over time. • / When the stock prices are steadily increasing over time. • ...
System software 2024-02-25
Across
- (2words)A feature that allows users to revert their computer's state to a previous point in time, restoring system settings and files to a known good state.
- (2words)Divides memory into non-contiguous segments, each representing a logical grouping of data.
- (2words)Involves allocating resources and facilitating the sharing and exchange of data among processes running on a computer.
- (2words)Tasks such as defining file naming conventions, performing file operations, maintaining directory structures, and managing access control.
- (2words)Manages a computer's main memory, including optimization, organization, and protection to ensure efficient and secure memory usage.
- Signals generated by hardware or software to request attention from the CPU, used for asynchronous events like hardware errors or user inputs.
- (2words)A memory management technique that extends a computer's physical memory by using disk space as an overflow area, improving system performance.
- (2words)Organization of files and folders on a storage device, maintained by file management systems.
- (2words)Determines allocation and deallocation of computer memory for running applications, including swapping data to and from the HDD or SSD.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, enhancing network security.
- (2words)Software that communicates with input and output devices, translating data and managing hardware resources.
- (2words)Process of restoring lost, deleted, corrupted, or inaccessible data from storage devices, ensuring data availability and integrity.
- (2words)Control and coordination of printing operations, including loading printer drivers, managing print queues, and handling error messages.
- (2words)Mechanisms implemented by the operating system to detect, report, and recover from errors or exceptional conditions, maintaining system stability.
- (2words)Splits memory into contiguous partitions and allocates partitions to applications, varying in size.
- Activity (2words)Simultaneous use of a computer system by multiple users, facilitated by user accounts, passwords, and access rights management.
- (2words)Ensures that competing applications cannot use the same memory locations simultaneously, preventing data loss, security issues, or system crashes.
- (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.
- (2words)Allocates all memory to a single application, used by systems like MS-DOS and embedded systems.
Down
- The process of loading and initializing the operating system kernel when a computer is powered on or restarted.
- (2words)Involves managing physical and virtual devices connected to the computer system, including installation, configuration, and maintenance.
- Ensuring consistency and coordination among processes or threads accessing shared resources, preventing conflicts and data corruption.
- A temporary storage area used in hardware management to manage input/output operations.
- A program running on a computer, managed by process management to allocate resources and synchronize data exchange.
- (2words)Involves managing input and output peripheral devices, including communication, translation, and prioritization.
- Permissions granted to users or processes, controlling access to system resources and ensuring data privacy.
- (2words)Determines how memory is allocated to applications, including single allocation, partitioned allocation, paged memory, and segmented memory.
- Software designed to detect, prevent, and remove malicious software, ensuring the security of the operating system.
- (2words)Software that manages computer hardware and provides services for computer programs.
- (2words)Ensures the integrity, confidentiality, and availability of data through measures like updates, antivirus software, firewalls, user privileges, and data recovery.
- A data structure used in process management to schedule resources and resolve software conflicts.
- (2words)Verifying the identity of users accessing the system, typically through methods like passwords, biometrics, or cryptographic keys.
32 Clues: (2words)Allocates fixed-size partitions of memory, used by virtual memory systems. • A temporary storage area used in hardware management to manage input/output operations. • (2words)Software that manages computer hardware and provides services for computer programs. • ...
Series 63 - Final Crossword 2024-05-06
Across
- the person who is going to pass tomorrow
- when a representative engages in private securities transactions without the knowledge or consent of his employer
- what you should remind yourself that you are tomorrow morning
- The official or agency in charge of following/enforcing the securities laws of a state
- must have: buy/sell, name of security, account number, order type, solicited or unsolicited
- refers to every contract to exchange securities, usually for cash
- must be filed when $10,000 or more is deposited
- transactions done solely to give the appearance of trading activity
- folks who are not dead, minors, or people who have been declared mentally incompetent.
- deposit of cash, securities or insurance to ensure protection of their consumers in the event of malpractice, theft or fraud
- legal document that must be given to every investor who purchases registered securities in a primary offering
- Although exempt securities and securities sold in exempt transactions are exempt from the registration and advertising filing requirements of the Uniform Securities Act, no security or person is exempt from the ________ rules.
- If an agent represents a broker/dealer, they must always ________, no matter what they sell.
- what you should feel about yourself for making it this far
- Any material designed for use by newspapers, magazines, radio, television, telephone recording or any other public medium to solicit business.
- act of reaching out to entice a client to buy or sell something
- placing an order for own account ahead of placing customers order
- any person who issues or proposes to issue any security
Down
- without intention to deceive, or "in good faith"
- the Series 63 test administrator, not FINRA
- laws passed by states to govern securities industry
- Includes every solicitation to sell a security for value
- deliberate concealment, misrepresentation or omission of material information or the truth to deceive or manipulate another party for unlawful or unfair gain
- person who, for compensation, engages in advising others to the value of securities and/or if they are to be invested in
- any person engaged in the business of effecting transactions in securities for the account of others or for his own account
- An individual who represents a broker/dealer or an issuer when selling or trying to sell securities to the investing public
- accepting customer funds or securities into a persons possession for safekeeping
- tomorrow you will be fully _________
- Any person who has non-public knowledge (material information) about a corporation
- when a brokerage firm combines its securities with customer's securities
- meaning not required to register
- submitted when there seems to be something wrong in the account, like theft, laundering or embezzlement
- exemption granted when the firm is not required to register in state when they do not have an office in the state and no more than. 5 clients in 12 months because they do not have a physical presence in the state and is only doing minimal business
- when you defeat NASAA you have become a ______
- buying a security in one market and simultaneously selling it on another market to profit from price difference between the two markets is not illegal
35 Clues: meaning not required to register • tomorrow you will be fully _________ • the person who is going to pass tomorrow • the Series 63 test administrator, not FINRA • when you defeat NASAA you have become a ______ • must be filed when $10,000 or more is deposited • without intention to deceive, or "in good faith" • laws passed by states to govern securities industry • ...
agruculture 2024-10-28
11 Clues: drift • tenure • larceny • security • land use • equality • Exchange • Conditions • Liberalisation • National Product (GNP) • the following terms and use them in a sentence.
Jobs Are Here 2015-04-27
Westbury Library 2022-05-17
Via 2021-09-21
The United States and the World Project 2024-06-14
Cyber Bullying 2021-07-16
Across
- Most common effect of cyber bulling, that involves having a low self esteem.
- Deliberately provoking a response through the use of insults on online forums and social media sites.
- Intentionally excluding someone from social activities.
Down
- It is sending or posting fake and cruel information about you online to damage their reputation and friendship.
- Is good for sending electronic letters and pictures but it can also be used to send nasty and threatening messages.
- Is the act of publicly humiliating a child through the online posting of private information.
6 Clues: Intentionally excluding someone from social activities. • Most common effect of cyber bulling, that involves having a low self esteem. • Is the act of publicly humiliating a child through the online posting of private information. • Deliberately provoking a response through the use of insults on online forums and social media sites. • ...
Cyber-Safety 2021-09-16
Across
- A Program used in malicious ways
- You don't receive what you were promised
- software that is designed to damage and destroy computers and computer systems
- when someone finds the pin for your credit card using automated programs
Down
- network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
- a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code
6 Clues: A Program used in malicious ways • You don't receive what you were promised • when someone finds the pin for your credit card using automated programs • software that is designed to damage and destroy computers and computer systems • a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code • ...
cyber saftey 2019-09-30
Across
- an attempt to trick someone to get important information or money
- information that comes to us through the internet, often through electronics
- feeling:when something uncomfortable happens on digital media
Down
- a type of crime in which your private information is stolen and used
- to engage in activities that don't involve devices, apps, or the internet
- information:information about you that can be used to identify you
6 Clues: feeling:when something uncomfortable happens on digital media • an attempt to trick someone to get important information or money • information:information about you that can be used to identify you • a type of crime in which your private information is stolen and used • information that comes to us through the internet, often through electronics • ...
Cyber safety 2016-02-10
Across
- an website that allows everyone to edit and add information on a topic
- people uses it to watch videos
- creator, you can make books on the device
Down
- you can use Twitter to send messages online and privately
- it's the most used in Australia, everyone uses it to search things
- is used to communicate with teachers and students in a safe way
6 Clues: people uses it to watch videos • creator, you can make books on the device • you can use Twitter to send messages online and privately • is used to communicate with teachers and students in a safe way • it's the most used in Australia, everyone uses it to search things • an website that allows everyone to edit and add information on a topic
cyber cross 2022-07-21
6 Clues: money for hacked data • sending hacking emails to users • illegal access of data via (VoIP) • maliciously crafted software code. • hacking attempt at senior individual • hacking attempt at specific individual
Cyber Safety 2024-07-06
Across
- A secret word or phrase used to access accounts.
- A name used to identify oneself on a computer system.
- Ensuring protection from harm or danger.
Down
- A small program designed to cause damage to your computer by gaining access to it.
- Global network connecting computers worldwide.
- Electronic mail used for sending messages online.
6 Clues: Ensuring protection from harm or danger. • Global network connecting computers worldwide. • A secret word or phrase used to access accounts. • Electronic mail used for sending messages online. • A name used to identify oneself on a computer system. • A small program designed to cause damage to your computer by gaining access to it.
Cyber Safety 2024-07-25
6 Clues: an id for the internet • people who stands up to bulling • people who bullies peope online • leaking your private information to the internet • people whos not upstanding but watching it happened • a player who is good at a online game to a low level game
cyber bullying 2024-07-25
Across
- someone who watches bullying and doesnt do anything about it
- watches it happen and does nothing
- an information system on the internet
Down
- behaviour from a person that could be rude or intimidating
- something that helps you search on the web
- the person who is being mean
- a global computer network providing a variety of information
7 Clues: the person who is being mean • watches it happen and does nothing • an information system on the internet • something that helps you search on the web • behaviour from a person that could be rude or intimidating • someone who watches bullying and doesnt do anything about it • a global computer network providing a variety of information
Cyber somthing 2023-01-11
6 Clues: alongside • on purpose • harmful and gradual • capable or floating • a rapid and often excessive spread or increase • existing in or spreading through every part or something
Cyber secruity 2024-10-04
6 Clues: Covid 19 • type of evil • Form of violence • Something every store has • You can receive and send these • the technological version of catching a fish
Cyber secruity 2024-10-04
6 Clues: Covid 19 • type of evil • Form of violence • Something every store has • You can receive and send these • the technological version of catching a fish
Cyber-Safety 2021-09-16
Across
- A Program used in malicious ways
- You don't receive what you were promised
- software that is designed to damage and destroy computers and computer systems
- when someone finds the pin for your credit card using automated programs
Down
- network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
- a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code
6 Clues: A Program used in malicious ways • You don't receive what you were promised • when someone finds the pin for your credit card using automated programs • software that is designed to damage and destroy computers and computer systems • a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code • ...
cyber safety 2021-08-10
Across
- a stranger asking too many personnel question
- i am careful with what i ____ because i know that it is on there forever
- making mean comments towards another person
Down
- search engine
- i have many different _____ just in case someone figures one out
- i have my _____ settings turned on so strangers cant talk to me
6 Clues: search engine • making mean comments towards another person • a stranger asking too many personnel question • i have my _____ settings turned on so strangers cant talk to me • i have many different _____ just in case someone figures one out • i am careful with what i ____ because i know that it is on there forever
Cyber Safety 2021-03-03
CYBER SAFETY 2021-10-20
Across
- - Level of protection one has while being online/on the internet
- - harassments done online by the hackers of your account or by oneself
- - Something that keeps your accounts, files and posts safe
Down
- - Something that keeps your computer and files safe from viruses that destroy everything in your computer
- - practice of downloading and distributing copyrighted content digitally without permission of the creater
- - Mails that push you into trouble of being hacked once opened carelessly
6 Clues: - Something that keeps your accounts, files and posts safe • - Level of protection one has while being online/on the internet • - harassments done online by the hackers of your account or by oneself • - Mails that push you into trouble of being hacked once opened carelessly • ...
Cyber Safety 2023-05-05
6 Clues: to not be safe. • ___________ technologies. • pretending to be someone else. • how you should keep your personal information. • an adult contacting a child with sexual intentions. • the place where all your personal information is stored.
Cyber safety 2023-05-22
6 Clues: when your Safe online. • Someone that takes your money • Something you use to login to Apps • When there is a bug in your computer. • When someone is being bullied online. • posting rumors online ruining someone's reputation
CYBER INTIMIDATION 2013-10-08
Across
- Ne fais pas tu _ _ _ _ _ _ _ _ _ à quelqu’un. Ne partagez pas votre mot de passe.
- Lorsque beaucoup de personnes _ _ _ _ _ _ _ Ils font de la peine aux personnes.
- Lorsque vous avez des gens qui vous menaces. _ _ _ _ _ _ leurs de votre page d’accueil Facebook.
Down
- Les gens maquent du _ _ _ _ _ _ _ lorsqu’ils vous appellent des noms.
- Lorsque _ _ _ _ _ _ _ _ _ _ tu as un problème de cyber intimidation, tu dois le dire à un professeur.
- Il est _ _ _ _ _ _ _ _ _ à soumettre votre information personnel sure l’internet.
6 Clues: Les gens maquent du _ _ _ _ _ _ _ lorsqu’ils vous appellent des noms. • Lorsque beaucoup de personnes _ _ _ _ _ _ _ Ils font de la peine aux personnes. • Il est _ _ _ _ _ _ _ _ _ à soumettre votre information personnel sure l’internet. • Ne fais pas tu _ _ _ _ _ _ _ _ _ à quelqu’un. Ne partagez pas votre mot de passe. • ...
Cyber attacks 2022-03-31
Across
- an attempt by hackers to damage or destroy a computer network or system
- fraudulent message designed to trick a person
Down
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- the state of being free from danger or threat
- An advanced persistent threat
- short for Internet Protocol.
6 Clues: short for Internet Protocol. • An advanced persistent threat • the state of being free from danger or threat • fraudulent message designed to trick a person • an attempt by hackers to damage or destroy a computer network or system • software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
Cyber Bullying 2023-10-19
6 Clues: Where do you report cyber bullying? • What to do before you post a comment? • What is a mean person’s name on social media? • What should you be on social media, mean or kind? • Is bullying online legal or illegal in Australia? • Before posting a photo or video of someone else, what should you get?
Cyber Ethics 2024-03-12
6 Clues: Unwanted bulk mails • the right related to new inventions. • It protects your brand name, logos,etc. • An illegal intrusion into a system or network • An act of harming, harassing a person using the Internet • An act of sending a fake mail to the user misleading him to share his personal details
Cyber Criminals 2024-11-12
6 Clues: Hackers who work for a Country • Hackers already have privileged access • Hackers who find code online and tries it out • Hackers with political or ideological motivations • Hackers who work internally looking for vulnerabilities • Hackers who find a vulnerability and then sells it back to the owneer
Cyber Wellness 2025-01-28
Across
- The cause of the main lead's collapse in the video 'You saved the world' was _______.
- The main lead in the video 'Why' chose not to _______ about the strangers' comments online.
- In the video 'Bullied', one is advised to reach out to someone who has been _______.
Down
- Sara Lee in the video 'Bullied' commented on the main lead's account if she was trying to be a/an _______.
- The main lead in the video 'You saved the world' was _______ to gaming.
- The main lead in the video 'Why' should _______ the account
6 Clues: The main lead in the video 'Why' should _______ the account • The main lead in the video 'You saved the world' was _______ to gaming. • In the video 'Bullied', one is advised to reach out to someone who has been _______. • The cause of the main lead's collapse in the video 'You saved the world' was _______. • ...
cyber ethics 2025-06-07
Across
- which is a wireless technology used to interconnect of mobile.
- full form of lan
Down
- which topology is most common network setup that consists of star figured workstation
- it is a physically attach a computer so that it can participate in network communicatio
- what is device that connnects two different types of network with each other.
- in which topology all the network are connected in circular manner
6 Clues: full form of lan • which is a wireless technology used to interconnect of mobile. • in which topology all the network are connected in circular manner • what is device that connnects two different types of network with each other. • which topology is most common network setup that consists of star figured workstation • ...
CYBER ETHICS 2025-06-02
Cyber Cleuths 2025-10-17
6 Clues: – Your digital bodyguard. • – Your weakest point, admit it. • – Code that makes computers sick. • – Online scam disguised as kindness. • – Turning messages into secret code. • – The invisibility cloak of the internet.
Azure Data DoL, Feb 13, 2025 2025-02-13
Across
- The management of data availability, usability, integrity, and security within an organization
- A security framework that assumes no user or device is trustworthy by default, regardless of its location inside or outside the network
- A network security system that monitors and controls incoming and outgoing network traffic
- Microsoft's single, unified, logical data lake for your whole organization
Down
- A Microsoft solution that can help an organization govern, protect, and manage data, wherever it lives
- A Microsoft tool used for business analytics, transforming data into interactive insights and visualization
- A framework that allows for the distributed processing of large datasets across clusters of computers
- A storage repository that holds a vast amount of raw data in its native format
- A standard programming language used for managing and manipulating relational databases
9 Clues: Microsoft's single, unified, logical data lake for your whole organization • A storage repository that holds a vast amount of raw data in its native format • A standard programming language used for managing and manipulating relational databases • A network security system that monitors and controls incoming and outgoing network traffic • ...
COMMERCE INVESTMENT 2022-06-07
Across
- The company that is providing the insurance
- items of value
- A loan from a financial institution where something is held as security in case the money is not repaid
- A list of income and likely expenditures (a step that can minimise impacts of events)
- setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
- A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
- Part ownership of a company
- Where the exchange of goods and services between buyers and seller occur
- Someone who purchases goods and services to satisfy need and wants
- A practice of funding a project by raising money from a large number of people
- The price that must be paid to use someone else’s money
- Expand your portfolio with different types of shares
- money set aside during life for retirement (a step that can minimise the impact of events)
- A person who works for a wage or salary
- Money received on a regular basis from work, property, business, investment or welfare
- Any investment that grows or has potential to grow
- Investments that provide regulate profits
- to overcharge or swindle (a threat to financial security)
Down
- A promis to repair any defects that are in a product
- a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
- Regularly putting aside some money for future use
- electronic funds transfer point of sale
- The swapping or exchanging of one good or another
- Real estate that is bought with the aim of earning some kind of financial return
- A digital currency
- personal group with lots of money that are willing to lose it
- The buying and selling of goods and services via the internet
- Part of a firm’s profit that is divided amongst shareholders
- Buy goods in large quantities from the manufacturer
- items that can be used to reduce your accessible income
- Involves buying the rights of another business to distribute its products under its name
- A legally binding agreement
- What remains after all business expenses are deducted from sales revenue
- The amount of money a consumer is prepared to pay in exchange of a good or service
- Place where shares in public companies are bought and sold
- money owing to external sources (e.g a bank)
- the profit you receive on your investment as a percentage of your original investment
- Activities taken for the purpose of production and consumption of goods and services in a region
- when a person gives up control of their assets and finances, voluntary or by court order
- illegal business practice (a threat to financial security)
- A currency used to invest in stocks, shares as well as goods and services etc.
- spending more money than your disposable income allows (a threat to financial security)
- Buying something without giving much thought if you really need it
- Australian Stock exchange
- use of money to purchase equipment for a new business or an existing business
- a type of investment that is acceptable to society’s current standards
- a collection of financial investments like stocks and cash etc.
47 Clues: items of value • A digital currency • Australian Stock exchange • A legally binding agreement • Part ownership of a company • electronic funds transfer point of sale • A person who works for a wage or salary • Investments that provide regulate profits • The company that is providing the insurance • money owing to external sources (e.g a bank) • ...
Final Review 2022-04-29
Across
- Encompasses the recovery, investigation, examination, and analysis of material found in digital devices during incidents.
- Security team that manages an organization's network defense.
- Type of RFID tag can send a signal over a long distance.
- Provides the network virtualization solution called XenServer.
- type of interference is caused by motors, heavy machinery, and fluorescent lights.
- The most volatile memory in the gathering of potential evidence.
- An security system that identifies any attacks. In addition, takes immediate action to stop or prevent the attack.
- Backup strategy backs up all files from a computer's file system.
- Cloud computing solutions delivers software applications to a client.
- Used as a secure tunnel to connect two networks.
- This layer of SDN communicates with the Control layer through what is called the northbound interface.
- Password attack employs a list of pre-defined passwords that it tries against a login prompt.
- Message authentication code that allows a user to verify that a file or message is legitimate.
- Type of wireless access point is generally used in a residential setting.
- sends unsolicited business cards and messages to a Bluetooth device.
- Process of adding random characters at the beginning or end of a password to generate a completely different hash.
- An exploit in which malware allows the virtual OS to interact directly with the hypervisor.
- Protocol for logging.
- An attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information.
- A PKI is an implementation for managing which type of encryption.
- Dumpster diving is this type of reconnaissance.
- One of the most popular packet capturing tools.
- Rights management category is applied to music, videos, and software that is sold to consumers.
Down
- Connects multiple servers together so that if one server fails, the others immediately take over its tasks.
- Entering random data to the inputs of an application.
- Violation of a security policy.
- SIEM component that is responsible for gathering all event logs from configured devices.
- A Cloud technology that allows cloud services to be shared by several.
- DLP method works by replacing sensitive data with realistic fictional data.
- A Cloud technology that provides cloud services to just about anyone.
- These types of logs are generated when a computer randomly restarts.
- (SOAR) system automation components that shows processes and procedures that are to be used by a human.
- Tool that can be used to view and modify DNS server information in Linux.
- A vulnerability scan method in which administrator logos into a system for scanning.
- Used to verify that a downloaded file has not been altered.
- Protocol used by IPsec to create a security association between communicating partners.
- Cryptography mechanism that hides secret communications within various forms of data.
- A Wireless device used to manage multiple access points in your organization.
- MOST secure EAP implementation.
- used on a wireless network to identify the network name.
- passive reconnaissance tool is used to gather information from a variety of public sources.
- Computer software, firmware, or hardware that creates and runs virtual machines.
- Acronym for a solution that pushes security policies directly to mobile devices over a network.
- An SDN layer also known as the Infrastructure layer.
- Password attack with a large table of hashes.
- Harddrive configuration used for data redundancy.
46 Clues: Protocol for logging. • Violation of a security policy. • MOST secure EAP implementation. • Password attack with a large table of hashes. • Dumpster diving is this type of reconnaissance. • One of the most popular packet capturing tools. • Used as a secure tunnel to connect two networks. • Harddrive configuration used for data redundancy. • ...
Cryptober Puzzle #2 2021-09-30
Across
- The set of ways in which an adversary can enter a system and potentially cause damage
- The act of exploiting a security vulnerability on the same day it becomes publicly known
- The process of granting or denying specific requests for or attempts to obtain and use information and related information processing services
- A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents.
- a security control report developed by the American Institute of Certified Public Accountants
- The process of verifying the identity or other attributes of an entity (user, process, or device)
- An attack that prevents or impairs the authorized use of information system resources or services
Down
- allows access based on the job title
- Short for malicious software
- A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data
- An unauthorized act of bypassing the security mechanisms of a network or information system
- The unauthorized transfer of information from an information system
- a browser setting that lets you browse privately by deleting history, site data, cookies, and data.
- a service you can use to create and manage passwords. You only need a single master password to log in to the manager itself.
14 Clues: Short for malicious software • allows access based on the job title • The unauthorized transfer of information from an information system • The set of ways in which an adversary can enter a system and potentially cause damage • The act of exploiting a security vulnerability on the same day it becomes publicly known • ...
Responsible Technology 2021-12-13
Across
- The Tech We Want is this, ethical, and inclusive
- The difficult decision that The Tech Workers Handbook is designed to support
- The rails and roads of the digital economy
- A set of rules that are inadequate in the age of surveillance capitalism
- Data about data
- Not today’s data governance
- One community fighting back against disinformation
- Last Week Tonight Oct. 10
- The end-to-end world
Down
- A concept that balances data’s societal good, market innovation, and digital rights
- A key attribute of MOSIP that ensures it can adapt to future needs and risks
- Policies tried to undermine this fundamental right but advocates pushed back
- More than the new oil
- A new, digital form of colonization on the African continent
- The global tech movement that Harvard will lead into the future
- One of the most significant challenges in our connected world
- Five years of championing better digital identity
- The target of unsafe social media ads
18 Clues: Data about data • The end-to-end world • More than the new oil • Last Week Tonight Oct. 10 • Not today’s data governance • The target of unsafe social media ads • The rails and roads of the digital economy • The Tech We Want is this, ethical, and inclusive • Five years of championing better digital identity • One community fighting back against disinformation • ...
Christmas Crossword Competition 2023-10-25
Across
- Around 25 million to be enjoyed in the UK
- In the UK, children have an average of 16
- Festive tune that was the first song played in space
- Artist who sang ‘Merry Xmas Everybody'
- A traditional name Father Christmas and, suspiciously, our compliance manager
- Steven Mint
- Finance present exchange
- In our last newsletter, Lauren Lee was named a ___
- British Christmas TV film released the same year Whitechurch Securities Ltd was established
Down
- 27% of families watch it
- 26.6 billion estimated to be lost
- 24 days in the calendar
- 6 million are sold in the UK to wrap those presents
- Why doesn’t santa have a retirement plan? Because he’s too focussed on the ___
- You can avoid it in ethical investments but santa still might fill your stocking with it if you’ve been naughty
- Monday that follows Black Friday
- Why do santa’s little helpers all have income protection insurance? Because they’re elf__
- Name of the Grinch’s dog
18 Clues: Steven Mint • 24 days in the calendar • 27% of families watch it • Finance present exchange • Name of the Grinch’s dog • Monday that follows Black Friday • 26.6 billion estimated to be lost • Artist who sang ‘Merry Xmas Everybody' • Around 25 million to be enjoyed in the UK • In the UK, children have an average of 16 • In our last newsletter, Lauren Lee was named a ___ • ...
Customer Service Week - Crossword 2025-10-04
Across
- Finish this CSC Guiding Principle: Very few things are actually ___________
- This CSC brand's main focus is home design
- The "S" in SLA
- Which CSC brand has a city in its name?
- Total number of brands in CSC's family of brandss
- Which CSC family brand has an animal in its logo?
- Which CSC Brand was featured in a South Park episode?
- who is the Vice President of CSC's Call Centers? (first & last name)
Down
- The "E" of EBITDA
- Which CSC value is this: "We're driven to support each other at all times. We act with empathy, honesty, and integrity."
- CSC Generation's CTO and AI Guru (last name)
- the "L" of BNPL
- The most recent brand to join CSC's family of brands
- time period of intense online shopping that begins Black Friday and ends Cyber Monday
- CSC brands are all part of which industry?
- CSC Generation's Founder & CEO (last name)
- The name of our LMS platform
- Measure of a customer's contentment (acronym)
18 Clues: The "S" in SLA • the "L" of BNPL • The "E" of EBITDA • The name of our LMS platform • Which CSC brand has a city in its name? • This CSC brand's main focus is home design • CSC brands are all part of which industry? • CSC Generation's Founder & CEO (last name) • CSC Generation's CTO and AI Guru (last name) • Measure of a customer's contentment (acronym) • ...
At a concert 2018-10-18
Online safty by Namo 2013-09-08
6 Clues: you can see your friend face. • is a website can chat with friend. • _ bullying tessing somebody in internet • you can chat with you friend and call your friends. • chat room you don’t known who really chatting with you. • you can post your picture can chat with you friend and can play game
crack it 2023-09-18
Across
- A programming technique for finding solutions to complex problems.
- Digital or virtual currency that uses cryptography for security and operates independently of a central authority.
- computing paradigm involving probability and randomness.
- A method in cryptography to ensure data integrity.
- field of study involving massive datasets and patterns.
- A network security protocol to protect data in transit.
Down
- A decentralized digital ledger.
- A branch of AI simulating human-like conversation
- A network of interconnected smart devices.
9 Clues: A decentralized digital ledger. • A network of interconnected smart devices. • A branch of AI simulating human-like conversation • A method in cryptography to ensure data integrity. • field of study involving massive datasets and patterns. • A network security protocol to protect data in transit. • computing paradigm involving probability and randomness. • ...
Five Nights at Freddy's Trivia 2023-12-14
Across
- What name are you given in sister location?
- What animatronic was torn apart by kids?
- what color is the guy who un-alived kids?
- Animatronic Scott Cawthon is most afraid of?
- What animatronic is pirate themed?
Down
- what does chika eat in security breach?
- Who said "was that the bite of 87 ?!?!"
- Who do you play as in security breach?
8 Clues: What animatronic is pirate themed? • Who do you play as in security breach? • what does chika eat in security breach? • Who said "was that the bite of 87 ?!?!" • What animatronic was torn apart by kids? • what color is the guy who un-alived kids? • What name are you given in sister location? • Animatronic Scott Cawthon is most afraid of?
tech thing 2015-09-15
Across
- object that changes screens and stuff
- an agreement to using the web responsibly
- community: its is a group of people that like something so they made it world wide for ppl to join
- something you are leader or supposed to talk care of
- : the way to act online
- Community : it like a group of ppl in a online game
- Environments a fake place that is fake or is real but not in person
Down
- when someone is bullying you
- when someone is breaking into your personal or work account
- a group of ppl
- someone that says/something over and over
- putting something public
- Theft :someone that steals your identity to do something bad
- Citizen following rules to web site agreements
- connect something to something
- Networking place where u can talk to other ppl
- use: you are allowed to use a piece of work as without paying if you use it for the news or something
17 Clues: a group of ppl • : the way to act online • putting something public • when someone is bullying you • connect something to something • object that changes screens and stuff • someone that says/something over and over • an agreement to using the web responsibly • Citizen following rules to web site agreements • Networking place where u can talk to other ppl • ...
20 Definitions Technology Terms 2015-09-15
Across
- To put a document in a different place
- - A document that is released to the public/ other person(s)
- Citizen A responsible internet user that interacts with other people
- A rule that allows you to use someone’s idea if you give them credit for it
- Is meant to be used but not directly said
- Bullying a person online
- Media A place on the internet that allows a person to create and share their idea with other people
- Acceptable User Policy ….. An agreement that you sign that ensures you will take care of a computer
- - Being polite on the network
Down
- Being accountable for what you do
- Networking - A group of people that analyze info online
- To break into something that you aren’t suppose to
- Community A group of people that use the internet to interact
- Theft Someone who steals/ takes personal information from someone else
- An electronic tool with a screen
- A community around the world that communicates with each other
- A group of people who share some interests
17 Clues: Bullying a person online • - Being polite on the network • An electronic tool with a screen • Being accountable for what you do • To put a document in a different place • Is meant to be used but not directly said • A group of people who share some interests • To break into something that you aren’t suppose to • Networking - A group of people that analyze info online • ...
Understand & Taking A Stand Against Bullying 2024-05-30
Across
- Position or rank in relation to others.
- An act of physical harm or injury to another person.
- Behavior directed at another person that is unwanted and unwelcome.
- Belief in one's own abilities.
- To communicate through words or gestures the intent to harm another person.
- Set apart from others; alone.
- Having to do with or involving computers or other online technology.
- To refuse to admit; to force out.
- Using threats to frighten someone; often used to compel another person to do something, or to deter the person from doing something.
- People of the same age, or close in age, who are similar in many ways.
- To keep from happening or existing.
Down
- Boldly hostile; quarrelsome.
- Related to words and speech.
- The result or outcome of an action or event.
- Done on purpose; planned or deliberate.
- Confident and self-assured.
16 Clues: Confident and self-assured. • Boldly hostile; quarrelsome. • Related to words and speech. • Set apart from others; alone. • Belief in one's own abilities. • To refuse to admit; to force out. • To keep from happening or existing. • Position or rank in relation to others. • Done on purpose; planned or deliberate. • The result or outcome of an action or event. • ...
Disruptive technology 2025-07-24
Across
- Using fast quantum bits rather then binary
- Multiple layers of authentication to prevent loss of personal data and information
- Technology that mixes with the virtual and real world
- Tech that automatically defends against other digital threats
- A model where tools and other forms of education is delivered online
- technology that convert data into decision making insights
- monitors and reacts to threats on user's device
- A flexible idea to secure digital assets
Down
- multi digital experiences that can be accessed across multiple platforms
- Machine learning and advanced automation
- A digital world where users interact with during real time
- A way to determine possible weaknesses
- Technology Innovations aimed to improve environmental sustainability
- A form of technology that is able to imitate human knowledge
- cloud services spread across multiple locations but centrally managed
- A form of insurance in case of cyber attacks
16 Clues: A way to determine possible weaknesses • Machine learning and advanced automation • A flexible idea to secure digital assets • Using fast quantum bits rather then binary • A form of insurance in case of cyber attacks • monitors and reacts to threats on user's device • Technology that mixes with the virtual and real world • ...
Aerospace book 1, 3, 5 and 7 Vocabulary 2023-08-03
Across
- – relating to the forces of air in motion
- in the Northern Hemisphere
- - an enormous collection of stars arranged in a particular shape
- – the science of flight within the atmosphere
- – the art, science, and technology of flight within the atmosphere
- - first layer of the atmosphere where most of the Earth’s weather occurs
- - boundary between the troposphere and the stratosphere
- space - the space between the Earth and the Moon
- edge – the front part of a wing or airfoil
- – the curved part of an airfoil from its leading to trailing edge
- security - the collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants.
- full rotation 24 hours
- easterlies - global winds that flow from the poles and move to the west
- - a region of the atmosphere where electrons are gained or lost
- winds - the world-wide system of winds that transfers heat between tropical and polar regions
- (fall) equinox - the time when the Sun's direct rays strike the equator resulting in day and
- - a crime that involves a computer and a network.
- – a line drawn through an airfoil from its leading to trailing edge
- - a layer of the atmosphere extending from 50 to about 300 miles
- - a channel that links computers, servers, network devices, peripherals, or other devices together to allow the sharing of data.
- theoretically the absolute coldest temperature
- zero - the point at which all molecules no longer move or have the least amount of
- - small gravity levels or low gravity; floating condition
- temperature
- – a combination of aeronautics and space
- - a person who conducts illegal activity using computers or other digital technology.
- orbit of its outermost planet
- - all encompassing term that includes everything; planets, galaxies, animals, plants, and humans
- US, generally from the west to the east
- ethics - is a set of moral, legal, and social principles that applies to computers relating to the user’s behavior
- - a desktop computer or workstation that is capable of obtaining resources from a server. Cyber - describes characteristics of the culture of computers, information technology, and virtual reality.
- - region beyond the Earth’s atmosphere where there is very little molecular activity
- rate - the rate of decrease with an increase in height for pressure and temperature
- – the natural force pulling everything to Earth
- Allen belts - radiation belts around the Earth filled with charged particles
- - a computer program or a device that provides sharable resources.
Down
- - the environment that allows digital technology of many forms to communicate with one another via the Internet.
- balloons, helicopters, hangliders, and parasails
- - unit of measurement based on absolute zero and commonly used by scientists to
- - the method by which the Sun heats the Earth
- - a layer of the atmosphere extending from about 30 to 50 miles
- - a layer of the atmosphere extending from the tropopause to about 30 miles
- westerlies - global winds that move toward the poles and appear to curve to the east
- – height above sea level or ground level expressed in units
- - space that is empty or void of molecules
- stream - a strong wind that develops at 30,000-35,000 feet and moves as a winding road across
- – a person who operates an aircraft in flight
- space - space located within a solar system; measured from the center of the Sun to
- – the downward movement of air behind a wing in flight
- - the movement of the Earth revolving around the Sun; full revolution about 365 days
- switching - a process of arranging data into small units that can be transmitted over a digital network.
- – a place on either land or water where aircraft can land and take off for flight
- – the upward force that opposes gravity and supports the weight of an aircraft
- – pertaining to air
- Force - winds associated with the Earth’s rotation that deflect a freely-moving object to the
- - how the Earth turns (rotates) on its axis at an angle of 23.5° while it revolves around the
- - a connection point that relays information along a distributed network.
- - a global area of calm winds
- wind – the flow of air which moves opposite the flight path of an airplane
- – forces in motion
- – an aircraft that is kept aloft by the aerodynamic forces upon its wings and is thrust forward by a means of propulsioairfoil – a component, such as a wing, that is specifically designed to produce lift, thrust, or directional stability
- – the force which moves an aircraft forward in flight
- the use of technology to attack a nation via network communications and computer devices.
- - a worldwide collection of different networks connecting millions of devices which allows communication between other devices on the network.
- – any machine that is capable of flying through the air; included are ultralights, airplanes,
- space - the region in space from one solar system to another
- – a mixture of gases that contains approximately 78% nitrogen, 21% oxygen, and 1% other gases
- - a region of the atmosphere where ozone is created
- of equal length, usually on September 22nd or 23rd
- – a force which slows the forward movement of an aircraft in flight
70 Clues: temperature • – forces in motion • – pertaining to air • full rotation 24 hours • in the Northern Hemisphere • - a global area of calm winds • orbit of its outermost planet • US, generally from the west to the east • – a combination of aeronautics and space • – relating to the forces of air in motion • - space that is empty or void of molecules • ...
FDR's New Deal Programs 2023-04-14
10 Clues: National • Agricultural • Works Progress • Social Security • Tennessee Valley • Federal Emergency • Works Administration • Rural Electrification • Civilian Conservation • Federal Deposit Insurance
Review PDP SPIRIT: Respect 2021-07-12
5 Clues: ...bullying; happens online • ... Windows; a tool for self discovery • Antidote of bullying and social exclusion. • Area that people know about us, but we don't. • What is very difficult to receive without giving it first
Bullying 2020-06-07
Across
- when someone is being mean when does it escalate to bullying
- when you make someone give you something threw violence
- what should you do when people are punching and hurting you
- what do you do after someone has bullied you
Down
- what is a type of bullying where someone insults you
- what is it called when someone hurts you with their body
- what is it called when nobody is your friend
- what is a type of bullying on the internet
8 Clues: what is a type of bullying on the internet • what is it called when nobody is your friend • what do you do after someone has bullied you • what is a type of bullying where someone insults you • when you make someone give you something threw violence • what is it called when someone hurts you with their body • ...
Chiara Silvestre crossword puzzle 2021-05-23
Across
- one of organization objectives
- month of the conference in San Francisco
- number of the first states that joined the UN
Down
- UN was established after
- one of main office closest to Italy
- one of the aims that maintains intergovernmental organization that start with S
- headquartered on international territory
- intergovernmental organization that aims to maintain international peace and security
8 Clues: UN was established after • one of organization objectives • one of main office closest to Italy • headquartered on international territory • month of the conference in San Francisco • number of the first states that joined the UN • one of the aims that maintains intergovernmental organization that start with S • ...
Mod 5 1-b Application Security 2023-08-24
Across
- Ensures that a user is who they say they are.
- Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users.
- Provides a time-stamped record of which aspects of the application were accessed and by whom.
Down
- Safeguarding sensitive data while in transit or at rest.
- Combines elements of both static and dynamic testing.
- Check their code as they are writing it
- Analyzes running code while simulating outside, or “black box” attacks.
- Designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.
- Application ___________ the process of developing, testing, and adding security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.
9 Clues: Check their code as they are writing it • Ensures that a user is who they say they are. • Combines elements of both static and dynamic testing. • Safeguarding sensitive data while in transit or at rest. • Analyzes running code while simulating outside, or “black box” attacks. • ...
Digital media literacy 2023-09-06
12 Clues: password • Mechanism • using online • playing games • online platform • online being mean • Leonardo da Vinci • technical process • how to use devices • collect information • used in practical choices • needed for woodwork practical
Vocab Unit 11 2024-02-12
12 Clues: nuts • sour • guide • picky • rules • cry out • organize • away from danger • looking life-like • snuggle; get comfy • to make sure you're safe • downfall of snow or rocks on a mountain
CLUB DE SOLEIL 2025-08-24
12 Clues: CHECK IN • VIP GUEST • TRANSPORT • WHO CLEANS • REFLECTION • BOOKS TOURS • WHO REPAIRS • MAKE A SPLASH • OUTSIDE COOKER • PATROLS PROPERTY • WHAT DO YOU SLEEP ON • WHERE DO YOU TAKE YOUR LUNCH
Great Depression 2024-02-08
Across
- FDR targeted these first, and shut down the unstable ones.
- What New Deal programs hired people to build public projects, murals and roads
- FDR used ____ to talk to people.
- How many programs were within the New Deal?
- Social Security provides what?
- The needy relied on the government and ___ for food.
Down
- Roosevelt addressed citizens by using this.
- A holdover from FDR, it was made to give relief to the elderly, it was called ______ Security.
- Bad farming practices contributed the ____ bowl.
- This program paid farmers to work/produce less.
- FDR believed that the workers employed by the New Deal should have jobs that gave them money and what?
- In his first days in ____ FDR pushed congress and they passed 15 bills (a record).
- Unlike most Americans FDR was _____.
- The R’s of the New Deal are to reform, recover and what?
- It was because of this that FDR was paralyzed
- FDR was the governor of this state.
16 Clues: Social Security provides what? • FDR used ____ to talk to people. • FDR was the governor of this state. • Unlike most Americans FDR was _____. • Roosevelt addressed citizens by using this. • How many programs were within the New Deal? • It was because of this that FDR was paralyzed • This program paid farmers to work/produce less. • ...
Crossword 2024-10-09
Across
- A list of approved entities allowed access to a system.
- A vulnerability that is exploited before the vendor knows about it
- Processes for responding to and managing security incidents.
- Information used to verify a user’s identity, like a password.
- A network of compromised computers controlled by a hacker.
- Disguising communication from an unknown source as being from a known one.
- A code injection technique used to attack databases.
- Measures to protect physical assets and locations from unauthorized access.
- The state of being unidentifiable within a network or system.
- A symmetric-key algorithm for data encryption
Down
- A legal requirement to inform affected individuals after a data breach.
- A fixed-size string generated from data to ensure integrity.
- Dividing a computer network into smaller parts for security.
- An entity that issues digital certificates for secure communications.
- Software intended to harm or exploit any programmable device.
15 Clues: A symmetric-key algorithm for data encryption • A code injection technique used to attack databases. • A list of approved entities allowed access to a system. • A network of compromised computers controlled by a hacker. • A fixed-size string generated from data to ensure integrity. • Dividing a computer network into smaller parts for security. • ...
account owners 2020-11-04
Across
- a collection of items of the same type stored in a hidden or inaccessible place.
- the admin sets options that helps the accounts stay safe
- is when you are checking that it is that person
- accounts that people of the owner of the accounts have restricted
- a computer program with a graphical user interface for displaying and navigating between web pages.
- made by the admin of the accounts
Down
- you can protect your computer by downloading them
- has security in it
- are made by app developers
- you can do this so that you don't lose your stuff when you reset your computer
- the person who runs the accounts
- is places some one is allowed to go
12 Clues: has security in it • are made by app developers • the person who runs the accounts • made by the admin of the accounts • is places some one is allowed to go • is when you are checking that it is that person • you can protect your computer by downloading them • the admin sets options that helps the accounts stay safe • ...
Summit 2013-04-16
Across
- Summit provides (a)_____ for people with disabilities
- Summit's Youth Advocacy Club is also known as (y)___
- Someone shows (i)_____ if they make their own decisions
- Office of Public Assistance or (O)__
- Social Security Disability Insurance is also (S)___
- The Supreme Court decision in (o)____ v. United States determined that people have a right to live in the community
Down
- This civil rights law was passed in 1990 (a)__
- Instead of saying able-bodied, use the term (n)____
- MT Program: Medicaid for (W)_______ with Disabilities
- The advocacy group (p)______ at Summit is sponsored by the Kiwanis Club
- Supplemental Security Income is also (S)__
- The (A)__ Act would allow people to save money yet still receive Medicaid
12 Clues: Office of Public Assistance or (O)__ • Supplemental Security Income is also (S)__ • This civil rights law was passed in 1990 (a)__ • Instead of saying able-bodied, use the term (n)____ • Social Security Disability Insurance is also (S)___ • Summit's Youth Advocacy Club is also known as (y)___ • MT Program: Medicaid for (W)_______ with Disabilities • ...
Compiling Crosswords 2018-02-05
Across
- If you use a computer you need it as a display
- Systematic search for new insights
- This Departement ships the goods to the customer
- The amount by which the value of a device is reduced over time
- It offers financial security in case of damage
- In this department you have to manage customer relationships
Down
- A small container that you keep your documents in
- One of the most important machine in the office
- The main task of this department is to produce goods
- Raising funds while offering your property as a security deposit
- This machine is used to communicate
- One of the tasks of this Departement is to negotiate with suppliers
12 Clues: Systematic search for new insights • This machine is used to communicate • If you use a computer you need it as a display • It offers financial security in case of damage • One of the most important machine in the office • This Departement ships the goods to the customer • A small container that you keep your documents in • ...
VisioNize 2022-03-18
Across
- VisioNize _____ enabled devices require a hardware hub to connect to VisioNize
- This module is important for GxP lab for documentation purposes
- the pillars of VisioNize subscriptions are Essential and sample ___________
- The _________ module allows for you to check all device parameter and monitor them
- Lab suite Essential allows for ________ notifications ONLY
Down
- VisioNize is a ________ based platform
- Device data ________ function is available for both Essential and Sample Security plans
- This module allows you to plan maintenance for your devices
- VisioNize ___ enabled devices are equipped with the VisioNize touch interface
- One VisioNize Box can connect up to _________ devices
- Any device __________ updates can be done remotely for connected Eppendorf devices
- VisioNize ______ connect 3rd party devices to VisioNize
12 Clues: VisioNize is a ________ based platform • One VisioNize Box can connect up to _________ devices • VisioNize ______ connect 3rd party devices to VisioNize • Lab suite Essential allows for ________ notifications ONLY • This module allows you to plan maintenance for your devices • This module is important for GxP lab for documentation purposes • ...
Travel terms 2024-10-04
Across
- "The act of leaving for a journey, or the start of a flight."
- "Area where passengers collect their luggage after a flight."
- "Screening of passengers and their belongings before boarding."
- "The act of reaching a destination."
- "Elevator, especially at airports, to move between floors."
Down
- "The area where passengers board or leave an aircraft."
- "Main building at an airport where passengers arrive and depart."
- "Official document required for international travel."
- "Security checkpoint for passengers entering a country, ensuring compliance with national laws."
- "The process of registering for a flight before departure."
- "Place at the airport where you leave your checked luggage."
- "Wheeled cart used to carry luggage in airports."
12 Clues: "The act of reaching a destination." • "Wheeled cart used to carry luggage in airports." • "Official document required for international travel." • "The area where passengers board or leave an aircraft." • "The process of registering for a flight before departure." • "Elevator, especially at airports, to move between floors." • ...
CHEMSTAR GROUP 2020-09-15
Across
- Behind the Security post
- product delivery
- Senior factory engineer
- Wider coverage
- HOD Finished goods store
- Paint samples in batches
- Fasanmi Ebenezer
- A Unit in Account
- oil based
- CPIN plastics
Down
- Best for outdoor painting
- Overall head of Admin
- Action
- Chemstar Group Subsidiary
- Acronym for raw materials
- Morning Devotion
- Strategy and Business Development
- Facility Unit Equipment
18 Clues: Action • oil based • CPIN plastics • Wider coverage • product delivery • Morning Devotion • Fasanmi Ebenezer • A Unit in Account • Overall head of Admin • Senior factory engineer • Facility Unit Equipment • Behind the Security post • HOD Finished goods store • Paint samples in batches • Best for outdoor painting • Chemstar Group Subsidiary • Acronym for raw materials • ...
Missing Links 2021-01-26
Across
- Action-Dispute-Revolution
- Again-At-Over
- Dawn-Girl-Greek
- Down-Arm-Par
- Holiday-Indian-Sun
- High-Pay-Sun
- Contact-Letter-Reaction
- Bank-Case-Compare
Down
- Wage-Room-Clean
- Hop-Egg-Whiskey
- Side-Stream-Up
- Blossom-Tomato-Picker
- Some-Day-Number
- Case-Hand-Lip
- High-Security-Factor
- Fire-Narrow-Route
- Eye-Intent-Lesser
- Student-Maid-Wet
18 Clues: Down-Arm-Par • High-Pay-Sun • Again-At-Over • Case-Hand-Lip • Side-Stream-Up • Wage-Room-Clean • Hop-Egg-Whiskey • Dawn-Girl-Greek • Some-Day-Number • Student-Maid-Wet • Fire-Narrow-Route • Eye-Intent-Lesser • Bank-Case-Compare • Holiday-Indian-Sun • High-Security-Factor • Blossom-Tomato-Picker • Contact-Letter-Reaction • Action-Dispute-Revolution
The Cyber Shield Crossword - Breach Guardians 2025-11-19
Across
- Secure connection tunnel
- Monitoring software
- Identity verification
- Multi-factor authentication
- Network of compromised devices
- Network traffic filter
- Unpatched vulnerability
Down
- Security testing method
- To encode data
- Hidden system modification tool
- Extortion malware
- Isolated test environment
- Science of encryption
- Keyboard activity recorder
- To trick someone into giving credentials
- Overload attack
- Hidden way into a system
- Malicious software
18 Clues: To encode data • Overload attack • Extortion malware • Malicious software • Monitoring software • Identity verification • Science of encryption • Network traffic filter • Security testing method • Unpatched vulnerability • Secure connection tunnel • Hidden way into a system • Isolated test environment • Keyboard activity recorder • Multi-factor authentication • Network of compromised devices • ...
RISKPUBLIKA #10 2023-09-04
Across
- KRI adalah Key Risk ...
- Materi training Risk Mindset & Culture telah tersedia di ...
- (eng) ... Risk adalah potensi risiko utama yang menjadi perhatian perusahaan
- (eng) TAF Risk Mindset adalah .... Mind
Down
- (eng) Serangan cyber yang dilakukan melalui email dengan berpura-pura agar TAFriends melakukan sesuatu (open file) atau mengunjungi link yang mengandung konten berbahaya
- E-KYC adalah Electronic ... Your Customer
- (eng) Data yang berkualitas diawali dengan kebenaran saat melakukan ... entry
- (eng) Besar akibat yang mungkin timbul dari suatu risiko
8 Clues: KRI adalah Key Risk ... • (eng) TAF Risk Mindset adalah .... Mind • E-KYC adalah Electronic ... Your Customer • (eng) Besar akibat yang mungkin timbul dari suatu risiko • Materi training Risk Mindset & Culture telah tersedia di ... • (eng) ... Risk adalah potensi risiko utama yang menjadi perhatian perusahaan • ...
Cybersecurity 2025-01-21
Across
- Software designed to protect systems from malware and cyber threats
- The act of stealing personal information for fraudulent use
- Unauthorized access to a computer system or network.
- A method hackers use to deceive users into sharing sensitive information
Down
- The process of converting data into a secure format
- A weakness in software that can be exploited by attackers.
- The process of identifying and fixing software bugs or vulnerabilities
- A type of malicious software that demands payment to restore access
8 Clues: The process of converting data into a secure format • Unauthorized access to a computer system or network. • A weakness in software that can be exploited by attackers. • The act of stealing personal information for fraudulent use • Software designed to protect systems from malware and cyber threats • ...
ParaCommando Kruiswoordraadsel 2014-03-11
Across
- meerdere compagnieën
- Thuishaven school voor onderofficieren
- Hoofddeksel van de chutist
- legervervoermiddel
- legeroefening
- Eskadron in het Belgisch Leger
- Vertrekplaats voor vliegtuigsprong
- De beste vriend van een para
- Militair voertuig
Down
- Auschwitz en Birkenau
- onbemande vliegtuig(afk)
- Opleidingskamp van de para-commando
- Belgium Luxemburg International Security Assistance Force
- M56
- Parachute
- voormalig Belgische Koning
- graad in het leger
- Militaire helikopter
- Operatie Kolwezi 78
19 Clues: M56 • Parachute • legeroefening • Militair voertuig • legervervoermiddel • graad in het leger • Operatie Kolwezi 78 • meerdere compagnieën • Militaire helikopter • Auschwitz en Birkenau • onbemande vliegtuig(afk) • Hoofddeksel van de chutist • voormalig Belgische Koning • De beste vriend van een para • Eskadron in het Belgisch Leger • Vertrekplaats voor vliegtuigsprong • ...
ParaCommando Kruiswoordraadsel 2014-03-11
Across
- Hoofddeksel van de chutist
- Operatie Kolwezi 78
- Eskadron in het Belgisch Leger
- De beste vriend van een para
- Vertrekplaats voor vliegtuigsprong
- Militair voertuig
- Belgium Luxemburg International Security Assistance Force
- Opleidingskamp van de para-commando
- meerdere compagnieën
Down
- Auschwitz en Birkenau
- graad in het leger
- legeroefening
- legervervoermiddel
- Parachute
- onbemande vliegtuig(afk)
- Thuishaven school voor onderofficieren
- voormalig Belgische Koning
- M56
- Militaire helikopter
19 Clues: M56 • Parachute • legeroefening • Militair voertuig • graad in het leger • legervervoermiddel • Operatie Kolwezi 78 • Militaire helikopter • meerdere compagnieën • Auschwitz en Birkenau • onbemande vliegtuig(afk) • Hoofddeksel van de chutist • voormalig Belgische Koning • De beste vriend van een para • Eskadron in het Belgisch Leger • Vertrekplaats voor vliegtuigsprong • ...
ParaCommando Kruiswoordraadsel 2014-03-11
Across
- Hoofddeksel van de chutist
- Operatie Kolwezi 78
- Eskadron in het Belgisch Leger
- De beste vriend van een para
- Vertrekplaats voor vliegtuigsprong
- Militair voertuig
- Belgium Luxemburg International Security Assistance Force
- Opleidingskamp van de para-commando
- meerdere compagnieën
Down
- Auschwitz en Birkenau
- graad in het leger
- legeroefening
- legervervoermiddel
- Parachute
- onbemande vliegtuig(afk)
- Thuishaven school voor onderofficieren
- voormalig Belgische Koning
- M56
- Militaire helikopter
19 Clues: M56 • Parachute • legeroefening • Militair voertuig • graad in het leger • legervervoermiddel • Operatie Kolwezi 78 • Militaire helikopter • meerdere compagnieën • Auschwitz en Birkenau • onbemande vliegtuig(afk) • Hoofddeksel van de chutist • voormalig Belgische Koning • De beste vriend van een para • Eskadron in het Belgisch Leger • Vertrekplaats voor vliegtuigsprong • ...
Identity Theft 2016-12-10
Across
- These should always be difficult so that identity thieves cannot guess them easily.
- a number in the format 000-00-0000, unique for each and every person, that is used to track Social Security benefits and for other identification purposes.
- the condition of being protected from identity thefts and other people who could cause you to lose financial security
- When someone steals this, they have the access to fraudently apply for credit, file taxes, or get medical services.
- the fraudulent acquisition and use of a person's private identifying information, usually for their own financial gain.
- Do this to your receipts and old credit cards.
- This occurs when someone steals your Social Security Number to obtain medical treatment or other medical services.
Down
- shielding your identity
- When criminals watch from a nearby location as you punch in your cell # to a hotel or rental car company.
- charges/bills that you may have noticed.. that you, yourself did NOT pay for.
- When you install this and virus-detection software on your home computer, you are protecting yourself from criminals who may be trying to access your private information via computer.
- If you suspect that your identity has been stolen, you should contact authorities immediately.
12 Clues: shielding your identity • Do this to your receipts and old credit cards. • charges/bills that you may have noticed.. that you, yourself did NOT pay for. • These should always be difficult so that identity thieves cannot guess them easily. • If you suspect that your identity has been stolen, you should contact authorities immediately. • ...
EAS Crossword 2020-11-08
Across
- SOF Cashiers and TMs must ensure they _____ active security tags when customers purchase security tagged items.
- A type of EAS stop where a PSG conducts an EAS stop and finds that store product has NOT been paid for.
Down
- Theft deterrence system where the security gate is triggered by an active security tag.
- App that is used to view EAS alarm triggers on EAS iPods.
- A performance measure used to evaluate the efficiency of an investment (i.e., our EAS system).
- VENDOR
6 Clues: VENDOR • App that is used to view EAS alarm triggers on EAS iPods. • Theft deterrence system where the security gate is triggered by an active security tag. • A performance measure used to evaluate the efficiency of an investment (i.e., our EAS system). • A type of EAS stop where a PSG conducts an EAS stop and finds that store product has NOT been paid for. • ...
Human Rights Day 2021-12-06
12 Clues: Safety • correct • liberty • possessions • equivalence • how many articles? • date of declaration • the act of assenting • differences & unlikeness • something that is included • free from bias & injustice • speech of self respect or appreciation
Avery's Crossword 2024-04-18
12 Clues: Mini crib • Needs changing • Newborn vision • Security blanket • Lullaby composer • Stroller, abroad • Baby, in Italian • Hospital keepsake • Pacifier, nickname • Sendak's 1963 classic • Green Eggs and Ham author • APA exercise recommendation
Second ISMS Crossword Puzzle 2015-11-17
Across
- _______allows for clear and easy understanding of who will be granted access to given information
- a means of escaping a building in the event of fire.
- The art of tricking or manipulating people into providing information that they normally would not provide
- Which is independent malicious program that need not any host program?
- Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.
- Data that is of no use to company is termed as______?
- Procedure that's used to check a business's performance.
- ________is a document that contains a list of the tasks that has to be completed as part of an audit.
- This is known as goldmine of information
Down
- This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
- A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
- What common attack can be used by the attacker against a system for password cracking?
- A(n) ____________________ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.
- This technology is used to measure and analyse human body characteristics for authentication purposes.
- Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident.
15 Clues: This is known as goldmine of information • a means of escaping a building in the event of fire. • Data that is of no use to company is termed as______? • Procedure that's used to check a business's performance. • Which is independent malicious program that need not any host program? • ...
The Bad Guys Chapters 1-4 2022-02-25
18 Clues: basic • unsafe • to save • bad guys • protection • suggestion • to rush in • to get into • crazy, silly • cannot be done • Spanish for "guy" • Spanish for "crazy" • rubbing unpleasantly • to give up something • to break into a computer • very hard to get in or out • what you think is going to happen • to break in when someone's talking
cyber intimidation 2013-09-30
Across
- un _ _ _ _ _ _ _ _ _ _ si tu as problèmesde cyber intimidation
- beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonte mal tu
Down
- tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
- il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
- peuple _ _ _ _ _ _ _ _ _tu qaund ils dire ton noms
- quand vous obtenez tu devrait _ _ _ _ _ _ leur
6 Clues: quand vous obtenez tu devrait _ _ _ _ _ _ leur • peuple _ _ _ _ _ _ _ _ _tu qaund ils dire ton noms • tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs. • un _ _ _ _ _ _ _ _ _ _ si tu as problèmesde cyber intimidation • beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonte mal tu • ...
CYBER INTIMIDATION 2013-09-30
Across
- quand vous obtenez tu devrais _ _ _ _ _ _ leur
- peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms
- un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation
Down
- il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
- -quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
- beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu
6 Clues: quand vous obtenez tu devrais _ _ _ _ _ _ leur • peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms • un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation • beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu • -quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs. • ...
Bonus Game 2024-10-22
Across
- it is a consent or authorization to do something.
- serves as a pass when entering something.
- Acronym: One ____ Passwords.
- a state of being free from public attention.
Down
- it is a person's name and other facts about who they are.
- mfa serves as a ______ to decrease the possibility of a successful cyber attack.
6 Clues: Acronym: One ____ Passwords. • serves as a pass when entering something. • a state of being free from public attention. • it is a consent or authorization to do something. • it is a person's name and other facts about who they are. • mfa serves as a ______ to decrease the possibility of a successful cyber attack.
Cyber Threat Intelligence Crossword Puzzle 2025-02-18
Across
- The first phase of the cyber kill chain
- A cybercrime technique used to trick users into revealing sensitive data
- An online network that provides anonymity to cybercriminals
Down
- Gathering intelligence from freely available sources
- Cybercriminals who demand payment to restore encrypted files
- A threat intelligence framework that maps adversary behaviors
6 Clues: The first phase of the cyber kill chain • Gathering intelligence from freely available sources • An online network that provides anonymity to cybercriminals • Cybercriminals who demand payment to restore encrypted files • A threat intelligence framework that maps adversary behaviors • A cybercrime technique used to trick users into revealing sensitive data
Complete the following crossword 2025-07-03
6 Clues: Set it and forget it • You can view these online • You can now assign these to your accounts • A transaction that can be completed online • Set up these to be notified of account activity • A method that cyber criminals use to trick you by sending fraudulent SMS or text messages
Unit 4 crossword puzzle 2022-03-02
Across
- A standalone storage device or appliance that acts as a file server
- a quick fix for a specific software problem
- A folder whose contents are available over the network
- sets of rules in iptables
- used to locate open ports
- used for outgoing connections
- A collection of patches, hotfixes, and system enhancements that have been tested by the manufacturer for wide deployment.
- The process of increasing the security of devices and software.
Down
- process created by the National Security Agency (NSA) to assist in making a network manageable, defensible, and secure.
- used to check network connections
- controls the behavior for incoming connections
- packets leaving the system
- firewall command line utility for Linux operation systems
- A special network composed of high-speed storage that is shared by multiple servers.
- a fix the is more thoroughly tested than a hotfix and designed for a wider deployment
15 Clues: sets of rules in iptables • used to locate open ports • packets leaving the system • used for outgoing connections • used to check network connections • a quick fix for a specific software problem • controls the behavior for incoming connections • A folder whose contents are available over the network • firewall command line utility for Linux operation systems • ...
COMM 205 C01 2024-08-27
Across
- Information ____ Officer is responsible for the technical aspects of ensuring the security of information.
- Users who are first to adopt new technology and take risk.
- Every information system contains hardware, software, people, data and ____.
- People who write computer programs to support business functions.
- A set of parts or components working together towards a common goal.
- Database ____ is the person who plans, develops, monitors and maintains databases.
Down
- Computer ____ designs the computing devices that we use every day.
- Users who are last to adopt technology and are adverse to change.
- ____ Manager is responsible for keeping projects on time and budget.
- Processed data that possess context, relevance, and purpose.
- A set of instructions that tells the computer what to do.
- Computer ____ is the person responsible for monitoring and controlling computer systems.
- The physical devices that make up a computer.
- A collection of facts, that is intangible.
- ____ is the head of the IS department.
15 Clues: ____ is the head of the IS department. • A collection of facts, that is intangible. • The physical devices that make up a computer. • A set of instructions that tells the computer what to do. • Users who are first to adopt new technology and take risk. • Processed data that possess context, relevance, and purpose. • ...
