cyber security Crossword Puzzles
Bonus Game 2024-10-22
Across
- it is a consent or authorization to do something.
- serves as a pass when entering something.
- Acronym: One ____ Passwords.
- a state of being free from public attention.
Down
- it is a person's name and other facts about who they are.
- mfa serves as a ______ to decrease the possibility of a successful cyber attack.
6 Clues: Acronym: One ____ Passwords. • serves as a pass when entering something. • a state of being free from public attention. • it is a consent or authorization to do something. • it is a person's name and other facts about who they are. • mfa serves as a ______ to decrease the possibility of a successful cyber attack.
Cyber Threat Intelligence Crossword Puzzle 2025-02-18
Across
- The first phase of the cyber kill chain
- A cybercrime technique used to trick users into revealing sensitive data
- An online network that provides anonymity to cybercriminals
Down
- Gathering intelligence from freely available sources
- Cybercriminals who demand payment to restore encrypted files
- A threat intelligence framework that maps adversary behaviors
6 Clues: The first phase of the cyber kill chain • Gathering intelligence from freely available sources • An online network that provides anonymity to cybercriminals • Cybercriminals who demand payment to restore encrypted files • A threat intelligence framework that maps adversary behaviors • A cybercrime technique used to trick users into revealing sensitive data
Complete the following crossword 2025-07-03
6 Clues: Set it and forget it • You can view these online • You can now assign these to your accounts • A transaction that can be completed online • Set up these to be notified of account activity • A method that cyber criminals use to trick you by sending fraudulent SMS or text messages
28 August, 1948 2017-01-26
Across
- CIA but for communism only
- meaning unaligned and subject to a larger power, 4 words
- john gets paid for how hard he works and sam gets paid for how hard he works
- good ol' american gov'/we all get a say
- precursor to the Molotov Plan
- winston churchill divides the world with this term
- you me and my aunt all work for a common good
Down
- a false figure head runs these governments
- another name for capitalism
- the government has total control of your life
- flew blue plains with supplies into red territory to support those inside the red bloc
- created by the passing of the national security act and resides under the national security council
12 Clues: CIA but for communism only • another name for capitalism • precursor to the Molotov Plan • good ol' american gov'/we all get a say • a false figure head runs these governments • the government has total control of your life • you me and my aunt all work for a common good • winston churchill divides the world with this term • ...
Pay Stub Review 2024-03-26
Across
- a person employed for wages and salary
- the amount of money a person gets paid hourly
- a number in the format xxx-xx-xxxx, unique for each individual, used to track Social Security benefits and for other ID purposes.
- pay AFTER deductions
- money taken out of your paystub (insurance, tax, social security)
- A fixed amount of money agreed between the employer and employee. Does not change based on hours worked.
Down
- a person in charge of employment (boss, manager, CEO0
- a time added to what is normal. Get extra money
- the amount of money a person gets paid per hour
- YTD
- amount of time an employee works per paycheck (dates of work)
- pay BEFORE deductions
12 Clues: YTD • pay AFTER deductions • pay BEFORE deductions • a person employed for wages and salary • the amount of money a person gets paid hourly • a time added to what is normal. Get extra money • the amount of money a person gets paid per hour • a person in charge of employment (boss, manager, CEO0 • amount of time an employee works per paycheck (dates of work) • ...
ROUND 1 - CROSSWORD 2024-09-19
Across
- The current worth of the stream of future cash flow
- An investment strategy designed to reduce the risk of adverse price movements
- An investment strategy focused on minimizing risk
- A company’s total earnings before taxes, interest, depreciation, and amortization
- Market characterised by falling prices
- Profits from the sale of an asset held for a short period
Down
- Fund invested in long-term government and corporate bonds
- A bond that can be converted into shares of stock
- A security yielding no interest but issued at a discount
- A system of social security contributions
- Buying and selling of stocks within the same day
- The average rate of return a company expects to earn from an investment
12 Clues: Market characterised by falling prices • A system of social security contributions • Buying and selling of stocks within the same day • A bond that can be converted into shares of stock • An investment strategy focused on minimizing risk • The current worth of the stream of future cash flow • A security yielding no interest but issued at a discount • ...
Computer Threats 2025-10-21
Across
- Core topic Weakness that threats can exploit
- Core topic Possible danger that may damage data
- Main focus of your lesson Protecting data and systems from harm
- From CIA Triad (Lesson 3 link) Ensuring information is kept private
Down
- From CIA Triad (Lesson 3 link) Keeping data accurate and unchanged
- Example of a computer threat Harmful software that damages systems
- Security defense Blocks unauthorized network access
- Example of user protection Secret code that secures access
- From CIA Triad (Lesson 3 link) Ensuring data is always accessible
- Example of an attack Fake message designed to steal data
- Common threat actor A person who breaks into systems
- Target of most threats Information stored or processed in computers
12 Clues: Core topic Weakness that threats can exploit • Core topic Possible danger that may damage data • Security defense Blocks unauthorized network access • Common threat actor A person who breaks into systems • Example of an attack Fake message designed to steal data • Example of user protection Secret code that secures access • ...
Occupations (Security, Investigation & Law) 2013-02-20
Across
- “Baywatch” is a TV series about...
- A lawyer (in the US)
- He works at the police station.
- James Bond is an...
- He stops fires (2).
- Ally McBeal is a famous...
Down
- Withney Houston's famous movie: “The ...”
- He takes decisions in a court.
- She works at the police station.
- In the TV series ”CSI”, main characters are...
- He protects a person, place or thing from danger or attack.
- He stops fires.
- Sherlock Holmes is a...
- He works at the police station (2)
14 Clues: He stops fires. • James Bond is an... • He stops fires (2). • A lawyer (in the US) • Sherlock Holmes is a... • Ally McBeal is a famous... • He takes decisions in a court. • He works at the police station. • She works at the police station. • “Baywatch” is a TV series about... • He works at the police station (2) • Withney Houston's famous movie: “The ...” • ...
HUMAN RIGHTS 2020-11-12
Across
- the right to be employed
- tranquillity/non war
- the right to state your opinion
- same rights/fairness
- existence
- protection/assurance
- social equality
Down
- to own
- liberty
- the right to relaxation
- freedom from intrusion
- variety of behaviour/opinion
- freedom to have your own ideas
- non-discrimination
- philosophy based on faith
- formal learning
- soundness of body/mind
17 Clues: to own • liberty • existence • formal learning • social equality • non-discrimination • tranquillity/non war • same rights/fairness • protection/assurance • freedom from intrusion • soundness of body/mind • the right to relaxation • the right to be employed • philosophy based on faith • variety of behaviour/opinion • freedom to have your own ideas • the right to state your opinion
The right to bear arms 2021-05-06
At a concert 2018-10-18
Crossword 2025-01-27
Chapter 5 3KB 2022-03-08
Across
- bouwen
- flexibel
- samen
- verdienen
- stipt
- beveiliging
- verwarrend
- kapper
- tevreden
- veiligheid
- sociaal
- omringen
- timmerman
- beweging
- kok
- dienst
- kwetsbaar
- evenement
- gezondheidszorg
Down
- vol
- balanceren
- bezorgen
- bord
- vooruitgang
- protest
- vervuiling
- georganiseerd
- aanmoedigen
- productie
- zelfstandig
- oprichter
- duidelijk
- verkoper
- hoeveelheid
- gewoonte
- kantoor
- secretaresse
- fooi
- salaris
- ervaren
40 Clues: vol • kok • bord • fooi • samen • stipt • bouwen • kapper • dienst • protest • sociaal • kantoor • salaris • ervaren • bezorgen • flexibel • tevreden • verkoper • gewoonte • omringen • beweging • verdienen • productie • oprichter • duidelijk • timmerman • kwetsbaar • evenement • balanceren • vervuiling • verwarrend • veiligheid • vooruitgang • aanmoedigen • beveiliging • zelfstandig • hoeveelheid • secretaresse • georganiseerd • gezondheidszorg
Scene 3: Set 2 Society 2021-10-25
Across
- vammainen
- demokratia
- mielipide
- eläkeläinen (AmE)
- köyhyys
- vapaus
- uskonto
- arvo, arvostaa
- yhteisö
- eläkeläinen (BrE)
- kulttuuri
- nuoriso
- epätasa-arvo
- terveydenhoito
- vapaaehtoistyö
- sosiaaliturva
Down
- koulutus
- ympäristö
- enemmistö
- sukupuoli
- vähemmistö
- etninen tausta
- tasa-arvo
- yhteiskunta
- oikeus
- tasavalta
- sukupuoli
- talous
- hyvinvointi
- vero
- kansalainen
- velvollisuus
- hyväntekeväisyys
- asia, kysymys
- rasismi
35 Clues: vero • vapaus • oikeus • talous • köyhyys • uskonto • yhteisö • nuoriso • rasismi • koulutus • vammainen • ympäristö • enemmistö • sukupuoli • mielipide • tasa-arvo • tasavalta • sukupuoli • kulttuuri • demokratia • vähemmistö • yhteiskunta • hyvinvointi • kansalainen • epätasa-arvo • velvollisuus • asia, kysymys • sosiaaliturva • etninen tausta • arvo, arvostaa • terveydenhoito • vapaaehtoistyö • hyväntekeväisyys • eläkeläinen (AmE) • ...
Vocab Words 2022-04-06
Across
- writing paper
- possessive form of they
- revealed
- a place
- still and peaceful
- an airplane
- beyond
- contraction of they are
- unadorned,simple,common
- quiet order and security
Down
- the head of the school
- a rule of conduct
- a conjunction used in comparisons
- attentive to accuracy and detail
- in a fixed position
- glowed
- wholly or entirely
- at the time
- hurled
- a part of something
20 Clues: glowed • beyond • hurled • a place • revealed • an airplane • at the time • writing paper • a rule of conduct • wholly or entirely • still and peaceful • in a fixed position • a part of something • the head of the school • possessive form of they • contraction of they are • unadorned,simple,common • quiet order and security • attentive to accuracy and detail • a conjunction used in comparisons
Belonging 2013-10-10
Across
- Sanctuary
- Active hostility or opposition
- Mutual trust and friendship amongst people
- Companionship feeling
- Obligation
- Close bond between individuals
- The position of being alone
- Disagreement
- Peace
- All being of one mind
Down
- The feeling of pity for another's misfortune
- All one kind
- View points
- Official agreement
- The ability to comprehend something
- Taking out
- Rid of
- The state of being similar
- Being distant
- Safety
20 Clues: Peace • Rid of • Safety • Sanctuary • Taking out • Obligation • View points • All one kind • Disagreement • Being distant • Official agreement • Companionship feeling • All being of one mind • The state of being similar • The position of being alone • Active hostility or opposition • Close bond between individuals • The ability to comprehend something • Mutual trust and friendship amongst people • ...
Ch 8. Airplane Vocabulary 2023-03-21
26 Clues: a city • a seat • a seat • a plane • a runway • a ticket • on board • a flight • a country • a counter • the cabin • a terminal • a carry-on • an airport • a suitcase • a passport • an arrival • a passenger • a departure • a boarding pass • an announcement • a departure gate • the flight number • a concourse, hall • an airline company • the airport security
Spanish 2 Unit 2 Vocabulary 2020-10-30
Across
- ayudar
- móvil
- recibir
- recoger la basura
- tomar medidas para...
- la rutina
- en el hospital
- recaudar fondos para...
- concienciar acerca de
- recaudar donaciones/donativos para...
- reciclar
Down
- la seguridad
- flexible
- comunicar
- la disciplina
- ofrecer a + verbo
- sembrar árboles
- la autonomía
- en la despensa comunitaria
- ir/venir/llegar a trabajar
- preocuparse por
- la oficina
- compartir
- el teletrabajo
- mandar
25 Clues: móvil • ayudar • mandar • recibir • flexible • reciclar • comunicar • la rutina • compartir • la oficina • la seguridad • la autonomía • la disciplina • en el hospital • el teletrabajo • sembrar árboles • preocuparse por • ofrecer a + verbo • recoger la basura • tomar medidas para... • concienciar acerca de • recaudar fondos para... • en la despensa comunitaria • ir/venir/llegar a trabajar • ...
Komputery 2021-03-09
Across
- instalować (program)
- skasować
- przeglądać
- zapisać (np. dokument)
- ściągać (np. gry)
- ustawienia
- załącznik
- wpis (na forum, blogu)
- zawiesić się
- błąd
- wznawiać
- stworzyć
- dołączać
Down
- ....media – media społecznościowe
- pulpit, komputer stacjonarny
- informacje, dane
- przeglądarka
- wybrać
- kliknąć
- ....down zamykać, wyłączać komputer
- kropka (w adresie email)
- ....drive - USB
- plik
- bezpieczeństwo
- ....engine wyszukiwarka internetowa
- przenośny
- ...stick – pamięć USB
- @
28 Clues: @ • plik • błąd • wybrać • kliknąć • skasować • wznawiać • stworzyć • dołączać • załącznik • przenośny • przeglądać • ustawienia • przeglądarka • zawiesić się • bezpieczeństwo • ....drive - USB • informacje, dane • ściągać (np. gry) • instalować (program) • ...stick – pamięć USB • zapisać (np. dokument) • wpis (na forum, blogu) • kropka (w adresie email) • pulpit, komputer stacjonarny • ....media – media społecznościowe • ...
Financial Literacy Vocabulary Daymond,Colin 2017-11-29
Across
- bill credit
- loss insolvency
- costs damages
- account allocation
- Gross earnings Taxable income
- cash pay
- bank card debit
- earnings fee
- Creditcard bank card
- nest egg
- contract debit
- Net play net wage
- value-added tax
Down
- concern importance
- depart drop
- deposit saving account
- security money in the bank
- interest bank rate
- answer corollary
- deposit front money
- annual pay for government
- expense cost
22 Clues: cash pay • nest egg • bill credit • depart drop • earnings fee • expense cost • costs damages • contract debit • loss insolvency • bank card debit • value-added tax • answer corollary • Net play net wage • concern importance • account allocation • interest bank rate • deposit front money • Creditcard bank card • deposit saving account • annual pay for government • security money in the bank • ...
UNLOCKED 1 2019-11-26
Across
- overlock
- student
- perimeter
- key
- away, dispose
- easily, flexible
- flag, standard
- Y, millennials
- forbidden
- prepare, steel
- disaster
- addendum
- table cushion, bank
- of worth, valuation
- relationship, bailment
Down
- buying, investment
- management system, access
- in the northern hemisphere, european
- security device, padlock
- of time, space
- contract
- of senior rank, consultant
- floor, mezannine
- conversation, chat
- or investigate, survey
- network, Instagram
26 Clues: key • student • overlock • contract • disaster • addendum • perimeter • forbidden • away, dispose • of time, space • flag, standard • Y, millennials • prepare, steel • easily, flexible • floor, mezannine • buying, investment • conversation, chat • network, Instagram • table cushion, bank • of worth, valuation • or investigate, survey • relationship, bailment • security device, padlock • management system, access • ...
fnaf 2023-09-02
Across
- william afton's oldest son
- chicken
- steals batteries
- fifth game
- fox
- bunnie
- william afrton
- possessed by two people
- mangle's gender
- parts of all funtime make up who
Down
- afton's daughter possesses who
- william afton's daughter
- calms funtime freddy down
- william afton's youngest son
- stole bonnie's face
- tiny helpful bear
- charlie possesses who
- bear
- rumored to be william afton's wife
- replaced foxy in security breach
20 Clues: fox • bear • bunnie • chicken • fifth game • william afrton • mangle's gender • steals batteries • tiny helpful bear • stole bonnie's face • charlie possesses who • possessed by two people • william afton's daughter • calms funtime freddy down • william afton's oldest son • william afton's youngest son • afton's daughter possesses who • replaced foxy in security breach • ...
Sol2_U1_8-9 2023-09-21
Across
- seisund, olek
- uskumatu
- pöördumatu,tagasivõtmatu
- võimetu
- maalima, värvima
- võimatu
- pimedus, sõgedus
- seade, seadeldis
- seljakott
- seletama, selgitama
- ette kujutama
- loeng
- lai
- kuular
- lubama, võimaldama
- lainepikkus
- analüüsima
- teadlane
Down
- ebamugav
- meelde jätma
- rahulolematu
- turvalisus, turva
- lahutamatu
- keeruline, peen
- kahvatu
- otsustama
- ülisuur
- juhtmeta
- erinev
- erinevus
- arenema, arendama
- lisama, kinnistama, omistama
- täiesti
33 Clues: lai • loeng • erinev • kuular • võimetu • võimatu • kahvatu • ülisuur • täiesti • ebamugav • uskumatu • juhtmeta • erinevus • teadlane • otsustama • seljakott • lahutamatu • analüüsima • lainepikkus • meelde jätma • rahulolematu • seisund, olek • ette kujutama • keeruline, peen • maalima, värvima • pimedus, sõgedus • seade, seadeldis • turvalisus, turva • arenema, arendama • lubama, võimaldama • seletama, selgitama • ...
GLG Edition Crossword Puzzle 2024-08-13
Across
- Guardian's dedication to clients
- Client empowerment
- Courtroom clerk
- Legal dispute over injury
- Legal Action
- Estate planning term
- Legal term for a wrongful act
- Asset protection strategy
- Legal evidence
Down
- Guardian's approach
- Financial security goal
- Legal document
- Consumer protection area
- Legal dispute resolution
- To win a case
- Legal professional
- another area of Guardian's expertise
- Part of a legal case
- Legal process for debts
- Legal dispute
20 Clues: Legal Action • To win a case • Legal dispute • Legal document • Legal evidence • Courtroom clerk • Client empowerment • Legal professional • Guardian's approach • Part of a legal case • Estate planning term • Financial security goal • Legal process for debts • Consumer protection area • Legal dispute resolution • Legal dispute over injury • Asset protection strategy • Legal term for a wrongful act • ...
Vocabulario 1.2 - a bordo del avión 2024-10-17
Across
- the aisle
- to wait for the departure
- the flight attendant(male)
- the bathroom
- the no smoking signal
- to leave late
- under the seat
- the flight crew
- on board the plane
Down
- to show the agent
- fastened
- to leave on time
- security
- to land
- the "little" window
- the seat belt
- to take-off
- the overhead compartment
- the runway
- to make a line
20 Clues: to land • fastened • security • the aisle • the runway • to take-off • the bathroom • the seat belt • to leave late • under the seat • to make a line • the flight crew • to leave on time • to show the agent • on board the plane • the "little" window • the no smoking signal • the overhead compartment • to wait for the departure • the flight attendant(male)
Gov Departments 2025-01-21
Across
- Housing
- Art🎨!
- Commerce
- Emergencies
- 1862
- Alaska
- (1935)
- Stocks
- Treasury
- (1933)
- (1953)
- 1953
- Tennessee
- Space
- 1965
- 1949
- Communications
Down
- Military
- Flight
- Ginnie Mae
- Head of DOD
- Fannie Mae
- Security
- Farms
- Freddie Mac
- Intelligence
- Quality of Food
- Federal Investigators
- 1/4 of Gov spending
- Highways
- Accounting
- 1870
- Weather
- Unified...
35 Clues: 1862 • Mail • 1953 • 1965 • 1870 • 1949 • Art🎨! • Farms • Space • Flight • Alaska • (1935) • Stocks • (1933) • (1953) • Housing • Weather • Military • Commerce • Security • Treasury • Highways • Tennessee • Ginnie Mae • Fannie Mae • Accounting • Unified... • Head of DOD • Emergencies • Freddie Mac • Intelligence • Communications • Quality of Food • 1/4 of Gov spending • Federal Investigators
LexiQuest: Crossword Odyssey 2023-12-06
14 Clues: Code translator • Language rules • Harmful software • more than one form • Unchangeable state • Data storage system • Placeholder for data • Concurrent execution • Step-by-step procedure • Function calling itself • Base 2 numbering system • Network security barrier • Memory address reference • Algorithm efficiency analysis
Admin Crossword Puzzle #2 2023-12-20
14 Clues: DMS • A bill • "Bates Me!" • Work biography • Outlook online • Visitors start here • ______ Records Center • Keep the chickens here • Chief Financial Officer • Chief Information Officer • A legally binding agreement • A negative balance (3 words) • Experienced, qualified, skillful • Application to report security incidents
Face Reading 2025-08-21
10 Clues: test trial • companion ally • strong feelings • facial gestures • factual reality • conduct actions • false statement • safety protection • focused awareness • skilled specialist
Global Media Culture 2024-09-30
12 Clues: exchange • exchange • mass media • inclusivity • convergence • human rights • media events • media companies • and translation • and translation • Security Council • and global film industry
Español para la Policía 2012-07-16
17 Clues: 300 • Kaput • Birth • Pounds • Surname • License • Security • The big guns • Registration • Your dad's mom • Not "not guilty" • An elephant's nose? • A single-edged blade • This will keep you warm • Reason for a trip to court • Speedy possibility for a ticket • What you never want to see in your rear-view mirror
Society & Aging 2015-11-14
Across
- a maximum number of cell divisions that normal cells undergo as typically measured in a laboratory dish
- prejudice or negative stereotypes about people based on chronological age
- the excess of social security payroll taxes collected over the amount paid out, including excess funds accumulated from prior years
- the federal government program that pays for acute health care for older people
- the predicted length of life usually from some specific point in time such as birth
- those people, usually women, who have obligations to care for children as well as older parents or in-laws
- a pension system, public or private, in which future retirement benefits owed are paid out of money saved up in advance
- a view holding that the more active people are, the more likely they are to be satisfied with life
- a rise in the average age of the population; alternatively, an increase in the proportion of the population made up of people over age 65
Down
- as applied to Social Security, a fair return to beneficiaries depending on how much they contribute to the system
- the intellectual ability to solve novel tasks or problems
- the medical specialty treating the diseases of old age
- rituals that mark major life events, thereby reinforcing shared norms about age grading
- people aged 65 to 74
- residential facilities for older adults that provide limited supportive care and permit a high degree of independence
- a group of people born within a bounded period of years, such as the baby boom generation
- legal responsibility for another person's welfare
- an individual's written statement specifying or limiting his or her medical treatment in a situation without hope of recovery
- temporary care for dependent older people to allow the caregiver some time off
- people aged 85 and older
20 Clues: people aged 65 to 74 • people aged 85 and older • legal responsibility for another person's welfare • the medical specialty treating the diseases of old age • the intellectual ability to solve novel tasks or problems • prejudice or negative stereotypes about people based on chronological age • ...
Betelihem Abeje 12/05/2024 2024-12-06
Across
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- security features that enable administrators to control who has access to the network
- testers who are paid to probe networks and report vulnerabilities
- allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- a document that describes the rules governing access to an organization’s information resources
- a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- attackers who do not report problems, but instead disseminate the information to other black hat attackers
- creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- WSUS is a server role that makes it possible for administrators to take control of Microsoft product updates a process called
- only backs up files that have changed since the last full backup
Down
- a Windows domain environment and provides mutual authentication
- to supply two or more types of authentication drawn from Knowledge, Possession, Inherence
- security features that enable what users can do after they are logged on to the network
- backs up the disk sector by sector to create an exact image of the disk’s contents
- is specially allocated disk area that holds information that is swapped back and forth from RAM to disk
- good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- The most widely used method for encrypting data
- creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- common tool used by many Linux administrators
- Most Linux distributions have a built-in firewall called
20 Clues: common tool used by many Linux administrators • The most widely used method for encrypting data • Most Linux distributions have a built-in firewall called • a Windows domain environment and provides mutual authentication • only backs up files that have changed since the last full backup • testers who are paid to probe networks and report vulnerabilities • ...
LTC IS IT FOR ME 2025-09-12
Across
- Safeguarding client information.
- The rate charged by a facility for a patient who is paying his own cost of care.
- When imposition of a penalty due to the asset transfer would deprive the client of Medical care such that the a/r’s health or life would be endangered,
- A managed care service delivery for the frail community-dwelling elderly,
- A person appointed by a court to be legally in charge of another affairs.
- Assets
- Health insurance for aged and disabled under Title XVIII of the Social Security Act.
- An individual who is blind or permanently and totally disabled who is unable to become self-supporting after age 18.
- An advocacy program mandated by the Older Americans Act and North Carolina General Statutes.
- A long-term care facility which provides 24 hour nursing care with a RN or LPN on duty at all times.
Down
- The owner of the property creates a life estate for themself, retaining the power to sell the property, with a remainder interest to someone else
- IMC must complete and mail informing the a/r of changes or adverse actions.
- To change ownership or title from one person(s) to another
- Principal place of residence owned by an a/r or a budget unit member
- The portion that a patient in long-term care is expected to pay.
- Irrevocable ______ A contract in which the terms cannot be altered.
- The period of ineligibility when client gives away or sells an asset
- Katie Beckett is referred to as ____ in North Carolina.
- current market value less any encumbrances
- A review of all factors of eligibility
- A computer printout listing the amount of an individual's Social Security benefits.
- The disregard of Social Security benefits when determining eligibility
- 5 years (60 months) from the starting point
23 Clues: Assets • Safeguarding client information. • A review of all factors of eligibility • current market value less any encumbrances • 5 years (60 months) from the starting point • Katie Beckett is referred to as ____ in North Carolina. • To change ownership or title from one person(s) to another • The portion that a patient in long-term care is expected to pay. • ...
Crossword Puzzle For CS 2025-03-30
Across
- – A copy of data stored in case the original is lost or damaged.
- – A list of trusted websites or emails that are safe to use.
- – Malware that locks files and demands payment to unlock them.
- – Installing the latest version of software to fix security issues.
- – Unauthorized access to sensitive information.
- – Unsolicited, often irrelevant emails or messages.
- – Malicious software that attaches to programs to spread and damage files.
- – A scam that tricks users into giving personal information.
- – A hidden way for hackers to access a computer system.
- – A network of infected computers controlled remotely by hackers.
- – A type of malware that replicates itself to spread to other computers.
- – A list of websites or emails that are considered unsafe or malicious.
- – A system that protects your computer from unauthorized access.
- – The process of encoding data to keep it safe from unauthorized access.
- – Fake software that scares users into downloading it.
- – Software that secretly records keystrokes to steal information.
- – Another name for Trojan Horse; malicious software pretending to be useful.
- – A software update that fixes bugs or security vulnerabilities.
Down
- – Verifying the identity of a user or system before granting access.
- – Software that secretly monitors and collects information from users.
- – Software that scans and removes viruses from your computer.
- – Malware disguised as legitimate software to trick users.
- – Software that displays unwanted advertisements on your computer.
- – A type of malware that hides the presence of other malicious software.
- – Redirecting users to fake websites to steal information.
- – A software used to detect and remove spyware.
- – Trickery used to manipulate people into giving out confidential information.
- – A security flaw that is exploited before the software is updated.
- – Gaining unauthorized control of a computer or account.
- – Software designed to harm your computer or steal data.
30 Clues: – Unauthorized access to sensitive information. • – A software used to detect and remove spyware. • – Unsolicited, often irrelevant emails or messages. • – Fake software that scares users into downloading it. • – A hidden way for hackers to access a computer system. • – Gaining unauthorized control of a computer or account. • ...
Unit 3 Network Threats and Vulnerabilities 2025-07-17
Across
- Software which records and transmits key strokes
- The use of fake websites to collect credentials from unsuspecting users.
- Directive access control that sets out the expectations and responsibilities for employees.
- Should be carried out yearly to ensure security systems are suitable and uptodate.
- A range of methods that prey upon human mistakes rather than digital systems.
- Types of attacks that change, damage or delete data and systems.
- Applied to systems to fix known problems.
- Uses a key to convert data into an unintelligible form.
- Appears as or is part of a legitimate file but is actually malicious code.
- determins which parts of an IP address should match or not for authorisation.
- A _ would allow unauthorised users access to something.
- The E in WEP (Something which should not be used anymore)
- Leaving discarded, infected, portable media in the open hoping someone will run it on a device.
- Following people closely through secured doors.
- Once in a system will spread automatically depending on its programming.
- The U in UAC
- Hackers can make use of these to gain access to systems and bypass security.
Down
- Checks incoming and outgoing traffic to ensure it is authorised based on credentials such as IP Addresses.
- Where an identity is disguised to appear as a trusted source.
- A type of attack when data is monitored and not changed.
- Using an authorised users credentials when they are already logged in.
- Anti Virus software keeps a record of known malicious code within this.
- Fake emails used to gain information and credentials from targets.
- This is what malware is short for.
- After we _ users, they are given authorised access.
- Requires human interaction to run.
- An attack that encrypts data until a payment is made.
- A type of attack that makes use of an exploit to bypass security measures.
- A denial of service attack that makes use of multiple devices.
29 Clues: The U in UAC • This is what malware is short for. • Requires human interaction to run. • Applied to systems to fix known problems. • Following people closely through secured doors. • Software which records and transmits key strokes • After we _ users, they are given authorised access. • An attack that encrypts data until a payment is made. • ...
internet safety crossword puzzle 2025-03-06
Across
- a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses
- rules of conduct for respectful and appropriate communication on the internet
- distribution of copyrighted material,
Down
- image-editing software
- Any crime done online
- someone who frequently makes negative comments about you online
- a packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server
- software designed to block access to a computer system until a sum of money is paid.
- texting someone online
9 Clues: Any crime done online • image-editing software • texting someone online • distribution of copyrighted material, • someone who frequently makes negative comments about you online • rules of conduct for respectful and appropriate communication on the internet • software designed to block access to a computer system until a sum of money is paid. • ...
CODE PINK REVIEW 2025-10-20
Across
- Where the HUGs tag is placed on the infant
- Parents are encouraged to look for these prior to relinquishing their child to that person
- The second word in section D of the Juvenile - Infant Security Policy
- People should only be coming into the NICU if they have a ___ to be there
- Families and patients are asked to ___ on the unit until the all clear is made
- The Nursing Abduction _____ is located in Policytech as well as in the downtime paperwork box
- The "Signing Out an Infant" function will allow infant/tag to _____ exit the HUGS monitored area (for example, if the infant is going to the OR)
- A hospital-wide "security alert"_____ will be made
Down
- The charge nurse will ____ roles and responsibilities for who will search, who will monitor doors, and who will remain as the contact person with the phone
- As you search room to room, you will signal that a room has already been searched by ____ the door
- To prevent a code pink, Hugs Tags are used on all non-intubated infants weighing ____ than 1200g
- Anyone entering the unit must be prepared to supply this prior to entry
- The Suspend ____ Alarm function should be used anytime the strap needs to be temporarily removed from the HUGs tag (if the strap is too tight or needs to be replaced)
- Who you call if a child is missing; 69111
14 Clues: Who you call if a child is missing; 69111 • Where the HUGs tag is placed on the infant • A hospital-wide "security alert"_____ will be made • The second word in section D of the Juvenile - Infant Security Policy • Anyone entering the unit must be prepared to supply this prior to entry • People should only be coming into the NICU if they have a ___ to be there • ...
STEM Jobs 2021-03-31
Across
- identifies potential threats and current security measures
- analyzes specimens in the lab
- analyze and decrypt information contained within cipher texts and encrypted data
- takes care of our pets when they are sick
- collects, organizes and analyzes opinions and data to solve problems and explore issues
- in charge of preserving and finding things like fossils
- survey ecosystems and assess their diversity
- avoids explosions in the lab through proper lab safety training
Down
- develops tech and medicine through innovation of new devices and equipment that improve health.
- takes care of you when you are sick
- works under the supervision of a doctor
- responsible for developing security systems using algorithms and cyphers to encrypt data
- prepare and dispense prescriptions
- experts in the contents that make up the Earth and other planets as well as what leads to their shapes
14 Clues: analyzes specimens in the lab • prepare and dispense prescriptions • takes care of you when you are sick • works under the supervision of a doctor • takes care of our pets when they are sick • survey ecosystems and assess their diversity • in charge of preserving and finding things like fossils • identifies potential threats and current security measures • ...
Consumer Loans 2021-03-16
Across
- creates additional lending opportunities for the credit union by providing a guarantee on non standard loans
- loan is not secured by collateral
- is an assigned estimated dollar value to a collateral
- is a revolving line of credit with overdraft protection
- security is tangible security as long as the credit union can determine value
- months is the minimum of steady employment
- a person who makes a formal application for a loan
- is a fixed period for which something is intended to last
Down
- is designed to make low cost loans available to first
- is a record of borrowers responsible repayment of debts
- does not follow rule or policy
- is to help members who are experiencing hardship
- is the interest rate for a whole year
- is the document that list KFCU as lienholder
14 Clues: does not follow rule or policy • loan is not secured by collateral • is the interest rate for a whole year • months is the minimum of steady employment • is the document that list KFCU as lienholder • is to help members who are experiencing hardship • a person who makes a formal application for a loan • is designed to make low cost loans available to first • ...
Series 63 Chapter 1 2024-04-30
Across
- designated state official who enforces provisions of USA
- any person engaged in effecting securities transactions for others or their own account
- typically firms or orgs that participate in large volume of trading daily
- individual who represents a broker-dealer
- this under USA means it is backed by a separate entity
- has AUM of $100MM or more & works for a registered investment company
- an individual or a legal entity
- an attempt to solicit a purchase or sale of a security for value
Down
- minimizes duplication of fed & state registration of securities & prevents fraud
- under USA this is the disposition of a security
- willful wrong-doing or deceit of a client
- protects investors & their interests when involved in a fiduciary relationship
- any person who engages in recommendations for compensation (ABC)
- any person who distributes securities for sale & receives proceeds
14 Clues: an individual or a legal entity • willful wrong-doing or deceit of a client • individual who represents a broker-dealer • under USA this is the disposition of a security • this under USA means it is backed by a separate entity • designated state official who enforces provisions of USA • any person who engages in recommendations for compensation (ABC) • ...
Crossword- Access control 2022-02-05
Across
- the flow of information between subject and object refers to
- Confirms and audits potential breaches by analyzing the security events.
- Simple security rule (“no read up “ rule) in BLP preserves
- One example of Single Sign-on technology
Down
- The term in access control for the verification that the user’s claimed identity is valid
- ______ list is the subject perspective view of the access control matrix.
- BIBA model enforces
- One technique comes under authentication by knowledge
- Credit card-based authentication comes under authentication by this factor.
- Common identity management technology
10 Clues: BIBA model enforces • Common identity management technology • One example of Single Sign-on technology • One technique comes under authentication by knowledge • Simple security rule (“no read up “ rule) in BLP preserves • the flow of information between subject and object refers to • Confirms and audits potential breaches by analyzing the security events. • ...
Crossword- Access control 2022-02-05
Across
- One technique comes under authentication by knowledge
- Simple security rule (“no read up “ rule) in BLP preserves
- Confirms and audits potential breaches by analyzing the security events.
Down
- ______ list is the subject perspective view of the access control matrix.
- One example of Single Sign-on technology
- Credit card-based authentication comes under authentication by this factor.
- Common identity management technology
- The term in access control for the verification that the user’s claimed identity is valid
- BIBA model enforces
- the flow of information between subject and object refers to
10 Clues: BIBA model enforces • Common identity management technology • One example of Single Sign-on technology • One technique comes under authentication by knowledge • Simple security rule (“no read up “ rule) in BLP preserves • the flow of information between subject and object refers to • Confirms and audits potential breaches by analyzing the security events. • ...
Homework 5th September 2023-09-04
Across
- The place or activity you do for your profession.
- A substance we use to make candles or sculptures.
- A collection of objects or art in a museum.
- A loud noise we use to alert people of danger.
- guard The person in charge of security in a place, like a museum.
- The person who drives a vehicle, like a train.
Down
- A device we use to cast light when it's dark.
- A place where they keep art or historical objects.
- The person who helps us when we get sick.
- The person who puts fires down.
10 Clues: The person who puts fires down. • The person who helps us when we get sick. • A collection of objects or art in a museum. • A device we use to cast light when it's dark. • A loud noise we use to alert people of danger. • The person who drives a vehicle, like a train. • The place or activity you do for your profession. • A substance we use to make candles or sculptures. • ...
Personnel in IT 2025-03-18
Across
- creates websites through the use of programming codes.
- monitors and maintains the system security.
- analyses system that have already been created and recommends upgrade of computer systems.
- creates and shares content using social media platforms.
- writes, tests and maintains application software.
Down
- create and maintain networks.
- attends to any hardware faults and malfunctions in the equipment.
- provides technical assistance to computer users who need help with a specific application.
- Develops applications that allow users to do various functions.
- designs, creates and maintains a database and is responsible for the security of that database.
10 Clues: create and maintain networks. • monitors and maintains the system security. • writes, tests and maintains application software. • creates websites through the use of programming codes. • creates and shares content using social media platforms. • Develops applications that allow users to do various functions. • ...
Vocabulario de Viajes 2014-10-26
Across
- passport
- electronic ticket
- form of identification
- to land
- boarding pass
- metal detectors
- customs
- direct flight
- suitcase
- buy a ticket
- early
- departure time
- to form a line
- late
- gate
Down
- carry on
- passenger
- ticket
- security guards
- to take off
- to pack a suitcase
- full flight
- flight crew
- time
- flight schedules
- below
- on board
- luggage
- flight attendants
29 Clues: time • late • gate • below • early • ticket • to land • customs • luggage • carry on • passport • suitcase • on board • passenger • to take off • full flight • flight crew • buy a ticket • boarding pass • direct flight • departure time • to form a line • security guards • metal detectors • flight schedules • electronic ticket • flight attendants • to pack a suitcase • form of identification
TTec Crossword Puzzle 2018-02-09
Across
- healthcare project
- ttec winter party
- burning car
- bottled water
- disinfecting wipes
- ttech home page
- building dentist
- spirit day
- inexpensive merchandise
- red and white
Down
- current guessing game
- Laura's dog has this
- off the clock but at work
- username and password
- ttec main street
- approve paid time off
- main ttechu course
- champion national bird
- bodyguard
- hotel
- schedule visualization
- space car
22 Clues: hotel • bodyguard • space car • spirit day • burning car • bottled water • red and white • ttech home page • ttec main street • building dentist • ttec winter party • healthcare project • main ttechu course • disinfecting wipes • Laura's dog has this • current guessing game • username and password • approve paid time off • champion national bird • schedule visualization • inexpensive merchandise • ...
Convert nouns to character adjectives 2020-11-24
Across
- Reliability
- Pessimism
- Security
- Sadness
- Originality
- Sympathy
- Self
- Nervousness
- Forgiveness
- Tenacity
- Wisdom
- Sociability
- Violence
- Stability
- Kindness
- Music
- Loyalty
- Passion
- Mood
- Practicality
- Response
- Shyness
- Possession
Down
- Temperament
- Patience
- Flexibility
- Manipulation
- Resource
- Optimism
- Trust
- Stubbornness
- Intuition
- Compromise
- Persuasion
- Secret
- Suspicion
- Trust
- Diplomacy
- Laziness
- Progression
- Jealousy
41 Clues: Self • Mood • Trust • Trust • Music • Secret • Wisdom • Sadness • Loyalty • Passion • Shyness • Patience • Security • Resource • Optimism • Sympathy • Tenacity • Violence • Kindness • Laziness • Jealousy • Response • Pessimism • Intuition • Suspicion • Stability • Diplomacy • Compromise • Persuasion • Possession • Temperament • Flexibility • Reliability • Originality • Nervousness • Forgiveness • Sociability • Progression • Manipulation • Stubbornness • Practicality
asd 2016-05-09
Across
- mode
- mašīna
- dektetīvs
- biznesmenis
- kalkulācija
- zinātne
- lauksaimniecība
- konstrukcija
- sataisīt
- dizains
- žurnālists
- tūrisms
- inžinierija
- tīrītājs
- izglītība
- dizaineris
- dīleris
- industrija
- politika
- advokāts
- finanses
Down
- ķirurgs
- biznes
- aizsardzība
- tehniķis
- mehāniķis
- mēdiji
- psihologs
- likums
- informācija
- komunicēt
- gids
- sports
- tehnoloģija
- analīze
- eksperiments
- rīki
- komiķis
- medikamenti
- ideja
- zemnieks
41 Clues: mode • gids • rīki • ideja • biznes • mašīna • mēdiji • likums • sports • ķirurgs • zinātne • analīze • dizains • tūrisms • komiķis • dīleris • tehniķis • sataisīt • tīrītājs • zemnieks • politika • advokāts • finanses • mehāniķis • dektetīvs • psihologs • komunicēt • izglītība • žurnālists • dizaineris • industrija • aizsardzība • biznesmenis • kalkulācija • informācija • tehnoloģija • inžinierija • medikamenti • konstrukcija • eksperiments • lauksaimniecība
Unit 5 (Grade 11) 2020-11-14
Across
- лечить
- страхование
- с высокой стоимостью
- пособие
- вдовы
- однако, хотя
- бедность
- недостаток, дефицит
- давать право на что-либо
- пенсия
- частный
- выгода
- несмотря на
- пенсионеры
Down
- доступный
- испытывать, переносить
- обеспечивать, предоставлять
- социальное обеспечение
- доход
- зарплата
- безработный
- с низкой стоимостью
- требовать
- ущерб
- пока; в то время, как
- работодатель
- работник
- безопасность
- инвалидность
- пожилые люди
- взнос
31 Clues: доход • ущерб • вдовы • взнос • лечить • пенсия • выгода • пособие • частный • зарплата • бедность • работник • доступный • требовать • пенсионеры • страхование • безработный • несмотря на • однако, хотя • работодатель • безопасность • инвалидность • пожилые люди • с низкой стоимостью • недостаток, дефицит • с высокой стоимостью • пока; в то время, как • испытывать, переносить • социальное обеспечение • давать право на что-либо • ...
Anniversary 2020-09-30
Across
- suds on the sand
- security
- Abel's aboard
- pelican?
- joyous 10/12
- covers a rock if it doesn't get cut
- 8 per week
- home for a week
- rolling fiesta
- spins notes
- family steps
Down
- rock out
- i just called to say
- thanks Janice!
- penthouse
- universally recognized official
- tribal named model
- prematurely recessed
- water spot
- written in the sand
- ______ with love
- under the sea
22 Clues: rock out • security • pelican? • penthouse • water spot • 8 per week • spins notes • joyous 10/12 • family steps • Abel's aboard • under the sea • thanks Janice! • rolling fiesta • home for a week • suds on the sand • ______ with love • tribal named model • written in the sand • i just called to say • prematurely recessed • universally recognized official • covers a rock if it doesn't get cut
Hamburg Gaming crossword 2023-02-17
Across
- big win
- name of property
- and beverage
- _______ service center
- keeps us safe
- "show me the _____"
- ____ machine
- responsible for promotions
- biggest guestpath department
Down
- your time keeping system
- behind the bars
- need for access
- blue ribbon _____
- floor attendants are in this department
- ______ north club
- scratch off ticket
- ticket that comes from a slot machine
- watches over us
- your self-service system
- gaming facility
20 Clues: big win • and beverage • ____ machine • keeps us safe • behind the bars • need for access • watches over us • gaming facility • name of property • blue ribbon _____ • ______ north club • scratch off ticket • "show me the _____" • _______ service center • your time keeping system • your self-service system • responsible for promotions • biggest guestpath department • ...
GAME 2021-10-06
Across
- small
- having to do with country
- become less/make less
- endurance
- something in circulation like money
- fond of fighting, warlike
- group of five
- one of two things alike
Down
- turn aside through fear
- act of choosing
- make worse
- skill art
- cause to become friends again
- agreement; understanding
- safety; protection
- spotless; without a stain
- cowardly
- made up
- occur between/ come in between
- noticeable
20 Clues: small • made up • cowardly • skill art • endurance • make worse • noticeable • group of five • act of choosing • safety; protection • become less/make less • turn aside through fear • one of two things alike • agreement; understanding • having to do with country • spotless; without a stain • fond of fighting, warlike • cause to become friends again • occur between/ come in between • ...
08 en el aereopuerto 2024-12-18
Across
- – Destination
- – To land
- – Waiting room
- – To board
- – Ticket
- – Entertainment
- – Airplane
- – in-flight
- – Departure
- Dutyfree
- – To wait
- – To travel
- – Train
- – Airline
- – Reservation
- – gate
Down
- – check-in
- – Suitcase
- – Sala VIP
- – Vacation / Holidays
- – Flight attendant
- – Customer service
- – Security
- – Pilot
- – To take off
- – Adventure
- – Airport
- – Taxi
- – Rest / Relaxation
- – Trip
30 Clues: – Taxi • – Trip • – gate • – Pilot • – Train • – Ticket • Dutyfree • – To land • – Airport • – To wait • – Airline • – check-in • – Suitcase • – Sala VIP • – To board • – Security • – Airplane • – in-flight • – Departure • – Adventure • – To travel • – Destination • – To take off • – Reservation • – Waiting room • – Entertainment • – Flight attendant • – Customer service • – Rest / Relaxation • – Vacation / Holidays
28 2025-03-02
Across
- News article title
- Medium of exchange
- Time off
- Record of past events
- Expert in plants
- Plane arrival
- Story writer
- Personal space
- Leisure traveler
- Risky business
- Protection from harm
- Pedaled transport
- Mental treatment
Down
- Legal agreement
- Store buyer
- Mental strength
- Unexpected riches
- Safe keeping
- Stored electronically
- Equal distribution
- Goods transportation
- Beauty care routine
- Business leader
- Plan for success
- Item transport
25 Clues: Time off • Store buyer • Safe keeping • Story writer • Plane arrival • Personal space • Risky business • Item transport • Legal agreement • Mental strength • Business leader • Expert in plants • Plan for success • Leisure traveler • Mental treatment • Unexpected riches • Pedaled transport • News article title • Medium of exchange • Equal distribution • Beauty care routine • Goods transportation • ...
De viaje 2022-11-06
Across
- customs
- tour guide
- el avión to go by plane
- leave
- un viaje to go on a trip
- mountain
- restaurant
- de credito credit card
- key
- flight
Down
- un coche rent a car
- passenger
- aisle
- aisle
- place
- room
- de seguridad security
- en un hotel stay at a hotel
- island
- y vuelta round-trip
- monumentos to see monuments
- dinero withdraw money
- airline
- una maleta to pack a suitcase
- airport
25 Clues: key • room • aisle • aisle • place • leave • island • flight • customs • airline • airport • mountain • passenger • tour guide • restaurant • y vuelta round-trip • un coche rent a car • de credito credit card • de seguridad security • en un hotel stay at a hotel • el avión to go by plane • dinero withdraw money • una maleta to pack a suitcase • un viaje to go on a trip • ...
M6 Unit 9 2025-12-23
Across
- – put in, save
- – borrower, owing party
- – collecting money, seeking funds
- – return, extra payment
- – security, guarantee, asset
- – guarantee, assurance
- – financial plan, spending plan
- – funds, assets, investment
Down
- – home loan, property loan
- – payment, part payment
- – ownership value, net value
- – asset selling, closing down
- – insolvency, financial failure
- – lender, loan provider
- – presenting, proposing
- – borrowing, credit, advance
- – project, enterprise
- – protect, reduce risk
- – take out, remove
- – financial aid, funding, allowance
20 Clues: – put in, save • – take out, remove • – project, enterprise • – protect, reduce risk • – guarantee, assurance • – payment, part payment • – lender, loan provider • – borrower, owing party • – presenting, proposing • – return, extra payment • – home loan, property loan • – funds, assets, investment • – ownership value, net value • – security, guarantee, asset • – borrowing, credit, advance • ...
Crossword 4 2015-06-01
Across
- A form of load balancing which hands out tasks in a repeating non-priority sequence
- Unified Thread Management
- A security stance based on a repeating process of locating the least secure element of an infrastructure and securing it
- A detection method where all traffic or events that fail to match the normal baselines are considered abnormal and potentially malicious
- Access Control List
- Similar to Defense in Depth, in that it supports multiple layers but unlike it in that it uses a different security mechanism at each of the layers
- A technique of storing or copying log events to a central logging server
- The maximum communication or transmission capacity of a network segment
- A detection method where all traffic or events that match an item in the database is considered abnormal and potentially malicious
- A notification from a firewall that a specific event or packet was detected
- A hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic
Down
- A detection method where all traffic or events that fail to match defined normal are considered anomalies and potentially malicious
- Technique of load balancing that operates by sending the next ransaction to the firewall with the least current workload
- The principle that for an organization’s security policy to be effective, everyone must be forced to work within it and follow its rules
- A written expression of an item of concern and one or more actions to take when the item of concern appears in traffic
- A means of providing faster access to static content for external users accessing internal Web servers
- An organizations’ filtering configuration: What should be allowed and what should be blocked
- An event that does not trigger an alarm but should have
- An event that triggers an alarm but should not have
- Write-once read-many form of storage device
20 Clues: Access Control List • Unified Thread Management • Write-once read-many form of storage device • An event that triggers an alarm but should not have • An event that does not trigger an alarm but should have • The maximum communication or transmission capacity of a network segment • A technique of storing or copying log events to a central logging server • ...
Technologic Revolution Crossword 2 2018-10-13
Across
- used to be on CD's, now on spotify and Itunes
- cashiers, factory works, teachers, and much more are losing their _____
- what companies do to promote something. Used to be on billboards or flyers, now online on in forms or pop ups
- Where people are learning instead of going to an actual school. Teachers are losing their jobs because of this
- when people get past your passwords and security and look into your device they are invading your ____
- to do this people used to write letters or send postcards, now they text, facetime, skype, or email
- used to give directions on paper but now is an app on phones
- what you are doing when you buy items. Can be online or physically
- a device that contains all your information that you carry around with you
- this lists all that you have searched on a device
- stuff on your phone that makes your life easier; calendar, calculator, instagram, snapchat.
- Articles that told you important events of the world. Used to be on paper
Down
- people who pretend to be someone else to attract other people
- vehicles that get people from place to place
- negative and hurtful comments made online by a person
- a technology company that is used instead of looking in encyclopedias to find information
- a change in government or people's point of view
- the apps where people post pictures, send videos, and talk to friends
- cameras, locks, and lights are used to protect homes, buildings, and places
- computers that are portable
- people who are able to get past the security and codes of you devices are get your information
- the transfer of money online or physically
- people used to go to cinemas to watch this but now they just go on Netflix or Hulu
- people go to the doctor to check this. Our addiction to technology sometimes affects this.
24 Clues: computers that are portable • the transfer of money online or physically • vehicles that get people from place to place • used to be on CD's, now on spotify and Itunes • a change in government or people's point of view • this lists all that you have searched on a device • negative and hurtful comments made online by a person • ...
Semester 2 Vocabulary 2024-05-09
Across
- Interest calculated only on the original amount you borrowed or deposited.
- Health insurance for people who are 65 or older, certain younger people with disabilities, and people with End-Stage Renal Disease (ESRD).
- The amount of money you have in your account after adding deposits and subtracting withdrawals.
- The original amount of money you invest or borrow.
- Income or organizations that don't have to pay taxes.
- The age when you can get your full Social Security benefits.
- Something that happens once every year.
- Money from the government to help retirees, people with disabilities, and survivors.
- Money you put into an account before paying taxes, often for retirement.
- Something that happens four times a year, every three months.
- When you work less or in a different way than before, but you're not fully retired.
Down
- Something that happens twice a year.
- The percentage of your principal that you either pay or earn as interest over time.
- Points you earn based on your work history and earnings, which determine your Social Security benefits.
- The date when you can take out your money from an investment or loan.
- A special bank account where you deposit money for a set period, and in return, you earn a fixed amount of interest.
- When you stop working, usually at an older age, and rely on savings and benefits for income.
- Money you invest after paying taxes on it.
- A way to measure how much money you'll make from an investment over a year, including compound interest.
- Something that happens every day.
- A special account where you save money for retirement, and sometimes you get tax benefits.
- Interest calculated on both the original amount and the accumulated interest.
- Investment earnings that you don't pay taxes on until you take the money out, usually in retirement accounts.
- Money taken out of your paycheck to fund Social Security and Medicare.
24 Clues: Something that happens every day. • Something that happens twice a year. • Something that happens once every year. • Money you invest after paying taxes on it. • The original amount of money you invest or borrow. • Income or organizations that don't have to pay taxes. • The age when you can get your full Social Security benefits. • ...
Cybersecurity Awareness Month 2024-10-17
Across
- When sensitive information is exposed after a security failure, it’s a data ______.
- Always ______ your software to the latest version to fix bugs and stay secure!
- Always use a password _______ to store and organize your passwords safely!
- Bad software installed on a computer to damage or harm it. Examples include viruses, worms, trojans, spyware, ransomware, etc.
- __________ is a type of malware that locks your files and demands payment to unlock them.
- When malicious threat actors disguise themselves as a trusted source to deceive you, it's called ________.
- Technology that scrambles your data so it can only be read by those authorized is called __________.
- When malicious threat actors create a fake email or website to trick you it is called ________.
- Technology that enables machines to mimic human intelligence, learning, and decision-making is known as __.
Down
- When hackers pretend to be a trusted entity to manipulate you into giving up sensitive information or access unauthorized systems, it’s called ______ engineering.
- A fake video, image, or audio created using AI to impersonate someone is known as a ________.
- A ________ is a security system that blocks unauthorized access to your computer or network.
- Always use long and unique _________ for each of your accounts.
- Leaving a tempting item, like a free download or USB, to trick people into installing malware is called _______.
- If you receive a strange text message asking for personal info, it might be ________ (SMS Phishing).
- When bad threat actors use a QR code to trick you into visiting a malicious site, it’s called ________.
- Multi-factor Authentication, or ___, helps protect your account by adding another layer of security.
- Open source ____________ is when cybercriminals exploit publicly available information to build a profile about a target.
- A phone call that tricks you into sharing personal information is a form of voice phishing called _______.
- A ___ is a private network that makes your internet activity anonymous (abbreviation).
20 Clues: Always use long and unique _________ for each of your accounts. • Always use a password _______ to store and organize your passwords safely! • Always ______ your software to the latest version to fix bugs and stay secure! • When sensitive information is exposed after a security failure, it’s a data ______. • ...
3-7 2024-11-22
Across
- Armitage was heavily injured while flying into this country
- The flat, origami-wrapped object Molly gives Case
- The operation that Corto was involved in, which caused his severe injuries (two words)
- The system used to access and hack information protected by security
- A type of painkiller used by Molly after an injury
- Leader of the group from # across/down (two words)
- Surgical implant in the skull, mentioned as a common feature
- A vat-grown ____ assassin
- high-tech deck Case uses (two words)
- City where the Panther Moderns were involved
- Molly's weapons implanted in her fingers
- High-security location at the tip of the spindle
- The substance that Armitage claims is slowly dissolving inside Case’s arteries
- AI stands for this (two words)
Down
- Subculture involved in surreal violence and media manipulation (two words)
- Short term for a substitute used to replace human senses in cyberspace (two words)
- Case’s former mentor (two words)
- Armitage is diagnosed with this mental disability
- The city where Molly and Case share a breakfast in the text
- Term used to describe the simulated representation of cyberspace
- The device used to connect the Flatline’s construct to Case’s system
- The city in Turkey where Case and Molly are traveling to
- The axis of the Sprawl that includes Boston and Atlanta
- Virtual reality term, used when "keying in"
- Technology company referenced as the source of security systems (two words)
- This term refers to the technology allowing a person's consciousness to be replicated in cyberspace
- The city where Case and the Flatline access Armitage’s database
- Molly's black storage device
- Molly's specific type of suit worn for protection and blending in
- Thief who stole an AI
- A term used for an electronic entity that mimics a deceased person's skills and behavior
31 Clues: Thief who stole an AI • A vat-grown ____ assassin • Molly's black storage device • AI stands for this (two words) • Case’s former mentor (two words) • high-tech deck Case uses (two words) • Molly's weapons implanted in her fingers • Virtual reality term, used when "keying in" • City where the Panther Moderns were involved • High-security location at the tip of the spindle • ...
SAPM CROSSWORD 2022-07-01
Across
- In order to diversify, we look for security returns that are less than 1 ---------------
- One of the researchers/economists who developed the CAPM model
- The ------------- which represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return is called efficient curve.
- A ----------------trading strategy is where you can short similar number of shares of the same or similar stock which you are long so as to lock-in the profits.
- The risk that is ---------------to the firm is diversifiable
- A conditional market order to buy stock if it increases to a specified price
- The other name for utility curve is ------------------curve.
- The regression line of a market model is the security ----------line
- The pure arbitrage opportunity is where an investor earns riskless ----------------without making any net investment
Down
- --------------is a market equilibrium model (write in short form)
- --------------------is the sensitivity of asset returns to market returns.
- The capital market line is an efficient line where ------------------ lending and borrowing are allowed and the tangent portfolio on the efficient frontier of risky assets is the market index.
- In the absence of ------------------- markets, there will be liquidity risk.
- The economist who developed a macroeconomic-based factor model
- On any type of order, instead of paying 100% cash, investors can borrow a portion of the transaction and use the stock as collateral, which is called --------------------transactions
- Variance of a portfolio with equi-proportionate investments in each security is approximately equal to the average ------------------as the number of securities becomes very large
- Researchers came up with the ------------ index model to reduce the estimation errors in the Mean-variance model
- It is the basis of one of the factors of the Fama-French 5 factor model
- The economist who introduced the factor momentum in Fama-French 3 factor model
- The other name for non-diversifiable risk is -------------------------risk
20 Clues: The risk that is ---------------to the firm is diversifiable • The other name for utility curve is ------------------curve. • One of the researchers/economists who developed the CAPM model • The economist who developed a macroeconomic-based factor model • --------------is a market equilibrium model (write in short form) • ...
1600 M7 a 2025-10-31
Across
- A dispute- a disagreement over the interpretation of a term in an existing collective agreement.
- Risk follows '____' This means that a loss to goods falls upon the party that owns at that time.
- Builers' ____ legislation protects unpaid contractors, subcontractors, workers, adn suppliers of material in regard to improvements to land.
- Implied ______ that the goods are free of liens etc.
- A type of dispute between employer and worker for ________.
- Fraudulent ________ is the transferring of assest to a third party to keep them safe from creditors.
- Creditors may protect themselves by taking some security for a loan by requiring a pledge of _____ property.
- Legal procedure wherby a court appointed trustee takes control of a debtor's assets and administers them for creditors.
- An ______ relationship involves a person called the XOXOXO acting on behalf of anohter, called the principat, to arrance a contract.
- Implied ______ that the seller has the rights to sell the goods.
Down
- _________ional dispute. IE between two unions.
- The Personal Security Act- this regulates the creation and registration of security interests in all personal property.
- This test used by court to determine worker status. How the worker fits in with company. IE expect to join union or not.
- Creditors may require a _____ when a loan is made. (By another person' ie co signer
- Fraudulent ________ is where an insolvent debtor pays off one creditor to the detriment of another.
- This test used by court to determine worker or contractor status.
- The inability to pay one's debts as they become due.
- A type of dispute employer/employee where disputing the terms that are to be included in their collective agreement.
- The relationship between teh principal and third part is called a xoxox.
- '____' terms. Unless parties have specified otherwise, certain conditions and warranties are _____ as part of contract.
- of goods This Act applies to the sale or lease of goods. Space between each word in crossword.
21 Clues: _________ional dispute. IE between two unions. • The inability to pay one's debts as they become due. • Implied ______ that the goods are free of liens etc. • A type of dispute between employer and worker for ________. • Implied ______ that the seller has the rights to sell the goods. • This test used by court to determine worker or contractor status. • ...
CODE NAME: RODNEY 2023-12-17
13 Clues: "happy" • cereal IT • driving advice • fluffy is ____ • secret identity • empty nest child • supposedly green • made warm for you • all about the ears • reluctant specialty • escape from the zoo • small rodent moniker • famous ice cream mistake
iSEC Dimensions, CrossWord 2024-12-08
Across
- characteristic of a system to operate under adverse conditions.
- An international standard for information security management systems.
- The set of guidelines that define security practices for an organization
- The practice of preventing unauthorized data exfiltration from the cloud.
- Ensuring the confidentiality, integrity, and availability of data is called.
- The concept of ensuring data is available when needed
Down
- A comprehensive plan that ensures the continuation of operations during a crisis
- Blue team are integral part of
- A strategy to prevent data loss in cloud environments
- A tool used to monitor and log activities in a cloud environment.
- The method of isolating resources for a single tenant in a cloud environment.
- A type of malware attack that specifically targets cloud resources.
- The backbone of secure communication online.
- A legal requirement for companies processing EU citizen's data.
- A system of access control where users must provide more than one form of authentication
15 Clues: Blue team are integral part of • The backbone of secure communication online. • A strategy to prevent data loss in cloud environments • The concept of ensuring data is available when needed • characteristic of a system to operate under adverse conditions. • A legal requirement for companies processing EU citizen's data. • ...
CROSSWORD 2024-10-09
Across
- A list of approved entities allowed access to a system.
- A vulnerability that is exploited before the vendor knows about it
- Processes for responding to and managing security incidents.
- Information used to verify a user’s identity, like a password.
- A network of compromised computers controlled by a hacker.
- Disguising communication from an unknown source as being from a known one.
- A code injection technique used to attack databases.
- Measures to protect physical assets and locations from unauthorized access.
- The state of being unidentifiable within a network or system.
- A symmetric-key algorithm for data encryption
Down
- A legal requirement to inform affected individuals after a data breach.
- A fixed-size string generated from data to ensure integrity.
- Dividing a computer network into smaller parts for security.
- An entity that issues digital certificates for secure communications.
- Software intended to harm or exploit any programmable device.
15 Clues: A symmetric-key algorithm for data encryption • A code injection technique used to attack databases. • A list of approved entities allowed access to a system. • A network of compromised computers controlled by a hacker. • A fixed-size string generated from data to ensure integrity. • Dividing a computer network into smaller parts for security. • ...
Module 6: International Law 2024-11-20
Across
- Direct sales between a domestic manufacturer and a foreign buyer.
- Prohibits bribing foreign officials to gain business advantages.
- General Agreement on Tariffs and Trade, aimed at reducing trade barriers.
- Items requiring a license for export due to security concerns.
- Limits on the quantity of specific goods allowed to be imported.
- Permits the President to regulate the export of military-related items.
- Prohibition of certain goods from entering a country.
- Government acquisition of private businesses, with or without compensation.
Down
- Selling goods below market value in a foreign country to drive out competition.
- Taxes imposed on imported goods.
- World Trade Organization, resolves trade disputes among member countries.
- Balances free trade with national security requirements.
- Requires U.S. courts to avoid interfering in foreign affairs decisions.
- Protects U.S. investors from losses due to political risks overseas.
- The process of returning profits from a foreign country to the home country.
15 Clues: Taxes imposed on imported goods. • Prohibition of certain goods from entering a country. • Balances free trade with national security requirements. • Items requiring a license for export due to security concerns. • Prohibits bribing foreign officials to gain business advantages. • Limits on the quantity of specific goods allowed to be imported. • ...
Can you remember the vocabulary? 2025-11-26
Across
- To enter somewhere you are not meant to ener, usually with force.
- A man or woman etc. made out of wood or stone
- When you have to leave immediately
- Something on a wall that tells you what you can or can't do or that simply gives information.
- When a small child shouts and screams and rolls around on the floor, they have a '_______'
- Guard a man or a woman whose job is to make sure that things are safe
Down
- Doesn't have a price, very important/rare/valuable.
- To find
- To show where something is using your index finger.
- The platform on the outside of a building
- Someone who dreams a lot and doesn't work hard
- The action of crime or stealing (h_ _ _ _).
- Doesn't want to work hard. Marinette thinks Henri is '________'
- Usually at the Louvre, security is very '_______'
- When you put your hand on a surface.
15 Clues: To find • When you have to leave immediately • When you put your hand on a surface. • The platform on the outside of a building • The action of crime or stealing (h_ _ _ _). • A man or woman etc. made out of wood or stone • Someone who dreams a lot and doesn't work hard • Usually at the Louvre, security is very '_______' • ...
TCR Puzzle 2015-12-22
TCR Puzzle 2015-12-22
Terrorism 2023-04-03
Across
- unlawfully taking an aircraft by force to use it for one's own purposes.
- D__ __ __ __ __ __ __ __ __ and Diplomacy are ways to maintain peace and security.
- We need to be v__ __ __ __ __ __ __ to prevent attacks from happening.
- T__ __ __ __ Defence and SGSecure are ways to create deterrence.
- D__ __ __ __ __ __ __ __ __ to daily activities (No normal life)
- the victims of terrorist attacks.
- Terrorist attacks can happen a__ __ __ __ __ __ __ and anytime.
- D__ __ __ __ __ __ __ and disunity (consequences of terrorism).
- Loss of lives and D__ __ __ __ __ __ __ __ __ __ of property
Down
- All passengers and crew on the flight s__ __ __ __ __ __ __ the hijack of SQ117.
- I__ __ __ __ __ __ __ __ __ __ __ __ due to security measures.
- B__ __ __ __ __ __ __ __ and multilateral relationships are ways to create diplomacy.
- C__ __ __ __ __ __ __ exercises and practices to keep us on our toes are important to respond to attacks.
- S___________________, USA, Norway are the three countries that we have seen experience terrorist attacks.
14 Clues: the victims of terrorist attacks. • Loss of lives and D__ __ __ __ __ __ __ __ __ __ of property • I__ __ __ __ __ __ __ __ __ __ __ __ due to security measures. • Terrorist attacks can happen a__ __ __ __ __ __ __ and anytime. • D__ __ __ __ __ __ __ and disunity (consequences of terrorism). • T__ __ __ __ Defence and SGSecure are ways to create deterrence. • ...
SASE 2024-09-30
Across
- Region which recorded the highest growth rate in SASE market in 2023.
- Component of Access Secure ensuring Zero Trust Network Access.
- A lightweight application to be installed on end devices for Sangfor Access Secure.
- A solution that combines network and security functions together into a cloud delivered service.
- Eliminates the performance bottlenecks of legacy IPSec VPNs.
- Data protection capability which is part of Access Secure Platform.
- A legacy remote access solution exploited frequently by malicious users.
Down
- Access Secure module which is responsible for MFA, SSO and Adaptive Authentication.
- Sangfor Access Secure is _________ certified for biometric authentication.
- Component of Access Secure ensuring Secure Internet Access.
- Primary driver of SASE adoption among customers.
- Type of encryption for traffic flowing through Access Secure.
- Component of Access Secure ensuring Endpoint Security.
- Sangfor Access Secure has strongest ______ network in Asia Pacific.
14 Clues: Primary driver of SASE adoption among customers. • Component of Access Secure ensuring Endpoint Security. • Component of Access Secure ensuring Secure Internet Access. • Eliminates the performance bottlenecks of legacy IPSec VPNs. • Type of encryption for traffic flowing through Access Secure. • Component of Access Secure ensuring Zero Trust Network Access. • ...
mf crossword 2014-02-09
Across
- A measure of the volatility, or systematic risk, of a security or a portfolio in comparison to the market as a whole.
- The situation where a country's imports exceed its exports (acronym).
- Government body that regulates and monitors mutual funds in India (acronym).
- As per SEBI color coding, denotes high risk.
- Synonym for 'Security'.
- The rate at which banks borrow money from RBI.
- Synonym for your investments (equity, debt etc.)
Down
- Divide your investments across different investment options (equity, debt etc.)
- The company that maintains a mutual fund's assets.
- Nifty Stock market index comprising shares of 50 companies.
- Moving a fixed sum of money from one scheme to another at period intervals (acronym).
- Foreign Exchange (acronym)
12 Clues: Synonym for 'Security'. • Foreign Exchange (acronym) • As per SEBI color coding, denotes high risk. • The rate at which banks borrow money from RBI. • Synonym for your investments (equity, debt etc.) • The company that maintains a mutual fund's assets. • Nifty Stock market index comprising shares of 50 companies. • ...
SN43004FP Chapter 4.1 2022-10-19
Across
- Log that contains events logged by applications
- Event of significant problem, such as loss of data
- Centralize the collection and management of events from other computers
- Log that records general events related to applications, security, setup, and system
- Log that records application- or service-specific events
Down
- Log that contains events logged during setup / install
- Event describing the successful operation of a program or service
- Log that contains forwarded events from other servers
- Monitors the health of systems and troubleshooting
- Log that contains events logged by the OS or its components, such as the failure of a service
- Log that contains audit enabled events
- Event that is not significant but might indicate a possible future problem
12 Clues: Log that contains audit enabled events • Log that contains events logged by applications • Monitors the health of systems and troubleshooting • Event of significant problem, such as loss of data • Log that contains forwarded events from other servers • Log that contains events logged during setup / install • Log that records application- or service-specific events • ...
Mockstock 2024-09-16
Across
- A measure of the risk-adjusted return of a financial portfolio
- A system of social security contributions
- Stock market index that tracks 30 large public companies in the U.S.
- A company’s total earnings before taxes, interest, depreciation, and amortization
- The interest rate at which banks lend to each other.
- An investment strategy designed to reduce the risk of adverse price movements
Down
- An investment strategy focused on minimizing risk
- A security yielding no interest but issued at a discount
- A tax imposed on inheritances
- The maximum amount of loss a company can suffer without going bankrupt
- The use of borrowed money to increase potential return
- A market condition characterized by irrationally high asset prices
12 Clues: A tax imposed on inheritances • A system of social security contributions • An investment strategy focused on minimizing risk • The interest rate at which banks lend to each other. • The use of borrowed money to increase potential return • A security yielding no interest but issued at a discount • A measure of the risk-adjusted return of a financial portfolio • ...
Devo Delight 2021-04-12
Across
- Day after Cyber Monday (Two words)
- Center's planned gifts program (2 words)
- name of our printed member newsletter (2 words)
Down
- Quarterly webinar for Leadership Circle and Owls Club members (2 words)
- Center's automatic recurring donations program (2 words)
- What can you do with a match (3 words)
- Someone who has signed up to receive our emails but hasn't made a donation to the Center
- Someone who has made a donation to the Center
- The graphic sometimes on the Center's homepage that links to a donation form or petition
9 Clues: Day after Cyber Monday (Two words) • What can you do with a match (3 words) • Center's planned gifts program (2 words) • Someone who has made a donation to the Center • name of our printed member newsletter (2 words) • Center's automatic recurring donations program (2 words) • Quarterly webinar for Leadership Circle and Owls Club members (2 words) • ...
Caleigh- bullying crossword 2022-05-17
Across
- Mckenna was teasing Caleigh because of her purple hair
- Pam would get bullied by Tyson everyday because of her height
- Kalia was making fun of her brother because he didn't know the answer to a homework question
- Kate invites everyone except Paige to her birthday party and makes sure Paige knows about it
- front of the whole class
- JD was getting bullied because of his character on the online game
Down
- Kaylynn was making fun of DeeDee´s outfit on Friday
- What is the B of the 4 b´s of bullying
- John would constantly trip Morgan everyday
- what is the A in the 4 b´s of bullying?
- Abbie was spreading rumors around the school about lily because their friendship ended
11 Clues: front of the whole class • What is the B of the 4 b´s of bullying • what is the A in the 4 b´s of bullying? • John would constantly trip Morgan everyday • Kaylynn was making fun of DeeDee´s outfit on Friday • Mckenna was teasing Caleigh because of her purple hair • Pam would get bullied by Tyson everyday because of her height • ...
Caleigh- bullying crossword 2022-05-17
Across
- Mckenna was teasing Caleigh because of her purple hair
- Pam would get bullied by Tyson everyday because of her height
- Kalia was making fun of her brother because he didn't know the answer to a homework question
- Kate invites everyone except Paige to her birthday party and makes sure Paige knows about it
- front of the whole class
- JD was getting bullied because of his character on the online game
Down
- Kaylynn was making fun of DeeDee´s outfit on Friday
- What is the B of the 4 b´s of bullying
- John would constantly trip Morgan everyday
- what is the A in the 4 b´s of bullying?
- Abbie was spreading rumors around the school about lily because their friendship ended
11 Clues: front of the whole class • What is the B of the 4 b´s of bullying • what is the A in the 4 b´s of bullying? • John would constantly trip Morgan everyday • Kaylynn was making fun of DeeDee´s outfit on Friday • Mckenna was teasing Caleigh because of her purple hair • Pam would get bullied by Tyson everyday because of her height • ...
Crossword - Voltedge 2019-09-06
Across
- Portal to view security emergency contact and other security info
- Tool currently used for onboarding
- An R package that provides an elegant framework for building web apps using R
- Greek letter that denotes mean of a statistical distribution
- TCT Application access provisioning is done by?
- One of the focus areas of EHS
Down
- In CDA, if the probability is more than 60%, which color is assigned?
- Tool used for Rewards and Recognitions
- Which technology is used; searching from 41+ million tags?
- Company wide EHS system of record
10 Clues: One of the focus areas of EHS • Company wide EHS system of record • Tool currently used for onboarding • Tool used for Rewards and Recognitions • TCT Application access provisioning is done by? • Which technology is used; searching from 41+ million tags? • Greek letter that denotes mean of a statistical distribution • ...
MyVizo Crossword Puzzle 2023-09-19
Across
- find information and fun facts about your co workers
- the name of our intranet
- under tools & resources, the ___ tab gives you our current Information Security Standards
- we have 4 ____ that employee's can report to
- this are provides everything to help keep you healthy & busy
Down
- this department
- there are 19 ____ within the corporate tab on the intranet
- new employee's must go through this process when first employed
- need to fill out a change management or request for access? find this under tools and resources
- _____ got moved from daily emails to the intranet
10 Clues: this department • the name of our intranet • we have 4 ____ that employee's can report to • _____ got moved from daily emails to the intranet • find information and fun facts about your co workers • there are 19 ____ within the corporate tab on the intranet • this are provides everything to help keep you healthy & busy • ...
Black Hat 2024 2024-07-23
Across
- Malware attack
- Project _____ is Talos' cross-team effort to help protect Ukraine's power grid
- The slogan "Our job is your defense." belongs to which Cisco Security team?
- Online scam to steal personal information
- One of the largest and most infamous ransomware attacks
- Bring your Security stack together with...
Down
- Name of the international cybersecurity event that was founded in 1997?
- Can be used to create code, text, music, videos, photos...
- Talos is now further enriched by the acquisition of..
- Not the next generation of something. The first generation of something new
10 Clues: Malware attack • Online scam to steal personal information • Bring your Security stack together with... • Talos is now further enriched by the acquisition of.. • One of the largest and most infamous ransomware attacks • Can be used to create code, text, music, videos, photos... • Name of the international cybersecurity event that was founded in 1997? • ...
TPWD Cybersecurity Awareness 2024-10-08
Across
- A fake email designed to trick users into giving up personal information
- A way to verify a person's identity online
- A malicious software designed to harm a computer
- A software update that fixes vulnerabilities in a program
- Software that blocks harmful content from reaching your computer
Down
- A security breach that involves unauthorized access to data
- A security feature that requires more than one form of verification
- A network of infected computers controlled by a hacker
- The practice of protecting information from unauthorized access
- A set of guidelines for handling sensitive data
10 Clues: A way to verify a person's identity online • A set of guidelines for handling sensitive data • A malicious software designed to harm a computer • A network of infected computers controlled by a hacker • A software update that fixes vulnerabilities in a program • A security breach that involves unauthorized access to data • ...
"Lock It Down: A Cybersecurity Challenge" 2025-06-05
Across
- A secret combination used to access accounts (8 letters)
- A secure encrypted network connection (3 letters)
- The practice of protecting systems from digital attacks (11 letters)
- A flaw in software that hackers exploit (8 letters)
- Unauthorized access to data (7 letters)
Down
- A type of attack that floods a server with traffic (4 letters)
- Two-factor ________ (adds extra login security) (12 letters)
- A network security system that monitors traffic (8 letters)
- Fake emails pretending to be legitimate (8 letters)
- Malicious software that encrypts files and demands payment (8 letters)
10 Clues: Unauthorized access to data (7 letters) • A secure encrypted network connection (3 letters) • Fake emails pretending to be legitimate (8 letters) • A flaw in software that hackers exploit (8 letters) • A secret combination used to access accounts (8 letters) • A network security system that monitors traffic (8 letters) • ...
Cyber Bullying and Cyber safety 2024-08-20
6 Clues: - Bullying online • - Against bullies • - Being safe online • - Supporting bullies • - Connected computers share resources • - Sites that are accessed using a web brower
Investment Course Lesson 17 Derivatives 2 2023-03-13
Across
- Takes two consecutive lows and two consecutive highs in a stock price average graph and uses the averages to determine price direction and strength
- like a future, but not traded on the market and considered OTC
- the person or entity on the other side of the transaction
- shows how two moving averages in a particular security are related
Down
- current market value of assets in a transaction
- when the price of a security moves contrary to other data
- the right to buy a security at a specific price
7 Clues: current market value of assets in a transaction • the right to buy a security at a specific price • when the price of a security moves contrary to other data • the person or entity on the other side of the transaction • like a future, but not traded on the market and considered OTC • shows how two moving averages in a particular security are related • ...
Trend Micro Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security can monitor ____ for threats (Starts with f)
- Trend Micro Mobile Security scans your mobile phone in ____ (Starts with r)
- Trend Micro Mobile Security provides ____ to users before they interact with harmful pages
Down
- Trend Micro Mobile Security monitors apps and files for ____ behavior
- Trend Micro Mobile Security can ____ website URLs and content (Starts with a)
5 Clues: Trend Micro Mobile Security monitors apps and files for ____ behavior • Trend Micro Mobile Security can monitor ____ for threats (Starts with f) • Trend Micro Mobile Security scans your mobile phone in ____ (Starts with r) • Trend Micro Mobile Security can ____ website URLs and content (Starts with a) • ...
Workplace Happiness 2020-11-23
11 Clues: making, • pattern • balance, • security, • recognition, • connections, • and interesting work, • Growth, and Development, • and co-worker relationship, • Trust, Culture and Environment • scope for innovation and creativity,
THE GRIND 2023-02-13
16 Clues: PRO • 7/28 • 21800 • LETS GO • PHONE HOME • WHO'S THERE • WHO'S PLACE? • FIREARM MAKE • SHOOTS A CROSSBOW • BEST DISPATCH SHIFT • BEST ON-SITE SECURITY • COMMON CALLER OF LOUDOUN • TELECOMMUNICATION DEVICE • CAN YOU PLEASE SEND A ___DEPUTY • COMMON INCIDENT OF WESTERN LOUDOUN • SECTION OF DC THAT HOLD THE MOST CRIME
percy jackson 2023-12-13
16 Clues: Centaur • god of war • percy's dad • percy's mom • hermes's son • percy's satyr • main character • Percy's weapon • Percy's friend • ares's daughter • percy's step dad • three headed wolf • god of the underworld • percy's latin teacher at yancy • security gaurd to the underworld • a place that is special to sally jackson
Chiara Silvestre crossword puzzle 2021-05-23
Across
- one of organization objectives
- number of the first states that joined the UN
Down
- UN was established after
- month of the conference in San Francisco
- one of main office closest to Italy
- one of the aims that maintains intergovernmental organization that start with S
- headquartered on international territory
- intergovernmental organization that aims to maintain international peace and security
8 Clues: UN was established after • one of organization objectives • one of main office closest to Italy • month of the conference in San Francisco • headquartered on international territory • number of the first states that joined the UN • one of the aims that maintains intergovernmental organization that start with S • ...
Types of debentures 2024-10-15
Across
- does not have any specific assets as security
- Debenture in the form of security
- which cannot be converted into equity shares
- Not have their name in company register
Down
- whose name is registered in the register of company
- which can be converted at the request of its holder
- redeemed after a specific time period
- no fixed maturity date
8 Clues: no fixed maturity date • Debenture in the form of security • redeemed after a specific time period • Not have their name in company register • which cannot be converted into equity shares • does not have any specific assets as security • whose name is registered in the register of company • which can be converted at the request of its holder
SUSE Rancher for SAP® applications Crossword Competition 2025-03-26
Across
- Essential for meeting critical SAP application uptime agreements, often requiring priority support from expert vendors. Ensuring quick __________.
- Security feature in SUSE Rancher for SAP that isolates network traffic to enhance security and compliance
- Primary benefit of using SUSE Rancher for SAP app management - Simplified __________ and management.
Down
- Process by which SUSE Rancher for SAP applications ensure they remain aligned with SAP's evolving requirements over time
- SUSE Security, included with SUSE Rancher for SAP applications, provides advanced container security capabilities. This SAP-tailored platform offers the visibility, threat detection, and what else?
- Database management system included in the SUSE Rancher Application Collection, essential for SAP workloads
- Type of support that SUSE Rancher for SAP applications offers to ensure rapid resolution of critical platform issues
7 Clues: Primary benefit of using SUSE Rancher for SAP app management - Simplified __________ and management. • Security feature in SUSE Rancher for SAP that isolates network traffic to enhance security and compliance • Database management system included in the SUSE Rancher Application Collection, essential for SAP workloads • ...
U.S. Foreign Policy 2022-03-15
Across
- "American [8]"? Nah...
- This type of development is central to the economy of the U.S..
- The state of not supporting either side in a conflict. George Washington looked to this policy in response to the war between France and Britain.
- The famous "Day of ______" speech was the 32nd president's response to the sudden attack on a certain naval base.
- This type of policy deals with multinational security and compromises commitment of national armed forces.
- An intergovernmental [13] alliance organised by the North Atlantic Treaty to protect the freedom and security of its members.
- This National Security Advisor and Secretary of State under former president Richard Nixon urged the overthrow of democratically elected Allende.
Down
- Japanese-American __________ camps were where American residents, two-thirds of whom were legal citizens, were forcibly relocated and incarcerated.
- A war here was known for its controversy when the U.S. intervened. It resulted in many casualties due to the use of chemical weapons.
- Covers the negotiation of treaties, the issuing of official declarations, and the representation of governmental views and interests.
- The "human" version of these are a significant factor of foreign policy everywhere. They are regularly protected, and for good reason.
- Wrote the foreign policy position closing further colonization in the Western Hemisphere
- This political movement in [7] is often referred to as a terrorist organisation.
- This country hosted the longest war in U.S. history.
- The ideology of extending rule for the benefit of political and economic access.
- A site here was bombed by the U.S. military because it was believed to have been occupied by Iraqi militias.
16 Clues: "American [8]"? Nah... • This country hosted the longest war in U.S. history. • This type of development is central to the economy of the U.S.. • This political movement in [7] is often referred to as a terrorist organisation. • The ideology of extending rule for the benefit of political and economic access. • ...
Report Management 2022-05-13
Across
- pledge collateral report
- rating report
- negative funds correction report
- value and date report
- credit card and loans reports
- exception tracking report
- security interest report
- negative DDA report
- most recent reports
- management reports
Down
- archived reports
- standard daily report
- banks portfolio analysis report
- customer analysis report
- custom built reports
- geocoding report
- possible incorrect interest payment report
- collateral evaluation report
18 Clues: rating report • archived reports • geocoding report • management reports • negative DDA report • most recent reports • custom built reports • standard daily report • value and date report • pledge collateral report • customer analysis report • security interest report • exception tracking report • collateral evaluation report • credit card and loans reports • banks portfolio analysis report • ...
Cyber Safe Seniors 2022-01-16
Across
- a method used by cyber criminals to trick their victims into giving out their personal information
- the spreading of fake news
- an urgent situation caused by scammers to induce fear and panic
Down
- a phrase used to unlock online accounts
- software that protects your device against virus
- a behaviour used by love scammers to gain the trust of their victims
- the first step when checking for fake news
7 Clues: the spreading of fake news • a phrase used to unlock online accounts • the first step when checking for fake news • software that protects your device against virus • an urgent situation caused by scammers to induce fear and panic • a behaviour used by love scammers to gain the trust of their victims • ...
Computer ethics, environmental and legal issues 2024-03-15
Across
- personal data must be _____ from unauthorised access.
- use them to log into an app and need to be remembered.
- an act used to protect person data and details
Down
- an act which prevents data from being changed.
- protects your work from other people using it
- a person who uses their skill to breach cyber defences
- the set of commonly agreed principles that govern the use of computers.
7 Clues: protects your work from other people using it • an act which prevents data from being changed. • an act used to protect person data and details • personal data must be _____ from unauthorised access. • use them to log into an app and need to be remembered. • a person who uses their skill to breach cyber defences • ...
words lol 2025-10-13
Across
- something such as a decision that is very easy or obvious so you don't need to think a lot about it
- ...-athlete (that competes by playing video-games)
- a person that saves lifes, for example on swimming Olympics
Down
- ... designer (someone who creates the world around you in game)
- a person which creates buildings
- to ... smth off (as silly/useless/stupid)
- ... engineer (close to tester)
7 Clues: ... engineer (close to tester) • a person which creates buildings • to ... smth off (as silly/useless/stupid) • ...-athlete (that competes by playing video-games) • a person that saves lifes, for example on swimming Olympics • ... designer (someone who creates the world around you in game) • ...
Peanuts! 2021-11-05
Across
- Lucy's crush
- Charlie Brown's baseball job
- Charlie Brown cooled down
- Linus' security
- Snoopy's animal avatar
- Peppermint Patty's character
- imaginary fighter plane
- Charlie Brown's BFF
- Charlie Brown's Halloween take
- Schroeder's musical crush
Down
- what the Herald Angels Sing
- brother to Linus and Lucy
- the single tree decoration
- Snoopy's imaginary night
- Spike's digs
- Patty's flavor
- Lucy's family name
- Charlie Brown's lament
- Snoopy's sib
19 Clues: Lucy's crush • Spike's digs • Snoopy's sib • Patty's flavor • Linus' security • Lucy's family name • Charlie Brown's BFF • Charlie Brown's lament • Snoopy's animal avatar • imaginary fighter plane • Snoopy's imaginary night • brother to Linus and Lucy • Charlie Brown cooled down • Schroeder's musical crush • the single tree decoration • what the Herald Angels Sing • Charlie Brown's baseball job • ...
Professions 2023-03-01
Across
- repairs cars and machines
- builds and repairs pipes
- maintaining safety & security
- drives a taxi
- teaches in school
- can build a table
- flies with plane
- writes books
- person who makes music
Down
- catches fish
- helps sick people
- works in a hospital
- sells medication
- cuts hair
- works in a restaurant
- makes bread
- makes clothing
- cooks food
- grows vegetables and fruits
19 Clues: cuts hair • cooks food • makes bread • catches fish • writes books • drives a taxi • makes clothing • sells medication • flies with plane • helps sick people • teaches in school • can build a table • works in a hospital • works in a restaurant • person who makes music • builds and repairs pipes • repairs cars and machines • grows vegetables and fruits • maintaining safety & security
