cyber security Crossword Puzzles

Dystopian Escape Room 2020-04-23

Dystopian Escape Room crossword puzzle
Across
  1. opposite of dystopia
  2. Kim Jong-Un is practically worshipped by citizens, making him the __________ of North Korea
  3. The word “utopia” was created from 2 __________ words, eutopia & outopia
  4. A dystopian government often uses mass __________ to spy on its citizens
  5. Term for mega-technological genre: “cyber-__________”
  6. Type of government that has total control over people’s lives
  7. Opposite of individuality
  8. __________
Down
  1. #7 down was originally named for a fictional __________
  2. Dystopias often occur after an __________ event like a plague of nuclear warfare
  3. Dystopian literature takes a current trend to the _____
  4. Sir Thomas __________
  5. A dystopia typically exists as an __________ of a perfect world
  6. The answer to #15 across serves to create an emotional response as opposed to a __________ response
  7. Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of
  8. Biased information used to promote a political point of view

16 Clues: __________opposite of dystopiaSir Thomas __________Opposite of individualityTerm for mega-technological genre: “cyber-__________”#7 down was originally named for a fictional __________Dystopian literature takes a current trend to the _____Biased information used to promote a political point of view...

Understand & Taking A Stand Against Bullying 2024-05-30

Understand & Taking A Stand Against Bullying crossword puzzle
Across
  1. Position or rank in relation to others.
  2. An act of physical harm or injury to another person.
  3. Behavior directed at another person that is unwanted and unwelcome.
  4. Belief in one's own abilities.
  5. To communicate through words or gestures the intent to harm another person.
  6. Set apart from others; alone.
  7. Having to do with or involving computers or other online technology.
  8. To refuse to admit; to force out.
  9. Using threats to frighten someone; often used to compel another person to do something, or to deter the person from doing something.
  10. People of the same age, or close in age, who are similar in many ways.
  11. To keep from happening or existing.
Down
  1. Boldly hostile; quarrelsome.
  2. Related to words and speech.
  3. The result or outcome of an action or event.
  4. Done on purpose; planned or deliberate.
  5. Confident and self-assured.

16 Clues: Confident and self-assured.Boldly hostile; quarrelsome.Related to words and speech.Set apart from others; alone.Belief in one's own abilities.To refuse to admit; to force out.To keep from happening or existing.Position or rank in relation to others.Done on purpose; planned or deliberate.The result or outcome of an action or event....

Cyberbullying via Social Media 2024-10-31

Cyberbullying via Social Media crossword puzzle
Across
  1. a lighthearted way to defuse a mean situation
  2. popular social media app with integrated "Here for you"
  3. protect this and change it immediately if anyone finds it out for your cyber safety and privacy
  4. cyberbullying has caused almost double the attempts of this
  5. type of thinking required to decide if something is real or not online
  6. Australia's ranking in 'countries with the highest level of bullying'
  7. sharing someones personal identity without their consent
  8. recommended site to report bullying
Down
  1. type of bystander to call out when witnessing bullying
  2. what you should do before you post
  3. type of cyberbullying for sharing private information about someone without their consent
  4. the 4th S in KidsHelpline's '4S' steps
  5. percent of teens without access to a cell phone
  6. trending social media app with a wellbeing guide
  7. intimate messaging type putting you at risk of blackmail or image-abuse
  8. reason for cyberbullying which can be benign or toxic

16 Clues: what you should do before you postrecommended site to report bullyingthe 4th S in KidsHelpline's '4S' stepsa lighthearted way to defuse a mean situationpercent of teens without access to a cell phonetrending social media app with a wellbeing guidereason for cyberbullying which can be benign or toxic...

NETWORKING CONCEPTS AND CYBER ETHICS . 2025-05-28

NETWORKING CONCEPTS AND CYBER ETHICS . crossword puzzle
Across
  1. ________ spam filtering / blocking software .
  2. ___________ refers to criminal activities .
  3. A _____ is a network device that is used to connect all the computers in a network with each other .
  4. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  5. A computer ___________ can be as a group of computers .
  6. _____________ refers to an illegal intrusion into a computer system or network .
  7. A network maintained without using wires is called a ___________ network .
  8. A digital footprint is also known as .
  9. What is the short form of Local Area Network ?
Down
  1. _________ topology is connected in circular path .
  2. Hacking , which is done for a good ~cause , such as national security , is known as .
  3. What is the short form of Information and communication technology ?
  4. _____ is a network created for an individual person .
  5. A ________ is a device that connects two different types of networks with each other .
  6. A __________ similar to a hub .
  7. To _________ plagiarism , one can rephrase the material .
  8. Each computer in a network is called a .
  9. ______ refers to unwanted bulk email .

18 Clues: A __________ similar to a hub .A digital footprint is also known as .______ refers to unwanted bulk email .Each computer in a network is called a .___________ refers to criminal activities .________ spam filtering / blocking software .What is the short form of Local Area Network ?_________ topology is connected in circular path ....

NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28

NETWORKING CONCEPT AND CYBER ETHICS crossword puzzle
Across
  1. _________ topology is connected in circular path .
  2. ______ refers to unwanted bulk email .
  3. A digital footprint is also known as .
  4. Each computer in a network is called a .
  5. ________ spam filtering / blocking software .
  6. A _____ is a network device that is used to connect all the computers in a network with each other .
  7. Hacking , which is done for a good ~cause , such as national security , is known as .
  8. A computer ___________ can be as a group of computers .
Down
  1. ___________ refers to criminal activities .
  2. _____________ refers to an illegal intrusion into a computer system or network .
  3. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  4. A network maintained without using wires is called a ___________ network .
  5. What is the short form of Local Area Network ?
  6. A ________ is a device that connects two different types of networks with each other .
  7. To _________ plagiarism , one can rephrase the material .
  8. A __________ similar to a hub .
  9. _____ is a network created for an individual person .
  10. What is the short form of Information and communication technology ?

18 Clues: A __________ similar to a hub .______ refers to unwanted bulk email .A digital footprint is also known as .Each computer in a network is called a .___________ refers to criminal activities .________ spam filtering / blocking software .What is the short form of Local Area Network ?_________ topology is connected in circular path ....

cyber safety 2017-04-25

cyber safety crossword puzzle
Across
  1. when a person writes something online
  2. worldwide of computer networks
  3. an application that lets you in a game or internet
Down
  1. a application on the web that locates,retrieves, and displays information
  2. a word used for electronics
  3. a message sent from electronics

6 Clues: a word used for electronicsworldwide of computer networksa message sent from electronicswhen a person writes something onlinean application that lets you in a game or interneta application on the web that locates,retrieves, and displays information

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. A code used to prove your identity
  2. Someone who is mean or aggressive online
Down
  1. Posting rumours online ruining someone's Reputation
  2. A hack or Hacker Forcing something bad onto a computer
  3. Someone who pretends to be someone else to get money
  4. Being Safe and Responsible Online

6 Clues: Being Safe and Responsible OnlineA code used to prove your identitySomeone who is mean or aggressive onlinePosting rumours online ruining someone's ReputationSomeone who pretends to be someone else to get moneyA hack or Hacker Forcing something bad onto a computer

Cyber Hygiene 2024-03-06

Cyber Hygiene crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. A security method that requires two forms of identification to access resources and data.
  3. A set of practices users take to improve their online security.
Down
  1. A type of scam that uses email or websites to trick victims.
  2. Malicious activities on digital systems or network.
  3. A scam that involves a victim to be tricked by a fake online identity.

6 Clues: Malicious activities on digital systems or network.A type of scam that uses email or websites to trick victims.A set of practices users take to improve their online security.A scam that involves a victim to be tricked by a fake online identity.A string of characters that allows access to a computer system or service....

cyber mobbing 2024-04-15

cyber mobbing crossword puzzle
Across
  1. wo passiert am meisten cybermobbing?
  2. auf was solltest du achten um deinen account von hackern zu schützen?
  3. wie heißt mobbing übers Internet?
Down
  1. in welchem land ist cybermobbing seid 2016 strafbar?
  2. wie heißt die notrufnummer für hilfe?
  3. wie heißt ein gefälschtes profil?

6 Clues: wie heißt ein gefälschtes profil?wie heißt mobbing übers Internet?wo passiert am meisten cybermobbing?wie heißt die notrufnummer für hilfe?in welchem land ist cybermobbing seid 2016 strafbar?auf was solltest du achten um deinen account von hackern zu schützen?

Cyber Wellness 2023-02-01

Cyber Wellness crossword puzzle
Across
  1. whatever you post online, it will have an ______ on how others think about you
  2. do not _______ your password
  3. think ______ you do
Down
  1. you can share you password with ______ friends
  2. _____ others opinions and privacy
  3. you need to have trust before you _____ someone

6 Clues: think ______ you dodo not _______ your password_____ others opinions and privacyyou can share you password with ______ friendsyou need to have trust before you _____ someonewhatever you post online, it will have an ______ on how others think about you

Cyber Witch 2025-11-04

Cyber Witch crossword puzzle
Across
  1. Ritual con vela
  2. Lectura
  3. Lectura
Down
  1. Jar ritual de mar
  2. una vela
  3. Lectura
  4. Vale la pena
  5. Pregunta puntuales

8 Clues: LecturaLecturaLecturauna velaVale la penaRitual con velaJar ritual de marPregunta puntuales

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. : Local network in a small area
  2. : A global network of networks
Down
  1. : Harmful software
  2. : Wireless internet access
  3. : Sends data between computer networks
  4. : Moral rules for digital use

6 Clues: : Harmful software: Wireless internet access: Moral rules for digital use: A global network of networks: Local network in a small area: Sends data between computer networks

Cyber Safety 2025-11-20

Cyber Safety crossword puzzle
Across
  1. A fake message trying to steal info
  2. The private word/phrase you use to sign in
  3. Verifying something is real
  4. An email designed to look legit but isn’t
Down
  1. Type of hacker hired by companies to test employees
  2. Someone who protects a company from attacks

6 Clues: Verifying something is realA fake message trying to steal infoAn email designed to look legit but isn’tThe private word/phrase you use to sign inSomeone who protects a company from attacksType of hacker hired by companies to test employees

Cyber Chase 2025-09-09

Cyber Chase crossword puzzle
Across
  1. – A type of malicious code that replicates itself.
  2. – Malicious software that pretends to be legitimate.
  3. – A person who breaks into computer systems.
Down
  1. – Self-replicating malware that spreads without user action.
  2. – Secretly tracks your activity.
  3. – Shows excessive ads but doesn’t always track data.

6 Clues: – Secretly tracks your activity.– A person who breaks into computer systems.– A type of malicious code that replicates itself.– Malicious software that pretends to be legitimate.– Shows excessive ads but doesn’t always track data.– Self-replicating malware that spreads without user action.

class puzzle 2023-08-22

class puzzle crossword puzzle
Across
  1. the act of taking over other electronics
  2. the amount of time it takes to get a action done
  3. the act of bullyng on the enternet
  4. a two word virus named was a computer worm designed to exploit major flaws in Microsoft’s Internet Information Services web server.
  5. the sexueal
  6. the most dangerious virus first spotted in March 1999, spreading to the public via internet forums and emails offering free login credentials to adult websites.
  7. what you need to sign in
  8. worm was not just a worm that could replicate itself but also a Trojan horse, or malware disguised as a harmless program.
  9. a facebook virus that was named after a snack made of flower egg and chocolate
  10. a person employed to look after technical equipment or do practical work in a laboratory.
  11. the "cells" of a webcite
  12. theact of making electronics work
Down
  1. another computer worm, targeted machines with Windows XP and Windows 2000 operating systems in 2004. It spread quickly through a vulnerability in the Local Security Authority Subsystem Service, which is responsible for managing user logins and credentials. The worm caused millions of PCs to blue screen and crash, which led many businesses to shut down their networks until the infection was dealt with.
  2. was designed to encrypt files on infected computers and demand a ransom from its victims. However, the malware was unique in that it spread rapidly throughout computer networks by exploiting vulnerabilities in outdated Windows operating systems.
  3. the location of informaiton
  4. the worst malware in history, causing more than $38 billion worth of damages in 2004. Like Sobig, it was another type of mass mailing computer worm that stole email addresses from infected computers and sent itself to those addresses.
  5. a virus named after the greek god of lightning
  6. malware appeared in October 2001. It had the capability to exploit buggy Microsoft email clients and spread itself to everyone in a user’s Outlook address book.
  7. computer worm discovered in 2010, spreading via corrupted USB drives and was predominantly used in cyber warfare. The malware targeted industrial control systems used to control nuclear power plants and other industrial facilities.
  8. good hacker it is 2 words no space
  9. bad hacker it is 2 words no space
  10. also known as the love letter or the LoveBug virus, was first discovered in May 2000.
  11. the way to get to a web sight
  12. a bad program
  13. most vaulable player

25 Clues: the sexueala bad programmost vaulable playerwhat you need to sign inthe "cells" of a webcitethe location of informaitonthe way to get to a web sightbad hacker it is 2 words no spacetheact of making electronics workthe act of bullyng on the enternetgood hacker it is 2 words no spacethe act of taking over other electronics...

Food Security BC 2022-10-27

Food Security BC crossword puzzle
Across
  1. Plants grown for their produce
  2. Animals which are grown for their produce
  3. used in pesticide and fertilizers, oftentimes harmful towards the environment
  4. Interaction among companies, people and governments
  5. Where the city meets the rural area
  6. ... farming: farming in the city
Down
  1. same definition as healing, 'replenishing'
  2. A device invented to take photos of leftovers and notify people when there are leftovers so food isn't wasted
  3. an organization which donates leftover uneaten food from events such as the superbowl to homeless shelters and the people in need
  4. ... produce: produce grown near/close to the market(s) it ships to, so the food is fresh (but often rots quickly)

10 Clues: Plants grown for their produce... farming: farming in the cityWhere the city meets the rural areaAnimals which are grown for their producesame definition as healing, 'replenishing'Interaction among companies, people and governmentsused in pesticide and fertilizers, oftentimes harmful towards the environment...

Privacy and Security 2019-09-30

Privacy and Security crossword puzzle
Across
  1. Covered Entity Service Provider (1st Word)
  2. ___________ Identifiable Information
  3. Cybercrime (e.g., action request by email)
  4. Unauthorized access of PHI (non-breach)
  5. __________ Health Information
  6. PHI Law
  7. Altarum PHI Oversight Body
Down
  1. Form of Secure Electronic Submission
  2. Covered Entity Service Provider (2nd Word)
  3. Secret Word (unlocks computer)

10 Clues: PHI LawAltarum PHI Oversight Body__________ Health InformationSecret Word (unlocks computer)Form of Secure Electronic Submission___________ Identifiable InformationUnauthorized access of PHI (non-breach)Covered Entity Service Provider (2nd Word)Covered Entity Service Provider (1st Word)Cybercrime (e.g., action request by email)

SECURITY AND VIRUSES 2013-05-01

SECURITY AND VIRUSES crossword puzzle
Across
  1. software program that displays advertising on your computer
  2. Programming language that allows applets to run within a web browser
  3. is a file or program other then a virus that is potentially harmful
  4. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
  5. program written with malicious intent and sent out by attackers
Down
  1. Events or attacks that remove, corrupt, deny access, allow access, or steal information
  2. technically a worm
  3. , is software designed specifically to detect, disable, and remove viruses
  4. Technology created by Microsoft to control interactivity on web pages
  5. self-replicating program that is harmful to networks

10 Clues: technically a wormself-replicating program that is harmful to networkssoftware program that displays advertising on your computerprogram written with malicious intent and sent out by attackersis a file or program other then a virus that is potentially harmfulProgramming language that allows applets to run within a web browser...

Information Security Crossword 2017-01-13

Information Security Crossword crossword puzzle
Across
  1. A secret series of characters used to authenticate a person’s identity.
  2. A person who uses computers to gain unauthorized access to computer systems and networks.
  3. Anything that has the potential to cause serious harm to a computer system.
  4. You may not divulge this information while you are working for an employer or after you leave.
Down
  1. A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
  2. A type of malware that is often disguised as legitimate software.
  3. A flaw or weakness that can be used to attack a system or organization.
  4. Personal information related to personal data stored on computer systems
  5. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
  6. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.

10 Clues: A type of malware that is often disguised as legitimate software.A flaw or weakness that can be used to attack a system or organization.A secret series of characters used to authenticate a person’s identity.Personal information related to personal data stored on computer systems...

INFORMATION SECURITY PUZZLE 2017-11-14

INFORMATION SECURITY PUZZLE crossword puzzle
Across
  1. A piece of digital information generated by a web server and saved in your computer after visiting a website
  2. A network using which things can communicate with each other using internet as means of communication between them.
  3. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
  1. Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  2. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  3. An attempt by hackers to damage or destroy a computer network or system.
  4. A software that is designed to detect and destroy compute viruses.
  5. Global system of interconnected computer networks that use the Internet protocol suite
  6. Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.

10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _A software that is designed to detect and destroy compute viruses.An attempt by hackers to damage or destroy a computer network or system.Don't click on _ _ _ _ _ within emails from an unknown or untrusted source...

Network Security Commands 2022-04-25

Network Security Commands crossword puzzle
Across
  1. Authenticates the vty line against the local database.
  2. Configure the IP domain name of the network by using the global configuration mode.
  3. Enables vty inbound SSH sessions
  4. Generates a key to encrypt SSH traffic
  5. Disables an inactive privileged EXEC mode access after a specified amount of time.
  6. Sets a minimum acceptable password length
Down
  1. Encrypts all plaintext passwords.
  2. Shows the services or ports that are on by default.
  3. Deters brute-force password guessing attacks.
  4. Verifies or creates a local database entry.

10 Clues: Enables vty inbound SSH sessionsEncrypts all plaintext passwords.Generates a key to encrypt SSH trafficSets a minimum acceptable password lengthVerifies or creates a local database entry.Deters brute-force password guessing attacks.Shows the services or ports that are on by default.Authenticates the vty line against the local database....

FNaF Security Breach 2023-08-11

FNaF Security Breach crossword puzzle
Across
  1. A broken ex-guitarist
  2. Narcissistic fox
  3. A funny nighttime jester man
  4. A funny daytime jester man
  5. Your guardian
  6. I smell pizza!
Down
  1. Psycho rabbit lady
  2. He always comes back
  3. A security guard
  4. The guitarist's replacement

10 Clues: Your guardianI smell pizza!A security guardNarcissistic foxPsycho rabbit ladyHe always comes backA broken ex-guitaristA funny daytime jester manThe guitarist's replacementA funny nighttime jester man

SPECIAL SECURITY PUZZLE 2023-08-17

SPECIAL SECURITY PUZZLE crossword puzzle
Across
  1. EMERGENCY LIGHT
  2. EIGHTSIDED SIGN
  3. SEE OUTSIDE THE DOOR
  4. SAFEST PLACE FOR CAR
  5. LIFELINE FOR PET
Down
  1. TOP SPEED IN SUN CITY
  2. NO SOLICITING
  3. 702-254-2303
  4. KEEP GARAGE DOOR_____
  5. NIGHTTIME DETERRENT

10 Clues: 702-254-2303NO SOLICITINGEMERGENCY LIGHTEIGHTSIDED SIGNLIFELINE FOR PETNIGHTTIME DETERRENTSEE OUTSIDE THE DOORSAFEST PLACE FOR CARTOP SPEED IN SUN CITYKEEP GARAGE DOOR_____

SECURITY AWARENESS PUZZLE 2023-09-20

SECURITY AWARENESS PUZZLE crossword puzzle
Across
  1. Acronym for Communications Security
  2. An orange stripe on an visitor's badge indicates that the visitor is a
  3. If an unauthorized individual has seen classified material the the material has been?
  4. Classified material must NEVER be left
  5. Acronym for Department of Defense?
Down
  1. Name of the area in a facility where classified computer equipment is openly stored (two words)
  2. This must be worn at all times when entering, exiting and within all company locations
  3. Acronym for the Federal Bureau of Investigation
  4. Visitors must have an ___ at all times
  5. Access to classified information requires a clearance and a (3 words)

10 Clues: Acronym for Department of Defense?Acronym for Communications SecurityVisitors must have an ___ at all timesClassified material must NEVER be leftAcronym for the Federal Bureau of InvestigationAccess to classified information requires a clearance and a (3 words)An orange stripe on an visitor's badge indicates that the visitor is a...

Platfom security crossword 2023-09-15

Platfom security crossword crossword puzzle
Across
  1. , helps to prevent unauthorized access to data on lost or stolen computers by combining
  2. boot , Measured Boot measures all important code and configuration settings during the boot of Windows.
  3. , the process responsible for secure logon.
  4. , linux uses this technique to define the priority of processes
  5. ,The core of OS and has complete control over everything in the system.
Down
  1. Network Authentication protocol based on trusted third party to authenticate server and client.
  2. , processes running in the background, started by the kernel itself.
  3. , a real-time operating system used in mission-critical applications
  4. , one method to block buffer overflow attacks
  5. ,a connection used to exchange data between the processes.

10 Clues: , the process responsible for secure logon., one method to block buffer overflow attacks,a connection used to exchange data between the processes., linux uses this technique to define the priority of processes, processes running in the background, started by the kernel itself., a real-time operating system used in mission-critical applications...

Network security management 2024-03-21

Network security management crossword puzzle
Across
  1. Tools for monitoring and analyzing network traffic
  2. A mechanism for verifying user identity
  3. A system for detecting abnormal network behavior
  4. Protocol for encrypted data transmission
  5. Technologies to prevent the spread of malicious software
Down
  1. Technologies used to protect data transmission in networks
  2. Practice of protecting computer networks from unauthorized access
  3. A Strategy for Restricting Network Resource Access
  4. Provide a secure channel for remote access to network devices
  5. A device for detecting and blocking network attacks

10 Clues: A mechanism for verifying user identityProtocol for encrypted data transmissionA system for detecting abnormal network behaviorTools for monitoring and analyzing network trafficA Strategy for Restricting Network Resource AccessA device for detecting and blocking network attacksTechnologies to prevent the spread of malicious software...

HIPAA Security Training 2024-03-15

HIPAA Security Training crossword puzzle
Across
  1. Used to protect accounts and information
  2. Protection against unauthorized access
  3. Process to secure data
  4. Permission by individuals for use of their PHI
  5. Health Insurance Portability and Accountability Act
Down
  1. Adherence to laws and regulations
  2. Right of individuals to keep their information secure
  3. Unauthorized access/disclosure of PHI
  4. Protected Health Information
  5. Notifying appropriate entities about breaches

10 Clues: Process to secure dataProtected Health InformationAdherence to laws and regulationsUnauthorized access/disclosure of PHIProtection against unauthorized accessUsed to protect accounts and informationNotifying appropriate entities about breachesPermission by individuals for use of their PHIHealth Insurance Portability and Accountability Act...

Security Crossword Puzzle 2024-05-16

Security Crossword Puzzle crossword puzzle
Across
  1. there is a right and ______ way to lift properly and prevent back injuries.
  2. _____ offers a year-round discount to all Great Wolf Pack Members on these shoes.
  3. Balancing work with our personal lives and responsibilities can sometimes take a toll on our _____ health.
  4. The biggest _____ when it comes to stretching is not holding the stretch long enough.
Down
  1. It only takes how many bad lifts to potentially seriously injure yourself?
  2. What should you check on your shoes frequently?
  3. Keep the object you are lifting _____ to your body.
  4. Do NOT lift with your back ______?
  5. Slip, _____, and fall incidents can result in serious injury and are the most common cause of workplace injuries at Great Wolf.
  6. Do not _____ while lifting objects.

10 Clues: Do NOT lift with your back ______?Do not _____ while lifting objects.What should you check on your shoes frequently?Keep the object you are lifting _____ to your body.It only takes how many bad lifts to potentially seriously injure yourself?there is a right and ______ way to lift properly and prevent back injuries....

Information Security Essentials 2025-04-28

Information Security Essentials crossword puzzle
Across
  1. Program untuk mendeteksi dan menghapus malware
  2. Aturan organisasi untuk keamanan informasi
  3. Melindungi informasi dari akses yang tidak sah
  4. Informasi selalu dapat diakses saat dibutuhkan
Down
  1. Penipuan untuk mencuri data via email/SMS/telepon
  2. Aset berharga yang harus dilindungi
  3. Kata sandi yang sulit ditebak
  4. Menjaga informasi agar tidak diubah secara ilegal
  5. Aplikasi untuk menyimpan kata sandi dengan aman
  6. Tindakan saat temukan aktivitas mencurigakan

10 Clues: Kata sandi yang sulit ditebakAset berharga yang harus dilindungiAturan organisasi untuk keamanan informasiTindakan saat temukan aktivitas mencurigakanProgram untuk mendeteksi dan menghapus malwareMelindungi informasi dari akses yang tidak sahInformasi selalu dapat diakses saat dibutuhkanAplikasi untuk menyimpan kata sandi dengan aman...

Mobile Security Quiz 2025-09-15

Mobile Security Quiz crossword puzzle
Across
  1. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.​
  2. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.​
  3. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.​
  4. (9) | Collecting data remotely from devices to monitor performance or security status.
  5. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.​
Down
  1. (7) | An isolated environment restricting app access to the broader system to contain threats.​
  2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.​
  3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.​
  4. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​
  5. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.​

10 Clues: (9) | Collecting data remotely from devices to monitor performance or security status.(7) | An isolated environment restricting app access to the broader system to contain threats.​(8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​...

Mobile Security Quiz 2025-09-15

Mobile Security Quiz crossword puzzle
Across
  1. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.​
  2. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.​
  3. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.​
  4. (9) | Collecting data remotely from devices to monitor performance or security status.
  5. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.​
Down
  1. (7) | An isolated environment restricting app access to the broader system to contain threats.​
  2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.​
  3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.​
  4. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​
  5. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.​

10 Clues: (9) | Collecting data remotely from devices to monitor performance or security status.(7) | An isolated environment restricting app access to the broader system to contain threats.​(8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​...

Information Security Challenge 2025-12-01

Information Security Challenge crossword puzzle
Across
  1. An individual who uses technical skills to gain unauthorized access to systems or data.
  2. The potential for loss or damage when a threat exploits a vulnerability.
  3. Restricting access to resources based on user identity and permissions.
  4. Double-check before you enter—password plus token.
  5. Ensuring that data remains accurate, consistent, and unaltered.
Down
  1. Writing software in a way that prevents security vulnerabilities.
  2. Ensuring that systems and data are accessible when needed by authorized users.
  3. Any circumstance or event with the potential to harm systems or data.
  4. GDPR and HIPAA aim to ensure this
  5. Gaining unauthorized physical access by following an authorized person into a secure area.

10 Clues: GDPR and HIPAA aim to ensure thisDouble-check before you enter—password plus token.Ensuring that data remains accurate, consistent, and unaltered.Writing software in a way that prevents security vulnerabilities.Any circumstance or event with the potential to harm systems or data....

Security Awareness Spotlight 2025-06-04

Security Awareness Spotlight crossword puzzle
Across
  1. For device maintenance, you should uninstall_______ apps from your devices.
  2. The event automatically logs _______ minutes per mission as volunteer time.
  3. To verify identities during emergencies, families should establish a unique _______ or phrase
  4. Browser maintenance includes clearing_______ and cookies.
  5. One of the missions is called "_______ boost", which involves securing your Wi-Fi network
  6. For account security, you should enable_______ authentication on critical accounts
  7. You should regularly update your devices'_______ systems and apps.
Down
  1. The TELUS Days of Giving event invites you to host a "_______ Party" with family and friends.
  2. You should _______ yourself to see what information is publicly available.
  3. To check if your data has been compromised, you can scan your email for _______ web breaches.

10 Clues: Browser maintenance includes clearing_______ and cookies.You should regularly update your devices'_______ systems and apps.You should _______ yourself to see what information is publicly available.For device maintenance, you should uninstall_______ apps from your devices.The event automatically logs _______ minutes per mission as volunteer time....

July Security Sightline 2025-07-07

July Security Sightline crossword puzzle
Across
  1. Stay _____ in public spaces, especially at large gatherings or events
  2. Practice, tactics, techniques & strategies used to combat or eliminate terrorism
  3. ____ is Antiterrorism Month
  4. Scott _____ Kartvedt - Former Blue Angel
Down
  1. End on a Positive Note "___ TO BE HERE"
  2. Only as a last resort
  3. See Something,____ Something
  4. If escape isn't possible - stay quiet and out of sight
  5. RGi's Rubber Mascot
  6. If you can escape safely

10 Clues: RGi's Rubber MascotOnly as a last resortIf you can escape safely____ is Antiterrorism MonthSee Something,____ SomethingEnd on a Positive Note "___ TO BE HERE"Scott _____ Kartvedt - Former Blue AngelIf escape isn't possible - stay quiet and out of sightStay _____ in public spaces, especially at large gatherings or events...

Security Code East 2025-07-09

Security Code East crossword puzzle
Across
  1. Will leave your fingers stained
  2. Begone!
  3. What one might do to hair
  4. What one might need a cleanser for
  5. In between acrylic and watercolor
Down
  1. Turkey dinner
  2. An essential for an art student
  3. A descriptor for say, Arnold Schwarzenegger
  4. What most of us are
  5. Happy cat!

10 Clues: Begone!Happy cat!Turkey dinnerWhat most of us areWhat one might do to hairWill leave your fingers stainedAn essential for an art studentIn between acrylic and watercolorWhat one might need a cleanser forA descriptor for say, Arnold Schwarzenegger

HIPAA Privacy & Security 2025-08-25

HIPAA Privacy & Security crossword puzzle
Across
  1. Documenting for services not provided.
  2. Keeping client information from being shared.
  3. When personal benefit interferes with duty.
  4. Anonymous channel for ethical reporting.
Down
  1. Accurate and complete ___ is required for compliance.
  2. Sharing PHI improperly is a HIPAA ___.
  3. Making decisions with integrity.
  4. Speaking up about wrongdoing.
  5. To speak up against wrongdoing.
  6. Law banning referral incentives

10 Clues: Speaking up about wrongdoing.To speak up against wrongdoing.Law banning referral incentivesMaking decisions with integrity.Documenting for services not provided.Sharing PHI improperly is a HIPAA ___.Anonymous channel for ethical reporting.When personal benefit interferes with duty.Keeping client information from being shared....

I.R.F.I.PCRUCIVERBANDO 2024-01-25

I.R.F.I.PCRUCIVERBANDO crossword puzzle
Across
  1. CHI COMPIE ATTI DI AGGRESSIONE
  2. FURTO DI IDENTITA'
Down
  1. BULLISMO IN RETE
  2. RISPETTO PER LE REGOLE

4 Clues: BULLISMO IN RETEFURTO DI IDENTITA'RISPETTO PER LE REGOLECHI COMPIE ATTI DI AGGRESSIONE

Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29

Whaine V. ~ 7/8 Internet Safety CrossWord! crossword puzzle
Across
  1. Sharing someone’s secrets or embarrassing information online
  2. A hostile and insulting interaction between internet users.
  3. An image that is captured of what is shown on a phone, tablet, or computer screen
  4. A technology that allows us to access our files through the internet from anywhere in the world.
  5. An Internet service that helps you search for information on the web
  6. Someone who posts rude or off-topic messages in an online community
Down
  1. Online communities, also known as social networks
  2. Setting up a fake online profile
  3. malware,cyber-destroyer, break your technology
  4. Rules or manners for interacting courteously with others online

10 Clues: Setting up a fake online profilemalware,cyber-destroyer, break your technologyOnline communities, also known as social networksA hostile and insulting interaction between internet users.Sharing someone’s secrets or embarrassing information onlineRules or manners for interacting courteously with others online...

TECHNOLOGY 2021-10-07

TECHNOLOGY crossword puzzle
Across
  1. ​introducing or using new ideas, ways of doing something, etc.
  2. no longer used because something new has been invented
  3. too important to be without
  4. having a good knowledge and understanding of modern technology, especially computers
  5. a person who fears, dislikes or avoids new technology
Down
  1. the utilization of imagination or original ideas to generate something
  2. develop (something) to a higher standard, especially (equipment or machinery) by adding or replacing components
  3. of only average quality, not very good
  4. a small tool or device that does something useful
  5. relating to, or involving computers or computer networks (as the Internet)

10 Clues: too important to be withoutof only average quality, not very gooda small tool or device that does something usefula person who fears, dislikes or avoids new technologyno longer used because something new has been invented​introducing or using new ideas, ways of doing something, etc....

BK 2024-02-05

BK crossword puzzle
Across
  1. memukul, mendorong, dll termasuk bully…
  2. Gangguan yang di dapatkan oleh korban bullying ada gangguan…
  3. Pihak yang mampu membela dirinya karena lemah ketika mendapatkan tindakan agresif dan manipulatif disebut…
  4. Tindakan mengganggu atau menyakiti orang lain secara fisik atau psikis disebut....
  5. intimidasi yang melibatkan kata kata bauk secara tertulis/ terucap merupakan bully…
Down
  1. dapat meniru niru bullying adalah dampak negatif bagi…
  2. Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying…
  3. Gangguan emosi, sulit mendapatkan pekerjaan ketika sudah dewasa adalah dampak negatif bagi…
  4. memposting foto memalukan/ menyebarkan aib, termasuk ke bully…
  5. Jenis Tindakan Bully di dunia maya yang ditunjukkan untuk mengucilkan seseorang adalah…

10 Clues: memukul, mendorong, dll termasuk bully…dapat meniru niru bullying adalah dampak negatif bagi…Gangguan yang di dapatkan oleh korban bullying ada gangguan…memposting foto memalukan/ menyebarkan aib, termasuk ke bully…Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying…...

ASTS TIK_FATIMAH AZZAHRA PURNOMO (14/ X E-10) 2024-09-12

ASTS TIK_FATIMAH AZZAHRA PURNOMO (14/ X E-10) crossword puzzle
Across
  1. Sistem komputer dan informasi; dunia maya; berhubungan dengan internet
  2. Empat pilar dalam berpikir komputasional, yaitu dekomposisi, abstraksi, pengenalan pola, dan...
  3. Yang diperlukan individu dan kelompok untuk mengambil keputusan
  4. Yang membagi tugas fan peran secara adil dalam berkolaborasi
  5. Jenis infografis yang menampilkan daftar informasi dengan berbagai pembahasan, seperti tips, trik, dan pembahasan lainnya
  6. Pengelolaan dan penyajian data bervolume lebih besar dan melakukan analisis yang lebih kompleks dari fase sebelumnya
Down
  1. Cyber physical system dikenal dengan
  2. Tentukan tujuan kolaborasi, dan pastikan persamaan persepsi dan deskripsi lengkap tentang prakondisi masing-masing
  3. Informatika berasal dari bahasa Inggris
  4. Ukuran huruf cukup besar untuk dapat dilihat oleh pendengarnya

10 Clues: Cyber physical system dikenal denganInformatika berasal dari bahasa InggrisYang membagi tugas fan peran secara adil dalam berkolaborasiUkuran huruf cukup besar untuk dapat dilihat oleh pendengarnyaYang diperlukan individu dan kelompok untuk mengambil keputusanSistem komputer dan informasi; dunia maya; berhubungan dengan internet...

TTS KELOMPOK 2 (10.6) 2024-10-30

TTS KELOMPOK 2 (10.6) crossword puzzle
Across
  1. Program atau Kampanye untuk melawan bullying di sekolah?
  2. Hak setiap murid untuk merasa aman dan dihargai di lingkungan sekolah disebut hak...
  3. Emosi yang sering dirasakan korban setelah mengalami bullying berulang kali?
  4. Korban bullying biasanya mengalami gangguan
Down
  1. Orang yang melihat tindakan Bullying secara langsung
  2. Menerima perbedaan dan tidak membeda-bedakan adalah?
  3. Tindakan kekerasan kepada seseorang yang di anggap lemah?
  4. Tindakan yang membuat orang lain merasa tidak nyaman atau sedih dan dapat dilakukan oleh seseorang maupun sekelompok orang
  5. Platform atau media cyber bullying yang digunakan untuk menyebarkan komentar negatif atau ujaran kebencian?
  6. Menghina dan merendahkan orang lain dengan kata-kata disebut?

10 Clues: Korban bullying biasanya mengalami gangguanOrang yang melihat tindakan Bullying secara langsungMenerima perbedaan dan tidak membeda-bedakan adalah?Program atau Kampanye untuk melawan bullying di sekolah?Tindakan kekerasan kepada seseorang yang di anggap lemah?Menghina dan merendahkan orang lain dengan kata-kata disebut?...

vocabulary 2026-02-11

vocabulary crossword puzzle
Across
  1. affect
  2. safety
  3. clear
  4. heavy load
  5. self operating
Down
  1. felt sorry for
  2. carry out
  3. spending to much
  4. money saving
  5. move

10 Clues: moveclearaffectsafetycarry outheavy loadmoney savingfelt sorry forself operatingspending to much

Pay Checks 2021-09-29

Pay Checks crossword puzzle
Across
  1. collects federal taxes to pay for public services
  2. the most common method of payment
  3. methods to pay employees
  4. money is electronically loaded onto a plastic card
  5. employee withholding allowance certificate
  6. The national health care program for the elderly and is 1.45%
  7. The nation's retirement program and is 6.2%
  8. compulsory charges imposed on citizens by local, state and federal governments
Down
  1. is the easiest way to get paid
  2. the length of time for which an employee's wages are calculated
  3. Is a retirement program you can make contributions to
  4. The amount of money left after all deductions have been withheld
  5. on the W-4 are used to calculate the amount of federal taxes withheld from your paycheck
  6. are associated with using a payroll card
  7. The total amount of money earned during a pay period before deductions
  8. a document included each pay period which outlines paycheck deductions
  9. Includes 2 separate taxes, social security, and medicare
  10. you must be a documented worker in order to be eligible to work in the United States
  11. Employment Eligibility Verification Form

19 Clues: methods to pay employeesis the easiest way to get paidthe most common method of paymentare associated with using a payroll cardEmployment Eligibility Verification Formemployee withholding allowance certificateThe nation's retirement program and is 6.2%collects federal taxes to pay for public services...

Stock Market 2023-04-26

Stock Market crossword puzzle
Across
  1. The Federal Deposit Insurance Corporation
  2. A security that gives a of ownership of a company
  3. Owners/part-owners of a company not involved with running the buisiness
  4. Money left over after paying for any expenses
  5. A market where securities are bought and sold
  6. Company's ability to convert assets to cash or acquire cash
  7. The value of financial assets increases over time
Down
  1. Uncertainty with respect to one's investments
  2. The cost of an item/security
  3. An agreement to provide you a future equity stake based on the amount you invested
  4. Increase in price, usually in securities/stocks
  5. An instrument in which a person can either make investment, borrow money, or save money
  6. The process of buying assets that increase or decrease in value over time and provide returns
  7. Decrease in price, usually in securities/stocks
  8. Distribution of a company's earnings to its shareholders
  9. State, act, or right of owning something
  10. A single company that has a controlling interest in another company or companies
  11. Issued by government when they want to raise money
  12. Unit of equity ownership in a corporation

19 Clues: The cost of an item/securityState, act, or right of owning somethingThe Federal Deposit Insurance CorporationUnit of equity ownership in a corporationUncertainty with respect to one's investmentsMoney left over after paying for any expensesA market where securities are bought and soldIncrease in price, usually in securities/stocks...

A word Maze : Facility Management & Corporate Real Estate 2024-01-16

A word Maze : Facility Management & Corporate Real Estate crossword puzzle
Across
  1. A term for the physical location of a property
  2. A type of real estate that includes warehouses and factories
  3. A professional who advises on property transactions
  4. A term for the usable space in a building
  5. A professional responsible for managing all aspects of a building
  6. The process of planning for future facility needs
  7. A type of contract for the use of a property
  8. A type of maintenance performed to avoid breakdowns
  9. A term for the income a property generates after expenses
  10. A type of real estate that includes apartment buildings
Down
  1. A type of real estate that includes shopping centers and restaurants
  2. A term for the day-to-day maintenance of a building
  3. A term for the ongoing costs of operating a building
  4. The process of maximizing the value and usage of a property
  5. The process of ensuring a facility complies with regulations
  6. The cost of using a property, often expressed per square foot
  7. The process of managing a property’s energy usage
  8. A type of real estate that includes office buildings
  9. The process of overseeing a property’s security measures
  10. A document that outlines the terms and conditions of a property lease

20 Clues: A term for the usable space in a buildingA type of contract for the use of a propertyA term for the physical location of a propertyThe process of managing a property’s energy usageThe process of planning for future facility needsA term for the day-to-day maintenance of a buildingA professional who advises on property transactions...

Bonus Game 2024-10-22

Bonus Game crossword puzzle
Across
  1. a state of being free from public attention.
  2. it is a consent or authorization to do something.
  3. mfa serves as a ______ to decrease the possibility of a successful cyber attack.
Down
  1. serves as a pass when entering something.
  2. Acronym: One ____ Passwords.
  3. it is a person's name and other facts about who they are.

6 Clues: Acronym: One ____ Passwords.serves as a pass when entering something.a state of being free from public attention.it is a consent or authorization to do something.it is a person's name and other facts about who they are.mfa serves as a ______ to decrease the possibility of a successful cyber attack.

Antivirus 2022-12-09

Antivirus crossword puzzle
Across
  1. Cleanup Premium
  2. Data Internet security
  3. Web Security Space
Down
  1. Internet security
  2. Dome
  3. Internet security

6 Clues: DomeCleanup PremiumInternet securityInternet securityWeb Security SpaceData Internet security

xFi Crossword Puzzle 2019-01-09

xFi Crossword Puzzle crossword puzzle
Across
  1. speed required for xfi advantage
  2. amount of data included in xFi advantage
  3. uses a radio frequency signal instead of wires to connect your devices
  4. device that converts data so that it can be transmitted from computer to computer over telephone wires
Down
  1. delivers a smarter, more personalized security solution for your home network
  2. feature that includes equipment, unlimited data and security
  3. pods devices that can be paired with a compatible xFi Gateway to create a mesh WiFi network in the home

7 Clues: speed required for xfi advantageamount of data included in xFi advantagefeature that includes equipment, unlimited data and securityuses a radio frequency signal instead of wires to connect your devicesdelivers a smarter, more personalized security solution for your home network...

RECAP IND 2023-08-01

RECAP IND crossword puzzle
Across
  1. BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
  2. THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING
  3. A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
  4. A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
  5. A...LIKES TO LEARN FROM DEMONSTRATIONS
  6. A...LIKES TO BE INTELLECTUALLY CHALLENGED
  7. A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
  8. A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOU DO IN THIS CASE?"
  9. WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
Down
  1. AN...HAS ACCESS TO THE WHOLE SYSTEM
  2. WHAT DOES THE D IN MIDAS STAND FOR?
  3. THIS IS A TYPE OF TRAVEL DOCUMENT
  4. WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?
  5. SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
  6. MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
  7. IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
  8. A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURE USING MIDAS

17 Clues: THIS IS A TYPE OF TRAVEL DOCUMENTAN...HAS ACCESS TO THE WHOLE SYSTEMWHAT DOES THE D IN MIDAS STAND FOR?A...LIKES TO LEARN FROM DEMONSTRATIONSA...LIKES TO BE INTELLECTUALLY CHALLENGEDMACHINE READABLE TRAVEL DOCUMENTS HAVE A...WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPHTHIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING...

cybersecurity Crossword 2025-10-14

cybersecurity Crossword crossword puzzle
Across
  1. acts as a security camera which watches for any suspicious activity
  2. ensuring data is accurate, complete, and secure
  3. storing data on a device not connected to a network
  4. used to detect, prevent, and remove any malicious software
  5. transmits data as pulses of light
  6. the proccess of proving your identity and ensuring authorization
  7. a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
  1. ensuring timely access to information
  2. two step process to verifying identity
  3. relies on physical connections, which makes it difficult to hack
  4. ensures that someone can't unsend anything or deny any action online
  5. to reduce the potential harm of a threat
  6. tool which monitora network traffic and blocks off any sort of malicious activity
  7. stands for confidentiality, integrity, and availability and also means keeping data secret and secure
  8. ways to verify a user's identity
  9. the possibility of an unfortunate event occuring
  10. keeping data private and accessible only to those who are authorized

17 Clues: ways to verify a user's identitytransmits data as pulses of lightensuring timely access to informationtwo step process to verifying identityto reduce the potential harm of a threatensuring data is accurate, complete, and securethe possibility of an unfortunate event occuringstoring data on a device not connected to a network...

The Time Machine Chapter 3- Crossword Puzzle 2021-02-17

The Time Machine Chapter 3- Crossword Puzzle crossword puzzle
Across
  1. geliştirmek
  2. mantıklı
  3. nüfus
  4. güvenlik, emniyet
  5. tarım
Down
  1. açıklama
  2. tanımak, bilmek
  3. gök gürültülü fırtına
  4. (bir yerde) oturmak, işgal etmek
  5. dikey

10 Clues: nüfusdikeytarımaçıklamamantıklıgeliştirmektanımak, bilmekgüvenlik, emniyetgök gürültülü fırtına(bir yerde) oturmak, işgal etmek

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. mediums
  2. decodes
  3. sender to receiver, creation
  4. protocol levels
  5. sending
Down
  1. common clock
  2. server, user's identity
  3. data
  4. interface, transmitter
  5. security

10 Clues: datamediumsdecodessendingsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysender to receiver, creation

Looking for words 2024-02-05

Looking for words crossword puzzle
Across
  1. peaceful
  2. having plenty of room
  3. insulation
  4. near
  5. security
Down
  1. luminous
  2. original
  3. luxury property
  4. representative co-owners
  5. excellent

10 Clues: nearluminousoriginalpeacefulsecurityexcellentinsulationluxury propertyhaving plenty of roomrepresentative co-owners

HAPPY BIRTHDAY TANNER! 2024-02-15

HAPPY BIRTHDAY TANNER! crossword puzzle
Across
  1. "home, home on the..."
  2. slugs
  3. Barbie's favorite color
  4. "Joe of old time bubblegum"
  5. peak
  6. bullseye
Down
  1. what skiers wear
  2. startle
  3. smaller than a mountain
  4. "DARN!"
  5. what you might want to wear to a rap concert
  6. rhymes with cammo
  7. security
  8. 38?

14 Clues: 38?peakslugsstartle"DARN!"securitybullseyewhat skiers wearrhymes with cammo"home, home on the..."smaller than a mountainBarbie's favorite color"Joe of old time bubblegum"what you might want to wear to a rap concert

CHINA VS USA TIKTOK WARS 2024-09-26

CHINA VS USA TIKTOK WARS crossword puzzle
Across
  1. Platforms like TikTok that engage users worldwide.
  2. A security system used to protect against external threats.
  3. TikTok's CEO who testified before the U.S. Congress.
  4. The economic conflict between the U.S. and China impacting technology companies.
  5. The tech company that controls TikTok.
  6. and data collection, often a concern in Chinese platforms.
  7. A popular video-sharing app owned by Chinese company ByteDance.
  8. The country where TikTok’s parent company is based.
  9. The U.S. legislative body involved in TikTok discussions.
  10. Concerns about TikTok shaping public opinion or politics.
Down
  1. The idea of controlling digital infrastructure within a country.
  2. A set of rules TikTok uses to suggest personalized content.
  3. Moderation The practice of managing what is shared on social media platforms.
  4. Information that TikTok collects from its users.
  5. A major concern for the U.S. government regarding TikTok’s operations.
  6. What the U.S. government has considered for TikTok.
  7. Control over content, especially associated with Chinese media.
  8. A key issue raised in the U.S. regarding TikTok’s data collection.
  9. The Chinese parent company of TikTok.
  10. The control or possession of a company, questioned in the TikTok debate.

20 Clues: The Chinese parent company of TikTok.The tech company that controls TikTok.Information that TikTok collects from its users.Platforms like TikTok that engage users worldwide.What the U.S. government has considered for TikTok.The country where TikTok’s parent company is based.TikTok's CEO who testified before the U.S. Congress....

Into the XDR Abyss: A Puzzling Descent 2023-10-06

Into the XDR Abyss: A Puzzling Descent crossword puzzle
Across
  1. The digital playbook's maneuvers (7)
  2. Linking digital dots to paint a threat landscape (9)
  3. When a digital item needs its own space (9)
  4. That "He-Who-Must-Not-Be-Named" of the network (9)
  5. Tune out digital chatter to hear alerts better (6,2,5)
  6. Supercharged defense with the Iron Throne's view (3) (abbr.)
  7. Patterns like Sheldon's knocks on Big Bang Theory. (10)
  8. Darwin would have a digital field day with this (4,8)
  9. Guarding against too good-to-be-true jackpot letters (18)
Down
  1. Computers getting their digital diplomas (15)
  2. Like Rick's adventures in Rick and Morty (14)
  3. Where digital realms intersect and tales intertwine (11)
  4. Letting tech do the heavy digital lifting (8)
  5. Cutting through the cyber fog to see clearly (10)
  6. Demanding the lion's share of digital assets (9,10)
  7. Were Neo's choices in The Matrix really directionless? (7)

16 Clues: The digital playbook's maneuvers (7)When a digital item needs its own space (9)Computers getting their digital diplomas (15)Like Rick's adventures in Rick and Morty (14)Letting tech do the heavy digital lifting (8)Cutting through the cyber fog to see clearly (10)That "He-Who-Must-Not-Be-Named" of the network (9)...

It 2020-03-16

It crossword puzzle
Across
  1. / To say to someone that you will harm someone or do something unpleasant or unwanted
  2. / If you have your parents'______ to order something over the Internet
  3. / When someone abuses or insults you on a regular basis
  4. / To make someone uncomfortable.His bad manners _________ her
  5. / Social Media is a great way to ______ with friends.
  6. / Cyberbullying can have serious ______.
  7. bullying / Bullying that happens online
Down
  1. / Never try to seek ______ on a cyberbully. Don't do to them what they did to you.
  2. / Don't share the _________ for your accounts
  3. / Make sure that you have installed a ______ to keep your device safe from hackers.
  4. / You will use the right __________
  5. / Never give any personal ___________ to people online
  6. / People cyberbully because is less likely to be ______
  7. / Always follow the _____
  8. / Teach other about keeping ______ on the Internet.
  9. / Never agree to meet face-to-face with someone you've met ______ without discussing it with your parents

16 Clues: / Always follow the _____/ You will use the right __________bullying / Bullying that happens online/ Cyberbullying can have serious ______./ Don't share the _________ for your accounts/ Teach other about keeping ______ on the Internet./ Never give any personal ___________ to people online...

NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28

NETWORKING CONCEPT AND CYBER ETHICS crossword puzzle
Across
  1. _________ topology is connected in circular path .
  2. ______ refers to unwanted bulk email .
  3. A digital footprint is also known as .
  4. Each computer in a network is called a .
  5. ________ spam filtering / blocking software .
  6. A _____ is a network device that is used to connect all the computers in a network with each other .
  7. Hacking , which is done for a good ~cause , such as national security , is known as .
  8. A computer ___________ can be as a group of computers .
Down
  1. ___________ refers to criminal activities .
  2. _____________ refers to an illegal intrusion into a computer system or network .
  3. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  4. A network maintained without using wires is called a ___________ network .
  5. What is the short form of Local Area Network ?
  6. A ________ is a device that connects two different types of networks with each other .
  7. To _________ plagiarism , one can rephrase the material .
  8. A __________ similar to a hub .
  9. _____ is a network created for an individual person .
  10. What is the short form of Information and communication technology ?

18 Clues: A __________ similar to a hub .______ refers to unwanted bulk email .A digital footprint is also known as .Each computer in a network is called a .___________ refers to criminal activities .________ spam filtering / blocking software .What is the short form of Local Area Network ?_________ topology is connected in circular path ....

Title 2017-01-23

Title crossword puzzle
Across
  1. an instrument used to encumber land as a security for a debt (Non-Judicial States)
  2. date the county has verified their records through
  3. total amount paid during a transfer of land
  4. a map representing a piece of land subdivided into lots
  5. road map to final policy
  6. IE. A property in Maryland requiring yearly ground rent payments
  7. a person, who, by a written instrument receives an interest in land
Down
  1. product provided by an abstractor consisting of deeds and open encumbrances
  2. recorded document switching lien position
  3. boundary lines of a piece of land
  4. cover page of a search package
  5. IE. Right of Way
  6. right of ownership for the life of an individual
  7. end results of refinance transaction once all requirements have been met
  8. a person, who, by a written instrument transfers to another an interest in land
  9. lien or charge upon the land of the debtor
  10. an instrument used to encumber land as a security for a debt (Judicial States)

17 Clues: IE. Right of Wayroad map to final policycover page of a search packageboundary lines of a piece of landrecorded document switching lien positionlien or charge upon the land of the debtortotal amount paid during a transfer of landright of ownership for the life of an individualdate the county has verified their records through...

maabd crossword 2023-03-24

maabd crossword crossword puzzle
Across
  1. this program provides qualified Medicare eligible individuals withcoverage of their Medicare premiums
  2. Amendment Public Law 94-566 Section 503
  3. Covers only Medicare co-pays, premium and deductible charges
  4. medical assistance to disabled children who require a level of care provided ina medical facility, but can be appropriately cared for at home for less cost
  5. RETIREMENT, SURVIVORS, DISABILITY INSURANCE
  6. determined blind according to Social Security Administration criteria
  7. Have net countable income 100% - 120% of FPL
  8. must be 65 years or older
  9. SUPPLEMENTAL SECURITY INCOME
Down
  1. eligibility renewed once every 12 months
  2. cover aged, blind and disabled individuals using SSI budgeting methodologies
  3. Have net countable income 120% - 135% of FPL
  4. Aging and Disability Services Division
  5. individual must meet the disability criteria established by the SSA
  6. SUPPLEMENTAL SECURITY INCOME
  7. Individuals eligible for this program receive reduced premium payments for their Part D prescription drug program
  8. Scholarships, Fellowships, Need-Based Education Grants
  9. Medicaid coverage for emergency medical situations to individuals who do not meet the criteria of a qualified non-citizen

18 Clues: must be 65 years or olderSUPPLEMENTAL SECURITY INCOMESUPPLEMENTAL SECURITY INCOMEAging and Disability Services Divisioneligibility renewed once every 12 monthsAmendment Public Law 94-566 Section 503RETIREMENT, SURVIVORS, DISABILITY INSURANCEHave net countable income 120% - 135% of FPLHave net countable income 100% - 120% of FPL...

Deposit and withdrawal puzzle 2022-05-05

Deposit and withdrawal puzzle crossword puzzle
Across
  1. internal decline generated on a credit card deposit attempt.
  2. security tool, checking for fraud and financial background of customer.
  3. 3-4% charge
  4. The deposit limit is 2 per month.
  5. checking email address, phone number or name to see if the customer has an online presence or background.
  6. card number starts with 6.
  7. Once the Payments Out department determines that all the Rules/Terms and Conditions were upheld.
  8. the sense of regret after spending a lot of money.
  9. This code consists of 8 - 11 characters.
Down
  1. used to store, buy, send and receive Bitcoins and Bitcoin Cash coins.
  2. Refund request must be sent to the Payments Department.
  3. Reviews only WGS, JS, Rival, Everygame, GE.
  4. processors are not using an online gaming merchant category code for processing transactions.
  5. The minimum deposit amount for Miami Club Casino is $35.
  6. A Transaction will not show up in IPP. backoffice because.
  7. Only available for WGS & RI players.
  8. processors which in the final step of transaction require an additional security password.

17 Clues: 3-4% chargecard number starts with 6.The deposit limit is 2 per month.Only available for WGS & RI players.This code consists of 8 - 11 characters.Reviews only WGS, JS, Rival, Everygame, GE.the sense of regret after spending a lot of money.Refund request must be sent to the Payments Department.The minimum deposit amount for Miami Club Casino is $35....

vocab 2022-11-28

vocab crossword puzzle
Across
  1. to go through security
  2. passport
  3. to travel
  4. to travel by taxi
  5. ticket
  6. exit
Down
  1. door/gate
  2. airport
  3. Suitcase
  4. luggage

10 Clues: exitticketairportluggageSuitcasepassportdoor/gateto travelto travel by taxito go through security

CYBER INTIMIDATION 2013-09-30

CYBER INTIMIDATION crossword puzzle
Across
  1. - quand vous obtenez tu devrais _ _ _ _ _ _ leur
  2. - quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
  3. - peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms
  4. - beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu
Down
  1. - dire un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation
  2. - il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.

6 Clues: - quand vous obtenez tu devrais _ _ _ _ _ _ leur- peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms- beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu- quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.- dire un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation...

s22 2024-08-04

s22 crossword puzzle
Across
  1. The ability to prepare for, respond to, and recover from cyber incidents
  2. An ethical hacker who uses their skills for good
Down
  1. A hacker who falls between ethical and malicious hacking
  2. A hacker with malicious intent
  3. The process of identifying and analyzing potential risks
  4. Redirecting a website's traffic to a fraudulent site

6 Clues: A hacker with malicious intentAn ethical hacker who uses their skills for goodRedirecting a website's traffic to a fraudulent siteA hacker who falls between ethical and malicious hackingThe process of identifying and analyzing potential risksThe ability to prepare for, respond to, and recover from cyber incidents

SAW 2022 ENG 2022-01-27

SAW 2022 ENG crossword puzzle
Across
  1. Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
  2. Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
  3. Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
  4. This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
  5. A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
  6. Converting information from one form to another to hide its content and prevent unauthorized access.
  7. An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
  1. Indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
  2. A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
  3. Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
  4. Applies to information or assets that, if compromised, could cause serious injury to the national interest.
  5. Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
  6. Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
  7. The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information.
  8. Malicious software designed to infiltrate and damage computers without the user’s consent.
  9. An attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
  10. Training that provides an overview of the directives and best practices related to security. Contains 10 modules

17 Clues: Malicious software designed to infiltrate and damage computers without the user’s consent.An inadequacy related to security that could increase susceptibility to compromise or injury.Converting information from one form to another to hide its content and prevent unauthorized access....

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sent by the sender to receiver
  2. data
  3. origin
  4. interface, transmitter
  5. common clock
  6. server, user's identity
  7. security
Down
  1. decodes
  2. protocol levels
  3. bringing something to existence
  4. mediums

11 Clues: dataorigindecodesmediumssecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysent by the sender to receiverbringing something to existence

cocoa deals 2022-01-10

cocoa deals crossword puzzle
Across
  1. Steagall banking
  2. conservation corps
  3. housing act
  4. security administration
  5. owner's loan act
  6. works administration
Down
  1. industrial recovery administration
  2. work administration
  3. banking relief act
  4. progress administration
  5. conservation

11 Clues: housing actconservationSteagall bankingowner's loan actconservation corpsbanking relief actwork administrationworks administrationprogress administrationsecurity administrationindustrial recovery administration

Business brief vocabulary 2021-10-17

Business brief vocabulary crossword puzzle
Across
  1. their risk investment in lots of different items/locations to reduce the possibility of loss.
  2. security protection for computers/websites.
  3. viruses human created computer disease.
  4. of assets taking a person’s/companies possession by an authorized individual/organisation/business.
  5. establish companies Companies exist for a long time/famous/significant brand name e.g. Nike.
  6. liability claims to be at fault due to the product poor design/quality and a subsequent financial or legal claim.
  7. something in return.
  8. espionage obtaining trade secrets illegally.
  9. suicide Brand collapses due to poor decisions.
  10. Cheating. Presenting something that is not true. It results in someone losing something.
  11. risks risk connected to business performance linked to the reputation of the company.
Down
  1. something not exactly legal.
  2. to take/grab someone and demand money.
  3. people who break IT security.
  4. capitalists investment of money/resources linked to the amount of risk.
  5. self confidence without worrying about anything else.
  6. programs that protect against computer viruses.
  7. What you get back from an investment.
  8. recalls taking product from the market by the producer/government.
  9. off a situation which you accept something in a compromise.

20 Clues: something in return.something not exactly legal.people who break IT security.What you get back from an investment.to take/grab someone and demand money.viruses human created computer disease.security protection for computers/websites.espionage obtaining trade secrets illegally.programs that protect against computer viruses....

Government Finance 2023-04-20

Government Finance crossword puzzle
Across
  1. When the government borrows money by selling ____
  2. Taxes people pay on the land and houses they own
  3. General tax levied on consumer's purchases of nearly all products
  4. Social Security, National Defense, Income Security, Medicare, and Health are all _____
  5. Most important resources of state government revenues
  6. Programs that help citizens who meet established eligibility requirements (i.e health, nutritional, income)
  7. Takes the same percentage of tac from anyone no matter how much they make
  8. Spending equal revenues
Down
  1. Government expenditures that must be approved yearly
  2. Tax rate that increases as income increases
  3. Laws that approve spending got a particular activity
  4. Money the government has borrowed and hasn’t paid back
  5. When the government spends more than it collects in revenue
  6. Programs that begin working to stimulate the economy as soon as needer
  7. State spending on their citizen's education
  8. Spending that does not need annual approval
  9. The percentage of tax you pay decreases as you make more money
  10. Tax levied by the government directly on your income
  11. Second largest category of federal expenditures

19 Clues: Spending equal revenuesTax rate that increases as income increasesState spending on their citizen's educationSpending that does not need annual approvalSecond largest category of federal expendituresTaxes people pay on the land and houses they ownWhen the government borrows money by selling ____Government expenditures that must be approved yearly...

Sundong Air 2025-07-11

Sundong Air crossword puzzle
Across
  1. 탑승구
  2. 체크인 카운터
  3. 여권
Down
  1. 비행기
  2. 탑승권
  3. 보안 검색대
  4. 공항

9 Clues: 공항여권비행기탑승권탑승구보안 검색대체크인 카운터

Unit 4 Crossword 2 2026-01-21

Unit 4 Crossword 2 crossword puzzle
Across
  1. uupunut
  2. haaste
  3. käytännöllinen
  4. turvatarkastus
  5. selvittää
Down
  1. ohje
  2. rautatieasema
  3. saapua
  4. vihje

9 Clues: ohjevihjehaastesaapuauupunutselvittäärautatieasemakäytännöllinenturvatarkastus

Cyber Bullying 2021-07-16

Cyber Bullying crossword puzzle
Across
  1. Most common effect of cyber bulling, that involves having a low self esteem.
  2. Deliberately provoking a response through the use of insults on online forums and social media sites.
  3. Intentionally excluding someone from social activities.
Down
  1. It is sending or posting fake and cruel information about you online to damage their reputation and friendship.
  2. Is good for sending electronic letters and pictures but it can also be used to send nasty and threatening messages.
  3. Is the act of publicly humiliating a child through the online posting of private information.

6 Clues: Intentionally excluding someone from social activities.Most common effect of cyber bulling, that involves having a low self esteem.Is the act of publicly humiliating a child through the online posting of private information.Deliberately provoking a response through the use of insults on online forums and social media sites....

Cyber-Safety 2021-09-16

Cyber-Safety crossword puzzle
Across
  1. A Program used in malicious ways
  2. You don't receive what you were promised
  3. software that is designed to damage and destroy computers and computer systems
  4. when someone finds the pin for your credit card using automated programs
Down
  1. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
  2. a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code

6 Clues: A Program used in malicious waysYou don't receive what you were promisedwhen someone finds the pin for your credit card using automated programssoftware that is designed to damage and destroy computers and computer systemsa title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code...

cyber saftey 2019-09-30

cyber saftey crossword puzzle
Across
  1. an attempt to trick someone to get important information or money
  2. information that comes to us through the internet, often through electronics
  3. feeling:when something uncomfortable happens on digital media
Down
  1. a type of crime in which your private information is stolen and used
  2. to engage in activities that don't involve devices, apps, or the internet
  3. information:information about you that can be used to identify you

6 Clues: feeling:when something uncomfortable happens on digital mediaan attempt to trick someone to get important information or moneyinformation:information about you that can be used to identify youa type of crime in which your private information is stolen and usedinformation that comes to us through the internet, often through electronics...

Cyber safety 2016-02-10

Cyber safety crossword puzzle
Across
  1. an website that allows everyone to edit and add information on a topic
  2. people uses it to watch videos
  3. creator, you can make books on the device
Down
  1. you can use Twitter to send messages online and privately
  2. it's the most used in Australia, everyone uses it to search things
  3. is used to communicate with teachers and students in a safe way

6 Clues: people uses it to watch videoscreator, you can make books on the deviceyou can use Twitter to send messages online and privatelyis used to communicate with teachers and students in a safe wayit's the most used in Australia, everyone uses it to search thingsan website that allows everyone to edit and add information on a topic

cyber cross 2022-07-21

cyber cross crossword puzzle
Across
  1. illegal access of data via (VoIP)
  2. money for hacked data
  3. maliciously crafted software code.
Down
  1. sending hacking emails to users
  2. hacking attempt at specific individual
  3. hacking attempt at senior individual

6 Clues: money for hacked datasending hacking emails to usersillegal access of data via (VoIP)maliciously crafted software code.hacking attempt at senior individualhacking attempt at specific individual

Cyber Safety 2024-07-06

Cyber Safety crossword puzzle
Across
  1. A secret word or phrase used to access accounts.
  2. A name used to identify oneself on a computer system.
  3. Ensuring protection from harm or danger.
Down
  1. A small program designed to cause damage to your computer by gaining access to it.
  2. Global network connecting computers worldwide.
  3. Electronic mail used for sending messages online.

6 Clues: Ensuring protection from harm or danger.Global network connecting computers worldwide.A secret word or phrase used to access accounts.Electronic mail used for sending messages online.A name used to identify oneself on a computer system.A small program designed to cause damage to your computer by gaining access to it.

Cyber Safety 2024-07-25

Cyber Safety crossword puzzle
Across
  1. people whos not upstanding but watching it happened
  2. a player who is good at a online game to a low level game
  3. an id for the internet
  4. leaking your private information to the internet
Down
  1. people who stands up to bulling
  2. people who bullies peope online

6 Clues: an id for the internetpeople who stands up to bullingpeople who bullies peope onlineleaking your private information to the internetpeople whos not upstanding but watching it happeneda player who is good at a online game to a low level game

cyber bullying 2024-07-25

cyber bullying crossword puzzle
Across
  1. someone who watches bullying and doesnt do anything about it
  2. watches it happen and does nothing
  3. an information system on the internet
Down
  1. behaviour from a person that could be rude or intimidating
  2. something that helps you search on the web
  3. the person who is being mean
  4. a global computer network providing a variety of information

7 Clues: the person who is being meanwatches it happen and does nothingan information system on the internetsomething that helps you search on the webbehaviour from a person that could be rude or intimidatingsomeone who watches bullying and doesnt do anything about ita global computer network providing a variety of information

Cyber somthing 2023-01-11

Cyber somthing crossword puzzle
Across
  1. capable or floating
  2. a rapid and often excessive spread or increase
  3. existing in or spreading through every part or something
Down
  1. on purpose
  2. harmful and gradual
  3. alongside

6 Clues: alongsideon purposeharmful and gradualcapable or floatinga rapid and often excessive spread or increaseexisting in or spreading through every part or something

Cyber secruity 2024-10-04

Cyber secruity crossword puzzle
Across
  1. You can receive and send these
  2. Covid 19
  3. Form of violence
Down
  1. the technological version of catching a fish
  2. Something every store has
  3. type of evil

6 Clues: Covid 19type of evilForm of violenceSomething every store hasYou can receive and send thesethe technological version of catching a fish

Cyber secruity 2024-10-04

Cyber secruity crossword puzzle
Across
  1. You can receive and send these
  2. Covid 19
  3. Form of violence
Down
  1. the technological version of catching a fish
  2. Something every store has
  3. type of evil

6 Clues: Covid 19type of evilForm of violenceSomething every store hasYou can receive and send thesethe technological version of catching a fish

NSA 2015-11-20

NSA crossword puzzle
Across
  1. / Windows 2008 has two types of account Local and ___________
  2. / a device designed to control the flow of traffic into and out-of a network
  3. / Ping O’ Death is a ___________ attack.
  4. / Each computer in a DNS domain is uniquely identified by its?
  5. / Virus scanners must determine the ___________ of the file to determine that it is a virus
  6. / ___________ Filtering A Technique employed to ensure that incoming packets are from the network they say they are from
  7. / A group policy that is obtained from a higher level.
  8. / An attack from many agents.
  9. / Failing to install and update security patches could lead to a ____ on your system
  10. / They change their encryption module on replication
Down
  1. / A built in account
  2. / Units that mirror your organization's functional or business structure
  3. / A virus that spreads via Word, Excel, PowerPoint & PDF files
  4. / A built in account
  5. / A Syn Flood attack exploits the TCP ________________
  6. / Software that uses security holes to replicate itself

16 Clues: / A built in account/ A built in account/ An attack from many agents./ Ping O’ Death is a ___________ attack./ They change their encryption module on replication/ A group policy that is obtained from a higher level./ A Syn Flood attack exploits the TCP ________________/ Software that uses security holes to replicate itself...

Business Law 2022-07-08

Business Law crossword puzzle
Across
  1. type of security under which the issuer owes the holder a debt, & is obliged to repay
  2. long term loan that a corporate or govt. raises from the public for capital requirements
  3. something given up for a promise
  4. a person who takes responsibility for another's debt
  5. giving the world notice that the creditor has interest in adulterous property; other creditors beware
  6. district or county which is where the contract was executed
  7. rule adopted by an org. chiefly for the govt. of its members & the regulation of affairs
Down
  1. creditors rights attach as soon as they sign
  2. promises exchanged between parties
  3. promise to keep an offer open that is paid for
  4. distribution of profits by a corp. to its shareholders
  5. control over work is dependent on employer
  6. promise for performance
  7. shares of which ownership of a corporation
  8. security interest or legal rights acquired in one property by a creditor

15 Clues: promise for performancesomething given up for a promisepromises exchanged between partiescontrol over work is dependent on employershares of which ownership of a corporationcreditors rights attach as soon as they signpromise to keep an offer open that is paid fora person who takes responsibility for another's debt...

Climate and Food Production 2022-11-24

Climate and Food Production crossword puzzle
Across
  1. The amount of crop harvested per area of land
  2. Climate change is one of these factors that threaten food security
  3. The type of fertiliser best used for sustainable farming practices
  4. the presence of salt on the surface of the land or in rivers
  5. The availability and access to enough nutritious food to maintain a healthy life
  6. Most crops will not grow with this present in the soil
  7. A decline in the quality of land so it becomes unproductive
  8. One of the main crops grown in Western Australia
  9. A natural underground water source
Down
  1. Includes rainfall and temperature
  2. The supply of water by artificial means to agricultural areas where there is a shortage
  3. A glass building that houses plants and vegetables
  4. A threat to food security
  5. When agriculture meets the current and future generational needs
  6. A method to store rainwater on farms

15 Clues: A threat to food securityIncludes rainfall and temperatureA natural underground water sourceA method to store rainwater on farmsThe amount of crop harvested per area of landOne of the main crops grown in Western AustraliaA glass building that houses plants and vegetablesMost crops will not grow with this present in the soil...

CROSSWORD 2024-05-20

CROSSWORD crossword puzzle
Across
  1. - What improvements can be made to the audiovisual experience?
  2. - What steps can be taken to improve accessibility for people with disabilities?
  3. - How can we create a more exclusive experience for certain attendees?
  4. - How can parking facilities be made more convenient and spacious?
  5. - How can the cleanliness of restrooms and common areas be maintained?
  6. - How an public transportation options be improved for the arena?
  7. - How can security be improved without inconveniencing attendees?
Down
  1. - What can be done to enhance mobile connectivity for visitors?
  2. - How can we cater to diverse tastes in food and beverages?
  3. - How can the ticketing experience be made more efficient?
  4. - How can we reduce crowd congestion at the Mall of Asia Arena?
  5. - How can navigation within the arena be made easier for visitors?
  6. - What eco-friendly initiatives can the arena implement?
  7. - What additional entertainment options could be offered around event times?
  8. - What can be done to improve seating comfort for attendees?

15 Clues: - What eco-friendly initiatives can the arena implement?- How can the ticketing experience be made more efficient?- How can we cater to diverse tastes in food and beverages?- What can be done to improve seating comfort for attendees?- What improvements can be made to the audiovisual experience?...

Understanding our neighbours 2024-03-18

Understanding our neighbours crossword puzzle
Across
  1. Indonesia has plans to relocate its _ _ _ _ _ _ _ from Jakarta to Nusantara
  2. What is the event that affect Singapore the most with Indonesia
  3. SAF and NS foster _ _ _ _ _ _ _ _ _ _ _ _ among Singaporeans, crucial for national unity
  4. The current King of Malaysia is Sultan of which state?
  5. _ _ _ _ _ _ _ _ _ _ in SAF and NS is key to maintaining Singapore's defense readiness
  6. Building _ _ _ _ _ in Singapore's defense capabilities through rigorous training
  7. Indonesia and Singapore develop joint initiatives to address regional security challenges, such as _ _ _ _ _ _ _-terrorism and maritime safety
Down
  1. What Political Coalitions is the Current Prime Minister from?
  2. The Defense Cooperation Agreement enables Singapore Armed Forces to conduct _ _ _ _ _ _ _ _ training in Indonesia
  3. Major area of cooperation between Malaysia and Singapore?
  4. Current president of Indonesia
  5. Crucial for _ _ _ _ _ _ _ _ defense and the credibility of Singapore's commitment to it
  6. Essential to ensuring _ _ _ _ _ _ _ _ in a small nation like Singapore
  7. What does SEZ stands for?
  8. What is the challenges that is a point of contention between Malaysia and Singapore?

15 Clues: What does SEZ stands for?Current president of IndonesiaThe current King of Malaysia is Sultan of which state?Major area of cooperation between Malaysia and Singapore?What Political Coalitions is the Current Prime Minister from?What is the event that affect Singapore the most with Indonesia...

crossword 2024-10-09

crossword crossword puzzle
Across
  1. Encryption Standard :A symmetric-key algorithm for data encryption
  2. communication from an unknown source as being from a known one.
  3. Notification: A legal requirement to inform affected individuals after a data breach.
  4. :A network of compromised computers controlled by a hacker.
  5. Management:Processes for responding to and managing security incidents.
  6. Security:Measures to protect physical assets and locations from unauthorized access.
  7. vulnerability that is exploited before the vendor knows about it
  8. list of approved entities allowed access to a system.
Down
  1. a computer network into smaller parts for security.
  2. :Information used to verify a user’s identity, like a password.
  3. Authority (CA):An entity that issues digital certificates for secure communications.
  4. Hash:A fixed-size string generated from data to ensure integrity.
  5. Code:Software intended to harm or exploit any programmable device.
  6. code injection technique used to attack databases.
  7. state of being unidentifiable within a network or system.

15 Clues: code injection technique used to attack databases.a computer network into smaller parts for security.list of approved entities allowed access to a system.state of being unidentifiable within a network or system.:A network of compromised computers controlled by a hacker.:Information used to verify a user’s identity, like a password....

crossword 2024-10-09

crossword crossword puzzle
Across
  1. A list of approved entities allowed access to a system.
  2. A vulnerability that is exploited before the vendor knows about it
  3. Processes for responding to and managing security incidents.
  4. Information used to verify a user’s identity, like a password.
  5. A network of compromised computers controlled by a hacker.
  6. Disguising communication from an unknown source as being from a known one.
  7. A code injection technique used to attack databases.
  8. Measures to protect physical assets and locations from unauthorized access.
  9. The state of being unidentifiable within a network or system.
  10. A symmetric-key algorithm for data encryption
Down
  1. A legal requirement to inform affected individuals after a data breach.
  2. A fixed-size string generated from data to ensure integrity.
  3. Dividing a computer network into smaller parts for security.
  4. An entity that issues digital certificates for secure communications.
  5. Software intended to harm or exploit any programmable device.

15 Clues: A symmetric-key algorithm for data encryptionA code injection technique used to attack databases.A list of approved entities allowed access to a system.A network of compromised computers controlled by a hacker.A fixed-size string generated from data to ensure integrity.Dividing a computer network into smaller parts for security....

about the work 2024-11-11

about the work crossword puzzle
Across
  1. performs a number of important functions to ensure security and order in society.\
  2. Performs on stage
  3. He is engaged in creative activities in various fields of art
  4. This is a leader who manages people and processes.
  5. controls the flight of the aircraft
  6. produces agricultural products for sale on leased or own land
  7. maintenance, repair, adjustment and inspection of various mechanical systems
  8. Selection of flowers and plants
Down
  1. Driving a vehicle
  2. He is engaged in the management and control of various technical devices
  3. Preparation of drinks
  4. занимается учётом и хранением книг, а также выдачей их всем желающим для работы или простого чтения.
  5. is engaged in ensuring the safety of the facility
  6. He is engaged in the translation and adaptation of written text or oral speech from one language to another
  7. He must guide his student in coordinating his personal goals with academic ones.

15 Clues: Driving a vehiclePerforms on stagePreparation of drinksSelection of flowers and plantscontrols the flight of the aircraftis engaged in ensuring the safety of the facilityThis is a leader who manages people and processes.He is engaged in creative activities in various fields of artproduces agricultural products for sale on leased or own land...

Think Before You Click: Cyber Threats Crossword 2025-03-20

Think Before You Click: Cyber Threats Crossword crossword puzzle
Across
  1. Unsolicited and irrelevant emails sent to many users
  2. Security system controlling network traffic
  3. Malware that blocks access or threatens to leak data unless ransom paid
  4. Report suspicious emails quickly to your __________ team.
  5. Don’t share __________ info, colleagues won’t ask via personal email.
  6. Fraudulent attempt to obtain sensitive information by pretending to be trustworthy
  7. Saving passwords in unsecured files or browsers is unsafe, use a __________ instead.
  8. Disguising communication from unknown source as trusted
  9. Fraud attempt to get sensitive info via SMS
Down
  1. Don’t download strange __________ from unexpected emails — it might be malware!
  2. Don’t click on strange _____ in emails — it might be a phishing trick.
  3. If a site warns it’s unsafe, don’t ignore the browser’s __________.
  4. Clicking ‘unsubscribe’ in spam emails may __________ your email to attackers.
  5. Phishing attack targeted at specific individual or organization
  6. A secret word or phrase used to gain access to a system

15 Clues: Security system controlling network trafficFraud attempt to get sensitive info via SMSUnsolicited and irrelevant emails sent to many usersDisguising communication from unknown source as trustedA secret word or phrase used to gain access to a systemReport suspicious emails quickly to your __________ team....

crossword 2018-05-21

crossword crossword puzzle
Across
  1. once passengers are though immigration and security they are now in
  2. what is the three letter code for kerikeri
  3. In 2014 how may passengers did auckland international airport carry
  4. whats the number runways at the auckland airport
  5. for parking facilities which do you think would cost more short or long term
  6. what is the liquid measurement that your aloud to carry
  7. true or false both travellers and non-travellers have access to all landslide facilities
Down
  1. whats the third phase of flight
  2. what side does this definition belong to-this is the area before departing passengers pass through security.
  3. true or false landslide offers lounges
  4. what do you put your gels and liquids in
  5. whats hours does the airport operate
  6. what does AVSEC stand for
  7. auckland city is how far away from the airport
  8. how many airbridges does auckland international airport have
  9. what jet engine aircrafts do these belong to,737,767,777,787
  10. what is the three letter code for hamilton

17 Clues: what does AVSEC stand forwhats the third phase of flightwhats hours does the airport operatetrue or false landslide offers loungeswhat do you put your gels and liquids inwhat is the three letter code for kerikeriwhat is the three letter code for hamiltonauckland city is how far away from the airportwhats the number runways at the auckland airport...

Vocabulary pag 72 2024-04-17

Vocabulary pag 72 crossword puzzle
Across
  1. refers to the act of illegally taking another person's property without their consent.
  2. institution where people convicted of crimes are imprisoned.
  3. process of seeking information and collecting evidence to solve a criminal case.
  4. professional in charge of investigating crimes and collecting evidence.
  5. object used to inflict damage or cause injury.
  6. act of killing someone intentionally and illegally.
  7. act of illegally taking another person's property without his or her consent.
  8. used to identify people and as evidence in criminal cases.
  9. information or evidence used to prove or disprove a fact.
Down
  1. to observe or carefully analyze something to obtain information.
  2. a person who commits crimes or breaks the law.
  3. unique and distinctive prints on your fingertips.
  4. find a solution or answer to a problem or situation.
  5. to capture or detain someone, especially a criminal.
  6. Guard- professional in charge of protecting property and people.
  7. to actively follow or search for someone, especially a criminal.
  8. officers-members of law enforcement agencies charged with maintaining peace and security.

17 Clues: a person who commits crimes or breaks the law.object used to inflict damage or cause injury.unique and distinctive prints on your fingertips.act of killing someone intentionally and illegally.find a solution or answer to a problem or situation.to capture or detain someone, especially a criminal....

Cybersecurity Glosary 2025-10-07

Cybersecurity Glosary crossword puzzle
Across
  1. Security principle ensuring that data is not altered or tampered with
  2. Type of malware that locks data until a payment is made
  3. Permission to access certain resources or perform actions
  4. Fraudulent attempt to get sensitive information by pretending to be a trusted empty
  5. Company that provides users access to the Internet
  6. Malicious program disguised as legitimate software
  7. Network of connected devices that communicate over the Internet
  8. Unauthorized takeover of a system, network or online session
  9. Process that converts data into unreadable code to protect it
  10. Manipulating people to reveal confidential information
Down
  1. Weak Points in a system that attackers can exploit
  2. Security principle ensuring that systems and data are accesible when needed
  3. Process of verifying someone's identity before granting access
  4. Secret string of characters used for authentication
  5. Probability that a threat will exploit a vulnerability
  6. Software that secretly collects user data and send it to others
  7. Risks that come from employees or people inside an organization

17 Clues: Weak Points in a system that attackers can exploitCompany that provides users access to the InternetMalicious program disguised as legitimate softwareSecret string of characters used for authenticationProbability that a threat will exploit a vulnerabilityManipulating people to reveal confidential information...

Words from FMC-010 2025-11-07

Words from FMC-010 crossword puzzle
Across
  1. The amount of safety you take with your money
  2. A card linked to your money, you can also use online banking
  3. The amount of money you take from the bank
  4. The length of time until a loan must be paid
  5. The maximum amount of money
  6. The amount of chance you take with your money
  7. Someone who borrows money from someone
  8. The percentage of interest each month or annum
  9. An agreement that has a set end date
Down
  1. something pledged as security for repayment of a loan
  2. The rate that stays the same no matter what
  3. The interest rate that changes by the market
  4. Someone who lends you money
  5. The amount of money the bank pays when you buy a house
  6. A card that is directly linked to your banks money that you have to pay back every month
  7. Changing the way you pack back the bank or someone
  8. The original amount of money borrowed

17 Clues: The maximum amount of moneySomeone who lends you moneyAn agreement that has a set end dateThe original amount of money borrowedSomeone who borrows money from someoneThe amount of money you take from the bankThe rate that stays the same no matter whatThe interest rate that changes by the marketThe length of time until a loan must be paid...

Chapter 3 section 1 2013-10-02

Chapter 3 section 1 crossword puzzle
Across
  1. include sending letters of appreciation and presenting awards
  2. result from a desire to reach our ultimate potential
  3. include love, friendship and reputation
  4. includes economic security, mental security, protection from harm
  5. in order to build trust you need to take___________to let the customers get to know you
  6. always keep your_______ when trying to build trust
  7. the most basic need includes food, water and shelter
Down
  1. what type of selling needs to emphasize the relationship between salesperson and buyer
  2. personal selling needs to have what type of communication
  3. based on the desire to have a specific product or service
  4. based on the customers logical reasoning
  5. you shoud___________ time for small talk with customers to build trust

12 Clues: include love, friendship and reputationbased on the customers logical reasoningalways keep your_______ when trying to build trustresult from a desire to reach our ultimate potentialthe most basic need includes food, water and shelterpersonal selling needs to have what type of communicationbased on the desire to have a specific product or service...

Aerospace book 1, 3, 5 and 7 Vocabulary 2023-08-03

Aerospace book 1, 3, 5 and 7 Vocabulary crossword puzzle
Across
  1. – relating to the forces of air in motion
  2. in the Northern Hemisphere
  3. - an enormous collection of stars arranged in a particular shape
  4. – the science of flight within the atmosphere
  5. – the art, science, and technology of flight within the atmosphere
  6. - first layer of the atmosphere where most of the Earth’s weather occurs
  7. - boundary between the troposphere and the stratosphere
  8. space - the space between the Earth and the Moon
  9. edge – the front part of a wing or airfoil
  10. – the curved part of an airfoil from its leading to trailing edge
  11. security - the collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants.
  12. full rotation 24 hours
  13. easterlies - global winds that flow from the poles and move to the west
  14. - a region of the atmosphere where electrons are gained or lost
  15. winds - the world-wide system of winds that transfers heat between tropical and polar regions
  16. (fall) equinox - the time when the Sun's direct rays strike the equator resulting in day and
  17. - a crime that involves a computer and a network.
  18. – a line drawn through an airfoil from its leading to trailing edge
  19. - a layer of the atmosphere extending from 50 to about 300 miles
  20. - a channel that links computers, servers, network devices, peripherals, or other devices together to allow the sharing of data.
  21. theoretically the absolute coldest temperature
  22. zero - the point at which all molecules no longer move or have the least amount of
  23. - small gravity levels or low gravity; floating condition
  24. temperature
  25. – a combination of aeronautics and space
  26. - a person who conducts illegal activity using computers or other digital technology.
  27. orbit of its outermost planet
  28. - all encompassing term that includes everything; planets, galaxies, animals, plants, and humans
  29. US, generally from the west to the east
  30. ethics - is a set of moral, legal, and social principles that applies to computers relating to the user’s behavior
  31. - a desktop computer or workstation that is capable of obtaining resources from a server. Cyber - describes characteristics of the culture of computers, information technology, and virtual reality.
  32. - region beyond the Earth’s atmosphere where there is very little molecular activity
  33. rate - the rate of decrease with an increase in height for pressure and temperature
  34. – the natural force pulling everything to Earth
  35. Allen belts - radiation belts around the Earth filled with charged particles
  36. - a computer program or a device that provides sharable resources.
Down
  1. - the environment that allows digital technology of many forms to communicate with one another via the Internet.
  2. balloons, helicopters, hangliders, and parasails
  3. - unit of measurement based on absolute zero and commonly used by scientists to
  4. - the method by which the Sun heats the Earth
  5. - a layer of the atmosphere extending from about 30 to 50 miles
  6. - a layer of the atmosphere extending from the tropopause to about 30 miles
  7. westerlies - global winds that move toward the poles and appear to curve to the east
  8. – height above sea level or ground level expressed in units
  9. - space that is empty or void of molecules
  10. stream - a strong wind that develops at 30,000-35,000 feet and moves as a winding road across
  11. – a person who operates an aircraft in flight
  12. space - space located within a solar system; measured from the center of the Sun to
  13. – the downward movement of air behind a wing in flight
  14. - the movement of the Earth revolving around the Sun; full revolution about 365 days
  15. switching - a process of arranging data into small units that can be transmitted over a digital network.
  16. – a place on either land or water where aircraft can land and take off for flight
  17. – the upward force that opposes gravity and supports the weight of an aircraft
  18. – pertaining to air
  19. Force - winds associated with the Earth’s rotation that deflect a freely-moving object to the
  20. - how the Earth turns (rotates) on its axis at an angle of 23.5° while it revolves around the
  21. - a connection point that relays information along a distributed network.
  22. - a global area of calm winds
  23. wind – the flow of air which moves opposite the flight path of an airplane
  24. – forces in motion
  25. – an aircraft that is kept aloft by the aerodynamic forces upon its wings and is thrust for￾ward by a means of propulsioairfoil – a component, such as a wing, that is specifically designed to produce lift, thrust, or direc￾tional stability
  26. – the force which moves an aircraft forward in flight
  27. the use of technology to attack a nation via network communications and computer devices.
  28. - a worldwide collection of different networks connecting millions of devices which allows communication between other devices on the network.
  29. – any machine that is capable of flying through the air; included are ultralights, airplanes,
  30. space - the region in space from one solar system to another
  31. – a mixture of gases that contains approximately 78% nitrogen, 21% oxygen, and 1% other gases
  32. - a region of the atmosphere where ozone is created
  33. of equal length, usually on September 22nd or 23rd
  34. – a force which slows the forward movement of an aircraft in flight

70 Clues: temperature– forces in motion– pertaining to airfull rotation 24 hoursin the Northern Hemisphere- a global area of calm windsorbit of its outermost planetUS, generally from the west to the east– a combination of aeronautics and space– relating to the forces of air in motion- space that is empty or void of molecules...

Fuller Leadership Crossword 2022-02-14

Fuller Leadership Crossword crossword puzzle
Across
  1. Nutrition Services Supervisor
  2. Quality of Life Supervisor
  3. 2nd Floor Manager
  4. Director of Nursing
  5. Assistant Administrator
  6. 3rd Floor Manager
  7. Financial Counselor/Office Supervisor
  8. Security Supervisor
  9. Nutrition Services Supervisor
  10. Administrator
Down
  1. 4th Floor Manager
  2. Assistant Administrator
  3. 5th Floor Manager
  4. Environmental Services Supervisor
  5. Infection Prevention
  6. Therapy Supervisor

16 Clues: Administrator4th Floor Manager5th Floor Manager2nd Floor Manager3rd Floor ManagerTherapy SupervisorDirector of NursingSecurity SupervisorInfection PreventionAssistant AdministratorAssistant AdministratorQuality of Life SupervisorNutrition Services SupervisorNutrition Services SupervisorEnvironmental Services Supervisor...

#18 Hospital Staff 2025-09-11

#18 Hospital Staff crossword puzzle
Across
  1. Protect hospital grounds
  2. Operate hospital machines
  3. Move patients safely
  4. Organize treatment
  5. Support patient needs
Down
  1. Greet visitors
  2. Prepare medicines
  3. Provide medical care
  4. Create healthy menus
  5. Give spiritual comfort
  6. Guide physical activity
  7. Keep rooms safe
  8. Offer kindness
  9. Daily support and help

14 Clues: Greet visitorsOffer kindnessKeep rooms safePrepare medicinesOrganize treatmentProvide medical careCreate healthy menusMove patients safelySupport patient needsGive spiritual comfortDaily support and helpGuide physical activityProtect hospital groundsOperate hospital machines