cyber security Crossword Puzzles
Data Protection Awareness Puzzle 2017-01-09
Across
- Under which section of the DPA 1998 can you make a Subject Access Request (SAR)
- Number of principles the Data Protection Act 1998 (DPA) contains
- Fill in the blank: Personal data must be held no longer than '...'
- Act of revelation
- Give permission
- An organisation or body that processes personal data
- You can lock your computer by holding the Windows button and which other letter on the keyboard?
Down
- A data breach may result in this for The Authority and for you
- Establishing who someone is
- Attempting to get confidential information by sending fake emails
- A requirement for logging in
- A medium used by The Authority for secure email and file transfers
- Security error/ the breaking of a law or agreement
- A computer security system which prevents unauthorised access to a network
14 Clues: Give permission • Act of revelation • Establishing who someone is • A requirement for logging in • Security error/ the breaking of a law or agreement • An organisation or body that processes personal data • A data breach may result in this for The Authority and for you • Number of principles the Data Protection Act 1998 (DPA) contains • ...
Department of Homeland Security 2015-08-17
Across
- Month DHS was formed
- Secretary of TSA
- What kind of branch is the Eagle on the DHS seal holding in its left talon?
- Number of secretaries DHS has had
- First Secretary of DHS
- Number of child agencies under DHS
- Campaign set up to combat human trafficking
Down
- Secretary of DHS
- How many arrows is the Eagle holding in its right talon on the DHS seal?
- An agency within DHS which has two distinct purposes, one of them being the protection of current and former national leaders and their families.
- An agency within DHS whose primary purpose is to coordinate and respond to natural disasters that occur within the United States and overwhelm the local resources and authorities of where they occur
- A branch of the US Armed Forces that operated under DHS during peace time, but can be transferred to the U.S. Department of the Navy by the President at any time, or by Congress during times of war.
- Number of core missions DHS has according to the QHSR
- An agency within DHS which regulates and facilitates international trade, collects import duties, and enforces U.S. regulations. Currently,the largest federal law enforcement agency.
14 Clues: Secretary of DHS • Secretary of TSA • Month DHS was formed • First Secretary of DHS • Number of secretaries DHS has had • Number of child agencies under DHS • Campaign set up to combat human trafficking • Number of core missions DHS has according to the QHSR • How many arrows is the Eagle holding in its right talon on the DHS seal? • ...
Food security in india 2023-12-01
Across
- - casual labourers are from which area
- - universal is the coverage target group of which scheme
- - important role in food security in india
- - what is the other name of fair price shops
- - raised the maintenance cost of procuring food grains by the government
- - food is within reach of every person
Down
- - revolution associated with milk and its production brought by amul
- - priority households is the coverage target group of which scheme
- - issue price of APS is
- - purchases wheat and rice from the farmers
- - launched in December 2000
- - in which state famine occured
- - proved to be the most effective instrument of government policy over the years
- - landless farmers are from which area
- - which scheme was introduced in 1992
15 Clues: - issue price of APS is • - launched in December 2000 • - in which state famine occured • - which scheme was introduced in 1992 • - casual labourers are from which area • - landless farmers are from which area • - food is within reach of every person • - important role in food security in india • - purchases wheat and rice from the farmers • ...
Human Security and Peacebuilding 2025-05-17
Across
- Reframe spoilers to be a ... instead of only disruptive
- Combination of liberal efforts and local practices
- Premature ... and election before DDR and SSR
- Part of 4-part model of hybrid peace, top down rules and pressures
- Type of spoilers that fundamentally reject the peace process entirely
- External intervention is strategically focused on achieving ... objectives
- One of the 3 forms of local resistance, resist, ignore, ...
Down
- This approach to liberal peace-building involves multiple international actors
- Type of liberal peace-building, its strength lies in swift decision making and clear accountability
- Type of peace that risks return of repression because it isn't democratic
- One of 5 pillars of successful peace-building, ... partnerships between local and international actors
- Liberal values, democracy, free ..., rule of law
- Type of peace-building where rules are imposed from higher up, with little regard to local context
- Focused on developing effective, legitimate and resilient state institutions
14 Clues: Premature ... and election before DDR and SSR • Liberal values, democracy, free ..., rule of law • Combination of liberal efforts and local practices • Reframe spoilers to be a ... instead of only disruptive • One of the 3 forms of local resistance, resist, ignore, ... • Part of 4-part model of hybrid peace, top down rules and pressures • ...
Internet Privacy and Security 2025-08-15
Across
- A secret combination used to access something
- What software does after placing a cookie
- The ideas or beliefs others have about you
- Protecting people’s devices and software
- A set of instructions in software code
- Helps people know what apps and sites do with their data
- Learning A form of AI that improves with new data
Down
- Protecting people’s data and personal information
- A person who uses computers to gain unauthorized access
- Footprint All the information about you that appears online
- A bit of text placed on your device by websites
- The area in digital products where you manage privacy
- Intelligence Software that makes machines learn and solve problems
- Digital information that can be seen, used, and shared
14 Clues: A set of instructions in software code • Protecting people’s devices and software • What software does after placing a cookie • The ideas or beliefs others have about you • A secret combination used to access something • A bit of text placed on your device by websites • Protecting people’s data and personal information • ...
Biomes and Food Security 2021-11-03
Across
- when livestock eat too much grass
- being able to find and source food
- a biome used by humans for livestock and crops
- a biome that is usually dry and hot/cold
- having enough nutritious food that is affordable/accessible
- when healthy grasslands turn to desert
Down
- quality of soil getting worse
- maintaining biomes so that they last into the future
- having enough money to buy food
- affects how hot/cold a place is
- average weather conditions experienced in a biome
- imaginary line around the middle of the world
- a biome that is full of trees;temperate climate
- another word for ecosystem
14 Clues: another word for ecosystem • quality of soil getting worse • having enough money to buy food • affects how hot/cold a place is • when livestock eat too much grass • being able to find and source food • when healthy grasslands turn to desert • a biome that is usually dry and hot/cold • imaginary line around the middle of the world • ...
ParaCommando Kruiswoordraadsel 2014-03-11
Across
- Militair voertuig
- Vertrekplaats voor vliegtuigsprong
- Militaire helikopter
- Operatie Kolwezi 78
- onbemande vliegtuig(afk)
- De beste vriend van een para
- Parachute
- M56
- Eskadron in het Belgisch Leger
- Hoofddeksel van de chutist
Down
- legervervoermiddel
- Auschwitz en Birkenau
- legeroefening
- voormalig Belgische Koning
- Thuishaven school voor onderofficieren
- meerdere compagnieën
- Belgium Luxemburg International Security Assistance Force
- Opleidingskamp van de para-commando
- graad in het leger
19 Clues: M56 • Parachute • legeroefening • Militair voertuig • legervervoermiddel • graad in het leger • Operatie Kolwezi 78 • Militaire helikopter • meerdere compagnieën • Auschwitz en Birkenau • onbemande vliegtuig(afk) • voormalig Belgische Koning • Hoofddeksel van de chutist • De beste vriend van een para • Eskadron in het Belgisch Leger • Vertrekplaats voor vliegtuigsprong • ...
ParaCommando Kruiswoordraadsel 2014-03-11
Across
- Opleidingskamp van de para-commando
- legeroefening
- Belgium Luxemburg International Security Assistance Force
- M56
- Hoofddeksel van de chutist
- onbemande vliegtuig(afk)
- meerdere compagnieën
- Auschwitz en Birkenau
- Militaire helikopter
Down
- legervervoermiddel
- Eskadron in het Belgisch Leger
- De beste vriend van een para
- Operatie Kolwezi 78
- Thuishaven school voor onderofficieren
- Vertrekplaats voor vliegtuigsprong
- Parachute
- voormalig Belgische Koning
- graad in het leger
- Militair voertuig
19 Clues: M56 • Parachute • legeroefening • Militair voertuig • legervervoermiddel • graad in het leger • Operatie Kolwezi 78 • meerdere compagnieën • Militaire helikopter • Auschwitz en Birkenau • onbemande vliegtuig(afk) • Hoofddeksel van de chutist • voormalig Belgische Koning • De beste vriend van een para • Eskadron in het Belgisch Leger • Vertrekplaats voor vliegtuigsprong • ...
test q3 2025-08-06
Across
- IPS Technology has increased crime-solving rates by over _____% across multiple nations
- Our ____ solution allows for contactless identity verification through use of remote supervision driven by video and audio sessions
- IDEMIA Public Security’s ______ solution is ideal for urban environments, providing speed and red-light enforcement with a sleek design that can easily fit into a city setting
- IDEMIA is certified platinum (highest level) in this sustainability rating
- IDEMIA Public Security provides biometric authentication and document verification solutions to support this initiative to better protect European borders
- IDEMIA Public Security’s ________ app is available for businesses to securely verify a person’s identity through use of digital credentials and bluetooth connection
- This solution enables high-tech threat migration capabilities by increasing the safety of force protection personnel, improving installation situational awareness and, ultimately, providing secure and frictionless access, meeting the expectations of today’s generation.
- IDEMIA Public Security’s _______ Series offers efficient, secure identity verification in all conditions
Down
- Reinforcing our commitment to leadership in biometrics and identity technology, we have recently added ________ to one of our products used to aid in criminal investigations and now empower law enforcement to identify individuals even when traditional biometric data is unavailable.
- In North America, IDEMIA Public Security recently hit a huge milestone with launching mobile IDs in all three major U.S. wallets with the launch of the Iowa Mobile ID in _______ Wallet
- IDEMIA Public Security’s ______ solution was developed in response to France’s Charles de Gaulle airport and Singapore’s Changi airport need for a touchless solution to facilitate secure identification of passengers and reduce boarding times
- IDEMIA Public Security combines our technical leadership with a ________ mindset, setting apart our solutions and helping agencies tackle challenges with confidence and efficiency
- IDEMIA Public Security’s ______ provides support in criminal investigations with a range of biometric identification systems, including facial, fingerprint, iris matching and more
- Our ____ Site recently obtained the ISO 14001 certification, becoming the first IPS site to achieve this milestone
- IDEMIA Public Security continuously participates in and ranks amongst the top performers in these benchmarking tests
15 Clues: IDEMIA is certified platinum (highest level) in this sustainability rating • IPS Technology has increased crime-solving rates by over _____% across multiple nations • IDEMIA Public Security’s _______ Series offers efficient, secure identity verification in all conditions • ...
Crossword- Access control 2022-02-05
Across
- One technique comes under authentication by knowledge
- One example of Single Sign-on technology
- BIBA model enforces
- Simple security rule (“no read up “ rule) in BLP preserves
- ______ list is the subject perspective view of the access control matrix.
Down
- Credit card-based authentication comes under authentication by this factor.
- The term in access control for the verification that the user’s claimed identity is valid
- Confirms and audits potential breaches by analyzing the security events.
- Common identity management technology
- the flow of information between subject and object refers to
10 Clues: BIBA model enforces • Common identity management technology • One example of Single Sign-on technology • One technique comes under authentication by knowledge • Simple security rule (“no read up “ rule) in BLP preserves • the flow of information between subject and object refers to • Confirms and audits potential breaches by analyzing the security events. • ...
The Executive Branch 2023-10-21
Across
- President The second-in-command in the executive branch
- The group of advisers appointed by the President to lead various government departments
- The department responsible for US foreign affairs
- The executive department in charge of federal law enforcement and investigations
- The head of the executive branch
Down
- Security The executive department responsible for ensuring national security
- The executive department in charge of the country's military forces
- The executive department overseeing environmental and natural resource policies
- The government agency responsible for enforcing immigration laws
- The department responsible for managing the country's finances
10 Clues: The head of the executive branch • The department responsible for US foreign affairs • President The second-in-command in the executive branch • The department responsible for managing the country's finances • The government agency responsible for enforcing immigration laws • The executive department in charge of the country's military forces • ...
Crossword 2023-11-21
Across
- Calls all members to respect the sovereignty, territorial integrity and political independence
- Withdrawal of customary trade and financial relations for foreign and security/policy purposes
- What does the United States lose because of their double standards?
- What was the US response to the UN Security COuncil Gaza ceasefire resolution?
- Supporter of Ukraine economically and politically.
Down
- Article one’s greatest emphasis.
- Largest international financial supporter of Ukraine
- Author’s book
- Balanced stance on Russo-Ukrainian war to save economic ties
- What is the collective name for the developing nations of Latin America, Africa and Asia?
10 Clues: Author’s book • Article one’s greatest emphasis. • Supporter of Ukraine economically and politically. • Largest international financial supporter of Ukraine • Balanced stance on Russo-Ukrainian war to save economic ties • What does the United States lose because of their double standards? • ...
airramm 2024-10-10
Across
- Software that secetly gather user data
- The first character of its acronym begins with a number, it is used for two-factor authentication
- A weakness that can be exploited to compromise a system
- Malware that locks data, demanding payment for access
Down
- A group of infected devices controlled by hackers
- Unauthorized access or theft of confidential data
- A software update that fixes security flaws
- A scan to steal sensitive information by pretending to be legitimate
- Harmuful software designed to damage or infiltrate systems
- A system that controls network traffic based on security rules.
10 Clues: Software that secetly gather user data • A software update that fixes security flaws • A group of infected devices controlled by hackers • Unauthorized access or theft of confidential data • Malware that locks data, demanding payment for access • A weakness that can be exploited to compromise a system • Harmuful software designed to damage or infiltrate systems • ...
test 2024-09-25
Across
- I help visualize and communicate product roadmaps.
- I gather user feedback to guide product development.
- I provide a suite for planning, development, and collaboration.
Down
- I analyze code quality and maintainability.
- I help secure open source by finding vulnerabilities.
- Manages open-source compliance and security risks. Helps track and analyze third-party software usage.(Acronym)
- I manage feature flags and control rollouts.
- A powerful REST API client for testing APIs. Supports GraphQL and offers collaboration features.
- I identify and fix security issues in your code.
- I enable collaborative design for teams.
10 Clues: I enable collaborative design for teams. • I analyze code quality and maintainability. • I manage feature flags and control rollouts. • I identify and fix security issues in your code. • I help visualize and communicate product roadmaps. • I gather user feedback to guide product development. • I help secure open source by finding vulnerabilities. • ...
Bank credit essentials 2024-11-28
Across
- Contract defining terms and conditions of a loan.
- A principle ensuring lenders have equal claim on borrower assets.
- One of the 5Cs, assessing integrity and trustworthiness.
- The duration of the loan, linked to the risk of default.
Down
- Assets pledged by borrowers as security for a loan.
- A credit evaluation model used alongside the 5Cs.
- A third-party commitment to pay in case of borrower default.
- Legal paperwork required for securing a loan.
- A fallback assurance in case of borrower’s failure to pay.
- One of the 5Cs, showing financial commitment by the borrower.
10 Clues: Legal paperwork required for securing a loan. • A credit evaluation model used alongside the 5Cs. • Contract defining terms and conditions of a loan. • Assets pledged by borrowers as security for a loan. • One of the 5Cs, assessing integrity and trustworthiness. • The duration of the loan, linked to the risk of default. • ...
Fortinet: Crack the Code 2024-06-04
Across
- a tool for analyzing and reporting on network events and security logs.
- a network switch that connects and manages data traffic within a network.
- a security token that provides two-factor authentication for securing user access.
- a centralized management system for controlling all your fortigate devices and policies.
Down
- a system that manages user identity and access privileges across a network.
- a security appliance that acts as a firewall to protect networks from external threats.
- a cloud-based service that provides secure access to network resources from anywhere.
7 Clues: a tool for analyzing and reporting on network events and security logs. • a network switch that connects and manages data traffic within a network. • a system that manages user identity and access privileges across a network. • a security token that provides two-factor authentication for securing user access. • ...
MONDAY 4th NOVEMBER 2019-11-03
16 Clues: POINT • DIRECT • JOURNEY • SECURITY • REGISTER • ENJOYABLE • MONEY YOU OWE • PLAY FOR MONEY • OPPOSITE OF WET • DISMISS FROM A JOB • ACTIVITY FOR PLEASURE • MAN WHOSE WIFE IS DEAD • SIGN USED TO CONNECT WORDS • PERSON WHO TRAVELS CLANDESTINELY • A PLACE IN WHICH A SPECTATOR SITS • CHALLENGE,HAVE THE COURAGE TO DO SOMETHING
Random Words 2025-08-27
Across
- Musical instrument
- Released after death
- Comes in different types
- Of tremendous magnitude
- Fuel for a furnace
- Bird known for their pouch
- Medieval weapon
- Security measure
Down
- Yellow flower
- In a living being
- Hockey essential
- Antonym of chaos
- Medical instrument
- Artistic instrument
- Building block for the body
- Synonym of chaos
16 Clues: Yellow flower • Medieval weapon • Hockey essential • Antonym of chaos • Synonym of chaos • Security measure • In a living being • Musical instrument • Medical instrument • Fuel for a furnace • Artistic instrument • Released after death • Of tremendous magnitude • Comes in different types • Bird known for their pouch • Building block for the body
Poppy Playtime 2025-05-25
Across
- The First Successful Experiment
- The Musical Dinosaur
- PlayStation Overseer
- Musical Memory Predator
- Our Ally
- Another Failure
- The Doctor
- Safe Haven’s Protector
- Playtime Co. Security
- Follower of The Prototype
Down
- Statues Apex Predator
- The First Bigger Body
- Playtime Co.’s First Success
- Doctor’s Loyal Pet
- Former Playtime Co. Employee
- False Prisoner
16 Clues: Our Ally • The Doctor • False Prisoner • Another Failure • Doctor’s Loyal Pet • The Musical Dinosaur • PlayStation Overseer • Statues Apex Predator • The First Bigger Body • Playtime Co. Security • Safe Haven’s Protector • Musical Memory Predator • Follower of The Prototype • Playtime Co.’s First Success • Former Playtime Co. Employee • The First Successful Experiment
Science 2022-06-27
15 Clues: adapted cell • M in MRS GREN • gas to liquid • downward force • liquid to solid • undifferentiated • one type of atom • more than one cell • DNA stored in cell • cell security guard • scientific magnifier • how plants make food • more than two elements • sparse particle arrangement • stationary or constant speed
The Delp Wedding 2023-09-22
15 Clues: best man • first date • maid of honor • where they met • years together • month they met • got engaged at • number of pets • who is the chef • where they live • their favorite food • Sarah’s birth month • Austin’s birth month • number of flower girls • number of ring security boys
Crime in the UK 2024-06-12
15 Clues: Worry • Rather • Evidence • Companion • Protection • Deal, Contract • A sharp utensil • "________ spree" • A target of violence • Things not in common • Units of information • In the company of other people • An item used to attack or defend • Use of force against others, attack • An organization that sells products or services
Emergency Code Crossword Puzzle 2015-01-12
Across
- who can turn off medical gases
- bomb threat
- active shooter
- missing or kdnapped child
- snow or ice
- no water
- funnel cloud
- security rapidly needed
Down
- material safety data sheet
- mass casuality event
- missing or wandering patient
- hazmat decontamination emergency
- evacuation
- medical emergency or CPR
- fire
- infant abduction or missing baby
- rescue, alarm, contain, extinguish
17 Clues: fire • no water • evacuation • bomb threat • snow or ice • funnel cloud • active shooter • mass casuality event • security rapidly needed • medical emergency or CPR • missing or kdnapped child • material safety data sheet • missing or wandering patient • who can turn off medical gases • hazmat decontamination emergency • infant abduction or missing baby • rescue, alarm, contain, extinguish
16 carrer cluster 2020-09-23
Across
- managment, and administraion these people have a strong desigher for buisinesses
- and construction these job requiers you to desighn and build
- and audio these people work in the department with technology
- Sales and Service The work environment can be an office, a retail store or the home of the customer
- Services The work environment can be a hospital, a spa or a beauty salon.
- The typical work environment is an office
- Technology, Engineering, and Mathematics he work environment can be a laboratory
- Public Safety, Corrections, and Security Working in Law, Public Safety, Corrections, and Security may be of interest to people who are brave and have a strong desire to protect others.
Down
- Technology The work environment is typically an office. A career in Information Technology may be of interest to people who have a passion for the Internet, including assisting web navigation and fixing security issues.
- Distribution, and Logistics The work environment can be a car repair shop, a train, a bus or an office.
- food and nutrual recorces the work inviroment is mostly outdoors
- A typical work environment is an industrial unit.
- and Tourism The career paths related to bars and restaurants may be of interest to people who love food and don’t mind working long hours standing.
- and training this job helps other people learn
- and Public Administration The work environment is typically a city’s municipal office or a customs office.
- Science The work environment can be a hospital, private clinic, pharmacy retail chain or patients’ homes.
16 Clues: The typical work environment is an office • and training this job helps other people learn • A typical work environment is an industrial unit. • and construction these job requiers you to desighn and build • and audio these people work in the department with technology • food and nutrual recorces the work inviroment is mostly outdoors • ...
WHAT THEY DO 2021-08-26
Across
- TECHNOLOGY SUPPORT TECH
- HEAD DAY CUSTODIAN
- LIBRARIAN
- ASST. PRINCIPAL
- INSTRUCTIONAL TECHNOLOGY
- P.E.
- NEW SPED HI
- MUSIC
- STUDENT INFORMATION
- MATH COACH
- NEW GIFTED RESOURCE TEACHER
- DAY CUSTODIAN
- SECURITY (AKA MR. GLENN)
Down
- CAFETERIA MONITOR
- OFFICE ASSOCIATE
- CAFETERIA MANAGER
- NEW ESL
- ART
- NEW 3RD GRADE TEACHER
- NEW 1ST GRADE TEACHER
- NEW GENERAL ASST.
- PRINCIPAL
- BOOKKEEPER/PAYROLL
- NEW SCHOOL NURSE
- READING SPECIALIST
25 Clues: ART • P.E. • MUSIC • NEW ESL • LIBRARIAN • PRINCIPAL • MATH COACH • NEW SPED HI • DAY CUSTODIAN • ASST. PRINCIPAL • OFFICE ASSOCIATE • NEW SCHOOL NURSE • CAFETERIA MONITOR • CAFETERIA MANAGER • NEW GENERAL ASST. • HEAD DAY CUSTODIAN • BOOKKEEPER/PAYROLL • READING SPECIALIST • STUDENT INFORMATION • NEW 3RD GRADE TEACHER • NEW 1ST GRADE TEACHER • TECHNOLOGY SUPPORT TECH • INSTRUCTIONAL TECHNOLOGY • ...
MCPL PUZZLER 2022-06-23
Across
- sarah angelica julie febe
- where to drop books
- fol head
- new h.r. manager
- security training
- branch near montgomery village
- graphic artist
- june 19
- same numeric address as white oak
- upper county branch
- online tutoring
Down
- free streaming with library card
- central is here
- integrated library system
- former maggie nightingale
- manager at cm
- first director
- supply vendor
- does booksubs
- branch in bethesda
20 Clues: june 19 • fol head • manager at cm • supply vendor • does booksubs • first director • graphic artist • central is here • online tutoring • new h.r. manager • security training • branch in bethesda • where to drop books • upper county branch • sarah angelica julie febe • integrated library system • former maggie nightingale • branch near montgomery village • free streaming with library card • ...
6th Grade Week 10 Crossword 2020-02-10
Across
- теорија/teori/teori
- слика/foto/resim
- благородна/fisnik/asil
- науката/shkencë/bilim
- крокодил/krokodil/timsah
- се врти/rrotullohem/dönmek
- претпазливост/kujdes/dikkat
- безбедност/siguri/güvenlik
- ножеви/thika/bıçaklar
Down
- гуштер/hardhucë/kertenkele
- хор/kor/koro
- загадувањето/ndotje/kirlilik
- патник/pasagjer/yolcu
- подели/përçaj/bölmek
- бојкотот/bojkotim/boykot
- накит/me ar/takı
- антички/i lashtë/antik
- објасни/shpjegoj/açıklamak
- апсолутна/absolut/söylemek
- индекс/indeks/indeks
20 Clues: хор/kor/koro • слика/foto/resim • накит/me ar/takı • теорија/teori/teori • подели/përçaj/bölmek • индекс/indeks/indeks • патник/pasagjer/yolcu • науката/shkencë/bilim • ножеви/thika/bıçaklar • благородна/fisnik/asil • антички/i lashtë/antik • бојкотот/bojkotim/boykot • крокодил/krokodil/timsah • гуштер/hardhucë/kertenkele • објасни/shpjegoj/açıklamak • се врти/rrotullohem/dönmek • ...
Lesson 69-72 2023-02-06
Across
- opening; outlet
- to misunderstand; to misjudge
- to wound; to cut
- to rush; to plunge
- vast; huge
- thorough; all inclusive
- daze; stupor
- mortgage; security
- counterfeit; false
- to expel; to remove
- to beg; to plead
Down
- to snuff out; to smother
- sad; sorry
- to glorify; to elevate
- to sit on the fence; to hem and haw
- friendly; neighborly
- story; narration
- facts; statistics
- protected; safe
- renovation; repair
20 Clues: sad; sorry • vast; huge • daze; stupor • opening; outlet • protected; safe • to wound; to cut • story; narration • to beg; to plead • facts; statistics • to rush; to plunge • mortgage; security • counterfeit; false • renovation; repair • to expel; to remove • friendly; neighborly • to glorify; to elevate • thorough; all inclusive • to snuff out; to smother • to misunderstand; to misjudge • ...
#OnlyGoneandDennett 2023-07-27
Across
- Location of hen do
- Honeymoon locale
- Mr & Mrs _______
- Month Andrew proposed
- Grooms football team
- Wedding venue
- Maid of honour
- Best Man
- Bridesmaid
Down
- Brides football team
- Nickname for each other
- Location of stag do
- First dance song
- Furthest place someone has travelled from today
- Brides middle name
- Number of bridesmaids
- Colour of bridesmaid dresses
- Usher #2
- Ring security
- Grooms middle name
- Usher #1
21 Clues: Usher #2 • Usher #1 • Best Man • Bridesmaid • Ring security • Wedding venue • Maid of honour • First dance song • Honeymoon locale • Mr & Mrs _______ • Location of hen do • Brides middle name • Grooms middle name • Location of stag do • Brides football team • Grooms football team • Number of bridesmaids • Month Andrew proposed • Nickname for each other • Colour of bridesmaid dresses • ...
TTS 5 MATERI_CICI EGI FEBIANI_XE_05 2025-04-15
Across
- sebarkan konten
- kata kunci utama
- gabungkan pencarian
- ketik dokumen
- analisis data
- fungsi jumlah
- singkatan dari Hak Atas Kekayaan Intelektual
- pembuat program
- buat presentasi
- hitung angka
- menjaga keamanan
- video online
- hasil pencarian kata
- lindungi temuan
Down
- hak cipta
- nilai budaya
- atur sistem
- pembuat website
- buat tabel
- lindungi merek
- lindungi karya
- cari informasi online
- membuat konten
- media online
- kecualikan kata
25 Clues: hak cipta • buat tabel • atur sistem • nilai budaya • hitung angka • media online • video online • ketik dokumen • analisis data • fungsi jumlah • lindungi merek • lindungi karya • membuat konten • sebarkan konten • pembuat website • pembuat program • buat presentasi • kecualikan kata • lindungi temuan • kata kunci utama • menjaga keamanan • gabungkan pencarian • hasil pencarian kata • cari informasi online • ...
IEEE Data Privacy Day 2015-01-27
Across
- Unauthorized access, collection, use, disclosure or disposal of personal information is called a privacy ___.
- Tricking people into revealing their account details, specifically done online.
- The process of transformation of data into an unrecognizable form, using some specific set of rules.
- The process of specifying access rights to data resources.
- A value needed to both encrypt and decrypt data.
- Stored data about physical characteristics of users, often used to verify identities.
- To ___ your Facebook account, it must first be deactivated.
- A service that, when connected to, replaces all your traffic's IP address with its own.
- Wrapping your credit cards with this prevents them from being scanned without your knowledge.
- A method or tool hidden in some system that allows undetected bypassing of security measures and access to the system.
- Physical copies of confidential data are problematic in regards to ___.
- Personal data relevant to ethnicity, religion, political belief, sexual preference, etc. is called ___ data.
- For your personal data to be legally used by others, you must provide ___.
- Ensuring the security of a system involves penetration ___.
Down
- The process of requesting access to a protected data resource by proving your identity.
- A system whose security is open for exploitation is said to be ___.
- Software that can be installed on your system without your knowledge and used to gather information on you.
- Automatic embedding of location data when you take photos.
- The science that includes cryptography and cryptanalysis.
- This feature of Facebook, introduced as an overhaul of the "wall" in 2011, came under criticism for violating user privacy.
- Hackers could compromise a private database using a type of attack called SQL ___.
- Taking unauthorized control of a connection that someone else has established (Think planes).
- A ___ signature identifies the sender of some data and verifies that the data has not changed during transmission.
- A file that keeps a records of activities performed on a system.
- Manipulating people into revealing confidential information is called ___ engineering.
25 Clues: A value needed to both encrypt and decrypt data. • The science that includes cryptography and cryptanalysis. • Automatic embedding of location data when you take photos. • The process of specifying access rights to data resources. • To ___ your Facebook account, it must first be deactivated. • Ensuring the security of a system involves penetration ___. • ...
Cybersecurity Terms 2022-11-22
Across
- A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
- Software that is a cumulative package of all patches and feature updates.
- Malware that prevents a user's device from properly operating until a fee is paid.
- An attacker who controls a botnet.
- An infected computer that is under the remote control of an attacker.
- Computer code that lies dormant until it is triggered by a specific logical event.
- Software that helps prevent computers from becoming infected by different types of spyware.
- A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
- Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
- A publicly released software security update intended to repair a vulnerability.
- Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
Down
- A logical computer network of zombies under the control of an attacker.
- Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
- Hardware or software designed to limit the spread of malware.
- A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
- Software code that gives access to a program or a service that circumvents normal security protections.
- An executable program that is advertised as performing one activity but which actually performs a malicious activity.
- Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
- A general term used to describe software that spies on users by gathering information without consent.
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
20 Clues: An attacker who controls a botnet. • Hardware or software designed to limit the spread of malware. • An infected computer that is under the remote control of an attacker. • A logical computer network of zombies under the control of an attacker. • Software that is a cumulative package of all patches and feature updates. • ...
Economies Crossword 2022-10-04
Across
- retirement savings plans that serve employees of public schools and tax-exempt organizations
- a financial institution that is licensed to accept checking and savings deposits and make loans
- a number from 300 to 850 that rates a consumer’s creditworthniess
- a consistent means of measuring the value of things
- a savings product that earns interest on a lump sum for a fixed period of time.
- Every purchase you made over time.
- an intermediary instrument or system used to facilitate the sale, purchase, or trade of goods between parties.
- type of financial cooperative that provides traditional banking services.
- is a risk management strategy that mixes a wide variety of investments within a portfolio.
- a security that represents the ownership of a fraction of the issuing corporation.
- a financial vehicle that pools assets from shareholders to invest in securities like stocks, bonds, money market instruments, and other assets.
Down
- a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
- a state-sponsored investment plan that enables you to save money for a beneficiary and pay for education expenses.
- a retirement savings and investing plan that employers offer.
- an interest-bearing deposit account held at a bank or other financial institution.
- grant loans where borrowers can use their vehicle title as. collateral or as security for repayment.
- a debt security, similar to an IOU.
- A store of value is an asset, commodity, or currency that maintains its value without depreciating.
- is a detailed breakdown of your credit history prepared by a credit bureau.
- a type of tax-advantaged
- a savings account that holds a fixed amount of money for a fixed period of time, such as six months, one year, or five years, and in exchange, the issuing bank pays interest.
21 Clues: a type of tax-advantaged • Every purchase you made over time. • a debt security, similar to an IOU. • a consistent means of measuring the value of things • a retirement savings and investing plan that employers offer. • a number from 300 to 850 that rates a consumer’s creditworthniess • type of financial cooperative that provides traditional banking services. • ...
Life Planning Ch. 26 & 27 2023-12-10
Across
- costs that are predictable and that recur regularly.
- an employers payroll monies are electronically transferred directly into their employees personal checking or savings accounts.
- to sign the back of a check in order to transfer it to another person or institution.
- the total income earned before deductions are made.
- the money received after Social Security income tax and other deductions have been taken from the paycheck.
- a rating based on how promptly a person pays his or her debts.
- sources or amounts of income that are not taxed.
- a card used to transfer money from your bank account to a stores account when making a purchase.
- use of future income for goods and services currently received.
Down
- a nonprofit financial institution owned by and operated for the benefit of its members.
- a plan for managing income and expenses.
- a type of credit in which the buyer is allowed to make purchases up to a specified amount paying a percentage of the balance each month plus carrying charges to keep the account revolving.
- money subtracted from a person’s wages for such items as income tax and Social Security.
- security for a loan.
- and account to which taxpayers may make annual contributions up to a set amount. Taxes may or may not be paid on the contributions but interest earnings are not taxed until the money is withdrawn.
- an order for a specific amount of money payable to a specific payee.
- costs that fluctuate in amount and may occur less regularly.
- a specified annual percentage of the amount of money in a savings program. A charge made for using borrowed money.
- the dollar amount the use of credit will cost consisting primarily of interest payments.
- convenient computerized machines that facilitate banking transactions at numerous locations 24 hours a day.
20 Clues: security for a loan. • a plan for managing income and expenses. • sources or amounts of income that are not taxed. • the total income earned before deductions are made. • costs that are predictable and that recur regularly. • costs that fluctuate in amount and may occur less regularly. • a rating based on how promptly a person pays his or her debts. • ...
CIS 1102N 2023-11-15
Across
- Essential pieces of software that allow hardware to communicate with the operating system
- Tools used for compressing and decompressing files
- Tools used for copying and restoring data
- It retrieves information from other parts of the web and displays it
- security device that monitors and filters incoming and outgoing network traffic
- A program that assists in locating and removing unnecessary files
- known as clients, over a network
- Programs designed to assist with system maintenance tasks
- A type of software that enables communication between the user and the computer
- A type of application used for managing and analyzing data
- A type of utility that rearranges fragmented data on a disk for improved performance
- A type of application used for creating and editing images
- Software that performs a specific task
- Types of these include system and application
Down
- program that allows communication and file sharing over a network
- software used to create/edit/view a spreadsheet
- establishes a digital connection between your computer and a remote server owned
- Software used for protecting a computer system from unauthorized access
- Applications designed to enhance and streamline the user's web browsing experience
- Ensures the computer's security against malicious software
- A set of instructions that tell a computer how to perform specific tasks
- primarily used for creating, editing, and formatting documents.
- computer program that can capture, display and manipulate data arranged in rows and columns
- Software that enables users to create, edit, and format documents
- A type of software that allows you to create and edit images
- Programs that control and manage hardware
- Software that allows users to create, edit, and manage visual presentations
- Programs designed to enhance the performance of a computer
- A type of system software that manages computer hardware and software resources
- used to convert sound waves into electrical waves or to input sound into computers
30 Clues: known as clients, over a network • Software that performs a specific task • Tools used for copying and restoring data • Programs that control and manage hardware • Types of these include system and application • software used to create/edit/view a spreadsheet • Tools used for compressing and decompressing files • ...
IS1 NetSec Newsletter Crossword Challenge #3 - AWS Virtual Private Cloud 2023-10-13
Across
- For IPv6, it lets traffic leave your VPC (6+4+8+7)
- Exposed to the web, it's where your front-end might be (6+6)
- It converts private IPs to public ones (7+7+11)
- Define what's allowed inwards, in a security group (7+5)
- Records network traffic, for analysis and security (4+4)
- Monitoring your traffic, without disruption, for security purposes (7+9)
- This particular VPC API helps you revert the prefix list from the past (31)
- A fixed cloud address that's scarce, assigned to an instance (7+2)
- Rules of entry, the guards of your EC2 instances (8+5)
- A secluded space, no direct internet connection (7+6)
- Hub and spoke architecture for VPCs, a central traffic director (7+7)
- Anonymizing traffic, it hides your private instances (3+7)
- This particular service helps share VPCs between AWS accounts (8+6+7)
- Sharing routes between route tables (5+11)
Down
- Linking VPCs, cross-region or same, it connects (7+10)
- Like a firewall, it guards your VPC's pathways (7+3)
- For site-to-site VPNs, your on-premises entry (8+7)
- A dedicated line, bypassing the internet (6+7)
- In the heart of the cloud, this point is discreet. Helps securely connect to AWS services without any public access (3+8)
- A portal to the web, your VPC's connection (8+7)
- Defines your IP range, in the cloud's addressing (4+5)
- Keep track of IP allocation, no confusion (7+7+5)
- A virtual network card, it helps connect your instances together (7+7+9)
- Your cloud within a cloud, for isolation purposes (7+7+5)
- Guides traffic in the VPC, like street signs in the cloud (5+5)
- For organizing your IPs efficiently, it's the solution (4)
- A division of your VPC network, like a neighborhood in the cloud (6)
27 Clues: Sharing routes between route tables (5+11) • A dedicated line, bypassing the internet (6+7) • It converts private IPs to public ones (7+7+11) • A portal to the web, your VPC's connection (8+7) • Keep track of IP allocation, no confusion (7+7+5) • For IPv6, it lets traffic leave your VPC (6+4+8+7) • For site-to-site VPNs, your on-premises entry (8+7) • ...
Semester 2 Financial Aid VOCAB. 2024-05-11
Across
- credits credits that you earn when you work and pay social security taxes
- of Deposit a certificate that states you have a specific sum on deposit and guarantees the payment of a fixed interest rate until Maturity
- "average percentage yield" is an annual rate of interest that takes into account the effect of compounding
- also known as the balance, is the amount of money in a bank account
- 4 times per year
- the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
- to continue to work at a part-time job, out of choice or necessity
- when money is not taxed upon earnings but is taxed when it is withdrawn later in life
- every day
Down
- interest is compounded once a year
- individual retirement account
- interest money earned on money deposited plus previous interest
- interest Only the original principal is added to the account
- security provides income for people after they retire, pays benefits to disabled workers pays death benefits to serving family members
- investment this is money that is deducted from your income after taxes have been deducted
- Federal insurance contributions act.-social security and medicare taxes
- investment a deposit made to a retirement account that is taken out of your wages before taxes have been calculated and deducted
- exempt money that is free from taxes
- twice a year
- rate the proportion of the balance that will be paid by the bank
- the date when a bond's principal is repaid with interest
- the point in a person's life when they stop working
- retirement age if you were born 1943- 1954, 66 is the full retirement age. For anyone born in 1960 or later, the full retirement age is 67.
23 Clues: every day • twice a year • 4 times per year • individual retirement account • interest is compounded once a year • the point in a person's life when they stop working • exempt money that is free from taxes • the date when a bond's principal is repaid with interest • to continue to work at a part-time job, out of choice or necessity • ...
Taxes Terms 2025-09-24
Across
- U.S Federal agency responsible for administering and enforcing the nation's tax laws.
- A qualifying child or relative who relies on you for financial support.
- A mandatory payment or charge collected by the government.
- The value of an asset for tax purposes.
- A tax on specific goods,services, or activities.
- All income you receive during the year, including wages, interest, dividends, and other earnings.
- The total income generated by a company or government from its primary business activities.
- Type of tax that increases as the taxable amount increases.
- Type of government that collects the majority of taxes and funds national services like defense, Social Security, and Medicare.
- Taxes taken out of an employee's paycheck by the employer to pay their income and payroll taxes.
- Type of tax that takes the same percentage of income from all taxpayers.
- A tax paid by employers and employees to fund Social Security and Medicare.
- A locally assessed levy on real estate and sometimes personal property.
Down
- A tax paid by the consumer when they purchase goods and services.
- A tax imposed by a government directly on your income.
- Type of government that collects taxes to fund their own services, such as education, transportation, and public safety.
- A tax on the transfer of money or property to another person.
- A reimbursement from the government to a taxpayer who has overpaid their taxes throughout the year.
- A nine-digit number assigned by the IRS to identify a business entity.
- The illegal practice of not paying taxes you legally owe.
- A federal payroll tax payable by both employees and employers to fund Social Security and Medicare.
- A tax levied by a government on imported goods.
- Type of tax that is applied uniformly,regardless of income level.
- A tax on the profits of a corporation.
- Governments such as counties, cities, and special districts, collect revenue to fund community services.
- The ranges of taxable income.
26 Clues: The ranges of taxable income. • A tax on the profits of a corporation. • The value of an asset for tax purposes. • A tax levied by a government on imported goods. • A tax on specific goods,services, or activities. • A tax imposed by a government directly on your income. • The illegal practice of not paying taxes you legally owe. • ...
RU ITEC411 2025-10-11
Across
- - What is it called when the bug that was found in OpenSSL in 2012 was exploited
- - The ______ horse was a software application that is believed to be safe but has other intended functions
- - The secondary measure when identifying malware looks at virus-like _______
- - What part of security it used to verify the identity of a user, device or entity
- - This was an example of a popular worm in 2008
- - A specific hack known as, the ________ worm, in 1988 coined the term for internet hacking
- - The phrase ________ theft is coined as doing a malicious act and consuming the identification of another person
- - A manipulation technique that allows for the release of information for credible gain is what type of _________ engineering
- - In vintage age, hackers were known as ____________ programmers
- - A lot of people are offered payment for encrypted files on a computer
Down
- - What cyberattack was carried out by U.S. and Israel to damage centrifuges in Iran
- - What type of testing is usually used for checking for security flaws or bugs within programs or systems
- - This company was hacked from a phishing attempt where the hacker elevated privileges and gained access to 40 million credit card numbers
- - This type of hack only works if a person opens an infected program or infected attachment
- - What form of technology is now available to look at the biological characteristics of an individual for authentication
- - The term that has been evolved to individuals who break into systems for either financial gains or to discover vulnerabilities
- - The phrase also known as political hacking
- - A software that is mainly used to search for malware on your computer
- - What triad is very popular in Cybersecurity and it helps to prevent unauthorized access to different systems
- - A method/security tool to keep data at rest and in transit safe
20 Clues: - The phrase also known as political hacking • - This was an example of a popular worm in 2008 • - In vintage age, hackers were known as ____________ programmers • - A method/security tool to keep data at rest and in transit safe • - A software that is mainly used to search for malware on your computer • ...
Chapter 2 Crossword Puzzle 2025-11-14
Across
- The government began issuing gold and silver ___ in 1863
- The Federal Government issued ___ backs as legal tender
- Is the official currency in the U.S.
- Under the National Banking ___, notes could only be printed by the treasury
- You can maintain ___ by controlling risks in the financial market
- ___ deposit is a type of EFT transaction
- Paper money is produced in the U.S. by the U.S.
- The founder of the second bank of the U.S.
- Banks Chartered and supervised by OCC with national currency
- Anything of value that is accepted in return for goods and services
- Monetary ___ is the Mechanism a nation uses to provide and manage money
- Putting money aside for when you need it
- A Treasury ___ is a security that pays interest from 2 to 10 years
- Taking Measures to make money grow
- The Federal Reserve is responsible of the ___ System
- A Treasury ___ is a security that pays interest in a year or less
Down
- The Federal ___ Insurance Corporation regulates business
- Is the extra money you have to pay back on loans over time
- Ownership of this was illegal until 1974
- During the free banking era, anyone could open a
- financial investment issued by a corporation or a government
- In 1971, Nixon closed the gold ___
- The founder of the first bank of the U.S.
- Securities ___ is a financial institution that is involved in trading securities
- Coins are produced in the U.S. by the U.S.
- Can be in the form of money or coins
- Paper money is referred to as a
- The Federal Reserve is divided into ___ districts
- Banks controlled by State Regulatory authorities
- Financial ___ is any organization that provides services for money
- The Federal Reserve System is the ___ bank of the U.S.
- The Federal Reserve ___ financial institutions
32 Clues: Paper money is referred to as a • In 1971, Nixon closed the gold ___ • Taking Measures to make money grow • Is the official currency in the U.S. • Can be in the form of money or coins • Ownership of this was illegal until 1974 • ___ deposit is a type of EFT transaction • Putting money aside for when you need it • The founder of the first bank of the U.S. • ...
Beveiliging 2019-06-06
Across
- algemeen opsporingsambtenaar
- Nationaal Coördinator Terrorismebestrijding en Veiligheid
- akoestisch signaal
- centrale waar inbraakmeldingen binnen komen
- veiligheid
- beveiligingswerkzaamheden uitvoeren met een hond
- een terroristische aanslag in NL is voorstelbaar
- parkeercontroleur
- voorkomen
Down
- beveiliging
- optisch signaal
- een persoon of object voortdurend in de gaten houden
- betrouwbaar
- hospitality
- beteugelen
- Algemene inlichtingen en veiligheidsdienst
16 Clues: voorkomen • beteugelen • veiligheid • beveiliging • betrouwbaar • hospitality • optisch signaal • parkeercontroleur • akoestisch signaal • algemeen opsporingsambtenaar • Algemene inlichtingen en veiligheidsdienst • centrale waar inbraakmeldingen binnen komen • beveiligingswerkzaamheden uitvoeren met een hond • een terroristische aanslag in NL is voorstelbaar • ...
Glossary Terms 2024-05-03
Across
- unequal
- measurement value
- suitable living
- help
- scarcity lack of, deficiency
- measure of achievement
- number, people
Down
- growth
- good or bad standard
- Variation differeUrbanization n towns, cities
- reliable access to food
- travels
- eg: Australia, Canada, Japan
- eg: Afghanistan, Bangladesh, Anogola
- surroundings, earth, conditions
- reason for extreme hunger
16 Clues: help • growth • unequal • travels • number, people • suitable living • measurement value • good or bad standard • measure of achievement • reliable access to food • reason for extreme hunger • eg: Australia, Canada, Japan • scarcity lack of, deficiency • surroundings, earth, conditions • eg: Afghanistan, Bangladesh, Anogola • Variation differeUrbanization n towns, cities
Network 2025-05-05
Across
- - network
- - Where u live
- - private network to send things securely
- - a centralised technology unit where data is stored
- - a person
- - a document
- - where ships dock
- - Local Area network
- -
- - a network security wall
Down
- - server oversee
- - student portal
- - Internet Protocol!!!
- - a secured way of converting data
- - It’s pretty obvious
- - network speed
16 Clues: - • - network • - a person • - a document • - Where u live • - network speed • - server oversee • - student portal • - where ships dock • - Local Area network • - It’s pretty obvious • - Internet Protocol!!! • - a network security wall • - a secured way of converting data • - private network to send things securely • - a centralised technology unit where data is stored
6th Grade - Virtual Bee Challenge 2020-06-03
Across
- претпазливост/kujdes/dikkat
- се врти/rrotullohem/dönmek
- хор/kor/koro
- загадувањето/ndotje/kirlilik
- бојкотот/boykotim/boykot
- гуштер/hardhucë/kertenkele
- слика/foto/resim
- патник/pasagjer/yolcu
Down
- ножеви/thika/biçaklar
- крокодил/krokodil/timsah
- благородна/fisnik/asil
- науката/shkencë/bilim
- подели/përçaj/bölmek
- теорија/teori/teori
- безбедност/siguri/güvenlik
15 Clues: хор/kor/koro • слика/foto/resim • теорија/teori/teori • подели/përçaj/bölmek • ножеви/thika/biçaklar • науката/shkencë/bilim • патник/pasagjer/yolcu • благородна/fisnik/asil • крокодил/krokodil/timsah • бојкотот/boykotim/boykot • се врти/rrotullohem/dönmek • гуштер/hardhucë/kertenkele • безбедност/siguri/güvenlik • претпазливост/kujdes/dikkat • загадувањето/ndotje/kirlilik
Networking Terms 2023-11-27
Across
- Main device ID protocol.
- Data unit in transit.
- Local network connector.
- Web address system.
- Network connection point.
- Network participant.
- Data path between devices.
- Local network.
Down
- Expanded device ID protocol.
- Data transfer capacity.
- Interconnected devices.
- Network security monitor.
- Broad network.
- Network traffic director.
- Central network connection point.
15 Clues: Broad network. • Local network. • Web address system. • Network participant. • Data unit in transit. • Data transfer capacity. • Interconnected devices. • Main device ID protocol. • Local network connector. • Network security monitor. • Network traffic director. • Network connection point. • Data path between devices. • Expanded device ID protocol. • Central network connection point.
Unit 8 Irie 2024-05-08
Across
- _______ conservation corps
- An insect that infests crops
- Eugene _______
- The bombing of __________
- ________ of 1924
- Social _____ administration
- a cause of the great depression.
Down
- Overproduction in ____________
- a way to protect america during the war, but help allies
- _____ ships
- ______ in purchasing
- _____ market crash of 1929
- ____ Vinson
- _____ Russel
- _____ electrification Administration
15 Clues: _____ ships • ____ Vinson • _____ Russel • Eugene _______ • ________ of 1924 • ______ in purchasing • The bombing of __________ • _______ conservation corps • _____ market crash of 1929 • Social _____ administration • An insect that infests crops • Overproduction in ____________ • a cause of the great depression. • _____ electrification Administration • ...
CAPTAIN AMERICA: THE WINTER SOLDIER (2014) 2023-04-06
Across
- Is declared dead
- Project Fury is heading
- Head of counterterrorism unit
- Bad guy defrosted
- Is alive
- SHIELD headquarters
Down
- Evil terrorist organization
- River Cap falls in
- Pararescueman
- Cap's Avenger helper
- SHIELD's counterterrorism unit
- Fury's right hand woman
- Secretary of Internal Security
- Brother directors
- Now a brain in a computer
15 Clues: Is alive • Pararescueman • Is declared dead • Bad guy defrosted • Brother directors • River Cap falls in • SHIELD headquarters • Cap's Avenger helper • Project Fury is heading • Fury's right hand woman • Now a brain in a computer • Evil terrorist organization • Head of counterterrorism unit • SHIELD's counterterrorism unit • Secretary of Internal Security
Vocabulary at School 2024-11-04
Across
- Kegiatan tamasya edukasi ke luar sekolah untuk pembelajaran berdasarkan pengalaman
- Ruang kelas tempat belajar
- Penjaga keamanan
- Bapak/ Ibu yang mengajar di kelas
- Kamar kecil
- Kepala administrator sekolah, mengawasi operasi dan stafnya
- Upacara
- Sekolah asrama
Down
- pekerjaan rumah (PR)
- Ujian
- Asrama
- Tempat membaca dan meminjam buku
- Siswa/ pelajar
- Kantin
- Pustakawan
15 Clues: Ujian • Asrama • Kantin • Upacara • Pustakawan • Kamar kecil • Siswa/ pelajar • Sekolah asrama • Penjaga keamanan • pekerjaan rumah (PR) • Ruang kelas tempat belajar • Tempat membaca dan meminjam buku • Bapak/ Ibu yang mengajar di kelas • Kepala administrator sekolah, mengawasi operasi dan stafnya • Kegiatan tamasya edukasi ke luar sekolah untuk pembelajaran berdasarkan pengalaman
TECH TUESDAY 10/7/25 2025-09-17
Across
- DETECTS MALICIOUS CODE
- BLOCKS UNAUTHORIZED ACCESS
- SECRETLY WATCHES YOU
- PREVENTS DATA LOSS
- BREAKS INTO SYSTEMS
- PHONE, LAPTOP, OR TABLET
- FAKE EMAIL SCAM
Down
- ANOTHER TERM FOR MFA
- USERNAME AND PASSWORD
- SECURE REMOTE CONNECTION
- KEEPS SOFTWARE SECURE
- DATA LEAK INCIDENT
- MALICIOUS SOFTWARE
- SCRAMBLES DATA FOR SECURITY
- NEVER SHARE IT
15 Clues: NEVER SHARE IT • FAKE EMAIL SCAM • DATA LEAK INCIDENT • MALICIOUS SOFTWARE • PREVENTS DATA LOSS • BREAKS INTO SYSTEMS • ANOTHER TERM FOR MFA • SECRETLY WATCHES YOU • USERNAME AND PASSWORD • KEEPS SOFTWARE SECURE • DETECTS MALICIOUS CODE • SECURE REMOTE CONNECTION • PHONE, LAPTOP, OR TABLET • BLOCKS UNAUTHORIZED ACCESS • SCRAMBLES DATA FOR SECURITY
Jocie and Anna Vocab quiz #4 2025-11-21
Across
- Monday
- When someone spends their Saturday helping the homeless
- His _________ fame grew after his death.
- Loch Ness monster
- Parrot
- Scavengers
- The fly was ____.
- The security footage would _______ her story.
- Guilty Criminals
Down
- the chatter box
- Someone who never works out
- Unsettling
- The law is ______.
- Beware of the dog
- Lawyer
15 Clues: Monday • Lawyer • Parrot • Unsettling • Scavengers • the chatter box • Guilty Criminals • Loch Ness monster • Beware of the dog • The fly was ____. • The law is ______. • Someone who never works out • His _________ fame grew after his death. • The security footage would _______ her story. • When someone spends their Saturday helping the homeless
Ch. 1 Crossword 2024-08-30
11 Clues: now • basis • security • Oncology • paid for • procedure • can get into • starting process • continues to develop • registered health info admin • contains patient health info gathered from EMR's
THE DIGITAL GRID 2024-12-07
14 Clues: Billionth prefix • Access entry step • Automated program • Hidden data storage • Programmer’s script • Data's virtual home • Step-by-step process • Smallest screen unit • Fraudulent email scam • Unmanned aerial gadget • Internet speed measure • Digital ledger technology • Network's security barrier • Smart machine abbreviation
Unit 4 Vocab 2020-10-19
Across
- The student was _________ when the teacher gave him a test.
- The policeman was very _______ when he pulled someone over to give them a ticket.
- The Airport security all ways checks bags for __________.
- The _______ student got valedictorian.
- The sound ____________ off the walls so i heard it multiple times.
- The security guard __________ the passport at the airport.
Down
- The Lawyer _____________ the sentence for the prisoner.
- Mrs. Malda Gives off a fun ____ because she is happy all the time.
- The insult was ___________ because it was really upsetting.
- The man ___________ the old house that needed some work.
- Lennie's _________ is innocent because he is always acting like he never did anything wrong.
- Letterkenny is a __________ TV show.
- Some of the students in math think that it is ___________.
- People who do triathlons are very _________ because the races are long.
14 Clues: Letterkenny is a __________ TV show. • The _______ student got valedictorian. • The Lawyer _____________ the sentence for the prisoner. • The man ___________ the old house that needed some work. • The Airport security all ways checks bags for __________. • Some of the students in math think that it is ___________. • ...
RU ITEC411 Crime and Security 2021-12-01
Across
- a piece of software that is designed to fix errors in preexisting software
- the use of hacking for a political cause
- fake websites that are used to steal personal information
- malware that encrypts files on a computer and then demands payment to decrypt the files
- biological characteristics that are unique to an individual
- this attack overloads a target site with requests for information
- malware that monitors and records a user's activity on their device
- software that allows future access to a device by bypassing the normal security checks
- devices attached to card readers that can collect card numbers and pins
Down
- flaws in a system that can be exploited
- fraudulent messages that impersonate people or organizations in order to steal the target's information
- a group of Internet connected devices infected with malware that communicates with a central host
- software that searches for and removes malware on a device
- a verbal statement that is false and damaging to one's reputation
- a program that copies itself to other computers
- malicious software
- intentional, unauthorized access to a computer system
- In the early days of computing, this would be a creative programmer who wrote clever or elegant code
- a written statement that is false and damaging to one's reputation
- deceiving users by faking data, usually to make a communication appear to be from a trusted source
- software that attaches itself to other software
21 Clues: malicious software • flaws in a system that can be exploited • the use of hacking for a political cause • a program that copies itself to other computers • software that attaches itself to other software • intentional, unauthorized access to a computer system • fake websites that are used to steal personal information • ...
Topic 5.1 Food Security Vocabulary 2022-01-05
Across
- Organization of the United Nations (FAO) is a specialized agency of the United Nations that leads international efforts to defeat hunger. The goal is to achieve food security for all and make sure that people have regular access to enough high-quality food to lead active, healthy lives. With over 194 member states, FAO works in over 130 countries worldwide.
- comprises establishments primarily engaged in growing crops, raising animals, and harvesting fish and other animals from a farm, ranch, or their natural habitat. Agri-food includes agriculture, fisheries and aquaculture, and food and beverage processing.
- running out of food; experienced hunger; at the most extreme, having to go without food for a day or more.
- the condition associated with deficiencies, excesses or imbalances in the consumption of macro- and/or micronutrients. For example, undernutrition and obesity are both forms of malnutrition. Child stunting or wasting are both indicators for undernutrition.
- is the physical, chemical and biological decline in soil quality. It can be the loss of organic matter, decline in soil fertility, and structural condition, erosion, adverse changes in salinity, acidity or alkalinity, and the effects of toxic chemicals, pollutants or excessive flooding.
- an uncomfortable or painful sensation caused by insufficient energy from diet. Food deprivation; not eating enough calories. Used here interchangeably with (chronic) undernourishment. Measured by the prevalence of undernourishment (PoU).
- is water pollution that comes from a single, discrete place, typically a pipe.
- the science or practice of farming, including cultivation of the soil for the growing of crops and the rearing of animals to provide food, wool, and other products.
- The biologically inappropriate consumption of corn and soy by livestock (whose digestive/nutritional systems are not designed to eat those particular plants). Other methods include monoculture, use of pesticides and herbicides, conventional agriculture that uses tractors that use fossil fuels.
- refers to how the price of a commodity (or price relationship between multiple commodities) is determined by the market. It is essentially the link between pricing behavior and the underlying physical behavior that affects pricing. Supply and demand. More demand than supply than the higher price.
Down
- is the creation of manufactured products through economically-sound processes that minimize negative environmental impacts while conserving energy and natural resources. Sustainable manufacturing also enhances employee, community and product safety.
- a state of uncertainty about the ability to get food; a risk of skipping meals or seeing food run out; being forced to compromise on the nutritional quality and/or quantity of food consumed.
- a measurement of how far food has traveled before it reaches you. A good way of looking at the environmental impact of foods and their ingredients.
- - organisms that spread across national or. geographical (physical) boundaries, indicating that disease or pest events in one country may have direct effects or potential effects in another country).
- the quality or state of being of a similar kind or of having a uniform structure or composition throughout
- is a gradual process that occurs when the impact of water or wind detaches and removes soil particles, causing the soil to deteriorate.
- any fuel that is derived from biomass—that is, plant or algae material or animal waste. Since such feedstock material can be replenished readily, biofuel is considered to be a source of renewable energy, unlike fossil fuels such as petroleum, coal, and natural gas.
- The unconsolidated mineral or organic material on the immediate surface of the Earth that serves as a natural medium for the growth of land plants.
- is a nutty-flavored, starchy root vegetable or tuber. Native to South America, it’s a major source of calories and carbs for people in many countries. Nigeria, Thailand, and Indonesia are the top cassava-producing countries in the world.
- the large-scale, intensive production of crops and animals, often involving chemical fertilizers on crops or the routine, harmful use of antibiotics in animals (as a way to compensate for filthy conditions, even when the animals are not sick). It may also involve crops that are genetically modified, heavy use of pesticides, and other practices that deplete the land, mistreat animals, and increase various forms of pollution.
- refers to both water and air pollution from diffuse sources. Affects a water body from sources such as polluted runoff from agricultural areas draining into a river, or wind-borne debris blowing out to sea.
- Relating to soil, especially as it affects living organisms. Characteristics include such factors as water content, acidity, aeration, and the availability of nutrients.
- a renewable fuel made from corn and other plant materials
- is a natural substance that is not replenished with the speed at which it is consumed. It is a finite resource. Fossil fuels such as oil, natural gas, and coal are examples
- is the lack of sufficient available water resources to meet the demands of water usage within a region. Water scarcity involves water stress, water shortage or deficits, and water crisis.
- is the ability of soil to sustain plant growth and optimize crop yield. This can be enhanced through organic and inorganic fertilizers to the soil.
26 Clues: a renewable fuel made from corn and other plant materials • is water pollution that comes from a single, discrete place, typically a pipe. • the quality or state of being of a similar kind or of having a uniform structure or composition throughout • running out of food; experienced hunger; at the most extreme, having to go without food for a day or more. • ...
Law, Public Safety, & Security .......... Paramedic 2014-12-11
Across
- technology will have a _____ effect on this job(+/-)
- paramedics work ____ and this is 24/7 365 days a year
- education needed to be paramedic, get after high school
- apply these to people that have suffered from injury, ____ mask
- "intravenous" paramedics apply these to injured people to sedate them
- education after high school, additional training to a specific career
- perform this on someone that has stopped breathing, cardiopulmonary resuscitation
- use this when driving, paramedic vehicle
- involved in working with, communicating with, and teaching people
Down
- paramedics use this to set broken bones and secure it
- paramedics must show this and lead others to save lives
- amount of pay earned when you have 10+ years working, $68,930
- the job ____ is +26.73% in the next 6 years
- amount earned between 1-5 years of working $41,130
- area that they work in, in ambulance(before they reach emergency care)
- paramedics must keep this, not break down and cry, faint because of blood
- paramedics need to ___ to an accident and provide aid
- must have many of this, examples are paramedic and EMT basic
- need to be educated in this subject very well, involves plant and animal organisms, their tissues, cells, and functions
- amount earned when first starting $26,030
20 Clues: use this when driving, paramedic vehicle • amount earned when first starting $26,030 • the job ____ is +26.73% in the next 6 years • amount earned between 1-5 years of working $41,130 • technology will have a _____ effect on this job(+/-) • paramedics use this to set broken bones and secure it • paramedics work ____ and this is 24/7 365 days a year • ...
RU ITEC411 Crime and Security 2023-10-15
Across
- Deceptive computer program that appears to be legit.
- Ensures that only authorized users can access certain data or resources while maintaining privacy, and preventing data breaches.
- Manipulation of individuals into divulging confidential information.
- A network of computers used to perform malicious activities.
- A weakness in a computer system, or network that can be exploited.
- Type of attack where attackers overwhelm a target system or network.
- Redirecting legitimate website traffic to fake websites without the user's knowledge.
- Type of malware that holds a user's files hostage and demands something in return.
- A hidden entry point into a computer system, usually created by the developer.
- A malicious software program that self-replicates without human intervention.
Down
- A company that provides users with access to the internet.
- Authorized users can access information or services whenever needed.
- Using hacking to promote a political cause.
- Disguising communication from an unknown source.For example, forging senders email address.
- Requires users to provide multiple forms of identification before gaining access to a system.
- Process of converting plaintext data into ciphertext to secure from unauthorized access.
- The assurance that data remains accurate, consistent, and unaltered.
- A malicious software program that replicates itself with human intervention.
- Attackers impersonate trustworthy entities, usually through emails.
- Malicious software that secretly monitors a user's activity.
20 Clues: Using hacking to promote a political cause. • Deceptive computer program that appears to be legit. • A company that provides users with access to the internet. • A network of computers used to perform malicious activities. • Malicious software that secretly monitors a user's activity. • A weakness in a computer system, or network that can be exploited. • ...
RU ITEC411 Crime and Security 2023-11-30
Across
- a space in which computers communicate
- wrongdoing for financial gain
- program that produces duplicates of itself on other computers
- something that is fake or fraudulent
- person who gets access to a computer for political or social ends
- the act of swaying people to a website to get personal information
- software that damages or gains unauthorized access to another computer
- attack over an email trying to gain sensitive information
- software to gain access to a computer in a nontraditional way
- large number of messages sent over the internet
Down
- communicating on a distance through cable or broadcasting system
- a virus attack with a multipart worm that traveled on a USB stick that was carried out by the US and Isreal
- a number of computers that have a virus or malware that communicates to a host
- attack over text message trying to gain personal information
- a type of software that adheres itself to other software
- an attack by a hacker to damage a computer network
- encrypted malware that displays a message wanting payment for the key to gain the personal information back from the user
- malware that can watch and record a users activities on a computer
- breaking into something you do not have access to
- is shown as a not-bad application but then carries a bad component
20 Clues: wrongdoing for financial gain • something that is fake or fraudulent • a space in which computers communicate • large number of messages sent over the internet • breaking into something you do not have access to • an attack by a hacker to damage a computer network • a type of software that adheres itself to other software • ...
RU ITEC411-Crime and Security 2022-10-16
Across
- gaining unauthorized access to data in a system or computer
- software that allow future access to a computer system by bypassing the normal layers of security.
- can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
- biological characteristics unique to an individual
- criminal activity that involves the use of a computer r a network
- person that uses their technical knowledge to break into a computer system or network by no standard means.
- irrelevant or inappropriate messages sent in bulk to recepients
- malware that can monitor or record victim's activities on a computer or mobile phone
- group of internet connected devices each of which runs one or more bots.
- use of computers or computer network techniques such as hacking to promote political agenda
- the assurance that private data will remain private
Down
- sending fraudulent text messages on purpose appearing to come from reputable and legit companies
- the assurance that data will not change without authorization
- malware that blocks access to data or threatens to publish it unless a ransom is paid.
- recording devices inside credit card readers to collect credit card numbers and PINs.
- converting information into secret code that hides the meaning of the information
- protection of computer systems and networks from information theft or hardware damage.
- the way in which thieves collect personal data by luring the victims to fake websites
- sending deceiving emails in order to obtain sensitive personal information from the victim
- malicious computer worm that targets a specific type of control system
- software designed intentionally to be intrusive and destructive to a computer or network
- software that attaches itself to other software and spreads when someone runs an infected program.
22 Clues: biological characteristics unique to an individual • the assurance that private data will remain private • gaining unauthorized access to data in a system or computer • the assurance that data will not change without authorization • irrelevant or inappropriate messages sent in bulk to recepients • criminal activity that involves the use of a computer r a network • ...
RU ITEC411 - Crime and Security 2022-10-16
Across
- embedded devices connected to the internet
- Malicious software designed to look like something else
- Luring people to fraudulent websites
- Function used to encode information
- Malicious software that monitors user activity
- Hacking to promote a political agenda
- Fraudulent spam
- 1980's Law that governs unauthorized access
- Unique biological characteristics
- Malicious software that exploits vulnerabilities
Down
- A group of compromised devices
- Allows hackers a future way into a system
- Malicious software that encrypts files
- criminal deception or trickery
- Written defamation
- Breaking into gaining unauthorized access (era 2)
- Verbal defamation
- A creative programmer (era 1)
- Malicious software that attaches to programs
- Cyberattack designed to overwhelm services
20 Clues: Fraudulent spam • Verbal defamation • Written defamation • A creative programmer (era 1) • A group of compromised devices • criminal deception or trickery • Unique biological characteristics • Function used to encode information • Luring people to fraudulent websites • Hacking to promote a political agenda • Malicious software that encrypts files • ...
RU ITEC411 Crime and Security 2024-03-15
Across
- the first popular social media website
- unwanted communications
- the computers most people carry everyday
- They collect taxes
- breaking the law
- biggest search engine
- the business of crime
- becoming someone else
- computer fraud and abuse act
Down
- Helps in humanitarian crisis
- risking your money in betting
- the program the runs your computer
- unauthorized entry to a computer system
- the act of trying to scam passwords or sensitive information
- Social media site for jobs
- The office of personnel management
- law passed after 9/11
- someone who breaks the law
- one of the worst viruses in history
- written lies
20 Clues: written lies • breaking the law • They collect taxes • biggest search engine • law passed after 9/11 • the business of crime • becoming someone else • unwanted communications • Social media site for jobs • someone who breaks the law • Helps in humanitarian crisis • computer fraud and abuse act • risking your money in betting • the program the runs your computer • ...
Industrial Security Concept Crossword Puzzle 2025-10-13
Across
- - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
- - the monitoring of telephone conversation by a third party, often by covert means
- - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
- - used as a form of identification and access control
- - term used in England for lock picker, safecrackers, and penetrators of restricted areas
- - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
- - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
- - means to secretly listen to record a conversation using a hidden electronic device
- - a house like structures above the perimeter barrier
Down
- - indication of impending danger or harm
- - a metallic container used for safekeeping of documents or small items in office or installation
- - it is the communication channel that conveys the information from all sensors in the system
- - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
- - genuine key stolen from the owner
- - any information and material, the unauthorized disclosure of which would endanger national security
- - A chance of being injured or harmed
- - inability to withstand the effects of a hostile environment
- - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
- - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
- - is the potential that a chosen action will lead to a loss
20 Clues: - genuine key stolen from the owner • - A chance of being injured or harmed • - indication of impending danger or harm • - used as a form of identification and access control • - a house like structures above the perimeter barrier • - is the potential that a chosen action will lead to a loss • - inability to withstand the effects of a hostile environment • ...
la Crucigrama de viaja 2024-11-07
WORLD HERITAGE 2023-05-09
10 Clues: property • security • protection • rural scenery • man-made object • act of destroying • variety of species • memorial structure • relating to ecology • natural environment
Public Service 2023-09-08
10 Clues: Nurse • Teacher • Navy Seal • Pharmacist • Medical Researcher • Healthcare Provider • Hairdresser or Barber • Mental Health Counselor • Early Learning Specialist • National Security Specialist
NonFunctional Requirements 2016-04-28
hunger and poverty 2021-01-17
Across
- hunger is usually uncomfortable or _________.
- insecure not all ______ ______ people are hungry.
- people ________ to food insecurity are those who are able to maintain an acceptable level of food security today, but may be at risk of becoming food insecure in the future.
- Food insecurity: Hunger, Malnutrition, _______.
- Vulnerability ______ helps to design better good security responses.
- Increase the ability to ____.
Down
- Results from deficiencies, excess or imbalances in the consumption of Marco- and/or micro-nutrients.
- poverty is most often defined in terms of _____.
- deprivation Scientifically, hunger is referred to as ____ _________.
- all ____ people are food insecure.
- reduce the degree of expose to the _____.
- food insecure and ____ are deeply interrelated phenomena.
12 Clues: Increase the ability to ____. • all ____ people are food insecure. • reduce the degree of expose to the _____. • hunger is usually uncomfortable or _________. • Food insecurity: Hunger, Malnutrition, _______. • poverty is most often defined in terms of _____. • insecure not all ______ ______ people are hungry. • food insecure and ____ are deeply interrelated phenomena. • ...
IFS 2022-07-30
Across
- An asset but not security
- An asset as well as security
- a platform thatfacilitates the exchange of financial assets
- a system that mobilizes and usefully allocatesscarce resources of a country.
- An acknowledgement of Debt
- regulates the stock exchange business
Down
- Securities provided to the bank in exchange of loan
- a security that represents the ownership of a fraction of the issuing corporation.
- All financial assets are not _
- a promise by a borrower to pay a lender their principal and usually interest on a loan.
- minimum percentage of cash, gold, and other securities, before lending loans to customers
11 Clues: An asset but not security • An acknowledgement of Debt • An asset as well as security • All financial assets are not _ • regulates the stock exchange business • Securities provided to the bank in exchange of loan • a platform thatfacilitates the exchange of financial assets • a system that mobilizes and usefully allocatesscarce resources of a country. • ...
Crossword - Voltedge 2019-09-05
Across
- Tool currently used for onboarding
- Greek letter that denotes mean of a statistical distribution
- One of the focus areas of EHS
- In CDA, if the probability is more than 60%, which color is assigned?
- An R package that provides an elegant framework for building web apps using R
Down
- Tool used for Rewards and Recognitions
- Company wide EHS system of record
- Portal to view security emergency contact and other security info
- Which technology is used; searching from 41+ million tags?
- TCT Application access provisioning is done by?
10 Clues: One of the focus areas of EHS • Company wide EHS system of record • Tool currently used for onboarding • Tool used for Rewards and Recognitions • TCT Application access provisioning is done by? • Which technology is used; searching from 41+ million tags? • Greek letter that denotes mean of a statistical distribution • ...
Master 2024-12-27
Across
- A network of infected computers controlled by a hacker.
- A string of text created from data for verification.
- An attack that floods a server with traffic to crash it.
- A deliberate effort to compromise a computer system.
- A security model where no one inside a network is trusted by default.
- A simulation of an attack to test security.
Down
- Investigating digital data to find evidence.
- A pathway used by attackers to exploit a vulnerability.
- Tools used to create fake emails for attacks.
- A deviation from normal behavior in system logs.
10 Clues: A simulation of an attack to test security. • Investigating digital data to find evidence. • Tools used to create fake emails for attacks. • A deviation from normal behavior in system logs. • A string of text created from data for verification. • A deliberate effort to compromise a computer system. • A network of infected computers controlled by a hacker. • ...
Total Defence Day 2023 - Digital Defence (P1-P3) 2023-02-07
Across
- Never ______________ One-Time Passwords(OTPs)to anyone.
- We should use 5 or ______________ words in our passwords.
- One-Time Passwords (OTPs).
Down
- We can use paraphrases as our _______________ e.g.saw Eagle At The Park.
- Cyber criminals will ask you for ______________ information like phone numbers, banking details
- We should ______________ the passphrases up with upper, lower case letters, numbers and symbols.
6 Clues: One-Time Passwords (OTPs). • Never ______________ One-Time Passwords(OTPs)to anyone. • We should use 5 or ______________ words in our passwords. • We can use paraphrases as our _______________ e.g.saw Eagle At The Park. • Cyber criminals will ask you for ______________ information like phone numbers, banking details • ...
Mod 5-3e Vulnerability Management 2023-08-30
Across
- describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system
- can also be used to to conduct a manual audit of information system security controls.
Down
- are updated and released during each SRG-STIG Update Release Cycle to capture all newly updated or released SRGs, STIGs, and Tools.
- designed to act as a comprehensive STIG compliance tool that provides security monitoring, DISA STIG-specific audit logs, and real-time security event monitoring.
- responsible for maintaining the security posture of the Department of Defense Information Network (DoDIN).
- an automated compliance scanning tool that leverages the STIGs and OS-specific baselines to analyze and report on the security configuration of an information system.
6 Clues: can also be used to to conduct a manual audit of information system security controls. • responsible for maintaining the security posture of the Department of Defense Information Network (DoDIN). • describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system • ...
Jenis Profesi 2024-08-08
Across
- menguasai bahasa pemrograman dan terampil menggunakannya
- seseorang pembuat konten kreatif
- orang yang mengajar dan menyediakan pendidikan untuk orang lain
- seseorang yang meneliti informasi menggunakan alat analisis data
- berkaitan erat dengan penemuan-penemuan baru
- orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
- mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
- pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
- menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
- bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
- melindungi sistem, jaringan, serta data dari serangan cyber
- profesional di bidang kuliner
- membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
- ndividu yang mempunyai pengaruh besar di media sosial
- bertugas mengendalikan pesawat
- maha guru
- seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
- berkaitan erat dengan keamanan dan ketertiban negaranya
18 Clues: maha guru • profesional di bidang kuliner • bertugas mengendalikan pesawat • seseorang pembuat konten kreatif • berkaitan erat dengan penemuan-penemuan baru • ndividu yang mempunyai pengaruh besar di media sosial • menguasai bahasa pemrograman dan terampil menggunakannya • berkaitan erat dengan keamanan dan ketertiban negaranya • ...
Words 2023-05-10
12 Clues: safety • choosy • a creed • a pastry • to group • to appeal • very real • to make sure • natural disaster • what a baby does • what a explorer does • a word that describes a crazy person
bullying 2014-12-07
Across
- A type of bullying that involves taunting and name calling
- The use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
- Child bullying has existed in ________ and schools for centuries
- _____ bullying is fairly new
- Statistics have shown bullying and _____ is becoming a huge problem
Down
- A type of bullying that involves using electronic means to harm others
- Two of the main reasons people are bullied are because of appearance and ________
- A type of bullying that involves hitting, punching, or kicking
8 Clues: _____ bullying is fairly new • A type of bullying that involves taunting and name calling • A type of bullying that involves hitting, punching, or kicking • Child bullying has existed in ________ and schools for centuries • Statistics have shown bullying and _____ is becoming a huge problem • A type of bullying that involves using electronic means to harm others • ...
December Q4 Security Training 2023-12-22
Across
- When safe to do so, we should activate the ____ or/and observe the robber's escape route.
- Behavior to keep during a robbery is to ___ ___ and avoid sudden movements.
- Person responsible for shouting "I've been robbed, Lock the doors!"
- To preserve evidence of a note pass robbery, drop the note on the ____ or leave it at your station.
- The type of form filled out when observing or describing a robber.
- What is the amount dispensed during a robbery from the TCR?
- Most bomb threats and extortion are received this way.
- All media inquires go to this department.
- The practice of obtaining something, especially money, through force of threats.
Down
- Keys to press for dispense procedure from TCR(abbreviated).
- This form provides the following information: Contact names, instructions for branch employees on what to do during and after a robbery, and phone numbers.
- Person responsible for advising members of a robbery situation.
- These eight hand held items around the branch can help alert security that a robbery has occurred.
- When calling 911, we call from an RBFCU ___ ___.
14 Clues: All media inquires go to this department. • When calling 911, we call from an RBFCU ___ ___. • Most bomb threats and extortion are received this way. • Keys to press for dispense procedure from TCR(abbreviated). • What is the amount dispensed during a robbery from the TCR? • Person responsible for advising members of a robbery situation. • ...
KPMSOL CROSSWORD 2024-11-30
Across
- What was the Centre of Cyber and Artificial Intelligence previously named?
- What does the P in Kirit P Mehta stand for? Patel
- What event was held in 2024 by Pehchaan: Gender Sensitization, Inclusivity and Equity Cell?
- What is the maximum number of lectures a student can miss of a 3-credit subject to maintain 80% attendance?
- Which committee deals in the corporate legal field?
Down
- In which year was KPMSOL founded?
- Which does not have a mid term or term end exam?
- How many intra moot court competitions have been held since 2013? 9
- How many law campuses does NMIMS have?
- What is the maximum duration permissible to complete a 5 year program in NMIMS?
- What are the two mandatory committees for every law school?
- What is the name of our university’s sports festival?
12 Clues: In which year was KPMSOL founded? • How many law campuses does NMIMS have? • Which does not have a mid term or term end exam? • What does the P in Kirit P Mehta stand for? Patel • Which committee deals in the corporate legal field? • What is the name of our university’s sports festival? • What are the two mandatory committees for every law school? • ...
The ressurection crossword (matt 28:1-15) 2023-03-25
13 Clues: plan • winter • frightened • a grave site • a land disaster • a heavenly being • a praise session • to tell to people • a time of the day • security officials • opposite of peaceful • past participle of rise • a day of religious observance
INTERNET VOCABULARY 2024-02-14
Across
- An attempt to trick individuals into providing sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity.
- A secret combination of characters used for user authentication and access to secured information.
- Measures taken to protect systems, networks, and data from unauthorized access, attacks, or damage.
- The process of copying data or files from a remote server or website to a user's device.
- A notification or warning about a potential threat, danger, or important event that requires immediate attention.
Down
- The right of individuals to keep their personal information and activities confidential and protected from unauthorized disclosure.
- A malicious software that can replicate itself and spread to other computers.
- Unauthorized access to computer systems or networks with the intention of gathering, altering, or destroying data.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A fraudulent scheme performed by a deceitful individual, group, or company to gain money or something else of value.
- Software that secretly gathers information about a user's activities without their knowledge and sends it to a third party.
11 Clues: A malicious software that can replicate itself and spread to other computers. • The process of copying data or files from a remote server or website to a user's device. • A secret combination of characters used for user authentication and access to secured information. • ...
Search Services Tech summit - 2022 2022-10-07
Across
- cross cluster search
- Monitoring service
- Operators friend
- New Provisioning system
- Event based self-healing
- Service provides temporary access
- Cost effective storage
Down
- DP Security Hardening
- Serveless configservice
- Recently supported EBS volume
- High Availability Project name
- Durability and remote storage
- MVP feature parity
- Upcoming AWS region in India
- Automation CICD Release
- Dataprepper
16 Clues: Dataprepper • Operators friend • Monitoring service • MVP feature parity • cross cluster search • DP Security Hardening • Cost effective storage • Serveless configservice • New Provisioning system • Automation CICD Release • Event based self-healing • Upcoming AWS region in India • Recently supported EBS volume • Durability and remote storage • High Availability Project name • ...
Nativity '24 2024-12-10
Across
- wiseguys
- booked or embarrassed?
- famous announcer
- John was _______, but Jesus was Nazarene
- waiting for the anointed one
- old church lady
- divine step dad
- old new mom
- the ponderer
Down
- silent priest
- smells like a king, baby!
- 1st generation GPS
- Jesus' job description
- leader who loves counting
- tiny throne
- midnight security detail
16 Clues: wiseguys • tiny throne • old new mom • the ponderer • silent priest • old church lady • divine step dad • famous announcer • 1st generation GPS • booked or embarrassed? • Jesus' job description • midnight security detail • smells like a king, baby! • leader who loves counting • waiting for the anointed one • John was _______, but Jesus was Nazarene
Time value of money. Behavior of interest rates 2025-03-10
Across
- An investment's annual income (interest or dividends) divided by the current price of the security
- The lending interest rate adjusted for inflation as measured by the GDP deflator
- The possibility that an investor might be unable to reinvest cash flows at a rate comparable to their current rate of return
- is a company that assigns credit ratings, which rate a debtor's ability to pay back debt by making timely principal and interest payments and the likelihood of default
- is an interest rate applicable to a financial transaction that will take place in the future
- shows that long-term U.S. Treasury debt interest rates are less than short-term interest rates
- Bonds in which payment of income on the principal is related to a specific price index, usually the Consumer Price Index
- Is a security that is issued for less than its par or face value
- theory states that the interest rate on a long-term bond will equal an average of short-term interest rates expected to occur over the life of the long-term bond plus a liquidity premium (also referred to as a term premium) that responds to supply-and-demand conditions for that bond
- Is a type of loan where the interest rate remains unchanged for the entire term of the loan or for a part of the loan term
- The percentage increase in the value of an asset or investment over a specific period of time. It is calculated by taking the difference between the final and initial value of the asset, divided by the initial value, and then multiplying by 100
- The probability of a decline in the value of an asset resulting from unexpected fluctuations in interest rates
- is the failure to make required interest or principal repayments on a debt, whether that debt is a loan or a security
- bonds with no default risk
- explains why bonds of the same maturity but issued by different economic entities have different yields
Down
- Is a financial term used to describe a security’s nominal or dollar value as given by its issuer. For bonds, it’s the amount paid to the holder at maturity
- maps out the relationship between interest rates and the time to maturity for a given debt instrument, typically government bonds
- A debt obligation with coupons attached that represent semiannual interest payments
- states that current long-term rates can be used to predict short term rates of future
- is the annualized return on a debt instrument based on the total payments received from the date of initial purchase until the maturation date
- Measures how long it takes, in years, for an investor to be repaid a bond’s price through its total cash flows
- Is the current value of a future sum of money or stream of cash flows
- The movement of money into and out of a company over a certain period of time
- theory sees markets for different-maturity bonds as separate and segmented
- is the net gain or loss of an investment over a specified time period, expressed as a percentage of the investment’s initial cost
- Is a percentage that describes how much is paid by a fixed-income security to the owner of that security during the duration of that bond
- bonds that carry a higher risk of default than most bonds issued by corporations and governments
- is the investment return an asset is expected to yield in excess of the risk-free rate of return
- Is the annual rate you find on financial products, not adjusted for inflation, fees, or compounding
- is the price quoted for immediate settlement on an interest rate, commodity, a security, or a currency
- a line that plots the yields or interest rates of bonds that have equal credit quality but different maturity dates
- Is an investment asset that pays a stated return for an infinite amount of time. An annuity with no termination date is an example of it
- Values that have been adjusted for inflation, providing a more accurate representation of the purchasing power of money over time
33 Clues: bonds with no default risk • Is a security that is issued for less than its par or face value • Is the current value of a future sum of money or stream of cash flows • theory sees markets for different-maturity bonds as separate and segmented • The movement of money into and out of a company over a certain period of time • ...
techIA2 2015-03-01
Across
- Nickname of machine created by Allan Turning
- Code name for John Cairncross
- Thailand’s first internet connection was established at this university
- Name of the worm used to infiltrate Iran’s uranium processing facilities
- German General in the Africa campaign
- Turning was arrested and charged with being this
- This was a group of five English spies
- People believe that the cyber attack against Iran was funded by this organization
Down
- The communication machines used by the Germans used these to change messages
- After WWII enigma machines were sold to these nations
- The location of the English GS&CS
- The Germans used these in a naval blockade of England and battle of the Atlantic
- Nickname given by Allan Turing to the computer he created
- Code name for the allied invasion of Europe
- Created a line of communications between computers at Stanford and UCLA in 1969
15 Clues: Code name for John Cairncross • The location of the English GS&CS • German General in the Africa campaign • This was a group of five English spies • Code name for the allied invasion of Europe • Nickname of machine created by Allan Turning • Turning was arrested and charged with being this • After WWII enigma machines were sold to these nations • ...
Browsing safely 2025-06-15
Across
- applications used to prevent the entry of virus into the computer system
- full form of virus
- acts done to protect one's computer system
- Collection of various networks in the form of a web
- providing malwares and viruses into one's computer through various links and emails
- illegal entry into one's computer through various links
- cyber crime in which money is demanded after attacking the victim
- a type of anti-virus
- befriending children on social media and causing harm through social media or physically
- full form of OTP
Down
- criminal activities intented to harm a person through online
- act of terrorism conducted through the use of internet
- full form of ICT
- sequence of characters or numbers used in any device or system to keep it protected
- act of harassing people through the use of internet
15 Clues: full form of ICT • full form of OTP • full form of virus • a type of anti-virus • acts done to protect one's computer system • Collection of various networks in the form of a web • act of harassing people through the use of internet • act of terrorism conducted through the use of internet • illegal entry into one's computer through various links • ...
crossword 2014-02-09
Across
- The company that maintains a mutual fund's assets.
- The rate at which banks borrow money from RBI.
- Divide your investments across different investment options (equity, debt etc.)
- Government body that regulates and monitors mutual funds in India (acronym).
- A measure of the volatility, or systematic risk, of a security or a portfolio in comparison to the market as a whole.
Down
- As per SEBI color coding, denotes high risk.
- The situation where a country's imports exceed its exports (acronym).
- Synonym for 'Security'.
- Moving a fixed sum of money from one scheme to another at period intervals (acronym).
- Foreign Exchange (acronym)
- Synonym for your investments (equity, debt etc.)
11 Clues: Synonym for 'Security'. • Foreign Exchange (acronym) • As per SEBI color coding, denotes high risk. • The rate at which banks borrow money from RBI. • Synonym for your investments (equity, debt etc.) • The company that maintains a mutual fund's assets. • The situation where a country's imports exceed its exports (acronym). • ...
book project part one 2024-03-22
Across
- cause (someone) to become motionless with horror, wonder, or astonishment
- childishly silly and trivial.
- exercising a compelling charm which inspires devotion in others
- to walk about in an idle or leisurely manner
- in the order given
- he student who has the highest grade point average in their class when they graduate from high school or college
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- extremely small.
- without refinement, delicacy, or sensitivity; gross; obtuse; stupid
- a group of islands.
- regard or represent as perfect or better than in reality.
11 Clues: extremely small. • in the order given • a group of islands. • childishly silly and trivial. • to walk about in an idle or leisurely manner • regard or represent as perfect or better than in reality. • exercising a compelling charm which inspires devotion in others • without refinement, delicacy, or sensitivity; gross; obtuse; stupid • ...
OPTICAL STORAGE, INTERNET SECURITY & EMAIL 2014-03-27
Across
- a copy of a file
- something you need to connect to the Internet
- It can infect your files and corrupt your hard drive
- topic of the message
- malicious software
- to connect to the Internet you need an username and a.....
- a floating gate transistor
- WI-FI.....
- ROM
- Digital.......Disc DVD
- a type of disc which uses a blue-violet laser
- CD and DVD use a laser..... to read data
Down
- a program used for displaying web pages
- It protects a company intranet from outside attacks.
- a type of non-volatile memory
- used to send a message to another person via the Internet
- TCP/IP is the standard......
- used to download and view documents published on the Internet
- a term that describes any fast, high-bandwidth connection
- Internet Service ........ ISP
- able to be rewritten many times
- files added to the message
- It changes data into a secret code
- without using cables
- a product that integrates two different technologies
25 Clues: ROM • WI-FI..... • a copy of a file • malicious software • topic of the message • without using cables • Digital.......Disc DVD • a floating gate transistor • files added to the message • TCP/IP is the standard...... • a type of non-volatile memory • Internet Service ........ ISP • able to be rewritten many times • It changes data into a secret code • ...
job security - Take over from 2017-11-02
Across
- to give someone money for something you buy or for a service
- money paid by an employer to a worker who is too ill to work
- Pradine alga
- to dismiss someone from their job SYN fire Give sb the sack
- money you earn that is paid according to the number of hours, days, or weeks that you work → salary
- Pasiimk laisvą dieną
- (informal)to dismiss someone from their job SYN sack
- to work too much or to make someone work too much
- the extra money that you must pay back when you borrow money
- formal a job
- Perimti iš
- _ompany to start a company, organization, committee etc SYN establish
- when you stop working, usually because of your age
- Pradėkite savo verslą
- a group of people who have been given the official job of finding out about something or controlling something
- the knowledge that your job is permanent as long as you want it to be
- to stop working, usually because you have reached a certain age
- something that someone needs or asks for
- In receipt of assistance, financial or otherwise, from publicly or privately funded agencies (most often government-run) due to a certain level of hardship, poverty, or need. It was really disheartening having to go on the dole these past six months, but it was the only thing that kept our family afloat after I lost my job.
Down
- the number of people who are available to work, considered together with all the available jobs
- Gaukite darbo užmokesčio didėjimą
- akcijos
- Pateikite paraišką dėl
- to learn or to teach someone the skills that are needed to do a different job
- benefit /dole money paid regularly by the government to people who have no job
- to officially announce that you have decided to leave your job or an organization → quit
- with neither side having any advantage over the other
- a small amount of additional money that you give to someone such as a waiter or a taxi driver
- _romotion Skatinimo perspektyvos
- a job with normal daytime hours. I wouldn't want a nine-to-five job. I like the freedom I have as my own boss. I used to work nights, but now I have a nine-to-five job.
- leave A leave of absence from work granted to a father to care for an infant.
31 Clues: akcijos • Perimti iš • Pradine alga • formal a job • Pasiimk laisvą dieną • Pradėkite savo verslą • Pateikite paraišką dėl • _romotion Skatinimo perspektyvos • Gaukite darbo užmokesčio didėjimą • something that someone needs or asks for • to work too much or to make someone work too much • when you stop working, usually because of your age • ...
Online Safety, Security, and Ethics 2020-10-18
Across
- A search engine that plants trees
- An unwanted email mostly from bots or advertisers
- The process of interactively searching for and retrieving requested information via a computer from databases that are online.
- The search engine of the God of Thunder
- It covers the key issues in developing a successful research project
- An unwanted acquisition of sensitive personal information
- A malicious program that transfers from one computer to another
- An essential techniques for carrying out convincing research
- Disguises as a useful program but once downloaded or installed leaves your PC unprotected
- Defined as the information superhighway
Down
- An animal bird search engine
- It causes harm to a computer system or network
- A program that runs in the background without you knowing it
- A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web
- A program designed to replicate itself and transfer from one computer to another
- It is designed to detect and destroy computer viruses
- It is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application
- A software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- An anti-virus or anti-malware software product that starts and end with n.
- A program designed to send you advertisements, mostly as pop-ups
20 Clues: An animal bird search engine • A search engine that plants trees • The search engine of the God of Thunder • Defined as the information superhighway • It causes harm to a computer system or network • An unwanted email mostly from bots or advertisers • It is designed to detect and destroy computer viruses • An unwanted acquisition of sensitive personal information • ...
SSQH Safety and Security Crossword 2024-06-11
Across
- Airports are classified into three categories: green, _____ and red.
- Passengers are required to use _____ in their own class of travel (exceptions are made for passengers with special needs) for flights into the USA.
- As a security measure to prevent unauthorized entry, crew should _____ their doors in hotels during layovers.
- Adopting the right _____ when lifting heavy objects is important in preventing back injuries.
- Crew must be aware of the _____ points in both the cabin as well as the galley as part of turbulence management.
- The H.E.R.O in #ZeroAccidentHERO campaign stands for; Happy, Exemplary, Resourceful and _____.
- When handling hot crockery, using protective gears such as _____ and the plate tongs are important to prevent scalding/burns.
- Turbulence can be _____, so it is essential for cabin crew to be equipped with turbulence management knowledge to minimise the occurrence of such injuries!
- Crew should ensure that the lavatory and passageway are clear of any threats before entering or exiting the _____.
- During transit, crew shall ensure that only _____ persons displaying proper ID are allowed into the cabin. (Both UK/US spelling are acceptable.)
Down
- Stay _____ and be aware of surroundings at all times.
- If the seatbelt sign is not on, CIC and complex leaders should exercise _____ by suspending cabin service when they observe that crew are facing difficulties manoeuvring in the cabin.
- _____ to severe turbulence can happen at any moment.
- The Least Risk Bomb Location (LRBL) for all aircraft types is at the _____ right door.
- Materials with _____ content must not be placed in microwave ovens.
- Practice safe work habits such as _____ coffee/tea pots into the cart when the seatbelt sign turns on.
- It is important to manage _____ and ensure that you have sufficient rest to always stay alert on flight.
- Good _____ helps prevent injury when turbulence occurs.
- NTL passengers (and any accompanying escorts) shall be the _____ to disembark the aircraft.
- If an announcement is made for crew to be seated, move swiftly to _____ yourself in the nearest available seat.
20 Clues: _____ to severe turbulence can happen at any moment. • Stay _____ and be aware of surroundings at all times. • Good _____ helps prevent injury when turbulence occurs. • Materials with _____ content must not be placed in microwave ovens. • Airports are classified into three categories: green, _____ and red. • ...
Orion Brower , National Security Final 2022-05-13
Across
- science of writing
- of station government official who is the head of a team.
- Case officer responsible for handling agents in operations.
- forger passports and liscences.
- Person used once unknowingly for an intelligence operation.
- spy
- for the other side.
- Commander
- Slang for British members of the secret intelligence service.
- drop Drop off point
- Only something meant to be read by a specific agent.
- bodyguard
- Intercepted communication
- Agent Agent that pretends to be a spy when he / she is on the opposite side.
Down
- Thwarting of foreign agencies.
- Agent that searches graves for names of the deceased.
- guide
- someone that lives out of their original country.
- Agent sent to their country to
- of influence Agent that uses their position to influence the public.
- Bribery
- Valuable
- Agent risk taker
- officer intelligence officer who recruits and manages spies.
- British slang
- in place informant
- Clean steps an agent may take to see if their under surveillance.
27 Clues: spy • guide • Bribery • Valuable • Commander • bodyguard • British slang • Agent risk taker • science of writing • for the other side. • in place informant • drop Drop off point • Intercepted communication • Thwarting of foreign agencies. • Agent sent to their country to • forger passports and liscences. • someone that lives out of their original country. • ...
RU ITEC411- Crime and Security 2024-10-16
Across
- Software created with the intent to harm computer hardware/software
- Ensuring data that should be private remains private
- Hackers who use their skills to improve system security
- The process of verifying the identity of a person
- A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
- Biological characteristics that are unique to each individual
Down
- The main federal computer-crime law passed in 1980
- The exchange of goods/services over the internet
- The --------- system controls access to a computer's hardware, applications, and files.
- A way in which one can transform readable data into an unreadable cypher
- Hackers whose activities are destructive
- The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
- Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
- These people developed coding standards for secure software development
- The type of theft in which a criminal uses the identity of an unknowing innocent person
- The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
- A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
- Hacking to promote a political cause
- The use of false domains/URLs to steal personal/financial information
- An application is ------ if it has a digital certificate attached to it
20 Clues: Hacking to promote a political cause • Hackers whose activities are destructive • The exchange of goods/services over the internet • The process of verifying the identity of a person • The main federal computer-crime law passed in 1980 • Ensuring data that should be private remains private • Hackers who use their skills to improve system security • ...
RU ITEC411- Crime and Security 2024-10-16
Across
- The use of false domains/URLs to steal personal/financial information
- The main federal computer-crime law passed in 1980
- Biological characteristics that are unique to each individual
- A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
- These people developed coding standards for secure software development
- The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
- The exchange of goods/services over the internet
- Hacking to promote a political cause
- The --------- system controls access to a computer's hardware, applications, and files.
Down
- Ensuring data that should be private remains private
- Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
- The process of verifying the identity of a person
- The type of theft in which a criminal uses the identity of an unknowing innocent person
- Used to monitor/filter out unwanted communication from untrusted sites and/or suspicious activity
- Hackers who use their skills to improve system security
- Hackers whose activities are destructive
- Software created with the intent to harm computer hardware/software
- A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
- An application is ------ if it has a digital certificate attached to it
- A way in which one can transform readable data into an unreadable cypher
- The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
21 Clues: Hacking to promote a political cause • Hackers whose activities are destructive • The exchange of goods/services over the internet • The process of verifying the identity of a person • The main federal computer-crime law passed in 1980 • Ensuring data that should be private remains private • Hackers who use their skills to improve system security • ...
RU ITEC411 Chapter 5 - Security 2025-03-18
Across
- Software that attaches or adds itself to other software
- Software designed to monitor and record user activity on a computer
- Hacking to promote a political cause
- Virus that's responsible for $10B in damages and infected 80% of U.S. federal agencies
- Gathering for developing innovative new software and hardware products
- Ensuring data that should be private remains private
- Software that encrypts personal data and locks it behind a paywall
- Defect found in the "heartbeat" section of the OpenSSL code
- Software designed to exploit specific system flaws
Down
- Device used to collect card information from payment terminals
- Trojan that accessed 70 million target customer's data
- code library used to send and receive encrypted messages
- "A coordinated army of compromised devices"
- Spam messages intending to collect information to impersonate someone to steal money and goods
- Goal of significant portion of hacking is to steal
- Hidden entry point that bypasses normal security
- Used to mean a "Computer virtuoso"
- Malicious software disguising itself as a harmless program
- Beginning of the Internet, linked universities, companies, and government installations
- Hack used to damage Iranian centrifuges
- ____ hacking, meant to impress and gain respect from peers
- Characteristics that are biologically unique to an individual
22 Clues: Used to mean a "Computer virtuoso" • Hacking to promote a political cause • Hack used to damage Iranian centrifuges • "A coordinated army of compromised devices" • Hidden entry point that bypasses normal security • Goal of significant portion of hacking is to steal • Software designed to exploit specific system flaws • ...
Chapter 8 - Network Perimeter Security 2025-05-21
Across
- A configuration file that tells browsers how to use a proxy server automatically.
- Inspecting individual packets and allowing or blocking them based on rules.
- A proxy that hides a user’s real IP address when accessing external networks.
- Monitoring the state of active connections to make dynamic traffic decisions.
- A tool that blocks access to unwanted or harmful online content.
- A decoy system set up to attract and monitor attackers.
- A device or software that monitors network traffic for suspicious activity.
- A proxy that filters traffic based on specific application protocols.
- A network interface mode that captures all traffic on the segment, not just addressed traffic.
- An all-in-one security solution combining firewall, antivirus, intrusion prevention, and more.
- A firewall that filters traffic based on specific application content or behavior.
- A missed alert when actual malicious activity is not detected.
- A rule that clearly grants permission for network access or traffic.
- A rule that clearly blocks specific access or traffic.
Down
- The boundary between a private internal network and the public internet.
- An alert triggered by harmless activity mistaken as a threat.
- A set of rules that control network traffic by permitting or denying data packets.
- Technology that prevents sensitive data from being leaked or accessed without authorization.
- A default rule that blocks traffic not explicitly allowed.
- A firewall that manages traffic at the session layer between trusted and untrusted hosts.
- A firewall specifically designed to protect web applications from attacks.
- A proxy that filters and caches web traffic.
- An appliance or software that filters malicious content and enforces web policies.
- A system that actively blocks malicious traffic as it’s detected.
- A network of honeypots designed to study and detect attacks.
- A system that acts as an intermediary between users and the internet.
26 Clues: A proxy that filters and caches web traffic. • A rule that clearly blocks specific access or traffic. • A decoy system set up to attract and monitor attackers. • A default rule that blocks traffic not explicitly allowed. • A network of honeypots designed to study and detect attacks. • An alert triggered by harmless activity mistaken as a threat. • ...
RU ITEC411 - Crime and Security 2022-10-16
Across
- Fraudulent spam emails to gather information used to impersonate someone, steal money or goods.
- Placing false IP address in the tables on a DNS that leads to a counterfeit site for gathering personal data.
- Various crimes in which a criminal or group uses the identity of a person.
- Ensure systems, services, data are accessible when needed.
- An attack in which a botnet overwhelms a system or website with requests that stops users from accessing the system or website.
- Malware that monitors and records activities on an electronic device.
- Fraudulent spam texts to gather information used to impersonate someone, steal money or goods.
- Recording device used to steal credit/debit card information.
- Group of electronic devices that have a malware that controls them via a central host that coordinates the army to perform tasks.
- Biological characteristics unique to an individual.
Down
- Ensure data should be private remain private.
- Software that gives access to an electronic device by bypassing security checks.
- Manipulation of people to get information or do a task that violates security protocols, two words no spaces.
- Malware that asks as a normal software but has malicious abilities hidden.
- A system that calculates a customer's bill when checking out and starts payment.
- Malware that encrypts files on an electronic devices, then asks for payment to decrypt files.
- Software that attaches to a program.
- Similar to virus, does not attach itself to other programs.
- Use of hacking to promote a political cause.
- Ensure data is not changed without authorization, stays consistent over time and stays sync with real world.
20 Clues: Software that attaches to a program. • Use of hacking to promote a political cause. • Ensure data should be private remain private. • Biological characteristics unique to an individual. • Ensure systems, services, data are accessible when needed. • Similar to virus, does not attach itself to other programs. • ...
Digital Security, Ethics, and Privacy 2022-11-07
Across
- A set of instructions in a program that allows users to bypass security controls
- The process of sharing computing resources among computers and devices on a network
- A type of attack that overloads a resource, thus making it unavailable to legitimate users
- A ratio that measures how much power enters a computer facility compared to how much power is used
- All data is backed up whenever a change is made
- A unique hardware identifier for your device
- Protects individuals against the wrongful disclosure of their health information
- The discovery, collection, and analysis of evidence found on a computer or network
- The phase of disaster recovery that includes the evacuation plan
- A normal looking yet fraudulent Wi-Fi network
- A program that copies itself repeatedly and spreads throughout the network without human help
- An animal loving hacker who might deface the website of a local meat packing plant
- Technique used by attackers to make their traffic look legitimate to the victim device
- A common infringement of copyright
Down
- The process of ensuring that the person requesting access to a computer or network is not an imposter
- Online or Internet-based illegal acts
- Attacks that attempt to trick the victim into giving information to the attacker
- The movement to ensure that all users have access to devices, data, and infrastructure
- The record of everything you do online
- A private secure path across a public network
- The process of restricting access to certain material
- A part of the web that is accessed using special software, providing anonymity to its users
- A private combination of words associated with a username
- Any event or action that could cause loss or damage
- A type of authentication that combines multiple types of authentication to provide more secure access
25 Clues: A common infringement of copyright • Online or Internet-based illegal acts • The record of everything you do online • A unique hardware identifier for your device • A private secure path across a public network • A normal looking yet fraudulent Wi-Fi network • All data is backed up whenever a change is made • Any event or action that could cause loss or damage • ...
Security Terminology Puzzle (Participation 3) 2023-01-25
Across
- many compromised computers attacking
- software that is harmful
- your devices unique number online
- software that checks for malware
- malware that makes you pay
- software that tracks you
Down
- unscrambles the unreadable scrambled data
- harassment over social media
- network pro learning hacking techniques
- tricking users to click an image
- shield for data
- malware pretending to be useful
- multitudinous attackers preventing legitimate users
- software that displays adverts
- internet access at starbucks
- attacks seeking out personal info
- hides a users information/location
- scrambling data into unreadable
- attacks from an unknown vulnerability
- i swear that isn't me
20 Clues: shield for data • i swear that isn't me • software that is harmful • software that tracks you • malware that makes you pay • harassment over social media • internet access at starbucks • software that displays adverts • malware pretending to be useful • scrambling data into unreadable • tricking users to click an image • software that checks for malware • ...
Industrial Security Concept Crossword Puzzle 2025-10-13
Across
- - indication of impending danger or harm
- - inability to withstand the effects of a hostile environment
- - term used in England for lock picker, safecrackers, and penetrators of restricted areas
- - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
- - the monitoring of telephone conversation by a third party, often by covert means
- - a house like structures above the perimeter barrier
- - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
- - A chance of being injured or harmed
- - genuine key stolen from the owner
Down
- - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
- - means to secretly listen to record a conversation using a hidden electronic device
- - it is the communication channel that conveys the information from all sensors in the system
- - a metallic container used for safekeeping of documents or small items in office or installation
- - used as a form of identification and access control
- - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
- - any information and material, the unauthorized disclosure of which would endanger national security
- - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
- - is the potential that a chosen action will lead to a loss
- - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
- - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
20 Clues: - genuine key stolen from the owner • - A chance of being injured or harmed • - indication of impending danger or harm • - used as a form of identification and access control • - a house like structures above the perimeter barrier • - is the potential that a chosen action will lead to a loss • - inability to withstand the effects of a hostile environment • ...
Industrial Security Concept Crossword Puzzle 2025-10-13
Across
- - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
- - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
- - A chance of being injured or harmed
- - used as a form of identification and access control
- - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
- - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
- - genuine key stolen from the owner
- - means to secretly listen to record a conversation using a hidden electronic device
- - term used in England for lock picker, safecrackers, and penetrators of restricted areas
- - a house like structures above the perimeter barrier
Down
- - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
- - inability to withstand the effects of a hostile environment
- - it is the communication channel that conveys the information from all sensors in the system
- - indication of impending danger or harm
- - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
- - the monitoring of telephone conversation by a third party, often by covert means
- - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
- - any information and material, the unauthorized disclosure of which would endanger national security
- - a metallic container used for safekeeping of documents or small items in office or installation
- - is the potential that a chosen action will lead to a loss
20 Clues: - genuine key stolen from the owner • - A chance of being injured or harmed • - indication of impending danger or harm • - used as a form of identification and access control • - a house like structures above the perimeter barrier • - is the potential that a chosen action will lead to a loss • - inability to withstand the effects of a hostile environment • ...
