cyber security Crossword Puzzles

Data Protection Awareness Puzzle 2017-01-09

Data Protection Awareness Puzzle crossword puzzle
Across
  1. Under which section of the DPA 1998 can you make a Subject Access Request (SAR)
  2. Number of principles the Data Protection Act 1998 (DPA) contains
  3. Fill in the blank: Personal data must be held no longer than '...'
  4. Act of revelation
  5. Give permission
  6. An organisation or body that processes personal data
  7. You can lock your computer by holding the Windows button and which other letter on the keyboard?
Down
  1. A data breach may result in this for The Authority and for you
  2. Establishing who someone is
  3. Attempting to get confidential information by sending fake emails
  4. A requirement for logging in
  5. A medium used by The Authority for secure email and file transfers
  6. Security error/ the breaking of a law or agreement
  7. A computer security system which prevents unauthorised access to a network

14 Clues: Give permissionAct of revelationEstablishing who someone isA requirement for logging inSecurity error/ the breaking of a law or agreementAn organisation or body that processes personal dataA data breach may result in this for The Authority and for youNumber of principles the Data Protection Act 1998 (DPA) contains...

Department of Homeland Security 2015-08-17

Department of Homeland Security crossword puzzle
Across
  1. Month DHS was formed
  2. Secretary of TSA
  3. What kind of branch is the Eagle on the DHS seal holding in its left talon?
  4. Number of secretaries DHS has had
  5. First Secretary of DHS
  6. Number of child agencies under DHS
  7. Campaign set up to combat human trafficking
Down
  1. Secretary of DHS
  2. How many arrows is the Eagle holding in its right talon on the DHS seal?
  3. An agency within DHS which has two distinct purposes, one of them being the protection of current and former national leaders and their families.
  4. An agency within DHS whose primary purpose is to coordinate and respond to natural disasters that occur within the United States and overwhelm the local resources and authorities of where they occur
  5. A branch of the US Armed Forces that operated under DHS during peace time, but can be transferred to the U.S. Department of the Navy by the President at any time, or by Congress during times of war.
  6. Number of core missions DHS has according to the QHSR
  7. An agency within DHS which regulates and facilitates international trade, collects import duties, and enforces U.S. regulations. Currently,the largest federal law enforcement agency.

14 Clues: Secretary of DHSSecretary of TSAMonth DHS was formedFirst Secretary of DHSNumber of secretaries DHS has hadNumber of child agencies under DHSCampaign set up to combat human traffickingNumber of core missions DHS has according to the QHSRHow many arrows is the Eagle holding in its right talon on the DHS seal?...

Food security in india 2023-12-01

Food security in india crossword puzzle
Across
  1. - casual labourers are from which area
  2. - universal is the coverage target group of which scheme
  3. - important role in food security in india
  4. - what is the other name of fair price shops
  5. - raised the maintenance cost of procuring food grains by the government
  6. - food is within reach of every person
Down
  1. - revolution associated with milk and its production brought by amul
  2. - priority households is the coverage target group of which scheme
  3. - issue price of APS is
  4. - purchases wheat and rice from the farmers
  5. - launched in December 2000
  6. - in which state famine occured
  7. - proved to be the most effective instrument of government policy over the years
  8. - landless farmers are from which area
  9. - which scheme was introduced in 1992

15 Clues: - issue price of APS is- launched in December 2000- in which state famine occured- which scheme was introduced in 1992- casual labourers are from which area- landless farmers are from which area- food is within reach of every person- important role in food security in india- purchases wheat and rice from the farmers...

Human Security and Peacebuilding 2025-05-17

Human Security and Peacebuilding crossword puzzle
Across
  1. Reframe spoilers to be a ... instead of only disruptive
  2. Combination of liberal efforts and local practices
  3. Premature ... and election before DDR and SSR
  4. Part of 4-part model of hybrid peace, top down rules and pressures
  5. Type of spoilers that fundamentally reject the peace process entirely
  6. External intervention is strategically focused on achieving ... objectives
  7. One of the 3 forms of local resistance, resist, ignore, ...
Down
  1. This approach to liberal peace-building involves multiple international actors
  2. Type of liberal peace-building, its strength lies in swift decision making and clear accountability
  3. Type of peace that risks return of repression because it isn't democratic
  4. One of 5 pillars of successful peace-building, ... partnerships between local and international actors
  5. Liberal values, democracy, free ..., rule of law
  6. Type of peace-building where rules are imposed from higher up, with little regard to local context
  7. Focused on developing effective, legitimate and resilient state institutions

14 Clues: Premature ... and election before DDR and SSRLiberal values, democracy, free ..., rule of lawCombination of liberal efforts and local practicesReframe spoilers to be a ... instead of only disruptiveOne of the 3 forms of local resistance, resist, ignore, ...Part of 4-part model of hybrid peace, top down rules and pressures...

Internet Privacy and Security 2025-08-15

Internet Privacy and Security crossword puzzle
Across
  1. A secret combination used to access something
  2. What software does after placing a cookie
  3. The ideas or beliefs others have about you
  4. Protecting people’s devices and software
  5. A set of instructions in software code
  6. Helps people know what apps and sites do with their data
  7. Learning A form of AI that improves with new data
Down
  1. Protecting people’s data and personal information
  2. A person who uses computers to gain unauthorized access
  3. Footprint All the information about you that appears online
  4. A bit of text placed on your device by websites
  5. The area in digital products where you manage privacy
  6. Intelligence Software that makes machines learn and solve problems
  7. Digital information that can be seen, used, and shared

14 Clues: A set of instructions in software codeProtecting people’s devices and softwareWhat software does after placing a cookieThe ideas or beliefs others have about youA secret combination used to access somethingA bit of text placed on your device by websitesProtecting people’s data and personal information...

Biomes and Food Security 2021-11-03

Biomes and Food Security crossword puzzle
Across
  1. when livestock eat too much grass
  2. being able to find and source food
  3. a biome used by humans for livestock and crops
  4. a biome that is usually dry and hot/cold
  5. having enough nutritious food that is affordable/accessible
  6. when healthy grasslands turn to desert
Down
  1. quality of soil getting worse
  2. maintaining biomes so that they last into the future
  3. having enough money to buy food
  4. affects how hot/cold a place is
  5. average weather conditions experienced in a biome
  6. imaginary line around the middle of the world
  7. a biome that is full of trees;temperate climate
  8. another word for ecosystem

14 Clues: another word for ecosystemquality of soil getting worsehaving enough money to buy foodaffects how hot/cold a place iswhen livestock eat too much grassbeing able to find and source foodwhen healthy grasslands turn to deserta biome that is usually dry and hot/coldimaginary line around the middle of the world...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. Militair voertuig
  2. Vertrekplaats voor vliegtuigsprong
  3. Militaire helikopter
  4. Operatie Kolwezi 78
  5. onbemande vliegtuig(afk)
  6. De beste vriend van een para
  7. Parachute
  8. M56
  9. Eskadron in het Belgisch Leger
  10. Hoofddeksel van de chutist
Down
  1. legervervoermiddel
  2. Auschwitz en Birkenau
  3. legeroefening
  4. voormalig Belgische Koning
  5. Thuishaven school voor onderofficieren
  6. meerdere compagnieën
  7. Belgium Luxemburg International Security Assistance Force
  8. Opleidingskamp van de para-commando
  9. graad in het leger

19 Clues: M56ParachutelegeroefeningMilitair voertuiglegervervoermiddelgraad in het legerOperatie Kolwezi 78Militaire helikoptermeerdere compagnieënAuschwitz en Birkenauonbemande vliegtuig(afk)voormalig Belgische KoningHoofddeksel van de chutistDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. Opleidingskamp van de para-commando
  2. legeroefening
  3. Belgium Luxemburg International Security Assistance Force
  4. M56
  5. Hoofddeksel van de chutist
  6. onbemande vliegtuig(afk)
  7. meerdere compagnieën
  8. Auschwitz en Birkenau
  9. Militaire helikopter
Down
  1. legervervoermiddel
  2. Eskadron in het Belgisch Leger
  3. De beste vriend van een para
  4. Operatie Kolwezi 78
  5. Thuishaven school voor onderofficieren
  6. Vertrekplaats voor vliegtuigsprong
  7. Parachute
  8. voormalig Belgische Koning
  9. graad in het leger
  10. Militair voertuig

19 Clues: M56ParachutelegeroefeningMilitair voertuiglegervervoermiddelgraad in het legerOperatie Kolwezi 78meerdere compagnieënMilitaire helikopterAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

test q3 2025-08-06

test q3 crossword puzzle
Across
  1. IPS Technology has increased crime-solving rates by over _____% across multiple nations
  2. Our ____ solution allows for contactless identity verification through use of remote supervision driven by video and audio sessions
  3. IDEMIA Public Security’s ______ solution is ideal for urban environments, providing speed and red-light enforcement with a sleek design that can easily fit into a city setting
  4. IDEMIA is certified platinum (highest level) in this sustainability rating
  5. IDEMIA Public Security provides biometric authentication and document verification solutions to support this initiative to better protect European borders
  6. IDEMIA Public Security’s ________ app is available for businesses to securely verify a person’s identity through use of digital credentials and bluetooth connection
  7. This solution enables high-tech threat migration capabilities by increasing the safety of force protection personnel, improving installation situational awareness and, ultimately, providing secure and frictionless access, meeting the expectations of today’s generation.
  8. IDEMIA Public Security’s _______ Series offers efficient, secure identity verification in all conditions
Down
  1. Reinforcing our commitment to leadership in biometrics and identity technology, we have recently added ________ to one of our products used to aid in criminal investigations and now empower law enforcement to identify individuals even when traditional biometric data is unavailable.
  2. In North America, IDEMIA Public Security recently hit a huge milestone with launching mobile IDs in all three major U.S. wallets with the launch of the Iowa Mobile ID in _______ Wallet
  3. IDEMIA Public Security’s ______ solution was developed in response to France’s Charles de Gaulle airport and Singapore’s Changi airport need for a touchless solution to facilitate secure identification of passengers and reduce boarding times
  4. IDEMIA Public Security combines our technical leadership with a ________ mindset, setting apart our solutions and helping agencies tackle challenges with confidence and efficiency
  5. IDEMIA Public Security’s ______ provides support in criminal investigations with a range of biometric identification systems, including facial, fingerprint, iris matching and more
  6. Our ____ Site recently obtained the ISO 14001 certification, becoming the first IPS site to achieve this milestone
  7. IDEMIA Public Security continuously participates in and ranks amongst the top performers in these benchmarking tests

15 Clues: IDEMIA is certified platinum (highest level) in this sustainability ratingIPS Technology has increased crime-solving rates by over _____% across multiple nationsIDEMIA Public Security’s _______ Series offers efficient, secure identity verification in all conditions...

Crossword- Access control 2022-02-05

Crossword- Access control crossword puzzle
Across
  1. One technique comes under authentication by knowledge
  2. One example of Single Sign-on technology
  3. BIBA model enforces
  4. Simple security rule (“no read up “ rule) in BLP preserves
  5. ______ list is the subject perspective view of the access control matrix.
Down
  1. Credit card-based authentication comes under authentication by this factor.
  2. The term in access control for the verification that the user’s claimed identity is valid
  3. Confirms and audits potential breaches by analyzing the security events.
  4. Common identity management technology
  5. the flow of information between subject and object refers to

10 Clues: BIBA model enforcesCommon identity management technologyOne example of Single Sign-on technologyOne technique comes under authentication by knowledgeSimple security rule (“no read up “ rule) in BLP preservesthe flow of information between subject and object refers toConfirms and audits potential breaches by analyzing the security events....

The Executive Branch 2023-10-21

The Executive Branch crossword puzzle
Across
  1. President The second-in-command in the executive branch
  2. The group of advisers appointed by the President to lead various government departments
  3. The department responsible for US foreign affairs
  4. The executive department in charge of federal law enforcement and investigations
  5. The head of the executive branch
Down
  1. Security The executive department responsible for ensuring national security
  2. The executive department in charge of the country's military forces
  3. The executive department overseeing environmental and natural resource policies
  4. The government agency responsible for enforcing immigration laws
  5. The department responsible for managing the country's finances

10 Clues: The head of the executive branchThe department responsible for US foreign affairsPresident The second-in-command in the executive branchThe department responsible for managing the country's financesThe government agency responsible for enforcing immigration lawsThe executive department in charge of the country's military forces...

Crossword 2023-11-21

Crossword crossword puzzle
Across
  1. Calls all members to respect the sovereignty, territorial integrity and political independence
  2. Withdrawal of customary trade and financial relations for foreign and security/policy purposes
  3. What does the United States lose because of their double standards?
  4. What was the US response to the UN Security COuncil Gaza ceasefire resolution?
  5. Supporter of Ukraine economically and politically.
Down
  1. Article one’s greatest emphasis.
  2. Largest international financial supporter of Ukraine
  3. Author’s book
  4. Balanced stance on Russo-Ukrainian war to save economic ties
  5. What is the collective name for the developing nations of Latin America, Africa and Asia?

10 Clues: Author’s bookArticle one’s greatest emphasis.Supporter of Ukraine economically and politically.Largest international financial supporter of UkraineBalanced stance on Russo-Ukrainian war to save economic tiesWhat does the United States lose because of their double standards?...

airramm 2024-10-10

airramm crossword puzzle
Across
  1. Software that secetly gather user data
  2. The first character of its acronym begins with a number, it is used for two-factor authentication
  3. A weakness that can be exploited to compromise a system
  4. Malware that locks data, demanding payment for access
Down
  1. A group of infected devices controlled by hackers
  2. Unauthorized access or theft of confidential data
  3. A software update that fixes security flaws
  4. A scan to steal sensitive information by pretending to be legitimate
  5. Harmuful software designed to damage or infiltrate systems
  6. A system that controls network traffic based on security rules.

10 Clues: Software that secetly gather user dataA software update that fixes security flawsA group of infected devices controlled by hackersUnauthorized access or theft of confidential dataMalware that locks data, demanding payment for accessA weakness that can be exploited to compromise a systemHarmuful software designed to damage or infiltrate systems...

test 2024-09-25

test crossword puzzle
Across
  1. I help visualize and communicate product roadmaps.
  2. I gather user feedback to guide product development.
  3. I provide a suite for planning, development, and collaboration.
Down
  1. I analyze code quality and maintainability.
  2. I help secure open source by finding vulnerabilities.
  3. Manages open-source compliance and security risks. Helps track and analyze third-party software usage.(Acronym)
  4. I manage feature flags and control rollouts.
  5. A powerful REST API client for testing APIs. Supports GraphQL and offers collaboration features.
  6. I identify and fix security issues in your code.
  7. I enable collaborative design for teams.

10 Clues: I enable collaborative design for teams.I analyze code quality and maintainability.I manage feature flags and control rollouts.I identify and fix security issues in your code.I help visualize and communicate product roadmaps.I gather user feedback to guide product development.I help secure open source by finding vulnerabilities....

Bank credit essentials 2024-11-28

Bank credit essentials crossword puzzle
Across
  1. Contract defining terms and conditions of a loan.
  2. A principle ensuring lenders have equal claim on borrower assets.
  3. One of the 5Cs, assessing integrity and trustworthiness.
  4. The duration of the loan, linked to the risk of default.
Down
  1. Assets pledged by borrowers as security for a loan.
  2. A credit evaluation model used alongside the 5Cs.
  3. A third-party commitment to pay in case of borrower default.
  4. Legal paperwork required for securing a loan.
  5. A fallback assurance in case of borrower’s failure to pay.
  6. One of the 5Cs, showing financial commitment by the borrower.

10 Clues: Legal paperwork required for securing a loan.A credit evaluation model used alongside the 5Cs.Contract defining terms and conditions of a loan.Assets pledged by borrowers as security for a loan.One of the 5Cs, assessing integrity and trustworthiness.The duration of the loan, linked to the risk of default....

Fortinet: Crack the Code 2024-06-04

Fortinet: Crack the Code crossword puzzle
Across
  1. a tool for analyzing and reporting on network events and security logs.
  2. a network switch that connects and manages data traffic within a network.
  3. a security token that provides two-factor authentication for securing user access.
  4. a centralized management system for controlling all your fortigate devices and policies.
Down
  1. a system that manages user identity and access privileges across a network.
  2. a security appliance that acts as a firewall to protect networks from external threats.
  3. a cloud-based service that provides secure access to network resources from anywhere.

7 Clues: a tool for analyzing and reporting on network events and security logs.a network switch that connects and manages data traffic within a network.a system that manages user identity and access privileges across a network.a security token that provides two-factor authentication for securing user access....

MONDAY 4th NOVEMBER 2019-11-03

MONDAY 4th NOVEMBER crossword puzzle
Across
  1. DISMISS FROM A JOB
  2. POINT
  3. A PLACE IN WHICH A SPECTATOR SITS
  4. MAN WHOSE WIFE IS DEAD
  5. CHALLENGE,HAVE THE COURAGE TO DO SOMETHING
  6. ENJOYABLE
  7. SIGN USED TO CONNECT WORDS
  8. ACTIVITY FOR PLEASURE
  9. REGISTER
Down
  1. DIRECT
  2. JOURNEY
  3. PERSON WHO TRAVELS CLANDESTINELY
  4. SECURITY
  5. MONEY YOU OWE
  6. PLAY FOR MONEY
  7. OPPOSITE OF WET

16 Clues: POINTDIRECTJOURNEYSECURITYREGISTERENJOYABLEMONEY YOU OWEPLAY FOR MONEYOPPOSITE OF WETDISMISS FROM A JOBACTIVITY FOR PLEASUREMAN WHOSE WIFE IS DEADSIGN USED TO CONNECT WORDSPERSON WHO TRAVELS CLANDESTINELYA PLACE IN WHICH A SPECTATOR SITSCHALLENGE,HAVE THE COURAGE TO DO SOMETHING

Random Words 2025-08-27

Random Words crossword puzzle
Across
  1. Musical instrument
  2. Released after death
  3. Comes in different types
  4. Of tremendous magnitude
  5. Fuel for a furnace
  6. Bird known for their pouch
  7. Medieval weapon
  8. Security measure
Down
  1. Yellow flower
  2. In a living being
  3. Hockey essential
  4. Antonym of chaos
  5. Medical instrument
  6. Artistic instrument
  7. Building block for the body
  8. Synonym of chaos

16 Clues: Yellow flowerMedieval weaponHockey essentialAntonym of chaosSynonym of chaosSecurity measureIn a living beingMusical instrumentMedical instrumentFuel for a furnaceArtistic instrumentReleased after deathOf tremendous magnitudeComes in different typesBird known for their pouchBuilding block for the body

Poppy Playtime 2025-05-25

Poppy Playtime crossword puzzle
Across
  1. The First Successful Experiment
  2. The Musical Dinosaur
  3. PlayStation Overseer
  4. Musical Memory Predator
  5. Our Ally
  6. Another Failure
  7. The Doctor
  8. Safe Haven’s Protector
  9. Playtime Co. Security
  10. Follower of The Prototype
Down
  1. Statues Apex Predator
  2. The First Bigger Body
  3. Playtime Co.’s First Success
  4. Doctor’s Loyal Pet
  5. Former Playtime Co. Employee
  6. False Prisoner

16 Clues: Our AllyThe DoctorFalse PrisonerAnother FailureDoctor’s Loyal PetThe Musical DinosaurPlayStation OverseerStatues Apex PredatorThe First Bigger BodyPlaytime Co. SecuritySafe Haven’s ProtectorMusical Memory PredatorFollower of The PrototypePlaytime Co.’s First SuccessFormer Playtime Co. EmployeeThe First Successful Experiment

Science 2022-06-27

Science crossword puzzle
Across
  1. liquid to solid
  2. M in MRS GREN
  3. scientific magnifier
  4. undifferentiated
  5. stationary or constant speed
  6. downward force
  7. DNA stored in cell
  8. adapted cell
  9. sparse particle arrangement
Down
  1. cell security guard
  2. more than two elements
  3. gas to liquid
  4. how plants make food
  5. more than one cell
  6. one type of atom

15 Clues: adapted cellM in MRS GRENgas to liquiddownward forceliquid to solidundifferentiatedone type of atommore than one cellDNA stored in cellcell security guardscientific magnifierhow plants make foodmore than two elementssparse particle arrangementstationary or constant speed

The Delp Wedding 2023-09-22

The Delp Wedding crossword puzzle
Across
  1. best man
  2. number of ring security boys
  3. who is the chef
  4. where they live
  5. month they met
  6. first date
Down
  1. Austin’s birth month
  2. maid of honor
  3. where they met
  4. their favorite food
  5. number of flower girls
  6. years together
  7. got engaged at
  8. Sarah’s birth month
  9. number of pets

15 Clues: best manfirst datemaid of honorwhere they metyears togethermonth they metgot engaged atnumber of petswho is the chefwhere they livetheir favorite foodSarah’s birth monthAustin’s birth monthnumber of flower girlsnumber of ring security boys

Crime in the UK 2024-06-12

Crime in the UK crossword puzzle
Across
  1. Rather
  2. Use of force against others, attack
  3. Deal, Contract
  4. Things not in common
  5. "________ spree"
  6. In the company of other people
Down
  1. An organization that sells products or services
  2. Worry
  3. A sharp utensil
  4. A target of violence
  5. Companion
  6. An item used to attack or defend
  7. Protection
  8. Evidence
  9. Units of information

15 Clues: WorryRatherEvidenceCompanionProtectionDeal, ContractA sharp utensil"________ spree"A target of violenceThings not in commonUnits of informationIn the company of other peopleAn item used to attack or defendUse of force against others, attackAn organization that sells products or services

Emergency Code Crossword Puzzle 2015-01-12

Emergency Code Crossword Puzzle crossword puzzle
Across
  1. who can turn off medical gases
  2. bomb threat
  3. active shooter
  4. missing or kdnapped child
  5. snow or ice
  6. no water
  7. funnel cloud
  8. security rapidly needed
Down
  1. material safety data sheet
  2. mass casuality event
  3. missing or wandering patient
  4. hazmat decontamination emergency
  5. evacuation
  6. medical emergency or CPR
  7. fire
  8. infant abduction or missing baby
  9. rescue, alarm, contain, extinguish

17 Clues: fireno waterevacuationbomb threatsnow or icefunnel cloudactive shootermass casuality eventsecurity rapidly neededmedical emergency or CPRmissing or kdnapped childmaterial safety data sheetmissing or wandering patientwho can turn off medical gaseshazmat decontamination emergencyinfant abduction or missing babyrescue, alarm, contain, extinguish

16 carrer cluster 2020-09-23

16 carrer cluster crossword puzzle
Across
  1. managment, and administraion these people have a strong desigher for buisinesses
  2. and construction these job requiers you to desighn and build
  3. and audio these people work in the department with technology
  4. Sales and Service The work environment can be an office, a retail store or the home of the customer
  5. Services The work environment can be a hospital, a spa or a beauty salon.
  6. The typical work environment is an office
  7. Technology, Engineering, and Mathematics he work environment can be a laboratory
  8. Public Safety, Corrections, and Security Working in Law, Public Safety, Corrections, and Security may be of interest to people who are brave and have a strong desire to protect others.
Down
  1. Technology The work environment is typically an office. A career in Information Technology may be of interest to people who have a passion for the Internet, including assisting web navigation and fixing security issues.
  2. Distribution, and Logistics The work environment can be a car repair shop, a train, a bus or an office.
  3. food and nutrual recorces the work inviroment is mostly outdoors
  4. A typical work environment is an industrial unit.
  5. and Tourism The career paths related to bars and restaurants may be of interest to people who love food and don’t mind working long hours standing.
  6. and training this job helps other people learn
  7. and Public Administration The work environment is typically a city’s municipal office or a customs office.
  8. Science The work environment can be a hospital, private clinic, pharmacy retail chain or patients’ homes.

16 Clues: The typical work environment is an officeand training this job helps other people learnA typical work environment is an industrial unit.and construction these job requiers you to desighn and buildand audio these people work in the department with technologyfood and nutrual recorces the work inviroment is mostly outdoors...

WHAT THEY DO 2021-08-26

WHAT THEY DO crossword puzzle
Across
  1. TECHNOLOGY SUPPORT TECH
  2. HEAD DAY CUSTODIAN
  3. LIBRARIAN
  4. ASST. PRINCIPAL
  5. INSTRUCTIONAL TECHNOLOGY
  6. P.E.
  7. NEW SPED HI
  8. MUSIC
  9. STUDENT INFORMATION
  10. MATH COACH
  11. NEW GIFTED RESOURCE TEACHER
  12. DAY CUSTODIAN
  13. SECURITY (AKA MR. GLENN)
Down
  1. CAFETERIA MONITOR
  2. OFFICE ASSOCIATE
  3. CAFETERIA MANAGER
  4. NEW ESL
  5. ART
  6. NEW 3RD GRADE TEACHER
  7. NEW 1ST GRADE TEACHER
  8. NEW GENERAL ASST.
  9. PRINCIPAL
  10. BOOKKEEPER/PAYROLL
  11. NEW SCHOOL NURSE
  12. READING SPECIALIST

25 Clues: ARTP.E.MUSICNEW ESLLIBRARIANPRINCIPALMATH COACHNEW SPED HIDAY CUSTODIANASST. PRINCIPALOFFICE ASSOCIATENEW SCHOOL NURSECAFETERIA MONITORCAFETERIA MANAGERNEW GENERAL ASST.HEAD DAY CUSTODIANBOOKKEEPER/PAYROLLREADING SPECIALISTSTUDENT INFORMATIONNEW 3RD GRADE TEACHERNEW 1ST GRADE TEACHERTECHNOLOGY SUPPORT TECHINSTRUCTIONAL TECHNOLOGY...

MCPL PUZZLER 2022-06-23

MCPL PUZZLER crossword puzzle
Across
  1. sarah angelica julie febe
  2. where to drop books
  3. fol head
  4. new h.r. manager
  5. security training
  6. branch near montgomery village
  7. graphic artist
  8. june 19
  9. same numeric address as white oak
  10. upper county branch
  11. online tutoring
Down
  1. free streaming with library card
  2. central is here
  3. integrated library system
  4. former maggie nightingale
  5. manager at cm
  6. first director
  7. supply vendor
  8. does booksubs
  9. branch in bethesda

20 Clues: june 19fol headmanager at cmsupply vendordoes booksubsfirst directorgraphic artistcentral is hereonline tutoringnew h.r. managersecurity trainingbranch in bethesdawhere to drop booksupper county branchsarah angelica julie febeintegrated library systemformer maggie nightingalebranch near montgomery villagefree streaming with library card...

6th Grade Week 10 Crossword 2020-02-10

6th Grade Week 10 Crossword crossword puzzle
Across
  1. теорија/teori/teori
  2. слика/foto/resim
  3. благородна/fisnik/asil
  4. науката/shkencë/bilim
  5. крокодил/krokodil/timsah
  6. се врти/rrotullohem/dönmek
  7. претпазливост/kujdes/dikkat
  8. безбедност/siguri/güvenlik
  9. ножеви/thika/bıçaklar
Down
  1. гуштер/hardhucë/kertenkele
  2. хор/kor/koro
  3. загадувањето/ndotje/kirlilik
  4. патник/pasagjer/yolcu
  5. подели/përçaj/bölmek
  6. бојкотот/bojkotim/boykot
  7. накит/me ar/takı
  8. антички/i lashtë/antik
  9. објасни/shpjegoj/açıklamak
  10. апсолутна/absolut/söylemek
  11. индекс/indeks/indeks

20 Clues: хор/kor/koroслика/foto/resimнакит/me ar/takıтеорија/teori/teoriподели/përçaj/bölmekиндекс/indeks/indeksпатник/pasagjer/yolcuнауката/shkencë/bilimножеви/thika/bıçaklarблагородна/fisnik/asilантички/i lashtë/antikбојкотот/bojkotim/boykotкрокодил/krokodil/timsahгуштер/hardhucë/kertenkeleобјасни/shpjegoj/açıklamakсе врти/rrotullohem/dönmek...

Lesson 69-72 2023-02-06

Lesson 69-72 crossword puzzle
Across
  1. opening; outlet
  2. to misunderstand; to misjudge
  3. to wound; to cut
  4. to rush; to plunge
  5. vast; huge
  6. thorough; all inclusive
  7. daze; stupor
  8. mortgage; security
  9. counterfeit; false
  10. to expel; to remove
  11. to beg; to plead
Down
  1. to snuff out; to smother
  2. sad; sorry
  3. to glorify; to elevate
  4. to sit on the fence; to hem and haw
  5. friendly; neighborly
  6. story; narration
  7. facts; statistics
  8. protected; safe
  9. renovation; repair

20 Clues: sad; sorryvast; hugedaze; stuporopening; outletprotected; safeto wound; to cutstory; narrationto beg; to pleadfacts; statisticsto rush; to plungemortgage; securitycounterfeit; falserenovation; repairto expel; to removefriendly; neighborlyto glorify; to elevatethorough; all inclusiveto snuff out; to smotherto misunderstand; to misjudge...

#OnlyGoneandDennett 2023-07-27

#OnlyGoneandDennett crossword puzzle
Across
  1. Location of hen do
  2. Honeymoon locale
  3. Mr & Mrs _______
  4. Month Andrew proposed
  5. Grooms football team
  6. Wedding venue
  7. Maid of honour
  8. Best Man
  9. Bridesmaid
Down
  1. Brides football team
  2. Nickname for each other
  3. Location of stag do
  4. First dance song
  5. Furthest place someone has travelled from today
  6. Brides middle name
  7. Number of bridesmaids
  8. Colour of bridesmaid dresses
  9. Usher #2
  10. Ring security
  11. Grooms middle name
  12. Usher #1

21 Clues: Usher #2Usher #1Best ManBridesmaidRing securityWedding venueMaid of honourFirst dance songHoneymoon localeMr & Mrs _______Location of hen doBrides middle nameGrooms middle nameLocation of stag doBrides football teamGrooms football teamNumber of bridesmaidsMonth Andrew proposedNickname for each otherColour of bridesmaid dresses...

TTS 5 MATERI_CICI EGI FEBIANI_XE_05 2025-04-15

TTS 5 MATERI_CICI EGI FEBIANI_XE_05 crossword puzzle
Across
  1. sebarkan konten
  2. kata kunci utama
  3. gabungkan pencarian
  4. ketik dokumen
  5. analisis data
  6. fungsi jumlah
  7. singkatan dari Hak Atas Kekayaan Intelektual
  8. pembuat program
  9. buat presentasi
  10. hitung angka
  11. menjaga keamanan
  12. video online
  13. hasil pencarian kata
  14. lindungi temuan
Down
  1. hak cipta
  2. nilai budaya
  3. atur sistem
  4. pembuat website
  5. buat tabel
  6. lindungi merek
  7. lindungi karya
  8. cari informasi online
  9. membuat konten
  10. media online
  11. kecualikan kata

25 Clues: hak ciptabuat tabelatur sistemnilai budayahitung angkamedia onlinevideo onlineketik dokumenanalisis datafungsi jumlahlindungi mereklindungi karyamembuat kontensebarkan kontenpembuat websitepembuat programbuat presentasikecualikan katalindungi temuankata kunci utamamenjaga keamanangabungkan pencarianhasil pencarian katacari informasi online...

IEEE Data Privacy Day 2015-01-27

IEEE Data Privacy Day crossword puzzle
Across
  1. Unauthorized access, collection, use, disclosure or disposal of personal information is called a privacy ___.
  2. Tricking people into revealing their account details, specifically done online.
  3. The process of transformation of data into an unrecognizable form, using some specific set of rules.
  4. The process of specifying access rights to data resources.
  5. A value needed to both encrypt and decrypt data.
  6. Stored data about physical characteristics of users, often used to verify identities.
  7. To ___ your Facebook account, it must first be deactivated.
  8. A service that, when connected to, replaces all your traffic's IP address with its own.
  9. Wrapping your credit cards with this prevents them from being scanned without your knowledge.
  10. A method or tool hidden in some system that allows undetected bypassing of security measures and access to the system.
  11. Physical copies of confidential data are problematic in regards to ___.
  12. Personal data relevant to ethnicity, religion, political belief, sexual preference, etc. is called ___ data.
  13. For your personal data to be legally used by others, you must provide ___.
  14. Ensuring the security of a system involves penetration ___.
Down
  1. The process of requesting access to a protected data resource by proving your identity.
  2. A system whose security is open for exploitation is said to be ___.
  3. Software that can be installed on your system without your knowledge and used to gather information on you.
  4. Automatic embedding of location data when you take photos.
  5. The science that includes cryptography and cryptanalysis.
  6. This feature of Facebook, introduced as an overhaul of the "wall" in 2011, came under criticism for violating user privacy.
  7. Hackers could compromise a private database using a type of attack called SQL ___.
  8. Taking unauthorized control of a connection that someone else has established (Think planes).
  9. A ___ signature identifies the sender of some data and verifies that the data has not changed during transmission.
  10. A file that keeps a records of activities performed on a system.
  11. Manipulating people into revealing confidential information is called ___ engineering.

25 Clues: A value needed to both encrypt and decrypt data.The science that includes cryptography and cryptanalysis.Automatic embedding of location data when you take photos.The process of specifying access rights to data resources.To ___ your Facebook account, it must first be deactivated.Ensuring the security of a system involves penetration ___....

Cybersecurity Terms 2022-11-22

Cybersecurity Terms crossword puzzle
Across
  1. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  2. Software that is a cumulative package of all patches and feature updates.
  3. Malware that prevents a user's device from properly operating until a fee is paid.
  4. An attacker who controls a botnet.
  5. An infected computer that is under the remote control of an attacker.
  6. Computer code that lies dormant until it is triggered by a specific logical event.
  7. Software that helps prevent computers from becoming infected by different types of spyware.
  8. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  9. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  10. A publicly released software security update intended to repair a vulnerability.
  11. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
Down
  1. A logical computer network of zombies under the control of an attacker.
  2. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. Hardware or software designed to limit the spread of malware.
  4. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  5. Software code that gives access to a program or a service that circumvents normal security protections.
  6. An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  7. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  8. A general term used to describe software that spies on users by gathering information without consent.
  9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

20 Clues: An attacker who controls a botnet.Hardware or software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.A logical computer network of zombies under the control of an attacker.Software that is a cumulative package of all patches and feature updates....

Economies Crossword 2022-10-04

Economies Crossword crossword puzzle
Across
  1. retirement savings plans that serve employees of public schools and tax-exempt organizations
  2. a financial institution that is licensed to accept checking and savings deposits and make loans
  3. a number from 300 to 850 that rates a consumer’s creditworthniess
  4. a consistent means of measuring the value of things
  5. a savings product that earns interest on a lump sum for a fixed period of time.
  6. Every purchase you made over time.
  7. an intermediary instrument or system used to facilitate the sale, purchase, or trade of goods between parties.
  8. type of financial cooperative that provides traditional banking services.
  9. is a risk management strategy that mixes a wide variety of investments within a portfolio.
  10. a security that represents the ownership of a fraction of the issuing corporation.
  11. a financial vehicle that pools assets from shareholders to invest in securities like stocks, bonds, money market instruments, and other assets.
Down
  1. a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
  2. a state-sponsored investment plan that enables you to save money for a beneficiary and pay for education expenses.
  3. a retirement savings and investing plan that employers offer.
  4. an interest-bearing deposit account held at a bank or other financial institution.
  5. grant loans where borrowers can use their vehicle title as. collateral or as security for repayment.
  6. a debt security, similar to an IOU.
  7. A store of value is an asset, commodity, or currency that maintains its value without depreciating.
  8. is a detailed breakdown of your credit history prepared by a credit bureau.
  9. a type of tax-advantaged
  10. a savings account that holds a fixed amount of money for a fixed period of time, such as six months, one year, or five years, and in exchange, the issuing bank pays interest.

21 Clues: a type of tax-advantagedEvery purchase you made over time.a debt security, similar to an IOU.a consistent means of measuring the value of thingsa retirement savings and investing plan that employers offer.a number from 300 to 850 that rates a consumer’s creditworthniesstype of financial cooperative that provides traditional banking services....

Life Planning Ch. 26 & 27 2023-12-10

Life Planning Ch. 26 & 27 crossword puzzle
Across
  1. costs that are predictable and that recur regularly.
  2. an employers payroll monies are electronically transferred directly into their employees personal checking or savings accounts.
  3. to sign the back of a check in order to transfer it to another person or institution.
  4. the total income earned before deductions are made.
  5. the money received after Social Security income tax and other deductions have been taken from the paycheck.
  6. a rating based on how promptly a person pays his or her debts.
  7. sources or amounts of income that are not taxed.
  8. a card used to transfer money from your bank account to a stores account when making a purchase.
  9. use of future income for goods and services currently received.
Down
  1. a nonprofit financial institution owned by and operated for the benefit of its members.
  2. a plan for managing income and expenses.
  3. a type of credit in which the buyer is allowed to make purchases up to a specified amount paying a percentage of the balance each month plus carrying charges to keep the account revolving.
  4. money subtracted from a person’s wages for such items as income tax and Social Security.
  5. security for a loan.
  6. and account to which taxpayers may make annual contributions up to a set amount. Taxes may or may not be paid on the contributions but interest earnings are not taxed until the money is withdrawn.
  7. an order for a specific amount of money payable to a specific payee.
  8. costs that fluctuate in amount and may occur less regularly.
  9. a specified annual percentage of the amount of money in a savings program. A charge made for using borrowed money.
  10. the dollar amount the use of credit will cost consisting primarily of interest payments.
  11. convenient computerized machines that facilitate banking transactions at numerous locations 24 hours a day.

20 Clues: security for a loan.a plan for managing income and expenses.sources or amounts of income that are not taxed.the total income earned before deductions are made.costs that are predictable and that recur regularly.costs that fluctuate in amount and may occur less regularly.a rating based on how promptly a person pays his or her debts....

CIS 1102N 2023-11-15

CIS 1102N crossword puzzle
Across
  1. Essential pieces of software that allow hardware to communicate with the operating system
  2. Tools used for compressing and decompressing files
  3. Tools used for copying and restoring data
  4. It retrieves information from other parts of the web and displays it
  5. security device that monitors and filters incoming and outgoing network traffic
  6. A program that assists in locating and removing unnecessary files
  7. known as clients, over a network
  8. Programs designed to assist with system maintenance tasks
  9. A type of software that enables communication between the user and the computer
  10. A type of application used for managing and analyzing data
  11. A type of utility that rearranges fragmented data on a disk for improved performance
  12. A type of application used for creating and editing images
  13. Software that performs a specific task
  14. Types of these include system and application
Down
  1. program that allows communication and file sharing over a network
  2. software used to create/edit/view a spreadsheet
  3. establishes a digital connection between your computer and a remote server owned
  4. Software used for protecting a computer system from unauthorized access
  5. Applications designed to enhance and streamline the user's web browsing experience
  6. Ensures the computer's security against malicious software
  7. A set of instructions that tell a computer how to perform specific tasks
  8. primarily used for creating, editing, and formatting documents.
  9. computer program that can capture, display and manipulate data arranged in rows and columns
  10. Software that enables users to create, edit, and format documents
  11. A type of software that allows you to create and edit images
  12. Programs that control and manage hardware
  13. Software that allows users to create, edit, and manage visual presentations
  14. Programs designed to enhance the performance of a computer
  15. A type of system software that manages computer hardware and software resources
  16. used to convert sound waves into electrical waves or to input sound into computers

30 Clues: known as clients, over a networkSoftware that performs a specific taskTools used for copying and restoring dataPrograms that control and manage hardwareTypes of these include system and applicationsoftware used to create/edit/view a spreadsheetTools used for compressing and decompressing files...

IS1 NetSec Newsletter Crossword Challenge #3 - AWS Virtual Private Cloud 2023-10-13

IS1 NetSec Newsletter Crossword Challenge #3 - AWS Virtual Private Cloud crossword puzzle
Across
  1. For IPv6, it lets traffic leave your VPC (6+4+8+7)
  2. Exposed to the web, it's where your front-end might be (6+6)
  3. It converts private IPs to public ones (7+7+11)
  4. Define what's allowed inwards, in a security group (7+5)
  5. Records network traffic, for analysis and security (4+4)
  6. Monitoring your traffic, without disruption, for security purposes (7+9)
  7. This particular VPC API helps you revert the prefix list from the past (31)
  8. A fixed cloud address that's scarce, assigned to an instance (7+2)
  9. Rules of entry, the guards of your EC2 instances (8+5)
  10. A secluded space, no direct internet connection (7+6)
  11. Hub and spoke architecture for VPCs, a central traffic director (7+7)
  12. Anonymizing traffic, it hides your private instances (3+7)
  13. This particular service helps share VPCs between AWS accounts (8+6+7)
  14. Sharing routes between route tables (5+11)
Down
  1. Linking VPCs, cross-region or same, it connects (7+10)
  2. Like a firewall, it guards your VPC's pathways (7+3)
  3. For site-to-site VPNs, your on-premises entry (8+7)
  4. A dedicated line, bypassing the internet (6+7)
  5. In the heart of the cloud, this point is discreet. Helps securely connect to AWS services without any public access (3+8)
  6. A portal to the web, your VPC's connection (8+7)
  7. Defines your IP range, in the cloud's addressing (4+5)
  8. Keep track of IP allocation, no confusion (7+7+5)
  9. A virtual network card, it helps connect your instances together (7+7+9)
  10. Your cloud within a cloud, for isolation purposes (7+7+5)
  11. Guides traffic in the VPC, like street signs in the cloud (5+5)
  12. For organizing your IPs efficiently, it's the solution (4)
  13. A division of your VPC network, like a neighborhood in the cloud (6)

27 Clues: Sharing routes between route tables (5+11)A dedicated line, bypassing the internet (6+7)It converts private IPs to public ones (7+7+11)A portal to the web, your VPC's connection (8+7)Keep track of IP allocation, no confusion (7+7+5)For IPv6, it lets traffic leave your VPC (6+4+8+7)For site-to-site VPNs, your on-premises entry (8+7)...

Semester 2 Financial Aid VOCAB. 2024-05-11

Semester 2 Financial Aid VOCAB. crossword puzzle
Across
  1. credits credits that you earn when you work and pay social security taxes
  2. of Deposit a certificate that states you have a specific sum on deposit and guarantees the payment of a fixed interest rate until Maturity
  3. "average percentage yield" is an annual rate of interest that takes into account the effect of compounding
  4. also known as the balance, is the amount of money in a bank account
  5. 4 times per year
  6. the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
  7. to continue to work at a part-time job, out of choice or necessity
  8. when money is not taxed upon earnings but is taxed when it is withdrawn later in life
  9. every day
Down
  1. interest is compounded once a year
  2. individual retirement account
  3. interest money earned on money deposited plus previous interest
  4. interest Only the original principal is added to the account
  5. security provides income for people after they retire, pays benefits to disabled workers pays death benefits to serving family members
  6. investment this is money that is deducted from your income after taxes have been deducted
  7. Federal insurance contributions act.-social security and medicare taxes
  8. investment a deposit made to a retirement account that is taken out of your wages before taxes have been calculated and deducted
  9. exempt money that is free from taxes
  10. twice a year
  11. rate the proportion of the balance that will be paid by the bank
  12. the date when a bond's principal is repaid with interest
  13. the point in a person's life when they stop working
  14. retirement age if you were born 1943- 1954, 66 is the full retirement age. For anyone born in 1960 or later, the full retirement age is 67.

23 Clues: every daytwice a year4 times per yearindividual retirement accountinterest is compounded once a yearthe point in a person's life when they stop workingexempt money that is free from taxesthe date when a bond's principal is repaid with interestto continue to work at a part-time job, out of choice or necessity...

Taxes Terms 2025-09-24

Taxes Terms crossword puzzle
Across
  1. U.S Federal agency responsible for administering and enforcing the nation's tax laws.
  2. A qualifying child or relative who relies on you for financial support.
  3. A mandatory payment or charge collected by the government.
  4. The value of an asset for tax purposes.
  5. A tax on specific goods,services, or activities.
  6. All income you receive during the year, including wages, interest, dividends, and other earnings.
  7. The total income generated by a company or government from its primary business activities.
  8. Type of tax that increases as the taxable amount increases.
  9. Type of government that collects the majority of taxes and funds national services like defense, Social Security, and Medicare.
  10. Taxes taken out of an employee's paycheck by the employer to pay their income and payroll taxes.
  11. Type of tax that takes the same percentage of income from all taxpayers.
  12. A tax paid by employers and employees to fund Social Security and Medicare.
  13. A locally assessed levy on real estate and sometimes personal property.
Down
  1. A tax paid by the consumer when they purchase goods and services.
  2. A tax imposed by a government directly on your income.
  3. Type of government that collects taxes to fund their own services, such as education, transportation, and public safety.
  4. A tax on the transfer of money or property to another person.
  5. A reimbursement from the government to a taxpayer who has overpaid their taxes throughout the year.
  6. A nine-digit number assigned by the IRS to identify a business entity.
  7. The illegal practice of not paying taxes you legally owe.
  8. A federal payroll tax payable by both employees and employers to fund Social Security and Medicare.
  9. A tax levied by a government on imported goods.
  10. Type of tax that is applied uniformly,regardless of income level.
  11. A tax on the profits of a corporation.
  12. Governments such as counties, cities, and special districts, collect revenue to fund community services.
  13. The ranges of taxable income.

26 Clues: The ranges of taxable income.A tax on the profits of a corporation.The value of an asset for tax purposes.A tax levied by a government on imported goods.A tax on specific goods,services, or activities.A tax imposed by a government directly on your income.The illegal practice of not paying taxes you legally owe....

RU ITEC411 2025-10-11

RU ITEC411 crossword puzzle
Across
  1. - What is it called when the bug that was found in OpenSSL in 2012 was exploited
  2. - The ______ horse was a software application that is believed to be safe but has other intended functions
  3. - The secondary measure when identifying malware looks at virus-like _______
  4. - What part of security it used to verify the identity of a user, device or entity
  5. - This was an example of a popular worm in 2008
  6. - A specific hack known as, the ________ worm, in 1988 coined the term for internet hacking
  7. - The phrase ________ theft is coined as doing a malicious act and consuming the identification of another person
  8. - A manipulation technique that allows for the release of information for credible gain is what type of _________ engineering
  9. - In vintage age, hackers were known as ____________ programmers
  10. - A lot of people are offered payment for encrypted files on a computer
Down
  1. - What cyberattack was carried out by U.S. and Israel to damage centrifuges in Iran
  2. - What type of testing is usually used for checking for security flaws or bugs within programs or systems
  3. - This company was hacked from a phishing attempt where the hacker elevated privileges and gained access to 40 million credit card numbers
  4. - This type of hack only works if a person opens an infected program or infected attachment
  5. - What form of technology is now available to look at the biological characteristics of an individual for authentication
  6. - The term that has been evolved to individuals who break into systems for either financial gains or to discover vulnerabilities
  7. - The phrase also known as political hacking
  8. - A software that is mainly used to search for malware on your computer
  9. - What triad is very popular in Cybersecurity and it helps to prevent unauthorized access to different systems
  10. - A method/security tool to keep data at rest and in transit safe

20 Clues: - The phrase also known as political hacking- This was an example of a popular worm in 2008- In vintage age, hackers were known as ____________ programmers- A method/security tool to keep data at rest and in transit safe- A software that is mainly used to search for malware on your computer...

Chapter 2 Crossword Puzzle 2025-11-14

Chapter 2 Crossword Puzzle crossword puzzle
Across
  1. The government began issuing gold and silver ___ in 1863
  2. The Federal Government issued ___ backs as legal tender
  3. Is the official currency in the U.S.
  4. Under the National Banking ___, notes could only be printed by the treasury
  5. You can maintain ___ by controlling risks in the financial market
  6. ___ deposit is a type of EFT transaction
  7. Paper money is produced in the U.S. by the U.S.
  8. The founder of the second bank of the U.S.
  9. Banks Chartered and supervised by OCC with national currency
  10. Anything of value that is accepted in return for goods and services
  11. Monetary ___ is the Mechanism a nation uses to provide and manage money
  12. Putting money aside for when you need it
  13. A Treasury ___ is a security that pays interest from 2 to 10 years
  14. Taking Measures to make money grow
  15. The Federal Reserve is responsible of the ___ System
  16. A Treasury ___ is a security that pays interest in a year or less
Down
  1. The Federal ___ Insurance Corporation regulates business
  2. Is the extra money you have to pay back on loans over time
  3. Ownership of this was illegal until 1974
  4. During the free banking era, anyone could open a
  5. financial investment issued by a corporation or a government
  6. In 1971, Nixon closed the gold ___
  7. The founder of the first bank of the U.S.
  8. Securities ___ is a financial institution that is involved in trading securities
  9. Coins are produced in the U.S. by the U.S.
  10. Can be in the form of money or coins
  11. Paper money is referred to as a
  12. The Federal Reserve is divided into ___ districts
  13. Banks controlled by State Regulatory authorities
  14. Financial ___ is any organization that provides services for money
  15. The Federal Reserve System is the ___ bank of the U.S.
  16. The Federal Reserve ___ financial institutions

32 Clues: Paper money is referred to as aIn 1971, Nixon closed the gold ___Taking Measures to make money growIs the official currency in the U.S.Can be in the form of money or coinsOwnership of this was illegal until 1974___ deposit is a type of EFT transactionPutting money aside for when you need itThe founder of the first bank of the U.S....

Beveiliging 2019-06-06

Beveiliging crossword puzzle
Across
  1. algemeen opsporingsambtenaar
  2. Nationaal Coördinator Terrorismebestrijding en Veiligheid
  3. akoestisch signaal
  4. centrale waar inbraakmeldingen binnen komen
  5. veiligheid
  6. beveiligingswerkzaamheden uitvoeren met een hond
  7. een terroristische aanslag in NL is voorstelbaar
  8. parkeercontroleur
  9. voorkomen
Down
  1. beveiliging
  2. optisch signaal
  3. een persoon of object voortdurend in de gaten houden
  4. betrouwbaar
  5. hospitality
  6. beteugelen
  7. Algemene inlichtingen en veiligheidsdienst

16 Clues: voorkomenbeteugelenveiligheidbeveiligingbetrouwbaarhospitalityoptisch signaalparkeercontroleurakoestisch signaalalgemeen opsporingsambtenaarAlgemene inlichtingen en veiligheidsdienstcentrale waar inbraakmeldingen binnen komenbeveiligingswerkzaamheden uitvoeren met een hondeen terroristische aanslag in NL is voorstelbaar...

Glossary Terms 2024-05-03

Glossary Terms crossword puzzle
Across
  1. unequal
  2. measurement value
  3. suitable living
  4. help
  5. scarcity lack of, deficiency
  6. measure of achievement
  7. number, people
Down
  1. growth
  2. good or bad standard
  3. Variation differeUrbanization n towns, cities
  4. reliable access to food
  5. travels
  6. eg: Australia, Canada, Japan
  7. eg: Afghanistan, Bangladesh, Anogola
  8. surroundings, earth, conditions
  9. reason for extreme hunger

16 Clues: helpgrowthunequaltravelsnumber, peoplesuitable livingmeasurement valuegood or bad standardmeasure of achievementreliable access to foodreason for extreme hungereg: Australia, Canada, Japanscarcity lack of, deficiencysurroundings, earth, conditionseg: Afghanistan, Bangladesh, AnogolaVariation differeUrbanization n towns, cities

Network 2025-05-05

Network crossword puzzle
Across
  1. - network
  2. - Where u live
  3. - private network to send things securely
  4. - a centralised technology unit where data is stored
  5. - a person
  6. - a document
  7. - where ships dock
  8. - Local Area network
  9. -
  10. - a network security wall
Down
  1. - server oversee
  2. - student portal
  3. - Internet Protocol!!!
  4. - a secured way of converting data
  5. - It’s pretty obvious
  6. - network speed

16 Clues: -- network- a person- a document- Where u live- network speed- server oversee- student portal- where ships dock- Local Area network- It’s pretty obvious- Internet Protocol!!!- a network security wall- a secured way of converting data- private network to send things securely- a centralised technology unit where data is stored

6th Grade - Virtual Bee Challenge 2020-06-03

6th Grade - Virtual Bee Challenge crossword puzzle
Across
  1. претпазливост/kujdes/dikkat
  2. се врти/rrotullohem/dönmek
  3. хор/kor/koro
  4. загадувањето/ndotje/kirlilik
  5. бојкотот/boykotim/boykot
  6. гуштер/hardhucë/kertenkele
  7. слика/foto/resim
  8. патник/pasagjer/yolcu
Down
  1. ножеви/thika/biçaklar
  2. крокодил/krokodil/timsah
  3. благородна/fisnik/asil
  4. науката/shkencë/bilim
  5. подели/përçaj/bölmek
  6. теорија/teori/teori
  7. безбедност/siguri/güvenlik

15 Clues: хор/kor/koroслика/foto/resimтеорија/teori/teoriподели/përçaj/bölmekножеви/thika/biçaklarнауката/shkencë/bilimпатник/pasagjer/yolcuблагородна/fisnik/asilкрокодил/krokodil/timsahбојкотот/boykotim/boykotсе врти/rrotullohem/dönmekгуштер/hardhucë/kertenkeleбезбедност/siguri/güvenlikпретпазливост/kujdes/dikkatзагадувањето/ndotje/kirlilik

Networking Terms 2023-11-27

Networking Terms crossword puzzle
Across
  1. Main device ID protocol.
  2. Data unit in transit.
  3. Local network connector.
  4. Web address system.
  5. Network connection point.
  6. Network participant.
  7. Data path between devices.
  8. Local network.
Down
  1. Expanded device ID protocol.
  2. Data transfer capacity.
  3. Interconnected devices.
  4. Network security monitor.
  5. Broad network.
  6. Network traffic director.
  7. Central network connection point.

15 Clues: Broad network.Local network.Web address system.Network participant.Data unit in transit.Data transfer capacity.Interconnected devices.Main device ID protocol.Local network connector.Network security monitor.Network traffic director.Network connection point.Data path between devices.Expanded device ID protocol.Central network connection point.

Unit 8 Irie 2024-05-08

Unit 8 Irie crossword puzzle
Across
  1. _______ conservation corps
  2. An insect that infests crops
  3. Eugene _______
  4. The bombing of __________
  5. ________ of 1924
  6. Social _____ administration
  7. a cause of the great depression.
Down
  1. Overproduction in ____________
  2. a way to protect america during the war, but help allies
  3. _____ ships
  4. ______ in purchasing
  5. _____ market crash of 1929
  6. ____ Vinson
  7. _____ Russel
  8. _____ electrification Administration

15 Clues: _____ ships____ Vinson_____ RusselEugene _______________ of 1924______ in purchasingThe bombing of _________________ conservation corps_____ market crash of 1929Social _____ administrationAn insect that infests cropsOverproduction in ____________a cause of the great depression._____ electrification Administration...

CAPTAIN AMERICA: THE WINTER SOLDIER (2014) 2023-04-06

CAPTAIN AMERICA: THE WINTER SOLDIER (2014) crossword puzzle
Across
  1. Is declared dead
  2. Project Fury is heading
  3. Head of counterterrorism unit
  4. Bad guy defrosted
  5. Is alive
  6. SHIELD headquarters
Down
  1. Evil terrorist organization
  2. River Cap falls in
  3. Pararescueman
  4. Cap's Avenger helper
  5. SHIELD's counterterrorism unit
  6. Fury's right hand woman
  7. Secretary of Internal Security
  8. Brother directors
  9. Now a brain in a computer

15 Clues: Is alivePararescuemanIs declared deadBad guy defrostedBrother directorsRiver Cap falls inSHIELD headquartersCap's Avenger helperProject Fury is headingFury's right hand womanNow a brain in a computerEvil terrorist organizationHead of counterterrorism unitSHIELD's counterterrorism unitSecretary of Internal Security

Vocabulary at School 2024-11-04

Vocabulary at School crossword puzzle
Across
  1. Kegiatan tamasya edukasi ke luar sekolah untuk pembelajaran berdasarkan pengalaman
  2. Ruang kelas tempat belajar
  3. Penjaga keamanan
  4. Bapak/ Ibu yang mengajar di kelas
  5. Kamar kecil
  6. Kepala administrator sekolah, mengawasi operasi dan stafnya
  7. Upacara
  8. Sekolah asrama
Down
  1. pekerjaan rumah (PR)
  2. Ujian
  3. Asrama
  4. Tempat membaca dan meminjam buku
  5. Siswa/ pelajar
  6. Kantin
  7. Pustakawan

15 Clues: UjianAsramaKantinUpacaraPustakawanKamar kecilSiswa/ pelajarSekolah asramaPenjaga keamananpekerjaan rumah (PR)Ruang kelas tempat belajarTempat membaca dan meminjam bukuBapak/ Ibu yang mengajar di kelasKepala administrator sekolah, mengawasi operasi dan stafnyaKegiatan tamasya edukasi ke luar sekolah untuk pembelajaran berdasarkan pengalaman

TECH TUESDAY 10/7/25 2025-09-17

TECH TUESDAY 10/7/25 crossword puzzle
Across
  1. DETECTS MALICIOUS CODE
  2. BLOCKS UNAUTHORIZED ACCESS
  3. SECRETLY WATCHES YOU
  4. PREVENTS DATA LOSS
  5. BREAKS INTO SYSTEMS
  6. PHONE, LAPTOP, OR TABLET
  7. FAKE EMAIL SCAM
Down
  1. ANOTHER TERM FOR MFA
  2. USERNAME AND PASSWORD
  3. SECURE REMOTE CONNECTION
  4. KEEPS SOFTWARE SECURE
  5. DATA LEAK INCIDENT
  6. MALICIOUS SOFTWARE
  7. SCRAMBLES DATA FOR SECURITY
  8. NEVER SHARE IT

15 Clues: NEVER SHARE ITFAKE EMAIL SCAMDATA LEAK INCIDENTMALICIOUS SOFTWAREPREVENTS DATA LOSSBREAKS INTO SYSTEMSANOTHER TERM FOR MFASECRETLY WATCHES YOUUSERNAME AND PASSWORDKEEPS SOFTWARE SECUREDETECTS MALICIOUS CODESECURE REMOTE CONNECTIONPHONE, LAPTOP, OR TABLETBLOCKS UNAUTHORIZED ACCESSSCRAMBLES DATA FOR SECURITY

Jocie and Anna Vocab quiz #4 2025-11-21

Jocie and Anna Vocab quiz #4 crossword puzzle
Across
  1. Monday
  2. When someone spends their Saturday helping the homeless
  3. His _________ fame grew after his death.
  4. Loch Ness monster
  5. Parrot
  6. Scavengers
  7. The fly was ____.
  8. The security footage would _______ her story.
  9. Guilty Criminals
Down
  1. the chatter box
  2. Someone who never works out
  3. Unsettling
  4. The law is ______.
  5. Beware of the dog
  6. Lawyer

15 Clues: MondayLawyerParrotUnsettlingScavengersthe chatter boxGuilty CriminalsLoch Ness monsterBeware of the dogThe fly was ____.The law is ______.Someone who never works outHis _________ fame grew after his death.The security footage would _______ her story.When someone spends their Saturday helping the homeless

Ch. 1 Crossword 2024-08-30

Ch. 1 Crossword crossword puzzle
Across
  1. registered health info admin
  2. continues to develop
  3. Oncology
  4. paid for
  5. can get into
  6. procedure
Down
  1. security
  2. starting process
  3. now
  4. basis
  5. contains patient health info gathered from EMR's

11 Clues: nowbasissecurityOncologypaid forprocedurecan get intostarting processcontinues to developregistered health info admincontains patient health info gathered from EMR's

THE DIGITAL GRID 2024-12-07

THE DIGITAL GRID crossword puzzle
Across
  1. Billionth prefix
  2. Step-by-step process
  3. Smallest screen unit
  4. Programmer’s script
  5. Data's virtual home
  6. Internet speed measure
  7. Smart machine abbreviation
Down
  1. Access entry step
  2. Hidden data storage
  3. Automated program
  4. Network's security barrier
  5. Digital ledger technology
  6. Unmanned aerial gadget
  7. Fraudulent email scam

14 Clues: Billionth prefixAccess entry stepAutomated programHidden data storageProgrammer’s scriptData's virtual homeStep-by-step processSmallest screen unitFraudulent email scamUnmanned aerial gadgetInternet speed measureDigital ledger technologyNetwork's security barrierSmart machine abbreviation

Unit 4 Vocab 2020-10-19

Unit 4 Vocab crossword puzzle
Across
  1. The student was _________ when the teacher gave him a test.
  2. The policeman was very _______ when he pulled someone over to give them a ticket.
  3. The Airport security all ways checks bags for __________.
  4. The _______ student got valedictorian.
  5. The sound ____________ off the walls so i heard it multiple times.
  6. The security guard __________ the passport at the airport.
Down
  1. The Lawyer _____________ the sentence for the prisoner.
  2. Mrs. Malda Gives off a fun ____ because she is happy all the time.
  3. The insult was ___________ because it was really upsetting.
  4. The man ___________ the old house that needed some work.
  5. Lennie's _________ is innocent because he is always acting like he never did anything wrong.
  6. Letterkenny is a __________ TV show.
  7. Some of the students in math think that it is ___________.
  8. People who do triathlons are very _________ because the races are long.

14 Clues: Letterkenny is a __________ TV show.The _______ student got valedictorian.The Lawyer _____________ the sentence for the prisoner.The man ___________ the old house that needed some work.The Airport security all ways checks bags for __________.Some of the students in math think that it is ___________....

RU ITEC411 Crime and Security 2021-12-01

RU ITEC411 Crime and Security crossword puzzle
Across
  1. a piece of software that is designed to fix errors in preexisting software
  2. the use of hacking for a political cause
  3. fake websites that are used to steal personal information
  4. malware that encrypts files on a computer and then demands payment to decrypt the files
  5. biological characteristics that are unique to an individual
  6. this attack overloads a target site with requests for information
  7. malware that monitors and records a user's activity on their device
  8. software that allows future access to a device by bypassing the normal security checks
  9. devices attached to card readers that can collect card numbers and pins
Down
  1. flaws in a system that can be exploited
  2. fraudulent messages that impersonate people or organizations in order to steal the target's information
  3. a group of Internet connected devices infected with malware that communicates with a central host
  4. software that searches for and removes malware on a device
  5. a verbal statement that is false and damaging to one's reputation
  6. a program that copies itself to other computers
  7. malicious software
  8. intentional, unauthorized access to a computer system
  9. In the early days of computing, this would be a creative programmer who wrote clever or elegant code
  10. a written statement that is false and damaging to one's reputation
  11. deceiving users by faking data, usually to make a communication appear to be from a trusted source
  12. software that attaches itself to other software

21 Clues: malicious softwareflaws in a system that can be exploitedthe use of hacking for a political causea program that copies itself to other computerssoftware that attaches itself to other softwareintentional, unauthorized access to a computer systemfake websites that are used to steal personal information...

Topic 5.1 Food Security Vocabulary 2022-01-05

Topic 5.1 Food Security Vocabulary crossword puzzle
Across
  1. Organization of the United Nations (FAO) is a specialized agency of the United Nations that leads international efforts to defeat hunger. The goal is to achieve food security for all and make sure that people have regular access to enough high-quality food to lead active, healthy lives. With over 194 member states, FAO works in over 130 countries worldwide.
  2. comprises establishments primarily engaged in growing crops, raising animals, and harvesting fish and other animals from a farm, ranch, or their natural habitat. Agri-food includes agriculture, fisheries and aquaculture, and food and beverage processing.
  3. running out of food; experienced hunger; at the most extreme, having to go without food for a day or more.
  4. the condition associated with deficiencies, excesses or imbalances in the consumption of macro- and/or micronutrients. For example, undernutrition and obesity are both forms of malnutrition. Child stunting or wasting are both indicators for undernutrition.
  5. is the physical, chemical and biological decline in soil quality. It can be the loss of organic matter, decline in soil fertility, and structural condition, erosion, adverse changes in salinity, acidity or alkalinity, and the effects of toxic chemicals, pollutants or excessive flooding.
  6. an uncomfortable or painful sensation caused by insufficient energy from diet. Food deprivation; not eating enough calories. Used here interchangeably with (chronic) undernourishment. Measured by the prevalence of undernourishment (PoU).
  7. is water pollution that comes from a single, discrete place, typically a pipe.
  8. the science or practice of farming, including cultivation of the soil for the growing of crops and the rearing of animals to provide food, wool, and other products.
  9. The biologically inappropriate consumption of corn and soy by livestock (whose digestive/nutritional systems are not designed to eat those particular plants). Other methods include monoculture, use of pesticides and herbicides, conventional agriculture that uses tractors that use fossil fuels.
  10. refers to how the price of a commodity (or price relationship between multiple commodities) is determined by the market. It is essentially the link between pricing behavior and the underlying physical behavior that affects pricing. Supply and demand. More demand than supply than the higher price.
Down
  1. is the creation of manufactured products through economically-sound processes that minimize negative environmental impacts while conserving energy and natural resources. Sustainable manufacturing also enhances employee, community and product safety.
  2. a state of uncertainty about the ability to get food; a risk of skipping meals or seeing food run out; being forced to compromise on the nutritional quality and/or quantity of food consumed.
  3. a measurement of how far food has traveled before it reaches you. A good way of looking at the environmental impact of foods and their ingredients.
  4. - organisms that spread across national or. geographical (physical) boundaries, indicating that disease or pest events in one country may have direct effects or potential effects in another country).
  5. the quality or state of being of a similar kind or of having a uniform structure or composition throughout
  6. is a gradual process that occurs when the impact of water or wind detaches and removes soil particles, causing the soil to deteriorate.
  7. any fuel that is derived from biomass—that is, plant or algae material or animal waste. Since such feedstock material can be replenished readily, biofuel is considered to be a source of renewable energy, unlike fossil fuels such as petroleum, coal, and natural gas.
  8. The unconsolidated mineral or organic material on the immediate surface of the Earth that serves as a natural medium for the growth of land plants.
  9. is a nutty-flavored, starchy root vegetable or tuber. Native to South America, it’s a major source of calories and carbs for people in many countries. Nigeria, Thailand, and Indonesia are the top cassava-producing countries in the world.
  10. the large-scale, intensive production of crops and animals, often involving chemical fertilizers on crops or the routine, harmful use of antibiotics in animals (as a way to compensate for filthy conditions, even when the animals are not sick). It may also involve crops that are genetically modified, heavy use of pesticides, and other practices that deplete the land, mistreat animals, and increase various forms of pollution.
  11. refers to both water and air pollution from diffuse sources. Affects a water body from sources such as polluted runoff from agricultural areas draining into a river, or wind-borne debris blowing out to sea.
  12. Relating to soil, especially as it affects living organisms. Characteristics include such factors as water content, acidity, aeration, and the availability of nutrients.
  13. a renewable fuel made from corn and other plant materials
  14. is a natural substance that is not replenished with the speed at which it is consumed. It is a finite resource. Fossil fuels such as oil, natural gas, and coal are examples
  15. is the lack of sufficient available water resources to meet the demands of water usage within a region. Water scarcity involves water stress, water shortage or deficits, and water crisis.
  16. is the ability of soil to sustain plant growth and optimize crop yield. This can be enhanced through organic and inorganic fertilizers to the soil.

26 Clues: a renewable fuel made from corn and other plant materialsis water pollution that comes from a single, discrete place, typically a pipe.the quality or state of being of a similar kind or of having a uniform structure or composition throughoutrunning out of food; experienced hunger; at the most extreme, having to go without food for a day or more....

Law, Public Safety, & Security .......... Paramedic 2014-12-11

Law, Public Safety, & Security  ..........                        Paramedic crossword puzzle
Across
  1. technology will have a _____ effect on this job(+/-)
  2. paramedics work ____ and this is 24/7 365 days a year
  3. education needed to be paramedic, get after high school
  4. apply these to people that have suffered from injury, ____ mask
  5. "intravenous" paramedics apply these to injured people to sedate them
  6. education after high school, additional training to a specific career
  7. perform this on someone that has stopped breathing, cardiopulmonary resuscitation
  8. use this when driving, paramedic vehicle
  9. involved in working with, communicating with, and teaching people
Down
  1. paramedics use this to set broken bones and secure it
  2. paramedics must show this and lead others to save lives
  3. amount of pay earned when you have 10+ years working, $68,930
  4. the job ____ is +26.73% in the next 6 years
  5. amount earned between 1-5 years of working $41,130
  6. area that they work in, in ambulance(before they reach emergency care)
  7. paramedics must keep this, not break down and cry, faint because of blood
  8. paramedics need to ___ to an accident and provide aid
  9. must have many of this, examples are paramedic and EMT basic
  10. need to be educated in this subject very well, involves plant and animal organisms, their tissues, cells, and functions
  11. amount earned when first starting $26,030

20 Clues: use this when driving, paramedic vehicleamount earned when first starting $26,030the job ____ is +26.73% in the next 6 yearsamount earned between 1-5 years of working $41,130technology will have a _____ effect on this job(+/-)paramedics use this to set broken bones and secure itparamedics work ____ and this is 24/7 365 days a year...

RU ITEC411 Crime and Security 2023-10-15

RU ITEC411 Crime and Security crossword puzzle
Across
  1. Deceptive computer program that appears to be legit.
  2. Ensures that only authorized users can access certain data or resources while maintaining privacy, and preventing data breaches.
  3. Manipulation of individuals into divulging confidential information.
  4. A network of computers used to perform malicious activities.
  5. A weakness in a computer system, or network that can be exploited.
  6. Type of attack where attackers overwhelm a target system or network.
  7. Redirecting legitimate website traffic to fake websites without the user's knowledge.
  8. Type of malware that holds a user's files hostage and demands something in return.
  9. A hidden entry point into a computer system, usually created by the developer.
  10. A malicious software program that self-replicates without human intervention.
Down
  1. A company that provides users with access to the internet.
  2. Authorized users can access information or services whenever needed.
  3. Using hacking to promote a political cause.
  4. Disguising communication from an unknown source.For example, forging senders email address.
  5. Requires users to provide multiple forms of identification before gaining access to a system.
  6. Process of converting plaintext data into ciphertext to secure from unauthorized access.
  7. The assurance that data remains accurate, consistent, and unaltered.
  8. A malicious software program that replicates itself with human intervention.
  9. Attackers impersonate trustworthy entities, usually through emails.
  10. Malicious software that secretly monitors a user's activity.

20 Clues: Using hacking to promote a political cause.Deceptive computer program that appears to be legit.A company that provides users with access to the internet.A network of computers used to perform malicious activities.Malicious software that secretly monitors a user's activity.A weakness in a computer system, or network that can be exploited....

RU ITEC411 Crime and Security 2023-11-30

RU ITEC411 Crime and Security crossword puzzle
Across
  1. a space in which computers communicate
  2. wrongdoing for financial gain
  3. program that produces duplicates of itself on other computers
  4. something that is fake or fraudulent
  5. person who gets access to a computer for political or social ends
  6. the act of swaying people to a website to get personal information
  7. software that damages or gains unauthorized access to another computer
  8. attack over an email trying to gain sensitive information
  9. software to gain access to a computer in a nontraditional way
  10. large number of messages sent over the internet
Down
  1. communicating on a distance through cable or broadcasting system
  2. a virus attack with a multipart worm that traveled on a USB stick that was carried out by the US and Isreal
  3. a number of computers that have a virus or malware that communicates to a host
  4. attack over text message trying to gain personal information
  5. a type of software that adheres itself to other software
  6. an attack by a hacker to damage a computer network
  7. encrypted malware that displays a message wanting payment for the key to gain the personal information back from the user
  8. malware that can watch and record a users activities on a computer
  9. breaking into something you do not have access to
  10. is shown as a not-bad application but then carries a bad component

20 Clues: wrongdoing for financial gainsomething that is fake or fraudulenta space in which computers communicatelarge number of messages sent over the internetbreaking into something you do not have access toan attack by a hacker to damage a computer networka type of software that adheres itself to other software...

RU ITEC411-Crime and Security 2022-10-16

RU ITEC411-Crime and Security crossword puzzle
Across
  1. gaining unauthorized access to data in a system or computer
  2. software that allow future access to a computer system by bypassing the normal layers of security.
  3. can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
  4. biological characteristics unique to an individual
  5. criminal activity that involves the use of a computer r a network
  6. person that uses their technical knowledge to break into a computer system or network by no standard means.
  7. irrelevant or inappropriate messages sent in bulk to recepients
  8. malware that can monitor or record victim's activities on a computer or mobile phone
  9. group of internet connected devices each of which runs one or more bots.
  10. use of computers or computer network techniques such as hacking to promote political agenda
  11. the assurance that private data will remain private
Down
  1. sending fraudulent text messages on purpose appearing to come from reputable and legit companies
  2. the assurance that data will not change without authorization
  3. malware that blocks access to data or threatens to publish it unless a ransom is paid.
  4. recording devices inside credit card readers to collect credit card numbers and PINs.
  5. converting information into secret code that hides the meaning of the information
  6. protection of computer systems and networks from information theft or hardware damage.
  7. the way in which thieves collect personal data by luring the victims to fake websites
  8. sending deceiving emails in order to obtain sensitive personal information from the victim
  9. malicious computer worm that targets a specific type of control system
  10. software designed intentionally to be intrusive and destructive to a computer or network
  11. software that attaches itself to other software and spreads when someone runs an infected program.

22 Clues: biological characteristics unique to an individualthe assurance that private data will remain privategaining unauthorized access to data in a system or computerthe assurance that data will not change without authorizationirrelevant or inappropriate messages sent in bulk to recepientscriminal activity that involves the use of a computer r a network...

RU ITEC411 - Crime and Security 2022-10-16

RU ITEC411 - Crime and Security crossword puzzle
Across
  1. embedded devices connected to the internet
  2. Malicious software designed to look like something else
  3. Luring people to fraudulent websites
  4. Function used to encode information
  5. Malicious software that monitors user activity
  6. Hacking to promote a political agenda
  7. Fraudulent spam
  8. 1980's Law that governs unauthorized access
  9. Unique biological characteristics
  10. Malicious software that exploits vulnerabilities
Down
  1. A group of compromised devices
  2. Allows hackers a future way into a system
  3. Malicious software that encrypts files
  4. criminal deception or trickery
  5. Written defamation
  6. Breaking into gaining unauthorized access (era 2)
  7. Verbal defamation
  8. A creative programmer (era 1)
  9. Malicious software that attaches to programs
  10. Cyberattack designed to overwhelm services

20 Clues: Fraudulent spamVerbal defamationWritten defamationA creative programmer (era 1)A group of compromised devicescriminal deception or trickeryUnique biological characteristicsFunction used to encode informationLuring people to fraudulent websitesHacking to promote a political agendaMalicious software that encrypts files...

RU ITEC411 Crime and Security 2024-03-15

RU ITEC411 Crime and Security crossword puzzle
Across
  1. the first popular social media website
  2. unwanted communications
  3. the computers most people carry everyday
  4. They collect taxes
  5. breaking the law
  6. biggest search engine
  7. the business of crime
  8. becoming someone else
  9. computer fraud and abuse act
Down
  1. Helps in humanitarian crisis
  2. risking your money in betting
  3. the program the runs your computer
  4. unauthorized entry to a computer system
  5. the act of trying to scam passwords or sensitive information
  6. Social media site for jobs
  7. The office of personnel management
  8. law passed after 9/11
  9. someone who breaks the law
  10. one of the worst viruses in history
  11. written lies

20 Clues: written liesbreaking the lawThey collect taxesbiggest search enginelaw passed after 9/11the business of crimebecoming someone elseunwanted communicationsSocial media site for jobssomeone who breaks the lawHelps in humanitarian crisiscomputer fraud and abuse actrisking your money in bettingthe program the runs your computer...

Industrial Security Concept Crossword Puzzle 2025-10-13

Industrial Security Concept Crossword Puzzle crossword puzzle
Across
  1. - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
  2. - the monitoring of telephone conversation by a third party, often by covert means
  3. - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
  4. - used as a form of identification and access control
  5. - term used in England for lock picker, safecrackers, and penetrators of restricted areas
  6. - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
  7. - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
  8. - means to secretly listen to record a conversation using a hidden electronic device
  9. - a house like structures above the perimeter barrier
Down
  1. - indication of impending danger or harm
  2. - a metallic container used for safekeeping of documents or small items in office or installation
  3. - it is the communication channel that conveys the information from all sensors in the system
  4. - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
  5. - genuine key stolen from the owner
  6. - any information and material, the unauthorized disclosure of which would endanger national security
  7. - A chance of being injured or harmed
  8. - inability to withstand the effects of a hostile environment
  9. - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
  10. - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
  11. - is the potential that a chosen action will lead to a loss

20 Clues: - genuine key stolen from the owner- A chance of being injured or harmed- indication of impending danger or harm- used as a form of identification and access control- a house like structures above the perimeter barrier- is the potential that a chosen action will lead to a loss- inability to withstand the effects of a hostile environment...

la Crucigrama de viaja 2024-11-07

la Crucigrama de viaja crossword puzzle
Across
  1. to leave
  2. to go through security
  3. flight
  4. Suitcase
Down
  1. Gate
  2. Exit
  3. to travel
  4. Beach
  5. Ruins

9 Clues: GateExitBeachRuinsflightto leaveSuitcaseto travelto go through security

WORLD HERITAGE 2023-05-09

WORLD HERITAGE crossword puzzle
Across
  1. protection
  2. property
  3. security
  4. memorial structure
  5. man-made object
Down
  1. variety of species
  2. relating to ecology
  3. natural environment
  4. act of destroying
  5. rural scenery

10 Clues: propertysecurityprotectionrural sceneryman-made objectact of destroyingvariety of speciesmemorial structurerelating to ecologynatural environment

Public Service 2023-09-08

Public Service crossword puzzle
Across
  1. Pharmacist
  2. Navy Seal
  3. Teacher
  4. Early Learning Specialist
  5. Hairdresser or Barber
Down
  1. Healthcare Provider
  2. Mental Health Counselor
  3. Medical Researcher
  4. Nurse
  5. National Security Specialist

10 Clues: NurseTeacherNavy SealPharmacistMedical ResearcherHealthcare ProviderHairdresser or BarberMental Health CounselorEarly Learning SpecialistNational Security Specialist

NonFunctional Requirements 2016-04-28

NonFunctional Requirements crossword puzzle
Across
  1. Clue #2
  2. Clue #1
  3. Clue #4
  4. Clue #8
  5. Clue #6
Down
  1. Clue #9
  2. Clue #3
  3. Clue #7
  4. Clue #10
  5. Clue #5

10 Clues: Clue #2Clue #9Clue #3Clue #1Clue #7Clue #4Clue #5Clue #8Clue #6Clue #10

hunger and poverty 2021-01-17

hunger and poverty crossword puzzle
Across
  1. hunger is usually uncomfortable or _________.
  2. insecure not all ______ ______ people are hungry.
  3. people ________ to food insecurity are those who are able to maintain an acceptable level of food security today, but may be at risk of becoming food insecure in the future.
  4. Food insecurity: Hunger, Malnutrition, _______.
  5. Vulnerability ______ helps to design better good security responses.
  6. Increase the ability to ____.
Down
  1. Results from deficiencies, excess or imbalances in the consumption of Marco- and/or micro-nutrients.
  2. poverty is most often defined in terms of _____.
  3. deprivation Scientifically, hunger is referred to as ____ _________.
  4. all ____ people are food insecure.
  5. reduce the degree of expose to the _____.
  6. food insecure and ____ are deeply interrelated phenomena.

12 Clues: Increase the ability to ____.all ____ people are food insecure.reduce the degree of expose to the _____.hunger is usually uncomfortable or _________.Food insecurity: Hunger, Malnutrition, _______.poverty is most often defined in terms of _____.insecure not all ______ ______ people are hungry.food insecure and ____ are deeply interrelated phenomena....

IFS 2022-07-30

IFS crossword puzzle
Across
  1. An asset but not security
  2. An asset as well as security
  3. a platform thatfacilitates the exchange of financial assets
  4. a system that mobilizes and usefully allocatesscarce resources of a country.
  5. An acknowledgement of Debt
  6. regulates the stock exchange business
Down
  1. Securities provided to the bank in exchange of loan
  2. a security that represents the ownership of a fraction of the issuing corporation.
  3. All financial assets are not _
  4. a promise by a borrower to pay a lender their principal and usually interest on a loan.
  5. minimum percentage of cash, gold, and other securities, before lending loans to customers

11 Clues: An asset but not securityAn acknowledgement of DebtAn asset as well as securityAll financial assets are not _regulates the stock exchange businessSecurities provided to the bank in exchange of loana platform thatfacilitates the exchange of financial assetsa system that mobilizes and usefully allocatesscarce resources of a country....

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. Tool currently used for onboarding
  2. Greek letter that denotes mean of a statistical distribution
  3. One of the focus areas of EHS
  4. In CDA, if the probability is more than 60%, which color is assigned?
  5. An R package that provides an elegant framework for building web apps using R
Down
  1. Tool used for Rewards and Recognitions
  2. Company wide EHS system of record
  3. Portal to view security emergency contact and other security info
  4. Which technology is used; searching from 41+ million tags?
  5. TCT Application access provisioning is done by?

10 Clues: One of the focus areas of EHSCompany wide EHS system of recordTool currently used for onboardingTool used for Rewards and RecognitionsTCT Application access provisioning is done by?Which technology is used; searching from 41+ million tags?Greek letter that denotes mean of a statistical distribution...

Master 2024-12-27

Master crossword puzzle
Across
  1. A network of infected computers controlled by a hacker.
  2. A string of text created from data for verification.
  3. An attack that floods a server with traffic to crash it.
  4. A deliberate effort to compromise a computer system.
  5. A security model where no one inside a network is trusted by default.
  6. A simulation of an attack to test security.
Down
  1. Investigating digital data to find evidence.
  2. A pathway used by attackers to exploit a vulnerability.
  3. Tools used to create fake emails for attacks.
  4. A deviation from normal behavior in system logs.

10 Clues: A simulation of an attack to test security.Investigating digital data to find evidence.Tools used to create fake emails for attacks.A deviation from normal behavior in system logs.A string of text created from data for verification.A deliberate effort to compromise a computer system.A network of infected computers controlled by a hacker....

Total Defence Day 2023 - Digital Defence (P1-P3) 2023-02-07

Total Defence Day 2023 - Digital Defence (P1-P3) crossword puzzle
Across
  1. Never ______________ One-Time Passwords(OTPs)to anyone.
  2. We should use 5 or ______________ words in our passwords.
  3. One-Time Passwords (OTPs).
Down
  1. We can use paraphrases as our _______________ e.g.saw Eagle At The Park.
  2. Cyber criminals will ask you for ______________ information like phone numbers, banking details
  3. We should ______________ the passphrases up with upper, lower case letters, numbers and symbols.

6 Clues: One-Time Passwords (OTPs).Never ______________ One-Time Passwords(OTPs)to anyone.We should use 5 or ______________ words in our passwords.We can use paraphrases as our _______________ e.g.saw Eagle At The Park.Cyber criminals will ask you for ______________ information like phone numbers, banking details...

Mod 5-3e Vulnerability Management 2023-08-30

Mod 5-3e Vulnerability Management crossword puzzle
Across
  1. describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system
  2. can also be used to to conduct a manual audit of information system security controls.
Down
  1. are updated and released during each SRG-STIG Update Release Cycle to capture all newly updated or released SRGs, STIGs, and Tools.
  2. designed to act as a comprehensive STIG compliance tool that provides security monitoring, DISA STIG-specific audit logs, and real-time security event monitoring.
  3. responsible for maintaining the security posture of the Department of Defense Information Network (DoDIN).
  4. an automated compliance scanning tool that leverages the STIGs and OS-specific baselines to analyze and report on the security configuration of an information system.

6 Clues: can also be used to to conduct a manual audit of information system security controls.responsible for maintaining the security posture of the Department of Defense Information Network (DoDIN).describes how to minimize network-based attacks and prevent system access when the attacker is interfacing with the system...

Jenis Profesi 2024-08-08

Jenis Profesi crossword puzzle
Across
  1. menguasai bahasa pemrograman dan terampil menggunakannya
  2. seseorang pembuat konten kreatif
  3. orang yang mengajar dan menyediakan pendidikan untuk orang lain
  4. seseorang yang meneliti informasi menggunakan alat analisis data
  5. berkaitan erat dengan penemuan-penemuan baru
  6. orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
  7. mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
  8. pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
  1. menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
  2. bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
  3. melindungi sistem, jaringan, serta data dari serangan cyber
  4. profesional di bidang kuliner
  5. membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
  6. ndividu yang mempunyai pengaruh besar di media sosial
  7. bertugas mengendalikan pesawat
  8. maha guru
  9. seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
  10. berkaitan erat dengan keamanan dan ketertiban negaranya

18 Clues: maha guruprofesional di bidang kulinerbertugas mengendalikan pesawatseseorang pembuat konten kreatifberkaitan erat dengan penemuan-penemuan barundividu yang mempunyai pengaruh besar di media sosialmenguasai bahasa pemrograman dan terampil menggunakannyaberkaitan erat dengan keamanan dan ketertiban negaranya...

Words 2023-05-10

Words crossword puzzle
Across
  1. to appeal
  2. to make sure
  3. very real
  4. to group
  5. choosy
  6. a creed
Down
  1. safety
  2. natural disaster
  3. what a baby does
  4. a pastry
  5. a word that describes a crazy person
  6. what a explorer does

12 Clues: safetychoosya creeda pastryto groupto appealvery realto make surenatural disasterwhat a baby doeswhat a explorer doesa word that describes a crazy person

bullying 2014-12-07

bullying crossword puzzle
Across
  1. A type of bullying that involves taunting and name calling
  2. The use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
  3. Child bullying has existed in ________ and schools for centuries
  4. _____ bullying is fairly new
  5. Statistics have shown bullying and _____ is becoming a huge problem
Down
  1. A type of bullying that involves using electronic means to harm others
  2. Two of the main reasons people are bullied are because of appearance and ________
  3. A type of bullying that involves hitting, punching, or kicking

8 Clues: _____ bullying is fairly newA type of bullying that involves taunting and name callingA type of bullying that involves hitting, punching, or kickingChild bullying has existed in ________ and schools for centuriesStatistics have shown bullying and _____ is becoming a huge problemA type of bullying that involves using electronic means to harm others...

December Q4 Security Training 2023-12-22

December Q4 Security Training crossword puzzle
Across
  1. When safe to do so, we should activate the ____ or/and observe the robber's escape route.
  2. Behavior to keep during a robbery is to ___ ___ and avoid sudden movements.
  3. Person responsible for shouting "I've been robbed, Lock the doors!"
  4. To preserve evidence of a note pass robbery, drop the note on the ____ or leave it at your station.
  5. The type of form filled out when observing or describing a robber.
  6. What is the amount dispensed during a robbery from the TCR?
  7. Most bomb threats and extortion are received this way.
  8. All media inquires go to this department.
  9. The practice of obtaining something, especially money, through force of threats.
Down
  1. Keys to press for dispense procedure from TCR(abbreviated).
  2. This form provides the following information: Contact names, instructions for branch employees on what to do during and after a robbery, and phone numbers.
  3. Person responsible for advising members of a robbery situation.
  4. These eight hand held items around the branch can help alert security that a robbery has occurred.
  5. When calling 911, we call from an RBFCU ___ ___.

14 Clues: All media inquires go to this department.When calling 911, we call from an RBFCU ___ ___.Most bomb threats and extortion are received this way.Keys to press for dispense procedure from TCR(abbreviated).What is the amount dispensed during a robbery from the TCR?Person responsible for advising members of a robbery situation....

KPMSOL CROSSWORD 2024-11-30

KPMSOL CROSSWORD crossword puzzle
Across
  1. What was the Centre of Cyber and Artificial Intelligence previously named?
  2. What does the P in Kirit P Mehta stand for? Patel
  3. What event was held in 2024 by Pehchaan: Gender Sensitization, Inclusivity and Equity Cell?
  4. What is the maximum number of lectures a student can miss of a 3-credit subject to maintain 80% attendance?
  5. Which committee deals in the corporate legal field?
Down
  1. In which year was KPMSOL founded?
  2. Which does not have a mid term or term end exam?
  3. How many intra moot court competitions have been held since 2013? 9
  4. How many law campuses does NMIMS have?
  5. What is the maximum duration permissible to complete a 5 year program in NMIMS?
  6. What are the two mandatory committees for every law school?
  7. What is the name of our university’s sports festival?

12 Clues: In which year was KPMSOL founded?How many law campuses does NMIMS have?Which does not have a mid term or term end exam?What does the P in Kirit P Mehta stand for? PatelWhich committee deals in the corporate legal field?What is the name of our university’s sports festival?What are the two mandatory committees for every law school?...

The ressurection crossword (matt 28:1-15) 2023-03-25

The ressurection crossword (matt 28:1-15) crossword puzzle
Across
  1. a land disaster
  2. a heavenly being
  3. winter
  4. security officials
  5. a grave site
  6. opposite of peaceful
  7. past participle of rise
Down
  1. plan
  2. to tell to people
  3. a time of the day
  4. a day of religious observance
  5. a praise session
  6. frightened

13 Clues: planwinterfrighteneda grave sitea land disastera heavenly beinga praise sessionto tell to peoplea time of the daysecurity officialsopposite of peacefulpast participle of risea day of religious observance

INTERNET VOCABULARY 2024-02-14

INTERNET VOCABULARY crossword puzzle
Across
  1. An attempt to trick individuals into providing sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity.
  2. A secret combination of characters used for user authentication and access to secured information.
  3. Measures taken to protect systems, networks, and data from unauthorized access, attacks, or damage.
  4. The process of copying data or files from a remote server or website to a user's device.
  5. A notification or warning about a potential threat, danger, or important event that requires immediate attention.
Down
  1. The right of individuals to keep their personal information and activities confidential and protected from unauthorized disclosure.
  2. A malicious software that can replicate itself and spread to other computers.
  3. Unauthorized access to computer systems or networks with the intention of gathering, altering, or destroying data.
  4. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. A fraudulent scheme performed by a deceitful individual, group, or company to gain money or something else of value.
  6. Software that secretly gathers information about a user's activities without their knowledge and sends it to a third party.

11 Clues: A malicious software that can replicate itself and spread to other computers.The process of copying data or files from a remote server or website to a user's device.A secret combination of characters used for user authentication and access to secured information....

Search Services Tech summit - 2022 2022-10-07

Search Services Tech summit - 2022 crossword puzzle
Across
  1. cross cluster search
  2. Monitoring service
  3. Operators friend
  4. New Provisioning system
  5. Event based self-healing
  6. Service provides temporary access
  7. Cost effective storage
Down
  1. DP Security Hardening
  2. Serveless configservice
  3. Recently supported EBS volume
  4. High Availability Project name
  5. Durability and remote storage
  6. MVP feature parity
  7. Upcoming AWS region in India
  8. Automation CICD Release
  9. Dataprepper

16 Clues: DataprepperOperators friendMonitoring serviceMVP feature paritycross cluster searchDP Security HardeningCost effective storageServeless configserviceNew Provisioning systemAutomation CICD ReleaseEvent based self-healingUpcoming AWS region in IndiaRecently supported EBS volumeDurability and remote storageHigh Availability Project name...

Nativity '24 2024-12-10

Nativity '24 crossword puzzle
Across
  1. wiseguys
  2. booked or embarrassed?
  3. famous announcer
  4. John was _______, but Jesus was Nazarene
  5. waiting for the anointed one
  6. old church lady
  7. divine step dad
  8. old new mom
  9. the ponderer
Down
  1. silent priest
  2. smells like a king, baby!
  3. 1st generation GPS
  4. Jesus' job description
  5. leader who loves counting
  6. tiny throne
  7. midnight security detail

16 Clues: wiseguystiny throneold new momthe ponderersilent priestold church ladydivine step dadfamous announcer1st generation GPSbooked or embarrassed?Jesus' job descriptionmidnight security detailsmells like a king, baby!leader who loves countingwaiting for the anointed oneJohn was _______, but Jesus was Nazarene

Time value of money. Behavior of interest rates 2025-03-10

Time value of money. Behavior of interest rates crossword puzzle
Across
  1. An investment's annual income (interest or dividends) divided by the current price of the security
  2. The lending interest rate adjusted for inflation as measured by the GDP deflator
  3. The possibility that an investor might be unable to reinvest cash flows at a rate comparable to their current rate of return
  4. is a company that assigns credit ratings, which rate a debtor's ability to pay back debt by making timely principal and interest payments and the likelihood of default
  5. is an interest rate applicable to a financial transaction that will take place in the future
  6. shows that long-term U.S. Treasury debt interest rates are less than short-term interest rates
  7. Bonds in which payment of income on the principal is related to a specific price index, usually the Consumer Price Index
  8. Is a security that is issued for less than its par or face value
  9. theory states that the interest rate on a long-term bond will equal an average of short-term interest rates expected to occur over the life of the long-term bond plus a liquidity premium (also referred to as a term premium) that responds to supply-and-demand conditions for that bond
  10. Is a type of loan where the interest rate remains unchanged for the entire term of the loan or for a part of the loan term
  11. The percentage increase in the value of an asset or investment over a specific period of time. It is calculated by taking the difference between the final and initial value of the asset, divided by the initial value, and then multiplying by 100
  12. The probability of a decline in the value of an asset resulting from unexpected fluctuations in interest rates
  13. is the failure to make required interest or principal repayments on a debt, whether that debt is a loan or a security
  14. bonds with no default risk
  15. explains why bonds of the same maturity but issued by different economic entities have different yields
Down
  1. Is a financial term used to describe a security’s nominal or dollar value as given by its issuer. For bonds, it’s the amount paid to the holder at maturity
  2. maps out the relationship between interest rates and the time to maturity for a given debt instrument, typically government bonds
  3. A debt obligation with coupons attached that represent semiannual interest payments
  4. states that current long-term rates can be used to predict short term rates of future
  5. is the annualized return on a debt instrument based on the total payments received from the date of initial purchase until the maturation date
  6. Measures how long it takes, in years, for an investor to be repaid a bond’s price through its total cash flows
  7. Is the current value of a future sum of money or stream of cash flows
  8. The movement of money into and out of a company over a certain period of time
  9. theory sees markets for different-maturity bonds as separate and segmented
  10. is the net gain or loss of an investment over a specified time period, expressed as a percentage of the investment’s initial cost
  11. Is a percentage that describes how much is paid by a fixed-income security to the owner of that security during the duration of that bond
  12. bonds that carry a higher risk of default than most bonds issued by corporations and governments
  13. is the investment return an asset is expected to yield in excess of the risk-free rate of return
  14. Is the annual rate you find on financial products, not adjusted for inflation, fees, or compounding
  15. is the price quoted for immediate settlement on an interest rate, commodity, a security, or a currency
  16. a line that plots the yields or interest rates of bonds that have equal credit quality but different maturity dates
  17. Is an investment asset that pays a stated return for an infinite amount of time. An annuity with no termination date is an example of it
  18. Values that have been adjusted for inflation, providing a more accurate representation of the purchasing power of money over time

33 Clues: bonds with no default riskIs a security that is issued for less than its par or face valueIs the current value of a future sum of money or stream of cash flowstheory sees markets for different-maturity bonds as separate and segmentedThe movement of money into and out of a company over a certain period of time...

techIA2 2015-03-01

techIA2 crossword puzzle
Across
  1. Nickname of machine created by Allan Turning
  2. Code name for John Cairncross
  3. Thailand’s first internet connection was established at this university
  4. Name of the worm used to infiltrate Iran’s uranium processing facilities
  5. German General in the Africa campaign
  6. Turning was arrested and charged with being this
  7. This was a group of five English spies
  8. People believe that the cyber attack against Iran was funded by this organization
Down
  1. The communication machines used by the Germans used these to change messages
  2. After WWII enigma machines were sold to these nations
  3. The location of the English GS&CS
  4. The Germans used these in a naval blockade of England and battle of the Atlantic
  5. Nickname given by Allan Turing to the computer he created
  6. Code name for the allied invasion of Europe
  7. Created a line of communications between computers at Stanford and UCLA in 1969

15 Clues: Code name for John CairncrossThe location of the English GS&CSGerman General in the Africa campaignThis was a group of five English spiesCode name for the allied invasion of EuropeNickname of machine created by Allan TurningTurning was arrested and charged with being thisAfter WWII enigma machines were sold to these nations...

Browsing safely 2025-06-15

Browsing safely crossword puzzle
Across
  1. applications used to prevent the entry of virus into the computer system
  2. full form of virus
  3. acts done to protect one's computer system
  4. Collection of various networks in the form of a web
  5. providing malwares and viruses into one's computer through various links and emails
  6. illegal entry into one's computer through various links
  7. cyber crime in which money is demanded after attacking the victim
  8. a type of anti-virus
  9. befriending children on social media and causing harm through social media or physically
  10. full form of OTP
Down
  1. criminal activities intented to harm a person through online
  2. act of terrorism conducted through the use of internet
  3. full form of ICT
  4. sequence of characters or numbers used in any device or system to keep it protected
  5. act of harassing people through the use of internet

15 Clues: full form of ICTfull form of OTPfull form of virusa type of anti-virusacts done to protect one's computer systemCollection of various networks in the form of a webact of harassing people through the use of internetact of terrorism conducted through the use of internetillegal entry into one's computer through various links...

crossword 2014-02-09

crossword crossword puzzle
Across
  1. The company that maintains a mutual fund's assets.
  2. The rate at which banks borrow money from RBI.
  3. Divide your investments across different investment options (equity, debt etc.)
  4. Government body that regulates and monitors mutual funds in India (acronym).
  5. A measure of the volatility, or systematic risk, of a security or a portfolio in comparison to the market as a whole.
Down
  1. As per SEBI color coding, denotes high risk.
  2. The situation where a country's imports exceed its exports (acronym).
  3. Synonym for 'Security'.
  4. Moving a fixed sum of money from one scheme to another at period intervals (acronym).
  5. Foreign Exchange (acronym)
  6. Synonym for your investments (equity, debt etc.)

11 Clues: Synonym for 'Security'.Foreign Exchange (acronym)As per SEBI color coding, denotes high risk.The rate at which banks borrow money from RBI.Synonym for your investments (equity, debt etc.)The company that maintains a mutual fund's assets.The situation where a country's imports exceed its exports (acronym)....

book project part one 2024-03-22

book project part one crossword puzzle
Across
  1. cause (someone) to become motionless with horror, wonder, or astonishment
  2. childishly silly and trivial.
  3. exercising a compelling charm which inspires devotion in others
  4. to walk about in an idle or leisurely manner
  5. in the order given
  6. he student who has the highest grade point average in their class when they graduate from high school or college
  7. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. extremely small.
  2. without refinement, delicacy, or sensitivity; gross; obtuse; stupid
  3. a group of islands.
  4. regard or represent as perfect or better than in reality.

11 Clues: extremely small.in the order givena group of islands.childishly silly and trivial.to walk about in an idle or leisurely mannerregard or represent as perfect or better than in reality.exercising a compelling charm which inspires devotion in otherswithout refinement, delicacy, or sensitivity; gross; obtuse; stupid...

OPTICAL STORAGE, INTERNET SECURITY & EMAIL 2014-03-27

OPTICAL STORAGE, INTERNET SECURITY & EMAIL crossword puzzle
Across
  1. a copy of a file
  2. something you need to connect to the Internet
  3. It can infect your files and corrupt your hard drive
  4. topic of the message
  5. malicious software
  6. to connect to the Internet you need an username and a.....
  7. a floating gate transistor
  8. WI-FI.....
  9. ROM
  10. Digital.......Disc DVD
  11. a type of disc which uses a blue-violet laser
  12. CD and DVD use a laser..... to read data
Down
  1. a program used for displaying web pages
  2. It protects a company intranet from outside attacks.
  3. a type of non-volatile memory
  4. used to send a message to another person via the Internet
  5. TCP/IP is the standard......
  6. used to download and view documents published on the Internet
  7. a term that describes any fast, high-bandwidth connection
  8. Internet Service ........ ISP
  9. able to be rewritten many times
  10. files added to the message
  11. It changes data into a secret code
  12. without using cables
  13. a product that integrates two different technologies

25 Clues: ROMWI-FI.....a copy of a filemalicious softwaretopic of the messagewithout using cablesDigital.......Disc DVDa floating gate transistorfiles added to the messageTCP/IP is the standard......a type of non-volatile memoryInternet Service ........ ISPable to be rewritten many timesIt changes data into a secret code...

job security - Take over from 2017-11-02

job security - Take over from crossword puzzle
Across
  1. to give someone money for something you buy or for a service
  2. money paid by an employer to a worker who is too ill to work
  3. Pradine alga
  4. to dismiss someone from their job SYN fire Give sb the sack
  5. money you earn that is paid according to the number of hours, days, or weeks that you work → salary
  6. Pasiimk laisvą dieną
  7. (informal)to dismiss someone from their job SYN sack
  8. to work too much or to make someone work too much
  9. the extra money that you must pay back when you borrow money
  10. formal a job
  11. Perimti iš
  12. _ompany to start a company, organization, committee etc SYN establish
  13. when you stop working, usually because of your age
  14. Pradėkite savo verslą
  15. a group of people who have been given the official job of finding out about something or controlling something
  16. the knowledge that your job is permanent as long as you want it to be
  17. to stop working, usually because you have reached a certain age
  18. something that someone needs or asks for
  19. In receipt of assistance, financial or otherwise, from publicly or privately funded agencies (most often government-run) due to a certain level of hardship, poverty, or need. It was really disheartening having to go on the dole these past six months, but it was the only thing that kept our family afloat after I lost my job.
Down
  1. the number of people who are available to work, considered together with all the available jobs
  2. Gaukite darbo užmokesčio didėjimą
  3. akcijos
  4. Pateikite paraišką dėl
  5. to learn or to teach someone the skills that are needed to do a different job
  6. benefit /dole money paid regularly by the government to people who have no job
  7. to officially announce that you have decided to leave your job or an organization → quit
  8. with neither side having any advantage over the other
  9. a small amount of additional money that you give to someone such as a waiter or a taxi driver
  10. _romotion Skatinimo perspektyvos
  11. a job with normal daytime hours. I wouldn't want a nine-to-five job. I like the freedom I have as my own boss. I used to work nights, but now I have a nine-to-five job.
  12. leave A leave of absence from work granted to a father to care for an infant.

31 Clues: akcijosPerimti išPradine algaformal a jobPasiimk laisvą dienąPradėkite savo versląPateikite paraišką dėl_romotion Skatinimo perspektyvosGaukite darbo užmokesčio didėjimąsomething that someone needs or asks forto work too much or to make someone work too muchwhen you stop working, usually because of your age...

Online Safety, Security, and Ethics 2020-10-18

Online Safety, Security, and Ethics crossword puzzle
Across
  1. A search engine that plants trees
  2. An unwanted email mostly from bots or advertisers
  3. The process of interactively searching for and retrieving requested information via a computer from databases that are online.
  4. The search engine of the God of Thunder
  5. It covers the key issues in developing a successful research project
  6. An unwanted acquisition of sensitive personal information
  7. A malicious program that transfers from one computer to another
  8. An essential techniques for carrying out convincing research
  9. Disguises as a useful program but once downloaded or installed leaves your PC unprotected
  10. Defined as the information superhighway
Down
  1. An animal bird search engine
  2. It causes harm to a computer system or network
  3. A program that runs in the background without you knowing it
  4. A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web
  5. A program designed to replicate itself and transfer from one computer to another
  6. It is designed to detect and destroy computer viruses
  7. It is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application
  8. A software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
  9. An anti-virus or anti-malware software product that starts and end with n.
  10. A program designed to send you advertisements, mostly as pop-ups

20 Clues: An animal bird search engineA search engine that plants treesThe search engine of the God of ThunderDefined as the information superhighwayIt causes harm to a computer system or networkAn unwanted email mostly from bots or advertisersIt is designed to detect and destroy computer virusesAn unwanted acquisition of sensitive personal information...

SSQH Safety and Security Crossword 2024-06-11

SSQH Safety and Security Crossword crossword puzzle
Across
  1. Airports are classified into three categories: green, _____ and red.
  2. Passengers are required to use _____ in their own class of travel (exceptions are made for passengers with special needs) for flights into the USA.
  3. As a security measure to prevent unauthorized entry, crew should _____ their doors in hotels during layovers.
  4. Adopting the right _____ when lifting heavy objects is important in preventing back injuries.
  5. Crew must be aware of the _____ points in both the cabin as well as the galley as part of turbulence management.
  6. The H.E.R.O in #ZeroAccidentHERO campaign stands for; Happy, Exemplary, Resourceful and _____.
  7. When handling hot crockery, using protective gears such as _____ and the plate tongs are important to prevent scalding/burns.
  8. Turbulence can be _____, so it is essential for cabin crew to be equipped with turbulence management knowledge to minimise the occurrence of such injuries!
  9. Crew should ensure that the lavatory and passageway are clear of any threats before entering or exiting the _____.
  10. During transit, crew shall ensure that only _____ persons displaying proper ID are allowed into the cabin. (Both UK/US spelling are acceptable.)
Down
  1. Stay _____ and be aware of surroundings at all times.
  2. If the seatbelt sign is not on, CIC and complex leaders should exercise _____ by suspending cabin service when they observe that crew are facing difficulties manoeuvring in the cabin.
  3. _____ to severe turbulence can happen at any moment.
  4. The Least Risk Bomb Location (LRBL) for all aircraft types is at the _____ right door.
  5. Materials with _____ content must not be placed in microwave ovens.
  6. Practice safe work habits such as _____ coffee/tea pots into the cart when the seatbelt sign turns on.
  7. It is important to manage _____ and ensure that you have sufficient rest to always stay alert on flight.
  8. Good _____ helps prevent injury when turbulence occurs.
  9. NTL passengers (and any accompanying escorts) shall be the _____ to disembark the aircraft.
  10. If an announcement is made for crew to be seated, move swiftly to _____ yourself in the nearest available seat.

20 Clues: _____ to severe turbulence can happen at any moment.Stay _____ and be aware of surroundings at all times.Good _____ helps prevent injury when turbulence occurs.Materials with _____ content must not be placed in microwave ovens.Airports are classified into three categories: green, _____ and red....

Orion Brower , National Security Final 2022-05-13

Orion Brower , National Security Final crossword puzzle
Across
  1. science of writing
  2. of station government official who is the head of a team.
  3. Case officer responsible for handling agents in operations.
  4. forger passports and liscences.
  5. Person used once unknowingly for an intelligence operation.
  6. spy
  7. for the other side.
  8. Commander
  9. Slang for British members of the secret intelligence service.
  10. drop Drop off point
  11. Only something meant to be read by a specific agent.
  12. bodyguard
  13. Intercepted communication
  14. Agent Agent that pretends to be a spy when he / she is on the opposite side.
Down
  1. Thwarting of foreign agencies.
  2. Agent that searches graves for names of the deceased.
  3. guide
  4. someone that lives out of their original country.
  5. Agent sent to their country to
  6. of influence Agent that uses their position to influence the public.
  7. Bribery
  8. Valuable
  9. Agent risk taker
  10. officer intelligence officer who recruits and manages spies.
  11. British slang
  12. in place informant
  13. Clean steps an agent may take to see if their under surveillance.

27 Clues: spyguideBriberyValuableCommanderbodyguardBritish slangAgent risk takerscience of writingfor the other side.in place informantdrop Drop off pointIntercepted communicationThwarting of foreign agencies.Agent sent to their country toforger passports and liscences.someone that lives out of their original country....

RU ITEC411- Crime and Security 2024-10-16

RU ITEC411- Crime and Security crossword puzzle
Across
  1. Software created with the intent to harm computer hardware/software
  2. Ensuring data that should be private remains private
  3. Hackers who use their skills to improve system security
  4. The process of verifying the identity of a person
  5. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
  6. Biological characteristics that are unique to each individual
Down
  1. The main federal computer-crime law passed in 1980
  2. The exchange of goods/services over the internet
  3. The --------- system controls access to a computer's hardware, applications, and files.
  4. A way in which one can transform readable data into an unreadable cypher
  5. Hackers whose activities are destructive
  6. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
  7. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
  8. These people developed coding standards for secure software development
  9. The type of theft in which a criminal uses the identity of an unknowing innocent person
  10. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
  11. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
  12. Hacking to promote a political cause
  13. The use of false domains/URLs to steal personal/financial information
  14. An application is ------ if it has a digital certificate attached to it

20 Clues: Hacking to promote a political causeHackers whose activities are destructiveThe exchange of goods/services over the internetThe process of verifying the identity of a personThe main federal computer-crime law passed in 1980Ensuring data that should be private remains privateHackers who use their skills to improve system security...

RU ITEC411- Crime and Security 2024-10-16

RU ITEC411- Crime and Security crossword puzzle
Across
  1. The use of false domains/URLs to steal personal/financial information
  2. The main federal computer-crime law passed in 1980
  3. Biological characteristics that are unique to each individual
  4. A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
  5. These people developed coding standards for secure software development
  6. The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
  7. The exchange of goods/services over the internet
  8. Hacking to promote a political cause
  9. The --------- system controls access to a computer's hardware, applications, and files.
Down
  1. Ensuring data that should be private remains private
  2. Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
  3. The process of verifying the identity of a person
  4. The type of theft in which a criminal uses the identity of an unknowing innocent person
  5. Used to monitor/filter out unwanted communication from untrusted sites and/or suspicious activity
  6. Hackers who use their skills to improve system security
  7. Hackers whose activities are destructive
  8. Software created with the intent to harm computer hardware/software
  9. A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
  10. An application is ------ if it has a digital certificate attached to it
  11. A way in which one can transform readable data into an unreadable cypher
  12. The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment

21 Clues: Hacking to promote a political causeHackers whose activities are destructiveThe exchange of goods/services over the internetThe process of verifying the identity of a personThe main federal computer-crime law passed in 1980Ensuring data that should be private remains privateHackers who use their skills to improve system security...

RU ITEC411 Chapter 5 - Security 2025-03-18

RU ITEC411 Chapter 5 - Security crossword puzzle
Across
  1. Software that attaches or adds itself to other software
  2. Software designed to monitor and record user activity on a computer
  3. Hacking to promote a political cause
  4. Virus that's responsible for $10B in damages and infected 80% of U.S. federal agencies
  5. Gathering for developing innovative new software and hardware products
  6. Ensuring data that should be private remains private
  7. Software that encrypts personal data and locks it behind a paywall
  8. Defect found in the "heartbeat" section of the OpenSSL code
  9. Software designed to exploit specific system flaws
Down
  1. Device used to collect card information from payment terminals
  2. Trojan that accessed 70 million target customer's data
  3. code library used to send and receive encrypted messages
  4. "A coordinated army of compromised devices"
  5. Spam messages intending to collect information to impersonate someone to steal money and goods
  6. Goal of significant portion of hacking is to steal
  7. Hidden entry point that bypasses normal security
  8. Used to mean a "Computer virtuoso"
  9. Malicious software disguising itself as a harmless program
  10. Beginning of the Internet, linked universities, companies, and government installations
  11. Hack used to damage Iranian centrifuges
  12. ____ hacking, meant to impress and gain respect from peers
  13. Characteristics that are biologically unique to an individual

22 Clues: Used to mean a "Computer virtuoso"Hacking to promote a political causeHack used to damage Iranian centrifuges"A coordinated army of compromised devices"Hidden entry point that bypasses normal securityGoal of significant portion of hacking is to stealSoftware designed to exploit specific system flaws...

Chapter 8 - Network Perimeter Security 2025-05-21

Chapter 8 - Network Perimeter Security crossword puzzle
Across
  1. A configuration file that tells browsers how to use a proxy server automatically.
  2. Inspecting individual packets and allowing or blocking them based on rules.
  3. A proxy that hides a user’s real IP address when accessing external networks.
  4. Monitoring the state of active connections to make dynamic traffic decisions.
  5. A tool that blocks access to unwanted or harmful online content.
  6. A decoy system set up to attract and monitor attackers.
  7. A device or software that monitors network traffic for suspicious activity.
  8. A proxy that filters traffic based on specific application protocols.
  9. A network interface mode that captures all traffic on the segment, not just addressed traffic.
  10. An all-in-one security solution combining firewall, antivirus, intrusion prevention, and more.
  11. A firewall that filters traffic based on specific application content or behavior.
  12. A missed alert when actual malicious activity is not detected.
  13. A rule that clearly grants permission for network access or traffic.
  14. A rule that clearly blocks specific access or traffic.
Down
  1. The boundary between a private internal network and the public internet.
  2. An alert triggered by harmless activity mistaken as a threat.
  3. A set of rules that control network traffic by permitting or denying data packets.
  4. Technology that prevents sensitive data from being leaked or accessed without authorization.
  5. A default rule that blocks traffic not explicitly allowed.
  6. A firewall that manages traffic at the session layer between trusted and untrusted hosts.
  7. A firewall specifically designed to protect web applications from attacks.
  8. A proxy that filters and caches web traffic.
  9. An appliance or software that filters malicious content and enforces web policies.
  10. A system that actively blocks malicious traffic as it’s detected.
  11. A network of honeypots designed to study and detect attacks.
  12. A system that acts as an intermediary between users and the internet.

26 Clues: A proxy that filters and caches web traffic.A rule that clearly blocks specific access or traffic.A decoy system set up to attract and monitor attackers.A default rule that blocks traffic not explicitly allowed.A network of honeypots designed to study and detect attacks.An alert triggered by harmless activity mistaken as a threat....

RU ITEC411 - Crime and Security 2022-10-16

RU ITEC411 - Crime and Security crossword puzzle
Across
  1. Fraudulent spam emails to gather information used to impersonate someone, steal money or goods.
  2. Placing false IP address in the tables on a DNS that leads to a counterfeit site for gathering personal data.
  3. Various crimes in which a criminal or group uses the identity of a person.
  4. Ensure systems, services, data are accessible when needed.
  5. An attack in which a botnet overwhelms a system or website with requests that stops users from accessing the system or website.
  6. Malware that monitors and records activities on an electronic device.
  7. Fraudulent spam texts to gather information used to impersonate someone, steal money or goods.
  8. Recording device used to steal credit/debit card information.
  9. Group of electronic devices that have a malware that controls them via a central host that coordinates the army to perform tasks.
  10. Biological characteristics unique to an individual.
Down
  1. Ensure data should be private remain private.
  2. Software that gives access to an electronic device by bypassing security checks.
  3. Manipulation of people to get information or do a task that violates security protocols, two words no spaces.
  4. Malware that asks as a normal software but has malicious abilities hidden.
  5. A system that calculates a customer's bill when checking out and starts payment.
  6. Malware that encrypts files on an electronic devices, then asks for payment to decrypt files.
  7. Software that attaches to a program.
  8. Similar to virus, does not attach itself to other programs.
  9. Use of hacking to promote a political cause.
  10. Ensure data is not changed without authorization, stays consistent over time and stays sync with real world.

20 Clues: Software that attaches to a program.Use of hacking to promote a political cause.Ensure data should be private remain private.Biological characteristics unique to an individual.Ensure systems, services, data are accessible when needed.Similar to virus, does not attach itself to other programs....

Digital Security, Ethics, and Privacy 2022-11-07

Digital Security, Ethics, and Privacy crossword puzzle
Across
  1. A set of instructions in a program that allows users to bypass security controls
  2. The process of sharing computing resources among computers and devices on a network
  3. A type of attack that overloads a resource, thus making it unavailable to legitimate users
  4. A ratio that measures how much power enters a computer facility compared to how much power is used
  5. All data is backed up whenever a change is made
  6. A unique hardware identifier for your device
  7. Protects individuals against the wrongful disclosure of their health information
  8. The discovery, collection, and analysis of evidence found on a computer or network
  9. The phase of disaster recovery that includes the evacuation plan
  10. A normal looking yet fraudulent Wi-Fi network
  11. A program that copies itself repeatedly and spreads throughout the network without human help
  12. An animal loving hacker who might deface the website of a local meat packing plant
  13. Technique used by attackers to make their traffic look legitimate to the victim device
  14. A common infringement of copyright
Down
  1. The process of ensuring that the person requesting access to a computer or network is not an imposter
  2. Online or Internet-based illegal acts
  3. Attacks that attempt to trick the victim into giving information to the attacker
  4. The movement to ensure that all users have access to devices, data, and infrastructure
  5. The record of everything you do online
  6. A private secure path across a public network
  7. The process of restricting access to certain material
  8. A part of the web that is accessed using special software, providing anonymity to its users
  9. A private combination of words associated with a username
  10. Any event or action that could cause loss or damage
  11. A type of authentication that combines multiple types of authentication to provide more secure access

25 Clues: A common infringement of copyrightOnline or Internet-based illegal actsThe record of everything you do onlineA unique hardware identifier for your deviceA private secure path across a public networkA normal looking yet fraudulent Wi-Fi networkAll data is backed up whenever a change is madeAny event or action that could cause loss or damage...

Security Terminology Puzzle (Participation 3) 2023-01-25

Security Terminology Puzzle (Participation 3) crossword puzzle
Across
  1. many compromised computers attacking
  2. software that is harmful
  3. your devices unique number online
  4. software that checks for malware
  5. malware that makes you pay
  6. software that tracks you
Down
  1. unscrambles the unreadable scrambled data
  2. harassment over social media
  3. network pro learning hacking techniques
  4. tricking users to click an image
  5. shield for data
  6. malware pretending to be useful
  7. multitudinous attackers preventing legitimate users
  8. software that displays adverts
  9. internet access at starbucks
  10. attacks seeking out personal info
  11. hides a users information/location
  12. scrambling data into unreadable
  13. attacks from an unknown vulnerability
  14. i swear that isn't me

20 Clues: shield for datai swear that isn't mesoftware that is harmfulsoftware that tracks youmalware that makes you payharassment over social mediainternet access at starbuckssoftware that displays advertsmalware pretending to be usefulscrambling data into unreadabletricking users to click an imagesoftware that checks for malware...

Industrial Security Concept Crossword Puzzle 2025-10-13

Industrial Security Concept Crossword Puzzle crossword puzzle
Across
  1. - indication of impending danger or harm
  2. - inability to withstand the effects of a hostile environment
  3. - term used in England for lock picker, safecrackers, and penetrators of restricted areas
  4. - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
  5. - the monitoring of telephone conversation by a third party, often by covert means
  6. - a house like structures above the perimeter barrier
  7. - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
  8. - A chance of being injured or harmed
  9. - genuine key stolen from the owner
Down
  1. - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
  2. - means to secretly listen to record a conversation using a hidden electronic device
  3. - it is the communication channel that conveys the information from all sensors in the system
  4. - a metallic container used for safekeeping of documents or small items in office or installation
  5. - used as a form of identification and access control
  6. - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
  7. - any information and material, the unauthorized disclosure of which would endanger national security
  8. - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
  9. - is the potential that a chosen action will lead to a loss
  10. - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
  11. - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys

20 Clues: - genuine key stolen from the owner- A chance of being injured or harmed- indication of impending danger or harm- used as a form of identification and access control- a house like structures above the perimeter barrier- is the potential that a chosen action will lead to a loss- inability to withstand the effects of a hostile environment...

Industrial Security Concept Crossword Puzzle 2025-10-13

Industrial Security Concept Crossword Puzzle crossword puzzle
Across
  1. - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
  2. - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
  3. - A chance of being injured or harmed
  4. - used as a form of identification and access control
  5. - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
  6. - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
  7. - genuine key stolen from the owner
  8. - means to secretly listen to record a conversation using a hidden electronic device
  9. - term used in England for lock picker, safecrackers, and penetrators of restricted areas
  10. - a house like structures above the perimeter barrier
Down
  1. - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
  2. - inability to withstand the effects of a hostile environment
  3. - it is the communication channel that conveys the information from all sensors in the system
  4. - indication of impending danger or harm
  5. - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
  6. - the monitoring of telephone conversation by a third party, often by covert means
  7. - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
  8. - any information and material, the unauthorized disclosure of which would endanger national security
  9. - a metallic container used for safekeeping of documents or small items in office or installation
  10. - is the potential that a chosen action will lead to a loss

20 Clues: - genuine key stolen from the owner- A chance of being injured or harmed- indication of impending danger or harm- used as a form of identification and access control- a house like structures above the perimeter barrier- is the potential that a chosen action will lead to a loss- inability to withstand the effects of a hostile environment...