Surpise No 2 Crossword
Type
Crossword
Description

Abbreviation for we are
On route somewhere
not physically existing as such but made by software to appear to do so
A genre of TV portrating real life scenarios
A venue where people come to play games
A sport in US thats legal but illegal here
When humans are dead but alive and can kill you
expressing motion in the direction of (a particular location).
used to connect words of the same part of speech, clauses, or sentences, that are to be taken jointly.
Further; additional
Enjoyment
matter, material, articles, or activities of a specified or indeterminate kind that are being referred to, indicated, or implied.

Cyber Security Crossword

Cyber Security Crossword
Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running.
designed to detect and destroy computer viruses.
an attempt by hackers to damage or destroy a computer network or system.
a method, often secret, of bypassing normal authentication in a product
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
are small files that Web sites put on your computer hard disk drive when you first visit
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
someone who seeks and exploits weaknesses in a computer system or computer network.
global system of interconnected computer networks that use the Internet protocol suite
a local or restricted communications network, especially a private network created using World Wide Web software.
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
any malicious computer program which is used to hack into a computer by misleading users of its true intent
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
a standalone malware computer program that replicates itself in order to spread to other computers.

Poetry Forms Crossword

Poetry Forms Crossword
Type
Crossword
Description

a comparison using is or was
using like or as
uses a flow and beat throughout the poem
repetition of sounds and syllables
a object, colour, place used to represent deeper ideas
imitates the sound an object or action makes
non-human things
go Buy some Butter
you are as Dead as a Dodo
once clever saying
words that influence you or make you emotional
hinting future themes e.g. your going to die
overstatement or exaggeration
saying one thing but meaning another e.g. we're friends
a statement with further meaning "if you look deeply, she's shallow"
imitating poem in a humorous meaning
ridiculing a subject

Genre Crossword Puzzle

Genre Crossword Puzzle
Type
Crossword
Description

Un-true literature including short stories and novels
A witch doing magic on an undiscovered world is an example of...
What is a genre with larger than life or greatly exaggerated characters?
A genre that is written for play, theater, or radio
A genre that might contain talking animals and convoy a moral is...
A genre ment to change someones opinion is...
A sub-genre of fiction involving futuristic ideas
A genre that is passed down through generations including traditional beliefs
A sub-genre that could happen but has not
Story of someones life written by that person
Story if someones life written by another person
A form of writing that has a meter and rhythm with every lines and syllables
Genre that focus's on humorous effect
Provide's facts on a variety of topics
A semi-true story passed from generations with important meaning or symbolism from the culture it came from
A book about the life of penguins that is true is an example of what genre
A genre where the plot takes place in the past
A drama showing weakness and unfavorible circumstances
A traditional story usually concerning a hero or event
A genre containing magical creatures

Cyber Security Crossword

Cyber Security Crossword
Type
Crossword
Description

process of confirming the correctness of the claimed identity
approval, permission, or empowerment for someone or something to do something
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one
encrypted form of the message being sent
stripping one llayer's headers and passing the rest of the packet up to next higher layer
TCP/IP protocol specifying the transfer of text or binary files across the network
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
prove that a user sent a message and the message has not been altered
sequence of eight bits
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
gaining unauthorized logical access to sensitive data by circumventing a system's protections
type of input validation attack where SQL code is inserted into application queries to manipulate the database
basic communication language or "protocol" of the Internet
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program

IT&S Cyber Security Crossword Puzzle

IT&S Cyber Security Crossword Puzzle
Type
Crossword
Description

A software that is designed and destroy computer viruses
Do not leave your laptop or computer ___________________
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
Email scam or attempt to trick you into giving your password or personal information
The state of being free from danger and threat
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus.
Choose a password that is easy for you _______________ but hard for you someone to guess.
Also known as malicious software any; any program or file that is harmful to a computer user
Passwords should should always be at least this many characters long.
A _______ assessment is the process by which risks are identified and the impact of those risks determined
Applied to data to protect it from unauthorized use in case of theft or loss.
Always _______your computer when you leave your desk
To protect personal information, avoid sending it via
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
A collection of information that is organized so that it can easily be accessed, managed and updated
Never share your _________ with another person

Gothic Horror Crossword

Gothic Horror Crossword
Type
Crossword
Description

The category a book or film falls into.
The features you would expect of a particular genre
Dracula was one of these
The red stuff all over this genre
Things that happen beyond the rules of nature
When inanimate things seem to have a mond of their own
Gothic Horror stories usually take place in the...
The name given to the medieval buildings in these stories
When a story is made up
When the weather matches the mood

Crossword - Exercise 1

Crossword - Exercise 1
Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account
An attempt by hackers to damage or destroy a computer network or system.
Someone who seeks and exploits weaknesses in a computer system or computer network.
The process of confirming the correctness of the claimed identity
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
A standalone malware computer program that replicates itself in order to spread to other computers.
Are small files that Web sites put on your computer hard disk drive when you first visit
A technology that allows us to access our files through the internet from anywhere in the world.
Appears at the beginning of the web-link of a secured website
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
A data classification mode that describes certain data or document as a secret
A government agency in Qatar that handles all reported incidents related to cyber attacks
The art of manipulating people to get access to sensitive information
A software that is a type of utility used for scanning and removing harmful software from your computer
Any software program in which advertising banners are displayed while the program is running
The use of electronic communication to bully a person
A phone call tactic in which individuals are tricked into revealing critical financial or personal information
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet.

English 2 crossword puzzle

English 2 crossword puzzle
Type
Crossword
Description

a brief statement or account of the main points of something.
combine (a number of things) into a coherent whole.
Connecting background knowledge to what you are reading
of or relating to sensation or the physical senses; transmitted or perceived by the senses.
a conclusion reached on the basis of evidence and reason
examine methodically and in detail the constitution or structure of (something, especially information), typically for purposes of explanation and interpretation.
evidence from a text (fiction or nonfiction) that you can use to illustrate your ideas and support your arguments.
Refers to information that is implied or inferred because it's not clearly stated
the objective analysis and evaluation of an issue in order to form a judgment
the subject of a talk, a piece of writing, a person's thoughts, or an exhibition; a topic.
language that uses words or expressions with a meaning that is different from the literal interpretation.
the patterns of rhythm and sound used in poetry.
a piece of writing that partakes of the nature of both speech and song that is nearly always rhythmical, usually metaphorical, and often exhibits such formal elements as meter, rhyme, and stanzaic structure.
elements are a strong visual means of indicating relationships.
literary work in which special intensity is given to the expression of feelings and ideas by the use of distinctive style and rhythm; poems collectively or as a genre of literature.
the use of symbols to represent ideas or qualities.
a story, poem, or picture that can be interpreted to reveal a hidden meaning, typically a moral or political one.
an expression designed to call something to mind without mentioning it explicitly; an indirect or passing reference.

OPSEC is not Puzzling Crossword

OPSEC is not Puzzling Crossword
Type
Crossword
Description

What you should do to your anti-virus software on a regular basis
What you should do to all papers with PII or other sensitive information
Where you should keep your badge when off-site
An adversary is considered a _________
"Computer1234" would be a bad example of this
Actions that mitigate a threat
An option to protect your credit
What potential harm from poor OPSEC is called
What you must do to emails containing Critical Information
What a weakness in our practices or defenses is called
The type of information that OPSEC protects
The number of steps in the OPSEC process
The Freedom of Information Act is for what type of information
It is very important to use privacy settings on _______________
What you should remove each time you walk away from your NMCI computer
What you cannot take with your smartphone or camera anywhere onsite
What you should practice whenever you discuss your work with anyone
OPSEC is a _______ effort
What is the abbreviation of the list that shows the commands Critical Information
The kind of email account you can't use to conduct Government business

Computer Basics ! Crossword

Computer Basics ! Crossword
Type
Crossword
Description

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data
any part of your computer that has a physical structure, such as the keyboard or mouse.
any set of instructions that tells the hardware what to do and how to do it
the metal and plastic box that contains the main components
one of the main ways to communicate with a computer.
another important tool for communicating with computers. Commonly known as a pointing device.
is used to print documents, photos, and anything else that appears on your screen.
is the computer's main circuit board
your system's short-term memory
where your software, documents, and other files are stored
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language
What id a shorter term for Wireless Internet Connection
is a type of software that allows you to perform specific tasks
llows you to write a letter, design a flyer, and create many other types of documents
the tool you use to access the Internet
any type of software that is designed to damage your computer or gain unauthorized access to your personal information
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second.
When you save a file, the data is written to the hard drive, which acts as
is responsible for what you see on the monitor
also called an audio card—is responsible for what you hear in the speakers or headphones