security awareness
JAO
computer security terms
f | h | o | h | i | z | i | b | c | x | w | t | j | p | e | o | n | h | b | o | w | a | z |
c | n | k | j | s | y | m | g | b | f | t | v | p | o | d | u | y | e | w | w | a | r | f |
s | w | v | h | d | w | w | b | y | r | v | r | e | m | h | p | g | h | b | n | o | u | i |
f | z | e | d | g | c | b | g | t | j | o | a | p | e | i | v | d | g | y | d | b | e | r |
k | u | y | u | v | n | i | s | v | t | p | w | t | b | t | z | d | w | g | w | f | i | o |
k | s | l | i | p | y | j | s | e | b | o | m | s | m | k | e | k | g | h | x | q | z | u |
s | g | v | n | v | n | b | c | l | e | a | n | d | e | s | k | u | y | x | c | w | f | l |
o | m | r | t | o | o | t | d | x | l | o | g | i | n | r | g | c | j | a | d | z | m | r |
c | y | b | e | v | i | r | d | l | i | y | z | o | s | v | q | u | r | y | p | m | b | j |
i | m | a | r | o | t | t | o | t | l | b | p | f | z | x | w | e | x | e | i | i | h | s |
a | o | j | n | t | p | e | a | f | u | s | h | a | s | f | m | p | x | i | h | x | s | x |
l | v | y | e | j | y | m | n | c | e | u | i | p | s | s | k | a | x | x | i | e | y | w |
e | g | c | t | v | r | l | y | r | i | n | s | d | o | s | d | s | b | m | n | n | g | i |
n | f | n | o | o | c | v | t | x | e | f | h | c | k | t | w | i | d | e | g | j | d | d |
g | j | m | f | n | n | n | i | k | l | t | i | k | s | j | p | o | r | h | y | n | c | l |
i | a | n | t | i | e | f | r | b | r | a | n | s | o | m | w | a | r | e | w | t | k | f |
n | i | a | h | d | x | c | u | z | l | k | g | i | s | m | w | h | l | d | s | f | t | k |
e | j | d | i | y | y | n | c | m | j | j | s | h | u | a | s | h | i | w | t | u | k | e |
e | y | c | n | o | d | t | e | y | i | w | v | e | k | l | l | v | f | r | d | b | e | m |
r | n | e | g | c | k | d | s | t | m | v | a | i | x | w | n | c | h | s | m | c | d | s |
i | d | r | s | v | i | w | p | d | u | m | p | q | u | a | h | v | v | l | h | b | p | t |
n | o | i | t | a | c | i | t | n | e | h | t | u | a | r | o | t | c | a | f | o | w | t |
g | u | d | p | w | m | e | d | e | q | i | j | l | l | e | a | h | g | j | r | m | e | g |
|
|
awareness | browser | classification | clean desk | driveby | encryption | hoaxes | incident response | information | internet | internet of things | laptop | login | malware | password | phishing | protection | ransomware | security | social engineering | social media | two factor authentication | USB | userid |
|
Some of the puzzles that people list for the public
get indexed by the search engines
(like Google).
Some people find those puzzles and cannot figure out how to make a puzzle
of their own. So this page now has the navigation sidebar.
There are now buttons on the puzzle so that you can get a clean page,
in either HTML or PDF, that you can use your browser's print button
to print. The PDF format allows the web site to know how large a
printer page is, and the fonts are scaled to fill the page.
The PDF takes awhile to generate. Don't panic!
|