Find a word: Break the security code



1. access

2. alert

3. attack

4. authenticate

5. biometric

6. CERT

7. classified

8. Code Red

9. detection

10. encryption

11. filters

12. firewallv

13. flaws

14. halt

15. identity

16. intrusion

17. network

18. password

19. patch

20. policy

21. recovery

22. sensitive

23. sensors

24. shield

25. signature

26. terror

27. threat

28. weakness

Answer

Featured

  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.