cybersecurity Crossword Puzzles
TEMA 2: EKONOMI DIGITAL 2025-10-23
Across
- Istilah lain dari pembayaran tanpa uang tunai.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Salah satu contoh dompet digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Media sosial yang sering digunakan untuk promosi produk.
- Proses promosi produk melalui media sosial.
Down
- Pihak yang menjual barang atau jasa di internet.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Proses jual beli melalui internet.
- Singkatan dari Financial Technology.
- Teknologi penyimpanan data berbasis internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Istilah lain dari pembayaran tanpa uang tunai. • Salah satu contoh dompet digital di Indonesia. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
KeyW Crossword 2017-01-18
Across
- When at work, what must you always carry
- Applying statistical analysis to data which has a geographical or spatial aspect
- KeyW non-profit organization abbreviated
- KeyW's best location
- What is the name of our newsletter
- KeyW CEO
- Time sheet
- What is the surname of KeyW's founder
- What type of bird is our mascot
Down
- KeyW's colors
- What month was KeyW founded
- What is the name of our mascot
- Radio Detection and Ranging
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- Parrot Ball location
- How many miles connect Key West to Florida main land
- Which food truck offers the best cheese steaks
- What color is our KeyW van
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
science-and-technology 2 2023-11-25
Across
- Device that speeds up charged particles.
- The path of an object around a celestial body.
- Managing temperature and weather conditions.
- Computer-generated simulation of a three-dimensional environment.
- Design and construction of new biological parts.
- Device that converts hydrogen into electricity.
- Study of ionized gases (plasma).
Down
- Protection of computer systems from theft or damage.
- Altering genes in an organism's DNA.
- Relating to electric and magnetic fields.
- Elementary particle and a fundamental constituent of matter.
- Study of extremely low temperatures.
- Manipulation of matter on a molecular or atomic scale.
- Electromagnetic radiation with longer wavelengths than visible light.
- Long-term alteration in Earth's climate.
- Small rocky object orbiting the sun.
- Application of biological principles to medicine.
- Programs and applications for computers.
- Thread-like structure of DNA in the nucleus.
- Ability of machines to learn from data.
20 Clues: Study of ionized gases (plasma). • Altering genes in an organism's DNA. • Study of extremely low temperatures. • Small rocky object orbiting the sun. • Ability of machines to learn from data. • Device that speeds up charged particles. • Long-term alteration in Earth's climate. • Programs and applications for computers. • Relating to electric and magnetic fields. • ...
Technology Crossword 2024-05-29
Across
- AI
- a computer that works like a human brain
- a form of a monitarilly valuable item
- Something that is a threat to us non physically
- this is a watch or VR headset
- Something that can be invaded
- an orbit of artifical stars in a pattern
- a form of tourism that is very expensive and not many have a chance to go.
- Exploring the largest part of earth
- Advanced Computing
Down
- Finger print or face id
- a form of engineering
- A form of travel out of this world
- Threat of Unemployment
- Analysis of data
- Something seen as a toy for some but fly
- having people colonize a close planet
- Something almost everyone uses
- many people have these devices
- a way of making sure that you get what you need to get well
20 Clues: AI • Analysis of data • Advanced Computing • a form of engineering • Threat of Unemployment • Finger print or face id • this is a watch or VR headset • Something that can be invaded • Something almost everyone uses • many people have these devices • A form of travel out of this world • Exploring the largest part of earth • a form of a monitarilly valuable item • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
TTS 2025-04-15
Across
- Perlindungan hukum untuk identitas produk
- Scientist Analis data untuk pengambilan keputusan
- Perundungan melalui media digital
- Simbol penanda pencarian fleksibel pada mesin pencari
- Masakan Jawa Timur Contoh pencarian kuliner khas Jawa Timur
- Platform berbagi video terbesar di dunia
- Cipta Perlindungan hukum untuk karya kreatif
- Kebencian Ungkapan yang menghina dan merendahkan
- Simbol pengurang kata kunci dalam pencarian
- Penulis kode program komputer
- Platform berbagi foto dan video populer
- Lembaga pemerintah pengelola HAKI
Down
- Buatan" Penulisan untuk pencarian frasa spesifik
- Ideologi yang menganjurkan kekerasan
- Digital Pedoman moral dalam pembuatan konten digital
- Developer Pengembang dan pengelola situs web
- Analyst Pakar keamanan sistem komputer
- Budaya Tujuan penyebaran konten budaya
- Konten seksual yang eksplisit
- Informasi palsu yang tersebar luas
- Jaipong Contoh konten budaya Sunda di media digital
- Perlindungan hukum untuk inovasi
- Designer Perancang antarmuka pengguna
- Singkatan dari Hak Kekayaan Intelektual
- Operator logika untuk pencarian gabungan kata kunci
25 Clues: Konten seksual yang eksplisit • Penulis kode program komputer • Perlindungan hukum untuk inovasi • Perundungan melalui media digital • Lembaga pemerintah pengelola HAKI • Informasi palsu yang tersebar luas • Ideologi yang menganjurkan kekerasan • Designer Perancang antarmuka pengguna • Analyst Pakar keamanan sistem komputer • Budaya Tujuan penyebaran konten budaya • ...
Technology vocabulary 2025-09-03
Across
- Virtual reality, a 3D digital world.
- An electronic machine that processes information.
- Technology you can put on your body.
- A person who loves technology.
- To bring software to the newest version.
- Computers that can act and “think” like humans.
- A program used on a phone or computer.
- A small electronic device.
- A screen you can control by touching.
- To take a file from the internet.
- Wireless internet connection.
Down
- A picture of what’s on your screen.
- To look through websites or files.
- Someone who writes computer code.
- Protecting computers and data from attacks.
- To write words on a keyboard.
- To turn off and then back on again.
- To add a file to an email.
- A place or device that gives Wi-Fi access.
- To send a file to the internet.
- A portable computer.
21 Clues: A portable computer. • To add a file to an email. • A small electronic device. • To write words on a keyboard. • Wireless internet connection. • A person who loves technology. • To send a file to the internet. • Someone who writes computer code. • To take a file from the internet. • To look through websites or files. • A picture of what’s on your screen. • ...
Words In Eagle 101 I Learned 2025-10-07
Across
- Drug Abuse Resistance Education
- To stand up to something you believe in.
- Can happen to the lungs of people who smoke.
- Stress or worriness. A type of emotion.
- How to be a good citizen on the internet.
- An e-cigarette.
- The things you feel on the inside(Joy, sad,ect.)
- Mr. Rieck's favorite sports team.
- The act of having a bond with another person.
- A movie we watched in Eagle 101.
Down
- Security on electronic devices.
- We watch them every Friday to keep things on the happy side of life.
- An opioid and drug that messes with your body.
- Coloring or listening to music for a reset.
- A motivational speaker.
- A timer race Mr. Rieck uses.
- A fear of something (Mr. Rieck's is 67)
- Drugs such as vapes that have flavor.
- A type of drug.
- Someone who is outgoing and willing to work in a group.
20 Clues: An e-cigarette. • A type of drug. • A motivational speaker. • A timer race Mr. Rieck uses. • Security on electronic devices. • Drug Abuse Resistance Education • A movie we watched in Eagle 101. • Mr. Rieck's favorite sports team. • Drugs such as vapes that have flavor. • Stress or worriness. A type of emotion. • A fear of something (Mr. Rieck's is 67) • ...
test 2022-07-15
Across
- Music festival they attended -
- Michael proposed in ___ beach -
- European country michael lived in -
- How they met
- On the way to Big Sur they stopped at an ___ farm -
- Day of the week they attend life group -
- City of the music festival they attended -
- Basketball team michael supports -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Month they met -
- City they took their engagement photos -
- Sauce michael hates -
Down
- State michael was raised in -
- Industry sammi works in -
- Sammis favorite flowers -
- Sammis bridal shower was a ___ party -
- Brand of sammi’s car -
- Type of dance sammi did growing up -
- Destination of first plane ride together -
- Type of engineer Michael is -
- Year they met -
- Color of michaels bathroom before they painted it -
- Location of their first post together on IG -
- Engagement ring shape -
25 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • Basketball team michael supports - • ...
Cisco 2022-11-30
Across
- intentional tampering
- machine within a machine
- machine for printing text onto paper
- information non-consensually given to the public
- something on many screens
- output device that displays images
- place of sale
- official procedure
- common handheld device
- faster protocol
- thick rope of wire
- putting something into another forcefully
- an autonomous device
- device that often works with mice
- IO device that displays images
- IO device for computer
Down
- negative or not good
- our fearless leader
- slower protocol
- protection of systems
- to engineer
- company
- can be divided into vlans
- attack strategy
- connects networks
- our country
- a form of social engineering
- something often worn by humans
- IO device for computers
- a type of robot
- encoded message
- device
- aspect of human lift
- a type of person
34 Clues: device • company • to engineer • our country • place of sale • slower protocol • attack strategy • faster protocol • a type of robot • encoded message • a type of person • connects networks • official procedure • thick rope of wire • our fearless leader • negative or not good • an autonomous device • aspect of human lift • intentional tampering • protection of systems • common handheld device • ...
Crossword Puzzle 2023-12-12
Across
- Coordinated anti-terrorism effort
- Diplomatic negotiation process
- Mutual defense pact
- Emotional response to stress or danger
- Country with aggressive territorial claims in the West Philippine Sea
- Protection against cyber threats
- Manipulation of information to influence opinions
- Policies aimed at reducing gender-based disparities
- Targeting of adversary's decision-making processes
- Island in the West Philippine Sea claimed by multiple countries
- Localized peace talks with insurgent groups
Down
- Common mental health condition characterized by persistent sadness
- Act of risking one's life to save others
- Joint military exercises
- Replacement of old weaponry with newer, more advanced systems
- Primary fighter aircraft used by the Air Force
- Country's plan for protecting itself from external threats
- Large warship equipped for open-sea combat
- Strategy to address the root causes of insurgency
- International court ruling on the West Philippine Sea dispute
- Declaration of the government to end insurgency
21 Clues: Mutual defense pact • Joint military exercises • Diplomatic negotiation process • Protection against cyber threats • Coordinated anti-terrorism effort • Emotional response to stress or danger • Act of risking one's life to save others • Large warship equipped for open-sea combat • Localized peace talks with insurgent groups • Primary fighter aircraft used by the Air Force • ...
NEWSLETTER 2023-11-13
Across
- The activity, you do to get to places.
- Another word for young people....
- Ghana’s Winter.
- I want for Christmas is......
- The invisible line that divides the earth into two equal parts.
- Picture on social media.
- Your identity summarized onto one thing.
- Plans for the New Year.
- Program used to harm computers.
- Color associated with the New Year.
- MIDG end-of-year package for employees.
- Popular hangout zone in Accra.
- ....is responsible for the safety and manner on the internet and other connection.
Down
- Merry Christmas
- Baby Crocodile
- .....is the most showed movie during Christmas movie in Ghana.
- Margins ID Group is made up of four....
- .... flies when you’re having fun.
- Sits atop the Christmas tree.
- Pronto’s location.
- A machine that can be used to write, connect to the writer, the internet and play games.
- Identity theft is an example of...
- A letter sent on the internet.
- What makes you, you.
24 Clues: Baby Crocodile • Merry Christmas • Ghana’s Winter. • Pronto’s location. • What makes you, you. • Plans for the New Year. • Picture on social media. • I want for Christmas is...... • Sits atop the Christmas tree. • A letter sent on the internet. • Popular hangout zone in Accra. • Program used to harm computers. • Another word for young people.... • .... flies when you’re having fun. • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
Tugas Daring Yesika Intan Aurelia 2025-04-24
Across
- UI designer merancang tampilan?
- menyebarluaskan konten digital disebut?
- Hoaks termasuk dalam konten?
- Salah satu platform berbagi konten tulisan adalah?
- Orang yang merancang sistem jaringan komputer disebut?
- Search engine menggunakan apa untuk mengindeks data?
- HAKI melindungi karya cipta agar tidak?
- Profesi yang menjaga keamanan data disebut?
- Data analyst bertugas menganalisis?
- Salah satu situs validasi fakta di Indonesia adalah?
- YouTube digunakan untuk menyebarkan konten berupa?
- Fungsi utama search engine adalah untuk?
Down
- Validasi konten bisa dilakukan dengan cara?
- Algoritma pada search engine membantu menentukan?
- Konten digital bisa berupa teks, gambar, video, dan ?
- Contoh selain Google adalah?
- Programmer bertugas membuat?
- Hak cipta diberikan kepada?
- Konten negatif dapat berdampak pada?
- Mesin pencari paling populer saat ini adalah?
- HAKI meliputi hak cipta dan?
- Contoh karya yang dilindungi HAKI adalah?
- Ciri konten valid adalah mencantumkan?
- Pelanggaran HAKI dapat dikenai?
- Software pengolah gambar adalah?
25 Clues: Hak cipta diberikan kepada? • Contoh selain Google adalah? • Hoaks termasuk dalam konten? • Programmer bertugas membuat? • HAKI meliputi hak cipta dan? • UI designer merancang tampilan? • Pelanggaran HAKI dapat dikenai? • Software pengolah gambar adalah? • Data analyst bertugas menganalisis? • Konten negatif dapat berdampak pada? • Ciri konten valid adalah mencantumkan? • ...
New Pork Rinds Crossword Puzzle 2025-08-20
Across
- Called
- Quinoa, for example
- The coolest person ever
- Strange
- Escape from prison
- Disney dragon sidekick
- Best when solving a crossword puzzle
- A certain town clerk always says, "You're so ___."
- One may fall asleep at work if they have it
- Sinatra or hot dog
- Sport considered America's Greatest Pasttime
- Slang for guitar
- Children's bathtub toy
- Inspirational words
- Athletes who like to club
Down
- been hacked, Message concerning cybersecurity
- Outdated childish insult
- Roundabout
- frequent party guest
- "Your room is a ____"
- Tip over
- Amount that you can order in
- "___ goes his name-o"
- Before "Engine" and after "Top"
- cartoon bear who favors honey
- Super
- powerful wizard
- Gymnastics movement or secure storage
- Fried chicken state, in short
- "Broaden your ____"
- Assumes
- Pull aggressively
- Sun movement
- Pokemon trainer
34 Clues: Super • Called • Strange • Assumes • Tip over • Roundabout • Sun movement • powerful wizard • Pokemon trainer • Slang for guitar • Pull aggressively • Escape from prison • Sinatra or hot dog • Quinoa, for example • "Broaden your ____" • Inspirational words • frequent party guest • "Your room is a ____" • "___ goes his name-o" • Disney dragon sidekick • Children's bathtub toy • The coolest person ever • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Contoh aplikasi fintech di Indonesia adalah
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Perusahaan baru yang berbasis teknologi disebut
- → Masa depan ekonomi digital bergantung pada literasi
- → Pemasaran melalui media sosial disebut
- → Berjualan melalui marketplace online termasuk kegiatan
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
- → Fintech merupakan singkatan dari
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Kecerdasan buatan dikenal juga dengan istilah
- → Transaksi keuangan secara online disebut
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Keamanan transaksi online dikenal dengan istilah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Risiko ekonomi digital adalah kebocoran
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
TEMA 2 PERKEMBANGAN EKONOMI DIGITAL 2025-10-27
Across
- Istilah lain dari pembayaran tanpa uang tunai.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Salah satu contoh dompet digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Media sosial yang sering digunakan untuk promosi produk.
- Proses promosi produk melalui media sosial.
Down
- Pihak yang menjual barang atau jasa di internet.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Proses jual beli melalui internet.
- Singkatan dari Financial Technology.
- Teknologi penyimpanan data berbasis internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Istilah lain dari pembayaran tanpa uang tunai. • Salah satu contoh dompet digital di Indonesia. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
TEMA 02 : EKONOMI DIGITAL 2025-10-23
Across
- Proses promosi produk melalui media sosial.
- Media sosial yang sering digunakan untuk promosi produk.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Pihak yang menjual barang atau jasa di internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Teknologi penyimpanan data berbasis internet.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi
- Istilah lain dari pembayaran tanpa uang tunai.
Down
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Singkatan dari Financial Technology.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Tempat di mana penjual dan pembeli bertemu secara online.
- Salah satu contoh dompet digital di Indonesia.
- Proses jual beli melalui internet.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Salah satu contoh dompet digital di Indonesia. • Istilah lain dari pembayaran tanpa uang tunai. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
WORDS IN EAGLE 101 2025-10-07
Across
- An e-cigarette.
- Someone who is outgoing and willing to work in a group.
- Coloring or listening to music for a reset.
- We watch them every Friday to keep things on the happy side of life.
- A timer race Mr. Rieck uses.
- Can happen to the lungs of people who smoke.
- The things you feel on the inside(Joy, sad,ect.)
- A motivational speaker.
Down
- Drug Abuse Resistance Education
- Drugs such as vapes that have flavor.
- Stress or worriness. A type of emotion.
- How to be a good citizen on the internet.
- Security on electronic devices.
- A movie we watched in Eagle 101.
- An opioid and drug that messes with your body.
- The act of having a bond with another person.
- To stand up to something you believe in.
- A type of drug.
- A fear of something (Mr. Rieck's is 67)
- Mr. Rieck's favorite sports team.
20 Clues: An e-cigarette. • A type of drug. • A motivational speaker. • A timer race Mr. Rieck uses. • Drug Abuse Resistance Education • Security on electronic devices. • A movie we watched in Eagle 101. • Mr. Rieck's favorite sports team. • Drugs such as vapes that have flavor. • Stress or worriness. A type of emotion. • A fear of something (Mr. Rieck's is 67) • ...
Mr Robot 2022-11-15
Across
- prevent attacks by blocking malicious traffic
- unwanted files or programs that can cause harm to a computer
- private information being kept secret
- people who seek to exploit weaknesses in software
- a set of characters that allows access to a system
- software designed to detect and destroy viruses
Down
- flaws in software
- the art of protecting networks, devices, and data from attacks
- type of email use to steal information about you
9 Clues: flaws in software • private information being kept secret • prevent attacks by blocking malicious traffic • software designed to detect and destroy viruses • type of email use to steal information about you • people who seek to exploit weaknesses in software • a set of characters that allows access to a system • ...
CWSI Cyber CrossWord 2025-03-25
Across
- Foundation of both cybersecurity and team collaboration
- Common attack vector for phishing and scams
- What you should never do with suspicious links or attachments
- A vulnerability in software waiting to be exploited
- Guidelines that govern secure workplace behavior
Down
- A physical or digital object used for multi-factor authentication
- What hackers see unaware employees as
- A potential danger that exploits system vulnerabilities
- The chance that a threat will exploit a vulnerability
9 Clues: What hackers see unaware employees as • Common attack vector for phishing and scams • Guidelines that govern secure workplace behavior • A vulnerability in software waiting to be exploited • The chance that a threat will exploit a vulnerability • Foundation of both cybersecurity and team collaboration • A potential danger that exploits system vulnerabilities • ...
End Users and Cybersecurity 2023-10-13
Across
- 85% of people posting puppy photos are trying to _____ you
- _____ are connected to the internet
- ensure that the correct information is relayed to the right destination across the network
- _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
- network of connections between people, things, data, and processes
- shortened URLs
Down
- variant of malware
- person who uses IT products or services
- occurs when an end user receives an illegitimate message or email
- providing education to end users can mitigate cybersecurity _____
- almost every employee has access to this
- help protect your internet connection and privacy online
12 Clues: shortened URLs • variant of malware • _____ are connected to the internet • person who uses IT products or services • almost every employee has access to this • help protect your internet connection and privacy online • 85% of people posting puppy photos are trying to _____ you • occurs when an end user receives an illegitimate message or email • ...
Compliance Week - Day 1 Puzzle 2022-10-09
Across
- Intimidation of an individual after reporting an allegation of misconduct.
- When PHI is exposed, a _______ of the patient's privacy has been committed.
- Never share your ________ with anyone.
- The ____ is an anonymous way to report a compliance concern. (707.825.1027)
- Health insurance portability & accountability act.
Down
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
- Computer security
- It is our job to _______ our clients health record.
- Verify this for every client every time (3 words)
- An official inspection of an individual's or organization's accounts.
- Protected health information.
11 Clues: Computer security • Protected health information. • Never share your ________ with anyone. • Verify this for every client every time (3 words) • Health insurance portability & accountability act. • It is our job to _______ our clients health record. • An official inspection of an individual's or organization's accounts. • ...
1 2025-05-22
Across
- – A program or practical use of something in real life
- – Something given in recognition of excellence or achievement
- – Something given or added to help achieve a goal
- – A result gained by effort or skill
Down
- – Protection of computer systems and networks from attacks
- – The use or study of computers and technology
- – An area of study, activity, or interest
- – A fundamental element or basis of something
- – The strong effect or influence of something
- – A reward given to someone for winning or achieving something
- – An organized collection of information stored electronically
- – Something handed down from the past
12 Clues: – A result gained by effort or skill • – Something handed down from the past • – An area of study, activity, or interest • – A fundamental element or basis of something • – The strong effect or influence of something • – The use or study of computers and technology • – Something given or added to help achieve a goal • ...
ch1-2-3 2021-09-25
Across
- quality of dealing with ideas rather than events
- malicious software
- track online activity and capture data
- study of what is right or wrong in human conduct
- a way to discover and fix a problem in a system
- process to protect individual and organization
Down
- the beliefs of the individuals or groups as to what is wrong and right
- replicates itself independently in a network
- automatically delivers advertisements
- holds a computer system captive until payment is made
- the degree to which something is able or fit to be used
- usually spreads by USB drives, emails or network shares
12 Clues: malicious software • automatically delivers advertisements • track online activity and capture data • replicates itself independently in a network • process to protect individual and organization • a way to discover and fix a problem in a system • quality of dealing with ideas rather than events • study of what is right or wrong in human conduct • ...
Love Data Week Crossword 2025-01-24
Across
- Acronym for the Office of the Chief Information Officer
- The process of making uniform or homogeneous
- Examination of data
- GNB’s Chief Information Officer
- The protection of computers and networks against unauthorised access and sabotage
Down
- Indigenous Data ___________ is the ability for Indigenous peoples, communities, and Nations to participate, steward, and control data that is created with or about themselves
- VPN’s offering
- Info that gives info about other info?
- Secrecy and fidelity one cannot break
- Hopephully phutile ephphort to dishonestly obtain sensitive inphormation
- Unauthorized access to personal information
- Perform very well in data analysis?
12 Clues: VPN’s offering • Examination of data • GNB’s Chief Information Officer • Perform very well in data analysis? • Secrecy and fidelity one cannot break • Info that gives info about other info? • Unauthorized access to personal information • The process of making uniform or homogeneous • Acronym for the Office of the Chief Information Officer • ...
Shifting Security 2026-02-19
Across
- The school the introduced the theory of securitization
- Realism is centered on territoy soverignity and ___ defense
- Security is not only about real world but includes the internet
- A form of security that does not focus on people but the society (climate change).
- The theory for traditional security
Down
- Conveys the notion that security is more than just state but should involve individuals
- Means continously changing
- The question that we are presenting on.
- Traditional security is _______
- The persons who stated that security must cross multiple sector
- Defined the concept of human security
- Security shifted from traditional to ______________
12 Clues: Means continously changing • Traditional security is _______ • The theory for traditional security • Defined the concept of human security • The question that we are presenting on. • Security shifted from traditional to ______________ • The school the introduced the theory of securitization • Realism is centered on territoy soverignity and ___ defense • ...
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
- fundamental component of ipsec virtual private networks (vpn).
- actual barriers deployed to prevent direct contact with systems.
- way to store and transmit data so only the intended recipient can read or process it.
- to encrypt and decrypt messages.
- has a fixed block size of 128, 192 or 256 bits.
- use one key to encrypt data and a different key to decrypt data.
- implementing cryptography into a web browser.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
- hardware and software solutions used to manage access resources and systems.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- science of making and breaking secret codes.
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- a protocol that provides a secure remote access connection to network devices.
15 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • actual barriers deployed to prevent direct contact with systems. • ...
Cybersecurity Awareness Month - 2024 2024-10-09
Across
- - When somebody sends an e-mail with a link to a bogus website it is called
- - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- - Protecting the data against unauthorized access or disclosure is
- - Its a type of malware that disguises itself as legitimate code.
- Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- - This can slow down your computer AND watch everywhere you go on the internet
- - Data that is used to Identify specific individual
- - Impact of Threat exploiting a vulnerability is known as
Down
- - The control that you have over your personal information and how that information is used
- - A globally accepted and recognized standard for cyber security is
- - Three principles of ISMS are Confidentiality, ____ and Availability
- - Critical security component that determines what resources a user can access and what actions they can perform
- - An event that impacts the organization and requires a response and recovery.
- -PII Bank information falls under which category of data classification.
- - Unique sets of characters used to authenticate user identity and protect personal data or system access.
15 Clues: - Data that is used to Identify specific individual • - Impact of Threat exploiting a vulnerability is known as • - Its a type of malware that disguises itself as legitimate code. • - Protecting the data against unauthorized access or disclosure is • - A globally accepted and recognized standard for cyber security is • ...
Prestige Cybersecurity Awareness Month 2025-10-16
Across
- A network security system that monitors and controls incoming and outgoing traffic
- A type of cyber attack that tricks users into revealing personal information
- The principle of ensuring data is not altered or tampered with
- A software update that fixes security vulnerabilities
- Malware that locks data and demands payment for release
- A file or program that appears harmless but contains malicious code
- Software designed to disrupt, damage, or gain unauthorized access
- The process of converting data into a coded form to prevent unauthorized access
Down
- The practice of hiding messages so only the intended recipient can read them
- Software that secretly gathers user information
- A person who gains unauthorized access to systems for malicious purposes
- An extra layer of security requiring two forms of identification
- A secret word or phrase used to gain access
- A fake website or email designed to look legitimate
- A service that encrypts your internet connection for privacy
15 Clues: A secret word or phrase used to gain access • Software that secretly gathers user information • A fake website or email designed to look legitimate • A software update that fixes security vulnerabilities • Malware that locks data and demands payment for release • A service that encrypts your internet connection for privacy • ...
ACC 2022-09-27
Across
- We waive any right of recovery we may have
- platform used to log calls
- ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
- our ABI know it all
- are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
- contains a collection of additional coverages and increased limits for certain coverages
- an inspection required in the state of NY
- optional coverage maximizes limits
- provides coverages at no cost
- Option for liability limit
- script used to answer a call
11 Clues: our ABI know it all • platform used to log calls • Option for liability limit • script used to answer a call • provides coverages at no cost • optional coverage maximizes limits • an inspection required in the state of NY • We waive any right of recovery we may have • contains a collection of additional coverages and increased limits for certain coverages • ...
ict 2024-07-02
Across
- Number system with two digits, 0 and 1, used by computers.
- Security system that monitors and controls network traffic.
- Process of converting information into a secure form.
- Organized collection of data.
- Intelligence: Simulation of human intelligence by machines.
Down
- Device connected to a computer (e.g., printer, mouse).
- Technique of creating virtual versions of computer resources.
- Protection of computer systems from digital attacks
- Finding and fixing errors or bugs in software code.
- Step-by-step procedure for solving a problem.
- System: Software that manages computer hardware and software resources.
11 Clues: Organized collection of data. • Step-by-step procedure for solving a problem. • Protection of computer systems from digital attacks • Finding and fixing errors or bugs in software code. • Process of converting information into a secure form. • Device connected to a computer (e.g., printer, mouse). • Number system with two digits, 0 and 1, used by computers. • ...
Anson Khoo Kai Loon 8G 2023-01-19
Across
- People use this to study online during the pandemic.
- To protect others from looking in your phone.
- protects you from networks & programs digital attacks.
- We can use ________ to communicate with others all around the world.
- You can send a ______ to your friends to play with.
Down
- A website that people use to buy something online.
- A website that people use to search.
- You need to press _______ to shut your computer/laptop.
- Made by Mark Zuckerberg.
- Its use in almost all electronic devices.
- An old website that people use to search something.
11 Clues: Made by Mark Zuckerberg. • A website that people use to search. • Its use in almost all electronic devices. • To protect others from looking in your phone. • A website that people use to buy something online. • An old website that people use to search something. • You can send a ______ to your friends to play with. • People use this to study online during the pandemic. • ...
Internet Crossword 2024-12-04
Across
- the global computer system that interconnects technology
- a unique form of personal data which website ask for
- a platform where resources are managed on a a computer
- the language of the computer which are performed on a computer
- the delivery of IT resources throughout the Internet
- the programs that build a computer
Down
- the physical connection of computers together
- a barricade that monitors information going in or out
- the protection of computers, data, and the Internet
- the amount of data your computer can handle
- a coding error on a computer
11 Clues: a coding error on a computer • the programs that build a computer • the amount of data your computer can handle • the physical connection of computers together • the protection of computers, data, and the Internet • a unique form of personal data which website ask for • the delivery of IT resources throughout the Internet • ...
Logiscool v3 2025-11-11
Across
- What you type to tell AI what to do
- Describes vehicles that can drive themselves
- Protecting computers and data from harm
- Doing the right thing in technology and AI
Down
- A programming language for coders
- A virtual world where people can meet and play
- A computer program that chats like a person
- Co-founder of DeepMind and leader in AI innovation
- Flying robots used for photos, deliveries, or rescue
- Teen inventor who created tech to fight cyberbullying (Gitanjali ___)
- Smart systems that can think and learn like humans
11 Clues: A programming language for coders • What you type to tell AI what to do • Protecting computers and data from harm • Doing the right thing in technology and AI • A computer program that chats like a person • Describes vehicles that can drive themselves • A virtual world where people can meet and play • Co-founder of DeepMind and leader in AI innovation • ...
Rush Health Cybersecurity 2020-02-24
Across
- Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
- Type of attack to steal username and password
- Type of unwanted emails
- a standalone malware computer program that replicates itself in order to spread to other computers
- Someone that does harm to a computer
- Scrambling information so that only those with the keys can read it
Down
- Type of malware that requires a ransom to remove the malware.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- Something that can harm your computer
10 Clues: Type of unwanted emails • Someone that does harm to a computer • Something that can harm your computer • Type of attack to steal username and password • Type of malware that requires a ransom to remove the malware. • Scrambling information so that only those with the keys can read it • ...
All Things Cybersecurity 2021-03-31
Across
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Small files that Web sites put on your computer hard disk drive when you first visit.
- Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
- A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- An attempt by hackers to damage or destroy a computer network or system.
- A local or restricted communications network, especially a private network created using World Wide Web software.
10 Clues: An attempt by hackers to damage or destroy a computer network or system. • Someone who seeks and exploits weaknesses in a computer system or computer network. • Small files that Web sites put on your computer hard disk drive when you first visit. • ...
Cybersecurity crossword puzzle 2023-12-14
Across
- Software used to protect against viruses and malware.
- A program that replicates itself and spreads to other computers.
- An organization that identifies security flaws in software.
- An encrypted connection between a web browser and a server.
- A technique to deceive individuals into providing sensitive information.
- A type of attack that floods a network to disrupt its operation.
Down
- A system that verifies a user's identity through a unique physical characteristic.
- A secret code that only authorized parties should be able to read.
- The practice of keeping software up to date to protect against vulnerabilities.
- A sequence of characters used to authenticate identity or access.
10 Clues: Software used to protect against viruses and malware. • An organization that identifies security flaws in software. • An encrypted connection between a web browser and a server. • A program that replicates itself and spreads to other computers. • A type of attack that floods a network to disrupt its operation. • ...
Basic cybersecurity terms 2024-07-29
Across
- An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A security process that verifies the identity of a user or device attempting to access a system.
- A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
10 Clues: A security process that verifies the identity of a user or device attempting to access a system. • Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity Basics #1 2024-09-17
Across
- The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
- Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
- Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
- Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
- Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
- Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
- A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
- A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
- To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
- To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.
10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen. • To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn. • Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only. • ...
Compliance And Cybersecurity 2024-12-23
Across
- The process of confirming the identity of a user or device
- A malicious software program that encrypts files for ransom
- A set of rules or guidelines adopted by an organization.
- Do not share a password with members
Down
- A defensive system protecting networks from cyberattacks
- The act of adhering to laws, regulations, and standards.
- What does the HIPAA Privacy Rule protect?
- The deliberate act of stealing personal information online
- Data that is unreadable without decryption
- Rules to guard patient data
10 Clues: Rules to guard patient data • Do not share a password with members • What does the HIPAA Privacy Rule protect? • Data that is unreadable without decryption • A defensive system protecting networks from cyberattacks • The act of adhering to laws, regulations, and standards. • A set of rules or guidelines adopted by an organization. • ...
CYBERSECURITY CROSSWORD PUZZLE 2025-08-15
Across
- The process of converting data into a coded format to prevent unauthorized access.
- Malicious software designed to damage or disrupt systems.
- A network security device that monitors and filters incoming and outgoing traffic.
- A cyberattack method that tricks users into revealing sensitive information.
- A copy of data kept in case the original is lost or damaged.
Down
- Software that secretly monitors and collects user information.
- Secure connection method over the internet, often used for privacy.
- A self-replicating program that infects files or systems.
- An update to fix software vulnerabilities.
- A secret string used for authentication.
10 Clues: A secret string used for authentication. • An update to fix software vulnerabilities. • Malicious software designed to damage or disrupt systems. • A self-replicating program that infects files or systems. • A copy of data kept in case the original is lost or damaged. • Software that secretly monitors and collects user information. • ...
Cybersecurity Amelie BTS1 2025-12-02
Across
- A group of Internet-connected devices, each of which runs one or more bots.
- Completely Automated Public Turing test to tell Computers and Humans Apart.
- information that is officially secret.
Down
- An occasion when private information can be seen by people who should not be able to see it.
- deriving from or relating to a previously unknown vulnerability to attack in some software.
- (Acronym) - set of tools and processes designed to help organizations detect, prevent, and manage the unauthorized access, transmission, or leakage of sensitive data security strategy.
- (Acronym) - in the US, a law that states the level of care that employer health insurance plans must provide and the rules for the exchange and protection of personal medical information.
- (Acronym)- The use of two or more different types of proof of your identity when you are doing something online.
- Programs that surreptitiously monitor and report the actions of a computer user.
- theft the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
10 Clues: information that is officially secret. • A group of Internet-connected devices, each of which runs one or more bots. • Completely Automated Public Turing test to tell Computers and Humans Apart. • Programs that surreptitiously monitor and report the actions of a computer user. • ...
TBP FL-D 10/23 2023-10-23
Across
- Type of current produced by solar panels.
- The c in E=mc^2.
- Amount of heat required to raise temperature by 1 degree Celsius.
Down
- Type of engineer responsible for harnessing electricity.
- This cat may or may not be alive.
- Building with the most popular bathroom on UCF campus.
- Plastic polymer that can be recycled and reformed into another shape
- The cybersecurity team that works to defend an organization.
- Support structure that uses triangles.
9 Clues: The c in E=mc^2. • This cat may or may not be alive. • Support structure that uses triangles. • Type of current produced by solar panels. • Building with the most popular bathroom on UCF campus. • Type of engineer responsible for harnessing electricity. • The cybersecurity team that works to defend an organization. • ...
SBU TBP Crossword 10/5 2022-10-04
Across
- Species with the most genetic similarity to humans.
- Series of educational lectures hosted by Tau Beta Pi.
- Protection against unauthorized electronic data access.
- Process of converting data into a code for protection.
Down
- Mathematical function without "in-between" values.
- Longest bone in the human body.
- A structure consisting of beams connected in triangular shapes.
- ____'s constant gives the relationship between the energy and frequency of a photon.
- Third most common element in the universe.
9 Clues: Longest bone in the human body. • Third most common element in the universe. • Mathematical function without "in-between" values. • Species with the most genetic similarity to humans. • Series of educational lectures hosted by Tau Beta Pi. • Process of converting data into a code for protection. • Protection against unauthorized electronic data access. • ...
30 2023-06-06
Across
- - Online storage and computing services
- - Uniform Resource Locator, the address of a web page
- - Measures to protect computer systems and data from digital threats
- - Buying and selling goods or services online
- - Component that stores electrical energy
- - Conductive material for transmitting electricity
- - Device that changes the voltage of an electrical current
Down
- - Device that stores and provides electrical energy
- - Electrical socket for connecting devices to the power supply
- - Safety device that breaks the circuit when current exceeds a certain level
- - Complete path for electrical current
- - Device used to control the flow of electrical current
- - Component that restricts the flow of electricity
13 Clues: - Complete path for electrical current • - Online storage and computing services • - Component that stores electrical energy • - Buying and selling goods or services online • - Component that restricts the flow of electricity • - Conductive material for transmitting electricity • - Device that stores and provides electrical energy • ...
Cybersecurity Decoded 2 2020-07-30
10 Clues: childhood game • the iron giant • Not canned food • Troy's downfall • type of cleanliness • sugar comes in these • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses • Dr's are known to have the messiest ones
Cybersecurity crossword puzzle 2023-12-14
Across
- A technique to deceive individuals into providing sensitive information.
- Software used to protect against viruses and malware.
- A sequence of characters used to authenticate identity or access.
- A program that replicates itself and spreads to other computers.
- An encrypted connection between a web browser and a server.
Down
- The practice of keeping software up to date to protect against vulnerabilities.
- A system that verifies a user's identity through a unique physical characteristic.
- A secret code that only authorized parties should be able to read.
- A type of attack that floods a network to disrupt its operation.
- An organization that identifies security flaws in software.
10 Clues: Software used to protect against viruses and malware. • An organization that identifies security flaws in software. • An encrypted connection between a web browser and a server. • A type of attack that floods a network to disrupt its operation. • A program that replicates itself and spreads to other computers. • ...
Cybersecurity e I.A. 2024-05-23
Across
- riconoscimento online
- parola d'accesso
- "pescare" dati finanziari e codici di accesso di un utente
- veniva definito "virus per computer"
- attività criminale tramite dispositivi digitali
Down
- anche detto Anti-Malware
- Tra LAN e WAN
- tratta di scritture nascoste
- punto debole di un sistema
- manovra offensiva contro sistemi informatici
10 Clues: Tra LAN e WAN • parola d'accesso • riconoscimento online • anche detto Anti-Malware • punto debole di un sistema • tratta di scritture nascoste • veniva definito "virus per computer" • manovra offensiva contro sistemi informatici • attività criminale tramite dispositivi digitali • "pescare" dati finanziari e codici di accesso di un utente
Cybersecurity Intro Vocabulary 2023-09-07
Across
- the avenue or path the hacker uses to commit the attack
- usually operates outside the law
- a hacker who is generally ethical and law-abiding.
- the act of circumventing or breaking past security boundaries.
Down
- process of protecting a system against unintended or malicious changes or use
- a malicious software code that is unleashed and attempts to perform its destructive content
- an attempt to steal, damage, or destroy data or a computer system
- a person who engages in hacking
- They do no harm, but they don't ask permission
- hacking into a phone system
10 Clues: hacking into a phone system • a person who engages in hacking • usually operates outside the law • They do no harm, but they don't ask permission • a hacker who is generally ethical and law-abiding. • the avenue or path the hacker uses to commit the attack • the act of circumventing or breaking past security boundaries. • ...
Cybersecurity Awareness Puzzle 2023-09-20
Across
- ______ is a type of phishing that uses voice calls to manipulate a target.
- Type of malware that threatens to expose information unless a payment is made.
- Cyber defense agency that is hosting National Cybersecurity Awareness Month.
- Social engineering tactic that research is done on the victim to personalize the attack.
- Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
- A new social engineering attack involves QR codes and is a form of a *ishing attacks.
- According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
- Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
- A ________ manager is best the way to create and maintain strong passwords.
- In 2023, this brand name was abused the most in phishing attacks.
10 Clues: In 2023, this brand name was abused the most in phishing attacks. • ______ is a type of phishing that uses voice calls to manipulate a target. • A ________ manager is best the way to create and maintain strong passwords. • Cyber defense agency that is hosting National Cybersecurity Awareness Month. • ...
Key Cybersecurity Vocabulary 2025-07-10
Across
- Tools that collect and analyze security data to detect threats
- Detects and blocks suspicious activities in real time
- Keeping systems up to date with software fixes to close security hole
- A network of infected computers controlled by an attacker, often used for DDoS
Down
- Tricking people into revealing confidential information
- Monitors network traffic for suspicious activity and alerts administrators
- Probing a system for open ports to find possible vulnerabilities
- A fake communication used to trick users into giving up sensitive data
- Requires two methods to verify a user’s identity
- Verifying the identity of a user, device, or process before allowing access
10 Clues: Requires two methods to verify a user’s identity • Detects and blocks suspicious activities in real time • Tricking people into revealing confidential information • Tools that collect and analyze security data to detect threats • Probing a system for open ports to find possible vulnerabilities • ...
IT Cybersecurity terms 2025-08-28
Across
- Regular software updates to fix vulnerabilities
- Extra step beyond a password
- Do this when you leave your desk
- Always create a copy of important files
- Encrypts your connection on public Wi-Fi
- Fake message trying to steal information
Down
- Turn the device off and on to fix issues
- Strongest defense is user awareness
- Protect files or drives from unauthorized access
- Never share this secret login credential
10 Clues: Extra step beyond a password • Do this when you leave your desk • Strongest defense is user awareness • Always create a copy of important files • Turn the device off and on to fix issues • Never share this secret login credential • Encrypts your connection on public Wi-Fi • Fake message trying to steal information • Regular software updates to fix vulnerabilities • ...
Computer Concepts 2025-11-18
Across
- software that detects and removes harmful programs
- images, visuals, and video are processed by a ___ processing unit
- protection of computers, networks, and data from attacks
- number system made of 0s and 1s
- the main circuit board that connects all components
- short-term working space used by a computer, also called RAM
- security tool that blocks unwanted network traffic
Down
- the screen that shows images and text
- scrambling data so only authorised users can read it
- number system based on 10
- the ___ processing unit is where calculations are performed
- scam where someone is tricked into giving personal information
- harmful software designed to damage or steal information
13 Clues: number system based on 10 • number system made of 0s and 1s • the screen that shows images and text • software that detects and removes harmful programs • security tool that blocks unwanted network traffic • the main circuit board that connects all components • scrambling data so only authorised users can read it • ...
Provalus Crossword 2025-09-30
Across
- The one medication on the list that is an anti-arrythmic
- Which is the insurance plan that covers low-income individuals?
- Which Aux code is used for lunch?
- The keyboard shortcut for "select all"
- The Medicare part that covers hospital visits
- The protection of digital data
- How many folders deep can you go in OneDrive?
Down
- Which is the insurance plan that covers individuals above 65?
- Disregarding concerns
- How many days long is the probation period?
- How many times you should say a customer's name in a phone call
- What Citrix is
- The components of active listening are attention and ____
13 Clues: What Citrix is • Disregarding concerns • The protection of digital data • Which Aux code is used for lunch? • The keyboard shortcut for "select all" • How many days long is the probation period? • The Medicare part that covers hospital visits • How many folders deep can you go in OneDrive? • The one medication on the list that is an anti-arrythmic • ...
Introduction to Cybersecurity 2021-07-13
Across
- SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- MALICIOUS SOFTWARE.
Down
- AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
- SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
- COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
10 Clues: MALICIOUS SOFTWARE. • A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE • SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE. • MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID. • ...
Introduction to Cybersecurity 2021-07-13
Across
- COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- MALICIOUS SOFTWARE.
- SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
- AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
- SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
10 Clues: MALICIOUS SOFTWARE. • A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE • SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE. • SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES. • ...
Cybersecurity Crossword Puzzle 2023-05-25
Across
- Term for sexually explicit material available on the internet
- Software designs to damage or gain unauthorized access to a computer system
- Act of sending deceptive emails to trick individuals
- Every aspect of protecting an organization and its employees and assets against cyber threats
- Process of gaining unauthorized access to computer systems
Down
- One of the internet abuse effects for teenagers
- Act of deliberately using digital communication to harass or intimidate someone
- Software designed to protect against malicious software
- Practice of protecting information by converting it into a secret code
- A secret word or phrase that must be used to gain admission
10 Clues: One of the internet abuse effects for teenagers • Act of sending deceptive emails to trick individuals • Software designed to protect against malicious software • Process of gaining unauthorized access to computer systems • A secret word or phrase that must be used to gain admission • Term for sexually explicit material available on the internet • ...
Cybersecurity Week 1 2021-10-05
Across
- Short for malicious software designed to obtain information from a computer without the user's consent
- Protection of information assets within internetworked information systems
- Ensures the timely and reliable access and use of information systems
- Full use of a vulnerability for the benefit of an attacker
Down
- Protection of information from authorized access and disclosure
- A protected string of characters that authenticate a computer user to a system
- the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
- The protection of information from unauthorized modification
- A system or combination of systems that enforces a boundary between two or more networks
- An individual who attempts to gain unauthorized access to a computer system
10 Clues: Full use of a vulnerability for the benefit of an attacker • The protection of information from unauthorized modification • Protection of information from authorized access and disclosure • Ensures the timely and reliable access and use of information systems • Protection of information assets within internetworked information systems • ...
Cybersecurity Hex Crossword 2023-11-03
10 Clues: 46 55 4E • 4D 41 54 48 • 54 45 53 54 • 4C 49 46 45 • 43 4C 41 53 53 • 43 59 42 45 52 • 50 48 4F 4E 45 • 53 43 48 4F 4F 4C • 4C 41 50 54 4F 50 0A • 43 52 4F 53 53 57 4F 52 44
TPWD Cybersecurity Awareness 2024-10-08
Across
- A fake email designed to trick users into giving up personal information
- A way to verify a person's identity online
- A malicious software designed to harm a computer
- A software update that fixes vulnerabilities in a program
- Software that blocks harmful content from reaching your computer
Down
- A security breach that involves unauthorized access to data
- A security feature that requires more than one form of verification
- A network of infected computers controlled by a hacker
- The practice of protecting information from unauthorized access
- A set of guidelines for handling sensitive data
10 Clues: A way to verify a person's identity online • A set of guidelines for handling sensitive data • A malicious software designed to harm a computer • A network of infected computers controlled by a hacker • A software update that fixes vulnerabilities in a program • A security breach that involves unauthorized access to data • ...
Foundations of Cybersecurity 2024-11-20
Across
- This device inspects and filters network traffic
- the process of converting data into a code
- the process of verifying an identity before granting access
- the process of encoding information so that only the person that the message was intended for can read it
Down
- the practice of sending fake emails
- a network of compromised computers that are controlled by a single attacker
- a weakness within a computer system
- software that is designed to disrupt or damage access to a computer
- a type of malicious software that secretly gathers a user's personal data
- a type of malware that encrypts a victim's files or locks their device, and then demands payment
10 Clues: the practice of sending fake emails • a weakness within a computer system • the process of converting data into a code • This device inspects and filters network traffic • the process of verifying an identity before granting access • software that is designed to disrupt or damage access to a computer • ...
technolgy 2024-12-20
Across
- Protecting digital information from threats.
- An online community for connecting with others.
- A person skilled in technology.
- A computer that provides data to other computers.
- Someone very interested in computers.
- A software used to access websites.
- To transfer a file from the internet to your device.
- To create an account on a website or app.
- Abbreviation for Artificial Intelligence.
Down
- Software that is free to use.
- Smart devices worn on the body, like fitness trackers.
- MEDIA Online platforms for sharing content and communication.
- HOTSPOT A location where wireless internet is available.
- PROVIDER A company that provides internet access.
- To transfer a file from your device to the internet.
- A computer-generated immersive experience.
- To log into an account.
17 Clues: To log into an account. • Software that is free to use. • A person skilled in technology. • A software used to access websites. • Someone very interested in computers. • To create an account on a website or app. • Abbreviation for Artificial Intelligence. • A computer-generated immersive experience. • Protecting digital information from threats. • ...
Info - security 2017-11-27
Across
- be attentive
- lure someone
- name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- protect networks, computers, programs and data from attack
- should not be shared
- monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- designed to detect and destroy computer viruses
- exploit weaknesses to gain access
- malicious software designed to block access to a computer system until a sum of money is paid.
- protects personal data published via the Internet
10 Clues: be attentive • lure someone • should not be shared • exploit weaknesses to gain access • designed to detect and destroy computer viruses • protects personal data published via the Internet • protect networks, computers, programs and data from attack • malicious software designed to block access to a computer system until a sum of money is paid. • ...
Profesi dan peluang usaha di bidang tkjt 2023-11-17
Across
- seseorang yang ahli dalam membuat animasi
- seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
- DBA termasuk singkatan dari
- bentuk perlindungan terhadap sistem yang terhubung ke internet
- melakukan instalasi dan konfigurasi adalah tugas?
Down
- seseorang yang ahli dalam bidang perfilm an atau video
- menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
- seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
- orang yang membuat poster,logo, disebut?
- peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu
10 Clues: DBA termasuk singkatan dari • orang yang membuat poster,logo, disebut? • seseorang yang ahli dalam membuat animasi • melakukan instalasi dan konfigurasi adalah tugas? • seseorang yang ahli dalam bidang perfilm an atau video • bentuk perlindungan terhadap sistem yang terhubung ke internet • menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang? • ...
Crossword #7 2023-11-07
Across
- A Brazilian type of music that will be performed by the Connection Trio.
- Production of this play has been delayed due to a COVID outbreak.
- The conference in which Marshall athletics compete
- A magic dragon.
Down
- Men's soccer faces this team this week.
- Education of this will be a part of the 4th Avenue Innovation Center
- A low battery will need a ________
- No.0 on the men's basketball team.
- Declared war on Hamas leading to unrest on campuses across the nation
- Science, Technology,Engineering and Mathematics.
10 Clues: A magic dragon. • A low battery will need a ________ • No.0 on the men's basketball team. • Men's soccer faces this team this week. • Science, Technology,Engineering and Mathematics. • The conference in which Marshall athletics compete • Production of this play has been delayed due to a COVID outbreak. • ...
Crossword Puzzle for you 2025-08-04
Across
- Person who works for a company or organization
- Machine that produces hard copies of digital documents
- The process of manufacturing goods in large quantities
- Person or business that buys products or services from a company
- Secure room housing computer servers and networking equipment
Down
- Practice of protecting systems and data from digital attacks
- Technology using radio waves for tracking and identification
- Material essential for electronic device manufacturing
- On-site maintenance or support provided to customers
- Device used for billing and transactions in retail
10 Clues: Person who works for a company or organization • Device used for billing and transactions in retail • On-site maintenance or support provided to customers • Material essential for electronic device manufacturing • Machine that produces hard copies of digital documents • The process of manufacturing goods in large quantities • ...
Cybersecurity e I.A. 2024-05-23
Across
- riconoscimento online
- parola d'accesso
- "pescare" dati finanziari e codici di accesso di un utente
- veniva definito "virus per computer"
- attività criminale tramite dispositivi digitali
Down
- anche detto Anti-Malware
- Tra LAN e WAN
- tratta di scritture nascoste
- punto debole di un sistema
- manovra offensiva contro sistemi informatici
10 Clues: Tra LAN e WAN • parola d'accesso • riconoscimento online • anche detto Anti-Malware • punto debole di un sistema • tratta di scritture nascoste • veniva definito "virus per computer" • manovra offensiva contro sistemi informatici • attività criminale tramite dispositivi digitali • "pescare" dati finanziari e codici di accesso di un utente
Cybersecurity Revision Quiz 2024-10-20
Across
- This is when someone watches over your shoulder to see your private details.
- This protects information by turning it into a secret code.
- This is when someone is mean or rude online just to upset others.
- This is a way to unlock devices using fingerprints or face scans (B________).
Down
- This is a sneaky program that spies on your computer activity.
- This is someone you can talk to if you're worried about something online. (two words)
- This looks like a gift but secretly harms your computer.
- This is when someone tricks you into giving personal information.
- This is something that all uses need. It is hard to guess and keeps your account safe. (two words)
- This software protects your computer from harmful viruses.
10 Clues: This looks like a gift but secretly harms your computer. • This software protects your computer from harmful viruses. • This protects information by turning it into a secret code. • This is a sneaky program that spies on your computer activity. • This is when someone tricks you into giving personal information. • ...
Cybersecurity Crossword Puzzle 2025-11-26
Across
- Applying updates to software to fix vulnerabilities
- Process of verifying the identity of a user or device
- Malicious software that locks data and demands payment for release.
Down
- Manipulating people into revealing confidential information
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Secret string of characters used for authentication
- Process of converting data into a coded form to prevent unauthorized access
- Software designed to disrupt, damage, or gain unauthorized access to a system
- Secure tunnel for online communication, often used for privacy
- Network security system that monitors and controls incoming and outgoing traffic
10 Clues: Applying updates to software to fix vulnerabilities • Secret string of characters used for authentication • Process of verifying the identity of a user or device • Manipulating people into revealing confidential information • Secure tunnel for online communication, often used for privacy • Malicious software that locks data and demands payment for release. • ...
Computer Science 2024-10-25
6 Clues: Protecting your systems • password an easily guessed password • password A password that is strong • a memorized secret with a sequence of words • random password Make up your own password • device A technique someone uses to remember
keamanan digital 2025-08-28
6 Clues: apa ancaman digital berupa program? • apa kata lain dari keamanan digital • apa perangkat lunak untuk blokir virus • apa tindakan mencuri data dengan menyamar • apa jenis kode rahasia untuk melindungi akun? • apa metode verifikasi ganda untuk keamanan akun?
Computer Studies 9/10 Crossword 2024-05-21
Across
- A high-level programming language often used for web development.
- The physical components of a computer system.
- A software application used to access the web.
- An interconnected group of computers.
- The smallest unit of digital information.
- The primary storage device in a computer.
- A sequence of characters.
- A temporary storage that provides fast access to data.
- A set of instructions that a computer follows to perform a task.
- The standard language for creating web pages.
Down
- The main circuit board of a computer.
- A named collection of related data.
- Basic unit of data in computing.
- A global system of interconnected computer networks.
- The practice of protecting computers and data from unauthorized access.
- A device for entering data into a computer.
- To find and correct errors in a program.
- A way of sending information over the internet securely.
- The "brain" of the computer.
- An error in a program.
20 Clues: An error in a program. • A sequence of characters. • The "brain" of the computer. • Basic unit of data in computing. • A named collection of related data. • The main circuit board of a computer. • An interconnected group of computers. • To find and correct errors in a program. • The smallest unit of digital information. • The primary storage device in a computer. • ...
Andy & George’s Wedding Crossword 2024-05-28
Across
- What school did George go to?
- What is our favourite number?
- What was our wedding present from Bob & Wendy?
- How many years have we been together?
- What school did Andy go to?
- Where did George go to uni?
- Where did we first meet?
- Where do we live?
- Where did Andy go to uni?
- On what street was their first flat?
- What is George’s middle name?
Down
- What’s Andy’s favourite flavour of icecream?
- What colour is the diamond in George’s ring?
- Where does George work?
- What industry does Andy work in?
- What did Andy study at uni?
- What name is George saved under in Andy’s phone?
- What’s Andy’s coffee order?
- Where did we get engaged?
- What is Andy’s favourite hobby?
- What’s George’s favourite film?
- What was our first dog called?
- What colour are George’s eyes?
- What is Andy’s middle name?
24 Clues: Where do we live? • Where does George work? • Where did we first meet? • Where did we get engaged? • Where did Andy go to uni? • What did Andy study at uni? • What school did Andy go to? • Where did George go to uni? • What’s Andy’s coffee order? • What is Andy’s middle name? • What school did George go to? • What is our favourite number? • What is George’s middle name? • ...
Human Ingenuity and Technology 2024-12-06
Across
- Platforms for online social interaction
- Field focused on designing intelligent machines
- Autonomous vehicles with no human driver
- Protection of computer systems from theft or damage
- Additive manufacturing process creating three-dimensional objects
- Creating a genetically identical copy of an organism
- Manipulation of matter on an atomic scale
- Proposed point of rapid technological growth
- A new device or method created through innovation
- Objects orbiting Earth for communication and research
- Simulated experience that can mimic the real world
Down
- Residence equipped with interconnected devices for automation
- Smart devices worn on the body for various applications
- Using biological systems for technological applications
- Sustainable energy sources like solar and wind
- Virtual money used for online transactions
- Creative problem-solving of mankind
- Multi-functional mobile device
- Altered organisms for improved traits
- Machines simulating human intelligence
20 Clues: Multi-functional mobile device • Creative problem-solving of mankind • Altered organisms for improved traits • Machines simulating human intelligence • Platforms for online social interaction • Autonomous vehicles with no human driver • Manipulation of matter on an atomic scale • Virtual money used for online transactions • Proposed point of rapid technological growth • ...
AnaBela Meitasari XF, 02 2025-04-15
Across
- Proses memeriksa kebenaran informasi disebut
- Ahli yang menangani keamanan jaringan
- Pekerja yang mengelola database
- platform populer untuk menyebarkan video budaya
- Batik adalah contoh konten digital bertema
- Perlindungan untuk logo atau simbol disebut
- Profesi yang merancang dan membangun perangkat lunak
- Lembaga pengawas konten di internet di Indonesia
- Berita palsu disebut juga
- konten di gital yang memperkenalkan tarian daerah tersebut
- Jenis konten yang merugikan dan harus disaring
- Profesi yang menganalisis data
Down
- Orang yang mendesain tampilan website
- Hak atas penemuan teknologi baru
- Hak yang melindungi karya musik dan tulisan
- Operator untuk mencari dalam situs tertentu
- Lembaga resmi pendaftaran HAKI di Indonesia
- Sistem yang memblokir konten berbahaya
- Operator pencarian untuk mengecualikan kata tertentu
- salah satu bentuk produksi konten berupa suara
- Kata kunci untuk mencari frasa persis
- Situs yang digunakan untuk mencari informasi di internet
- Hak eksklusif atas ciptaan disebut
- lstilah untuk hasil pencarian yang muncul di google
24 Clues: Berita palsu disebut juga • Profesi yang menganalisis data • Pekerja yang mengelola database • Hak atas penemuan teknologi baru • Hak eksklusif atas ciptaan disebut • Orang yang mendesain tampilan website • Ahli yang menangani keamanan jaringan • Kata kunci untuk mencari frasa persis • Sistem yang memblokir konten berbahaya • Batik adalah contoh konten digital bertema • ...
TTS INFORMATIKA 2025-04-14
Across
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Proses identifikasi atau verifikasi pengguna
- Penyusupan sistem oleh pihak tidak berwenang.
- Jenis virus komputer
- Pencurian data kartu kredit atau kartu debit
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Teknik mengakses sistem tanpa otorisasi.
- Penyerang digital yang memiliki tujuan jahat.
Down
- Kata sandi dalam sistem keamanan.
- Istilah lain untuk keamanan jaringan
- Alamat identifikasi unik setiap perangkat di jaringan.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Aksi mencari celah dalam sistem komputer.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Penipuan online melalui email atau situs palsu.
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Program pengintai aktivitas pengguna tanpa izin.
- Sandi digital yang dipakai untuk keamanan transaksi.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-14
Across
- Penyerang digital yang memiliki tujuan jahat.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Proses identifikasi atau verifikasi pengguna
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Program pengintai aktivitas pengguna tanpa izin.
- Teknik mengakses sistem tanpa otorisasi.
- Jenis virus komputer
- Kata sandi dalam sistem keamanan.
- Istilah lain untuk keamanan jaringan
Down
- Penyusupan sistem oleh pihak tidak berwenang.
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Aksi mencari celah dalam sistem komputer.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Pencurian data kartu kredit atau kartu debit
- Penipuan online melalui email atau situs palsu.
- Sandi digital yang dipakai untuk keamanan transaksi.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Pencurian data kartu kredit atau kartu debit • Proses identifikasi atau verifikasi pengguna • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
TEKA - TEKI SILANG EKONOMI DIGITAL 2025-08-21
Across
- Transaksi melalui jaringan internet
- Sistem penyimpanan data berbasis internet
- Perusahaan rintisan berbasis teknologi
- Metode pembayaran tanpa uang tunai
- Konsultan investasi keuangan
- masyarakat yang sebelumnya terpinggirkan dapat mengakses layanan keuangan, pendidikan,dan lainnya
- Platform jual beli online
- Pertanian berbasis teknologi
- Inovasi finansial berbasis teknologi
- Perantara pembayaran digital seperti OVO dan DANA
- layanan pendiidkan atau pendidikan berbasis teknologi
Down
- internet Komponen yang ada pada infrastruktur digital
- Contoh robo advisors
- Mengumpulkan dana dari banyak orang melalui plastfrom digital atau penggalangan donasi
- Sistem keamanan data
- Mata uang kripto paling terkenal
- Pinjaman modal secara online tetapi melalui investor bukan sembarangan orang dan terawasi oleh OJK
- Penyedia layanan keuangan dalam skala kecil atau masyarakat yang tidak memiliki pengetahuan cara akses pinjaman ke bank, biasanya pinjam dana melalui BPR (Bank Pengkrediatan Rakyat) untuk usaha kecil / UMKM
- Layanan transportasi yang menghubungkan dengan pengemudi dan ada real time nya
- layanan kesehatan atau konsultasi kesehatan secara online
20 Clues: Contoh robo advisors • Sistem keamanan data • Platform jual beli online • Konsultan investasi keuangan • Pertanian berbasis teknologi • Mata uang kripto paling terkenal • Metode pembayaran tanpa uang tunai • Transaksi melalui jaringan internet • Inovasi finansial berbasis teknologi • Perusahaan rintisan berbasis teknologi • Sistem penyimpanan data berbasis internet • ...
Know your Math 2025-08-30
Across
- Solves large-scale systems in structural engineering.
- Used in image compression techniques like PCA.
- Applied in heat transfer and fluid flow analysis.
- the Determines solvability of engineering systems.
- Average off the values
- Used to approximate functions in aircraft control systems.
- Applied in medical testing for disease prediction.
- Applied in vibration analysis of mechanical structures.
- Used in reliability engineering to model component lifetimes.
- Helps in predicting combined system failure chances.
- Helps detect anomalies in network traffic for cybersecurity.
Down
- Used in spam email detection.
- Used to analyze asymmetry in business profits distribution.
- Used in power flow analysis of electrical grids.
- Essential in facial recognition algorithms.
- Speeds up computations in control systems.
- Measures risk in stock market analysis.
- Central Value of the data set
- Applied in electrical circuit analysis for sinusoidal signals.
- Used in robotics for motion transformation between coordinate systems.
20 Clues: Average off the values • Used in spam email detection. • Central Value of the data set • Measures risk in stock market analysis. • Speeds up computations in control systems. • Essential in facial recognition algorithms. • Used in image compression techniques like PCA. • Used in power flow analysis of electrical grids. • Applied in heat transfer and fluid flow analysis. • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Masa depan ekonomi digital bergantung pada literasi
- → Perusahaan baru yang berbasis teknologi disebut
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Risiko ekonomi digital adalah kebocoran
- → Berjualan melalui marketplace online termasuk kegiatan
- → Contoh aplikasi fintech di Indonesia adalah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Pemasaran melalui media sosial disebut
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
- → Kecerdasan buatan dikenal juga dengan istilah
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
Cybersecurity Crossword Puzzle 2023-11-10
Across
- A champion of cybersecurity
- The process of identifying a users identity
- Changing the IP address of an email so it appears to come from a trusted source
- Malicious software used to damage or infect a system
- A means of attack, a vulnerability
- Technology used to keep hackers out of a system
Down
- Coding to protect information
- Malware that hijacks a system in return for payment
- Malware that corrupts a system, then spreads to other systems
- Practice of posing as someone legitimate to gain access
10 Clues: A champion of cybersecurity • Coding to protect information • A means of attack, a vulnerability • The process of identifying a users identity • Technology used to keep hackers out of a system • Malware that hijacks a system in return for payment • Malicious software used to damage or infect a system • Practice of posing as someone legitimate to gain access • ...
STEM in the News 2023-09-26
Across
- regulates anyone who stores, transmits, or possesses cardholder data
- Rules created for keeping things under control
- The act of staying safe online
- Using or creating ways to use services for malicious purposes
- Regulates use and transfer of Healthcare data
Down
- Moving something from one place to another
- An online exploit of a service or information
- Handles the storing, handling, and transmission of digital data
- Created by the EU to protect their citizens online
- Online or relating to a computer
10 Clues: The act of staying safe online • Online or relating to a computer • Moving something from one place to another • An online exploit of a service or information • Regulates use and transfer of Healthcare data • Rules created for keeping things under control • Created by the EU to protect their citizens online • ...
The Department of Homeland Security Crossword 2024-12-09
Across
- The main mission of DHS is to stop this threat.
- CISA, stands for ___________ and Infrastructure Security Agency.
- ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
- DHS operates at the ______ level.
- One weakness of the DHS is the __________ jurisdiction.
- The DHS Oversees ______ security and lawful immigration.
Down
- One of the DHS agencies.
- The person who appoints the Secretary of Homeland Security.
- DHS works to help communities recover through ________.
- The DHS is the newest _______-level department.
10 Clues: One of the DHS agencies. • DHS operates at the ______ level. • The main mission of DHS is to stop this threat. • The DHS is the newest _______-level department. • DHS works to help communities recover through ________. • One weakness of the DHS is the __________ jurisdiction. • The DHS Oversees ______ security and lawful immigration. • ...
Theme: Technology 2024-07-24
Across
- An organized collection of data
- A machine capable of carrying out complex actions automatically
- A global network connecting millions of private public academic and government networks
- A process or set of rules to be followed in calculations or other problem-solving operations
- The programs and other operating information used by a computer
Down
- The practice of protecting systems networks and programs from digital attacks
- A mobile phone with advanced features
- A portable personal computer
- An unmanned aerial vehicle
- Abbreviation for Artificial Intelligence
10 Clues: An unmanned aerial vehicle • A portable personal computer • An organized collection of data • A mobile phone with advanced features • Abbreviation for Artificial Intelligence • A machine capable of carrying out complex actions automatically • The programs and other operating information used by a computer • ...
FITAVocab.lo 2013-05-15
Across
- code of positive conduct one uses such as plagiarism, copyright, etc.
- rules and behaviors designed to keep individuals safe online
- a search engine that goes through all the search engines.
- speed of machine
- short term memory for your computer
- a
Down
- a website that protects young people from cyber bullies
- protecting information on computer systems/networks
- a program that allows you to search information on the internet.
- a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.
10 Clues: a • speed of machine • short term memory for your computer • protecting information on computer systems/networks • a website that protects young people from cyber bullies • a search engine that goes through all the search engines. • rules and behaviors designed to keep individuals safe online • a program that allows you to search information on the internet. • ...
Tugas - Jaringan komputer dan internet 2024-01-11
Across
- aspek teknis pada jaringan komputer
- nama lain jaringan komputer
- Jenis jaringan komputer
- aspek utama keamanan jaringan
- yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
- topologi jaringan yang lebih sederhana yaitu
Down
- Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
- server komponen jaringan komputer
- lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
- Network interface card
10 Clues: Network interface card • Jenis jaringan komputer • nama lain jaringan komputer • aspek utama keamanan jaringan • server komponen jaringan komputer • aspek teknis pada jaringan komputer • topologi jaringan yang lebih sederhana yaitu • lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu • ...
Technology 2025-05-05
Across
- Writing code to create software or applications.
- The physical parts of a computer system.
- Protection of internet-connected systems from cyber threats.
- The use of scientific knowledge for practical purposes.
- A mobile phone with advanced features and internet access.
Down
- Programs and operating information used by a computer.
- A software program designed for a specific task on devices.
- A global network connecting millions of computers worldwide.
- A group of interconnected computers or devices.
- An electronic device that processes data and performs tasks.
10 Clues: The physical parts of a computer system. • A group of interconnected computers or devices. • Writing code to create software or applications. • Programs and operating information used by a computer. • The use of scientific knowledge for practical purposes. • A mobile phone with advanced features and internet access. • ...
Technology & Social Media 2025-06-13
Across
- – Something that spreads quickly on the internet.
- – A saved copy of files or data in case you lose them.
- – Programs or apps used on a computer or phone.
- – A machine or tool that helps do tasks, like a phone or laptop.
- – A small, smart electronic tool or device.
Down
- – A person who affects others' opinions online.
- – Related to technology using numbers, like computers.
- – A new idea or method that improves something.
- – Protection against online attacks and hackers.
- – The right to keep your personal information safe.
10 Clues: – A small, smart electronic tool or device. • – A person who affects others' opinions online. • – A new idea or method that improves something. • – Programs or apps used on a computer or phone. • – Protection against online attacks and hackers. • – Something that spreads quickly on the internet. • – The right to keep your personal information safe. • ...
Career Focus 7 2025-11-05
Across
- What the trainee earns upon successful completion
- Critical skill needed for protecting digital assets
- Formal training received at an RTO like TAFE
Down
- The capacity to adjust to a new work task or technology
- Type of program: A university preparation or bridging course
- The ability to move skills from one job to another
- The overall program of study you're enrolled in
- National GTO with an Albury-Wodonga presence
- In demand professional who builds applications or software systems
- LETTER A one-page letter sent with a resume
10 Clues: LETTER A one-page letter sent with a resume • National GTO with an Albury-Wodonga presence • Formal training received at an RTO like TAFE • The overall program of study you're enrolled in • What the trainee earns upon successful completion • The ability to move skills from one job to another • Critical skill needed for protecting digital assets • ...
Industry 4.0 2025-10-17
Across
- Visual display of performance metrics
- A digitally Tech-enabled logistics network (two words)
- A reality, which creates a fully immersive digital environment
- Digital modelling of real-world processes
- Software that defines functions, protocols, and data formats to allow different software applications to communicate with each other.
- Supervisory Control and Data Acquisition (abbreviation)
- A Network of connected machines sharing data (3)Cybersecurity
- The Monitoring of the location of equipment and resources
- The examination of raw data information to find useful patterns
- A manufacturing process focused on reducing waste
- A type of manufacturing often referred to as 3D printing
- A type of maintenance that uses data analytics to prevent equipment failure
- This type of reality overlays digital information on the real world
- Near-field communication for contactless exchange
- A manufacturing software system for managing shop-floor operations (abbrev)
- A System which makes Machines capable of operating without human control
- A computerised network of remote servers which host internet data
- Software systems that controls warehouse management operations (abbreviation)
Down
- Minimising environmental impact of operations
- Protection against online threats in connected systems
- A collaborative robot that interacts physically with humans.
- A decentralised digital ledger that stores linked blocks of cryptographically secured records
- A type of factory whose physical processes and machinery are governed by an AI system, reducing the human workforce
- Manufacturing equipment which is fully controlled by digital systems.
- Key Performance Indicator
- Large volume of data that can now be collected from all aspects of manufacturing
- The capability of computational systems to perform tasks typically associated with human intelligence
- A software system that integrates and manages core business processes within an organization, such as production, supply chain, finance, and human resources
- A virtual model of a physical machine, part, process, or system
- A reality which is a blend of physical and digital worlds
- A Device used to collect and transmit performance data
- Radio-frequency identification for tracking
- Short for Overall Equipment Effectiveness)
33 Clues: Key Performance Indicator • Visual display of performance metrics • Digital modelling of real-world processes • Short for Overall Equipment Effectiveness) • Radio-frequency identification for tracking • Minimising environmental impact of operations • A manufacturing process focused on reducing waste • Near-field communication for contactless exchange • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
Cybersecurity Awareness Month Crossword Puzzle 2022-09-15
7 Clues: A message sent on Twitter. • A network for online picture sharing. • A platform founded by Mark Zuckerburg. • The fastest growing social media platform. • An act that can be made by a Facebook user. • A self portrait taken by using the front camera. • Technology Field concerned with social media privacy.
SecuritySquares-Advanced 2023-03-03
Across
- 01101100 01101111 01110111 01100101 01110011 00001010
- A piece of code put in to fix an error
- Unique string of numbers that identifies a device connected to a network
- Intent to do harm
- The second in CIA triad
- When an attacker tricks users into clicking on hidden elements
- A characteristic or distinctive pattern that can be searched for
- Rivest-Shamir-Adleman
- Pay or else
- A type of media manipulation
Down
- A White hat hacker
- Converting enciphered text to plain text
- Unique identifier assigned to a NIC
- The use of mathematical techniques to provide security services
- A scam without a rod and reel but with voice mail
- The process of uncovering trends and patterns in large amounts of data
- Information Technology Infrastructure Library
- The process for overseeing the cybersecurity teams
18 Clues: Pay or else • Intent to do harm • A White hat hacker • Rivest-Shamir-Adleman • The second in CIA triad • A type of media manipulation • Unique identifier assigned to a NIC • A piece of code put in to fix an error • Converting enciphered text to plain text • Information Technology Infrastructure Library • A scam without a rod and reel but with voice mail • ...
Thematic Puzzle 2024-12-16
Across
- – “A structure for growing plants, also related to gases trapping heat.”
- – “The variety of life in the world or a particular habitat.”
- Exchange – “The sharing of ideas, traditions, and values between cultures.”
- – “A distributed digital ledger system.”
- – “Securing information through coding.”
- – “A global network connecting billions of devices.”
- Footprint – “The total emissions of carbon dioxide by an individual or group.”
- – “At risk of extinction.”
Down
- – “Protecting data from unauthorized access.”
- – “The natural home of a plant or animal.”
- – “A type of energy source that is sustainable.”
- Trade – “Exchange of goods and services internationally.”
- – “The act of protecting and preserving nature.”
- – “A community of interacting organisms and their environment.”
- Energy – “Energy from sustainable sources like solar or wind.”
15 Clues: – “At risk of extinction.” • – “A distributed digital ledger system.” • – “Securing information through coding.” • – “The natural home of a plant or animal.” • – “Protecting data from unauthorized access.” • – “A type of energy source that is sustainable.” • – “The act of protecting and preserving nature.” • – “A global network connecting billions of devices.” • ...
