cybersecurity Crossword Puzzles

Tugas - Jaringan komputer dan internet 2024-01-11

Tugas - Jaringan komputer dan internet crossword puzzle
Across
  1. aspek teknis pada jaringan komputer
  2. nama lain jaringan komputer
  3. Jenis jaringan komputer
  4. aspek utama keamanan jaringan
  5. yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
  6. topologi jaringan yang lebih sederhana yaitu
Down
  1. Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
  2. server komponen jaringan komputer
  3. lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
  4. Network interface card

10 Clues: Network interface cardJenis jaringan komputernama lain jaringan komputeraspek utama keamanan jaringanserver komponen jaringan komputeraspek teknis pada jaringan komputertopologi jaringan yang lebih sederhana yaitulapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu...

Technology 2025-05-05

Technology crossword puzzle
Across
  1. Writing code to create software or applications.
  2. The physical parts of a computer system.
  3. Protection of internet-connected systems from cyber threats.
  4. The use of scientific knowledge for practical purposes.
  5. A mobile phone with advanced features and internet access.
Down
  1. Programs and operating information used by a computer.
  2. A software program designed for a specific task on devices.
  3. A global network connecting millions of computers worldwide.
  4. A group of interconnected computers or devices.
  5. An electronic device that processes data and performs tasks.

10 Clues: The physical parts of a computer system.A group of interconnected computers or devices.Writing code to create software or applications.Programs and operating information used by a computer.The use of scientific knowledge for practical purposes.A mobile phone with advanced features and internet access....

Technology & Social Media 2025-06-13

Technology & Social Media crossword puzzle
Across
  1. – Something that spreads quickly on the internet.
  2. – A saved copy of files or data in case you lose them.
  3. – Programs or apps used on a computer or phone.
  4. – A machine or tool that helps do tasks, like a phone or laptop.
  5. – A small, smart electronic tool or device.
Down
  1. – A person who affects others' opinions online.
  2. – Related to technology using numbers, like computers.
  3. – A new idea or method that improves something.
  4. – Protection against online attacks and hackers.
  5. – The right to keep your personal information safe.

10 Clues: – A small, smart electronic tool or device.– A person who affects others' opinions online.– A new idea or method that improves something.– Programs or apps used on a computer or phone.– Protection against online attacks and hackers.– Something that spreads quickly on the internet.– The right to keep your personal information safe....

Career Focus 7 2025-11-05

Career Focus 7 crossword puzzle
Across
  1. What the trainee earns upon successful completion
  2. Critical skill needed for protecting digital assets
  3. Formal training received at an RTO like TAFE
Down
  1. The capacity to adjust to a new work task or technology
  2. Type of program: A university preparation or bridging course
  3. The ability to move skills from one job to another
  4. The overall program of study you're enrolled in
  5. National GTO with an Albury-Wodonga presence
  6. In demand professional who builds applications or software systems
  7. LETTER A one-page letter sent with a resume

10 Clues: LETTER A one-page letter sent with a resumeNational GTO with an Albury-Wodonga presenceFormal training received at an RTO like TAFEThe overall program of study you're enrolled inWhat the trainee earns upon successful completionThe ability to move skills from one job to anotherCritical skill needed for protecting digital assets...

Computer Science 2024-10-25

Computer Science crossword puzzle
Across
  1. password an easily guessed password
  2. Protecting your systems
Down
  1. a memorized secret with a sequence of words
  2. device A technique someone uses to remember
  3. password A password that is strong
  4. random password Make up your own password

6 Clues: Protecting your systemspassword an easily guessed passwordpassword A password that is stronga memorized secret with a sequence of wordsrandom password Make up your own passworddevice A technique someone uses to remember

keamanan digital 2025-08-28

keamanan digital crossword puzzle
Across
  1. apa jenis kode rahasia untuk melindungi akun?
  2. apa tindakan mencuri data dengan menyamar
Down
  1. apa ancaman digital berupa program?
  2. apa kata lain dari keamanan digital
  3. apa perangkat lunak untuk blokir virus
  4. apa metode verifikasi ganda untuk keamanan akun?

6 Clues: apa ancaman digital berupa program?apa kata lain dari keamanan digitalapa perangkat lunak untuk blokir virusapa tindakan mencuri data dengan menyamarapa jenis kode rahasia untuk melindungi akun?apa metode verifikasi ganda untuk keamanan akun?

Info - security 2017-11-27

Info - security crossword puzzle
Across
  1. be attentive
  2. lure someone
  3. name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
  4. protect networks, computers, programs and data from attack
  5. should not be shared
  6. monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. designed to detect and destroy computer viruses
  2. exploit weaknesses to gain access
  3. malicious software designed to block access to a computer system until a sum of money is paid.
  4. protects personal data published via the Internet

10 Clues: be attentivelure someoneshould not be sharedexploit weaknesses to gain accessdesigned to detect and destroy computer virusesprotects personal data published via the Internetprotect networks, computers, programs and data from attackmalicious software designed to block access to a computer system until a sum of money is paid....

Profesi dan peluang usaha di bidang tkjt 2023-11-17

Profesi dan peluang usaha di bidang tkjt crossword puzzle
Across
  1. seseorang yang ahli dalam membuat animasi
  2. seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
  3. DBA termasuk singkatan dari
  4. bentuk perlindungan terhadap sistem yang terhubung ke internet
  5. melakukan instalasi dan konfigurasi adalah tugas?
Down
  1. seseorang yang ahli dalam bidang perfilm an atau video
  2. menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
  3. seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
  4. orang yang membuat poster,logo, disebut?
  5. peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu

10 Clues: DBA termasuk singkatan dariorang yang membuat poster,logo, disebut?seseorang yang ahli dalam membuat animasimelakukan instalasi dan konfigurasi adalah tugas?seseorang yang ahli dalam bidang perfilm an atau videobentuk perlindungan terhadap sistem yang terhubung ke internetmenganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?...

Crossword #7 2023-11-07

Crossword #7 crossword puzzle
Across
  1. A Brazilian type of music that will be performed by the Connection Trio.
  2. Production of this play has been delayed due to a COVID outbreak.
  3. The conference in which Marshall athletics compete
  4. A magic dragon.
Down
  1. Men's soccer faces this team this week.
  2. Education of this will be a part of the 4th Avenue Innovation Center
  3. A low battery will need a ________
  4. No.0 on the men's basketball team.
  5. Declared war on Hamas leading to unrest on campuses across the nation
  6. Science, Technology,Engineering and Mathematics.

10 Clues: A magic dragon.A low battery will need a ________No.0 on the men's basketball team.Men's soccer faces this team this week.Science, Technology,Engineering and Mathematics.The conference in which Marshall athletics competeProduction of this play has been delayed due to a COVID outbreak....

Crossword Puzzle for you 2025-08-04

Crossword Puzzle for you crossword puzzle
Across
  1. Person who works for a company or organization
  2. Machine that produces hard copies of digital documents
  3. The process of manufacturing goods in large quantities
  4. Person or business that buys products or services from a company
  5. Secure room housing computer servers and networking equipment
Down
  1. Practice of protecting systems and data from digital attacks
  2. Technology using radio waves for tracking and identification
  3. Material essential for electronic device manufacturing
  4. On-site maintenance or support provided to customers
  5. Device used for billing and transactions in retail

10 Clues: Person who works for a company or organizationDevice used for billing and transactions in retailOn-site maintenance or support provided to customersMaterial essential for electronic device manufacturingMachine that produces hard copies of digital documentsThe process of manufacturing goods in large quantities...

Cybersecurity Crossword Puzzle 2023-11-10

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A champion of cybersecurity
  2. The process of identifying a users identity
  3. Changing the IP address of an email so it appears to come from a trusted source
  4. Malicious software used to damage or infect a system
  5. A means of attack, a vulnerability
  6. Technology used to keep hackers out of a system
Down
  1. Coding to protect information
  2. Malware that hijacks a system in return for payment
  3. Malware that corrupts a system, then spreads to other systems
  4. Practice of posing as someone legitimate to gain access

10 Clues: A champion of cybersecurityCoding to protect informationA means of attack, a vulnerabilityThe process of identifying a users identityTechnology used to keep hackers out of a systemMalware that hijacks a system in return for paymentMalicious software used to damage or infect a systemPractice of posing as someone legitimate to gain access...

STEM in the News 2023-09-26

STEM in the News crossword puzzle
Across
  1. regulates anyone who stores, transmits, or possesses cardholder data
  2. Rules created for keeping things under control
  3. The act of staying safe online
  4. Using or creating ways to use services for malicious purposes
  5. Regulates use and transfer of Healthcare data
Down
  1. Moving something from one place to another
  2. An online exploit of a service or information
  3. Handles the storing, handling, and transmission of digital data
  4. Created by the EU to protect their citizens online
  5. Online or relating to a computer

10 Clues: The act of staying safe onlineOnline or relating to a computerMoving something from one place to anotherAn online exploit of a service or informationRegulates use and transfer of Healthcare dataRules created for keeping things under controlCreated by the EU to protect their citizens online...

The Department of Homeland Security Crossword 2024-12-09

The Department of Homeland Security Crossword crossword puzzle
Across
  1. The main mission of DHS is to stop this threat.
  2. CISA, stands for ___________ and Infrastructure Security Agency.
  3. ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
  4. DHS operates at the ______ level.
  5. One weakness of the DHS is the __________ jurisdiction.
  6. The DHS Oversees ______ security and lawful immigration.
Down
  1. One of the DHS agencies.
  2. The person who appoints the Secretary of Homeland Security.
  3. DHS works to help communities recover through ________.
  4. The DHS is the newest _______-level department.

10 Clues: One of the DHS agencies.DHS operates at the ______ level.The main mission of DHS is to stop this threat.The DHS is the newest _______-level department.DHS works to help communities recover through ________.One weakness of the DHS is the __________ jurisdiction.The DHS Oversees ______ security and lawful immigration....

Theme: Technology 2024-07-24

Theme: Technology crossword puzzle
Across
  1. An organized collection of data
  2. A machine capable of carrying out complex actions automatically
  3. A global network connecting millions of private public academic and government networks
  4. A process or set of rules to be followed in calculations or other problem-solving operations
  5. The programs and other operating information used by a computer
Down
  1. The practice of protecting systems networks and programs from digital attacks
  2. A mobile phone with advanced features
  3. A portable personal computer
  4. An unmanned aerial vehicle
  5. Abbreviation for Artificial Intelligence

10 Clues: An unmanned aerial vehicleA portable personal computerAn organized collection of dataA mobile phone with advanced featuresAbbreviation for Artificial IntelligenceA machine capable of carrying out complex actions automaticallyThe programs and other operating information used by a computer...

Information Security 2022-09-29

Information Security crossword puzzle
Across
  1. A type of malware that records every single press of the keyboard that you make
  2. A key only used by one individual to decrypt
  3. A key that can be used by anyone to encrypt messages
  4. Gaining unauthorised access to or control of a computer system
  5. A trap for cybersecurity criminals
  6. Bullying that takes place online
  7. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
  8. Special viruses that move from computer to computer without human action
  9. Impersonation of email address or device to gain unauthorized access to information or systems
  10. Copy of data
  11. Hacking to try and champion a cause, e.g. climate change, rather than to steal information
  12. A weaknesses in computers
  13. scrambled data
  14. Ethical hacking in order to find any cybersecurity weaknesses
  15. Raw data that is put into context and has meaning
Down
  1. core of an operating system
  2. General term for programs that gains access to your system for unethical reasons
  3. Email that contains a message with a suspicious link designed to steal personal information
  4. annoying malware that spams you with ads
  5. Software that protects computers from virus related harm
  6. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
  7. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
  8. Malicious code typically disguised as a legitimate program
  9. To take advantage of a system's weakness
  10. I am not a robot
  11. Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
  12. Secretly watches computer activity
  13. Collection of malware infested computers that form a network to attack
  14. Electronic messages sent through the internet
  15. Readable data
  16. Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  17. An internal security team that defends against both real attackers and Red Teams

32 Clues: Copy of dataReadable datascrambled dataI am not a robotA weaknesses in computerscore of an operating systemBullying that takes place onlineA trap for cybersecurity criminalsSecretly watches computer activityannoying malware that spams you with adsTo take advantage of a system's weaknessA key only used by one individual to decrypt...

Cybersecurity Fundamentals Chapter 4 2022-10-25

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
  2. fundamental component of ipsec virtual private networks (vpn).
  3. actual barriers deployed to prevent direct contact with systems.
  4. way to store and transmit data so only the intended recipient can read or process it.
  5. to encrypt and decrypt messages.
  6. has a fixed block size of 128, 192 or 256 bits.
  7. use one key to encrypt data and a different key to decrypt data.
  8. implementing cryptography into a web browser.
  9. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
  1. hardware and software solutions used to manage access resources and systems.
  2. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
  3. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  4. science of making and breaking secret codes.
  5. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  6. a protocol that provides a secure remote access connection to network devices.

15 Clues: to encrypt and decrypt messages.science of making and breaking secret codes.implementing cryptography into a web browser.has a fixed block size of 128, 192 or 256 bits.fundamental component of ipsec virtual private networks (vpn).actual barriers deployed to prevent direct contact with systems....

Cybersecurity Awareness Month - 2024 2024-10-09

Cybersecurity Awareness Month - 2024 crossword puzzle
Across
  1. - When somebody sends an e-mail with a link to a bogus website it is called
  2. - Destroying the cause of security incident with powerful process or technique is which stage of incident response
  3. - Protecting the data against unauthorized access or disclosure is
  4. - Its a type of malware that disguises itself as legitimate code.
  5. Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
  6. - This can slow down your computer AND watch everywhere you go on the internet
  7. - Data that is used to Identify specific individual
  8. - Impact of Threat exploiting a vulnerability is known as
Down
  1. - The control that you have over your personal information and how that information is used
  2. - A globally accepted and recognized standard for cyber security is
  3. - Three principles of ISMS are Confidentiality, ____ and Availability
  4. - Critical security component that determines what resources a user can access and what actions they can perform
  5. - An event that impacts the organization and requires a response and recovery.
  6. -PII Bank information falls under which category of data classification.
  7. - Unique sets of characters used to authenticate user identity and protect personal data or system access.

15 Clues: - Data that is used to Identify specific individual- Impact of Threat exploiting a vulnerability is known as- Its a type of malware that disguises itself as legitimate code.- Protecting the data against unauthorized access or disclosure is- A globally accepted and recognized standard for cyber security is...

Prestige Cybersecurity Awareness Month 2025-10-16

Prestige Cybersecurity Awareness Month crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing traffic
  2. A type of cyber attack that tricks users into revealing personal information
  3. The principle of ensuring data is not altered or tampered with
  4. A software update that fixes security vulnerabilities
  5. Malware that locks data and demands payment for release
  6. A file or program that appears harmless but contains malicious code
  7. Software designed to disrupt, damage, or gain unauthorized access
  8. The process of converting data into a coded form to prevent unauthorized access
Down
  1. The practice of hiding messages so only the intended recipient can read them
  2. Software that secretly gathers user information
  3. A person who gains unauthorized access to systems for malicious purposes
  4. An extra layer of security requiring two forms of identification
  5. A secret word or phrase used to gain access
  6. A fake website or email designed to look legitimate
  7. A service that encrypts your internet connection for privacy

15 Clues: A secret word or phrase used to gain accessSoftware that secretly gathers user informationA fake website or email designed to look legitimateA software update that fixes security vulnerabilitiesMalware that locks data and demands payment for releaseA service that encrypts your internet connection for privacy...

Computer Studies 9/10 Crossword 2024-05-21

Computer Studies 9/10 Crossword crossword puzzle
Across
  1. A high-level programming language often used for web development.
  2. The physical components of a computer system.
  3. A software application used to access the web.
  4. An interconnected group of computers.
  5. The smallest unit of digital information.
  6. The primary storage device in a computer.
  7. A sequence of characters.
  8. A temporary storage that provides fast access to data.
  9. A set of instructions that a computer follows to perform a task.
  10. The standard language for creating web pages.
Down
  1. The main circuit board of a computer.
  2. A named collection of related data.
  3. Basic unit of data in computing.
  4. A global system of interconnected computer networks.
  5. The practice of protecting computers and data from unauthorized access.
  6. A device for entering data into a computer.
  7. To find and correct errors in a program.
  8. A way of sending information over the internet securely.
  9. The "brain" of the computer.
  10. An error in a program.

20 Clues: An error in a program.A sequence of characters.The "brain" of the computer.Basic unit of data in computing.A named collection of related data.The main circuit board of a computer.An interconnected group of computers.To find and correct errors in a program.The smallest unit of digital information.The primary storage device in a computer....

Andy & George’s Wedding Crossword 2024-05-28

Andy & George’s Wedding Crossword crossword puzzle
Across
  1. What school did George go to?
  2. What is our favourite number?
  3. What was our wedding present from Bob & Wendy?
  4. How many years have we been together?
  5. What school did Andy go to?
  6. Where did George go to uni?
  7. Where did we first meet?
  8. Where do we live?
  9. Where did Andy go to uni?
  10. On what street was their first flat?
  11. What is George’s middle name?
Down
  1. What’s Andy’s favourite flavour of icecream?
  2. What colour is the diamond in George’s ring?
  3. Where does George work?
  4. What industry does Andy work in?
  5. What did Andy study at uni?
  6. What name is George saved under in Andy’s phone?
  7. What’s Andy’s coffee order?
  8. Where did we get engaged?
  9. What is Andy’s favourite hobby?
  10. What’s George’s favourite film?
  11. What was our first dog called?
  12. What colour are George’s eyes?
  13. What is Andy’s middle name?

24 Clues: Where do we live?Where does George work?Where did we first meet?Where did we get engaged?Where did Andy go to uni?What did Andy study at uni?What school did Andy go to?Where did George go to uni?What’s Andy’s coffee order?What is Andy’s middle name?What school did George go to?What is our favourite number?What is George’s middle name?...

Human Ingenuity and Technology 2024-12-06

Human Ingenuity and Technology crossword puzzle
Across
  1. Platforms for online social interaction
  2. Field focused on designing intelligent machines
  3. Autonomous vehicles with no human driver
  4. Protection of computer systems from theft or damage
  5. Additive manufacturing process creating three-dimensional objects
  6. Creating a genetically identical copy of an organism
  7. Manipulation of matter on an atomic scale
  8. Proposed point of rapid technological growth
  9. A new device or method created through innovation
  10. Objects orbiting Earth for communication and research
  11. Simulated experience that can mimic the real world
Down
  1. Residence equipped with interconnected devices for automation
  2. Smart devices worn on the body for various applications
  3. Using biological systems for technological applications
  4. Sustainable energy sources like solar and wind
  5. Virtual money used for online transactions
  6. Creative problem-solving of mankind
  7. Multi-functional mobile device
  8. Altered organisms for improved traits
  9. Machines simulating human intelligence

20 Clues: Multi-functional mobile deviceCreative problem-solving of mankindAltered organisms for improved traitsMachines simulating human intelligencePlatforms for online social interactionAutonomous vehicles with no human driverManipulation of matter on an atomic scaleVirtual money used for online transactionsProposed point of rapid technological growth...

AnaBela Meitasari XF, 02 2025-04-15

AnaBela Meitasari XF, 02 crossword puzzle
Across
  1. Proses memeriksa kebenaran informasi disebut
  2. Ahli yang menangani keamanan jaringan
  3. Pekerja yang mengelola database
  4. platform populer untuk menyebarkan video budaya
  5. Batik adalah contoh konten digital bertema
  6. Perlindungan untuk logo atau simbol disebut
  7. Profesi yang merancang dan membangun perangkat lunak
  8. Lembaga pengawas konten di internet di Indonesia
  9. Berita palsu disebut juga
  10. konten di gital yang memperkenalkan tarian daerah tersebut
  11. Jenis konten yang merugikan dan harus disaring
  12. Profesi yang menganalisis data
Down
  1. Orang yang mendesain tampilan website
  2. Hak atas penemuan teknologi baru
  3. Hak yang melindungi karya musik dan tulisan
  4. Operator untuk mencari dalam situs tertentu
  5. Lembaga resmi pendaftaran HAKI di Indonesia
  6. Sistem yang memblokir konten berbahaya
  7. Operator pencarian untuk mengecualikan kata tertentu
  8. salah satu bentuk produksi konten berupa suara
  9. Kata kunci untuk mencari frasa persis
  10. Situs yang digunakan untuk mencari informasi di internet
  11. Hak eksklusif atas ciptaan disebut
  12. lstilah untuk hasil pencarian yang muncul di google

24 Clues: Berita palsu disebut jugaProfesi yang menganalisis dataPekerja yang mengelola databaseHak atas penemuan teknologi baruHak eksklusif atas ciptaan disebutOrang yang mendesain tampilan websiteAhli yang menangani keamanan jaringanKata kunci untuk mencari frasa persisSistem yang memblokir konten berbahayaBatik adalah contoh konten digital bertema...

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Sistem keamanan biometrik yang menggunakan sidik jari.
  2. Proses identifikasi atau verifikasi pengguna
  3. Penyusupan sistem oleh pihak tidak berwenang.
  4. Jenis virus komputer
  5. Pencurian data kartu kredit atau kartu debit
  6. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  7. Teknik mengakses sistem tanpa otorisasi.
  8. Penyerang digital yang memiliki tujuan jahat.
Down
  1. Kata sandi dalam sistem keamanan.
  2. Istilah lain untuk keamanan jaringan
  3. Alamat identifikasi unik setiap perangkat di jaringan.
  4. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  5. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  6. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  7. Aksi mencari celah dalam sistem komputer.
  8. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  9. Penipuan online melalui email atau situs palsu.
  10. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  11. Program pengintai aktivitas pengguna tanpa izin.
  12. Sandi digital yang dipakai untuk keamanan transaksi.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Penyerang digital yang memiliki tujuan jahat.
  2. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  3. Proses identifikasi atau verifikasi pengguna
  4. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  5. Sistem keamanan biometrik yang menggunakan sidik jari.
  6. Program pengintai aktivitas pengguna tanpa izin.
  7. Teknik mengakses sistem tanpa otorisasi.
  8. Jenis virus komputer
  9. Kata sandi dalam sistem keamanan.
  10. Istilah lain untuk keamanan jaringan
Down
  1. Penyusupan sistem oleh pihak tidak berwenang.
  2. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  3. Aksi mencari celah dalam sistem komputer.
  4. Alamat identifikasi unik setiap perangkat di jaringan.
  5. Pencurian data kartu kredit atau kartu debit
  6. Penipuan online melalui email atau situs palsu.
  7. Sandi digital yang dipakai untuk keamanan transaksi.
  8. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  9. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  10. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Pencurian data kartu kredit atau kartu debitProses identifikasi atau verifikasi penggunaPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

TEKA - TEKI SILANG EKONOMI DIGITAL 2025-08-21

TEKA - TEKI SILANG EKONOMI DIGITAL crossword puzzle
Across
  1. Transaksi melalui jaringan internet
  2. Sistem penyimpanan data berbasis internet
  3. Perusahaan rintisan berbasis teknologi
  4. Metode pembayaran tanpa uang tunai
  5. Konsultan investasi keuangan
  6. masyarakat yang sebelumnya terpinggirkan dapat mengakses layanan keuangan, pendidikan,dan lainnya
  7. Platform jual beli online
  8. Pertanian berbasis teknologi
  9. Inovasi finansial berbasis teknologi
  10. Perantara pembayaran digital seperti OVO dan DANA
  11. layanan pendiidkan atau pendidikan berbasis teknologi
Down
  1. internet Komponen yang ada pada infrastruktur digital
  2. Contoh robo advisors
  3. Mengumpulkan dana dari banyak orang melalui plastfrom digital atau penggalangan donasi
  4. Sistem keamanan data
  5. Mata uang kripto paling terkenal
  6. Pinjaman modal secara online tetapi melalui investor bukan sembarangan orang dan terawasi oleh OJK
  7. Penyedia layanan keuangan dalam skala kecil atau masyarakat yang tidak memiliki pengetahuan cara akses pinjaman ke bank, biasanya pinjam dana melalui BPR (Bank Pengkrediatan Rakyat) untuk usaha kecil / UMKM
  8. Layanan transportasi yang menghubungkan dengan pengemudi dan ada real time nya
  9. layanan kesehatan atau konsultasi kesehatan secara online

20 Clues: Contoh robo advisorsSistem keamanan dataPlatform jual beli onlineKonsultan investasi keuanganPertanian berbasis teknologiMata uang kripto paling terkenalMetode pembayaran tanpa uang tunaiTransaksi melalui jaringan internetInovasi finansial berbasis teknologiPerusahaan rintisan berbasis teknologiSistem penyimpanan data berbasis internet...

Know your Math 2025-08-30

Know your Math crossword puzzle
Across
  1. Solves large-scale systems in structural engineering.
  2. Used in image compression techniques like PCA.
  3. Applied in heat transfer and fluid flow analysis.
  4. the Determines solvability of engineering systems.
  5. Average off the values
  6. Used to approximate functions in aircraft control systems.
  7. Applied in medical testing for disease prediction.
  8. Applied in vibration analysis of mechanical structures.
  9. Used in reliability engineering to model component lifetimes.
  10. Helps in predicting combined system failure chances.
  11. Helps detect anomalies in network traffic for cybersecurity.
Down
  1. Used in spam email detection.
  2. Used to analyze asymmetry in business profits distribution.
  3. Used in power flow analysis of electrical grids.
  4. Essential in facial recognition algorithms.
  5. Speeds up computations in control systems.
  6. Measures risk in stock market analysis.
  7. Central Value of the data set
  8. Applied in electrical circuit analysis for sinusoidal signals.
  9. Used in robotics for motion transformation between coordinate systems.

20 Clues: Average off the valuesUsed in spam email detection.Central Value of the data setMeasures risk in stock market analysis.Speeds up computations in control systems.Essential in facial recognition algorithms.Used in image compression techniques like PCA.Used in power flow analysis of electrical grids.Applied in heat transfer and fluid flow analysis....

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Masa depan ekonomi digital bergantung pada literasi
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → Risiko ekonomi digital adalah kebocoran
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Contoh aplikasi fintech di Indonesia adalah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  9. → Transaksi keuangan secara online disebut
  10. → Fintech merupakan singkatan dari
  11. → Pemasaran melalui media sosial disebut
  12. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
  1. → Kecerdasan buatan dikenal juga dengan istilah
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  6. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  7. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  8. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

Cybersecurity Decoded 2 2020-07-30

Cybersecurity Decoded 2 crossword puzzle
Across
  1. childhood game
  2. Not canned food
  3. used to fix jeans... or software
  4. Dr's are known to have the messiest ones
  5. the iron giant
  6. Fake mustache, trench coat, sunglasses
Down
  1. they come out after the rain
  2. type of cleanliness
  3. sugar comes in these
  4. Troy's downfall

10 Clues: childhood gamethe iron giantNot canned foodTroy's downfalltype of cleanlinesssugar comes in thesethey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglassesDr's are known to have the messiest ones

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. A technique to deceive individuals into providing sensitive information.
  2. Software used to protect against viruses and malware.
  3. A sequence of characters used to authenticate identity or access.
  4. A program that replicates itself and spreads to other computers.
  5. An encrypted connection between a web browser and a server.
Down
  1. The practice of keeping software up to date to protect against vulnerabilities.
  2. A system that verifies a user's identity through a unique physical characteristic.
  3. A secret code that only authorized parties should be able to read.
  4. A type of attack that floods a network to disrupt its operation.
  5. An organization that identifies security flaws in software.

10 Clues: Software used to protect against viruses and malware.An organization that identifies security flaws in software.An encrypted connection between a web browser and a server.A type of attack that floods a network to disrupt its operation.A program that replicates itself and spreads to other computers....

Cybersecurity e I.A. 2024-05-23

Cybersecurity e I.A. crossword puzzle
Across
  1. riconoscimento online
  2. parola d'accesso
  3. "pescare" dati finanziari e codici di accesso di un utente
  4. veniva definito "virus per computer"
  5. attività criminale tramite dispositivi digitali
Down
  1. anche detto Anti-Malware
  2. Tra LAN e WAN
  3. tratta di scritture nascoste
  4. punto debole di un sistema
  5. manovra offensiva contro sistemi informatici

10 Clues: Tra LAN e WANparola d'accessoriconoscimento onlineanche detto Anti-Malwarepunto debole di un sistematratta di scritture nascosteveniva definito "virus per computer"manovra offensiva contro sistemi informaticiattività criminale tramite dispositivi digitali"pescare" dati finanziari e codici di accesso di un utente

Cybersecurity Intro Vocabulary 2023-09-07

Cybersecurity Intro Vocabulary crossword puzzle
Across
  1. the avenue or path the hacker uses to commit the attack
  2. usually operates outside the law
  3. a hacker who is generally ethical and law-abiding.
  4. the act of circumventing or breaking past security boundaries.
Down
  1. process of protecting a system against unintended or malicious changes or use
  2. a malicious software code that is unleashed and attempts to perform its destructive content
  3. an attempt to steal, damage, or destroy data or a computer system
  4. a person who engages in hacking
  5. They do no harm, but they don't ask permission
  6. hacking into a phone system

10 Clues: hacking into a phone systema person who engages in hackingusually operates outside the lawThey do no harm, but they don't ask permissiona hacker who is generally ethical and law-abiding.the avenue or path the hacker uses to commit the attackthe act of circumventing or breaking past security boundaries....

Cybersecurity Awareness Puzzle 2023-09-20

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. ______ is a type of phishing that uses voice calls to manipulate a target.
  2. Type of malware that threatens to expose information unless a payment is made.
  3. Cyber defense agency that is hosting National Cybersecurity Awareness Month.
  4. Social engineering tactic that research is done on the victim to personalize the attack.
  5. Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
  1. A new social engineering attack involves QR codes and is a form of a *ishing attacks.
  2. According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
  3. Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
  4. A ________ manager is best the way to create and maintain strong passwords.
  5. In 2023, this brand name was abused the most in phishing attacks.

10 Clues: In 2023, this brand name was abused the most in phishing attacks.______ is a type of phishing that uses voice calls to manipulate a target.A ________ manager is best the way to create and maintain strong passwords.Cyber defense agency that is hosting National Cybersecurity Awareness Month....

Key Cybersecurity Vocabulary 2025-07-10

Key Cybersecurity Vocabulary crossword puzzle
Across
  1. Tools that collect and analyze security data to detect threats
  2. Detects and blocks suspicious activities in real time
  3. Keeping systems up to date with software fixes to close security hole
  4. A network of infected computers controlled by an attacker, often used for DDoS
Down
  1. Tricking people into revealing confidential information
  2. Monitors network traffic for suspicious activity and alerts administrators
  3. Probing a system for open ports to find possible vulnerabilities
  4. A fake communication used to trick users into giving up sensitive data
  5. Requires two methods to verify a user’s identity
  6. Verifying the identity of a user, device, or process before allowing access

10 Clues: Requires two methods to verify a user’s identityDetects and blocks suspicious activities in real timeTricking people into revealing confidential informationTools that collect and analyze security data to detect threatsProbing a system for open ports to find possible vulnerabilities...

IT Cybersecurity terms 2025-08-28

IT Cybersecurity terms crossword puzzle
Across
  1. Regular software updates to fix vulnerabilities
  2. Extra step beyond a password
  3. Do this when you leave your desk
  4. Always create a copy of important files
  5. Encrypts your connection on public Wi-Fi
  6. Fake message trying to steal information
Down
  1. Turn the device off and on to fix issues
  2. Strongest defense is user awareness
  3. Protect files or drives from unauthorized access
  4. Never share this secret login credential

10 Clues: Extra step beyond a passwordDo this when you leave your deskStrongest defense is user awarenessAlways create a copy of important filesTurn the device off and on to fix issuesNever share this secret login credentialEncrypts your connection on public Wi-FiFake message trying to steal informationRegular software updates to fix vulnerabilities...

SecuritySquares-Advanced 2023-03-03

SecuritySquares-Advanced crossword puzzle
Across
  1. 01101100 01101111 01110111 01100101 01110011 00001010
  2. A piece of code put in to fix an error
  3. Unique string of numbers that identifies a device connected to a network
  4. Intent to do harm
  5. The second in CIA triad
  6. When an attacker tricks users into clicking on hidden elements
  7. A characteristic or distinctive pattern that can be searched for
  8. Rivest-Shamir-Adleman
  9. Pay or else
  10. A type of media manipulation
Down
  1. A White hat hacker
  2. Converting enciphered text to plain text
  3. Unique identifier assigned to a NIC
  4. The use of mathematical techniques to provide security services
  5. A scam without a rod and reel but with voice mail
  6. The process of uncovering trends and patterns in large amounts of data
  7. Information Technology Infrastructure Library
  8. The process for overseeing the cybersecurity teams

18 Clues: Pay or elseIntent to do harmA White hat hackerRivest-Shamir-AdlemanThe second in CIA triadA type of media manipulationUnique identifier assigned to a NICA piece of code put in to fix an errorConverting enciphered text to plain textInformation Technology Infrastructure LibraryA scam without a rod and reel but with voice mail...

Cybersecurity e I.A. 2024-05-23

Cybersecurity e I.A. crossword puzzle
Across
  1. riconoscimento online
  2. parola d'accesso
  3. "pescare" dati finanziari e codici di accesso di un utente
  4. veniva definito "virus per computer"
  5. attività criminale tramite dispositivi digitali
Down
  1. anche detto Anti-Malware
  2. Tra LAN e WAN
  3. tratta di scritture nascoste
  4. punto debole di un sistema
  5. manovra offensiva contro sistemi informatici

10 Clues: Tra LAN e WANparola d'accessoriconoscimento onlineanche detto Anti-Malwarepunto debole di un sistematratta di scritture nascosteveniva definito "virus per computer"manovra offensiva contro sistemi informaticiattività criminale tramite dispositivi digitali"pescare" dati finanziari e codici di accesso di un utente

Cybersecurity Revision Quiz 2024-10-20

Cybersecurity Revision Quiz crossword puzzle
Across
  1. This is when someone watches over your shoulder to see your private details.
  2. This protects information by turning it into a secret code.
  3. This is when someone is mean or rude online just to upset others.
  4. This is a way to unlock devices using fingerprints or face scans (B________).
Down
  1. This is a sneaky program that spies on your computer activity.
  2. This is someone you can talk to if you're worried about something online. (two words)
  3. This looks like a gift but secretly harms your computer.
  4. This is when someone tricks you into giving personal information.
  5. This is something that all uses need. It is hard to guess and keeps your account safe. (two words)
  6. This software protects your computer from harmful viruses.

10 Clues: This looks like a gift but secretly harms your computer.This software protects your computer from harmful viruses.This protects information by turning it into a secret code.This is a sneaky program that spies on your computer activity.This is when someone tricks you into giving personal information....

Cybersecurity Crossword Puzzle 2025-11-26

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Applying updates to software to fix vulnerabilities
  2. Process of verifying the identity of a user or device
  3. Malicious software that locks data and demands payment for release.
Down
  1. Manipulating people into revealing confidential information
  2. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  3. Secret string of characters used for authentication
  4. Process of converting data into a coded form to prevent unauthorized access
  5. Software designed to disrupt, damage, or gain unauthorized access to a system
  6. Secure tunnel for online communication, often used for privacy
  7. Network security system that monitors and controls incoming and outgoing traffic

10 Clues: Applying updates to software to fix vulnerabilitiesSecret string of characters used for authenticationProcess of verifying the identity of a user or deviceManipulating people into revealing confidential informationSecure tunnel for online communication, often used for privacyMalicious software that locks data and demands payment for release....

Thematic Puzzle 2024-12-16

Thematic Puzzle crossword puzzle
Across
  1. – “A structure for growing plants, also related to gases trapping heat.”
  2. – “The variety of life in the world or a particular habitat.”
  3. Exchange – “The sharing of ideas, traditions, and values between cultures.”
  4. – “A distributed digital ledger system.”
  5. – “Securing information through coding.”
  6. – “A global network connecting billions of devices.”
  7. Footprint – “The total emissions of carbon dioxide by an individual or group.”
  8. – “At risk of extinction.”
Down
  1. – “Protecting data from unauthorized access.”
  2. – “The natural home of a plant or animal.”
  3. – “A type of energy source that is sustainable.”
  4. Trade – “Exchange of goods and services internationally.”
  5. – “The act of protecting and preserving nature.”
  6. – “A community of interacting organisms and their environment.”
  7. Energy – “Energy from sustainable sources like solar or wind.”

15 Clues: – “At risk of extinction.”– “A distributed digital ledger system.”– “Securing information through coding.”– “The natural home of a plant or animal.”– “Protecting data from unauthorized access.”– “A type of energy source that is sustainable.”– “The act of protecting and preserving nature.”– “A global network connecting billions of devices.”...

HP GPO Crossword puzzle 2022-06-22

HP GPO Crossword puzzle crossword puzzle
Across
  1. Helps move stock for HP
  2. Document that explains input output and process
  3. Safeguarding the digital world
  4. Converts screen to paper
  5. Introducing new methods, ideas, or products
Down
  1. Making sure your future generations are comfortable
  2. The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible

7 Clues: Helps move stock for HPConverts screen to paperSafeguarding the digital worldIntroducing new methods, ideas, or productsDocument that explains input output and processMaking sure your future generations are comfortableThe practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible

Digital Literacy Basics 2024-12-09

Digital Literacy Basics crossword puzzle
Across
  1. The traces you leave online
  2. A combination of letters, numbers, and symbols used for security
  3. A way to protect your personal information online
  4. The online platform for social interaction
  5. To transfer a file from the internet to your device
Down
  1. The software used to access the internet
  2. An unsolicited email attempt to steal personal information
  3. A virtual space to store files

8 Clues: The traces you leave onlineA virtual space to store filesThe software used to access the internetThe online platform for social interactionA way to protect your personal information onlineTo transfer a file from the internet to your deviceAn unsolicited email attempt to steal personal information...

Industry 4.0 2025-10-17

Industry 4.0 crossword puzzle
Across
  1. Visual display of performance metrics
  2. A digitally Tech-enabled logistics network (two words)
  3. A reality, which creates a fully immersive digital environment
  4. Digital modelling of real-world processes
  5. Software that defines functions, protocols, and data formats to allow different software applications to communicate with each other.
  6. Supervisory Control and Data Acquisition (abbreviation)
  7. A Network of connected machines sharing data (3)Cybersecurity
  8. The Monitoring of the location of equipment and resources
  9. The examination of raw data information to find useful patterns
  10. A manufacturing process focused on reducing waste
  11. A type of manufacturing often referred to as 3D printing
  12. A type of maintenance that uses data analytics to prevent equipment failure
  13. This type of reality overlays digital information on the real world
  14. Near-field communication for contactless exchange
  15. A manufacturing software system for managing shop-floor operations (abbrev)
  16. A System which makes Machines capable of operating without human control
  17. A computerised network of remote servers which host internet data
  18. Software systems that controls warehouse management operations (abbreviation)
Down
  1. Minimising environmental impact of operations
  2. Protection against online threats in connected systems
  3. A collaborative robot that interacts physically with humans.
  4. A decentralised digital ledger that stores linked blocks of cryptographically secured records
  5. A type of factory whose physical processes and machinery are governed by an AI system, reducing the human workforce
  6. Manufacturing equipment which is fully controlled by digital systems.
  7. Key Performance Indicator
  8. Large volume of data that can now be collected from all aspects of manufacturing
  9. The capability of computational systems to perform tasks typically associated with human intelligence
  10. A software system that integrates and manages core business processes within an organization, such as production, supply chain, finance, and human resources
  11. A virtual model of a physical machine, part, process, or system
  12. A reality which is a blend of physical and digital worlds
  13. A Device used to collect and transmit performance data
  14. Radio-frequency identification for tracking
  15. Short for Overall Equipment Effectiveness)

33 Clues: Key Performance IndicatorVisual display of performance metricsDigital modelling of real-world processesShort for Overall Equipment Effectiveness)Radio-frequency identification for trackingMinimising environmental impact of operationsA manufacturing process focused on reducing wasteNear-field communication for contactless exchange...

Cybersecurity Awareness Month Crossword Puzzle 2022-09-15

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Technology Field concerned with social media privacy.
  2. A message sent on Twitter.
  3. A platform founded by Mark Zuckerburg.
Down
  1. A self portrait taken by using the front camera.
  2. A network for online picture sharing.
  3. The fastest growing social media platform.
  4. An act that can be made by a Facebook user.

7 Clues: A message sent on Twitter.A network for online picture sharing.A platform founded by Mark Zuckerburg.The fastest growing social media platform.An act that can be made by a Facebook user.A self portrait taken by using the front camera.Technology Field concerned with social media privacy.

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. A popular operating system.
  2. Securing computer systems against unauthorized access.
  3. Unethical practice of gaining unauthorized access to computer systems.
  4. Act of impersonating a legitimate entity to deceive individuals or gain access.
Down
  1. Desired outcomes.
  2. Malicious software used to gain unauthorised access to computer systems.
  3. Term for gaining access to a secure network through.

7 Clues: Desired outcomes.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems.Malicious software used to gain unauthorised access to computer systems....

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. Unethical practice of gaining unauthorized access to computer systems.
  2. A popular operating system.
  3. Desired outcomes.
  4. Term for gaining access to a secure network through.
Down
  1. Securing computer systems against unauthorized access.
  2. Act of impersonating a legitimate entity to deceive individuals or gain access.
  3. Malicious software used to gain unauthorised access to computer systems.

7 Clues: Desired outcomes.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems.Malicious software used to gain unauthorised access to computer systems....

Cybersecurity101 2022-11-16

Cybersecurity101 crossword puzzle
Across
  1. malware that is secretly spying on you and stealing your data
  2. act of discovering open wifi networks by driving around
  3. malware that encrypts your files and system demanding payment
  4. practice of socially engineering high value individuals of an organization
  5. agency responsible for strengthening cybersecurity posture in the US
  6. brute force technique to discover files, domains, etc.
Down
  1. method of a threat actor uses to return into your network/device
  2. phishing over the phone
  3. common public-key encryption algorithm
  4. most common threat vector for social engineering
  5. phishing over text
  6. MITRE framework for tactics techniques and procedures

12 Clues: phishing over textphishing over the phonecommon public-key encryption algorithmmost common threat vector for social engineeringMITRE framework for tactics techniques and proceduresbrute force technique to discover files, domains, etc.act of discovering open wifi networks by driving aroundmalware that is secretly spying on you and stealing your data...

SCAI Feasting with Faculty 2023-11-02

SCAI Feasting with Faculty crossword puzzle
Across
  1. Location where data is stored in a computer's memory.
  2. The study of breaking codes and ciphers.
  3. Software designed to harm or infiltrate a computer.
  4. Low-level human-readable code for computers.
  5. Investigating digital evidence for legal purposes.
  6. Small storage areas inside the computer's CPU.
  7. Measures to keep your computer and data safe online.
Down
  1. Making data unreadable to unauthorized users.
  2. A secure way to verify the sender of a message.
  3. Moving information from one place to another.
  4. A digital barrier that protects your network from threats.
  5. A command that tells the computer what to do.

12 Clues: The study of breaking codes and ciphers.Low-level human-readable code for computers.Making data unreadable to unauthorized users.Moving information from one place to another.A command that tells the computer what to do.Small storage areas inside the computer's CPU.A secure way to verify the sender of a message....

Isa usando un crusigrama 2020-08-21

Isa usando un crusigrama crossword puzzle
Across
  1. te protege de el coronavirus y lo usas al tener contacto con la gente
  2. para enmarcar una foto
  3. hace que estes prevenido de lo que le pueden hacer a la computadora
  4. infectan archivos y destruyen datos de tu computadora
  5. donde guardas mucho informacion, fotos y muchas cosas tuyas
  6. para no dañarte los ojos al tomar sol
Down
  1. una enfermedad que genero una pandemia
  2. es donde esta tu rutina y te la recuerda al mirarlo
  3. para emprolijarte el pelo
  4. te despierta o te recuerda algo

10 Clues: para enmarcar una fotopara emprolijarte el pelote despierta o te recuerda algopara no dañarte los ojos al tomar soluna enfermedad que genero una pandemiaes donde esta tu rutina y te la recuerda al mirarloinfectan archivos y destruyen datos de tu computadoradonde guardas mucho informacion, fotos y muchas cosas tuyas...

Team - AllSafe 2022-03-27

Team - AllSafe crossword puzzle
Across
  1. Data that can identify a specific individual
  2. What's common between Aetnaand cyber security? (Clue: Important to save money)
  3. Compliance standard to safeguard health information
  4. An off-site attack surface (Clud: Most SaaS platforms use this service)
  5. a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
  1. A social engineering attack
  2. Risk assessment of vendors, suppliers, partners, contractors, or service providers
  3. Head of information security program
  4. Method to reduce human error
  5. Electronically-stored health information

10 Clues: A social engineering attackMethod to reduce human errorHead of information security programElectronically-stored health informationData that can identify a specific individualCompliance standard to safeguard health informationAn off-site attack surface (Clud: Most SaaS platforms use this service)...

WeWork 109NBR - Know Your Neighbours! 2024-08-30

WeWork 109NBR - Know Your Neighbours! crossword puzzle
Across
  1. Singaporean home cleaning service provider
  2. European cybersecurity company
  3. Their software helps you to manage (real estate) properties
  4. Barbie and Hot Wheels toy company
Down
  1. Has an exhibition at the Funan Underground Pedestrian Link @ B2, owner of hit series ‘The King’s Avatar’
  2. Sea creature or digital marketing platform?
  3. Yuu rewards club creator (hint: check Apple/Google Play store)
  4. Temasek founded AI-powered computer vision application
  5. Global banking company, good for currency exchange
  6. Payments platform for Boost, McDonalds and Dunkin Donuts

10 Clues: European cybersecurity companyBarbie and Hot Wheels toy companySingaporean home cleaning service providerSea creature or digital marketing platform?Global banking company, good for currency exchangeTemasek founded AI-powered computer vision applicationPayments platform for Boost, McDonalds and Dunkin Donuts...

Jobs of the future 2025-04-30

Jobs of the future crossword puzzle
Across
  1. Farmer – Someone who uses technology to grow food in cities.
  2. – A person who creates computer programs and apps.
  3. – A person who designs and builds robots.
  4. – A person who helps design self-driving cars.
  5. – A scientist who works with genes to improve health.
Down
  1. – Someone who explores space and other planets.
  2. Expert – A person who protects computers from hackers.
  3. – Someone who studies and protects the environment.
  4. Energy Specialist – Someone who creates energy from the sun and wind.
  5. Biologist – A person who studies the oceans and marine life.

10 Clues: – A person who designs and builds robots.– A person who helps design self-driving cars.– Someone who explores space and other planets.– A person who creates computer programs and apps.– Someone who studies and protects the environment.– A scientist who works with genes to improve health.Expert – A person who protects computers from hackers....

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Refers to unwanted bulk emails that come from unknown sources
  2. The process of transforming data into an unreadable code
  3. Device that connects multiple networks
  4. It can be defined as the legal rules and restrictions imposed on online laws
Down
  1. Type of cyber attack that tricks users
  2. Wireless technology used to interconnect mobiles computers etc
  3. Network topology with a central hub
  4. Practice of protecting digital information
  5. It is a combination of two terms 'net' and 'etiquette'
  6. Refers to an illegal intrusion into a computer system or network

10 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

NCSAM 2024-08-27

NCSAM crossword puzzle
Across
  1. duh
  2. duh2
  3. duh3
Down
  1. duh4

4 Clues: duhduh4duh2duh3

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. CX
Down
  1. Salesguy
  2. Search Engine

4 Clues: DXCXSalesguySearch Engine

'Digital' Crossword 2019-07-07

'Digital' Crossword crossword puzzle
Across
  1. Highly digitized and connected production facility that relies on smart manufacturing
  2. Interconnected Digital Technologies for better customer experience
  3. ASTM F2792
  4. Systematic computational analysis of data or statistics
  5. Network of Internet connected objects able to collect and exchange data
  6. Digital version of a physical asset and/or process
  7. Integration of digital information with live video or the user's environment in real time
  8. Network of remote servers hosted on the Internet to store, manage, and process data
  9. Small autonomous services that work together
Down
  1. Simulated Intelligence in machines
  2. Massive Volume of Data inundated daily
  3. Robotic Process Automation
  4. Processing Quantum Bits of Data
  5. Techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  6. Digital records of transaction

15 Clues: ASTM F2792Robotic Process AutomationDigital records of transactionProcessing Quantum Bits of DataSimulated Intelligence in machinesMassive Volume of Data inundated dailySmall autonomous services that work togetherDigital version of a physical asset and/or processSystematic computational analysis of data or statistics...

Technological Progress 2024-03-09

Technological Progress crossword puzzle
Across
  1. Meeting present needs without compromising future resources
  2. Transmitting information over a distance by electronic means
  3. The use of living systems and organisms to develop products
  4. The use of machines to perform tasks without human intervention
  5. The process of introducing new ideas or methods
Down
  1. Protecting computers and networks from theft or damage
  2. Designing, constructing, and using robots
  3. A secure, shared digital ledger for recording transactions
  4. A set of rules to solve problems or perform computations

9 Clues: Designing, constructing, and using robotsThe process of introducing new ideas or methodsProtecting computers and networks from theft or damageA set of rules to solve problems or perform computationsA secure, shared digital ledger for recording transactionsMeeting present needs without compromising future resources...

Knowledge Adventure Crossword Puzzle 2023-06-18

Knowledge Adventure Crossword Puzzle crossword puzzle
Across
  1. Measures to protect digital information.
  2. A reference to a source of information
  3. Online location with webpages.
  4. Connected to or available on the internet.
Down
  1. A structured collection of data accessible in various formats
  2. A significant word or term used in searching for information)
  3. A software program used to search for information on the interne
  4. Content that includes various forms of media.
  5. Legal protection for original creative works to prevent unauthorized use or copying.

9 Clues: Online location with webpages.A reference to a source of informationMeasures to protect digital information.Connected to or available on the internet.Content that includes various forms of media.A structured collection of data accessible in various formatsA significant word or term used in searching for information)...

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Wireless technology used to interconnect mobiles computers etc
  2. Refers to unwanted bulk emails that come from unknown sources
  3. Practice of protecting digital information
  4. Network topology with a central hub
Down
  1. It is a combination of two terms 'net' and 'etiquette'
  2. The process of transforming data into an unreadable code
  3. Type of cyber attack that tricks users
  4. Refers to an illegal intrusion into a computer system or network
  5. Device that connects multiple networks

9 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

Internet Safety Crossword 2025-03-04

Internet Safety Crossword crossword puzzle
Across
  1. Cyberstalking is the use of digital technology to track and harass someone.
  2. Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  3. When someone builds trust online to exploit or harm another person, often for illegal or abusive purposes.
  4. Something built specifically for web browsers to track, personalize and save information about each user's session.
  5. The illegal copying or distribution of copyrighted material via the Internet.
  6. Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
  7. Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  8. The act of someone causing discord online or in person.
  9. Footprint A digital footprint is the traceable data and activity a user leaves on the internet.
  10. Someone who uses the internet to exploit or harm others, often by gaining their trust first.
Down
  1. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
  2. Identity Theft When a malicious actor steals someone's online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim.
  3. Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
  4. Shouting is typing in all capital letter, which is considered yelling.
  5. A set of unofficial rules for good behavior and politeness followed by users of online and digital technologies such as the Internet, email, and chatrooms.
  6. Settings The part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user.
  7. An online real-time conversation, typically carried out by people who use nicknames instead of their real names.
  8. for weblog) A diary or personal journal kept on a website.
  9. When someone films an assault as a prank and shares it online, promoting violence and bullying
  10. The use of a computer as an instrument to further illegal ends

20 Clues: The act of someone causing discord online or in person.for weblog) A diary or personal journal kept on a website.The use of a computer as an instrument to further illegal endsShouting is typing in all capital letter, which is considered yelling.Cyberstalking is the use of digital technology to track and harass someone....

Planet of Nico 2021-12-09

Planet of Nico crossword puzzle
Across
  1. it's our secret word
  2. your favorite youtuber
  3. they keep you happy as long as you feed them with water
  4. our happiest place in the world
  5. the most beautiful instrument
  6. juan's best friend that eats a lot of croquettes
  7. basically what you do everyday
Down
  1. you love making them whenever you have the most beautiful view
  2. it's the most delicious kind of sandwich in the world
  3. you go there to clean your mind for a while
  4. you can sometimes eat it with some bubble tea
  5. it's the most handsome and smart man in the world
  6. you love doing this and it makes you learn a lot
  7. they're fluffy and they need belly pets

14 Clues: it's our secret wordyour favorite youtuberthe most beautiful instrumentbasically what you do everydayour happiest place in the worldthey're fluffy and they need belly petsyou go there to clean your mind for a whileyou can sometimes eat it with some bubble teajuan's best friend that eats a lot of croquettes...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

CSA Terms 2022-01-13

CSA Terms crossword puzzle
Across
  1. A cybersecurity control framework for cloud computing, used as a tool for the systematic assessment of a cloud implementation
  2. A credential and training program that fills the gap in the market for technical education for cloud IT auditing
  3. A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  4. A cloud service model that provides resource pools of virtualized infrastructure, such as compute, network, or storage pools
  5. A program designed to help customers assess and select a CSP through a three-step program of self-assessment, third-party audit, and continuous monitoring
Down
  1. A certificate that is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  2. A tool that offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  3. Union's agency dedicated to achieving a high common level of cybersecurity across Europe
  4. An on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies
  5. A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted

10 Clues: Union's agency dedicated to achieving a high common level of cybersecurity across EuropeA credential and training program that fills the gap in the market for technical education for cloud IT auditingA cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

Industry Buzz 2025-01-07

Industry Buzz crossword puzzle
Across
  1. Curriculum, pedagogy, classroom, lesson plans
  2. Counseling, mental health, wellbeing
Down
  1. Marketing, finance, strategy, management
  2. Networks, cybersecurity, coding, software
  3. Patient care, diagnoses, treatment, hospitals

5 Clues: Counseling, mental health, wellbeingMarketing, finance, strategy, managementNetworks, cybersecurity, coding, softwarePatient care, diagnoses, treatment, hospitalsCurriculum, pedagogy, classroom, lesson plans

C for Cybersecurity 2022-10-08

C for Cybersecurity crossword puzzle
Across
  1. violation detected!
  2. do you have one installed on your system yet?
  3. A proper request always has a ...
  4. **across might come in handy here
  5. spotting threats on the go
Down
  1. feature that works 24 x 7 (6,2)
  2. explore solutions on your own **(2,Down)
  3. might as well be maleficent
  4. is always a target, keep it safe!
  5. delegate this work, please

10 Clues: violation detected!delegate this work, pleasespotting threats on the gomight as well be maleficentfeature that works 24 x 7 (6,2)is always a target, keep it safe!A proper request always has a ...**across might come in handy hereexplore solutions on your own **(2,Down)do you have one installed on your system yet?

Cybersecurity Decoded 1 2020-07-30

Cybersecurity Decoded 1 crossword puzzle
Across
  1. childhood game
  2. the iron giant
  3. used to fix jeans... or software
  4. Not canned food
  5. Dr's are known to have the messiest ones
Down
  1. they come out after the rain
  2. type of cleanliness
  3. Troy's downfall
  4. sugar comes in these
  5. Fake mustache, trench coat, sunglasses

10 Clues: childhood gamethe iron giantTroy's downfallNot canned foodtype of cleanlinesssugar comes in thesethey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglassesDr's are known to have the messiest ones

Cybersecurity First Principles 2016-06-14

Cybersecurity First Principles crossword puzzle
Across
  1. less complicated, less problems
  2. multiple layers of defense protect information
  3. to simplify and decrease the number of ways the software can be exploited
  4. privilege level which limits what access people have to your resources
Down
  1. any attempt to prevent people from being able to see information
  2. keeping information worlds from colliding
  3. keeping processes separated prevents the failure of one process from negatively impacting another
  4. resources - hardware, system objects, or processes - must be separated and used as intended
  5. able to be inserted or removed from a project
  6. summarizing or explaining in a way that can be easily understood

10 Clues: less complicated, less problemskeeping information worlds from collidingable to be inserted or removed from a projectmultiple layers of defense protect informationany attempt to prevent people from being able to see informationsummarizing or explaining in a way that can be easily understood...

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. A system that verifies a user's identity through a unique physical characteristic.
  2. A sequence of characters used to authenticate identity or access.
  3. An encrypted connection between a web browser and a server.
  4. An organization that identifies security flaws in software.
  5. A type of attack that floods a network to disrupt its operation.
Down
  1. Software used to protect against viruses and malware.
  2. A technique to deceive individuals into providing sensitive information.
  3. A program that replicates itself and spreads to other computers.
  4. A secret code that only authorized parties should be able to read.
  5. The practice of keeping software up to date to protect against vulnerabilities.

10 Clues: Software used to protect against viruses and malware.An encrypted connection between a web browser and a server.An organization that identifies security flaws in software.A program that replicates itself and spreads to other computers.A type of attack that floods a network to disrupt its operation....

Cybersecurity Awareness Crossword 2024-02-08

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. A program that hurts your computer and tries to split itself among other computers\
  2. Synonym for password
  3. Something you need to improve password security
  4. Searching for private information through the trash
  5. An email pretending to be from a trusted person or organization for nefarious reasons
  6. First word in the acronym "VPN"
  7. The percent of Americans who use the same password
Down
  1. Super common password worldwide
  2. The act of looking over someone's shoulder to steal information
  3. A dishonest scheme

10 Clues: A dishonest schemeSynonym for passwordSuper common password worldwideFirst word in the acronym "VPN"Something you need to improve password securityThe percent of Americans who use the same passwordSearching for private information through the trashThe act of looking over someone's shoulder to steal information...

Introduction to Cybersecurity 2025-06-19

Introduction to Cybersecurity crossword puzzle
Across
  1. Fraudulent attempt to steal sensitive data via deceptive emails.
  2. Incident where data is accessed/stolen without permission.
  3. Three core security goals: Confidentiality, Integrity, and _______.
  4. Moral principles governing digital behavior (e.g., privacy, transparency).
Down
  1. Security system that monitors/controls network traffic (blocks unauthorized access).
  2. Self-replicating malware that spreads between devices.
  3. Process of encoding data to prevent unauthorized reading.
  4. Malicious software designed to damage systems (e.g., viruses, trojans).
  5. Person who exploits system vulnerabilities.
  6. Software update to fix security flaws.

10 Clues: Software update to fix security flaws.Person who exploits system vulnerabilities.Self-replicating malware that spreads between devices.Process of encoding data to prevent unauthorized reading.Incident where data is accessed/stolen without permission.Fraudulent attempt to steal sensitive data via deceptive emails....

Crossword Puzzle 2024-06-26

Crossword Puzzle crossword puzzle
Across
  1. Popular brand for laptops and other tech devices, known for its ThinkPad series.
  2. Brand recognized for its audio-visual and computer connectivity products.
  3. Brand known for producing high-quality bags, cases, and other accessories.
  4. Who are we?
Down
  1. Mighty leader in sales Team.
  2. Brand specializing in interactive displays and collaboration technology.
  3. Brand famous for its cybersecurity solutions.
  4. Brand known for its Galaxy series of smartphones.

8 Clues: Who are we?Mighty leader in sales Team.Brand famous for its cybersecurity solutions.Brand known for its Galaxy series of smartphones.Brand specializing in interactive displays and collaboration technology.Brand recognized for its audio-visual and computer connectivity products....

Financial literacy 2024-05-10

Financial literacy crossword puzzle
Across
  1. Protection from hacking
  2. First name of the person who is on the cover of our magazine
  3. Scholarships based on athletic or academic achievements
  4. ____ percent go to needs in the 50-30-20 rule.
  5. way to save money
Down
  1. _____ Change; problem for insurance
  2. Go ____ if you've reached the sixth step to home buying
  3. _______ Score; only get to check this a certain amount of times per year

8 Clues: way to save moneyProtection from hacking_____ Change; problem for insurance____ percent go to needs in the 50-30-20 rule.Go ____ if you've reached the sixth step to home buyingScholarships based on athletic or academic achievementsFirst name of the person who is on the cover of our magazine...

Security Awareness 2024-04-16

Security Awareness crossword puzzle
Across
  1. Testing environment.
  2. Protect sensitive information from being leaked by users.
  3. "M" Computer security company.
  4. Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
  5. Most common cyberattack on internet.
Down
  1. Social __ when actors trick others into revealing sensitive info.
  2. An attack where a person allows themselves to be identified as someone else.
  3. As cybersecurity threats grow, sites include this increased security feature.

8 Clues: Testing environment."M" Computer security company.Most common cyberattack on internet.Protect sensitive information from being leaked by users.Social __ when actors trick others into revealing sensitive info.An attack where a person allows themselves to be identified as someone else....

School Safety 2022-11-28

School Safety crossword puzzle
Across
  1. a reason for doing something
  2. national threat assessment center
  3. a statement with intention to inflict, pain, injury, or other hostile action on someone or something
Down
  1. protecting school networks from hackers
  2. document that outlines how a school will prepare, respond and recover
  3. a network security device
  4. a person who carries out a harmful, illegal or immoral act
  5. violence directed at a student, group, or location

8 Clues: a network security devicea reason for doing somethingnational threat assessment centerprotecting school networks from hackersviolence directed at a student, group, or locationa person who carries out a harmful, illegal or immoral actdocument that outlines how a school will prepare, respond and recover...

Cybersecurity Workforce Framework 2020-10-28

Cybersecurity Workforce Framework crossword puzzle
Across
  1. and Operate, Specialized denial and deception operations
  2. and Development, provide leadership, management, direction, an/or development
  3. Provision, Conceptualize, design, and build secure IT systems
Down
  1. and Defend, Identification, analysis and mitigation of threats
  2. Examine cyber events and/or crimes of IT systems
  3. Review and evaluate incoming cybersecurity information
  4. and maintain, Provide support, administration and maintenance

7 Clues: Examine cyber events and/or crimes of IT systemsReview and evaluate incoming cybersecurity informationand Operate, Specialized denial and deception operationsProvision, Conceptualize, design, and build secure IT systemsand Defend, Identification, analysis and mitigation of threatsand maintain, Provide support, administration and maintenance...

CYBER SECURITY 2023-12-27

CYBER SECURITY crossword puzzle
Across
  1. Software update designed to fix security vulnerabilities.
  2. Interconnected computers facilitating communication and data exchange.
  3. Measures to protect computer systems from attacks.
  4. Hint: Verifying the identity of a user through passwords or biometrics.
  5. Secret code for user access.
  6. Deceptive emails or websites aiming to steal data.
  7. breach Unauthorized access leading to the exposure of sensitive information.
Down
  1. Software designed to harm or exploit computer systems.
  2. Software designed to detect and remove malicious programs.
  3. Converts sensitive information into a secret code.
  4. Unauthorized access or breach into a system.
  5. Deliberate exploitation of computer systems for malicious purposes.
  6. Acts as a digital barrier to unauthorized access.
  7. Requires two forms of identification for access.
  8. Hint: Weakness in a system that could be exploited by attackers.

15 Clues: Secret code for user access.Unauthorized access or breach into a system.Requires two forms of identification for access.Acts as a digital barrier to unauthorized access.Converts sensitive information into a secret code.Measures to protect computer systems from attacks.Deceptive emails or websites aiming to steal data....

DTIN- Final Crossword Part 2 2024-03-21

DTIN- Final Crossword Part 2 crossword puzzle
Across
  1. Type of digital currency that uses cryptography
  2. Methodology promoting continuous iteration of development
  3. Style of education through electronic and online media
  4. Network of physical objects connected to the internet
  5. Field involving analysis of raw data to draw conclusions
  6. Platforms for social interaction and content sharing
  7. Term for currency available only in digital form
  8. Large and complex data sets that are difficult to process
  9. Delivery of computing services over the internet
Down
  1. Decentralized ledger technology behind cryptocurrencies
  2. Simulated experience that can be similar to or different from the real world
  3. Protection of internet-connected systems from cyber threats
  4. Mobile phone with advanced features and connectivity
  5. Record of one's internet usage and online activities
  6. AI subset involving algorithms that learn over time

15 Clues: Type of digital currency that uses cryptographyTerm for currency available only in digital formDelivery of computing services over the internetAI subset involving algorithms that learn over timeMobile phone with advanced features and connectivityRecord of one's internet usage and online activitiesPlatforms for social interaction and content sharing...

Profesi Bidang Informatika 2025-04-10

Profesi Bidang Informatika crossword puzzle
Across
  1. : Orang yang menulis dan mengembangkan kode program
  2. : Profesi yang bertugas membangun dan mengembangkan aplikasi
  3. : Bidang yang berfokus pada perlindungan sistem dari serangan digital
  4. : Developer yang menguasai frontend dan backend
  5. : Bagian dari pengembangan web yang berhubungan dengan tampilan
  6. : Tempat penyimpanan data dalam sistem komputer
Down
  1. : Orang yang memberikan bantuan teknis kepada pengguna komputer
  2. : Profesi teknis dalam perancangan dan pengembangan sistem
  3. : Bagian dari pengembangan web yang mengatur logika dan basis data
  4. : Sebutan lain untuk orang yang menulis kode
  5. : Profesi yang fokus pada tampilan dan pengalaman pengguna
  6. : Seseorang yang mengakses sistem secara tidak sah, bisa positif atau negatif
  7. : Orang yang mengelola dan memelihara sistem jaringan dan server
  8. : Gabungan tugas development dan operations dalam pengembangan perangkat lunak
  9. : Orang yang menganalisis sistem dan kebutuhan perangkat lunak

15 Clues: : Sebutan lain untuk orang yang menulis kode: Developer yang menguasai frontend dan backend: Tempat penyimpanan data dalam sistem komputer: Orang yang menulis dan mengembangkan kode program: Profesi teknis dalam perancangan dan pengembangan sistem: Profesi yang fokus pada tampilan dan pengalaman pengguna...

Unlock Innovation 2025-09-12

Unlock Innovation crossword puzzle
Across
  1. Careful study to discover or develop new ideas.
  2. Word often used for devices like watches, TVs, or homes.
  3. Technology behind Bitcoin and secure digital records.
  4. The use of science and tools to solve problems.
  5. Innovation is all about shaping this.
  6. Legal protection for an invention.
  7. Where data is stored online instead of your computer.
  8. Machines that can “think” and “learn” like humans (abbr.).
  9. Immersive 3D experience using special headsets.
Down
  1. The ability to think of new ideas.
  2. The creative process of planning how something will look or work.
  3. A young company built on innovative ideas.
  4. The first working model of a new product.
  5. Machines designed to perform tasks like humans.
  6. Protecting systems and data from online attacks.

15 Clues: The ability to think of new ideas.Legal protection for an invention.Innovation is all about shaping this.The first working model of a new product.A young company built on innovative ideas.Careful study to discover or develop new ideas.Machines designed to perform tasks like humans.The use of science and tools to solve problems....

Easy Cyber Security 2021-11-28

Easy Cyber Security crossword puzzle
Across
  1. the topic is
  2. not fishing but
  3. I should open every attachment I get
  4. Bad software that infects your computer is called ______
  5. the people who attack us are called ______
Down
  1. A ____ breech is when a criminal steals confidential information
  2. you can't use your computer until you pay because you have _______
  3. I should always use a ______ password
  4. you get an email from someone you don't know asking you to open an attachment it is a

9 Clues: the topic isnot fishing butI should open every attachment I getI should always use a ______ passwordthe people who attack us are called ______Bad software that infects your computer is called ______A ____ breech is when a criminal steals confidential informationyou can't use your computer until you pay because you have _______...

business 2025-05-22

business crossword puzzle
Across
  1. RATE Leaving a company, often measured in percentages (HR).
  2. Strategy that compares performance with top competitors (Business).
  3. Security that protects systems and data (Tech).
  4. INNOVATION A revolutionary idea that changes the market (Business).
Down
  1. Design that improves how people interact with a product (Tech).
  2. Bringing new workers into a company smoothly (HR).
  3. Business model: selling directly to consumers (Business).
  4. AUDIENCE Group of people you market your product to (Marketing).
  5. Total money earned (Finance).

9 Clues: Total money earned (Finance).Security that protects systems and data (Tech).Bringing new workers into a company smoothly (HR).Business model: selling directly to consumers (Business).RATE Leaving a company, often measured in percentages (HR).Design that improves how people interact with a product (Tech)....

Cybersecurity Awareness Month - 2023 2023-10-17

Cybersecurity Awareness Month - 2023 crossword puzzle
Across
  1. an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
  2. one of the biggest ransomware attacks
  3. an unwanted software designed to throw advertisements up on your screen, most often within a web browser
  4. a set of changes to a computer program or its supporting data designed to update, fix, or improve
  5. a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
  6. is an authentication method that requires the user to provide two or more verification factors to gain access
Down
  1. a malware that misleads users of its true intent by disguising itself as a standard program
  2. a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  3. designed to detect and destroy computer viruses
  4. validating the user identity
  5. will you stop clicking phishing links?
  6. a self-replicating virus that does not alter files but resides in active memory and duplicates itself
  7. a type of characters that you should use in your passwords
  8. harmful software

14 Clues: harmful softwarevalidating the user identityone of the biggest ransomware attackswill you stop clicking phishing links?designed to detect and destroy computer virusesa type of characters that you should use in your passwordsa malware that misleads users of its true intent by disguising itself as a standard program...

FUN CyberSecurity Puzzle CIS120 2025-03-18

FUN CyberSecurity Puzzle CIS120 crossword puzzle
Across
  1. Rule specific configuration setting that determines how data flows through a firewall.
  2. type of malware that spreads by attaching itself to other programs or files.
  3. cyberattack that redirects users to fake websites to steal personal information.
  4. A network compromised of computers controlled remotely to perform certain activities.
  5. The process of converting data into code to prevent hacks.
  6. A program that records keystrokes to steal information like passwords and Keys.
  7. A person who gains unauthorized access to systems or networks.
Down
  1. type of malware that replicates itself to spread across networks without needing a host file.
  2. A group of devices used to monitor and gather information without user consent.
  3. An act of disguising communication to appear as if it's from a trusted source.
  4. Software updates. These fix vulnerabilities or improve security.
  5. Malware or Hacker that locks users out of their system. until ransom is paid.
  6. Factor Authentication The security process that requires two forms of verification to access an account.
  7. vulnerability in software that is unknown to the vendor and can be exploited by attackers.

14 Clues: The process of converting data into code to prevent hacks.A person who gains unauthorized access to systems or networks.Software updates. These fix vulnerabilities or improve security.type of malware that spreads by attaching itself to other programs or files.Malware or Hacker that locks users out of their system. until ransom is paid....

Cybersecurity and Compliance Week! 2025-11-10

Cybersecurity and Compliance Week! crossword puzzle
Across
  1. What emails are you supposed to report to IT?
  2. What is a security measure that requires at least two forms of identification?
  3. Who is a person who gains unauthorized access to computer systems?
  4. What is the process of converting data into a secure format?
  5. Who is the HR Reporting Officer?
  6. What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
  7. What is the term for the agreement between covered entities and business associates?
  8. You are the first line of ___ in protection of DDID and AHS
Down
  1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. What is a central concept of HIPAA that protects individuals' health information?
  3. Who is the HIPAA Privacy Officer?
  4. What is the term for malicious software?
  5. Who is the Security Officer?
  6. What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?

14 Clues: Who is the Security Officer?Who is the HR Reporting Officer?Who is the HIPAA Privacy Officer?What is the term for malicious software?What emails are you supposed to report to IT?You are the first line of ___ in protection of DDID and AHSWhat is the process of converting data into a secure format?...

Cybersecurity 701 Unit 5 2025-11-10

Cybersecurity 701 Unit 5 crossword puzzle
Across
  1. A systematic examination of security controls and configurations to identify issues and ensure compliance.
  2. A validation method that uses vulnerability scanning tools again to check the effectiveness of previous remediation efforts
  3. A remediation action that involves dividing a network into smaller, isolated sections to contain threats.
  4. A single virtual or physical host that is configured to appear vulnerable and/or attractive to potential attackers to lure them in
  5. A network composed of multiple deception hosts, which is more difficult for attackers to detect.
  6. A method of ensuring application security by analyzing source code or binary code without executing the application
Down
  1. The initial phase of a penetration test involving intelligence gathering on the target system or network
  2. The method of isolating or restricting access to compromised or suspicious systems or data to contain and limit the impact of a security incident.
  3. A cybersecurity practice that involves simulating cyberattacks to proactively identify vulnerabilities in a system.
  4. A bait file intended to be accessed by malicious actors, which sends an alarm and indicates unauthorized activity in a system
  5. The abbreviation for tools designed to prevent unauthorized access, use, or transmission of sensitive data.
  6. The abbreviation for a comprehensive solution that centralizes log and event data to quickly respond to incidents
  7. Fictitious words or records added to legitimate databases whose presence indicates stolen data, serving as a passive detection method.
  8. A network protocol that collects IP traffic flow information for analysis and monitoring to provide insight into network traffic patterns.

14 Clues: A network composed of multiple deception hosts, which is more difficult for attackers to detect.The initial phase of a penetration test involving intelligence gathering on the target system or networkA remediation action that involves dividing a network into smaller, isolated sections to contain threats....

Industry Buzz 2025-01-07

Industry Buzz crossword puzzle
Across
  1. Networks, cybersecurity, coding, software
  2. Therapy, counseling, mental health, wellbeing
Down
  1. Patient care, diagnoses, treatment, hospitals
  2. Marketing, finance, strategy, management
  3. Curriculum, pedagogy, classroom, lesson plans

5 Clues: Marketing, finance, strategy, managementNetworks, cybersecurity, coding, softwarePatient care, diagnoses, treatment, hospitalsCurriculum, pedagogy, classroom, lesson plansTherapy, counseling, mental health, wellbeing

YTS Kitchen Tour 2024-03-08

YTS Kitchen Tour crossword puzzle
Across
  1. Your Technology Support provided IT team
  2. The easiest way to add phsyical security
  3. Hours support is available to our customers
  4. YTS is a Cisco Meraki partner to install this in your office
  5. #1 Concern of businesses today that costs over $300,000 per incident
  6. A common project YTS can handle for our customers
Down
  1. YTS provides Zoom certified staff to handle setting this up
  2. Level of service YTS provides to all customers
  3. How to prevent phsyical access to unauthorized people

9 Clues: Your Technology Support provided IT teamThe easiest way to add phsyical securityHours support is available to our customersLevel of service YTS provides to all customersA common project YTS can handle for our customersHow to prevent phsyical access to unauthorized peopleYTS provides Zoom certified staff to handle setting this up...

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. The individuals who control access to people, data, and systems
  2. Kwiktrip's password policy requires that coworkers change their passwords __days
  3. You can help fight cybercrime by becoming a __________
  4. What is the common hacking method
  5. These are designed to maintain the security of everyone associated with an organization
  6. This attack occurs when cybercriminals research and track which sites employees visit the most
Down
  1. _____are the last line of defense
  2. Failure to run these equals failure to patch security vulnerabilities
  3. This security tool identified and removes malicious programs
  4. This dangerous attack targets specific people or organization, often with custom made email or messages
  5. Stealing money is the main goal behind this type of malware
  6. Any scenario that triggers emotions should also trigger your ______
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. What should you do when a workstation or device is no longer in use
  9. The future of security is_____, not machines

15 Clues: _____are the last line of defenseWhat is the common hacking methodThe future of security is_____, not machinesYou can help fight cybercrime by becoming a __________Stealing money is the main goal behind this type of malwareThis security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

Cybersecurity Fundamental Chapter 1 2022-11-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. attacks that originate from within an organization.
  2. the honeynet project.
  3. unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
  4. breaks into network or computer systems to discover weakness in order to improve the security of these systems.
  5. infragard is an example of widespread sharing of cyber intelligent.
  6. groups of criminals break into computers or networks to gain access for various reason.
  7. who rally and protest against different political and social ideas
  8. external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
  1. somewhere between white and black hat attackers.
  2. grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
  3. hobbyists mostly limited to pranks and vandalism, have little or no skills.
  4. nation common vulnerabilities and exposures (CVE) database.
  5. black hat hackers who are either self-employed or working for large cybercrime organizations.
  6. the standard provides a framework for implementing cybersecurity measures within an organization.

14 Clues: the honeynet project.somewhere between white and black hat attackers.attacks that originate from within an organization.nation common vulnerabilities and exposures (CVE) database.who rally and protest against different political and social ideasinfragard is an example of widespread sharing of cyber intelligent....

Technology Vocabulary 2025-05-03

Technology Vocabulary crossword puzzle
Across
  1. A product of digital audio
  2. A set of rules to solve a problem in a series of steps
  3. Listening or watching sound or video directly from the internet
  4. Protection of computer software
Down
  1. Username and Password
  2. Social media browse

6 Clues: Social media browseUsername and PasswordA product of digital audioProtection of computer softwareA set of rules to solve a problem in a series of stepsListening or watching sound or video directly from the internet

Data Privacy and Cybersecurity 2022-08-15

Data Privacy and Cybersecurity crossword puzzle
Across
  1. This 2020 ballot initiative amended 2 down
  2. This type of document guides an organization's response after a data privacy and security incident
  3. A law firm that guides an organization through a data privacy and security incident
  4. A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
  5. This European Union law served as the basis for the creation of 2 down
  6. Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
  7. A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
  8. An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
  1. Number of comprehensive consumer privacy laws in the United States
  2. The United States' first state-specific consumer privacy law
  3. A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
  4. Unauthorized activity on an organization’s digital network
  5. The Advisen 2022 "Cyber Law Firm of the Year"
  6. This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"

14 Clues: This 2020 ballot initiative amended 2 downThe Advisen 2022 "Cyber Law Firm of the Year"Unauthorized activity on an organization’s digital networkThe United States' first state-specific consumer privacy lawNumber of comprehensive consumer privacy laws in the United StatesThis year's Cybersecurity Awareness Month theme - "See ___ in Cyber"...

Cybersecurity Fundamentals Chapter 8 2022-11-08

Cybersecurity Fundamentals Chapter 8 crossword puzzle
Across
  1. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
  2. poorly enforced security policies, no awareness of security
  3. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
  4. open source linux security distribution.
  5. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
  6. a method of testing the areas of weakness in systems by using various malicious techniques.
  7. includes the users who access the organization's information system.
Down
  1. assess computer, computer systems, networks, or applications for weakness.
  2. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
  3. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
  4. laws prohibit undesired behaviors.
  5. intercept and log network traffic
  6. provides free analysis and warning service to internet users and organizations.
  7. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.

14 Clues: intercept and log network trafficlaws prohibit undesired behaviors.open source linux security distribution.poorly enforced security policies, no awareness of securityincludes the users who access the organization's information system.assess computer, computer systems, networks, or applications for weakness....

Chapter 8: Cybersecurity Vocab Crossword 2025-04-08

Chapter 8: Cybersecurity Vocab Crossword crossword puzzle
Across
  1. Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
  2. a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
  3. Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
  4. Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
  5. Phish: phishing attack where the hacker sends a message for you to log back into your account.
  6. SMS phishing text messages asking you to click here.
  7. Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
  8. a system designed to block unauthorized access while still allowing outward communication.
  9. Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
  1. a secret phrase used to gain admission into something.
  2. voicemail messages demanding you to take action.
  3. software that is designed to disrupt, damage, or gain unauthorized access to a computer.
  4. creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
  5. The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
  6. Drive: a data storage device that can be used even when the device is turned off.
  7. Cloud: a data storage device that is stored on the internet
  8. Software: a program designed to detect and remove viruses and other malware from your computer.
  9. every aspect of your defense to fight the hackers.
  10. Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
  11. Engineering: the use of deception to manipulate an individual into giving personal information away.
  12. Phish: phishing attack where the hacker sends a message regarding a package being delivered.
  13. sending fraudulent messages that imitate a real company in hope of being given personal information.
  14. Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.

23 Clues: voicemail messages demanding you to take action.every aspect of your defense to fight the hackers.SMS phishing text messages asking you to click here.a secret phrase used to gain admission into something.Cloud: a data storage device that is stored on the internetDrive: a data storage device that can be used even when the device is turned off....

Cybersecurity Awareness Month Crossword Puzzle 2025-10-16

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Software designed with intent to harm
  2. Overloads a network to kill it
  3. Secretly collects private info
  4. Way to send messages over internet
  5. Intrusively displays unwanted advertisements
  6. Identity to access a website
  7. Scrambles info to protect it
  8. Detects, prevents, and removes malware
  9. Attempt by Hackers to compromise data
  10. Locks you out system until paid
  11. A trick to get private info
Down
  1. Combination of stuff for security
  2. Disguises as legitimate software but bad
  3. Process to verify someone's identity
  4. Barrier between a trusted network
  5. Programs that attach and spread file
  6. A software update to fix vulnerabilities
  7. Bad guy who steals info
  8. Self replicating program that spreads independently
  9. Network of malware infected computers

20 Clues: Bad guy who steals infoA trick to get private infoIdentity to access a websiteScrambles info to protect itOverloads a network to kill itSecretly collects private infoLocks you out system until paidCombination of stuff for securityBarrier between a trusted networkWay to send messages over internetProcess to verify someone's identity...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

PAW 2024 Crossword Puzzle 2024-05-17

PAW 2024 Crossword Puzzle crossword puzzle
Across
  1. Check twice that all information is the correct information for the correct person _____ to releasing it.
  2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  4. Always verify the source of an email ___________ clicking open any links.
  5. The patient must be informed of the purpose of the _________, use, or disclosure of their personal health information.
  6. When faxing, ensure that the fax _____-sheet is free of any personal health information.
  7. All access to personal health information must be for a ____ -related need-to-know.
  8. A patient may not only request confidential status for privacy reasons but may also require it for ______ reasons.
  9. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
Down
  1. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  2. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  3. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  4. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors, including curiosity and a concern about the well-being about others.
  5. All access to personal health information must be limited to what is _________ to perform your job duties.
  6. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  7. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  8. A strong passphrase should be at least four words and ___________ characters in length.
  9. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
  10. Consent must be _________, whether it is written or verbal.

19 Clues: Consent must be _________, whether it is written or verbal.Always verify the source of an email ___________ clicking open any links.All access to personal health information must be for a ____ -related need-to-know.A strong passphrase should be at least four words and ___________ characters in length....

Data Breach Crossword 2025-03-28

Data Breach Crossword crossword puzzle
Across
  1. A type of attack that tricks users into revealing information (8 letters)
  2. Unauthorized access to data (6 letters)
  3. Sensitive information that could be compromised (8 letters)
  4. Someone who gains unauthorised access to data (6 letters)
  5. The process of keeping information safe (13 letters)
Down
  1. Financial consequences of breaching the DPA (5 letters)
  2. Damage to a company's public image (10 letters)
  3. Regulation that protects personal data in the EU
  4. A security measure that verifies identity (9 letters)
  5. A type of software used to steal data (7 letters)
  6. The act of making data unreadable to unauthorized users(10 letters)
  7. A measure to prevent unauthorized access (9 letters)

12 Clues: Unauthorized access to data (6 letters)Damage to a company's public image (10 letters)Regulation that protects personal data in the EUA type of software used to steal data (7 letters)A measure to prevent unauthorized access (9 letters)The process of keeping information safe (13 letters)A security measure that verifies identity (9 letters)...

CSE167 Terminology 2022-04-28

CSE167 Terminology crossword puzzle
Across
  1. a conventional encryption method that used a single key encryption
  2. when information kept private and secure
  3. the state of information while it is encrypted
  4. the state of information before it is encrypted
  5. the art of protecting information and information systems
  6. provides verification of identity
Down
  1. when systems are available to those who need them
  2. type of attack that bad actors use to gain information commonly through emails
  3. an encryption method that utilizes a public/private key
  4. two words which is a form of manipulation that bad actors use to gain unauthorized access
  5. records the identities and actives
  6. when the data is not modified

12 Clues: when the data is not modifiedprovides verification of identityrecords the identities and activeswhen information kept private and securethe state of information while it is encryptedthe state of information before it is encryptedwhen systems are available to those who need theman encryption method that utilizes a public/private key...