cybersecurity Crossword Puzzles
Tugas - Jaringan komputer dan internet 2024-01-11
Across
- aspek teknis pada jaringan komputer
- nama lain jaringan komputer
- Jenis jaringan komputer
- aspek utama keamanan jaringan
- yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
- topologi jaringan yang lebih sederhana yaitu
Down
- Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
- server komponen jaringan komputer
- lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
- Network interface card
10 Clues: Network interface card • Jenis jaringan komputer • nama lain jaringan komputer • aspek utama keamanan jaringan • server komponen jaringan komputer • aspek teknis pada jaringan komputer • topologi jaringan yang lebih sederhana yaitu • lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu • ...
Technology 2025-05-05
Across
- Writing code to create software or applications.
- The physical parts of a computer system.
- Protection of internet-connected systems from cyber threats.
- The use of scientific knowledge for practical purposes.
- A mobile phone with advanced features and internet access.
Down
- Programs and operating information used by a computer.
- A software program designed for a specific task on devices.
- A global network connecting millions of computers worldwide.
- A group of interconnected computers or devices.
- An electronic device that processes data and performs tasks.
10 Clues: The physical parts of a computer system. • A group of interconnected computers or devices. • Writing code to create software or applications. • Programs and operating information used by a computer. • The use of scientific knowledge for practical purposes. • A mobile phone with advanced features and internet access. • ...
Technology & Social Media 2025-06-13
Across
- – Something that spreads quickly on the internet.
- – A saved copy of files or data in case you lose them.
- – Programs or apps used on a computer or phone.
- – A machine or tool that helps do tasks, like a phone or laptop.
- – A small, smart electronic tool or device.
Down
- – A person who affects others' opinions online.
- – Related to technology using numbers, like computers.
- – A new idea or method that improves something.
- – Protection against online attacks and hackers.
- – The right to keep your personal information safe.
10 Clues: – A small, smart electronic tool or device. • – A person who affects others' opinions online. • – A new idea or method that improves something. • – Programs or apps used on a computer or phone. • – Protection against online attacks and hackers. • – Something that spreads quickly on the internet. • – The right to keep your personal information safe. • ...
Career Focus 7 2025-11-05
Across
- What the trainee earns upon successful completion
- Critical skill needed for protecting digital assets
- Formal training received at an RTO like TAFE
Down
- The capacity to adjust to a new work task or technology
- Type of program: A university preparation or bridging course
- The ability to move skills from one job to another
- The overall program of study you're enrolled in
- National GTO with an Albury-Wodonga presence
- In demand professional who builds applications or software systems
- LETTER A one-page letter sent with a resume
10 Clues: LETTER A one-page letter sent with a resume • National GTO with an Albury-Wodonga presence • Formal training received at an RTO like TAFE • The overall program of study you're enrolled in • What the trainee earns upon successful completion • The ability to move skills from one job to another • Critical skill needed for protecting digital assets • ...
Computer Science 2024-10-25
6 Clues: Protecting your systems • password an easily guessed password • password A password that is strong • a memorized secret with a sequence of words • random password Make up your own password • device A technique someone uses to remember
keamanan digital 2025-08-28
6 Clues: apa ancaman digital berupa program? • apa kata lain dari keamanan digital • apa perangkat lunak untuk blokir virus • apa tindakan mencuri data dengan menyamar • apa jenis kode rahasia untuk melindungi akun? • apa metode verifikasi ganda untuk keamanan akun?
Info - security 2017-11-27
Across
- be attentive
- lure someone
- name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- protect networks, computers, programs and data from attack
- should not be shared
- monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- designed to detect and destroy computer viruses
- exploit weaknesses to gain access
- malicious software designed to block access to a computer system until a sum of money is paid.
- protects personal data published via the Internet
10 Clues: be attentive • lure someone • should not be shared • exploit weaknesses to gain access • designed to detect and destroy computer viruses • protects personal data published via the Internet • protect networks, computers, programs and data from attack • malicious software designed to block access to a computer system until a sum of money is paid. • ...
Profesi dan peluang usaha di bidang tkjt 2023-11-17
Across
- seseorang yang ahli dalam membuat animasi
- seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
- DBA termasuk singkatan dari
- bentuk perlindungan terhadap sistem yang terhubung ke internet
- melakukan instalasi dan konfigurasi adalah tugas?
Down
- seseorang yang ahli dalam bidang perfilm an atau video
- menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
- seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
- orang yang membuat poster,logo, disebut?
- peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu
10 Clues: DBA termasuk singkatan dari • orang yang membuat poster,logo, disebut? • seseorang yang ahli dalam membuat animasi • melakukan instalasi dan konfigurasi adalah tugas? • seseorang yang ahli dalam bidang perfilm an atau video • bentuk perlindungan terhadap sistem yang terhubung ke internet • menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang? • ...
Crossword #7 2023-11-07
Across
- A Brazilian type of music that will be performed by the Connection Trio.
- Production of this play has been delayed due to a COVID outbreak.
- The conference in which Marshall athletics compete
- A magic dragon.
Down
- Men's soccer faces this team this week.
- Education of this will be a part of the 4th Avenue Innovation Center
- A low battery will need a ________
- No.0 on the men's basketball team.
- Declared war on Hamas leading to unrest on campuses across the nation
- Science, Technology,Engineering and Mathematics.
10 Clues: A magic dragon. • A low battery will need a ________ • No.0 on the men's basketball team. • Men's soccer faces this team this week. • Science, Technology,Engineering and Mathematics. • The conference in which Marshall athletics compete • Production of this play has been delayed due to a COVID outbreak. • ...
Crossword Puzzle for you 2025-08-04
Across
- Person who works for a company or organization
- Machine that produces hard copies of digital documents
- The process of manufacturing goods in large quantities
- Person or business that buys products or services from a company
- Secure room housing computer servers and networking equipment
Down
- Practice of protecting systems and data from digital attacks
- Technology using radio waves for tracking and identification
- Material essential for electronic device manufacturing
- On-site maintenance or support provided to customers
- Device used for billing and transactions in retail
10 Clues: Person who works for a company or organization • Device used for billing and transactions in retail • On-site maintenance or support provided to customers • Material essential for electronic device manufacturing • Machine that produces hard copies of digital documents • The process of manufacturing goods in large quantities • ...
Cybersecurity Crossword Puzzle 2023-11-10
Across
- A champion of cybersecurity
- The process of identifying a users identity
- Changing the IP address of an email so it appears to come from a trusted source
- Malicious software used to damage or infect a system
- A means of attack, a vulnerability
- Technology used to keep hackers out of a system
Down
- Coding to protect information
- Malware that hijacks a system in return for payment
- Malware that corrupts a system, then spreads to other systems
- Practice of posing as someone legitimate to gain access
10 Clues: A champion of cybersecurity • Coding to protect information • A means of attack, a vulnerability • The process of identifying a users identity • Technology used to keep hackers out of a system • Malware that hijacks a system in return for payment • Malicious software used to damage or infect a system • Practice of posing as someone legitimate to gain access • ...
STEM in the News 2023-09-26
Across
- regulates anyone who stores, transmits, or possesses cardholder data
- Rules created for keeping things under control
- The act of staying safe online
- Using or creating ways to use services for malicious purposes
- Regulates use and transfer of Healthcare data
Down
- Moving something from one place to another
- An online exploit of a service or information
- Handles the storing, handling, and transmission of digital data
- Created by the EU to protect their citizens online
- Online or relating to a computer
10 Clues: The act of staying safe online • Online or relating to a computer • Moving something from one place to another • An online exploit of a service or information • Regulates use and transfer of Healthcare data • Rules created for keeping things under control • Created by the EU to protect their citizens online • ...
The Department of Homeland Security Crossword 2024-12-09
Across
- The main mission of DHS is to stop this threat.
- CISA, stands for ___________ and Infrastructure Security Agency.
- ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
- DHS operates at the ______ level.
- One weakness of the DHS is the __________ jurisdiction.
- The DHS Oversees ______ security and lawful immigration.
Down
- One of the DHS agencies.
- The person who appoints the Secretary of Homeland Security.
- DHS works to help communities recover through ________.
- The DHS is the newest _______-level department.
10 Clues: One of the DHS agencies. • DHS operates at the ______ level. • The main mission of DHS is to stop this threat. • The DHS is the newest _______-level department. • DHS works to help communities recover through ________. • One weakness of the DHS is the __________ jurisdiction. • The DHS Oversees ______ security and lawful immigration. • ...
Theme: Technology 2024-07-24
Across
- An organized collection of data
- A machine capable of carrying out complex actions automatically
- A global network connecting millions of private public academic and government networks
- A process or set of rules to be followed in calculations or other problem-solving operations
- The programs and other operating information used by a computer
Down
- The practice of protecting systems networks and programs from digital attacks
- A mobile phone with advanced features
- A portable personal computer
- An unmanned aerial vehicle
- Abbreviation for Artificial Intelligence
10 Clues: An unmanned aerial vehicle • A portable personal computer • An organized collection of data • A mobile phone with advanced features • Abbreviation for Artificial Intelligence • A machine capable of carrying out complex actions automatically • The programs and other operating information used by a computer • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
- fundamental component of ipsec virtual private networks (vpn).
- actual barriers deployed to prevent direct contact with systems.
- way to store and transmit data so only the intended recipient can read or process it.
- to encrypt and decrypt messages.
- has a fixed block size of 128, 192 or 256 bits.
- use one key to encrypt data and a different key to decrypt data.
- implementing cryptography into a web browser.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
- hardware and software solutions used to manage access resources and systems.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- science of making and breaking secret codes.
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- a protocol that provides a secure remote access connection to network devices.
15 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • actual barriers deployed to prevent direct contact with systems. • ...
Cybersecurity Awareness Month - 2024 2024-10-09
Across
- - When somebody sends an e-mail with a link to a bogus website it is called
- - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- - Protecting the data against unauthorized access or disclosure is
- - Its a type of malware that disguises itself as legitimate code.
- Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- - This can slow down your computer AND watch everywhere you go on the internet
- - Data that is used to Identify specific individual
- - Impact of Threat exploiting a vulnerability is known as
Down
- - The control that you have over your personal information and how that information is used
- - A globally accepted and recognized standard for cyber security is
- - Three principles of ISMS are Confidentiality, ____ and Availability
- - Critical security component that determines what resources a user can access and what actions they can perform
- - An event that impacts the organization and requires a response and recovery.
- -PII Bank information falls under which category of data classification.
- - Unique sets of characters used to authenticate user identity and protect personal data or system access.
15 Clues: - Data that is used to Identify specific individual • - Impact of Threat exploiting a vulnerability is known as • - Its a type of malware that disguises itself as legitimate code. • - Protecting the data against unauthorized access or disclosure is • - A globally accepted and recognized standard for cyber security is • ...
Prestige Cybersecurity Awareness Month 2025-10-16
Across
- A network security system that monitors and controls incoming and outgoing traffic
- A type of cyber attack that tricks users into revealing personal information
- The principle of ensuring data is not altered or tampered with
- A software update that fixes security vulnerabilities
- Malware that locks data and demands payment for release
- A file or program that appears harmless but contains malicious code
- Software designed to disrupt, damage, or gain unauthorized access
- The process of converting data into a coded form to prevent unauthorized access
Down
- The practice of hiding messages so only the intended recipient can read them
- Software that secretly gathers user information
- A person who gains unauthorized access to systems for malicious purposes
- An extra layer of security requiring two forms of identification
- A secret word or phrase used to gain access
- A fake website or email designed to look legitimate
- A service that encrypts your internet connection for privacy
15 Clues: A secret word or phrase used to gain access • Software that secretly gathers user information • A fake website or email designed to look legitimate • A software update that fixes security vulnerabilities • Malware that locks data and demands payment for release • A service that encrypts your internet connection for privacy • ...
Computer Studies 9/10 Crossword 2024-05-21
Across
- A high-level programming language often used for web development.
- The physical components of a computer system.
- A software application used to access the web.
- An interconnected group of computers.
- The smallest unit of digital information.
- The primary storage device in a computer.
- A sequence of characters.
- A temporary storage that provides fast access to data.
- A set of instructions that a computer follows to perform a task.
- The standard language for creating web pages.
Down
- The main circuit board of a computer.
- A named collection of related data.
- Basic unit of data in computing.
- A global system of interconnected computer networks.
- The practice of protecting computers and data from unauthorized access.
- A device for entering data into a computer.
- To find and correct errors in a program.
- A way of sending information over the internet securely.
- The "brain" of the computer.
- An error in a program.
20 Clues: An error in a program. • A sequence of characters. • The "brain" of the computer. • Basic unit of data in computing. • A named collection of related data. • The main circuit board of a computer. • An interconnected group of computers. • To find and correct errors in a program. • The smallest unit of digital information. • The primary storage device in a computer. • ...
Andy & George’s Wedding Crossword 2024-05-28
Across
- What school did George go to?
- What is our favourite number?
- What was our wedding present from Bob & Wendy?
- How many years have we been together?
- What school did Andy go to?
- Where did George go to uni?
- Where did we first meet?
- Where do we live?
- Where did Andy go to uni?
- On what street was their first flat?
- What is George’s middle name?
Down
- What’s Andy’s favourite flavour of icecream?
- What colour is the diamond in George’s ring?
- Where does George work?
- What industry does Andy work in?
- What did Andy study at uni?
- What name is George saved under in Andy’s phone?
- What’s Andy’s coffee order?
- Where did we get engaged?
- What is Andy’s favourite hobby?
- What’s George’s favourite film?
- What was our first dog called?
- What colour are George’s eyes?
- What is Andy’s middle name?
24 Clues: Where do we live? • Where does George work? • Where did we first meet? • Where did we get engaged? • Where did Andy go to uni? • What did Andy study at uni? • What school did Andy go to? • Where did George go to uni? • What’s Andy’s coffee order? • What is Andy’s middle name? • What school did George go to? • What is our favourite number? • What is George’s middle name? • ...
Human Ingenuity and Technology 2024-12-06
Across
- Platforms for online social interaction
- Field focused on designing intelligent machines
- Autonomous vehicles with no human driver
- Protection of computer systems from theft or damage
- Additive manufacturing process creating three-dimensional objects
- Creating a genetically identical copy of an organism
- Manipulation of matter on an atomic scale
- Proposed point of rapid technological growth
- A new device or method created through innovation
- Objects orbiting Earth for communication and research
- Simulated experience that can mimic the real world
Down
- Residence equipped with interconnected devices for automation
- Smart devices worn on the body for various applications
- Using biological systems for technological applications
- Sustainable energy sources like solar and wind
- Virtual money used for online transactions
- Creative problem-solving of mankind
- Multi-functional mobile device
- Altered organisms for improved traits
- Machines simulating human intelligence
20 Clues: Multi-functional mobile device • Creative problem-solving of mankind • Altered organisms for improved traits • Machines simulating human intelligence • Platforms for online social interaction • Autonomous vehicles with no human driver • Manipulation of matter on an atomic scale • Virtual money used for online transactions • Proposed point of rapid technological growth • ...
AnaBela Meitasari XF, 02 2025-04-15
Across
- Proses memeriksa kebenaran informasi disebut
- Ahli yang menangani keamanan jaringan
- Pekerja yang mengelola database
- platform populer untuk menyebarkan video budaya
- Batik adalah contoh konten digital bertema
- Perlindungan untuk logo atau simbol disebut
- Profesi yang merancang dan membangun perangkat lunak
- Lembaga pengawas konten di internet di Indonesia
- Berita palsu disebut juga
- konten di gital yang memperkenalkan tarian daerah tersebut
- Jenis konten yang merugikan dan harus disaring
- Profesi yang menganalisis data
Down
- Orang yang mendesain tampilan website
- Hak atas penemuan teknologi baru
- Hak yang melindungi karya musik dan tulisan
- Operator untuk mencari dalam situs tertentu
- Lembaga resmi pendaftaran HAKI di Indonesia
- Sistem yang memblokir konten berbahaya
- Operator pencarian untuk mengecualikan kata tertentu
- salah satu bentuk produksi konten berupa suara
- Kata kunci untuk mencari frasa persis
- Situs yang digunakan untuk mencari informasi di internet
- Hak eksklusif atas ciptaan disebut
- lstilah untuk hasil pencarian yang muncul di google
24 Clues: Berita palsu disebut juga • Profesi yang menganalisis data • Pekerja yang mengelola database • Hak atas penemuan teknologi baru • Hak eksklusif atas ciptaan disebut • Orang yang mendesain tampilan website • Ahli yang menangani keamanan jaringan • Kata kunci untuk mencari frasa persis • Sistem yang memblokir konten berbahaya • Batik adalah contoh konten digital bertema • ...
TTS INFORMATIKA 2025-04-14
Across
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Proses identifikasi atau verifikasi pengguna
- Penyusupan sistem oleh pihak tidak berwenang.
- Jenis virus komputer
- Pencurian data kartu kredit atau kartu debit
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Teknik mengakses sistem tanpa otorisasi.
- Penyerang digital yang memiliki tujuan jahat.
Down
- Kata sandi dalam sistem keamanan.
- Istilah lain untuk keamanan jaringan
- Alamat identifikasi unik setiap perangkat di jaringan.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Aksi mencari celah dalam sistem komputer.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Penipuan online melalui email atau situs palsu.
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Program pengintai aktivitas pengguna tanpa izin.
- Sandi digital yang dipakai untuk keamanan transaksi.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-14
Across
- Penyerang digital yang memiliki tujuan jahat.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Proses identifikasi atau verifikasi pengguna
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Program pengintai aktivitas pengguna tanpa izin.
- Teknik mengakses sistem tanpa otorisasi.
- Jenis virus komputer
- Kata sandi dalam sistem keamanan.
- Istilah lain untuk keamanan jaringan
Down
- Penyusupan sistem oleh pihak tidak berwenang.
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Aksi mencari celah dalam sistem komputer.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Pencurian data kartu kredit atau kartu debit
- Penipuan online melalui email atau situs palsu.
- Sandi digital yang dipakai untuk keamanan transaksi.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Pencurian data kartu kredit atau kartu debit • Proses identifikasi atau verifikasi pengguna • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
TEKA - TEKI SILANG EKONOMI DIGITAL 2025-08-21
Across
- Transaksi melalui jaringan internet
- Sistem penyimpanan data berbasis internet
- Perusahaan rintisan berbasis teknologi
- Metode pembayaran tanpa uang tunai
- Konsultan investasi keuangan
- masyarakat yang sebelumnya terpinggirkan dapat mengakses layanan keuangan, pendidikan,dan lainnya
- Platform jual beli online
- Pertanian berbasis teknologi
- Inovasi finansial berbasis teknologi
- Perantara pembayaran digital seperti OVO dan DANA
- layanan pendiidkan atau pendidikan berbasis teknologi
Down
- internet Komponen yang ada pada infrastruktur digital
- Contoh robo advisors
- Mengumpulkan dana dari banyak orang melalui plastfrom digital atau penggalangan donasi
- Sistem keamanan data
- Mata uang kripto paling terkenal
- Pinjaman modal secara online tetapi melalui investor bukan sembarangan orang dan terawasi oleh OJK
- Penyedia layanan keuangan dalam skala kecil atau masyarakat yang tidak memiliki pengetahuan cara akses pinjaman ke bank, biasanya pinjam dana melalui BPR (Bank Pengkrediatan Rakyat) untuk usaha kecil / UMKM
- Layanan transportasi yang menghubungkan dengan pengemudi dan ada real time nya
- layanan kesehatan atau konsultasi kesehatan secara online
20 Clues: Contoh robo advisors • Sistem keamanan data • Platform jual beli online • Konsultan investasi keuangan • Pertanian berbasis teknologi • Mata uang kripto paling terkenal • Metode pembayaran tanpa uang tunai • Transaksi melalui jaringan internet • Inovasi finansial berbasis teknologi • Perusahaan rintisan berbasis teknologi • Sistem penyimpanan data berbasis internet • ...
Know your Math 2025-08-30
Across
- Solves large-scale systems in structural engineering.
- Used in image compression techniques like PCA.
- Applied in heat transfer and fluid flow analysis.
- the Determines solvability of engineering systems.
- Average off the values
- Used to approximate functions in aircraft control systems.
- Applied in medical testing for disease prediction.
- Applied in vibration analysis of mechanical structures.
- Used in reliability engineering to model component lifetimes.
- Helps in predicting combined system failure chances.
- Helps detect anomalies in network traffic for cybersecurity.
Down
- Used in spam email detection.
- Used to analyze asymmetry in business profits distribution.
- Used in power flow analysis of electrical grids.
- Essential in facial recognition algorithms.
- Speeds up computations in control systems.
- Measures risk in stock market analysis.
- Central Value of the data set
- Applied in electrical circuit analysis for sinusoidal signals.
- Used in robotics for motion transformation between coordinate systems.
20 Clues: Average off the values • Used in spam email detection. • Central Value of the data set • Measures risk in stock market analysis. • Speeds up computations in control systems. • Essential in facial recognition algorithms. • Used in image compression techniques like PCA. • Used in power flow analysis of electrical grids. • Applied in heat transfer and fluid flow analysis. • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Masa depan ekonomi digital bergantung pada literasi
- → Perusahaan baru yang berbasis teknologi disebut
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Risiko ekonomi digital adalah kebocoran
- → Berjualan melalui marketplace online termasuk kegiatan
- → Contoh aplikasi fintech di Indonesia adalah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Pemasaran melalui media sosial disebut
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
- → Kecerdasan buatan dikenal juga dengan istilah
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
Cybersecurity Decoded 2 2020-07-30
10 Clues: childhood game • the iron giant • Not canned food • Troy's downfall • type of cleanliness • sugar comes in these • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses • Dr's are known to have the messiest ones
Cybersecurity crossword puzzle 2023-12-14
Across
- A technique to deceive individuals into providing sensitive information.
- Software used to protect against viruses and malware.
- A sequence of characters used to authenticate identity or access.
- A program that replicates itself and spreads to other computers.
- An encrypted connection between a web browser and a server.
Down
- The practice of keeping software up to date to protect against vulnerabilities.
- A system that verifies a user's identity through a unique physical characteristic.
- A secret code that only authorized parties should be able to read.
- A type of attack that floods a network to disrupt its operation.
- An organization that identifies security flaws in software.
10 Clues: Software used to protect against viruses and malware. • An organization that identifies security flaws in software. • An encrypted connection between a web browser and a server. • A type of attack that floods a network to disrupt its operation. • A program that replicates itself and spreads to other computers. • ...
Cybersecurity e I.A. 2024-05-23
Across
- riconoscimento online
- parola d'accesso
- "pescare" dati finanziari e codici di accesso di un utente
- veniva definito "virus per computer"
- attività criminale tramite dispositivi digitali
Down
- anche detto Anti-Malware
- Tra LAN e WAN
- tratta di scritture nascoste
- punto debole di un sistema
- manovra offensiva contro sistemi informatici
10 Clues: Tra LAN e WAN • parola d'accesso • riconoscimento online • anche detto Anti-Malware • punto debole di un sistema • tratta di scritture nascoste • veniva definito "virus per computer" • manovra offensiva contro sistemi informatici • attività criminale tramite dispositivi digitali • "pescare" dati finanziari e codici di accesso di un utente
Cybersecurity Intro Vocabulary 2023-09-07
Across
- the avenue or path the hacker uses to commit the attack
- usually operates outside the law
- a hacker who is generally ethical and law-abiding.
- the act of circumventing or breaking past security boundaries.
Down
- process of protecting a system against unintended or malicious changes or use
- a malicious software code that is unleashed and attempts to perform its destructive content
- an attempt to steal, damage, or destroy data or a computer system
- a person who engages in hacking
- They do no harm, but they don't ask permission
- hacking into a phone system
10 Clues: hacking into a phone system • a person who engages in hacking • usually operates outside the law • They do no harm, but they don't ask permission • a hacker who is generally ethical and law-abiding. • the avenue or path the hacker uses to commit the attack • the act of circumventing or breaking past security boundaries. • ...
Cybersecurity Awareness Puzzle 2023-09-20
Across
- ______ is a type of phishing that uses voice calls to manipulate a target.
- Type of malware that threatens to expose information unless a payment is made.
- Cyber defense agency that is hosting National Cybersecurity Awareness Month.
- Social engineering tactic that research is done on the victim to personalize the attack.
- Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
- A new social engineering attack involves QR codes and is a form of a *ishing attacks.
- According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
- Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
- A ________ manager is best the way to create and maintain strong passwords.
- In 2023, this brand name was abused the most in phishing attacks.
10 Clues: In 2023, this brand name was abused the most in phishing attacks. • ______ is a type of phishing that uses voice calls to manipulate a target. • A ________ manager is best the way to create and maintain strong passwords. • Cyber defense agency that is hosting National Cybersecurity Awareness Month. • ...
Key Cybersecurity Vocabulary 2025-07-10
Across
- Tools that collect and analyze security data to detect threats
- Detects and blocks suspicious activities in real time
- Keeping systems up to date with software fixes to close security hole
- A network of infected computers controlled by an attacker, often used for DDoS
Down
- Tricking people into revealing confidential information
- Monitors network traffic for suspicious activity and alerts administrators
- Probing a system for open ports to find possible vulnerabilities
- A fake communication used to trick users into giving up sensitive data
- Requires two methods to verify a user’s identity
- Verifying the identity of a user, device, or process before allowing access
10 Clues: Requires two methods to verify a user’s identity • Detects and blocks suspicious activities in real time • Tricking people into revealing confidential information • Tools that collect and analyze security data to detect threats • Probing a system for open ports to find possible vulnerabilities • ...
IT Cybersecurity terms 2025-08-28
Across
- Regular software updates to fix vulnerabilities
- Extra step beyond a password
- Do this when you leave your desk
- Always create a copy of important files
- Encrypts your connection on public Wi-Fi
- Fake message trying to steal information
Down
- Turn the device off and on to fix issues
- Strongest defense is user awareness
- Protect files or drives from unauthorized access
- Never share this secret login credential
10 Clues: Extra step beyond a password • Do this when you leave your desk • Strongest defense is user awareness • Always create a copy of important files • Turn the device off and on to fix issues • Never share this secret login credential • Encrypts your connection on public Wi-Fi • Fake message trying to steal information • Regular software updates to fix vulnerabilities • ...
SecuritySquares-Advanced 2023-03-03
Across
- 01101100 01101111 01110111 01100101 01110011 00001010
- A piece of code put in to fix an error
- Unique string of numbers that identifies a device connected to a network
- Intent to do harm
- The second in CIA triad
- When an attacker tricks users into clicking on hidden elements
- A characteristic or distinctive pattern that can be searched for
- Rivest-Shamir-Adleman
- Pay or else
- A type of media manipulation
Down
- A White hat hacker
- Converting enciphered text to plain text
- Unique identifier assigned to a NIC
- The use of mathematical techniques to provide security services
- A scam without a rod and reel but with voice mail
- The process of uncovering trends and patterns in large amounts of data
- Information Technology Infrastructure Library
- The process for overseeing the cybersecurity teams
18 Clues: Pay or else • Intent to do harm • A White hat hacker • Rivest-Shamir-Adleman • The second in CIA triad • A type of media manipulation • Unique identifier assigned to a NIC • A piece of code put in to fix an error • Converting enciphered text to plain text • Information Technology Infrastructure Library • A scam without a rod and reel but with voice mail • ...
Cybersecurity e I.A. 2024-05-23
Across
- riconoscimento online
- parola d'accesso
- "pescare" dati finanziari e codici di accesso di un utente
- veniva definito "virus per computer"
- attività criminale tramite dispositivi digitali
Down
- anche detto Anti-Malware
- Tra LAN e WAN
- tratta di scritture nascoste
- punto debole di un sistema
- manovra offensiva contro sistemi informatici
10 Clues: Tra LAN e WAN • parola d'accesso • riconoscimento online • anche detto Anti-Malware • punto debole di un sistema • tratta di scritture nascoste • veniva definito "virus per computer" • manovra offensiva contro sistemi informatici • attività criminale tramite dispositivi digitali • "pescare" dati finanziari e codici di accesso di un utente
Cybersecurity Revision Quiz 2024-10-20
Across
- This is when someone watches over your shoulder to see your private details.
- This protects information by turning it into a secret code.
- This is when someone is mean or rude online just to upset others.
- This is a way to unlock devices using fingerprints or face scans (B________).
Down
- This is a sneaky program that spies on your computer activity.
- This is someone you can talk to if you're worried about something online. (two words)
- This looks like a gift but secretly harms your computer.
- This is when someone tricks you into giving personal information.
- This is something that all uses need. It is hard to guess and keeps your account safe. (two words)
- This software protects your computer from harmful viruses.
10 Clues: This looks like a gift but secretly harms your computer. • This software protects your computer from harmful viruses. • This protects information by turning it into a secret code. • This is a sneaky program that spies on your computer activity. • This is when someone tricks you into giving personal information. • ...
Cybersecurity Crossword Puzzle 2025-11-26
Across
- Applying updates to software to fix vulnerabilities
- Process of verifying the identity of a user or device
- Malicious software that locks data and demands payment for release.
Down
- Manipulating people into revealing confidential information
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Secret string of characters used for authentication
- Process of converting data into a coded form to prevent unauthorized access
- Software designed to disrupt, damage, or gain unauthorized access to a system
- Secure tunnel for online communication, often used for privacy
- Network security system that monitors and controls incoming and outgoing traffic
10 Clues: Applying updates to software to fix vulnerabilities • Secret string of characters used for authentication • Process of verifying the identity of a user or device • Manipulating people into revealing confidential information • Secure tunnel for online communication, often used for privacy • Malicious software that locks data and demands payment for release. • ...
Thematic Puzzle 2024-12-16
Across
- – “A structure for growing plants, also related to gases trapping heat.”
- – “The variety of life in the world or a particular habitat.”
- Exchange – “The sharing of ideas, traditions, and values between cultures.”
- – “A distributed digital ledger system.”
- – “Securing information through coding.”
- – “A global network connecting billions of devices.”
- Footprint – “The total emissions of carbon dioxide by an individual or group.”
- – “At risk of extinction.”
Down
- – “Protecting data from unauthorized access.”
- – “The natural home of a plant or animal.”
- – “A type of energy source that is sustainable.”
- Trade – “Exchange of goods and services internationally.”
- – “The act of protecting and preserving nature.”
- – “A community of interacting organisms and their environment.”
- Energy – “Energy from sustainable sources like solar or wind.”
15 Clues: – “At risk of extinction.” • – “A distributed digital ledger system.” • – “Securing information through coding.” • – “The natural home of a plant or animal.” • – “Protecting data from unauthorized access.” • – “A type of energy source that is sustainable.” • – “The act of protecting and preserving nature.” • – “A global network connecting billions of devices.” • ...
HP GPO Crossword puzzle 2022-06-22
Across
- Helps move stock for HP
- Document that explains input output and process
- Safeguarding the digital world
- Converts screen to paper
- Introducing new methods, ideas, or products
Down
- Making sure your future generations are comfortable
- The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible
7 Clues: Helps move stock for HP • Converts screen to paper • Safeguarding the digital world • Introducing new methods, ideas, or products • Document that explains input output and process • Making sure your future generations are comfortable • The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible
Digital Literacy Basics 2024-12-09
Across
- The traces you leave online
- A combination of letters, numbers, and symbols used for security
- A way to protect your personal information online
- The online platform for social interaction
- To transfer a file from the internet to your device
Down
- The software used to access the internet
- An unsolicited email attempt to steal personal information
- A virtual space to store files
8 Clues: The traces you leave online • A virtual space to store files • The software used to access the internet • The online platform for social interaction • A way to protect your personal information online • To transfer a file from the internet to your device • An unsolicited email attempt to steal personal information • ...
Industry 4.0 2025-10-17
Across
- Visual display of performance metrics
- A digitally Tech-enabled logistics network (two words)
- A reality, which creates a fully immersive digital environment
- Digital modelling of real-world processes
- Software that defines functions, protocols, and data formats to allow different software applications to communicate with each other.
- Supervisory Control and Data Acquisition (abbreviation)
- A Network of connected machines sharing data (3)Cybersecurity
- The Monitoring of the location of equipment and resources
- The examination of raw data information to find useful patterns
- A manufacturing process focused on reducing waste
- A type of manufacturing often referred to as 3D printing
- A type of maintenance that uses data analytics to prevent equipment failure
- This type of reality overlays digital information on the real world
- Near-field communication for contactless exchange
- A manufacturing software system for managing shop-floor operations (abbrev)
- A System which makes Machines capable of operating without human control
- A computerised network of remote servers which host internet data
- Software systems that controls warehouse management operations (abbreviation)
Down
- Minimising environmental impact of operations
- Protection against online threats in connected systems
- A collaborative robot that interacts physically with humans.
- A decentralised digital ledger that stores linked blocks of cryptographically secured records
- A type of factory whose physical processes and machinery are governed by an AI system, reducing the human workforce
- Manufacturing equipment which is fully controlled by digital systems.
- Key Performance Indicator
- Large volume of data that can now be collected from all aspects of manufacturing
- The capability of computational systems to perform tasks typically associated with human intelligence
- A software system that integrates and manages core business processes within an organization, such as production, supply chain, finance, and human resources
- A virtual model of a physical machine, part, process, or system
- A reality which is a blend of physical and digital worlds
- A Device used to collect and transmit performance data
- Radio-frequency identification for tracking
- Short for Overall Equipment Effectiveness)
33 Clues: Key Performance Indicator • Visual display of performance metrics • Digital modelling of real-world processes • Short for Overall Equipment Effectiveness) • Radio-frequency identification for tracking • Minimising environmental impact of operations • A manufacturing process focused on reducing waste • Near-field communication for contactless exchange • ...
Cybersecurity Awareness Month Crossword Puzzle 2022-09-15
7 Clues: A message sent on Twitter. • A network for online picture sharing. • A platform founded by Mark Zuckerburg. • The fastest growing social media platform. • An act that can be made by a Facebook user. • A self portrait taken by using the front camera. • Technology Field concerned with social media privacy.
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- A popular operating system.
- Securing computer systems against unauthorized access.
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
Down
- Desired outcomes.
- Malicious software used to gain unauthorised access to computer systems.
- Term for gaining access to a secure network through.
7 Clues: Desired outcomes. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • Malicious software used to gain unauthorised access to computer systems. • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- A popular operating system.
- Desired outcomes.
- Term for gaining access to a secure network through.
Down
- Securing computer systems against unauthorized access.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- Malicious software used to gain unauthorised access to computer systems.
7 Clues: Desired outcomes. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • Malicious software used to gain unauthorised access to computer systems. • ...
Cybersecurity101 2022-11-16
Across
- malware that is secretly spying on you and stealing your data
- act of discovering open wifi networks by driving around
- malware that encrypts your files and system demanding payment
- practice of socially engineering high value individuals of an organization
- agency responsible for strengthening cybersecurity posture in the US
- brute force technique to discover files, domains, etc.
Down
- method of a threat actor uses to return into your network/device
- phishing over the phone
- common public-key encryption algorithm
- most common threat vector for social engineering
- phishing over text
- MITRE framework for tactics techniques and procedures
12 Clues: phishing over text • phishing over the phone • common public-key encryption algorithm • most common threat vector for social engineering • MITRE framework for tactics techniques and procedures • brute force technique to discover files, domains, etc. • act of discovering open wifi networks by driving around • malware that is secretly spying on you and stealing your data • ...
SCAI Feasting with Faculty 2023-11-02
Across
- Location where data is stored in a computer's memory.
- The study of breaking codes and ciphers.
- Software designed to harm or infiltrate a computer.
- Low-level human-readable code for computers.
- Investigating digital evidence for legal purposes.
- Small storage areas inside the computer's CPU.
- Measures to keep your computer and data safe online.
Down
- Making data unreadable to unauthorized users.
- A secure way to verify the sender of a message.
- Moving information from one place to another.
- A digital barrier that protects your network from threats.
- A command that tells the computer what to do.
12 Clues: The study of breaking codes and ciphers. • Low-level human-readable code for computers. • Making data unreadable to unauthorized users. • Moving information from one place to another. • A command that tells the computer what to do. • Small storage areas inside the computer's CPU. • A secure way to verify the sender of a message. • ...
Isa usando un crusigrama 2020-08-21
Across
- te protege de el coronavirus y lo usas al tener contacto con la gente
- para enmarcar una foto
- hace que estes prevenido de lo que le pueden hacer a la computadora
- infectan archivos y destruyen datos de tu computadora
- donde guardas mucho informacion, fotos y muchas cosas tuyas
- para no dañarte los ojos al tomar sol
Down
- una enfermedad que genero una pandemia
- es donde esta tu rutina y te la recuerda al mirarlo
- para emprolijarte el pelo
- te despierta o te recuerda algo
10 Clues: para enmarcar una foto • para emprolijarte el pelo • te despierta o te recuerda algo • para no dañarte los ojos al tomar sol • una enfermedad que genero una pandemia • es donde esta tu rutina y te la recuerda al mirarlo • infectan archivos y destruyen datos de tu computadora • donde guardas mucho informacion, fotos y muchas cosas tuyas • ...
Team - AllSafe 2022-03-27
Across
- Data that can identify a specific individual
- What's common between Aetnaand cyber security? (Clue: Important to save money)
- Compliance standard to safeguard health information
- An off-site attack surface (Clud: Most SaaS platforms use this service)
- a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
- A social engineering attack
- Risk assessment of vendors, suppliers, partners, contractors, or service providers
- Head of information security program
- Method to reduce human error
- Electronically-stored health information
10 Clues: A social engineering attack • Method to reduce human error • Head of information security program • Electronically-stored health information • Data that can identify a specific individual • Compliance standard to safeguard health information • An off-site attack surface (Clud: Most SaaS platforms use this service) • ...
WeWork 109NBR - Know Your Neighbours! 2024-08-30
Across
- Singaporean home cleaning service provider
- European cybersecurity company
- Their software helps you to manage (real estate) properties
- Barbie and Hot Wheels toy company
Down
- Has an exhibition at the Funan Underground Pedestrian Link @ B2, owner of hit series ‘The King’s Avatar’
- Sea creature or digital marketing platform?
- Yuu rewards club creator (hint: check Apple/Google Play store)
- Temasek founded AI-powered computer vision application
- Global banking company, good for currency exchange
- Payments platform for Boost, McDonalds and Dunkin Donuts
10 Clues: European cybersecurity company • Barbie and Hot Wheels toy company • Singaporean home cleaning service provider • Sea creature or digital marketing platform? • Global banking company, good for currency exchange • Temasek founded AI-powered computer vision application • Payments platform for Boost, McDonalds and Dunkin Donuts • ...
Jobs of the future 2025-04-30
Across
- Farmer – Someone who uses technology to grow food in cities.
- – A person who creates computer programs and apps.
- – A person who designs and builds robots.
- – A person who helps design self-driving cars.
- – A scientist who works with genes to improve health.
Down
- – Someone who explores space and other planets.
- Expert – A person who protects computers from hackers.
- – Someone who studies and protects the environment.
- Energy Specialist – Someone who creates energy from the sun and wind.
- Biologist – A person who studies the oceans and marine life.
10 Clues: – A person who designs and builds robots. • – A person who helps design self-driving cars. • – Someone who explores space and other planets. • – A person who creates computer programs and apps. • – Someone who studies and protects the environment. • – A scientist who works with genes to improve health. • Expert – A person who protects computers from hackers. • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Refers to unwanted bulk emails that come from unknown sources
- The process of transforming data into an unreadable code
- Device that connects multiple networks
- It can be defined as the legal rules and restrictions imposed on online laws
Down
- Type of cyber attack that tricks users
- Wireless technology used to interconnect mobiles computers etc
- Network topology with a central hub
- Practice of protecting digital information
- It is a combination of two terms 'net' and 'etiquette'
- Refers to an illegal intrusion into a computer system or network
10 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
NCSAM 2024-08-27
Thinklogic 2021-09-13
'Digital' Crossword 2019-07-07
Across
- Highly digitized and connected production facility that relies on smart manufacturing
- Interconnected Digital Technologies for better customer experience
- ASTM F2792
- Systematic computational analysis of data or statistics
- Network of Internet connected objects able to collect and exchange data
- Digital version of a physical asset and/or process
- Integration of digital information with live video or the user's environment in real time
- Network of remote servers hosted on the Internet to store, manage, and process data
- Small autonomous services that work together
Down
- Simulated Intelligence in machines
- Massive Volume of Data inundated daily
- Robotic Process Automation
- Processing Quantum Bits of Data
- Techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- Digital records of transaction
15 Clues: ASTM F2792 • Robotic Process Automation • Digital records of transaction • Processing Quantum Bits of Data • Simulated Intelligence in machines • Massive Volume of Data inundated daily • Small autonomous services that work together • Digital version of a physical asset and/or process • Systematic computational analysis of data or statistics • ...
Technological Progress 2024-03-09
Across
- Meeting present needs without compromising future resources
- Transmitting information over a distance by electronic means
- The use of living systems and organisms to develop products
- The use of machines to perform tasks without human intervention
- The process of introducing new ideas or methods
Down
- Protecting computers and networks from theft or damage
- Designing, constructing, and using robots
- A secure, shared digital ledger for recording transactions
- A set of rules to solve problems or perform computations
9 Clues: Designing, constructing, and using robots • The process of introducing new ideas or methods • Protecting computers and networks from theft or damage • A set of rules to solve problems or perform computations • A secure, shared digital ledger for recording transactions • Meeting present needs without compromising future resources • ...
Knowledge Adventure Crossword Puzzle 2023-06-18
Across
- Measures to protect digital information.
- A reference to a source of information
- Online location with webpages.
- Connected to or available on the internet.
Down
- A structured collection of data accessible in various formats
- A significant word or term used in searching for information)
- A software program used to search for information on the interne
- Content that includes various forms of media.
- Legal protection for original creative works to prevent unauthorized use or copying.
9 Clues: Online location with webpages. • A reference to a source of information • Measures to protect digital information. • Connected to or available on the internet. • Content that includes various forms of media. • A structured collection of data accessible in various formats • A significant word or term used in searching for information) • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Wireless technology used to interconnect mobiles computers etc
- Refers to unwanted bulk emails that come from unknown sources
- Practice of protecting digital information
- Network topology with a central hub
Down
- It is a combination of two terms 'net' and 'etiquette'
- The process of transforming data into an unreadable code
- Type of cyber attack that tricks users
- Refers to an illegal intrusion into a computer system or network
- Device that connects multiple networks
9 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
Internet Safety Crossword 2025-03-04
Across
- Cyberstalking is the use of digital technology to track and harass someone.
- Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- When someone builds trust online to exploit or harm another person, often for illegal or abusive purposes.
- Something built specifically for web browsers to track, personalize and save information about each user's session.
- The illegal copying or distribution of copyrighted material via the Internet.
- Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
- Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- The act of someone causing discord online or in person.
- Footprint A digital footprint is the traceable data and activity a user leaves on the internet.
- Someone who uses the internet to exploit or harm others, often by gaining their trust first.
Down
- Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
- Identity Theft When a malicious actor steals someone's online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim.
- Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
- Shouting is typing in all capital letter, which is considered yelling.
- A set of unofficial rules for good behavior and politeness followed by users of online and digital technologies such as the Internet, email, and chatrooms.
- Settings The part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user.
- An online real-time conversation, typically carried out by people who use nicknames instead of their real names.
- for weblog) A diary or personal journal kept on a website.
- When someone films an assault as a prank and shares it online, promoting violence and bullying
- The use of a computer as an instrument to further illegal ends
20 Clues: The act of someone causing discord online or in person. • for weblog) A diary or personal journal kept on a website. • The use of a computer as an instrument to further illegal ends • Shouting is typing in all capital letter, which is considered yelling. • Cyberstalking is the use of digital technology to track and harass someone. • ...
Planet of Nico 2021-12-09
Across
- it's our secret word
- your favorite youtuber
- they keep you happy as long as you feed them with water
- our happiest place in the world
- the most beautiful instrument
- juan's best friend that eats a lot of croquettes
- basically what you do everyday
Down
- you love making them whenever you have the most beautiful view
- it's the most delicious kind of sandwich in the world
- you go there to clean your mind for a while
- you can sometimes eat it with some bubble tea
- it's the most handsome and smart man in the world
- you love doing this and it makes you learn a lot
- they're fluffy and they need belly pets
14 Clues: it's our secret word • your favorite youtuber • the most beautiful instrument • basically what you do everyday • our happiest place in the world • they're fluffy and they need belly pets • you go there to clean your mind for a while • you can sometimes eat it with some bubble tea • juan's best friend that eats a lot of croquettes • ...
STATION X 2023 2023-03-02
Across
- The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
- For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
- Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
- Ngee Ann Polytechnic has its own radio station: Radio _______.
- Students are able to pursue a minor via the ______ Learning Pathway Programme.
- Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
- The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- Common____Programme is now a new programme offered in the School of Film & Media Studies.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
- Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
- Ngee Ann Polytechnic is a Poly For Budding _________.
- The School of Design & Environment diplomas has a focus on _______.
- If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
- Located at the Atrium, there is a 24/7 unmanned ______.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.
20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________. • Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic has its own radio station: Radio _______. • The School of Design & Environment diplomas has a focus on _______. • Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______. • ...
STATION X 2023 2023-03-02
Across
- The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
- For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
- Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
- Ngee Ann Polytechnic has its own radio station: Radio _______.
- Students are able to pursue a minor via the ______ Learning Pathway Programme.
- Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
- The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- Common____Programme is now a new programme offered in the School of Film & Media Studies.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
- Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
- Ngee Ann Polytechnic is a Poly For Budding _________.
- The School of Design & Environment diplomas has a focus on _______.
- If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
- Located at the Atrium, there is a 24/7 unmanned ______.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.
20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________. • Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic has its own radio station: Radio _______. • The School of Design & Environment diplomas has a focus on _______. • Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______. • ...
CSA Terms 2022-01-13
Across
- A cybersecurity control framework for cloud computing, used as a tool for the systematic assessment of a cloud implementation
- A credential and training program that fills the gap in the market for technical education for cloud IT auditing
- A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
- A cloud service model that provides resource pools of virtualized infrastructure, such as compute, network, or storage pools
- A program designed to help customers assess and select a CSP through a three-step program of self-assessment, third-party audit, and continuous monitoring
Down
- A certificate that is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
- A tool that offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
- Union's agency dedicated to achieving a high common level of cybersecurity across Europe
- An on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies
- A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
10 Clues: Union's agency dedicated to achieving a high common level of cybersecurity across Europe • A credential and training program that fills the gap in the market for technical education for cloud IT auditing • A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet • ...
Industry Buzz 2025-01-07
5 Clues: Counseling, mental health, wellbeing • Marketing, finance, strategy, management • Networks, cybersecurity, coding, software • Patient care, diagnoses, treatment, hospitals • Curriculum, pedagogy, classroom, lesson plans
C for Cybersecurity 2022-10-08
Across
- violation detected!
- do you have one installed on your system yet?
- A proper request always has a ...
- **across might come in handy here
- spotting threats on the go
Down
- feature that works 24 x 7 (6,2)
- explore solutions on your own **(2,Down)
- might as well be maleficent
- is always a target, keep it safe!
- delegate this work, please
10 Clues: violation detected! • delegate this work, please • spotting threats on the go • might as well be maleficent • feature that works 24 x 7 (6,2) • is always a target, keep it safe! • A proper request always has a ... • **across might come in handy here • explore solutions on your own **(2,Down) • do you have one installed on your system yet?
Cybersecurity Decoded 1 2020-07-30
10 Clues: childhood game • the iron giant • Troy's downfall • Not canned food • type of cleanliness • sugar comes in these • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses • Dr's are known to have the messiest ones
Cybersecurity First Principles 2016-06-14
Across
- less complicated, less problems
- multiple layers of defense protect information
- to simplify and decrease the number of ways the software can be exploited
- privilege level which limits what access people have to your resources
Down
- any attempt to prevent people from being able to see information
- keeping information worlds from colliding
- keeping processes separated prevents the failure of one process from negatively impacting another
- resources - hardware, system objects, or processes - must be separated and used as intended
- able to be inserted or removed from a project
- summarizing or explaining in a way that can be easily understood
10 Clues: less complicated, less problems • keeping information worlds from colliding • able to be inserted or removed from a project • multiple layers of defense protect information • any attempt to prevent people from being able to see information • summarizing or explaining in a way that can be easily understood • ...
Cybersecurity crossword puzzle 2023-12-14
Across
- A system that verifies a user's identity through a unique physical characteristic.
- A sequence of characters used to authenticate identity or access.
- An encrypted connection between a web browser and a server.
- An organization that identifies security flaws in software.
- A type of attack that floods a network to disrupt its operation.
Down
- Software used to protect against viruses and malware.
- A technique to deceive individuals into providing sensitive information.
- A program that replicates itself and spreads to other computers.
- A secret code that only authorized parties should be able to read.
- The practice of keeping software up to date to protect against vulnerabilities.
10 Clues: Software used to protect against viruses and malware. • An encrypted connection between a web browser and a server. • An organization that identifies security flaws in software. • A program that replicates itself and spreads to other computers. • A type of attack that floods a network to disrupt its operation. • ...
Cybersecurity Awareness Crossword 2024-02-08
Across
- A program that hurts your computer and tries to split itself among other computers\
- Synonym for password
- Something you need to improve password security
- Searching for private information through the trash
- An email pretending to be from a trusted person or organization for nefarious reasons
- First word in the acronym "VPN"
- The percent of Americans who use the same password
Down
- Super common password worldwide
- The act of looking over someone's shoulder to steal information
- A dishonest scheme
10 Clues: A dishonest scheme • Synonym for password • Super common password worldwide • First word in the acronym "VPN" • Something you need to improve password security • The percent of Americans who use the same password • Searching for private information through the trash • The act of looking over someone's shoulder to steal information • ...
Introduction to Cybersecurity 2025-06-19
Across
- Fraudulent attempt to steal sensitive data via deceptive emails.
- Incident where data is accessed/stolen without permission.
- Three core security goals: Confidentiality, Integrity, and _______.
- Moral principles governing digital behavior (e.g., privacy, transparency).
Down
- Security system that monitors/controls network traffic (blocks unauthorized access).
- Self-replicating malware that spreads between devices.
- Process of encoding data to prevent unauthorized reading.
- Malicious software designed to damage systems (e.g., viruses, trojans).
- Person who exploits system vulnerabilities.
- Software update to fix security flaws.
10 Clues: Software update to fix security flaws. • Person who exploits system vulnerabilities. • Self-replicating malware that spreads between devices. • Process of encoding data to prevent unauthorized reading. • Incident where data is accessed/stolen without permission. • Fraudulent attempt to steal sensitive data via deceptive emails. • ...
Crossword Puzzle 2024-06-26
Across
- Popular brand for laptops and other tech devices, known for its ThinkPad series.
- Brand recognized for its audio-visual and computer connectivity products.
- Brand known for producing high-quality bags, cases, and other accessories.
- Who are we?
Down
- Mighty leader in sales Team.
- Brand specializing in interactive displays and collaboration technology.
- Brand famous for its cybersecurity solutions.
- Brand known for its Galaxy series of smartphones.
8 Clues: Who are we? • Mighty leader in sales Team. • Brand famous for its cybersecurity solutions. • Brand known for its Galaxy series of smartphones. • Brand specializing in interactive displays and collaboration technology. • Brand recognized for its audio-visual and computer connectivity products. • ...
Financial literacy 2024-05-10
Across
- Protection from hacking
- First name of the person who is on the cover of our magazine
- Scholarships based on athletic or academic achievements
- ____ percent go to needs in the 50-30-20 rule.
- way to save money
Down
- _____ Change; problem for insurance
- Go ____ if you've reached the sixth step to home buying
- _______ Score; only get to check this a certain amount of times per year
8 Clues: way to save money • Protection from hacking • _____ Change; problem for insurance • ____ percent go to needs in the 50-30-20 rule. • Go ____ if you've reached the sixth step to home buying • Scholarships based on athletic or academic achievements • First name of the person who is on the cover of our magazine • ...
Security Awareness 2024-04-16
Across
- Testing environment.
- Protect sensitive information from being leaked by users.
- "M" Computer security company.
- Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
- Most common cyberattack on internet.
Down
- Social __ when actors trick others into revealing sensitive info.
- An attack where a person allows themselves to be identified as someone else.
- As cybersecurity threats grow, sites include this increased security feature.
8 Clues: Testing environment. • "M" Computer security company. • Most common cyberattack on internet. • Protect sensitive information from being leaked by users. • Social __ when actors trick others into revealing sensitive info. • An attack where a person allows themselves to be identified as someone else. • ...
School Safety 2022-11-28
Across
- a reason for doing something
- national threat assessment center
- a statement with intention to inflict, pain, injury, or other hostile action on someone or something
Down
- protecting school networks from hackers
- document that outlines how a school will prepare, respond and recover
- a network security device
- a person who carries out a harmful, illegal or immoral act
- violence directed at a student, group, or location
8 Clues: a network security device • a reason for doing something • national threat assessment center • protecting school networks from hackers • violence directed at a student, group, or location • a person who carries out a harmful, illegal or immoral act • document that outlines how a school will prepare, respond and recover • ...
Cybersecurity Workforce Framework 2020-10-28
Across
- and Operate, Specialized denial and deception operations
- and Development, provide leadership, management, direction, an/or development
- Provision, Conceptualize, design, and build secure IT systems
Down
- and Defend, Identification, analysis and mitigation of threats
- Examine cyber events and/or crimes of IT systems
- Review and evaluate incoming cybersecurity information
- and maintain, Provide support, administration and maintenance
7 Clues: Examine cyber events and/or crimes of IT systems • Review and evaluate incoming cybersecurity information • and Operate, Specialized denial and deception operations • Provision, Conceptualize, design, and build secure IT systems • and Defend, Identification, analysis and mitigation of threats • and maintain, Provide support, administration and maintenance • ...
CYBER SECURITY 2023-12-27
Across
- Software update designed to fix security vulnerabilities.
- Interconnected computers facilitating communication and data exchange.
- Measures to protect computer systems from attacks.
- Hint: Verifying the identity of a user through passwords or biometrics.
- Secret code for user access.
- Deceptive emails or websites aiming to steal data.
- breach Unauthorized access leading to the exposure of sensitive information.
Down
- Software designed to harm or exploit computer systems.
- Software designed to detect and remove malicious programs.
- Converts sensitive information into a secret code.
- Unauthorized access or breach into a system.
- Deliberate exploitation of computer systems for malicious purposes.
- Acts as a digital barrier to unauthorized access.
- Requires two forms of identification for access.
- Hint: Weakness in a system that could be exploited by attackers.
15 Clues: Secret code for user access. • Unauthorized access or breach into a system. • Requires two forms of identification for access. • Acts as a digital barrier to unauthorized access. • Converts sensitive information into a secret code. • Measures to protect computer systems from attacks. • Deceptive emails or websites aiming to steal data. • ...
DTIN- Final Crossword Part 2 2024-03-21
Across
- Type of digital currency that uses cryptography
- Methodology promoting continuous iteration of development
- Style of education through electronic and online media
- Network of physical objects connected to the internet
- Field involving analysis of raw data to draw conclusions
- Platforms for social interaction and content sharing
- Term for currency available only in digital form
- Large and complex data sets that are difficult to process
- Delivery of computing services over the internet
Down
- Decentralized ledger technology behind cryptocurrencies
- Simulated experience that can be similar to or different from the real world
- Protection of internet-connected systems from cyber threats
- Mobile phone with advanced features and connectivity
- Record of one's internet usage and online activities
- AI subset involving algorithms that learn over time
15 Clues: Type of digital currency that uses cryptography • Term for currency available only in digital form • Delivery of computing services over the internet • AI subset involving algorithms that learn over time • Mobile phone with advanced features and connectivity • Record of one's internet usage and online activities • Platforms for social interaction and content sharing • ...
Profesi Bidang Informatika 2025-04-10
Across
- : Orang yang menulis dan mengembangkan kode program
- : Profesi yang bertugas membangun dan mengembangkan aplikasi
- : Bidang yang berfokus pada perlindungan sistem dari serangan digital
- : Developer yang menguasai frontend dan backend
- : Bagian dari pengembangan web yang berhubungan dengan tampilan
- : Tempat penyimpanan data dalam sistem komputer
Down
- : Orang yang memberikan bantuan teknis kepada pengguna komputer
- : Profesi teknis dalam perancangan dan pengembangan sistem
- : Bagian dari pengembangan web yang mengatur logika dan basis data
- : Sebutan lain untuk orang yang menulis kode
- : Profesi yang fokus pada tampilan dan pengalaman pengguna
- : Seseorang yang mengakses sistem secara tidak sah, bisa positif atau negatif
- : Orang yang mengelola dan memelihara sistem jaringan dan server
- : Gabungan tugas development dan operations dalam pengembangan perangkat lunak
- : Orang yang menganalisis sistem dan kebutuhan perangkat lunak
15 Clues: : Sebutan lain untuk orang yang menulis kode • : Developer yang menguasai frontend dan backend • : Tempat penyimpanan data dalam sistem komputer • : Orang yang menulis dan mengembangkan kode program • : Profesi teknis dalam perancangan dan pengembangan sistem • : Profesi yang fokus pada tampilan dan pengalaman pengguna • ...
Unlock Innovation 2025-09-12
Across
- Careful study to discover or develop new ideas.
- Word often used for devices like watches, TVs, or homes.
- Technology behind Bitcoin and secure digital records.
- The use of science and tools to solve problems.
- Innovation is all about shaping this.
- Legal protection for an invention.
- Where data is stored online instead of your computer.
- Machines that can “think” and “learn” like humans (abbr.).
- Immersive 3D experience using special headsets.
Down
- The ability to think of new ideas.
- The creative process of planning how something will look or work.
- A young company built on innovative ideas.
- The first working model of a new product.
- Machines designed to perform tasks like humans.
- Protecting systems and data from online attacks.
15 Clues: The ability to think of new ideas. • Legal protection for an invention. • Innovation is all about shaping this. • The first working model of a new product. • A young company built on innovative ideas. • Careful study to discover or develop new ideas. • Machines designed to perform tasks like humans. • The use of science and tools to solve problems. • ...
Easy Cyber Security 2021-11-28
Across
- the topic is
- not fishing but
- I should open every attachment I get
- Bad software that infects your computer is called ______
- the people who attack us are called ______
Down
- A ____ breech is when a criminal steals confidential information
- you can't use your computer until you pay because you have _______
- I should always use a ______ password
- you get an email from someone you don't know asking you to open an attachment it is a
9 Clues: the topic is • not fishing but • I should open every attachment I get • I should always use a ______ password • the people who attack us are called ______ • Bad software that infects your computer is called ______ • A ____ breech is when a criminal steals confidential information • you can't use your computer until you pay because you have _______ • ...
business 2025-05-22
Across
- RATE Leaving a company, often measured in percentages (HR).
- Strategy that compares performance with top competitors (Business).
- Security that protects systems and data (Tech).
- INNOVATION A revolutionary idea that changes the market (Business).
Down
- Design that improves how people interact with a product (Tech).
- Bringing new workers into a company smoothly (HR).
- Business model: selling directly to consumers (Business).
- AUDIENCE Group of people you market your product to (Marketing).
- Total money earned (Finance).
9 Clues: Total money earned (Finance). • Security that protects systems and data (Tech). • Bringing new workers into a company smoothly (HR). • Business model: selling directly to consumers (Business). • RATE Leaving a company, often measured in percentages (HR). • Design that improves how people interact with a product (Tech). • ...
Cybersecurity Awareness Month - 2023 2023-10-17
Across
- an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
- one of the biggest ransomware attacks
- an unwanted software designed to throw advertisements up on your screen, most often within a web browser
- a set of changes to a computer program or its supporting data designed to update, fix, or improve
- a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
- is an authentication method that requires the user to provide two or more verification factors to gain access
Down
- a malware that misleads users of its true intent by disguising itself as a standard program
- a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
- designed to detect and destroy computer viruses
- validating the user identity
- will you stop clicking phishing links?
- a self-replicating virus that does not alter files but resides in active memory and duplicates itself
- a type of characters that you should use in your passwords
- harmful software
14 Clues: harmful software • validating the user identity • one of the biggest ransomware attacks • will you stop clicking phishing links? • designed to detect and destroy computer viruses • a type of characters that you should use in your passwords • a malware that misleads users of its true intent by disguising itself as a standard program • ...
FUN CyberSecurity Puzzle CIS120 2025-03-18
Across
- Rule specific configuration setting that determines how data flows through a firewall.
- type of malware that spreads by attaching itself to other programs or files.
- cyberattack that redirects users to fake websites to steal personal information.
- A network compromised of computers controlled remotely to perform certain activities.
- The process of converting data into code to prevent hacks.
- A program that records keystrokes to steal information like passwords and Keys.
- A person who gains unauthorized access to systems or networks.
Down
- type of malware that replicates itself to spread across networks without needing a host file.
- A group of devices used to monitor and gather information without user consent.
- An act of disguising communication to appear as if it's from a trusted source.
- Software updates. These fix vulnerabilities or improve security.
- Malware or Hacker that locks users out of their system. until ransom is paid.
- Factor Authentication The security process that requires two forms of verification to access an account.
- vulnerability in software that is unknown to the vendor and can be exploited by attackers.
14 Clues: The process of converting data into code to prevent hacks. • A person who gains unauthorized access to systems or networks. • Software updates. These fix vulnerabilities or improve security. • type of malware that spreads by attaching itself to other programs or files. • Malware or Hacker that locks users out of their system. until ransom is paid. • ...
Cybersecurity and Compliance Week! 2025-11-10
Across
- What emails are you supposed to report to IT?
- What is a security measure that requires at least two forms of identification?
- Who is a person who gains unauthorized access to computer systems?
- What is the process of converting data into a secure format?
- Who is the HR Reporting Officer?
- What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
- What is the term for the agreement between covered entities and business associates?
- You are the first line of ___ in protection of DDID and AHS
Down
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is a central concept of HIPAA that protects individuals' health information?
- Who is the HIPAA Privacy Officer?
- What is the term for malicious software?
- Who is the Security Officer?
- What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?
14 Clues: Who is the Security Officer? • Who is the HR Reporting Officer? • Who is the HIPAA Privacy Officer? • What is the term for malicious software? • What emails are you supposed to report to IT? • You are the first line of ___ in protection of DDID and AHS • What is the process of converting data into a secure format? • ...
Cybersecurity 701 Unit 5 2025-11-10
Across
- A systematic examination of security controls and configurations to identify issues and ensure compliance.
- A validation method that uses vulnerability scanning tools again to check the effectiveness of previous remediation efforts
- A remediation action that involves dividing a network into smaller, isolated sections to contain threats.
- A single virtual or physical host that is configured to appear vulnerable and/or attractive to potential attackers to lure them in
- A network composed of multiple deception hosts, which is more difficult for attackers to detect.
- A method of ensuring application security by analyzing source code or binary code without executing the application
Down
- The initial phase of a penetration test involving intelligence gathering on the target system or network
- The method of isolating or restricting access to compromised or suspicious systems or data to contain and limit the impact of a security incident.
- A cybersecurity practice that involves simulating cyberattacks to proactively identify vulnerabilities in a system.
- A bait file intended to be accessed by malicious actors, which sends an alarm and indicates unauthorized activity in a system
- The abbreviation for tools designed to prevent unauthorized access, use, or transmission of sensitive data.
- The abbreviation for a comprehensive solution that centralizes log and event data to quickly respond to incidents
- Fictitious words or records added to legitimate databases whose presence indicates stolen data, serving as a passive detection method.
- A network protocol that collects IP traffic flow information for analysis and monitoring to provide insight into network traffic patterns.
14 Clues: A network composed of multiple deception hosts, which is more difficult for attackers to detect. • The initial phase of a penetration test involving intelligence gathering on the target system or network • A remediation action that involves dividing a network into smaller, isolated sections to contain threats. • ...
Industry Buzz 2025-01-07
5 Clues: Marketing, finance, strategy, management • Networks, cybersecurity, coding, software • Patient care, diagnoses, treatment, hospitals • Curriculum, pedagogy, classroom, lesson plans • Therapy, counseling, mental health, wellbeing
YTS Kitchen Tour 2024-03-08
Across
- Your Technology Support provided IT team
- The easiest way to add phsyical security
- Hours support is available to our customers
- YTS is a Cisco Meraki partner to install this in your office
- #1 Concern of businesses today that costs over $300,000 per incident
- A common project YTS can handle for our customers
Down
- YTS provides Zoom certified staff to handle setting this up
- Level of service YTS provides to all customers
- How to prevent phsyical access to unauthorized people
9 Clues: Your Technology Support provided IT team • The easiest way to add phsyical security • Hours support is available to our customers • Level of service YTS provides to all customers • A common project YTS can handle for our customers • How to prevent phsyical access to unauthorized people • YTS provides Zoom certified staff to handle setting this up • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- The individuals who control access to people, data, and systems
- Kwiktrip's password policy requires that coworkers change their passwords __days
- You can help fight cybercrime by becoming a __________
- What is the common hacking method
- These are designed to maintain the security of everyone associated with an organization
- This attack occurs when cybercriminals research and track which sites employees visit the most
Down
- _____are the last line of defense
- Failure to run these equals failure to patch security vulnerabilities
- This security tool identified and removes malicious programs
- This dangerous attack targets specific people or organization, often with custom made email or messages
- Stealing money is the main goal behind this type of malware
- Any scenario that triggers emotions should also trigger your ______
- This attack occurs when someone sneaks into a secured area behind someone else
- What should you do when a workstation or device is no longer in use
- The future of security is_____, not machines
15 Clues: _____are the last line of defense • What is the common hacking method • The future of security is_____, not machines • You can help fight cybercrime by becoming a __________ • Stealing money is the main goal behind this type of malware • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
Cybersecurity Fundamental Chapter 1 2022-11-03
Across
- attacks that originate from within an organization.
- the honeynet project.
- unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
- breaks into network or computer systems to discover weakness in order to improve the security of these systems.
- infragard is an example of widespread sharing of cyber intelligent.
- groups of criminals break into computers or networks to gain access for various reason.
- who rally and protest against different political and social ideas
- external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
- somewhere between white and black hat attackers.
- grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
- hobbyists mostly limited to pranks and vandalism, have little or no skills.
- nation common vulnerabilities and exposures (CVE) database.
- black hat hackers who are either self-employed or working for large cybercrime organizations.
- the standard provides a framework for implementing cybersecurity measures within an organization.
14 Clues: the honeynet project. • somewhere between white and black hat attackers. • attacks that originate from within an organization. • nation common vulnerabilities and exposures (CVE) database. • who rally and protest against different political and social ideas • infragard is an example of widespread sharing of cyber intelligent. • ...
Technology Vocabulary 2025-05-03
6 Clues: Social media browse • Username and Password • A product of digital audio • Protection of computer software • A set of rules to solve a problem in a series of steps • Listening or watching sound or video directly from the internet
Data Privacy and Cybersecurity 2022-08-15
Across
- This 2020 ballot initiative amended 2 down
- This type of document guides an organization's response after a data privacy and security incident
- A law firm that guides an organization through a data privacy and security incident
- A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
- This European Union law served as the basis for the creation of 2 down
- Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
- A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
- An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
- Number of comprehensive consumer privacy laws in the United States
- The United States' first state-specific consumer privacy law
- A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
- Unauthorized activity on an organization’s digital network
- The Advisen 2022 "Cyber Law Firm of the Year"
- This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"
14 Clues: This 2020 ballot initiative amended 2 down • The Advisen 2022 "Cyber Law Firm of the Year" • Unauthorized activity on an organization’s digital network • The United States' first state-specific consumer privacy law • Number of comprehensive consumer privacy laws in the United States • This year's Cybersecurity Awareness Month theme - "See ___ in Cyber" • ...
Cybersecurity Fundamentals Chapter 8 2022-11-08
Across
- US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
- poorly enforced security policies, no awareness of security
- the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
- open source linux security distribution.
- disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
- a method of testing the areas of weakness in systems by using various malicious techniques.
- includes the users who access the organization's information system.
Down
- assess computer, computer systems, networks, or applications for weakness.
- a non-profit organization that brings together industry, academia and government to address advance cyber threats.
- a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
- laws prohibit undesired behaviors.
- intercept and log network traffic
- provides free analysis and warning service to internet users and organizations.
- help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.
14 Clues: intercept and log network traffic • laws prohibit undesired behaviors. • open source linux security distribution. • poorly enforced security policies, no awareness of security • includes the users who access the organization's information system. • assess computer, computer systems, networks, or applications for weakness. • ...
Chapter 8: Cybersecurity Vocab Crossword 2025-04-08
Across
- Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
- a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
- Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
- Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
- Phish: phishing attack where the hacker sends a message for you to log back into your account.
- SMS phishing text messages asking you to click here.
- Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
- a system designed to block unauthorized access while still allowing outward communication.
- Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
- a secret phrase used to gain admission into something.
- voicemail messages demanding you to take action.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer.
- creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
- The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
- Drive: a data storage device that can be used even when the device is turned off.
- Cloud: a data storage device that is stored on the internet
- Software: a program designed to detect and remove viruses and other malware from your computer.
- every aspect of your defense to fight the hackers.
- Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
- Engineering: the use of deception to manipulate an individual into giving personal information away.
- Phish: phishing attack where the hacker sends a message regarding a package being delivered.
- sending fraudulent messages that imitate a real company in hope of being given personal information.
- Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.
23 Clues: voicemail messages demanding you to take action. • every aspect of your defense to fight the hackers. • SMS phishing text messages asking you to click here. • a secret phrase used to gain admission into something. • Cloud: a data storage device that is stored on the internet • Drive: a data storage device that can be used even when the device is turned off. • ...
Cybersecurity Awareness Month Crossword Puzzle 2025-10-16
Across
- Software designed with intent to harm
- Overloads a network to kill it
- Secretly collects private info
- Way to send messages over internet
- Intrusively displays unwanted advertisements
- Identity to access a website
- Scrambles info to protect it
- Detects, prevents, and removes malware
- Attempt by Hackers to compromise data
- Locks you out system until paid
- A trick to get private info
Down
- Combination of stuff for security
- Disguises as legitimate software but bad
- Process to verify someone's identity
- Barrier between a trusted network
- Programs that attach and spread file
- A software update to fix vulnerabilities
- Bad guy who steals info
- Self replicating program that spreads independently
- Network of malware infected computers
20 Clues: Bad guy who steals info • A trick to get private info • Identity to access a website • Scrambles info to protect it • Overloads a network to kill it • Secretly collects private info • Locks you out system until paid • Combination of stuff for security • Barrier between a trusted network • Way to send messages over internet • Process to verify someone's identity • ...
STATION X 2023 2023-03-02
Across
- The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
- For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
- Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
- Ngee Ann Polytechnic has its own radio station: Radio _______.
- Students are able to pursue a minor via the ______ Learning Pathway Programme.
- Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
- The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- Common____Programme is now a new programme offered in the School of Film & Media Studies.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
- Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
- Ngee Ann Polytechnic is a Poly For Budding _________.
- The School of Design & Environment diplomas has a focus on _______.
- If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
- Located at the Atrium, there is a 24/7 unmanned ______.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.
20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________. • Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic has its own radio station: Radio _______. • The School of Design & Environment diplomas has a focus on _______. • Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______. • ...
STATION X 2023 2023-03-02
Across
- The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
- For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
- Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
- Ngee Ann Polytechnic has its own radio station: Radio _______.
- Students are able to pursue a minor via the ______ Learning Pathway Programme.
- Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
- The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- Common____Programme is now a new programme offered in the School of Film & Media Studies.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
- Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
- Ngee Ann Polytechnic is a Poly For Budding _________.
- The School of Design & Environment diplomas has a focus on _______.
- If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
- Located at the Atrium, there is a 24/7 unmanned ______.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.
20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________. • Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic has its own radio station: Radio _______. • The School of Design & Environment diplomas has a focus on _______. • Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______. • ...
PAW 2024 Crossword Puzzle 2024-05-17
Across
- Check twice that all information is the correct information for the correct person _____ to releasing it.
- When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
- If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
- Always verify the source of an email ___________ clicking open any links.
- The patient must be informed of the purpose of the _________, use, or disclosure of their personal health information.
- When faxing, ensure that the fax _____-sheet is free of any personal health information.
- All access to personal health information must be for a ____ -related need-to-know.
- A patient may not only request confidential status for privacy reasons but may also require it for ______ reasons.
- If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
Down
- ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
- Loss of _____ by patients and families may be one of the consequences of a privacy breach.
- When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
- Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors, including curiosity and a concern about the well-being about others.
- All access to personal health information must be limited to what is _________ to perform your job duties.
- Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
- If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
- A strong passphrase should be at least four words and ___________ characters in length.
- If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
- Consent must be _________, whether it is written or verbal.
19 Clues: Consent must be _________, whether it is written or verbal. • Always verify the source of an email ___________ clicking open any links. • All access to personal health information must be for a ____ -related need-to-know. • A strong passphrase should be at least four words and ___________ characters in length. • ...
Data Breach Crossword 2025-03-28
Across
- A type of attack that tricks users into revealing information (8 letters)
- Unauthorized access to data (6 letters)
- Sensitive information that could be compromised (8 letters)
- Someone who gains unauthorised access to data (6 letters)
- The process of keeping information safe (13 letters)
Down
- Financial consequences of breaching the DPA (5 letters)
- Damage to a company's public image (10 letters)
- Regulation that protects personal data in the EU
- A security measure that verifies identity (9 letters)
- A type of software used to steal data (7 letters)
- The act of making data unreadable to unauthorized users(10 letters)
- A measure to prevent unauthorized access (9 letters)
12 Clues: Unauthorized access to data (6 letters) • Damage to a company's public image (10 letters) • Regulation that protects personal data in the EU • A type of software used to steal data (7 letters) • A measure to prevent unauthorized access (9 letters) • The process of keeping information safe (13 letters) • A security measure that verifies identity (9 letters) • ...
CSE167 Terminology 2022-04-28
Across
- a conventional encryption method that used a single key encryption
- when information kept private and secure
- the state of information while it is encrypted
- the state of information before it is encrypted
- the art of protecting information and information systems
- provides verification of identity
Down
- when systems are available to those who need them
- type of attack that bad actors use to gain information commonly through emails
- an encryption method that utilizes a public/private key
- two words which is a form of manipulation that bad actors use to gain unauthorized access
- records the identities and actives
- when the data is not modified
12 Clues: when the data is not modified • provides verification of identity • records the identities and actives • when information kept private and secure • the state of information while it is encrypted • the state of information before it is encrypted • when systems are available to those who need them • an encryption method that utilizes a public/private key • ...
