cybersecurity Crossword Puzzles
Shifting Security 2026-02-19
Across
- The school the introduced the theory of securitization
- Realism is centered on territoy soverignity and ___ defense
- Security is not only about real world but includes the internet
- A form of security that does not focus on people but the society (climate change).
- The theory for traditional security
Down
- Conveys the notion that security is more than just state but should involve individuals
- Means continously changing
- The question that we are presenting on.
- Traditional security is _______
- The persons who stated that security must cross multiple sector
- Defined the concept of human security
- Security shifted from traditional to ______________
12 Clues: Means continously changing • Traditional security is _______ • The theory for traditional security • Defined the concept of human security • The question that we are presenting on. • Security shifted from traditional to ______________ • The school the introduced the theory of securitization • Realism is centered on territoy soverignity and ___ defense • ...
Compliance Week - Day 1 Puzzle 2022-10-09
Across
- Intimidation of an individual after reporting an allegation of misconduct.
- When PHI is exposed, a _______ of the patient's privacy has been committed.
- Never share your ________ with anyone.
- The ____ is an anonymous way to report a compliance concern. (707.825.1027)
- Health insurance portability & accountability act.
Down
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
- Computer security
- It is our job to _______ our clients health record.
- Verify this for every client every time (3 words)
- An official inspection of an individual's or organization's accounts.
- Protected health information.
11 Clues: Computer security • Protected health information. • Never share your ________ with anyone. • Verify this for every client every time (3 words) • Health insurance portability & accountability act. • It is our job to _______ our clients health record. • An official inspection of an individual's or organization's accounts. • ...
Anson Khoo Kai Loon 8G 2023-01-19
Across
- People use this to study online during the pandemic.
- To protect others from looking in your phone.
- protects you from networks & programs digital attacks.
- We can use ________ to communicate with others all around the world.
- You can send a ______ to your friends to play with.
Down
- A website that people use to buy something online.
- A website that people use to search.
- You need to press _______ to shut your computer/laptop.
- Made by Mark Zuckerberg.
- Its use in almost all electronic devices.
- An old website that people use to search something.
11 Clues: Made by Mark Zuckerberg. • A website that people use to search. • Its use in almost all electronic devices. • To protect others from looking in your phone. • A website that people use to buy something online. • An old website that people use to search something. • You can send a ______ to your friends to play with. • People use this to study online during the pandemic. • ...
Internet Crossword 2024-12-04
Across
- the global computer system that interconnects technology
- a unique form of personal data which website ask for
- a platform where resources are managed on a a computer
- the language of the computer which are performed on a computer
- the delivery of IT resources throughout the Internet
- the programs that build a computer
Down
- the physical connection of computers together
- a barricade that monitors information going in or out
- the protection of computers, data, and the Internet
- the amount of data your computer can handle
- a coding error on a computer
11 Clues: a coding error on a computer • the programs that build a computer • the amount of data your computer can handle • the physical connection of computers together • the protection of computers, data, and the Internet • a unique form of personal data which website ask for • the delivery of IT resources throughout the Internet • ...
Logiscool v3 2025-11-11
Across
- What you type to tell AI what to do
- Describes vehicles that can drive themselves
- Protecting computers and data from harm
- Doing the right thing in technology and AI
Down
- A programming language for coders
- A virtual world where people can meet and play
- A computer program that chats like a person
- Co-founder of DeepMind and leader in AI innovation
- Flying robots used for photos, deliveries, or rescue
- Teen inventor who created tech to fight cyberbullying (Gitanjali ___)
- Smart systems that can think and learn like humans
11 Clues: A programming language for coders • What you type to tell AI what to do • Protecting computers and data from harm • Doing the right thing in technology and AI • A computer program that chats like a person • Describes vehicles that can drive themselves • A virtual world where people can meet and play • Co-founder of DeepMind and leader in AI innovation • ...
1 2025-05-22
Across
- – A program or practical use of something in real life
- – Something given in recognition of excellence or achievement
- – Something given or added to help achieve a goal
- – A result gained by effort or skill
Down
- – Protection of computer systems and networks from attacks
- – The use or study of computers and technology
- – An area of study, activity, or interest
- – A fundamental element or basis of something
- – The strong effect or influence of something
- – A reward given to someone for winning or achieving something
- – An organized collection of information stored electronically
- – Something handed down from the past
12 Clues: – A result gained by effort or skill • – Something handed down from the past • – An area of study, activity, or interest • – A fundamental element or basis of something • – The strong effect or influence of something • – The use or study of computers and technology • – Something given or added to help achieve a goal • ...
ACC 2022-09-27
Across
- We waive any right of recovery we may have
- platform used to log calls
- ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
- our ABI know it all
- are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
- contains a collection of additional coverages and increased limits for certain coverages
- an inspection required in the state of NY
- optional coverage maximizes limits
- provides coverages at no cost
- Option for liability limit
- script used to answer a call
11 Clues: our ABI know it all • platform used to log calls • Option for liability limit • script used to answer a call • provides coverages at no cost • optional coverage maximizes limits • an inspection required in the state of NY • We waive any right of recovery we may have • contains a collection of additional coverages and increased limits for certain coverages • ...
ict 2024-07-02
Across
- Number system with two digits, 0 and 1, used by computers.
- Security system that monitors and controls network traffic.
- Process of converting information into a secure form.
- Organized collection of data.
- Intelligence: Simulation of human intelligence by machines.
Down
- Device connected to a computer (e.g., printer, mouse).
- Technique of creating virtual versions of computer resources.
- Protection of computer systems from digital attacks
- Finding and fixing errors or bugs in software code.
- Step-by-step procedure for solving a problem.
- System: Software that manages computer hardware and software resources.
11 Clues: Organized collection of data. • Step-by-step procedure for solving a problem. • Protection of computer systems from digital attacks • Finding and fixing errors or bugs in software code. • Process of converting information into a secure form. • Device connected to a computer (e.g., printer, mouse). • Number system with two digits, 0 and 1, used by computers. • ...
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
- fundamental component of ipsec virtual private networks (vpn).
- actual barriers deployed to prevent direct contact with systems.
- way to store and transmit data so only the intended recipient can read or process it.
- to encrypt and decrypt messages.
- has a fixed block size of 128, 192 or 256 bits.
- use one key to encrypt data and a different key to decrypt data.
- implementing cryptography into a web browser.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
- hardware and software solutions used to manage access resources and systems.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- science of making and breaking secret codes.
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- a protocol that provides a secure remote access connection to network devices.
15 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • actual barriers deployed to prevent direct contact with systems. • ...
Prestige Cybersecurity Awareness Month 2025-10-16
Across
- A network security system that monitors and controls incoming and outgoing traffic
- A type of cyber attack that tricks users into revealing personal information
- The principle of ensuring data is not altered or tampered with
- A software update that fixes security vulnerabilities
- Malware that locks data and demands payment for release
- A file or program that appears harmless but contains malicious code
- Software designed to disrupt, damage, or gain unauthorized access
- The process of converting data into a coded form to prevent unauthorized access
Down
- The practice of hiding messages so only the intended recipient can read them
- Software that secretly gathers user information
- A person who gains unauthorized access to systems for malicious purposes
- An extra layer of security requiring two forms of identification
- A secret word or phrase used to gain access
- A fake website or email designed to look legitimate
- A service that encrypts your internet connection for privacy
15 Clues: A secret word or phrase used to gain access • Software that secretly gathers user information • A fake website or email designed to look legitimate • A software update that fixes security vulnerabilities • Malware that locks data and demands payment for release • A service that encrypts your internet connection for privacy • ...
Cybersecurity Awareness Month - 2024 2024-10-09
Across
- - When somebody sends an e-mail with a link to a bogus website it is called
- - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- - Protecting the data against unauthorized access or disclosure is
- - Its a type of malware that disguises itself as legitimate code.
- Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- - This can slow down your computer AND watch everywhere you go on the internet
- - Data that is used to Identify specific individual
- - Impact of Threat exploiting a vulnerability is known as
Down
- - The control that you have over your personal information and how that information is used
- - A globally accepted and recognized standard for cyber security is
- - Three principles of ISMS are Confidentiality, ____ and Availability
- - Critical security component that determines what resources a user can access and what actions they can perform
- - An event that impacts the organization and requires a response and recovery.
- -PII Bank information falls under which category of data classification.
- - Unique sets of characters used to authenticate user identity and protect personal data or system access.
15 Clues: - Data that is used to Identify specific individual • - Impact of Threat exploiting a vulnerability is known as • - Its a type of malware that disguises itself as legitimate code. • - Protecting the data against unauthorized access or disclosure is • - A globally accepted and recognized standard for cyber security is • ...
Jocelyn M Cybersecurity Crossword 2026-04-02
Across
- Process of preparing for and recovering from unexpected events like cyberattacks
- The trail of your activity online
- Protects how organizations share and handle information in daily operations
- Malicious software that attaches to legitimate files, replicating itself, and spreads to other programs and devices
- Malware that locks your files and demands money
- When private information is stolen
Down
- Malicious Software that secretly installs on your device to steal personal data
- Protects data from being accessed, changed, or stolen by unauthorized people
- Process of using additional login methods to accurately identify the correct user from the account
- Protects software and apps from hackers or viruses that could steal or damage data
- A security barrier that blocks unwanted access
- It protects computer networks from hackers and cyberattacks
- Malware disguised as legitimate software, tricking users into installing it to gain unauthorized access
- Self-replicating malware that spreads across networks
- Fake messages that try to trick you into giving information
15 Clues: The trail of your activity online • When private information is stolen • A security barrier that blocks unwanted access • Malware that locks your files and demands money • Self-replicating malware that spreads across networks • It protects computer networks from hackers and cyberattacks • Fake messages that try to trick you into giving information • ...
30 2023-06-06
Across
- - Online storage and computing services
- - Uniform Resource Locator, the address of a web page
- - Measures to protect computer systems and data from digital threats
- - Buying and selling goods or services online
- - Component that stores electrical energy
- - Conductive material for transmitting electricity
- - Device that changes the voltage of an electrical current
Down
- - Device that stores and provides electrical energy
- - Electrical socket for connecting devices to the power supply
- - Safety device that breaks the circuit when current exceeds a certain level
- - Complete path for electrical current
- - Device used to control the flow of electrical current
- - Component that restricts the flow of electricity
13 Clues: - Complete path for electrical current • - Online storage and computing services • - Component that stores electrical energy • - Buying and selling goods or services online • - Component that restricts the flow of electricity • - Conductive material for transmitting electricity • - Device that stores and provides electrical energy • ...
Provalus Crossword 2025-09-30
Across
- The one medication on the list that is an anti-arrythmic
- Which is the insurance plan that covers low-income individuals?
- Which Aux code is used for lunch?
- The keyboard shortcut for "select all"
- The Medicare part that covers hospital visits
- The protection of digital data
- How many folders deep can you go in OneDrive?
Down
- Which is the insurance plan that covers individuals above 65?
- Disregarding concerns
- How many days long is the probation period?
- How many times you should say a customer's name in a phone call
- What Citrix is
- The components of active listening are attention and ____
13 Clues: What Citrix is • Disregarding concerns • The protection of digital data • Which Aux code is used for lunch? • The keyboard shortcut for "select all" • How many days long is the probation period? • The Medicare part that covers hospital visits • How many folders deep can you go in OneDrive? • The one medication on the list that is an anti-arrythmic • ...
Telemedicine 2026-02-21
Across
- Secure apps or systems used for online care
- Tracking a patient’s health over time
- The ability to get care when you need it
- Information collected from tests devices or records
- Digital files that store your medical history
- A way to get healthcare remotely using digital tech
- Computer systems that can learn and help make decisions
- Surgery done using robots controlled from far away
- Small devices that detect and measure body signals
Down
- Emotional and psychological well-being care
- Scrambling data so only authorized people can read it
- Doctor appointments done by live video
- Protecting computers and networks from digital attacks
13 Clues: Tracking a patient’s health over time • Doctor appointments done by live video • The ability to get care when you need it • Secure apps or systems used for online care • Emotional and psychological well-being care • Digital files that store your medical history • Surgery done using robots controlled from far away • Small devices that detect and measure body signals • ...
TBP FL-D 10/23 2023-10-23
Across
- Type of current produced by solar panels.
- The c in E=mc^2.
- Amount of heat required to raise temperature by 1 degree Celsius.
Down
- Type of engineer responsible for harnessing electricity.
- This cat may or may not be alive.
- Building with the most popular bathroom on UCF campus.
- Plastic polymer that can be recycled and reformed into another shape
- The cybersecurity team that works to defend an organization.
- Support structure that uses triangles.
9 Clues: The c in E=mc^2. • This cat may or may not be alive. • Support structure that uses triangles. • Type of current produced by solar panels. • Building with the most popular bathroom on UCF campus. • Type of engineer responsible for harnessing electricity. • The cybersecurity team that works to defend an organization. • ...
SBU TBP Crossword 10/5 2022-10-04
Across
- Species with the most genetic similarity to humans.
- Series of educational lectures hosted by Tau Beta Pi.
- Protection against unauthorized electronic data access.
- Process of converting data into a code for protection.
Down
- Mathematical function without "in-between" values.
- Longest bone in the human body.
- A structure consisting of beams connected in triangular shapes.
- ____'s constant gives the relationship between the energy and frequency of a photon.
- Third most common element in the universe.
9 Clues: Longest bone in the human body. • Third most common element in the universe. • Mathematical function without "in-between" values. • Species with the most genetic similarity to humans. • Series of educational lectures hosted by Tau Beta Pi. • Process of converting data into a code for protection. • Protection against unauthorized electronic data access. • ...
Computer Concepts 2025-11-18
Across
- software that detects and removes harmful programs
- images, visuals, and video are processed by a ___ processing unit
- protection of computers, networks, and data from attacks
- number system made of 0s and 1s
- the main circuit board that connects all components
- short-term working space used by a computer, also called RAM
- security tool that blocks unwanted network traffic
Down
- the screen that shows images and text
- scrambling data so only authorised users can read it
- number system based on 10
- the ___ processing unit is where calculations are performed
- scam where someone is tricked into giving personal information
- harmful software designed to damage or steal information
13 Clues: number system based on 10 • number system made of 0s and 1s • the screen that shows images and text • software that detects and removes harmful programs • security tool that blocks unwanted network traffic • the main circuit board that connects all components • scrambling data so only authorised users can read it • ...
Rush Health Cybersecurity 2020-02-24
Across
- Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
- Type of attack to steal username and password
- Type of unwanted emails
- a standalone malware computer program that replicates itself in order to spread to other computers
- Someone that does harm to a computer
- Scrambling information so that only those with the keys can read it
Down
- Type of malware that requires a ransom to remove the malware.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- Something that can harm your computer
10 Clues: Type of unwanted emails • Someone that does harm to a computer • Something that can harm your computer • Type of attack to steal username and password • Type of malware that requires a ransom to remove the malware. • Scrambling information so that only those with the keys can read it • ...
All Things Cybersecurity 2021-03-31
Across
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Small files that Web sites put on your computer hard disk drive when you first visit.
- Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
- A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- An attempt by hackers to damage or destroy a computer network or system.
- A local or restricted communications network, especially a private network created using World Wide Web software.
10 Clues: An attempt by hackers to damage or destroy a computer network or system. • Someone who seeks and exploits weaknesses in a computer system or computer network. • Small files that Web sites put on your computer hard disk drive when you first visit. • ...
Cybersecurity crossword puzzle 2023-12-14
Across
- Software used to protect against viruses and malware.
- A program that replicates itself and spreads to other computers.
- An organization that identifies security flaws in software.
- An encrypted connection between a web browser and a server.
- A technique to deceive individuals into providing sensitive information.
- A type of attack that floods a network to disrupt its operation.
Down
- A system that verifies a user's identity through a unique physical characteristic.
- A secret code that only authorized parties should be able to read.
- The practice of keeping software up to date to protect against vulnerabilities.
- A sequence of characters used to authenticate identity or access.
10 Clues: Software used to protect against viruses and malware. • An organization that identifies security flaws in software. • An encrypted connection between a web browser and a server. • A program that replicates itself and spreads to other computers. • A type of attack that floods a network to disrupt its operation. • ...
Basic cybersecurity terms 2024-07-29
Across
- An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A security process that verifies the identity of a user or device attempting to access a system.
- A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
10 Clues: A security process that verifies the identity of a user or device attempting to access a system. • Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity Basics #1 2024-09-17
Across
- The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
- Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
- Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
- Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
- Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
- Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
- A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
- A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
- To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
- To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.
10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen. • To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn. • Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only. • ...
Compliance And Cybersecurity 2024-12-23
Across
- The process of confirming the identity of a user or device
- A malicious software program that encrypts files for ransom
- A set of rules or guidelines adopted by an organization.
- Do not share a password with members
Down
- A defensive system protecting networks from cyberattacks
- The act of adhering to laws, regulations, and standards.
- What does the HIPAA Privacy Rule protect?
- The deliberate act of stealing personal information online
- Data that is unreadable without decryption
- Rules to guard patient data
10 Clues: Rules to guard patient data • Do not share a password with members • What does the HIPAA Privacy Rule protect? • Data that is unreadable without decryption • A defensive system protecting networks from cyberattacks • The act of adhering to laws, regulations, and standards. • A set of rules or guidelines adopted by an organization. • ...
CYBERSECURITY CROSSWORD PUZZLE 2025-08-15
Across
- The process of converting data into a coded format to prevent unauthorized access.
- Malicious software designed to damage or disrupt systems.
- A network security device that monitors and filters incoming and outgoing traffic.
- A cyberattack method that tricks users into revealing sensitive information.
- A copy of data kept in case the original is lost or damaged.
Down
- Software that secretly monitors and collects user information.
- Secure connection method over the internet, often used for privacy.
- A self-replicating program that infects files or systems.
- An update to fix software vulnerabilities.
- A secret string used for authentication.
10 Clues: A secret string used for authentication. • An update to fix software vulnerabilities. • Malicious software designed to damage or disrupt systems. • A self-replicating program that infects files or systems. • A copy of data kept in case the original is lost or damaged. • Software that secretly monitors and collects user information. • ...
Cybersecurity Amelie BTS1 2025-12-02
Across
- A group of Internet-connected devices, each of which runs one or more bots.
- Completely Automated Public Turing test to tell Computers and Humans Apart.
- information that is officially secret.
Down
- An occasion when private information can be seen by people who should not be able to see it.
- deriving from or relating to a previously unknown vulnerability to attack in some software.
- (Acronym) - set of tools and processes designed to help organizations detect, prevent, and manage the unauthorized access, transmission, or leakage of sensitive data security strategy.
- (Acronym) - in the US, a law that states the level of care that employer health insurance plans must provide and the rules for the exchange and protection of personal medical information.
- (Acronym)- The use of two or more different types of proof of your identity when you are doing something online.
- Programs that surreptitiously monitor and report the actions of a computer user.
- theft the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
10 Clues: information that is officially secret. • A group of Internet-connected devices, each of which runs one or more bots. • Completely Automated Public Turing test to tell Computers and Humans Apart. • Programs that surreptitiously monitor and report the actions of a computer user. • ...
technolgy 2024-12-20
Across
- Protecting digital information from threats.
- An online community for connecting with others.
- A person skilled in technology.
- A computer that provides data to other computers.
- Someone very interested in computers.
- A software used to access websites.
- To transfer a file from the internet to your device.
- To create an account on a website or app.
- Abbreviation for Artificial Intelligence.
Down
- Software that is free to use.
- Smart devices worn on the body, like fitness trackers.
- MEDIA Online platforms for sharing content and communication.
- HOTSPOT A location where wireless internet is available.
- PROVIDER A company that provides internet access.
- To transfer a file from your device to the internet.
- A computer-generated immersive experience.
- To log into an account.
17 Clues: To log into an account. • Software that is free to use. • A person skilled in technology. • A software used to access websites. • Someone very interested in computers. • To create an account on a website or app. • Abbreviation for Artificial Intelligence. • A computer-generated immersive experience. • Protecting digital information from threats. • ...
Introduction to Cybersecurity 2021-07-13
Across
- SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- MALICIOUS SOFTWARE.
Down
- AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
- SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
- COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
10 Clues: MALICIOUS SOFTWARE. • A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE • SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE. • MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID. • ...
Introduction to Cybersecurity 2021-07-13
Across
- COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- MALICIOUS SOFTWARE.
- SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
- AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
- SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
10 Clues: MALICIOUS SOFTWARE. • A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE • SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE. • SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES. • ...
Cybersecurity Crossword Puzzle 2023-05-25
Across
- Term for sexually explicit material available on the internet
- Software designs to damage or gain unauthorized access to a computer system
- Act of sending deceptive emails to trick individuals
- Every aspect of protecting an organization and its employees and assets against cyber threats
- Process of gaining unauthorized access to computer systems
Down
- One of the internet abuse effects for teenagers
- Act of deliberately using digital communication to harass or intimidate someone
- Software designed to protect against malicious software
- Practice of protecting information by converting it into a secret code
- A secret word or phrase that must be used to gain admission
10 Clues: One of the internet abuse effects for teenagers • Act of sending deceptive emails to trick individuals • Software designed to protect against malicious software • Process of gaining unauthorized access to computer systems • A secret word or phrase that must be used to gain admission • Term for sexually explicit material available on the internet • ...
Cybersecurity Week 1 2021-10-05
Across
- Short for malicious software designed to obtain information from a computer without the user's consent
- Protection of information assets within internetworked information systems
- Ensures the timely and reliable access and use of information systems
- Full use of a vulnerability for the benefit of an attacker
Down
- Protection of information from authorized access and disclosure
- A protected string of characters that authenticate a computer user to a system
- the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
- The protection of information from unauthorized modification
- A system or combination of systems that enforces a boundary between two or more networks
- An individual who attempts to gain unauthorized access to a computer system
10 Clues: Full use of a vulnerability for the benefit of an attacker • The protection of information from unauthorized modification • Protection of information from authorized access and disclosure • Ensures the timely and reliable access and use of information systems • Protection of information assets within internetworked information systems • ...
Cybersecurity Hex Crossword 2023-11-03
10 Clues: 46 55 4E • 4D 41 54 48 • 54 45 53 54 • 4C 49 46 45 • 43 4C 41 53 53 • 43 59 42 45 52 • 50 48 4F 4E 45 • 53 43 48 4F 4F 4C • 4C 41 50 54 4F 50 0A • 43 52 4F 53 53 57 4F 52 44
TPWD Cybersecurity Awareness 2024-10-08
Across
- A fake email designed to trick users into giving up personal information
- A way to verify a person's identity online
- A malicious software designed to harm a computer
- A software update that fixes vulnerabilities in a program
- Software that blocks harmful content from reaching your computer
Down
- A security breach that involves unauthorized access to data
- A security feature that requires more than one form of verification
- A network of infected computers controlled by a hacker
- The practice of protecting information from unauthorized access
- A set of guidelines for handling sensitive data
10 Clues: A way to verify a person's identity online • A set of guidelines for handling sensitive data • A malicious software designed to harm a computer • A network of infected computers controlled by a hacker • A software update that fixes vulnerabilities in a program • A security breach that involves unauthorized access to data • ...
Foundations of Cybersecurity 2024-11-20
Across
- This device inspects and filters network traffic
- the process of converting data into a code
- the process of verifying an identity before granting access
- the process of encoding information so that only the person that the message was intended for can read it
Down
- the practice of sending fake emails
- a network of compromised computers that are controlled by a single attacker
- a weakness within a computer system
- software that is designed to disrupt or damage access to a computer
- a type of malicious software that secretly gathers a user's personal data
- a type of malware that encrypts a victim's files or locks their device, and then demands payment
10 Clues: the practice of sending fake emails • a weakness within a computer system • the process of converting data into a code • This device inspects and filters network traffic • the process of verifying an identity before granting access • software that is designed to disrupt or damage access to a computer • ...
Info - security 2017-11-27
Across
- be attentive
- lure someone
- name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- protect networks, computers, programs and data from attack
- should not be shared
- monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- designed to detect and destroy computer viruses
- exploit weaknesses to gain access
- malicious software designed to block access to a computer system until a sum of money is paid.
- protects personal data published via the Internet
10 Clues: be attentive • lure someone • should not be shared • exploit weaknesses to gain access • designed to detect and destroy computer viruses • protects personal data published via the Internet • protect networks, computers, programs and data from attack • malicious software designed to block access to a computer system until a sum of money is paid. • ...
Profesi dan peluang usaha di bidang tkjt 2023-11-17
Across
- seseorang yang ahli dalam membuat animasi
- seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
- DBA termasuk singkatan dari
- bentuk perlindungan terhadap sistem yang terhubung ke internet
- melakukan instalasi dan konfigurasi adalah tugas?
Down
- seseorang yang ahli dalam bidang perfilm an atau video
- menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
- seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
- orang yang membuat poster,logo, disebut?
- peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu
10 Clues: DBA termasuk singkatan dari • orang yang membuat poster,logo, disebut? • seseorang yang ahli dalam membuat animasi • melakukan instalasi dan konfigurasi adalah tugas? • seseorang yang ahli dalam bidang perfilm an atau video • bentuk perlindungan terhadap sistem yang terhubung ke internet • menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang? • ...
Crossword #7 2023-11-07
Across
- A Brazilian type of music that will be performed by the Connection Trio.
- Production of this play has been delayed due to a COVID outbreak.
- The conference in which Marshall athletics compete
- A magic dragon.
Down
- Men's soccer faces this team this week.
- Education of this will be a part of the 4th Avenue Innovation Center
- A low battery will need a ________
- No.0 on the men's basketball team.
- Declared war on Hamas leading to unrest on campuses across the nation
- Science, Technology,Engineering and Mathematics.
10 Clues: A magic dragon. • A low battery will need a ________ • No.0 on the men's basketball team. • Men's soccer faces this team this week. • Science, Technology,Engineering and Mathematics. • The conference in which Marshall athletics compete • Production of this play has been delayed due to a COVID outbreak. • ...
Crossword Puzzle for you 2025-08-04
Across
- Person who works for a company or organization
- Machine that produces hard copies of digital documents
- The process of manufacturing goods in large quantities
- Person or business that buys products or services from a company
- Secure room housing computer servers and networking equipment
Down
- Practice of protecting systems and data from digital attacks
- Technology using radio waves for tracking and identification
- Material essential for electronic device manufacturing
- On-site maintenance or support provided to customers
- Device used for billing and transactions in retail
10 Clues: Person who works for a company or organization • Device used for billing and transactions in retail • On-site maintenance or support provided to customers • Material essential for electronic device manufacturing • Machine that produces hard copies of digital documents • The process of manufacturing goods in large quantities • ...
Computer Studies 9/10 Crossword 2024-05-21
Across
- A high-level programming language often used for web development.
- The physical components of a computer system.
- A software application used to access the web.
- An interconnected group of computers.
- The smallest unit of digital information.
- The primary storage device in a computer.
- A sequence of characters.
- A temporary storage that provides fast access to data.
- A set of instructions that a computer follows to perform a task.
- The standard language for creating web pages.
Down
- The main circuit board of a computer.
- A named collection of related data.
- Basic unit of data in computing.
- A global system of interconnected computer networks.
- The practice of protecting computers and data from unauthorized access.
- A device for entering data into a computer.
- To find and correct errors in a program.
- A way of sending information over the internet securely.
- The "brain" of the computer.
- An error in a program.
20 Clues: An error in a program. • A sequence of characters. • The "brain" of the computer. • Basic unit of data in computing. • A named collection of related data. • The main circuit board of a computer. • An interconnected group of computers. • To find and correct errors in a program. • The smallest unit of digital information. • The primary storage device in a computer. • ...
Andy & George’s Wedding Crossword 2024-05-28
Across
- What school did George go to?
- What is our favourite number?
- What was our wedding present from Bob & Wendy?
- How many years have we been together?
- What school did Andy go to?
- Where did George go to uni?
- Where did we first meet?
- Where do we live?
- Where did Andy go to uni?
- On what street was their first flat?
- What is George’s middle name?
Down
- What’s Andy’s favourite flavour of icecream?
- What colour is the diamond in George’s ring?
- Where does George work?
- What industry does Andy work in?
- What did Andy study at uni?
- What name is George saved under in Andy’s phone?
- What’s Andy’s coffee order?
- Where did we get engaged?
- What is Andy’s favourite hobby?
- What’s George’s favourite film?
- What was our first dog called?
- What colour are George’s eyes?
- What is Andy’s middle name?
24 Clues: Where do we live? • Where does George work? • Where did we first meet? • Where did we get engaged? • Where did Andy go to uni? • What did Andy study at uni? • What school did Andy go to? • Where did George go to uni? • What’s Andy’s coffee order? • What is Andy’s middle name? • What school did George go to? • What is our favourite number? • What is George’s middle name? • ...
Human Ingenuity and Technology 2024-12-06
Across
- Platforms for online social interaction
- Field focused on designing intelligent machines
- Autonomous vehicles with no human driver
- Protection of computer systems from theft or damage
- Additive manufacturing process creating three-dimensional objects
- Creating a genetically identical copy of an organism
- Manipulation of matter on an atomic scale
- Proposed point of rapid technological growth
- A new device or method created through innovation
- Objects orbiting Earth for communication and research
- Simulated experience that can mimic the real world
Down
- Residence equipped with interconnected devices for automation
- Smart devices worn on the body for various applications
- Using biological systems for technological applications
- Sustainable energy sources like solar and wind
- Virtual money used for online transactions
- Creative problem-solving of mankind
- Multi-functional mobile device
- Altered organisms for improved traits
- Machines simulating human intelligence
20 Clues: Multi-functional mobile device • Creative problem-solving of mankind • Altered organisms for improved traits • Machines simulating human intelligence • Platforms for online social interaction • Autonomous vehicles with no human driver • Manipulation of matter on an atomic scale • Virtual money used for online transactions • Proposed point of rapid technological growth • ...
AnaBela Meitasari XF, 02 2025-04-15
Across
- Proses memeriksa kebenaran informasi disebut
- Ahli yang menangani keamanan jaringan
- Pekerja yang mengelola database
- platform populer untuk menyebarkan video budaya
- Batik adalah contoh konten digital bertema
- Perlindungan untuk logo atau simbol disebut
- Profesi yang merancang dan membangun perangkat lunak
- Lembaga pengawas konten di internet di Indonesia
- Berita palsu disebut juga
- konten di gital yang memperkenalkan tarian daerah tersebut
- Jenis konten yang merugikan dan harus disaring
- Profesi yang menganalisis data
Down
- Orang yang mendesain tampilan website
- Hak atas penemuan teknologi baru
- Hak yang melindungi karya musik dan tulisan
- Operator untuk mencari dalam situs tertentu
- Lembaga resmi pendaftaran HAKI di Indonesia
- Sistem yang memblokir konten berbahaya
- Operator pencarian untuk mengecualikan kata tertentu
- salah satu bentuk produksi konten berupa suara
- Kata kunci untuk mencari frasa persis
- Situs yang digunakan untuk mencari informasi di internet
- Hak eksklusif atas ciptaan disebut
- lstilah untuk hasil pencarian yang muncul di google
24 Clues: Berita palsu disebut juga • Profesi yang menganalisis data • Pekerja yang mengelola database • Hak atas penemuan teknologi baru • Hak eksklusif atas ciptaan disebut • Orang yang mendesain tampilan website • Ahli yang menangani keamanan jaringan • Kata kunci untuk mencari frasa persis • Sistem yang memblokir konten berbahaya • Batik adalah contoh konten digital bertema • ...
TTS INFORMATIKA 2025-04-14
Across
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Proses identifikasi atau verifikasi pengguna
- Penyusupan sistem oleh pihak tidak berwenang.
- Jenis virus komputer
- Pencurian data kartu kredit atau kartu debit
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Teknik mengakses sistem tanpa otorisasi.
- Penyerang digital yang memiliki tujuan jahat.
Down
- Kata sandi dalam sistem keamanan.
- Istilah lain untuk keamanan jaringan
- Alamat identifikasi unik setiap perangkat di jaringan.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Aksi mencari celah dalam sistem komputer.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Penipuan online melalui email atau situs palsu.
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Program pengintai aktivitas pengguna tanpa izin.
- Sandi digital yang dipakai untuk keamanan transaksi.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-14
Across
- Penyerang digital yang memiliki tujuan jahat.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Proses identifikasi atau verifikasi pengguna
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Program pengintai aktivitas pengguna tanpa izin.
- Teknik mengakses sistem tanpa otorisasi.
- Jenis virus komputer
- Kata sandi dalam sistem keamanan.
- Istilah lain untuk keamanan jaringan
Down
- Penyusupan sistem oleh pihak tidak berwenang.
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Aksi mencari celah dalam sistem komputer.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Pencurian data kartu kredit atau kartu debit
- Penipuan online melalui email atau situs palsu.
- Sandi digital yang dipakai untuk keamanan transaksi.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Pencurian data kartu kredit atau kartu debit • Proses identifikasi atau verifikasi pengguna • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
TEKA - TEKI SILANG EKONOMI DIGITAL 2025-08-21
Across
- Transaksi melalui jaringan internet
- Sistem penyimpanan data berbasis internet
- Perusahaan rintisan berbasis teknologi
- Metode pembayaran tanpa uang tunai
- Konsultan investasi keuangan
- masyarakat yang sebelumnya terpinggirkan dapat mengakses layanan keuangan, pendidikan,dan lainnya
- Platform jual beli online
- Pertanian berbasis teknologi
- Inovasi finansial berbasis teknologi
- Perantara pembayaran digital seperti OVO dan DANA
- layanan pendiidkan atau pendidikan berbasis teknologi
Down
- internet Komponen yang ada pada infrastruktur digital
- Contoh robo advisors
- Mengumpulkan dana dari banyak orang melalui plastfrom digital atau penggalangan donasi
- Sistem keamanan data
- Mata uang kripto paling terkenal
- Pinjaman modal secara online tetapi melalui investor bukan sembarangan orang dan terawasi oleh OJK
- Penyedia layanan keuangan dalam skala kecil atau masyarakat yang tidak memiliki pengetahuan cara akses pinjaman ke bank, biasanya pinjam dana melalui BPR (Bank Pengkrediatan Rakyat) untuk usaha kecil / UMKM
- Layanan transportasi yang menghubungkan dengan pengemudi dan ada real time nya
- layanan kesehatan atau konsultasi kesehatan secara online
20 Clues: Contoh robo advisors • Sistem keamanan data • Platform jual beli online • Konsultan investasi keuangan • Pertanian berbasis teknologi • Mata uang kripto paling terkenal • Metode pembayaran tanpa uang tunai • Transaksi melalui jaringan internet • Inovasi finansial berbasis teknologi • Perusahaan rintisan berbasis teknologi • Sistem penyimpanan data berbasis internet • ...
Know your Math 2025-08-30
Across
- Solves large-scale systems in structural engineering.
- Used in image compression techniques like PCA.
- Applied in heat transfer and fluid flow analysis.
- the Determines solvability of engineering systems.
- Average off the values
- Used to approximate functions in aircraft control systems.
- Applied in medical testing for disease prediction.
- Applied in vibration analysis of mechanical structures.
- Used in reliability engineering to model component lifetimes.
- Helps in predicting combined system failure chances.
- Helps detect anomalies in network traffic for cybersecurity.
Down
- Used in spam email detection.
- Used to analyze asymmetry in business profits distribution.
- Used in power flow analysis of electrical grids.
- Essential in facial recognition algorithms.
- Speeds up computations in control systems.
- Measures risk in stock market analysis.
- Central Value of the data set
- Applied in electrical circuit analysis for sinusoidal signals.
- Used in robotics for motion transformation between coordinate systems.
20 Clues: Average off the values • Used in spam email detection. • Central Value of the data set • Measures risk in stock market analysis. • Speeds up computations in control systems. • Essential in facial recognition algorithms. • Used in image compression techniques like PCA. • Used in power flow analysis of electrical grids. • Applied in heat transfer and fluid flow analysis. • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Masa depan ekonomi digital bergantung pada literasi
- → Perusahaan baru yang berbasis teknologi disebut
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Risiko ekonomi digital adalah kebocoran
- → Berjualan melalui marketplace online termasuk kegiatan
- → Contoh aplikasi fintech di Indonesia adalah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Pemasaran melalui media sosial disebut
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
- → Kecerdasan buatan dikenal juga dengan istilah
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
FITAVocab.lo 2013-05-15
Across
- code of positive conduct one uses such as plagiarism, copyright, etc.
- rules and behaviors designed to keep individuals safe online
- a search engine that goes through all the search engines.
- speed of machine
- short term memory for your computer
- a
Down
- a website that protects young people from cyber bullies
- protecting information on computer systems/networks
- a program that allows you to search information on the internet.
- a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.
10 Clues: a • speed of machine • short term memory for your computer • protecting information on computer systems/networks • a website that protects young people from cyber bullies • a search engine that goes through all the search engines. • rules and behaviors designed to keep individuals safe online • a program that allows you to search information on the internet. • ...
Tugas - Jaringan komputer dan internet 2024-01-11
Across
- aspek teknis pada jaringan komputer
- nama lain jaringan komputer
- Jenis jaringan komputer
- aspek utama keamanan jaringan
- yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
- topologi jaringan yang lebih sederhana yaitu
Down
- Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
- server komponen jaringan komputer
- lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
- Network interface card
10 Clues: Network interface card • Jenis jaringan komputer • nama lain jaringan komputer • aspek utama keamanan jaringan • server komponen jaringan komputer • aspek teknis pada jaringan komputer • topologi jaringan yang lebih sederhana yaitu • lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu • ...
Technology 2025-05-05
Across
- Writing code to create software or applications.
- The physical parts of a computer system.
- Protection of internet-connected systems from cyber threats.
- The use of scientific knowledge for practical purposes.
- A mobile phone with advanced features and internet access.
Down
- Programs and operating information used by a computer.
- A software program designed for a specific task on devices.
- A global network connecting millions of computers worldwide.
- A group of interconnected computers or devices.
- An electronic device that processes data and performs tasks.
10 Clues: The physical parts of a computer system. • A group of interconnected computers or devices. • Writing code to create software or applications. • Programs and operating information used by a computer. • The use of scientific knowledge for practical purposes. • A mobile phone with advanced features and internet access. • ...
Technology & Social Media 2025-06-13
Across
- – Something that spreads quickly on the internet.
- – A saved copy of files or data in case you lose them.
- – Programs or apps used on a computer or phone.
- – A machine or tool that helps do tasks, like a phone or laptop.
- – A small, smart electronic tool or device.
Down
- – A person who affects others' opinions online.
- – Related to technology using numbers, like computers.
- – A new idea or method that improves something.
- – Protection against online attacks and hackers.
- – The right to keep your personal information safe.
10 Clues: – A small, smart electronic tool or device. • – A person who affects others' opinions online. • – A new idea or method that improves something. • – Programs or apps used on a computer or phone. • – Protection against online attacks and hackers. • – Something that spreads quickly on the internet. • – The right to keep your personal information safe. • ...
Career Focus 7 2025-11-05
Across
- What the trainee earns upon successful completion
- Critical skill needed for protecting digital assets
- Formal training received at an RTO like TAFE
Down
- The capacity to adjust to a new work task or technology
- Type of program: A university preparation or bridging course
- The ability to move skills from one job to another
- The overall program of study you're enrolled in
- National GTO with an Albury-Wodonga presence
- In demand professional who builds applications or software systems
- LETTER A one-page letter sent with a resume
10 Clues: LETTER A one-page letter sent with a resume • National GTO with an Albury-Wodonga presence • Formal training received at an RTO like TAFE • The overall program of study you're enrolled in • What the trainee earns upon successful completion • The ability to move skills from one job to another • Critical skill needed for protecting digital assets • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
Cybersecurity Crossword Puzzle 2023-11-10
Across
- A champion of cybersecurity
- The process of identifying a users identity
- Changing the IP address of an email so it appears to come from a trusted source
- Malicious software used to damage or infect a system
- A means of attack, a vulnerability
- Technology used to keep hackers out of a system
Down
- Coding to protect information
- Malware that hijacks a system in return for payment
- Malware that corrupts a system, then spreads to other systems
- Practice of posing as someone legitimate to gain access
10 Clues: A champion of cybersecurity • Coding to protect information • A means of attack, a vulnerability • The process of identifying a users identity • Technology used to keep hackers out of a system • Malware that hijacks a system in return for payment • Malicious software used to damage or infect a system • Practice of posing as someone legitimate to gain access • ...
STEM in the News 2023-09-26
Across
- regulates anyone who stores, transmits, or possesses cardholder data
- Rules created for keeping things under control
- The act of staying safe online
- Using or creating ways to use services for malicious purposes
- Regulates use and transfer of Healthcare data
Down
- Moving something from one place to another
- An online exploit of a service or information
- Handles the storing, handling, and transmission of digital data
- Created by the EU to protect their citizens online
- Online or relating to a computer
10 Clues: The act of staying safe online • Online or relating to a computer • Moving something from one place to another • An online exploit of a service or information • Regulates use and transfer of Healthcare data • Rules created for keeping things under control • Created by the EU to protect their citizens online • ...
The Department of Homeland Security Crossword 2024-12-09
Across
- The main mission of DHS is to stop this threat.
- CISA, stands for ___________ and Infrastructure Security Agency.
- ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
- DHS operates at the ______ level.
- One weakness of the DHS is the __________ jurisdiction.
- The DHS Oversees ______ security and lawful immigration.
Down
- One of the DHS agencies.
- The person who appoints the Secretary of Homeland Security.
- DHS works to help communities recover through ________.
- The DHS is the newest _______-level department.
10 Clues: One of the DHS agencies. • DHS operates at the ______ level. • The main mission of DHS is to stop this threat. • The DHS is the newest _______-level department. • DHS works to help communities recover through ________. • One weakness of the DHS is the __________ jurisdiction. • The DHS Oversees ______ security and lawful immigration. • ...
Theme: Technology 2024-07-24
Across
- An organized collection of data
- A machine capable of carrying out complex actions automatically
- A global network connecting millions of private public academic and government networks
- A process or set of rules to be followed in calculations or other problem-solving operations
- The programs and other operating information used by a computer
Down
- The practice of protecting systems networks and programs from digital attacks
- A mobile phone with advanced features
- A portable personal computer
- An unmanned aerial vehicle
- Abbreviation for Artificial Intelligence
10 Clues: An unmanned aerial vehicle • A portable personal computer • An organized collection of data • A mobile phone with advanced features • Abbreviation for Artificial Intelligence • A machine capable of carrying out complex actions automatically • The programs and other operating information used by a computer • ...
Computer Science 2024-10-25
6 Clues: Protecting your systems • password an easily guessed password • password A password that is strong • a memorized secret with a sequence of words • random password Make up your own password • device A technique someone uses to remember
keamanan digital 2025-08-28
6 Clues: apa ancaman digital berupa program? • apa kata lain dari keamanan digital • apa perangkat lunak untuk blokir virus • apa tindakan mencuri data dengan menyamar • apa jenis kode rahasia untuk melindungi akun? • apa metode verifikasi ganda untuk keamanan akun?
Industry 4.0 2025-10-17
Across
- Visual display of performance metrics
- A digitally Tech-enabled logistics network (two words)
- A reality, which creates a fully immersive digital environment
- Digital modelling of real-world processes
- Software that defines functions, protocols, and data formats to allow different software applications to communicate with each other.
- Supervisory Control and Data Acquisition (abbreviation)
- A Network of connected machines sharing data (3)Cybersecurity
- The Monitoring of the location of equipment and resources
- The examination of raw data information to find useful patterns
- A manufacturing process focused on reducing waste
- A type of manufacturing often referred to as 3D printing
- A type of maintenance that uses data analytics to prevent equipment failure
- This type of reality overlays digital information on the real world
- Near-field communication for contactless exchange
- A manufacturing software system for managing shop-floor operations (abbrev)
- A System which makes Machines capable of operating without human control
- A computerised network of remote servers which host internet data
- Software systems that controls warehouse management operations (abbreviation)
Down
- Minimising environmental impact of operations
- Protection against online threats in connected systems
- A collaborative robot that interacts physically with humans.
- A decentralised digital ledger that stores linked blocks of cryptographically secured records
- A type of factory whose physical processes and machinery are governed by an AI system, reducing the human workforce
- Manufacturing equipment which is fully controlled by digital systems.
- Key Performance Indicator
- Large volume of data that can now be collected from all aspects of manufacturing
- The capability of computational systems to perform tasks typically associated with human intelligence
- A software system that integrates and manages core business processes within an organization, such as production, supply chain, finance, and human resources
- A virtual model of a physical machine, part, process, or system
- A reality which is a blend of physical and digital worlds
- A Device used to collect and transmit performance data
- Radio-frequency identification for tracking
- Short for Overall Equipment Effectiveness)
33 Clues: Key Performance Indicator • Visual display of performance metrics • Digital modelling of real-world processes • Short for Overall Equipment Effectiveness) • Radio-frequency identification for tracking • Minimising environmental impact of operations • A manufacturing process focused on reducing waste • Near-field communication for contactless exchange • ...
SecuritySquares-Advanced 2023-03-03
Across
- 01101100 01101111 01110111 01100101 01110011 00001010
- A piece of code put in to fix an error
- Unique string of numbers that identifies a device connected to a network
- Intent to do harm
- The second in CIA triad
- When an attacker tricks users into clicking on hidden elements
- A characteristic or distinctive pattern that can be searched for
- Rivest-Shamir-Adleman
- Pay or else
- A type of media manipulation
Down
- A White hat hacker
- Converting enciphered text to plain text
- Unique identifier assigned to a NIC
- The use of mathematical techniques to provide security services
- A scam without a rod and reel but with voice mail
- The process of uncovering trends and patterns in large amounts of data
- Information Technology Infrastructure Library
- The process for overseeing the cybersecurity teams
18 Clues: Pay or else • Intent to do harm • A White hat hacker • Rivest-Shamir-Adleman • The second in CIA triad • A type of media manipulation • Unique identifier assigned to a NIC • A piece of code put in to fix an error • Converting enciphered text to plain text • Information Technology Infrastructure Library • A scam without a rod and reel but with voice mail • ...
Cybersecurity e I.A. 2024-05-23
Across
- riconoscimento online
- parola d'accesso
- "pescare" dati finanziari e codici di accesso di un utente
- veniva definito "virus per computer"
- attività criminale tramite dispositivi digitali
Down
- anche detto Anti-Malware
- Tra LAN e WAN
- tratta di scritture nascoste
- punto debole di un sistema
- manovra offensiva contro sistemi informatici
10 Clues: Tra LAN e WAN • parola d'accesso • riconoscimento online • anche detto Anti-Malware • punto debole di un sistema • tratta di scritture nascoste • veniva definito "virus per computer" • manovra offensiva contro sistemi informatici • attività criminale tramite dispositivi digitali • "pescare" dati finanziari e codici di accesso di un utente
Cybersecurity Revision Quiz 2024-10-20
Across
- This is when someone watches over your shoulder to see your private details.
- This protects information by turning it into a secret code.
- This is when someone is mean or rude online just to upset others.
- This is a way to unlock devices using fingerprints or face scans (B________).
Down
- This is a sneaky program that spies on your computer activity.
- This is someone you can talk to if you're worried about something online. (two words)
- This looks like a gift but secretly harms your computer.
- This is when someone tricks you into giving personal information.
- This is something that all uses need. It is hard to guess and keeps your account safe. (two words)
- This software protects your computer from harmful viruses.
10 Clues: This looks like a gift but secretly harms your computer. • This software protects your computer from harmful viruses. • This protects information by turning it into a secret code. • This is a sneaky program that spies on your computer activity. • This is when someone tricks you into giving personal information. • ...
Cybersecurity Crossword Puzzle 2025-11-26
Across
- Applying updates to software to fix vulnerabilities
- Process of verifying the identity of a user or device
- Malicious software that locks data and demands payment for release.
Down
- Manipulating people into revealing confidential information
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Secret string of characters used for authentication
- Process of converting data into a coded form to prevent unauthorized access
- Software designed to disrupt, damage, or gain unauthorized access to a system
- Secure tunnel for online communication, often used for privacy
- Network security system that monitors and controls incoming and outgoing traffic
10 Clues: Applying updates to software to fix vulnerabilities • Secret string of characters used for authentication • Process of verifying the identity of a user or device • Manipulating people into revealing confidential information • Secure tunnel for online communication, often used for privacy • Malicious software that locks data and demands payment for release. • ...
Thematic Puzzle 2024-12-16
Across
- – “A structure for growing plants, also related to gases trapping heat.”
- – “The variety of life in the world or a particular habitat.”
- Exchange – “The sharing of ideas, traditions, and values between cultures.”
- – “A distributed digital ledger system.”
- – “Securing information through coding.”
- – “A global network connecting billions of devices.”
- Footprint – “The total emissions of carbon dioxide by an individual or group.”
- – “At risk of extinction.”
Down
- – “Protecting data from unauthorized access.”
- – “The natural home of a plant or animal.”
- – “A type of energy source that is sustainable.”
- Trade – “Exchange of goods and services internationally.”
- – “The act of protecting and preserving nature.”
- – “A community of interacting organisms and their environment.”
- Energy – “Energy from sustainable sources like solar or wind.”
15 Clues: – “At risk of extinction.” • – “A distributed digital ledger system.” • – “Securing information through coding.” • – “The natural home of a plant or animal.” • – “Protecting data from unauthorized access.” • – “A type of energy source that is sustainable.” • – “The act of protecting and preserving nature.” • – “A global network connecting billions of devices.” • ...
Cybersecurity Awareness Month Crossword Puzzle 2022-09-15
7 Clues: A message sent on Twitter. • A network for online picture sharing. • A platform founded by Mark Zuckerburg. • The fastest growing social media platform. • An act that can be made by a Facebook user. • A self portrait taken by using the front camera. • Technology Field concerned with social media privacy.
Digital Literacy Basics 2024-12-09
Across
- The traces you leave online
- A combination of letters, numbers, and symbols used for security
- A way to protect your personal information online
- The online platform for social interaction
- To transfer a file from the internet to your device
Down
- The software used to access the internet
- An unsolicited email attempt to steal personal information
- A virtual space to store files
8 Clues: The traces you leave online • A virtual space to store files • The software used to access the internet • The online platform for social interaction • A way to protect your personal information online • To transfer a file from the internet to your device • An unsolicited email attempt to steal personal information • ...
Cybersecurity101 2022-11-16
Across
- malware that is secretly spying on you and stealing your data
- act of discovering open wifi networks by driving around
- malware that encrypts your files and system demanding payment
- practice of socially engineering high value individuals of an organization
- agency responsible for strengthening cybersecurity posture in the US
- brute force technique to discover files, domains, etc.
Down
- method of a threat actor uses to return into your network/device
- phishing over the phone
- common public-key encryption algorithm
- most common threat vector for social engineering
- phishing over text
- MITRE framework for tactics techniques and procedures
12 Clues: phishing over text • phishing over the phone • common public-key encryption algorithm • most common threat vector for social engineering • MITRE framework for tactics techniques and procedures • brute force technique to discover files, domains, etc. • act of discovering open wifi networks by driving around • malware that is secretly spying on you and stealing your data • ...
SCAI Feasting with Faculty 2023-11-02
Across
- Location where data is stored in a computer's memory.
- The study of breaking codes and ciphers.
- Software designed to harm or infiltrate a computer.
- Low-level human-readable code for computers.
- Investigating digital evidence for legal purposes.
- Small storage areas inside the computer's CPU.
- Measures to keep your computer and data safe online.
Down
- Making data unreadable to unauthorized users.
- A secure way to verify the sender of a message.
- Moving information from one place to another.
- A digital barrier that protects your network from threats.
- A command that tells the computer what to do.
12 Clues: The study of breaking codes and ciphers. • Low-level human-readable code for computers. • Making data unreadable to unauthorized users. • Moving information from one place to another. • A command that tells the computer what to do. • Small storage areas inside the computer's CPU. • A secure way to verify the sender of a message. • ...
Cybersecurity Decoded 2 2020-07-30
10 Clues: childhood game • the iron giant • Not canned food • Troy's downfall • type of cleanliness • sugar comes in these • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses • Dr's are known to have the messiest ones
Cybersecurity crossword puzzle 2023-12-14
Across
- A technique to deceive individuals into providing sensitive information.
- Software used to protect against viruses and malware.
- A sequence of characters used to authenticate identity or access.
- A program that replicates itself and spreads to other computers.
- An encrypted connection between a web browser and a server.
Down
- The practice of keeping software up to date to protect against vulnerabilities.
- A system that verifies a user's identity through a unique physical characteristic.
- A secret code that only authorized parties should be able to read.
- A type of attack that floods a network to disrupt its operation.
- An organization that identifies security flaws in software.
10 Clues: Software used to protect against viruses and malware. • An organization that identifies security flaws in software. • An encrypted connection between a web browser and a server. • A type of attack that floods a network to disrupt its operation. • A program that replicates itself and spreads to other computers. • ...
Cybersecurity e I.A. 2024-05-23
Across
- riconoscimento online
- parola d'accesso
- "pescare" dati finanziari e codici di accesso di un utente
- veniva definito "virus per computer"
- attività criminale tramite dispositivi digitali
Down
- anche detto Anti-Malware
- Tra LAN e WAN
- tratta di scritture nascoste
- punto debole di un sistema
- manovra offensiva contro sistemi informatici
10 Clues: Tra LAN e WAN • parola d'accesso • riconoscimento online • anche detto Anti-Malware • punto debole di un sistema • tratta di scritture nascoste • veniva definito "virus per computer" • manovra offensiva contro sistemi informatici • attività criminale tramite dispositivi digitali • "pescare" dati finanziari e codici di accesso di un utente
Cybersecurity Intro Vocabulary 2023-09-07
Across
- the avenue or path the hacker uses to commit the attack
- usually operates outside the law
- a hacker who is generally ethical and law-abiding.
- the act of circumventing or breaking past security boundaries.
Down
- process of protecting a system against unintended or malicious changes or use
- a malicious software code that is unleashed and attempts to perform its destructive content
- an attempt to steal, damage, or destroy data or a computer system
- a person who engages in hacking
- They do no harm, but they don't ask permission
- hacking into a phone system
10 Clues: hacking into a phone system • a person who engages in hacking • usually operates outside the law • They do no harm, but they don't ask permission • a hacker who is generally ethical and law-abiding. • the avenue or path the hacker uses to commit the attack • the act of circumventing or breaking past security boundaries. • ...
Cybersecurity Awareness Puzzle 2023-09-20
Across
- ______ is a type of phishing that uses voice calls to manipulate a target.
- Type of malware that threatens to expose information unless a payment is made.
- Cyber defense agency that is hosting National Cybersecurity Awareness Month.
- Social engineering tactic that research is done on the victim to personalize the attack.
- Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
- A new social engineering attack involves QR codes and is a form of a *ishing attacks.
- According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
- Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
- A ________ manager is best the way to create and maintain strong passwords.
- In 2023, this brand name was abused the most in phishing attacks.
10 Clues: In 2023, this brand name was abused the most in phishing attacks. • ______ is a type of phishing that uses voice calls to manipulate a target. • A ________ manager is best the way to create and maintain strong passwords. • Cyber defense agency that is hosting National Cybersecurity Awareness Month. • ...
Key Cybersecurity Vocabulary 2025-07-10
Across
- Tools that collect and analyze security data to detect threats
- Detects and blocks suspicious activities in real time
- Keeping systems up to date with software fixes to close security hole
- A network of infected computers controlled by an attacker, often used for DDoS
Down
- Tricking people into revealing confidential information
- Monitors network traffic for suspicious activity and alerts administrators
- Probing a system for open ports to find possible vulnerabilities
- A fake communication used to trick users into giving up sensitive data
- Requires two methods to verify a user’s identity
- Verifying the identity of a user, device, or process before allowing access
10 Clues: Requires two methods to verify a user’s identity • Detects and blocks suspicious activities in real time • Tricking people into revealing confidential information • Tools that collect and analyze security data to detect threats • Probing a system for open ports to find possible vulnerabilities • ...
IT Cybersecurity terms 2025-08-28
Across
- Regular software updates to fix vulnerabilities
- Extra step beyond a password
- Do this when you leave your desk
- Always create a copy of important files
- Encrypts your connection on public Wi-Fi
- Fake message trying to steal information
Down
- Turn the device off and on to fix issues
- Strongest defense is user awareness
- Protect files or drives from unauthorized access
- Never share this secret login credential
10 Clues: Extra step beyond a password • Do this when you leave your desk • Strongest defense is user awareness • Always create a copy of important files • Turn the device off and on to fix issues • Never share this secret login credential • Encrypts your connection on public Wi-Fi • Fake message trying to steal information • Regular software updates to fix vulnerabilities • ...
Cybersecurity Crossword Puzzle 2026-02-28
Across
- Verifying someone’s identity before allowing system access.
- Using two methods (like a password + phone code) to securely confirm identity
- Harmful software designed to damage, steal, or gain access to systems.
- A secret code used to log in and prove identity.
Down
- Privacy: Protecting personal information from misuse and unauthorized access.
- Fake messages that trick you into giving up passwords or personal info.
- Scrambling data so only authorized users can read it.
- A security barrier that blocks unauthorized network access.
- Someone who breaks into systems—some for harm, others for good (security testing).
- Malware that spreads by attaching to files or programs when opened.
10 Clues: A secret code used to log in and prove identity. • Scrambling data so only authorized users can read it. • Verifying someone’s identity before allowing system access. • A security barrier that blocks unauthorized network access. • Malware that spreads by attaching to files or programs when opened. • ...
HP GPO Crossword puzzle 2022-06-22
Across
- Helps move stock for HP
- Document that explains input output and process
- Safeguarding the digital world
- Converts screen to paper
- Introducing new methods, ideas, or products
Down
- Making sure your future generations are comfortable
- The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible
7 Clues: Helps move stock for HP • Converts screen to paper • Safeguarding the digital world • Introducing new methods, ideas, or products • Document that explains input output and process • Making sure your future generations are comfortable • The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- A popular operating system.
- Securing computer systems against unauthorized access.
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
Down
- Desired outcomes.
- Malicious software used to gain unauthorised access to computer systems.
- Term for gaining access to a secure network through.
7 Clues: Desired outcomes. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • Malicious software used to gain unauthorised access to computer systems. • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- A popular operating system.
- Desired outcomes.
- Term for gaining access to a secure network through.
Down
- Securing computer systems against unauthorized access.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- Malicious software used to gain unauthorised access to computer systems.
7 Clues: Desired outcomes. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • Malicious software used to gain unauthorised access to computer systems. • ...
Isa usando un crusigrama 2020-08-21
Across
- te protege de el coronavirus y lo usas al tener contacto con la gente
- para enmarcar una foto
- hace que estes prevenido de lo que le pueden hacer a la computadora
- infectan archivos y destruyen datos de tu computadora
- donde guardas mucho informacion, fotos y muchas cosas tuyas
- para no dañarte los ojos al tomar sol
Down
- una enfermedad que genero una pandemia
- es donde esta tu rutina y te la recuerda al mirarlo
- para emprolijarte el pelo
- te despierta o te recuerda algo
10 Clues: para enmarcar una foto • para emprolijarte el pelo • te despierta o te recuerda algo • para no dañarte los ojos al tomar sol • una enfermedad que genero una pandemia • es donde esta tu rutina y te la recuerda al mirarlo • infectan archivos y destruyen datos de tu computadora • donde guardas mucho informacion, fotos y muchas cosas tuyas • ...
Team - AllSafe 2022-03-27
Across
- Data that can identify a specific individual
- What's common between Aetnaand cyber security? (Clue: Important to save money)
- Compliance standard to safeguard health information
- An off-site attack surface (Clud: Most SaaS platforms use this service)
- a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
- A social engineering attack
- Risk assessment of vendors, suppliers, partners, contractors, or service providers
- Head of information security program
- Method to reduce human error
- Electronically-stored health information
10 Clues: A social engineering attack • Method to reduce human error • Head of information security program • Electronically-stored health information • Data that can identify a specific individual • Compliance standard to safeguard health information • An off-site attack surface (Clud: Most SaaS platforms use this service) • ...
WeWork 109NBR - Know Your Neighbours! 2024-08-30
Across
- Singaporean home cleaning service provider
- European cybersecurity company
- Their software helps you to manage (real estate) properties
- Barbie and Hot Wheels toy company
Down
- Has an exhibition at the Funan Underground Pedestrian Link @ B2, owner of hit series ‘The King’s Avatar’
- Sea creature or digital marketing platform?
- Yuu rewards club creator (hint: check Apple/Google Play store)
- Temasek founded AI-powered computer vision application
- Global banking company, good for currency exchange
- Payments platform for Boost, McDonalds and Dunkin Donuts
10 Clues: European cybersecurity company • Barbie and Hot Wheels toy company • Singaporean home cleaning service provider • Sea creature or digital marketing platform? • Global banking company, good for currency exchange • Temasek founded AI-powered computer vision application • Payments platform for Boost, McDonalds and Dunkin Donuts • ...
Jobs of the future 2025-04-30
Across
- Farmer – Someone who uses technology to grow food in cities.
- – A person who creates computer programs and apps.
- – A person who designs and builds robots.
- – A person who helps design self-driving cars.
- – A scientist who works with genes to improve health.
Down
- – Someone who explores space and other planets.
- Expert – A person who protects computers from hackers.
- – Someone who studies and protects the environment.
- Energy Specialist – Someone who creates energy from the sun and wind.
- Biologist – A person who studies the oceans and marine life.
10 Clues: – A person who designs and builds robots. • – A person who helps design self-driving cars. • – Someone who explores space and other planets. • – A person who creates computer programs and apps. • – Someone who studies and protects the environment. • – A scientist who works with genes to improve health. • Expert – A person who protects computers from hackers. • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Refers to unwanted bulk emails that come from unknown sources
- The process of transforming data into an unreadable code
- Device that connects multiple networks
- It can be defined as the legal rules and restrictions imposed on online laws
Down
- Type of cyber attack that tricks users
- Wireless technology used to interconnect mobiles computers etc
- Network topology with a central hub
- Practice of protecting digital information
- It is a combination of two terms 'net' and 'etiquette'
- Refers to an illegal intrusion into a computer system or network
10 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
Safety week 2026-02-02
Across
- Knowing the risks and staying safe online
- Keeping your personal information safe and private
- Giving permission before information or pictures are used
- Fake images, videos, or sounds made by AI
- A system that stops harmful access to a computer or network
- Rules a computer follows to solve problems or sort information
Down
- Checking that information, accounts, or sources are real
- Knowing what is right and wrong when using technology
- Protecting computers, networks, and data from online threats
- Scrambling information so only allowed people can read it
10 Clues: Knowing the risks and staying safe online • Fake images, videos, or sounds made by AI • Keeping your personal information safe and private • Knowing what is right and wrong when using technology • Checking that information, accounts, or sources are real • Giving permission before information or pictures are used • ...
Combat robots 2026-02-27
Across
- Programs that process sensor data and determine actions
- Operation of a robot by a human operator from a distance
- Engineered materials that reduce weight while maintaining strength
- Weaponized systems capable of operating without direct human control
Down
- Scientific study of movement applied to robot balance and posture
- Robots designed to resemble and move like humans for military use
- Sensors that detect heat signatures in the environment
- Protection of communication systems against hacking
- Self-operating control systems allowing independent action
- Mechanisms using pressurized fluid to enable movement
10 Clues: Protection of communication systems against hacking • Mechanisms using pressurized fluid to enable movement • Sensors that detect heat signatures in the environment • Programs that process sensor data and determine actions • Operation of a robot by a human operator from a distance • Self-operating control systems allowing independent action • ...
Internet Safety Crossword 2025-03-04
Across
- Cyberstalking is the use of digital technology to track and harass someone.
- Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- When someone builds trust online to exploit or harm another person, often for illegal or abusive purposes.
- Something built specifically for web browsers to track, personalize and save information about each user's session.
- The illegal copying or distribution of copyrighted material via the Internet.
- Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
- Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- The act of someone causing discord online or in person.
- Footprint A digital footprint is the traceable data and activity a user leaves on the internet.
- Someone who uses the internet to exploit or harm others, often by gaining their trust first.
Down
- Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
- Identity Theft When a malicious actor steals someone's online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim.
- Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
- Shouting is typing in all capital letter, which is considered yelling.
- A set of unofficial rules for good behavior and politeness followed by users of online and digital technologies such as the Internet, email, and chatrooms.
- Settings The part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user.
- An online real-time conversation, typically carried out by people who use nicknames instead of their real names.
- for weblog) A diary or personal journal kept on a website.
- When someone films an assault as a prank and shares it online, promoting violence and bullying
- The use of a computer as an instrument to further illegal ends
20 Clues: The act of someone causing discord online or in person. • for weblog) A diary or personal journal kept on a website. • The use of a computer as an instrument to further illegal ends • Shouting is typing in all capital letter, which is considered yelling. • Cyberstalking is the use of digital technology to track and harass someone. • ...
C for Cybersecurity 2022-10-08
Across
- violation detected!
- do you have one installed on your system yet?
- A proper request always has a ...
- **across might come in handy here
- spotting threats on the go
Down
- feature that works 24 x 7 (6,2)
- explore solutions on your own **(2,Down)
- might as well be maleficent
- is always a target, keep it safe!
- delegate this work, please
10 Clues: violation detected! • delegate this work, please • spotting threats on the go • might as well be maleficent • feature that works 24 x 7 (6,2) • is always a target, keep it safe! • A proper request always has a ... • **across might come in handy here • explore solutions on your own **(2,Down) • do you have one installed on your system yet?
Cybersecurity Decoded 1 2020-07-30
10 Clues: childhood game • the iron giant • Troy's downfall • Not canned food • type of cleanliness • sugar comes in these • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses • Dr's are known to have the messiest ones
Cybersecurity First Principles 2016-06-14
Across
- less complicated, less problems
- multiple layers of defense protect information
- to simplify and decrease the number of ways the software can be exploited
- privilege level which limits what access people have to your resources
Down
- any attempt to prevent people from being able to see information
- keeping information worlds from colliding
- keeping processes separated prevents the failure of one process from negatively impacting another
- resources - hardware, system objects, or processes - must be separated and used as intended
- able to be inserted or removed from a project
- summarizing or explaining in a way that can be easily understood
10 Clues: less complicated, less problems • keeping information worlds from colliding • able to be inserted or removed from a project • multiple layers of defense protect information • any attempt to prevent people from being able to see information • summarizing or explaining in a way that can be easily understood • ...
Cybersecurity crossword puzzle 2023-12-14
Across
- A system that verifies a user's identity through a unique physical characteristic.
- A sequence of characters used to authenticate identity or access.
- An encrypted connection between a web browser and a server.
- An organization that identifies security flaws in software.
- A type of attack that floods a network to disrupt its operation.
Down
- Software used to protect against viruses and malware.
- A technique to deceive individuals into providing sensitive information.
- A program that replicates itself and spreads to other computers.
- A secret code that only authorized parties should be able to read.
- The practice of keeping software up to date to protect against vulnerabilities.
10 Clues: Software used to protect against viruses and malware. • An encrypted connection between a web browser and a server. • An organization that identifies security flaws in software. • A program that replicates itself and spreads to other computers. • A type of attack that floods a network to disrupt its operation. • ...
Cybersecurity Awareness Crossword 2024-02-08
Across
- A program that hurts your computer and tries to split itself among other computers\
- Synonym for password
- Something you need to improve password security
- Searching for private information through the trash
- An email pretending to be from a trusted person or organization for nefarious reasons
- First word in the acronym "VPN"
- The percent of Americans who use the same password
Down
- Super common password worldwide
- The act of looking over someone's shoulder to steal information
- A dishonest scheme
10 Clues: A dishonest scheme • Synonym for password • Super common password worldwide • First word in the acronym "VPN" • Something you need to improve password security • The percent of Americans who use the same password • Searching for private information through the trash • The act of looking over someone's shoulder to steal information • ...
Introduction to Cybersecurity 2025-06-19
Across
- Fraudulent attempt to steal sensitive data via deceptive emails.
- Incident where data is accessed/stolen without permission.
- Three core security goals: Confidentiality, Integrity, and _______.
- Moral principles governing digital behavior (e.g., privacy, transparency).
Down
- Security system that monitors/controls network traffic (blocks unauthorized access).
- Self-replicating malware that spreads between devices.
- Process of encoding data to prevent unauthorized reading.
- Malicious software designed to damage systems (e.g., viruses, trojans).
- Person who exploits system vulnerabilities.
- Software update to fix security flaws.
10 Clues: Software update to fix security flaws. • Person who exploits system vulnerabilities. • Self-replicating malware that spreads between devices. • Process of encoding data to prevent unauthorized reading. • Incident where data is accessed/stolen without permission. • Fraudulent attempt to steal sensitive data via deceptive emails. • ...
Cybersecurity Crossword Puzzle 2026-02-28
Across
- Someone who breaks into systems—some for harm, others for good (security testing).
- Harmful software designed to damage, steal, or gain access to systems.
- Fake messages that trick you into giving up passwords or personal info.
- A secret code used to log in and prove identity.
- Malware that spreads by attaching to files or programs when opened.
Down
- Verifying someone’s identity before allowing system access.
- Protecting personal information from misuse and unauthorized access.
- Scrambling data so only authorized users can read it.
- Using two methods (like a password + phone code) to securely confirm identity
- A security barrier that blocks unauthorized network access.
10 Clues: A secret code used to log in and prove identity. • Scrambling data so only authorized users can read it. • Verifying someone’s identity before allowing system access. • A security barrier that blocks unauthorized network access. • Malware that spreads by attaching to files or programs when opened. • ...
'Digital' Crossword 2019-07-07
Across
- Highly digitized and connected production facility that relies on smart manufacturing
- Interconnected Digital Technologies for better customer experience
- ASTM F2792
- Systematic computational analysis of data or statistics
- Network of Internet connected objects able to collect and exchange data
- Digital version of a physical asset and/or process
- Integration of digital information with live video or the user's environment in real time
- Network of remote servers hosted on the Internet to store, manage, and process data
- Small autonomous services that work together
Down
- Simulated Intelligence in machines
- Massive Volume of Data inundated daily
- Robotic Process Automation
- Processing Quantum Bits of Data
- Techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- Digital records of transaction
15 Clues: ASTM F2792 • Robotic Process Automation • Digital records of transaction • Processing Quantum Bits of Data • Simulated Intelligence in machines • Massive Volume of Data inundated daily • Small autonomous services that work together • Digital version of a physical asset and/or process • Systematic computational analysis of data or statistics • ...
Technological Progress 2024-03-09
Across
- Meeting present needs without compromising future resources
- Transmitting information over a distance by electronic means
- The use of living systems and organisms to develop products
- The use of machines to perform tasks without human intervention
- The process of introducing new ideas or methods
Down
- Protecting computers and networks from theft or damage
- Designing, constructing, and using robots
- A secure, shared digital ledger for recording transactions
- A set of rules to solve problems or perform computations
9 Clues: Designing, constructing, and using robots • The process of introducing new ideas or methods • Protecting computers and networks from theft or damage • A set of rules to solve problems or perform computations • A secure, shared digital ledger for recording transactions • Meeting present needs without compromising future resources • ...
STATION X 2023 2023-03-02
Across
- The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
- For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
- Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
- Ngee Ann Polytechnic has its own radio station: Radio _______.
- Students are able to pursue a minor via the ______ Learning Pathway Programme.
- Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
- The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- Common____Programme is now a new programme offered in the School of Film & Media Studies.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
- Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
- Ngee Ann Polytechnic is a Poly For Budding _________.
- The School of Design & Environment diplomas has a focus on _______.
- If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
- Located at the Atrium, there is a 24/7 unmanned ______.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.
20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________. • Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic has its own radio station: Radio _______. • The School of Design & Environment diplomas has a focus on _______. • Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______. • ...
STATION X 2023 2023-03-02
Across
- The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
- For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
- Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
- Ngee Ann Polytechnic has its own radio station: Radio _______.
- Students are able to pursue a minor via the ______ Learning Pathway Programme.
- Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
- The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- Common____Programme is now a new programme offered in the School of Film & Media Studies.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
- Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
- Ngee Ann Polytechnic is a Poly For Budding _________.
- The School of Design & Environment diplomas has a focus on _______.
- If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
- Located at the Atrium, there is a 24/7 unmanned ______.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.
20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________. • Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic has its own radio station: Radio _______. • The School of Design & Environment diplomas has a focus on _______. • Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______. • ...
