cybersecurity Crossword Puzzles
CyberCTFHub 2025-06-10
Across
- An error in a computer program
- Malware designed to hide its presence
- Software that secretly collects user information
- A type of malware that disguises itself as normal software
- A language used to interact with databases
- A one-way process to convert data to a fixed value
- Someone who gains unauthorised access to systems
- A way to take advantage of a software flaw
- Software designed to harm or exploit a device
- The process of converting data into a secret code
Down
- A system that blocks unwanted network traffic
- A network of infected computers controlled remotely
- A secret word used to gain access to something
- Hiding data inside images or other files
- A fix released for software vulnerabilities
- Malware that locks files and demands payment
- A fake email or message that tries to trick you into giving personal information
- Software that records everything you type
- A tool that hides your IP and encrypts your connection
- A cybersecurity competition to test hacking skills
20 Clues: An error in a computer program • Malware designed to hide its presence • Hiding data inside images or other files • Software that records everything you type • A language used to interact with databases • A way to take advantage of a software flaw • A fix released for software vulnerabilities • Malware that locks files and demands payment • ...
Science and Technology 2024-12-16
Across
- Computing - Storing and accessing data over the Internet
- Footprint - Measure of greenhouse gas emissions
- - Efforts to protect natural resources
- - Living without depleting resources
- - When a species no longer exists
- - Technology that designs and operates robots
- Mining - Extracting patterns from large datasets
- - At risk of extinction
- Computing - Using quantum mechanics for calculations
- - Protecting systems from online threats
- - Inclusion of different people or ideas.
- - Worldwide integration and interaction of economies.
Down
- - The increase in city development and growth.
- - A glass structure for growing plants
- - Engineering at an atomic scale
- - A decentralized digital ledger
- - Government by the people.
- - A set of steps for solving a problem
- - Community of interacting organisms and their environment
- - The natural home of an organism
- - Global computer network
- - The removal of trees on a large scale
- Media - Online platforms for connecting people
- Intelligence - Simulated human intelligence in machines
- - The process of ice turning into water
25 Clues: - At risk of extinction • - Global computer network • - Government by the people. • - Engineering at an atomic scale • - A decentralized digital ledger • - The natural home of an organism • - When a species no longer exists • - Living without depleting resources • - A glass structure for growing plants • - A set of steps for solving a problem • ...
Cyber Security Crossword 1 2025-09-22
Across
- Part of the Internet hidden behind passwords
- Area of computer science concerned with keeping data safe
- A dishonest scheme designed to cheat someone out of money, property, or other valuable things
- Gaining access to data without permission
Down
- Type of fraud where someone pretends to be someone else.
- Part of the Internet where illegal activity occurs
- Part of the Internet accessible via search engines
- Tricking someone into giving up personal information, often via email.
8 Clues: Gaining access to data without permission • Part of the Internet hidden behind passwords • Part of the Internet where illegal activity occurs • Part of the Internet accessible via search engines • Type of fraud where someone pretends to be someone else. • Area of computer science concerned with keeping data safe • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
Computer Science 2024-03-21
Across
- Analyse de données
- Contrôle de version
- Apprentissage profond
- Interface utilisateur (IU)
- Algorithmes
- Système d'exploitation (SE)
- Développement web
- Cryptage
- Décryptage
- Réalité augmentée (RA)
- Matériel informatique
- Vision par ordinateur
- Expérience utilisateur (UX)
- Algorithme
- Réalité virtuelle (RV)
- Langage de programmation
- Robotique
- Base de données
- Apprentissage automatique
- Intelligence artificielle (IA)
- Structure de données
- Internet des objets (IdO)
- Architecture logicielle
Down
- Informatique quantique
- Technologie de l'information (TI)
- Développement de logiciels
- Compilateur
- Cybersécurité
- Informatique en nuage
- Arrière plan
- Frontal
- development Développement d'applications mobiles
- Génie logiciel
- Graphisme informatique
- Exploration de données
- Réseaux neuronaux artificiels
- networks Réseaux neuronaux
- Débogage
- Programmation
- Réseau
40 Clues: Réseau • Frontal • Cryptage • Débogage • Robotique • Décryptage • Algorithme • Compilateur • Algorithmes • Cybersécurité • Arrière plan • Programmation • Génie logiciel • Base de données • Développement web • Analyse de données • Contrôle de version • Structure de données • Apprentissage profond • Informatique en nuage • Matériel informatique • Vision par ordinateur • Informatique quantique • Graphisme informatique • ...
All About John Paul 2024-02-09
Across
- The science of God
- What you study in astronomy
- The name of a pope
- The national language of Belize
- The skill of persuading people
- Your first step in becoming a JP student
- Place where you bathe on the OLA
- What’s big and blue at JPII
- A game where queens are stronger than kings
- The part of you that is physical
- What you sit around during the OLA
- A book you use to teach people the Catholic faith
- What God called Himself when Moses asked
Down
- The love of wisdom
- ____ Leadership Adventure
- You go on a mission trip to ____ others
- The part of you that is invisible
- The concentration where you learn finance
- The language that Spanish is based on
- Where Jesus is on campus
- The concentration with math and science
- The kind of education that makes you free
- The name of the campus dog
- How you study cybersecurity at JPII
- The current president of the student body
25 Clues: The love of wisdom • The science of God • The name of a pope • Where Jesus is on campus • ____ Leadership Adventure • The name of the campus dog • What you study in astronomy • What’s big and blue at JPII • The skill of persuading people • The national language of Belize • Place where you bathe on the OLA • The part of you that is physical • The part of you that is invisible • ...
TEMA 2 2025-10-24
Across
- Jaringan pengiriman barang dari gudang ke konsumen.
- Antarmuka yang menghubungkan sistem perangkat lunak (singkatan tiga huruf).
- Program otomatis yang mengeksekusi kontrak saat kondisi terpenuhi.
- Model jualan tanpa menyetok barang sendiri (perantara supplier ke pembeli).
- Nilai atau bintang yang diberikan pembeli ke penjual.
- Analisis data besar untuk insight bisnis.
- Upaya melindungi sistem dan transaksi digital dari serangan.
- Faktur elektronik yang dipakai untuk transaksi bisnis.
- Layanan penyimpanan dan komputasi via internet.
Down
- Bentuk kegiatan ekonomi lewat toko dan layanan di internet.
- Sistem pembayaran tanpa uang fisik.
- Proses awal memasukkan penjual/pegawai ke platform digital.
- Penilaian dari pengguna yang membantu reputasi penjual.
- Tahap pengiriman terakhir menuju alamat pembeli.
- Layanan yang memproses pembayaran online antara pembeli dan penjual.
- Strategi penjualan yang menggabungkan online dan offline.
- Istilah lain untuk toko yang beroperasi di internet.
- Bentuk ekonomi dengan pekerjaan fleksibel/pekerja lepas digital.
- Platform yang mempertemukan penjual dan pembeli (kata umum).
- Identitas digital pengguna untuk transaksi dan verifikasi.
20 Clues: Sistem pembayaran tanpa uang fisik. • Analisis data besar untuk insight bisnis. • Layanan penyimpanan dan komputasi via internet. • Tahap pengiriman terakhir menuju alamat pembeli. • Jaringan pengiriman barang dari gudang ke konsumen. • Istilah lain untuk toko yang beroperasi di internet. • Nilai atau bintang yang diberikan pembeli ke penjual. • ...
BMSS BBL Puzzle 06.17.25 2025-06-17
Across
- Information that must be accurate and structured to enable AI and audits
- Official document filed to report withheld taxes
- Type of platform often used for secure, accessible data storage
- A collection of investments held by an individual or fund
- Protecting information from unauthorized access
- Measures that manage how data is handled and protected
- Permission or ability to retrieve and use data
- BMSS company providing IT and cybersecurity services
- Alabama city where BMSS opened a new office
- A consistent, standardized format for storing information
- BMSS wealth management company
- BMSS company specializing in payroll and HR solutions
Down
- Correctness and reliability of information
- Examination of records to ensure correctness and compliance
- Policies and processes ensuring proper management of information
- Measures used to evaluate how data and systems perform
- Pay for hours worked beyond the standard workweek
- Principles that guide personal and investment decisions
- Expenses associated with managing an investment
- An incomplete or inaccurate data structure can increase this
20 Clues: BMSS wealth management company • Correctness and reliability of information • Alabama city where BMSS opened a new office • Permission or ability to retrieve and use data • Expenses associated with managing an investment • Official document filed to report withheld taxes • Protecting information from unauthorized access • ...
TJ's Crossword 2024-05-29
Across
- What color is my new RIT sweatshirt?
- How many brothers do I have?
- What is my youngest brother's name?
- Who is my favorite person in the world?
- What's my favorite color?
- What is my oldest cousin's name?
- Who do I want to make out aggressively with?
- What is the name of the golf course I work at?
- What kind of car do I have?
- what day of the month is my birthday?
- What is the name of my highschool?
- The name of the resteraunt we ate at was Finch ____.
- What town is my real house in?
- What was I on when I bit a hole through my tongue?
Down
- What is my mom's name?
- What is going to be my major in college?
- What is my oldest brother's name?
- What is the name of the lake I live at during the summer?
- What is my middle name?
- What color are my eyes?
- What do I eat every Friday night?
- Who is the most attractive person in the world?
- What is my dad's name?
- What street is my real house on?
24 Clues: What is my mom's name? • What is my dad's name? • What is my middle name? • What color are my eyes? • What's my favorite color? • What kind of car do I have? • How many brothers do I have? • What town is my real house in? • What is my oldest cousin's name? • What street is my real house on? • What is my oldest brother's name? • What do I eat every Friday night? • ...
AHMAD WILDAN ARFIANTO/01/XF 2025-04-15
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
Zahra puspita_Xf_35 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
FIKO ARDIA PRATAMA , XF/13 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
M.affan.r.r/24 2025-04-29
Across
- Proses menyebarkan informasi secara digital
- Profesi yang mengelola dan merancang sistem jaringan
- Hak atas ciptaan disebut hak
- Platform untuk melaporkan konten berbahaya
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Orang yang menulis dan mengembangkan kode program
- Spesialis yang menjaga keamanan sistem informasi
- Kata kunci untuk mencari frasa secara tepat di Google
- Istilah untuk mengecualikan kata dalam pencarian Google
- Platform pencarian yang sangat populer di dunia
- Orang yang menguji kualitas perangkat lunak
- Konten yang menyesatkan dan tidak benar
- Informasi yang memprovokasi dan merugikan disebut
Down
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Proses memeriksa kebenaran informasi
- Format umum untuk gambar digital
- Budaya yang muncul dan berkembang di internet
- Profesi yang mengubah data menjadi informasi berharga
- Hak eksklusif atas merek disebut hak
- Platform berbagi video terpopuler saat ini
- Singkatan dari Hak Atas Kekayaan Intelektual
- Pelanggaran terhadap HAKI disebut
- Perlindungan hukum terhadap ide atau ciptaan
- Pihak yang berwenang mengawasi konten digital
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Proses menyebarkan informasi secara digital • ...
M.Alif Nurdiansyah/26/XF 2025-04-29
Across
- Platform pencarian yang sangat populer di dunia
- Platform berbagi video terpopuler saat ini
- Proses menyebarkan informasi secara digital
- Istilah untuk mengecualikan kata dalam pencarian Google
- Digunakan untuk mencari kata dalam situs tertentu
- Singkatan dari Hak Atas Kekayaan Intelektual
- Orang yang menulis dan mengembangkan kode program
- Pelanggaran terhadap HAKI disebut
- Hak eksklusif atas merek disebut hak
- Proses memeriksa kebenaran informasi
- Konten yang menyesatkan dan tidak benar
- Orang yang menguji kualitas perangkat lunak
- Perlindungan hukum terhadap ide atau ciptaan
Down
- Pihak yang berwenang mengawasi konten digital
- Budaya yang muncul dan berkembang di internet
- Spesialis yang menjaga keamanan sistem informasi
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Konten yang dibagikan secara luas disebut konten
- Profesi yang mengelola dan merancang sistem jaringan
- Format umum untuk gambar digital
- Hak atas ciptaan disebut hak
- Kata kunci untuk mencari frasa secara tepat di Google
- Profesi yang mengubah data menjadi informasi berharga
- Platform untuk melaporkan konten berbahaya
- Informasi yang memprovokasi dan merugikan disebut
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Hak eksklusif atas merek disebut hak • Proses memeriksa kebenaran informasi • Konten yang menyesatkan dan tidak benar • Platform berbagi video terpopuler saat ini • Platform untuk melaporkan konten berbahaya • Proses menyebarkan informasi secara digital • ...
M.Reza Aditya.S/25/X-F 2025-04-29
Across
- Proses menyebarkan informasi secara digital
- Profesi yang mengelola dan merancang sistem jaringan
- Hak atas ciptaan disebut hak
- Platform untuk melaporkan konten berbahaya
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Orang yang menulis dan mengembangkan kode program
- Spesialis yang menjaga keamanan sistem informasi
- Kata kunci untuk mencari frasa secara tepat di Google
- Istilah untuk mengecualikan kata dalam pencarian Google
- Platform pencarian yang sangat populer di dunia
- Orang yang menguji kualitas perangkat lunak
- Konten yang menyesatkan dan tidak benar
- Informasi yang memprovokasi dan merugikan disebut
Down
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Proses memeriksa kebenaran informasi
- Format umum untuk gambar digitalnya
- Budaya yang muncul dan berkembang di internet
- Profesi yang mengubah data menjadi informasi berharga
- Hak eksklusif atas merek disebut hak
- Platform berbagi video terpopuler saat ini
- Singkatan dari Hak Atas Kekayaan Intelektual
- Pelanggaran terhadap HAKI disebut
- Perlindungan hukum terhadap ide atau ciptaan
- Pihak yang berwenang mengawasi konten digital
25 Clues: Hak atas ciptaan disebut hak • Pelanggaran terhadap HAKI disebut • Format umum untuk gambar digitalnya • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Proses menyebarkan informasi secara digital • ...
gruppo 3 2025-04-04
Across
- Scrittura di codice per creare software.
- Archivio strutturato di dati.
- Parola che unisce frasi o parole.
- Sequenza di istruzioni per risolvere un problema.
- Parola che indica un'azione o uno stato.
- Protezione di dati e sistemi informatici.
- Componenti fisici di un computer.
- Uso di server online per archiviare ed elaborare dati.
- Connessione tra computer per scambio di dati.
- Chi compie l'azione o di cui si parla nella frase.
- Parte della frase che aggiunge informazioni al verbo o al nome.
- Software che gestisce il computer (es. Windows, Linux).
Down
- Simulazione dell’intelligenza umana nei computer.
- Parola che collega un sostantivo ad altri elementi della frase.
- Parola che indica una persona, un oggetto o un concetto.
- Parola che sostituisce un sostantivo.
- Parola che precede il sostantivo, determinandone il genere e il numero.
- Parola che descrive un sostantivo.
- Programmi che fanno funzionare un computer.
- Parola che modifica un verbo, un aggettivo o un altro avverbio.
20 Clues: Archivio strutturato di dati. • Parola che unisce frasi o parole. • Componenti fisici di un computer. • Parola che descrive un sostantivo. • Parola che sostituisce un sostantivo. • Scrittura di codice per creare software. • Parola che indica un'azione o uno stato. • Protezione di dati e sistemi informatici. • Programmi che fanno funzionare un computer. • ...
Tugas Daring Informatika Gadis Edycia X-I/12 2025-04-16
Across
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Profesi bidang keamanan data dan jaringan
- Operator untuk mengecualikan istilah dari pencarian (simbol)
- Singkatan dari Hak atas Kekayaan Intelektual
- Perlindungan atas penemuan teknologi
- Lembaga negara pengawas konten digital
- Jenis HAKI yang melindungi nama dagang
- Alat untuk menyaring konten tidak pantas
- Konten berisi kebencian atau diskriminasi
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Proses membuat media seperti video atau gambar digital
- Jenis tarian daerah yang bisa dijadikan konten
Down
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Operator untuk alternatif kata
- Istilah untuk penyebaran konten ke publik
- Tindakan menyalin karya tanpa izin
- Proses mengecek kebenaran sebuah informasi
- Istilah singkat untuk pengembang situs web
- Berita palsu yang menyesatkan publik
- Syntax untuk mencari dokumen tertentu seperti PDF
- Platform media sosial populer untuk video pendek
- Simbol untuk mencari frasa tepat
- Orang yang menulis dan mengembangkan kode
- Profesi yang fokus ke tampilan dan pengalaman pengguna
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Perlindungan atas penemuan teknologi • Berita palsu yang menyesatkan publik • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Istilah untuk penyebaran konten ke publik • ...
Facets of Public Safety 2024-08-09
Across
- political process that focuses on the design of the land.
- practice of safeguarding buyers of goods and services.
- not guilty of a crime or offense.
- specialized state agencies.
- way in which safety in a workplace is managed.
- All government-owned, operated, and maintained infrastructure.
- organizations that ensure public safety, security, and health
- improving the health of people
Down
- culpable of or responsible for a specified wrongdoing.
- criminal law system
- is the managerial function charged with creating the framework.
- protect life and property through transporting.
- handling, preparation, and storage of food in ways that prevent foodborne illness.
- prevention of and protection from events
- field of health care concerned about well-beings.
- being protected against the criminal or unauthorized use of electronic data.
- federal law enforcement agency.
- the action of interrogating or the process of being interrogated.
- the aggregate of people living together in a more or less ordered community.
- organizations that deal with accidents and urgent problems.
- the policy or action of using vigorous campaigning to bring about political or social change.
21 Clues: criminal law system • specialized state agencies. • improving the health of people • federal law enforcement agency. • not guilty of a crime or offense. • prevention of and protection from events • way in which safety in a workplace is managed. • protect life and property through transporting. • field of health care concerned about well-beings. • ...
militer 2024-08-25
Across
- / A marksman who specializes in shooting targets from a distance.
- / A soldier who operates armored fighting vehicles.
- / A language expert in the military.
- / A religious leader who provides spiritual support.
- / Foot soldiers who engage in combat.
- / A soldier who gathers information about the enemy.
- / A person who serves in the army.
- / A person who repairs vehicles and machinery.
- / A person who plots the course for a vehicle or aircraft.
- / A specialist in protecting military computer systems.
Down
- / A pilot who flies military aircraft.
- / A soldier who operates large-caliber guns.
- / A person who works on a ship in the navy.
- / A soldier trained to parachute into operations.
- / A specialist in construction and repair in the military.
- / A military personnel trained to provide first aid.
- / A person who manages military supplies and transportation.
- / Military personnel who gather and analyze information.
- / A person who operates aircraft in the military.
- / A member of the U.S. Marine Corps.
20 Clues: / A person who serves in the army. • / A language expert in the military. • / A member of the U.S. Marine Corps. • / Foot soldiers who engage in combat. • / A pilot who flies military aircraft. • / A person who works on a ship in the navy. • / A soldier who operates large-caliber guns. • / A person who repairs vehicles and machinery. • ...
Information Technology 2025-11-12
Across
- hardware that shows or sends information OUT of the computer
- physical parts of a computer-you can touch
- finding and fixing tech problems
- career in IT that protects from hackers and threats
- information stored on a computer
- name you use to sign into a computer or website
- hardware that puts information into the computer
- trick to steal personal information
- using technology responsibly, safely, and respectfully
- programs or apps that tell the computer what to do
Down
- protecting information from attacks
- main software that runs a computer and manages everything else
- group of computers that are connected to share information
- secret word or phrase used to protect your information
- your username and password that allow you to access a computer or website
- harmful program
- wireless way to connect to the internet
- worldwide network that connects millions of computers to share informtion
- programs or apps that tell the computer what to do
- using computers and technology to store, send, and protect information
- saving files on the internet instead of on one device
21 Clues: harmful program • finding and fixing tech problems • information stored on a computer • protecting information from attacks • trick to steal personal information • wireless way to connect to the internet • physical parts of a computer-you can touch • name you use to sign into a computer or website • hardware that puts information into the computer • ...
Tech Talk 2024-03-23
Across
- Computer systems that can mimick human's brain
- An organized set of data that is stored in a computer and can be looked at and used in various ways
- Machines that can perform certain tasks automatically
- A machine with appearance and behaviors resembling a human
- Malicious code that is hidden in a computer software
- Graphics processing unit
- Physical parts of a computer
- A field related to protecting computers from online attacks
- Can be plug in many devices
Down
- A place you can visit without leaving your chair
- Math behind problem-solving
- Protects your computer from attacks
- Getting a file from the internet
- An AI-made video, image or recording that represents fake events, fake appearance or fake voices of a person
- Global network of computers
- The brain of a computer
16 Clues: The brain of a computer • Graphics processing unit • Math behind problem-solving • Global network of computers • Can be plug in many devices • Physical parts of a computer • Getting a file from the internet • Protects your computer from attacks • Computer systems that can mimick human's brain • A place you can visit without leaving your chair • ...
Second 2025-08-13
Across
- Force Attempting every possible password combination
- Person or group harassing others online
- Software designed to secretly monitor your activity
- Malicious code hidden inside another program
- Engineering Technique to trick people into revealing confidential information
- Security technique that converts data into unreadable form
- Hygiene Set of online habits to maintain security and privacy
Down
- Copy of important files kept separately for safety
- Horse Malicious program disguised as legitimate software
- Program that records every keystroke you type
- Fraud tactic to make a site look like another
- Official Indian body responding to cybersecurity incidents
- Injection Data theft by manipulating a website’s database queries
- Act 2000 Law in India dealing with cyber crimes
- Cyber attack exploiting a vulnerability before it’s fixed
- Device or software used to secure online privacy by masking IP
16 Clues: Person or group harassing others online • Malicious code hidden inside another program • Program that records every keystroke you type • Fraud tactic to make a site look like another • Act 2000 Law in India dealing with cyber crimes • Copy of important files kept separately for safety • Software designed to secretly monitor your activity • ...
Cyber Ethics 2025-06-15
Across
- using another's work without proper credit.
- illegal intrusion into a computer system
- the act of bullying or harassing individuals online.
- fake news or misleading information online
- unauthorized copying or distribution of digital content.
- the process of verifying someone's identity online.
- manipulating digital media to spread false information.
Down
- software designed to detect, prevent and remove malicious programs from a computer system.
- fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- the practice of protecting networks and systems from cyber threats.
- unwanted or unsolicited digital messages.
- encryption method ensuring data security during transmission.
- the set of polite and respectful behavior expected in online communication.
- software designed to harm or exploit computer systems.
- the right to control access personal information online.
- someone who hacks into one's computer system illegally.
- computer virus that disguises itself as a harmless program.
17 Clues: illegal intrusion into a computer system • unwanted or unsolicited digital messages. • fake news or misleading information online • using another's work without proper credit. • the process of verifying someone's identity online. • the act of bullying or harassing individuals online. • software designed to harm or exploit computer systems. • ...
Cybercrime Crossword 2025-10-22
Across
- a popular cryptocurrency of a dog that has become a meme
- A section of the internet that is used for illegal intent
- A digital aid that protects
- An email scam trying to steal login credentials, starts with "PH"
- completely digital currency
- a network security system that monitors tragic, often referred to as a wall
- the first and most well known crypto currency
- general term for malicious software
Down
- deliberate deception to make personal gain
- when sensitive information is accessed or disclosed without authorization when someone gets through your data.
- an unauthorized person who gains access to a system
- scrambling data to protect from unauthorized access
- software or code that takes advantage
- a deceptive scheme used to trick someone out of money
- malware that encrypts and demands money
- software that secretly monitors a user's data.
- the target of a cyber attack.
17 Clues: A digital aid that protects • completely digital currency • the target of a cyber attack. • general term for malicious software • software or code that takes advantage • malware that encrypts and demands money • deliberate deception to make personal gain • the first and most well known crypto currency • software that secretly monitors a user's data. • ...
MP 2 Exam Review 2023-12-07
Across
- provides power to the main internal parts of a computer
- connects all the inside components of a computer
- Controls who or what can enter a space
- temporary form of memory which holds data whilst the computer is switched on
Down
- stores data when somebody saves their work
- security measures that protect people and property from harm
- a machine that works with information
- Protecting computer systems from digital and physical attack
- small files used by web servers to save browsing information
9 Clues: a machine that works with information • Controls who or what can enter a space • stores data when somebody saves their work • connects all the inside components of a computer • provides power to the main internal parts of a computer • security measures that protect people and property from harm • Protecting computer systems from digital and physical attack • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Careers in Cybersecurity 2025-01-30
Across
- Advises organizations on best practices for securing their systems and data.
- Develops and oversees the implementation of complex security structures.
- Handles and mitigates the impact of security breaches and cyber incidents.
- Monitors and protects an organization's network from cyber threats and vulnerabilities.
Down
- Simulates cyberattacks to identify and fix security weaknesses.
- Investigates cybercrimes and analyzes digital evidence.
- Ensures that an organization adheres to cybersecurity laws and regulations.
- Designs and implements secure network solutions to defend against hackers and cyberattacks.
- Develops algorithms and encryption techniques to secure sensitive information.
9 Clues: Investigates cybercrimes and analyzes digital evidence. • Simulates cyberattacks to identify and fix security weaknesses. • Develops and oversees the implementation of complex security structures. • Handles and mitigates the impact of security breaches and cyber incidents. • Ensures that an organization adheres to cybersecurity laws and regulations. • ...
Cybersecurity: Attacks & Prevention 2025-03-18
Across
- - A type of attack where the attacker sends fraudulent messages to trick the recipient into revealing sensitive information.
- - A type of malicious software designed to block access to a computer system until a sum of money is paid.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - The act of attempting to gain unauthorized access to a computer system.
Down
- - A secret word or phrase that must be used to gain admission to something.
- - A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- - The process of converting information or data into a code to prevent unauthorized access.
- - A type of malware that replicates itself in order to spread to other computers.
- - A software application that runs automated tasks over the internet.
9 Clues: - A software application that runs automated tasks over the internet. • - The act of attempting to gain unauthorized access to a computer system. • - A secret word or phrase that must be used to gain admission to something. • - A type of malware that replicates itself in order to spread to other computers. • ...
Cybersecurity For Seniors 2025-10-06
Across
- When making an account set good ____
- Be _____ when sharing credit card information over the phone
- Means keeping information unchanged and trustworthy
- _____ calls/texts/links from strangers
Down
- _____ software when available
- Do not ____ passwords with anyone
- Do not _____ the same password
- Turn off _____ on all applications
- ______ applications you don't use anymore
9 Clues: _____ software when available • Do not _____ the same password • Do not ____ passwords with anyone • Turn off _____ on all applications • When making an account set good ____ • _____ calls/texts/links from strangers • ______ applications you don't use anymore • Means keeping information unchanged and trustworthy • ...
Programs of Study 2023-08-08
5 Clues: Digital protection under STEM. • A Program of study under Regional. • How many programs of study in CTE? • Nursing is under which Program of Study? • What Program of study is Culinay Arts under?
TTS INFORMATIKA 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
Startaplar uchun raqamli talim platformasi data analis qansepsiyasi 2025-10-08
Across
- Learning — Onlayn ta’limda darslarni avtomatik tahlil qilishda ishlatiladigan sun’iy intellekt sohasi nima?
- — Ma’lumotlar bazasini boshqarish uchun ishlatiladigan tizim nomi nima?
- (User Interface) — Ta’lim platformasining foydalanuvchi interfeysi qisqacha qanday ataladi?
- — Foydalanuvchilarning o‘quv jarayonini yaxshilash uchun o‘rganilgan ma’lumotlardan foydalanish nima deyiladi?
- Data — Katta hajmdagi ma’lumotlarni saqlash texnologiyasi qanday ataladi?
- Analysis — Ma’lumotlarni to‘plash, tahlil qilish va ulardan xulosa chiqarish jarayoni nima deyiladi?
- Analytics — O‘quvchilarning xatti-harakatlarini oldindan taxmin qilish texnologiyasi nima?
- Content — O‘quv platformasida darslar, videolar va testlar jamlanmasi qanday ataladi?
Down
- — Startapda foydalanuvchilarning ma’lumotlarini himoyalovchi tizim nima?
- — O‘quvchilarning onlayn darsdagi faolligini o‘lchash jarayoni nima deyiladi?
- — Tahlil natijalarini jadval, grafik yoki diagramma shaklida chiqaruvchi vosita nima?
- — Ma’lumotlarni ko‘rgazmali tarzda ifodalash jarayoni nima deyiladi?
- Cleaning — Data analysisda “tozalash” jarayoni nimani anglatadi?
- Making — Ma’lumotlar asosida qaror qabul qilish jarayoni nima deyiladi?
- — Data analyst ishlashda eng ko‘p foydalanadigan dasturlash tili nomi nima?
15 Clues: Cleaning — Data analysisda “tozalash” jarayoni nimani anglatadi? • — Ma’lumotlarni ko‘rgazmali tarzda ifodalash jarayoni nima deyiladi? • — Ma’lumotlar bazasini boshqarish uchun ishlatiladigan tizim nomi nima? • Making — Ma’lumotlar asosida qaror qabul qilish jarayoni nima deyiladi? • — Startapda foydalanuvchilarning ma’lumotlarini himoyalovchi tizim nima? • ...
Net work componets 2022-10-27
Across
- What is an ISDN adapter?
- In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals, such as analog or digital.
- A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
- Description A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- A firewall is defined as a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- A bridge is a network device that connects multiple LANs
- Services Digital Network (ISDN) provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications.
- A network switch connects devices (such as computers, printers, wireless access points) in a network to each other, and allows them to 'talk' by exchanging data packets
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
9 Clues: What is an ISDN adapter? • A bridge is a network device that connects multiple LANs • A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together. • In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals, such as analog or digital. • ...
CROSSWORD 2025-10-30
6 Clues: The money a company earns from sales • The physical components of a computer • Type of business done over the internet • Online retail giant founded by Jeff Bezos • Protecting computers, networks, and data from digital attacks • A young company with a new business idea, often seeking investors
chin kai er-8Gamma 2023-01-19
Across
- information you have in your account
- raw fact and figures
- is the practice systems network and program from digital-attacks
Down
- usually aimed at accessing ,changing , or destroying sensitive information
- are created when that data has been processed and become meaningful.
- the social media company owned by mark Zuckerberg
6 Clues: raw fact and figures • information you have in your account • the social media company owned by mark Zuckerberg • is the practice systems network and program from digital-attacks • are created when that data has been processed and become meaningful. • usually aimed at accessing ,changing , or destroying sensitive information
Cybersecurity Awareness 2021-09-24
Cybersecurity Awareness 2021-09-24
Cybersecurity Awareness 2024-08-09
Cybersecurity Threats 2024-03-21
Across
- Games Some games might encourage to make in-app purchases
- in the Middle Attacker intercepts or manipulates the communication between two parties without their knowledge or consent.
- Websites avoid clicking on pop-up ads or links from unknown sources.
- Unauthorized individuals trying to gain access to computer systems
Down
- Disrupt the normal functioning of a targeted system
- Engineering Tricks the users into providing an entry point for malware.
6 Clues: Disrupt the normal functioning of a targeted system • Games Some games might encourage to make in-app purchases • Unauthorized individuals trying to gain access to computer systems • Websites avoid clicking on pop-up ads or links from unknown sources. • Engineering Tricks the users into providing an entry point for malware. • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
Cybersecurity Crossword 2023-06-08
Across
- a computer security term for an isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- a type of malicious software designed to disrupt a victim’s computer, server, or network.
- A chain of Internet-connected devices centrally controlled by a hacker
Down
- the process of disguising data so it’s impossible to decipher without authorization
- a type of email that you’ve technically solicited but may serve little to no purpose to you.
- tools that ask people to verify they are human and not robots
6 Clues: tools that ask people to verify they are human and not robots • A chain of Internet-connected devices centrally controlled by a hacker • the process of disguising data so it’s impossible to decipher without authorization • a type of malicious software designed to disrupt a victim’s computer, server, or network. • ...
Wedding Sip & Solve Crossword 2022-09-27
Across
- Favorite planet?
- What sport did Patrick play in high school?
- Where was Sasha born?
- What does Patrick actually do?
- What were S&P doing when Patrick proposed?
- First American town where Sasha lived after moving from Russia?
- What state did Patrick grow up in?
- What is the name of the black dog running around this party?
- How many states have S&P lived in together?
- What brand of the van did S&P Drive across the country?
- Favorite National Park?
- Sasha’s favorite organ in the human body?
- Elopement Location?
- Town in Oregon where S&P lived?
- Patrick’s Spirit Animal?
Down
- What did Sasha study in college?
- S&P’s favorite musician currently?
- Patrick’s major in college?
- First friend that Sasha made in the US? (hint: guest of the wedding party)
- Where did Sasha & Patrick meet?
- Sasha’s spirit animal?
- Who was adopted first?
- How many years have S&P been together?
- What is the name of the goldendoodle running around here?
- Patrick’s favorite tree?
- Sasha’s favorite tree?
- Favorite hobby to do together?
27 Clues: Favorite planet? • Elopement Location? • Where was Sasha born? • Sasha’s spirit animal? • Who was adopted first? • Sasha’s favorite tree? • Favorite National Park? • Patrick’s favorite tree? • Patrick’s Spirit Animal? • Patrick’s major in college? • What does Patrick actually do? • Favorite hobby to do together? • Where did Sasha & Patrick meet? • Town in Oregon where S&P lived? • ...
Cyber Security 2020-11-07
Across
- A code to send a secret message
- Short for “Sending Particularly Annoying Messages.”
- protecting digital devices against attacks
- smaller pieces of info sent through the internet
- Copying a file from one computer to another
- software that secretly collects info about you
- info about you cause of online activity
- A name you type so you can use a computer
Down
- an attacker uses a list of words as potential passwords
- A secret word that allows you access
- software made to damage your computer or network
- cyberattack from hacker w/ bad links
- when an attacker tries many
- a place where data stops along the way
- A person who secretly gets access to a computer Network A system of computers that are connected
- data that describe another piece of data
- cyberattack where hacker pretends to know you
- A system of symbols used to create a secret message
- passwords in hopes of guessing correctly
- A system of rules and correct steps to follow
20 Clues: when an attacker tries many • A code to send a secret message • A secret word that allows you access • cyberattack from hacker w/ bad links • a place where data stops along the way • info about you cause of online activity • data that describe another piece of data • passwords in hopes of guessing correctly • A name you type so you can use a computer • ...
Mileidy & Elliot 2023-05-19
Across
- Mileidy's birthday month
- What did Elliot study in college?
- The state Elliot grew up in
- The new family name
- The wedding dessert
- The state Elliot was born in
- Their first big adventure together
- Wedding dinner
- What is the Man of Honor's name?
- The gemstone in both Mileidy's and Elliot's rings
- Mileidy's favorite drink
- The wedding is hosted at the _____ Castle
- What town are we in, right now?
- Mileidy's favorite season
- Mileidy's favorite flower
Down
- The town they met in
- How many brothers does Mileidy have?
- Their favorite holiday
- Elliot's favorite drink
- College they met at
- The town they live in
- What is the Best Man's name?
- Elliot's favorite color
- The month they began dating
- Elliot's middle name
- Mileidy's childhood dog
- Month of the wedding
- Color of Elliot's suit
- How many tattoos does Elliot have?
- What month did they get engaged?
30 Clues: Wedding dinner • The new family name • The wedding dessert • College they met at • The town they met in • Elliot's middle name • Month of the wedding • The town they live in • Their favorite holiday • Color of Elliot's suit • Elliot's favorite drink • Elliot's favorite color • Mileidy's childhood dog • Mileidy's birthday month • Mileidy's favorite drink • Mileidy's favorite season • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
cybercrime 2024-11-09
Across
- Testing Breaking into a system to test its defenses legally
- Attacks aimed at disrupting or disabling a network
- Financial theft through hacking or scams
- Protecting data and systems from cyber attacks
- Virus or worm code hidden within a seemingly harmless program
- Common scam emails that trick people into sharing private info
- Passwords, PINs, and fingerprints used for digital security
- Illegal access to systems without permission
- Fake sites mimicking real ones to steal information
Down
- Software designed to harm or exploit computers
- Law-breaking activities online
- Tracking software that monitors user activity without consent
- Protecting children from inappropriate online content
- Method of verifying identity online, often in two steps
- Theft Stealing another person’s identity to impersonate them online
- The backbone of online communications targeted by cybercriminals
- Program that spreads across computers, copying itself
- Fake messages asking for sensitive information
- Act of unauthorized copying or using someone's content
- Criminals who exploit security weaknesses online
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Software designed to harm or exploit computers • Protecting data and systems from cyber attacks • Fake messages asking for sensitive information • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
Fairuz Ijlal/11 Membuat TTS materi seperti tabel masing masing 5 soal 2025-04-15
Across
- Platform pencarian yang sangat populer di dunia
- Platform berbagi video terpopuler saat ini
- Proses menyebarkan informasi secara digital
- Istilah untuk mengecualikan kata dalam pencarian Google
- Digunakan untuk mencari kata dalam situs tertentu
- Singkatan dari Hak Atas Kekayaan Intelektual
- Orang yang menulis dan mengembangkan kode program
- Pelanggaran terhadap HAKI disebut
- Hak eksklusif atas merek disebut hak
- Proses memeriksa kebenaran informasi
- Konten yang menyesatkan dan tidak benar
- Orang yang menguji kualitas perangkat lunak
- Perlindungan hukum terhadap ide atau ciptaan
Down
- Pihak yang berwenang mengawasi konten digital
- Budaya yang muncul dan berkembang di internet
- Spesialis yang menjaga keamanan sistem informasi
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Konten yang dibagikan secara luas disebut konten
- Profesi yang mengelola dan merancang sistem jaringan
- Format umum untuk gambar digital
- Hak atas ciptaan disebut hak
- Kata kunci untuk mencari frasa secara tepat di Google
- Profesi yang mengubah data menjadi informasi berharga
- Platform untuk melaporkan konten berbahaya
- Informasi yang memprovokasi dan merugikan disebut
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Hak eksklusif atas merek disebut hak • Proses memeriksa kebenaran informasi • Konten yang menyesatkan dan tidak benar • Platform berbagi video terpopuler saat ini • Platform untuk melaporkan konten berbahaya • Proses menyebarkan informasi secara digital • ...
TTSINFORMATIKA-MARGARETH-TIARA-DEWI-XE 2025-04-15
Across
- Langkah awal sebelum membuat konten digital?
- nama lain hak merk
- Platform berbagi video terbesar?
- Pelindung hasil cipta seseorang agar tidak disalahgunakan?
- Proses menyebarluaskan informasi digital?
- Konten yang tidak sesuai norma disebut?
- Profesi yang menjaga keamanan data di jaringan?
- Search engine buatan Microsoft?
- Teknik mengoptimalkan situs agar muncul di hasil pencarian teratas?
- Pihak yang berwenang memblokir konten negatif
- Istilah untuk kata yang diketik saat mencari informasi?
- Hak atas karya cipta disebut juga ...?
Down
- mencari informasi di internet menggunakan mesin pencari disebut
- Orang yang membuat program komputer disebut?
- Jenis HAKI untuk perlindungan merek dagang?
- upaya memastikan informasi benar
- produksi dan Diseminasi Konten DigitaMedia berbentuk digital
- Pekerjaan yang fokus menganalisis data?
- profesi yang mengelola sistem jaringan komputer?
- Singkatan dari Hak Atas Kekayaan Intelektual?
- Pemeriksaan ulang konten disebut proses
- Nama search engine paling populer di dunia?
- Konten digital harus ... agar mudah dipahami pengguna.
- Validasi Konten Negatif Informasi palsu yang menyebar disebut?
- Pekerja yang merancang tampilan website?
25 Clues: nama lain hak merk • Search engine buatan Microsoft? • upaya memastikan informasi benar • Platform berbagi video terbesar? • Hak atas karya cipta disebut juga ...? • Pekerjaan yang fokus menganalisis data? • Pemeriksaan ulang konten disebut proses • Konten yang tidak sesuai norma disebut? • Pekerja yang merancang tampilan website? • Proses menyebarluaskan informasi digital? • ...
Tugas daring Irdina Batrisyia Bilqis Azizah 2025-04-17
Across
- Orang yang memeriksa kebenaran
- Informasi yang sudah diperiksa disebut informasi
- Proses mengecek keaslian suatu informasi
- Profesi yang menguji dan memperbaiki bug aplikasi
- Orang yang membuat dan merancang perangkat lunak
- Konten yang terbukti palsu disebut
- proses menjadwalkan konten untuk terbit otomatis
- Undang-undang yang melindungi karya digital
- Ahli yang menjaga keamanan jaringan
- Proses membandingkan fakta dan sumber informasi
- simbol yang sering digunakan untuk memulai pencarian
- kata atau frasa yang diketik untuk mencari informasi
- Orang yang merancang tampilan antarmuka aplikasi
Down
- kepanjangan dari HAKI
- platform untuk berbagi video milik google
- proses membuat konten digital seperti video,teks, atau gambar
- bentuk konten digital berupa suara
- Profesi yang menganalisis data dalam jumlah besar
- penyebaran konten digital ke publik
- Search engine yang berasal dari Rusia
- Search engine yang mengutamakan privasi pengguna
- Mesin pencari paling populer buatan Google
- atau konten
- cipta Hak hukum atas hasil karya disebut
- Pihak yang memiliki hak atas suatu karya
25 Clues: atau konten • kepanjangan dari HAKI • Orang yang memeriksa kebenaran • bentuk konten digital berupa suara • Konten yang terbukti palsu disebut • penyebaran konten digital ke publik • Ahli yang menjaga keamanan jaringan • Search engine yang berasal dari Rusia • Proses mengecek keaslian suatu informasi • cipta Hak hukum atas hasil karya disebut • ...
Informatica-italiano marcello e Piergiorgio 2025-03-28
Across
- Parola che unisce frasi o parole.
- Chi compie l'azione o di cui si parla nella frase.
- Parola che descrive un sostantivo.
- – Componenti fisici di un computer.
- – Sequenza di istruzioni per risolvere un problema.
- Parola che collega un sostantivo ad altri elementi della frase.
- computing – Uso di server online per archiviare ed elaborare dati.
- Parola che modifica un verbo, un aggettivo o un altro avverbio.
- Parola che indica una persona, un oggetto o un concetto.
- – Archivio strutturato di dati.
Down
- – Protezione di dati e sistemi informatici.
- operativo – Software che gestisce il computer (es. Windows, Linux).
- – Programmi che fanno funzionare un computer.
- informatica – Connessione tra computer per scambio di dati.
- Parola che sostituisce un sostantivo.
- Parola che precede il sostantivo, determinandone il genere e il numero.
- Parte della frase che aggiunge informazioni al verbo o al nome.
- Parola che indica un'azione o uno stato.
- – Scrittura di codice per creare software.
- artificiale – Simulazione dell’intelligenza umana nei computer.
20 Clues: – Archivio strutturato di dati. • Parola che unisce frasi o parole. • Parola che descrive un sostantivo. • – Componenti fisici di un computer. • Parola che sostituisce un sostantivo. • Parola che indica un'azione o uno stato. • – Scrittura di codice per creare software. • – Protezione di dati e sistemi informatici. • – Programmi che fanno funzionare un computer. • ...
Kozhyhar's Crossword 2025-06-07
Across
- Reaching mutual terms
- Scrambling data for safety
- Fixing software errors
- Barrier against hackers
- Larger touchscreen device
- Instructions for computers
- Virtual boundary for alerts
- Tech enhancing shopping
- Ease of use in design
- Monitoring for security
- Pocket-sized computer
- Hiring external providers
- Delay in data transmission
- Legal service agreement
- Observing systems or people
- Early version for testing
- Combined effort for greater results
- User interaction metric
- Blocks unauthorized access
- Health-tracking devices
Down
- Shaking up traditional industries
- Real-time media delivery
- Protecting digital systems
- Data transfer capacity
- Remote data storage
- Meeting regulations
- Authentication via body traits
- Operational availability
- Acceptance of new tech
- Consistent performance
- Driving force behind change
- On-demand audio shows
- Reducing human intervention
- Team collaboration framework
- Signals for location tracking
- Blending of tech and business
- Hosts data and services
- User interaction design
- Flexible project methodology
- Remote healthcare services
40 Clues: Remote data storage • Meeting regulations • Reaching mutual terms • On-demand audio shows • Ease of use in design • Pocket-sized computer • Data transfer capacity • Fixing software errors • Acceptance of new tech • Consistent performance • Barrier against hackers • Tech enhancing shopping • Monitoring for security • Hosts data and services • Legal service agreement • User interaction design • ...
CTF-CW7 2025-11-14
Across
- Logbook tracking all the data-handling jobs run by a company
- Strangers checking under the rug
- Tekion’s online bouncer from Akamai—blocking cyber troublemakers at the front door!
- Sewing up another digital rip
- Hacking your way up the office ladder
- Hide-and-seek champ, cybersecurity edition
- Hiding credit card details with asterisks in statements
- Swaggers in so every Tekion API gets its time to shine!
- Give it a spin before you buy—or face the judge!
- Security’s version of duct-taping a leak
- The recipe card for fixing cyber messes
Down
- Data from your system’s fitbit
- Mixing up data to make it hard to interpret
- The “no free hugs” approach to access
- New European law aiming to make AI safe, fair, and compliant
- Company’s treasure map
- At Tekion, even buying office supplies is a breeze with this zippy tool!
- Class time for grownups
- Turning secret code into plain gossip
- Letting the bots handle the boring stuff
20 Clues: Company’s treasure map • Class time for grownups • Sewing up another digital rip • Data from your system’s fitbit • Strangers checking under the rug • The “no free hugs” approach to access • Hacking your way up the office ladder • Turning secret code into plain gossip • The recipe card for fixing cyber messes • Letting the bots handle the boring stuff • ...
Cyber Physical Systems - 1 2025-03-20
Across
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- Processing data closer to the source rather than a central server.
- Study of control and communication in machines and living beings.
- A highly automated, connected, and intelligent manufacturing system.
- Internet-based computing providing storage and processing power.
- A network of connected devices that communicate over the internet.
- Using models to replicate real-world behaviors.
- Devices that detect and respond to physical changes.
- The ability of different systems to work together.
- Large volumes of data used for analytics and decision-making.
Down
- A decentralized and secure digital ledger technology.
- Combining different subsystems into a unified system.
- A virtual replica of a physical system for monitoring and analysis.
- A computing system integrated into a larger system.
- The capability of a system to function independently.
- Devices that convert electrical signals into mechanical motion.
- Related to manufacturing and production systems.
- The process of making systems operate without human intervention.
19 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Cyber Safety 2024-04-15
Across
- A secret combination of words or numbers that allows a user to access an online service
- an attempt to trick a person into giving away money or information by pretending to be a well-known company
- harm inflicted through text, emails, or online sites
- online etiquette - being nice and respectful to others online
- software that displays unwanted advertising on your computer
- someone who gains unauthorized access to people's computers
- software designed to damage a computer of phone
- searching through websites freely
- a dishonest scheme to get information or money
- self-replicating program that attacks a computer system
Down
- short form for “world wide web"
- leaving offensive messages on the internet
- computer equipment, machines, and parts
- an internet-related crime
- when someone tracks, lures, or harasses people online
- a security system used to block malicious threats to your computer
- any action that’s taken to protect computers and prevent online crime
- a shorter word for internet
- unwanted emails or junk mail
19 Clues: an internet-related crime • a shorter word for internet • unwanted emails or junk mail • short form for “world wide web" • searching through websites freely • computer equipment, machines, and parts • leaving offensive messages on the internet • a dishonest scheme to get information or money • software designed to damage a computer of phone • ...
GRC 2024-10-14
5 Clues: things you must follow (GRC) • data in the form of digits (Data Department) • something risky or harmful (Risk Department) • protects your online accounts (Cybersecurity) • keeping people safe (Health and Safety Department)
brainriddle 2025-02-09
Across
- A cyberattack where fake QR codes trick users into visiting malicious sites.
- A cyberattack that tricks users into clicking hidden elements.
- A tool that protects a network by blocking suspicious traffic.
- A method used to avoid security restrictions.
- When private data is exposed to unauthorized people.
- An attack where a hacker takes control of an active user session.
- A weakness in software that hackers can exploit.
Down
- A method of guessing passwords by trying many combinations.
- A small software update that fixes security flaws.
- A cybersecurity event that may cause harm to systems.
- A physical or digital device used for secure authentication.
- Files that store records of activity on a system.
- A username and password used for authentication.
- A type of malware that bombards users with unwanted ads.
- A security method that requires two types of authentication.
15 Clues: A method used to avoid security restrictions. • A username and password used for authentication. • A weakness in software that hackers can exploit. • Files that store records of activity on a system. • A small software update that fixes security flaws. • When private data is exposed to unauthorized people. • A cybersecurity event that may cause harm to systems. • ...
Claims Board Friday Fun 9/13 2024-09-13
Across
- Movie name referred by Google CEO during his meetings
- Attaches itself to clean files and spreads to other files
- 14 year old scientist created specialized soap to treat cancer
- Publishes latest tech news and Tech CEOs start their day going through this site
- Use phone calls to trick individuals to reveal personal details
- Urgency of a work item to be worked upon
- Cybersecurity form with major outage impacting Microsoft apps
Down
- Bug not directly related to the code
- Effective way of writing User stories
- Company which will bring 2 astronauts who are stuck in International Space Station
- Every action has an outcome and none other than you are responsible for it
- Deceives via emails
- Level of Impact
- Caused by Solar Storms
- Text messages to trick individuals to reveal personal information
15 Clues: Level of Impact • Deceives via emails • Caused by Solar Storms • Bug not directly related to the code • Effective way of writing User stories • Urgency of a work item to be worked upon • Movie name referred by Google CEO during his meetings • Attaches itself to clean files and spreads to other files • Cybersecurity form with major outage impacting Microsoft apps • ...
Responsible AI In Practice 2025-05-07
Across
- Use of technology to perform tasks without human intervention
- General Data Protection Regulation governing data privacy in the EU
- Assessment Evaluation of potential negative outcomes of AI applications
- Openness about how AI systems operate and make decisions
- Responsibility for the outcomes produced by AI systems
Down
- Ensuring individuals' personal information is protected in AI processes
- Minimisation Collecting only the data necessary for a specific purpose
- Systems that simulate human intelligence
- Human supervision of AI outputs to ensure accuracy and fairness
- Adherence to laws and regulations related to AI usage
- Systematic error introduced into AI models due to prejudiced data
- Process of removing personally identifiable information from data
- Moral principles guiding the responsible use of AI
- Protection of systems and data from digital attacks
- AI Act European Union legislation regulating artificial intelligence
15 Clues: Systems that simulate human intelligence • Moral principles guiding the responsible use of AI • Protection of systems and data from digital attacks • Adherence to laws and regulations related to AI usage • Responsibility for the outcomes produced by AI systems • Openness about how AI systems operate and make decisions • ...
Technology crossword 2025-06-26
Across
- Programs you use on your phone or tablet.
- (Virtual Reality) A headset that lets you enter a 3D digital world.
- Protection of computers and data from attacks.
- A machine that can think or learn like a human.
- Software you can download and use for free.
- Provide The company that gives you internet access.
- Device A phone, watch, or TV that can connect to the internet.
- Technology Devices like smartwatches or fitness bands you wear.
Down
- Engine A website like Google to find information.
- A small electronic tool or device.
- A place where you can connect to wireless internet.
- Media Platforms like Instagram, TikTok, or Twitter.
- A picture taken of your screen.
- A big computer that stores data and websites.
- Browser An app like Chrome or Safari to explore websites.
- Network A site where people connect and share, like Facebook.
16 Clues: A picture taken of your screen. • A small electronic tool or device. • Programs you use on your phone or tablet. • Software you can download and use for free. • A big computer that stores data and websites. • Protection of computers and data from attacks. • A machine that can think or learn like a human. • Engine A website like Google to find information. • ...
Safe Browsing 2025-05-27
Across
- unethical hacker
- software program or piece of hardware to screen out hackers, viruses, worms that try to reach computer over internet
- Vital Information Resources Under Seize.
- Information and Communication Technology
- threatening over internet
- application of technologies to protect programs, data, users from cyber attacks and the risk of using internet
- software for identifying, deleting and fixing malicious software.
- misleading people by sending email or link pretending its from a trusted organisation or person for stealing their personal details.
- a file stores information about visiting of websites in the browser.
- malicious software for damaging computer
Down
- person hacks information with permission
- act of breaking security code of digital devices.
- people gain by accessing data remotely in an unauthorized manner.
- protect original works of authorship including text, image, music etc
- Crime through internet
15 Clues: unethical hacker • Crime through internet • threatening over internet • person hacks information with permission • Vital Information Resources Under Seize. • Information and Communication Technology • malicious software for damaging computer • act of breaking security code of digital devices. • people gain by accessing data remotely in an unauthorized manner. • ...
Sicurezza informatica 2026-02-18
Across
- Autenticazione a due fattori per aumentare la sicurezza
- Malware che si autoreplica attraverso reti o file
- Software che individua e rimuove virus e malware
- Metodo di attacco che prova tutte le password possibili
- Copia dei dati per proteggerli da perdite o guasti
- Tutte le pratiche per proteggere dati, reti e sistemi
- Qualsiasi software progettato per danneggiare o spiare
Down
- Overflow Situazione in cui un programma scrive oltre la memoria prevista
- Chiave segreta usata per entrare in account o sistemi
- Malware che blocca i file e richiede un pagamento per sbloccarli
- Autenticazione che richiede più passaggi per verificare l’identità
- Protezione dei dati personali e delle informazioni sensibili
- Protezione di rete che blocca accessi non autorizzati
- Software pericoloso nascosto dentro programmi legittimi
- Truffa online che usa email o siti falsi per rubare dati
15 Clues: Software che individua e rimuove virus e malware • Malware che si autoreplica attraverso reti o file • Copia dei dati per proteggerli da perdite o guasti • Chiave segreta usata per entrare in account o sistemi • Protezione di rete che blocca accessi non autorizzati • Tutte le pratiche per proteggere dati, reti e sistemi • ...
Cybersecurity Terminology Puzzle (participation 3) 2023-01-27
Across
- software that is harmful
- software that checks for malware
- internet access at starbucks
- scrambling data in unreadable
- attacks seeking out personal info
- software that tracks you
- shield for data
- tech savy criminals stealing private information
- improving security tools for cloud infrastructure
- multiple attackers preventing legitimate users
Down
- tricking users to click an image
- altered image creating false reality
- malware that makes you pay
- malware pretending to be useful
- designs, builds, and tests security systems
- malware that displays adverts
- network pro learning hacking techniques
- online harassment that intimidates victims
18 Clues: shield for data • software that is harmful • software that tracks you • malware that makes you pay • internet access at starbucks • scrambling data in unreadable • malware that displays adverts • malware pretending to be useful • tricking users to click an image • software that checks for malware • attacks seeking out personal info • altered image creating false reality • ...
Cybersecurity 2023-03-26
Cybersecurity 2023-09-13
Across
- A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker.
Down
- Sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
- A 4 step method used for checking suspicious emails to make sure they are not a phishing email.
4 Clues: A 4 step method used for checking suspicious emails to make sure they are not a phishing email. • A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker. • ...
Cybersecurity 2025-08-19
Computing Practice Tutorial Worksheet #3 2024-09-16
5 Clues: A person who builds websites • The language computers understand • Someone who analyzes data for a living • A job that involves protecting information • An important attribute for catching mistakes
Cybersecurity 2024-10-07
Across
- A 4 step method used for checking suspicious emails before taking any action.
- Occurs when someone accidentally causes harm, such as by clicking on a malicious link.
Down
- Software intentionally designed to cause disruption to a computer, server, client, or network.
- Highly personalized and targets a specific individual, often using details like their name, position, or projects they're involved in to appear more legitimate.
4 Clues: A 4 step method used for checking suspicious emails before taking any action. • Occurs when someone accidentally causes harm, such as by clicking on a malicious link. • Software intentionally designed to cause disruption to a computer, server, client, or network. • ...
Cybersecurity Vocab 2022-03-10
Cybersecurity Concepts 2023-10-11
Across
- assets of the computer system should be accessible only by authorized parties
- A set of circumstances that has the potential to cause loss or harm
- A weakness in the system
Down
- assets can be modified only by authorized parties or in authorized ways
- authorized parties should not be prevented from accessing objects to which they have legitimate access
- An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats
6 Clues: A weakness in the system • A set of circumstances that has the potential to cause loss or harm • assets can be modified only by authorized parties or in authorized ways • assets of the computer system should be accessible only by authorized parties • authorized parties should not be prevented from accessing objects to which they have legitimate access • ...
Cybersecurity crosswords 2024-10-18
Across
- A person who uses technical skills to gain unauthorized access to systems.
- Protecting information from unauthorized access or harm.
- Facts and statistics collected for analysis or reference.
Down
- A group of connected computers that can share data and resources.
- To make something more current or improve it, often related to software.
- The ability to enter or use a system, network, or resource.
6 Clues: Protecting information from unauthorized access or harm. • Facts and statistics collected for analysis or reference. • The ability to enter or use a system, network, or resource. • A group of connected computers that can share data and resources. • To make something more current or improve it, often related to software. • ...
Online Safety 2020-10-16
Across
- used to protect your data on the internet.
- someone who gains unauthorized access to data
- slang for Facebook sabotage.
- a way to exchange messages over the internet.
- information stored on computers.
Down
- sending emails impersonating a company to get personal information and bank details.
- someone who uses the internet to bully people.
- something that keeps your account protected that only you know, they be in the form of bio metrics, letters and numbers.
8 Clues: slang for Facebook sabotage. • information stored on computers. • used to protect your data on the internet. • someone who gains unauthorized access to data • a way to exchange messages over the internet. • someone who uses the internet to bully people. • sending emails impersonating a company to get personal information and bank details. • ...
Get Familiar with IEEE's Technology Predictions for 2024 2024-02-10
Across
- Success Rank >10, Maturity Grade C/D (Middle word)
- Success Grade C+, Maturity Rank 18
- Maturity Grade C/D,Success Rank >20 (Last word)
- Success Grade B-, Market Adoption Rank 13 (Last word)
Down
- Commercial Adoption Horizon >3.36 years, Success Grade B (Last word)
- Commercial Adoption Horizon <2.98 years, Maturity Grade B- (Last word)
- Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10
- Market Adoption Grade B, Maturity Rank 1 (First word)
8 Clues: Success Grade C+, Maturity Rank 18 • Maturity Grade C/D,Success Rank >20 (Last word) • Success Rank >10, Maturity Grade C/D (Middle word) • Market Adoption Grade B, Maturity Rank 1 (First word) • Success Grade B-, Market Adoption Rank 13 (Last word) • Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10 • ...
Crossword2 2024-12-18
Across
- A computer that provides resources to other devices.
- The practice of protecting systems, networks, and programs from digital attacks.
- The language used to structure web pages.
- An error in a program that needs fixing.
- Address A unique string of numbers separated by periods that identifies each computer using the Internet Protocol.
Down
- Secures data by converting it into a coded format.
- Protects networks from unauthorized access.
- Stores data on the internet instead of your local device.
8 Clues: An error in a program that needs fixing. • The language used to structure web pages. • Protects networks from unauthorized access. • Secures data by converting it into a coded format. • A computer that provides resources to other devices. • Stores data on the internet instead of your local device. • ...
INDUSTRY 4.0 2025-08-19
Across
- Devices that detect and measure physical properties like temperature or pressure.
- Technology that enables machines to simulate human intelligence
- Network that connects everyday objects to the internet
- Online servers used for storage, computing, and services
- Large volumes of structured and unstructured information analyzed for insights
- Protection of data, systems, and networks against digital attacks.
Down
- A production site enhanced by connectivity, automation, and AI.
- Machines that can perform tasks automatically, often used in factories
8 Clues: Network that connects everyday objects to the internet • Online servers used for storage, computing, and services • A production site enhanced by connectivity, automation, and AI. • Technology that enables machines to simulate human intelligence • Protection of data, systems, and networks against digital attacks. • ...
Information and Network Security 2023-09-08
Across
- coded message
- Cause loss of message confidentiality
- A security principle that ensures data is accessible only to those authorized to view or modify it.
- A secret combination of characters used to authenticate a user's identity
- A type of malware that spreads by duplicating itself and infecting other programs
- This Ciphers these hide the message by rearranging the letter order
- The practice of protecting computer systems and networks from digital attacks.
Down
- Causes loss of message integrity
- Plain text message may be hidden in image or sound It is not encryption
- Is most difficult attack to find out
10 Clues: coded message • Causes loss of message integrity • Is most difficult attack to find out • Cause loss of message confidentiality • This Ciphers these hide the message by rearranging the letter order • Plain text message may be hidden in image or sound It is not encryption • A secret combination of characters used to authenticate a user's identity • ...
Crossword#10 2023-07-11
Across
- - Storing and accessing data and applications remotely over the internet.
- - technology to manage business processes and operations.
- - Conducting business transactions online.
- - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
- - Working remotely using technology to communicate and collaborate.
- - Using technology to automate routine tasks and processes.
Down
- - Protecting computer systems and networks from unauthorized access or attacks.
- - technology to manage interactions with customers.
- - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
- - Using data and statistical analysis to inform decision-making.
10 Clues: - Conducting business transactions online. • - technology to manage interactions with customers. • - technology to manage business processes and operations. • - Using technology to automate routine tasks and processes. • - Using data and statistical analysis to inform decision-making. • - Working remotely using technology to communicate and collaborate. • ...
Techy Word Search Challenge 2024-04-16
Across
- Information stored and processed by computers, like numbers, text, or images.
- Writing instructions for a computer using a programming language.
- Machines that can move, sense, and interact with their environment.
- The physical parts of a computer that you can touch and see.
- A global network that connects computers worldwide.
Down
- Protecting computers, networks, and data from cyberattacks.
- Instructions for a computer's next move in a game.
- Intelligence: Computers that can learn, reason, and make decisions like humans.
- Programs that make computers work, like games, word processors, or music players.
- Turning information into a secret code to keep it safe from hackers.
10 Clues: Instructions for a computer's next move in a game. • A global network that connects computers worldwide. • Protecting computers, networks, and data from cyberattacks. • The physical parts of a computer that you can touch and see. • Writing instructions for a computer using a programming language. • ...
Cybersecurity 2023-08-23
Senior Cybersecurity Words to Know 2024-01-04
Across
- An area of the computer's memory that only one program can acess
- Removing any unnecessary information
- A current or former employee who has access to a company's data or network and could be part of an attack
- A piece of message or data transmitted through the internet
- address A series of numbers unique to a device
- Giving as few people as necessary access to digital content
Down
- Anything that is stored on a computer.
- The protection of digital devices against attacks
- A black and white code that contains data
- A box that conducts electricity and prevents electromagnetic charges
- A wireless access point that provides internet access
- Keeping information from being seen by certain users
12 Clues: Removing any unnecessary information • Anything that is stored on a computer. • A black and white code that contains data • address A series of numbers unique to a device • The protection of digital devices against attacks • Keeping information from being seen by certain users • A wireless access point that provides internet access • ...
crossword puzzle 2025-07-25
Across
- a small device or machine with a particular purpose
- Something that takes attention away from what is important.
- The exchange of information between people or devices.
- A word or phrase preceded by “#” used to categorize content online.
- Reusing discarded materials to create products of higher value.
- Something that spreads quickly online.
Down
- The flat surface on a device where images or data are displayed.
- Practices to protect computers and networks from attacks.
- Processing used materials into new products.
- Transmitting video or audio over the internet in real time.
- A mobile phone with advanced features like internet access and apps.
- Media: Websites and apps for sharing content and connecting with others.
12 Clues: Something that spreads quickly online. • Processing used materials into new products. • a small device or machine with a particular purpose • The exchange of information between people or devices. • Practices to protect computers and networks from attacks. • Transmitting video or audio over the internet in real time. • ...
SMART CITIES 2022-02-15
Across
- The transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- T in ciTies
- SMART is the ___ use of resources in an efficient & effective way
- a person who is among the first to explore or settle a new country or area
- E in citiEs
- C in Cities
- facts and statistics collected together for reference or analysis
Down
- 2nd I in citIes
- S in citieS
- A global network which facilitates communication and sharing of information online
- the protection of computer systems and networks from cyber threats
- 1st I in cIties
- Reuse discarded objects or material in such a way as to create a product of higher quality or value than the original
13 Clues: S in citieS • T in ciTies • E in citiEs • C in Cities • 2nd I in citIes • 1st I in cIties • SMART is the ___ use of resources in an efficient & effective way • facts and statistics collected together for reference or analysis • the protection of computer systems and networks from cyber threats • a person who is among the first to explore or settle a new country or area • ...
insurance 31 2026-02-09
Across
- Rates are regulatory authority sets the rates.
- Law are Rates must be approved before use.
- Law are rates where Approval only required for specific conditions
- Official permission granted by a regulator to operate.
- – Protection of systems and data from digital attacks.
- Law are Rates used immediately after filing; regulators can later order changes.
Down
- Law are Rates used first, then filed within a specific period.
- – System by which a company is directed and controlled.
- – The science of examining data to support decisions.
- – Funds set aside to meet future obligations or losses.
- Law are Range-based flexibility without prior approval.
- – Extremely large datasets analyzed for patterns and insights.
- Consumer _ _ _ _ _ _ _ _ _ _ is Safeguarding to defend customers from unfair practices.
13 Clues: Law are Rates must be approved before use. • Rates are regulatory authority sets the rates. • – The science of examining data to support decisions. • Official permission granted by a regulator to operate. • – Protection of systems and data from digital attacks. • – System by which a company is directed and controlled. • ...
Cybersecurity 2021-02-12
4 Clues: a code used to keep information safe • a kind of virus that is also a animal • a person trying to get your private information • a way people get money from you by sending you a scam email
Season4Sharing Scavenger Hunt! 2020-12-08
Across
- Our CFO's Last Name
- Service Makes Individuals’ Lives Easier
- Last Name of Nobel Prize Winner interviewed by Jean English during Ignite20
- Nikesh announced our intent to acquire this company in Nov 11, 2020
- A world where each day is safer and more secure than the one before
Down
- First name of one of our founders
- One of our NGFW competitors
- It is the name of our of our main brands
- Where has James McGregor worked the longest?
- On this month, Palo Alto Networks became a public company in the NYSE Stock Market
- To be the cybersecurity partner of choice, protecting our digital way of life
- Palo Alto Networks Stock Symbol
12 Clues: Our CFO's Last Name • One of our NGFW competitors • Palo Alto Networks Stock Symbol • First name of one of our founders • Service Makes Individuals’ Lives Easier • It is the name of our of our main brands • Where has James McGregor worked the longest? • Nikesh announced our intent to acquire this company in Nov 11, 2020 • ...
Computer language and browsing safely 2025-05-31
Across
- BEFRIENDING OF OPERATOR (ADULT) AND CHILDREN TO EMPHASIZE A CHILD'S EMOTIONS
- THE COMPUTER LANGUAGE WHICH IS USED NOWADAYS
- THE PEOPLE WHO DO HACKING
- SHORT FORM OF THE ARTIFICIAL INTELLIGENCE
- IT IS A ILLEGAL THING WHICH IS USED TO CAUSE DISTURBANCES IN A COMPUTER
- THE CYBERCRIME WHICH STEALS VITAL OR SECRET INFORMATION OF A COMPUTER
- THE CRIMES COMMITTED BY CYBERCRIMNIALS
- THE MACHINE WHICH CONVERTS MACHINE LANGUAGE INTO HUMAN LANGUAGE LINE-BY-LINE
Down
- EXAMPLES OF THE APPS ARE C, C++, PYTHON ETC
- THE PROCESS OF ADDING OR SUBTRACTING BINARY NUMBERS
- USES 0 AS OFF AND 1 AS ON
- THE ALPHABETICAL LETTERS BUTTONS USED IN ASSEMBLY LANGUAGE
- THE PROCESS OF PROTECTING COMPUTER AND COMPUTER SYSTEMS FROM CYBERCRIMES
- USES MNEMONICS INSTEAD OF USING BINARY NUMBERS
- THE PROCESS OF BULLYING OR HURTING SOMEONE'S FEELINGS
- THE MACHINE WHICH CONVERTS MACHINE LANGUAGE INTO HUMAN LANGUAGE AND VICE-VERSA IN ONE GO
16 Clues: USES 0 AS OFF AND 1 AS ON • THE PEOPLE WHO DO HACKING • THE CRIMES COMMITTED BY CYBERCRIMNIALS • SHORT FORM OF THE ARTIFICIAL INTELLIGENCE • EXAMPLES OF THE APPS ARE C, C++, PYTHON ETC • THE COMPUTER LANGUAGE WHICH IS USED NOWADAYS • USES MNEMONICS INSTEAD OF USING BINARY NUMBERS • THE PROCESS OF ADDING OR SUBTRACTING BINARY NUMBERS • ...
Browsing safety 2025-06-06
Across
- misusing someone's personal information like name , dob
- the scientific knowledge and/or equipment that is needed for a particular industry
- malware that encrypts viticm's personal data until the ransomware is paid
- Refers to illegal entry into a system
- Criminal activity intended to harm a computer device
- an impression you create while surfing online
Down
- protects the system from computer virus
- Our lives heavily rely on it
- protects confidential information
- type of malicious software (malware) that infects a computer and can replicate itself by modifying other programs.
- Ethnical hackers are called
- Full form of otp
- Unethical hackers are called
- software that helps in preventing unauthorised access in the computer system
- cybersecurity threat where attackers use deceptive means, often email or text messages, to trick individuals into revealing personal information or installing malware
- harassing people online through deliberate manner
16 Clues: Full form of otp • Ethnical hackers are called • Our lives heavily rely on it • Unethical hackers are called • protects confidential information • Refers to illegal entry into a system • protects the system from computer virus • an impression you create while surfing online • harassing people online through deliberate manner • ...
Crossword Puzzle Challenge 2025-10-20
Across
- A general term for malicious software.
- An incident where data is accessed without authorization.
- A hidden method of bypassing normal authentication.
- Software that secretly gathers user information without consent.
- Impersonating another device or user to gain access.
- A self-replicating malware that spreads without user interaction.
- The process of verifying a user's identity.
Down
- The part of malware that performs the malicious action.
- A type of malware disguised as legitimate software.
- A potential cause of an unwanted incident in cybersecurity.
- Fraudulent attempt to obtain sensitive information via email or messaging.
- A network of infected devices controlled remotely.
- A stealthy type of malware designed to hide its presence.
- A piece of code that takes advantage of a vulnerability.
- Malware that attaches to files and spreads when executed.
- A method of converting data into a fixed-size string, often used for passwords.
16 Clues: A general term for malicious software. • The process of verifying a user's identity. • A network of infected devices controlled remotely. • A type of malware disguised as legitimate software. • A hidden method of bypassing normal authentication. • Impersonating another device or user to gain access. • The part of malware that performs the malicious action. • ...
Technology used in business 2026-03-05
Across
- Promoting goods through online platforms.
- An electronic banking device that allows customers to perform financial transactions without interacting with a teller.
- _____ tools are Advanced, technology-based instruments designed for specific business functions.
- Buying and selling goods online.
- online presence of a company.
- Using machines to perform repetitive tasks.
Down
- Loss of focus caused by misuse of technology, such as non-work browsing during business hours.
- Basic, manual instruments used in business operations before advanced technology.
- Move data around and make calculations; a role of ICT.
- A site used in e-commerce.
- Protecting business systems from digital threats.
- A global network connecting millions of computers, enabling communication and business transactions.
- A system of interlinked documents and resources accessed via the internet, supporting global communication
- Meetings held via video or audio link.
- Electronic communication tool.
- Conducting all aspects of business operations online
16 Clues: A site used in e-commerce. • online presence of a company. • Electronic communication tool. • Buying and selling goods online. • Meetings held via video or audio link. • Promoting goods through online platforms. • Using machines to perform repetitive tasks. • Protecting business systems from digital threats. • Conducting all aspects of business operations online • ...
Cyber Crossword 2026-01-12
Across
- A flaw or weakness in an information system that could be exploited
- Phishing for the big prize!
- A string of characters used to authenticate an identity
- A mechanism for creating a secure connection between a computing device and a computer network
- The ability of individuals to understand and exercise control over how information about themselves may be used by others
- An unauthorized user who attempts to or gains access to an information system
- Extra copies of computer files that can be used to restore files that are lost or damaged
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Converting data into a form that cannot be easily understood by unauthorized people
- Software that compromises the operation of a system by performing an unauthorized function or process
- Computer programs that can block, detect, and remove viruses and other malware
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital inform
- Human characteristics used for identification
- A type of malware that denies a user's access to a system or data until a sum of money is paid
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like like they are from trusted
Down
- A cybersecurity risk that originates from within an organization
- Part of the internet that isn't indexed by search engines
- A routine fix for a computer program
- Software designed to block malware from entering protected networks
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user
- A process or measure used to verify a user's identity
- A collection of computers compromised by malicious code and controlled across a network
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying da
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
- Unsolicited emails sent to many addresses
- Faking the sending address of a transmission to gain illegal entry into a secure system
27 Clues: Phishing for the big prize! • A routine fix for a computer program • Unsolicited emails sent to many addresses • Human characteristics used for identification • A process or measure used to verify a user's identity • A string of characters used to authenticate an identity • Part of the internet that isn't indexed by search engines • ...
Internet Security Crossword puzzle 2022-10-24
Across
- Who can communicate and control servers if their computers get an infection?
- What is the main thing Malware tries to attack?
- What type of internet hack uses fake sources of emails?
- What can Malware use to send more viruses?
Down
- What is an alternative to internet security?
- Who can collect your user credentials?
- What can Malware steal if it gets into your device?
7 Clues: Who can collect your user credentials? • What can Malware use to send more viruses? • What is an alternative to internet security? • What is the main thing Malware tries to attack? • What can Malware steal if it gets into your device? • What type of internet hack uses fake sources of emails? • ...
Attack and Risk Vectors 2023-08-17
Across
- like pretending to be a legitimate website
- harmful software
- or holding a PC or operation station hostage
- a cybercriminal's path to breach a computer system or network
- tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
- send fake emails
- the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
7 Clues: send fake emails • harmful software • like pretending to be a legitimate website • or holding a PC or operation station hostage • a cybercriminal's path to breach a computer system or network • tricking people into revealing sensitive information, often through deceptive emails or fake websites? • ...
Module 8 EDM-250 2023-10-17
5 Clues: National Flood Insurance Program • 1990's program called Project _____ • after 9/11 changed from all-hazard to ____ • Critical emerging hazard w/ critical impacts • lack of leadership is the most _____ issue in EM
Module 8 EDM-250 2023-08-16
5 Clues: National Flood Insurance Program • 1990's program called Project _____ • after 9/11 changed from all-hazard to ____ • Critical emerging hazard w/ critical impacts • lack of leadership is the most _____ issue in EM
HOW AI INTEGRATE IN ERP TO SOLVE CYBERSECURITY ISSUE 2025-04-27
5 Clues: Type of attack AI helps prevent • System that integrates business processes • Method that predicts future cybersecurity risks • Security process that scrambles data to protect it • Technique used to detect unusual patterns automatically
Cybersecurity Awareness Month Crossword Puzzle 2025-09-19
Across
- A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
- The best way to keep Cornerstone secure is to become a ________ ___________.
- All customer and bank information that is no longer required must be ____________.
- an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
- A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
- Malicious software designed to harm, exploit or otherwise compromise a computer system.
- the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
- Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
- Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
- A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
- Create strong ___________ or passphrases and never share them with anyone else.
Down
- A type of malware that encrypts a victim's files and demands payment for the decryption key.
- the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
- Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
- Someone who tries to access data that they aren't authorized to view.
- All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
- ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
- The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.
18 Clues: Someone who tries to access data that they aren't authorized to view. • The best way to keep Cornerstone secure is to become a ________ ___________. • Create strong ___________ or passphrases and never share them with anyone else. • All customer and bank information that is no longer required must be ____________. • ...
STATION X 2023 2023-03-02
Across
- For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
- The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- The diplomas offered in the School of Design & Environment focuses on ________.
- The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- Ngee Ann Polytechnic is an award-winning smart and ______campus.
- Located at the Atrium, there is a 24/7 unmanned ______.
- If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
- Common _____ Programme is a new programme offered in the School of Film & Media Studies.
- Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
- Students are able to pursue a minor via the ______Learning Pathway Programme.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
- Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
- Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
20 Clues: Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic is an award-winning smart and ______campus. • Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______. • Students are able to pursue a minor via the ______Learning Pathway Programme. • The diplomas offered in the School of Design & Environment focuses on ________. • ...
Q1 Crssword 2023-04-25
Across
- ____ First - deliver problem resolution and exceed customer expectations
- Product that extends patching to protect over 350 third party apps
- Software-defined secondary storage solution
- Firm who provided an audit of the systems management appliance source code
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Company who’s slogan Where Next Meets Now?
- Information Systems Management abbreviation
Down
- Cloud ready enterprise backup software
- Practice of defending computers, networks and data from malicious attacks
- This product released Query Insights, which allows customers to gain visibility into the performance of SQL statements
- Month of the Sales Kickoff Meeting 2023
- Celebrating its 25th anniversary
- ___ Thompson, President and GM
- Abbreviation, primarily covering the erwin portfolio and Toad data point
14 Clues: ___ Thompson, President and GM • Celebrating its 25th anniversary • Cloud ready enterprise backup software • Month of the Sales Kickoff Meeting 2023 • Company who’s slogan Where Next Meets Now? • Software-defined secondary storage solution • Information Systems Management abbreviation • Product that extends patching to protect over 350 third party apps • ...
Kiberxavfsizlik siyosatida xalqaro va milliy standart meyorlarini o'rganish 2025-12-05
Across
- Industrial Control Systems (SCADA, DCS) xavfsizligi uchun NIST standarti.
- O‘zbekistonda shaxsiy ma’lumotlarni himoyalash bo‘yicha asosiy hukumat organi — “____ inspeksiyasi”.
- Kiberhujumlarga qarshi baholash modeli: __ Maturity Model (C2M2).
- AQSh federal hukumatida barcha federal axborot tizimlari xavfsizlik talablarini belgilovchi qonun (abbr.).
- Risklarni aniqlash, baholash va boshqarish bo‘yicha xalqaro standart: ISO/IEC ____.
- NIST tomonidan ishlab chiqilgan bulutli hisoblash xavfsizlik modeli.
- DSS Elektron to‘lov kartalari xavfsizligi bo‘yicha xalqaro standart (____ DSS).
- Blockchain xavfsizligi bo‘yicha ISO/TS ____.
Down
- O‘zDSt ____:2019 — O‘zbekistonda davlat axborot tizimlari uchun axborot xavfsizligi talablari.
- Yaponiyaning axborot xavfsizligi boshqaruv tizimi standarti (ISO 27001 ga ekvivalent).
- Ma’lumotlarga kirish bosqichlari: Identification → Authentication → Authorization.
- Operational Technology (OT) uchun ICS/SCADA xavfsizlik talablari bo‘yicha xalqaro standart.
- Axborot tizimlari auditiga oid xalqaro standartlar oilasi (ISO/IEC ____).
- Axborot xavfsizligida doimiy takomillashtirish sikli: Plan → Do → Check → Act.
14 Clues: Blockchain xavfsizligi bo‘yicha ISO/TS ____. • Kiberhujumlarga qarshi baholash modeli: __ Maturity Model (C2M2). • NIST tomonidan ishlab chiqilgan bulutli hisoblash xavfsizlik modeli. • Industrial Control Systems (SCADA, DCS) xavfsizligi uchun NIST standarti. • Axborot tizimlari auditiga oid xalqaro standartlar oilasi (ISO/IEC ____). • ...
Functions of the departments 2021-10-11
Across
- Responsible for assigning employees (workers) or vehicles to customers.
- Responsible for making the product
- Responsible for the office/building and any repairs.
- Responsible for the management of the flow of things between the point of origin and the point of consumption in order to meet requirements of customers or corporations.
- Responsible of server configurations, routing protocols, network configurations and storage environments.
Down
- Responsible for keeping a connection with different departments
- Responsible for selling the product/service.
- work with organizations to keep their computer information systems secure.
- Responsible for the company's computers and proper function of the equipment.
- Responsible for payments, bills and expenses.
- Responsible for hiring new staff
11 Clues: Responsible for hiring new staff • Responsible for making the product • Responsible for selling the product/service. • Responsible for payments, bills and expenses. • Responsible for the office/building and any repairs. • Responsible for keeping a connection with different departments • Responsible for assigning employees (workers) or vehicles to customers. • ...
