Krzyżówka Angielski
Across
- 2. – A document describing an event or findings.
- 5. – A secret code to access a system.
- 9. – Protection against threats or attacks.
- 13. – Unauthorized entry into a system.
- 14. – A user identity in a system.
- 15. – Accidental or unlawful release of information.
- 18. – A formal rule or guideline.
- 20. – Proof of an event or action.
- 21. – Someone who monitors or watches activity.
- 24. – A saved copy of data in case of loss.
- 27. – Instructions written for computers.
- 29. – Delay in data communication.
- 30. – Connected computers that share data.
- 35. – To watch or track activity.
- 36. – A set of connected computer components.
- 37. – Rules about what is morally right or wrong.
- 38. – A tool that blocks unwanted network traffic.
- 41. – Searching for threats inside a network.
- 43. – The chance that something bad may happen.
- 45. – Belief that someone or something is reliable.
- 46. – A step taken to solve a problem.
- 50. – A risk or danger.
- 51. – The way a system or user acts.
- 52. – A sign that danger or problems may occur.
- 53. – Permission to use or enter a system.
- 54. – A formal review of systems or processes.
Down
- 1. – Following laws, rules, or standards.
- 3. – A simplified digital structure used to predict or analyze.
- 4. – A prediction based on information.
- 6. – Programs used by a computer.
- 7. – Use of technology to perform tasks without human input.
- 8. – Related to money or cost.
- 10. – A tool used to explore or test a system.
- 11. – Related to investigating cyber incidents.
- 12. – A place where data is kept.
- 16. – Monitoring to make sure rules are followed.
- 17. – A break in security where data is exposed.
- 19. – The right to keep personal data protected.
- 22. – A call for data or a service.
- 23. – A specific area or internet address space.
- 25. – A set of rules for communication.
- 26. – To check a system for issues or threats.
- 28. – A part of a larger software system.
- 31. – Converting information into a secure code.
- 32. – A computer that provides resources to others.
- 33. – Numerical information used for analysis.
- 34. – Learning skills or knowledge.
- 39. – Short Definition (EN)
- 40. – Records of system activities.
- 42. – A weakness that can be exploited.
- 44. – An event that disrupts normal operations.
- 47. – A connection point in a network.
- 48. – Information stored or processed by computers.
- 49. – Something unusual that may signal a problem.