Krzyżówka Angielski Cyberbezpieczenstwo
Across
- 4. The current condition of a system.
- 5. Too much data or activity for a system to handle.
- 6. A call for data or a service.
- 12. A formal rule or guideline.
- 13. A mistake or problem in a system.
- 17. Records of system activities.
- 18. To follow the path of an action or data flow.
- 19. Information stored or processed by computers.
- 20. Learning skills or knowledge.
- 23. To protect from harm or attacks.
- 26. A tool that blocks unwanted network traffic.
- 31. Accidental or unlawful release of information.
- 36. The way a system or user acts.
- 37. A place where data is kept.
- 38. Connected computers that share data.
- 39. A connection point in a network.
- 41. Rules about what is morally right or wrong.
- 42. A set of connected computer components.
- 43. Use of technology to perform tasks without human input.
- 44. Unauthorized entry into a system.
- 46. Monitoring to make sure rules are followed.
- 48. A request for information from a database.
- 49. A user identity in a system.
Down
- 1. A tool used to explore or test a system.
- 2. Official rule made by authorities.
- 3. The path data takes to reach a destination.
- 7. Protection against threats or attacks.
- 8. A specific area or internet address space.
- 9. A system on which applications can run.
- 10. Measurements used to evaluate performance.
- 11. Instructions written for computers.
- 14. The ability to manage or direct something.
- 15. Programs used by a computer.
- 16. A part of a larger software system.
- 21. The chance that something bad may happen.
- 22. A risk or danger.
- 24. Converting information into a secure code.
- 25. A secret code to access a system.
- 26. Related to investigating cyber incidents.
- 27. Numerical information used for analysis.
- 28. A sign that danger or problems may occur.
- 29. Information sent from one place to another.
- 30. Belief that someone or something is reliable.
- 32. Studying information to understand it.
- 33. An action taken after an incident.
- 34. Related to money or cost.
- 35. Something unusual that may signal a problem.
- 36. A break in security where data is exposed.
- 40. A simplified digital structure used to predict or analyze.
- 45. Continuous flow of data.
- 47. A written record of actions or events
- 50. A person or system chosen for attack.