Krzyżówka Angielski Cyberbezpieczenstwo

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 4. The current condition of a system.
  2. 5. Too much data or activity for a system to handle.
  3. 6. A call for data or a service.
  4. 12. A formal rule or guideline.
  5. 13. A mistake or problem in a system.
  6. 17. Records of system activities.
  7. 18. To follow the path of an action or data flow.
  8. 19. Information stored or processed by computers.
  9. 20. Learning skills or knowledge.
  10. 23. To protect from harm or attacks.
  11. 26. A tool that blocks unwanted network traffic.
  12. 31. Accidental or unlawful release of information.
  13. 36. The way a system or user acts.
  14. 37. A place where data is kept.
  15. 38. Connected computers that share data.
  16. 39. A connection point in a network.
  17. 41. Rules about what is morally right or wrong.
  18. 42. A set of connected computer components.
  19. 43. Use of technology to perform tasks without human input.
  20. 44. Unauthorized entry into a system.
  21. 46. Monitoring to make sure rules are followed.
  22. 48. A request for information from a database.
  23. 49. A user identity in a system.
Down
  1. 1. A tool used to explore or test a system.
  2. 2. Official rule made by authorities.
  3. 3. The path data takes to reach a destination.
  4. 7. Protection against threats or attacks.
  5. 8. A specific area or internet address space.
  6. 9. A system on which applications can run.
  7. 10. Measurements used to evaluate performance.
  8. 11. Instructions written for computers.
  9. 14. The ability to manage or direct something.
  10. 15. Programs used by a computer.
  11. 16. A part of a larger software system.
  12. 21. The chance that something bad may happen.
  13. 22. A risk or danger.
  14. 24. Converting information into a secure code.
  15. 25. A secret code to access a system.
  16. 26. Related to investigating cyber incidents.
  17. 27. Numerical information used for analysis.
  18. 28. A sign that danger or problems may occur.
  19. 29. Information sent from one place to another.
  20. 30. Belief that someone or something is reliable.
  21. 32. Studying information to understand it.
  22. 33. An action taken after an incident.
  23. 34. Related to money or cost.
  24. 35. Something unusual that may signal a problem.
  25. 36. A break in security where data is exposed.
  26. 40. A simplified digital structure used to predict or analyze.
  27. 45. Continuous flow of data.
  28. 47. A written record of actions or events
  29. 50. A person or system chosen for attack.