Krzyżówka zadanie

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172
Across
  1. 4. Use of technology to perform tasks without human input.
  2. 6. A sign that danger or problems may occur.
  3. 8. Information stored or processed by computers.
  4. 10. A request for information from a database.
  5. 11. Accidental or unlawful release of information.
  6. 15. A risk or danger.
  7. 17. A specific area or internet address space.
  8. 19. A user identity in a system.
  9. 24. Related to money or cost.
  10. 27. A tool that blocks unwanted network traffic.
  11. 28. A document describing an event or findings.
  12. 30. The current condition of a system.
  13. 31. Related to investigating cyber incidents.
  14. 35. To check a system for issues or threats.
  15. 36. A computer that provides resources to others.
  16. 37. Too much data or activity for a system to handle.
  17. 41. Numerical information used for analysis.
  18. 42. A saved copy of data in case of loss.
  19. 46. Unauthorized entry into a system.
  20. 47. A piece of hardware used in computing.
  21. 49. A written record of actions or events.
  22. 50. Someone who monitors or watches activity.
  23. 53. A set of rules for communication.
  24. 55. Measurements used to evaluate performance.
  25. 56. A call for data or a service.
  26. 58. Permission to use or enter a system.
  27. 59. Proof of an event or action.
  28. 62. Programs used by a computer.
  29. 65. A person or system chosen for attack.
  30. 68. The ability to manage or direct something.
  31. 70. Long-term storage of old files.
  32. 71. A prediction based on information.
  33. 72. A formal review of systems or processes.
Down
  1. 1. A direct instruction given to a computer.
  2. 2. A formal rule or guideline.
  3. 3. To watch or track activity.
  4. 5. A part of a larger software system.
  5. 7. Official rule made by authorities.
  6. 9. Searching for threats inside a network.
  7. 12. Something unusual that may signal a problem.
  8. 13. Continuous flow of data.
  9. 14. A system on which applications can run.
  10. 16. Instructions written for computers.
  11. 18. An event that disrupts normal operations.
  12. 20. A weakness that can be exploited.
  13. 21. Monitoring to make sure rules are followed.
  14. 22. A secret code to access a system.
  15. 23. To follow the path of an action or data flow.
  16. 25. A mistake or problem in a system.
  17. 26. Information sent from one place to another.
  18. 29. A connection point in a network.
  19. 32. A place where data is kept.
  20. 33. Protection against threats or attacks.
  21. 34. Records of system activities.
  22. 35. To protect from harm or attacks.
  23. 38. Delay in data communication.
  24. 39. The way a system or user acts.
  25. 40. The right to keep personal data protected.
  26. 43. Belief that someone or something is reliable.
  27. 44. A set of connected computer components.
  28. 45. The path data takes to reach a destination.
  29. 48. A simplified digital structure used to predict or analyze.
  30. 51. An action taken after an incident.
  31. 52. Connected computers that share data.
  32. 54. The chance that something bad may happen.
  33. 57. Converting information into a secure code.
  34. 60. Following laws, rules, or standards.
  35. 61. A break in security where data is exposed.
  36. 63. A step taken to solve a problem.
  37. 64. Rules about what is morally right or wrong.
  38. 66. A tool used to explore or test a system.
  39. 67. Studying information to understand it.
  40. 69. Learning skills or knowledge.