Across
- 5. A weakness that can be exploited.
- 6. Long-term storage of old files.
- 7. The way a system or user acts.
- 9. A request for information from a database.
- 11. A system on which applications can run.
- 13. Connected computers that share data.
- 15. A direct instruction given to a computer.
- 17. Instructions written for computers.
- 18. A person or system chosen for attack.
- 19. A step taken to solve a problem.
- 21. Accidental or unlawful release of information.
- 22. A piece of hardware used in computing.
- 23. A place where data is kept.
- 25. To protect from harm or attacks.
- 28. Continuous flow of data.
- 30. Converting information into a secure code.
- 33. Related to investigating cyber incidents.
- 34. The right to keep personal data protected.
- 36. The current condition of a system.
- 39. A formal rule or guideline.
- 41. A mistake or problem in a system.
- 42. Someone who monitors or watches activity.
- 43. Information stored or processed by computers.
- 45. The chance that something bad may happen.
- 47. An action taken after an incident.
- 48. Unauthorized entry into a system.
- 50. Protection against threats or attacks.
- 54. To follow the path of an action or data flow.
- 55. Use of technology to perform tasks without human input.
- 57. A written record of actions or events.
- 58. Permission to use or enter a system.
- 60. Learning skills or knowledge.
- 62. A simplified digital structure used to predict or analyze.
- 66. A set of rules for communication.
- 68. Monitoring to make sure rules are followed.
- 69. A break in security where data is exposed.
- 70. A specific area or internet address space.
- 71. A part of a larger software system.
Down
- 1. Official rule made by authorities.
- 2. A tool that blocks unwanted network traffic.
- 3. A formal review of systems or processes.
- 4. Programs used by a computer.
- 8. Searching for threats inside a network.
- 10. Proof of an event or action.
- 12. Related to money or cost.
- 14. Numerical information used for analysis.
- 15. Following laws, rules, or standards.
- 16. Information sent from one place to another.
- 20. A call for data or a service.
- 24. A prediction based on information.
- 26. The ability to manage or direct something.
- 27. Belief that someone or something is reliable.
- 29. Measurements used to evaluate performance.
- 31. To watch or track activity.
- 32. A user identity in a system.
- 35. Studying information to understand it.
- 37. A computer that provides resources to others.
- 38. A set of connected computer components.
- 40. A risk or danger.
- 42. Too much data or activity for a system to handle.
- 44. Something unusual that may signal a problem.
- 46. The path data takes to reach a destination.
- 49. To check a system for issues or threats.
- 51. A saved copy of data in case of loss.
- 52. A document describing an event or findings.
- 53. A sign that danger or problems may occur.
- 56. An event that disrupts normal operations.
- 59. Delay in data communication.
- 61. A connection point in a network.
- 63. A secret code to access a system.
- 64. A tool used to explore or test a system.
- 65. Rules about what is morally right or wrong.
- 67. Records of system activities.
