English

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071
Across
  1. 5. A weakness that can be exploited.
  2. 6. Long-term storage of old files.
  3. 7. The way a system or user acts.
  4. 9. A request for information from a database.
  5. 11. A system on which applications can run.
  6. 13. Connected computers that share data.
  7. 15. A direct instruction given to a computer.
  8. 17. Instructions written for computers.
  9. 18. A person or system chosen for attack.
  10. 19. A step taken to solve a problem.
  11. 21. Accidental or unlawful release of information.
  12. 22. A piece of hardware used in computing.
  13. 23. A place where data is kept.
  14. 25. To protect from harm or attacks.
  15. 28. Continuous flow of data.
  16. 30. Converting information into a secure code.
  17. 33. Related to investigating cyber incidents.
  18. 34. The right to keep personal data protected.
  19. 36. The current condition of a system.
  20. 39. A formal rule or guideline.
  21. 41. A mistake or problem in a system.
  22. 42. Someone who monitors or watches activity.
  23. 43. Information stored or processed by computers.
  24. 45. The chance that something bad may happen.
  25. 47. An action taken after an incident.
  26. 48. Unauthorized entry into a system.
  27. 50. Protection against threats or attacks.
  28. 54. To follow the path of an action or data flow.
  29. 55. Use of technology to perform tasks without human input.
  30. 57. A written record of actions or events.
  31. 58. Permission to use or enter a system.
  32. 60. Learning skills or knowledge.
  33. 62. A simplified digital structure used to predict or analyze.
  34. 66. A set of rules for communication.
  35. 68. Monitoring to make sure rules are followed.
  36. 69. A break in security where data is exposed.
  37. 70. A specific area or internet address space.
  38. 71. A part of a larger software system.
Down
  1. 1. Official rule made by authorities.
  2. 2. A tool that blocks unwanted network traffic.
  3. 3. A formal review of systems or processes.
  4. 4. Programs used by a computer.
  5. 8. Searching for threats inside a network.
  6. 10. Proof of an event or action.
  7. 12. Related to money or cost.
  8. 14. Numerical information used for analysis.
  9. 15. Following laws, rules, or standards.
  10. 16. Information sent from one place to another.
  11. 20. A call for data or a service.
  12. 24. A prediction based on information.
  13. 26. The ability to manage or direct something.
  14. 27. Belief that someone or something is reliable.
  15. 29. Measurements used to evaluate performance.
  16. 31. To watch or track activity.
  17. 32. A user identity in a system.
  18. 35. Studying information to understand it.
  19. 37. A computer that provides resources to others.
  20. 38. A set of connected computer components.
  21. 40. A risk or danger.
  22. 42. Too much data or activity for a system to handle.
  23. 44. Something unusual that may signal a problem.
  24. 46. The path data takes to reach a destination.
  25. 49. To check a system for issues or threats.
  26. 51. A saved copy of data in case of loss.
  27. 52. A document describing an event or findings.
  28. 53. A sign that danger or problems may occur.
  29. 56. An event that disrupts normal operations.
  30. 59. Delay in data communication.
  31. 61. A connection point in a network.
  32. 63. A secret code to access a system.
  33. 64. A tool used to explore or test a system.
  34. 65. Rules about what is morally right or wrong.
  35. 67. Records of system activities.