Krzyżówka Angielski

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
Across
  1. 2. – A document describing an event or findings.
  2. 5. – A secret code to access a system.
  3. 9. – Protection against threats or attacks.
  4. 13. – Unauthorized entry into a system.
  5. 14. – A user identity in a system.
  6. 15. – Accidental or unlawful release of information.
  7. 18. – A formal rule or guideline.
  8. 20. – Proof of an event or action.
  9. 21. – Someone who monitors or watches activity.
  10. 24. – A saved copy of data in case of loss.
  11. 27. – Instructions written for computers.
  12. 29. – Delay in data communication.
  13. 30. – Connected computers that share data.
  14. 35. – To watch or track activity.
  15. 36. – A set of connected computer components.
  16. 37. – Rules about what is morally right or wrong.
  17. 38. – A tool that blocks unwanted network traffic.
  18. 41. – Searching for threats inside a network.
  19. 43. – The chance that something bad may happen.
  20. 45. – Belief that someone or something is reliable.
  21. 46. – A step taken to solve a problem.
  22. 50. – A risk or danger.
  23. 51. – The way a system or user acts.
  24. 52. – A sign that danger or problems may occur.
  25. 53. – Permission to use or enter a system.
  26. 54. – A formal review of systems or processes.
Down
  1. 1. – Following laws, rules, or standards.
  2. 3. – A simplified digital structure used to predict or analyze.
  3. 4. – A prediction based on information.
  4. 6. – Programs used by a computer.
  5. 7. – Use of technology to perform tasks without human input.
  6. 8. – Related to money or cost.
  7. 10. – A tool used to explore or test a system.
  8. 11. – Related to investigating cyber incidents.
  9. 12. – A place where data is kept.
  10. 16. – Monitoring to make sure rules are followed.
  11. 17. – A break in security where data is exposed.
  12. 19. – The right to keep personal data protected.
  13. 22. – A call for data or a service.
  14. 23. – A specific area or internet address space.
  15. 25. – A set of rules for communication.
  16. 26. – To check a system for issues or threats.
  17. 28. – A part of a larger software system.
  18. 31. – Converting information into a secure code.
  19. 32. – A computer that provides resources to others.
  20. 33. – Numerical information used for analysis.
  21. 34. – Learning skills or knowledge.
  22. 39. – Short Definition (EN)
  23. 40. – Records of system activities.
  24. 42. – A weakness that can be exploited.
  25. 44. – An event that disrupts normal operations.
  26. 47. – A connection point in a network.
  27. 48. – Information stored or processed by computers.
  28. 49. – Something unusual that may signal a problem.