Krzyżówka Angielski

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566
Across
  1. 2. The right to keep personal data protected.
  2. 5. Learning skills or knowledge.
  3. 6. Records of system activities.
  4. 9. Studying information to understand it.
  5. 12. Connected computers that share data.
  6. 13. Instructions written for computers.
  7. 16. A direct instruction given to a computer.
  8. 17. The chance that something bad may happen.
  9. 19. Use of technology to perform tasks without human input.
  10. 21. A break in security where data is exposed.
  11. 23. Rules about what is morally right or wrong.
  12. 24. The ability to manage or direct something.
  13. 26. A system on which applications can run.
  14. 27. A tool that blocks unwanted network traffic.
  15. 29. Continuous flow of data.
  16. 32. A simplified digital structure used to predict or analyze.
  17. 33. A tool used to explore or test a system.
  18. 34. A call for data or a service.
  19. 35. To follow the path of an action or data flow.
  20. 39. Following laws, rules, or standards.
  21. 40. Official rule made by authorities.
  22. 42. Something unusual that may signal a problem.
  23. 44. Monitoring to make sure rules are followed.
  24. 46. Protection against threats or attacks.
  25. 48. An event that disrupts normal operations.
  26. 50. A saved copy of data in case of loss.
  27. 51. A step taken to solve a problem.
  28. 52. A set of rules for communication.
  29. 55. Searching for threats inside a network.
  30. 56. Proof of an event or action.
  31. 58. A formal review of systems or processes.
  32. 59. A prediction based on information.
  33. 63. To watch or track activity.
  34. 64. A request for information from a database.
  35. 66. A user identity in a system.
Down
  1. 1. A sign that danger or problems may occur.
  2. 3. Unauthorized entry into a system.
  3. 4. A formal rule or guideline.
  4. 7. A document describing an event or findings.
  5. 8. A specific area or internet address space.
  6. 9. Long-term storage of old files.
  7. 10. A computer that provides resources to others.
  8. 11. A place where data is kept.
  9. 14. A piece of hardware used in computing.
  10. 15. Delay in data communication.
  11. 18. A set of connected computer components.
  12. 20. Someone who monitors or watches activity.
  13. 22. Programs used by a computer.
  14. 25. A risk or danger.
  15. 28. Related to money or cost.
  16. 30. A part of a larger software system.
  17. 31. The way a system or user acts.
  18. 36. Related to investigating cyber incidents.
  19. 37. Accidental or unlawful release of information.
  20. 38. To check a system for issues or threats.
  21. 41. A connection point in a network.
  22. 43. A secret code to access a system.
  23. 45. Numerical information used for analysis.
  24. 47. Belief that someone or something is reliable.
  25. 49. A person or system chosen for attack.
  26. 53. Too much data or activity for a system to handle.
  27. 54. A weakness that can be exploited.
  28. 57. Converting information into a secure code.
  29. 60. The path data takes to reach a destination.
  30. 61. Permission to use or enter a system.
  31. 62. Measurements used to evaluate performance.
  32. 65. Information stored or processed by computers.