Across
- 2. The right to keep personal data protected.
- 5. Learning skills or knowledge.
- 6. Records of system activities.
- 9. Studying information to understand it.
- 12. Connected computers that share data.
- 13. Instructions written for computers.
- 16. A direct instruction given to a computer.
- 17. The chance that something bad may happen.
- 19. Use of technology to perform tasks without human input.
- 21. A break in security where data is exposed.
- 23. Rules about what is morally right or wrong.
- 24. The ability to manage or direct something.
- 26. A system on which applications can run.
- 27. A tool that blocks unwanted network traffic.
- 29. Continuous flow of data.
- 32. A simplified digital structure used to predict or analyze.
- 33. A tool used to explore or test a system.
- 34. A call for data or a service.
- 35. To follow the path of an action or data flow.
- 39. Following laws, rules, or standards.
- 40. Official rule made by authorities.
- 42. Something unusual that may signal a problem.
- 44. Monitoring to make sure rules are followed.
- 46. Protection against threats or attacks.
- 48. An event that disrupts normal operations.
- 50. A saved copy of data in case of loss.
- 51. A step taken to solve a problem.
- 52. A set of rules for communication.
- 55. Searching for threats inside a network.
- 56. Proof of an event or action.
- 58. A formal review of systems or processes.
- 59. A prediction based on information.
- 63. To watch or track activity.
- 64. A request for information from a database.
- 66. A user identity in a system.
Down
- 1. A sign that danger or problems may occur.
- 3. Unauthorized entry into a system.
- 4. A formal rule or guideline.
- 7. A document describing an event or findings.
- 8. A specific area or internet address space.
- 9. Long-term storage of old files.
- 10. A computer that provides resources to others.
- 11. A place where data is kept.
- 14. A piece of hardware used in computing.
- 15. Delay in data communication.
- 18. A set of connected computer components.
- 20. Someone who monitors or watches activity.
- 22. Programs used by a computer.
- 25. A risk or danger.
- 28. Related to money or cost.
- 30. A part of a larger software system.
- 31. The way a system or user acts.
- 36. Related to investigating cyber incidents.
- 37. Accidental or unlawful release of information.
- 38. To check a system for issues or threats.
- 41. A connection point in a network.
- 43. A secret code to access a system.
- 45. Numerical information used for analysis.
- 47. Belief that someone or something is reliable.
- 49. A person or system chosen for attack.
- 53. Too much data or activity for a system to handle.
- 54. A weakness that can be exploited.
- 57. Converting information into a secure code.
- 60. The path data takes to reach a destination.
- 61. Permission to use or enter a system.
- 62. Measurements used to evaluate performance.
- 65. Information stored or processed by computers.
