Across
- 4. Use of technology to perform tasks without human input.
- 6. A sign that danger or problems may occur.
- 8. Information stored or processed by computers.
- 10. A request for information from a database.
- 11. Accidental or unlawful release of information.
- 15. A risk or danger.
- 17. A specific area or internet address space.
- 19. A user identity in a system.
- 24. Related to money or cost.
- 27. A tool that blocks unwanted network traffic.
- 28. A document describing an event or findings.
- 30. The current condition of a system.
- 31. Related to investigating cyber incidents.
- 35. To check a system for issues or threats.
- 36. A computer that provides resources to others.
- 37. Too much data or activity for a system to handle.
- 41. Numerical information used for analysis.
- 42. A saved copy of data in case of loss.
- 46. Unauthorized entry into a system.
- 47. A piece of hardware used in computing.
- 49. A written record of actions or events.
- 50. Someone who monitors or watches activity.
- 53. A set of rules for communication.
- 55. Measurements used to evaluate performance.
- 56. A call for data or a service.
- 58. Permission to use or enter a system.
- 59. Proof of an event or action.
- 62. Programs used by a computer.
- 65. A person or system chosen for attack.
- 68. The ability to manage or direct something.
- 70. Long-term storage of old files.
- 71. A prediction based on information.
- 72. A formal review of systems or processes.
Down
- 1. A direct instruction given to a computer.
- 2. A formal rule or guideline.
- 3. To watch or track activity.
- 5. A part of a larger software system.
- 7. Official rule made by authorities.
- 9. Searching for threats inside a network.
- 12. Something unusual that may signal a problem.
- 13. Continuous flow of data.
- 14. A system on which applications can run.
- 16. Instructions written for computers.
- 18. An event that disrupts normal operations.
- 20. A weakness that can be exploited.
- 21. Monitoring to make sure rules are followed.
- 22. A secret code to access a system.
- 23. To follow the path of an action or data flow.
- 25. A mistake or problem in a system.
- 26. Information sent from one place to another.
- 29. A connection point in a network.
- 32. A place where data is kept.
- 33. Protection against threats or attacks.
- 34. Records of system activities.
- 35. To protect from harm or attacks.
- 38. Delay in data communication.
- 39. The way a system or user acts.
- 40. The right to keep personal data protected.
- 43. Belief that someone or something is reliable.
- 44. A set of connected computer components.
- 45. The path data takes to reach a destination.
- 48. A simplified digital structure used to predict or analyze.
- 51. An action taken after an incident.
- 52. Connected computers that share data.
- 54. The chance that something bad may happen.
- 57. Converting information into a secure code.
- 60. Following laws, rules, or standards.
- 61. A break in security where data is exposed.
- 63. A step taken to solve a problem.
- 64. Rules about what is morally right or wrong.
- 66. A tool used to explore or test a system.
- 67. Studying information to understand it.
- 69. Learning skills or knowledge.
