PaulinaNatalia

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
Across
  1. 3. An action taken after an incident.
  2. 7. A place where data is kept.
  3. 12. To protect from harm or attacks.
  4. 14. A tool that blocks unwanted network traffic.
  5. 16. Converting information into a secure code.
  6. 17. The right to keep personal data protected.
  7. 18. A computer that provides resources to others.
  8. 20. A tool used to explore or test a system.
  9. 23. The path data takes to reach a destination.
  10. 24. Programs used by a computer.
  11. 25. A part of a larger software system.
  12. 27. Information sent from one place to another.
  13. 28. A step taken to solve a problem.
  14. 30. A direct instruction given to a computer.
  15. 33. Use of technology to perform tasks without human input.
  16. 35. Learning skills or knowledge.
  17. 36. Following laws, rules, or standards.
  18. 39. A sign that danger or problems may occur.
  19. 40. The way a system or user acts.
  20. 42. Protection against threats or attacks.
  21. 43. Rules about what is morally right or wrong.
  22. 44. Connected computers that share data.
  23. 46. Delay in data communication.
  24. 47. A specific area or internet address space.
  25. 48. A mistake or problem in a system.
  26. 50. Instructions written for computers.
  27. 51. A connection point in a network.
  28. 52. Permission to use or enter a system.
  29. 53. A risk or danger.
  30. 56. Too much data or activity for a system to handle.
  31. 58. Official rule made by authorities.
  32. 60. A system on which applications can run.
  33. 62. Belief that someone or something is reliable.
  34. 65. Information stored or processed by computers.
  35. 66. A prediction based on information.
  36. 68. A document describing an event or findings.
  37. 69. A formal review of systems or processes.
Down
  1. 1. Unauthorized entry into a system.
  2. 2. Related to money or cost.
  3. 4. Continuous flow of data.
  4. 5. Someone who monitors or watches activity.
  5. 6. The ability to manage or direct something.
  6. 8. Something unusual that may signal a problem.
  7. 9. A call for data or a service.
  8. 10. A break in security where data is exposed.
  9. 11. A request for information from a database.
  10. 12. Numerical information used for analysis.
  11. 13. Records of system activities.
  12. 15. A set of connected computer components.
  13. 17. A set of rules for communication.
  14. 19. A secret code to access a system.
  15. 21. Monitoring to make sure rules are followed.
  16. 22. To watch or track activity.
  17. 24. To check a system for issues or threats.
  18. 26. A formal rule or guideline.
  19. 29. Related to investigating cyber incidents.
  20. 31. Long-term storage of old files.
  21. 32. Searching for threats inside a network.
  22. 34. Proof of an event or action.
  23. 37. Measurements used to evaluate performance.
  24. 38. An event that disrupts normal operations.
  25. 41. A weakness that can be exploited.
  26. 45. A written record of actions or events.
  27. 49. The chance that something bad may happen.
  28. 52. A user identity in a system.
  29. 54. A simplified digital structure used to predict or analyze.
  30. 55. Studying information to understand it.
  31. 57. To follow the path of an action or data flow.
  32. 59. The current condition of a system.
  33. 61. Accidental or unlawful release of information.
  34. 63. A person or system chosen for attack.
  35. 64. A saved copy of data in case of loss.
  36. 67. A piece of hardware used in computing.