Across
- 3. An action taken after an incident.
- 7. A place where data is kept.
- 12. To protect from harm or attacks.
- 14. A tool that blocks unwanted network traffic.
- 16. Converting information into a secure code.
- 17. The right to keep personal data protected.
- 18. A computer that provides resources to others.
- 20. A tool used to explore or test a system.
- 23. The path data takes to reach a destination.
- 24. Programs used by a computer.
- 25. A part of a larger software system.
- 27. Information sent from one place to another.
- 28. A step taken to solve a problem.
- 30. A direct instruction given to a computer.
- 33. Use of technology to perform tasks without human input.
- 35. Learning skills or knowledge.
- 36. Following laws, rules, or standards.
- 39. A sign that danger or problems may occur.
- 40. The way a system or user acts.
- 42. Protection against threats or attacks.
- 43. Rules about what is morally right or wrong.
- 44. Connected computers that share data.
- 46. Delay in data communication.
- 47. A specific area or internet address space.
- 48. A mistake or problem in a system.
- 50. Instructions written for computers.
- 51. A connection point in a network.
- 52. Permission to use or enter a system.
- 53. A risk or danger.
- 56. Too much data or activity for a system to handle.
- 58. Official rule made by authorities.
- 60. A system on which applications can run.
- 62. Belief that someone or something is reliable.
- 65. Information stored or processed by computers.
- 66. A prediction based on information.
- 68. A document describing an event or findings.
- 69. A formal review of systems or processes.
Down
- 1. Unauthorized entry into a system.
- 2. Related to money or cost.
- 4. Continuous flow of data.
- 5. Someone who monitors or watches activity.
- 6. The ability to manage or direct something.
- 8. Something unusual that may signal a problem.
- 9. A call for data or a service.
- 10. A break in security where data is exposed.
- 11. A request for information from a database.
- 12. Numerical information used for analysis.
- 13. Records of system activities.
- 15. A set of connected computer components.
- 17. A set of rules for communication.
- 19. A secret code to access a system.
- 21. Monitoring to make sure rules are followed.
- 22. To watch or track activity.
- 24. To check a system for issues or threats.
- 26. A formal rule or guideline.
- 29. Related to investigating cyber incidents.
- 31. Long-term storage of old files.
- 32. Searching for threats inside a network.
- 34. Proof of an event or action.
- 37. Measurements used to evaluate performance.
- 38. An event that disrupts normal operations.
- 41. A weakness that can be exploited.
- 45. A written record of actions or events.
- 49. The chance that something bad may happen.
- 52. A user identity in a system.
- 54. A simplified digital structure used to predict or analyze.
- 55. Studying information to understand it.
- 57. To follow the path of an action or data flow.
- 59. The current condition of a system.
- 61. Accidental or unlawful release of information.
- 63. A person or system chosen for attack.
- 64. A saved copy of data in case of loss.
- 67. A piece of hardware used in computing.
