Cryptober 2022 - Week 4 - Crossword

12345678910
Across
  1. 5. Name the process for ensuring that data retained (in any format) is secure to help avoid a potential breach (e.g., unauthorized access or disclosure).
  2. 7. What is the retention period for email correspondence?
  3. 9. Injection, Broken Authentication and Sensitive Data Exposure are examples of bugs that Chainalysis wants to know about under which public policy?
  4. 10. What's the name of the process of preserving all forms of information relevant to legal proceedings?
Down
  1. 1. What is the first name of Chainalysis’ VP of security?
  2. 2. Which tool helped security to identify many unapproved applications located within Google, Slack and Zoom?
  3. 3. Name one of the industry standards that our security program is structured around?
  4. 4. What is the retention period for Product Development Data such as User Stories, Test Sets and Cases?
  5. 6. Which team should you notify In instances where unauthorized access or disclosure of data occurs?
  6. 8. What is stage 3 of the Application Security Engineering - Vulnerability Triage Policy?