CTF-CW-10

1234567891011121314151617181920
Across
  1. 3. The practice of hiding meaning in messages
  2. 4. Service at Tekion for simplifying software requests.
  3. 7. Sprint and issue management dashboard at Tekion.
  4. 11. Requirement to delete data when no longer needed for its purpose
  5. 15. GDPR requirement to gather least amount of data needed
  6. 16. Keeping personal or sensitive information safe
  7. 18. Establishing true user identity
  8. 19. International standard for Privacy Information Management Systems
  9. 20. (Triplicate) Adversary methods description
Down
  1. 1. (Duplicate) Handling threats as a team
  2. 2. (Duplicate) Plan for handling security disasters
  3. 5. United Kingdom's post-Brexit data protection regulation
  4. 6. (Duplicate) Host-level monitoring security tool
  5. 8. Ensuring data hasn�t been changed or tampered
  6. 9. Person in charge of independent checks
  7. 10. Test run or legal proceeding
  8. 12. More than password needed to get in (again
  9. 13. Choosing how to handle each identified threat
  10. 14. Measure to prevent unwanted events
  11. 17. Cloud-based security layer used by Tekion to protect its websites from online attacks.