CTF-CW-10
Across
- 3. The practice of hiding meaning in messages
- 4. Service at Tekion for simplifying software requests.
- 7. Sprint and issue management dashboard at Tekion.
- 11. Requirement to delete data when no longer needed for its purpose
- 15. GDPR requirement to gather least amount of data needed
- 16. Keeping personal or sensitive information safe
- 18. Establishing true user identity
- 19. International standard for Privacy Information Management Systems
- 20. (Triplicate) Adversary methods description
Down
- 1. (Duplicate) Handling threats as a team
- 2. (Duplicate) Plan for handling security disasters
- 5. United Kingdom's post-Brexit data protection regulation
- 6. (Duplicate) Host-level monitoring security tool
- 8. Ensuring data hasn�t been changed or tampered
- 9. Person in charge of independent checks
- 10. Test run or legal proceeding
- 12. More than password needed to get in (again
- 13. Choosing how to handle each identified threat
- 14. Measure to prevent unwanted events
- 17. Cloud-based security layer used by Tekion to protect its websites from online attacks.