CTF-CW-3S
Across
- 4. Granting users permission to resources
- 6. Network security system for filtering traffic
- 8. Internal Tekion tool for catching secret leaks in source code repositories.
- 11. Separating affected systems during security event
- 13. Visual map showing how personal information moves through systems
- 17. Step-by-step plan for responding to threat scenarios
- 18. Testing how well controls perform
- 19. Step to limit damage during an event
- 20. Science of investigating digital evidence
Down
- 1. Organized written information
- 2. Source code and CI/CD home for Tekion software teams.
- 3. Weakness that can be exploited in a system
- 5. Temporary interaction between user and system
- 7. Transparent communication about data collection and processing
- 9. Goal a control is designed to achieve
- 10. Strengthening defenses of computers or networks
- 12. Static code scanner in Tekion development workflows.
- 14. Manager for data integrity and compliance
- 15. European Union's comprehensive data protection regulation
- 16. Rules governing how long personal data can be stored