CTF-CW-7

1234567891011121314151617181920
Across
  1. 3. Making scrambled data readable again
  2. 7. Actively searching for cyber attackers
  3. 8. Assessment by outside professionals
  4. 9. API documentation and tryout platform at Tekion.
  5. 11. Automated remote data collection
  6. 14. Technique hiding original data with modified content
  7. 16. Record of all valuable items
  8. 18. Web application firewall by Akamai that protects Tekion�s websites.
  9. 19. Evaluation or court case
  10. 20. Technique making data unclear while preserving its utility
Down
  1. 1. Using technology to perform security tasks automatically
  2. 2. Security model: never trust, always verify
  3. 4. Gaining higher access than intended
  4. 5. Immediate patch for a critical bug
  5. 6. Documentation of all personal data processing activities
  6. 10. Learning sessions for staff
  7. 12. Smart procurement tool used by Tekion for purchasing.
  8. 13. European Union's comprehensive artificial intelligence regulation
  9. 15. Updating code to fix holes�again
  10. 17. A set of documented IT procedures