CTF-CW-7
Across
- 3. Making scrambled data readable again
- 7. Actively searching for cyber attackers
- 8. Assessment by outside professionals
- 9. API documentation and tryout platform at Tekion.
- 11. Automated remote data collection
- 14. Technique hiding original data with modified content
- 16. Record of all valuable items
- 18. Web application firewall by Akamai that protects Tekion�s websites.
- 19. Evaluation or court case
- 20. Technique making data unclear while preserving its utility
Down
- 1. Using technology to perform security tasks automatically
- 2. Security model: never trust, always verify
- 4. Gaining higher access than intended
- 5. Immediate patch for a critical bug
- 6. Documentation of all personal data processing activities
- 10. Learning sessions for staff
- 12. Smart procurement tool used by Tekion for purchasing.
- 13. European Union's comprehensive artificial intelligence regulation
- 15. Updating code to fix holes�again
- 17. A set of documented IT procedures