CTF-CW-9

1234567891011121314151617181920
Across
  1. 2. Native risk without any safety measures
  2. 6. Time attackers spend undetected
  3. 7. Raising a problem to higher-level personnel
  4. 8. Mathematical technique adding statistical noise to protect individual privacy
  5. 10. Trust service criteria audit report
  6. 11. Abbreviation for Confidentiality, Integrity, and Availability
  7. 14. Rules for managing and protecting data
  8. 17. Correctly identified security threat
  9. 18. Red team�s go-to platform for offensive security at Tekion.
  10. 20. Critical information for encryption and decryption
Down
  1. 1. Ensuring maximum privacy protection without user action required
  2. 3. Creating multiple simulated systems on one machine
  3. 4. Anti-phishing and brand protection platform adopted by Tekion.
  4. 5. Real-time monitoring tool at Tekion.
  5. 9. Ethical approach to artificial intelligence development and deployment
  6. 12. Anything of value owned or used
  7. 13. The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
  8. 15. (Duplicate) Procedures for automated or manual response actions
  9. 16. Gathering data from publicly available sources
  10. 19. Again, technology for preventing leaks