CYBERSECURITY

1234567
Across
  1. 2. ... device forensics roots began when mobile devices started to become popular, about 2000.
  2. 4. Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
  3. 5. ...are fast moving and increasing in number and severity.
Down
  1. 1. ISACA publication Transforming ...
  2. 3. Digital forensics scientific process: ...of custody.
  3. 6. ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
  4. 7. Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.