Across
- 2. Harmful digital activity detected by the Fusion Center. 54 68 72 65 61 74
- 5. Key concept: ensuring business can recover from incidents. 52 65 73 69 6C 69 65 6E 63 65
- 6. Analyzes network activity and alerts on threats. 53 4F 43
- 8. Place where teams from across Mastercard collaborate to detect and respond to threats.46 75 73 69 6F 6E 43 65 6E 74 65 72
- 9. Study of protecting systems and networks. 43 79 62 65 72 73 65 63 75 72 69 74 79
- 10. The Fusion Center handles these to prevent data loss.49 6E 63 69 64 65 6E 74 73
- 11. “Trust is a _______.”43 75 72 72 65 6E 63 79
Down
- 1. An unwanted software program or attack. 4D 61 6C 77 61 72 65
- 3. Cyber teams must work together in this way. 43 6F 6C 6C 61 62 6F 72 61 74 69 6F 6E
- 4. The global company hosting our field trip. 4D 61 73 74 65 72 63 61 72 64
- 7. Digital evidence is analyzed here.46 6F 72 65 6E 73 69 63 73
