CTF-CW-1S

1234567891011121314151617181920
Across
  1. 2. Dealing with crises as they happen
  2. 3. Replacing sensitive data with non-sensitive equivalents
  3. 9. Software designed to harm or exploit systems
  4. 12. Computer Emergency Response Team acronym
  5. 13. Applying updates to fix bugs or vulnerabilities
  6. 15. Confidence in a system’s reliability and integrity
  7. 16. Reading the fine print with a magnifying glass
  8. 18. Monitoring and analytics solution adopted by Tekion SOC
  9. 19. Identity and access management platform for login security at Tekion.
  10. 20. How far the flashlight shines on your work
Down
  1. 1. The fusion of security and IT operations for strong defense
  2. 4. Encoding data so only authorized can read
  3. 5. Verifying the claimed identity of a user, system, or device.
  4. 6. Entity determining purposes and means of personal data processing
  5. 7. California's comprehensive state law granting consumers rights over their personal information.
  6. 8. Document explaining how organization collects and uses personal data
  7. 10. Cloud-native tool at Tekion that safeguards running apps from attacks.
  8. 11. Because numbers never fudge the truth
  9. 14. The hole in your security bucket
  10. 17. A security team's overall defensive stance