Activity

12345678910111213
Across
  1. 1. combines and provides threat intelligence feeds to end users
  2. 5. detects all endpoint threats
  3. 8. allows users to run multiple instances of operating systems
  4. 10. tools hinders investigation
  5. 12. consists of identification and selection of data
  6. 13. is a process that allows one to obtain a bit-for-bit copy of data to avoid damage of original data
Down
  1. 2. testing checks the effectiveness of security defenses
  2. 3. incorporates security assurance at every stage
  3. 4. converts the information extracted to a format that can be understood by investigators
  4. 6. combines agile development, agile infrastructure, and flexible operations
  5. 7. is a Windows application to attain IP address
  6. 9. displays help
  7. 11. helps to make directory