Across
- 1. combines and provides threat intelligence feeds to end users
- 5. detects all endpoint threats
- 8. allows users to run multiple instances of operating systems
- 10. tools hinders investigation
- 12. consists of identification and selection of data
- 13. is a process that allows one to obtain a bit-for-bit copy of data to avoid damage of original data
Down
- 2. testing checks the effectiveness of security defenses
- 3. incorporates security assurance at every stage
- 4. converts the information extracted to a format that can be understood by investigators
- 6. combines agile development, agile infrastructure, and flexible operations
- 7. is a Windows application to attain IP address
- 9. displays help
- 11. helps to make directory
