Across
- 1. combines and provides threat intelligence feeds to end users.
- 5. detects all endpoint threats.
- 8. allows users to run multiple instances of operating systems.
- 10. tools hinders investigation.
- 12. consists of identification and selection of data.
- 13. is a process that allows one to obtain a bit-for-bit copy of data to avoid damage of original data.
Down
- 2. testing checks the effectiveness of security defenses.
- 3. incorporates security assurance at every stage.
- 4. converts the information extracted to a format that can be understood by investigators.
- 6. combines agile development, agile infrastructure, and flexible operations.
- 7. is a Windows application to attain IP address.
- 9. displays help.
- 11. helps to make directory.
