CTF-CW-2S

1234567891011121314151617181920
Across
  1. 4. Legal basis requiring explicit permission for data processing
  2. 7. Special rights or access levels in a system
  3. 9. Offensive security and threat-simulation platform at Tekion.
  4. 11. Privacy principle restricting how long personal data can be kept
  5. 12. Copying data for recovery after loss
  6. 14. AI-powered platform at Tekion that finds and fixes app code vulnerabilities.
  7. 17. Sequence of actions to achieve an outcome
  8. 19. Tactics, Techniques, and Procedures acronym
  9. 20. Self-replicating malware spreading through networks
Down
  1. 1. Unplanned event threatening data or operations
  2. 2. A company you hire to run your security monitoring remotely
  3. 3. Verifying identity to access a system
  4. 5. Canada's Personal Information Protection and Electronic Documents Act
  5. 6. Recovery strategy for a detected issue
  6. 8. Combining individual data points into statistical summaries to protect privacy
  7. 10. Document tracking known risks
  8. 13. Runtime application security platform deployed at Tekion.
  9. 15. Bringing operations back after an incident
  10. 16. International standards-setting organization
  11. 18. Data Loss Prevention: protecting info from leaving the network