CTF-CW-3S

1234567891011121314151617181920
Across
  1. 4. Granting users permission to resources
  2. 6. Network security system for filtering traffic
  3. 8. Internal Tekion tool for catching secret leaks in source code repositories.
  4. 11. Separating affected systems during security event
  5. 13. Visual map showing how personal information moves through systems
  6. 17. Step-by-step plan for responding to threat scenarios
  7. 18. Testing how well controls perform
  8. 19. Step to limit damage during an event
  9. 20. Science of investigating digital evidence
Down
  1. 1. Organized written information
  2. 2. Source code and CI/CD home for Tekion software teams.
  3. 3. Weakness that can be exploited in a system
  4. 5. Temporary interaction between user and system
  5. 7. Transparent communication about data collection and processing
  6. 9. Goal a control is designed to achieve
  7. 10. Strengthening defenses of computers or networks
  8. 12. Static code scanner in Tekion development workflows.
  9. 14. Manager for data integrity and compliance
  10. 15. European Union's comprehensive data protection regulation
  11. 16. Rules governing how long personal data can be stored