Across
- 1. System�s ability to handle growth
- 3. Web Application Firewall: protects websites
- 5. When someone breaks a formal rule
- 6. Proof collected in a cyber investigation
- 7. Openness about security controls and processes.
- 9. Email security service trusted by Tekion.
- 11. Person/role overseeing rules or limits
- 14. Hiding real numbers with random stand-ins again
- 15. Process for managing computer security events
- 17. The things done to prevent or detect risks
- 18. Role managing security events
Down
- 2. Framework for managing artificial intelligence risks and compliance
- 4. Moral principles guiding artificial intelligence development
- 7. Innovation hub for new products at Tekion.
- 8. Individual whose personal data is being processed
- 9. Multi-factor authentication: more than password required
- 10. Steps to fix incident aftermath
- 12. Limits of coverage
- 13. Special cyberops expert team at Tekion.
- 16. Unique identifier for a networked device
