CTF-CW-5

123456789101112131415161718
Across
  1. 1. System�s ability to handle growth
  2. 3. Web Application Firewall: protects websites
  3. 5. When someone breaks a formal rule
  4. 6. Proof collected in a cyber investigation
  5. 7. Openness about security controls and processes.
  6. 9. Email security service trusted by Tekion.
  7. 11. Person/role overseeing rules or limits
  8. 14. Hiding real numbers with random stand-ins again
  9. 15. Process for managing computer security events
  10. 17. The things done to prevent or detect risks
  11. 18. Role managing security events
Down
  1. 2. Framework for managing artificial intelligence risks and compliance
  2. 4. Moral principles guiding artificial intelligence development
  3. 7. Innovation hub for new products at Tekion.
  4. 8. Individual whose personal data is being processed
  5. 9. Multi-factor authentication: more than password required
  6. 10. Steps to fix incident aftermath
  7. 12. Limits of coverage
  8. 13. Special cyberops expert team at Tekion.
  9. 16. Unique identifier for a networked device