Cyber security - 2

12345678910111213
Across
  1. 3. A modern security approach that provides integrated security across distributed systems.
  2. 4. A framework for developing, implementing, and monitoring IT governance.
  3. 5. Ensuring that information is accessible only to those authorized to have access.
  4. 6. A form of public key encryption based on elliptic curves.
  5. 11. A cryptographic technique for verifying the authenticity of digital messages.
  6. 13. Strategies and tools to prevent unauthorized data transfer or access.
Down
  1. 1. Documentation of who handled evidence and when.
  2. 2. Software used to collect, preserve, and analyze digital evidence.
  3. 5. Routine practices for maintaining system health and improving security.
  4. 7. Tools that monitor end-user devices to detect and respond to threats.
  5. 8. Part of the internet not indexed by standard search engines and often used for illegal activity.
  6. 9. An attack that injects malicious scripts into content viewed by users.
  7. 10. An incident in which sensitive data is accessed without authorization.
  8. 11. An attack that floods a system with traffic to make it unavailable.
  9. 12. A method or code that takes advantage of a vulnerability.