Across
- 3. A modern security approach that provides integrated security across distributed systems.
- 4. A framework for developing, implementing, and monitoring IT governance.
- 5. Ensuring that information is accessible only to those authorized to have access.
- 6. A form of public key encryption based on elliptic curves.
- 11. A cryptographic technique for verifying the authenticity of digital messages.
- 13. Strategies and tools to prevent unauthorized data transfer or access.
Down
- 1. Documentation of who handled evidence and when.
- 2. Software used to collect, preserve, and analyze digital evidence.
- 5. Routine practices for maintaining system health and improving security.
- 7. Tools that monitor end-user devices to detect and respond to threats.
- 8. Part of the internet not indexed by standard search engines and often used for illegal activity.
- 9. An attack that injects malicious scripts into content viewed by users.
- 10. An incident in which sensitive data is accessed without authorization.
- 11. An attack that floods a system with traffic to make it unavailable.
- 12. A method or code that takes advantage of a vulnerability.
