Cyber techniques

1234567
Across
  1. 3. Examining server and network records to trace unauthorized access
  2. 4. Working across borders to catch international cybercriminals.
  3. 6. A phrase used to describe how investigators trace stolen money
  4. 7. Collaborating with social media and telecom companies for metadata.
Down
  1. 1. Identifying patterns of suspicious online behavior using Artificial Intelligence
  2. 2. Recovering lost or hidden data from digital devices
  3. 5. Analyzing the behavior and tactics of suspects