iSEC Dimensions, CrossWord

123456789101112131415
Across
  1. 2. CPRA, DPDPA, GDPR all these regulations ensure.
  2. 6. Attack where malicious user can use the cloud to mine cryptocurrency.
  3. 7. A cyberattack that floods a network to make it unavailable.
  4. 8. A service that continuously evaluates the security of cloud services and recommends improvements.
  5. 10. The process of restoring data and systems after an attack or failure.
  6. 11. The process of verifying the identity of a user or system.
  7. 12. A framework for managing organizational risks.
  8. 14. Risk management approach that accepts certain risks rather than taking actions.
Down
  1. 1. A system used to monitor and control network traffic.
  2. 3. The process of ensuring access control in the cloud enviorment using tokens or certificates.
  3. 4. An attack where malicious actors exploit poorly configured cloud storage.
  4. 5. A software tool designed to detect and safeguard from malicious software.
  5. 9. Red team and Blue team are integral part of.
  6. 13. The ability to recover data after loss or damage, typically in a cloud environment.
  7. 15. Objective of GDPR is to safeguard.