Forensic Investigation and Incident Response

12345678910
Across
  1. 1. Identifying critical assets that could be at risk – what could go wrong?
  2. 4. Understanding the potential impacts of cyber threats were they to materialize is important.
  3. 5. process to ensure the needed logs data is collected and stored for an appropriate amount of time.
  4. 6. the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
  5. 7. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
  6. 10. Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
Down
  1. 2. Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
  2. 3. Identify and track the origin of data, software, and/or hardware elements.
  3. 8. info that can be of vital importance to the outcome of legal proceedings or investigations.
  4. 9. It is a technique used to consistently trick an adversary during a cyber-attack.