Across
- 3. It is a technique used to consistently trick an adversary during a cyber-attack.
- 5. Identify and track the origin of data, software, and/or hardware elements.
- 6. Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
- 7. Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- 9. Identifying critical assets that could be at risk – what could go wrong?
- 10. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- 1. the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- 2. info that can be of vital importance to the outcome of legal proceedings or investigations.
- 4. Understanding the potential impacts of cyber threats were they to materialize is important.
- 8. process to ensure the needed logs data is collected and stored for an appropriate amount of time.