Forensic Investigation and Incident Response

12345678910
Across
  1. 3. It is a technique used to consistently trick an adversary during a cyber-attack.
  2. 5. Identify and track the origin of data, software, and/or hardware elements.
  3. 6. Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
  4. 7. Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
  5. 9. Identifying critical assets that could be at risk – what could go wrong?
  6. 10. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
  1. 1. the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
  2. 2. info that can be of vital importance to the outcome of legal proceedings or investigations.
  3. 4. Understanding the potential impacts of cyber threats were they to materialize is important.
  4. 8. process to ensure the needed logs data is collected and stored for an appropriate amount of time.