Across
- 3. Government rule guiding healthcare data protection
- 6. Be ready to bend and bounce back
- 7. Things you label so you don’t forget
- 11. The shadow you measure before it bites
- 12. Many little fences inside one yard
Down
- 1. Rules limiting who can see or do things
- 2. Attacker’s movement sideways inside a system
- 4. Intent written down so it can’t wander
- 5. Extra layer proving who you are during login
- 8. A promise you hold without a receipt
- 9. Splitting networks to block threat spread
- 10. Keeping an up-to-date list of tech devices and apps
