Across
- 3. Intent written down so it can’t wander
- 6. A promise you hold without a receipt
- 7. Be ready to bend and bounce back
- 10. Many little fences inside one yard
- 11. Rules limiting who can see or do things
Down
- 1. Splitting networks to block threat spread
- 2. Extra layer proving who you are during login
- 4. Attacker’s movement sideways inside a system
- 5. Keeping an up-to-date list of tech devices and apps
- 8. Things you label so you don’t forget
- 9. Government rule guiding healthcare data protection
- 12. The shadow you measure before it bites
