Across
- 2. Be ready to bend and bounce back
- 5. The shadow you measure before it bites
- 7. Attacker’s movement sideways inside a system
- 9. Keeping an up-to-date list of tech devices and apps
- 10. A promise you hold without a receipt
- 11. Splitting networks to block threat spread
- 12. Intent written down so it can’t wander
Down
- 1. Rules limiting who can see or do things
- 3. Government rule guiding healthcare data protection
- 4. Extra layer proving who you are during login
- 6. Many little fences inside one yard
- 8. Things you label so you don’t forget
