Across
- 3. Things you label so you don’t forget
- 4. Rules limiting who can see or do things
- 7. A promise you hold without a receipt
- 8. The shadow you measure before it bites
- 9. Government rule guiding healthcare data protection
- 10. Many little fences inside one yard
- 11. Intent written down so it can’t wander
Down
- 1. Extra layer proving who you are during login
- 2. Splitting networks to block threat spreads
- 3. Keeping an up-to-date list of tech devices and app
- 5. Be ready to bend and bounce back
- 6. Attacker’s movement sideways inside a system
