Across
- 1. Stopping information from exfiltrating
- 4. Pair of tools for tracking and analyzing admin logins
- 7. - one of CIA triad
- 9. concept that allows company control on personal devices
- 12. - one of CIA triad
Down
- 1. Public/private key pair to ID sender email origination
- 2. group that simulates real world attacks
- 3. Virtualization tool
- 5. framework of adversarial attacks & techniques
- 6. Group of system & network defenders
- 8. architecture that requires continuous authentication
- 9. record that tells an email where it should go
- 10. index of known issues
- 11. government body that produces frameworks to guide policies
