1. Word Search

Edit Answers
7223613427606283591674674..380 32.2.528.611500434615.27664097 21.5649167109.575.600716.28911 84821.2.79112621146.6228.93194 4.9..021580..4225542636231480. 549.01.44954.83961241354819862 75.2621.83.1660694706.5217.250 038816504702582373..28.5824643 8017.364821.0702193723174.9528 324362219123512.730098349043.8 137075384.54657467.39567..2382 925738827.325951219.8508221125 435926...9847032024533535243.3 325.583.6.4803417379237.52.22. 5710670.252639640.167619.59584 291119053.309.544202523.778374 362671350281..2991152365.51949 51.79.0702694971436544.3429.50 69537843.142016331014236419048 90581079737909259429649.749593 03636.060368435506645052296833 64260771711874174482605337041. .50.23.3327868896.976398814007 62.0.238733716555650.072.35... 01530364.9922917218044.7.50260 .76246282.1.9238.1632127.14.60 552577.63635.4206658.217724.26 42397063290174519.43.77.7.1819 7194.40093292.9004501583694916 054099.08313881.40888863307034
1.
Attestation
2.
Nonrepudiation
3.
Remediation
4.
Forensics
5.
Cryptography
6.
ThreatModeling
7.
PrivilegeEscalation
8.
LeastPrivilege
9.
ZeroTrust
10.
IdentityFederation
11.
SegregationOfDuties
12.
HeuristicAnalysis
13.
Obfuscation
14.
DataExfiltration
15.
Tokenization
16.
HomomorphicEncryption
17.
SideChannelAttack
18.
DenialOfService
19.
ManInTheMiddle
20.
DiffieHellman
21.
PostQuantumCrypto
22.
EllipticCurve
23.
Kerberos
24.
SupplyChainAttack
25.
SAML
26.
PKI
27.
FederatedIdentity
28.
CertificateTransparency
29.
AdvancedPersistentThreat
30.
RegulatoryCompliance