Cyber - Technical words 6

Edit Answers
SYMMETRICENCRYPTIONO QPVGISWTUKXIASECVGVD VUXGGIYLZUVNBOYIPNJR TYKHMSAQORMEJUPIMIRM VSZGCYCLMVAEHLLWNGWR QUAYTLCVWIPTHGYCOAWM AOGHUAEYTYZKLQLGGMJG TLCLVNOLYYSKGLIWGIXN AKOSZAPFZBEWRCPOUCLI PBHBFGRWYJCCNIIKBILT VQSNCOIKZLUSWTWNQSRN SOEFKLSECURITYEVENTU SFLCZZWHWBIXYGXWLEVH CHAINOFCUSTODYZPVRDT OIEPFFGEGVYVIXGGBOJA OSECURITYBASELINEFGE KJYZROPZAOUBDHVYVSIR MNSBKAMDXMDCKUHKZTBH DMMFQXDOCQIXFRPYWLGT XCOBITGDPRTDITNNBTSJ
1.
Reviewing logs to detect suspicious or unauthorized activities.
2.
An evaluation of an organization's security policies and systems.
3.
A set of procedures for identifying and handling security incidents.
4.
An observable occurrence relevant to system security.
5.
Creating an exact copy of a digital device for investigation.
6.
Documentation of who handled evidence and when.
7.
Proactively searching for signs of malicious activity.
8.
A set of security settings that serve as a benchmark for systems.
9.
Encryption using the same key for both encryption and decryption.
10.
A framework for developing, implementing, and monitoring IT governance.
11.
A European regulation on data protection and privacy.
12.
A form of public key encryption based on elliptic curves.