021-1
Across
- 1. Term for when security is breached
- 5. Malicious code used in the attack
- 7. Joint groups formed to improve cybersecurity
- 8. Efforts to reduce the impact of the attack
- 10. Tech giant also affected by the attack
- 13. Public and private sectors working together
- 14. Russian state-sponsored group behind the attack
- 15. U.S. Department of Homeland Security's response
- 17. Type of actor behind the attack
- 19. Another name for the attackers
- 20. Key focus in the aftermath of the attack
- 22. Type of analysis conducted to investigate the attack
- 24. Weaknesses exploited by the attackers
Down
- 2. Techniques used by attackers to avoid detection
- 3. Another term for the security incident
- 4. Process of uncovering the details of the attack
- 5. U.S. response to the attack
- 6. IT company at the center of the attack
- 9. The effect of the attack on organizations
- 11. Cybersecurity firm that discovered the breach
- 12. Software updates released by SolarWinds
- 16. Actions pursued against the attackers
- 18. U.S. department that was compromised
- 21. U.S. body that held hearings on the attack
- 23. SolarWinds product that was compromised