Super Cryptic Cyber Crossword 9000

12345678910111213141516171819202122232425262728293031
Across
  1. 3. Password 2.0.
  2. 4. Spoofing, at the very top of the company’s hierarchy.
  3. 6. Protecting your door with a lock made of Cheetos
  4. 9. Online advertising used to spread malware.
  5. 10. Much stronger than SMS, but weaker than U2F.
  6. 13. A Wi-Fi access point that wants to hurt you, bad…
  7. 18. Oh you wanted access to your system? NOPE.
  8. 19. Everyone needs protection… even Wi-Fi connections in hotel lobbies!
  9. 20. Reason #999 not to use SMS as an MFA mechanism.
  10. 24. Isolates an application, a web browser, or a piece of code inside a safe environment for testing or processing.
  11. 26. registering or using a domain that's similar to, but not typographically identical with, another domain to direct Internet users who carelessly type a url.
  12. 27. Pay us money… or else have fun having no access to your files!
  13. 28. Don’t get (personally) hooked!
  14. 30. A system within organizations, people, activities, information, and resources involved in supplying a product or service to a consumer.
  15. 31. An item of value and/or importance to our business operations.
Down
  1. 1. Hide this to have a (minor) edge over your Wi-Fi attackers!
  2. 2. Lets you authenticate by the way you sign your name or walk the walk!
  3. 5. An orchestrated marketing or PR campaign in the guise of unsolicited comments from members of the public.
  4. 7. This is how I prove who I claim to be to a system.
  5. 8. You swipe your card into the reader, I will blindly follow.
  6. 11. The risk posture of our company is situated somewhere between a bank and this.
  7. 12. Ninja IT’s meaner and nastier cousin.
  8. 14. A security model which assumes that there is always at least one person on every team that is compromised or coerced.
  9. 15. The internet’s telephone directory.
  10. 16. A vendor assessment a day keeps external audits away.
  11. 17. Phishing for those partial to phone calls.
  12. 21. Don’t get hooked to this social “experiment”!
  13. 22. Finding private and usually sensitive information about a person or an organization, and then publishing that information without authorization.
  14. 23. The practice and study of methods for hiding information.
  15. 25. I will execute independently and self-replicate through your network connections. Sounds cool, eh?
  16. 29. Defines and manages controls that an organization needs to implement.