CTF-CW-11
Across
- 2. Document on every website about rules for handling details
- 4. When the cloud gets graded for playing by the compliance rulebook.
- 8. At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
- 9. The elevator hack from novice to boss
- 14. Tech world’s fire brigade—second shout
- 16. Safety scissors for your network
- 18. Tekion’s legendary vault no hacker can touch.
- 19. Buzzing threat hunter hangout
- 20. Pop-up or email outlining changes in how data gets used
Down
- 1. Any data, direct or indirect, that reveals a person’s identity
- 3. Processes to ensure robots don’t go rogue
- 5. When a hacker sneaks past your digital guard
- 6. The organization behind the ATT&CK plots
- 7. DNA test for who’s calling the shots
- 10. When your browser “remembers” you, for a while
- 11. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
- 12. Slamming the panic room door on hackers
- 13. Every journey’s pit stops
- 15. Red ink on the corporate report card
- 17. Info swap: turn gold into poker chips