CTF-CW-11

1234567891011121314151617181920
Across
  1. 2. Document on every website about rules for handling details
  2. 4. When the cloud gets graded for playing by the compliance rulebook.
  3. 8. At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
  4. 9. The elevator hack from novice to boss
  5. 14. Tech world’s fire brigade—second shout
  6. 16. Safety scissors for your network
  7. 18. Tekion’s legendary vault no hacker can touch.
  8. 19. Buzzing threat hunter hangout
  9. 20. Pop-up or email outlining changes in how data gets used
Down
  1. 1. Any data, direct or indirect, that reveals a person’s identity
  2. 3. Processes to ensure robots don’t go rogue
  3. 5. When a hacker sneaks past your digital guard
  4. 6. The organization behind the ATT&CK plots
  5. 7. DNA test for who’s calling the shots
  6. 10. When your browser “remembers” you, for a while
  7. 11. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
  8. 12. Slamming the panic room door on hackers
  9. 13. Every journey’s pit stops
  10. 15. Red ink on the corporate report card
  11. 17. Info swap: turn gold into poker chips