CTF-CW4

1234567891011121314151617181920
Across
  1. 2. The before-pic of your cybersecurity fitness journey
  2. 4. The grown-ups table for company decisions
  3. 5. The “ctrl+z” for disasters
  4. 7. The set of powers (like access, erase) given to a person under privacy laws
  5. 11. “Don’t do this” in formal writing
  6. 14. The cyber-beehive buzzing with clues
  7. 15. Fortune-teller’s favorite word
  8. 16. The “red flags” in the cyber crime scene
  9. 17. AI method: models train locally so raw data stays put
  10. 18. At Tekion, say “LUMOS!” to light up your software requests.
  11. 19. The fire drill script for hackers
  12. 20. Every Tekion deploy “leaps” through this pond!
Down
  1. 1. To strip removed details linking data back to real people
  2. 3. Digital “pinkie promise” you can’t break
  3. 6. Making secrets so secret even you forget them
  4. 8. When your diary writes in code
  5. 9. Keeping receipts for your servers
  6. 10. The goal algorithms treat people equally, not favoring some over others
  7. 12. At Tekion, if you need software access, this smart gatekeeper lights the way—no magic wand required!
  8. 13. Ethical hackers playing hide-and-seek in your network