CTF-CW7

1234567891011121314151617181920
Across
  1. 2. Logbook tracking all the data-handling jobs run by a company
  2. 4. Strangers checking under the rug
  3. 7. Tekion’s online bouncer from Akamai—blocking cyber troublemakers at the front door!
  4. 9. Sewing up another digital rip
  5. 11. Hacking your way up the office ladder
  6. 13. Hide-and-seek champ, cybersecurity edition
  7. 15. Hiding credit card details with asterisks in statements
  8. 17. Swaggers in so every Tekion API gets its time to shine!
  9. 18. Give it a spin before you buy—or face the judge!
  10. 19. Security’s version of duct-taping a leak
  11. 20. The recipe card for fixing cyber messes
Down
  1. 1. Data from your system’s fitbit
  2. 3. Mixing up data to make it hard to interpret
  3. 5. The “no free hugs” approach to access
  4. 6. New European law aiming to make AI safe, fair, and compliant
  5. 8. Company’s treasure map
  6. 10. At Tekion, even buying office supplies is a breeze with this zippy tool!
  7. 12. Class time for grownups
  8. 14. Turning secret code into plain gossip
  9. 16. Letting the bots handle the boring stuff