CTF-CW9

1234567891011121314151617181920
Across
  1. 4. How long the burglar napped on your couch
  2. 5. When private information escapes through a security hole
  3. 8. Security’s holy trinity
  4. 10. Cyber-spying with nothing but your browser
  5. 11. The wolf that really is at the door
  6. 13. “Call in the boss! This is above my pay grade!”
  7. 14. The mess you started with
  8. 15. The “seatbelt” for your sensitive files
  9. 16. The report card for tech companies
  10. 17. Who’s a good watchdog for Tekion? This one!
  11. 18. Approach to artificial intelligence that seeks to prevent negative consequences
  12. 20. Fancy word for “the cool stuff we own”
Down
  1. 1. The matrix for your servers
  2. 2. Privacy settings are strict unless the user loosens them
  3. 3. Obfuscation method that answers queries with a bit of added uncertainty
  4. 6. Where every hacker at Tekion learns to play defense.
  5. 7. Rulebook for your info
  6. 9. Tekion’s own “fraud detector”—spotting fake sites before they fool anyone!
  7. 12. IKEA instructions for crisis moments
  8. 19. Your data’s magic decoder ring