CTF-CW9
Across
- 4. How long the burglar napped on your couch
- 5. When private information escapes through a security hole
- 8. Security’s holy trinity
- 10. Cyber-spying with nothing but your browser
- 11. The wolf that really is at the door
- 13. “Call in the boss! This is above my pay grade!”
- 14. The mess you started with
- 15. The “seatbelt” for your sensitive files
- 16. The report card for tech companies
- 17. Who’s a good watchdog for Tekion? This one!
- 18. Approach to artificial intelligence that seeks to prevent negative consequences
- 20. Fancy word for “the cool stuff we own”
Down
- 1. The matrix for your servers
- 2. Privacy settings are strict unless the user loosens them
- 3. Obfuscation method that answers queries with a bit of added uncertainty
- 6. Where every hacker at Tekion learns to play defense.
- 7. Rulebook for your info
- 9. Tekion’s own “fraud detector”—spotting fake sites before they fool anyone!
- 12. IKEA instructions for crisis moments
- 19. Your data’s magic decoder ring