hi
Across
- 2. A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- 5. A generic term encompassing decode and decipher
- 6. Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- 7. Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- 9. The service provider for CrowdStrike's internal training courses
- 14. The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- 15. Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- 16. CrowdStrike's CEO and co-founder; abbr
- 17. The property of being accessible and usable upon demand
- 19. Computer compromised with malicious code; used by a threat actor to perform remote commands
- 20. Hosting city of Fal.Con; abbr
- 21. Someone who uses a social network to create an account with a fake identity to deceive an individual
- 26. Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- 27. Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- 29. As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- 32. System of prevention and recovery from potential threats to a business; abbr
- 34. As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- 37. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- 39. String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- 42. An unauthorized user who attempts to or gains access to an information system
- 44. Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- 45. CrowdStrike's annual cybersecurity convention; "___.Con"
- 46. Software that compromises the operation of a system by performing an unauthorized function or process
- 48. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- 49. Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- 53. A way to take advantage of a vulnerability in software
- 54. A cybersecurity company
- 55. The generic term encompassing encipher and encode
- 58. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- 59. The process of verifying the identity or other attributes of an entity
Down
- 1. Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- 3. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- 4. A denial of service technique that uses numerous systems to perform the attack simultaneously
- 8. A recognizable, distinguishing pattern; typically used to sign documents
- 10. Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- 11. Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- 12. Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- 13. Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- 18. ___-Party Information
- 19. Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- 22. A capability to limit network traffic between networks and/or information systems
- 23. Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- 24. General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- 25. In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- 28. The process of transforming plaintext into ciphertext
- 30. Type of analysis that determines what levels of impact to a system are tolerable; abbr
- 31. Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- 33. The assurance that the confidentiality of, and access to, certain information about an entity is protected
- 35. CrowdStrike threat hunting team
- 36. Intranet webpage for all things CrowdStrike-related; abbr
- 38. Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- 40. Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- 41. A dishonest scheme; a fraud
- 43. CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- 47. Short form for "cryptography"
- 50. When someone uses a social network to create an account with a fake identity to deceive a concrete person
- 51. The process of transforming ciphertext into its original plaintext
- 52. Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- 56. Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- 57. Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- 58. Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms