MGR-22 CROSSWORD CONTEST

12345678910111213141516171819202122
Across
  1. 5. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
  2. 9. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
  3. 10. IBM worked with __________ to create a scalable CRM platform, called Customer 360, which gives every part of IBM a holistic view into the client journey and cuts time to issue resolution by 26%
  4. 12. “Never trust, always verify” is the first defining principle of which model
  5. 15. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
  6. 16. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers
  7. 18. This aerospace manufacturer announced that open source, hybrid cloud, and AI technologies from IBM and Red Hat are part of its second mission
  8. 21. One-way street to persisting top secrets
Down
  1. 1. Decoy computers or systems that lure hackers and cybercriminals into attacking them
  2. 2. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships
  3. 3. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
  4. 4. ensure the sensitive data is accessed only by an authorized user
  5. 6. A Person who uses technology to gain unauthorized access to data is called a _____
  6. 7. Recent IBM security acquisition of an endpoint security company.
  7. 8. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was _____
  8. 11. The _____________ ransomware group was involved in the recent hacking of a networking giant by compromising an employee’s personal google account.
  9. 13. Cross-site scripting standing in front of a mirror
  10. 14. To avoid ____________, user input should not be put directly into a database
  11. 17. Vast Strides –I help in identifying Security Vulnerabilities
  12. 19. A form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
  13. 20. A protocol used for directory services authentication that was first developed in 1993
  14. 22. A group of protocols used to encrypt data between two communication points.