Security Crossword

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. A system that binds public keys with identities
  2. 3. CVP of ID PM at MS
  3. 4. An avid skateboarder started this widely admired security company
  4. 6. The TF in 17 Across was the architect for this technology
  5. 7. Where you might specify a number used once
  6. 8. First name, middle name, and surname, but for computers
  7. 9. Sneaky character commonly found in discussions about Alice and Bob
  8. 11. Used in silver ticket attacks: T??
  9. 15. A security MVP with a popular AAD blog whom the author introduced to 17 across
  10. 17. AAD researcher you might meet in Finland
  11. 20. CVP of ID was once a Director of Development for this remote access protocol
  12. 24. Controversial variable name discovered in Windows in 1999
  13. 26. Mallory specializes in this kind of attack
  14. 28. Before you login into Office365, you first interact with this popular service
  15. 29. You might pass the hash to attack this
  16. 31. XML oriented standard full of assertions
  17. 32. I?? Acronym for IT dept most likely to manage AD
Down
  1. 1. Preauthentication process involving X.509
  2. 2. Your UPN could be considered to be a form of this
  3. 3. Known for its utility with SSO
  4. 5. A container of sorts in AD parlance
  5. 6. Dir. PM of ID Sec. at MS
  6. 10. Alan Turing built a bombe to crack this
  7. 12. To issue X.509 certificates, you'd stand up one of these
  8. 13. To understand the internals of an unknown protocol, one might do this to it
  9. 14. The prefix in the flags ??_KEYEXCHANGE and ??_SIGNATURE used in MS CryptoAPI
  10. 15. Architect behind Microsoft's two most widely used identity systems
  11. 16. Keeper of secrets in Windows
  12. 18. SYSKEY was introduced to help encrypt this
  13. 19. The NTLM hash is sometimes referred to as this
  14. 20. Container of claims in SAML
  15. 21. Fill in the missing letters of this cipher known in the 90s for augmented security: 3??S
  16. 22. One way or Two way
  17. 23. Alliance determined to replace passwords with stronger alternatives
  18. 25. One might use this to mitigate a rainbow table attack
  19. 27. Tina Turner ex-husband that shares a name with IPSEC protocol
  20. 30. Popular utility for 'handling' Windows credentials
  21. 31. A salve for password fatigue