Across
- 3. Password 2.0.
- 4. Spoofing, at the very top of the company’s hierarchy.
- 6. Protecting your door with a lock made of Cheetos
- 9. Online advertising used to spread malware.
- 10. Much stronger than SMS, but weaker than U2F.
- 13. A Wi-Fi access point that wants to hurt you, bad…
- 18. Oh you wanted access to your system? NOPE.
- 19. Everyone needs protection… even Wi-Fi connections in hotel lobbies!
- 20. Reason #999 not to use SMS as an MFA mechanism.
- 24. Isolates an application, a web browser, or a piece of code inside a safe environment for testing or processing.
- 26. registering or using a domain that's similar to, but not typographically identical with, another domain to direct Internet users who carelessly type a url.
- 27. Pay us money… or else have fun having no access to your files!
- 28. Don’t get (personally) hooked!
- 30. A system within organizations, people, activities, information, and resources involved in supplying a product or service to a consumer.
- 31. An item of value and/or importance to our business operations.
Down
- 1. Hide this to have a (minor) edge over your Wi-Fi attackers!
- 2. Lets you authenticate by the way you sign your name or walk the walk!
- 5. An orchestrated marketing or PR campaign in the guise of unsolicited comments from members of the public.
- 7. This is how I prove who I claim to be to a system.
- 8. You swipe your card into the reader, I will blindly follow.
- 11. The risk posture of our company is situated somewhere between a bank and this.
- 12. Ninja IT’s meaner and nastier cousin.
- 14. A security model which assumes that there is always at least one person on every team that is compromised or coerced.
- 15. The internet’s telephone directory.
- 16. A vendor assessment a day keeps external audits away.
- 17. Phishing for those partial to phone calls.
- 21. Don’t get hooked to this social “experiment”!
- 22. Finding private and usually sensitive information about a person or an organization, and then publishing that information without authorization.
- 23. The practice and study of methods for hiding information.
- 25. I will execute independently and self-replicate through your network connections. Sounds cool, eh?
- 29. Defines and manages controls that an organization needs to implement.
