CTF-CW6

1234567891011121314151617181920
Across
  1. 5. The robot butler for incident response
  2. 6. The housekeeper for your digital vault
  3. 7. The digital signature no one can forge
  4. 10. At Tekion, nothing launches past this checkpoint without a security stamp!
  5. 11. Building products with privacy protections from the start
  6. 15. The club bouncer’s preferred guest list
  7. 17. Swapping out names with code numbers in datasets
  8. 18. Not you, not me, but the other guy
  9. 19. The toy box for suspicious files
Down
  1. 1. Hall monitor for regulations
  2. 2. Only requesting essential personal questions on a signup form
  3. 3. The “pest control” for your servers
  4. 4. The Tupperware for your applications
  5. 8. VIP pass for allowed apps and users
  6. 9. No stickynotes—1password’s where Tekion hides the keys!
  7. 12. When your umbrella has a hole—it leaks risk!
  8. 13. The “oops” log for Tekion’s digital slip-ups.
  9. 14. Cyber bouncer’s checklist
  10. 16. Conversation with a website’s memory
  11. 20. Four-letter acronym that stops privacy disasters before they start (abbr.)!