Cryptober Puzzle #4

12345678910111213141516
Across
  1. 6. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  2. 9. the process involved in creating a system of prevention and recovery from potential threats to a company
  3. 10. Software designed for checking packets of data transferred over the Internet
  4. 12. A method of overloading a predefined amount of memory storage in a buffer, which can potentially overwrite and corrupt memory beyond the buffer’s boundaries.
  5. 14. We provide data, software, services, and research to government agencies, exchanges, financial institutions, and insurance and cybersecurity companies in over 60 countries
  6. 15. a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.
  7. 16. A Phishing Attack Aimed at a Senior Executive
Down
  1. 1. A technology allows producers to place anyone's likeness and/or voice in an existing image, video or audio clip, and can even be used to create entirely fictional photos from scratch.
  2. 2. a real-time cryptocurrency transaction monitoring product that allows our customers to comply with anti money laundering regulations.
  3. 3. Elon Musk used his Twitter platform to express his views on which cryptocurrencies?
  4. 4. the investigation software that connects cryptocurrency transactions to real-world entities, enabling you to combat criminal activity on the blockchain.
  5. 5. a digital database containing information (such as records of financial transactions) that can be simultaneously used and shared within a large decentralized, publicly accessible network
  6. 7. leverages the transparency of the blockchain to provide real-world data and the unique insights needed to conduct cryptocurrency research and make investment decisions.
  7. 8. Malware that holds the data of a computer user for ransom.
  8. 11. a system by which financial products become available on a public decentralized blockchain network
  9. 13. A ​​method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence.