Across
- 2. A month dedicated to all things cybersecurity (acronym)
- 4. TIAA's cybersecurity mascot
- 5. Label often assigned to devices that are on a network; can be static or dynamic
- 9. The protection of internet connected systems and devices
- 11. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
- 13. TIAA's one stop shop for computer and technical issues
- 14. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
- 15. Ethical hacking; hacking for the greater good
- 16. A type of phishing that is more personalized to the end user
- 18. A concept where all devices are connected to the internet, such as household items
- 19. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
- 1. Unique hardware identifier; physical layer in the OSI model
- 3. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
- 4. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
- 6. What does VPN stand for
- 7. Someone with elevated access
- 8. Last name of TIAA's CISO
- 10. Software with malicious characteristics; often used to compromise a system
- 12. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
- 17. An algorithmic method which hides characteristics of communication by converting it into various codes