CSAM 2020

12345678910111213141516171819
Across
  1. 2. A month dedicated to all things cybersecurity (acronym)
  2. 4. TIAA's cybersecurity mascot
  3. 5. Label often assigned to devices that are on a network; can be static or dynamic
  4. 9. The protection of internet connected systems and devices
  5. 11. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  6. 13. TIAA's one stop shop for computer and technical issues
  7. 14. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. 15. Ethical hacking; hacking for the greater good
  9. 16. A type of phishing that is more personalized to the end user
  10. 18. A concept where all devices are connected to the internet, such as household items
  11. 19. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
  1. 1. Unique hardware identifier; physical layer in the OSI model
  2. 3. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  3. 4. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  4. 6. What does VPN stand for
  5. 7. Someone with elevated access
  6. 8. Last name of TIAA's CISO
  7. 10. Software with malicious characteristics; often used to compromise a system
  8. 12. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  9. 17. An algorithmic method which hides characteristics of communication by converting it into various codes