CTF-CW-11

1234567891011121314151617181920
Across
  1. 3. Tech world’s fire brigade—second shout
  2. 4. When the cloud gets graded for playing by the compliance rulebook.
  3. 6. VIOLATION Red ink on the corporate report card
  4. 7. Every journey’s pit stops
  5. 9. ESCALATION The elevator hack from novice to boss
  6. 12. IQ At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
  7. 16. POLICY Document on every website about rules for handling details
  8. 18. MODEL DNA test for who’s calling the shots
  9. 19. DATA Any data, direct or indirect, that reveals a person’s identity
  10. 20. When a hacker sneaks past your digital guard
Down
  1. 1. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
  2. 2. When your browser “remembers” you, for a while
  3. 5. Tekion’s legendary vault no hacker can touch.
  4. 8. SEGMENTATION Safety scissors for your network
  5. 10. Buzzing threat hunter hangout
  6. 11. GOVERNANCE Processes to ensure robots don’t go rogue
  7. 13. Slamming the panic room door on hackers
  8. 14. NOTICE Pop-up or email outlining changes in how data gets used
  9. 15. The organization behind the ATT&CK plots
  10. 17. Info swap: turn gold into poker chips