CTF-CW-20

123456789101112131415161718
Across
  1. 2. When your security team comes with an external logo
  2. 4. When hackers turn computers into their own remote-control zombie army!
  3. 5. That missing shingle hackers march right through
  4. 7. The “one key” for all your digital doors
  5. 10. Fake data so realistic, even AI gets catfished.
  6. 13. Digital “naughty” list
  7. 15. “We’ll take our chances” - signed management
  8. 16. Playing tag with your problems
  9. 17. Gossipy details your files spill when you aren’t looking—take two!
  10. 18. The cyber squirm that keeps on moving
Down
  1. 1. The business progress postcard
  2. 2. Not getting in unless you BOTH know and show
  3. 3. Slice of time between project pit stops
  4. 6. The chess moves hackers (and defenders) use to outsmart each other in cyberspace.
  5. 8. All the coding action at Tekion stops here first!
  6. 9. At Tekion, this keeps our audits painless and our paperwork stress-free—compliance on autopilot!
  7. 11. No, your doctor can’t tweet your health check thanks to this law.
  8. 12. Where digital detectives go to play connect-the-dots after an incident.
  9. 14. Turning “password” into an uncrackable puzzle
  10. 15. Only the bold try redhunt at Tekion—it’s like laser tag for devs!