Across
- 2. malware intentionally staying inactive
- 3. the kind of "IT" that happens when employees buy apps without telling the boss
- 6. what incident response becomes when documentation is missing
- 8. the "footprints" left behind in the sow after a digital intruder has fled
- 10. a "phish" that only aims for the "biggest fish" (CEOs and Board members)
- 11. the digital "companion" portal for reporting stolen phones and blocking lost IMEIs across india
- 13. an attempt to harm a system
- 14. the process of "toughening-up" a system by closing every unnecessary port
- 17. the "stubborn animal" accounts (over 24 lakh of them) that the RBI ordered banks to shut down by 2026.
- 18. The "great escape" where stolen data sneaks out past the perimeter
- 19. one way transformation used for password change
- 22. What your expensive smartphone becomes after a particularly bad fimware update
- 24. a control that fails the moment it becomes visible
- 25. The "sideways" movement an attacker takes once they've gotten inside
Down
- 1. trust the "suspicious roommate" policy mandated by RBI in 2025; verify everyone, trust no one
- 4. The brewing giant that had to "pour out" it's operations in late 2025 after Qilin tapped into their servers
- 5. exploitation of human trust instead of technical flaws
- 7. the "daily chores" of a system admin- clearing logs, rotating keys, and taking out digital trash.
- 9. the digital "invisibility suit" worn by a hacker, or a folder meant to be hidden
- 12. persuading an AI to ignore its "digital guardrails" and explain how to rob a bank
- 15. the "front porch" of a network where all outside traffic must first step
- 16. a network of infected computers
- 20. a safe environment to test untrusted code
- 21. the "final guess" an AI makes when it sees a new file and decides if it's a virus or a vacation photo
- 23. An acronym for software that isn't quite a virus, but you definitely didn't want it
