Across
- 3. She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”
- 4. This astronomer caught the first advanced persistent threat and wrote about it in the 1989 book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage”
- 6. He gained unauthorized access to dozens of computer networks. Arrested by the FBI in 1995, he pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, resulting in five years in prison. Now he runs a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing.
- 9. He exposed some of the biggest data breaches ever, including the ones at Target and Home Depot. He has also written several books chronicling his extensive work investigating cyber-criminal gangs in Russia and elsewhere. But he is not related to the recently fired CISA director.
- 10. Best known for his work involving DNS cache poisoning, he is one of just seven people with the authority to restore the DNS root keys on the Internet in the event of an emergency.
- 11. He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.
- 12. This Cornell University graduate student created in 1988 the very first internet worm and denial-of-service (DoS) attack.
Down
- 1. She invented the Spanning Tree Protocol (STP) that builds a loop-free logical topology for Ethernet networks.
- 2. She created Microsoft’s Bug Bounty Program and the Hacker One Bug Bounty Program, where she helped create the Department of Defense's "Hack the Pentagon" pilot program.
- 5. As a researcher at BBN technologies, he realized in 1970 the possibilities of creating a program capable of moving in a network and leaving behind a trail.
- 7. Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period.
- 8. Created the haveibeenpwned.com website that allows anyone to check to see if their email or username has been compromised in major breaches.