hi

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
Across
  1. 2. A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
  2. 5. A generic term encompassing decode and decipher
  3. 6. Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
  4. 7. Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
  5. 9. The service provider for CrowdStrike's internal training courses
  6. 14. The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
  7. 15. Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
  8. 16. CrowdStrike's CEO and co-founder; abbr
  9. 17. The property of being accessible and usable upon demand
  10. 19. Computer compromised with malicious code; used by a threat actor to perform remote commands
  11. 20. Hosting city of Fal.Con; abbr
  12. 21. Someone who uses a social network to create an account with a fake identity to deceive an individual
  13. 26. Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  14. 27. Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
  15. 29. As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
  16. 32. System of prevention and recovery from potential threats to a business; abbr
  17. 34. As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
  18. 37. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
  19. 39. String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  20. 42. An unauthorized user who attempts to or gains access to an information system
  21. 44. Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
  22. 45. CrowdStrike's annual cybersecurity convention; "___.Con"
  23. 46. Software that compromises the operation of a system by performing an unauthorized function or process
  24. 48. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
  25. 49. Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
  26. 53. A way to take advantage of a vulnerability in software
  27. 54. A cybersecurity company
  28. 55. The generic term encompassing encipher and encode
  29. 58. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  30. 59. The process of verifying the identity or other attributes of an entity
Down
  1. 1. Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
  2. 3. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  3. 4. A denial of service technique that uses numerous systems to perform the attack simultaneously
  4. 8. A recognizable, distinguishing pattern; typically used to sign documents
  5. 10. Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
  6. 11. Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
  7. 12. Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
  8. 13. Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
  9. 18. ___-Party Information
  10. 19. Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
  11. 22. A capability to limit network traffic between networks and/or information systems
  12. 23. Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  13. 24. General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
  14. 25. In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
  15. 28. The process of transforming plaintext into ciphertext
  16. 30. Type of analysis that determines what levels of impact to a system are tolerable; abbr
  17. 31. Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
  18. 33. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  19. 35. CrowdStrike threat hunting team
  20. 36. Intranet webpage for all things CrowdStrike-related; abbr
  21. 38. Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
  22. 40. Cryptographic network protocol for operating network services securely over an unsecured network; abbr
  23. 41. A dishonest scheme; a fraud
  24. 43. CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
  25. 47. Short form for "cryptography"
  26. 50. When someone uses a social network to create an account with a fake identity to deceive a concrete person
  27. 51. The process of transforming ciphertext into its original plaintext
  28. 52. Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
  29. 56. Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
  30. 57. Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
  31. 58. Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms