Across
- 3. - Notorious group known for exploiting vulnerabilities for profit
- 6. - The tool of choice for a thief who likes to play hide and seek
- 9. - The process of scrambling information to keep it secret
- 11. - The principle of limiting access based on user needs
- 12. - Protocol used for authentication in Microsoft networks
Down
- 1. - Crafty crew that snatches your secrets without a sword
- 2. - Ritual of sharpening defenses to keep the bad guys at bay
- 4. - Structured guide that outlines how to respond to threats
- 5. - Secretive moves of an attacker, often hidden in plain sight
- 7. - The secret playbook of cyber mischief-makers
- 8. - Legendary flaw that opens doors without knocking
- 10. - Ransomware tactic that involves manipulating security software
