Across
- 6. Yearly requirement loved by all
- 7. The part of the internet that is accessible only through special software, such as Tor
- 11. The part of the internet not indexed by standard search engines
- 12. This type of hijacking involves redirecting netowrk traffic from its intended destination to a destination specified by the attacker
- 13. Demon-child brought forth to end mankind; manager
- 14. Utilizing fraudulent domains that resemble a trusted URL, but with a small typo
- 15. An attack that attempts to make a machine or network resource unabailable to its users by flooding it with traffic
- 19. Anglicized form of Gaelic Mag Fhionnachtaigh; manager
- 22. A highly motivated threat actor or threat actor group, usually sponsored by a nation-state (abbr)
- 23. Surnamed derived from “hood”; manager
- 27. Our boss’s last name in an alternate universe
- 28. Writer known for detective novels; manager
- 30. Searching for a WiFI network access point from a moving vehicle
- 31. A type of payment fraud that involves emails pretending to be from the CEO or another high-ranking official within a company, asking to initiate a wire transfer
- 33. 2016 Comerica acquisition in the Virginia Market
- 34. A bank employee who performs banking services for the public, such as cashing checks and accepting deposits
- 35. Phone number takeover using a variety of methods
Down
- 1. “Musky” first name of Comerica’s founder
- 2. Phishing that targets corporate executives
- 3. A person who transfers illicitly obstained funds on behalf of others
- 4. 2011 Comerica acquisition in the Texas Market
- 5. A server that functions as an intermediary between a user and other servers
- 8. Isn’t a Bank, but is a place that houses the people that make a bank.
- 9. The money put into a bank account
- 10. Community resource trusted by friends who become valued customers
- 12. Incorruptible transaction database shared by all the individuals in its system; keyword for vendor spam
- 16. Full packages of individuals PII
- 17. Fraud in which a threat actor gains access to a victim’s accounts (abbr)
- 18. Malicious software designed to “lock up” a system
- 20. Jedidiah doesn’t know what this is and this point is afraid to ask
- 21. Criminals often say they are doing it for the ___
- 24. A secret number or code that protects the security of an account
- 25. A financial agreement in which a neutral 3rd party ensures that a payment is made to a seller upon the buyer’s receipt
- 26. Land of many princes.
- 29. Winning pitching in Comerica Park’s first game
- 32. The process of protecting individual data items that could be used to reveal sensitive information
