Virtual Offsite 2020

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 6. Yearly requirement loved by all
  2. 7. The part of the internet that is accessible only through special software, such as Tor
  3. 11. The part of the internet not indexed by standard search engines
  4. 12. This type of hijacking involves redirecting netowrk traffic from its intended destination to a destination specified by the attacker
  5. 13. Demon-child brought forth to end mankind; manager
  6. 14. Utilizing fraudulent domains that resemble a trusted URL, but with a small typo
  7. 15. An attack that attempts to make a machine or network resource unabailable to its users by flooding it with traffic
  8. 19. Anglicized form of Gaelic Mag Fhionnachtaigh; manager
  9. 22. A highly motivated threat actor or threat actor group, usually sponsored by a nation-state (abbr)
  10. 23. Surnamed derived from “hood”; manager
  11. 27. Our boss’s last name in an alternate universe
  12. 28. Writer known for detective novels; manager
  13. 30. Searching for a WiFI network access point from a moving vehicle
  14. 31. A type of payment fraud that involves emails pretending to be from the CEO or another high-ranking official within a company, asking to initiate a wire transfer
  15. 33. 2016 Comerica acquisition in the Virginia Market
  16. 34. A bank employee who performs banking services for the public, such as cashing checks and accepting deposits
  17. 35. Phone number takeover using a variety of methods
Down
  1. 1. “Musky” first name of Comerica’s founder
  2. 2. Phishing that targets corporate executives
  3. 3. A person who transfers illicitly obstained funds on behalf of others
  4. 4. 2011 Comerica acquisition in the Texas Market
  5. 5. A server that functions as an intermediary between a user and other servers
  6. 8. Isn’t a Bank, but is a place that houses the people that make a bank.
  7. 9. The money put into a bank account
  8. 10. Community resource trusted by friends who become valued customers
  9. 12. Incorruptible transaction database shared by all the individuals in its system; keyword for vendor spam
  10. 16. Full packages of individuals PII
  11. 17. Fraud in which a threat actor gains access to a victim’s accounts (abbr)
  12. 18. Malicious software designed to “lock up” a system
  13. 20. Jedidiah doesn’t know what this is and this point is afraid to ask
  14. 21. Criminals often say they are doing it for the ___
  15. 24. A secret number or code that protects the security of an account
  16. 25. A financial agreement in which a neutral 3rd party ensures that a payment is made to a seller upon the buyer’s receipt
  17. 26. Land of many princes.
  18. 29. Winning pitching in Comerica Park’s first game
  19. 32. The process of protecting individual data items that could be used to reveal sensitive information