Security Cross Word

12345678910111213141516171819202122232425
Across
  1. 6. Virtual private connection over public networks
  2. 7. Restricting distribution based on sensitivity
  3. 8. Detects, blocks, and responds on endpoints (abbr.)
  4. 11. Legal framework protecting personal information
  5. 12. Network barrier enforcing traffic rules
  6. 13. Targeted, well-researched phishing attack
  7. 16. Manipulating people to bypass security
  8. 17. Program that demands payment to restore data
  9. 19. Authentication standard for phishing resistance
  10. 23. Application for generating/storing credentials
  11. 25. Principle: assume breach and verify explicitly
Down
  1. 1. Backups that enable restoration after attacks
  2. 2. Small software flaw exploited by attackers
  3. 3. Process of reporting an event to Security
  4. 4. Transforming data to unreadable form
  5. 5. Attack where criminals pose as executives
  6. 9. Practice of updating systems to fix flaws
  7. 10. Limiting access to only what’s needed
  8. 14. Protects data in transit on untrusted networks
  9. 15. Malicious software
  10. 18. Deceptive emails designed to steal information
  11. 20. Policy prohibiting unapproved tools
  12. 21. Security model emphasizing continuous verification
  13. 22. Second factor for identity verification
  14. 24. Preventing unauthorized data exfiltration (abbr.)