Security puzzle

123456789101112131415161718192021222324
Across
  1. 5. The government is watching our certification through compliance
  2. 7. Mcdonald's _____ browns or the secure format to store passwords in a database
  3. 9. Not the loch ness monster but a dynamic scanning tool
  4. 11. Process for scanning federal VPCs before releases because the government says so
  5. 12. Following someone through physical security without using your own badge
  6. 14. Acronym for the three pillars of security, or an unrelated government agency
  7. 17. Example: 12 characters, 1 uppercase, 1 lowercase, 1 symbol, 1 blood of unicorn, 1 rabbit foot
  8. 18. Conference affectionately known as "hacker summer camp" held in Las Vegas every year
  9. 21. Tool used for vendor reviews
  10. 22. Representation of a system used to assess risk boundaries
  11. 24. Using (vulnerability #) to conduct an attack
Down
  1. 1. Something you have, something you know, something you are.. just a password is not enough
  2. 2. Public or private? Symmetric or asymmetric? Also unlocks doors
  3. 3. Use 1.2 or higher, formerly called SSL
  4. 4. Example: Entering in name as "1=1; drop table USER;"
  5. 6. Example: AJ sends you an urgent text message requesting youtube gift cards
  6. 8. A weakness in our code or configuration (example: log4j)
  7. 10. Process for evaluating security and privacy of medium/high risk features
  8. 13. Secure physical space to store user data
  9. 15. Example: <script>alert(1);</script>
  10. 16. Our endpoint protection product
  11. 19. How you sign in to get access to company resources
  12. 20. Internal password management tool
  13. 23. This organization publishes top ten vulnerabilities