Across
- 1. This aerospace manufacturer announced that open source, hybrid cloud and AI technologies from IBM and Red Hat are part of its second mission.
- 3. Form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
- 5. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
- 9. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was ___
- 10. A Person who uses technology to gain unauthorized access to data is called a ___ .
- 11. To avoid ____________, user input should not be put directly into a database.
- 15. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers.
- 16. A group of protocols used to encrypt data between two communication points.
- 17. A protocol used for directory services authentication that was first developed in 1993.
- 19. The _____________ ransomware group recently hacked a networking giant by compromising an employee’s personal google account.
- 20. “Never trust, always verify” is the first defining principle of which model
Down
- 2. I have a dual role in MaaS Architecture –CDN and WAF. Which vendor are we talking about?
- 4. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships.
- 6. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
- 7. Cross-site scripting standing in front of amirror
- 8. Vast Strides –I help in identifying Security Vulnerabilities
- 12. One-way street to persisting top secrets
- 13. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
- 14. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
- 18. Recent IBM security acquisition of an endpoint security company.
