My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

DEVO Puzzle 1

Across
When one form of logging in once just isn't enough
The modern digital equivalent to moat and drawbridge that protects your castle ENCRYPTION - What you should ALWAYS do to your data at rest and in
Happens to everyone sooner or later, although no one wants to admit it
You'll have to go to the DMV to get a new license because of this
You want to give the least amount of this to users
Baiting a hook, throwing it out via email, and waiting for somebody to swallow it
You use these to combat adversaries and they use them against you.
Like a VHS tape of your network traffic
a well-established method used by both defenders and adversaries to hide open ports from access
identification unique to every human
Movie quote, "Do you want to play a game?"
GDPR protects this.
The hot beverage that keeps a SOC running 24/7
a device that is controlled by someone else, usually for nefarious purpose
It shut down Iran's nuclear program, for a while, by controlling the speed of spin of centrifuges
any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset
Used to mean PC's, but now means phones, tablets, watches, and more
One of the most common ways to put data into Devo.
Biometric used to "see" if you should have access
a structured language for describing cyber threat information so it can be shared, stored, and analyzed in a consistent manner.
Down
Who you call when you get a flat tire
The predecessor to TLS that delvers authenticated and encrypted connections
A SANS Summit held in July in August, TX
a nice guy that tests your security system, and tells you what doors you need to lock
The sweet trap set to lure out and study a predator
When millions of bots get together to breakdown your door
The second stage in the cyber kill chain
six of these are used for process improvement
A sneaky wireless attack to connect to your devices
The kind of privacy Europe has that America doesn't
The thing bad guys use to look over your digital shoulder
cyber framework, as well as Nicholas Cage film
A type of attack used famously by the ancient Greeks where you let something in that looks harmless, but isn't
When someone looks like a printer, but is really a thief
When a new exploit is discovered; it's not the first day it's used
What you do when you don't want to get stuck with a blackberry for your work phone
SysAdmin, Audit, Network and Security