Web Security p212-214, 252
Across
- 1. bad hacker, evil
- 3. outdated & unreliable - untrustworthy technology
- 4. Person --> "known knowns, ...know we don't know, ...don't know we don't know"
- 5. criminal scamming & harvesting info often by gaining illegitimate access
- 6. software attack, also what birds eat
- 7. hacking methods may cross legal or ethical lines
- 11. take advantage of vulnerability (a weakness) in software
- 13. Chief Information security officer
- 14. denial of service
- 15. plan to prevent, detect and respond to any attempts to breach security
- 18. a combination of confidentiality, integrity and availability
Down
- 2. motivated by ideology to undertake maximum disruption to computer systems
- 8. 'malicious software' infiltrating /damaging computer systems, without authorisation
- 9. ethical hacker
- 10. attacks that leave no time to prepare for or defend against an attack
- 12. employee attacking company from the inside
- 16. taking of data, physical assets or IP (intellectual property)
- 17. espionage targets specific computer installations to steal data without being detected