Web Security p212-214, 252

123456789101112131415161718
Across
  1. 1. bad hacker, evil
  2. 3. outdated & unreliable - untrustworthy technology
  3. 4. Person --> "known knowns, ...know we don't know, ...don't know we don't know"
  4. 5. criminal scamming & harvesting info often by gaining illegitimate access
  5. 6. software attack, also what birds eat
  6. 7. hacking methods may cross legal or ethical lines
  7. 11. take advantage of vulnerability (a weakness) in software
  8. 13. Chief Information security officer
  9. 14. denial of service
  10. 15. plan to prevent, detect and respond to any attempts to breach security
  11. 18. a combination of confidentiality, integrity and availability
Down
  1. 2. motivated by ideology to undertake maximum disruption to computer systems
  2. 8. 'malicious software' infiltrating /damaging computer systems, without authorisation
  3. 9. ethical hacker
  4. 10. attacks that leave no time to prepare for or defend against an attack
  5. 12. employee attacking company from the inside
  6. 16. taking of data, physical assets or IP (intellectual property)
  7. 17. espionage targets specific computer installations to steal data without being detected