CF Chapter 1 & 2
Across
- 2. A secure virtual network that uses the public network (i.e., the Internet). The security of a virtual private network lies in the encryption of packet content between the endpoints that define the virtual private network
- 3. The 3 states of data are Data at rest, Data in transit, Data in ???
- 7. Script Kiddies are cyber-criminals having little or no ???, often using existing tools or instructions to launch attacks.
- 8. The 3 security services for controlling access are ???, Authorization, Accounting
- 9. is a weakness that makes a target susceptible to an attack.
Down
- 1. The 3 principles of security are Confidentiality, ???, Availability
- 4. Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- 5. Hat Hackers cyber-criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- 6. A type records that cyber criminals would be interested in stealing from organisations (hint: hospital)
- 7. ??? net is a method of sending information from one device to another using removable media