Chapter 2 - Cybersecurity Threat Landscape

123456789101112
Across
  1. 2. ethical hacker motivated by desire to expose vulnerabilities and improve security
  2. 3. the means that threat actors use to obtain access
  3. 7. often the perpetrators of advanced persistent threats (APTs)
  4. 11. unskilled attacker who uses hacking techniques but has limited skills
  5. 12. threat intelligence gathered from publicly available sources
Down
  1. 1. occurs when an employee, contractor, vendor, or other individuals with authorized access to information and systems
  2. 4. attacks that exploit a previously unknown vulnerability
  3. 5. seek to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks
  4. 6. motivated by the desire to obtain sensitive or proprietary information
  5. 8. the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
  6. 9. motive is simply illegal financial gain
  7. 10. uses hacking techniques to accomplish some activist goal