Chapter 2 - Cybersecurity Threat Landscape
Across
- 5. attacks seeking to extort money or other concessions from victims by threatening to release sensitive information or launching further attacks
- 6. the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
- 8. attack that attempts to compromise devices, systems, or software before it even reaches the organization
- 9. attacks motivated by organizations seeking to steal secret information from other organizations
- 10. attack that occurs when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack
- 11. a geographic view of threat intelligence
- 12. an anonymous network created through encryption technology and often used for illicit activity
- 14. attacks by actors hacking into either foreign governments or corporations
- 18. attacks motivated by a desire to get even with an individual or organization by exacting retribution against them
- 19. attacks seeking to take down or interrupt critical systems or networks
- 20. term for attackers who use hacking techniques but have limited skills; aka script kiddie
- 21. threat actor that comes from within our own environment
Down
- 1. attacks motivated by a desire to expose vulnerabilities and improve security
- 2. attack in which access to sensitive information is gained and then removed from an organization
- 3. attacker who uses hacking techniques to accomplish an activist goal
- 4. includes information like the severity, fixes, and other information useful for both attackers and defenders
- 7. the path or means by which an attack can gain access to a target in order to cause harm
- 13. threat actor that exists outside organizations: competitors, criminals, and the curious
- 15. threat intelligence that is acquired from publicly available sources
- 16. attacks on a system that exploits vulnerabilities that are unknown to others, including the vendor
- 17. the study of the methods used by cybersecurity adversaries when engaging in attacks