Cybersecurity Fundamental Chapter 1
Across
- 5. attacks that originate from within an organization.
- 6. the honeynet project.
- 7. unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
- 9. breaks into network or computer systems to discover weakness in order to improve the security of these systems.
- 10. infragard is an example of widespread sharing of cyber intelligent.
- 11. groups of criminals break into computers or networks to gain access for various reason.
- 13. who rally and protest against different political and social ideas
- 14. external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
- 1. somewhere between white and black hat attackers.
- 2. grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
- 3. hobbyists mostly limited to pranks and vandalism, have little or no skills.
- 4. nation common vulnerabilities and exposures (CVE) database.
- 8. black hat hackers who are either self-employed or working for large cybercrime organizations.
- 12. the standard provides a framework for implementing cybersecurity measures within an organization.