Cybersecurity Fundamental Chapter 1

12345678910111213
Across
  1. 2. Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
  2. 6. group of criminals breaks into computers or networks to gain access for various reasons.
  3. 12. Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  4. 13. The Honeynet project is an example of creating Early Warning Systems.
Down
  1. 1. great businesses have been created by collecting and harnessing the power of data and data analytics.
  2. 3. InfraGard is an example of wide spread sharing of cyber intelligence.
  3. 4. hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  4. 5. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  5. 7. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. 8. hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
  7. 9. Business large and small have recognized the power of big data and data analytics.
  8. 10. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
  9. 11. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.