Cybersecurity Fundamental Chapter 1
Across
- 2. Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- 6. group of criminals breaks into computers or networks to gain access for various reasons.
- 12. Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- 13. The Honeynet project is an example of creating Early Warning Systems.
Down
- 1. great businesses have been created by collecting and harnessing the power of data and data analytics.
- 3. InfraGard is an example of wide spread sharing of cyber intelligence.
- 4. hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- 5. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- 7. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- 8. hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- 9. Business large and small have recognized the power of big data and data analytics.
- 10. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- 11. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.