Cybersecurity Fundamental Chapter 1

123456789101112
Across
  1. 4. who rally and protest against different political and social ideas.
  2. 6. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. 7. collection of technologies that enable the connection of various devices to the Internet.
  4. 8. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
  5. 11. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
  6. 12. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
  1. 1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. 2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  3. 3. Their targets are foreign governments, terrorist groups, and corporations.
  4. 5. hackers who are either self-employed or working for large cybercrime organizations.
  5. 9. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. 10. result of data sets that are large and complex, making traditional data processing applications inadequate.