Cybersecurity Fundamental Chapter 1
Across
- 4. who rally and protest against different political and social ideas.
- 6. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- 7. collection of technologies that enable the connection of various devices to the Internet.
- 8. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
- 11. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
- 12. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
- 1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- 2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- 3. Their targets are foreign governments, terrorist groups, and corporations.
- 5. hackers who are either self-employed or working for large cybercrime organizations.
- 9. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- 10. result of data sets that are large and complex, making traditional data processing applications inadequate.