Cybersecurity Fundamental Chapter 1 Part 2

1234567
Across
  1. 4. is a continuous computer hack that occurs under the radar against a specific object.
  2. 6. The collection of technologies that enable the connection of various devices to the Internet.
  3. 7. amateurs or skilled attackers can exploit vulnerabilities in networked devices, or can use social engineering, such as trickery, to gain access.
Down
  1. 1. In the past, employees typically used company-issued computers connected to a corporate LAN.
  2. 2. recognize the threat that data poses if used against people.
  3. 3. They may also have knowledge of security countermeasures, policies and higher levels of administrative privileges.
  4. 5. The result of data sets that are large and complex, making traditional data processing applications inadequate.