Test
Across
- 1. Establishes early warning sensors and alert networks to warn others of potential attacks.
- 4. Provides comprehensive databases of all known vulnerabilities, shared worldwide to help prepare for and fend off common attacks.
- 9. Highly trained and well-funded hackers who steal secrets, gather intelligence, or commit sabotage for their government.
- 10. Threats posed by increased use of mobile devices to access enterprise information and inability to centrally manage them.
- 11. Businesses, government agencies, and countries sharing critical information about serious attacks to prevent similar attacks.
- 13. Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- 14. Information Security Management Standards providing a framework for implementing cybersecurity measures within an organization.
- 15. Black hat hackers, self-employed or working for cybercrime organizations, who steal billions from consumers and businesses.
- 16. Unethical hackers who exploit weaknesses in networks or computer systems, violating security for personal gain.
- 17. Discourage cyberattacks and data breaches with severe penalties to punish cyber criminals caught carrying out illegal actions.
- 18. Challenges posed by the huge amount, high speed, and wide range of data types and sources that need protection.
Down
- 2. Internal users like employees or contract partners who can cause greater damage due to direct access and knowledge of systems.
- 3. Gray hat hackers who protest against political and social ideas by posting articles, videos, and leaking sensitive information.
- 5. Gray hat hackers who exploit vulnerabilities in software and systems and report them to vendors for rewards.
- 6. Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun.
- 7. Exploit weaknesses or vulnerabilities to gain access to internal resources.
- 8. Technology enabling billions of devices to connect to the Internet, affecting the amount of data needing protection.
- 12. Hackers between white and black hat, who may commit crimes not for personal gain or damage, and may report or publish vulnerabilities.