U03 - CSE-CH01 - Keywords

123456789
Across
  1. 2. (3,4) is the result of data sets that are large and complex, making traditional data processing applications inadequate.
  2. 6. (13,8) The CVE National Database was developed to provide a publicly available database of all know vulnerabilities. The Common Vulnerabilities and Exposures (CVE) database is an example.
  3. 7. (8,2,6) is the collection of technologies that enable the connection of various devices to the Internet abbreviated (IoT).
  4. 8. (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  5. 9. (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Down
  1. 1. (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. 3. (11,8,10,9) The standards provide a framework for implementing cybersecurity measures within an organization. The ISO 27000 standards are an example.
  3. 4. (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
  4. 5. (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.