U11 M01 Part 2

1234567891011
Across
  1. 2. (5,7) refers to amateur or inexperienced hackers who uses existing tools or instructions found on the Internet to launch attacks.
  2. 5. (5,9) attackers gather intelligence or commit sabotage on behalf of their government.
  3. 7. a type of data breach where the goal is to take sensitive personal data.
  4. 9. This can includes employees, contract staff, or trusted partners that can accidentally or intentionally cause a threat.
  5. 10. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
  6. 11. (4,2,7) the financial impact of a security breach can
Down
  1. 1. make political statements to create awareness about issues that are important to them.
  2. 3. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
  3. 4. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
  4. 6. a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
  5. 8. This can include amateurs or skilled attackers outside of the organization can cause a threat.