U11 M01 Part 2
Across
- 2. (5,7) refers to amateur or inexperienced hackers who uses existing tools or instructions found on the Internet to launch attacks.
- 5. (5,9) attackers gather intelligence or commit sabotage on behalf of their government.
- 7. a type of data breach where the goal is to take sensitive personal data.
- 9. This can includes employees, contract staff, or trusted partners that can accidentally or intentionally cause a threat.
- 10. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
- 11. (4,2,7) the financial impact of a security breach can
Down
- 1. make political statements to create awareness about issues that are important to them.
- 3. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
- 4. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
- 6. a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
- 8. This can include amateurs or skilled attackers outside of the organization can cause a threat.