U11 - Mod 1 Key Terms

123456789101112
Across
  1. 3. (6,7) refers to teenagers or inexperienced threat actors running existing scripts, tools, and exploits, to cause harm, but typically not for profit.
  2. 4. (10,2,6) are signs that a potential cybersecurity attack is in progress.
  3. 7. are threat actors who are motivated to make money using any means necessary. While sometimes they work independently, they are more often financed and sponsored by criminal organizations.
  4. 10. A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
  5. 12. (acronym) provides virtual computing resources such as hardware, software, servers, storage, and other infrastructure components. An organization will buy access to them.
Down
  1. 1. (6,6) is a path by which a threat actor can gain access to a server, host, or network.
  2. 2. (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
  3. 3. (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
  4. 5. a term that refers to grey hat hackers who rally and protest against different political and social ideas.
  5. 6. (acronym) It allows an organization to develop, run and manage its applications on the service's hardware using its tools.
  6. 8. (acronym) provides organizations with software (stored in the cloud) that is centrally hosted and accessed by users via a web browser, app, or other software.
  7. 9. (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
  8. 11. (acronym) Threat actors use echo packets (pings) to discover subnets and hosts on a protected network, to generate DoS flood attacks, and to alter host routing tables.