U11 - Mod 1 Key Terms
Across
- 3. (6,7) refers to teenagers or inexperienced threat actors running existing scripts, tools, and exploits, to cause harm, but typically not for profit.
- 4. (10,2,6) are signs that a potential cybersecurity attack is in progress.
- 7. are threat actors who are motivated to make money using any means necessary. While sometimes they work independently, they are more often financed and sponsored by criminal organizations.
- 10. A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
- 12. (acronym) provides virtual computing resources such as hardware, software, servers, storage, and other infrastructure components. An organization will buy access to them.
Down
- 1. (6,6) is a path by which a threat actor can gain access to a server, host, or network.
- 2. (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
- 3. (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
- 5. a term that refers to grey hat hackers who rally and protest against different political and social ideas.
- 6. (acronym) It allows an organization to develop, run and manage its applications on the service's hardware using its tools.
- 8. (acronym) provides organizations with software (stored in the cloud) that is centrally hosted and accessed by users via a web browser, app, or other software.
- 9. (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
- 11. (acronym) Threat actors use echo packets (pings) to discover subnets and hosts on a protected network, to generate DoS flood attacks, and to alter host routing tables.