Across
- 4. State Sponsored Hackers
- 5. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- 7. The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
- 8. The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
- 9. The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
- 11. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- 12. is the collection of technologies that enable the connection of various devices to the Internet.
- 13. is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- 14. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
- 15. Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
- 1. Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- 2. Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- 3. This group of criminals breaks into computers or networks to gain access for various reasons.
- 6. The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
- 10. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.