Chapter 2 - Cybersecurity Threat Landscape

123456789101112131415161718192021
Across
  1. 5. attacks seeking to extort money or other concessions from victims by threatening to release sensitive information or launching further attacks
  2. 6. the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
  3. 8. attack that attempts to compromise devices, systems, or software before it even reaches the organization
  4. 9. attacks motivated by organizations seeking to steal secret information from other organizations
  5. 10. attack that occurs when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack
  6. 11. a geographic view of threat intelligence
  7. 12. an anonymous network created through encryption technology and often used for illicit activity
  8. 14. attacks by actors hacking into either foreign governments or corporations
  9. 18. attacks motivated by a desire to get even with an individual or organization by exacting retribution against them
  10. 19. attacks seeking to take down or interrupt critical systems or networks
  11. 20. term for attackers who use hacking techniques but have limited skills; aka script kiddie
  12. 21. threat actor that comes from within our own environment
Down
  1. 1. attacks motivated by a desire to expose vulnerabilities and improve security
  2. 2. attack in which access to sensitive information is gained and then removed from an organization
  3. 3. attacker who uses hacking techniques to accomplish an activist goal
  4. 4. includes information like the severity, fixes, and other information useful for both attackers and defenders
  5. 7. the path or means by which an attack can gain access to a target in order to cause harm
  6. 13. threat actor that exists outside organizations: competitors, criminals, and the curious
  7. 15. threat intelligence that is acquired from publicly available sources
  8. 16. attacks on a system that exploits vulnerabilities that are unknown to others, including the vendor
  9. 17. the study of the methods used by cybersecurity adversaries when engaging in attacks