Across
- 4. Author synonymous with a criminal coder.
- 8. Cyber terrorist are likely to choose targets that are publicly _____.
- 10. 2008-09 Worm that recruited devices into a botnet without the control of an operator to guide it.
- 11. Hackers generally tied to national conflicts.
- 12. A "kiddie" that is the most common of non-state attackers.
Down
- 1. In the technical industry they are often well-organized and have highly trained employees.
- 2. Motivation is entirely political or religious in nature.
- 3. Cyber terrorist are likely to choose targets that are highly _____.
- 5. IDS, Intrusion _____System
- 6. Motivations of organized crime are _____ and power.
- 7. Attackers with no regard for the rule of law or disruption caused.
- 9. Considered the lowest of the low attacker. Seeks PII
