Across
- 7. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
- 8. _______________ is any crime perpetrated using computers and networks.
- 10. A__________ monitored a network, blocking dangerous content such as viruses.
- 11. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
- 13. Viruses, trojans and worms are examples of __________________________.
- 15. An ethical hacker.
- 16. Your favorite teacher.
- 17. A statement of an intention to inflict harm or damage .
Down
- 1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
- 2. Your favorite class.
- 3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
- 4. The exposure to the possibility of the attacked or harmed.
- 5. Actual action that causes harm or damage.
- 6. A blend between an ethical hacker and a cracker.
- 9. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- 12. An action taken to counteract the threat.
- 14. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.