Cybersecurity Fundamental Chapter 1

1234567891011121314
Across
  1. 5. attacks that originate from within an organization.
  2. 6. the honeynet project.
  3. 7. unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
  4. 9. breaks into network or computer systems to discover weakness in order to improve the security of these systems.
  5. 10. infragard is an example of widespread sharing of cyber intelligent.
  6. 11. groups of criminals break into computers or networks to gain access for various reason.
  7. 13. who rally and protest against different political and social ideas
  8. 14. external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
  1. 1. somewhere between white and black hat attackers.
  2. 2. grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
  3. 3. hobbyists mostly limited to pranks and vandalism, have little or no skills.
  4. 4. nation common vulnerabilities and exposures (CVE) database.
  5. 8. black hat hackers who are either self-employed or working for large cybercrime organizations.
  6. 12. the standard provides a framework for implementing cybersecurity measures within an organization.