Across
- 4. is a continuous computer hack that occurs under the radar against a specific object.
- 6. The collection of technologies that enable the connection of various devices to the Internet.
- 7. amateurs or skilled attackers can exploit vulnerabilities in networked devices, or can use social engineering, such as trickery, to gain access.
Down
- 1. In the past, employees typically used company-issued computers connected to a corporate LAN.
- 2. recognize the threat that data poses if used against people.
- 3. They may also have knowledge of security countermeasures, policies and higher levels of administrative privileges.
- 5. The result of data sets that are large and complex, making traditional data processing applications inadequate.