Across
- 4. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- 9. Attacks that originate from within an organization are known as ___________ security threats.
- 10. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- 11. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- 13. DDoS in cyber security means "Distributed ______-of-Service.
- 15. The acronym of this technology which enable people to connect billions of devices to the Internet.
- 16. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- 18. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- 20. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- 1. Criminals use this tool to capture data streams over a network.
- 2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- 3. What is another word used to describe the speed of data.
- 5. A group of grey hat hackers who rally and protest against different political and social ideas.
- 6. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- 7. Cyber ______ is a weakness that makes a target susceptible to an attack
- 8. The acronym of the practice where people used their own devices to access enterprise information.
- 12. This group of criminals breaks into computers or networks to gain access for various reasons.
- 14. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- 17. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- 19. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.