CyF Chapter 1

1234567891011121314151617181920
Across
  1. 4. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
  2. 9. Attacks that originate from within an organization are known as ___________ security threats.
  3. 10. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
  4. 11. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
  5. 13. DDoS in cyber security means "Distributed ______-of-Service.
  6. 15. The acronym of this technology which enable people to connect billions of devices to the Internet.
  7. 16. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
  8. 18. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
  9. 20. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
  1. 1. Criminals use this tool to capture data streams over a network.
  2. 2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
  3. 3. What is another word used to describe the speed of data.
  4. 5. A group of grey hat hackers who rally and protest against different political and social ideas.
  5. 6. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
  6. 7. Cyber ______ is a weakness that makes a target susceptible to an attack
  7. 8. The acronym of the practice where people used their own devices to access enterprise information.
  8. 12. This group of criminals breaks into computers or networks to gain access for various reasons.
  9. 14. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
  10. 17. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  11. 19. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.