Across
- 2. software and operating system (OS) updates that address security vulnerabilities within a program or product
- 5. when cybercriminals breach a private network, steal valuable data and hold the information hostage
- 7. put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time
- 8. sites that are not indexed and only accessible via specialized web browsers
- 9. an important factor in the determination of the risk of a threat actor. Highly ___________ threat actors are more likely to be successful if an attack is launched. Less _________ attackers have a lower probability of an attack being successful should it be launched
- 10. a sovereign territory with one group of individuals who share a common history
Down
- 1. typically involves a cyber criminal stealing data from personal or corporate devices, such as computers and mobile phones, through various cyberattack methods
- 3. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
- 4. a person or test result that is incorrectly classified as positive (as for the presence of a health condition) because of imperfect testing methods or procedures
- 6. a cybersecurity approach that uses existing infrastructure and controls to secure endpoints, rather than deploying people