security+J

12345678910
Across
  1. 2. software and operating system (OS) updates that address security vulnerabilities within a program or product
  2. 5. when cybercriminals breach a private network, steal valuable data and hold the information hostage
  3. 7. put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time
  4. 8. sites that are not indexed and only accessible via specialized web browsers
  5. 9. an important factor in the determination of the risk of a threat actor. Highly ___________ threat actors are more likely to be successful if an attack is launched. Less _________ attackers have a lower probability of an attack being successful should it be launched
  6. 10. a sovereign territory with one group of individuals who share a common history
Down
  1. 1. typically involves a cyber criminal stealing data from personal or corporate devices, such as computers and mobile phones, through various cyberattack methods
  2. 3. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
  3. 4. a person or test result that is incorrectly classified as positive (as for the presence of a health condition) because of imperfect testing methods or procedures
  4. 6. a cybersecurity approach that uses existing infrastructure and controls to secure endpoints, rather than deploying people