Across
- 1. Sensors and alert networks that warn of potential attacks.
- 4. Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
- 9. Highly trained hackers who steal secrets or commit sabotage for their government.
- 10. Threats posed by the increasing use of mobile devices to access enterprise information.
- 11. Sharing of critical information about serious attacks to prevent similar ones.
- 13. Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- 14. Framework for implementing cybersecurity measures within an organization.
- 15. Black hat hackers who steal money from consumers and businesses.
- 16. Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
- 17. Legislation to discourage cyberattacks and punish cyber criminals.
- 18. Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
- 2. Threats from employees or partners with inside access and knowledge.
- 3. Gray hat hackers who protest against political and social ideas by leaking sensitive information.
- 5. Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
- 6. Teenagers or hobbyists with little skill who hack for fun, not profit.
- 7. Threats that exploit weaknesses to gain access to internal resources.
- 8. Technology connecting billions of devices to the Internet, affecting data protection needs.
- 12. Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.