Test

123456789101112131415161718
Across
  1. 1. Establishes early warning sensors and alert networks to warn others of potential attacks.
  2. 4. Provides comprehensive databases of all known vulnerabilities, shared worldwide to help prepare for and fend off common attacks.
  3. 9. Highly trained and well-funded hackers who steal secrets, gather intelligence, or commit sabotage for their government.
  4. 10. Threats posed by increased use of mobile devices to access enterprise information and inability to centrally manage them.
  5. 11. Businesses, government agencies, and countries sharing critical information about serious attacks to prevent similar attacks.
  6. 13. Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
  7. 14. Information Security Management Standards providing a framework for implementing cybersecurity measures within an organization.
  8. 15. Black hat hackers, self-employed or working for cybercrime organizations, who steal billions from consumers and businesses.
  9. 16. Unethical hackers who exploit weaknesses in networks or computer systems, violating security for personal gain.
  10. 17. Discourage cyberattacks and data breaches with severe penalties to punish cyber criminals caught carrying out illegal actions.
  11. 18. Challenges posed by the huge amount, high speed, and wide range of data types and sources that need protection.
Down
  1. 2. Internal users like employees or contract partners who can cause greater damage due to direct access and knowledge of systems.
  2. 3. Gray hat hackers who protest against political and social ideas by posting articles, videos, and leaking sensitive information.
  3. 5. Gray hat hackers who exploit vulnerabilities in software and systems and report them to vendors for rewards.
  4. 6. Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun.
  5. 7. Exploit weaknesses or vulnerabilities to gain access to internal resources.
  6. 8. Technology enabling billions of devices to connect to the Internet, affecting the amount of data needing protection.
  7. 12. Hackers between white and black hat, who may commit crimes not for personal gain or damage, and may report or publish vulnerabilities.