Across
- 2. (3,4) is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- 6. (13,8) The CVE National Database was developed to provide a publicly available database of all know vulnerabilities. The Common Vulnerabilities and Exposures (CVE) database is an example.
- 7. (8,2,6) is the collection of technologies that enable the connection of various devices to the Internet abbreviated (IoT).
- 8. (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- 9. (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Down
- 1. (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- 3. (11,8,10,9) The standards provide a framework for implementing cybersecurity measures within an organization. The ISO 27000 standards are an example.
- 4. (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- 5. (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.