U11 - Mod 2 Key Terms

1234567891011121314
Across
  1. 2. A method of gaining unauthorised access to a computer system/network.
  2. 6. (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. 9. (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
  4. 10. (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
  5. 11. (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. 12. (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
  7. 13. (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Down
  1. 1. (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
  2. 3. (6,6) a path by which a threat actor can access a server, host, or network.
  3. 4. (5,8) An individual who commits illegal activities using computers and the Internet.
  4. 5. (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
  5. 7. Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
  6. 8. (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  7. 14. An individual who gains unauthorised access to computer system/network for social or political purposes.