Across
- 5. Hacking in the context of cyber security is gaining __________access to or control of a computer system
- 6. A type of hacker who is not motivated by theft but instead creating disruption to cause public embarrassment or promote a political cause.
- 7. Brute force attacks are an attack that makes multiple attempts to discover something, usually a _________.
Down
- 1. The number of attacker(s) involved in a DDoS attack
- 2. ______-kiddies are hackers (not necessarily kids) who use tools downloaded from the internet that allow them to hack with little technical knowledge.
- 3. The number of attacker(s) involved in a DoS attack
- 4. ________ testers are people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system.
