Across
- 4. A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
- 5. An individual who simulates cyberattacks to evaluate the security of a system.
- 6. A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
- 10. Measures taken to protect physical assets and facilities from unauthorized access or harm.
- 11. The accuracy and reliability of data, protected from unauthorized alteration.
- 13. A hacker who engages in malicious activities for personal gain or to cause harm.
- 16. Mistakes made by individuals that can lead to security breaches.
- 18. Creating multiple security layers to prevent unauthorized access at different levels.
- 20. Covert agents who gather information on behalf of a government or organization.
- 21. An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
- 1. Ensuring that sensitive information is accessible only to authorized individuals.
- 2. The ability to identify and recognize cybersecurity threats and incidents.
- 3. Making sure that data is accessible when needed, without unauthorized disruptions.
- 7. Individuals with advanced computer skills who manipulate software or systems for various purposes.
- 8. Covert activities aimed at gathering confidential information from competitors or enemies.
- 9. Individuals who engage in illegal activities on the internet for financial gain.
- 12. People within an organization who have access to sensitive information and can pose security risks.
- 14. Implementing measures to discourage potential attackers from targeting a system or organization.
- 15. Introducing obstacles and barriers to slow down attackers' progress.
- 17. The process of restoring systems and data after a cybersecurity breach or incident.
- 19. Taking swift actions to address and mitigate cybersecurity incidents.