CIS 27 Chapter 1
Across
- 2. software embedded into hardware
- 4. unskilled attackers
- 6. pose a threat from the position of a trusted entity
- 7. only authorized parties can view the information
- 9. Preselected options for authentication
- 12. Software in which no additional processes
- 16. Controls that provide an alternative to normal controls
- 17. End of a product’s manufacturing lifespan
- 18. Erroneous technology settings
- 19. unauthorized copying of data
- 22. Individual or entity who is responsible for attacks
- 25. Unnecessary ports that are not disabled
- 27. Safeguard employed within an enterprise to protect the CIA of information
- 28. Timely, reliable access to authorized information
- 29. Network that moves a product from its creation to the end-user
- 30. outsourcing the responsibility of a IT resources
Down
- 1. Businesses that furnish solutions or services to users and organizations
- 3. Process of bypassing corporate approval for technology purchases
- 5. Vulnerability for which there are no days of advanced warning
- 8. no unauthorized person or malicious software has altered the data
- 10. Provides framework to control access to resources
- 11. Threat actor's motivation of sound moral principles
- 13. Erroneous technology settings.
- 14. older hardware platform
- 15. discourage security violation before they occur
- 17. Secretly gathering information for a rival
- 20. mitigate or lessen the damage caused by the incident
- 21. software update is infected with malware
- 23. Threat actors who are strongly motivated by philosophical or political beliefs.
- 24. Verifying the identity of a user or process
- 26. Threat actors who are employed by their own government to carry out attacks.