Cyber Risk Crossword Puzzle

1234567891011121314151617
Across
  1. 2. Assessment approach based on numbers.
  2. 3. A plan that addresses the impact level of the availability objective.
  3. 6. The first step in a process that defines the impact levels of the CIA.
  4. 7. An attempted security violation.
  5. 9. Weakness in an information system.
  6. 13. The acronym of a framework that manages risk.
  7. 14. A measurement of extent of a threat.
  8. 15. Unauthorized modification.
  9. 17. Any person with authorized access to a system.
Down
  1. 1. Assessment approach based on non-numerical values.
  2. 3. The practice of protecting HW, SW, and data.
  3. 4. Unauthorized disclosure.
  4. 5. Reliable and timely access to resources.
  5. 8. The practice of using email or fake websites to do something malicious.
  6. 10. A successful security violation.
  7. 11. Technical artifacts or events that suggest an attack is imminent.
  8. 12. Event with the potential to impact an organization.
  9. 16. The acronym of an analysis that is a key step in planning for key mission components of an IS.