1. 2. A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
  2. 6. Type of assessments that are the cornerstone of every program for cybersecurity
  3. 9. A basic security software used to prevent, scan, detect and delete viruses from a computer
  4. 11. Protecting information is vital for the normal functioning of organizations
  5. 12. Is an advanced security control that reduces the chance of it being stolen
  1. 1. Systems that are no longer supported by the manufacturer
  2. 3. is a significant threat to the confidentiality, integrity and availability of information
  3. 4. A key stakeholder that may not recognize how to securely communicate with their provider
  4. 5. The abbreviation of a federal requirement restricting electronic transmission of health information
  5. 7. Type of phishing email specific employee within an organization
  6. 8. Most significant security incident
  7. 10. This stakeholder may have lax security policies compromising your system