Cybersecurity Crossword
Across
- 2. The use of ____ off-the-shelf products have weakened security of ICS.
- 7. Network device designed to control the flow of traffic between networks.
- 9. Support component that contributes to ICS vulnerabilities.
- 11. Total amount of loss or damage that can be expected from a successful attack
- 13. Four-step process of taking action to reduce or eliminate risk.
- 15. Doing ____ is not a viable option for securing ICS.
- 17. has led to workforce downsizing and cost reducing measures in ICS.
- 19. Intrusion, attack, and ____ are the three stages of an attack.
- 20. The majority of attackers are _____.
Down
- 1. Weakness in a system that can be exploited.
- 3. The equation for ____ is threat x vulnerability x consequence
- 4. A copy of your password should NOT be left on your ___.
- 5. _____ should be at least 8 alphanumeric characters long.
- 6. The most common social engineering method.
- 8. The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
- 10. Along with intent and opportunity, ____ is needed for threats to succeed.
- 11. 22% of breaches involved some form of ___ ___.
- 12. ____% of attacks are financially motivated.
- 14. _____ is rummaging through business or residential trash for the purpose of finding useful information.
- 16. An attack that is used to make computer resources unavailable.
- 18. Malicious software.