Cybersecurity Crossword

1234567891011121314151617181920
Across
  1. 2. The use of ____ off-the-shelf products have weakened security of ICS.
  2. 7. Network device designed to control the flow of traffic between networks.
  3. 9. Support component that contributes to ICS vulnerabilities.
  4. 11. Total amount of loss or damage that can be expected from a successful attack
  5. 13. Four-step process of taking action to reduce or eliminate risk.
  6. 15. Doing ____ is not a viable option for securing ICS.
  7. 17. has led to workforce downsizing and cost reducing measures in ICS.
  8. 19. Intrusion, attack, and ____ are the three stages of an attack.
  9. 20. The majority of attackers are _____.
Down
  1. 1. Weakness in a system that can be exploited.
  2. 3. The equation for ____ is threat x vulnerability x consequence
  3. 4. A copy of your password should NOT be left on your ___.
  4. 5. _____ should be at least 8 alphanumeric characters long.
  5. 6. The most common social engineering method.
  6. 8. The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
  7. 10. Along with intent and opportunity, ____ is needed for threats to succeed.
  8. 11. 22% of breaches involved some form of ___ ___.
  9. 12. ____% of attacks are financially motivated.
  10. 14. _____ is rummaging through business or residential trash for the purpose of finding useful information.
  11. 16. An attack that is used to make computer resources unavailable.
  12. 18. Malicious software.