ISSO June 2021

12345678910111213141516171819
Across
  1. 2. IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
  2. 4. The physical separation or isolation of a system from other systems or networks is known as an __ __.
  3. 7. A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
  4. 8. A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
  5. 10. IRM office responsable for Cyber Operations oversight.
  6. 11. ____ is the only thumb drive authorized on Department of State Automated Information Systems.
  7. 13. vulnerabilities must be remediated within ___calendar days of initial detection.
  8. 17. The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
  9. 18. this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
  10. 19. The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
  1. 1. is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
  2. 3. The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
  3. 5. A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
  4. 6. Criminal organization responsable for the cyber attack against the Colonial Pipeline.
  5. 9. A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
  6. 12. computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
  7. 14. ISSO duties must be performed using an ISSO ___ account.
  8. 15. The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
  9. 16. of ___ is an attack that prevents or impairs the authorized use of information system resources or services.