lbock2@comcast.net

12345678910111213
Across
  1. 2. Have no physical substance and include trade secrets, databases, and company records.
  2. 6. A security flaw or weakness in a system that can be exploited by threats to gain unauthorized access to an asset.
  3. 7. A comprehensive approach to managing risk and protecting information assets from a cyber threat
  4. 9. When a person, place, or thing is open or exposed to harm and is a combination of threats and vulnerabilities.
  5. 10. Keeping private information private by preventing unauthorized disclosure
  6. 11. Evaluates a system to identify vulnerabilities that malicious actors could exploit.
  7. 12. Ensures data has not been changed, destroyed or lost in an unauthorized or accidental manner
  8. 13. Attack Sends multiple requests to a system to interrupt or suspend services to legitimate users.
Down
  1. 1. Anything you can touch such as printers, servers, infrastructure devices, and end devices.
  2. 3. The ability to recognize and understand the current environment along with the potential effects of that particular situation.
  3. 4. Services are accessible and available to authorized users or processes in an information infrastructure.
  4. 5. Assesses potential risks that can negatively affect an organization.
  5. 8. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.