lbock2@comcast.net
Across
- 2. Have no physical substance and include trade secrets, databases, and company records.
- 6. A security flaw or weakness in a system that can be exploited by threats to gain unauthorized access to an asset.
- 7. A comprehensive approach to managing risk and protecting information assets from a cyber threat
- 9. When a person, place, or thing is open or exposed to harm and is a combination of threats and vulnerabilities.
- 10. Keeping private information private by preventing unauthorized disclosure
- 11. Evaluates a system to identify vulnerabilities that malicious actors could exploit.
- 12. Ensures data has not been changed, destroyed or lost in an unauthorized or accidental manner
- 13. Attack Sends multiple requests to a system to interrupt or suspend services to legitimate users.
Down
- 1. Anything you can touch such as printers, servers, infrastructure devices, and end devices.
- 3. The ability to recognize and understand the current environment along with the potential effects of that particular situation.
- 4. Services are accessible and available to authorized users or processes in an information infrastructure.
- 5. Assesses potential risks that can negatively affect an organization.
- 8. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.