Across
- 1. Regulation for protecting personal data in the EU
- 5. Industrial devices connected to networks
- 6. Weakness that could be exploited
- 8. Physical method to secure rooms or racks
- 11. Review to ensure policies and controls are followed
- 15. Authentication that changes codes at regular intervals
- 18. Digital proof of identity used in secure communication
- 19. Single login grants access to multiple systems
- 20. Standard for exchanging authentication data
- 21. Device used for physical monitoring and security
- 23. Technology used to control industrial equipment
- 24. Standard for securing payment card information
- 27. Refers to data moving across a network
- 28. Process of verifying who a user is
- 29. Centralized AAA protocol for network access
- 30. Decoy system to attract attackers
- 32. Potential danger to systems or data
- 34. Security model of confidentiality, integrity, availability
- 35. Group of honeypots working together
- 37. Protects data by converting it into unreadable form
- 38. Separate network for visitors with limited access
Down
- 2. Assigning permissions based on a user’s job function
- 3. Likelihood of a threat exploiting a vulnerability
- 4. Restricts access based on physical location
- 7. Code or method used to take advantage of a weakness
- 9. Separating networks for security and performance
- 10. Determines what resources a user is allowed to access
- 12. Everyday smart devices connected to networks
- 13. System for monitoring and controlling industrial processes
- 14. Certificate created and trusted by its own issuer
- 16. Industrial control system for automation and management
- 17. Requirement that data stays within a certain region
- 22. Principle of granting minimum necessary permissions
- 24. Framework of CAs, certs, and keys for encryption
- 25. Requires two or more factors for authentication
- 26. System of policies and tools for identity management
- 31. Directory protocol often used for authentication
- 32. Cisco protocol for centralized authentication
- 33. Refers to data stored on a device or disk
- 36. Policy allowing employees to use personal devices
