Across
- 2. The monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication.
- 4. The key to boundary ______________ is a multi-layered approach focused on efficiently segmenting your networks and controlling the flow of your data.
- 5. A physical or logical subnet that separates an internal network from the internet.
- 6. A too-narrow ______________ could exclude system resources from the level of protection required by the system owner.
Down
- 1. All of the traffic entering and exiting the high-value system environment should be ______________.
- 3. Which boundary is the point where data transfers from the intranet to the internet and vice-versa.
- 4. The organization should have a well-defined and documented ______________ depicting of all of the entities that store or process system data.
