5-2a Boundary Interaction

123456
Across
  1. 2. The monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication.
  2. 4. The key to boundary ______________ is a multi-layered approach focused on efficiently segmenting your networks and controlling the flow of your data.
  3. 5. A physical or logical subnet that separates an internal network from the internet.
  4. 6. A too-narrow ______________ could exclude system resources from the level of protection required by the system owner.
Down
  1. 1. All of the traffic entering and exiting the high-value system environment should be ______________.
  2. 3. Which boundary is the point where data transfers from the intranet to the internet and vice-versa.
  3. 4. The organization should have a well-defined and documented ______________ depicting of all of the entities that store or process system data.