Cyber Crossword #2

123456789101112
Across
  1. 4. Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future.
  2. 6. The selection of combinations of conditions, parameters, features, and specifications of a system.
  3. 7. A process intended to eliminate as many security risks as possible by implementing security controls (e.g., changing default passwords, enabling security settings, and protecting privileged accounts), patching vulnerabilities, turning off nonessential services, and removing all nonessential software programs, protocols, and utilities from the system.
  4. 8. ​​A physical USB smart card, or hard token, that may be used to log in to your desktop​​​​​​​. YubiKeys offer better security, usability and reliability and can be used as either the primary authentication device or as a companion to a smartphone.
  5. 10. A c​loud based solution with Multi-Factor Authentication (MFA) and Single-Sign On capabilities that grant users access to applications, systems and servers after they have successfully presented one or more forms of verification to prove their identity.
  6. 12. An intentional, deliberate act to misrepresent the truth or conceal a material fact for personal gain, or to persuade another to act upon it to his or her detriment.
Down
  1. 1. ​A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. This is usually done via email.
  2. 2. ​The verification of a user’s identity by a system.
  3. 3. The measure of a system’s ability to handle varying amounts of work by adding or removing resources from the system. For example, a scalable web application is one that works well with one user or many users, and that gracefully handles peaks and dips in traffic.
  4. 5. A broad reference to third-party services that are accessible via the internet. Types of cloud services can include Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS).
  5. 9. The ability to automate scaling up or scaling down. Elasticity is used to meet sudden bursts in capacity while agility is used to address more predictable and even planned demand and workload requirements.
  6. 11. Setting clear expectations for the conduct (behaviors and actions) of the entity being governed and directing, controlling, and strongly influencing the entity to achieve these expectations. This includes specifying a framework for decision making, with assigned decision rights and accountability, intended to consistently produce desired behaviors and actions.