CyF Chapter 8

12345678
Across
  1. 3. services hosted by a cloud provider, service provider, or internet provider.
  2. 5. all of the services used by an organization including HVAC, water, and fire detection.
  3. 7. collection of devices interconnected using cables or airwaves.
  4. 8. the little voice in the background guiding a cybersecurity specialist as to what he/she should or should not do, regardless of whether it is legal.
Down
  1. 1. any desktop computer, laptop, tablet, or smartphone that connects to the network.
  2. 2. all of the critical systems, applications, and data.
  3. 4. law prohibit undesired behaviors.
  4. 6. includes the users who access the organization's information system.