Across
- 3. services hosted by a cloud provider, service provider, or internet provider.
- 5. all of the services used by an organization including HVAC, water, and fire detection.
- 7. collection of devices interconnected using cables or airwaves.
- 8. the little voice in the background guiding a cybersecurity specialist as to what he/she should or should not do, regardless of whether it is legal.
Down
- 1. any desktop computer, laptop, tablet, or smartphone that connects to the network.
- 2. all of the critical systems, applications, and data.
- 4. law prohibit undesired behaviors.
- 6. includes the users who access the organization's information system.