DOMAIN 3 CROSSWORD | CYBER

12345678910111213141516171819202122232425262728293031323334
Across
  1. 4. software that creates, runs and manages virtual machines (VMs)
  2. 6. module(TPM) an embedded hardware chip on a motherboard that stores cryptographic keys used for encryption hardware
  3. 8. environment an environment used to test and application and discover any bugs or errors
  4. 10. automation the Internet connection in home appliances, such as refrigerators and coffee makers
  5. 13. a wireless network used to provide guests with Internet access
  6. 14. a protocol that translates public IP addresses to private IP addresses and private addresses back to public IP addresses
  7. 18. the use of different security control types, such as technical controls (firewalls, IDSs and proxy servers); administrative controls (vulnerability assessments and penetration tests); and physical controls (security cameras and locked rooms)
  8. 19. an OS that manages a network device; some Cisco devices use the Cisco IOS (Internetwork OS)
  9. 24. is the hardware-based and software-based encryption of an entire disk
  10. 25. the exposure of data by an error, such as an integer overflow or buffer overflow
  11. 26. a combination of all the elements required to produce a product
  12. 27. the use of implementing security controls from different vendors to increase security
  13. 30. environment an environment that simulates the production environment and is used for late stage testing
  14. 33. a group of SQL statements that execute as one SQL statement, like a mini-program
  15. 34. isolation that ensures that a system isn't connected to any other system to reduce risk of being attacked
Down
  1. 1. the analysis of code without executing it
  2. 2. a structure of basic concepts that is used to provide guidance to professionals on how to implement security in various systems
  3. 3. theorganization of tables and columns in a database to reduce redundant data and improve overall database performance
  4. 5. (SDN)a network that is comprised of virtualization technologies instead of hardware routers and switches
  5. 7. a framework that is based on relevant laws and regulations, such as HIPAA
  6. 9. is the software-based encryption of an entire disk;
  7. 11. the analysis of code as the code is running
  8. 12. a framework that is not based on law, but by common standards and practices
  9. 15. a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
  10. 16. an internal network, used to communicate and share content
  11. 17. encryption/self-encrypting drive (FDE/SED)
  12. 20. a group of honeypots that is within a separate network or zone, but accessible from an organization's primary network
  13. 21. to provide a digital signature for code
  14. 22. an OS that manages a server, such as Windows Server 2016 or the Server base environments in Linux
  15. 23. training of users on common threats and emerging threats to help avoid these types of attacks
  16. 28. a part of a network that can be accessed by authorized users from outside of the network, such as business partners, customers, vendors, etc.
  17. 29. an integrated circuit that includes all the functionality of a computing system within the hardware
  18. 31. to use an isolated area on a system (usually, a virtual machine), often for testing purpose
  19. 32. network a bridge to a wired network; a network that provides employees access to network resources as if they were connected from a wired dest node at their desk