Across
- 6. Information Assurance involves measures that protect and defend both information and information systems.
- 8. Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
- 11. ensures that information remains in its original form; information remains true to the creators intent
- 14. Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
- 16. Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
- 17. Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
- 18. Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
- 19. These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
- 20. The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
- 1. ensures the disclosure of information only to those persons with authority to see it.
- 2. Information Assurance is concerned with safeguarding information from both malicious and accidental threats
- 3. Some older hardware may not be able to support newer security software and solutions.
- 4. Hardware can take years to develop, and resolving security issues often require more than a quick patch.
- 5. Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
- 7. It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
- 9. Most IoT device and robotics manufacturers don’t have dedicated security experts.
- 10. Many corporate data centers and high-end desktops use purpose-built chipsets.
- 12. The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
- 13. It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
- 15. Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.