Across
- 2. IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
- 4. The physical separation or isolation of a system from other systems or networks is known as an __ __.
- 7. A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
- 8. A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
- 10. IRM office responsable for Cyber Operations oversight.
- 11. ____ is the only thumb drive authorized on Department of State Automated Information Systems.
- 13. vulnerabilities must be remediated within ___calendar days of initial detection.
- 17. The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
- 18. this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
- 19. The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
- 1. is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
- 3. The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
- 5. A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
- 6. Criminal organization responsable for the cyber attack against the Colonial Pipeline.
- 9. A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
- 12. computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
- 14. ISSO duties must be performed using an ISSO ___ account.
- 15. The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
- 16. of ___ is an attack that prevents or impairs the authorized use of information system resources or services.