Across
- 4. Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
- 6. A weakness in a system or its design that could be exploited by a threat actor.
- 8. BYOD means Bring Your Own ____
- 9. This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
- 10. The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
- 1. Any potential danger to an asset.
- 2. This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
- 3. This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
- 5. A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
- 7. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.