Modules 18 to 20 Crossword

12345678910
Across
  1. 4. Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
  2. 6. A weakness in a system or its design that could be exploited by a threat actor.
  3. 8. BYOD means Bring Your Own ____
  4. 9. This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
  5. 10. The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
  1. 1. Any potential danger to an asset.
  2. 2. This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
  3. 3. This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
  4. 5. A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
  5. 7. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.