Across
- 5. (7,8) with this defence method if cyber criminals penetrate one layer, they still have to contend with several more layers with each layer being more complicated than the previous one.
- 8. (9,5,2,11,5) combines multiple physical hard drives into a single logical unit to provide data redundancy and improve performance.
- 12. (9,11) An organization should not reveal any information that cyber criminals can use to figure out what version of the operating system a server is running or the type of equipment it uses.
- 13. (7,7) is typically the router that provides devices access to the rest of the network or to the Internet.
- 14. refers to changing the controls and procedures at different layers.
Down
- 1. (8,4) a network protocol used with network switches that prevents loops on a network when switches interconnect via multiple paths.
- 2. involves reducing the severity of the loss or the likelihood of the loss from occurring.
- 3. (5,15) as part of an IT asset management system, an organization specifies the acceptable IT assets that meet its objectives
- 4. (5,10) includes a complete inventory of hardware and software.
- 6. (4,8) is the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
- 7. (4,5) means that systems and services are available 99.999%
- 9. (4,12) incorporates Fault Tolerance, System Resiliency, and Elimination or reduction of single-points of failure
- 10. (6,5,2,7) can be a specific piece of hardware, a process, a specific piece of data, or even an essential utility.
- 11. (8,6) with approach is used to reduces the possibility of a threat to data and information. An organization should restrict access so that users only have the level of access required to do their job.
