My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

ISSO June 2021

Horizontales
_____ is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
This type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee
Critical vulnerabilities must be remediated within ___calendar days of initial detection.
The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance
The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
The _ and _ _ _ (acronym) is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
Denial of ___ is an attack that prevents or impairs the authorized use of information system resources or services
Verticales
A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
The physical separation or isolation of a system from other systems or networks is known as an __ __
The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
ISSO duties must be performed using an ISSO ___ account.
The ____ is the only thumb drive authorized on Department of State Automated Information Systems.
A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
IRM office responsable for Cyber Operations oversight
Criminal organization responsable for the cyber attack against the Colonial Pipeline.
___ computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.