My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

ISSO June 2021

Horizontales
IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
This type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee
The physical separation or isolation of a system from other systems or networks is known as an __ __
The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance
The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
The _ and _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
___ computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
ISSO duties must be performed using an ISSO ___ account.
The ____ is the only thumb drive authorized on Department of State Automated Information Systems.
Verticales
Critical vulnerabilities must be remediated within ___calendar days of initial detection.
A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
Denial of ___ is an attack that prevents or impairs the authorized use of information system resources or services
Criminal organization responsable for the cyber attack against the Colonial Pipeline.
The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
IRM office responsable for Cyber Operations oversight
_____ is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.