Security Audit Quiz
Across
- 3. The probability of a threat exploiting a vulnerability.
- 6. NIST CSF function focused on safeguarding assets
- 7. Final step of an audit process.
- 8. Checking compliance to documented requirements.
- 9. A weakness that can be exploited.
- 11. A potential cause of an unwanted incident.
- 13. Ability to track actions back to individuals or systems.
- 15. U.S. body responsible for cybersecurity standards.
Down
- 1. The defined boundary of an audit.
- 2. measures implemented to reduce risk.
- 4. Level of harm from a compromise.
- 5. Unauthorized attempt to access a system.
- 10. Critical element of CIA triad.
- 12. Testing to confirm proper implementation.
- 14. Adhering to required standards or regulations.