Chapter 11 Computer Network Defense - Study Crossword
Across
- 4. ____in Depth. Multiple layers of security measures to hinder our attackers.
- 7. Basic principles which govern how we secure data. The "I" in CIA.
- 8. Disaster ____Planning can allow us to withstand or recover from the attacks outages, and disasters that we were not able to prevent.
- 9. Being able to access data when we need it.
- 10. Pose the single largest security vulnerability that we have in any environment.
Down
- 1. Keeping data out of the hands of those not authorized.
- 2. An assessment that uses scanning tools to discover or expose weaknesses in our network.
- 3. Verifying the identity of an individual or system against a presented set of credentials.
- 5. Training effort used to secure the weakest link in our defenses--PEOPLE.
- 6. Computer Network ___. Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within a computer network.