Chapter 12 Security Plus Crossword
Across
- 5. streams of information containing data about various cyber threats
- 9. Payment to a third-party for assuming risks
- 10. The willingness to assume a level of risk in order to achieve a result
- 11. Verifying that the organization is in compliance with required standards
- 13. Threat intelligence data that has been legally gathered
- 15. An examination of results to verify their accuracy
- 17. An alarm that is raised when there is no problem.
- 18. Directly probing for vulnerabilities
- 20. Using tools in a penetration test that do not raise any alarms
- 21. Analyzing a vulnerability scan for validation of its accuracy
Down
- 1. A subjective estimate of the loss to an asset if the specific threat occurs
- 2. pay security researchers who uncover security bugs
- 3. To treat one item as more important than another.
- 4. Relating to ownership.
- 6. assessment that attempts to uncover vulnerabilities and then exploit them
- 7. Numeric scores on a vulnerability
- 8. The failure to raise an alarm when there is an issue.
- 12. A judgment made about the results of an audit
- 14. Conformity to mandated standards
- 16. Part of the web that is the domain of threat actors
- 19. Assessments by independent third-party auditors