Configuration Management -E-Mates
Across
- 1. submits the updated change plan to the change control board.
- 4. A list of administrator-approved programs, IP and email addresses that can access the network.Blocks whatever is not on the list.
- 5. The users profile
- 7. The rules a company has for who can change the security systems.
- 8. Settings that help you navigate the login
- 9. Enable security configurations
- 10. Enable security configurations
- 12. Changes done to the security to improve the system
- 13. Any unwanted changes get blocked and reported protecting the system
- 15. Connections from far away
Down
- 2. Multiple layers of security
- 3. Restrictions on a area of importance
- 6. The enviornment in which the secuirty will effect
- 11. Enable security configurations
- 14. Security plans to protect the system