Configuration Management -E-Mates

123456789101112131415
Across
  1. 1. submits the updated change plan to the change control board.
  2. 4. A list of administrator-approved programs, IP and email addresses that can access the network.Blocks whatever is not on the list.
  3. 5. The users profile
  4. 7. The rules a company has for who can change the security systems.
  5. 8. Settings that help you navigate the login
  6. 9. Enable security configurations
  7. 10. Enable security configurations
  8. 12. Changes done to the security to improve the system
  9. 13. Any unwanted changes get blocked and reported protecting the system
  10. 15. Connections from far away
Down
  1. 2. Multiple layers of security
  2. 3. Restrictions on a area of importance
  3. 6. The enviornment in which the secuirty will effect
  4. 11. Enable security configurations
  5. 14. Security plans to protect the system