Cybersecurity Fundamental Chapter 6 Part 2

123456789
Across
  1. 5. The maximum acceptable amount of data loss measured in time before a disaster affects the business.
  2. 7. Identifying, assessing, and controlling threats to an organization's capital and earnings, including IT systems.
  3. 8. Secondary systems or processes that can take over in case the primary systems fail.
  4. 9. The period during which a system is unavailable or not operational.
Down
  1. 1. A complete inventory of hardware and software within an organization to protect them and manage security risks effectively.
  2. 2. Ensuring that the organization follows industry standards and regulations to maintain high availability and data protection.
  3. 3. The targeted duration of time within which a business process must be restored after a disaster to avoid unacceptable consequences.
  4. 4. The period during which a system is operational and accessible.
  5. 6. Techniques and tools implemented to protect systems and data from unauthorized access or attacks.