Cybersecurity Fundamental Chapter 8 Part 2

123456789101112
Across
  1. 2. The process of distributing and applying updates to software to fix known vulnerabilities.
  2. 5. The practice of protecting information by mitigating information risks, ensuring the confidentiality, integrity, and availability of data.
  3. 9. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
  4. 11. The process of addressing and managing the aftermath of a security breach or cyberattack.
  5. 12. Adhering to regulations, standards, and best practices designed to protect information systems and data.
Down
  1. 1. A proactive system that detects and prevents identified threats from infiltrating a network
  2. 3. The act of scanning a network to discover active devices, open ports, and potential vulnerabilities.
  3. 4. An incident where information is accessed without authorization, leading to potential exposure or theft of sensitive data.
  4. 6. Technology used to screen and exclude access to certain types of content deemed inappropriate or harmful.
  5. 7. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
  6. 8. A system that monitors network traffic for suspicious activity and potential threats
  7. 10. The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources.