Cybersecurity Fundamentals Chapter 8
Across
- 2. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
- 8. poorly enforced security policies, no awareness of security
- 9. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
- 10. open source linux security distribution.
- 12. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
- 13. a method of testing the areas of weakness in systems by using various malicious techniques.
- 14. includes the users who access the organization's information system.
Down
- 1. assess computer, computer systems, networks, or applications for weakness.
- 3. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
- 4. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
- 5. laws prohibit undesired behaviors.
- 6. intercept and log network traffic
- 7. provides free analysis and warning service to internet users and organizations.
- 11. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.