Cybersecurity Unit 10 Crossword
Across
- 2. also known as a "white list"
- 4. any software that relies upon by other applications and software
- 5. predefined responses for security incidents
- 6. this type of restart is needed for applying updates
- 8. when a system is unavailable
- 10. involves assessing all existing security controls, policies and procedures
- 13. step-by-step instructions for security measures
- 15. ideal security position based on industry standards
- 16. define requirements for security controls and configurations
Down
- 1. prioritization of improving security and moving to the desired state
- 3. also known as "block lists"
- 7. limiting certain actions or behaviors
- 9. comparing the current and desired states
- 11. Comparing the current state of an organization's security position to a desired state
- 12. never trust, always verify
- 14. these types of apps are outdated and older