IT Risk Management 03

1234567
Across
  1. 2. Use of fake website
  2. 4. Actions to inhibit the effectiveness of IDS
  3. 5. Differentiates between adversarial and non-adversarial risks
  4. 6. Risk analysis with an assumption that some controls are in place
  5. 7. Provides information about common vulnerabilities
Down
  1. 1. Use of multiple PCs to attack a single server
  2. 3. Type of attack aimed at obtaining login credentials
  3. 4. Developed by Carnegie Mellon University