policies security
Across
- 4. Rules that guide security behavior
- 6. Examining the incident to understand impact
- 7. Protection of personal information
- 9. Harmful software that infects systems
- 11. Investigating digital evidence
- 14. A violation or threat to security policies
- 15. Process of identifying an incident
Down
- 1. Stopping the spread of an attack
- 2. Copy of data used for restoration
- 3. Recorded system activities
- 5. Attack using fake messages to steal data
- 8. Data collected during investigation
- 10. Following laws and regulations
- 12. Major event causing serious damage
- 13. Restoring systems after an incident