Risk Management
Across
- 4. Location that consists of everything that a business needs except computers
- 5. Process of downgrading-undoing a recently applied patch or updated
- 6. Documents that set out how to limit damage and recover quickly from an incident
- 7. Open source tool for penetration testing many aspects of wireless networks
- 9. Contract that defines the services, products, and time frames for the vendor to achieve
Down
- 1. Process of documenting significant changes to the network
- 2. Set of procedures defining actions employees should perform to protect the network's security
- 3. Popular and extremely comprehensive vulnerability testing tool
- 4. Document used to track the collection, handling, and transfer of evidence
- 8. A unique tool that enables a penetration tester to use a massive library of attacks as well as tweak those attacks for unique penetrations