Secure the Grid: Security Control Families Crossword

123456789101112
Across
  1. 3. Evaluation of systems to ensure compliance with security policies.
  2. 5. Tracking activities to detect unauthorized access or misuse.
  3. 7. The process of verifying a user's identity before access.
  4. 9. Regular updates and repairs to keep systems secure.
  5. 10. Procedures for restoring data and systems after an incident.
  6. 12. Plans for continuity during an unexpected disruption.
Down
  1. 1. Organized methods for securing and managing resources.
  2. 2. Potential for a threat to exploit a vulnerability.
  3. 4. Baseline settings to protect systems and reduce vulnerabilities.
  4. 6. An event that compromises the security of information.
  5. 8. Training to help users recognize and prevent security threats.
  6. 11. Control mechanisms for who can enter or use resources.