Security Audit Quiz SET C
Across
- 3. NIST CSF function focused on safeguarding assets.
- 5. Level of harm from a compromise.
- 9. Testing to confirm proper implementation.
- 12. The defined boundary of an audit.
- 13. Critical element of CIA triad.
- 14. The probability of a threat exploiting a vulnerability.
- 15. Final step of an audit process.
Down
- 1. Unauthorized attempt to access a system.
- 2. Ability to track actions back to individuals or systems.
- 4. Adhering to required standards or regulations.
- 6. A potential cause of an unwanted incident.
- 7. A weakness that can be exploited.
- 8. U.S. body responsible for cybersecurity standards.
- 10. Checking compliance to documented requirements.
- 11. measures implemented to reduce risk.