Security Plus Chapter 1
Across
- 2. Network that moves a product from its creation to the end-user
- 5. Safeguard employed within an enterprise to protect the CIA of information
- 6. Controls that provide an alternative to normal controls
- 9. Businesses that furnish solutions or services to users and organizations
- 12. Threat actors who are strongly motivated by philosophical or political beliefs.
- 13. no unauthorized person or malicious software has altered the data
- 15. unauthorized copying of data
- 16. Threat actors who are employed by their own government to carry out attacks.
Down
- 1. Software in which no additional processes
- 3. pose a threat from the position of a trusted entity
- 4. Vulnerability for which there are no days of advanced warning
- 5. mitigate or lessen the damage caused by the incident
- 7. outsourcing the responsibility of a IT resources
- 8. End of a product’s manufacturing lifespan
- 10. Process of bypassing corporate approval for technology purchases
- 11. Erroneous technology settings.
- 14. Individual or entity who is responsible for attacks