U11 - Review Cyber Security Plan, Constraints & Test Plan
Across
- 3. (6,3,8) A type of testing ensures data can be restored.
- 6. (11,7) Simulate attacks to find weaknesses.
- 8. (5,3,16) as part of the CSP who manages security, audits, and response.
- 10. This part of the CSP ensures confidentiality, integrity, and availability of information.
- 12. (6,7) A type of testing that verifies permissions and authentication.
Down
- 1. This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
- 2. (13,8) Automated tools to detect flaws.
- 4. These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
- 5. (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
- 7. (5,8,4) (CSP) This outlines how to protect systems, data, and networks
- 9. Defines which systems, applications, and data are covered in the CSP.
- 11. (4,4) This ensures the security measures work as intended.