Incident Response Plan

123456789101112
Across
  1. 2. Organizations can detect incidents through security_______tools
  2. 4. typically includes a summary of the incident, impact assessment, timeline of events, and response actions taken.
  3. 6. ________________ is the process of restoring and returning affected systems and devices back to normal operation securely.
  4. 8. Incident Response____________ oversees and coordinates the response to an incident and is the primary decision-maker.
  5. 10. ____________involves removing the threat from all affected systems.
  6. 11. A ________________is an alert that inaccurately indicates malicious activity
  7. 12. A ____________ incident is any attempted or successful unauthorized access, use, disclosure, or modification, or destruction of
Down
  1. 1. __________ is vital for coordinating response efforts, informing stakeholders, and maintaining transparency with external
  2. 3. Incident ______________ is the methodology an organization uses to respond to and manage a cyberattack or breach.
  3. 5. Learned Key stages include Preparation, Identification, Containment, Eradication, Recovery, and__________.
  4. 7. ______ correctly identifies actual malicious activity.
  5. 9. _______include having tools and processes in place and training personnel on their roles during containment.