Across
- 2. Organizations can detect incidents through security_______tools
- 4. typically includes a summary of the incident, impact assessment, timeline of events, and response actions taken.
- 6. ________________ is the process of restoring and returning affected systems and devices back to normal operation securely.
- 8. Incident Response____________ oversees and coordinates the response to an incident and is the primary decision-maker.
- 10. ____________involves removing the threat from all affected systems.
- 11. A ________________is an alert that inaccurately indicates malicious activity
- 12. A ____________ incident is any attempted or successful unauthorized access, use, disclosure, or modification, or destruction of
Down
- 1. __________ is vital for coordinating response efforts, informing stakeholders, and maintaining transparency with external
- 3. Incident ______________ is the methodology an organization uses to respond to and manage a cyberattack or breach.
- 5. Learned Key stages include Preparation, Identification, Containment, Eradication, Recovery, and__________.
- 7. ______ correctly identifies actual malicious activity.
- 9. _______include having tools and processes in place and training personnel on their roles during containment.