SN33003FP Chapter 6

12345678910111213141516171819202122232425262728293031
Across
  1. 3. Reduces the severity of the loss or the likelihood of the loss from occurring
  2. 5. Prevent a disaster from occurring
  3. 6. The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
  4. 10. Gets critical systems to another location while repair of the original facility is under way
  5. 15. Avoiding complex solutions that users cannot understand or troubleshoot
  6. 18. Ability to maintain availability during disruptive events
  7. 20. Restricting access so that users only have the level of access required to do their job
  8. 23. It is critical to keep an organization functioning when a disaster occurs
  9. 29. Manages a complete inventory of hardware and software
  10. 30. Discover the incident
  11. 31. Plan for potential incidents
Down
  1. 1. Creating a barrier of multiple defences to prevent attacks
  2. 2. Identifies specific hardware and software products that the organization uses and supports
  3. 4. Breaching one layer of security does not compromise the whole system
  4. 7. Discover unwanted events
  5. 8. Investigate the cause of the incident and ask questions to better understand the nature of the threat
  6. 9. Analyzes the dangers posed by natural and human-caused events to the assets of an organization
  7. 11. Enhances system reliability and availability by distributing them across multiple physical locations
  8. 12. Manages a full inventory of hardware and software components that are vulnerable to security risks
  9. 13. Network protocol that provides for redundancy
  10. 14. Concealing certain types of information to make it more difficult for cyber criminals to attack a system
  11. 16. The set of procedures that an organization follows after an event occurs outside the normal range
  12. 17. Assigns all resources into a group based on common characteristics
  13. 19. Restore the system after a disaster
  14. 21. Minimizes risk by staying ahead of cybercriminals
  15. 22. Ensures system availability in the event of a component failure
  16. 24. Combines multiple physical hard drives into a single logical unit
  17. 25. A group of servers that act like a single system
  18. 26. Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
  19. 27. Enables a system to continue operating if one or more components fail
  20. 28. 99.999% uptime, less than 5.26 minutes downtime yearly