Across
- 3. maintaining list of all hardware, software and more
- 5. updating software to make sure there are no gaps or vulnerabilities
- 6. Method for limiting and controlling access to high-value systems, accounts, data
- 9. Should be offline, segmented and tested with RTO validation as a critical last line of defense
- 11. Product for detecting endpoint activity
- 12. _security to protect your organization from phishing attempts
Down
- 1. _classification and structured _ management. knowing where it lives and how it's protected is critical.
- 2. needed to review recorded events and activities within systems, networks, applications
- 4. _ segmentation, which limits blast radius, protects crown jewels, and slows down adversaries.
- 7. What method of security requires users to verify their identity with multiple forms of authentication?
- 8. often goes hand in hand with TTX
- 10. safeguards, policies, processes, or techniques designed to protect assets
