Security Audit Quiz

123456789101112131415
Across
  1. 3. The probability of a threat exploiting a vulnerability.
  2. 6. NIST CSF function focused on safeguarding assets
  3. 7. Final step of an audit process.
  4. 8. Checking compliance to documented requirements.
  5. 9. A weakness that can be exploited.
  6. 11. A potential cause of an unwanted incident.
  7. 13. Ability to track actions back to individuals or systems.
  8. 15. U.S. body responsible for cybersecurity standards.
Down
  1. 1. The defined boundary of an audit.
  2. 2. measures implemented to reduce risk.
  3. 4. Level of harm from a compromise.
  4. 5. Unauthorized attempt to access a system.
  5. 10. Critical element of CIA triad.
  6. 12. Testing to confirm proper implementation.
  7. 14. Adhering to required standards or regulations.