Across
- 2. Weakness that can be exploited
- 7. Malware that encrypts data for payment
- 10. Metric used to measure performance
- 11. Operating system commonly used for servers
- 16. Linux command to change directories
- 17. Organizational rule set for secure operations
- 19. Legacy firmware used for system startup
- 20. Role-based access control
- 21. Security triad acronym
- 24. Underlying cause of one or more incidents
- 26. Attack that overwhelms a server with traffic
- 27. System component that records events
- 31. Ensuring systems are accessible when needed
- 32. Temporary memory used for active processes
- 33. Discipline for managing IT services
- 34. Popular web server software
Down
- 1. Machine that provides services on a network
- 3. Memory dedicated to video processing
- 4. Linux command for listing directory contents
- 5. Linux command for removing files
- 6. Fully qualified domain name
- 8. Tracking all organizational IT assets
- 9. Software that manages virtual machines
- 12. Framework for managing IT services
- 13. US healthcare privacy regulation
- 14. Modern replacement for BIOS
- 15. EU data protection regulation
- 18. Unplanned interruption to an IT service
- 22. Hardware or software item tracked in ITSM
- 23. Server that forwards requests on behalf of a client
- 25. Linux command to create directories
- 28. Prioritizing incidents based on impact and urgency
- 29. Detectable occurrence in an IT environment
- 30. Authentication, Authorization, Accounting framework
