Chapter 11 Computer Network Defense - Study Crossword

12345678910
Across
  1. 4. ____in Depth. Multiple layers of security measures to hinder our attackers.
  2. 7. Basic principles which govern how we secure data. The "I" in CIA.
  3. 8. Disaster ____Planning can allow us to withstand or recover from the attacks outages, and disasters that we were not able to prevent.
  4. 9. Being able to access data when we need it.
  5. 10. Pose the single largest security vulnerability that we have in any environment.
Down
  1. 1. Keeping data out of the hands of those not authorized.
  2. 2. An assessment that uses scanning tools to discover or expose weaknesses in our network.
  3. 3. Verifying the identity of an individual or system against a presented set of credentials.
  4. 5. Training effort used to secure the weakest link in our defenses--PEOPLE.
  5. 6. Computer Network ___. Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within a computer network.