Chapter 12 Security Plus Crossword

123456789101112131415161718192021
Across
  1. 5. streams of information containing data about various cyber threats
  2. 9. Payment to a third-party for assuming risks
  3. 10. The willingness to assume a level of risk in order to achieve a result
  4. 11. Verifying that the organization is in compliance with required standards
  5. 13. Threat intelligence data that has been legally gathered
  6. 15. An examination of results to verify their accuracy
  7. 17. An alarm that is raised when there is no problem.
  8. 18. Directly probing for vulnerabilities
  9. 20. Using tools in a penetration test that do not raise any alarms
  10. 21. Analyzing a vulnerability scan for validation of its accuracy
Down
  1. 1. A subjective estimate of the loss to an asset if the specific threat occurs
  2. 2. pay security researchers who uncover security bugs
  3. 3. To treat one item as more important than another.
  4. 4. Relating to ownership.
  5. 6. assessment that attempts to uncover vulnerabilities and then exploit them
  6. 7. Numeric scores on a vulnerability
  7. 8. The failure to raise an alarm when there is an issue.
  8. 12. A judgment made about the results of an audit
  9. 14. Conformity to mandated standards
  10. 16. Part of the web that is the domain of threat actors
  11. 19. Assessments by independent third-party auditors