Across
- 4. Set of defined actions to take in accordance with established policy.
- 5. Minimum requirements from federal and state agencies and insurance companies to keep consumer data and critical infrastructure safe from cyber attacks.
- 6. Set of actions taken after a cyber event has occurred.
- 7. Information systems that include computers, mobile phones, tablets, security cameras, and any device that communicates over the internet, etc.
Down
- 1. Cybersecurity programs must be established, maintained, and is not a set it and forget it matter.
- 2. Bad actors, customers, contractors, employees, partners, visitors, and even individuals in your household.
- 3. Technical and non-technical measures to know that you have been compromised.
- 4. People, processes, and technologies to keep information and information systems safe from alteration, destruction, and exploitation.