Cybersecurity Fundamentals Chapter 8

1234567891011121314
Across
  1. 2. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
  2. 8. poorly enforced security policies, no awareness of security
  3. 9. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
  4. 10. open source linux security distribution.
  5. 12. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
  6. 13. a method of testing the areas of weakness in systems by using various malicious techniques.
  7. 14. includes the users who access the organization's information system.
Down
  1. 1. assess computer, computer systems, networks, or applications for weakness.
  2. 3. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
  3. 4. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
  4. 5. laws prohibit undesired behaviors.
  5. 6. intercept and log network traffic
  6. 7. provides free analysis and warning service to internet users and organizations.
  7. 11. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.