Cybersecurity Unit 10 Crossword

12345678910111213141516
Across
  1. 2. also known as a "white list"
  2. 4. any software that relies upon by other applications and software
  3. 5. predefined responses for security incidents
  4. 6. this type of restart is needed for applying updates
  5. 8. when a system is unavailable
  6. 10. involves assessing all existing security controls, policies and procedures
  7. 13. step-by-step instructions for security measures
  8. 15. ideal security position based on industry standards
  9. 16. define requirements for security controls and configurations
Down
  1. 1. prioritization of improving security and moving to the desired state
  2. 3. also known as "block lists"
  3. 7. limiting certain actions or behaviors
  4. 9. comparing the current and desired states
  5. 11. Comparing the current state of an organization's security position to a desired state
  6. 12. never trust, always verify
  7. 14. these types of apps are outdated and older