Across
- 3. Understanding the cause and scope of an incident
- 6. A memory overwrite caused by excessive data input
- 7. Isolating affected systems to prevent spread
- 8. Cross-functional groups coordinating governance activities
- 15. First phase in incident response: planning and readiness
- 16. VPN mode used for host-to-host connections
- 19. Risk strategy that reduces impact or likelihood
- 20. Identifying potential security incidents promptly
- 21. Abbreviation for attack where communication is intercepted and altered
- 22. Creates a secure tunnel over public networks
- 23. What your business loses when public trust is damaged
Down
- 1. Internal secure gateway for accessing internal systems
- 2. A hardened public-facing system used for secure remote access
- 4. Security device that protects web applications from attacks like XSS and SQLi
- 5. Risk strategy that eliminates the source of risk entirely
- 9. Risk strategy that shifts responsibility to a third party
- 10. Risk strategy that takes no action because the risk is tolerable
- 11. Restoring normal operations after an incident
- 12. Following laws, standards, and internal policies
- 13. Removing the threat and fixing vulnerabilities
- 14. Database attack that exploits misconfigured input validation
- 17. VPN mode used for site-to-site connections
- 18. Governance structure that sets strategic security direction
