Managing Risk

123456789
Across
  1. 2. A contract that defines the services,products, and time frames for the vendor to achieve.
  2. 4. A location that consists of a building, facilities, desks,toilets, parking, and everything that a business needs except computers.
  3. 6. A Document that defines what a person may and may not do on an organization’s computer and networks
  4. 7. A document used to track the collection, handling, and transfer of evidence.
  5. 8. The process of downgrading—undoing—a recently applied patch or updated.
  6. 9. A document between a customer and a service provider that defines the scope, quality, and terms of the service to be provided.
Down
  1. 1. Facility with all of the physical resources, computers, and network infrastructure to recover from a primary site disaster. A warm site does not have current backup data and it may take a day or more to recover and install backups before business operations can recommence.Aircrack-ng- An open source tool for penetration testing many aspects of wirless networks
  2. 3. A set of procedures defining actions employees should perform to protect the network’s security.
  3. 5. An open source tool for penetration testing many aspects of wirless networks
  4. 7. A set of documents that Defines procedures for changes to the network.