policies security

123456789101112131415
Across
  1. 4. Rules that guide security behavior
  2. 6. Examining the incident to understand impact
  3. 7. Protection of personal information
  4. 9. Harmful software that infects systems
  5. 11. Investigating digital evidence
  6. 14. A violation or threat to security policies
  7. 15. Process of identifying an incident
Down
  1. 1. Stopping the spread of an attack
  2. 2. Copy of data used for restoration
  3. 3. Recorded system activities
  4. 5. Attack using fake messages to steal data
  5. 8. Data collected during investigation
  6. 10. Following laws and regulations
  7. 12. Major event causing serious damage
  8. 13. Restoring systems after an incident