Risk Management

123456789
Across
  1. 4. Location that consists of everything that a business needs except computers
  2. 5. Process of downgrading-undoing a recently applied patch or updated
  3. 6. Documents that set out how to limit damage and recover quickly from an incident
  4. 7. Open source tool for penetration testing many aspects of wireless networks
  5. 9. Contract that defines the services, products, and time frames for the vendor to achieve
Down
  1. 1. Process of documenting significant changes to the network
  2. 2. Set of procedures defining actions employees should perform to protect the network's security
  3. 3. Popular and extremely comprehensive vulnerability testing tool
  4. 4. Document used to track the collection, handling, and transfer of evidence
  5. 8. A unique tool that enables a penetration tester to use a massive library of attacks as well as tweak those attacks for unique penetrations