Secure the Grid: Security Control Families Crossword

1234567891011
Across
  1. 3. Tracking activities to detect unauthorized access or misuse.
  2. 7. The process of verifying a user's identity before access.
  3. 9. Potential for a threat to exploit a vulnerability.
  4. 10. Baseline settings to protect systems and reduce vulnerabilities.
  5. 11. Organized methods for securing and managing resources.
Down
  1. 1. Evaluation of systems to ensure compliance with security policies.
  2. 2. Training to help users recognize and prevent security threats.
  3. 4. Plans for continuity during an unexpected disruption.
  4. 5. Regular updates and repairs to keep systems secure.
  5. 6. An event that compromises the security of information.
  6. 8. Control mechanisms for who can enter or use resources.
  7. 9. Procedures for restoring data and systems after an incident.