Across
- 3. Tracking activities to detect unauthorized access or misuse.
- 7. The process of verifying a user's identity before access.
- 9. Potential for a threat to exploit a vulnerability.
- 10. Baseline settings to protect systems and reduce vulnerabilities.
- 11. Organized methods for securing and managing resources.
Down
- 1. Evaluation of systems to ensure compliance with security policies.
- 2. Training to help users recognize and prevent security threats.
- 4. Plans for continuity during an unexpected disruption.
- 5. Regular updates and repairs to keep systems secure.
- 6. An event that compromises the security of information.
- 8. Control mechanisms for who can enter or use resources.
- 9. Procedures for restoring data and systems after an incident.
