Across
- 2. What is the highest level of policy in the security policy hierarchy?
- 7. What executive role, abbreviated as CSO, is primarily concerned with ensuring the security of an organization's assets?
- 8. Name a tool that helps in analyzing security event logs and data correlation.
- 11. What are policies that relate to the operations and technical aspects of security?
- 12. Type of network test that involves examining the network for vulnerabilities.
- 13. Type of network test involving attempting to gain unauthorized access to a system or network.
- 14. What tool is often used for network scanning and port mapping?
Down
- 1. This network test involves examining the system's response to various attempts to breach its security.
- 3. What type of documents outline, rules, and procedures related to security measures within an organization?
- 4. What type of policies govern the actions and behaviors of end users?
- 5. This network test involves analyzing the logs generated by various network devices for security-related events.
- 6. Which tool is known for its vulnerability scanning capabilities?
- 8. What is a popular open-source tool for network auditing?
- 9. What is the title commonly abbreviated as CEO, responsible for the overall management of an organization?
- 10. Network test that checks for the presence of malicious software on the network.
