security testing

1234567891011121314
Across
  1. 2. What is the highest level of policy in the security policy hierarchy?
  2. 7. What executive role, abbreviated as CSO, is primarily concerned with ensuring the security of an organization's assets?
  3. 8. Name a tool that helps in analyzing security event logs and data correlation.
  4. 11. What are policies that relate to the operations and technical aspects of security?
  5. 12. Type of network test that involves examining the network for vulnerabilities.
  6. 13. Type of network test involving attempting to gain unauthorized access to a system or network.
  7. 14. What tool is often used for network scanning and port mapping?
Down
  1. 1. This network test involves examining the system's response to various attempts to breach its security.
  2. 3. What type of documents outline, rules, and procedures related to security measures within an organization?
  3. 4. What type of policies govern the actions and behaviors of end users?
  4. 5. This network test involves analyzing the logs generated by various network devices for security-related events.
  5. 6. Which tool is known for its vulnerability scanning capabilities?
  6. 8. What is a popular open-source tool for network auditing?
  7. 9. What is the title commonly abbreviated as CEO, responsible for the overall management of an organization?
  8. 10. Network test that checks for the presence of malicious software on the network.