Across
- 3. Reduces the severity of the loss or the likelihood of the loss from occurring
- 5. Prevent a disaster from occurring
- 6. The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- 10. Gets critical systems to another location while repair of the original facility is under way
- 15. Avoiding complex solutions that users cannot understand or troubleshoot
- 18. Ability to maintain availability during disruptive events
- 20. Restricting access so that users only have the level of access required to do their job
- 23. It is critical to keep an organization functioning when a disaster occurs
- 29. Manages a complete inventory of hardware and software
- 30. Discover the incident
- 31. Plan for potential incidents
Down
- 1. Creating a barrier of multiple defences to prevent attacks
- 2. Identifies specific hardware and software products that the organization uses and supports
- 4. Breaching one layer of security does not compromise the whole system
- 7. Discover unwanted events
- 8. Investigate the cause of the incident and ask questions to better understand the nature of the threat
- 9. Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- 11. Enhances system reliability and availability by distributing them across multiple physical locations
- 12. Manages a full inventory of hardware and software components that are vulnerable to security risks
- 13. Network protocol that provides for redundancy
- 14. Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- 16. The set of procedures that an organization follows after an event occurs outside the normal range
- 17. Assigns all resources into a group based on common characteristics
- 19. Restore the system after a disaster
- 21. Minimizes risk by staying ahead of cybercriminals
- 22. Ensures system availability in the event of a component failure
- 24. Combines multiple physical hard drives into a single logical unit
- 25. A group of servers that act like a single system
- 26. Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- 27. Enables a system to continue operating if one or more components fail
- 28. 99.999% uptime, less than 5.26 minutes downtime yearly