U11 - Review Cyber Security Plan, Constraints & Test Plan

123456789101112
Across
  1. 3. (6,3,8) A type of testing ensures data can be restored.
  2. 6. (11,7) Simulate attacks to find weaknesses.
  3. 8. (5,3,16) as part of the CSP who manages security, audits, and response.
  4. 10. This part of the CSP ensures confidentiality, integrity, and availability of information.
  5. 12. (6,7) A type of testing that verifies permissions and authentication.
Down
  1. 1. This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
  2. 2. (13,8) Automated tools to detect flaws.
  3. 4. These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
  4. 5. (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
  5. 7. (5,8,4) (CSP) This outlines how to protect systems, data, and networks
  6. 9. Defines which systems, applications, and data are covered in the CSP.
  7. 11. (4,4) This ensures the security measures work as intended.