Créer jeu
Jouer Mots Croisés
1 Protection from disclosure and unathorized use.
2 An action, device, procedure or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it.
3 A weakness in a system's design, implementation or operation and management that could be exploited to violate the system's security policy.
4 The stage in cybersecurity incident response that involves removing the incident from the organization's systems and networks.
5 Protection of information from unauthorized modification or destruction.
6 threats that originate from outside an organization.
7 Risk assessment is an example of a ___________________ management activity.
8 Security _______________ is the process of identifying and addressing potential security threats to an organization's computer systems and networks.
9 The goal of incident response is to _________________ the impact of a cybersecurity incident.
10 a formal statement that specifies a set of rules required for gaining access to cyber security assets.
2
3
10
4
5
8
6
9
1
7