Créer une activité
Jouer Mots Roulette
A
B
C
D
E
F
G
H
I
L
M
P
R
T
V
Starts with  
A
_____________ programmers are part of the security planning team.
Starts with  
B
Incident response is an organized approach to address and manage the aftermath of a security __________.
Starts with  
C
Access __________ is part of the Protection Phase of the NIST framework.
Starts with  
D
The third stage/phase of the NIST Cyber Security Framework.
Starts with  
E
An example of a point that must be protected when implementing a security plan.
Starts with  
F
In February 2021 this year, _____________ was the highest type of cyber attack incident reported to Cybersecurity Malaysia.
Starts with  
G
The _________ of incident response is to handle the situation in a way that limits damage and reduces recovery time and costs.
Starts with  
H
Something in the organization that you must make an inventory of when implementing a security plan.
Starts with  
I
A security attack or breach that has happened in an organization.
Starts with  
L
A key element of a good security policy is that it is enforceable by ________.
Starts with  
M
Budget, hiring and retention, insecure networks and insider threats are reasons why an organization must ________________ security.
Starts with  
P
The goal of computer security planning is to create good security ___________ in an organization.
Starts with  
R
With regard to the contents of a security plan, accountability refers to the person _____________.
Starts with  
T
When preparing for emergencies, we must always _________ the plan (again and again!)
Starts with  
V
When establishing policies and procedures, we must identify how security breaches and _______________ are reported.