1
Protection from disclosure and unathorized use.
2
An action, device, procedure or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it.
3
A weakness in a system's design, implementation or operation and management that could be exploited to violate the system's security policy.
4
The stage in cybersecurity incident response that involves removing the incident from the organization's systems and networks.
5
Protection of information from unauthorized modification or destruction.
6
threats that originate from outside an organization.
7
Risk assessment is an example of a ___________________ management activity.
8
Security _______________ is the process of identifying and addressing potential security threats to an organization's computer systems and networks.
9
The goal of incident response is to _________________ the impact of a cybersecurity incident.
10
a formal statement that specifies a set of rules required for gaining access to cyber security assets.