CS Chapters 7 and 8Online version Chapter 7: Creating a Security Plan Chapter 8: Disaster Recovery by Aidora Abdullah A B C D E F G H I L M P R T V Starts with A _____________ programmers are part of the security planning team. Starts with B Incident response is an organized approach to address and manage the aftermath of a security __________. Starts with C Access __________ is part of the Protection Phase of the NIST framework. Starts with D The third stage/phase of the NIST Cyber Security Framework. Starts with E An example of a point that must be protected when implementing a security plan. Starts with F In February 2021 this year, _____________ was the highest type of cyber attack incident reported to Cybersecurity Malaysia. Starts with G The _________ of incident response is to handle the situation in a way that limits damage and reduces recovery time and costs. Starts with H Something in the organization that you must make an inventory of when implementing a security plan. Starts with I A security attack or breach that has happened in an organization. Starts with L A key element of a good security policy is that it is enforceable by ________. Starts with M Budget, hiring and retention, insecure networks and insider threats are reasons why an organization must ________________ security. Starts with P The goal of computer security planning is to create good security ___________ in an organization. Starts with R With regard to the contents of a security plan, accountability refers to the person _____________. Starts with T When preparing for emergencies, we must always _________ the plan (again and again!) Starts with V When establishing policies and procedures, we must identify how security breaches and _______________ are reported.