ACSO Privacy and Information Security Awareness Week May 2023

123456789101112131415161718
Across
  1. 2. The accidental or deliberate exposure of sensitive ACSO information into an uncontrolled or unauthorised environment or to persons without a need–to–know. Data ______
  2. 3. refers to the potential for loss, damage, or harm resulting from threats exploiting vulnerabilities in information systems, networks, or data assets. Multi-step process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls
  3. 6. Refers to obtaining permission before information is obtained, used or shared
  4. 10. Stands for Multi-Factor Authentication.
  5. 11. It's a fraudulent attempt, usually via email or social engineering, to deceive individuals into providing sensitive information, such as passwords or credit card details, by posing as a legitimate entity.
  6. 12. the state of being unidentifiable or untraceable, ensuring that an individual's actions or information cannot be linked back to their real identity.
  7. 13. Stands for Virtual Private Network. It's used to connect to ACSO network when working from home
  8. 14. Section that explains how ACSO will manage the process of dealing with actual or suspected data _____ in accordance with the national Notifiable Data Breach Procedure
  9. 15. I in the CIA triad. assurance that information and systems remain consistent and unaltered
  10. 17. Role responsible for monitoring and reviewing privacy related processes in ACSO. Privacy _______
  11. 18. C in the CIA triad. protection of sensitive information from unauthorized access
Down
  1. 1. ACSO must ensure that the operation of information processing facilities, including operating systems, are secure and protected against malware and data loss. _______ security
  2. 2. Either unclassified or classified ACSO information identified as requiring extra protection. _______ Information
  3. 4. Section that explains how ACSO must take reasonable steps to destroy or permanently de-identify personal information if it is no longer needed for any purpose, unless an exception applies. Data _____
  4. 5. An occurrence or activity that may threaten the confidentiality, integrity or availability of ACSO information. Cybersecurity _____
  5. 6. The manager of the group that administers and operates that information asset or system
  6. 7. A in the CIA triad. timely and reliable access to information and resources
  7. 8. malicious software designed to infiltrate, damage, or disrupt computer systems, networks, or devices, often without the user's knowledge or consent.
  8. 9. It's a fundamental human right
  9. 16. refers to how all ACSO personnel are required to maintain their workspace, computer, mobile devices, printed materials and access cards to enhance privacy and information security. Clean _____ Policy