Basic Terminologies
Across
- 3. form of identity management
- 5. weakness of an asset that can be exploited
- 7. information security program is aligned to _____________ of organization
- 8. means of managing risk
- 10. measure of the effect of a security event
Down
- 1. checking whether the organization has required controls is _____________ audit
- 2. Potential cause of unwanted event
- 4. secretly collect sensitive or classified information
- 6. combination of likelihood of an event and its impact
- 9. earthquake is a ________ threat