Bengkel SOP 2024

123456789101112
Across
  1. 4. To protect systems from being compromised by malware and to prevent access to unauthorized web resources.
  2. 7. Objective ___ is to reduce the risk of fraud, error and bypassing of information security controls.
  3. 10. To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered is objective for ___.
  4. 11. Any devices that require wi-fi access must get authorized from ___.
  5. 12. How many guideline do we have in JTMD
Down
  1. 1. ___ is to preserve information security when executing changes.
  2. 2. How many policy do we have in ISP ?
  3. 3. Test information is To ensure relevance of testing and protection of operational information used for ___?
  4. 5. Copyright, software license, trademarks, design rights is example of ___.
  5. 6. Personal identifiable information should follow accordingly with ___.
  6. 8. ___ must be implemented to ensure data security, including at the stages of data in transit, data at rest, and data in use.
  7. 9. ___ is shortform for Information Security Policy