Bengkel SOP 2024
Across
- 4. To protect systems from being compromised by malware and to prevent access to unauthorized web resources.
- 7. Objective ___ is to reduce the risk of fraud, error and bypassing of information security controls.
- 10. To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered is objective for ___.
- 11. Any devices that require wi-fi access must get authorized from ___.
- 12. How many guideline do we have in JTMD
Down
- 1. ___ is to preserve information security when executing changes.
- 2. How many policy do we have in ISP ?
- 3. Test information is To ensure relevance of testing and protection of operational information used for ___?
- 5. Copyright, software license, trademarks, design rights is example of ___.
- 6. Personal identifiable information should follow accordingly with ___.
- 8. ___ must be implemented to ensure data security, including at the stages of data in transit, data at rest, and data in use.
- 9. ___ is shortform for Information Security Policy