Chapter 5 - Information Assurance Management

1234567891011121314151617181920
Across
  1. 5. Process of recognizing possible dangers to systems or information
  2. 9. Pillar that confirms actions can be traced to individuals
  3. 10. Pillar of information assurance that ensures data is accessible when needed
  4. 12. Practice that focuses mainly on protecting data from unauthorized access
  5. 14. Potential cause of harm to information systems
  6. 15. Stage in PDCA where plans are implemented
  7. 17. Pillar that proves actions or transactions occurred
  8. 18. Law that protects creative works such as software and digital content
  9. 20. Rules and agreements that apply across multiple countries
Down
  1. 1. Weakness that can be exploited by a threat
  2. 2. Law that protects personal data and privacy
  3. 3. Field that ensures information remains secure, reliable, and available
  4. 4. Law that governs misuse of computers and digital systems
  5. 6. Stage in PDCA where results are reviewed and evaluated
  6. 7. Pillar that ensures data is accurate and not altered improperly
  7. 8. Program designed to educate users about security risks and best practices
  8. 11. Process of identifying valuable items such as data, systems, and hardware
  9. 13. Pillar that ensures information is protected from unauthorized access
  10. 16. Systematic process of evaluating risks and deciding how to control them
  11. 19. Methodology that improves processes continuously