Cyber Security
Across
- 2. Logs and Event Management provided in JICA Project
- 3. Set of rules, policies and operations that a company uses to achieve its business goals
- 8. Compliance is act of following rules, laws and regulations
- 10. Network Monitoring system short form
- 11. Term that Deals with Organization secret data
- 13. Operates continuously and Data visible 24*7
- 14. Next Generation Firewall brand provided in JICA Project
Down
- 1. Term used to define Weakness
- 4. Keeping Information and Communication Private
- 5. Terms used for Logging all the user activity
- 6. Keeping Organizational information accurate and free of errors
- 7. Authorizing a Person to perform certain activity
- 9. cybersecurity standards for OT technology
- 12. Role Based Access Control