Enterprise Information Security Policy

12345678910111213141516
Across
  1. 1. ____ is compromised of 60 standards
  2. 3. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
  3. 7. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
  4. 9. A Credential established by a sequence of characters used as a secret key
  5. 10. The physical elements of a computer system
  6. 14. Verifying the identity of a user, machine, software component, device, or other entity.
  7. 16. The set of characteristics by which a Person is definitively recognizable or known.
Down
  1. 2. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
  2. 4. _____ implements standards to protect Protected Health Information (PHI).
  3. 5. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
  4. 6. Any type of storage device that can be removed from a computer while the system is running.
  5. 8. A piece of Software intended to update an electronic Information Resource.
  6. 11. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
  7. 12. A person or persons responsible for supervising people or work.
  8. 13. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
  9. 15. Protected Health Information acronym