Ethics To Technology (ch.3)

123456
Across
  1. 2. Refers to confidentiality, integrity, and availability.
  2. 3. A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.
  3. 5. The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
  4. 6. A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.
Down
  1. 1. Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.
  2. 4. A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.