Global Security Culture Program

12345678
Across
  1. 4. Zones The main content of the second activity.
  2. 7. levels Security measure distributed based on job role
  3. 8. The process by which all individuals and objects are screened going into and out of the Red Zone. - CICO
Down
  1. 1. Force Open An alarm that will be triggered when someone opens a door without receiving "access granted" (green light)
  2. 2. Zone Security Zone that inside building, out side secured data hallCustomer Data The MOST important asset within our Red Zone data hallBreakaway connector Safety mechanism to prevent choking/strangulation hazard
  3. 3. Zone Security Zone that inside fence line, outside building
  4. 5. Amazon data centers use the what system to securely manage physical keys, which can control access permissions and track key usage history.
  5. 6. Risk Media Bin Keys belongs to which Key Risk Matrix.