Global Security Culture Program
Across
- 4. Zones The main content of the second activity.
- 7. levels Security measure distributed based on job role
- 8. The process by which all individuals and objects are screened going into and out of the Red Zone. - CICO
Down
- 1. Force Open An alarm that will be triggered when someone opens a door without receiving "access granted" (green light)
- 2. Zone Security Zone that inside building, out side secured data hallCustomer Data The MOST important asset within our Red Zone data hallBreakaway connector Safety mechanism to prevent choking/strangulation hazard
- 3. Zone Security Zone that inside fence line, outside building
- 5. Amazon data centers use the what system to securely manage physical keys, which can control access permissions and track key usage history.
- 6. Risk Media Bin Keys belongs to which Key Risk Matrix.