GT Cyber Security Fun Quiz

12345678910
Across
  1. 3. ____________________ of duties principle means there should not be any employee who handle and entire process singly.
  2. 4. Computers or devices authorised for remote access must be __________________ and installed with latest operating system security patches, antivirus / anti-malware software and signatures.
  3. 6. ______________________ is a security practice that involves examining system logs to detect and respond to unauthorised activities.
  4. 8. Access to information systems and endpoints must be controlled on the basis of business and security requirement based on the _______________ and least privilege principles with proper authorization.
  5. 9. _____________________ is a method used to exploit a vulnerability in a system to gain unauthorised access.
  6. 10. Use of _________________ data in development and test environments is strictly prohibited.
Down
  1. 1. Employees must ensure that data classified as confidential and highly confidential are encrypted with strong _____________ or password protection when transmitted over external networks.
  2. 2. Regular compliance check on system configurations must be conducted on periodic basis and in the event of revision of security ______________________.
  3. 5. Passwords value entered must be masked by __________________.
  4. 7. Group must implement strong governance to protect the confidentiality, integrity and ________________ and safety of Group data and information systems, and mitigate against the risk of information security threat.