GT Cyber Security Fun Quiz
Across
- 3. ____________________ of duties principle means there should not be any employee who handle and entire process singly.
- 4. Computers or devices authorised for remote access must be __________________ and installed with latest operating system security patches, antivirus / anti-malware software and signatures.
- 6. ______________________ is a security practice that involves examining system logs to detect and respond to unauthorised activities.
- 8. Access to information systems and endpoints must be controlled on the basis of business and security requirement based on the _______________ and least privilege principles with proper authorization.
- 9. _____________________ is a method used to exploit a vulnerability in a system to gain unauthorised access.
- 10. Use of _________________ data in development and test environments is strictly prohibited.
Down
- 1. Employees must ensure that data classified as confidential and highly confidential are encrypted with strong _____________ or password protection when transmitted over external networks.
- 2. Regular compliance check on system configurations must be conducted on periodic basis and in the event of revision of security ______________________.
- 5. Passwords value entered must be masked by __________________.
- 7. Group must implement strong governance to protect the confidentiality, integrity and ________________ and safety of Group data and information systems, and mitigate against the risk of information security threat.