Information Risk Management Date:07/07/2015

12345678910
Across
  1. 2. Potential cause of unwanted event
  2. 3. form of identity management
  3. 5. means of managing risk
  4. 6. combination of likelihood of an event and its impact
  5. 9. weakness of an asset that can be exploited
  6. 10. measure of the effect of a security event
Down
  1. 1. earthquake is a ________ threat
  2. 4. checking whether the organization has required controls is _____________ audit
  3. 7. secretly collect sensitive or classified information
  4. 8. information security program is aligned to _____________ of organization