Information Security

1234567891011121314
Across
  1. 2. Policy ensuring access is based on least privilege
  2. 4. Sensitive data classification requiring protection
  3. 7. Oversight structure of an information security program
  4. 8. Person responsible for overall security in an organization
  5. 9. Type of authentication requiring multiple credentials
  6. 10. A framework for reacting to security breaches
  7. 11. Data protection by converting it to unreadable format
  8. 14. Software to detect and remove malicious software
Down
  1. 1. Person ensuring security policies are integrated with employee lifecycle
  2. 3. Process of identifying and evaluating potential threats
  3. 5. Malicious software that demands payment
  4. 6. Subject Matter Expert, responsible for expertise in specific areas
  5. 10. Ensuring that information is accurate and unaltered
  6. 12. A method to store data to protect against loss
  7. 13. Network security system that monitors and controls traffic