Information Security
Across
- 2. Policy ensuring access is based on least privilege
- 4. Sensitive data classification requiring protection
- 7. Oversight structure of an information security program
- 8. Person responsible for overall security in an organization
- 9. Type of authentication requiring multiple credentials
- 10. A framework for reacting to security breaches
- 11. Data protection by converting it to unreadable format
- 14. Software to detect and remove malicious software
Down
- 1. Person ensuring security policies are integrated with employee lifecycle
- 3. Process of identifying and evaluating potential threats
- 5. Malicious software that demands payment
- 6. Subject Matter Expert, responsible for expertise in specific areas
- 10. Ensuring that information is accurate and unaltered
- 12. A method to store data to protect against loss
- 13. Network security system that monitors and controls traffic