Information Security crossword

12345678910111213141516
Across
  1. 3. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. 4. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. 8. ______ of any organizational security policy can result in disciplinary actions
  4. 9. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. 10. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. 13. A formal process for training and educating employees about IT protection
  7. 16. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. 1. An asset that is essential to an organization and must be suitably protected
  2. 2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. 5. Prevents the unauthorized use or disclosure of information
  4. 6. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. 7. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. 11. Guarantee of reliable access to the information by authorized people
  7. 12. Protecting the accuracy and completeness of information and processing methods
  8. 14. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. 15. Effect of uncertainty on objectives