Information Security crossword

123456789101112131415
Across
  1. 2. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
  2. 4. ISO 27001 is the international standard for _____________
  3. 6. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  4. 8. Guarantee of reliable access to the information by authorized people
  5. 10. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
  6. 12. An asset that is essential to an organization and must be suitably protected
  7. 13. Prevents the unauthorized use or disclosure of information
  8. 14. You should never share this with anyone
  9. 15. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
Down
  1. 1. You should report Phishing emails in the ___________ console
  2. 3. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  3. 4. Protecting the accuracy and completeness of information and processing methods
  4. 5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  5. 7. Encodes the data in such a way that it is unintelligible without a key
  6. 8. A software program that is designed to prevent malware
  7. 9. Where to report a security incident? - __________@tavant.com
  8. 11. Effect of uncertainty on objectives
  9. 14. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details