Information Security Policy
Across
- 3. The component of an effective EISP that answers the question, "What is this policy for?"
- 5. ISSP stands for _ -Specific Security Policies.
- 7. In the Bull's Eye Model, this is the center-most layer.
- 10. NIST stands for the National Institute of Standards and _ .
- 12. A _ is a detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
- 13. In the Bull's Eye Model, this is one of the middle layers.
Down
- 1. In the pyramid relationship for policies, practices, procedures, and guidelines; the two Industry, government, and regulatory exemplars standards and _ .
- 2. Policy must be able to stand up in _ if challenged.
- 4. In the pyramid relationship for policies, practices, procedures, and guidelines; these are the Practices sanctioned by management.
- 6. EISP stands for Enterprise Information Security _ .
- 7. Policy must be properly supported and _ .
- 8. In the Bull's Eye Model, this is one of the middle layers.
- 9. In the pyramid relationship for policies, practices, procedures, and guidelines; these influence an organizations documents?
- 11. Policy should never conflict with this.