Information Security Policy

12345678910111213
Across
  1. 3. The component of an effective EISP that answers the question, "What is this policy for?"
  2. 5. ISSP stands for _ -Specific Security Policies.
  3. 7. In the Bull's Eye Model, this is the center-most layer.
  4. 10. NIST stands for the National Institute of Standards and _ .
  5. 12. A _ is a detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
  6. 13. In the Bull's Eye Model, this is one of the middle layers.
Down
  1. 1. In the pyramid relationship for policies, practices, procedures, and guidelines; the two Industry, government, and regulatory exemplars standards and _ .
  2. 2. Policy must be able to stand up in _ if challenged.
  3. 4. In the pyramid relationship for policies, practices, procedures, and guidelines; these are the Practices sanctioned by management.
  4. 6. EISP stands for Enterprise Information Security _ .
  5. 7. Policy must be properly supported and _ .
  6. 8. In the Bull's Eye Model, this is one of the middle layers.
  7. 9. In the pyramid relationship for policies, practices, procedures, and guidelines; these influence an organizations documents?
  8. 11. Policy should never conflict with this.