IS Security and the Dark Side of IT

1234567891011
Across
  1. 3. Adherence to rules, regulations, or policies to ensure proper behavior or operations.
  2. 4. Measures taken to protect computer systems and data from theft, damage, or unauthorized access.
  3. 6. Strategies and processes used to identify, assess, and mitigate potential risks.
  4. 9. The act of coercing someone by threatening to reveal embarrassing or damaging information.
  5. 10. A difficulty or problem that requires creative solutions or efforts to overcome.
  6. 11. The hidden part of the internet where illegal activities often occur.
Down
  1. 1. A set of rules or guidelines that govern behavior or decision-making within an organization.
  2. 2. A breach or infringement of a rule, law, or policy.
  3. 5. Protective measures taken to safeguard against potential threats.
  4. 7. Individuals within an organization who have access to sensitive information.
  5. 8. Measures taken to protect against threats, ensuring the safety and integrity of systems, data, and assets.