Information Security Management System (ISMS)
Across
- 3. HR personnel is assigned to prepare access request for HRIS and ______.
- 4. A default folder where essential corporate documents must be stored
- 8. ____________is everyone's responsibility
- 13. A secret word or phrase that are to be treated as sensitive, confidential information
Down
- 1. Signifies that asset is highly confidential/critical
- 2. A document that defines the accountability and responsibility of the Asset Owner (custodian) and records the status of the asset.
- 4. He signed the Information Security Policy
- 5. Is the official name of the repository of ISMS Policies, Standards, Procedures and Guidelines
- 6. New program launched in relation to ISMS where updates of which are shown through comic strips.
- 7. Strong password should be at least ____ characters long.
- 9. Also known as a confidentiality agreement
- 10. Information security events or incidents must immediately be reported to____________.
- 11. Aspects of Information Security
- 12. IT system used when requesting access or raising any IT requests
- 14. Recommended action for paper and printed material containing confidential information prior to disposal