Information Security Management System (ISMS)

1234567891011121314
Across
  1. 3. HR personnel is assigned to prepare access request for HRIS and ______.
  2. 4. A default folder where essential corporate documents must be stored
  3. 8. ____________is everyone's responsibility
  4. 13. A secret word or phrase that are to be treated as sensitive, confidential information
Down
  1. 1. Signifies that asset is highly confidential/critical
  2. 2. A document that defines the accountability and responsibility of the Asset Owner (custodian) and records the status of the asset.
  3. 4. He signed the Information Security Policy
  4. 5. Is the official name of the repository of ISMS Policies, Standards, Procedures and Guidelines
  5. 6. New program launched in relation to ISMS where updates of which are shown through comic strips.
  6. 7. Strong password should be at least ____ characters long.
  7. 9. Also known as a confidentiality agreement
  8. 10. Information security events or incidents must immediately be reported to____________.
  9. 11. Aspects of Information Security
  10. 12. IT system used when requesting access or raising any IT requests
  11. 14. Recommended action for paper and printed material containing confidential information prior to disposal