KPMG Infosec Challenge

1234567
Across
  1. 4. Don't share your _ _ _ _ _ _ _ _ with your colleagues & keep changing it as per policy.
  2. 5. _ _ _ _ _ _ _ _ _ _ is the process of encoding messages or information in such a way that only authorized parties can read it
  3. 6. _ _ _ _ _ _ _ _ is the first line of defense on network attacks.
  4. 7. Don't let outsiders _ _ _ _ _ _ _ _ you while you are using access cards .
Down
  1. 1. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _, Integrity & Availability are at the heart of information security
  2. 2. Don't download applications from internet as they may contain _ _ _ _ _.
  3. 3. Information _ _ _ _ _ _ _ _ is vital in day to day operations.
  4. 4. Be careful of suspicious emails, they might contain _ _ _ _ _ _ _ _ Links.