Puzzle - 7
Across
- 1. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
- 3. a regular system update released by developers to fix bugs and other software vulnerabilities
- 6. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- 8. a list of permitted items that are automatically let through whatever gate is being used.
- 9. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
- 1. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- 2. State of being safe / free from danger or threat
- 4. a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system, except those explicitly mentioned which are denied access.
- 5. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- 7. The programs and other operating information used by a computer