Second ISMS Crossword Puzzle
Across
- 2. _______allows for clear and easy understanding of who will be granted access to given information
- 5. a means of escaping a building in the event of fire.
- 8. The art of tricking or manipulating people into providing information that they normally would not provide
- 10. Which is independent malicious program that need not any host program?
- 11. Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.
- 12. Data that is of no use to company is termed as______?
- 13. Procedure that's used to check a business's performance.
- 14. ________is a document that contains a list of the tasks that has to be completed as part of an audit.
- 15. This is known as goldmine of information
Down
- 1. This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
- 3. A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
- 4. What common attack can be used by the attacker against a system for password cracking?
- 6. A(n) ____________________ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.
- 7. This technology is used to measure and analyse human body characteristics for authentication purposes.
- 9. Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident.