Second ISMS Crossword Puzzle

123456789101112131415
Across
  1. 2. _______allows for clear and easy understanding of who will be granted access to given information
  2. 5. a means of escaping a building in the event of fire.
  3. 8. The art of tricking or manipulating people into providing information that they normally would not provide
  4. 10. Which is independent malicious program that need not any host program?
  5. 11. Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.
  6. 12. Data that is of no use to company is termed as______?
  7. 13. Procedure that's used to check a business's performance.
  8. 14. ________is a document that contains a list of the tasks that has to be completed as part of an audit.
  9. 15. This is known as goldmine of information
Down
  1. 1. This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
  2. 3. A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
  3. 4. What common attack can be used by the attacker against a system for password cracking?
  4. 6. A(n) ____________________ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.
  5. 7. This technology is used to measure and analyse human body characteristics for authentication purposes.
  6. 9. Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident.