Security in Cognizant
Across
- 6. General term for software programs that have been designed with or can be used for malicious intent
- 7. What sort of secure communication can be used to send code or project-critical documents
- 8. When access to a work area is no longer required, it should be informed immediately to the Manager and
- 10. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be
- 11. individuals other than Associates who enter Cognizant workplaces
Down
- 1. The property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- 2. reserves the right to monitor, access, and disclose any IM communication
- 3. The property of safeguarding the accuracy and completeness of assets
- 4. Any Person Working for Cognizant utilizing Cognizant Email Infrastructure
- 5. Anything that has value to the organization
- 7. What should be done with the project related documents that are no longer needed
- 9. Associates can download software for business use only after obtaining approval from their manager and
- 10. The property of being accessible and usable upon demand by an authorized entity