Security in Cognizant

1234567891011
Across
  1. 6. General term for software programs that have been designed with or can be used for malicious intent
  2. 7. What sort of secure communication can be used to send code or project-critical documents
  3. 8. When access to a work area is no longer required, it should be informed immediately to the Manager and
  4. 10. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be
  5. 11. individuals other than Associates who enter Cognizant workplaces
Down
  1. 1. The property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  2. 2. reserves the right to monitor, access, and disclose any IM communication
  3. 3. The property of safeguarding the accuracy and completeness of assets
  4. 4. Any Person Working for Cognizant utilizing Cognizant Email Infrastructure
  5. 5. Anything that has value to the organization
  6. 7. What should be done with the project related documents that are no longer needed
  7. 9. Associates can download software for business use only after obtaining approval from their manager and
  8. 10. The property of being accessible and usable upon demand by an authorized entity