Security

1234567891011
Across
  1. 2. Do not share your login ___
  2. 6. In the realm of computers, the act of obtaining secure data by conning an individual into revealing secure information
  3. 8. Policy, which restrict sending mail to public mail domain
  4. 9. This is the process of encoding messages or information in such a way that only authorized parties can read it
  5. 10. All project information must be classified as ___
Down
  1. 1. Activity to ensure the effectiveness and adequacy of BCP
  2. 3. When a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint
  3. 4. This can be used only to send personal information like payslip, PF statement from TCS mail domain to public mail domain
  4. 5. Where does Risks are captured
  5. 6. All unwanted paper based sensitive documents including confidential and proprietary documents must be ___
  6. 7. TCS is following ___ standard for business continuity Management
  7. 11. TCS enterprise wide certified against this ISO standard for information security