Security
Across
- 2. Do not share your login ___
- 6. In the realm of computers, the act of obtaining secure data by conning an individual into revealing secure information
- 8. Policy, which restrict sending mail to public mail domain
- 9. This is the process of encoding messages or information in such a way that only authorized parties can read it
- 10. All project information must be classified as ___
Down
- 1. Activity to ensure the effectiveness and adequacy of BCP
- 3. When a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint
- 4. This can be used only to send personal information like payslip, PF statement from TCS mail domain to public mail domain
- 5. Where does Risks are captured
- 6. All unwanted paper based sensitive documents including confidential and proprietary documents must be ___
- 7. TCS is following ___ standard for business continuity Management
- 11. TCS enterprise wide certified against this ISO standard for information security