Across
- 3. A formal document outlining security policies, procedures, and guidelines for safeguarding information assets.
- 5. The process involves the continuous implementation and management of security policies, involving regular updates, audits, and adherence to established guidelines.
- 7. The process involves setting access controls on files and folders to restrict their viewing, modification, or deletion permissions.
- 9. The guidelines outline the process for checking out and introducing new employees.
- 11. To manage permissions effectively
- 12. The framework and oversight for security policies are established, outlining roles and responsibilities for policy enforcement and review.
- 13. The guidelines emphasize the importance of honesty and professionalism in employee behavior.
Down
- 1. Rules for regulating access to specific physical spaces, such as offices or server rooms.
- 2. Grouping users based on roles, such as marketing or IT staff, and assigning specific access allows for efficient management of permissions for multiple users simultaneously.
- 4. This ensures the security and compliance of all systems by detecting any errors or misuse of access.
- 6. The process involves creating user accounts and determining the specifics of what each user can access or perform on the system.
- 8. Authentication methods rely on unique biological traits like fingerprints, facial recognition, or iris scans.
- 10. Devices or software that generate one-time codes or credentials for authentication.
