CHAPTER 4 CF

12345678910111213
Across
  1. 3. A formal document outlining security policies, procedures, and guidelines for safeguarding information assets.
  2. 5. The process involves the continuous implementation and management of security policies, involving regular updates, audits, and adherence to established guidelines.
  3. 7. The process involves setting access controls on files and folders to restrict their viewing, modification, or deletion permissions.
  4. 9. The guidelines outline the process for checking out and introducing new employees.
  5. 11. To manage permissions effectively
  6. 12. The framework and oversight for security policies are established, outlining roles and responsibilities for policy enforcement and review.
  7. 13. The guidelines emphasize the importance of honesty and professionalism in employee behavior.
Down
  1. 1. Rules for regulating access to specific physical spaces, such as offices or server rooms.
  2. 2. Grouping users based on roles, such as marketing or IT staff, and assigning specific access allows for efficient management of permissions for multiple users simultaneously.
  3. 4. This ensures the security and compliance of all systems by detecting any errors or misuse of access.
  4. 6. The process involves creating user accounts and determining the specifics of what each user can access or perform on the system.
  5. 8. Authentication methods rely on unique biological traits like fingerprints, facial recognition, or iris scans.
  6. 10. Devices or software that generate one-time codes or credentials for authentication.