ISMS

1234567891011121314151617181920
Across
  1. 2. The process of encoding information to protect its confidentiality and integrity
  2. 4. Removal of existing security threats
  3. 6. Physical components used to secure information and devices
  4. 9. Information assets and data needing protection
  5. 11. Measures to avoid potential security threats
  6. 12. Protection of intellectual property rights
  7. 14. Identification of threats as they arise
  8. 18. Engineering-based security solutions for information protection
  9. 19. The principle focused on protecting personal, organizational, or state-related secrets
  10. 20. A digital tool used to verify the authenticity of a document's sender
Down
  1. 1. Programs designed to secure information within computer systems
  2. 3. The continuous practice of monitoring, updating, and enhancing security protocols
  3. 4. The process of assessing vulnerabilities and threats to information systems
  4. 5. A mechanism to confirm a user's identity in a computer system
  5. 7. The trustworthiness and dependability of security measures
  6. 8. Type of security protection involving physical barriers and equipment
  7. 10. Returning systems to their state prior to a security breach
  8. 13. Type of security measure involving compliance with laws
  9. 15. Potential event or action that could compromise information security
  10. 16. Assessment and processing of information to predict and prevent criminal actions
  11. 17. Allowing authorized users to retrieve necessary information