Information Security Challenge

12345678910
Across
  1. 1. Grants access based on job responsibilities.
  2. 5. Training staff to recognize and respond to security threats.
  3. 6. Ensuring sensitive information is not disclosed to unauthorized people.
  4. 9. Removing system access when an employee leaves or changes roles.
  5. 10. The policy for Keeping workspaces free of exposed confidential information.
Down
  1. 2. Employer’s process to verify a candidate’s history.
  2. 3. Protecting personal information from misuse or exposure.
  3. 4. Guidelines/Policy for proper use of company systems and data.
  4. 7. Policy for creating and managing secure login credentials.
  5. 8. Policy for how long data is stored before deletion