Across
- 2. The accidental or deliberate exposure of sensitive ACSO information into an uncontrolled or unauthorised environment or to persons without a need–to–know. Data ______
- 3. refers to the potential for loss, damage, or harm resulting from threats exploiting vulnerabilities in information systems, networks, or data assets. Multi-step process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls
- 6. Refers to obtaining permission before information is obtained, used or shared
- 10. Stands for Multi-Factor Authentication.
- 11. It's a fraudulent attempt, usually via email or social engineering, to deceive individuals into providing sensitive information, such as passwords or credit card details, by posing as a legitimate entity.
- 12. the state of being unidentifiable or untraceable, ensuring that an individual's actions or information cannot be linked back to their real identity.
- 13. Stands for Virtual Private Network. It's used to connect to ACSO network when working from home
- 14. Section that explains how ACSO will manage the process of dealing with actual or suspected data _____ in accordance with the national Notifiable Data Breach Procedure
- 15. I in the CIA triad. assurance that information and systems remain consistent and unaltered
- 17. Role responsible for monitoring and reviewing privacy related processes in ACSO. Privacy _______
- 18. C in the CIA triad. protection of sensitive information from unauthorized access
Down
- 1. ACSO must ensure that the operation of information processing facilities, including operating systems, are secure and protected against malware and data loss. _______ security
- 2. Either unclassified or classified ACSO information identified as requiring extra protection. _______ Information
- 4. Section that explains how ACSO must take reasonable steps to destroy or permanently de-identify personal information if it is no longer needed for any purpose, unless an exception applies. Data _____
- 5. An occurrence or activity that may threaten the confidentiality, integrity or availability of ACSO information. Cybersecurity _____
- 6. The manager of the group that administers and operates that information asset or system
- 7. A in the CIA triad. timely and reliable access to information and resources
- 8. malicious software designed to infiltrate, damage, or disrupt computer systems, networks, or devices, often without the user's knowledge or consent.
- 9. It's a fundamental human right
- 16. refers to how all ACSO personnel are required to maintain their workspace, computer, mobile devices, printed materials and access cards to enhance privacy and information security. Clean _____ Policy