Basic Terminologies

12345678910
Across
  1. 3. form of identity management
  2. 5. weakness of an asset that can be exploited
  3. 7. information security program is aligned to _____________ of organization
  4. 8. means of managing risk
  5. 10. measure of the effect of a security event
Down
  1. 1. checking whether the organization has required controls is _____________ audit
  2. 2. Potential cause of unwanted event
  3. 4. secretly collect sensitive or classified information
  4. 6. combination of likelihood of an event and its impact
  5. 9. earthquake is a ________ threat