Across
- 5. Process of recognizing possible dangers to systems or information
- 9. Pillar that confirms actions can be traced to individuals
- 10. Pillar of information assurance that ensures data is accessible when needed
- 12. Practice that focuses mainly on protecting data from unauthorized access
- 14. Potential cause of harm to information systems
- 15. Stage in PDCA where plans are implemented
- 17. Pillar that proves actions or transactions occurred
- 18. Law that protects creative works such as software and digital content
- 20. Rules and agreements that apply across multiple countries
Down
- 1. Weakness that can be exploited by a threat
- 2. Law that protects personal data and privacy
- 3. Field that ensures information remains secure, reliable, and available
- 4. Law that governs misuse of computers and digital systems
- 6. Stage in PDCA where results are reviewed and evaluated
- 7. Pillar that ensures data is accurate and not altered improperly
- 8. Program designed to educate users about security risks and best practices
- 11. Process of identifying valuable items such as data, systems, and hardware
- 13. Pillar that ensures information is protected from unauthorized access
- 16. Systematic process of evaluating risks and deciding how to control them
- 19. Methodology that improves processes continuously
