Across
- 1. A formal or informal review of actions (5)
- 5. One of the components that make up the CIA (15)
- 6. If the accuracy of information is a major concern, which one of the CIA components would be used (9)
- 8. Which security document is not mandatory? (1,8)
- 9. What is said to take advantage of, or exploit vulnerabilities (1,7)
Down
- 1. When a user logs onto a computer system and is asked for their mother's maiden name, what aspect is the system ensuring? (12)
- 2. Another term to describe a Security Steering Group (7,5)
- 3. Privacy legislation is in place to protect the rights of
- 4. One of the two types of threats (10)
- 7. A type of risk mitigation (8)
