Across
- 1. Information Security should become a part of the ____ of the organization
- 2. Measures implemented to secure the assets of company are called security _____.
- 5. Policy is a form of ________ security control.
- 9. "Need to Know" is the _____ of granting access.
- 10. The first point in Information Security Policy refers to ____ security.
- 11. Senior management team is responsible for _______ the implementation of security controls.
Down
- 1. Compliance also includes satisfying _____ requirements.
- 3. FAI can ____ all my communications initiated from a company provided or owned electronic device.
- 4. Apart from any incident, I am also responsible for reporting any ______ which I may identified in the security control.
- 6. I am aware that breach of any policy requirement can result in _____ action.
- 7. Security _____ of an organization are identified by conducting a risk assessment.
- 8. ______ is a form of technical security control.
- 12. Responsibility of overall direction and support for the implementation of the Information Security Program is with _____.
