Across
- 2. Responsibility of overall direction and support for the implementation of the Information Security Program is with _____.
- 3. Senior management team is responsible for _______ the implementation of security controls.
- 5. I am aware that breach of any policy requirement can result in _____ action.
- 7. The first point in Information Security Policy refers to ____ security.
- 9. Policy is a form of ________ security control.
- 11. Measures implemented to secure the assets of a company are called security _____.
- 12. Information Security should become a part of the ____ of the organization
- 13. ______ is a form of technical security control.
Down
- 1. Apart from any incident, I am also responsible for reporting any ______ which I may identify in any of the security controls.
- 4. Security _____ of an organization are identified by conducting a risk assessment.
- 6. Compliance also includes satisfying _____ requirements.
- 8. "Need to Know" is the _____ of granting access.
- 10. FAI can ____ all my communications initiated from the company provided or owned electronic device.
