Cyber Security

1234567891011121314
Across
  1. 2. Logs and Event Management provided in JICA Project
  2. 3. Set of rules, policies and operations that a company uses to achieve its business goals
  3. 8. Compliance is act of following rules, laws and regulations
  4. 10. Network Monitoring system short form
  5. 11. Term that Deals with Organization secret data
  6. 13. Operates continuously and Data visible 24*7
  7. 14. Next Generation Firewall brand provided in JICA Project
Down
  1. 1. Term used to define Weakness
  2. 4. Keeping Information and Communication Private
  3. 5. Terms used for Logging all the user activity
  4. 6. Keeping Organizational information accurate and free of errors
  5. 7. Authorizing a Person to perform certain activity
  6. 9. cybersecurity standards for OT technology
  7. 12. Role Based Access Control