Across
- 6. The process of granting users permission to access systems or data based on predefined policies
- 7. The process of verifying the identity of a user, system, or device before granting access
- 9. The evaluation of risks, controls, and compliance to identify weaknesses and areas for improvement
- 13. Policies, procedures, and safeguards to ensure systems operate effectively and securely
- 14. The independent examination of systems, processes, and controls to assess their effectiveness
- 15. The creation and presentation of audit findings, assessments, and recommendations to management or stakeholders
- 17. The practice of dividing duties or responsibilities to reduce the risk of fraud or errors
- 19. Weaknesses or flaws in IT systems that can be exploited by threats to cause harm
- 20. The actions taken to address and correct identified issues, vulnerabilities, or non-compliance
- 22. A controlled, simulated cyberattack to identify vulnerabilities within a system
- 24. The ability of systems and processes to be examined, traced, and verified during an audit
- 25. Protecting computer systems and networks from cyber threats and attacks.
Down
- 1. Adhering to laws, regulations, and company policies.
- 2. The process of converting data into a secure format to prevent unauthorized access
- 3. The set of processes and structures used to direct and manage an organization’s IT
- 4. The ongoing process of observing and tracking the performance, security, and compliance of IT systems and networks
- 5. Records of system events, transactions, and user activities used to track and review operations
- 8. Any event or breach that disrupts IT services or compromises security
- 10. Protection of IT systems, data, and networks from unauthorized access or attacks
- 11. The ability to enter or use IT systems, networks, or data, controlled by permissions
- 12. Information that is stored, processed, and transmitted within IT systems
- 16. The possibility of loss, damage, or any negative impact arising from a potential threat to an organization's IT systems or operations.
- 18. The accuracy, consistency, and reliability of data throughout its lifecycle
- 21. The process of evaluating and verifying the effectiveness of IT systems, controls, and security measures
- 23. Documentation or data collected during an audit to support findings and conclusions
