iACE Crossword Puzzle 3

12345678910
Across
  1. 2. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  2. 4. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  3. 7. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  4. 8. An official inspection of an individual’s or organization’s accounts.
  5. 10. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
  1. 1. Unacceptable or improper behaviour, especially by an employee or professional person.
  2. 3. ________ risk refer to the risk of inadequate employment practices and resource management.
  3. 5. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  4. 6. Wrongful or criminal deception intended to result in financial or personal gain
  5. 9. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.