Across
- 2. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- 4. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- 7. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- 8. An official inspection of an individual’s or organization’s accounts.
- 10. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
- 1. Unacceptable or improper behaviour, especially by an employee or professional person.
- 3. ________ risk refer to the risk of inadequate employment practices and resource management.
- 5. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- 6. Wrongful or criminal deception intended to result in financial or personal gain
- 9. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.