Across
- 3. Ranking tasks or risks by importance
- 5. Public perception that can be damaged by breaches
- 7. A fine or consequence for non-compliance
- 8. I am harmful
- 10. System settings that affect performance
- 12. Programs and applications
- 14. loss Critical information is erased or inaccessible
- 15. The users who interact with and operate in an environment
- 18. How often a certain risk or issue occurs
- 21. Ordering risks based on severity and likelihood
- 22. Numerical estimate of potential loss
- 23. Unintentional harmful events affecting systems
- 25. You need to identify this before setting up an IS
- 27. Likelihood of a specific event occurring
- 28. Flaws that can be exploited by threats
Down
- 1. Organized collections of structured information
- 2. Physical parts of a computer or system
- 4. I am important for your network
- 6. Example: Routers, switches, cables in connectivity, etc.
- 9. disasters Earthquakes or floods that disrupt systems
- 11. Enhancements to improve system
- 13. Evaluation of consequences of an incident
- 16. What do you do after completing a task?
- 17. Gaps in security or system design
- 19. Series of steps to accomplish tasks in systems
- 20. System A coordinated set of components to manage data
- 24. What else do you need other than physical components?
- 26. Period when a system is unavailable/offline
