IT Systems and Security

12345678910111213141516171819202122232425262728
Across
  1. 3. Ranking tasks or risks by importance
  2. 5. Public perception that can be damaged by breaches
  3. 7. A fine or consequence for non-compliance
  4. 8. I am harmful
  5. 10. System settings that affect performance
  6. 12. Programs and applications
  7. 14. loss Critical information is erased or inaccessible
  8. 15. The users who interact with and operate in an environment
  9. 18. How often a certain risk or issue occurs
  10. 21. Ordering risks based on severity and likelihood
  11. 22. Numerical estimate of potential loss
  12. 23. Unintentional harmful events affecting systems
  13. 25. You need to identify this before setting up an IS
  14. 27. Likelihood of a specific event occurring
  15. 28. Flaws that can be exploited by threats
Down
  1. 1. Organized collections of structured information
  2. 2. Physical parts of a computer or system
  3. 4. I am important for your network
  4. 6. Example: Routers, switches, cables in connectivity, etc.
  5. 9. disasters Earthquakes or floods that disrupt systems
  6. 11. Enhancements to improve system
  7. 13. Evaluation of consequences of an incident
  8. 16. What do you do after completing a task?
  9. 17. Gaps in security or system design
  10. 19. Series of steps to accomplish tasks in systems
  11. 20. System A coordinated set of components to manage data
  12. 24. What else do you need other than physical components?
  13. 26. Period when a system is unavailable/offline