Across
- 2. Potential cause of unwanted event
- 3. form of identity management
- 5. means of managing risk
- 6. combination of likelihood of an event and its impact
- 9. weakness of an asset that can be exploited
- 10. measure of the effect of a security event
Down
- 1. earthquake is a ________ threat
- 4. checking whether the organization has required controls is _____________ audit
- 7. secretly collect sensitive or classified information
- 8. information security program is aligned to _____________ of organization
