Across
- 3. A framework for reacting to security breaches
- 7. ,Person ensuring security policies are integrated with employee lifecycle
- 9. ,Type of authentication requiring multiple credentials
- 11. , Sensitive data classification requiring protection
- 12. ,Person responsible for overall security in an organization
- 14. , Software to detect and remove malicious software
- 15. ,Network security system that monitors and controls traffic
- 16. ,Subject Matter Expert, responsible for expertise in specific areas
Down
- 1. ,A method to store data to protect against loss
- 2. ,Process to manage third-party risk
- 4. ,Ensuring that information is accurate and unaltered
- 5. ,Oversight structure of an information security program
- 6. ,Meeting regulatory requirements and internal policies
- 8. , Policy ensuring access is based on least privilege
- 10. ,Process of identifying and evaluating potential threats
- 13. , Malicious software that demands payment
