information security

12345678910111213141516
Across
  1. 3. A framework for reacting to security breaches
  2. 7. ,Person ensuring security policies are integrated with employee lifecycle
  3. 9. ,Type of authentication requiring multiple credentials
  4. 11. , Sensitive data classification requiring protection
  5. 12. ,Person responsible for overall security in an organization
  6. 14. , Software to detect and remove malicious software
  7. 15. ,Network security system that monitors and controls traffic
  8. 16. ,Subject Matter Expert, responsible for expertise in specific areas
Down
  1. 1. ,A method to store data to protect against loss
  2. 2. ,Process to manage third-party risk
  3. 4. ,Ensuring that information is accurate and unaltered
  4. 5. ,Oversight structure of an information security program
  5. 6. ,Meeting regulatory requirements and internal policies
  6. 8. , Policy ensuring access is based on least privilege
  7. 10. ,Process of identifying and evaluating potential threats
  8. 13. , Malicious software that demands payment