Information Security Challenge

12345678910
Across
  1. 2. Giving users only the access they need—nothing more.
  2. 5. The policy for Keeping workspaces free of exposed confidential information.
  3. 8. Training staff to recognize and respond to security threats.
  4. 9. Screening individuals before granting access to sensitive systems.
  5. 10. Removing system access when an employee leaves or changes roles.
Down
  1. 1. Rules for creating and managing secure login credentials.
  2. 3. Guidelines for proper use of company systems and data.
  3. 4. Grants permissions based on job responsibilities.
  4. 6. Ensuring sensitive information is not disclosed to unauthorized people.
  5. 7. Protecting personal information from misuse or exposure.