Across
- 3. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- 4. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
- 8. ______ of any organizational security policy can result in disciplinary actions
- 9. ISMS is a set of policies and procedures for managing an organization’s _______ data
- 10. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- 13. A formal process for training and educating employees about IT protection
- 16. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
- 1. An asset that is essential to an organization and must be suitably protected
- 2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
- 5. prevents the unauthorized use or disclosure of information
- 6. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
- 7. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- 11. Guarantee of reliable access to the information by authorized people
- 12. Protecting the accuracy and completeness of information and processing methods
- 14. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- 15. Effect of uncertainty on objectives
