Across
- 2. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
- 4. ISO 27001 is the international standard for _____________
- 6. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- 8. Guarantee of reliable access to the information by authorized people
- 10. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
- 12. An asset that is essential to an organization and must be suitably protected
- 13. Prevents the unauthorized use or disclosure of information
- 14. You should never share this with anyone
- 15. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
Down
- 1. You should report Phishing emails in the ___________ console
- 3. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- 4. Protecting the accuracy and completeness of information and processing methods
- 5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- 7. Encodes the data in such a way that it is unintelligible without a key
- 8. A software program that is designed to prevent malware
- 9. Where to report a security incident? - __________@tavant.com
- 11. Effect of uncertainty on objectives
- 14. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
