Information Security crossword

123456789101112131415161718
Across
  1. 3. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  2. 5. An asset that is essential to an organization and must be suitably protected
  3. 8. You should report Phishing emails in the ___________ console
  4. 9. Guarantee of reliable access to the information by authorized people
  5. 10. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
  6. 11. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
  7. 13. Prevents the unauthorized use or disclosure of information
  8. 15. Effect of uncertainty on objectives
  9. 16. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
  10. 18. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
Down
  1. 1. You should never share this with anyone
  2. 2. A software program that is designed to prevent malware
  3. 4. Where to report a security incident? - __________@tavant.com
  4. 6. Protecting the accuracy and completeness of information and processing methods
  5. 7. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. 12. ISO 27001 is the international standard for _____________
  7. 14. Encodes the data in such a way that it is unintelligible without a key
  8. 17. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______