Across
- 2. Fulfilling contractual requirements is also a ________ requirement.
- 7. Internet related.
- 8. Ensuring ________ safety is in the scope of information security.
- 9. Division of office space into areas with varying degree of physical access controls.
- 10. A server getting infected with virus leads to the loss of ________ of the computer system.
Down
- 1. Generates random one time passwords.
- 3. Emergency exits always open _________.
- 4. Personal computers requires ______ as much as office systems.
- 5. Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
- 6. Coming out safely from structure in danger.
