Across
- 1. / Such emails should be immediately deleted and not circulated further.
- 4. / This policy requires employees to keep workstations free of confidential information when unattended
- 5. / Mare sure that your computed screen is always ____ when unattended.
- 7. / All security incidents should be ____ to ensure the authorities are notified, and appropriate actions taken to minimize impact.
- 9. / An internationally acclaimed certification for information security standards.
- 10. / ensures safeguarding the accuracy and completeness of information.
Down
- 2. / This should contain a combination of alphabets, numbers and special characters .
- 3. / Social ____ uses influence, persuasion or manipulation to deceive people and obtain sensitive information.
- 6. / Is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 8. / This type of information is available on GKE websites, and free for everyone to access.
