Information Security Puzzle

12345678910
Across
  1. 1. / Such emails should be immediately deleted and not circulated further.
  2. 4. / This policy requires employees to keep workstations free of confidential information when unattended
  3. 5. / Mare sure that your computed screen is always ____ when unattended.
  4. 7. / All security incidents should be ____ to ensure the authorities are notified, and appropriate actions taken to minimize impact.
  5. 9. / An internationally acclaimed certification for information security standards.
  6. 10. / ensures safeguarding the accuracy and completeness of information.
Down
  1. 2. / This should contain a combination of alphabets, numbers and special characters .
  2. 3. / Social ____ uses influence, persuasion or manipulation to deceive people and obtain sensitive information.
  3. 6. / Is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  4. 8. / This type of information is available on GKE websites, and free for everyone to access.