Information Security Puzzle

1234567891011121314151617181920
Across
  1. 2. A key concept of data protection, where files and emails are tagged with labels in accordance to their sensitivity and value [Two word]
  2. 4. Email used to report information security incidents at EDGE [Full email]
  3. 6. A key risk associated with IP Theft that could lead to a detrimental impact on national security [Two word]
  4. 9. Data that should not be stored on personally owned devices [Two words]
  5. 10. Location of the Information Security (IS) policies at X [Three word]
  6. 11. A classification tag that applies to X's non-military Intellectual property data [One word]
  7. 14. Are not to be used to register or create accounts on public platforms [Two word]
  8. 16. Downloading them from the internet or using unauthorised versions is prohibited [Two words]
  9. 18. Are responsible and accountable for activities performed on X Group's information assets that are being used by them [One word]
  10. 20. Refers to the act of sharing valuable information with unauthorised parties [Two words]
Down
  1. 1. Is a key preventive control against insider threats [One word]
  2. 3. A leading root cause for insider threats [Two word]
  3. 5. Are not to be shared with anyone [Two words]
  4. 7. Policy that provides directives on how to use information assets within the company to protect employees and the company from inappropriate exposure of risks [Two word]
  5. 8. An action that end users must take, when aware or suspicious of unusual behavior that could lead to insider threat [One word]
  6. 12. Information created, acquired, developed or discovered by X Group [Two words]
  7. 13. An inappropriate act made following an informed and conscious decision with a motive to cause harm [One word]
  8. 15. The act of bypassing internal security controls to satisfy a business need, with no intention to cause harm {One word]
  9. 17. Can originate from current/former employees and third parties with authorised access to company systems [Two words]
  10. 19. A tool used to apply manual protection to files and emails before sharing with authorised recipients [One word]