Information Security

12345678910111213141516
Across
  1. 3. Personal journal published on the World Wide Web ________
  2. 5. All colleagues must comply with these information security documents _______
  3. 8. Personal information is protected by this act _______
  4. 10. These should never be shared __________
  5. 12. It should be changed immediately if suspected of being compromised
  6. 13. Information Security policies are published on it ___________
  7. 14. Always ensure your _________ is locked when you are away from your computer.
  8. 15. A tidy desk is also known as a _________ desk
  9. 16. When you received unsolicited email from unknown sources this is called ______
Down
  1. 1. You should not allow others to do this when accessing Society premises ______
  2. 2. Skipton may ______________ your internet usage
  3. 4. Completion of Information Security and DPA annual training is ____________
  4. 5. When you receive an email with a link to a bogus website it is called _________
  5. 6. This should be worn at all times when on Society premises __________
  6. 7. This should only be installed on Society systems by approved administrators ______
  7. 9. A type of use that should be limited when using Society systems ________
  8. 11. Something that can infect a PC/Laptop is known as a ________