Across
- 3. Adherence to rules, regulations, or policies to ensure proper behavior or operations.
- 4. Measures taken to protect computer systems and data from theft, damage, or unauthorized access.
- 6. Strategies and processes used to identify, assess, and mitigate potential risks.
- 9. The act of coercing someone by threatening to reveal embarrassing or damaging information.
- 10. A difficulty or problem that requires creative solutions or efforts to overcome.
- 11. The hidden part of the internet where illegal activities often occur.
Down
- 1. A set of rules or guidelines that govern behavior or decision-making within an organization.
- 2. A breach or infringement of a rule, law, or policy.
- 5. Protective measures taken to safeguard against potential threats.
- 7. Individuals within an organization who have access to sensitive information.
- 8. Measures taken to protect against threats, ensuring the safety and integrity of systems, data, and assets.