iSec CrossWord

12345678910
Across
  1. 4. software tool designed to detect and remove malicious software
  2. 5. Formal review to ensure that security measures are effective and policies are followed
  3. 7. A strategy for protecting sensitive data while it’s being transmitted across networks
  4. 10. framework for managing organizational risks
Down
  1. 1. The process of verifying the identity of a user or system
  2. 2. Information that directly or indirectly links to a person is considered
  3. 3. A system used to monitor and control network traffic
  4. 6. legal requirement for companies processing EU citizens’ data.
  5. 8. An international standard for information security management systems.
  6. 9. cyberattack that floods a network to make it unavailable.