Across
- 4. Don't share your _ _ _ _ _ _ _ _ with your colleagues & keep changing it as per policy.
- 5. _ _ _ _ _ _ _ _ _ _ is the process of encoding messages or information in such a way that only authorized parties can read it
- 6. _ _ _ _ _ _ _ _ is the first line of defense on network attacks.
- 7. Don't let outsiders _ _ _ _ _ _ _ _ you while you are using access cards .
Down
- 1. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _, Integrity & Availability are at the heart of information security
- 2. Don't download applications from internet as they may contain _ _ _ _ _.
- 3. Information _ _ _ _ _ _ _ _ is vital in day to day operations.
- 4. Be careful of suspicious emails, they might contain _ _ _ _ _ _ _ _ Links.
