Across
- 3. _________ configures and manages a system as per the data owner’s requirements.
- 6. Fulfilling contractual requirements for your client, including those for their information's security is also a ________ requirement.
- 7. Maintaining the documents related to your work logically and accurately constitutes ________ of records.
- 8. Personal computers requires ______ as much as office systems.
- 11. Daily update for an antivirus which includes details of the latest viruses.
- 12. Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
Down
- 1. Digital _______ - Science of computer investigation.
- 2. A statement or a set of statements adopted by management and binding on all the employees to follow.
- 3. Documented information security policy ensure ______ in its implementation.
- 4. _____, Security, Risk and Complaince are the 4 key deliverables of any information Security program.
- 5. Data _______ defines the security requirements for data protection.
- 9. Blocks unwanted network traffic to your computer.
- 10. Weakest link in information security.
