Across
- 2. Member of management or delegate who has primary responsibility for the business function supported by a system, application
- 3. Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
- 7. Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
- 8. Concerning ransomware, a user or organization's critical data is made inaccessible
- 12. Operations Risk Management Committee
- 14. Leader of a business unit with responsibility for implementing department level operating procedures
- 16. Any staff member who maintains security controls on behalf of an Owner
- 18. A kind of software used to prevent, scan, detect and delete viruses from a computer
Down
- 1. TEAMS channel for up to date security notices
- 3. Security Operating Policy
- 4. Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
- 5. Minimizing the harm of a particular risk
- 6. Month of CAM
- 9. Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
- 10. Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
- 11. One of two useful Security Awareness TEAMS channels
- 13. Any staff member who oversees data recovery
- 15. Number of years Catalyst has been a CAM Champ
- 17. Pertaining to a strong p, used to reduce vulnerability in the event of a hack
