Across
- 1. Having the minimum access and/or privileges necessary to perform the roles and responsibilities of the job function.
- 6. Hardware and/or software technology that protects network resources from unauthorized access
- 8. Hardware or software that connects two or more networks
- 9. Attestation of Compliance
- 11. Point of Sale
- 13. Process of converting information into an unintelligible form except to holders of a specific cryptographic key
Down
- 2. Protection of information to insure confidentiality, integrity, and availability.
- 3. A string of characters that serve as an authenticator of the user
- 4. Multiple Factor Authentication
- 5. Flaw or weakness
- 7. Descriptive narrative for a policy
- 10. Self-Assessment Questionnaire
- 12. CardHolder Data Environment