psychomotoricke zrucnosti

123456789101112131415161718192021222324252627
Across
  1. 1. Name of a modification that is not performed via the application business user interface
  2. 3. Strategic Access Management tool
  3. 5. Second goal of IT security
  4. 9. Third goal of IT security
  5. 13. Corporate .... Deviation (CDD)
  6. 15. The second step in risk management process
  7. 17. Chapter 8 of ASCA Procedure Manual
  8. 19. What document helps you to check whether you are compliant with our security standard
  9. 20. Opposite of DAST
  10. 21. Corporate instruction covering IBM Worldwide records management
  11. 22. Name of the tool that replaced WST
  12. 24. Standard describing requirements on IT Business Continuity
  13. 25. Standard that describes therisk severity guidelines
  14. 26. To what data types LEG116 applies
  15. 27. The first step in risk management process
Down
  1. 2. What is CHS162 applied for
  2. 4. What does ASCA stand for
  3. 6. First element of risk
  4. 7. Where the deviations are maintained
  5. 8. Other word for separation in Separation of duties
  6. 10. Where can you read through BPBC127? Where is it located?
  7. 11. Third element of risk
  8. 12. Standard that ASCA is driven by
  9. 14. Where the DSR requests are handled
  10. 16. California .... Privacy Act
  11. 18. Name of the new privacy tool
  12. 22. Who do you need confirmation from whether your application processes crown jewel data
  13. 23. Corporate instruction for registration criteria