SAW 2022 ENG

12345678910111213141516
Across
  1. 1. Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
  2. 3. Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
  3. 5. Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
  4. 9. This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
  5. 11. A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
  6. 13. Converting information from one form to another to hide its content and prevent unauthorized access.
  7. 15. An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
  1. 1. Indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
  2. 2. A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
  3. 4. Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
  4. 6. Applies to information or assets that, if compromised, could cause serious injury to the national interest.
  5. 7. Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
  6. 8. Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
  7. 10. The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information.
  8. 12. Malicious software designed to infiltrate and damage computers without the user’s consent.
  9. 14. An attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
  10. 16. Training that provides an overview of the directives and best practices related to security. Contains 10 modules