Security Awareness 2025 Crossword

12345678910111213141516171819202122232425262728293031
Across
  1. 4. The purpose of this puzzle is to increase security______
  2. 5. The loss of ID card, building access cards and compromise of passwords are examples of security _____ and must be reported
  3. 6. Chief ____ Officer (CSO)
  4. 7. Hacking is an example of a ____ attack
  5. 11. Physical security focuses on the safeguarding of sensitive information/_______/facilities
  6. 12. If a service contract contains a security _____, you must complete an SRCL
  7. 15. The PGS contains eight security controls and three ____
  8. 21. These emails are designed to deceive you into providing information
  9. 23. It is important to regularly exercise your ______ continuity plans
  10. 24. The current mandatory security awareness course, acronym
  11. 26. Security in contracting refers to the procurement of goods or _____
  12. 29. For reliability status, the screening process includes a ___ enforcement inquiry
  13. 30. _____Information/assets have a potential for injury
  14. 31. To be privy to certain information, you must have a ____ to know
Down
  1. 1. Project/Security/ Contracting _____
  2. 2. Malicious software designed to infiltrate or damage a computer system
  3. 3. "I Luv Ch3eZ@L0T!" - for example
  4. 8. Information categorized as ____ can only be processed in a high security zone
  5. 9. All _____ must be issued temporary passes and escorted to access a GC site
  6. 10. TBS' ____ on Government Security
  7. 13. Security control #7, security event
  8. 14. Reliability ____, the minimum security screening requirement within the Government of Canada
  9. 16. Training hub for public servants, acronym
  10. 17. By leaving the building during a Shelter-In-Place, you could put ______ in danger
  11. 18. The Canadian telecommunications industry is an example of a ____function
  12. 19. To email Protected B information, it must be_______
  13. 20. One must ____ documents according to their level of sensitivity
  14. 22. You must perform this evaluation to categorize your information/assets
  15. 25. The A,B or C of information management security
  16. 27. Reporting a security event helps mitigate_____
  17. 28. A natural ____ is an example of a disruption to a critical function