Across
- 2. Approval from --------is needed to take photographs inside TCS premises(3)
- 4. Password Should be minimum of -------Characters(5)
- 5. Mails that should not be propagated(5)
- 8. Manipulate people to give up confidential information(17)
- 11. Isecurity quiz must be completed successfully atleast ------a year(4)
- 12. Deleting important data/files with malicious intent is security---(6)
- 13. Misuse of confidential data should be reported to ----(3)
Down
- 1. Acceptance of ----- makes you liable for all activities done from the system using your ID(11)
- 3. All sensitive information should be ----before disposing them(8)
- 6. Client confidential information should be stored in ----(7)
- 7. Security breach will lead to ------action(12)
- 9. Use of unlicensed software is a breach of copyright and is ---------(7)
- 10. Internet browsing is logged and monitored by -----(6)
