Across
- 3. is used to dispose of paper-based information
- 6. I am allowing employees to securely access a corporate intranet while located outside the office.
- 7. It is the fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 9. is a hardware/software that controls incoming traffic and acts as barrier between trusted and untrusted networks
- 10. EDR used in TCS
Down
- 1. It is software you can use without paying
- 2. You should make me complicated. You should not forget me. You cannot access it without me
- 4. An automated access management and security compliance requirement tracking tool in Ultimatix
- 5. Bitlocker is used for
- 8. One of the three cornerstone principles of information security
