Across
- 1. Prevents disclosure of information to unauthorized people, also known as privacy
- 4. Defines security objectives, behavioral rules, and system requirements to secure assets
- 5. Provides technical direction for implementing and configuring technology to fulfill policy directives
- 6. Relates to organization's cybersecurity policies, procedures, and guidelines set by upper management
- 9. Focuses on protecting all states of data: at rest or in storage, in transit, or in process
- 11. The goals to protect cyberspace, including confidentiality, integrity, and availability (CIA Triad)
- 14. Data being sent from one device to another
Down
- 2. Making security awareness part of employee onboarding and ongoing training
- 3. Software, hardware, network, and cloud-based tools used to safeguard an organization's assets
- 7. Accuracy, consistency, and trustworthiness of data throughout its lifecycle
- 8. Ensures access to information systems and services at all times
- 10. Data during input, modification, computation, or output stages
- 12. Identifies expertise required for protection, including technology, policies/procedures/guidelines, and people
- 13. Stored data retained on storage devices when not actively used