Across
- 1. System must be ________ when you are away from your desk.
- 3. ABC does not allow usage of _________ system though customer has BYOD policy.
- 6. Project documents must not be _________ to external internet sites.
- 11. Customer VDI cannot be used to navigate unwanted websites which are ________ in ABC.
- 13. If there is conflict between ABC security policy and customer security policy then ABC associate has to follow _______ of the two.
- 14. Sending email to personal mail ID from business email (ABC or ABC' customer email) is strictly ________.
- 17. It is _______ responsibility to check the own system compliance regularly.
- 19. All third party/customer provided information must be treated as __________ until and unless specified otherwise by the third party/customer.
Down
- 2. User must be always responsible for the act perform by his own _________.
- 4. It is always better to ______ security violation internally rather escalated by customer.
- 5. Always check recipient email address before click on send button to ensure data _________.
- 7. Always check sender's email ID before clicking on any email attachment or link to prevent from ________ attack.
- 8. Security requirement for project or account must be governed by _______.
- 9. Document signed by associate to protect ABC or ABC' customer confidential business information.(NDA)
- 10. Unauthorized ___________ device must not be connected to ABC or client asset in any circumstances.
- 12. The_________ of information is responsible for classifying the information, created in any form (electronic or non-electronic), and restricting access to the information.
- 15. For any deviation from contractual agreement ________ approval must be obtained.
- 16. When you are doing planning or at design state, you must consider ________ requirement as well.
- 18. For any release or separation from account, access to customer environment must be revoked within _____ day(s).