Across
- 3. When receiving an email from an unknown contact that has an attachment, you should ______ the mail
- 7. New hire ____________________ should cover policies, security procedures, access levels, and training on the secure use of information systems.
- 10. How often should you perform an incremental backup?
- 11. Every Vendor or third party is supposed to sign _____ before signing contract with Motif?
- 13. The act of an unauthorized person who follows someone to a restricted area without the knowledge of the authorized person is called ________?
- 14. ____ is the term used to prevent the disclosure of information to unauthorized individuals or systems.
- 15. _____ is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
Down
- 1. Mechanisms that implement the policy
- 2. For information security purposes, ___ are the systems that use, store, and transmit information.
- 4. Looking over someone's shoulder, to get information is called _______?
- 5. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
- 6. An identified weakness of a controlled system is known as a ____.
- 8. Security violations must be reported _____ of discovery
- 9. _____ is protective software designed to defend your computer against malicious software. Malicious software or "malware" includes: viruses, Trojans, key loggers, hijackers, dialers, and other code that vandalizes or steals your computer contents.
- 12. _____ means that data cannot be modified undetectably
