Third ISMS Crossword Puzzle

123456789101112131415
Across
  1. 3. When receiving an email from an unknown contact that has an attachment, you should ______ the mail
  2. 7. New hire ____________________ should cover policies, security procedures, access levels, and training on the secure use of information systems.
  3. 10. How often should you perform an incremental backup?
  4. 11. Every Vendor or third party is supposed to sign _____ before signing contract with Motif?
  5. 13. The act of an unauthorized person who follows someone to a restricted area without the knowledge of the authorized person is called ________?
  6. 14. ____ is the term used to prevent the disclosure of information to unauthorized individuals or systems.
  7. 15. _____ is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
Down
  1. 1. Mechanisms that implement the policy
  2. 2. For information security purposes, ___ are the systems that use, store, and transmit information.
  3. 4. Looking over someone's shoulder, to get information is called _______?
  4. 5. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
  5. 6. An identified weakness of a controlled system is known as a ____.
  6. 8. Security violations must be reported _____ of discovery
  7. 9. _____ is protective software designed to defend your computer against malicious software. Malicious software or "malware" includes: viruses, Trojans, key loggers, hijackers, dialers, and other code that vandalizes or steals your computer contents.
  8. 12. _____ means that data cannot be modified undetectably