Across
- 2. - involves focusing efforts to prevent threats to the most valuable information
- 6. - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- 7. of the system to changes in the environment
- 8. methods are based on one principle of information security management;
Down
- 1. of additional tasks and requirements for employees of the organization caused by information protection measures
- 3. special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- 4. tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- 5. - excludes acquaintance of third parties with the means and technology of information protection
