Across
- 3. - excludes acquaintance of third parties with the means and technology of information protection
- 5. - involves focusing efforts to prevent threats to the most valuable information
- 7. of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- 1. of the system to changes in the environment
- 2. tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- 3. special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- 4. - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- 6. methods are based on one principle of information security management;
