Across
- 4. Methods based on several principles of information security management, each of which serves to solve its own problem
- 5. Measures establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as judicial proceedings.
- 7. The principle of building an information security system, which involves focusing on preventing threats to the most valuable information
- 10. Special mathematical and algorithmic means of protection of information transmitted over communication networks, stored and processed on computers using encryption methods.
Down
- 1. Methods that are based on one principle of information security management
- 2. Methods that are built on the basis of powerful automated intelligent tools with organizational management
- 3. One of the most important methods of analyzing the state of information security
- 6. The principle of building an information security system, which excludes acquaintance of third parties with the means and technology of information protection
- 8. stage that analyzes the possible actions of attackers
- 9. Information transmitted by telecommunication networks
