Types of measures to counter security threats. Legal bases of information technology security.

12345678910
Across
  1. 4. Methods based on several principles of information security management, each of which serves to solve its own problem
  2. 5. Measures establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as judicial proceedings.
  3. 7. The principle of building an information security system, which involves focusing on preventing threats to the most valuable information
  4. 10. Special mathematical and algorithmic means of protection of information transmitted over communication networks, stored and processed on computers using encryption methods.
Down
  1. 1. Methods that are based on one principle of information security management
  2. 2. Methods that are built on the basis of powerful automated intelligent tools with organizational management
  3. 3. One of the most important methods of analyzing the state of information security
  4. 6. The principle of building an information security system, which excludes acquaintance of third parties with the means and technology of information protection
  5. 8. stage that analyzes the possible actions of attackers
  6. 9. Information transmitted by telecommunication networks