My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Chapter 1-2 Mobile Security Policy

Horizontales
Ensures information is available to authorized users and devices for access
A set of rules and regulations set forth to increase the security of a network by ensuring specific and safe use of the network and keep an organization's data safe.
This is done by and outside firm hired by the company to validate internal audit work and preform special assignments such as certifying annual financial statements
An incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner
The organizations capability to defend its practices and polices to regulators, should the need arise
Does not prevent incidents or breaches immediately or prevent them actively. Rather it is used to review unauthorized changes and investigate them.
A stated agreement to provide a particular level of service, such as how often a supplier will provide their service or how quickly the firm will respond. Must have clear monitoring and enforcement rights included within
both a concept and a set of specific actions an organization takes to ensure compliance with its policies, processes, standards, and guidelines
Relies on a human to take action through things such as training or manager inspections
Functions as a detective control, when it works it improves the quality over time by affording opportunities to learn from past mistakes.
The degree to which employees understand and are willing to follow policies.
Association that developed a widely accepted international best practices framework that we know as COBIT
General use principle meaning you only have access to only the systems and data needed to preform your job effectively.
A weakness in a system that can be exploited
Verticales
The act of protecting information and the systems that store and process it
A human caused or natural event that could impact the system
Information systems security management ____-_____ has four domains. 1 Align, plan, and organize, 2 Build, Acquire, and Implement. 3 Deliver, Service, and Support. 4 Monitor, Evaluate and Assess.
A focusing of protecting information during process and use in particularly
An authorized simulated cyberattack on a computer system, performed to evaluate the security of the system
software that creates a control such as passwords, or antiviruses. Can also be dedicated hardware such as a firewall.
Some form of physical device that prevents or deters access such as a locked door or camera
the goal of ensuring that only authorized individuals are able to access specific information. Typically used when referring to the information a specific individual needs to complete their job with no more or no less information available to them.
Assurance that information has not been improperly changed, through intention or unintentionally.
The likelihood or probability of an event and its impact