Note, this is by no means a definitive list of keywords. These are just some keywords that came to the fore as I studied. You might find others. I might create another crossword as I continue working through Domain One.
Across
4 An inspection that ensures that expectations and standards are met.
5 The stability of the state of something over a period of me.
6 To isolate dues so
that
they must be performed by more than one person.
7 Laws or by-laws enacted by governing
bodies to control the activities of a subordinate group.
9 A violation of established law.
10 The assurance that the information accessed is correct and free from
unauthorized modification.
12 The individual planning or perpetrating an event.
14 The foundational
elements that guides one's
thoughts and actions.
15 An uncertain event or condition that, if it
occurs,
has the potential to negatively impact the organization.
20 The assurance that only those individuals with
appropriate permission can access information.
24 To ensure that the latest software is in use.
25 The means
of ensuring that an activity is being performed with appropriate permission.
27 To observe what is taking
place in real-me.
28 A firm belief in the reliability or truth of
something.
29 In the case of Information Security, an unauthorized restriction placed on a system.
|
Down
1 A safeguard that protects against a specific threat.
2 The leadership and organizational
structures and processes that ensure that the organization achieves its strategies and objectives.
3 A plan that demonstrates expected reaction
to stimulus.
4 Something
of value (to an organization in this case).
8 The means
of ensuring that the source or destination of a communication is truthfully conveyed.
9 An unscheduled, and unexpected termination of a process or system.
11 To affect the application of core security principles.
13 An event or situation that, if it
occurred, would prevent the organization from
operating in its normal manner, if at all.
16 The assurance that systems and information
required, can be accessed
when needed.
17 The acronym that refers to the various
stages of a system's existence.
18 A copy of information.
19 The opinion
generally held by those external to an organization.
21 The importance given to different elements in a collection.
22 A system for gathering and maintaining information.
23 To improve the application of core security principles.
26 A negative action taken against an organization or system.
|
No comments:
Post a Comment