Classified Information
Classifying a document as it is being created, amended, used, stored or transmitted allows us to specify the value of that information and the extent to witch it should be pretected.
Advertisements
Login to be the first to rate this puzzle!
COLLABORATION
CONFIDENTIAL
DESTRUCTION
DOCUMENTS
ENDANGERING
ESPIONAGE
EXTERNALIZATION
HACKTIVISM
INSECURE
INTERNAL
LEAKAGE
MARKETING
MODIFICATION
NONCOMPLIANCE
PHONES
PUBLIC
RETENTION
SABOTAGE
SECRET
SENDING
STORING
UNAUTHORIZED
J | Y | H | L | S | E | N | D | I | N | G | E | G | X | N |
Y | M | H | G | A | Q | O | P | B | L | H | G | N | O | O |
F | O | A | N | N | I | I | H | D | U | T | A | I | T | N |
D | D | C | I | O | E | T | O | G | Y | V | T | T | E | C |
E | I | K | R | I | R | A | N | K | Z | A | O | E | R | O |
S | F | T | E | T | U | R | E | E | Z | M | B | K | C | M |
T | I | I | G | N | C | O | S | I | D | H | A | R | E | P |
R | C | V | N | E | E | B | L | C | I | I | S | A | S | L |
U | A | I | A | T | S | A | G | U | F | Q | F | M | P | I |
C | T | S | D | E | N | L | A | N | R | E | T | N | I | A |
T | I | M | N | R | I | L | E | A | K | A | G | E | O | N |
I | O | J | E | S | T | O | R | I | N | G | E | X | N | C |
O | N | T | A | Y | G | C | I | L | B | U | P | N | A | E |
N | X | N | S | T | N | E | M | U | C | O | D | S | G | R |
E | D | E | Z | I | R | O | H | T | U | A | N | U | E | Q |
Advertisements
Advertisements