Classified Information
Classifying a document as it is being created, amended, used, stored or transmitted allows us to specify the value of that information and the extent to witch it should be pretected.
Advertisements
Login to be the first to rate this puzzle!
COLLABORATION
CONFIDENTIAL
DESTRUCTION
DOCUMENTS
ENDANGERING
ESPIONAGE
EXTERNALIZATION
HACKTIVISM
INSECURE
INTERNAL
LAPTOPS
LEAKAGE
MARKETING
MODIFICATION
NONCOMPLIANCE
PUBLIC
RETENTION
SABOTAGE
SENDING
STORING
THEFT
UNAUTHORIZED
D | D | C | O | L | L | A | B | O | R | A | T | I | O | N |
U | N | D | G | G | N | I | R | O | T | S | S | I | O | O |
N | O | E | N | N | L | A | N | R | E | T | N | I | M | N |
A | I | S | I | O | E | C | X | J | H | S | T | A | E | C |
U | T | T | R | I | A | R | Y | E | E | A | R | R | O | O |
T | A | R | E | T | K | B | F | C | Z | K | M | N | E | M |
H | C | U | G | N | A | T | U | I | E | S | F | P | G | P |
O | I | C | N | E | G | R | L | T | I | I | U | L | A | L |
R | F | T | A | T | E | A | I | V | D | B | N | A | T | I |
I | I | I | D | E | N | N | I | E | L | Z | F | P | O | A |
Z | D | O | N | R | G | T | N | I | K | K | B | T | B | N |
E | O | N | E | B | K | T | C | R | U | R | Q | O | A | C |
D | M | T | U | C | I | E | G | A | N | O | I | P | S | E |
B | X | C | A | A | G | N | I | D | N | E | S | S | N | M |
E | J | H | L | A | P | S | T | N | E | M | U | C | O | D |
Advertisements
Advertisements