UNSCRAMBLE

THE G2B CONNECTION



    eoniln ginidbd _ _ _ _ _ _  _ _ _ _ _ _ _

    alptro _ _ _ _ _ _

    beW _ _ _

    IED _ _ _

    eecrcomem _ - _ _ _ _ _ _ _ _

    erevesr tnouica _ _ _ _ _ _ _ _ _ _ _ _ _ _

    gliiatd rnieugtas _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _

    ICMAP darc _ _ _ _ _  _ _ _ _

    MLX _ _ _

    nconiratast _ _ _ _ _ _ _ _ _ _ _

    NISA 2X1 _ _ _ _ _ _ _

    KIP _ _ _

    POPF _ _ _ _

    syteuric _ _ _ _ _ _ _ _

    ttireacfiec ytaiourht_ _ _ _ _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _


For the answers, go to www.gcn.com and click on Crossword/Puzzle.

READERS SPEAK:

How have your agency's security funding requests fared? Do you have the money you need to protect the government's systems?

My agency has not fared very well. The assumption that a majority of agencies outside of the Defense Department consider their resources and information to be publicly accessible and nonsensitive supports efforts to not justify security funding. Although information confidentiality may not apply to some agencies, information integrity is clearly defined throughout government.

Although a sufficient amount of overall funding is proportioned for each agency, a small amount of funding is allocated for security.

'Ronald Greenfield, National Highway Traffic Safety Administration

For other responses, go to www.gcn.com and select Readers Speak.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.