UNSCRAMBLE

THE G2B CONNECTION



    eoniln ginidbd _ _ _ _ _ _  _ _ _ _ _ _ _

    alptro _ _ _ _ _ _

    beW _ _ _

    IED _ _ _

    eecrcomem _ - _ _ _ _ _ _ _ _

    erevesr tnouica _ _ _ _ _ _ _ _ _ _ _ _ _ _

    gliiatd rnieugtas _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _

    ICMAP darc _ _ _ _ _  _ _ _ _

    MLX _ _ _

    nconiratast _ _ _ _ _ _ _ _ _ _ _

    NISA 2X1 _ _ _ _ _ _ _

    KIP _ _ _

    POPF _ _ _ _

    syteuric _ _ _ _ _ _ _ _

    ttireacfiec ytaiourht_ _ _ _ _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _


For the answers, go to www.gcn.com and click on Crossword/Puzzle.

READERS SPEAK:

How have your agency's security funding requests fared? Do you have the money you need to protect the government's systems?

My agency has not fared very well. The assumption that a majority of agencies outside of the Defense Department consider their resources and information to be publicly accessible and nonsensitive supports efforts to not justify security funding. Although information confidentiality may not apply to some agencies, information integrity is clearly defined throughout government.

Although a sufficient amount of overall funding is proportioned for each agency, a small amount of funding is allocated for security.

'Ronald Greenfield, National Highway Traffic Safety Administration

For other responses, go to www.gcn.com and select Readers Speak.

inside gcn

  • analytics (Wright Studio/Shutterstock.com)

    3 data strategies to help crackdown on internal corruption

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group