UNSCRAMBLE
THE G2B CONNECTION

eoniln ginidbd _ _ _ _ _ _ _ _ _ _ _ _ _
alptro _ _ _ _ _ _
beW _ _ _
IED _ _ _
eecrcomem _ - _ _ _ _ _ _ _ _
erevesr tnouica _ _ _ _ _ _ _ _ _ _ _ _ _ _
gliiatd rnieugtas _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
ICMAP darc _ _ _ _ _ _ _ _ _
MLX _ _ _
nconiratast _ _ _ _ _ _ _ _ _ _ _
NISA 2X1 _ _ _ _ _ _ _
KIP _ _ _
POPF _ _ _ _
syteuric _ _ _ _ _ _ _ _
ttireacfiec ytaiourht_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
For the answers, go to
www.gcn.com and click on Crossword/Puzzle.
READERS SPEAK:How have your agency's security funding requests fared? Do you have the money you need to protect the government's systems?My agency has not fared very well. The assumption that a majority of agencies outside of the Defense Department consider their resources and information to be publicly accessible and nonsensitive supports efforts to not justify security funding. Although information confidentiality may not apply to some agencies, information integrity is clearly defined throughout government.
Although a sufficient amount of overall funding is proportioned for each agency, a small amount of funding is allocated for security.
'Ronald Greenfield, National Highway Traffic Safety AdministrationFor other responses, go to
www.gcn.com and select Readers Speak.