DELOITTE MASTERCLASS ON CYBERSECURITY & BCMS

123456789101112131415
Across
  1. 5. Is a security practice that involves several steps, all of which are meant to proactively prevent bad actors from taking advantage of IT vulnerabilities
  2. 6. A software that hackers use to gain access to your system and capture sensitive information.
  3. 7. A type of testing which a discussion-based exercise where participants respond to a hypothetical situation
  4. 9. The B in BETH3 concept means
  5. 10. A holistic management process that identifies disruptive threats and their impact on the organization's operations.
  6. 14. A type of testing which a discussion-based exercise where the participants review the BCP and verify it for correctness and practicality
  7. 15. The E in BETH3 concept means
Down
  1. 1. A two-page document containing the organization's objectives for establishing a BCMS and the signatures of the key leaders supporting the initiative
  2. 2. A type of testing which a simulation exercise usually involving multiple departments (rehearsals)
  3. 3. A critical component of a BCMS because it helps an organization figure out how effective its BCMS is
  4. 4. The T in BETH3 concept means
  5. 8. A type of testing which an exercise where participants actually implement recovery action (e.g., move to alternate site, use backup systems, etc.)
  6. 11. A type of phishing attacks ehich uses SMS messages or notifications to target people
  7. 12. Is a cybercrime in which a target or targets are contacted by e-mail, telephone, or text message by someone posing as a legitimate institution to lure them into providing sensitive data
  8. 13. A type of phishing attacks which a mash-up of 'Voice' and 'Phishing', refers to phishing done over phone calls