DELOITTE MASTERCLASS ON CYBERSECURITY & BCMS
Across
- 5. Is a security practice that involves several steps, all of which are meant to proactively prevent bad actors from taking advantage of IT vulnerabilities
- 6. A software that hackers use to gain access to your system and capture sensitive information.
- 7. A type of testing which a discussion-based exercise where participants respond to a hypothetical situation
- 9. The B in BETH3 concept means
- 10. A holistic management process that identifies disruptive threats and their impact on the organization's operations.
- 14. A type of testing which a discussion-based exercise where the participants review the BCP and verify it for correctness and practicality
- 15. The E in BETH3 concept means
Down
- 1. A two-page document containing the organization's objectives for establishing a BCMS and the signatures of the key leaders supporting the initiative
- 2. A type of testing which a simulation exercise usually involving multiple departments (rehearsals)
- 3. A critical component of a BCMS because it helps an organization figure out how effective its BCMS is
- 4. The T in BETH3 concept means
- 8. A type of testing which an exercise where participants actually implement recovery action (e.g., move to alternate site, use backup systems, etc.)
- 11. A type of phishing attacks ehich uses SMS messages or notifications to target people
- 12. Is a cybercrime in which a target or targets are contacted by e-mail, telephone, or text message by someone posing as a legitimate institution to lure them into providing sensitive data
- 13. A type of phishing attacks which a mash-up of 'Voice' and 'Phishing', refers to phishing done over phone calls