ia3
Across
- 6. or fundamental assets.
- 7. organization's public perception, a key asset.
- 9. weakness in a system exploitable by a threat actor.
- 11. potential harm from exploiting a vulnerability.
- 15. website developer using this creates a vulnerability.
- 17. ability to bounce back from disruptions.
- 18. act of establishing a BCMS (two words).
- 19. likelihood and consequence of a potential event.
- 21. 'C' in BCMS, referring to ongoing operational capability.
- 22. events are examples of these.
- 23. emails trying to steal information.
- 25. taken to protect computer systems and networks.
Down
- 1. resources a BCMS aims to safeguard.
- 2. first step in vulnerability management.
- 3. piece of personal information targeted in phishing.
- 4. security system that monitors network traffic.
- 5. used by hackers to gain system access (abbr.).
- 8. formal examination of a BCMS.
- 10. piece of personal information targeted in phishing.
- 12. 'M' in BCMS, overseeing the system.
- 13. documented set of actions for specific crisis scenarios.
- 14. provides a management ______.
- 16. common medium for deploying phishing attacks via phone text.
- 20. form for Business Continuity Plan.
- 24. 'T' in BCP Test Plan.