Let's Play OPS
Across
- 2. Unauthorized access gained by cracking credentials
- 4. Attack where shipment or order details are altered secretly
- 5. Encrypted communication protocol used between supply chain systems
- 7. Event where warehouse operations halt due to corrupted systems
- 8. Malicious entry inserted through software updates
- 10. Weakest digital point that can collapse a multi-partner network
- 11. Fraud where attackers pose as legitimate suppliers
Down
- 1. Practice of verifying every transaction or shared data
- 3. Undetected extraction of sensitive commercial data
- 6. Technique that overwhelms logistics systems with fake traffic
- 9. Process of assessing supplier cybersecurity capability