SynopTech No. 4 - Cyber Risk in Central Banking

12345678
Across
  1. 2. Phishing attacks involve the mass distribution of _____ e-mail messages
  2. 4. BSFIs should oversee _____ phishing simulations or exercises
  3. 6. Beyond investments, central banks focus on developing concrete policy _____
  4. 7. Phishing is an example of _____ engineering
  5. 8. Cyber security _____ is increasingly integrated into enterprise risk management frameworks
Down
  1. 1. Phishing is an attempt to obtain sensitive _____
  2. 3. _____ is one of the most common method of cyber attack
  3. 5. Data breaches compromise confidentiality, with financial and reputational _____