Across
- 2. Analysis Evaluating potential digital threats to ensure safety.
- 3. Assessment Analyzing threats to minimize potential vulnerabilities.
- 5. Management Routine updates to close security gaps in software.
- 7. Deceptive techniques using fake messages to steal sensitive information.
- 8. Testing Simulated attack to uncover security system flaws.
- 9. An attack demanding payment to unlock encrypted data.
- 10. Backup plan prepared for unexpected disruptions.
- 11. A voice-based scam to extract personal information over the phone.
- 12. Management Planning to ensure survival during emergencies.
- 13. Malicious software created to disrupt or damage systems.
- 15. Ability to recover operations during or after a crisis.
- 16. Continuity Plan (BCP) Framework ensuring operations continue despite challenges.
- 18. Cyberattack via text messages designed to deceive users.
Down
- 1. State of readiness to effectively respond to issues.
- 2. Process of restoring crucial business functions post-disruption.
- 4. Weakness in a system exploitable by attackers.
- 6. Process of verifying a user’s identity for security purposes.
- 14. Secures information by converting it into unreadable code.
- 17. A system barrier preventing unauthorized access to networks.
