CM-BCMS

123456789101112131415161718
Across
  1. 2. Analysis Evaluating potential digital threats to ensure safety.
  2. 3. Assessment Analyzing threats to minimize potential vulnerabilities.
  3. 5. Management Routine updates to close security gaps in software.
  4. 7. Deceptive techniques using fake messages to steal sensitive information.
  5. 8. Testing Simulated attack to uncover security system flaws.
  6. 9. An attack demanding payment to unlock encrypted data.
  7. 10. Backup plan prepared for unexpected disruptions.
  8. 11. A voice-based scam to extract personal information over the phone.
  9. 12. Management Planning to ensure survival during emergencies.
  10. 13. Malicious software created to disrupt or damage systems.
  11. 15. Ability to recover operations during or after a crisis.
  12. 16. Continuity Plan (BCP) Framework ensuring operations continue despite challenges.
  13. 18. Cyberattack via text messages designed to deceive users.
Down
  1. 1. State of readiness to effectively respond to issues.
  2. 2. Process of restoring crucial business functions post-disruption.
  3. 4. Weakness in a system exploitable by attackers.
  4. 6. Process of verifying a user’s identity for security purposes.
  5. 14. Secures information by converting it into unreadable code.
  6. 17. A system barrier preventing unauthorized access to networks.