CM-BCMS

1234567891011121314151617
Across
  1. 2. Harmful software that infiltrates and disrupts systems
  2. 4. A sudden event causing disruption or harm to operations
  3. 5. Fraudulent phone calls designed to extract sensitive details
  4. 8. Analyzing potential risks to prepare for future challenges
  5. 9. A critical situation requiring urgent decision-making
  6. 10. Framework ensuring operations continue despite challenges.
  7. 12. Potential actions that compromise digital safety
  8. 13. A technique used to take advantage of system vulnerabilities
  9. 15. Interconnected systems for sharing resources and information
  10. 16. A state of readiness to effectively manage crises
  11. 17. The process of converting information into secure code
Down
  1. 1. Verifying a user’s identity to ensure security
  2. 3. The capacity to adjust quickly to changing situations
  3. 6. Steps taken to reduce the impact of potential risks
  4. 7. Restoring critical business operations after a crisis
  5. 11. The ability to adapt and recover during disruptions
  6. 14. A security barrier protecting networks from external threats