Across
- 2. Harmful software that infiltrates and disrupts systems
- 4. A sudden event causing disruption or harm to operations
- 5. Fraudulent phone calls designed to extract sensitive details
- 8. Analyzing potential risks to prepare for future challenges
- 9. A critical situation requiring urgent decision-making
- 10. Framework ensuring operations continue despite challenges.
- 12. Potential actions that compromise digital safety
- 13. A technique used to take advantage of system vulnerabilities
- 15. Interconnected systems for sharing resources and information
- 16. A state of readiness to effectively manage crises
- 17. The process of converting information into secure code
Down
- 1. Verifying a user’s identity to ensure security
- 3. The capacity to adjust quickly to changing situations
- 6. Steps taken to reduce the impact of potential risks
- 7. Restoring critical business operations after a crisis
- 11. The ability to adapt and recover during disruptions
- 14. A security barrier protecting networks from external threats
