Across
- 2. Phishing attacks involve the mass distribution of _____ e-mail messages
- 5. BSFIs should oversee _____ phishing simulations or exercises
- 6. Cyber security _____ is increasingly integrated into enterprise risk management frameworks
- 7. Data breaches compromise confidentiality, with_____ and reputational losses.
Down
- 1. Beyond investments, central banks focus on developing concrete policy _____
- 2. Phishing is an example of _____ engineering
- 3. _____ is one of the most common method of cyber attack
- 4. Phishing is an attempt to obtain sensitive _____
