Synoptech No. 4 - Cyber Risk in Central Banking

1234567
Across
  1. 2. Phishing attacks involve the mass distribution of _____ e-mail messages
  2. 5. BSFIs should oversee _____ phishing simulations or exercises
  3. 6. Cyber security _____ is increasingly integrated into enterprise risk management frameworks
  4. 7. Data breaches compromise confidentiality, with_____ and reputational losses.
Down
  1. 1. Beyond investments, central banks focus on developing concrete policy _____
  2. 2. Phishing is an example of _____ engineering
  3. 3. _____ is one of the most common method of cyber attack
  4. 4. Phishing is an attempt to obtain sensitive _____