Across
- 5. The maximum acceptable amount of data loss measured in time before a disaster affects the business.
- 7. Identifying, assessing, and controlling threats to an organization's capital and earnings, including IT systems.
- 8. Secondary systems or processes that can take over in case the primary systems fail.
- 9. The period during which a system is unavailable or not operational.
Down
- 1. A complete inventory of hardware and software within an organization to protect them and manage security risks effectively.
- 2. Ensuring that the organization follows industry standards and regulations to maintain high availability and data protection.
- 3. The targeted duration of time within which a business process must be restored after a disaster to avoid unacceptable consequences.
- 4. The period during which a system is operational and accessible.
- 6. Techniques and tools implemented to protect systems and data from unauthorized access or attacks.