Across
- 3. What must cryptographic keys be protected against throughout their lifecycle?
- 6. What is the name of the Dutch IT-association that published the first DORA-control framework?
- 7. "The control team lead shall select at least three ********* to conduct the TLPT, on the basis of all of the following elements: (a) the recommendation by the threat intelligence provider and the threat-led nature of each scenario; (b) the input provided by the test managers; (c) the feasibility of the proposed scenarios for execution, based on the expert judgement of the testers; (d) the size, complexity and overall risk profile of the financial entity and the nature, scale and complexity of its services, activities and operations."
- 11. What technique can be used in network design to limit contagion during cyber attacks?
- 13. The **** plan with a third party must be based on realistic scenarios and assumptions.
- 14. Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
- 15. What must financial entities use for advanced testing of ICT tools?
- 16. How often per year should a review of access rights for ICT systems that support critical or important functions be performed
- 18. What percentage of affected clients using a service meets the materiality threshold for major incidents?
- 20. What must ICT security policies ensure regarding data?
Down
- 1. Information of subcontractors should **** be in the Register of Information that effectively underpin ICT services supporting critical or important functions or material parts thereof.
- 2. What is the main subject matter of DORA?
- 4. Who is responsible for implementing the ICT risk management framework in financial entities?
- 5. What must financial entities report to relevant authorities?
- 8. "The Register of Information has six criteria: Financial entities shall ensure that the information contained in the templates referred to in paragraph 1 adhere to the following principles of data quality. Five of them are: accuracy; completeness; integrity; uniformity; validity. What is the six criteria?"
- 9. What must be promptly renewed to ensure ongoing security?
- 10. What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
- 12. We enter the run phase of DORA. The ICT framework should be reviewed yearly. This report is quite extensive. So early start is important. Internal ***** should also start early to ***** this ICT Framework.
- 17. How frequently should vulnerability scanning be performed on critical ICT assets?
- 19. What should financial entities have to ensure data restoration?
