ia3

12345678910111213141516171819202122232425
Across
  1. 6. or fundamental assets.
  2. 7. organization's public perception, a key asset.
  3. 9. weakness in a system exploitable by a threat actor.
  4. 11. potential harm from exploiting a vulnerability.
  5. 15. website developer using this creates a vulnerability.
  6. 17. ability to bounce back from disruptions.
  7. 18. act of establishing a BCMS (two words).
  8. 19. likelihood and consequence of a potential event.
  9. 21. 'C' in BCMS, referring to ongoing operational capability.
  10. 22. events are examples of these.
  11. 23. emails trying to steal information.
  12. 25. taken to protect computer systems and networks.
Down
  1. 1. resources a BCMS aims to safeguard.
  2. 2. first step in vulnerability management.
  3. 3. piece of personal information targeted in phishing.
  4. 4. security system that monitors network traffic.
  5. 5. used by hackers to gain system access (abbr.).
  6. 8. formal examination of a BCMS.
  7. 10. piece of personal information targeted in phishing.
  8. 12. 'M' in BCMS, overseeing the system.
  9. 13. documented set of actions for specific crisis scenarios.
  10. 14. provides a management ______.
  11. 16. common medium for deploying phishing attacks via phone text.
  12. 20. form for Business Continuity Plan.
  13. 24. 'T' in BCP Test Plan.