Let's Play OPS

1234567891011
Across
  1. 2. Unauthorized access gained by cracking credentials
  2. 4. Attack where shipment or order details are altered secretly
  3. 5. Encrypted communication protocol used between supply chain systems
  4. 7. Event where warehouse operations halt due to corrupted systems
  5. 8. Malicious entry inserted through software updates
  6. 10. Weakest digital point that can collapse a multi-partner network
  7. 11. Fraud where attackers pose as legitimate suppliers
Down
  1. 1. Practice of verifying every transaction or shared data
  2. 3. Undetected extraction of sensitive commercial data
  3. 6. Technique that overwhelms logistics systems with fake traffic
  4. 9. Process of assessing supplier cybersecurity capability