Cloud Security and Data Privacy in Industrial IoT

12345678910111213141516171819202122232425
Across
  1. 5. A technology that creates a virtual representation of physical hardware, such as servers, storage, and networks
  2. 6. The unauthorized alteration or manipulation of devices, systems, or data to disrupt operations.
  3. 8. A decentralized digital ledger used to securely record transactions across multiple systems.
  4. 10. The principle of ensuring that information is accessible only to authorized users and systems.
  5. 11. The implementation of measures to safeguard systems, networks, and data against cyber threats and attacks.
  6. 12. A device that detects the change in the environment and responds to some output on the other system.
  7. 15. The assurance that an individual or entity cannot deny the authenticity of their actions or communications.
  8. 17. A mechanical or electronic component that performs actions based on control signals from a system.
  9. 20. Malicious software designed to disrupt, damage, or gain unauthorized access to systems or data.
  10. 21. The process of granting or denying specific permissions to a verified user or system.
  11. 23. A framework that ensures the right individuals have appropriate access to technology resources.
  12. 24. The process of verifying the identity of a user or device to ensure legitimate access.
  13. 25. A cloud-based software delivery model where applications are accessed via a subscription over the internet.
Down
  1. 1. A cyberattack where malicious code is inserted into a program or script to exploit vulnerabilities.
  2. 2. An attack where a perpetrator intercepts and manipulates communication between two parties.
  3. 3. The use of IoT technologies in industrial settings to enhance operational efficiency and automation.
  4. 4. A type of key helps a user encrypt the available data while the private key decrypts it
  5. 7. The process of securely creating, storing, distributing, and managing cryptographic keys.
  6. 9. A security tool that monitors and filters network traffic to block unauthorized access while allowing legitimate communication.
  7. 13. The process of converting readable data into a cipher text to prevent unauthorized access.
  8. 14. A distributed computing paradigm that processes data near its source to minimize latency and improve efficiency.
  9. 16. The practice of protecting personal or sensitive information from unauthorized access or disclosure.
  10. 18. The assurance that data remains accurate, consistent, and unaltered during transmission or storage.
  11. 19. A cyberattack that overwhelms a system or network to make it unavailable to users.
  12. 22. Actions taken to reduce the severity or impact of identified security risks or vulnerabilities.
  13. 24. Deliberate actions designed to exploit vulnerabilities in systems to gain unauthorized access or cause damage.