Chapter 11 Security Plus

12345678910111213141516171819202122232425
Across
  1. 3. Virtualization vulnerability exposing data to another VM.
  2. 12. integrated, cloud-centric, and user-centric approach to network security.
  3. 14. Equipment and personnel spread across different locations.
  4. 15. Unique challenges to securing cloud usage.
  5. 17. Virtualizing parts of physical network for reconfiguration.
  6. 18. located between the data source and the cloud
  7. 19. Cloud security controls to mitigate vulnerabilities.
  8. 20. On-demand infrastructure for configurable computing resources.
  9. 22. Computing resources located on organization’s campus.
  10. 23. VM breaking out to interact with host OS.
  11. 24. use of technology without the knowledge of the official IT department
  12. 25. expand and reduce resources according to the specific service requirements
Down
  1. 1. IT services using resources that are traditionally bound to hardware
  2. 2. Local equipment and personnel at organization’s campus computing.
  3. 4. AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
  4. 5. provision computing infrastructure using code instead of manual processes.
  5. 6. External providers offering cloud security controls.
  6. 7. Special security challenges in spanning public/private spaces.
  7. 8. computer that runs from resources stored on a central cloud
  8. 9. Linux security architecture for access control.
  9. 10. Table listing security duties of user and cloud provider.
  10. 11. isolate the failure of a server and storage resources from cloud users
  11. 13. Dividing application development into smaller, manageable entities.
  12. 16. Method of packaging, distributing, and running applications .
  13. 17. Virtualized service extending WAN networks.
  14. 21. Simplifies the process of building, deploying, and managing containerized applications