Chapter 11 Security Plus
Across
- 3. Virtualization vulnerability exposing data to another VM.
- 12. integrated, cloud-centric, and user-centric approach to network security.
- 14. Equipment and personnel spread across different locations.
- 15. Unique challenges to securing cloud usage.
- 17. Virtualizing parts of physical network for reconfiguration.
- 18. located between the data source and the cloud
- 19. Cloud security controls to mitigate vulnerabilities.
- 20. On-demand infrastructure for configurable computing resources.
- 22. Computing resources located on organization’s campus.
- 23. VM breaking out to interact with host OS.
- 24. use of technology without the knowledge of the official IT department
- 25. expand and reduce resources according to the specific service requirements
Down
- 1. IT services using resources that are traditionally bound to hardware
- 2. Local equipment and personnel at organization’s campus computing.
- 4. AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
- 5. provision computing infrastructure using code instead of manual processes.
- 6. External providers offering cloud security controls.
- 7. Special security challenges in spanning public/private spaces.
- 8. computer that runs from resources stored on a central cloud
- 9. Linux security architecture for access control.
- 10. Table listing security duties of user and cloud provider.
- 11. isolate the failure of a server and storage resources from cloud users
- 13. Dividing application development into smaller, manageable entities.
- 16. Method of packaging, distributing, and running applications .
- 17. Virtualized service extending WAN networks.
- 21. Simplifies the process of building, deploying, and managing containerized applications