Chapter 6 Security Plus

12345678910111213141516171819202122
Across
  1. 2. instrumentation used for industrial process control
  2. 6. involves isolating sensitive enterprise data
  3. 10. Downloading unofficial and unapproved apps
  4. 12. make a real-time operating system more resilient to attacks
  5. 14. Examining code after the source code
  6. 15. A coding technique for accounting for errors
  7. 17. facilitates communication between devices and the cloud
  8. 18. Circumventing the installed built-in limitations on Apple iOS devices
  9. 19. Office policy allowing personal tech
  10. 20. designed to replace or supplement a wired local area network
  11. 22. security constraint in which a device’s small size results in low processing
Down
  1. 1. testing software before the source code is compiled
  2. 3. refers to integrating security into the application
  3. 4. OS that guarantees real-time applications a certain capability within a specified deadline
  4. 5. Sharing a phone's internet with another device
  5. 6. Employee choose from company-approved devices
  6. 7. Process ensuring data accuracy before processing
  7. 8. computer hardware and software contained within a larger system
  8. 9. Tools that allow a device to be managed remotely by an organization
  9. 10. The ability of a system to handle growth efficiently
  10. 11. coverage area is divided into hexagon-shaped cells
  11. 13. The ability to resist attacks
  12. 16. ensuring timely and reliable access to devices
  13. 21. A system that controls multiple industrial control systems (ICS)