iSEC Dimensions, CrossWord

1234567891011121314
Across
  1. 3. A system used to monitor and control network traffic
  2. 5. An assessment to ensure that security measures are effective and policies are followed
  3. 6. Responsible for ensuring secure configuration of the applications/workloads on the cloud enviorment.
  4. 8. An attack where malicious actors exploit poorly configured cloud storage.
  5. 9. A strategy to prevent data loss in cloud environments
  6. 12. Practice that involves keeping sensitive information hidden through encryption or obfuscation
  7. 13. A vulnerability in software that is not yet known to the vendor.
  8. 14. A comprehensive plan that ensures the continuation of operations during a crisis
Down
  1. 1. The process of restoring data and systems after an attack or failure
  2. 2. The process of ensuring access control in the cloud enviorment using tokens or certificates.
  3. 4. The concept of ensuring data is available when needed
  4. 7. The service model where you rent virtual servers and storage in the cloud.
  5. 8. A system of access control where users must provide more than one form of authentication
  6. 10. The practice of keeping data private and protected in the cloud
  7. 11. A cyberattack that floods a network to make it unavailable.