Cloud Security (Easy)
Across
- 1. The set of policies, technologies, and practices designed to protect cloud infrastructure and data.
- 4. A security method that requires users to provide multiple forms of identification to access cloud resources.
- 5. A company that offers cloud computing services and infrastructure to businesses and individuals.
- 7. Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data in cloud environments.
Down
- 2. The process of converting data into a secure code to prevent unauthorized access or disclosure.
- 3. The framework and processes for managing user identities and controlling their access to cloud resources.
- 6. A secure network connection that allows users to access cloud resources over the internet.