Cybersecurity Fundamentals Chapter 2 Part 2
Across
- 4. requires a set of checks before allowing a device to connect to a network.
- 7. allows users to gain access to application software and databases. Cloud providers manage the infrastructure.
- 9. programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers.
- 10. shift the technology component from the organization to the cloud provider.
Down
- 1. run inside a virtual environment with a pre-packaged
- 2. includes the implementation of authentication and encryption.
- 3. appliances that are installed within the network faculties.
- 5. secure virtual network that uses the public network.
- 6. provides virtualized computing resources over the Internet.
- 8. developed a comprehensive framework to guide information security management.