Cybersecurity Fundamentals Chapter 2 Part 2

12345678910
Across
  1. 4. requires a set of checks before allowing a device to connect to a network.
  2. 7. allows users to gain access to application software and databases. Cloud providers manage the infrastructure.
  3. 9. programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers.
  4. 10. shift the technology component from the organization to the cloud provider.
Down
  1. 1. run inside a virtual environment with a pre-packaged
  2. 2. includes the implementation of authentication and encryption.
  3. 3. appliances that are installed within the network faculties.
  4. 5. secure virtual network that uses the public network.
  5. 6. provides virtualized computing resources over the Internet.
  6. 8. developed a comprehensive framework to guide information security management.