Information Security
Across
- 1. A TCS process for releasing application on Internet / Intranet.
- 4. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
- 5. Jenkins is the commonly used tool for performing this activity in the application development.
- 6. A TCS portal with a framwork for Software security.
- 9. A username, passowrd, and app-generated code on a phone.
- 11. A protocol operate on UDP ports 67 and 68
- 13. An application in TCS for Business Continuity Planning.
- 14. Application security testing examines source code.
- 16. It is Clould Service like TCS uses Google Workspaces
- 17. Plan It is a plan devised for an outcome other than usual plan.
- 19. It is achieved by using Hashing.
- 20. Allows you to login once and access many services and systems.
Down
- 2. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 3. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
- 7. An application tool recommended to use in TCS for storing and manage multiple credentials.
- 8. A TCS application used for managing physical access and logical resources access management.
- 10. You should not just identity, you should also confirm ________________________
- 12. An ability to shift workloads between cloud venders as needs change.
- 15. A software development methodology is most closely linked to DevSecOps approach.
- 18. DAY It is the day a new vulnerability is known and no patch is available yet.