ISACA BC

123456789
Across
  1. 1. way to create a secure software
  2. 4. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)
  3. 5. a computer malware program that was originally developed in the form of a banking Trojan
  4. 7. integrates all of the cloud security capabilities into a single cloud-native solution
  5. 9. Toughest privacy and security law in the world
Down
  1. 2. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
  2. 3. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
  3. 4. method that requires the user to provide two or more verification factors to gain access to a resource
  4. 6. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
  5. 8. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse