ISCC : Part 2

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 3. The process of verifying the identity of a system user
  2. 4. The assurance that data remains accurate complete and unchanged unless properly modified
  3. 6. The overall perception and satisfaction users have when interacting with a system
  4. 9. A general term for software designed to damage disrupt or gain unauthorized access to systems
  5. 13. A security goal ensuring information is accessible only to authorized users
  6. 17. The phase where navigation structure interaction flow and media usage are planned
  7. 18. A condition where information is isolated within departments preventing enterprise wide analysis
  8. 22. A measure affected when information is inaccurate outdated irrelevant or incomplete
  9. 23. A security principle preventing users from denying actions they performed
  10. 24. A security goal ensuring systems and data are accessible when required
  11. 27. Injury caused by prolonged repetitive computer related movements
  12. 28. The discipline concerned with designing systems that reduce physical strain and injury
  13. 33. An event where hardware software or procedures prevent an information system from operating correctly
  14. 38. The database design process used to reduce redundancy and improve data integrity
  15. 39. A set of rules governing data communication between network devices
  16. 40. A data condition ensuring that the same data value appears identically across all systems
Down
  1. 1. Malware that encrypts data and demands payment for its release
  2. 2. The activity most directly supported when managers interpret processed information rather than raw data
  3. 5. Legal rights protecting software data and digital creations
  4. 7. Attacks that exploit human behavior rather than technical vulnerabilities
  5. 8. The technique that allows multiple operating systems to run on a single physical machine
  6. 10. Unnecessary duplication of data that increases storage cost and inconsistency risk
  7. 11. A legal agreement defining how software can be used modified or distributed
  8. 12. The maximum amount of data that can be transmitted over a network in a given time
  9. 14. The part of a system that enables interaction between users and technology
  10. 15. A chronological record that tracks who accessed or modified data and when
  11. 16. Moral principles guiding acceptable behavior in digital environments
  12. 19. The ability of a system to handle increased workload without performance degradation
  13. 20. A cloud service that allows developers to build and deploy applications without managing infrastructure
  14. 21. A cloud service providing virtualized hardware resources over the internet
  15. 22. Organizational change driven by adopting digital technologies rather than simply automating tasks
  16. 25. The delay experienced in data transmission across a network
  17. 26. A way cloud computing is categorized such as infrastructure platform or software delivery
  18. 29. A cloud service characteristic where users access resources only when needed
  19. 30. A cloud service that delivers complete applications through a web browser
  20. 31. An organized combination of people technology and processes used to transform data into information for organizational decision making
  21. 32. The process of determining what actions an authenticated user is allowed to perform
  22. 34. A cloud feature that automatically adjusts computing resources based on demand
  23. 35. The ability of different systems or modules to work together seamlessly within an organization
  24. 36. A concept describing how information systems add value by improving efficiency coordination and competitiveness
  25. 37. A cloud pricing model where organizations are charged based on actual consumption