Platform security

12345678910
Across
  1. 2. , separate low-level system software running on the host machine to perform visualization.
  2. 3. , synchronous condition that results from a particularly undesirable situation.
  3. 6. , Linux uses this technique to define the priority of processes
  4. 7. , a real-time operating system used in mission-critical applications
  5. 9. , an asynchronous event that can occur at any time irrespective of what the processor is doing
  6. 10. , processes running in the background, started by the kernel itself.
Down
  1. 1. , a connection used to exchange data between the processes.
  2. 4. , one method to block buffer overflow attacks
  3. 5. , helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. 8. , the process responsible for secure logon.