Security Fest
Across
- 3. Facility not ready for immediate switch over
- 5. Command-line interface client program to transfer files
- 8. This has Security Clauses identified from the Contract and relevant controls
- 10. Data Encryption Standard is a ____ key algorithm
- 14. Gives its owner the legal right to exclude others from selling an invention for a limited period
- 15. Performs Traffic directing functions on the Internet
- 17. Hierarchical, Decentralized naming system for various resources connected to Internet
Down
- 1. Program offering on Cloud
- 2. Automatically generates online advertisements
- 4. Biometric access
- 6. A Tool to prevent Security Incidents
- 7. A potential threat or damage if not handled proactively may result in huge impact
- 9. Physical/Logical Subnetwork that exposes an organization's external-facing services to untrusted network
- 11. Duration of time and a service level within which a business process must be restored after a disaster
- 12. FIX released every month for all software
- 13. This technology provides Confidentiality, Authentication and Integrity
- 16. Electrical Apparatus that provides emergency power to a Load