Security Fest

1234567891011121314151617
Across
  1. 3. Facility not ready for immediate switch over
  2. 5. Command-line interface client program to transfer files
  3. 8. This has Security Clauses identified from the Contract and relevant controls
  4. 10. Data Encryption Standard is a ____ key algorithm
  5. 14. Gives its owner the legal right to exclude others from selling an invention for a limited period
  6. 15. Performs Traffic directing functions on the Internet
  7. 17. Hierarchical, Decentralized naming system for various resources connected to Internet
Down
  1. 1. Program offering on Cloud
  2. 2. Automatically generates online advertisements
  3. 4. Biometric access
  4. 6. A Tool to prevent Security Incidents
  5. 7. A potential threat or damage if not handled proactively may result in huge impact
  6. 9. Physical/Logical Subnetwork that exposes an organization's external-facing services to untrusted network
  7. 11. Duration of time and a service level within which a business process must be restored after a disaster
  8. 12. FIX released every month for all software
  9. 13. This technology provides Confidentiality, Authentication and Integrity
  10. 16. Electrical Apparatus that provides emergency power to a Load