Security in Cloud Computing

1234567891011121314151617181920
Across
  1. 2. A security process requiring two or more verification methods such as password plus OTP or biometrics.
  2. 3. Protecting data both when stored and when transmitted across networks using encryption techniques.
  3. 5. A framework used to manage digital identities, user roles, and access permissions in cloud environments.
  4. 8. A simulated cyberattack conducted by security experts to identify system vulnerabilities.
  5. 11. Internet-based computing that provides storage, applications, or services online instead of locally.
  6. 14. security technique where sensitive data is replaced with random symbols or tokens.
  7. 16. A record that tracks user actions, login attempts, and system activities for security monitoring.
  8. 18. A stored copy of important data created so it can be restored if the original data is lost or corrupted.
  9. 19. A virtual firewall in cloud platforms that controls inbound and outbound traffic to cloud resources.
  10. 20. A redundancy strategy where data is duplicated across different geographic locations for safety
Down
  1. 1. A security principle that grants users only the minimum access necessary to perform their tasks.
  2. 4. A technique used to make program code or data intentionally difficult to understand.
  3. 6. A strategy designed to restore IT infrastructure and services after disasters like cyberattacks or system failure.
  4. 7. An authentication system allowing users to log in once and access multiple related applications.
  5. 9. A method of assigning system permissions based on user roles such as admin, editor, or viewer.
  6. 10. A scheduled process that automatically copies data without manual user intervention.
  7. 12. A secure internet connection that encrypts data to protect privacy, especially when accessing cloud services remotely.
  8. 13. A network security system that monitors and filters incoming and outgoing traffic based on security rules.
  9. 15. A security method that restricts system or data access only to authorized users.
  10. 17. The process of converting readable data into coded form to prevent unauthorized access.