Security Plus Chapter 6

12345678910111213141516
Across
  1. 1. Circumventing the installed built-in limitations on Apple iOS devices
  2. 4. facilitates communication between devices and the cloud
  3. 6. coverage area is divided into hexagon-shaped cells
  4. 7. OS that guarantees real-time applications a certain capability within a specified deadline
  5. 9. A coding technique for accounting for errors
  6. 10. make a real-time operating system more resilient to attacks
  7. 11. Downloading unofficial and unapproved apps
  8. 12. testing software before the source code is compiled
  9. 16. refers to integrating security into the application
Down
  1. 2. The ability to resist attacks
  2. 3. ensuring timely and reliable access to devices
  3. 4. instrumentation used for industrial process control
  4. 5. involves isolating sensitive enterprise data
  5. 8. Examining code after the source code
  6. 13. security constraint in which a device’s small size results in low processing
  7. 14. A system that controls multiple industrial control systems (ICS)
  8. 15. Tools that allow a device to be managed remotely by an organization