Security Plus Chapter 6
Across
- 1. Circumventing the installed built-in limitations on Apple iOS devices
- 4. facilitates communication between devices and the cloud
- 6. coverage area is divided into hexagon-shaped cells
- 7. OS that guarantees real-time applications a certain capability within a specified deadline
- 9. A coding technique for accounting for errors
- 10. make a real-time operating system more resilient to attacks
- 11. Downloading unofficial and unapproved apps
- 12. testing software before the source code is compiled
- 16. refers to integrating security into the application
Down
- 2. The ability to resist attacks
- 3. ensuring timely and reliable access to devices
- 4. instrumentation used for industrial process control
- 5. involves isolating sensitive enterprise data
- 8. Examining code after the source code
- 13. security constraint in which a device’s small size results in low processing
- 14. A system that controls multiple industrial control systems (ICS)
- 15. Tools that allow a device to be managed remotely by an organization