Test2
Across
- 4. software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
- 6. represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
- 10. a secure protocol developed for sending information securely over the Internet
- 11. Refers to a company security policy that allows for employees’ personal devices to be used in business.
- 12. A computer program used to prevent, detect, and remove malware
- 13. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- 14. the psychological manipulation of people into performing actions or divulging confidential information
Down
- 1. type of authentication method where the proof of a user’s identity is gained by different independent sources
- 2. attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
- 3. the practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
- 5. Actions a company takes to manage the aftermath of a security breach or cyberattack
- 7. A formal and approved list of users who have defined access rights to an asset
- 8. surveillance software that can record every keystroke made on a computer’s keyboard
- 9. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data