U11 - Mod 17 Key Terms
Across
- 3. (8) as a Service allows users to access application software and databases. Cloud providers manage the infrastructure while users store data on the cloud provider’s servers.
- 4. (14) as a Service provides virtualized computing resources over the Internet. The provider hosts the hardware, software, servers, and storage components, and the user pays for
- 7. (4,2) a hypervisor where an application running on the host machine is used tocreate virtual machines that consist entirely of software and contain no hardware components.
- 11. hides original data with random characters or data.
- 12. replaces sensitive data with realistic fictional data.
- 13. (4,number) a hypervisor where the guest operating system runs directly on a hardware platform, under the control of the host system.
- 15. (8) as a Service lets an organization remotely access the development tools and services used to deliver such applications, on a subscription basis.
- 16. (acronym) provide a repository of useful code to make application development faster and cheaper.
Down
- 1. (7,5) Also called an internal, corporate, or enterprise cloud, a private cloud is hosted on a private platform.This offers an organization more control over its data, but it may be more expensive than other cloud services due to infrastructure, maintenance, and administration costs.
- 2. Cloud (6,5) combines the private and public cloud by offering control of organizational data, which is still hosted in a public cloud.
- 5. is the science of making and breaking secret codes.
- 6. (9,5) can measure the consistency of data in a file, picture, or record to ensure that it
- 8. (6,5) is hosted by a service provider at an offsite facility. Users pay a monthly or yearly usage fee to access the cloud. This option costs the organization less for infrastructure, maintenance, and administration — however, the organization has less control over its data.
- 9. threat (7,6) This occurs when an employee, contractor, or business partner maliciously or unintentionally compromise the cloud service.
- 10. is the process of scrambling data so that unauthorized people cannot easily read it.
- 14. not been corrupted.