Across
- 5. A technology that creates a virtual representation of physical hardware, such as servers, storage, and networks
- 6. The unauthorized alteration or manipulation of devices, systems, or data to disrupt operations.
- 8. A decentralized digital ledger used to securely record transactions across multiple systems.
- 10. The principle of ensuring that information is accessible only to authorized users and systems.
- 11. The implementation of measures to safeguard systems, networks, and data against cyber threats and attacks.
- 12. A device that detects the change in the environment and responds to some output on the other system.
- 15. The assurance that an individual or entity cannot deny the authenticity of their actions or communications.
- 17. A mechanical or electronic component that performs actions based on control signals from a system.
- 20. Malicious software designed to disrupt, damage, or gain unauthorized access to systems or data.
- 21. The process of granting or denying specific permissions to a verified user or system.
- 23. A framework that ensures the right individuals have appropriate access to technology resources.
- 24. The process of verifying the identity of a user or device to ensure legitimate access.
- 25. A cloud-based software delivery model where applications are accessed via a subscription over the internet.
Down
- 1. A cyberattack where malicious code is inserted into a program or script to exploit vulnerabilities.
- 2. An attack where a perpetrator intercepts and manipulates communication between two parties.
- 3. The use of IoT technologies in industrial settings to enhance operational efficiency and automation.
- 4. A type of key helps a user encrypt the available data while the private key decrypts it
- 7. The process of securely creating, storing, distributing, and managing cryptographic keys.
- 9. A security tool that monitors and filters network traffic to block unauthorized access while allowing legitimate communication.
- 13. The process of converting readable data into a cipher text to prevent unauthorized access.
- 14. A distributed computing paradigm that processes data near its source to minimize latency and improve efficiency.
- 16. The practice of protecting personal or sensitive information from unauthorized access or disclosure.
- 18. The assurance that data remains accurate, consistent, and unaltered during transmission or storage.
- 19. A cyberattack that overwhelms a system or network to make it unavailable to users.
- 22. Actions taken to reduce the severity or impact of identified security risks or vulnerabilities.
- 24. Deliberate actions designed to exploit vulnerabilities in systems to gain unauthorized access or cause damage.
