Across
- 8. services are delivered from a business' data center to internal users. This model offers versatility and convenience, while preserving management, control and security.
- 10. (Quality of Service) the capability of a network to provide better service to selected network traffic over various technologies
- 11. large secure locations for server farms
- 12. plugging a machine in which secures a frequency in your power line that is used for data transfer
- 15. security software that protects a system from malicious software
- 17. (Access Control Lists) a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee
- 18. Firewalls that allow only certain ports to be used
- 19. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it
- 20. using smartphones to control functions of your house
- 22. cloud technology that can be changed to adapt to the needs of the user
Down
- 1. the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
- 2. that covertly steals personal information from one computer
- 3. the property that enables a system to continue operating properly in the event of the failure of some components
- 4. allows companies to use computers as a utility that they get services for and from on demand rather than having to maintain their own infrastructure
- 5. the ability to add your own device onto a network, separate from the other machines on the network.
- 6. a third-party provider delivers the cloud service over the Internet, sold on-demand, typically by the minute or the hour.
- 7. (Virtual Private Network) a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.
- 9. self-replicating piece of code used for malicious purposes
- 13. the design of the communication on a network. It is a framework for the specification of the network’s physical components and their roles on the network
- 14. wireless ISP, get all data from an antenna outside your house
- 16. (Intrusion Prevention System) a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
- 20. The authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority.
- 21. a combination of public cloud services and on-premises private cloud – with orchestration and automation between the two. Companies can run mission-critical workloads or sensitive applications on the private cloud while using the public cloud for bursty workloads that must scale on-demand. The goal of hybrid cloud is to create a unified, automated, scalable environment which takes advantage of all that a public cloud infrastructure can provide, while still maintaining control over mission-critical data.
