Across
- 2. Unique challenges to securing cloud usage.
- 5. Computing resources located on organization’s campus.
- 10. External providers offering cloud security controls.
- 12. Table listing security duties of user and cloud provider.
- 14. Dividing application development into smaller, manageable entities.
- 15. Managing computer resources regardless of physical layout/location.
- 16. Virtualization vulnerability exposing data to another VM.
- 18. Cloud security controls to mitigate vulnerabilities.
- 19. Local equipment and personnel at organization’s campus computing.
- 20. Virtualizing parts of physical network for reconfiguration.
Down
- 1. Equipment and personnel spread across different locations.
- 3. Cloud infrastructure with managed capacity and setup.
- 4. Instances of virtualization for managing resources.
- 6. Reduced instance of virtualization for application deployment.
- 7. On-demand infrastructure for configurable computing resources.
- 8. Convergence of multiple cloud-delivered security services.
- 9. Special security challenges in spanning public/private spaces.
- 11. scape: VM breaking out to interact with host OS.
- 13. Linux security architecture for access control.
- 17. Virtualized service extending WAN networks.
