Chapter 11 Security Plus

1234567891011121314151617181920
Across
  1. 2. Unique challenges to securing cloud usage.
  2. 5. Computing resources located on organization’s campus.
  3. 10. External providers offering cloud security controls.
  4. 12. Table listing security duties of user and cloud provider.
  5. 14. Dividing application development into smaller, manageable entities.
  6. 15. Managing computer resources regardless of physical layout/location.
  7. 16. Virtualization vulnerability exposing data to another VM.
  8. 18. Cloud security controls to mitigate vulnerabilities.
  9. 19. Local equipment and personnel at organization’s campus computing.
  10. 20. Virtualizing parts of physical network for reconfiguration.
Down
  1. 1. Equipment and personnel spread across different locations.
  2. 3. Cloud infrastructure with managed capacity and setup.
  3. 4. Instances of virtualization for managing resources.
  4. 6. Reduced instance of virtualization for application deployment.
  5. 7. On-demand infrastructure for configurable computing resources.
  6. 8. Convergence of multiple cloud-delivered security services.
  7. 9. Special security challenges in spanning public/private spaces.
  8. 11. scape: VM breaking out to interact with host OS.
  9. 13. Linux security architecture for access control.
  10. 17. Virtualized service extending WAN networks.