Chapter 11 Security Plus

123456789101112131415161718192021
Across
  1. 4. IT services using resources that are traditionally bound to hardware
  2. 5. Virtualizing parts of physical network for reconfiguration.
  3. 6. Special security challenges in spanning public/private spaces.
  4. 9. VM breaking out to interact with host OS.
  5. 10. Linux security architecture for access control.
  6. 12. On-demand infrastructure for configurable computing resources.
  7. 13. Dividing application development into smaller, manageable entities.
  8. 14. Simplifies the process of building, deploying, and managing containerized applications
  9. 16. Virtualized service extending WAN networks.
  10. 18. Table listing security duties of user and cloud provider.
  11. 19. Computing resources located on organization’s campus.
  12. 20. AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
  13. 21. integrated, cloud-centric, and user-centric approach to network security.
Down
  1. 1. External providers offering cloud security controls.
  2. 2. Cloud security controls to mitigate vulnerabilities.
  3. 3. Unique challenges to securing cloud usage.
  4. 7. Method of packaging, distributing, and running applications .
  5. 8. Equipment and personnel spread across different locations.
  6. 11. provision computing infrastructure using code instead of manual processes.
  7. 15. Local equipment and personnel at organization’s campus computing.
  8. 17. Virtualization vulnerability exposing data to another VM.