Across
- 4. IT services using resources that are traditionally bound to hardware
- 5. Virtualizing parts of physical network for reconfiguration.
- 6. Special security challenges in spanning public/private spaces.
- 9. VM breaking out to interact with host OS.
- 10. Linux security architecture for access control.
- 12. On-demand infrastructure for configurable computing resources.
- 13. Dividing application development into smaller, manageable entities.
- 14. Simplifies the process of building, deploying, and managing containerized applications
- 16. Virtualized service extending WAN networks.
- 18. Table listing security duties of user and cloud provider.
- 19. Computing resources located on organization’s campus.
- 20. AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
- 21. integrated, cloud-centric, and user-centric approach to network security.
Down
- 1. External providers offering cloud security controls.
- 2. Cloud security controls to mitigate vulnerabilities.
- 3. Unique challenges to securing cloud usage.
- 7. Method of packaging, distributing, and running applications .
- 8. Equipment and personnel spread across different locations.
- 11. provision computing infrastructure using code instead of manual processes.
- 15. Local equipment and personnel at organization’s campus computing.
- 17. Virtualization vulnerability exposing data to another VM.
