Across
- 2. instrumentation used for industrial process control
- 6. involves isolating sensitive enterprise data
- 10. Downloading unofficial and unapproved apps
- 12. make a real-time operating system more resilient to attacks
- 14. Examining code after the source code
- 15. A coding technique for accounting for errors
- 17. facilitates communication between devices and the cloud
- 18. Circumventing the installed built-in limitations on Apple iOS devices
- 19. Office policy allowing personal tech
- 20. designed to replace or supplement a wired local area network
- 22. security constraint in which a device’s small size results in low processing
Down
- 1. testing software before the source code is compiled
- 3. refers to integrating security into the application
- 4. OS that guarantees real-time applications a certain capability within a specified deadline
- 5. Sharing a phone's internet with another device
- 6. Employee choose from company-approved devices
- 7. Process ensuring data accuracy before processing
- 8. computer hardware and software contained within a larger system
- 9. Tools that allow a device to be managed remotely by an organization
- 10. The ability of a system to handle growth efficiently
- 11. coverage area is divided into hexagon-shaped cells
- 13. The ability to resist attacks
- 16. ensuring timely and reliable access to devices
- 21. A system that controls multiple industrial control systems (ICS)