Across
- 3. A system used to monitor and control network traffic
- 5. An assessment to ensure that security measures are effective and policies are followed
- 6. Responsible for ensuring secure configuration of the applications/workloads on the cloud enviorment.
- 8. An attack where malicious actors exploit poorly configured cloud storage.
- 9. A strategy to prevent data loss in cloud environments
- 12. Practice that involves keeping sensitive information hidden through encryption or obfuscation
- 13. A vulnerability in software that is not yet known to the vendor.
- 14. A comprehensive plan that ensures the continuation of operations during a crisis
Down
- 1. The process of restoring data and systems after an attack or failure
- 2. The process of ensuring access control in the cloud enviorment using tokens or certificates.
- 4. The concept of ensuring data is available when needed
- 7. The service model where you rent virtual servers and storage in the cloud.
- 8. A system of access control where users must provide more than one form of authentication
- 10. The practice of keeping data private and protected in the cloud
- 11. A cyberattack that floods a network to make it unavailable.
