Across
- 1. A security measure that requires multiple forms of authentication.
- 4. Notifications of security incidents are often referred to as _____
- 6. Cloud service model often used for sensitive data storage where the provider manages everything
- 7. This authentication factor often involves something you have, like a fingerprint or smart card
- 8. The practice of monitoring network traffic for unusual or suspicious activity.
- 9. The principle of assigning different access levels to different users or groups
- 10. Ensuring that data is kept confidential, intact, and available
Down
- 2. Protecting data by converting it into a code
- 3. A security measure that involves keeping software and systems up to date.
- 5. The responsibility for securing cloud resources is often shared between the cloud provider and the___
