Cloud Security (Easy)

1234567
Across
  1. 1. The set of policies, technologies, and practices designed to protect cloud infrastructure and data.
  2. 4. A security method that requires users to provide multiple forms of identification to access cloud resources.
  3. 5. A company that offers cloud computing services and infrastructure to businesses and individuals.
  4. 7. Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data in cloud environments.
Down
  1. 2. The process of converting data into a secure code to prevent unauthorized access or disclosure.
  2. 3. The framework and processes for managing user identities and controlling their access to cloud resources.
  3. 6. A secure network connection that allows users to access cloud resources over the internet.