Across
- 6. Securing individual assets rather than relying one single network perimeter
- 8. A security enhancement that requires users to provide more than one form of identification to access an account or system
- 9. Digital world where users, represented by avatars, can interact with each other and digital environments, often through virtual reality (VR) or augmented reality (AR)
- 10. A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers
- 11. The concept of automating everything in an organization that can be automated
- 13. The delivery of various IT solutions, applications, and infrastructure as a service over the internet
- 15. technologies that enhance or replace our view of the world
- 16. A process used to identify weaknesses in systems, applications, or networks that could be exploited by attackers
Down
- 1. Covers the cost of losses and damages related to IT and networks
- 2. A computer capable of completing tasks humans typically require intelligence for
- 3. A cybersecurity technology that continuously monitors and responds to suspicious activities on endpoints like computers, servers, and mobile devices
- 4. Securing individual assets rather than relying one single network perimeter
- 5. A set of practices and technology
- 7. Managed by one provider but in many different locations
- 12. Technology designed to minimise negative environmental impact
- 14. Various ways
