Connections, Communication and The Cloud

12345678910111213141516
Across
  1. 6. Securing individual assets rather than relying one single network perimeter
  2. 8. A security enhancement that requires users to provide more than one form of identification to access an account or system
  3. 9. Digital world where users, represented by avatars, can interact with each other and digital environments, often through virtual reality (VR) or augmented reality (AR)
  4. 10. A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers
  5. 11. The concept of automating everything in an organization that can be automated
  6. 13. The delivery of various IT solutions, applications, and infrastructure as a service over the internet
  7. 15. technologies that enhance or replace our view of the world
  8. 16. A process used to identify weaknesses in systems, applications, or networks that could be exploited by attackers
Down
  1. 1. Covers the cost of losses and damages related to IT and networks
  2. 2. A computer capable of completing tasks humans typically require intelligence for
  3. 3. A cybersecurity technology that continuously monitors and responds to suspicious activities on endpoints like computers, servers, and mobile devices
  4. 4. Securing individual assets rather than relying one single network perimeter
  5. 5. A set of practices and technology
  6. 7. Managed by one provider but in many different locations
  7. 12. Technology designed to minimise negative environmental impact
  8. 14. Various ways