Across
- 8. There are 4 types lenses of innovation 1. )challenging orthodoxies 2.) harnessing trends 3.) leveraging resources and the last one is
- 10. A security feature, that includes multiple verifications steps to log in
- 11. The technology that secures data by scrambling it so only authorized parties can read it?
- 12. The security system that protects your network from unauthorized access
Down
- 1. Emails , messages that appear genuine ,but is actually malicious
- 2. Numerical standards or measures are used to track and assess business performance?
- 3. The type of thinking that focuses on narrowing down possibilities to find a single, best, or most logical solution to a problem?
- 4. A computing model allows data and applications to be accessed over the internet rather than stored locally
- 5. An unauthorized access or disclosure of sensitive company information?
- 6. A harmful software that can infect your computer
- 7. The data type that is typically organized in spread sheets and databases.
- 9. The act of adhering to data regulations, industry standards, and internal rules as enforced by data governance
