Across
- 3. The field of knowledge and practices aimed at protecting computer systems, programs, and data from cyberattacks, theft, and unauthorized access.
- 7. A set of rules and tools that allows programs to interact with each other.
- 8. A model of cloud services that provides organizations with data and application recovery after emergencies.
- 11. Action or interference taken to change or correct a process, situation, or behavior.
- 13. The process of using up resources or goods, both in an economic and general sense.
- 14. An individual or organization holding a current position or status in the market or society.
- 16. Processes and technologies used to prevent the use of financial systems for the legalization of proceeds from criminal activities.
Down
- 1. The combination of knowledge, skills, processes, and methods used to create products, services, and systems to meet human needs.
- 2. A decentralized database used to store records of transactions, providing security, transparency, and immutability of data.
- 4. The process of converting information using mathematical algorithms to make it unreadable to unauthorized users.
- 5. A cryptocurrency based on blockchain technology, proposed in 2008 within a paper by Satoshi Nakamoto.
- 6. A diversity or wide range of different elements, categories, or types.
- 9. A procedure or set of instructions designed to solve a specific problem or perform a particular type of computation.
- 10. At the beginning stage or at the moment of starting a specific process or event.
- 12. To seize power, position, or right unlawfully, usually by force or deceit.
- 15. A global standard for payment card security, based on the use of microchips to reduce fraud risks.