CSCU Module 8 – Securing the Cloud

12345678910111213141516171819202122232425262728293031
Across
  1. 2. Ensuring sensitive data on cloud remains confidential
  2. 4. Company offering cloud services to users
  3. 5. Cloud model offering a platform to develop and manage applications
  4. 7. Cloud shared by a group of organizations with similar goals
  5. 10. Ability to access cloud data anytime and anywhere
  6. 12. Unauthorized access to or theft of sensitive data
  7. 13. Employee with malicious intent who damages or leaks data
  8. 15. Cloud service owned by a provider and shared by multiple users
  9. 17. Loss of data due to hardware failure, error, or malicious activity
  10. 18. Cloud model providing infrastructure like virtual machines and storage
  11. 19. Physical site or country where cloud data is stored
  12. 21. Combination of two or more cloud types connected for flexibility
  13. 22. Question of who controls data once uploaded to the cloud
  14. 24. Protection of data, applications, and infrastructure in the cloud
  15. 27. Cloud setup dedicated to a single organization for storage and computing
  16. 28. User’s personal access space on a cloud platform
  17. 30. Login method requiring a password and verification code
  18. 31. Cloud model delivering complete software over the Internet
Down
  1. 1. Practice of using remote servers on the Internet to store, manage, and process data
  2. 3. Movement of data between data centers or servers
  3. 6. Cloud server environment where multiple users store data
  4. 8. Issue of whether deleted cloud data is permanently removed
  5. 9. Password that is long, complex, and difficult to guess
  6. 11. Process of converting encrypted data back to readable form
  7. 14. Safe online behavior when accessing or leaving cloud accounts
  8. 16. Copy of data stored separately for recovery after loss
  9. 20. Advantage of cloud allowing cheaper data management
  10. 23. Process of converting readable data into coded form
  11. 25. Security weakness in the cloud’s software or architecture
  12. 26. Gaining unauthorized access to a user’s cloud account
  13. 29. Service that saves data online and allows remote access