Across
- 2. Ensuring sensitive data on cloud remains confidential
- 4. Company offering cloud services to users
- 5. Cloud model offering a platform to develop and manage applications
- 7. Cloud shared by a group of organizations with similar goals
- 10. Ability to access cloud data anytime and anywhere
- 12. Unauthorized access to or theft of sensitive data
- 13. Employee with malicious intent who damages or leaks data
- 15. Cloud service owned by a provider and shared by multiple users
- 17. Loss of data due to hardware failure, error, or malicious activity
- 18. Cloud model providing infrastructure like virtual machines and storage
- 19. Physical site or country where cloud data is stored
- 21. Combination of two or more cloud types connected for flexibility
- 22. Question of who controls data once uploaded to the cloud
- 24. Protection of data, applications, and infrastructure in the cloud
- 27. Cloud setup dedicated to a single organization for storage and computing
- 28. User’s personal access space on a cloud platform
- 30. Login method requiring a password and verification code
- 31. Cloud model delivering complete software over the Internet
Down
- 1. Practice of using remote servers on the Internet to store, manage, and process data
- 3. Movement of data between data centers or servers
- 6. Cloud server environment where multiple users store data
- 8. Issue of whether deleted cloud data is permanently removed
- 9. Password that is long, complex, and difficult to guess
- 11. Process of converting encrypted data back to readable form
- 14. Safe online behavior when accessing or leaving cloud accounts
- 16. Copy of data stored separately for recovery after loss
- 20. Advantage of cloud allowing cheaper data management
- 23. Process of converting readable data into coded form
- 25. Security weakness in the cloud’s software or architecture
- 26. Gaining unauthorized access to a user’s cloud account
- 29. Service that saves data online and allows remote access
