Across
- 3. This term refers to the technology that limits where an app can function by tracking the mobile device's location.
- 4. The process of integrating secure development best practices and methodologies into application software development and deployment using the agile model.
- 6. A suite of software designed to protect against multiple types of malware.
- 8. Software that examines a computer for file-based virus infections and monitors activity like scanning new documents for viruses.
- 10. A system that supports the creation, editing, and modification of digital content by multiple employees
Down
- 1. A part of the internet where security professionals look for signs that critical information is being sought or sold.
- 2. This system is used to manage industrial control systems (ICSs).
- 3. The process of identifying the geographical location of a mobile device.
- 4. A "container" where an application can run without affecting the underlying operating system.
- 5. The process of bypassing installation limitations on smartphones to download apps from unofficial sources.
- 7. A technology that uses servers to deliver applications, data, and entire operating systems to mobile devices via an app or web browser.
- 9. is a group or class of software to management interface for mobile devices as well as computer devices