Cyber

12345678910
Across
  1. 3. This term refers to the technology that limits where an app can function by tracking the mobile device's location.
  2. 4. The process of integrating secure development best practices and methodologies into application software development and deployment using the agile model.
  3. 6. A suite of software designed to protect against multiple types of malware.
  4. 8. Software that examines a computer for file-based virus infections and monitors activity like scanning new documents for viruses.
  5. 10. A system that supports the creation, editing, and modification of digital content by multiple employees
Down
  1. 1. A part of the internet where security professionals look for signs that critical information is being sought or sold.
  2. 2. This system is used to manage industrial control systems (ICSs).
  3. 3. The process of identifying the geographical location of a mobile device.
  4. 4. A "container" where an application can run without affecting the underlying operating system.
  5. 5. The process of bypassing installation limitations on smartphones to download apps from unofficial sources.
  6. 7. A technology that uses servers to deliver applications, data, and entire operating systems to mobile devices via an app or web browser.
  7. 9. is a group or class of software to management interface for mobile devices as well as computer devices