Across
- 2. An exact replica of a hard drive
- 3. A tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications.
- 7. Fixes a vulnerability in the OS code to stop exploits
- 9. A Fix for a bug that is affecting OS functionality
- 10. A security flaw, glitch, or weakness found in software code that could be exploited by an attacker.
- 11. A specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access.
- 13. A backup that includes the operating system and configuration settings
Down
- 1. To minimize the risk or lessen the force or intensity of something unpleasant.
- 2. Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
- 4. Third-party programs installed by users to provide additional functions.
- 5. Is a structured process through which we identify potential security threats and vulnerabilities
- 6. A Patch for a very specific issue ‐not released through automatic updates.
- 8. A database of known vulnerabilities in all types of digital products.
- 12. Having several copies
