Across
- 4. an extra layer of protection used to ensure the security of online accounts beyond just a username and password.
- 7. adaptive data preparation platform built to turn raw data into ready data for analytics.
- 9. Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- 10. ability of a cloud to automatically expand or compress the infrastructural resources on a sudden-up and down in the requirement so that the workload can be managed efficiently.
- 11. The process of confirming the correctness of the claimed identity.
- 12. the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage.
Down
- 1. The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period.
- 2. network of 3D virtual worlds focused on social connection.
- 3. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- 5. data integration tool based on ETL architecture.
- 6. most prominent and used tool in big data industry with its enormous capability of large-scale processing data.
- 8. A collection of information that is organized so that it can easily be accessed, managed and updated.
