Disruptive Technology

1234567891011121314
Across
  1. 3. Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
  2. 4. cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
  3. 7. digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
  4. 10. security enhancement that requires users to provide more than one form of identification to access an account or system
  5. 11. a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
  6. 13. the development and use of technologies that minimize environmental impact while promoting social and economic benefits
  7. 14. comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
  1. 1. distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
  2. 2. refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
  3. 5. the process of identifying and assessing potential security weaknesses in systems, software, and networks
  4. 6. cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
  5. 8. business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
  6. 9. the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
  7. 12. leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.