Across
- 3. Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- 4. cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- 7. digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- 10. security enhancement that requires users to provide more than one form of identification to access an account or system
- 11. a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- 13. the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- 14. comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- 1. distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- 2. refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- 5. the process of identifying and assessing potential security weaknesses in systems, software, and networks
- 6. cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- 8. business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- 9. the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- 12. leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
