Disruptive Technology

12345678910111213141516
Across
  1. 2. Finds weaknesses and risks in applications or computer systems
  2. 4. Public cloud computing architecture
  3. 5. Uses endpoint monitoring to detect potential cybersecurity breaches
  4. 7. A large, virtual world centred around user interactivity
  5. 8. The act of automating everything that a business can automate
  6. 9. A cybersecurity measure that uses security controls to protect users and devices
  7. 12. Uses quantum mechanics and sciences to solve complex computing problems
  8. 13. A user's experience across one website/application
  9. 14. Combines practices and technologies to mitigate business risks
  10. 15. Covers victims in the event of a cybersecurity breach
  11. 16. Abbreviation is (BI)
Down
  1. 1. Abbreviation is (AI)
  2. 3. A form of authentication that provides users with an extra layer of security
  3. 6. Abbreviation is (XaaS)
  4. 10. Encompasses technologies that focus on immersive realities
  5. 11. Technologies that are developed with the thought of lessening environmental impacts