Across
- 2. Finds weaknesses and risks in applications or computer systems
- 4. Public cloud computing architecture
- 5. Uses endpoint monitoring to detect potential cybersecurity breaches
- 7. A large, virtual world centred around user interactivity
- 8. The act of automating everything that a business can automate
- 9. A cybersecurity measure that uses security controls to protect users and devices
- 12. Uses quantum mechanics and sciences to solve complex computing problems
- 13. A user's experience across one website/application
- 14. Combines practices and technologies to mitigate business risks
- 15. Covers victims in the event of a cybersecurity breach
- 16. Abbreviation is (BI)
Down
- 1. Abbreviation is (AI)
- 3. A form of authentication that provides users with an extra layer of security
- 6. Abbreviation is (XaaS)
- 10. Encompasses technologies that focus on immersive realities
- 11. Technologies that are developed with the thought of lessening environmental impacts
