Across
- 4. software that creates, runs and manages virtual machines (VMs)
- 6. module(TPM) an embedded hardware chip on a motherboard that stores cryptographic keys used for encryption hardware
- 8. environment an environment used to test and application and discover any bugs or errors
- 10. automation the Internet connection in home appliances, such as refrigerators and coffee makers
- 13. a wireless network used to provide guests with Internet access
- 14. a protocol that translates public IP addresses to private IP addresses and private addresses back to public IP addresses
- 18. the use of different security control types, such as technical controls (firewalls, IDSs and proxy servers); administrative controls (vulnerability assessments and penetration tests); and physical controls (security cameras and locked rooms)
- 19. an OS that manages a network device; some Cisco devices use the Cisco IOS (Internetwork OS)
- 24. is the hardware-based and software-based encryption of an entire disk
- 25. the exposure of data by an error, such as an integer overflow or buffer overflow
- 26. a combination of all the elements required to produce a product
- 27. the use of implementing security controls from different vendors to increase security
- 30. environment an environment that simulates the production environment and is used for late stage testing
- 33. a group of SQL statements that execute as one SQL statement, like a mini-program
- 34. isolation that ensures that a system isn't connected to any other system to reduce risk of being attacked
Down
- 1. the analysis of code without executing it
- 2. a structure of basic concepts that is used to provide guidance to professionals on how to implement security in various systems
- 3. theorganization of tables and columns in a database to reduce redundant data and improve overall database performance
- 5. (SDN)a network that is comprised of virtualization technologies instead of hardware routers and switches
- 7. a framework that is based on relevant laws and regulations, such as HIPAA
- 9. is the software-based encryption of an entire disk;
- 11. the analysis of code as the code is running
- 12. a framework that is not based on law, but by common standards and practices
- 15. a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
- 16. an internal network, used to communicate and share content
- 17. encryption/self-encrypting drive (FDE/SED)
- 20. a group of honeypots that is within a separate network or zone, but accessible from an organization's primary network
- 21. to provide a digital signature for code
- 22. an OS that manages a server, such as Windows Server 2016 or the Server base environments in Linux
- 23. training of users on common threats and emerging threats to help avoid these types of attacks
- 28. a part of a network that can be accessed by authorized users from outside of the network, such as business partners, customers, vendors, etc.
- 29. an integrated circuit that includes all the functionality of a computing system within the hardware
- 31. to use an isolated area on a system (usually, a virtual machine), often for testing purpose
- 32. network a bridge to a wired network; a network that provides employees access to network resources as if they were connected from a wired dest node at their desk