Across
- 2. CPRA, DPDPA, GDPR all these regulations ensure.
- 6. Attack where malicious user can use the cloud to mine cryptocurrency.
- 7. A cyberattack that floods a network to make it unavailable.
- 8. A service that continuously evaluates the security of cloud services and recommends improvements.
- 10. The process of restoring data and systems after an attack or failure.
- 11. The process of verifying the identity of a user or system.
- 12. A framework for managing organizational risks.
- 14. Risk management approach that accepts certain risks rather than taking actions.
Down
- 1. A system used to monitor and control network traffic.
- 3. The process of ensuring access control in the cloud enviorment using tokens or certificates.
- 4. An attack where malicious actors exploit poorly configured cloud storage.
- 5. A software tool designed to detect and safeguard from malicious software.
- 9. Red team and Blue team are integral part of.
- 13. The ability to recover data after loss or damage, typically in a cloud environment.
- 15. Objective of GDPR is to safeguard.
