Information Security

1234567891011121314151617181920
Across
  1. 1. A TCS process for releasing application on Internet / Intranet.
  2. 4. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  3. 5. Jenkins is the commonly used tool for performing this activity in the application development.
  4. 6. A TCS portal with a framwork for Software security.
  5. 9. A username, passowrd, and app-generated code on a phone.
  6. 11. A protocol operate on UDP ports 67 and 68
  7. 13. An application in TCS for Business Continuity Planning.
  8. 14. Application security testing examines source code.
  9. 16. It is Clould Service like TCS uses Google Workspaces
  10. 17. Plan It is a plan devised for an outcome other than usual plan.
  11. 19. It is achieved by using Hashing.
  12. 20. Allows you to login once and access many services and systems.
Down
  1. 2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  2. 3. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
  3. 7. An application tool recommended to use in TCS for storing and manage multiple credentials.
  4. 8. A TCS application used for managing physical access and logical resources access management.
  5. 10. You should not just identity, you should also confirm ________________________
  6. 12. An ability to shift workloads between cloud venders as needs change.
  7. 15. A software development methodology is most closely linked to DevSecOps approach.
  8. 18. DAY It is the day a new vulnerability is known and no patch is available yet.