Information Security

1234567891011121314151617181920
Across
  1. 2. It is Clould Service like TCS uses Google Workspaces
  2. 5. An ability to shift workloads between cloud venders as needs change.
  3. 6. Application security testing examines source code.
  4. 9. An application in TCS for Business Continuity Planning.
  5. 10. A protocol operate on UDP ports 67 and 68
  6. 11. DAY It is the day a new vulnerability is known and no patch is available yet.
  7. 14. A TCS process for releasing application on Internet / Intranet.
  8. 15. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  9. 16. A TCS portal with a framwork for Software security.
  10. 18. Plan It is a plan devised for an outcome other than usual plan.
  11. 20. It is achieved by using Hashing.
Down
  1. 1. A username, passowrd, and app-generated code on a phone.
  2. 3. You should not just identity, you should also confirm ________________________
  3. 4. Allows you to login once and access many services and systems.
  4. 7. A software development methodology is most closely linked to DevSecOps approach.
  5. 8. An application tool recommended to use in TCS for storing and manage multiple credentials.
  6. 12. A type of malicious software designed to block access to a computer system until a sum of money is paid
  7. 13. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
  8. 17. A TCS application used for managing physical access and logical resources access management.
  9. 19. Jenkins is the commonly used tool for performing this activity in the application development.