Across
- 2. It is Clould Service like TCS uses Google Workspaces
- 5. An ability to shift workloads between cloud venders as needs change.
- 6. Application security testing examines source code.
- 9. An application in TCS for Business Continuity Planning.
- 10. A protocol operate on UDP ports 67 and 68
- 11. DAY It is the day a new vulnerability is known and no patch is available yet.
- 14. A TCS process for releasing application on Internet / Intranet.
- 15. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
- 16. A TCS portal with a framwork for Software security.
- 18. Plan It is a plan devised for an outcome other than usual plan.
- 20. It is achieved by using Hashing.
Down
- 1. A username, passowrd, and app-generated code on a phone.
- 3. You should not just identity, you should also confirm ________________________
- 4. Allows you to login once and access many services and systems.
- 7. A software development methodology is most closely linked to DevSecOps approach.
- 8. An application tool recommended to use in TCS for storing and manage multiple credentials.
- 12. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 13. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
- 17. A TCS application used for managing physical access and logical resources access management.
- 19. Jenkins is the commonly used tool for performing this activity in the application development.
