Across
- 2. Malicious software that encrypts files, then makes demands to decrypt them.
- 7. Measurable value that indicates how well a process is working.
- 9. Attacks that overload a network, making it unusable.
- 12. A type of threat in which employees gain access to data for the purposes of leaking it.
- 14. A business approach focusing on increasing efficiency by reducing waste.
- 15. A stage during a process that slows down its workflow.
- 17. Malicious software using viruses, spyware and Trojans that harm devices and manipulate data.
- 20. Improving processes to make them more effective.
- 21. A computing paradigm that uses qubits for processing.
- 22. Attacks involving the insertion of malicious code into websites in order to steal data.
- 23. The use of consistent procedures that improve efficiency.
Down
- 1. A software that allows multiple virtual machines to run on a single physical machine.
- 3. Techniques used to reduce defects in processes.
- 4. Using technology to perform tasks without human intervention.
- 5. The capacity to complete tasks with minimal waste of resources.
- 6. A technology that packages software and its dependencies into standardized units.
- 8. A type of processing that allows running multiple processes at the same time to increase efficiency.
- 10. The capacity to handle increasing levels of work.
- 11. The sequence of tasks involved in completing a process.
- 13. Amount of work that's completed during a specific time period.
- 16. The process of running computations closer to data sources to reduce latency.
- 18. The process of creating virtual instances of servers, storage, and networks.
- 19. A system that breaks an application into small, independent services that work together.
