ISACA BC

12345678910
Across
  1. 2. Toughest privacy and security law in the world
  2. 4. integrates all of the cloud security capabilities into a single cloud-native solution
  3. 5. a computer malware program that was originally developed in the form of a banking Trojan
  4. 8. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
  5. 10. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse
Down
  1. 1. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
  2. 3. way to create a secure software
  3. 6. method that requires the user to provide two or more verification factors to gain access to a resource
  4. 7. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
  5. 9. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)