Across
- 3. The process of verifying the identity of a system user
- 4. The assurance that data remains accurate complete and unchanged unless properly modified
- 6. The overall perception and satisfaction users have when interacting with a system
- 9. A general term for software designed to damage disrupt or gain unauthorized access to systems
- 13. A security goal ensuring information is accessible only to authorized users
- 17. The phase where navigation structure interaction flow and media usage are planned
- 18. A condition where information is isolated within departments preventing enterprise wide analysis
- 22. A measure affected when information is inaccurate outdated irrelevant or incomplete
- 23. A security principle preventing users from denying actions they performed
- 24. A security goal ensuring systems and data are accessible when required
- 27. Injury caused by prolonged repetitive computer related movements
- 28. The discipline concerned with designing systems that reduce physical strain and injury
- 33. An event where hardware software or procedures prevent an information system from operating correctly
- 38. The database design process used to reduce redundancy and improve data integrity
- 39. A set of rules governing data communication between network devices
- 40. A data condition ensuring that the same data value appears identically across all systems
Down
- 1. Malware that encrypts data and demands payment for its release
- 2. The activity most directly supported when managers interpret processed information rather than raw data
- 5. Legal rights protecting software data and digital creations
- 7. Attacks that exploit human behavior rather than technical vulnerabilities
- 8. The technique that allows multiple operating systems to run on a single physical machine
- 10. Unnecessary duplication of data that increases storage cost and inconsistency risk
- 11. A legal agreement defining how software can be used modified or distributed
- 12. The maximum amount of data that can be transmitted over a network in a given time
- 14. The part of a system that enables interaction between users and technology
- 15. A chronological record that tracks who accessed or modified data and when
- 16. Moral principles guiding acceptable behavior in digital environments
- 19. The ability of a system to handle increased workload without performance degradation
- 20. A cloud service that allows developers to build and deploy applications without managing infrastructure
- 21. A cloud service providing virtualized hardware resources over the internet
- 22. Organizational change driven by adopting digital technologies rather than simply automating tasks
- 25. The delay experienced in data transmission across a network
- 26. A way cloud computing is categorized such as infrastructure platform or software delivery
- 29. A cloud service characteristic where users access resources only when needed
- 30. A cloud service that delivers complete applications through a web browser
- 31. An organized combination of people technology and processes used to transform data into information for organizational decision making
- 32. The process of determining what actions an authenticated user is allowed to perform
- 34. A cloud feature that automatically adjusts computing resources based on demand
- 35. The ability of different systems or modules to work together seamlessly within an organization
- 36. A concept describing how information systems add value by improving efficiency coordination and competitiveness
- 37. A cloud pricing model where organizations are charged based on actual consumption
