Across
- 2. the process of deploying an application to the target environment
- 6. is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
- 7. a corporate directive that specifies how employees should leave their working space when they leave the office.
- 9. the information is too valuable to permit any risk of its capture. Viewing is severely restricted\
- 10. the policies of persistent data and records management for meeting legal and business data archival requirements.
- 14. there are no restrictions on viewing the document.
Down
- 1. the software vendor may suspend all licenses if the customer is found to be non-compliant
- 3. unlicensed software exposes an organization to large fines and
- 4. looking for treasure in someone else's trash
- 5. is a type of Man-in-the-Middle Attack specifically involving a browser infected with some type of proxy malware.
- 8. an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
- 11. memory allocated to application
- 12. the process where fibers are separated and treated to produce pulp.
- 13. the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly reduces security risks, eliminating security vulnerabilities and reducing costs.
- 15. to indicate a set of instructions that lends itself to a definite or standardized procedure without loss of effectiveness
