IT Security Week 7

123456789101112131415
Across
  1. 2. the process of deploying an application to the target environment
  2. 6. is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  3. 7. a corporate directive that specifies how employees should leave their working space when they leave the office.
  4. 9. the information is too valuable to permit any risk of its capture. Viewing is severely restricted\
  5. 10. the policies of persistent data and records management for meeting legal and business data archival requirements.
  6. 14. there are no restrictions on viewing the document.
Down
  1. 1. the software vendor may suspend all licenses if the customer is found to be non-compliant
  2. 3. unlicensed software exposes an organization to large fines and
  3. 4. looking for treasure in someone else's trash
  4. 5. is a type of Man-in-the-Middle Attack specifically involving a browser infected with some type of proxy malware.
  5. 8. an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
  6. 11. memory allocated to application
  7. 12. the process where fibers are separated and treated to produce pulp.
  8. 13. the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly reduces security risks, eliminating security vulnerabilities and reducing costs.
  9. 15. to indicate a set of instructions that lends itself to a definite or standardized procedure without loss of effectiveness