MARVEL Cloud Computing and Cyber Security Domain

123456789101112131415
Across
  1. 2. Hash me D8578edf8458ce06fbc5bb76a58c5ca4
  2. 4. a method, often secret, of bypassing normal authentication in a product
  3. 8. I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
  4. 9. network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  5. 10. The Cloud Platform that CNA Hardy have chosen
  6. 11. a Deployment Model which is a combination of a Private and a Public Cloud
  7. 13. unique name by performing a wide variety of automated tasks on behalf of their master
  8. 14. is the computer's main circuit board.
  9. 15. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. 1. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  2. 3. malicious computer program which is used to hack into a computer by misleading users of its true intent
  3. 5. Encrypt the word alphabet using a Caesar cipher with a shift of 3
  4. 6. what does the P stand for in PaaS
  5. 7. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
  6. 12. A group of networked computers that share a common address (.edu, .com).