Across
- 5. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
- 9. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
- 10. IBM worked with __________ to create a scalable CRM platform, called Customer 360, which gives every part of IBM a holistic view into the client journey and cuts time to issue resolution by 26%
- 12. “Never trust, always verify” is the first defining principle of which model
- 15. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
- 16. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers
- 18. This aerospace manufacturer announced that open source, hybrid cloud, and AI technologies from IBM and Red Hat are part of its second mission
- 21. One-way street to persisting top secrets
Down
- 1. Decoy computers or systems that lure hackers and cybercriminals into attacking them
- 2. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships
- 3. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
- 4. ensure the sensitive data is accessed only by an authorized user
- 6. A Person who uses technology to gain unauthorized access to data is called a _____
- 7. Recent IBM security acquisition of an endpoint security company.
- 8. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was _____
- 11. The _____________ ransomware group was involved in the recent hacking of a networking giant by compromising an employee’s personal google account.
- 13. Cross-site scripting standing in front of a mirror
- 14. To avoid ____________, user input should not be put directly into a database
- 17. Vast Strides –I help in identifying Security Vulnerabilities
- 19. A form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
- 20. A protocol used for directory services authentication that was first developed in 1993
- 22. A group of protocols used to encrypt data between two communication points.
