Across
- 2. A security process requiring two or more verification methods such as password plus OTP or biometrics.
- 3. Protecting data both when stored and when transmitted across networks using encryption techniques.
- 5. A framework used to manage digital identities, user roles, and access permissions in cloud environments.
- 8. A simulated cyberattack conducted by security experts to identify system vulnerabilities.
- 11. Internet-based computing that provides storage, applications, or services online instead of locally.
- 14. security technique where sensitive data is replaced with random symbols or tokens.
- 16. A record that tracks user actions, login attempts, and system activities for security monitoring.
- 18. A stored copy of important data created so it can be restored if the original data is lost or corrupted.
- 19. A virtual firewall in cloud platforms that controls inbound and outbound traffic to cloud resources.
- 20. A redundancy strategy where data is duplicated across different geographic locations for safety
Down
- 1. A security principle that grants users only the minimum access necessary to perform their tasks.
- 4. A technique used to make program code or data intentionally difficult to understand.
- 6. A strategy designed to restore IT infrastructure and services after disasters like cyberattacks or system failure.
- 7. An authentication system allowing users to log in once and access multiple related applications.
- 9. A method of assigning system permissions based on user roles such as admin, editor, or viewer.
- 10. A scheduled process that automatically copies data without manual user intervention.
- 12. A secure internet connection that encrypts data to protect privacy, especially when accessing cloud services remotely.
- 13. A network security system that monitors and filters incoming and outgoing traffic based on security rules.
- 15. A security method that restricts system or data access only to authorized users.
- 17. The process of converting readable data into coded form to prevent unauthorized access.
