Across
- 2. A type of malware that encrypts files and demands payment
- 3. A weakness in a system that can be exploited by a threat
- 4. A virtual space where users interact with applications and services over the internet
- 6. A network type that allows remote access to a secure private system
- 9. A type of cloud service that provides a fully managed computing environment
- 10. A security measure that inspects and filters network traffic
- 11. A key concern when deploying applications in a cloud environment
- 12. A form of cyber attack where an attacker tricks users into providing sensitive information
Down
- 1. The process of encoding data to prevent unauthorized access
- 5. A type of cyber attack that floods a network with traffic
- 6. A model of computing where resources are dynamically allocated and managed as needed
- 7. The ability of a system to handle increasing workloads by adding resources
- 8. A security process that verifies a user's identity
- 13. A legal framework that regulates personal data protection
