Technology

12345678910111213
Across
  1. 2. Practice used to identify defects
  2. 4. String of characters used to confirm a user's identity
  3. 5. Malicious activities that exploit human interactions
  4. 6. Role in charge of the maintenance and troubleshooting of an application environment after its go-live
  5. 7. Cloud platform provided by Microsoft
  6. 10. Function of specifying access privileges to a resource
  7. 12. Data property that ensures the data accuracy and consistency ofer its lifecycle
  8. 13. Authentication protocol that allows users to be authenticated by co-operating sites
Down
  1. 1. Architectureal approach that divides a network into multiple subnets
  2. 3. Electronic document with identification data to prove one's identity before third parties
  3. 8. Process of encoding information
  4. 9. Process that covers many activities with the focus of reducing IT vulnerabilities
  5. 11. Project management methodology that involves breaking the project into phases and emphasizes continuous improvement