Across
- 2. Practice used to identify defects
- 4. String of characters used to confirm a user's identity
- 5. Malicious activities that exploit human interactions
- 6. Role in charge of the maintenance and troubleshooting of an application environment after its go-live
- 7. Cloud platform provided by Microsoft
- 10. Function of specifying access privileges to a resource
- 12. Data property that ensures the data accuracy and consistency ofer its lifecycle
- 13. Authentication protocol that allows users to be authenticated by co-operating sites
Down
- 1. Architectureal approach that divides a network into multiple subnets
- 3. Electronic document with identification data to prove one's identity before third parties
- 8. Process of encoding information
- 9. Process that covers many activities with the focus of reducing IT vulnerabilities
- 11. Project management methodology that involves breaking the project into phases and emphasizes continuous improvement