Test

1234567891011121314
Across
  1. 4. software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
  2. 6. represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
  3. 10. a secure protocol developed for sending information securely over the Internet
  4. 11. Refers to a company security policy that allows for employees’ personal devices to be used in business.
  5. 12. A computer program used to prevent, detect, and remove malware
  6. 13. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  7. 14. the psychological manipulation of people into performing actions or divulging confidential information
Down
  1. 1. type of authentication method where the proof of a user’s identity is gained by different independent sources
  2. 2. attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
  3. 3. the practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
  4. 5. Actions a company takes to manage the aftermath of a security breach or cyberattack
  5. 7. A formal and approved list of users who have defined access rights to an asset
  6. 8. surveillance software that can record every keystroke made on a computer’s keyboard
  7. 9. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data