U11 - Mod 17 Key Terms

12345678910111213141516
Across
  1. 3. (8) as a Service allows users to access application software and databases. Cloud providers manage the infrastructure while users store data on the cloud provider’s servers.
  2. 4. (14) as a Service provides virtualized computing resources over the Internet. The provider hosts the hardware, software, servers, and storage components, and the user pays for
  3. 7. (4,2) a hypervisor where an application running on the host machine is used tocreate virtual machines that consist entirely of software and contain no hardware components.
  4. 11. hides original data with random characters or data.
  5. 12. replaces sensitive data with realistic fictional data.
  6. 13. (4,number) a hypervisor where the guest operating system runs directly on a hardware platform, under the control of the host system.
  7. 15. (8) as a Service lets an organization remotely access the development tools and services used to deliver such applications, on a subscription basis.
  8. 16. (acronym) provide a repository of useful code to make application development faster and cheaper.
Down
  1. 1. (7,5) Also called an internal, corporate, or enterprise cloud, a private cloud is hosted on a private platform.This offers an organization more control over its data, but it may be more expensive than other cloud services due to infrastructure, maintenance, and administration costs.
  2. 2. Cloud (6,5) combines the private and public cloud by offering control of organizational data, which is still hosted in a public cloud.
  3. 5. is the science of making and breaking secret codes.
  4. 6. (9,5) can measure the consistency of data in a file, picture, or record to ensure that it
  5. 8. (6,5) is hosted by a service provider at an offsite facility. Users pay a monthly or yearly usage fee to access the cloud. This option costs the organization less for infrastructure, maintenance, and administration — however, the organization has less control over its data.
  6. 9. threat (7,6) This occurs when an employee, contractor, or business partner maliciously or unintentionally compromise the cloud service.
  7. 10. is the process of scrambling data so that unauthorized people cannot easily read it.
  8. 14. not been corrupted.