Across
- 4. Wireless Internet Service Provider
- 7. A proactive protection technology that provides security at the network level.
- 8. The public cloud is defined as a multi-tenant environment, where you buy a “server slice” in a cloud computing environment that is shared with a number of other clients or tenants.
- 11. Technology that provides the inhabitants of a home with advanced automation systems that provide control over the buildings functions.
- 15. Computer software used to prevent, detect and remove malicious software.
- 17. The protection of the access to files and data
- 18. A cloud computing environment which uses a mix of on-premises, private cloud and public cloud services with orchestration between the two platforms.
- 19. The implementation of backups that allow networks to continue operating,even when units fail.
- 21. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 22. Cloud platform that can be customized to ones particular needs.
- 23. Deriving from or relating to a previously unknown vulnerability to attack in some software.
Down
- 1. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing or allow it to pass.
- 2. A list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
- 3. A device that extends an Ethernet network or a USB connection to another room in the office or office using AC wall outlets.
- 5. The specific design of a network that includes the physical components and their functional organization and configuration.
- 6. A network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
- 9. The practice of allowing the employees of an organization to use their own personal computers, smartphones, or other devices for work purposes
- 10. The capability of a network to handle a growing amount of work, or its potential to be enlarged in order to accommodate for growth.
- 12. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than on a local server or a personal computer.
- 13. Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
- 14. The overall performance of a computer network, and how painless the experience is for the user(s)
- 16. The phrase used to describe a could computing platform that is implemented within the corporate firewall, under the control of the IT department.
- 20. A large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data.
