Block 5 Unit 2

12345678910
Across
  1. 2. Verifying you are who you say you are.
  2. 6. Responsible for collecting traffic from a particular segment for analysis.
  3. 8. Used to automate processes on a computer.
  4. 9. Process preventing someone from booting up a different OS to gain access.
  5. 10. Legacy authentication service for Unix systems.
Down
  1. 1. Taking measures to prevent security issues in the first place.
  2. 3. Stored on client computers containing user preferences and logon info.
  3. 4. Converts data into an unreadable format.
  4. 5. This NAC does not require software to be installed on a client.
  5. 7. Each sprint contains all the phases of this SDLC model.