Ch 13
Across
- 2. a type of encryption that requires the use of two keys, one for encryption and the other for decryption
- 4. a powerful magnet that must be held over hard drive platters to destroy the data contained on the drive
- 7. a format method that creates the boot sector and file allocation table on a drive
- 12. an access model that enables access through all ports, except those explicitly denied
- 15. also called message digest, a fixed length value generated by applying a mathematical function to an arbitrary length text
- 17. a malware that encrypts files on the target and then demands that a fee be paid in order to decrypt the files
- 19. malware that is packaged with legitimate software and is activated when a user installs the legitimate application
- 22. the name of the wireless network
- 23. a type of encryption that uses the same key to encrypt and decrypt the data
- 24. a format method that creates the tracks on a hard disk and is usually performed at the factory
- 25. a Windows feature that encrypts a removable drive
Down
- 1. a Windows feature that encrypts data and is directly linked to a specific user account
- 3. software tools used to perform a secure erase and that is designed to overwrite existing data multiple times, rendering the data unreadable
- 5. an access model that allow access to configured ports, and for which access to any ports not explicitly permitted is denied
- 6. malware that requires human action to spread and infect other hosts
- 8. a specialized chip installed on the motherboard and whose function is required when using BitLocker
- 9. malware that exploits network applications to consume bandwidth, crash the device, or install other malware
- 10. a dedicated device or a software service that protects computers and networks by preventing undesirable traffic from entering internal networks
- 11. a term to describe malicious software
- 13. malware that uses keyloggers to monitor user activity and sends information to cybercriminals
- 14. malware that displays unsolicited advertising using pop-up web browser windows, new toolbars, or redirects to a different website
- 16. a Windows feature that encrypts an entire hard drive
- 17. malware that is used by cybercriminals to gain administrator-account level access to a computer and control it remotely
- 18. a subnetwork in an organization that provides services to untrusted networks such as a website open to the internet
- 20. a small room with two doors, one of which must be closed before the other can be opened
- 21. a set of security objectives that ensure the security of a network, the data, and the computer systems in an organization