Computer Security & Management

123456789101112131415161718192021222324
Across
  1. 4. System that dynamically manages device files
  2. 5. Technique that maps private IPs to a public IP
  3. 8. Bootloader that loads the Linux kernel
  4. 10. Signal that cannot be caught or ignored
  5. 11. Remote source of software packages
  6. 13. File that defines which users can run commands as root
  7. 16. Central system logging service
  8. 19. Filesystem technique that logs changes before writing to disk to prevent corruption
  9. 21. Data structure that stores file metadata
  10. 24. Technique of hiding data within another file
Down
  1. 1. Software that interfaces between OS and hardware
  2. 2. Directory permission restricting file deletion to owner
  3. 3. Process that has finished but remains in process table
  4. 5. Value that determines process scheduling priority
  5. 6. Structure that organizes and stores files on disk
  6. 7. Device type that reads/writes data in chunks
  7. 9. Command used to detach a filesystem
  8. 10. Encryption using a shared key
  9. 12. Init system with PID 1 that manages services
  10. 14. File storing encrypted user passwords
  11. 15. Tool used to install local .deb packages
  12. 17. System call that creates a new process
  13. 18. US law expanding surveillance and intelligence powers
  14. 20. Core of the OS that manages hardware and processes
  15. 22. Background process running without user interaction
  16. 23. Command used to change file ownership