Cybersecurity Fundamentals Chapter 7
Across
- 2. tool used to protect data stored in the forms of files.
- 4. prevent rogue access point, it is also known as two-way authentication.
- 5. transforms data using a complicated algorithm to make it unreadable.
- 7. the stages of an information systems attack.
- 10. consist of permissions that limits folder or file access for an individual or for a group of users.
- 11. one of the most effective ways of protecting against data lost.
- 13. protects computers and mobile devices using reputable software
Down
- 1. patches are codes that manufacturers provide to prevent a newly discovered virus or worm from making successful attack.
- 3. locks physically protecting computer equipment.
- 6. uses radio wave to identify and track objects.
- 8. it freezes the hard disk partition, does not save any changes that the user makes.
- 9. idle timeout and screen lock.
- 12. copies the contents of the computer's hard disk to an image file.