Hekking_JAS IT 2025_Net_Module 11 Crosswords

12345678910111213141516171819
Across
  1. 3. control of what users may do after accessing network
  2. 4. technology that makes data unusuable and unreadable to all but authorized users
  3. 5. A public certification authority organization
  4. 7. The most widely used method for encrypting data
  5. 11. A white hat's role
  6. 13. unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
  7. 15. EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
  8. 16. Inherence refers to ... traits
  9. 18. A black hat's role
  10. 19. Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
  1. 1. ethical hacker who probes networks or OSs and reports on vulnerabilities
  2. 2. control of access to network
  3. 6. A common security tool used by Linux administrators
  4. 7. Three credential categories for multifactor authentication: knowledge, possession, and ...
  5. 8. Windows domain associated mutual authentication protocol
  6. 9. A built-in firewall included in many Linux distributions
  7. 10. common client-server authentication protocol
  8. 12. A good security option for servers that are not physically secure
  9. 14. A Linux Files tool that offers a trash can for deleting files permanently
  10. 17. Windows Server Update Services