Linux Security
Across
- 5. A distro of linux published by Canonical
- 7. Secure remote access service running on port 22 by default
- 8. A Linux utility designed to automate the rotation, compression, removal, and mailing of log files
- 9. The recording of a person's actions on a system (What did you do?)
- 13. Configuration file that defines sudo privileges for users
- 14. A linux file in etc that stores information about user's passwords
- 15. Displays active network connections and listening ports
- 17. Permission bit that runs a file with the group's privileges
- 19. Modifies user password expiration information
- 20. Network scanner used to discover hosts and open ports
- 21. Scheduler used to run commands or scripts at set intervals
Down
- 1. A plain text file that defines the groups on the system and their members
- 2. The verification of a person's permissions (What can you do?)
- 3. A command used to run another command as the root user
- 4. A default linux user with the ID of 0
- 6. Command used to change file or directory ownership
- 9. The verification of a person's identity (Who are you?)
- 10. Cybersecurity strategy operating on the principle "never trust, always verify"
- 11. A linux file in etc that stores information about users on the system
- 12. Permission bit that runs a file with the owner's privileges
- 16. A software suite and init system used on most modern Linux distros
- 18. Command used to change file or directory permissions