Module 11
Across
- 6. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- 8. s a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- 9. is the most widely used method for encrypting data
- 12. backs up any files that have changed since the last full or incremental backup
- 15. creates a barrier between two entities
- 16. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 17. a framework for other protocols that provide encryption and authentication
- 19. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- 20. backs up the disk sector by sector to create an exact image of the disk’s contents
Down
- 1. all of the disk’s contents are backed up as individual folders and files
- 2. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 3. only backs up files that have changed since the last full backup
- 4. is used to encrypt files and folders
- 5. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
- 7. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
- 10. document that describes the rules of an organization
- 11. used in a Windows domain environment and provides mutual authentication
- 13. requires a user to supply two or more types of authentication
- 14. an industry-standard client/server protocol that offers centralized control
- 18. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen