Securing Computer

12345678910
Across
  1. 1. What type of malware self-replicates?
  2. 5. What requires a Windows-created password to gain access to it?
  3. 6. What document can aid you if a chemical spill occurs?
  4. 7. You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. Your boss is asking to begin a chain of _______.
  5. 10. What is the science of recognizing humans based on physical characteristics?
Down
  1. 2. What type of malware is designed to gain administrative-level control of a system?
  2. 3. What is type of regulated data is specifically protected under the HIPAA Privacy Rule?
  3. 4. Non-_________ is not one of the steps of the incident response process.
  4. 8. You have been tasked with preventing the unwanted removal of a webcam. You should implement a ____ lock.
  5. 9. _____-force describes an attempt to guess a password by using a combination of letters and numbers.