Security

123456789101112
Across
  1. 1. first line of defense and must remain locked at all times, using conventional key and lock, or a physical bolt.
  2. 5. to help prevent unsolicited e-mail; can be applied to a network at the mail server or utilizing a cloud-based service.
  3. 6. small reinforced attachment that facilitates locking the device to a secure object such as a desk.
  4. 10. following an authorized user through a secure entrance
  5. 11. small rooms with two doors leading to a secure area.
  6. 12. used to verify to allow access to areas.
Down
  1. 2. can be used to allow keyless entry into secure areas.
  2. 3. used when sensitive data is normally transmitted in an encrypted format to protect the data.
  3. 4. security methods such as iris scans, hand, and fingerprint scanners.
  4. 7. used to grant keyless access to secure areas.
  5. 8. is an attempt to obtain information fraudulently
  6. 9. used to access secure areas; identify a user and allow access.