Security
Across
- 1. first line of defense and must remain locked at all times, using conventional key and lock, or a physical bolt.
- 5. to help prevent unsolicited e-mail; can be applied to a network at the mail server or utilizing a cloud-based service.
- 6. small reinforced attachment that facilitates locking the device to a secure object such as a desk.
- 10. following an authorized user through a secure entrance
- 11. small rooms with two doors leading to a secure area.
- 12. used to verify to allow access to areas.
Down
- 2. can be used to allow keyless entry into secure areas.
- 3. used when sensitive data is normally transmitted in an encrypted format to protect the data.
- 4. security methods such as iris scans, hand, and fingerprint scanners.
- 7. used to grant keyless access to secure areas.
- 8. is an attempt to obtain information fraudulently
- 9. used to access secure areas; identify a user and allow access.