Security
Across
- 4. Is a database of computers, users, and services.
- 6. Ensures the integrity of a message.
- 8. A type of asset for an organization.
- 10. Software developed by cybercriminals to perform malicious acts.
- 11. Type of malware where communications are intercepted.
- 12. This needs to be done to your computer when it's left unattended.
- 13. Using this method is a way to protect data.
- 17. Type of malware where a removable device is left in a public place for someone to use and infect their machine.
- 18. A feature that detects phishing websites.
- 21. In order to use this feature in Windows, TPM must be enabled.
- 22. Typically distributed by downloading online software.
Down
- 1. This needed to be updated in order for its anti-malware software to work.
- 2. A mode that allows users to browse the web anonymously.
- 3. A set of objectives to ensure the security of a network.
- 5. Type of malware where the attacker alters packet contents.
- 7. Is a type of lock in Windows that needs a pre-paired device.
- 9. Pretending to need personal information to confirm someone's identity.
- 14. This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
- 15. Prevents unwanted traffic from going into internal networks.
- 16. The most common type of computer malware.
- 19. Can be found in high-security environments.
- 20. A type of lock that needs a key that is separate from the door handle.