Security Policy

1234567891011121314151617181920
Across
  1. 2. creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
  2. 6. used to encrypt files and folders in windows OSs.
  3. 9. requires a user to supply two or more types of authentication.
  4. 11. a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
  5. 13. a framework for other protocols that provide encryption and authentication.
  6. 14. is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
  7. 15. is a common tool used by many Linux administrators.
  8. 16. prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
  9. 17. is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
  10. 18. An important part for maintaining a system.
  11. 19. backs up the disk sector by sector to create an exact image of the disk's contents.
  12. 20. used in a windows domain environment and provides mutual authentication.
Down
  1. 1. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
  2. 3. a server role that makes it possible for administrators to take control of Microsoft product updates.
  3. 4. the built-in firewall in most linux distributions.
  4. 5. a Linux files tool that offers a trash can for deleting files permanently.
  5. 7. backs up any files that changed since the last full or incremental backup.
  6. 8. creates a barrier between two entities.
  7. 10. only backs up files that have changed since the last full backup.
  8. 12. the most widely method for encrypting data.