Security Policy
Across
- 2. creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
- 6. used to encrypt files and folders in windows OSs.
- 9. requires a user to supply two or more types of authentication.
- 11. a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
- 13. a framework for other protocols that provide encryption and authentication.
- 14. is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
- 15. is a common tool used by many Linux administrators.
- 16. prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
- 17. is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
- 18. An important part for maintaining a system.
- 19. backs up the disk sector by sector to create an exact image of the disk's contents.
- 20. used in a windows domain environment and provides mutual authentication.
Down
- 1. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
- 3. a server role that makes it possible for administrators to take control of Microsoft product updates.
- 4. the built-in firewall in most linux distributions.
- 5. a Linux files tool that offers a trash can for deleting files permanently.
- 7. backs up any files that changed since the last full or incremental backup.
- 8. creates a barrier between two entities.
- 10. only backs up files that have changed since the last full backup.
- 12. the most widely method for encrypting data.