Seminar 4 Crossword

12345678910111213141516171819
Across
  1. 3. With any computer, you should shut down any _______ you do not need
  2. 4. Also called a DMZ
  3. 7. The third phase of assessing a system's security using the Six P's
  4. 9. The minimum frequency for system probing and auditing is once per _____
  5. 10. The most important factor when looking for a security professional
  6. 13. You should block all ______ ports
  7. 15. Room where servers are kept. It should have a strong door with a strong luck, such as a deadbolt
  8. 17. Command typed at the command line to edit your registry
  9. 18. The most respected security certification
  10. 19. The preferred method for storing backups
Down
  1. 1. It is absolutely essential that any organization have clearly written _______ on computer security
  2. 2. The process of securing a computer system against hackers, malware, and other intruders
  3. 4. Old media should be thoroughly ________ when no longer needed
  4. 5. Any legitimate security professional will not mind giving you ______
  5. 6. All communication takes place via some ______
  6. 8. ________ access to routers, hubs, and switches should be tightly controlled (Last of the Six P's)
  7. 11. The first rule of computer security is to check for ______
  8. 12. It is key to periodically ______ your network for security flaws (One of the Six P's)
  9. 14. Only download from well-known, ______ sites
  10. 16. The most widely used vulnerability scanner available today