Win7Support Chapter 12 Crossword Puzzle

123456789101112131415161718
Across
  1. 2. A user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card.
  2. 5. The act of manipulating people into performing actions or divulging confidential information.
  3. 6. The process of converting data into a format that cannot be read by another user. Once a user has encrypted a file, it automatically remains encrypted when the file is stored on disk.
  4. 8. The protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
  5. 13. Enables users to encrypt removable USB devices, such as flash drives and external hard disks.
  6. 14. A program named after the Trojan horse story in The Iliad (Greek mythology).
  7. 16. The process of converting data from encrypted format back to its original format.
  8. 17. Action Center A central place to view alerts and take actions that keep Windows running Windows
  9. 18. A software or hardware device designed to gain administrator level control over a computer system without being detected.
Down
  1. 1. A self replicating program that replicates itself to other computers over the network without any user intervention.
  2. 3. A microchip that is built into a computer. It is used to store cryptographic information, such as encryption keys. Information stored on the TPM can be more secure from external software attacks and physical theft.
  3. 4. A software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your
  4. 7. A type of malware that is installed on computers and collects personal information or browsing habits often without the user’s knowledge.
  5. 9. A program that can copy itself and infect a computer without the user’s consent or knowledge.
  6. 10. Sometimes called malware, is software designed to infiltrate or affect a computer system without the owner’s informed consent. It is usually associated with virus, worms, Trojan horses, spyware, rootkits and dishonest adware.
  7. 11. Including fixes, patches, service packs and device drivers, and apply them to the Windows system.
  8. 12. A message warning the recipient of non existent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone they know.
  9. 13. Allows you to encrypt entire disks. Therefore, if a drive or laptop is stolen, the data is still encrypted even if they install in to another system in which they are an administrator of that system.
  10. 15. Any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.