Win7Support Chapter 12 Crossword Puzzle
Across
- 2. A user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card.
- 5. The act of manipulating people into performing actions or divulging confidential information.
- 6. The process of converting data into a format that cannot be read by another user. Once a user has encrypted a file, it automatically remains encrypted when the file is stored on disk.
- 8. The protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
- 13. Enables users to encrypt removable USB devices, such as flash drives and external hard disks.
- 14. A program named after the Trojan horse story in The Iliad (Greek mythology).
- 16. The process of converting data from encrypted format back to its original format.
- 17. Action Center A central place to view alerts and take actions that keep Windows running Windows
- 18. A software or hardware device designed to gain administrator level control over a computer system without being detected.
Down
- 1. A self replicating program that replicates itself to other computers over the network without any user intervention.
- 3. A microchip that is built into a computer. It is used to store cryptographic information, such as encryption keys. Information stored on the TPM can be more secure from external software attacks and physical theft.
- 4. A software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your
- 7. A type of malware that is installed on computers and collects personal information or browsing habits often without the user’s knowledge.
- 9. A program that can copy itself and infect a computer without the user’s consent or knowledge.
- 10. Sometimes called malware, is software designed to infiltrate or affect a computer system without the owner’s informed consent. It is usually associated with virus, worms, Trojan horses, spyware, rootkits and dishonest adware.
- 11. Including fixes, patches, service packs and device drivers, and apply them to the Windows system.
- 12. A message warning the recipient of non existent computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone they know.
- 13. Allows you to encrypt entire disks. Therefore, if a drive or laptop is stolen, the data is still encrypted even if they install in to another system in which they are an administrator of that system.
- 15. Any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.