CYBER SECURITY // WENDY

12345678910111213141516171819
Across
  1. 1. fingerprint, retina scan, or voice pattern
  2. 7. testers who are paid to probe networks
  3. 8. barrier between a computer OS and the network
  4. 11. common tool used by many Linux administrators
  5. 12. barrier between two entities
  6. 14. series of letters, numbers, and special characters
  7. 15. what users can do after they are logged on
  8. 16. rules
  9. 17. supply two or more types of authentication (abr.)
  10. 19. create an exact image
Down
  1. 2. barrier between networks
  2. 3. username/password
  3. 4. security enhancement for servers
  4. 5. control who has access to the network
  5. 6. specially allocated disk area that holds information
  6. 9. users identify themselves to gain access to network
  7. 10. changes since last full back up
  8. 13. attackers who do not report problems, but instead disseminate
  9. 14. smart card or key
  10. 18. framework/other protocol provide encryption(abr.)