Across
- 2. -A strategy or framework to ensure the protection of computer systems and data.
- 4. - tool in Windows used to remove unnecessary files.
- 8. -A type of firewall that creates a barrier for a computer OS. Host Firewall
- 9. -secret code to prevent unauthorized access.
- 10. -Mix these letter types for better security.
- 11. -A common type of flaw that requires immediate attention from an update.
- 12. -A device or software designed to block unauthorized access to or from a private network.
- 13. -The location where firewall settings can be found in macOS. Preference
- 16. - type of firewall that acts between networks.
- 17. -A type of backup that creates an exact copy of a disk.
- 18. The operating system that macOS runs on. macOS
- 19. -A method of verifying the identity of a user, device, or system.
- 20. -Hackers who use discovered flaws for malicious purposes.
Down
- 1. - A policy that addresses the rights and expectations of individuals regarding their personal data.
- 3. -A policy that protects data and ensures that only authorized people have access.
- 5. -Testers who check for system vulnerabilities and report them.
- 6. -The primary function of a firewall is to create this.
- 7. -This type of network is more open, often used in public areas.
- 13. -What the user possesses, such as a key or smart card.
- 14. -A form of protection for your computer against harmful software.
- 15. -Symbols like $, &, or # What is call
