Surya Thapa

1234567891011121314151617181920
Across
  1. 2. -A strategy or framework to ensure the protection of computer systems and data.
  2. 4. - tool in Windows used to remove unnecessary files.
  3. 8. -A type of firewall that creates a barrier for a computer OS. Host Firewall
  4. 9. -secret code to prevent unauthorized access.
  5. 10. -Mix these letter types for better security.
  6. 11. -A common type of flaw that requires immediate attention from an update.
  7. 12. -A device or software designed to block unauthorized access to or from a private network.
  8. 13. -The location where firewall settings can be found in macOS. Preference
  9. 16. - type of firewall that acts between networks.
  10. 17. -A type of backup that creates an exact copy of a disk.
  11. 18. The operating system that macOS runs on. macOS
  12. 19. -A method of verifying the identity of a user, device, or system.
  13. 20. -Hackers who use discovered flaws for malicious purposes.
Down
  1. 1. - A policy that addresses the rights and expectations of individuals regarding their personal data.
  2. 3. -A policy that protects data and ensures that only authorized people have access.
  3. 5. -Testers who check for system vulnerabilities and report them.
  4. 6. -The primary function of a firewall is to create this.
  5. 7. -This type of network is more open, often used in public areas.
  6. 13. -What the user possesses, such as a key or smart card.
  7. 14. -A form of protection for your computer against harmful software.
  8. 15. -Symbols like $, &, or # What is call