Ch 13

12345678910111213141516171819202122232425
Across
  1. 2. a type of encryption that requires the use of two keys, one for encryption and the other for decryption
  2. 4. a powerful magnet that must be held over hard drive platters to destroy the data contained on the drive
  3. 7. a format method that creates the boot sector and file allocation table on a drive
  4. 12. an access model that enables access through all ports, except those explicitly denied
  5. 15. also called message digest, a fixed length value generated by applying a mathematical function to an arbitrary length text
  6. 17. a malware that encrypts files on the target and then demands that a fee be paid in order to decrypt the files
  7. 19. malware that is packaged with legitimate software and is activated when a user installs the legitimate application
  8. 22. the name of the wireless network
  9. 23. a type of encryption that uses the same key to encrypt and decrypt the data
  10. 24. a format method that creates the tracks on a hard disk and is usually performed at the factory
  11. 25. a Windows feature that encrypts a removable drive
Down
  1. 1. a Windows feature that encrypts data and is directly linked to a specific user account
  2. 3. software tools used to perform a secure erase and that is designed to overwrite existing data multiple times, rendering the data unreadable
  3. 5. an access model that allow access to configured ports, and for which access to any ports not explicitly permitted is denied
  4. 6. malware that requires human action to spread and infect other hosts
  5. 8. a specialized chip installed on the motherboard and whose function is required when using BitLocker
  6. 9. malware that exploits network applications to consume bandwidth, crash the device, or install other malware
  7. 10. a dedicated device or a software service that protects computers and networks by preventing undesirable traffic from entering internal networks
  8. 11. a term to describe malicious software
  9. 13. malware that uses keyloggers to monitor user activity and sends information to cybercriminals
  10. 14. malware that displays unsolicited advertising using pop-up web browser windows, new toolbars, or redirects to a different website
  11. 16. a Windows feature that encrypts an entire hard drive
  12. 17. malware that is used by cybercriminals to gain administrator-account level access to a computer and control it remotely
  13. 18. a subnetwork in an organization that provides services to untrusted networks such as a website open to the internet
  14. 20. a small room with two doors, one of which must be closed before the other can be opened
  15. 21. a set of security objectives that ensure the security of a network, the data, and the computer systems in an organization