computer clues

123456789101112131415161718
Across
  1. 3. is a document that describes the rules governing access to an organization’s
  2. 5. Password Authentication Protocol
  3. 7. The most widely used method for encrypting data is IP Security
  4. 10. backs up any files that have changed since the last full or incremental backup
  5. 12. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  6. 13. A common tool used by many Linux administrators
  7. 14. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  8. 15. creates a barrier between two entities
  9. 16. what the user knows (username/password)
  10. 18. what the user has (smart card or key)
Down
  1. 1. used in a Windows domain environment and provides mutual authentication
  2. 2. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  3. 4. backs up the disk sector by sector to create an exact image of the disk’s contents
  4. 6. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  5. 8. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  6. 9. requires a user to supply two or more types of authentication
  7. 10. what the user is; a unique biometric identifying trait(fingerprint,retina scan, or voice pattern)
  8. 11. a framework for other protocols that provide encryption and authentication
  9. 12. involve a certification authority (CA)
  10. 17. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets