Cybersecurity Fundamentals Chapter 7

12345678910111213
Across
  1. 2. tool used to protect data stored in the forms of files.
  2. 4. prevent rogue access point, it is also known as two-way authentication.
  3. 5. transforms data using a complicated algorithm to make it unreadable.
  4. 7. the stages of an information systems attack.
  5. 10. consist of permissions that limits folder or file access for an individual or for a group of users.
  6. 11. one of the most effective ways of protecting against data lost.
  7. 13. protects computers and mobile devices using reputable software
Down
  1. 1. patches are codes that manufacturers provide to prevent a newly discovered virus or worm from making successful attack.
  2. 3. locks physically protecting computer equipment.
  3. 6. uses radio wave to identify and track objects.
  4. 8. it freezes the hard disk partition, does not save any changes that the user makes.
  5. 9. idle timeout and screen lock.
  6. 12. copies the contents of the computer's hard disk to an image file.