Across
- 3. control of what users may do after accessing network
- 4. technology that makes data unusuable and unreadable to all but authorized users
- 5. A public certification authority organization
- 7. The most widely used method for encrypting data
- 11. A white hat's role
- 13. unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
- 15. EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
- 16. Inherence refers to ... traits
- 18. A black hat's role
- 19. Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
- 1. ethical hacker who probes networks or OSs and reports on vulnerabilities
- 2. control of access to network
- 6. A common security tool used by Linux administrators
- 7. Three credential categories for multifactor authentication: knowledge, possession, and ...
- 8. Windows domain associated mutual authentication protocol
- 9. A built-in firewall included in many Linux distributions
- 10. common client-server authentication protocol
- 12. A good security option for servers that are not physically secure
- 14. A Linux Files tool that offers a trash can for deleting files permanently
- 17. Windows Server Update Services
