Across
- 1. This clean policy is to minimize the risk of sensitive document exposure.
- 4. This frequent expiration is a security practice discouraged due to preditable patterns
- 5. Secretly monitors your online activity, browsing history, emails, and even keystrokes.
- 7. Program that might be intrusive or collect data without consent
- 8. Method of detecting viruses by examining suspicious code properties
- 13. This type of rights fpr system permissions are granted to user accounts
- 15. File used to identify a computer virus
- 16. mode means your activity data isn't saved on your device, or to a Google Account you're not signed into.
- 17. Windows feature prompting for confirmation before admin actions
- 18. backup key that allows you to decrypt the drive if you lose your startup key or if the TPM malfunctions.
Down
- 2. User-based encryption control technique for files
- 3. online threat that hides on a computer or mobile device and uses the machine's resources
- 6. A Control method used to manage and oversee how programs are run on a computer system.
- 9. Think of these as master keys that grant complete access to your system, even bypassing security measures. They burrow deep into the operating system, hiding themselves and other malware from detection.
- 10. This is a cryptograhic protocol that forms the backbone of secure connections on the web.
- 11. A signing that is used for digital verification of software authenticity
- 12. Browser Extensions are basically small scripts written in languages like JavaScript and leverage the browser's built-in ______ to extend its capabilities.
- 14. is considered a data-at-rest encryption technology.
