Across
- 1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- 2. Paid to probe networks and report vulnerabilities
- 4. is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
- 6. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- 7. is a server role that makes it possible for administrators to take control of Microsoft product updates
- 9. a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- 11. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- 15. what the user has (smart card or key)
- 17. Do not report problems, but instead disseminate the information to other
- 18. what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
- 19. Creates a barrier between two entities
Down
- 1. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- 3. a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- 5. features that enable administrators to control who has access to the network authentication
- 8. The most widely used method for encrypting data is IP Security
- 10. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- 12. What users can do after they are logged on to the network
- 13. An industry-standard client/server protocol that offers centralized control
- 14. what the user knows (username/password)
- 16. A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached
