Module 11: Securing and Maintaining an Operating system

12345678910111213141516171819
Across
  1. 1. Industry standard client/server protocol that offers centralized control
  2. 4. security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  3. 7. If there’s physical access to the computer, there’s no
  4. 10. Windows update management system
  5. 11. specially allocated disk area that holds information that is swapped back and forth from RAM to disk
  6. 13. Early version of mutual authentication protocol
  7. 14. New version of mutual authentication protocol
  8. 16. Enables administrators to control who has access to the network
  9. 18. Document that describes rules governing access to organization information
  10. 19. Built in firewall in most Linux distributions
Down
  1. 2. What users can do after they are logged on to the network
  2. 3. Used in windows, provides mutual authentication
  3. 5. Securing data on an OS involves authentication, authorization, encryption, and _____
  4. 6. Backup that backs up any files that have changed since the last full or incremental backup
  5. 8. Tool used to delete uneeded files on Windows
  6. 9. Linux command to see current firewall configuration
  7. 12. An Important part of maintaining a system is to make regular ____
  8. 13. Authentication that requires user to supply two or more types of authentication
  9. 15. A firewall creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  10. 17. Creates a barrier between two entities