Across
- 4. server used to authenticate based on user profile database
- 8. layer of the OSI model IPsec operates in
- 10. programmers develop these to fix any problems after a release
- 11. requires private key and public key pairs
- 12. relies on tickets to grant access to resources
- 13. encapsulating one protocol within another
- 15. computer controlled by third party
- 18. virus that affects both the boot sector & files
- 20. a network where only authorized users have access to the data
- 21. attacker simply drives around scanning for networks
- 23. standard allows you to create a private network on intranet
Down
- 1. actively replicates itself without intervention
- 2. uses two databases and TCP to authenticate users
- 3. VPN protocol created by Microsoft
- 5. acronym for Data Encryption Standard & type of public key encrypt
- 6. hacker can use to intercept traffic on your network
- 7. attack that prevents users from accessing the system
- 9. authentication, authorization and ______
- 10. defines the appropriate response to a security event
- 11. people try to call or email for personal information
- 14. process that encodes and decodes data
- 16. type of antivirus scan even with no definition for it
- 17. outdated and compromised security mechanism
- 19. minimum length of passwords
- 21. how often you should update antivirus software
- 22. wireless access point installed without your knowledge
