Across
- 3. A method that uses hard drive space when your computer runs out of RAM
- 4. A shared secret key used to securely connect devices on a network
- 8. Rules set to track and record activities on a system to ensure security and compliance
- 10. Converting data into a secure format to prevent unauthorized access
- 14. A Linux tool that manages network traffic rules and firewall settings
- 15. Rules that explain how a company collects, uses, and protects your personal information
- 16. A framework of protocols used to secure data exchanged over an IP network by providing encryption, authentication, and data integrity
- 18. Verifying identity using credentials
- 19. An ethical hacker improving security
- 21. The process of granting permission to access resources or perform actions
Down
- 1. Unique mark left behind, often used to identify a person
- 2. A security system that monitors and controls network traffic to block unauthorized access.
- 5. Steps taken to keep your personal information safe from being stolen or lost
- 6. A tool in Windows that secures data on a server by encrypting it
- 7. A barrier on the OS that blocks harmful data from entering or leaving the computer
- 9. A small unit of data that is monitored and filtered by the firewall to control network access
- 11. Rules that define how passwords should be created, used, and updated for security
- 12. Crating a copy of data for recovery
- 13. A hacker with malicious intent
- 17. Firewall rules that control data allowed into the server or device
- 20. Malicious software designed to harm or exploit systems
