Prem Thapa, 12/09/2024

123456789101112131415161718192021
Across
  1. 3. A method that uses hard drive space when your computer runs out of RAM
  2. 4. A shared secret key used to securely connect devices on a network
  3. 8. Rules set to track and record activities on a system to ensure security and compliance
  4. 10. Converting data into a secure format to prevent unauthorized access
  5. 14. A Linux tool that manages network traffic rules and firewall settings
  6. 15. Rules that explain how a company collects, uses, and protects your personal information
  7. 16. A framework of protocols used to secure data exchanged over an IP network by providing encryption, authentication, and data integrity
  8. 18. Verifying identity using credentials
  9. 19. An ethical hacker improving security
  10. 21. The process of granting permission to access resources or perform actions
Down
  1. 1. Unique mark left behind, often used to identify a person
  2. 2. A security system that monitors and controls network traffic to block unauthorized access.
  3. 5. Steps taken to keep your personal information safe from being stolen or lost
  4. 6. A tool in Windows that secures data on a server by encrypting it
  5. 7. A barrier on the OS that blocks harmful data from entering or leaving the computer
  6. 9. A small unit of data that is monitored and filtered by the firewall to control network access
  7. 11. Rules that define how passwords should be created, used, and updated for security
  8. 12. Crating a copy of data for recovery
  9. 13. A hacker with malicious intent
  10. 17. Firewall rules that control data allowed into the server or device
  11. 20. Malicious software designed to harm or exploit systems