Securing Computer

1234567891011121314
Across
  1. 3. What is type of regulated data is specifically protected under the HIPAA Privacy Rule?
  2. 6. What document can aid you if a chemical spill occurs?
  3. 8. _____-force describes an attempt to guess a password by using a combination of letters and numbers.
  4. 9. A user clicked a link in an e-mail that appeared to be from his bank. The link led him to a page that requested he change his password to access his bank account. It turns out that the webpage was fraudulent. What is this an example of?
  5. 12. Non-_________ is not one of the steps of the incident response process.
  6. 13. What type of malware self-replicates?
  7. 14. You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. Your boss is asking to begin a chain of _______.
Down
  1. 1. What type of malware is designed to gain administrative-level control of a system?
  2. 2. Disable ______ can prevent applications from automatically executing, and possibly infecting a computer with malware when removable media is inserted.
  3. 4. What requires a Windows-created password to gain access to it?
  4. 5. You have been tasked with preventing the unwanted removal of a webcam. You should implement a ____ lock.
  5. 7. What is the science of recognizing humans based on physical characteristics?
  6. 10. Several hundred infected computers simultaneously attacked your organization's server, rendering it useless to legitimate users. What kind of attack is this an example of?
  7. 11. What is the best mode to use when scanning for viruses?