Security

12345678910111213141516171819202122
Across
  1. 4. Is a database of computers, users, and services.
  2. 6. Ensures the integrity of a message.
  3. 8. A type of asset for an organization.
  4. 10. Software developed by cybercriminals to perform malicious acts.
  5. 11. Type of malware where communications are intercepted.
  6. 12. This needs to be done to your computer when it's left unattended.
  7. 13. Using this method is a way to protect data.
  8. 17. Type of malware where a removable device is left in a public place for someone to use and infect their machine.
  9. 18. A feature that detects phishing websites.
  10. 21. In order to use this feature in Windows, TPM must be enabled.
  11. 22. Typically distributed by downloading online software.
Down
  1. 1. This needed to be updated in order for its anti-malware software to work.
  2. 2. A mode that allows users to browse the web anonymously.
  3. 3. A set of objectives to ensure the security of a network.
  4. 5. Type of malware where the attacker alters packet contents.
  5. 7. Is a type of lock in Windows that needs a pre-paired device.
  6. 9. Pretending to need personal information to confirm someone's identity.
  7. 14. This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
  8. 15. Prevents unwanted traffic from going into internal networks.
  9. 16. The most common type of computer malware.
  10. 19. Can be found in high-security environments.
  11. 20. A type of lock that needs a key that is separate from the door handle.