SN33003FP Chapter 7

12345678910111213141516171819202122232425262728
Across
  1. 2. Secure privileged accounts, configure password policies and lockout policies and enable logs to record all events
  2. 5. Protects data by transforming it using a complicated algorithm to make it unreadable
  3. 7. Include measurements of the face, fingerprint, hand geometry, iris, retina, signature, and voice
  4. 9. Hardware/software that enforces network security policies by filtering unauthorized or potentially dangerous traffic
  5. 10. Uses Message Integrity Check (MIC) to detect if an attacker had altered the data and Temporal Key Integrity Protocol (TKIP) to better handle, protect and change encryption keys
  6. 14. Any wireless device can connect to the wireless network and is used where security is of no concern
  7. 15. Equipment uses networks (e.g. internet) to make / receive phone calls
  8. 19. Consists of permissions that limit folder or file access for an individual or for a group of users
  9. 20. Users should be limited to only the resources they need
  10. 22. Fends off problems posed by rogue access points and requires two-way authentication
  11. 23. Freezes hard drive partitions, reverting a system to its preset state upon restart
  12. 24. Allows an individual to gain access to an area with automated entry points using various technologies
  13. 25. Uses Advanced Encryption Standard (AES) for even better key management and encryption protection
  14. 26. Control access to an organization's sensitive areas
  15. 28. Manufacturers combine patches and upgrades into a service pack to mitigate attacks
Down
  1. 1. Automatically logs the user out and locks the screen after a specified period
  2. 3. Private network that connects remote sites or users together over a public network, like the Internet
  3. 4. Copies the contents of a computer's hard disk to an image file
  4. 6. Video and electronic surveillance supplement or in some cases, replace security guards
  5. 8. Enhances default security, removes unnecessary programs, applies patches, systematically updates, and identifies vulnerabilities
  6. 11. Power protection controls, HVAC systems, and hardware monitoring systems
  7. 12. One of the first widely used Wi-Fi security standards that suffered from numerous security weaknesses
  8. 13. Uses satellites and computers to determine the location of a device
  9. 16. A dedicated site that monitors, assesses, and defends the organization's information systems
  10. 17. One or more locations containing the tools that provide administrators with a detailed status of the organization's network
  11. 18. Antivirus protection, adware protection, phishing protection, spyware protection
  12. 21. A program that allows or denies traffic between the computer and other connected computers
  13. 27. Provides mechanisms to authenticate and encrypt data between a wireless client and wireless router