Across
- 2. Secure privileged accounts, configure password policies and lockout policies and enable logs to record all events
- 5. Protects data by transforming it using a complicated algorithm to make it unreadable
- 7. Include measurements of the face, fingerprint, hand geometry, iris, retina, signature, and voice
- 9. Hardware/software that enforces network security policies by filtering unauthorized or potentially dangerous traffic
- 10. Uses Message Integrity Check (MIC) to detect if an attacker had altered the data and Temporal Key Integrity Protocol (TKIP) to better handle, protect and change encryption keys
- 14. Any wireless device can connect to the wireless network and is used where security is of no concern
- 15. Equipment uses networks (e.g. internet) to make / receive phone calls
- 19. Consists of permissions that limit folder or file access for an individual or for a group of users
- 20. Users should be limited to only the resources they need
- 22. Fends off problems posed by rogue access points and requires two-way authentication
- 23. Freezes hard drive partitions, reverting a system to its preset state upon restart
- 24. Allows an individual to gain access to an area with automated entry points using various technologies
- 25. Uses Advanced Encryption Standard (AES) for even better key management and encryption protection
- 26. Control access to an organization's sensitive areas
- 28. Manufacturers combine patches and upgrades into a service pack to mitigate attacks
Down
- 1. Automatically logs the user out and locks the screen after a specified period
- 3. Private network that connects remote sites or users together over a public network, like the Internet
- 4. Copies the contents of a computer's hard disk to an image file
- 6. Video and electronic surveillance supplement or in some cases, replace security guards
- 8. Enhances default security, removes unnecessary programs, applies patches, systematically updates, and identifies vulnerabilities
- 11. Power protection controls, HVAC systems, and hardware monitoring systems
- 12. One of the first widely used Wi-Fi security standards that suffered from numerous security weaknesses
- 13. Uses satellites and computers to determine the location of a device
- 16. A dedicated site that monitors, assesses, and defends the organization's information systems
- 17. One or more locations containing the tools that provide administrators with a detailed status of the organization's network
- 18. Antivirus protection, adware protection, phishing protection, spyware protection
- 21. A program that allows or denies traffic between the computer and other connected computers
- 27. Provides mechanisms to authenticate and encrypt data between a wireless client and wireless router
