Across
- 1. Restoring data after a disaster
- 4. Software accessed online
- 5. Determining what a user can access
- 8. Proves a website is secure
- 10. Using multiple layers of security
- 11. Company-owned software
- 12. Malicious program that spreads between files
- 13. Software with editable public code
- 15. Allocating RAM to programs
- 17. Prevents unwanted browser windows
- 22. Programs used to complete everyday tasks
- 23. Manages hardware and software on a computer
- 25. Running multiple programs at once
- 27. Software that runs in the background
- 28. Standard security rules
- 30. Legal agreement for using software
- 31. Pay regularly to use software
- 33. Reducing system vulnerabilities
Down
- 2. Verifying a user’s identity
- 3. Reviewing systems for security issues
- 6. Monitoring system activity
- 7. Software that removes malware
- 9. Keeping systems updated
- 14. Proof that an action occurred
- 16. Giving users minimal necessary access
- 18. Update that fixes bugs or vulnerabilities
- 19. Allows the OS to communicate with hardware
- 20. Organizing files and folders
- 21. Controls read, write, or delete access
- 24. Temporary browser storage
- 26. How users interact with a computer
- 29. Blocks suspicious network traffic
- 32. Scrambling data for protection
