System Administration Secuirty

123456789101112131415161718192021222324252627282930313233
Across
  1. 1. Restoring data after a disaster
  2. 4. Software accessed online
  3. 5. Determining what a user can access
  4. 8. Proves a website is secure
  5. 10. Using multiple layers of security
  6. 11. Company-owned software
  7. 12. Malicious program that spreads between files
  8. 13. Software with editable public code
  9. 15. Allocating RAM to programs
  10. 17. Prevents unwanted browser windows
  11. 22. Programs used to complete everyday tasks
  12. 23. Manages hardware and software on a computer
  13. 25. Running multiple programs at once
  14. 27. Software that runs in the background
  15. 28. Standard security rules
  16. 30. Legal agreement for using software
  17. 31. Pay regularly to use software
  18. 33. Reducing system vulnerabilities
Down
  1. 2. Verifying a user’s identity
  2. 3. Reviewing systems for security issues
  3. 6. Monitoring system activity
  4. 7. Software that removes malware
  5. 9. Keeping systems updated
  6. 14. Proof that an action occurred
  7. 16. Giving users minimal necessary access
  8. 18. Update that fixes bugs or vulnerabilities
  9. 19. Allows the OS to communicate with hardware
  10. 20. Organizing files and folders
  11. 21. Controls read, write, or delete access
  12. 24. Temporary browser storage
  13. 26. How users interact with a computer
  14. 29. Blocks suspicious network traffic
  15. 32. Scrambling data for protection