Access Control
Across
- 3. Access Control permissions set by the owner of the resource.
- 4. Protects sensitive data by making it unreadable to unauthorised users, ensuring confidentiality even if data is intercepted.
- 11. Accessing multiple systems with one login.
- 14. A test to distinguish humans from automated bots.
- 18. Access control enforced by a central authority.
- 19. A table that tells the system which users can access what.
- 20. Giving users the minimum access they need to do their job.
- 23. An electronic document proving ownership of a public key.
- 24. Authentication using two separate components.
- 25. A digital identity assigned to a system user.
- 26. A physical card with embedded integrated circuits.
Down
- 1. Processes to manage individual identities and access.
- 2. A unique identifier for a system user.
- 5. Weaknesses in an organisation’s security systems that can be exploited by both internal and external threats.
- 6. The C in CIA Triad
- 7. A secret string of characters used to confirm identity.
- 8. The use physical information to confirm identity, "something you are".
- 9. Authentication using more than one method to verify identity.
- 10. Automatic logoff after a period of inactivity.
- 12. Verifying the identity of a user, process, or device.
- 13. Access control permissions assigned based on job role.
- 15. The A in CIA Triad
- 16. Granting permission to access resources or perform actions.
- 17. Physical or behavioural characteristics used for identification.
- 21. Data Protection ...
- 22. Act as a barrier between trusted internal networks and untrusted external sources, blocking malicious traffic.