Access Controls Game

1234567891011121314
Across
  1. 2. The owner of the data decides who can access and use their information
  2. 5. uses social skills to convince people to reveal access credential
  3. 9. The process that follows identification
  4. 10. The device that video records all activities
  5. 11. Malware that collects and sends information from infected computer to attacker
  6. 12. creating logs that records all users activities in a system
Down
  1. 1. Two or more distinct authentication types
  2. 3. willful and malicious defacement, destruction, or disruption of websites
  3. 4. The password that must be changes immediately after creating the account
  4. 6. Access is granted based on predefined roles within an organization
  5. 7. Basic methods to secure a building
  6. 8. Needs host and human interaction to replicate
  7. 13. Approach based on the use of measurable human characteristics/traits to authenticate identity
  8. 14. disguise themselves as useful programs but include malware