ARCON - Privileged Access Management
Across
- 2. An individual's physical characteristic.
- 5. Rules and Regulatory measures to be followed.
- 7. The secret asset of a user.
- 9. A sequence of operations that ensure protection of data.
- 11. A security technique that regulates who or what can view or use resources in a computing environment.
- 12. Approval, permission, or empowerment for someone or something to do something.
- 13. A node in a computer network, a key single point for data on its way to or from other networks.
- 16. An account that is given a non-restrictive access to the system.
- 17. Process of confirming the correctness of the claimed identity.
Down
- 1. An unauthorized user able to access and misuse information.
- 3. A malicious activity caused to an organization that comes from within the organization.
- 4. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- 6. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- 8. The process of converting information or data into a code, especially to prevent unauthorized access.
- 10. Authentication Dictionary.
- 14. A software program that keeps passwords in a secure digital location.
- 15. A software that forms a barrier between the computer and the outside world to prevent intrusion.