ARCON - Privileged Access Management

1234567891011121314151617
Across
  1. 2. An individual's physical characteristic.
  2. 5. Rules and Regulatory measures to be followed.
  3. 7. The secret asset of a user.
  4. 9. A sequence of operations that ensure protection of data.
  5. 11. A security technique that regulates who or what can view or use resources in a computing environment.
  6. 12. Approval, permission, or empowerment for someone or something to do something.
  7. 13. A node in a computer network, a key single point for data on its way to or from other networks.
  8. 16. An account that is given a non-restrictive access to the system.
  9. 17. Process of confirming the correctness of the claimed identity.
Down
  1. 1. An unauthorized user able to access and misuse information.
  2. 3. A malicious activity caused to an organization that comes from within the organization.
  3. 4. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  4. 6. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  5. 8. The process of converting information or data into a code, especially to prevent unauthorized access.
  6. 10. Authentication Dictionary.
  7. 14. A software program that keeps passwords in a secure digital location.
  8. 15. A software that forms a barrier between the computer and the outside world to prevent intrusion.