Chapter 4 - Information Security Governance Principles

123456789101112131415
Across
  1. 1. Authentication method that uses fingerprints or facial features
  2. 4. Method of giving different access rights to different users
  3. 6. Authentication method that requires more than one verification factor
  4. 8. Security method that limits access to files or folders
  5. 13. Secret combination used to verify a user’s identity
  6. 14. A set of step-by-step actions to ensure security rules are followed
  7. 15. Process of assigning value or sensitivity levels to information
Down
  1. 2. Unauthorized increase of access rights by a user
  2. 3. Process of tracking user activities for security purposes
  3. 5. A formal document that defines rules and expectations for information security
  4. 7. Unique name used by a user to access a system
  5. 9. Technique used to protect data by converting it into unreadable form
  6. 10. Collection of users with similar access rights
  7. 11. Small physical device used to generate secure login codes
  8. 12. Login system that allows access to multiple services using one account