Chapter 7 Security Plus

12345678910111213141516171819
Across
  1. 4. Granting access that is limited
  2. 6. Standard preconfigured passwords
  3. 9. Single sign-on for networks owned by different organizations
  4. 10. An access control scheme that is the most restrictive
  5. 14. evidence or proof of something
  6. 15. features and characteristics of the individual
  7. 16. Removing user accounts
  8. 17. Granting or denying approval to use specific resources
  9. 19. The ability of systems to exchange information
Down
  1. 1. Requiring the user to provide proof that they are the unique user.
  2. 2. The point in time when a password is no longer valid
  3. 3. allows secure web domains to exchange user authentication and authorization data
  4. 4. enables users to access a network resource through a directory service
  5. 5. An access control scheme that is the least restrictive
  6. 7. Using more than one type of authentication credential
  7. 8. Adding a random string to a hash algorithm for enhanced security
  8. 11. A key pair “burned” into a security key
  9. 12. small number of passwords used when trying several different user accounts
  10. 13. provide control over user validation and the resources that may be accessed
  11. 18. An open-source federation framework