Crossword- Access control

123456789
Across
  1. 4. One technique comes under authentication by knowledge
  2. 7. Simple security rule (“no read up “ rule) in BLP preserves
  3. 9. Confirms and audits potential breaches by analyzing the security events.
Down
  1. 1. ______ list is the subject perspective view of the access control matrix.
  2. 2. One example of Single Sign-on technology
  3. 3. Credit card-based authentication comes under authentication by this factor.
  4. 5. Common identity management technology
  5. 6. The term in access control for the verification that the user’s claimed identity is valid
  6. 8. BIBA model enforces
  7. 9. the flow of information between subject and object refers to