Crossword- Access control
Across
- 4. One technique comes under authentication by knowledge
- 7. Simple security rule (“no read up “ rule) in BLP preserves
- 9. Confirms and audits potential breaches by analyzing the security events.
Down
- 1. ______ list is the subject perspective view of the access control matrix.
- 2. One example of Single Sign-on technology
- 3. Credit card-based authentication comes under authentication by this factor.
- 5. Common identity management technology
- 6. The term in access control for the verification that the user’s claimed identity is valid
- 8. BIBA model enforces
- 9. the flow of information between subject and object refers to