Cybersecurity vocab

123456789
Across
  1. 2. available to anyone
  2. 5. The process of validating a user.
  3. 6. A type of hacking that uses every combination or guess to gain authorization.
  4. 7. when users cycle through multiple roles.
  5. 8. when trust relationship is considered two way.
  6. 9. used to decrypt data and given to one person.
Down
  1. 1. what you leave behind on the internet.
  2. 3. the measurement or analysis of a biological feature to validate a user.
  3. 4. when credentials are falsely authorized.