FT3 - 15 mins- 17.10.25-Time : 8.15 to 8.30
Across
- 4. Access model: based on attributes and context
- 5. Single sign-on service for multiple applications
- 6. Attacker manipulates URLs to access unauthorized data
- 10. Data about data (timestamps, geolocation)
Down
- 1. Attack gaining higher privileges than allowed
- 2. Authentication using password + fingerprint
- 3. Legal requirement ensuring evidence remains genuine
- 7. Access model: owner decides who can access
- 8. Access model based on role/job
- 9. Access model: strict centralized control