Internal Evaluation 4 - Crossword

123456789
Across
  1. 6. Credit card based authentication comes under authentication by this factor.
  2. 7. Describes the method of ensuring a subject is the entity it claims to be
  3. 8. BLP model enforces
  4. 9. Active entity that requires access to an object
Down
  1. 1. The term in access control for the verification that the user’s claimed identity is valid
  2. 2. Confirms and audits potential breaches by analyzing the security events.
  3. 3. the flow of information between subject and object refers to
  4. 4. list is the subject perspective view of access control matrix.
  5. 5. Common identity management technology
  6. 7. “No read down “ rule in BIBA preserves