Managing User Security
Across
- 1. the two keys included are Authentication Service exchange and Ticket Granting Service exchange.
- 5. essentially a database of the network resources and includes objects such as user and group accounts,computers,servers, and printers.
- 6. a user can be granted additional rights to data beyond what is allowed by his or her assigned access level
- 9. allows semi-independent systems to work together.
- 10. the measurement and analysis of a biological feature.
- 14. the point where false rejection rate and false acceptance rate are equal.
Down
- 2. it’s based off “what you do” like a pattern or rhythm.
- 3. all the areas that give a hacker access to a system.
- 4. when biometric credentials are authorized on invalid characteristics.
- 7. the process of validating a user.
- 8. opposite action denying an authorized biometric credential.
- 11. standard authentication protocol on all versions of Microsoft servers when using the Active Directory.
- 12. user cycle through different roles.
- 13. the process of reducing or eliminating vulnerabilities on a system.