Managing User Security

1234567891011121314
Across
  1. 1. the two keys included are Authentication Service exchange and Ticket Granting Service exchange.
  2. 5. essentially a database of the network resources and includes objects such as user and group accounts,computers,servers, and printers.
  3. 6. a user can be granted additional rights to data beyond what is allowed by his or her assigned access level
  4. 9. allows semi-independent systems to work together.
  5. 10. the measurement and analysis of a biological feature.
  6. 14. the point where false rejection rate and false acceptance rate are equal.
Down
  1. 2. it’s based off “what you do” like a pattern or rhythm.
  2. 3. all the areas that give a hacker access to a system.
  3. 4. when biometric credentials are authorized on invalid characteristics.
  4. 7. the process of validating a user.
  5. 8. opposite action denying an authorized biometric credential.
  6. 11. standard authentication protocol on all versions of Microsoft servers when using the Active Directory.
  7. 12. user cycle through different roles.
  8. 13. the process of reducing or eliminating vulnerabilities on a system.