Security

12345678910
Across
  1. 2. personal data to purify the access
  2. 6. collection data
  3. 7. record of events
  4. 8. the procedure to get the access
  5. 9. the process of validating user identity
  6. 10. some you use to enter the resource
Down
  1. 1. to prove that data is correct
  2. 3. provides user identity to the security system
  3. 4. the one who seeks the access
  4. 5. the function of specifying access rights to resources