Across
- 4. the process of deciding who is approved for access to specific resources
- 6. an authentication method based on something the user is, such as biometrics
- 8. when you try to guess every possible password (2 words)
- 9. increase this to make passwords more difficult to crack
- 12. authentication method based on something you have
- 14. Your password should be kept ____.
- 16. Password ____ software helps address the problem of remembering complex passwords for multiple accounts.
- 17. a plastic card with authentication credentials embedded in a microchip or magnetic strip on the card
- 19. Unfortunately, people write down passwords because they are hard to ____.
- 20. an attack that attempts to access a large number of accounts with a few commonly used passwords
- 22. do not share your password with _____.
- 23. an authentication method that uses more than one type of authentication credential (2 words)
Down
- 1. an authentication credential that is generally longer and more complex than a password
- 2. the part of access control that asks who are you?
- 3. one type of password attack based on the fact that most people use real words as passwords
- 5. type of access control that controls access to a computer system or network
- 7. the number of failed login attempts that trigger an account action
- 10. something you know, such as a password, passphrase, or a PIN
- 11. type of access control that controls entry to buildings, parking lots, and protected areas
- 13. A password that someone can easily guess is considered ____.
- 15. the process of proving you are the person or entity you claim to be
- 18. Use ____ passwords for each of your accounts.
- 21. objects in a computing system that should be password protected, such as files, computers, or printers
- 24. when passwords are shared by multiple people it is not possible to trace an action to a specific person resulting in a lack of _____.
