Access Control

1234567891011121314151617181920212223242526
Across
  1. 3. Access Control permissions set by the owner of the resource.
  2. 4. Protects sensitive data by making it unreadable to unauthorised users, ensuring confidentiality even if data is intercepted.
  3. 11. Accessing multiple systems with one login.
  4. 14. A test to distinguish humans from automated bots.
  5. 18. Access control enforced by a central authority.
  6. 19. A table that tells the system which users can access what.
  7. 20. Giving users the minimum access they need to do their job.
  8. 23. An electronic document proving ownership of a public key.
  9. 24. Authentication using two separate components.
  10. 25. A digital identity assigned to a system user.
  11. 26. A physical card with embedded integrated circuits.
Down
  1. 1. Processes to manage individual identities and access.
  2. 2. A unique identifier for a system user.
  3. 5. Weaknesses in an organisation’s security systems that can be exploited by both internal and external threats.
  4. 6. The C in CIA Triad
  5. 7. A secret string of characters used to confirm identity.
  6. 8. The use physical information to confirm identity, "something you are".
  7. 9. Authentication using more than one method to verify identity.
  8. 10. Automatic logoff after a period of inactivity.
  9. 12. Verifying the identity of a user, process, or device.
  10. 13. Access control permissions assigned based on job role.
  11. 15. The A in CIA Triad
  12. 16. Granting permission to access resources or perform actions.
  13. 17. Physical or behavioural characteristics used for identification.
  14. 21. Data Protection ...
  15. 22. Act as a barrier between trusted internal networks and untrusted external sources, blocking malicious traffic.