Across
- 2. The owner of the data decides who can access and use their information
- 5. uses social skills to convince people to reveal access credential
- 9. The process that follows identification
- 10. The device that video records all activities
- 11. Malware that collects and sends information from infected computer to attacker
- 12. creating logs that records all users activities in a system
Down
- 1. Two or more distinct authentication types
- 3. willful and malicious defacement, destruction, or disruption of websites
- 4. The password that must be changes immediately after creating the account
- 6. Access is granted based on predefined roles within an organization
- 7. Basic methods to secure a building
- 8. Needs host and human interaction to replicate
- 13. Approach based on the use of measurable human characteristics/traits to authenticate identity
- 14. disguise themselves as useful programs but include malware
