Across
- 2. The process of converting information or data into a code, especially to prevent unauthorized access.
- 4. A security technique that regulates who or what can view or use resources in a computing environment.
- 7. Approval, permission, or empowerment for someone or something to do something.
- 10. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- 13. Authentication Dictionary.
- 15. A software program that keeps passwords in a secure digital location.
- 17. The secret asset of a user.
Down
- 1. A malicious activity caused to an organization that comes from within the organization.
- 3. Rules and Regulatory measures to be followed.
- 5. An individual's physical characteristic.
- 6. An account that is given a non-restrictive access to the system.
- 8. Process of confirming the correctness of the claimed identity.
- 9. A node in a computer network, a key single point for data on its way to or from other networks.
- 11. A software that forms a barrier between the computer and the outside world to prevent intrusion.
- 12. A sequence of operations that ensure protection of data.
- 14. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- 16. An unauthorized user able to access and misuse information.
