ARCON - Privileged Access Management

1234567891011121314151617
Across
  1. 2. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. 4. A security technique that regulates who or what can view or use resources in a computing environment.
  3. 7. Approval, permission, or empowerment for someone or something to do something.
  4. 10. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  5. 13. Authentication Dictionary.
  6. 15. A software program that keeps passwords in a secure digital location.
  7. 17. The secret asset of a user.
Down
  1. 1. A malicious activity caused to an organization that comes from within the organization.
  2. 3. Rules and Regulatory measures to be followed.
  3. 5. An individual's physical characteristic.
  4. 6. An account that is given a non-restrictive access to the system.
  5. 8. Process of confirming the correctness of the claimed identity.
  6. 9. A node in a computer network, a key single point for data on its way to or from other networks.
  7. 11. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  8. 12. A sequence of operations that ensure protection of data.
  9. 14. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  10. 16. An unauthorized user able to access and misuse information.