Across
- 3. Rules and Regulatory measures to be followed.
- 6. The secret asset of a user.
- 11. Authentication Dictionary.
- 12. An account that is given a non-restrictive access to the system.
- 15. A software that forms a barrier between the computer and the outside world to prevent intrusion.
- 16. The process of converting information or data into a code, especially to prevent unauthorized access.
- 17. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
Down
- 1. A sequence of operations that ensure protection of data.
- 2. An unauthorized user able to access and misuse information.
- 4. A malicious activity caused to an organization that comes from within the organization.
- 5. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- 7. Approval, permission, or empowerment for someone or something to do something.
- 8. Process of confirming the correctness of the claimed identity.
- 9. A node in a computer network, a key single point for data on its way to or from other networks.
- 10. A security technique that regulates who or what can view or use resources in a computing environment.
- 13. A software program that keeps passwords in a secure digital location.
- 14. An individual's physical characteristic.
