ARCON - Privileged Access Management

1234567891011121314151617
Across
  1. 3. Rules and Regulatory measures to be followed.
  2. 6. The secret asset of a user.
  3. 11. Authentication Dictionary.
  4. 12. An account that is given a non-restrictive access to the system.
  5. 15. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  6. 16. The process of converting information or data into a code, especially to prevent unauthorized access.
  7. 17. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
Down
  1. 1. A sequence of operations that ensure protection of data.
  2. 2. An unauthorized user able to access and misuse information.
  3. 4. A malicious activity caused to an organization that comes from within the organization.
  4. 5. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  5. 7. Approval, permission, or empowerment for someone or something to do something.
  6. 8. Process of confirming the correctness of the claimed identity.
  7. 9. A node in a computer network, a key single point for data on its way to or from other networks.
  8. 10. A security technique that regulates who or what can view or use resources in a computing environment.
  9. 13. A software program that keeps passwords in a secure digital location.
  10. 14. An individual's physical characteristic.