ARCON - Privileged Access Management

1234567891011121314151617
Across
  1. 3. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  2. 4. Rules and Regulatory measures to be followed.
  3. 6. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. 10. The secret asset of a user.
  5. 12. An account that is given a non-restrictive access to the system.
  6. 13. Authentication Dictionary.
  7. 14. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  8. 17. A security technique that regulates who or what can view or use resources in a computing environment.
Down
  1. 1. An individual's physical characteristic.
  2. 2. A node in a computer network, a key single point for data on its way to or from other networks.
  3. 5. Process of confirming the correctness of the claimed identity.
  4. 7. A malicious activity caused to an organization that comes from within the organization.
  5. 8. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  6. 9. A sequence of operations that ensure protection of data.
  7. 11. Approval, permission, or empowerment for someone or something to do something.
  8. 15. A software program that keeps passwords in a secure digital location.
  9. 16. An unauthorized user able to access and misuse information.