Across
- 5. _______ is an authorization model that grants access to an organization’s specific resources based on the relationship between the user and the resource.
- 9. __________ Layer a security protocol that encrypts data transmitted between systems
- 10. Organizations need to pick an authorization model that is easy for users to understand but also provides the required level of security.
- 11. A authorization step where the user enters _______.
- 12. A authorization step where the _____ sends request to server.
- 13. _______ access control that restricts access based on the level of sensitivity of the resources.
- 14. The process of verifying a user's identity by checking their credentials.
Down
- 1. ________ grants users access to an organization’s specific data and systems based on particular attributes associated with the user.
- 2. ________ authentication uses unique physical characteristics.
- 3. ______ Directory Access Protocol refers to a standard protocol used to access and manage directory information.
- 4. ________ access control defines roles and privileges to restrict systems access to only authorized users.
- 6. ________ is the process after authentication that determines the level of access a user has to system resources such as data, applications and networks.
- 7. _____ is the opposite of MAC as it assigns privileges based on the user and the access group.
- 8. __________ authentication provides a temporary token
- 9. Allows users to log in to multiple applications using the same set of credentials.
