Authentication and Authorization

1234567891011121314
Across
  1. 5. _______ is an authorization model that grants access to an organization’s specific resources based on the relationship between the user and the resource.
  2. 9. __________ Layer a security protocol that encrypts data transmitted between systems
  3. 10. Organizations need to pick an authorization model that is easy for users to understand but also provides the required level of security.
  4. 11. A authorization step where the user enters _______.
  5. 12. A authorization step where the _____ sends request to server.
  6. 13. _______ access control that restricts access based on the level of sensitivity of the resources.
  7. 14. The process of verifying a user's identity by checking their credentials.
Down
  1. 1. ________ grants users access to an organization’s specific data and systems based on particular attributes associated with the user.
  2. 2. ________ authentication uses unique physical characteristics.
  3. 3. ______ Directory Access Protocol refers to a standard protocol used to access and manage directory information.
  4. 4. ________ access control defines roles and privileges to restrict systems access to only authorized users.
  5. 6. ________ is the process after authentication that determines the level of access a user has to system resources such as data, applications and networks.
  6. 7. _____ is the opposite of MAC as it assigns privileges based on the user and the access group.
  7. 8. __________ authentication provides a temporary token
  8. 9. Allows users to log in to multiple applications using the same set of credentials.