Across
- 1. Authentication method that uses fingerprints or facial features
- 4. Method of giving different access rights to different users
- 6. Authentication method that requires more than one verification factor
- 8. Security method that limits access to files or folders
- 13. Secret combination used to verify a user’s identity
- 14. A set of step-by-step actions to ensure security rules are followed
- 15. Process of assigning value or sensitivity levels to information
Down
- 2. Unauthorized increase of access rights by a user
- 3. Process of tracking user activities for security purposes
- 5. A formal document that defines rules and expectations for information security
- 7. Unique name used by a user to access a system
- 9. Technique used to protect data by converting it into unreadable form
- 10. Collection of users with similar access rights
- 11. Small physical device used to generate secure login codes
- 12. Login system that allows access to multiple services using one account
