Across
- 5. An access control scheme that is the least restrictive
- 6. injects stolen username and password across multiple websites
- 8. Granting or denying approval to use specific resources
- 11. The ability of systems to exchange information
- 12. small device that looks like a thumb drive which can be used for verification
- 13. enables users to access a network resource through a directory service
- 14. small number of passwords used when trying several different user accounts
- 15. Adding a random string to a hash algorithm for enhanced security
- 18. A key pair “burned” into a security key
- 19. features and characteristics of the individual
- 20. Removing user accounts
- 24. An access control scheme that is the most restrictive
- 25. password attack attempting thousands of combinations per second
Down
- 1. Single sign-on for networks owned by different organizations
- 2. software designed to break passwords
- 3. Using more than one type of authentication credential
- 4. Requiring the user to provide proof that they are the unique user.
- 7. Granting access that is limited
- 9. key stretching algorithms
- 10. Standard preconfigured passwords
- 16. evidence or proof of something
- 17. allows secure web domains to exchange user authentication and authorization data
- 21. The point in time when a password is no longer valid
- 22. An open-source federation framework
- 23. provide control over user validation and the resources that may be accessed
