Chapter 7 Security Plus

12345678910111213141516171819202122232425
Across
  1. 5. An access control scheme that is the least restrictive
  2. 6. injects stolen username and password across multiple websites
  3. 8. Granting or denying approval to use specific resources
  4. 11. The ability of systems to exchange information
  5. 12. small device that looks like a thumb drive which can be used for verification
  6. 13. enables users to access a network resource through a directory service
  7. 14. small number of passwords used when trying several different user accounts
  8. 15. Adding a random string to a hash algorithm for enhanced security
  9. 18. A key pair “burned” into a security key
  10. 19. features and characteristics of the individual
  11. 20. Removing user accounts
  12. 24. An access control scheme that is the most restrictive
  13. 25. password attack attempting thousands of combinations per second
Down
  1. 1. Single sign-on for networks owned by different organizations
  2. 2. software designed to break passwords
  3. 3. Using more than one type of authentication credential
  4. 4. Requiring the user to provide proof that they are the unique user.
  5. 7. Granting access that is limited
  6. 9. key stretching algorithms
  7. 10. Standard preconfigured passwords
  8. 16. evidence or proof of something
  9. 17. allows secure web domains to exchange user authentication and authorization data
  10. 21. The point in time when a password is no longer valid
  11. 22. An open-source federation framework
  12. 23. provide control over user validation and the resources that may be accessed