Across
- 2. UAP,BYOD
- 4. Impersonate a trusted person
- 8. Process of isolating a compromised device
- 11. Characteristics authentication
- 12. Accounts with permissions
Down
- 1. Access control model
- 3. A server that is accessed by an user
- 5. Attack that affects the kernel of an OS
- 6. Security key, iris scan, pattern
- 7. Mistakes can be undone
- 9. Privacy law
- 10. Quick fix of a problem
