Crossword- Access control

12345678910
Across
  1. 2. the flow of information between subject and object refers to
  2. 4. Confirms and audits potential breaches by analyzing the security events.
  3. 7. Simple security rule (“no read up “ rule) in BLP preserves
  4. 10. One example of Single Sign-on technology
Down
  1. 1. The term in access control for the verification that the user’s claimed identity is valid
  2. 3. ______ list is the subject perspective view of the access control matrix.
  3. 5. BIBA model enforces
  4. 6. One technique comes under authentication by knowledge
  5. 8. Credit card-based authentication comes under authentication by this factor.
  6. 9. Common identity management technology