Across
- 2. the flow of information between subject and object refers to
- 4. Confirms and audits potential breaches by analyzing the security events.
- 7. Simple security rule (“no read up “ rule) in BLP preserves
- 10. One example of Single Sign-on technology
Down
- 1. The term in access control for the verification that the user’s claimed identity is valid
- 3. ______ list is the subject perspective view of the access control matrix.
- 5. BIBA model enforces
- 6. One technique comes under authentication by knowledge
- 8. Credit card-based authentication comes under authentication by this factor.
- 9. Common identity management technology
