Across
- 2. One technique comes under authentication by knowledge
- 4. One example of Single Sign-on technology
- 7. BIBA model enforces
- 8. Simple security rule (“no read up “ rule) in BLP preserves
- 10. ______ list is the subject perspective view of the access control matrix.
Down
- 1. Credit card-based authentication comes under authentication by this factor.
- 3. The term in access control for the verification that the user’s claimed identity is valid
- 5. Confirms and audits potential breaches by analyzing the security events.
- 6. Common identity management technology
- 9. the flow of information between subject and object refers to
