Crossword- Access control

12345678910
Across
  1. 2. One technique comes under authentication by knowledge
  2. 4. One example of Single Sign-on technology
  3. 7. BIBA model enforces
  4. 8. Simple security rule (“no read up “ rule) in BLP preserves
  5. 10. ______ list is the subject perspective view of the access control matrix.
Down
  1. 1. Credit card-based authentication comes under authentication by this factor.
  2. 3. The term in access control for the verification that the user’s claimed identity is valid
  3. 5. Confirms and audits potential breaches by analyzing the security events.
  4. 6. Common identity management technology
  5. 9. the flow of information between subject and object refers to