Across
- 4. A person or entity responsible for an event that has been identified as a security incident or as a risk
- 5. Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
- 7. Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- 8. The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
- 10. Data that can be used to identify or contact an individual
- 11. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
- 1. A number used in conjunction with authentication devices
- 2. Scans that allow access to a physical space or program by verifying unique body features
- 3. unauthorized use is detected or attempted
- 6. Security control that can enforce a virtual boundary based on real-world geography
- 9. A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role
