Across
- 2. Closing or locking down any unnecessary paths on an operating system that can be used for unapproved access.
- 4. Point where the false acceptance rate and false rejection rate are equal.
- 5. Physical token inserted into a computer’s USB port.
- 11. Database of the network resources on a Microsoft network.
- 12. Security strategy in which a user can be granted additional rights to data beyond what is allowed by his or her assigned access level.
- 13. Authentication method using measurement and analysis of a biological feature.
- 15. Process of validating a user.
Down
- 1. Authentication method identifying measurable patterns in human activities.
- 3. Allows semi-independent systems to work together so users of one system can access resources from another system.
- 6. Ratio of the number of false acceptances divided by the number of identification attempts.
- 7. Those a user receives through another object, such as a group.
- 8. Ratio of the number of false rejections divided by the number of identification attempts.
- 9. Those a user is given at a specific location, such as a folder or a file.
- 10. Users cycle through different roles.
- 14. Those a user receives by default at a lower level.
