cyber

123456789101112131415
Across
  1. 2. Closing or locking down any unnecessary paths on an operating system that can be used for unapproved access.
  2. 4. Point where the false acceptance rate and false rejection rate are equal.
  3. 5. Physical token inserted into a computer’s USB port.
  4. 11. Database of the network resources on a Microsoft network.
  5. 12. Security strategy in which a user can be granted additional rights to data beyond what is allowed by his or her assigned access level.
  6. 13. Authentication method using measurement and analysis of a biological feature.
  7. 15. Process of validating a user.
Down
  1. 1. Authentication method identifying measurable patterns in human activities.
  2. 3. Allows semi-independent systems to work together so users of one system can access resources from another system.
  3. 6. Ratio of the number of false acceptances divided by the number of identification attempts.
  4. 7. Those a user receives through another object, such as a group.
  5. 8. Ratio of the number of false rejections divided by the number of identification attempts.
  6. 9. Those a user is given at a specific location, such as a folder or a file.
  7. 10. Users cycle through different roles.
  8. 14. Those a user receives by default at a lower level.