Cyber vocab chapter 3

123456789101112131415
Across
  1. 5. systems that requires a physical token
  2. 6. user receives through another object
  3. 10. user receives by default
  4. 13. validating a user
  5. 14. standard authentication protocol for all microsoft versions
  6. 15. false amount of rejected users
Down
  1. 1. allows you to share folders
  2. 2. given to a user at a certain location
  3. 3. where false accept and reject rates meet
  4. 4. all possible attack locations
  5. 7. database of all the network resoruces
  6. 8. eliminating vulnerabilities
  7. 9. analysis of a biological feature
  8. 11. identifying measurable patterns in human activity
  9. 12. cycle of different roles