Across
- 5. systems that requires a physical token
- 6. user receives through another object
- 10. user receives by default
- 13. validating a user
- 14. standard authentication protocol for all microsoft versions
- 15. false amount of rejected users
Down
- 1. allows you to share folders
- 2. given to a user at a certain location
- 3. where false accept and reject rates meet
- 4. all possible attack locations
- 7. database of all the network resoruces
- 8. eliminating vulnerabilities
- 9. analysis of a biological feature
- 11. identifying measurable patterns in human activity
- 12. cycle of different roles
