Cybersecurity Acronym

123456789101112131415161718
Across
  1. 1. Issues tickets and Kerberos authentication
  2. 3. methods exposed by a script or program that allow other scripts or programs to use it.
  3. 6. Standards, best practices, and guidelines
  4. 7. XML-based data format used to exchange authentication information
  5. 10. access control model where resources are protected by ACLs & managed by admins
  6. 11. access control model where each resource is protected by an access control list
  7. 15. An XML-based web services protocol used to exchange messages
  8. 16. token issued to an authenticated account
  9. 17. A number used with authentication devices such as smartcards
Down
  1. 2. Three principles of security control and management
  2. 4. A collection of access control entries
  3. 5. authentication scheme that requires at least two different factors as credentials
  4. 7. value assigned to an account by windows
  5. 8. access control model where resources are protected by system-defined rules
  6. 9. A standard for federated identity management
  7. 10. stateless style used by web applications
  8. 12. access control technique that evaluates a set of attributes that each subject possesses
  9. 13. file format that uses attribute-value pairs
  10. 14. A password that is generated for use in one specific session
  11. 18. provides identification, authentication, and authorization mechanisms for users