Cybersecurity Vocab 2

1234567891011121314
Across
  1. 5. biometrics considered invalid
  2. 6. Resources such as computers and accounts
  3. 7. cycle or new roles
  4. 8. Validating a user
  5. 9. authorizing access to user using biological feature
  6. 11. token into USB port
  7. 12. permission giver from other things
  8. 13. denying authorized biometircs credential
  9. 14. permission recieved from higher level
Down
  1. 1. Everyplace the hacker can get into
  2. 2. standard authentication protocol
  3. 3. permission given at certain lications
  4. 4. reducing vulnerability
  5. 5. Identity Managementsemi-independent systems
  6. 10. FAR and FRR are equal