Across
- 5. biometrics considered invalid
- 6. Resources such as computers and accounts
- 7. cycle or new roles
- 8. Validating a user
- 9. authorizing access to user using biological feature
- 11. token into USB port
- 12. permission giver from other things
- 13. denying authorized biometircs credential
- 14. permission recieved from higher level
Down
- 1. Everyplace the hacker can get into
- 2. standard authentication protocol
- 3. permission given at certain lications
- 4. reducing vulnerability
- 5. Identity Managementsemi-independent systems
- 10. FAR and FRR are equal