Across
- 2. available to anyone
- 5. The process of validating a user.
- 6. A type of hacking that uses every combination or guess to gain authorization.
- 7. when users cycle through multiple roles.
- 8. when trust relationship is considered two way.
- 9. used to decrypt data and given to one person.
Down
- 1. what you leave behind on the internet.
- 3. the measurement or analysis of a biological feature to validate a user.
- 4. when credentials are falsely authorized.