Across
- 2. Enables users to view and use data
- 6. Used to validate a user’s access and make sure they claim who they are
- 7. A stricter type of authentication
Down
- 1. What you use with a username to log in
- 3. The total of all data exposed to a person during a single sign in
- 4. the fraudulent practice of sending emails to reveal personal information
- 5. a type of malicious software designed to block access to a computer system until a sum of money is paid
- 6. A periodical review of security actions and user activity
