FT3 - 15 mins- 17.10.25-Time : 8.15 to 8.30

12345678910
Across
  1. 4. Access model: based on attributes and context
  2. 5. Single sign-on service for multiple applications
  3. 6. BROWSING Attacker manipulates URLs to access unauthorized data
  4. 10. Data about data (timestamps, geolocation)
Down
  1. 1. Attack gaining higher privileges than allowed
  2. 2. Authentication using password + fingerprint
  3. 3. Legal requirement ensuring evidence remains genuine
  4. 7. Access model: owner decides who can access
  5. 8. Access model based on role/job
  6. 9. Access model: strict centralized control