Across
- 6. Credit card based authentication comes under authentication by this factor.
- 7. Describes the method of ensuring a subject is the entity it claims to be
- 8. BLP model enforces
- 9. Active entity that requires access to an object
Down
- 1. The term in access control for the verification that the user’s claimed identity is valid
- 2. Confirms and audits potential breaches by analyzing the security events.
- 3. the flow of information between subject and object refers to
- 4. list is the subject perspective view of access control matrix.
- 5. Common identity management technology
- 7. “No read down “ rule in BIBA preserves
