Across
- 2. A social engineering attack that tricks users into revealing sensitive information.
- 5. The principle that ensures information remains accurate and unaltered.
- 6. A physical or digital device used to generate or store authentication credentials.
- 9. The process of verifying the identity of a user or system.
- 15. A technique where an attacker disguises themselves as a trusted entity to deceive victims.
- 18. A biometric security feature that ensures the biometric sample is from a real, live person.
- 19. A federated identity solution that enables single sign-on (SSO) across different organizations securely.
- 20. A biometric technique that identifies users based on their unique typing rhythm.
- 22. The process of granting or denying permissions to a user or system.
- 24. The principle that ensures information is only accessible to authorized users.
- 27. A method of authentication that uses physical or behavioral characteristics.
- 28. A biometric authentication method that scans the colored part of the eye.
- 29. A cyberattack where an attacker intercepts and alters communication between two parties.
- 30. A dynamic authentication method that generates temporary passcodes based on a shared secret and the current time.
Down
- 1. A method where an attacker systematically tries common passwords to gain access.
- 3. The point at which the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal in a biometric system.
- 4. An authentication method that analyzes unique patterns in actions like typing or mouse movement.
- 7. A biometric authentication method that uses unique patterns on the fingertip.
- 8. A public-key cryptography technique that offers strong security with smaller key sizes, often used in authentication.
- 10. A cryptographic technique that adds random data to passwords before hashing to prevent attacks.
- 11. The principle that ensures authorized users can access information when needed.
- 12. A technique that converts plaintext data into unreadable ciphertext for security.
- 13. A secret combination of characters used to verify a user's identity.
- 14. A cryptographic method used to verify the authenticity and integrity of a message or document.
- 16. A biometric authentication method that analyzes unique facial features.
- 17. An authentication method that requires more than one verification factor.
- 21. A cryptographic method that allows computations to be performed on encrypted data without decrypting it first.
- 23. A security model that assumes no entity should be trusted by default, even inside the network.
- 25. A security principle that ensures a user cannot deny performing an action or sending a message.
- 26. A cryptographic process that converts data into a fixed-length value, ensuring integrity.
