PRSE6212

123456789101112131415161718192021222324252627282930
Across
  1. 2. A social engineering attack that tricks users into revealing sensitive information.
  2. 5. The principle that ensures information remains accurate and unaltered.
  3. 6. A physical or digital device used to generate or store authentication credentials.
  4. 9. The process of verifying the identity of a user or system.
  5. 15. A technique where an attacker disguises themselves as a trusted entity to deceive victims.
  6. 18. A biometric security feature that ensures the biometric sample is from a real, live person.
  7. 19. A federated identity solution that enables single sign-on (SSO) across different organizations securely.
  8. 20. A biometric technique that identifies users based on their unique typing rhythm.
  9. 22. The process of granting or denying permissions to a user or system.
  10. 24. The principle that ensures information is only accessible to authorized users.
  11. 27. A method of authentication that uses physical or behavioral characteristics.
  12. 28. A biometric authentication method that scans the colored part of the eye.
  13. 29. A cyberattack where an attacker intercepts and alters communication between two parties.
  14. 30. A dynamic authentication method that generates temporary passcodes based on a shared secret and the current time.
Down
  1. 1. A method where an attacker systematically tries common passwords to gain access.
  2. 3. The point at which the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal in a biometric system.
  3. 4. An authentication method that analyzes unique patterns in actions like typing or mouse movement.
  4. 7. A biometric authentication method that uses unique patterns on the fingertip.
  5. 8. A public-key cryptography technique that offers strong security with smaller key sizes, often used in authentication.
  6. 10. A cryptographic technique that adds random data to passwords before hashing to prevent attacks.
  7. 11. The principle that ensures authorized users can access information when needed.
  8. 12. A technique that converts plaintext data into unreadable ciphertext for security.
  9. 13. A secret combination of characters used to verify a user's identity.
  10. 14. A cryptographic method used to verify the authenticity and integrity of a message or document.
  11. 16. A biometric authentication method that analyzes unique facial features.
  12. 17. An authentication method that requires more than one verification factor.
  13. 21. A cryptographic method that allows computations to be performed on encrypted data without decrypting it first.
  14. 23. A security model that assumes no entity should be trusted by default, even inside the network.
  15. 25. A security principle that ensures a user cannot deny performing an action or sending a message.
  16. 26. A cryptographic process that converts data into a fixed-length value, ensuring integrity.