Across
- 2. personal data to purify the access
- 6. collection data
- 7. record of events
- 8. the procedure to get the access
- 9. the process of validating user identity
- 10. some you use to enter the resource
Down
- 1. to prove that data is correct
- 3. provides user identity to the security system
- 4. the one who seeks the access
- 5. the function of specifying access rights to resources
