set 1

12345678910111213141516171819202122
Across
  1. 2. A hashing algorithm which generates unique fixed size 32-byte hash.
  2. 6. If I want an access to an application, I must create a request in_______________.
  3. 7. A directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.(2 words)
  4. 10. The Identifier that is used in CACIB to identify each one of us.
  5. 12. What feature helps you to assure the Non-repudiation.
  6. 13. What gets created when user’s request for application access is validated by all actors.
  7. 14. Never share your __________ with another person.
  8. 16. SSO stands for _________ Sign On.
  9. 17. Applied to data to protect it from unauthorized use in case of theft or loss.
  10. 18. A cryptography function that is irreversible.
  11. 19. A regulation by which the European Parliament, the Council of the European Union, and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU)
  12. 20. The letter ‘R’ in the GRANT stands for ______.
  13. 21. Sensitive application of CACIB which helps other applications to do Strong authentication.
  14. 22. Email scam or attempt to trick you into giving your password or other personal information.
Down
  1. 1. Apart from Production & integration, Grant provides you an environment for development purpose.
  2. 3. A Strong password should contain at least one of these.
  3. 4. Applications need to be declared in __________ before they can be seen in GRANT.
  4. 5. Information that's artificially manufactured rather than generated by real-world events   (2 words)
  5. 8. of moving data that is no longer actively used to a separate storage device for long-term retention     (2 words)    -
  6. 9. Considered one of the strongest 2-factor authentication and comes in the form of the USB-based Smart Tokens, Smart Cards, PFX files.
  7. 11. Method of creating a structurally similar but inauthentic version of an organization's data for software testing and user training  (2 words)
  8. 15. Do not send ______ information over email unless it is encrypted.