set 1

12345678910111213141516171819202122
Across
  1. 4. Never share your __________ with another person.
  2. 7. Apart from Production & integration, Grant provides you an environment for development purpose.
  3. 10. Information that's artificially manufactured rather than generated by real-world events   (2 words)
  4. 11. Method of creating a structurally similar but inauthentic version of an organization's data for software testing and user training  (2 words)
  5. 13. The letter ‘R’ in the GRANT stands for ______.
  6. 14. Sensitive application of CACIB which helps other applications to do Strong authentication.
  7. 15. What feature helps you to assure the Non-repudiation.
  8. 16. Email scam or attempt to trick you into giving your password or other personal information.
  9. 18. of moving data that is no longer actively used to a separate storage device for long-term retention     (2 words)    -
  10. 19. Applied to data to protect it from unauthorized use in case of theft or loss.
  11. 20. Considered one of the strongest 2-factor authentication and comes in the form of the USB-based Smart Tokens, Smart Cards, PFX files.
  12. 21. A cryptography function that is irreversible.
Down
  1. 1. A regulation by which the European Parliament, the Council of the European Union, and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU)
  2. 2. A Strong password should contain at least one of these.
  3. 3. The Identifier that is used in CACIB to identify each one of us.
  4. 5. What gets created when user’s request for application access is validated by all actors.
  5. 6. A directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.(2 words)
  6. 8. Do not send ______ information over email unless it is encrypted.
  7. 9. Applications need to be declared in __________ before they can be seen in GRANT.
  8. 12. SSO stands for _________ Sign On.
  9. 17. If I want an access to an application, I must create a request in_______________.
  10. 22. A hashing algorithm which generates unique fixed size 32-byte hash.