Across
- 2. access controls that are actual barriers deployed to prevent direct physical contact with systems.
- 4. (4,5) is a comprehensive approach to securing all access across networks, applications, and environments.
- 8. it verifies the identity of each user, to prevent unauthorized access; An administrative access control, one of the three security services.
- 9. (4,3,4) Smart cards and security key fobs are examples of something that users possess
- 10. it keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make; An administrative access control, one of the three security services.
- 11. (4,3,4) Passwords, passphrases, or PINs are all examples
Down
- 1. (6,4,2) solution allows the user to use one set of login credentials to authenticate across multiple applications. This way, the user only needs to remember one strong password.
- 3. it determines which resources users can access, along with the operations that users can perform; An administrative access control, one of the three security services.
- 5. access controls that are the hardware and software solutions used to manage access to resources and systems.
- 6. access controls that are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
- 7. are rules configured to limit folder or file access for an individual or a group and can help secure data.
- 9. (3,3,3) Biometric security compares unique physical characteristics against stored profiles to authenticate users.
