U11 - Mod 13 Key Terms

1234567891011
Across
  1. 2. access controls that are actual barriers deployed to prevent direct physical contact with systems.
  2. 4. (4,5) is a comprehensive approach to securing all access across networks, applications, and environments.
  3. 8. it verifies the identity of each user, to prevent unauthorized access; An administrative access control, one of the three security services.
  4. 9. (4,3,4) Smart cards and security key fobs are examples of something that users possess
  5. 10. it keeps track of what users do — including what they access, the amount of time they access resources, and any changes they make; An administrative access control, one of the three security services.
  6. 11. (4,3,4) Passwords, passphrases, or PINs are all examples
Down
  1. 1. (6,4,2) solution allows the user to use one set of login credentials to authenticate across multiple applications. This way, the user only needs to remember one strong password.
  2. 3. it determines which resources users can access, along with the operations that users can perform; An administrative access control, one of the three security services.
  3. 5. access controls that are the hardware and software solutions used to manage access to resources and systems.
  4. 6. access controls that are the policies and procedures defined by organizations to implement and enforce all aspects of controlling unauthorized access.
  5. 7. are rules configured to limit folder or file access for an individual or a group and can help secure data.
  6. 9. (3,3,3) Biometric security compares unique physical characteristics against stored profiles to authenticate users.