Unit 6

1234567891011121314151617
Across
  1. 3. This information can be used to determine policy and permission.
  2. 10. the process of validating identity. It includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.
  3. 11. The number of subjects or authentication attempts that can be validated.
  4. 12. A list that identifies users or groups who have specific security assignments to an object.
  5. 13. restrictions on the use of a user account for login.
  6. 14. a centralized database developed by Microsoft that contains user accounts and security information.
  7. 15. an administratively-defined collection of network resources that share a common directory database and security policies.
  8. 16. This type of authentication requires capturing and storing a unique physical attribute with a biometric system.
  9. 17. granting or denying access to an object based on the level of permissions or the actions allowed with the object.
Down
  1. 1. Account policies that help you control the composition and use of passwords.
  2. 2. The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
  3. 4. the ability to permit or deny access to resources on a network or computer.
  4. 5. plastic cards similar to credit cards that have an embedded memory chip that contains encrypted authentication information.
  5. 6. maintaining a record of the activity within the information system.
  6. 7. A system access control list is used by Microsoft for auditing in order to identify past actions performed by users on an object.
  7. 8. states that users or groups are given only the access they need to do their jobs and nothing more.
  8. 9. a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.