Unit 6 Security +

12345678910111213141516
Across
  1. 2. uses labels for both subjects (users who need access) and objects (resources with controlled access, such as data, applications, systems, networks, and physical space)
  2. 4. a list that identifies users or groups who have specific security assignments to an object.
  3. 7. process of copying changes to Active Directory on the domain controllers.
  4. 8. the verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.
  5. 10. type of access that is allowed or denied for an object.
  6. 11. a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.
  7. 12. group of related domains that share the same contiguous DNS namespace.
  8. 14. Account policies help you control the composition and use of passwords.
  9. 15. set of configuration settings applied to users or computers.
  10. 16. can be your role, position, or current project. This information can be used to determine policy and permission.
Down
  1. 1. The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
  2. 3. collection of related domain trees.
  3. 5. have limited permission
  4. 6. The point at which the number of false positives matches the number of false negatives in a biometric system.
  5. 8. developed by Microsoft, is a centralized database that contains user accounts and security information.
  6. 9. have complete control of the system
  7. 13. device or a file used to authenticate