Across
- 6. a method of confirming identity by using two or more pieces of evidence (or factors) to an BLANK mechanism
- 8. does each person have the physical attribute being measured?
- 9. the act of claiming an identity, such as telling someone your name.
- 12. The command BLANK creates a new group in a Linux terminal
- 13. a secure shell (BLANK) key is an access credential.
- 14. is the physical attribute distinctive enough that it can be used to distinguish between individuals?
- 15. data, applications, systems, networks, and physical space.
Down
- 1. the process of validating identity. it includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.
- 2. how well does the specified attribute hold up to aging
- 3. a device or a file used to authenticate.
- 4. issued by. certificate authority and verify identity by using public keys, details on the owner of the certificate, details on the issuer of the certificate.
- 5. granting or denying access to an object based on the level of permissions or the actions allowed with the subject.
- 7. sometimes referred to as accounting, is maintaining a record of the activity within the information system.
- 10. users, applications, or processes that need access to objects.
- 11. an online service that manages identity information for other organizations.
