Across
- 5. Those a user is given at a specific location, such as a folder or a file.
- 6. Those a user receives through another object, such as a group.
- 9. The point where the false acceptance rates and false rejection rates are equal
- 10. Ratio of the number of false acceptances divided by the number of identification attempts.
- 12. A physical token that requires it to be inserted into the computer’s USB port
- 13. Users cycle through different roles.
- 14. The standard authentication protocol on all versions of Microsoft Server when using the Active Directory
- 15. The process of validating a user
- 16. Allows semi-independent systems to work together so users of one system can access resources from another system.
Down
- 1. The measurement and analysis of a biological feature
- 2. Database of the network resources on a Microsoft network.
- 3. Those a user receives by default at a lower level.
- 4. Ratio of the number of false rejections divided by the number of identification attempts.
- 7. Closing or locking down any unnecessary paths on an operating system that can be used for unapproved access.
- 8. Allows semi-independent systems to work together so users of one system can access resources from another system.
- 11. All points or areas in a system that could be used or compromised to allow hackers entry into the system.
