Cybersecurity Week 1

12345
Across
  1. 3. A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
  2. 4. ___ trust network access is a set of technologies and functionalities that enable secure access to internal applications and remote users
  3. 5. A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers.
Down
  1. 1. Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
  2. 2. A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic