Cybersecurity Week 1
Across
- 3. A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
- 4. ___ trust network access is a set of technologies and functionalities that enable secure access to internal applications and remote users
- 5. A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers.
Down
- 1. Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- 2. A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic