Across
- 3. the method of authentication that requires 2 methods of verification
- 4. which policy requires you to secure your workstation
- 7. the B1 team responsible for overall network security
- 9. an email that attempts to solicit information
Down
- 1. the process of verifying a users identity
- 2. a computer infection
- 5. the process of email security requiring verification before access
- 6. which button in outlook that allows you to report an email as phishing
- 8. unwanted email
- 10. an unauthorized person attempting to access the network
