infosec terms

12345678910
Across
  1. 3. the method of authentication that requires 2 methods of verification
  2. 4. which policy requires you to secure your workstation
  3. 7. the B1 team responsible for overall network security
  4. 9. an email that attempts to solicit information
Down
  1. 1. the process of verifying a users identity
  2. 2. a computer infection
  3. 5. the process of email security requiring verification before access
  4. 6. which button in outlook that allows you to report an email as phishing
  5. 8. unwanted email
  6. 10. an unauthorized person attempting to access the network