Select from the dropdown lists to complete the text.
Stage 1: ( Gain Access, Look, Learn, and Remain )
Like a burglar forcing open a door with a crowbar, cybercriminals usually gain entry through a ( network, front door ), an infected ( file, router ), junk email, or an app ( vulnerability, hardening ) to insert ( malware, firewall ) into a target network.