CEH Chapter 9 Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 1. Legitimate application modified to include malware
  2. 5. AI generated speech mimicking a real persons voice
  3. 11. Social engineering attacks delivered through mobile devices
  4. 15. Luring victims with attractive items such as infected USB drives
  5. 17. Searching discarded materials for confidential information
  6. 19. AI generated video used to impersonate individuals
  7. 20. Changing inactive browser tabs into fake login pages
  8. 24. Voice based phishing conducted through phone or VoIP calls
  9. 25. Hijacking accounts using malicious QR login codes
  10. 26. Fake security alerts that pressure users to install malware
  11. 27. Phishing attack targeting executives or high value personnel
  12. 28. Copying legitimate communication and replacing links with malicious ones
  13. 29. Fake mobile application designed to steal user data
  14. 31. Entering secure areas with permission from an authorized user
  15. 33. Testing employees susceptibility to phishing attacks
  16. 34. SMS messages used to trick users into revealing information
  17. 35. Online scams using email websites or messaging platforms
  18. 36. Collecting personal data from social networking platforms
  19. 37. Manipulating people to reveal sensitive information
  20. 38. Following an authorized person into a restricted area without permission
  21. 39. Using stolen personal information for fraudulent activity
  22. 40. Creating problems so victims request help from attacker
Down
  1. 2. Fraudulent messages designed to steal login or financial information
  2. 3. Security method requiring multiple identity verifications
  3. 4. Verifying website destination before clicking links
  4. 6. Malicious link altering the original browser tab content
  5. 7. Establishing credibility before requesting information
  6. 8. Using perceived power or position to influence victims
  7. 9. Making victims believe an offer or resource is limited
  8. 10. Observing someone entering passwords or sensitive data
  9. 12. Extracting information through casual conversation
  10. 13. In person techniques used to trick individuals into sharing data
  11. 14. Offering services or assistance in exchange for credentials
  12. 16. Redirecting users to fake websites without their knowledge
  13. 18. Targeted phishing attack aimed at a specific individual
  14. 21. Creating pressure that forces victims to act quickly
  15. 22. Educating users to recognize social engineering attacks
  16. 23. Creating a believable story to obtain confidential information
  17. 30. Pretending to be a trusted person or employee
  18. 32. Abusing application permissions to access accounts