CEH Chapter 9 Crossword Puzzle
Across
- 1. Legitimate application modified to include malware
- 5. AI generated speech mimicking a real persons voice
- 11. Social engineering attacks delivered through mobile devices
- 15. Luring victims with attractive items such as infected USB drives
- 17. Searching discarded materials for confidential information
- 19. AI generated video used to impersonate individuals
- 20. Changing inactive browser tabs into fake login pages
- 24. Voice based phishing conducted through phone or VoIP calls
- 25. Hijacking accounts using malicious QR login codes
- 26. Fake security alerts that pressure users to install malware
- 27. Phishing attack targeting executives or high value personnel
- 28. Copying legitimate communication and replacing links with malicious ones
- 29. Fake mobile application designed to steal user data
- 31. Entering secure areas with permission from an authorized user
- 33. Testing employees susceptibility to phishing attacks
- 34. SMS messages used to trick users into revealing information
- 35. Online scams using email websites or messaging platforms
- 36. Collecting personal data from social networking platforms
- 37. Manipulating people to reveal sensitive information
- 38. Following an authorized person into a restricted area without permission
- 39. Using stolen personal information for fraudulent activity
- 40. Creating problems so victims request help from attacker
Down
- 2. Fraudulent messages designed to steal login or financial information
- 3. Security method requiring multiple identity verifications
- 4. Verifying website destination before clicking links
- 6. Malicious link altering the original browser tab content
- 7. Establishing credibility before requesting information
- 8. Using perceived power or position to influence victims
- 9. Making victims believe an offer or resource is limited
- 10. Observing someone entering passwords or sensitive data
- 12. Extracting information through casual conversation
- 13. In person techniques used to trick individuals into sharing data
- 14. Offering services or assistance in exchange for credentials
- 16. Redirecting users to fake websites without their knowledge
- 18. Targeted phishing attack aimed at a specific individual
- 21. Creating pressure that forces victims to act quickly
- 22. Educating users to recognize social engineering attacks
- 23. Creating a believable story to obtain confidential information
- 30. Pretending to be a trusted person or employee
- 32. Abusing application permissions to access accounts