CIB March

1234567
Across
  1. 3. Public-Facing Application, Use of commands to take advantage of weaknesses in an Internet-facing computer system to cause unintended behavior
  2. 5. when a FIE can conceals a tailored link or file containing malware in something like an email, text message, or social media
  3. 6. is a form of social engineering that exploits SMS, or text, messages.
  4. 7. When a FIE conceals hyperlinks beneath legitimate clickable content
Down
  1. 1. Breach organizations who have access to intended victims
  2. 2. Targeted and customized e-mail attacks.
  3. 4. is the social engineering approach that leverages voice communication.