Deborah Chen 8L : Social Engineering

123456
Across
  1. 3. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to tick them into providing valuable data.
  2. 4. ( also known as shoulder surfing.)
  3. 5. baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.
  4. 6. an attack that was designed from cyber criminals to make up fun quizzes or questions to find out more about their information.
Down
  1. 1. a set of methods used by cyber criminals to deceive individuals into handing over info that they can use for fraudulent purposes.
  2. 2. an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money.