Deborah Chen 8L : Social Engineering
Across
- 3. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to tick them into providing valuable data.
- 4. ( also known as shoulder surfing.)
- 5. baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.
- 6. an attack that was designed from cyber criminals to make up fun quizzes or questions to find out more about their information.
Down
- 1. a set of methods used by cyber criminals to deceive individuals into handing over info that they can use for fraudulent purposes.
- 2. an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money.