Social Engineering
Across
- 2. A high-profile company that fell victim to a whaling attack in 2016, resulting in significant financial losses.
- 3. A phishing attack that targets high-profile individuals such as executives.
- 4. Engineering The manipulation of people into performing actions or divulging confidential information through psychological tactics.
- 8. The act of attackers creating a fabricated scenario to steal information.
- 9. A physical security breach method where an attacker follows someone into a restricted area without authorization.
- 10. A psychological principle exploited in social engineering where individuals fear missing out.
- 11. A type of social engineering attack conducted over the phone.
- 12. When an authorized person allows an unauthorized person to enter a restricted area.
- 14. Pro Quo A method where attackers offer something in exchange for information.
Down
- 1. Manipulation Techniques Methods used in social engineering such as urgency, fear, and flattery to influence behavior.
- 5. Phishing Attackers create fake profiles and send connection requests to gather information and send phishing messages.
- 6. Leaving infected USB drives in public places to lure victims.
- 7. A social engineering attack that involves sending fraudulent text messages.
- 8. A type of social engineering attack that involves sending fraudulent messages designed to trick individuals into revealing sensitive information.
- 10. Phishing A form of phishing that uses personalized messages to target a specific individual or organization.
- 13. The act of pretending to be a trusted individual or organization to deceive someone.