Social Engineering Techniques
Across
- 3. uses mobile phones as the attack platform
- 5. direct victims to spoofed websites
- 7. unsolicited bulk messages
- 9. spam over instant messaging
- 11. covertly discovering information
- 13. unauthorised user following behind users
Down
- 1. targets by incorrectly typed a URLs
- 2. attach to the beginning of data
- 4. poses as a trusted person
- 5. emails to get you to click on links
- 6. fake scenarios for users to give information
- 8. targeted phishing attack
- 10. attempts to receive personal info over the phone
- 12. arriving in chain letter fashion