Social Engineering Techniques

12345678910111213
Across
  1. 3. uses mobile phones as the attack platform
  2. 5. direct victims to spoofed websites
  3. 7. unsolicited bulk messages
  4. 9. spam over instant messaging
  5. 11. covertly discovering information
  6. 13. unauthorised user following behind users
Down
  1. 1. targets by incorrectly typed a URLs
  2. 2. attach to the beginning of data
  3. 4. poses as a trusted person
  4. 5. emails to get you to click on links
  5. 6. fake scenarios for users to give information
  6. 8. targeted phishing attack
  7. 10. attempts to receive personal info over the phone
  8. 12. arriving in chain letter fashion