Types of Social Engineering Tactics
Across
- 1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- 5. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- 6. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- 12. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
- 13. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
- 2. This attack targets individuals who can give the criminal physical access to a secure building or area.
- 3. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- 4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- 7. This attack centers around an exchange of information or service to convince the victim to act.
- 8. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- 9. A type of monitoring software designed to record keystrokes made by a user.
- 10. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- 11. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.