Types of Social Engineering Tactics

12345678910111213
Across
  1. 2. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. 3. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. 5. This attack centers around an exchange of information or service to convince the victim to act.
  4. 6. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. 8. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. 9. A type of monitoring software designed to record keystrokes made by a user.
  7. 10. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. 12. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. 13. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. 1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. 4. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. 7. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. 11. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.