Unit 2 - The Human Factor

123456789101112131415161718
Across
  1. 3. A social engineering tactic where an attacker fabricates a story to obtain information.
  2. 6. A set of rules that an organization follows to maintain security.
  3. 7. False alarms or fake warnings designed to trick people into taking action.
  4. 8. A documented series of steps to follow for security practices.
  5. 13. Phishing attacks carried out via SMS text messages.
  6. 16. Manipulating people into revealing confidential information.
  7. 17. Unauthorized access to or manipulation of computer systems or networks.
  8. 18. A cyberattack where fraudulent emails trick users into revealing sensitive data.
Down
  1. 1. Malicious software designed to frighten users into downloading harmful programs.
  2. 2. A tactic where an attacker manipulates a target into seeking their help, ultimately gaining access to sensitive information.
  3. 3. Gaining unauthorized access to a secured area by following an authorized person.
  4. 4. A targeted phishing attack aimed at a specific individual or organization.
  5. 5. The act of spying on someone’s screen or keyboard to obtain sensitive information.
  6. 9. The act of searching through trash to find confidential information.
  7. 10. A social engineering attack that lures victims with a tempting offer to steal their information.
  8. 11. To reduce the impact or risk of a security threat.
  9. 12. Abbreviation for gathering publicly available information to analyze a target.
  10. 14. Phishing attacks conducted over voice calls.
  11. 15. A phishing attack targeting high-profile executives or important individuals.