Ai Lin 8G: Social engineering

1234
Across
  1. 2. these attacks to the victim is asked in an app or a social media post to combine a few pieces of information or complete a short quiz to produce a name.
  2. 4. is an attack in which the perpetrator invents a scenario in order to give the data or money.
Down
  1. 1. is an attack designed to steal a victim's password or other sensitive data.
  2. 3. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable information.