Chapter 2

1234567891011121314151617181920
Across
  1. 2. The attack surface of social engineering
  2. 6. redirect users into a fake Web site masquerading as a legitimate one and divulging personal information
  3. 8. False or inaccurate misinformation that comes from a malicious intent.
  4. 10. An attack directed toward a small group of specific individuals
  5. 12. A social engineering attack that uses the SMS to send fraudulent text messages.
  6. 13. advanced Google search
  7. 14. Making something unintelligible
  8. 15. An invention or a work that is the result of creativity
  9. 18. The country-specific requirements that apply to data.
  10. 19. attack that takes advantage of electronically making payments or transferring funds
  11. 20. Voice phishing that uses a telephone call to contact the victim.
Down
  1. 1. The process of cleaning data to provide privacy
  2. 3. Creating a copy of original data to make it unintelligible
  3. 4. The highest level of data sensitivity
  4. 5. Obfuscation of sensitive data elements into a random string of characters.
  5. 7. Masquerading as a real or fictitious character
  6. 9. A device that detects or measures a physical property and responds to it.
  7. 11. Identifying data’s location
  8. 12. A means of eliciting information or convincing a user to take action that weakens.
  9. 16. disinformation
  10. 17. Obtaining private information through social engineering