Across
- 3. Public-Facing Application, Use of commands to take advantage of weaknesses in an Internet-facing computer system to cause unintended behavior
- 5. when a FIE can conceals a tailored link or file containing malware in something like an email, text message, or social media
- 6. is a form of social engineering that exploits SMS, or text, messages.
- 7. When a FIE conceals hyperlinks beneath legitimate clickable content
Down
- 1. Breach organizations who have access to intended victims
- 2. Targeted and customized e-mail attacks.
- 4. is the social engineering approach that leverages voice communication.
