cyber

1234567
Across
  1. 1. Combines technique from question 1 and , but engages the target through SMS/text messages.
  2. 5. Is a social engineering technique in which an attacker sends fraudulent emails, claiming to be from a reputable and trusted source.
  3. 6. Be care full with what personal information you share in your online presence or risk falling victim to ___, where an attacker uses that information to create a compelling, targeted attack.
Down
  1. 2. If you get ___ request from your friends, they could potentially be social engineers attacks.
  2. 3. When an attacker offers a free music download or gift card in an attempt to trick the user into providing credentials, that's ____.
  3. 4. Social engineers typically use fear and ____ to trick users into committing risky actions.
  4. 7. Not all social engineering attacks take place online such as in vishing where the attacker attempts to trick a victim into disclosing sensitive information or granting access to the target's computer over the---.